Skip to main content

The Ontological Interpretation of Informational Privacy

  • Chapter
  • First Online:
Italian Philosophy of Technology

Part of the book series: Philosophy of Engineering and Technology ((POET,volume 35))

Abstract

The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they can also alter its nature and hence our understanding and appreciation of it; (d) a change in our ontological perspective, brought about by digital ICTs, suggests considering each person as being constituted by his or her information and hence regarding a breach of one’s informational privacy as a form of aggression towards one’s personal identity.

This chapter was originally published in Ethics and Information Technology (2005) 7:185–200.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Especially in the US, see Garfinkel (2000).

  2. 2.

    Froomkin (2000) still provides a valuable review.

  3. 3.

    See for example Johnson (2001), Bynum and Rogerson (2004) and Tavani (2003).

  4. 4.

    For a precise definition of agent see Floridi and Sanders (2004b).

  5. 5.

    For a similar point see Moor (1997), who writes “When information is computerized, it is greased to slide easily and quickly to many ports of call” (p. 27).

  6. 6.

    Anonymity is defined here as the unavailability of personal information, or the “noncoordinability of traits in a given respect”, according to Wallace (1999).

  7. 7.

    Stevenson’s The Strange Case of Dr Jekyll and Mr Hyde was first published in 1886.

  8. 8.

    Doyle’s A Study in Scarlet was first published in 1887.

  9. 9.

    Orwell’s 1984, first published in 1949, contains no reference to computers or digital machines.

  10. 10.

    The neologism is constructed following the word “re- engineering” (“to design and construct anew”).

  11. 11.

    Radio Frequency IDentification, a method of storing and remotely retrieving data using tags or transponders.

  12. 12.

    Coroama et al. (2004), Bohn et al. (2004) and Brey (2005) offer an ethical evaluation of privacy-related issues in Ambient Intelligence environments. For a technically informative and balanced assessment see also Gow (2005).

  13. 13.

    The issue of artificial morality is analyzed in Floridi and Sanders (2004b).

  14. 14.

    The term is introduced by Westin (1968) to describe digital profile generated from data concerning a user’s habits online.

  15. 15.

    The outer world, or reality, as it affects the agent inhabiting it.

  16. 16.

    “The best long-term assessment of public attitudes toward privacy is provided by Columbia’s Alan Westin, who has conducted a series of polls over the last 30 years on this issue. On average, he finds that one quarter of the American public cares deeply about keeping personal information secret, one quarter doesn’t care much at all, and roughly half are in the middle, wanting to know more about the benefits, safeguards, and risks before providing information. Customer behaviour in the marketplace – where many people freely provide personal information in exchange for various offers and benefits – seems to bear out this conclusion” Walker (2000).

  17. 17.

    Private communication. The rest of this section is largely based on comments sent to me by Paul Oldfield,

  18. 18.

    The debate on the ownership-based interpretation developed in the seventies, see Scanlon (1975) and Rachels (1975), who criticize Thomson (1975), who supported an interpretation of the right to privacy as being based on property rights.

  19. 19.

    See Spinello (2005) for a recent assessment of the use of the trespassing analogy in computer-ethical and legal contexts. Charles Ess has pointed out to me that comparative studies have shown such spatial metaphors to be popular only in Western contexts.

  20. 20.

    Moor (1997) infers from this that informational privacy is not a core value, i.e. a value that “all normal humans and cultures need for survival”, but then other values he lists as “core” are not really so in his sense, e.g. happiness and freedom. According to Moor, privacy is also intrinsically valuable, while being the expression of the core value represented by security.

  21. 21.

    For a different view see Volkman (2003).

  22. 22.

    This view is close to the interpretation of privacy in terms of protection of human dignity defended by Bloustein (1964).

  23. 23.

    In this sense, Johnson (2001) seems to be right in considering informational privacy an essential element in an individual’s autonomy. Moor (1997), referring to a previous edition of Johnson (2001), disagrees.

  24. 24.

    On the tripartite distinction between information as, about or for reality see Floridi (2004).

References

  • Alterman, A. (2003). A piece of yourself: Ethical issues in biometric identification. Ethics and Information Technology, 5(3), 139–150.

    Article  Google Scholar 

  • Becker, F., & Sims, W. (2000). Offices that work: Balancing cost, flexibility, and communication. New York: Cornell University Inter- national Workplace Studies Program.

    Google Scholar 

  • Bloustein, E. (1964). Privacy as an aspect of human dignity: An answer to dean Prosser. New York University Law Review, 39, 962–1007.

    Google Scholar 

  • Bohn, J., Coroama, V., Langheinrich, M., Mattern, F., & Rohs, M. (2004). Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. Journal of Human and Ecological Risk Assessment, 10(5), 763–786.

    Article  Google Scholar 

  • Brey, P. (2005). Freedom and privacy in ambient intelligence. In P. Brey, F. Grodzinsky, & L. Introna (Eds.), Ethics of new information technology – Proceed- ings of the sixth international conference of computer ethics: Philosophical enquiry (Cepe2005) (pp. 91–100). Enschende: CEPTES University of Twente.

    Google Scholar 

  • Bynum, T. W., & Rogerson, S. (2004). Computer ethics and professional responsibility. Oxford: Blackwell.

    Google Scholar 

  • Coroama, V., Bohn, J., & Mattern, F. (2004). Living in a smart environment – Implications for the coming ubiquitous information society. In IEEE SMC 2004, the Hague, the Netherlands, October 10–13 (pp. 5633–5638).

    Google Scholar 

  • Floridi, L. (1999). Information ethics: On the philosophical foundations of computer ethics. Ethics and Information Technology, 1(1), 37–56. Reprinted, with some modifications, in The Ethicomp Journal, 1(1), 2004, http://www.ccsr.cse.dmu.ac.uk/journal/articles/floridi_l_philosophical.pdf.

    Article  Google Scholar 

  • Floridi, L. (2004). Information. In L. Floridi (Ed.), The Blackwell guide to the philosophy of computing and information (pp. 40–61). Oxford: Blackwell.

    Chapter  Google Scholar 

  • Floridi, L. (2008). Information ethics. In J. van den Hoven & J. Weckert (Eds.), Moral philosophy and information technology. Cambridge: Cambridge University Press.

    Google Scholar 

  • Floridi, L. (2005). Presence: From epistemic failure to successful Observability. Presence: Teleoperators and Virtual Environments, 14(6), 656–676.

    Article  Google Scholar 

  • Floridi, L., & Sanders, J. W. (2004a). The method of abstraction. In M. Negrotti (Ed.), Yearbook of the artificial. Nature, culture and technology. Models in contemporary sciences (pp. 177–220). Bern: Peter Lang.

    Google Scholar 

  • Floridi, L., & Sanders, J. W. (2004b). On the morality of artificial agents. Minds and Machines, 14(3), 349–379.

    Article  Google Scholar 

  • Floridi, L., & Sanders, J. W. (2005). Internet ethics: The constructionist values of Homo Poieticus. In R. Cavalier (Ed.), The impact of the Internet on our moral lives. New York: SUNY.

    Google Scholar 

  • Froomkin, A. M. (2000). The death of privacy? Stanford Law Review, 52, 1461–1543.

    Article  Google Scholar 

  • Garfinkel, S. (2000). Database nation: The death of privacy in the 21st century. Beijing: O’Reilly.

    Google Scholar 

  • Gow, G. (2005). Consumers and Privacy in Ubiquitous Network Societies – Background Paper. Retrieved August 16, 2005, from http://www.itu.int/osg/spu/ni/ubiquitous/Papers/Privacy%20background%20paper.pdf

  • Johnson, D. G. (2001). Computer ethics (3rd ed.). Upper Saddle River, NJ: Prentice-Hall.

    Google Scholar 

  • Levi, P. (1959). If this is a man. London: Orion Press.

    Google Scholar 

  • Lyman, P. & Varian, H. R.. (2003). How much information? Retrieved August 16, 2005, from http://www.sims.berkeley.edu/research/projects/how-much-info-2003/execsum.htm#summary

  • Marx, G. T. (2005). Some conceptual issues in the study of Borders and surveillance. In E. Zureik & M. B. Salter (Eds.), Global surveillance and policing – Borders, security, identity. Cullompton: Willan Publishing. chapter 2.

    Google Scholar 

  • Mills, E. (2005). Google Balances Privacy, Reach. C|Net News. com. Retrieved August 30, 2005, from http://news.com.com/Google+balances+privacy%2C+reach/2100-1032_3-5787483.html

  • Moor, J. H. (1997). Towards a theory of privacy in the Informa- tion age. ACM SIGCAS Computers and Society, 27, 27–32.

    Article  Google Scholar 

  • Patton, J. W. (2000). Protecting privacy in public? Surveillance Technologies and the Value of Public Places. Ethics and Information Technology, 2(3), 181–187.

    Article  Google Scholar 

  • Rachels, J. (1975). Why privacy is important. Philosophy and Public Affairs, 4, 323–333.

    Google Scholar 

  • Scanlon, T. (1975). Thomson on privacy. Philosophy and Public Affairs, 4, 315–322.

    Google Scholar 

  • Spinello, R. A. (2005). Trespass and Kyosei in cyberspace. In R. A. Spinello & H. T. Tavani (Eds.), Intellectual property rights in a networked world: Theory and practice. Hershey, PA: Idea Group. chapter 8.

    Chapter  Google Scholar 

  • Tavani, H. T. (2003). Ethics and technology: Ethical issues in an age of information and communication technology. New York: Wiley.

    Google Scholar 

  • The Economist December 2nd 2004 Your Cheating Phone.

    Google Scholar 

  • The Economist December 16th 1999, Living in the Global Goldfish Bowl.

    Google Scholar 

  • The Economist Jan 23rd 2003, SURVEY: THE INTERNET SOCIETY.

    Google Scholar 

  • Thomson, J. (1975). The right to privacy. Philosophy and Public Affairs, 4, 295–314.

    Google Scholar 

  • Turing, A. M. (1936). On computable numbers, with an Applica- tion to the Entscheidungsproblem. Proceedings of the London Mathematical Society, 2(42), 230–265.

    Google Scholar 

  • Volkman, R. (2003). Privacy as life, liberty. Property. Ethics and Information Technology, 5(4), 199–210.

    Article  Google Scholar 

  • Walker, K. (2000). Where everybody knows your name: A pragmatic look at the costs of privacy and the benefits of information exchange. Stanford Technology Law Review, 2, 1–50.

    Google Scholar 

  • Wallace, K. A. (1999). Anonymity. Ethics and Information Tech- nology, 1(1), 23–35.

    Google Scholar 

  • Warren, S., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 193(4), 193–220.

    Google Scholar 

  • Westin, A. F. (1968). Privacy and freedom 1st. New York: Atheneum.

    Google Scholar 

Download references

Acknowledgements

Previous versions of this paper were presented at the seminar Bridging Cultures: Computer Ethics, Culture, and ICT (NTNU, Trondheim, 6 June, 2005) and at the Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005, University of Twente, 18 July, 2005). I wish to thank all the participants and especially Phil Brey, Charles Ess, Johnny Søraker, Bernd Carsten Stahl and May Thorseth and the anonymous referees of the journal for their comments. Paul Oldfield and Matteo Turilli read a final version and suggested several crucial improvements. None of them is responsible for any of its shortcomings.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luciano Floridi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Floridi, L. (2021). The Ontological Interpretation of Informational Privacy. In: Chiodo, S., Schiaffonati, V. (eds) Italian Philosophy of Technology. Philosophy of Engineering and Technology, vol 35. Springer, Cham. https://doi.org/10.1007/978-3-030-54522-2_4

Download citation

Publish with us

Policies and ethics