题名

隱私不再?-以身體與訊息作為隱私概念雙重性的社會實作理論觀點探究

并列篇名

Privacy No More? - Body and Information As Duality of Privacy

DOI

10.29843/JCCIS.201807_(35).0004

作者

劉育成(Yu-Cheng Liu)

关键词

隱私實作 ; 穿戴式科技 ; 自我追蹤技術 ; 俗民方法學 ; 訊息 ; 身體 ; doing privacy ; wearable technology ; self-tracking technology ; ethnomethodology ; information ; body

期刊名称

資訊社會研究

卷期/出版年月

35期(2018 / 07 / 01)

页次

87 - 123

内容语文

繁體中文

中文摘要

本文主要探討科技(technology)與隱私(privacy)之間的關係。其中較為主要的觀點是,科學與技術發展在人們對於隱私概念的認知與實作上,構成不同程度之變化。本研究將從技術哲學觀點出發,輔以俗民方法學對於社會成員在日常生活中之實作的探討,並以行動數位設備或所謂「穿戴式科技(wearable technologies)」為例,提出對科技與隱私之關係在理論上不同的觀察。本研究在過去已建立之隱私研究的基礎上,發展「隱私實作(doing privacy)」概念,並期待可以適切地理解隱私概念內涵在電子媒介與網際網路時代的變化。本研究嘗試探究使用者的「隱私實作」是如何透過新技術的使用來完成,以及該實作對使用者成員而言具有的意涵。本研究的結論有二:第一,從理論觀點來看「隱私不再」的現象時指出,人們的隱私實作並不一定在嘗試維護或保有傳統上的隱私觀點,而是透過實作來建構、形塑新的隱私觀,此一新的隱私觀也透過新技術的開發與使用,反過來與使用者共同建構這個新的隱私概念。第二,從實作的觀點,隱私或許不再具有價值中立性,而是「訊息/身體」這組區別運作出來的突現物(emergent)。相較於過去將隱私視為一種「權利」,新型態的科技所形塑出來的隱私概念毋寧是一種反身性運作的暫時性成就(ongoing accomplishment),也更具有與科技共構、共生的特性。本研究也主張,此一特性在嘗試理解現代科技與隱私概念之構成的關聯性上,將扮演重要角色。

英文摘要

The study mainly concerns the relationship between technology and privacy. It focuses on the idea that the development of science and technology to a great extent comes from people's changing recognition of and practices of privacy. Inspired by the philosophy of technology and then through the observation of layperson's daily practices from ethnomethodological perspective, the study examines how wearable devices with self-tracking technology "re-shape" people's understanding of privacy with an emphasis on a transformation from "information as body's environment" to "information as body's environment". The discussion of the transformation leads to at least two concluding remarks. On one hand, "privacy no more" indicates that people's privacy practices with self-tracking technology are not necessarily maintaining or solidifying the traditional viewpoint of privacy; instead, they are used to construct a different one. On the other hand, privacy may not be value-free; rather, it emerges from the distinction of information and body. The concept of privacy re-shaped by self-tracking technology becomes reflexively an ongoing accomplishment. The aim of the study is to investigate how people's "doing privacy" is accomplished with the intervention of self-tracking technology, whether voluntarily or not, and to contribute to a further understanding of the relationship between privacy and technology.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 社會學
社會科學 > 傳播學
参考文献
  1. 江淑琳(2014)。流動的空間,液態的隱私:再思考社交媒體的隱私意涵。傳播研究與實踐,4(1),85-104。
    連結:
  2. 郭戎晉(2013)。論個人資料保護法制中「技術設計」入法趨勢—以歐盟為觀察對象。Communications of the CCISA,19(3),65-79。
    連結:
  3. 郭明煌、廖鴻圖、蕭麗齡、王亭雅(2014)。資訊隱私顧慮對社群網站使用者使用意圖影響之研究—以Facebook為例。中華民國資訊管理學報,21(4),341-364。
    連結:
  4. 黃聖峯、鄒仁淳、林娟娟(2014)。社群網站之使用行為研究—以Facebook為例。電子商務研究,12(2),201-234。
    連結:
  5. 黃筱鈞、莊文勝(2012)。社交網站安全且有效率之擁護隱私保護機制。電子商務研究,10(3),257-268。
    連結:
  6. 劉靜怡(2012)。社群網路時代的隱私困境:以Facebook為討論對象。台大法學論叢,41(1),1-70。
    連結:
  7. Agar, N.(2014).Truly human enhancement: A philosophical defense of limits.Cambridge, Massachusetts:The MIT Press.
  8. Agre, P. E.(Ed.),Rotenberg, M.(Ed.)(1998).Technology and privacy: The new landscape.Cambridge, Massachusetts:The MIT Press.
  9. Baecker, D.(Ed.)(1999).Problems of form.Stanford, California:Stanford University Press.
  10. Bauman, Z.(2004).Liquid modernity.Cambridge:Polity Press.
  11. Bauman, Z.、張君玫譯(1998)。全球化:對人類的深遠影響。台北市:群學。
  12. Blackman, J.(2009).Omniveillance, Google, privacy in public, and the right to your digital identity: A tort for recording and disseminating an individual's image over theinternet.Santa Clara Law Review,49(2),313-392.
  13. Blatterer, H.(ed.),Johnson, P.(ed.),Markus, M. R.(ed.)(2010).Modern privacy: Shifting boundaries.New Forms. UK:Palgrave Macmillan.
  14. Blatterer, H.(Ed.),Johnson, P.(Ed.),Markus, M. R.(Ed.)(2010).Modern privacy: Shifting boundaries, new forms.UK:Palgrave Macmillan.
  15. Bostrom, N.(2014).Superintelligence: Paths, dangers, strategies.Oxford, UK:Oxford University Press.
  16. Broek, L. J. v. d.,Bergers, L. I. J. C.,Reijnders, C. M. A.,Gibbscorresponding, S.(2017).Progress and future prospectives in skin-on-chip development with emphasis on the use of different cell types and technical challenges.Stem Cell Reviews,13(3),418-429.
  17. Cabrera, L. Y.(2015).Rethinking human enhancement: Social enhancement and emergent technologies.Hampshire, UK:Palgrave Macmillan.
  18. Calvert, C.、林惠娸譯、陳雅汝譯(2000)。偷窺狂國家。台北:商周。
  19. Castells, M.(2000).The rise of the network society.Oxford, U.K.:Blackwell Publishers.
  20. Christin, D.,Reinhardt, A.,Kanhere, S. S.,Hollick, M.(2011).A survey on privacy in mobile participatory sensing applications.The Journal of Systems and Software,84,1928-1946.
  21. Craig, T.(ed.),Ludloff, M. E.(ed.)(2011).Privacy and big data.Sebastopol, CA:O'Reilly.
  22. Dijk, J. A. G. M. v.(2006).The network society: Social aspects of new media.London:SAGE Publications.
  23. Dwyer, T.(2015).Convergent media and privacy.Hampshire, UK:Palgrave Macmillan.
  24. Eilers, M.(ed.),Grüber, K.(ed.),Rehmann-Sutter, C.(ed.)(2014).The human enhancement debate and disability: New bodies for a better life.Hampshire, UK:Palgrave Macmillan.
  25. Fiore-Gartland, B.,Neff, G.(2015).Communication, mediation, and the expectations of data: Data valences across health and wellness communities.International Journal of Communication,9,1466-1484.
  26. Fortunati, L.(2003).Real people, artificial bodies.Mediating the human body: Technology, communication, and fashion,New Jersey:
  27. Frye, C. D.(2001).Privacy-enhanced business.Westport, Connecticut:Quorum Books.
  28. Garfinkel, H.(1992).Studies in ethnomethodology.Cambridge:Polity Press.
  29. Gavison, R.(1980).Privacy and the limits of the law.Yale Law Journal,89,421-471.
  30. Hassan, R.(2009).Empires of speed: Time and the acceleration of politics and society.Leiden:Brill.
  31. Hauskeller, M.(2013).Better human? Understanding the enhancement project.Durham, UK:Acumen.
  32. Heidegger, M.(1992).Basic writings: Ten key essays, plus the Introduction to Being and Time.San Francisco:
  33. Hoyle, R.,Templeman, R.,Armes, S.,Anthony, D.,Crandall, D.,Kapadia, A.(2014).Privacy behaviors of lifeloggers using weearable cameras.UbiComp '14 Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing,Seattle, Washington:
  34. Ihde, D.(1990).Technology and the lifeworld.Bloomington:Indiana University Press.
  35. Katherine, A.(2013).Boundaries in an overconnected world.Novato, California:New World Library.
  36. Katz, J. E.(Ed.)(2003).Machines that becomes us.New Brunswick:Transaction Publishers.
  37. Lane, J.(Ed.),Stodden, V.(Ed.),Bender, S.(Ed.),Nissenbaum, H.(Ed.)(2014).Privacy, big data, and the public good: Frameworks for engagement.Cambridge:Cambridge University Press.
  38. Lash, S.(2002).Critique of information.London:Sage.
  39. Levmore, S.(Ed.),Nussbaum, M. C.(Ed.)(2010).The offensive internet: Speech, privacy, and reputation.Cambridge, Massachusetts:Harvard University Press.
  40. Levy, S.(2001).Crypto.New York:Viking Penguin.
  41. Lilley, S.(2013).Transhumanism and society: The social debate over human enhancement.New York:Springer.
  42. Longo, G. O.(2003).Body and technology: Continuity or discontinuity.Mediating the human body: Technology, communication, and fashion,New Jersey:
  43. Luhmann, N.(1984).The self-description of society: Crisis fashion and sociological theory.International Journal of Comparative Sociology,25(1-2),59-72.
  44. Luhmann, N.(1995).The paradoxy of observing systems.Cultural critique: The politics of systems and environments, Part II,31,37-55.
  45. Luhmann, N.,Fuchs, S.(1988).Tautology and paradox in the self-descriptions of modern society.Sociological Theory,6(1),21-37.
  46. Lupton, D.(2014).Digital sociology.London:Routledge.
  47. Lyon, D.(Ed.),Zureik, E.(Ed.)(1996).Computers, surveillance, and privacy.Minneapolis:University of Minneapolis Press.
  48. Madden, M. (2012). Privacy management on social media sites. Retrieved from Washington, D.C.:
  49. Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M. (2013). Teens, social media, and privacy. Retrieved from Washington, D.C.
  50. Maldonado, T.(2003).The body: Artificialization and transparency.Mediating the human body: Technology, communication, and fashion,New Jersey:
  51. Marwick, A. E.,boyd, d.(2014).Networked privacy: How teenagers negociate context in social media.New Media & Society,16(7),1051-1067.
  52. Mason, P.(2015).Postcapitalism: A guild to our future.UK:Penguin.
  53. Mauss, M.(1973).Techniques of the body.Economy and Society,2(1),70-88.
  54. McLuhan, M.(1994).Understanding media: The extension of man.Cambridge, Massachusetts:The MIT Press.
  55. Moore, B.(1984).Privacy: Studies in social and cultural history.Armonk, New York:M. E. Sharpe, INC..
  56. Nemati, H. R.(Ed.)(2009).Techniques and applications for advanced information privacy and security.New York:IGI Global.
  57. Nissenbaum, H.(2010).Privacy in context: Technology, policy, and the integrity of social life.Stanford, California:Stanford University Press.
  58. O'Hara, K.,Shadbolt, N.(2008).The spy in the coffee machine: The end of privacy as we know it.London:Oneworld Publications.
  59. Preneel, B.(Ed.),Ikonomou, D.(Ed.)(2014).Privacy technologies and policy.Switzerland:Springer International Publishing.
  60. Rainie, L., Kiesler, S., Kang, R., & Madden, M. (2013). Anonymity, privacy, and security online. Retrieved from http://www.pewinternet.org/2013/09/05/anonymity-privacyand-security-online/
  61. RocketFuel. (2014). “Quantified self” digital tools: A CPG marketing opportunity. Retrieved from http://quantifiedself.com/docs/RocketFuel_Quantified_Self_Research.pdf
  62. Rosa, H.(2003).Social acceleration: Ethical and political consequences of a desycchronized high-speed society.Constellations,10(1),3-33.
  63. Rosa, H.(Ed.)(2009).High-speed society.University Park, Pennsylvania:The Pennsylvania State University Press.
  64. Rosa, H.,Trejo-Mathys, J.(Trans.)(2013).Social acceleration: A new theory of modernity.New York:Columbia University Press.
  65. Rudder, C.(2014).Dataclysm: Who we are.New York:Crown Publishers.
  66. Schiphorst, T.(2009).Body matters: The palpability of invisible computing.Leonardo,42(3),225-230.
  67. Selke, S.(Ed.)(2016).Lifelogging: digital self-tracking and lifelogging - between disruptive technology and cultural transformation.Wiesbaden:VS Verlag fur Sozialwissenschaften.
  68. Solove, D. J.(2007)."I've got nothing to hide" and other misunderstanding of privacy.San Diego Law Review,44,745-772.
  69. Solove, D. J.(2004).The digital person.New York:New York University.
  70. Spencer-Brown, G.(1969).Laws of form.London:Geroge Allen and Unwin Ltd..
  71. Stiegler, B.,Beardsworth, R.(Trans.) ,Collins, G.(Trans.)(1998).Technics and time.Stanford, California:Stanford University Press.
  72. Strandburg, K. J.(Ed.),Raicu, D. S.(Ed.)(2006).Privacy and technologies of identity.New York:Springer.
  73. Virilio, P.,Turner, C.(Trans.)(2005).The information bomb.London:Verso.
  74. Wajcman, J.(2014).Pressed for time: The acceleration of life in digital capitalism.Chicago:The University of Chicago Press.
  75. Waldo, J.,Lin, H. S.,Millett, L. I.(2007).Engaging privacy and information technology in a Digital age.
  76. West, C.,Fenstermaker, S.(1995).Doing difference.Gender & Society,9(1),8-37.
  77. West, C.,Zimmerman, D. H.(1987).Doing gender.Gender & Society,1(2),125-151.
  78. West, C.,Zimmerman, D. H.(2009).Accounting for doing gender.Gender & Society,23(1),112-122.
  79. Wufuer, M.,Lee, G.,Hur, W.,Jeon, B.,Kim, B. J.,Choi, T. H.,Lee, S.(2016).Skin-ona-chip model simulating inflammation, edema and drug-based treatment.Scientific Reports,6(37471),1-12.
  80. Yu-cheng, L.(2012).Ethnomethodology reconsidered: The practical logic of systems theory.Current Sociology,60(5),581-598.
  81. 王俊程、李宜昌、洪銘建(2002)。隱私市場—數位商品分享之價值。資訊管理研究,4(3),119-136。
  82. 邢姍姍、閻瑞彥、蔡馨瑩、張家菱(2013)。隱私或人氣?隱私態度與個人因素對社群網站後續使用行為之影響。北商學報,24,71-92。