Advertisement

Ethics and Information Technology

, Volume 8, Issue 3, pp 109–119 | Cite as

Four challenges for a theory of informational privacy

  • Luciano Floridi
Article

Abstract

In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In the conclusion, I discuss some of the work that lies ahead.

Keywords

information ethics informational privacy ontology passive privacy personal identity public privacy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

Acknowledgements

This paper is a fully revised version of a presentation given at the international workshop “Bridging Cultures: Computer Ethics, Culture, and ICT”, organised by the Programme for Applied Ethics in association with the Globalisation programme at NTNU (the Norwegian University of Science and Technology, Trondheim, Norway, June 6th–7th 2005). For that opportunity and for the feedback received, I wish to thank Charles Ess and May Thorseth (co-organisers), Eric Monteiro, Knut Rolland, Johnny Søraker, Bernd Carsten Stahl, Deborah Wheeler and all the students who took part to the workshop, and, for the financial support, NTNU. Charles Ess shared with me some important insights while discussing the final draft, and I hope I managed to take full advantage of his suggestions. As usual, all remaining mistakes are unfortunately mine.

References

  1. 1.
    Ariáes P., Duby. G. (1987) A History of Private Life 5 vols. Belknap Press of Harvard University Press, Cambridge, Mass, LondonGoogle Scholar
  2. 2.
    I. Asimov. The Dead Past. In Astounding Science Fiction, 6–46, 1956. manca qualche informazione, no?Google Scholar
  3. 3.
    Bäck E., Wikblad K. (1998) Privacy in Hospital. Journal of Advanced Nursing 27(5):940–945CrossRefGoogle Scholar
  4. 4.
    S.I. Benn. Privacy, Freedom, and Respect for Persons. In Richard Wasserstrom, editor, Today’s Moral Problems. Macmillan, New York, 1975Google Scholar
  5. 5.
    Bloustein E. (1964) Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser. New York University Law Review 39:962–1007Google Scholar
  6. 6.
    Cohen J. (2000) Examined Lives: Informational Privacy and the Subject as Object. Stanford Law Review 52:1373–1437CrossRefGoogle Scholar
  7. 7.
    C. Ess, editor, Special Issue on Privacy and Data Privacy Protection in Asia (Ethics and Information Technology), 2005Google Scholar
  8. 8.
    L. Floridi On the Intrinsic Value of Information Objects and the Infosphere. In Ethics and Information Technology, 4(4): 287–304, 2003Google Scholar
  9. 9.
    L. Floridi Is Information Meaningful Data? In Philosophy and Phenomenological Research 70(2): 351–370, 2005Google Scholar
  10. 10.
    Floridi L. (2005) The Ontological Interpretation of Informational Privacy. Ethics and Information Technology 7(4):185–200CrossRefGoogle Scholar
  11. 11.
    L. Floridi, Information Ethics. In Jeroen van den Hoven and John Weckert, editors, Moral Philosophy and Information Technology, Cambridge University Press, Cambridge, forthcomingGoogle Scholar
  12. 12.
    L. Floridi. The Logic of Being Informed. Logique et Analyse, forthcomingGoogle Scholar
  13. 13.
    Floridi L., Sanders J.W. (2004) On the Morality of Artificial Agents. Minds and Machines 14(3):349–379CrossRefGoogle Scholar
  14. 14.
    Floridi L., Sanders. J.W. (2005) Internet Ethics: The Constructionist Values of Homo Poieticus. In Robert Cavalier (editor) The Impact of the Internet on Our Moral Lives. SUNY, New YorkGoogle Scholar
  15. 15.
    Fried C. (1970) An Anatomy of Values: Problems of Personal and Social Choice. Harvard University Press, Cambridge, MassGoogle Scholar
  16. 16.
    Gibson J.J. (1979) The Ecological Approach to Visual Perception. Houghton Mifflin, Boston, LondonGoogle Scholar
  17. 17.
    Hongladarom S. (2006) Analysis and Justification of Privacy from a Buddhist Perspective. In Hongladarom S., Ess C. (editors) Information Technology Ethics: Cultural Perspectives. Idea Publishing, Hershey, PennsylvaniaGoogle Scholar
  18. 18.
    Inness J.C. (1996) Privacy, Intimacy, and Isolation. Oxford University Press, New YorkGoogle Scholar
  19. 19.
    Introna L.D. (1997) Privacy and the Computer: Why We Need Privacy in the Information Society. Metaphilosophy 28(3):259–275CrossRefGoogle Scholar
  20. 20.
    Johnson D.G. (1985) Computer Ethics. Prentice-Hall, Englewood CliffsGoogle Scholar
  21. 21.
    Johnson D.G. (2001) Computer Ethics, 3rd ed. Prentice-Hall, Upper Saddle River, NJGoogle Scholar
  22. 22.
    Johnson J.L. (1992) A Theory of the Nature of Value of Privacy. Public Affairs Quarterly 6(3):271–288Google Scholar
  23. 23.
    Kitiyadisai K. (2005) Privacy Rights and Protection: Foreign Values in Modern Thai Context. Ethics and Information Technology 7(1):17–26CrossRefGoogle Scholar
  24. 24.
    Margulis S.T. (2003) Privacy as a Social Issue and Behavioral Concept. Journal of Social Issues. 59(2):243–261CrossRefGoogle Scholar
  25. 25.
    Moor J.H. (1997) Towards a Theory of Privacy in the Information Age. ACM SIGCAS Computers and Society. 27:27–32CrossRefGoogle Scholar
  26. 26.
    Nakada M., Tamura T. (2005) Japanese Conceptions of Privacy: An Intercultural Perspective. Ethics and Information Technology 7(1):27–36CrossRefGoogle Scholar
  27. 27.
    Nissenbaum H. (1998) Protecting Privacy in an Information Age: The Problem of Privacy in Public. Law and Philosophy 17(5–6):559–596CrossRefGoogle Scholar
  28. 28.
    Rachels J. (1975) Why Privacy Is Important. Philosophy and Public Affairs 4:323–333Google Scholar
  29. 29.
    Reiman J.H. (1976) Privacy, Intimacy, and Personhood. Philosophy and Public Affairs 6(1):26–44Google Scholar
  30. 30.
    Scanlon T. (1975) Thomson on Privacy. Philosophy and Public Affairs 4:315–322Google Scholar
  31. 31.
    Schachter M. (2003) Informational and Decisional Privacy. Carolina Academic Press, Durham, N.CGoogle Scholar
  32. 32.
    Seltzer W., Anderson M. (2001) The Dark Side of Numbers: The Role of Population Data Systems in Human Rights Abuses. Social Research 68(2):339–371Google Scholar
  33. 33.
    Solove D.J. (2002) Conceptualizing Privacy. California Law Review 90:1087–1155Google Scholar
  34. 34.
    Thompson J. (1996) Models of Value: Eighteenth-Century Political Economy and the Novel. Duke University Press, Durham, N.C. LondonGoogle Scholar
  35. 35.
    Thomson J. (1975) The Right to Privacy. Philosophy and Public Affairs 4:295–314Google Scholar
  36. 36.
    M. Turilli. Ethical Protocols Design, Ethics and Information Technology, forthcomingGoogle Scholar
  37. 37.
    Volkman R. (2003) Privacy as Life, Liberty, Property. Ethics and Information Technology 5(4):199–210CrossRefGoogle Scholar
  38. 38.
    S. Warren and L.D. Brandeis. The Right to Privacy. Harvard Law Review, 193(4), 1890Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2006

Authors and Affiliations

  1. 1.Dipartimento di Scienze FilosoficheUniversità degli Studi di BariBariItaly
  2. 2.Faculty of PhilosophyUniversity of OxfordOxfordUK
  3. 3.Information Ethics Group, OUCLUniversity of OxfordOxfordUK

Personalised recommendations