Abstract
Discussion on privacy issues is as old as mankind. Starting with the protection of one’s body and home, it soon evolved in the direction of controlling one’s personal information. In 1891, the American lawyers Samuel Warren and Louis Brandeis described the right to privacy in a famous article: it is the right to be let alone. In 1967 a new milestone was reached with the publication of Alan Westin’s Privacy and Freedom when he defined privacy in terms of self determination: privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.
History of privacy makes clear that there is a strong relationship between privacy and the development of technology. The modern discussion started with the use of cameras and went on to include the development and use of computers in an information society in which personal data on every individual is collected and stored. Not only is it a great concern that privacy is eroding but also that we are entering a surveillance society. This loss of privacy seems to be even more the case since the protection of privacy is strongly dependant upon the political will to protect it. Since 9/11, however, this political will world-wide is oriented more toward the effective and efficient use of technology in the battle against criminality and terrorism than it is toward protecting privacy. Therefore it is time to re-evaluate the use of technology and the protection of privacy. It is not only privacy that is at stake but above all democracy.
Chapter PDF
Similar content being viewed by others
Keywords
References
Branscomb, A.W.: Who Owns Information? From Privacy to Public Access. Basic Books, New York (1994)
Moore Jr., B.: Studies in Social and Cultural History. M.E. Sharpe, Inc., Armonk (1984)
Hixson, R.F.: Privacy in a Public Society. Human Rights in Conflict. Oxford University Press, Oxford (1987)
Flaherty, D.H.: Privacy in Colonial New England. University Press of Virginia, Charlottesville (1972)
Westin, A.F.: Science, Privacy and Freedom: Issues and Proposals for the 1970’s. Part I; The Current Impact of Surveillance on Privacy, Disclosure, and Surveillance. Columbia Law Review 66, 1003–1050 (1966)
Westin, A.F.: Science, Privacy and Freedom: Issues and Proposals for the 1970’s. Part II, Balancing the Conflicting demands of Privacy, Disclosure, and Surveillance. Columbia Law Review 66, 1205–1253 (1966)
Westin, A.F.: Privacy & Freedom. The Bodley Head, London (1967)
Bates, A.: Privacy – A Useful Concept? Social Forces 42, 429–435 (1964)
Brenton, M.: The Privacy Invaders. Coward-McCann, Inc., New York (1964)
Harisson, A.: The Problem of Privacy in the Computer Age, an annotated bibliography. The Rand Corporation, Santa Monica (1967)
Jourard, S.M.: Some Psychological Aspects of privacy. Law and Contemporary Problems 31, 307–319 (1966)
Kalven Jr., H.: The Problem of Privacy in the Year 2000. Daedalus 93, 876–882 (1967)
Konvitz, M.R.: Privacy and the Law: a Philosophical Prelude. Law and Contemporary Problems 31, 272–281 (1966)
EPIC, Privacy & Human Rights, An international Survey of Privacy Laws and Developments. Electronic Privacy and Information Centre and Privacy International, Washington (2002)
The Economist, Move over, Big Brother, The Economist Technology Quarterly, 26 (December 2, 2004)
Garson, B.: The Electronic Sweatshop, How Computers Are Transforming the Office of the Future Into the Factory of the Past. Penguin Books, New York (1988)
Warren, S.D., Brandeis, L.D.: The Right to Privacy. In: Adam Carlyle Breckenridge, The Right to Privacy, pp. 133–153. University of Nebraska Press, Lincoln (1970)
Mayer, M.F.: Right of Privacy. Law Arts Publishers, Inc., New York (1972)
Zelermyer, W.: Invasion of Privacy. Syracuse University Press (1959)
Cate, F.H.: Privacy in the Information Age. Brooking Institution Press, Washington (1997)
Whyte, W.H.: The Organization Man. Penguin Books, Middlesex (1956)
Packard, V.: The Hidden Persuaders. Penguin Books, Midddlesex (1964)
Ruebhausen, O.M., Brim Jr., O.G.: Privacy and Behavioral Research. Columbia Law review 65, 1184–1211 (1965)
Warner, M., Stone, M.: The Data Bank Society. Organizations, Computers and Social Freedom. George Allen and Unwin Ltd., London (1970)
Miller, A.: The Assault on Privacy: Computers, Dossiers and Data Banks. The University of Michigan Press, Ann Arbor (1971)
Stanley, J., Steinhardt, B., Monster, B., Chains, W.: The Growth of an American Surveillance Society. American Civil Liberties Union, New York (2003)
Davies, S.: Big Brother at the Box Office, Electronic Visual Surveillance and the Bog Screen. In: Proceedings of the 21th International Conference on Privacy and Personal Data Protection, Hong Kong, pp. 151–160 (1999)
Elbirt, A.J.: Who are You? How to Protect Against Identity Theft. IEEE Technology and Society Magazin, 5–8 (2005)
Cavoukian, A.: Identity Theft Revisited: Security is Not Enough. Information and Privacy Commissioner, Ontario (2005)
Erbschloe, M., Vacca, J.: Net Privacy, A Guide to developing and implementing an ironclad ebusiness plan. McGraw-Hill, New York (2001)
Duquenoy, P., Masurkar, V.: Surrounded by intelligence .... In: Duquennoy, P., Fisher-Hübner, S., Holvast, J., Zuccato, A. (eds.) Risks and Challenges of the Network Society, pp. 121–134. Karlstad University Studies, Karlstad (2004)
The Economist, The surveillance society, May 1 (1999)
Evans, M.: The data-informed marketing model and its social responsibility. In: Lace, S. (ed.) The Glass Consumer, Life in a surveillance society, pp. 99–132. National Consumer Council (2005)
Foroohar, R.: Life in the grid. In: Newsweek, pp. 64–67, September 16-23 (2002)
Council of Europe, Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data, European Treaty Series No. 108, Strasbourg (1982)
OECD, Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Paris (1981)
Directive 95/46/EC of the European Parliament and the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and the free movement of such data, Official Journal of the European Communities, 281/31-50 (1995)
Directive 97/66/EC of the European Parliament and the Council of 15 December 1997 concerning the processing of personal data and the protection of privacy in the telecommunications sector, Official Journal of the European Communities, 24/1-8 (1998)
Directive 2002/58/EC of the European Parliament and the Council of 12 July 2002, concerning the processing of personal data and the protection of privacy in the electronic communication, Official Journal of the European Communities, 201/37-47 (2002)
Raab, C.: Regulatory provisions for privacy protection. In: Lace, S. (ed.) The Glass Consumer, Life in a surveillance society, pp. 45–67. National Consumer Council (2005)
Reidenberg, J.: Technologies for Privacy Protection. Paper presented at the 23rd Internation Conference of Data Protection Commissioners, Paris (2001)
Chaum, D.: Security without identification: Transaction Systems to make big brother obsolete. Communications of the ACM 28, 1020–1044 (1985)
van Rossem, H., Gardeniers, H., Borking, J., Cavoukian, A., Brans, J., Muttupulle, N., Magistrale, N.: Privacy-enhancing Technologies, The path to anonymity, vol. I and II. Registratiekamer, The Netherlands & Information and Privacy Commissioner, Ontario, Canada (1995)
Grodzinsky, F.S., Tavani, H.T.: Verizon vs the RIAA: Implications for Privacy and Democracy. Paper presented at ISTAS 2004, International Symposium on Technology and Society, Globalizing Technological Education (2004)
Brantgärde, L.: Swedish trends in Data Protection and Data Access. In: de Guchteneire, P., Mochmann, E. (eds.) Data protection and data access, pp. 105–122. North-Holland, Amsterdam (1990)
Computer Business Review (June 2001)
Burnham, D.: The Rise of the Computer State. The threat to our Freedoms, our Ethics and our democratic Process. Random House, New York (1983)
Flaherty, D.: The Emergence of Surveillance Societies in the Western World: Toward the Year 2000. Government Information Quarterly 4, 377–387 (1988)
Hall, H.: Data use in credit and insurance: controlling unfair outcomes. In: Lace, S. (ed.) The Glass Consumer, Life in a surveillance society, pp. 157–186. National Consumer Council (2005)
Lace, S. (ed.): The Glass Consumer, Life in a surveillance society. National Consumer Council (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Holvast, J. (2009). History of Privacy. In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds) The Future of Identity in the Information Society. Privacy and Identity 2008. IFIP Advances in Information and Communication Technology, vol 298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03315-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-03315-5_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03314-8
Online ISBN: 978-3-642-03315-5
eBook Packages: Computer ScienceComputer Science (R0)