Skip to main content

Privacy: An Outdated Concept?

  • Chapter
  • First Online:
Ethics in Computing, Science, and Engineering
  • 327 Accesses

Abstract

Privacy is a complex multidimensional facet of human existence which is infused into many diverse aspects of our lives. Some suggest that an individual’s quest for privacy is an indication that he/she has in some way done wrong—that he/she has something to hide. However as discussed in this chapter, privacies are much more complex and are crucial in supporting liberty, individuality, creativity, democracy, and human dignity. Without privacies our lives would be profoundly impoverished and as a consequence developments which erode privacy must be considered with great caution. This is strongly reinforced by lessons from history and by way of example, we consider the impact of the Stasi on the population of the German Democratic Republic (Deutsche Demokratische Republik) from the early 1950s to 1990. Despite such warnings, in recent times digital technologies have been used in ways which negatively impact on privacy values and facilitate a technique widely practiced by the Stasi—gaslighting. Driving forces underpinning today’s privacy erosion include commercial and political interests together with frequently promoted claims that loss of privacy will lead to enhanced safety. Unfortunately any such claim is fundamentally flawed as it fails to take into account aspects of human nature. In this chapter we also consider End User Licence Agreements and the ways in which they are frequently designed to enable organisations to capitalise on the individual’s Internet-based activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    Blundell, Q., ‘Collected Works’ (2020).

  2. 2.

    Wer nichts zu verbergen hat, hat auch nichts zu befürchten’—‘Who has nothing to hide, has also nothing to fear’.

  3. 3.

    In dealing with ongoing events of this nature, the author has removed specific reference to some of the countries and organisations concerned. They may of course be identified from the references cited.

  4. 4.

    From Eggers, D., ‘The Circle’, (2013).

  5. 5.

    Orwell (1949).

  6. 6.

    Attributed to H. P. Lovecraft.

  7. 7.

    In this latter respect, I recalled a previous university position. A large number of academic staff were recruited at the same time, and all had undergone a comprehensive medical prior to confirmation of appointment. During a visit to the HR department, new staff were very concerned to find that the completed medical forms were strewn across a junior administrator's desk (some were in fact scattered on the floor), such that they could be viewed by anybody passing by.

  8. 8.

    Attributed to Janna Malamud Smith.

  9. 9.

    John Brunner, ‘The Shockwave Rider’, (1974).

  10. 10.

    Kafka (1925).

  11. 11.

    In this subsection we use the term ‘information’ in a very general sense.

  12. 12.

    In another university, even as highly qualified engineers, academic staff were not allowed to fit mains plugs, correct the time of wall mounted clocks or change faulty light bulbs. I learnt that restrictions in relation to clocks and personal office light bulbs were in place as these activities involved standing on a chair (with the risk of possibly falling off). Consequently when my office light bulb failed, I had to report the matter and some weeks later an outside contractor arrived to carry out the 20 second task. In the interim I had worked each day in semi-darkness.

  13. 13.

    The name of the company has been removed.

  14. 14.

    Solzhenitsyn (1991), quoted in Solove (2007).

  15. 15.

    Attributed to Albert Einstein (1879–1955).

  16. 16.

    Attributed to Tom Stoppard. Quoted in Zimbardo (1973).

  17. 17.

    This was a follow-up to a similar experimental trial conducted in 1953. These trials raise several ethical issues. For example, the boys (and their parents) were unaware that they were participating in an experimental trial. Furthermore those running the trials may have deliberately manipulated the behavior of the boys in order to obtain the desired results (see Sect. 3.6.3).

  18. 18.

    Mary Wollstonecraft Shelley.

  19. 19.

    Attributed to Rabindranath Tagore. Quoted in Zimbardo (1973).

  20. 20.

    Interview with Edward Snowden: MacAskill and Hern (2018b).

  21. 21.

    In this section and elsewhere in the book we refer to ‘security’ and ‘intelligence’ organisations. We use these terms loosely and interchangeably within the context of governmental organisations which focus on the national and/or international acquisition, processing and analysis of data pertaining to individuals (or organisations) for the stated intention of using such data to carry out activities purporting to thwart serious criminal activity and perceived international threats. We assume that such agencies have a degree of autonomy in their actions and are protected by broad rights to secrecy (privacies in modi operandi which include wide-ranging requirements for staff confidentiality). In practice the remit of such organizations often gradually increases with time. This is commonly referred to as ‘mission creep’.

  22. 22.

    It appears that experimentation extended beyond the U.S. borders: ‘…Two projects of particular interest conducted as part of these experiments… involved the administration of LSD to unwitting subjects in Europe and the Far East.’ (Joint Hearing 1977)

  23. 23.

    Attributed to Edward Snowden. Quoted in Chaitin (2018).

  24. 24.

    Rogers et al. (1986), Volume 2: Appendix F ‘Personal Observations on Reliability of Shuttle’, by R. Feynman.

  25. 25.

    Rogers et al. (1986), Volume 2: Appendix F ‘Personal Observations on Reliability of Shuttle’, by R. Feynman.

  26. 26.

    Volume 2: Appendix F ‘Personal Observations on Reliability of Shuttle’.

  27. 27.

    Rogers et al. (1986) Volume 2: Appendix F ‘Personal Observations on Reliability of Shuttle’ by R. Feynman.

  28. 28.

    Unattributed.

  29. 29.

    This may also be the case with the interview panel who may over-exaggerate interesting aspects of the role and career enhancement opportunities which will (perhaps) be provided.

References

  • Abbott, A., ‘How the Brain Reacts to Orders’, Nature, 530, pp. 394–395 (25th Feb. 2016).

    Google Scholar 

  • Ainge Roy, E., ‘Top New Zealand Naval Officer on Trial Over Secret Camera in Embassy Bathroom’, The Guardian, (9th April 2019).

    Google Scholar 

  • Andregg, A., ‘Ethical Implications of the Snowden Revelations’, The International Journal of Intelligence, Security, and Public Affairs, 18, No. 2, pp. 110–131 (2016).

    Google Scholar 

  • Angwin, J., ‘You Know who else Collected Metadata? The Stasi’, PROPUBLICA (11th Feb. 2014).

    Google Scholar 

  • Bakos, Y., Marotta-Wugler, F., and Trossen, D., ‘Does Anyone Read the Fine Print? Consumer Attention to Standard-Form Contracts’, The Journal of Legal Studies, 43, No. 1 (Jan. 2014).

    Google Scholar 

  • BBC, ‘US Demands Social Media Details from Visa Applicants’, BBC 48486672, (1st June 2019).

    Google Scholar 

  • BBC, ‘Gaslighting: The ‘Perfect’ Romance that became a Nightmare’, 41915425 (29th Nov. 2017).

    Google Scholar 

  • BBC, ‘WW1 1914 Christmas Truce: ‘Stop it at once’ Order Auctioned’, 37256796 (2nd Sep. 2016).

    Google Scholar 

  • Becker, H., ‘Outsiders’, Free Press of Glencoe (1969).

    Google Scholar 

  • Bowlby, C., ‘Stasi files: The World’s Biggest Jigsaw P’, BBC News (14th Sep. 2012).

    Google Scholar 

  • Caspar, E., Christensen, J., Cleeremans, A., and Haggard, P., ‘Coercion Changes the Sense of Agency in the Human Brain’, Current Biology, 26, pp. 585–592 (7th Mar. 2016).

    Google Scholar 

  • Chaitin, D., ‘Edward Snowden: Facebook is a Surveillance Company Rebranded as ‘Social Media’’, Washington Examiner (17th Mar. 2018).

    Google Scholar 

  • Chandler-Wilde, H., ‘Police hunt man who placed hidden camera in Starbucks toilets after he accidentally filmed himself installing it’, The Independent (22nd Nov 2017).

    Google Scholar 

  • Doliński, D., Grzyb, T., Folwarczny, M., Grzbała, P., Krzyszycha, K., Martynowska, M., and Trojanowski, J., ‘Would You Deliver an Electric Shock in 2015? Obedience in the Experimental Paradigm Developed by Stanley Milgram in the 50 Years Following the Original Studies’, Social Psychological and Personality Science, 8, No. 8, pp. 927–933 (2017).

    Google Scholar 

  • Electronic Frontier Foundation, ‘Google CEO Eric Schmidt Dismisses the Importance of Privacy’ (10th Dec. 2009).

    Google Scholar 

  • Epstein, J., ‘Why President Obama Can’t Pardon Edward Snowden’, Newsweek Magazine (5th Jan. 2017).

    Google Scholar 

  • Etzioni, A., ‘The Limits of Privacy’, Basic Books (1999).

    Google Scholar 

  • Feynman, R., ‘Surely You’re Joking. Mr Feynman!: Adventures of a Curious Character’, W W Norton (1997).

    Google Scholar 

  • Finnigan, L., ‘Ernst & Young employee, who filmed thousands of people by planting hidden cameras in toilets, has been jailed’, The Telegraph (21st Dec. 2015).

    Google Scholar 

  • Flaherty, D. H., Visions of Privacy: Past Present and Future in ‘Visions of Privacy: Policy Choices for the Digital Age’, 19, 31, Bennett, C. J., and Grant, R. (eds.) (1999).

    Google Scholar 

  • Fleddermann, C., ‘Engineering Ethics’, Prentice Hall (2012).

    Google Scholar 

  • Forbes, I., ‘Minutes of Evidence’, Home Affairs Committee, House of Commons (26th June 2007).

    Google Scholar 

  • Gage, B., ‘What an Uncensored Letter to M.L.K. Reveals’, The New York Times Magazine (11th Nov. 2014).

    Google Scholar 

  • Ghitis, F., ‘Donald Trump is ‘Gaslighting’ Us All’, CNN (16th Jan. 2017).

    Google Scholar 

  • Glancy, R., ‘Will you Read this Article about Terms and Conditions? You Really Should’, The Guardian (24th April 2014).

    Google Scholar 

  • ‘The Madrid Privacy Declaration - Global Privacy Standards for a Global World’, International Data Protection and Privacy Commissioners Conference, Public Voice (3 November 2009).

    Google Scholar 

  • Greenwald, G., No Place to Hide: Edward Snowden, the NSA & the Surveillance State’, Penguin Books, (2014).

    Google Scholar 

  • Hilberg, R., ‘The Destruction of the European Jews’, Holmes and Meier (1985).

    Google Scholar 

  • Holtzman, D., ‘Privacy Lost: How Technology is Endangering Your Privacy’, Jossey-Bass, San Francisco (2006).

    Google Scholar 

  • Hosein, G., ‘Privacy as Freedom’, in Jorgensen, R. (ed)., ‘Human Rights in the Global Information Society’, MIT Press, pp. 121–147 (2006).

    Google Scholar 

  • Hunt, T., and Stewart, M., ‘Why were Police taking Photos of a Peaceful, Lawful Protest in Wellington?’, Stuff.co.nz (6th June 2017).

  • Innes, M., ‘Control Creep’, Sociological Research Online’, 6, No. 3 (2001).

    Google Scholar 

  • IWM , (Imperial War Museums), ‘Voices of the First World War: The Christmas Truce’ (31st May 2018).

    Google Scholar 

  • Joint Hearing, Before the Select Committee on Intelligence and the Subcommittee on Health and Scientific Research of the Committee on Human Resources United States Senate, ‘Project MKULTRA, The CIA’s Program of Research in Behavioural Modification’, U.S. Government Printing Office (3 Aug. 1977).

    Google Scholar 

  • Kafka, F., ‘The Trial’, (1925).

    Google Scholar 

  • King, M, L., ‘Letter to Fellow Clergymen’, Written in Birmingham City Jail (16th April 1963).

    Google Scholar 

  • Klitou, D., ‘Privacy-Invading Technologies and Privacy by Design’, Springer, Information Technology and Law series (2014).

    Google Scholar 

  • (a) Koebler, J., ‘Corporations Use End User License Agreements to Create a Parallel Legal System’, Motherboard (29th Mar. 2017).

    Google Scholar 

  • (b) Koebler, J., ‘Why American Farmers are Hacking their Tractors with Ukrainian Firmware’, Motherboard (21st Mar. 2017).

    Google Scholar 

  • Kumar, S., ‘Swedish Researchers Develop Tengai, a Robot which Objectively Interviews Candidates without Unconscious Biases’, The Guardian Tribune (12th March 2019).

    Google Scholar 

  • Luebke, D.M. and Milton, S., ‘Locating the Victim: An Overview of Census-Taking, Tabulation Technology and Persecution in Nazi Germany’, IEEE Annals of the History of Computing, 16, No. 3 (1994).

    Google Scholar 

  • MacAskill(a), E., ‘Is Whistleblowing worth Prison or a Life in Exile? Edward Snowden Talks to Daniel Ellsberg’, The Guardian (16th Jan. 2018).

    Google Scholar 

  • MacAskill(b), E., and Hern, A., ‘Edward Snowden: ‘The People are Still Powerless, but now they’re Aware’’, The Guardian (4th June 2018).

    Google Scholar 

  • March, R. H., ‘The Einstein File: J. Edgar Hoover’s Secret Was Against the World’s Most Famous Scientist’, (Review) Physics Today, 55, 9, p. 60 (2002).

    Google Scholar 

  • McLeod, S., ‘The Milgram Experiment’, Simply Psychology (2017).

    Google Scholar 

  • Milgram, S., ‘Behavioural Study of Obedience’, Journal of Abnormal and Social Psychology, 67, No. 4, pp. 371–378 (1963).

    Google Scholar 

  • Moor, J. H., ‘The Ethics of Privacy Protection’, Library Trends, 39, Nos. 1 and 2, pp. 69–82 (Summer/Fall 1991).

    Google Scholar 

  • Morozov, E., ‘The Real Privacy Problem’, MIT Technology Review (22nd Oct. 2013).

    Google Scholar 

  • Myer, M., ‘They Thought they were Free: The Germans 1933–45’, (2nd Edn.) University of Chicago Press (1966).

    Google Scholar 

  • Newitz, A., ‘Dangerous Terms: A Users Guide to EULA’s’, Electronic Frontier Foundation (Feb. 2005).

    Google Scholar 

  • Orwell, G., ‘Nineteen Eighty-Four’, Penguin Books (1949).

    Google Scholar 

  • Perkins, L., ‘To Install a Nanny Cam, or Not?’ HuffPost (11th Feb. 2017).

    Google Scholar 

  • Perry, G., ‘The Lost Boys: Inside Muzafer Sherif’s Robbers Cave Experiment’, Scribe (2018).

    Google Scholar 

  • Popplewell, R., ‘The Stasi and the East German Revolution of 1989’, Contemporary European History, pp. 37–63 (1992).

    Google Scholar 

  • Posner, R., ‘The Economics of Justice’, Harvard University Press (1981).

    Google Scholar 

  • Post, R.C., ‘Three Concepts of Privacy’, Yale Law School Legal Scholarship Repository (2001).

    Google Scholar 

  • Preston, A., ‘The Death of Privacy’, The Guardian (3rd Aug. 2014).

    Google Scholar 

  • Privacy International, ‘The Global Surveillance Industry’, (2016).

    Google Scholar 

  • Privacy International, ‘Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya’ (March 2017).

    Google Scholar 

  • Rietman, J., ‘No, The NSA isn’t like the Stasi – and Comparing them is Treacherous’, Wired (14th Jan. 2015).

    Google Scholar 

  • Robinson, W., Boisjoly, R., Hoeker, D., and Young, S., ‘Representation and Misrepresentation: Tufte and the Morton Thiokol Engineers on the Challenger’, Science and Engineering Ethics, 8, pp. 59–81 (2002).

    Google Scholar 

  • Rogers, W., et al., ‘Report of the Presidential Commission on the Space Shuttle Challenger Accident’ (6th June 1986).

    Google Scholar 

  • Samuelson, R., ‘Robert Samuelson: The Hidden Consequences of Snowden’, The Washington Post (5th Jan. 2014).

    Google Scholar 

  • Sarkis, S., ‘11 Warning Signs of Gaslighting’, Psychology Today (22nd Jan. 2017).

    Google Scholar 

  • Savage, M., ‘Meet Tengai, The Job Interview Robot who won’t Judge You’, BBC (12th March 2019).

    Google Scholar 

  • Shariatmandari, D., ‘A Real-Life Lord of the Flies: The Troubling Legacy of the Robbers Cave Experiment’, The Guardian (16th April 2018).

    Google Scholar 

  • Shellenbarger, S., ‘Yes, It’s OK to Spy on Babysitters: Do’s and Don’ts of the Nannycam’, Wall Street Journal (8th May 2003).

    Google Scholar 

  • Sherif, M., ‘Superordinate Goals in the Reduction of Intergroup Conflict’, The American Journal of Sociology, LXVIII, No. 4 (Jan. 1958).

    Google Scholar 

  • Simcox, R., ‘Don’t Listen to Edward Snowden’s Supporters - His Leaks have been a Gift to Terrorists’, The Independent (9th June 2015).

    Google Scholar 

  • Sloan, R., and Warner, R., ‘The Self, the Stasi, the NSA: Privacy, Knowledge, and Complicity in the Surveillance State’, Minnesota Journal of Law, Science & Technology, 17, Issue 1, (2016).

    Google Scholar 

  • Smith, O., ‘Facebook Terms and Conditions: Why You Don’t Own Your Online Life’, The Telegraph (4th Jan. 2013).

    Google Scholar 

  • Smith, R., ‘Ben Franklin’s Website’, Privacy Journal (2000).

    Google Scholar 

  • Solove, D., ‘“I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy’, San Diego Law Review 44, pp. 745–772 (2007).

    Google Scholar 

  • Solzhenitsyn, A., ‘Cancer Ward 192’, Bethell, N., and Burg, D., (trans.), Noonday Press (1991).

    Google Scholar 

  • Tuffs, A., ‘One in 20 East German Doctors Spied on Patients or Colleagues for the Stasi’, BMJ 335, p. 1113 (1st Dec. 2007).

    Google Scholar 

  • Tufte, E., ‘Visual and Statistical Thinking: Displays of Evidence for Making Decisions’, Graphic Press (1997).

    Google Scholar 

  • Waldrop, M., ‘Why the FBI Kept a 1,400 Page File on Einstein’, National Geographic (19th April 2017).

    Google Scholar 

  • Warren, S. D., and Brandeis, L. DE., ‘The Right to Privacy’, Harvard Law Review Association, 4, No. 5, pp. 193–220 (15th Dec. 1890).

    Google Scholar 

  • Weigend, A., ‘Data for the People: How to make Our Post-Privacy Economy Work for You’, Basic Books (2017).

    Google Scholar 

  • Wemple, E., ‘White House Press Secretary Sean Spicer Defines “Gaslighting”‘, The Washington Post (23rd Jan. 2017).

    Google Scholar 

  • Wensierski, P., ‘East German Snitching went Far Beyond the Stasi’, Spiegel Online (10th July 2015).

    Google Scholar 

  • Westin, A. F., ‘Privacy and Freedom’, Atheneum (1967).

    Google Scholar 

  • Wright, S., ‘The New Technologies of Political Repression: A New Case for Arms Control?’, Philosophy and Social Action, 17 (3–4), pp. 31–62 (July-December 1991).

    Google Scholar 

  • Zimbardo, P., ‘The Mind is a Formidable Jailer, A Pirandellian Prison’, The New York Times Magazine (8th April 1973).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Barry G. Blundell .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Blundell, B.G. (2020). Privacy: An Outdated Concept?. In: Ethics in Computing, Science, and Engineering. Springer, Cham. https://doi.org/10.1007/978-3-030-27126-8_3

Download citation

Publish with us

Policies and ethics