The 2024 SEFI conference posed the question, “How can we ensure the highest quality of technical competence while at the same time ensuring that social and environmental responsibility is core to the identity of engineering graduates?” Identity formation is a complex process that has been theorized in many ways. In this workshop, I invited participants to consider Holland and colleagues’ theory of identity as a useful framework for reflecting on our how our participation in engineering education contributes to beliefs about what makes a “real” or the “best” engineer. This theory posits that within our classrooms, students are participating in a complex cultural practice through which they ultimately learn to identify (and be identified) as more or less of an engineer than others. Our everyday classroom practices ultimately function to co-construct 1) shared beliefs about what makes a “good” engineer, and 2) everyone’s relative position in a social hierarchy. Furthermore, identify development is theorized to include both social forces (i.e., rules and guidelines that influence how people behave in a social space) and individual agency (i.e., we are not just carbon copies of culture or norms because our actions shape the culture and norms). Understanding identity development as such empowers us to be intentional with our own participation in identity construction by providing theoretical entry points for conveying the value of social responsibility. The usefulness of this particular identity theory to ideate strategies for integrating social responsibility into students’ engineering identities has been corroborated by the empirical findings of our U.S.-based engineering education research. During this workshop, we utilized the theory to draw out existing or future concrete practices that each of us, given our unique global and institutional contexts, are motivated to enact in support of social responsibility as core to engineering. Specifically, our interactions culminated with answering the following question: What is one concrete way I can be intentional in how I participate in identity co-construction? Participant responses to this prompt are presented directly. 
                        more » 
                        « less   
                    
                            
                            Privacy Nicks: How the Law Normalizes Surveillance
                        
                    
    
            Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this Article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death. Privacy nicks come from the proliferation of cameras and biometric sensors on doorbells, glasses, and watches, and the drift of surveillance and data analytics into new areas of our lives like travel, exercise, and social gatherings. Under our theory of privacy nicks as the Achilles heel of surveillance law, invasive practices become routine through repeated exposures that acclimate us to being vulnerable and watched in increasingly intimate ways. With acclimation comes resignation, and this shift in attitude biases how citizens and lawmakers view reasonable measures and fair tradeoffs. Because the law looks to norms and people’s expectations to set thresholds for what counts as a privacy violation, the normalization of these nicks results in a constant renegotiation of privacy standards to society’s disadvantage. When this happens, the legal and social threshold for rejecting invasive new practices keeps getting redrawn, excusing ever more aggressive intrusions. In effect, the test of what privacy law allows is whatever people will tolerate. There is no rule to stop us from tolerating everything. This Article provides a new theory and terminology to understand where privacy law falls short and suggests a way to escape the current surveillance spiral. 
        more » 
        « less   
        
    
                            - Award ID(s):
- 1956393
- PAR ID:
- 10638372
- Publisher / Repository:
- Washington University Law Review
- Date Published:
- Journal Name:
- Washington University Law Review
- ISSN:
- 2166-8000
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
- 
            
- 
            Within the ongoing disruption of the COVID-19 pandemic, technologically mediated health surveillance programs have vastly intensified and expanded to new spaces. Popular understandings of medical and health data protections came into question as a variety of institutions introduced new tools for symptom tracking, contact tracing, and the management of related data. These systems have raised complex questions about who should have access to health information, under what circumstances, and how people and institutions negotiate relationships between privacy, public safety, and care during times of crisis. In this paper, we take up the case of a large public university working to keep campus productive during COVID-19 through practices of placemaking, symptom screeners, and vaccine mandate compliance databases. Drawing on a multi-methods study including thirty-eight interviews, organizational documents, and discursive analysis, we show where and for whom administrative care infrastructures either misrecognized or torqued (Bowker and Star 1999) the care relationships that made life possible for people in the university community. We argue that an analysis of care—including the social relations that enable it and those that attempt to hegemonically define it—opens important questions for how people relate to data they produce about their bodies as well as to the institutions that manage them. Furthermore, we argue that privacy frameworks that rely on individual rights, essential categories of “sensitive information,” or the normative legitimacy of institutional practices are not equipped to reveal how people negotiate privacy and care in times of crisis.more » « less
- 
            Baym, Nancy; Ellison, Nicole (Ed.)Abstract The future of work increasingly focuses on the collection and analysis of worker data to monitor communication, ensure productivity, reduce security threats, and assist in decision-making. The COVID-19 pandemic increased employer reliance on these technologies; however, the blurring of home and work boundaries meant these monitoring tools might also surveil private spaces. To explore workers’ attitudes toward increased monitoring practices, we present findings from a factorial vignette survey of 645 U.S. adults who worked from home during the early months of the pandemic. Using the theory of privacy as contextual integrity to guide the survey design and analysis, we unpack the types of workplace surveillance practices that violate privacy norms and consider attitudinal differences between male and female workers. Our findings highlight that the acceptability of workplace surveillance practices is highly contextual, and that reductions in privacy and autonomy at work may further exacerbate power imbalances, especially for vulnerable employees.more » « less
- 
            The increased adoption of smart home cameras (SHCs) foregrounds issues of surveillance, power, and privacy in homes and neighborhoods. However, questions remain about how people are currently using these devices to monitor and surveil, what the benefits and limitations are for users, and what privacy and security tensions arise between primary users and other stakeholders. We present an empirical study with 14 SHC users to understand how these devices are used and integrated within everyday life. Based on semistructured qualitative interviews, we investigate users’ motivations, practices, privacy concerns, and social negotiations. Our findings highlight the SHC as a perceptually powerful and spatially sensitive device that enables a variety of surveillant uses outside of basic home security—from formally surveilling domestic workers, to casually spying on neighbors, to capturing memories. We categorize surveillant SHC uses, clarify distinctions between primary and non primary users, and highlight under-considered design directions for addressing power imbalances among primary and non-primary users.more » « less
- 
            Around the world, people increasingly generate data through their everyday activities. Much of this happens unwittingly through sensors, cameras, and other surveillance tools on roads, in cities, and at the workplace. However, how individuals and governments think about privacy varies significantly around the world. In this article, we explore differences between people’s attitudes toward privacy and data collection practices in the United States and the Netherlands, two countries with very different regulatory approaches to governing consumer privacy. Through a factorial vignette survey deployed in the two countries, we identify specific contextual factors associated with concerns regarding how personal data are being used. Using Nissenbaum’s framework of privacy as contextual integrity to guide our analysis, we consider the role that five factors play in this assessment: actors (those using data), data type, amount of data collected, reported purpose of data use, and inferences drawn from the data. Findings indicate nationally bound differences as well as shared concerns and indicate future directions for cross-cultural privacy research.more » « less
 An official website of the United States government
An official website of the United States government 
				
			 
					 
					
 
                                    