Skip to main content

Security Networks and Human Autonomy: A Philosophical Investigation

  • Chapter
  • First Online:
Big Data Challenges
  • 1414 Accesses

Abstract

Data transactions in complex information networks have their own philosophical and mathematical logics. This chapter introduces the reader to key philosophical debates about the nature and effect of information technologies, and seeks to apply these to the philosophy of information. Drawing on personalist philosophy, the chapter redirects attention to questions of moral agency as they relate to security and intelligence work, and questions whether overreliance on data may fail to account for important aspects of human experience and action.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Adams, F. (2004). Knowledge. In Floridi, L. (ed.) The Blackwell Guide to the Philosophy of Computing and Information. Oxford: Blackwell. 228–236.

    Google Scholar 

  • Alder, G. S. (1998). Ethical issues in electronic performance monitoring: A consideration of deontological and teleological perspectives. Journal of Business Ethics, 17, 729–743.

    Article  Google Scholar 

  • Cohen, J. (2000). Examined lives: Informational privacy and the subject as object. Stanford Law Review, 53(3), 1373–1438.

    Article  Google Scholar 

  • de La Mettrie, J. O. (1996). Machine man and other writings. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Deleuze, G. (1992). Postscript on the societies of control. October, 59, 3–7.

    Google Scholar 

  • Dretske, F. I. (1981). Knowledge and the flow of information. Cambridge, MA: MIT Press.

    Google Scholar 

  • Ess, C. (2009). Floridi’s philosophy of information and information ethics: Current perspectives, future directions. Information Society, 25(3), 159–168.

    Article  Google Scholar 

  • Floridi, L. (2004). Information. In L. Floridi (Ed.), The Blackwell guide to the philosophy of computing and information. Oxford: Blackwell.

    Chapter  Google Scholar 

  • Floridi, L. (2005). Consciousness, agents and the knowledge game. Minds and Machines, 15(3), 415–444.

    Article  Google Scholar 

  • Friedman, B., & Nissenbaum, H. (1996). Bias in computer systems. ACM Transactions on Information Systems, 14(3), 330–347.

    Article  Google Scholar 

  • Heidegger, M. (1978). Basic writings: Revised and expanded edition. London: Routledge.

    Google Scholar 

  • Knobel, C., & Bowker, G. C. (2011). Computing ethics values in design. Communications of the ACM, 54(7), 26–28.

    Article  Google Scholar 

  • Loch, K. D., & Conger, S. (1996). Evaluating ethical decision making and computer use. Communications of the ACM, 39, 74–83.

    Google Scholar 

  • Lundie, D. (2015). The givenness of the human learning experience and its incompatibility with information analytics. Educational Philosophy and Theory. doi:10.1080/00131857.2015.1052357.

    Google Scholar 

  • Lundie, D. (2016). Authority, autonomy and automation: The irreducibility of pedagogy to information transactions. In Studies in philosophy and education. New York: Springer.

    Google Scholar 

  • Plato (n.d.). Phaedrus. In The works of Plato (trans: Jowett, B.). New York: Tudor Publishing Co.

    Google Scholar 

  • Reich, R. (1992). The work of nations: Preparing ourselves for 21st century capitalism. New York: Vintage.

    Google Scholar 

  • Riphagen, D. (2008). The online panopticon: Privacy risks for users of social network sites. Retrieved November 27, 2015, from http://www.tbm.tudelft.nl/fileadmin/Faculteit/TBM/Over_de_Faculteit/Afdelingen/Afdeling_Infrastructure_Systems_and_Services/Sectie_Informatie_en_Communicatie_Technologie/medewerkers/jan_van_den_berg/news/doc/DavidRiphagen_GraduationThesis_Web.pdf

  • Schrader, D. & Lundie, D. (2012). The value of privacy and private information sharing in online communications. Association of Moral Education Annual Conference, San Antonio, TX, November 2012.

    Google Scholar 

  • Shannon, C. E., & Weaver, W. (1949). The mathematical theory of communication. Urbana, IL: University of Illinois Press.

    Google Scholar 

  • Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477–559.

    Article  Google Scholar 

  • Spencer, G. (1996). Microcybernetics as the meta-technology of pure control. In Z. Sardar & J. R. Ravetz (Eds.), Cyberfutures: Culture and politics on the information superhighway (pp. 61–76). London: Pluto Press.

    Google Scholar 

  • Tse, J., Schrader, D., Ghosh, D., Liao, T., & Lundie, D. (2015). A bibliometric analysis of privacy and ethics in IEEE Security and Privacy. Ethics and Information Technology, 17(2), 153–163.

    Article  Google Scholar 

  • Turing, A. (1949). Intelligent machinery, s.l., s.n.

    Google Scholar 

  • Van den Hoven, M. J. (1997). Privacy and the varieties of moral wrong-doing in the information age. Computers and Society, 27(2), 33–37.

    Article  Google Scholar 

  • Weinberger, D. (2012). Too big to know: Rethinking knowledge now that the facts aren’t the facts, experts are everywhere, and the smartest person in the room is the room. New York: Basic Books.

    Google Scholar 

  • Wheeler, J. (1990). Information, physics, quantum: The search for links. In W. Zureck (Ed.), Complexity, entropy and the physics of information. Redwood City, CA: Addison Wesley.

    Google Scholar 

  • Wicker, S. B., & Schrader, D. E. (2010). Privacy aware design principles for information networks. Proceedings of the IEEE, 99(2), 330–350.

    Article  Google Scholar 

  • Wittgenstein, L. (1953). Philosophical investigations. Oxford: Blackwell.

    Google Scholar 

  • Zahavi, D. (2005). Subjectivity and selfhood: Investigating the first-person perspective. Cambridge, MA: MIT Press.

    Google Scholar 

  • Zahavi, D., & Parnas, J. (1998). Phenomenal consciousness and self-awareness: A phenomenological critique of representational theory. Journal of Consciousness Studies, 5(5), 687–705.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Copyright information

© 2016 The Editor(s) (if applicable) and The Author(s)

About this chapter

Cite this chapter

Lundie, D. (2016). Security Networks and Human Autonomy: A Philosophical Investigation. In: Bunnik, A., Cawley, A., Mulqueen, M., Zwitter, A. (eds) Big Data Challenges. Palgrave, London. https://doi.org/10.1057/978-1-349-94885-7_4

Download citation

Publish with us

Policies and ethics