Assessing Security Technology’s Impact: Old Tools for New Problems

Science and Engineering Ethics 20 (3):659-673 (2014)
  Copy   BIBTEX

Abstract

The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,386

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
The Transhuman Security Dilemma.Daniel McIntosh - 2010 - Journal of Evolution and Technology 21 (2):32-48.
Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Cracking down on autonomy: three challenges to design in IT Law. [REVIEW]U. Pagallo - 2012 - Ethics and Information Technology 14 (4):319-328.

Analytics

Added to PP
2014-03-03

Downloads
18 (#811,325)

6 months
2 (#1,232,442)

Historical graph of downloads
How can I increase my downloads?