Philosophy, privacy, and pervasive computing

AI and Society 25 (1):61-70 (2010)
  Copy   BIBTEX

Abstract

Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices which can become linked in a pervasive computing environment: PDAs, GPS sensors, RFID chips/readers, publicly-located video surveillance cameras, Internet-enabled mobile phones, and the like, each raise threats to individual privacy. Without discounting the value of this approach, this paper aims to propose an alternative; and, as a result of recasting the threat to individual privacy from pervasive computing, to identify other, and deeper, moral goods that pervasive computing puts at risk that otherwise might remain concealed. In particular, I argue that pervasive computing threatens to compromise what I call existential autonomy: the right to decide for ourselves at least some of the existential conditions under which we form and develop our ways of life, including our relations to information technology. From this perspective, some moral goods at stake in protecting privacy in an environment of pervasive computing emerge that have less to do with furthering human well-being through the promotion of self-identity and subjectivity, than with stimulating curiosity, receptivity to difference, and, most broadly, openness to the world.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,060

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

The importance of privacy revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
Pervasive computing and an aging populace.Kalpana Shankar - 2010 - Journal of Information, Communication and Ethics in Society 8 (3):236-248.
Why privacy is not enough privacy in the context of “ubiquitous computing” and “big data”.Tobias Matzner - 2014 - Journal of Information, Communication and Ethics in Society 12 (2):93-106.
Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
Nanotechnology and Privacy.Jeroen van den Hoven - 2006 - International Journal of Applied Philosophy 20 (2):215-228.
Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.

Analytics

Added to PP
2013-11-20

Downloads
68 (#308,811)

6 months
6 (#851,135)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

References found in this work

Transforming technology: a critical theory revisited.Andrew Feenberg - 2002 - New York, N.Y.: Oxford University Press. Edited by Andrew Feenberg.
Why privacy is important.James Rachels - 1975 - Philosophy and Public Affairs 4 (4):323-333.
Privacy, morality, and the law.W. A. Parent - 1983 - Philosophy and Public Affairs 12 (4):269-288.
An anatomy of values.Charles Fried - 1970 - Cambridge,: Harvard University Press.

View all 19 references / Add more references