Page 464 - Kaleidoscope Academic Conference Proceedings 2024
P. 464

2024 ITU Kaleidoscope Academic Conference




           to the development of your personal identity, including your   basis [22]. The voter is then concealed but the integrity of the
           ‘right  to  participate  in  essential  economic,  social,  cultural   process is maintained.
           and leisure activities’ that underpin that identity [16].
                                                              Over time focus has moved from general policy declarations
           Definitions of privacy are related to the concept of identity,   to guiding frameworks such as the General Data Protection
           and as such, are both fundamental to the establishment of   Regulation (GDPR) and UK Data Protection Act 2018 (DPA
           human rights. Privacy is about autonomy over who collects   2018), and Digital Personal Data Protection Act 2023 (India)
           and uses a person’s private information, and identity is about   which  are  among  many  rules  introduced  by  governments
           autonomy over being regarded as a unique individual made   aimed  at  protecting  society  from  potential  overreach  by
           up  of  many  characteristics  and  historical  events.  The   private  and  public  sector  entities.  Unfortunately,  these
           narrative view of personal identity focuses on our ability to   frameworks have in some cases been unable to limit the very
           engage  in  storytelling  and  to  create  narratives  about   governments  who  implemented  them  from  overstepping
           ourselves and as such we need to be able to select or omit the   consent mechanisms put in place to protect individuals and
           information we share about ourselves as we require [17]. In   society. We should also note that despite policy efforts to
           the Convention on the Rights of the Child Article 16 we see   empower online users regarding how they choose to share
           the mirroring of UDHR A12 in regard to privacy, but it also   their  data,  online  service  providers  privacy  policies  are
           specifically calls out protections for identity in Articles 8 and   shown to not provide real consumer options if users want to
           29 [18]. Whilst privacy and identity are closely related and   engage in services [23]. Without this control at an individual
           arguably  feed  one  another,  there  are  differences  [19].   level,  society  remains  exposed  for  wider  risks  to  our
           However, those differences do not detract from the argument   democratic civil rights.
           that by infringing upon someone’s privacy we also interfere
           with their identity. Unfortunately, we see the two concepts   Identity, anonymity, and policy are seen here as structural
           merge as data processors argue the need to verify an ‘identity’   elements of the privacy and human rights debate which are
           to be able to participate in their service offering securely, and   foundational to social structure and how individuals interact
           in doing so mine all characteristics of a person for the most   and  communicate  with  one  another.  Therefore,  how  we
           mundane services. It is in the interest of data collectors to   design communication and social connection tools such as
           understand  identity  as  that  will  indirectly  influence  our   the web becomes a discussion on how those tools can and
           behaviors [20] but this is a commercially driven reason to   will influence society and human rights.
           validate identity rather than a security reason. For us to have
           moral agency, we need to have the ability, as Laceulle states,   3.  IMPACT OF THE WEB
           to ‘live well, with and for others, according to one’s deepest
           aspirations and best capacities, as full participating members   The term Web 1.0 (W1.0) and later W2.0 are considered by
           of  a  society/community’  [17].  If  this  engagement  is  only   Berners-Lee  to  be  a  misnomer  that  implies  W2.0  was
           permitted through the relinquishment of our privacy, then we   something apart from W1.0, but in fact the functionality was
           are not being allowed to participate in society or to realize   all based on W1.0 standards and has simply been a more fully
           our  moral  agency  without  threat  of  exclusion  from  that   realized version of the original vision. However, post the dot-
           community should we wish to withhold information. This   com crash the team at O’Reilly had been looking to reassure
           condition in and of itself removes the agency we need to   the public that the Web was just as important as ever, and so
           secure our identities.                             coined the phrase W2.0, not to distinguish the next phase as
                                                              a  new  set  of  technologies,  but  more  a  societal  shift  in
           As  with  privacy  and  identity,  privacy  and  anonymity  are   financial  interest  and  support  [24].  That  said,  there  is  an
           related  yet  distinct  concepts.  Anonymity,  a  fundamental   acknowledged  step  change  of  capability  in  this  phase  of
           requirement in modern democratic politics, is the absence of   development, whether conceptually intended or not. It sees
           identifying traits or the concealment of them. Privacy on the   W1.0 in its static user content consumption form, morph into
           other  hand  is  the  restriction  of  those  identifiers  from  the   a social and collaborative user-generated content tool.
           public gaze [21]. Relating anonymity to privacy has become
           part of the discussion regarding civil rights and inclusivity,   When considering the development of W2.0 the technical
           with  the  concealment  of  hierarchizing  identity  markers   advances are almost overshadowed by the societal impact
           offering opportunities for meritocracy and to challenge the   they have had. We saw commentators evangelizing about the
           corporate  and  political  power  structures  that  jeopardize   potential societal benefits of the democratization of data and
           human rights. For this paper, we will not debate absence vs   the redistribution of political power. Lev Grossman wrote in
           restriction  and  the  potential  associated  challenges  to   Time  magazine  (2006)  ‘It's  a  story  about  community  and
           accountability  but  will  take  the  position  that  any  future   collaboration on a scale never seen before […]. It's about the
           ecosystem should have the ability to restrict identifiers to a   many wrestling power from the few and helping one another
           level of concealment appropriate to the functionality of the   for nothing and how that will not only change the world, but
           application being utilized. In a W3.0 ecosystem this could be   also change the way the world changes. The tool that makes
           supported by other technical design structures such as smart   this possible is […] Web 2.0, as if it were a new version of
           contracts and cryptographic hashing. For example, a voting   some old software. But it's really a revolution’ [25]. At the
           solution requires full concealment, but the application could   heart  of  these  references  is  the  belief  we  were  moving
           restrict voting on a one vote per Self Sovereign Identity (SSI)   knowledge from the hands of the few into the hands of the





                                                          – 420 –
   459   460   461   462   463   464   465   466   467   468   469