11/11/2024
CYSE 201s
Prof. Yapli
Ahmed Kargbo
Privacy Threats in Intimate Relationships Privacy threats in intimate relationships | Journal of Cybersecurity | Oxford Academic
The article Privacy Threats in Intimate Relationships by Karen Levy and Bruce Schneier investigates how privacy is usually easily compromised within the conditions of close knit and personal relationships. This article relates to several social science principles such as: Human behavior and interaction, ethical considerations and the power of control dynamics etc.
Social Principles:
Human Behavior and Social Interactions:
In social science we take a deep dive at how individuals interact within their societies and how they act in relationships. This article touches on how technology impacts personal interactions and also privacy in intimate relationships. “A recent Pew survey found that the majority of parents check their teenagers’ browsing histories and social media profiles. Forty-eight percent looked through phone records and text messages, and 16% tracked teens’ locations via their cell phones; half reported knowing the password to their teenager’s email account” (Levy et al 3). Though most parents feel as if they are protecting their kids cyberlife by going through personal information, this is deliberately an act of privacy invasion. There are other ways to protect your kids online, such as setting restrictions and time limits through family shared and controlled accounts etc. Accessing a kid’s information might seem like something minor, but in the long run it could pose as harmful because it is more than likely that the individual will still actively be using the same email account and data in their future.
Ethical Considerations:
Social science takes into account all ethical issues in human behavior. This article highlights the questions about consent, autonomy, and the right to privacy and these are all centralized issues in social science. “In addition to being important on their own, intimate threats can be precursors to more traditional forms of privacy and security threat. Intimate privacy invasions can result in the destruction of valuable or personal data, like financial records or family photographs. They can be the first step in financial fraud”(Levy et al 6,7). Simply put, intimate threats commonly leverage data and information to their advantage similar to a cybercriminal but an individual wouldn’t think of it as a cyberattack simply because the issue didn’t transcend from a stranger.
Research Question:
How do technological advancements and surveillance capabilities affect privacy within intimate relationships? The authors monitor intimate relationships to identify privacy threats and determine their social impacts.
Research Methods and Analysis Collected:
Throughout the article, many surveys were broadcasted and interviews were conducted. It is safe to assume the author wanted to identify direct sources so they can prove more credible to the reader.
Concepts relating to CYSE 201s:
I’ve previously discussed how this article relates to Social Science, but specifically the biggest concept from this article that relates to our course material is the Impact on Society. The wide ranging privacy violations in intimate relationships severely affect societal norms and core values. We’ve reviewed social dynamics, social structures and identified how these social forces have shaped cybersecurity. It is best to simply learn and understand other cultures rather than judging.
Concerns and Contributions
The concern of this article is about Safety and Autonomy. For marginalized groups a lack of privacy can lead to many outcomes, even some harmful. Personal safety is a huge concern when debating the topic of privacy invasion. The lack of privacy challenges the concern for safety of individuals in abusive situations and relationships. Evidently marginalized groups are strong at advocating for stronger privacy measures contributing to proper cyber education and raising awareness.
Conclusion
Overall, this article measures several attempts of privacy invasions throughout a diverse pool. The authors monitor intimate relationships to identify privacy threats and determine their social impacts caused by technological advancements. For precautionary measures, after the study the authors call for a more complicated approach that would include a much stronger and legal protocol, in term to raise public awareness and prioritize safety and autonomy.
Cite
Levy, K., & Schneier, B. (2020, May 31). Privacy threats in intimate relationships. OUP Academic. https://academic.oup.com/cybersecurity/article/6/1/tyaa006/5849222?searchresult=1