{"id":585,"date":"2010-10-26T11:40:14","date_gmt":"2010-10-26T11:40:14","guid":{"rendered":"http:\/\/blog.soton.ac.uk\/comp6044\/?p=585"},"modified":"2010-10-26T11:40:14","modified_gmt":"2010-10-26T11:40:14","slug":"privacy-from-political-and-psychological-perspectives-and-how-this-concept-has-been-affected-by-the-development-of-the-web","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/comp6044\/2010\/10\/26\/privacy-from-political-and-psychological-perspectives-and-how-this-concept-has-been-affected-by-the-development-of-the-web\/","title":{"rendered":"Privacy from political and psychological perspectives and how this concept has been affected by the development of the Web"},"content":{"rendered":"<p style=\"margin-bottom: 0cm\" align=\"CENTER\"><span style=\"text-decoration: underline\"><strong>Privacy from political and psychological perspectives and how this concept has been affected by the development of the Web<\/strong><\/span><\/p>\n<p style=\"margin-bottom: 0cm\" align=\"CENTER\">\n<p style=\"margin-bottom: 0cm;font-weight: normal;text-decoration: none\" align=\"LEFT\">I am attempting to ascertain the psychological and political concepts and epistemological principles relating to the issue of privacy and in accordance how they can be applied to conceptions of privacy matters on the web. My aim will be to determine whether or not these disciplines compliment or contradict each other in relation to this issue.<\/p>\n<p style=\"margin-bottom: 0cm;font-weight: normal;text-decoration: none\" align=\"LEFT\">\n<p style=\"margin-bottom: 0cm;font-weight: normal;text-decoration: none\" align=\"LEFT\">For the psychology part of my study I am largely going to undertake my research in the area of &#8216;The Self&#8217; which is an established psychological school of thought, specifically the notion of the &#8216;Private Vs Public Self&#8217;. There could be a contrast between the two perceptions of individuals characters which the web could be helping to masquerade. For e.g. A person could have a hectic &#8216;online&#8217; life and appear popular with lots of friends on Facebook or Myspace and not be concerned about their personal and sensitive information being apparent for all to see but in the real world be a closed and private person. On the other hand someone may utilize the web to conceal the parts of their self that they don&#8217;t want to share, thus they would be more anxious about themselves being afforded adequate privacy on the web.<\/p>\n<p style=\"margin-bottom: 0cm;font-weight: normal;text-decoration: none\" align=\"LEFT\">\n<p style=\"margin-bottom: 0cm;font-weight: normal;text-decoration: none\" align=\"LEFT\">Core textbooks \u2013<\/p>\n<ul>\n<li>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">Leary, \tR. &amp; Tangney, J.P. (2003),<\/span><\/span><em><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">Handbook \tof Self and Identity,<\/span><\/span><\/em><span style=\"font-style: normal\"><span style=\"text-decoration: none\"><span style=\"font-weight: normal\"> The Guildford Press: New York.<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"font-style: normal\"><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">Sedikides, \tC. <\/span><\/span><\/span><em><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">The \tSelf<\/span><\/span><\/em><\/p>\n<\/li>\n<\/ul>\n<p style=\"margin-bottom: 0cm;font-weight: normal;text-decoration: none\" align=\"LEFT\">\n<p style=\"margin-bottom: 0cm;font-weight: normal;text-decoration: none\" align=\"LEFT\">For the political part  of my studies I am focusing on core undergraduate textbooks in order to obtain a basic understanding of the main principles relating to political matters which can be applied or linked to privacy issues. I am making a start in the area of  security networks and I have a particular interest in establishing the fundamental principles and ideas that influence the development of these networks. What are there priorities and what are there goals? Also with all the current furore of Governments &#8216;snooping&#8217; on its citizens via technological means is it possible to determine whether national security is paramount over individual privacy?<\/p>\n<p style=\"margin-bottom: 0cm;font-weight: normal;text-decoration: none\" align=\"LEFT\">\n<ul>\n<li>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">Boucher, \tD. &amp; Kelly, P. (2003), <\/span><\/span><em><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">Political \tThinkers \u2013 From Socrates to the Present&#8217;<\/span><\/span><\/em><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">, \tOxford University Press.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">Collins, \tA. (2007), <\/span><\/span><em><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">Contemporary \tSecurity Studies, <\/span><\/span><\/em><span style=\"font-style: normal\"><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">Oxford \tUniversity Press.<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\">\n<\/li>\n<\/ul>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"font-style: normal\"><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">I am also conducting some reading of books which deal with establishing the notion of privacy and how this concept has differed in light of growing technological advances. The two books which I am currently reading are:<\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\">\n<ul>\n<li>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"color: #000000\"><span style=\"font-family: 'Times New Roman', serif\"><span style=\"font-size: small\"><span style=\"font-style: normal\"><span style=\"font-weight: normal\">Kieron O&#8217;Hara and Nigel Shadbolt<\/span><\/span><\/span><\/span><\/span><span style=\"color: #000000\"><span style=\"font-family: 'Times New Roman', serif\"><span style=\"font-size: small\"><span style=\"font-style: normal\"><span style=\"font-weight: normal\">, <\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"font-family: 'Times New Roman', serif\"><span style=\"font-size: small\"><em><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">The Spy in the Coffee Machine \u2013 The end of privacy as we know it.<\/span><\/span><\/em><\/span><\/span><\/p>\n<\/li>\n<li>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"font-family: 'Times New Roman', serif\"><span style=\"font-size: small\"><span style=\"font-style: normal\"><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">Hal Abelson, Ken Ledeen and Harry Lewis<\/span><\/span><\/span><\/span><\/span><span style=\"font-family: 'Times New Roman', serif\"><span style=\"font-size: small\"><span style=\"font-style: normal\"><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">, Blown to bits \u2013 <\/span><\/span><\/span><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"font-family: 'Times New Roman', serif\"><span style=\"font-size: small\"><em><span style=\"text-decoration: none\"><span style=\"font-weight: normal\">Your life liberty and happiness after the digital explosion.<\/span><\/span><\/em><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"font-family: 'Times New Roman', serif\"><span style=\"font-size: small\"><em><span style=\"text-decoration: none\"><span style=\"font-weight: normal\"><br \/>\n<\/span><\/span><\/em><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"font-family: 'Times New Roman', serif\"><span style=\"font-size: x-small\"><em><br \/>\n<\/em><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"font-family: 'Times New Roman', serif\"><span style=\"font-size: xx-small\"><em><br \/>\n<\/em><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0cm\" align=\"LEFT\"><span style=\"font-family: 'Times New Roman', serif\"><span style=\"font-size: small\"><em><span style=\"text-decoration: none\"><span style=\"font-weight: normal\"><br \/>\n<\/span><\/span><\/em><\/span><\/span><\/p>\n<p style=\"margin-bottom: 0cm;font-style: normal\" align=\"LEFT\"><span style=\"font-family: 'Times New Roman', serif\"><span style=\"font-size: x-small\"><br \/>\n<\/span><\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Privacy from political and psychological perspectives and how this concept has been affected by the development of the Web I am attempting to ascertain the psychological and political concepts and epistemological principles relating to the issue of privacy and in accordance how they can be applied to conceptions of privacy matters on the web. My [&hellip;]<\/p>\n","protected":false},"author":125,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[262,263],"tags":[272],"class_list":["post-585","post","type-post","status-publish","format-standard","hentry","category-politics-discipline","category-psychology","tag-privacy"],"_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/posts\/585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/comments?post=585"}],"version-history":[{"count":6,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/posts\/585\/revisions"}],"predecessor-version":[{"id":594,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/posts\/585\/revisions\/594"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/media?parent=585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/categories?post=585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/tags?post=585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}