Philosophy, privacy, and pervasive computing

AI and Society 25 (1):61-70 (2010)
  Copy   BIBTEX

Abstract

Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices which can become linked in a pervasive computing environment: PDAs, GPS sensors, RFID chips/readers, publicly-located video surveillance cameras, Internet-enabled mobile phones, and the like, each raise threats to individual privacy. Without discounting the value of this approach, this paper aims to propose an alternative; and, as a result of recasting the threat to individual privacy from pervasive computing, to identify other, and deeper, moral goods that pervasive computing puts at risk that otherwise might remain concealed. In particular, I argue that pervasive computing threatens to compromise what I call existential autonomy: the right to decide for ourselves at least some of the existential conditions under which we form and develop our ways of life, including our relations to information technology. From this perspective, some moral goods at stake in protecting privacy in an environment of pervasive computing emerge that have less to do with furthering human well-being through the promotion of self-identity and subjectivity, than with stimulating curiosity, receptivity to difference, and, most broadly, openness to the world.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,438

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

The importance of privacy revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
Nanotechnology and Privacy.Jeroen van den Hoven - 2006 - International Journal of Applied Philosophy 20 (2):215-228.
Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
Freedom and privacy in ambient intelligence.Philip Brey - 2005 - Ethics and Information Technology 7 (3):157-166.
Privacy and discrete "social spheres".Jonathan Schonscheck - 1997 - Ethics and Behavior 7 (3):221 – 228.
Privacy and data privacy issues in contemporary china.Lü Yao-Huai - 2005 - Ethics and Information Technology 7 (1):7-15.
An ethical decision-making process for computing professionals.Edward J. O'Boyle - 2002 - Ethics and Information Technology 4 (4):267-277.
The moral value of informational privacy in cyberspace.Diane P. Michelfelder - 2001 - Ethics and Information Technology 3 (2):129-135.
Recent Developments in Computing and Philosophy.Anthony F. Beavers - 2011 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 42 (2):385-397.

Analytics

Added to PP
2013-11-20

Downloads
61 (#260,400)

6 months
13 (#186,332)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

References found in this work

Transforming technology: a critical theory revisited.Andrew Feenberg - 2002 - New York, N.Y.: Oxford University Press. Edited by Andrew Feenberg.
Why privacy is important.James Rachels - 1975 - Philosophy and Public Affairs 4 (4):323-333.
Privacy, morality, and the law.W. A. Parent - 1983 - Philosophy and Public Affairs 12 (4):269-288.
An anatomy of values.Charles Fried - 1970 - Cambridge,: Harvard University Press.

View all 18 references / Add more references