File #2512: "2018_Book_RememberingAndForgettingInTheD.pdf"

2018_Book_RememberingAndForgettingInTheD.pdf

Text

1|Preface|6
1|Content Overview|8
1|Contents|10
1|List of Contributors|16
1|Part I: Introduction|18
1|1 Overview, Purpose, and Scope|19
2|2 Structure, Contents, and Key Issues|23
2|3 Future Directions|29
1|Part II: Normative Concepts of Information Management|32
1|1 Introduction|33
2|2 Overarching Provisions of Swiss Law|35
3|2.1 The Swiss Federal Act on Data Protection (FADP)|35
3|2.2 The Federal Act on Freedom of Information in the Administration|39
3|2.3 The Federal Act on Archiving|40
2|3 Preservation|41
3|3.1 Purpose|41
4|3.1.1 General Remarks|41
4|3.1.2 Illustration Based on Selected Examples|42
5|3.1.2.1 Public Administration and Preservation of Government Interests|42
5|3.1.2.2 Preservation of Private Interests|43
5|3.1.2.3 Government Oversight|43
5|3.1.2.4 Preservation of National Heritage|44
3|3.2 Design|45
4|3.2.1 General Remarks|45
4|3.2.2 Illustration Based on Selected Examples|46
2|4 Deletion|49
3|4.1 Purpose|49
4|4.1.1 General Remarks|49
4|4.1.2 Illustration Based on Selected Examples|50
3|4.2 Design|51
4|4.2.1 General Remarks|51
4|4.2.2 Illustration Based on Selected Examples|52
2|5 Access|55
3|5.1 Purpose|55
4|5.1.1 General Remarks|55
4|5.1.2 Illustration Based on Selected Examples|56
3|5.2 Design|57
4|5.2.1 General Remarks|57
4|5.2.2 Illustration Based on Selected Examples|59
2|6 Loss of Relevance|62
3|6.1 Statute of Limitations|62
4|6.1.1 Purpose|62
4|6.1.2 Design|63
3|6.2 Right to Be Forgotten|66
2|7 Conclusion|70
3|References|71
1|Part III: Technological Developments|73
2|1 Introduction|74
2|2 Search Engines|76
3|2.1 Definition|76
3|2.2 Historical Development and Technical Operation|77
3|2.3 Significance of Search Engines|80
3|2.4 Threats and Risks|82
4|2.4.1 Search Engines as Informational Intermediaries: Credit History Reporting|82
4|2.4.2 Search Engines as Repositories of User Data: The Google Subpoena|85
3|2.5 Conclusion|87
3|References|87
2|3 Remembering and Forgetting in Social Media|89
3|3.1 Definition|89
3|3.2 Technology and Use|90
3|3.3 Numbers and Usage of Social Media|93
3|3.4 Risks|95
3|3.5 Social Media and Traditional Media|96
3|3.6 Social Media and Forgetting|97
3|3.7 Conclusion|98
3|References|99
2|4 Web Archives|101
3|4.1 Introduction|101
3|4.2 Definition|101
4|4.2.1 Web Archives|102
4|4.2.2 Web-Harvesting Techniques and Their Different Goals|102
4|4.2.3 Access to Web Archives|103
3|4.3 Web Archiving Initiatives|104
3|4.4 Benefit of Web Archives|106
3|4.5 Technology and Application Possibilities|107
4|4.5.1 Overview of Acquisition Methods|108
4|4.5.2 Current Challenges for Web Crawlers|109
4|4.5.3 Possibilities for Handling Technical Difficulties|110
4|4.5.4 Archiving Strategies|111
4|4.5.5 Access to Web Archives|113
3|4.6 Possible Developments and Key Changes in Comparison to the Classical Concept of Archiving|114
3|References|116
2|5 Mobile Internet|119
3|5.1 Internet Protocol as Trigger of the Digital Transformation|119
3|5.2 Ever Increasing Capacity|120
3|5.3 Entering a Whole New World of Mobile Services|122
3|5.4 Interdependencies Between Infrastructure and Services|123
4|5.4.1 Infrastructure Companies Offering All ICT-Services|123
4|5.4.2 OTT Service Providers Entering Infrastructure Markets|126
4|5.4.3 Two-Sided Markets and the Mobile Internet|127
3|5.5 Conclusion|129
3|References|130
1|Part IV: Interdisciplinary Perspectives|131
2|1 Remembering (to) Delete: Forgetting Beyond Informational Privacy|135
3|1.1 Individual Forgetting|136
3|1.2 Organizational Forgetting|137
3|1.3 Societal Forgetting|138
3|1.4 The Enduring Value of Forgetting|140
3|References|140
2|2 Forgetting: In a Digital Glasshouse|141
3|2.1 The Digital Age and the Renewed Interest in Forms of Forgetting|142
3|2.2 Forms of Forgetting in the Web|144
3|2.3 The Individual Right To Be Forgotten as a Fundamental Right|145
3|References|150
2|3 On the Interplay Between Forgetting and Remembering|152
3|3.1 Introduction|152
3|3.2 Remembering and Forgetting in Mathematics|155
3|3.3 Remembering and Forgetting in Information Technology|157
3|3.4 Data Science and Economics|159
3|3.5 The Digital Age|161
3|3.6 Practical Implications and Applications|162
3|References|164
2|4 On the Economics of Remembering and Forgetting in the Digital Age|165
3|4.1 Information in Economics|165
3|4.2 The Role of Information in ``Horizontal Interactions´´ Between Individuals|166
3|4.3 The Role of Information in ``Vertical Interactions´´ Between Individuals and Public Authority|168
4|4.3.1 The Principal-Agent View|169
4|4.3.2 The Government Mandate View|169
4|4.3.3 Endogenous Institutions and ``Sticky Information´´|170
4|4.3.4 Preventing Future Abuse of Today´s Information|171
3|4.4 Is the Quality of Information Endogenous?|173
3|4.5 Conclusion|176
3|References|176
2|5 A Political Economic Analysis of Transparency in a Digital World|178
3|5.1 Introduction|178
3|5.2 Information About Government in a Digital World|179
3|5.3 Benefits and Drawbacks of Increased Political Transparency in a Digital World|180
3|5.4 Conclusions|183
3|References|184
2|6 Digitalization and Social Identity Formation|186
3|6.1 Introduction|186
3|6.2 Social Theory of Remembering and Forgetting in Modern Societies|188
4|6.2.1 Mobility, Anonymity and the Evolution of Media of Interchange|189
4|6.2.2 Data, Information, Remembering and Forgetting|192
3|6.3 Identities in Social Encounters|194
4|6.3.1 Ceremonies of Remembering and Forgetting in Social Exchange|195
4|6.3.2 Everyday Digital Interaction|196
3|6.4 Objective Construction of Identity: Institutional Remembering and Forgetting|198
4|6.4.1 Identity and the Social Structure|199
4|6.4.2 A New Dimension: Digital Identity Structures|200
3|6.5 Conclusion: The Problem of Pseudo-Typification in Public Discourse|202
3|References|203
2|7 The Digital Age and the Social Imaginary|205
3|7.1 Introduction|205
3|7.2 Robert Downey, Jr.|206
3|7.3 Constructing Celebrities Through Media|207
3|7.4 Transgressing in Fame|208
3|7.5 Sacco´s Tweet|209
3|7.6 Regret and Reputation Management|210
3|7.7 Memory, Forgetting and Enacting|212
3|7.8 Summary|214
3|References|214
2|8 The Role of Temporal Construal in Online Privacy Behaviors|216
3|8.1 Introduction|216
3|8.2 Temporal Construal|217
3|8.3 Method|218
3|8.4 Results|219
3|8.5 Discussion|220
3|Appendix: Scenarios and Outcomes|221
4|Scenario 1|221
4|Scenario 2|222
4|Scenario 3|222
4|Scenario 4|222
4|Scenario 5|223
4|Evaluation of Outcomes|223
3|References|224
2|9 Remembering Prevails Over Forgetting: Archiving of Personal Data in the Analog and in the Digital Age|225
3|9.1 Introduction|225
3|9.2 Archiving of Personal Data in the Analog Age|226
3|9.3 The Impact of Digitization on the Archiving of Personal Data|229
3|9.4 Remembering and Forgetting in the Digital Age|232
2|10 Longevity: Remembering and Forgetting Personal Memories|233
3|10.1 Introduction|233
4|10.1.1 Longevity Changes Everything|233
4|10.1.2 Longevity Influences Future Values|234
4|10.1.3 Longevity Shapes the Legislative Agenda|234
4|10.1.4 Structure of this Chapter|235
3|10.2 Longevity as Individual and Collective Goal|236
4|10.2.1 Overcoming Diseases Is a Fundamental Need|236
4|10.2.2 Longevity Is Not Just More Years: It Is Better Years|237
3|10.3 Approaches to Longevity and Impact on Society|238
4|10.3.1 Approaches to Understanding Ageing|239
4|10.3.2 Scenarios 1 and 2: Evolutionary Longevity and Longevity ``to Go´´|241
4|10.3.3 Scenario 3: Privileged Longevity|242
4|10.3.4 Scenario 4: Cyborg Longevity|242
3|10.4 Challenges in Remembering and Forgetting Personal Memories|244
4|10.4.1 Decision Making: Remembering Personal Memories of Individuals?|246
4|10.4.2 The Definition of Self: Forgetting by a Forgiving Society?|247
4|10.4.3 Preventing Encrustation in Society: Eradicating an Individual´s Memories?|248
3|10.5 Principles for a Set of Guidelines on Remembering and Forgetting|249
4|10.5.1 Precautionary Long-Term Thinking and Trust in Future Generations|250
4|10.5.2 Good Reputation and Public Involvement|250
4|10.5.3 Anticipation|251
4|10.5.4 Improvisation|252
3|10.6 Concluding Remark|252
3|References|253
2|Part V: Design Guide|254
2|1 Addressees|255
3|2 Aim and Scope|256
3|3 Main Insights|258
3|4 Consequences|261
4|4.1 Precautionary Approach|261
4|4.2 Hierarchy of Concepts|262
4|4.3 Process, Not Rules|263
4|4.4 Policy Considerations|263
5|4.4.1 Regulatory Approach|263
5|4.4.2 Policy Proposals|264
3|5 Framework|266
4|5.1 Process|266
4|5.2 Alternative Mechanisms|268
4|5.3 Criteria|269
3|6 Final Observations|271
4|6.1 Trust in Change|271
4|6.2 Importance of Context|272
4|6.3 Conflict with Existing Data Protection Principles|272
4|References|274