Skip to main content

Advertisement

Log in

The Teleological Account of Proportional Surveillance

  • Published:
Res Publica Aims and scope Submit manuscript

Abstract

This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account. Specifically, it reviews the idea that the set of goods should be restricted, that proportionality should require a surplus of good, and that there should be both an upper and a lower-bound on the badness of proportional surveillance. Each of these ideas is shown to raise severe difficulties. Finally, the article considers whether to adopt a narrow or a wide proportionality condition, reviews an argument for the former, and concludes in favour of the latter.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Cf. Ross Bellaby: ‘“Surveillance” can cover a wide range of activities from CCTV cameras and “covert surveillance” to dataveillance and datamining. Who the individual “is”, where s/he is going, with whom s/he is associating or what s/he is doing all become the concern of the watchful eye’ (Bellaby 2012, p. 105). And Kevin Macnish: ‘Surveillance involves paying close and sustained attention to another person. It is distinct from casual yet focused people-watching, such as might occur at a pavement cafe, to the extent that it is sustained over time. Furthermore the design is not to pay attention to just anyone, but to pay attention to some entity (a person or group) in particular and for a particular reason. Nor does surveillance have to involve watching. It may also involve listening, as when a telephone conversation is bugged, or even smelling, as in the case of dogs trained to discover drugs, or hardware which is able to discover explosives at a distance’ (Macnish 2011). I will not defend my definition here, partly for considerations of space, and partly because I pursue that task in a different article (Thomsen 2019), but primarily because it is unlikely to be controversial in a way that affects the arguments of this article.

  2. Notable contributions to that literature include: (Austin 2003; Bellaby 2012; Doyle 2009; Hadjimatheou 2016; Macnish 2014, 2015, 2016, 2017; McCloskey 1980; Nissenbaum 1998; Parent 1983; Powers 1996; Rachels 1975a, b; Rubel 2007, 2011; Ryberg 2007; Scanlon 1975; Solove 2002, 2006, 2007; Tavani 2007; Tavani and Moor 2001; Thomson 1975; Von Hirsch 2000).

  3. Cf. Seth Lazar: ‘Defensive harm is proportionate when (and only when) the harm inflicted is an appropriate fit for the threat thereby averted’ (Lazar 2012, p. 5). Thomas Hurka: ‘Despite their differences, the various proportionality conditions—ad bellum and in bello, simple and comparative, objective and subjective—all say a war or act in war is wrong if the relevant harm it will cause is out of proportion to its relevant good’ (Hurka 2005, p. 38). Jeff McMahan: ‘[Jus ad bellum] proportionality holds that the resort to war is impermissible if the bad effects of the war would outweigh the good’ (McMahan 2009, p. 18).

  4. Cf. Andrew von Hirsch and Andrew Ashworth: ‘…the principle of proportionality [requires] the severity of the penalty to be proportionate to the seriousness of the criminal conduct of which the defendant has been convicted’ (Von Hirsch and Ashworth 2005, pp. 131–132). Ashworth: ‘Cardinal proportionality […] requires that the penalty should not be out of proportion to the gravity of the crime involved’ (Ashworth 2005, pp. 84–85). Anthony Duff: ‘Any normative theory of punishment includes some principle of proportionality, which requires that punishment must be “proportionate” to what justifies it’ (Duff 2001, p. 132). Von Hirsch: ‘The primary basis for deciding quanta of punishments, under [contemporary desert theory], is the principle of proportionality or “commensurate deserts”, requiring the severity of the penalty to be proportionate to the gravity of the defendant’s criminal conduct’ (von Hirsch 2009, p. 118).

  5. The so-called ‘problem of punishment’ (Boonin 2008).

  6. I deliberately avoid use of the phrasing that the crime deserves a certain severity of sanction in response. My broader formulation above is intended to capture the whole set of deontological theories that subscribe to a principle of proportionality, not merely the subset of retributivist theories that take the normative reasons at stake to be grounded in desert. For similar reasons I avoid the theoretically loaded term ‘punishment’ in favour of the more inclusive ‘sanction’.

  7. Just war theory often employs a similar restriction in the shape of ‘non-combatant immunity’ but accepts that there can be cases of permissibly harming non-combatants, subject to the condition of proportionality. This is uncontroversial when such harm is an unintended side effect of an action, but many theorists accept that in extreme conditions even intended harm to innocents may be permissible. Deontological criminal justice ethics could perhaps avail itself of the considerations employed in just war theory to explain the potential permissibility of harming bystanders to punishment, e.g. the offender’s family, who suffer through shaming and deprivation of access to a partner/parent/etc. In that context, prospective proportionality would presumably become pertinent. It is also possible, of course, to apply the just war theory framework including the self-defense justification to criminal justice ethics more broadly (see Tadros 2011).

  8. See (Ryberg 2004, 2019) for detailed analyses of the difficulties that follow from this need to translate between two different moral factors.

  9. By ‘goods’ and ‘bads’ I intend to encompass the morally valuable and morally disvaluable outcomes of the act, respectively. We might speak more familiarly of good and bad consequences, or costs and benefits, but I prefer to avoid these terms to decrease the risk of the reader mistakenly inferring that the teleological account of proportionality rests upon or entails consequentialism.

  10. Solove intends for this list to illustrate his point that there is no distinctive bad of losing privacy, but rather a cluster of problems that emerge in the context of privacy-losses. There are two ways of reading this claim. The first is that losing privacy is not intrinsically bad but can be instrumentally bad in a number of ways. I believe this is Solove’s intended reading, and it seems to me a very plausible claim. The second is the stronger claim that there is nothing that unites the various ways in which losing privacy can be instrumentally bad. This is too strong. The various ways in which losing privacy might be bad can be instrumentally bad for ultimately the same reason, e.g. because they lead to decreases of human wellbeing.

  11. Macnish argues that the harm of surveillance is generally tied to the degree to which it is intrusive. As a very general observation this sounds plausible, but if the concept of intrusion is to have the kind of explanatory power that would allow it to support an account of the badness of surveillance, then we need a more sophisticated and rigorous understanding of it than the common-sense conception. Unfortunately, despite exploring several examples and dimensions of intrusion, Macnish does not ultimately clarify what this sense of intrusion might be.

  12. Presumably, time, effort and material resources are only instrumentally valuable, so that the disvalue of investing them in carrying out surveillance is the opportunity cost of thereby declining to perform alternative valuable actions. Whether to count them here therefore depends on what role, if any, opportunity costs ought to play in proportionality. I develop these considerations below.

  13. Macnish’s concerns with social sorting, distribution of costs, and human errors or abuse of powers belong in this category, as do Solove’s with insecurity, disclosure, exposure, and blackmail.

  14. Macnish’s concerns with chilling effects, social fatalism, behavioural uniformity, fear of control and loss of trust belong in this category.

  15. This approach could be compatible with the account I have set out if one adopted a suitably unorthodox axiology. Such an axiology strikes me as wildly implausible, however. Hence the more charitable interpretation is the approach that takes these values as pertaining to proportionality specifically.

  16. On teleological accounts of desert-adjusted weights for wellbeing see (Feldman 1995a, b). One might also consider as starting points David Rodin’s account of 14 factors that affect proportionality in the context of just war, and Susanne Uniacke’s detailed discussion of the effect of liability to harm on proportionality (Rodin 2011, pp. 80–81; Uniacke 2011). For a critical overview of some of the challenges desert-adjusting wellbeing encounters, including centrally the problem that future decreases in wellbeing can ground desert-based reasons to do wrong, so as to decrease the moral disvalue of the future decreases, see (Ryberg 2011).

  17. There are familiar difficulties with the conceptual and moral differences between action and inaction, widely explored in the debate on the doctrine of doing and allowing (DDA). I shall attempt to set these more fundamental difficulties aside here, since making advances across the deeply dug trenches of that debate is clearly beyond the scope of this article, and it seems to me that my argument here does not ultimately hinge on what view one takes of the distinction. Some might further be inclined to accept the idea of a counterfactual baseline for proportionality along the lines above, but to impose a side-constraint based on the DDA as an additional condition of permissible surveillance. The DDA faces a long series of well-known objections, which seem to me very persuasive (see e.g. McMahan 1993; Norcross 2003; Rachels 1975a, b; although cf. Woollard 2015; Woollard 2016 provides an excellent overview). In light of my doubts about the DDA and the fact that such a condition is in any case a separate issue, I shall also leave the task of developing an account of permissible surveillance that includes a DDA-based condition to more sympathetic thinkers.

  18. Indeed, Macnish deserves credit both for introducing the idea of applying concepts developed in just war theory to the context of surveillance, and for, in doing so, substantially advancing the debate on the ethics of surveillance in terms of theoretical sophistication. Though his work provides a convenient foil on which I focus my criticism, I do not mean thereby to detract from that achievement.

  19. My argument here is structurally somewhat similar to, and to a large extent inspired by, the predictable regret objection against relativized pure-time discounting (Broome 2005, 2012, p. 151; Mintz-Woo 2019, p. 412).

  20. Note that the distinction at stake here is different from and unrelated to the doing-allowing distinction, and that the objections at stake are not at odds with the doing-allowing doctrine. This follows directly from the fact that my account means to include the possibility of φ’ing being an act that allows an already initiated form of surveillance to continue. But it is also worth noting that the idea at stake here is that certain goods brought about by an act of surveillance should not affect the proportionality of that act, whereas the doing-allowing doctrine holds (roughly) that the goods and bads resulting from an allowing grounds weaker reasons than the goods and bads resulting from a doing.

  21. Macnish makes a related point, that Hurka wants to avoid the situation where a small benefit to a sufficiently great number of people can justify imposing a great cost on a few (Macnish 2015, p. 234). However, holding some benefits to be peripheral will do little to avoid this situation, if, as appears to be the case, a benefit’s being peripheral depends on the nature of the benefit, since the situation emerges due to aggregation of benefits of different size. Furthermore, this is the familiar ‘one million headaches’-objection to consequentialism, and is subject to the standard responses to that objection (e.g. Norcross 1997).

  22. Does the fact that the voyeurism occurs in public invalidate Estranged? It seems to me strange to say, since it is widely held that we do have claims to privacy in public (cf. Ryberg 2007).

  23. I take it to be necessary but uncontroversial that the acts of surveillance become uncertain by being within the zone of vagueness. If we could assign probabilities to the act bringing about good equal to or greater than bad, then the presumption against bad does not apply, and a probabilistic variant of the presumption is implausibly strong, but then such probabilities are conventionally unassignable if there is irreducible vagueness.

  24. As is now widely recognised, the literature is best understood as containing a family of precautionary principles, rather than a precautionary principle. Apart from its moral interpretation, which seems to me most pertinent here, we should also distinguish between decision-making, epistemic and pragmatic variants, which differ from the version I set out above in that they take the principle to be a decision-rule, a belief-forming principle, or a rule-of-thumb respectively. See (Gardiner 2006; Hartzell-Nichols 2013; Sandin and Peterson 2019). It does not seem to me, however, that my arguments in the following hinge on which precautionary principle is at stake. As such, we can set the differences aside.

  25. Could we formulate a version of the sufficiency-relation that, unlike SG-proportionality, is a proper member of the family of precautionary principles? It seems we could. However, it would restrict proportionality constraints to the narrow set of cases that feature uncertain and strong bads. We presumably want proportionality to apply much more broadly. Friends of precaution are likely better off by assuming that it is a separate and supplementary constraint on permissible action.

  26. Very broadly, the challenge for precautionary principles is to formulate a version of the principle that is at once strong enough to be non-trivial, and weak enough to not have (very) implausible implications by condemning vast swathes of intuitively permissible human behaviour. See (Gardiner 2006; Harris and Holm 2002; Peterson 2006).

  27. Challenging Macnish’s argument for SG-proportionality does not, of course, constitute an independent argument against SG-proportionality. I do not intend to show that SG-proportionality is false. The claim I defend in this section is merely that Macnish has not given us good reasons to think that it is true.

  28. This is another juncture in the argument, at which the doing-allowing doctrine might be thought to be relevant. I think that it is not, whatever one thinks of the doctrine’s merits, for reasons parallel to those I mentioned in the context of restricting the goods above (see footnote 20).

  29. Assuming, plausibly I think, diminishing marginal goods from surveillance, and that at least some marginal bads are constant or even increasing.

  30. Unless, that is, one is a consequentialist, in which case the balance of telic reasons determine a uniquely permissible action set, in a way that is structurally similar to imposing an upper and lower boundary. But this is a rather different story, which includes opportunity costs (i.e. evaluates a wider set of potential actions), applies to permissibility tout court rather than just proportionality, and is in any case not what Macnish and deontologists more broadly might want.

  31. Notoriously, Immanuel Kant defended roughly this view, when he claimed that even the members of a society that had decided voluntarily to disband were under a stringent duty to first impose full punishment on convicted offenders (Kant 1996). Contemporary retributivists often explicitly distance themselves from Kant on this point.

  32. This point may be so blindingly obvious that the example strikes the reader as unrealistic—surely the police would pursue the superior course of action rather than waste time petitioning the court for permission to conduct more widespread but no more effective surveillance? In response I readily accept that this is the case. The example is meant only as illustration, and I do not mean to disparage the judgement of real-life police officers. However, in a philosophical literature full of creatively murderous doctors, teleportation devices, and bizarre trolley accidents, I think begging the reader’s indulgence in suspending disbelief on this point is reasonably modest.

  33. The astute reader may have noticed that Lazar’s conception is both subjectivist and probabilist. Translated to its factualist version, the conception would be: ‘Defensive harm H is necessary to avert unjustified threat T if an only if there is no less harmful alternative, such that the marginal morally weighted harm in H compared with that in the alternative is not justified by a countervailing marginal reduction in harm to the prospective victims of T’. As before, I attempt in the following to remain neutral between factualism and the alternatives.

  34. Is this an overly consequentialist reading of necessity? No. Necessity remains a different condition because it restricts its consideration to the bringing about of a particular type of good, rather than aggregative goods simpliciter. That is, it considers opportunity costs, but restricts the range of opportunity costs taken into consideration. Whether this is plausible is a different matter. Kieran Oberman argues, persuasively to my mind, that just war theorists have conventionally ruled out far too much, and that as a result waging war will often be impermissible simply because alternative uses of the resources would do far more good, e.g. by alleviating global poverty (Oberman 2019).

  35. As Macnish notes, Thomas Hurka makes a similar argument, albeit in the opposite direction (Macnish 2015, pp. 532–533). Hurka writes: ‘[The proportionality] condition must not be read literally, but must assess the alternatives to war in the same way as it does war: for the relevant good they may produce, their probability of producing it, and any costs that will result if the alternatives are tried and fail, such as making an eventual war more bloody. But then the last resort condition is in effect a comparative version of the initial, simple proportionality condition. For war and each of its alternatives it does a proportionality calculation, identifying the relevant goods and evils it will produce compared to a baseline of doing nothing, or continuing to act as one would have had there been no just cause. This yields the net good or bad effects of each, and it then says war is permitted only if its net outcome is better than those of all alternatives’ (Hurka 2005, pp. 37–38). McMahan too, although he considers them separate conditions, recognises that proportionality and necessity are connected: ‘[T]he requirements of minimal force and narrow proportionality do begin to blur together when considerations of probability and risk arise, as they usually do in conditions of war’ (McMahan 2009, p. 23).

  36. If this strikes the reader as unintuitive, then simply scale the harms involved, e.g. a bruised wrist, instead of a broken one. Lazar’s example does not hinge on the specific amounts of harm involved, but on the ordinal ranking between them.

  37. The doing-allowing distinction may also affect intuitions here. I assume that it should not since it is not a difference upon which Lazar’s argument rests. He would presumably want to treat as equal for the purposes of assessing proportionality scenarios in which we reverse the outcomes attached to the actions, so that e.g. lifting your foot leads to death and resting your foot to hospitalisation. As such, we should attempt to set aside any intuitions about the difference between doing and allowing.

References

  • Arneson, R.J. 2009. What do we owe to distant needy strangers? In Peter singer under fire: The moral iconoclast faces his critics, ed. J.A. Schaler, 267–293. Chicago and LaSalle: Open Court.

    Google Scholar 

  • Ashworth, A. 2005. Sentencing and criminal justice, 4th edn. Cambridge: Cambridge University Press.

    Google Scholar 

  • Austin, L.M. 2003. Privacy and the question of technology. Law and Philosophy 22(2): 119–166.

    Google Scholar 

  • Bellaby, R. 2012. What’s the harm? The ethics of intelligence collection. Intelligence and National Security 27(1): 93–117. https://doi.org/10.1080/02684527.2012.621600.

    Article  Google Scholar 

  • Boonin, D. 2008. The problem of punishment. New York: Cambridge University Press.

    Google Scholar 

  • Broome, J. 2005. Should we value population?*. Journal of Political Philosophy 13(4): 399–413. https://doi.org/10.1111/j.1467-9760.2005.00230.x.

    Article  Google Scholar 

  • Broome, J. 2012. Climate matters—Ethics in a warming world. New York: W. W. Norton & Co.

    Google Scholar 

  • Doyle, T. 2009. Privacy and perfect voyeurism. Ethics and Information Technology 11(3): 181–189. https://doi.org/10.1007/s10676-009-9195-9.

    Article  Google Scholar 

  • Duff, A. 2001. Punishment, communication, and community. Oxford: Oxford University Press.

    Google Scholar 

  • Duus-Otterström, G. 2013. Why retributivists should endorse leniency in punishment. Law and Philosophy 32(4): 459–483. https://doi.org/10.1007/s10982-012-9147-0.

    Article  Google Scholar 

  • Feldman, F. 1995a. Adjusting utility for justice: A consequentialist reply to the objection from justice. Philosophy and Phenomenological Research 55(3): 567–585.

    Google Scholar 

  • Feldman, F. 1995b. Desert: Reconsideration of some received wisdom. Mind 104(413): 63–77.

    Google Scholar 

  • Gardiner, S.M. 2006. A core precautionary principle. Journal of Political Philosophy 14(1): 33–60.

    Google Scholar 

  • Hadjimatheou, K. 2016. Surveillance technologies, wrongful criminalisation, and the presumption of innocence. Philosophy & Technology. https://doi.org/10.1007/s13347-016-0218-2.

    Article  Google Scholar 

  • Harris, J., and S. Holm. 2002. Extending human lifespan and the precautionary paradox. Journal of Medicine and Philosophy 27(3): 355–368.

    Google Scholar 

  • Hartzell-Nichols, L. 2013. From ‘the’ precautionary principle to precautionary principles. Ethics, Policy & Environment 16(3): 308–320. https://doi.org/10.1080/21550085.2013.844569.

    Article  Google Scholar 

  • Holtug, N. 2002. The harm principle. Ethical Theory and Moral Practice 5(4): 357–389. https://doi.org/10.1023/a:1021328520077.

    Article  Google Scholar 

  • Hurka, T. 2005. Proportionality in the morality of war. Philosophy & Public Affairs 33(1): 34–66. https://doi.org/10.1111/j.1088-4963.2005.00024.x.

    Article  Google Scholar 

  • Kant, I. 1996. The metaphysics of morals (M. Gregor, Trans.). Cambridge: Cambridge University Press.

  • Lazar, S. 2012. Necessity in self-defense and war. Philosophy & Public Affairs 40(1): 3–44.

    Google Scholar 

  • Lazar, S. 2017. War. In Stanford encyclopedia of philosophy, (Spring 2017 Edition), ed. E. N. Zalta. https://plato.stanford.edu/archives/spr2017/entries/war/

  • Macnish, K. 2011. Surveillance ethics. In The internet encyclopedia of philosophy. https://www.iep.utm.edu/surv-eth/

  • Macnish, K. 2014. Just surveillance? Towards a normative theory of surveillance. Surveillance & Society 12(1): 142–153.

    Google Scholar 

  • Macnish, K. 2015. An eye for an eye: Proportionality and surveillance. Ethical Theory and Moral Practice 18(3): 529–548.

    Google Scholar 

  • Macnish, K. 2016. Government surveillance and why defining privacy matters in a post-Snowden world. Journal of Applied Philosophy 35(2): 417–432.

    Google Scholar 

  • Macnish, K. 2017. The ethics of surveillance: An introduction. London: Routledge.

    Google Scholar 

  • McCloskey, H.J. 1980. Privacy and the right to privacy. Philosophy 55(211): 17–38.

    Google Scholar 

  • McMahan, J. 1993. Killing, letting die, and withdrawing aid. Ethics 103(2): 250–279.

    Google Scholar 

  • McMahan, J. 2009. Killing in war. Oxford: Oxford University Press.

    Google Scholar 

  • Mintz-Woo, K. 2019. Principled utility discounting under risk. Moral Philosophy and Politics 6(1): 89–112.

    Google Scholar 

  • Moore, M.S. 1997. Placing blame: A general theory of the criminal law. Oxford: Oxford University Press, Incorporated.

    Google Scholar 

  • Moore, G.E. 2000. Principia ethica. Cambridge: Cambridge University Press.

    Google Scholar 

  • Nissenbaum, H. 1998. Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy 17(5): 559–596. https://doi.org/10.1023/A:1006184504201.

    Article  Google Scholar 

  • Norcross, A. 1997. Comparing harms: Headaches and human lives. Philosophy & Public Affairs 26(2): 135–167. https://doi.org/10.1111/j.1088-4963.1997.tb00079.x.

    Article  Google Scholar 

  • Norcross, A. 2003. Killing and letting die. In A companion to applied ethics, ed. R.G. Frey and C.H. Wellman, 451–463. Oxford: Blackwell.

    Google Scholar 

  • Oberman, K. 2019. War and poverty. Philosophical Studies 176(1): 197–217.

    Google Scholar 

  • Parent, W.A. 1983. Privacy, morality, and the law. Philosophy & Public Affairs 12(4): 269–288.

    Google Scholar 

  • Peterson, M. 2006. The precautionary principle is incoherent. Risk Analysis 26(3): 595–601. https://doi.org/10.1111/j.1539-6924.2006.00781.x.

    Article  Google Scholar 

  • Powers, M. 1996. A cognitive access definition of privacy. Law and Philosophy 15(4): 369–386.

    Google Scholar 

  • Rachels, J. 1975a. Active and passive euthanasia. New England Journal of Medicine 292(2): 78–80. https://doi.org/10.1056/nejm197501092920206.

    Article  Google Scholar 

  • Rachels, J. 1975b. Why privacy is important. Philosophy & Public Affairs 4(4): 323–333.

    Google Scholar 

  • Rodin, D. 2011. Justifying harm. Ethics 122(1): 74–110.

    Google Scholar 

  • Rubel, A. 2007. Claims to privacy and the distributed value view. San Diego Law Review 44(4): 921–956.

    Google Scholar 

  • Rubel, A. 2011. The particularized judgment account of privacy. Res Publica 17(3): 275–290.

    Google Scholar 

  • Ryberg, J. 2004. The ethics of proportionate punishment: A critical investigation. Berlin: Springer.

    Google Scholar 

  • Ryberg, J. 2007. Privacy rights, crime prevention, CCTV, and the life of Mrs. Aremac. Res Publica 13(2): 127–143.

    Google Scholar 

  • Ryberg, J. 2011. Punishment and desert-adjusted utilitarianism. In Retributivism has a past—Has it a future?, ed. M. Tonry, 86–100. Oxford: Oxford University Press.

    Google Scholar 

  • Ryberg, J. 2019. Proportionality and the seriousness of crimes. In Of one-eyed and toothless miscreants: Making the punishment fit the crime, ed. M. Tonry. New York: Oxford University Press.

    Google Scholar 

  • Sandin, P., and M. Peterson. 2019. Is the precautionary principle a midlevel principle? Journal of Ethics, Policy and Environment 22(1): 34–48.

    Google Scholar 

  • Scanlon, T. 1975. Thomson on privacy. Philosophy & Public Affairs 4(4): 315–322. https://doi.org/10.2307/2265076.

    Article  Google Scholar 

  • Scanlon, T. 2008. Moral dimensions: Permissibility, meaning, and blame. Cambridge: Belknap Press.

    Google Scholar 

  • Søbirk Petersen, T. 2014. Being worse off: But in comparison with what? On the baseline problem of harm and the harm principle. Res Publica 20(2): 199–214.

    Google Scholar 

  • Solove, D.J. 2002. Conceptualizing privacy. California Law Review 90(4): 1088–1155.

    Google Scholar 

  • Solove, D.J. 2006. A taxonomy of privacy. University of Pennsylvania Law Review 154(3): 477–560.

    Google Scholar 

  • Solove, D.J. 2007. ‘I’ve got nothing to hide’ and other misunderstandings of privacy. San Diego Law Review 44: 745–772.

    Google Scholar 

  • Tadros, V. 2011. The ends of harm: The moral foundations of criminal law. Oxford: Oxford University Press.

    Google Scholar 

  • Tavani, H.T. 2007. Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy 38(1): 1–22.

    Google Scholar 

  • Tavani, H.T., and J.H. Moor. 2001. Privacy protection, control of information, and privacy-enhancing technologies. SIGCAS Computer Science 31(1): 6–11. https://doi.org/10.1145/572277.572278.

    Article  Google Scholar 

  • Thomsen, F.K. 2019. Sousveillance and surveillance: A critical analysis. Social Science Information. https://doi.org/10.1177/0539018419884410.

    Article  Google Scholar 

  • Thomson, J.J. 1975. The right to privacy. Philosophy & Public Affairs 4(4): 295–314. https://doi.org/10.2307/2265075.

    Article  Google Scholar 

  • Uniacke, S. 2011. Proportionality and self-defense. Law and Philosophy 30(3): 253–272.

    Google Scholar 

  • Von Hirsch, A. 2000. The ethics of public television surveillance. In Ethical and social perspectives on situational crime prevention, ed. A. Von Hirsch, D. Garland, and A. Wakefield, 59–76. Oxford: Hart.

    Google Scholar 

  • Von Hirsch, A. 2009. Proportionate sentences: A desert perspective. In Principled sentencing, 3rd edn, ed. A. Von Hirsch, A. Ashworth, and J.V. Roberts, 115–125. Oxford: Hart Publishing.

    Google Scholar 

  • Von Hirsch, A., and A. Ashworth. 2005. Proportionate sentencing. Oxford: Oxford University Press.

    Google Scholar 

  • Woollard, F. 2015. Doing and allowing harm. Oxford: Oxford University Press.

    Google Scholar 

  • Woollard, F., and F. Howard-Snyder. 2016. Doing vs. allowing harm. In Stanford encyclopedia of philosophy, (Winter 2016 Edition), ed. E.N. Zalta. https://plato.stanford.edu/archives/win2016/entries/doing-allowing/.

Download references

Acknowledgements

I have presented drafts of this paper at a 2018 Roskilde University Moral Philosophy seminar and a 2018 Aalborg University Centre for Philosophy and Public Policy seminar. I am grateful for valuable comments on these occasions to Andreas Albertsen, Jens Damgaard Thaysen, Sebastian Jon Holmen, Rune Klingenberg Hansen, Carl Knight, Kristian Kragh, Kasper Lippert-Rasmussen, Sune Lægaard, Ditte Marie Munch-Jurisic, Jesper Ryberg, Thomas Søbirk Petersen, Jakob Thrane Mainz, Nikolas Vrousalis, and Søren Sofus Wichman,. I also owe thanks for very thorough and helpful comments to two anonymous reviewers for the journal, as well as the assigned editor, Göran Duus-Otterström. Finally, this article was originally intended for a special issue on proportionality in surveillance. I owe thanks to Kira Vrist Rønn for organising that issue and inviting me to contribute.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Frej Klem Thomsen.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thomsen, F.K. The Teleological Account of Proportional Surveillance. Res Publica 26, 373–401 (2020). https://doi.org/10.1007/s11158-020-09451-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11158-020-09451-7

Keywords

Navigation