Abstract
The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they can also alter its nature and hence our understanding and appreciation of it; (d) a change in our ontological perspective, brought about by digital ICTs, suggests considering each person as being constituted by his or her information and hence regarding a breach of one’s informational privacy as a form of aggression towards one’s personal identity.
This chapter was originally published in Ethics and Information Technology (2005) 7:185–200.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Especially in the US, see Garfinkel (2000).
- 2.
Froomkin (2000) still provides a valuable review.
- 3.
- 4.
For a precise definition of agent see Floridi and Sanders (2004b).
- 5.
For a similar point see Moor (1997), who writes “When information is computerized, it is greased to slide easily and quickly to many ports of call” (p. 27).
- 6.
Anonymity is defined here as the unavailability of personal information, or the “noncoordinability of traits in a given respect”, according to Wallace (1999).
- 7.
Stevenson’s The Strange Case of Dr Jekyll and Mr Hyde was first published in 1886.
- 8.
Doyle’s A Study in Scarlet was first published in 1887.
- 9.
Orwell’s 1984, first published in 1949, contains no reference to computers or digital machines.
- 10.
The neologism is constructed following the word “re- engineering” (“to design and construct anew”).
- 11.
Radio Frequency IDentification, a method of storing and remotely retrieving data using tags or transponders.
- 12.
- 13.
The issue of artificial morality is analyzed in Floridi and Sanders (2004b).
- 14.
The term is introduced by Westin (1968) to describe digital profile generated from data concerning a user’s habits online.
- 15.
The outer world, or reality, as it affects the agent inhabiting it.
- 16.
“The best long-term assessment of public attitudes toward privacy is provided by Columbia’s Alan Westin, who has conducted a series of polls over the last 30 years on this issue. On average, he finds that one quarter of the American public cares deeply about keeping personal information secret, one quarter doesn’t care much at all, and roughly half are in the middle, wanting to know more about the benefits, safeguards, and risks before providing information. Customer behaviour in the marketplace – where many people freely provide personal information in exchange for various offers and benefits – seems to bear out this conclusion” Walker (2000).
- 17.
Private communication. The rest of this section is largely based on comments sent to me by Paul Oldfield,
- 18.
- 19.
See Spinello (2005) for a recent assessment of the use of the trespassing analogy in computer-ethical and legal contexts. Charles Ess has pointed out to me that comparative studies have shown such spatial metaphors to be popular only in Western contexts.
- 20.
Moor (1997) infers from this that informational privacy is not a core value, i.e. a value that “all normal humans and cultures need for survival”, but then other values he lists as “core” are not really so in his sense, e.g. happiness and freedom. According to Moor, privacy is also intrinsically valuable, while being the expression of the core value represented by security.
- 21.
For a different view see Volkman (2003).
- 22.
This view is close to the interpretation of privacy in terms of protection of human dignity defended by Bloustein (1964).
- 23.
- 24.
On the tripartite distinction between information as, about or for reality see Floridi (2004).
References
Alterman, A. (2003). A piece of yourself: Ethical issues in biometric identification. Ethics and Information Technology, 5(3), 139–150.
Becker, F., & Sims, W. (2000). Offices that work: Balancing cost, flexibility, and communication. New York: Cornell University Inter- national Workplace Studies Program.
Bloustein, E. (1964). Privacy as an aspect of human dignity: An answer to dean Prosser. New York University Law Review, 39, 962–1007.
Bohn, J., Coroama, V., Langheinrich, M., Mattern, F., & Rohs, M. (2004). Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. Journal of Human and Ecological Risk Assessment, 10(5), 763–786.
Brey, P. (2005). Freedom and privacy in ambient intelligence. In P. Brey, F. Grodzinsky, & L. Introna (Eds.), Ethics of new information technology – Proceed- ings of the sixth international conference of computer ethics: Philosophical enquiry (Cepe2005) (pp. 91–100). Enschende: CEPTES University of Twente.
Bynum, T. W., & Rogerson, S. (2004). Computer ethics and professional responsibility. Oxford: Blackwell.
Coroama, V., Bohn, J., & Mattern, F. (2004). Living in a smart environment – Implications for the coming ubiquitous information society. In IEEE SMC 2004, the Hague, the Netherlands, October 10–13 (pp. 5633–5638).
Floridi, L. (1999). Information ethics: On the philosophical foundations of computer ethics. Ethics and Information Technology, 1(1), 37–56. Reprinted, with some modifications, in The Ethicomp Journal, 1(1), 2004, http://www.ccsr.cse.dmu.ac.uk/journal/articles/floridi_l_philosophical.pdf.
Floridi, L. (2004). Information. In L. Floridi (Ed.), The Blackwell guide to the philosophy of computing and information (pp. 40–61). Oxford: Blackwell.
Floridi, L. (2008). Information ethics. In J. van den Hoven & J. Weckert (Eds.), Moral philosophy and information technology. Cambridge: Cambridge University Press.
Floridi, L. (2005). Presence: From epistemic failure to successful Observability. Presence: Teleoperators and Virtual Environments, 14(6), 656–676.
Floridi, L., & Sanders, J. W. (2004a). The method of abstraction. In M. Negrotti (Ed.), Yearbook of the artificial. Nature, culture and technology. Models in contemporary sciences (pp. 177–220). Bern: Peter Lang.
Floridi, L., & Sanders, J. W. (2004b). On the morality of artificial agents. Minds and Machines, 14(3), 349–379.
Floridi, L., & Sanders, J. W. (2005). Internet ethics: The constructionist values of Homo Poieticus. In R. Cavalier (Ed.), The impact of the Internet on our moral lives. New York: SUNY.
Froomkin, A. M. (2000). The death of privacy? Stanford Law Review, 52, 1461–1543.
Garfinkel, S. (2000). Database nation: The death of privacy in the 21st century. Beijing: O’Reilly.
Gow, G. (2005). Consumers and Privacy in Ubiquitous Network Societies – Background Paper. Retrieved August 16, 2005, from http://www.itu.int/osg/spu/ni/ubiquitous/Papers/Privacy%20background%20paper.pdf
Johnson, D. G. (2001). Computer ethics (3rd ed.). Upper Saddle River, NJ: Prentice-Hall.
Levi, P. (1959). If this is a man. London: Orion Press.
Lyman, P. & Varian, H. R.. (2003). How much information? Retrieved August 16, 2005, from http://www.sims.berkeley.edu/research/projects/how-much-info-2003/execsum.htm#summary
Marx, G. T. (2005). Some conceptual issues in the study of Borders and surveillance. In E. Zureik & M. B. Salter (Eds.), Global surveillance and policing – Borders, security, identity. Cullompton: Willan Publishing. chapter 2.
Mills, E. (2005). Google Balances Privacy, Reach. C|Net News. com. Retrieved August 30, 2005, from http://news.com.com/Google+balances+privacy%2C+reach/2100-1032_3-5787483.html
Moor, J. H. (1997). Towards a theory of privacy in the Informa- tion age. ACM SIGCAS Computers and Society, 27, 27–32.
Patton, J. W. (2000). Protecting privacy in public? Surveillance Technologies and the Value of Public Places. Ethics and Information Technology, 2(3), 181–187.
Rachels, J. (1975). Why privacy is important. Philosophy and Public Affairs, 4, 323–333.
Scanlon, T. (1975). Thomson on privacy. Philosophy and Public Affairs, 4, 315–322.
Spinello, R. A. (2005). Trespass and Kyosei in cyberspace. In R. A. Spinello & H. T. Tavani (Eds.), Intellectual property rights in a networked world: Theory and practice. Hershey, PA: Idea Group. chapter 8.
Tavani, H. T. (2003). Ethics and technology: Ethical issues in an age of information and communication technology. New York: Wiley.
The Economist December 2nd 2004 Your Cheating Phone.
The Economist December 16th 1999, Living in the Global Goldfish Bowl.
The Economist Jan 23rd 2003, SURVEY: THE INTERNET SOCIETY.
Thomson, J. (1975). The right to privacy. Philosophy and Public Affairs, 4, 295–314.
Turing, A. M. (1936). On computable numbers, with an Applica- tion to the Entscheidungsproblem. Proceedings of the London Mathematical Society, 2(42), 230–265.
Volkman, R. (2003). Privacy as life, liberty. Property. Ethics and Information Technology, 5(4), 199–210.
Walker, K. (2000). Where everybody knows your name: A pragmatic look at the costs of privacy and the benefits of information exchange. Stanford Technology Law Review, 2, 1–50.
Wallace, K. A. (1999). Anonymity. Ethics and Information Tech- nology, 1(1), 23–35.
Warren, S., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 193(4), 193–220.
Westin, A. F. (1968). Privacy and freedom 1st. New York: Atheneum.
Acknowledgements
Previous versions of this paper were presented at the seminar Bridging Cultures: Computer Ethics, Culture, and ICT (NTNU, Trondheim, 6 June, 2005) and at the Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005, University of Twente, 18 July, 2005). I wish to thank all the participants and especially Phil Brey, Charles Ess, Johnny Søraker, Bernd Carsten Stahl and May Thorseth and the anonymous referees of the journal for their comments. Paul Oldfield and Matteo Turilli read a final version and suggested several crucial improvements. None of them is responsible for any of its shortcomings.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Floridi, L. (2021). The Ontological Interpretation of Informational Privacy. In: Chiodo, S., Schiaffonati, V. (eds) Italian Philosophy of Technology. Philosophy of Engineering and Technology, vol 35. Springer, Cham. https://doi.org/10.1007/978-3-030-54522-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-54522-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-54521-5
Online ISBN: 978-3-030-54522-2
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)