Abstract
Data transactions in complex information networks have their own philosophical and mathematical logics. This chapter introduces the reader to key philosophical debates about the nature and effect of information technologies, and seeks to apply these to the philosophy of information. Drawing on personalist philosophy, the chapter redirects attention to questions of moral agency as they relate to security and intelligence work, and questions whether overreliance on data may fail to account for important aspects of human experience and action.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adams, F. (2004). Knowledge. In Floridi, L. (ed.) The Blackwell Guide to the Philosophy of Computing and Information. Oxford: Blackwell. 228–236.
Alder, G. S. (1998). Ethical issues in electronic performance monitoring: A consideration of deontological and teleological perspectives. Journal of Business Ethics, 17, 729–743.
Cohen, J. (2000). Examined lives: Informational privacy and the subject as object. Stanford Law Review, 53(3), 1373–1438.
de La Mettrie, J. O. (1996). Machine man and other writings. Cambridge: Cambridge University Press.
Deleuze, G. (1992). Postscript on the societies of control. October, 59, 3–7.
Dretske, F. I. (1981). Knowledge and the flow of information. Cambridge, MA: MIT Press.
Ess, C. (2009). Floridi’s philosophy of information and information ethics: Current perspectives, future directions. Information Society, 25(3), 159–168.
Floridi, L. (2004). Information. In L. Floridi (Ed.), The Blackwell guide to the philosophy of computing and information. Oxford: Blackwell.
Floridi, L. (2005). Consciousness, agents and the knowledge game. Minds and Machines, 15(3), 415–444.
Friedman, B., & Nissenbaum, H. (1996). Bias in computer systems. ACM Transactions on Information Systems, 14(3), 330–347.
Heidegger, M. (1978). Basic writings: Revised and expanded edition. London: Routledge.
Knobel, C., & Bowker, G. C. (2011). Computing ethics values in design. Communications of the ACM, 54(7), 26–28.
Loch, K. D., & Conger, S. (1996). Evaluating ethical decision making and computer use. Communications of the ACM, 39, 74–83.
Lundie, D. (2015). The givenness of the human learning experience and its incompatibility with information analytics. Educational Philosophy and Theory. doi:10.1080/00131857.2015.1052357.
Lundie, D. (2016). Authority, autonomy and automation: The irreducibility of pedagogy to information transactions. In Studies in philosophy and education. New York: Springer.
Plato (n.d.). Phaedrus. In The works of Plato (trans: Jowett, B.). New York: Tudor Publishing Co.
Reich, R. (1992). The work of nations: Preparing ourselves for 21st century capitalism. New York: Vintage.
Riphagen, D. (2008). The online panopticon: Privacy risks for users of social network sites. Retrieved November 27, 2015, from http://www.tbm.tudelft.nl/fileadmin/Faculteit/TBM/Over_de_Faculteit/Afdelingen/Afdeling_Infrastructure_Systems_and_Services/Sectie_Informatie_en_Communicatie_Technologie/medewerkers/jan_van_den_berg/news/doc/DavidRiphagen_GraduationThesis_Web.pdf
Schrader, D. & Lundie, D. (2012). The value of privacy and private information sharing in online communications. Association of Moral Education Annual Conference, San Antonio, TX, November 2012.
Shannon, C. E., & Weaver, W. (1949). The mathematical theory of communication. Urbana, IL: University of Illinois Press.
Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477–559.
Spencer, G. (1996). Microcybernetics as the meta-technology of pure control. In Z. Sardar & J. R. Ravetz (Eds.), Cyberfutures: Culture and politics on the information superhighway (pp. 61–76). London: Pluto Press.
Tse, J., Schrader, D., Ghosh, D., Liao, T., & Lundie, D. (2015). A bibliometric analysis of privacy and ethics in IEEE Security and Privacy. Ethics and Information Technology, 17(2), 153–163.
Turing, A. (1949). Intelligent machinery, s.l., s.n.
Van den Hoven, M. J. (1997). Privacy and the varieties of moral wrong-doing in the information age. Computers and Society, 27(2), 33–37.
Weinberger, D. (2012). Too big to know: Rethinking knowledge now that the facts aren’t the facts, experts are everywhere, and the smartest person in the room is the room. New York: Basic Books.
Wheeler, J. (1990). Information, physics, quantum: The search for links. In W. Zureck (Ed.), Complexity, entropy and the physics of information. Redwood City, CA: Addison Wesley.
Wicker, S. B., & Schrader, D. E. (2010). Privacy aware design principles for information networks. Proceedings of the IEEE, 99(2), 330–350.
Wittgenstein, L. (1953). Philosophical investigations. Oxford: Blackwell.
Zahavi, D. (2005). Subjectivity and selfhood: Investigating the first-person perspective. Cambridge, MA: MIT Press.
Zahavi, D., & Parnas, J. (1998). Phenomenal consciousness and self-awareness: A phenomenological critique of representational theory. Journal of Consciousness Studies, 5(5), 687–705.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2016 The Editor(s) (if applicable) and The Author(s)
About this chapter
Cite this chapter
Lundie, D. (2016). Security Networks and Human Autonomy: A Philosophical Investigation. In: Bunnik, A., Cawley, A., Mulqueen, M., Zwitter, A. (eds) Big Data Challenges. Palgrave, London. https://doi.org/10.1057/978-1-349-94885-7_4
Download citation
DOI: https://doi.org/10.1057/978-1-349-94885-7_4
Published:
Publisher Name: Palgrave, London
Print ISBN: 978-1-349-94884-0
Online ISBN: 978-1-349-94885-7
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)