Abstract
Privacy is a complex multidimensional facet of human existence which is infused into many diverse aspects of our lives. Some suggest that an individual’s quest for privacy is an indication that he/she has in some way done wrong—that he/she has something to hide. However as discussed in this chapter, privacies are much more complex and are crucial in supporting liberty, individuality, creativity, democracy, and human dignity. Without privacies our lives would be profoundly impoverished and as a consequence developments which erode privacy must be considered with great caution. This is strongly reinforced by lessons from history and by way of example, we consider the impact of the Stasi on the population of the German Democratic Republic (Deutsche Demokratische Republik) from the early 1950s to 1990. Despite such warnings, in recent times digital technologies have been used in ways which negatively impact on privacy values and facilitate a technique widely practiced by the Stasi—gaslighting. Driving forces underpinning today’s privacy erosion include commercial and political interests together with frequently promoted claims that loss of privacy will lead to enhanced safety. Unfortunately any such claim is fundamentally flawed as it fails to take into account aspects of human nature. In this chapter we also consider End User Licence Agreements and the ways in which they are frequently designed to enable organisations to capitalise on the individual’s Internet-based activities.
Notes
- 1.
Blundell, Q., ‘Collected Works’ (2020).
- 2.
‘Wer nichts zu verbergen hat, hat auch nichts zu befürchten’—‘Who has nothing to hide, has also nothing to fear’.
- 3.
In dealing with ongoing events of this nature, the author has removed specific reference to some of the countries and organisations concerned. They may of course be identified from the references cited.
- 4.
From Eggers, D., ‘The Circle’, (2013).
- 5.
Orwell (1949).
- 6.
Attributed to H. P. Lovecraft.
- 7.
In this latter respect, I recalled a previous university position. A large number of academic staff were recruited at the same time, and all had undergone a comprehensive medical prior to confirmation of appointment. During a visit to the HR department, new staff were very concerned to find that the completed medical forms were strewn across a junior administrator's desk (some were in fact scattered on the floor), such that they could be viewed by anybody passing by.
- 8.
Attributed to Janna Malamud Smith.
- 9.
John Brunner, ‘The Shockwave Rider’, (1974).
- 10.
Kafka (1925).
- 11.
In this subsection we use the term ‘information’ in a very general sense.
- 12.
In another university, even as highly qualified engineers, academic staff were not allowed to fit mains plugs, correct the time of wall mounted clocks or change faulty light bulbs. I learnt that restrictions in relation to clocks and personal office light bulbs were in place as these activities involved standing on a chair (with the risk of possibly falling off). Consequently when my office light bulb failed, I had to report the matter and some weeks later an outside contractor arrived to carry out the 20 second task. In the interim I had worked each day in semi-darkness.
- 13.
The name of the company has been removed.
- 14.
- 15.
Attributed to Albert Einstein (1879–1955).
- 16.
Attributed to Tom Stoppard. Quoted in Zimbardo (1973).
- 17.
This was a follow-up to a similar experimental trial conducted in 1953. These trials raise several ethical issues. For example, the boys (and their parents) were unaware that they were participating in an experimental trial. Furthermore those running the trials may have deliberately manipulated the behavior of the boys in order to obtain the desired results (see Sect. 3.6.3).
- 18.
Mary Wollstonecraft Shelley.
- 19.
Attributed to Rabindranath Tagore. Quoted in Zimbardo (1973).
- 20.
Interview with Edward Snowden: MacAskill and Hern (2018b).
- 21.
In this section and elsewhere in the book we refer to ‘security’ and ‘intelligence’ organisations. We use these terms loosely and interchangeably within the context of governmental organisations which focus on the national and/or international acquisition, processing and analysis of data pertaining to individuals (or organisations) for the stated intention of using such data to carry out activities purporting to thwart serious criminal activity and perceived international threats. We assume that such agencies have a degree of autonomy in their actions and are protected by broad rights to secrecy (privacies in modi operandi which include wide-ranging requirements for staff confidentiality). In practice the remit of such organizations often gradually increases with time. This is commonly referred to as ‘mission creep’.
- 22.
It appears that experimentation extended beyond the U.S. borders: ‘…Two projects of particular interest conducted as part of these experiments… involved the administration of LSD to unwitting subjects in Europe and the Far East.’ (Joint Hearing 1977)
- 23.
Attributed to Edward Snowden. Quoted in Chaitin (2018).
- 24.
Rogers et al. (1986), Volume 2: Appendix F ‘Personal Observations on Reliability of Shuttle’, by R. Feynman.
- 25.
Rogers et al. (1986), Volume 2: Appendix F ‘Personal Observations on Reliability of Shuttle’, by R. Feynman.
- 26.
Volume 2: Appendix F ‘Personal Observations on Reliability of Shuttle’.
- 27.
Rogers et al. (1986) Volume 2: Appendix F ‘Personal Observations on Reliability of Shuttle’ by R. Feynman.
- 28.
Unattributed.
- 29.
This may also be the case with the interview panel who may over-exaggerate interesting aspects of the role and career enhancement opportunities which will (perhaps) be provided.
References
Abbott, A., ‘How the Brain Reacts to Orders’, Nature, 530, pp. 394–395 (25th Feb. 2016).
Ainge Roy, E., ‘Top New Zealand Naval Officer on Trial Over Secret Camera in Embassy Bathroom’, The Guardian, (9th April 2019).
Andregg, A., ‘Ethical Implications of the Snowden Revelations’, The International Journal of Intelligence, Security, and Public Affairs, 18, No. 2, pp. 110–131 (2016).
Angwin, J., ‘You Know who else Collected Metadata? The Stasi’, PROPUBLICA (11th Feb. 2014).
Bakos, Y., Marotta-Wugler, F., and Trossen, D., ‘Does Anyone Read the Fine Print? Consumer Attention to Standard-Form Contracts’, The Journal of Legal Studies, 43, No. 1 (Jan. 2014).
BBC, ‘US Demands Social Media Details from Visa Applicants’, BBC 48486672, (1st June 2019).
BBC, ‘Gaslighting: The ‘Perfect’ Romance that became a Nightmare’, 41915425 (29th Nov. 2017).
BBC, ‘WW1 1914 Christmas Truce: ‘Stop it at once’ Order Auctioned’, 37256796 (2nd Sep. 2016).
Becker, H., ‘Outsiders’, Free Press of Glencoe (1969).
Bowlby, C., ‘Stasi files: The World’s Biggest Jigsaw P’, BBC News (14th Sep. 2012).
Caspar, E., Christensen, J., Cleeremans, A., and Haggard, P., ‘Coercion Changes the Sense of Agency in the Human Brain’, Current Biology, 26, pp. 585–592 (7th Mar. 2016).
Chaitin, D., ‘Edward Snowden: Facebook is a Surveillance Company Rebranded as ‘Social Media’’, Washington Examiner (17th Mar. 2018).
Chandler-Wilde, H., ‘Police hunt man who placed hidden camera in Starbucks toilets after he accidentally filmed himself installing it’, The Independent (22nd Nov 2017).
Doliński, D., Grzyb, T., Folwarczny, M., Grzbała, P., Krzyszycha, K., Martynowska, M., and Trojanowski, J., ‘Would You Deliver an Electric Shock in 2015? Obedience in the Experimental Paradigm Developed by Stanley Milgram in the 50 Years Following the Original Studies’, Social Psychological and Personality Science, 8, No. 8, pp. 927–933 (2017).
Electronic Frontier Foundation, ‘Google CEO Eric Schmidt Dismisses the Importance of Privacy’ (10th Dec. 2009).
Epstein, J., ‘Why President Obama Can’t Pardon Edward Snowden’, Newsweek Magazine (5th Jan. 2017).
Etzioni, A., ‘The Limits of Privacy’, Basic Books (1999).
Feynman, R., ‘Surely You’re Joking. Mr Feynman!: Adventures of a Curious Character’, W W Norton (1997).
Finnigan, L., ‘Ernst & Young employee, who filmed thousands of people by planting hidden cameras in toilets, has been jailed’, The Telegraph (21st Dec. 2015).
Flaherty, D. H., Visions of Privacy: Past Present and Future in ‘Visions of Privacy: Policy Choices for the Digital Age’, 19, 31, Bennett, C. J., and Grant, R. (eds.) (1999).
Fleddermann, C., ‘Engineering Ethics’, Prentice Hall (2012).
Forbes, I., ‘Minutes of Evidence’, Home Affairs Committee, House of Commons (26th June 2007).
Gage, B., ‘What an Uncensored Letter to M.L.K. Reveals’, The New York Times Magazine (11th Nov. 2014).
Ghitis, F., ‘Donald Trump is ‘Gaslighting’ Us All’, CNN (16th Jan. 2017).
Glancy, R., ‘Will you Read this Article about Terms and Conditions? You Really Should’, The Guardian (24th April 2014).
‘The Madrid Privacy Declaration - Global Privacy Standards for a Global World’, International Data Protection and Privacy Commissioners Conference, Public Voice (3 November 2009).
Greenwald, G., No Place to Hide: Edward Snowden, the NSA & the Surveillance State’, Penguin Books, (2014).
Hilberg, R., ‘The Destruction of the European Jews’, Holmes and Meier (1985).
Holtzman, D., ‘Privacy Lost: How Technology is Endangering Your Privacy’, Jossey-Bass, San Francisco (2006).
Hosein, G., ‘Privacy as Freedom’, in Jorgensen, R. (ed)., ‘Human Rights in the Global Information Society’, MIT Press, pp. 121–147 (2006).
Hunt, T., and Stewart, M., ‘Why were Police taking Photos of a Peaceful, Lawful Protest in Wellington?’, Stuff.co.nz (6th June 2017).
Innes, M., ‘Control Creep’, Sociological Research Online’, 6, No. 3 (2001).
IWM , (Imperial War Museums), ‘Voices of the First World War: The Christmas Truce’ (31st May 2018).
Joint Hearing, Before the Select Committee on Intelligence and the Subcommittee on Health and Scientific Research of the Committee on Human Resources United States Senate, ‘Project MKULTRA, The CIA’s Program of Research in Behavioural Modification’, U.S. Government Printing Office (3 Aug. 1977).
Kafka, F., ‘The Trial’, (1925).
King, M, L., ‘Letter to Fellow Clergymen’, Written in Birmingham City Jail (16th April 1963).
Klitou, D., ‘Privacy-Invading Technologies and Privacy by Design’, Springer, Information Technology and Law series (2014).
(a) Koebler, J., ‘Corporations Use End User License Agreements to Create a Parallel Legal System’, Motherboard (29th Mar. 2017).
(b) Koebler, J., ‘Why American Farmers are Hacking their Tractors with Ukrainian Firmware’, Motherboard (21st Mar. 2017).
Kumar, S., ‘Swedish Researchers Develop Tengai, a Robot which Objectively Interviews Candidates without Unconscious Biases’, The Guardian Tribune (12th March 2019).
Luebke, D.M. and Milton, S., ‘Locating the Victim: An Overview of Census-Taking, Tabulation Technology and Persecution in Nazi Germany’, IEEE Annals of the History of Computing, 16, No. 3 (1994).
MacAskill(a), E., ‘Is Whistleblowing worth Prison or a Life in Exile? Edward Snowden Talks to Daniel Ellsberg’, The Guardian (16th Jan. 2018).
MacAskill(b), E., and Hern, A., ‘Edward Snowden: ‘The People are Still Powerless, but now they’re Aware’’, The Guardian (4th June 2018).
March, R. H., ‘The Einstein File: J. Edgar Hoover’s Secret Was Against the World’s Most Famous Scientist’, (Review) Physics Today, 55, 9, p. 60 (2002).
McLeod, S., ‘The Milgram Experiment’, Simply Psychology (2017).
Milgram, S., ‘Behavioural Study of Obedience’, Journal of Abnormal and Social Psychology, 67, No. 4, pp. 371–378 (1963).
Moor, J. H., ‘The Ethics of Privacy Protection’, Library Trends, 39, Nos. 1 and 2, pp. 69–82 (Summer/Fall 1991).
Morozov, E., ‘The Real Privacy Problem’, MIT Technology Review (22nd Oct. 2013).
Myer, M., ‘They Thought they were Free: The Germans 1933–45’, (2nd Edn.) University of Chicago Press (1966).
Newitz, A., ‘Dangerous Terms: A Users Guide to EULA’s’, Electronic Frontier Foundation (Feb. 2005).
Orwell, G., ‘Nineteen Eighty-Four’, Penguin Books (1949).
Perkins, L., ‘To Install a Nanny Cam, or Not?’ HuffPost (11th Feb. 2017).
Perry, G., ‘The Lost Boys: Inside Muzafer Sherif’s Robbers Cave Experiment’, Scribe (2018).
Popplewell, R., ‘The Stasi and the East German Revolution of 1989’, Contemporary European History, pp. 37–63 (1992).
Posner, R., ‘The Economics of Justice’, Harvard University Press (1981).
Post, R.C., ‘Three Concepts of Privacy’, Yale Law School Legal Scholarship Repository (2001).
Preston, A., ‘The Death of Privacy’, The Guardian (3rd Aug. 2014).
Privacy International, ‘The Global Surveillance Industry’, (2016).
Privacy International, ‘Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya’ (March 2017).
Rietman, J., ‘No, The NSA isn’t like the Stasi – and Comparing them is Treacherous’, Wired (14th Jan. 2015).
Robinson, W., Boisjoly, R., Hoeker, D., and Young, S., ‘Representation and Misrepresentation: Tufte and the Morton Thiokol Engineers on the Challenger’, Science and Engineering Ethics, 8, pp. 59–81 (2002).
Rogers, W., et al., ‘Report of the Presidential Commission on the Space Shuttle Challenger Accident’ (6th June 1986).
Samuelson, R., ‘Robert Samuelson: The Hidden Consequences of Snowden’, The Washington Post (5th Jan. 2014).
Sarkis, S., ‘11 Warning Signs of Gaslighting’, Psychology Today (22nd Jan. 2017).
Savage, M., ‘Meet Tengai, The Job Interview Robot who won’t Judge You’, BBC (12th March 2019).
Shariatmandari, D., ‘A Real-Life Lord of the Flies: The Troubling Legacy of the Robbers Cave Experiment’, The Guardian (16th April 2018).
Shellenbarger, S., ‘Yes, It’s OK to Spy on Babysitters: Do’s and Don’ts of the Nannycam’, Wall Street Journal (8th May 2003).
Sherif, M., ‘Superordinate Goals in the Reduction of Intergroup Conflict’, The American Journal of Sociology, LXVIII, No. 4 (Jan. 1958).
Simcox, R., ‘Don’t Listen to Edward Snowden’s Supporters - His Leaks have been a Gift to Terrorists’, The Independent (9th June 2015).
Sloan, R., and Warner, R., ‘The Self, the Stasi, the NSA: Privacy, Knowledge, and Complicity in the Surveillance State’, Minnesota Journal of Law, Science & Technology, 17, Issue 1, (2016).
Smith, O., ‘Facebook Terms and Conditions: Why You Don’t Own Your Online Life’, The Telegraph (4th Jan. 2013).
Smith, R., ‘Ben Franklin’s Website’, Privacy Journal (2000).
Solove, D., ‘“I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy’, San Diego Law Review 44, pp. 745–772 (2007).
Solzhenitsyn, A., ‘Cancer Ward 192’, Bethell, N., and Burg, D., (trans.), Noonday Press (1991).
Tuffs, A., ‘One in 20 East German Doctors Spied on Patients or Colleagues for the Stasi’, BMJ 335, p. 1113 (1st Dec. 2007).
Tufte, E., ‘Visual and Statistical Thinking: Displays of Evidence for Making Decisions’, Graphic Press (1997).
Waldrop, M., ‘Why the FBI Kept a 1,400 Page File on Einstein’, National Geographic (19th April 2017).
Warren, S. D., and Brandeis, L. DE., ‘The Right to Privacy’, Harvard Law Review Association, 4, No. 5, pp. 193–220 (15th Dec. 1890).
Weigend, A., ‘Data for the People: How to make Our Post-Privacy Economy Work for You’, Basic Books (2017).
Wemple, E., ‘White House Press Secretary Sean Spicer Defines “Gaslighting”‘, The Washington Post (23rd Jan. 2017).
Wensierski, P., ‘East German Snitching went Far Beyond the Stasi’, Spiegel Online (10th July 2015).
Westin, A. F., ‘Privacy and Freedom’, Atheneum (1967).
Wright, S., ‘The New Technologies of Political Repression: A New Case for Arms Control?’, Philosophy and Social Action, 17 (3–4), pp. 31–62 (July-December 1991).
Zimbardo, P., ‘The Mind is a Formidable Jailer, A Pirandellian Prison’, The New York Times Magazine (8th April 1973).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Blundell, B.G. (2020). Privacy: An Outdated Concept?. In: Ethics in Computing, Science, and Engineering. Springer, Cham. https://doi.org/10.1007/978-3-030-27126-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-27126-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27125-1
Online ISBN: 978-3-030-27126-8
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)