Framing the future of privacy: citizens’ metaphors for privacy in the coming digital society
© The Author(s) 2017
Received: 30 June 2017
Accepted: 17 October 2017
Published: 24 October 2017
Privacy is one of the pressing issues of the digital age. New technologies and surveillance practices continuously present new privacy threats. This paper reports an exploratory qualitative study on non-experts’ metaphors for privacy in future society using focus group material from three countries: Finland, Germany and Israel. Using thematic analysis, four metaphorical frames for privacy are constructed: ‘dodo’, ‘hemline’, ‘savings’ and ‘foundations of our home’. The frames are analysed using the causal layered analysis method to uncover their systemic and worldview components. Taken together, the metaphorical frames highlight two key concerns of individuals: their struggle for control over a dominating future, on the one hand, and the problem of trust in collective means of privacy protection, on the other hand. The article concludes that the views of non-experts need to be included in broad societal discussion about a desirable future society and the role of privacy in that society. This discussion needs to seriously consider systemic interconnections that challenge privacy as well as the whole ecosystem of metaphorical frames for privacy.
Privacy is one of the pressing issues of the digital age. Privacy topics are discussed in the media every day, often in connection with new and emerging technologies. Current privacy threats include ubiquitous computing, radio-frequency identification, Big Data and behaviour in online social networks [1–5: 1]. Edward Snowden’s revelations of NSA surveillance, in turn, have amplified the debate about the limits of governmental data collection . While privacy may seem like a lost cause, there are also efforts to ensure privacy protection in the new technological landscape. Particularly in Europe, privacy issues are high on the agenda: the data protection reform process has culminated in the General Data Protection Regulation which was adopted on 27 April 2016.
Privacy has been studied extensively in recent decades [7, 8], and previous research projects have also studied possible futures of privacy in the context of emerging technologies [3, 9]. The stream of privacy literature has demonstrated that privacy fulfills the criteria of a wicked problem: it is multifaceted, there are many actors and possible solutions, and solutions are likely to create novel problems .
Privacy is also a deeply personal issue which influences the everyday life of ordinary citizens . Therefore, the futures of privacy cannot be governed top-down and only discussed in specialist debates on data protection. We must consider the views of citizens in addition to experts and technology developers. In particular, citizens need to be empowered to consider preferred futures themselves. In foresight and anticipatory governance of emerging technologies, there is a growing trend towards citizen participation [12–14]. Even though participation brings new challenges, ordinary citizens need to take part in anticipatory discussions which touch on their everyday lives. By using a relatively long future time horizon, individuals can freely express their hopes and fears regarding privacy. The views of non-experts can act as a reference when reforming privacy governance and designing information systems.
This article presents an explorative qualitative study on citizens’ thinking on long-term futures of privacy. The intention is to map ordinary citizens’ privacy conceptions and futures thinking rather than to uncover new knowledge about probable technological development or envision desirable futures. Causal layered analysis is used to study material from three focus groups conducted in 2012 in Finland, Germany and Israel. The future time horizon is 2050, although the exact year is not critical because anticipatory ideas are unlikely to be coded by year in individuals’ thinking. In contrast to forecasting possible futures, the long-term future is used as a methodological tool to map citizens’ thinking. In our searches, we have not been able to find literature that deals with citizens’ anticipation of long-term privacy futures.
The article is structured as follows. In the first two sections, we will discuss the key concepts of the study, privacy conceptions and metaphorical futures thinking. Then, we will introduce the empirical data and the analysis methods. In the analysis section, we will present the results of the analysis followed by a discussion of the implications.
The qualitative analysis revealed four metaphorical frames for privacy in the future: privacy as the dodo, as the hemline, as savings and as foundations of our home. Privacy was conceptualised either in individualistic or collective terms. For the individualistic framing, the key concern is individual control. For the collective framing, in turn, the central question is trust in collective means of protecting privacy. The lessons from this study for societal debate are twofold. Firstly, broad societal debate is needed on a desirable society and the role of privacy in that society, taking into account systemic interconnections and possible system traps. Secondly, the discussion needs to consider the whole ecosystem of different privacy conceptions, worldviews and framing metaphors.
During several decades of privacy scholarship, defining privacy has proven to be difficult. Privacy is a complex phenomenon that is discussed in many fields including political science, computer science, legal theory and information systems [5: 67]. Privacy is also a controversial, normatively loaded and dynamically evolving concept [15: 11, 16: 132, 5: 67]. In contemporary research, privacy is generally defined as a multi-dimensional construct, encompassing physical space, social relations, psychological and decisional interference, and control over personal information [16: 135–144, 17: 12–13, 18].
The relational and contextual nature of privacy has also been emphasised in privacy scholarship. Privacy is a societal value [19: 220–231], and a contextual phenomenon that concerns different norms at home, in the workplace, in the online environment and in leisure activities [5, 15, 20]. Likewise, privacy violations are contextual, including surveillance, intrusion and illegitimate data aggregation [17: 40–49, 104]. Following Nissenbaum [5: 140], privacy can be defined briefly as sets of norms which govern acceptable data flows in different contexts.
However, for this paper, individual conceptions of privacy are more important than general definitions. Because individuals are the targets of privacy violations, discussions of privacy need to take into account how privacy is experienced by individuals [11: 47–48]. Privacy conceptions refer to the subjective ways in which individuals frame privacy: their perceived vulnerabilities and specific issues of concern. In particular, privacy conceptions refer to the cognitive aspects of privacy attitudes, as opposed to the affective aspects .
Privacy concerns are an established topic in the information systems literature, for instance in studies of privacy-related behaviour [21, 22]. However, privacy conceptions are more fundamental because the conception defines what an individual is concerned about . Nevertheless, individual differences in privacy conceptions have thus far received little analytical attention .
In this article, we connect privacy conceptions to metaphorical frames of privacy in future society using focus group material. Miltgen and Peyrat-Guillard  have previously utilised focus groups in an extensive study of privacy concerns, but their focus was on understanding current privacy behaviour, disclosure and protection, rather than examining subjective privacy conceptions in the context of the long-term future.
Cultural frames and metaphors for imagining futures
This article studies the cultural frames that ordinary citizens use when imagining futures of privacy. The long-term future is used as a tool to investigate these frames. Cultural frames are important because they shape expectations and discussions regarding the future . Futures thinking is influenced by individuals’ beliefs about the past, and about causes and effects as well as their broader cultural worldview [25, 26]. In futures research, the image of the future, an imagined future that influences action, is a closely related concept [25, 27, 28]. Recent psychological research has also examined futures thinking under the term prospection, which includes developing mental representations of a general or abstract state of the world (‘semantic simulation’) [29, 30]. In this article, the cultural frame is understood as the perspectivising lens that influences the perceived key issue or issues concerning futures of privacy.
Because cultural frames are complex, we have chosen to investigate them using metaphors. We understand metaphors in Lakoff and Johnson’s sense, as conceptual mappings between different domains — something abstract understood in terms of something more concrete [31, 32]. In particular, we focus on understanding the role of privacy in future society through different metaphors. The assumption is that frames for imagining futures are largely metaphorical, but this claim is not studied in depth in this paper. Instead, we utilise metaphors as tools for communicating the essential aspects of a cultural frame.
Metaphors are a growing area of study within futures research . To a large extent, the existing literature has focused on utilising metaphors for effective scenario building and successfully communicating scenarios [34, 35]. In contrast, in this paper we focus on metaphorical thinking of ordinary citizens outside explicit foresight processes. Existing images of the future influence individuals’ behaviour and thus partly shape the emergent future [25: 32–33, 27: 1, 28: 82]. More importantly, it is necessary to become aware of existing frames as a first step towards discussing and shaping desirable futures.
Privacy conceptions, discussed in the previous chapter, constitute one part of the frames for understanding privacy futures. However, the broader frame also includes many other dimensions such as worldviews and ideologies. Causal layered analysis, introduced in the methodology section, is used as the framework for operationalising these concepts [36–38]. In the subsequent sections, we will first introduce the empirical data and then explain our approach to identifying and analysing metaphorical frames using thematic analysis and causal layered analysis.
Empirical data and analysis methods
As empirical material, this article uses focus groups conducted in 2012.1 Three focus group discussions were held: one in Finland, Germany and Israel.2 Focus groups are a suitable data collection method for studying complex topics because they allow participants to explore issues using their own words . Focus groups have been utilised to study privacy concerns in the context of new technologies [23, 40], but to our knowledge focus groups have not been used to study individuals’ thinking on the future of privacy.
Gender distribution of the focus group participants
Age distribution of the focus group participants
We analyse the frames using the causal layered analysis (CLA) method. Causal layered analysis is a qualitative futures research method that facilitates the in-depth study of beliefs about the future by dividing future-related texts into four layers: litany, system, worldview and metaphor [36–38]. In causal layered analysis, long-term futures are used as a methodological tool for examining present beliefs rather attempting to forecast possible futures. Analytical attention is drawn to futures thinking in the present, in this case the futures thinking of ordinary citizens.
CLA is a versatile method and the layers can be interpreted in different ways. In this study, the goal is to investigate metaphorical frames for the future of privacy. Therefore the material needs to be divided according to core metaphors. We chose to divide the material according to clusters of participants, assuming that each individual has certain systemic beliefs, a certain worldview and core metaphor when considering futures of privacy, and that similar individuals can be grouped into clusters. We acknowledge that this is a simplification and individuals may simultaneously hold several conflicting views. Our interpretation of the layers is given below.
What is the participant’s conception of privacy and of the functions of privacy ? Is privacy viewed from a normative or descriptive perspective ? Is privacy primarily framed in terms of physical space, social relations, decisional interference or control [16–18]?
What are seen as threats or drivers of change? What are the roles of technology, state and corporate institutions and culture ?
What kinds of solutions are presented?
Are individuals seen to have control over sharing personal information or is such control an illusion ?
How is the development of privacy over time perceived?
The worldview layer is understood through Mary Douglas’s cultural theory which identifies four ways of perceiving social relations (four ‘ways of life’): individualism, hierarchy, egalitarianism and fatalism [10, 45, 46]. In cultural theory, two dimensions are used for distinguishing between the different worldviews: the level of group pressure and the level of hierarchy. In this study, the four worldviews are used in a heuristic manner without extensive analysis.
The fourth layer, metaphor, is interpreted through Lakoff and Johnson’s theory of metaphors as conceptual mappings between different fields [31, 32]. In this case, the abstract phenomenon of privacy is understood through some other phenomenon, which influences how the future role of privacy in envisioned. Thus metaphors take the form ‘privacy as something’. Moreover, we assume that metaphors are generally not directly mentioned in the discussions, and thus finding metaphors requires close reading and interpretation.
The six sub-questions on the system layer were used as the criteria for clustering the focus group participants.3 First, the focus group discussions were coded in the Dedoose web application based on the themes listed above.4 Then, each individual’s comments were investigated separately. We clustered the participants into four groups based on similar views on these themes. Quantitative clustering based on usage of words was deemed unreliable due to the complexity of privacy conceptions. Thus the clustering was done in a qualitative manner, relying on researchers’ judgments. This process is inevitably somewhat subjective since the questions listed above were not asked directly in the focus groups. Instead, views on these themes are derived from conversations which are complex social situations.
The clustering process began with identifying participants whose views clearly differed from each other and placing these participants in different clusters. Then participants that were similar to these initial ‘cluster centres’ were placed into the respective clusters. Ultimately, a relatively coherent clustering was achieved. In the next section, we present the four metaphorical frames that we identified.
Four metaphorical frames for privacy in the coming digital society
In this section, each metaphorical frame is discussed and summarised in a table. The four frames are constructed as ideal types: hypothetical characterisations of a phenomenon in its purest form, aimed at capturing its essential features [47, 48: 18–22]. The composition of the clusters according to age, gender, and focus group is presented in Appendix 2.
Privacy as the dodo
Causal layered analysis of privacy as the dodo (n = 12)
Privacy is significantly diminished and surveillance and data collection using new technologies are everyday phenomena
Conception of privacy: Normative. Privacy as the right to be let alone and wide control over personal information. Privacy is extremely important.
Threats: Companies, governments and hedonistic individuals such as young people who unthinkingly share their data
Responsible actor: Individual
Solutions: Personal coping strategies
Individual control: Control is illusory, individuals have lost control over their privacy
Development: Gradual systemic drift to low privacy.
Privacy as the dodo
Companies and governments are seen as active agents and threats to privacy. Privacy protection is seen as the responsibility of individuals who are hedonistic consumers with little control over their privacy. In the Finnish focus group, one participant expressed the threat of shifting standards: “the threat is that we begin to consider control as self-evident and even compatible with our own interest” (male, 21–30 years). Another Finnish participant spoke of a numbing effect that continuous data collection has on people (female, 31–40 years). One Israeli participant claimed that “young people are willing to expose themselves completely and they don’t mind” (female, 61+ years).
Decreasing expectations of privacy lead to a decreasing overall level of privacy and vice versa. There is a negative feedback loop with no balancing loop to stop the drift . Companies establish services and practices which diminish privacy norms, which in turn creates more demand for such services. The drift to low privacy is viewed as a path-dependent process where future options are dramatically reduced: “We can’t divert from the path we walk on this regard” (male, 51–60 years, Israel). Already today it is difficult for individuals to discard services such as Facebook and Google because they have become part of the normal lifestyle.
The worldview is fatalistic. Individuals tragically lose their autonomy to act against powerful actors and trends which determine the future. In Douglas’s cultural theory, the fatalistic worldview is the worldview of prisoners and servants, and more generally of culturally isolated and strictly supervised groups, which fits the image of lost privacy and autonomy .
Privacy as the hemline
Causal layered analysis of privacy as the hemline (n = 5)
Privacy will remain important but it will be perceived differently
Conception of privacy: Privacy is a shared value and a personal preference. It is important but not the first priority.
Responsibility: Shared between society and individuals
Solutions: Common sense, traditional mechanisms, regulation
Individual control: Real
Development: Slow evolution through continuous negotiation
Privacy as the hemline
On the system level, the future of privacy is characterised by continuity and relatively slow evolution compared to the present situation. Like fashion trends, privacy continuously evolves — in a certain period, the fashionable hemline is low and some years later it is higher before again returning to a low hemline. The perception of privacy will be different in the future due to new communications technologies, but privacy as an institution is not in great danger. Privacy will remain important and in the most fundamental aspects of life it will remain similar. Awareness of possible threats will lead to people holding on to privacy more tightly.
Traditional cultural and institutional methods of privacy protection such as consent and professional confidentiality and personal coping tactics are viewed as sufficient. Privacy is therefore in a state of relative equilibrium and there are no radical systemic challenges to current privacy norms. The main threats are seen to come from criminals engaging in identity theft, for example. In general, individuals are considered as active in controlling their privacy. The evolution of privacy occurs through pragmatic and contextual negotiation, weighing the benefits and risks. As one participant put it, “we shouldn’t get hysterical” (male, 51–60 years, Finland). On the one hand, there are concerns over one’s profile being in many places but on the other hand, one can also benefit from improved services by giving information (male, 51–60 years, Finland).
The worldview is individualistic. Although privacy is viewed as a shared value, individuals are continuously engaging in negotiation with their privacy. If the benefits are attractive, privacy can be flexibly negotiated. When negotiating privacy, we need to pragmatically consider the threats related to revealing aspects of ourselves in each context.
Privacy as savings
Causal layered analysis of privacy as savings (n = 4)
There is a free market of personal information with individualised and unequal privacy
Conception of privacy: Individualised. Personal information is a commodity that can be traded, and privacy is a regulating factor in this trading.
Threats: New technologies, government
Responsible actor: Individual
Solutions: Individual’s abilities, purchasing power and common sense
Individual control: Possible but unequally divided
Development: Unstoppable evolution of technology and marketisation
Privacy as savings
From the system perspective, privacy is seen as highly individualised. It is the responsibility of individuals as consumers to protect their own privacy. The free market of personal information is seen as the natural state, and privacy regulation introduces restrictions and market distortion. In the privacy literature, some commentators have argued that giving individuals a property interest in their personal information would lead to individuals having more control over their information, since they can bargain with it and exchange it for other goods in the market [16: 134]. However, others criticise this development because it privatises the social phenomenon of privacy and neglects the public and collective value of privacy . In addition, if individuals must cope alone, there is little protection for those who are incapable of protecting their own privacy.
The worldview is individualistic. In principle, each individual has equal opportunities to protect their privacy and to trade with it. However, because individuals are concerned with private benefit, concentration of wealth and power mean that egalitarian ideals are not reached . In general, privacy is intimately connected to individual freedom. From the individualistic perspective, privacy means the freedom to pursue happiness in one’s own way as long as no harm is done to others. A liberal individualist discourse is prominent within privacy theorising, and it has been argued that historically privacy emerged together with individualism [15: 113–114]. The view of privacy as protection of freedom is especially prominent in the United States .
Privacy as foundations of our home
Causal layered analysis of privacy as foundations of our home (n = 7)
We have a moral obligation to protect privacy by legislation
Conception of privacy: Control over information and access, and also a shared value. Privacy is a sacred value which cannot be traded.
Threats: Lack of awareness, knowledge and transparency
Responsible actor: Society
Solutions: Broad regulatory framework
Individual control: Real
Development: Equilibrium: privacy maintains democracy and democracy maintains privacy.
Privacy as foundations of our home
On the system level, this participant cluster emphasises the social importance of privacy and the moral obligation to protect privacy. The future depends on the model that current generations set for future generations, and therefore we must act responsibly. One participant (male, 31–40 years, Germany) argued that privacy is a cultural value that is connected to the Enlightenment, and also a political value as “part of the protection of citizens which is one of the main tasks of society and the state”. This is seen as important for maintaining democracy.
This framing presents a virtuous cycle which maintains privacy. Privacy as a shared value enables the maintenance of the democratic public, which then protects privacy by regulating exposure and trade of information. This in turn maintains privacy as a shared value. In accordance with the communitarian discourse on positive rights, privacy is not only seen as the right to be let alone but also the right to autonomy and to shape society. In this discourse, the freedom of humans is not challenged by the government, because the individual and society are not seen as conflicting forces but rather society has an active role in shaping individuals .
The worldview is egalitarian. An Israeli participant (female, 21–30 years) stated that privacy means protection from inequality. They continued: “Privacy must be uniform: everybody must be exposed or concealed in the same amount”. Without privacy, everybody would have a different ‘colour’ and could be treated differently. Because privacy is a collective value, the downgrading of privacy by some will cause loss of privacy for all. This expresses the ideal of a strongly bonded group with few ranking or grading rules between its members .
An ecosystem of frames as different types of futures
The metaphorical frames likened to different types of forecasts
Type of forecast 
Privacy as the dodo
Privacy as the hemline
Privacy as savings
Privacy as foundations of our home
Using de Jouvenel’s  typology, ‘dodo’ is a primary forecast: this is the undesirable ‘business-as-usual’ future, which becomes real if nothing is done. It should be read as a cautionary tale that is intended as a prompt for action to protect privacy. The ‘foundations of our home’ frame is similar to a secondary forecast: it indicates that we must collectively uphold privacy as a value. The ‘hemline’ and ‘savings’ frames, in turn, can be understood as historical forecasts, trying to imagine what could happen in the complex interplay of different actors. From this perspective, imagining slow evolution or uncertainty are understandable reactions to considering the future.
Privacy conception and the key issue of the future of privacy
Privacy as mundane
Privacy as highly important
Privacy as an issue of individual control
Optimism about control (savings)
Pessimism about control (dodo)
Privacy as an issue of collective governance
Manageable change (hemline)
Challenge and response (foundations of our home)
We argue that these frames in fact constitute an ecosystem of frames rather than mutually incompatible alternatives. Douglas  states that all worldviews (individualism, fatalism, hierarchy, egalitarianism) are needed, and governance solutions that impose one organising principle will fail. Rather than constituting alternatives, all of these frames are needed, and the diversity of cultural frames is a key factor in shaping a resilient future. If the frames are seen as an ecosystem, the crucial question is whether the ecosystem is diverse enough and whether these frames adequately represent different worldviews.
Whether the frames are adequate for representing the different worldviews needs more empirical research, but some preliminary remarks can be made. The ‘savings’ frame presents both the benefits and drawbacks of individualism. Arguably it is more plausible than the ‘hemline’ frame which presumes continuity in an era of rapid change. The ‘dodo’ frame, in turn, begs the question why some individuals are able to see grave threats to privacy while others are blissfully ignorant. Finally, the ‘foundations of our home’ frame is an attractive description of a desirable future, but the shared value basis that it presumes may be problematic in a multicultural society. From this ecosystem perspective, it is undesirable to search for one ultimate metaphor of privacy. Instead, it is desirable to diversify futures thinking and to consider emergent novelty rather than repeating conventional discourses .
Implications for policy, research and public discussion
Considering policy implications, some limitations need to be taken into account. Firstly, the intention of these metaphorical frames is not to contribute directly to policy-making by providing desirable visions. Instead, they raise important themes in the privacy debate. Secondly, the current study is exploratory with a limited set of participants. Thirdly, the focus group design (see Appendix 1) focused on current threats and the section on futures was relatively short. Finally, most of the discussion was negatively framed, lacking discussions of privacy-enhancing technologies (PETs) or beneficial market mechanisms.6
The metaphorical frames highlight two key themes in the privacy debate: individual control and trust in collective privacy protection.7 The first theme is the individual’s struggle for control and agency in a future consisting largely of dominating elements. There is a clear danger to individuals’ autonomy if they are given only illusory control regarding their personal information. The ‘dodo’ and ‘savings’ frames express similar privacy threats but the agency of individuals is viewed differently. The former frame emphasises lack of control while the latter suggests that control is possible but unequally distributed.
The second theme is trust in collective privacy protection mechanisms such as privacy legislation. There is an ongoing debate whether binding privacy legislation or market-based solutions are preferable for ‘future-proofing’ privacy protection. The ‘dodo’ and ‘savings’ frames express skepticism about the effectiveness of privacy legislation, while the ‘hemline’ and ‘foundations of our home’ frames express more optimism and trust. If complex privacy legislation is drafted without public understanding or trust, the risk is that citizens become alienated from the privacy debate. It is important that in a democratic society citizens understand the reasoning behind privacy protection rules and that they are able to use the means of privacy protection available to them. This is particularly important as the participatory governance has been a central aim within the European Union in recent years .
Both nation states and EU institutions need to work on establishing trust in privacy legislation, because if privacy protection is left to individuals, privacy is likely to become unequally distributed. This is already the case with technological tools such as public key encryption and virtual private networks which are difficult to utilise for most citizens. Similarly, technical debates about data protection principles are unlikely to make citizens feel empowered and trustful. Establishing trust in EU institutions is particularly challenging in the current atmosphere of uncertainty regarding the future of the EU.
The question about privacy should be put into broader societal context. The key question is what kind of future society we want to live in and what role privacy has in this society, given current trends towards digitalisation and increasing surveillance. Privacy conceptions and metaphorical frames form an ecosystem where diversity is important rather than categorising conceptions as correct or mistaken. Therefore policy-making on privacy should not be made in a technocratic manner without public engagement. This means that the discussion should not be dominated by one frame such as liberal individualism, administrative efficiency or the fight against terrorism. Instead, transparent and inclusive debate is the prerequisite for seeking desirable futures of privacy. The debate should include the whole spectrum of worldviews and the whole cast of privacy-related actors including citizens, policy-makers, technology developers and companies .
The final implication of these metaphorical frames is that a broad systemic view is needed in privacy research and public discussion. We need to move beyond enumerating individual privacy threats and identify and analyse potential system traps such as the drift to low privacy. These traps can be analysed in similar ways as social-ecological system traps . The interests which drive privacy actors’ choices need to be part of the discussion because these are crucial in systemically producing privacy threats. Knowledge is also needed on cross-sectoral interrelations, that is, how privacy is influenced by decision-making in other fields such as security and traffic policy. Climate researchers discuss the water-energy-food nexus, highlighting the close linkages between these areas . This raises the question what kind of ‘nexus’ is formed by privacy and other policy fields. In addition, the systemic concepts of system traps and nexus raise the question of systemic transition. Where is the privacy system currently heading and do we need path creation or ‘mindful deviation’ to reach a more desirable future ?
There are some indications at present of this broad discussion about desirable futures and the role of privacy. The EU data protection reform is seeking to tackle trust issues by establishing credible and effective general privacy rules. The recent documentary Democracy tracks the reform, suggesting that central players within the EU institutions were active in promoting data protection in Europe . However, the General Data Protection Regulation has also been described as a “monster text” because of the difficulty of interpreting its layered meanings .
The MyData concept, in turn, aims to give control to consumers while also ensuring that organisations can make use of data collection [68, 69]. Similarly, the Privacy by Design concept harnesses engineering and product design to protect privacy . Privacy impact assessments aim to track the systemic privacy impacts of decisions . These developments suggest that is possible to retain a sense of agency on the road to the unknown future.
This article investigated metaphorical frames for the future of privacy using focus group data and causal layered analysis. The aim was to map citizens’ thinking on futures of privacy using metaphorical frames. Thematic analysis was used to cluster focus group participants into four groups with distinct views on the conception of privacy, on privacy threats and solutions, on the responsibility for protecting privacy and on control over privacy.
Four metaphorical frames for privacy futures were constructed: ‘dodo’, ‘hemline’, ‘savings’ and ‘foundations of our home’. The systemic drivers and worldviews behind these frames were examined using causal layered analysis. The privacy conceptions expressed in the frames differed along two key axes: individualistic or collective framing of privacy and privacy viewed as a highly important or relatively mundane issue. The analysis highlighted two key themes: individuals’ struggle for control over a dominating future and trust in the effectiveness of privacy legislation. Rather than alternative futures, the frames can be interpreted as different types of projections: primary (what will happen if nothing is done), secondary (what should be done) and historical (what could happen). Therefore they relate to human agency in different ways.
The study was exploratory but nonetheless the results have significant research and policy implications. Further studies could elaborate on the metaphorical frames that were constructed in this study, and perhaps modify or refute them. One interesting area for subsequent research is cultural differences. Would the frames be radically different if a similar study was conducted in China or in Nigeria? In which cultures is the question of the future of privacy even relevant, and should it be relevant? Another area of study is the influence of media on these frames. Does recent media coverage or social media discussion of privacy issues significantly impact the expressed views of non-experts, or are their views relatively stable?
Privacy protection is one of the key concerns in the ongoing digital transformation. The debate about privacy needs to be part of a broad and inclusive debate about the desirable future direction for society. The whole ecosystem of metaphorical frames and cast of privacy actors, including citizens, need to be part of the debate. In addition, potential system traps and systemic interconnections need to be studied further. In order to avoid traps and to find a path towards a desirable future, policy-makers, companies and researchers need to take individuals’ conceptions of privacy and its future seriously.
The focus group sessions were held before the discussion initiated by Edward Snowden’s disclosures, and thus they represent a snapshot of the debate at that time.
In addition, focus group sessions were held in Belgium and Poland. However, the transcripts of these sessions did not allow distinctions between individual participants. Therefore they were unsuitable for our analysis focusing on individuals’ metaphorical frames.
The questions and differing views represent the ‘horizontal’ breadth of causal layered analysis .
There are also many other frameworks for categorising futures thinking such as Tapio and Hietanen’s typology , but this one was chosen for its simplicity and because it can be used to categorise general futures thinking as opposed to professional futures research.
Arguably this negative framing is inherent in the modern concept of privacy which focuses on conditions of its violation, not its realisation .
The focus group study was conducted in the PRACTIS (Privacy – Appraising Challenges to Technologies and Ethics) project which was funded by the European Commission’s 7th Framework Programme for Research and Technological Development and coordinated by the Interdisciplinary Centre for Technology Analysis and Forecasting at Tel Aviv University, Israel. The aims of the project were to investigate how emerging technologies may impact privacy and conceptions of privacy and to propose ethical and legal frameworks for dealing with privacy risks. See http://www.practis.org/.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
- Brey PAE (2012) Anticipatory ethics for emerging technologies. NanoEthics 6:1–13. https://doi.org/10.1007/s11569-012-0141-7 View ArticleGoogle Scholar
- Hauptman A, Katz O (2011) PRACTIS deliverable 2.2: final horizon scanning reportGoogle Scholar
- De Hert P, Gutwirth S, Moscibroda A et al (2009) Legal safeguards for privacy and data protection in ambient intelligence. Pers Ubiquit Comput 13:435–444. https://doi.org/10.1007/s00779-008-0211-6 View ArticleGoogle Scholar
- Lockton V, Rosenberg RS (2005) RFID: the next serious threat to privacy. Ethics Inf Technol 7:221–231. https://doi.org/10.1007/s10676-006-0014-2 View ArticleGoogle Scholar
- Nissenbaum HF (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, StanfordGoogle Scholar
- MacAskill E, Guardian US Interactive Team (2013) NSA files decoded: Edward snowden’s surveillance revelations explained. The GuardianGoogle Scholar
- Minkkinen M (2015) Futures of privacy protection: a framework for creating scenarios of institutional change. Futures 73:48–60. https://doi.org/10.1016/j.futures.2015.07.006 View ArticleGoogle Scholar
- Smith HJ, Dinev T, Xu H (2011) Information privacy research: an interdisciplinary review. MIS Q 35:980–A27View ArticleGoogle Scholar
- Auffermann B, Luoto L, Lonkila A, Vartio E (2012) PRACTIS deliverable 4.2: report on potential changes in privacy climates and their impacts on ethical approachesGoogle Scholar
- Ney S, Verweij M (2015) Messy institutions for wicked problems: how to generate clumsy solutions? Environ Plann C: Gov Policy 33:1679–1696. https://doi.org/10.1177/0263774x15614450 View ArticleGoogle Scholar
- Lobet-Maris C, Grandjean N, Colin C, Birnhack M (2012) PRACTIS deliverable 5.2Google Scholar
- van der Helm R (2007) Ten insolvable dilemmas of participation and why foresight has to deal with them. Foresight 9:3–17. https://doi.org/10.1108/14636680710754138 View ArticleGoogle Scholar
- Cairns G, Śliwa M, Wright G (2010) Problematizing international business futures through a critical scenario method. Futures 42:971–979. https://doi.org/10.1016/j.futures.2010.08.016 View ArticleGoogle Scholar
- Krabbenborg L (2016) Creating inquiry between technology developers and civil society actors: learning from experiences around nanotechnology. Sci Eng Ethics 22:907–922. https://doi.org/10.1007/s11948-015-9660-2 View ArticleGoogle Scholar
- Schoeman FD (1992) Privacy and social freedom. Cambridge University Press, CambridgeView ArticleGoogle Scholar
- Tavani HT (2008) Informational privacy: concepts, theories, and controversies. In: Himma KE, Tavani HT (eds) The handbook of information and computer ethics. Wiley, Hoboken, pp 131–164View ArticleGoogle Scholar
- Solove DJ (2008) Understanding privacy. Harvard University Press, CambridgeGoogle Scholar
- Steijn WMP, Vedder A (2015) Privacy under construction. Sci Technol Hum Values 40:615–637. https://doi.org/10.1177/0162243915571167 View ArticleGoogle Scholar
- Regan PM (1995) Legislating privacy: technology, social values, and public policy. University of North Carolina Press, Chapel HillGoogle Scholar
- Baghai K (2012) Privacy as a human right: a sociological theory. Sociology 46:951–965. https://doi.org/10.1177/0038038512450804 View ArticleGoogle Scholar
- Schwaig KS, Segars AH, Grover V, Fiedler KD (2013) A model of consumers’ perceptions of the invasion of information privacy. Inf Manag 50:1–12. https://doi.org/10.1016/j.im.2012.11.002 View ArticleGoogle Scholar
- Kokolakis S (2017) Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput Secur 64:122–134. https://doi.org/10.1016/j.cose.2015.07.002 View ArticleGoogle Scholar
- Miltgen CL, Peyrat-Guillard D (2014) Cultural and generational influences on privacy concerns: a qualitative study in seven european countries. Eur J Inf Syst 23:103–125. https://doi.org/10.1057/ejis.2013.17 View ArticleGoogle Scholar
- Beckert J (2013) Imagined futures: fictional expectations in the economy. Theory Soc 42:219–240. https://doi.org/10.1007/s11186-013-9191-2 View ArticleGoogle Scholar
- Bell W, Mau JA (1971) Images of the future: theory and research strategies. In: Bell W, Mau JA (eds) The sociology of the future; theory, cases, and annotated bibliography. Russell Sage Foundation, New York, pp 6–44Google Scholar
- Rubin A (2013) Hidden, inconsistent, and influential: images of the future in changing times. Futures 45:S38–S44. https://doi.org/10.1016/j.futures.2012.11.011 View ArticleGoogle Scholar
- Polak FL (1973) The image of the future. Elsevier, AmsterdamGoogle Scholar
- Bell W (1997) Foundations of futures studies: human science for a new era, vol 1, history, purposes and knowledge. Transaction Publishers, New BrunswickGoogle Scholar
- Baumeister RF, Vohs KD (2016) Introduction to the special issue: the science of prospection. Rev Gen Psychol 20:1–2. https://doi.org/10.1037/gpr0000072 View ArticleGoogle Scholar
- Szpunar KK, Spreng RN, Schacter DL (2016) Toward a taxonomy of future thinking. In: Seeing the future: theoretical perspectives on future-oriented mental time travel. Oxford University Press, Oxford, pp 21–35View ArticleGoogle Scholar
- Lakoff G, Johnson M (1980) Metaphors we live by. The University of Chicago Press, ChicagoGoogle Scholar
- Lakoff G (1996) The contemporary theory of metaphor. Metaphor and thoughtGoogle Scholar
- Inayatullah S, Izgarjan A, Kuusi O, Minkkinen M (2016) Metaphors in futures research. Futures. https://doi.org/10.1016/j.futures.2016.04.004
- Bowman G, MacKay RB, Masrani S, McKiernan P (2013) Storytelling and the scenario process: understanding success and failure. Technol Forecast Soc Chang 80:735–748. https://doi.org/10.1016/j.techfore.2012.04.009 View ArticleGoogle Scholar
- Carbonell J, Sánchez-Esguevillas A, Carro B (2017) From data analysis to storytelling in scenario building. A semiotic approach to purpose-dependent writing of stories. Futures 88:15–29. https://doi.org/10.1016/j.futures.2017.03.002 View ArticleGoogle Scholar
- Inayatullah S (1998) Causal layered analysis: poststructuralism as method. Futures 30:815–829View ArticleGoogle Scholar
- Inayatullah S (2004) Causal layered analysis: theory, historical context, and case studies. In: Inayatullah S (ed) The causal layered analysis (CLA) reader: theory and case studies of an integrative and transformative methodology. Tamkang University Press, Tamsui, pp 1–52Google Scholar
- Inayatullah S (2015) The continued evolution of the use of CLA: using practice to transform. In: Inayatullah S, Milojević I (eds) CLA 2.0: transformative research in theory and practice. Tamkang University Press, Tamsui, pp 13–21Google Scholar
- Kitzinger J (1995) Qualitative research: introducing focus groups. BMJ 311:299–302View ArticleGoogle Scholar
- Morton A (2013) All my mates have got it, so it must be okay: constructing a richer understanding of privacy concerns-an exploratory focus group study. In: Reloading data protection. Springer Nature, pp 259–298Google Scholar
- Inayatullah S (2004) Appendix: the causal layered analysis pyramid. In: Inayatullah S (ed) The causal layered analysis (CLA) reader: theory and case studies of an integrative and transformative methodology. Tamkang University Press, Tamsui, p 543Google Scholar
- John NA, Peters B (2016) Why privacy keeps dying: the trouble with talk about the end of privacy. Inf Commun Soc 20:284–298. https://doi.org/10.1080/1369118x.2016.1167229 View ArticleGoogle Scholar
- Raab C, Koops B-J (2009) Privacy actors, performances and the future of privacy protection. In: Gutwirth S, Poullet Y, Hert P et al (eds) Reinventing data protection? Springer, Dordrecht, pp 207–221View ArticleGoogle Scholar
- Westin AF (1967) Privacy and freedom. Atheneum, New YorkGoogle Scholar
- Boschetti F, Price J, Walker I (2016) Myths of the future and scenario archetypes. Technol Forecast Soc Chang 111:76–85. https://doi.org/10.1016/j.techfore.2016.06.009 View ArticleGoogle Scholar
- Douglas M (2006) A history of grid and group cultural theory. Semiotics Institute Online, Toronto http://semioticon.com/sio/courses/the-group-grid-model/ Google Scholar
- Clegg S (2007) Ideal type. The blackwell encyclopedia of sociology. https://doi.org/10.1111/b.9781405124331.2007.x
- Weber M (1978) Economy and society: an outline of interpretive sociology, vol vol. 1. University of California Press, BerkeleyGoogle Scholar
- Meadows DH (2008) Thinking in systems: a primer. Chelsea Green, White River JunctionGoogle Scholar
- Cohen JE (2000) Examined lives: informational privacy and the subject as object. Social Science Research Network, RochesterGoogle Scholar
- Whitman JQ (2004) The two western cultures of privacy: dignity versus liberty. Yale Law J 113:1151–1221. https://doi.org/10.2307/4135723 View ArticleGoogle Scholar
- Tetlock PE (2003) Thinking the unthinkable: sacred values and taboo cognitions. Trends Cogn Sci 7:320–324. https://doi.org/10.1016/s1364-6613(03)00135-9 View ArticleGoogle Scholar
- Schwartz P (1996) The art of the long view: paths to strategic insight for yourself and your company. Currency Doubleday, New YorkGoogle Scholar
- Dator J (1979) The futures of cultures or cultures of the future. In: Marsella AJ, Tharp RG, Ciboroski TJ (eds) Perspectives on cross-cultural psychology. Academic, New York, pp 369–388Google Scholar
- Farrelly C (2004) Communitarianism. In: Introduction to contemporary political theory. SAGE Publications Ltd, London, pp 97–118Google Scholar
- Booth C, Rowlinson M, Clark P et al (2009) Scenarios and counterfactuals as modal narratives. Futures 41:87–95. https://doi.org/10.1016/j.futures.2008.07.037 View ArticleGoogle Scholar
- Miller R (2007) Futures literacy: a hybrid strategic scenario method. Futures 39:341–362. https://doi.org/10.1016/j.futures.2006.12.001 View ArticleGoogle Scholar
- Jouvenel B de (1967) The art of conjecture. Basic Books, New YorkGoogle Scholar
- Tapio P, Hietanen O (2002) Epistemology and public policy: using a new typology to analyse the paradigm shift in finnish transport futures studies. Futures 34:597–620. https://doi.org/10.1016/S0016-3287(02)00003-4 View ArticleGoogle Scholar
- Miller R, Poli R, Rossel P (2014) The discipline of anticipation: exploring key issues. UNESCO, The Rockefeller Foundation, ParisGoogle Scholar
- European Commission (2012) COMMUNICATION from the commission to the european parliament, the council. In: The european economic and social committee and the committee of the regions safeguarding privacy in a connected world a European data protection framework for the 21st century COM/2012/09 finalGoogle Scholar
- Blume P (2014) The myths pertaining to the proposed general data protection regulation. Int Data Privacy Law 4:269–273. https://doi.org/10.1093/idpl/ipu017 View ArticleGoogle Scholar
- Marxsen C (2015) Open stakeholder consultations at the European level – voice of the citizens? European Law Journal 21:257–280. https://doi.org/10.1111/eulj.12084 View ArticleGoogle Scholar
- Boonstra WJ, de BFW (2013) The historical dynamics of social–ecological traps. Ambio 43:260–274. https://doi.org/10.1007/s13280-013-0419-1 View ArticleGoogle Scholar
- Leck H, Conway D, Bradshaw M, Rees J (2015) Tracing the water-energy-food nexus: description, theory and practice. Geography Compass 9:445–460. https://doi.org/10.1111/gec3.12222 View ArticleGoogle Scholar
- Boon WP, Aarden E, Broerse JE (2015) Path creation by public agencies — the case of desirable futures of genomics. Technol Forecast Soc Chang 99:67–76. https://doi.org/10.1016/j.techfore.2015.06.038 View ArticleGoogle Scholar
- Bernet D (2015) Democracy: im rausch der datenGoogle Scholar
- Iemma R (2016) Towards personal data services: a view on some enabling factors. Int J Electron Gov 8:58. https://doi.org/10.1504/ijeg.2016.076690 View ArticleGoogle Scholar
- Kuikkaniemi K, Poikola A, Pitkänen O (2014) My data fueling wellbeing applications. In: Proceedings of the 2014 workshops on advances in computer entertainment conference - ace ‘14 workshopsGoogle Scholar
- Hustinx P (2010) Privacy by design: delivering the promises. Identity in the Information Society 3:253–255. https://doi.org/10.1007/s12394-010-0061-z View ArticleGoogle Scholar
- Clarke R (2009) Privacy impact assessment: its origins and development. Comput Law Secur Rev 25:123–135. https://doi.org/10.1016/j.clsr.2009.02.002 View ArticleGoogle Scholar