Your Data Is My Data: A Framework for Addressing Interdependent Privacy Infringements

  title={Your Data Is My Data: A Framework for Addressing Interdependent Privacy Infringements},
  author={Bernadette Kamleitner and Vince Mitchell},
  journal={Journal of Public Policy \& Marketing},
  pages={433 - 450}
Everyone holds personal information about others. Each person’s privacy thus critically depends on the interplay of multiple actors. In an age of technology integration, this interdependence of data protection is becoming a major threat to privacy. Yet current regulation focuses on the sharing of information between two parties rather than multiactor situations. This study highlights how current policy inadequacies, illustrated by the European Union General Data Protection Regulation, can be… 

Figures and Tables from this paper

Privacy self-management and the issue of privacy externalities: of thwarted expectations, and harmful exploitation
  • S. Brouwer
  • Computer Science
    Internet Policy Rev.
  • 2020
This article argues that the self-management of one's privacy is impossible due to privacy externalities, and offers two promising paths to address it-better enforcing the principle of data protection by design and by default, and relying on the framework of joint controllership.
Privacy please: Power distance and people’s responses to data breaches across countries
Information security and data breaches are perhaps the biggest challenges that global businesses face in the digital economy. Although data breaches can cause significant harm to users, businesses,
A Survey on Interdependent Privacy
This survey summary and analysis of research on interdependent privacy risks and on the associated (cooperative and non-cooperative) solutions systematize knowledge and provide insights on how this research should be conducted and which challenges it should address.
Would You Sacrifice Your Privacy to Protect Public Health? Prosocial Responsibility in a Pandemic Paves the Way for Digital Surveillance
It is suggested that prosocial responsibility besides motivating people to comply with anti-pandemic measures also undermines people’s valuation of privacy, and may act as a Trojan horse for privacy compromises.
The Transformation of Data Marketing: How an Ethical Lens on Consumer Data Collection Shapes the Future of Marketing
With a mass of customer data at our fingertips and the ability to use it to individualize promotion strategies, marketing communications, and product offerings, marketing activities are becoming more
Critical roles of knowledge and motivation in privacy research.
Interdependent Privacy Issues Are Pervasive Among Third-Party Applications
It is shown that interdependent privacy risks are enabled by certain permissions in all platforms studied, and actual apps request these permissions instantiating these risks.
The Competing Demands of Patient Privacy and Clinical Research.
A case study is presented that highlights the ethical concerns that arise when a patient who is employed by an academic medical center learns through a research invitational letter that her private information was accessed at this center without her consent.
Marketing and Public Policy in a “Runaway World”: A Commentary
In Runaway World, Giddens (2003) describes how globalization affects everything we do, propelling us into a “global order that no one fully understands,” but makes its effects felt on all of us (p.


A Contextual Approach to Privacy Online
In developing this approach, the paper warns that the current bias in conceiving of the Net as a predominantly commercial enterprise seriously limits the privacy agenda, and proposes an alternative approach, rooted in the theory of contextual integrity.
Understanding Privacy Online: Development of a Social Contract Approach to Privacy
Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared
Communication Privacy Management Theory
Petronio's Communication Privacy Management Theory has provided a full complement of principles and processes that explain the communicative system of decisions people make in considering revealing and concealing private information.
Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus
An extension to the privacy calculus model is developed, arguing that the situation‐specific assessment of risks and benefits is bounded by (1) pre‐existing attitudes or dispositions, such as general privacy concerns or general institutional trust, and (2) limited cognitive resources and heuristic thinking.
Surrendering Information through the Looking Glass: Transparency, Trust, and Protection
Trust and transparency influence consumer information exchanges, yet the understanding of how they shape marketing and public policy relating to privacy and security issues is not current with the
Examined Lives: Informational Privacy and the Subject as Object
In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests. On a theoretical
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
A critical analysis of the literature reveals that information privacy is a multilevel concept, but rarely studied as such, and calls for research on information privacy to use a broader diversity of sampling populations and to publish more design and action research in journal articles that can result in IT artifacts for protection or control of information privacy.
Can Consumers Experience Ownership for Their Personal Data?From Issues of Scope and Invisibility to Agents Handling Our Digital Blueprints
It is concluded that a very large fraction of personal data defies the logic and mechanisms of psychological possessions and is proposed to condense the boundless collection of data points into the singularized and graspable metaphor of a digital blueprint of the self.
Interdependent Privacy: Let Me Share Your Data
This paper defines online privacy interdependence, shows its existence through a study of Facebook application permissions, and model its impact through an Interdependent Privacy Game (IPG).
The illusion of personal data as no one's property
This paper argues that it is an illusion to suppose that data protection regimes, in Europe and elsewhere, need not deal with the issue of property rights in personal data. Building on the work of