Advertisement

Ethics and Information Technology

, Volume 18, Issue 3, pp 175–184 | Cite as

‘I keep a close watch on this child of mine’: a moral critique of other-tracking apps

  • Katleen Gabriels
Original Paper

Abstract

Smartphones and mobile applications are omnipresent in our lives. At the core of this article are ‘other-tracking apps’, i.e. mobile applications that make it possible, via location technology, to track others. These apps ensure that we are never unconnected from the network of ubiquitous information and, via that network, from others. In specific, focus lies on apps designed for parents to remotely track the whereabouts of their child(ren). This particular case can be considered as one example of broader reflection on what continuous technical connectivity means in moral terms. Other-tracking apps give new ground to moral queries related to information technologies. Even though there is little doubt that parents might implement these technologies with good intention to extend care and responsibility over a distance, our concern is that they mistake control for care. This article seeks to demonstrate that a critical stance towards other-tracking by parents is required, because these apps raise a number of concerns that should be recognized as they are implemented. A number of moral critiques are expressed and discussed. These apps have the potential to engender a situation of ‘over-proximity’. A framework is hence required that emphasizes maintaining the critical distance to respect the other’s heterogeneity, autonomy, and privacy.

Keywords

Mobile applications Other-tracking apps Quantified otherness Parent–child relation Moral concerns Care Control 

Notes

Acknowledgments

This research article is funded by the Flemish Research Foundation (FWO); the research project is entitled ‘Technical vs. Moral Proximity: The ‘Hidden Morality’ of ‘Continuous Connectivity’. The author is grateful to two anonymous reviewers for their valuable comments and suggestions.

References

  1. Barron, C. M. (2014). ‘I had no credit to ring you back’: Children’s strategies of negotiation and resistance to parental surveillance via mobile phones. Surveillance & Society, 12(3), 401–413.Google Scholar
  2. Baudrillard, J. (2000). The vital illusion (The Wellek library lectures). New York: Columbia University Press.Google Scholar
  3. Bentham, J. (1995). The panopticon writings. London: Verso.Google Scholar
  4. Bernstein, G., & Triger, Z. (2010). Over-parenting. University of California Davis Law Review, 44, 1221–1279.Google Scholar
  5. Boyd, D. (2014). It’s complicated. The social lives of networked teens. New Haven, CT: Yale University Press.Google Scholar
  6. Carlo, G., Fabes, R. A., Laible, D., & Kupanoff, K. (1999). Early adolescence and prosocial/moral behavior II: The role of social and contextual influences. Journal of Early Adolescence, 19(2), 133–147.CrossRefGoogle Scholar
  7. Clark, L. S. (2013/2014). The parent app: Understanding families in the digital age. Oxford: Oxford University Press.Google Scholar
  8. Crawford, K., Lingel, J., & Karppi, T. (2015). Our metrics, our selves: A hundred years of self-tracking from the weight scale to the wrist wearable device. European Journal of Cultural Studies, 18(4), 479–496.CrossRefGoogle Scholar
  9. Duhigg, C. (2012). How companies learn your secrets, February 16. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?_r=2&hp=&pagewanted=all. Accessed 14 Mar 2016.
  10. Duysburgh, P., Jansen, A., Decancq, J., Derboven, J., & Jacobs, A. (2015). “Who will help me out of bed today?” Creating a design space for IoT-assisted micromanagement in home care. Pervasive Health Conference, 2015, 1–8.Google Scholar
  11. Fabes, R. A., Carlo, G., Kupanoff, K., & Liable, D. (1999). Early adolescence and prosocial/moral behavior I: The role of individual processes. Journal of Early Adolescence, 19(1), 5–16.CrossRefGoogle Scholar
  12. Fahlquist, J. N. (2013). Responsibility and privacy—Ethical aspects of using GPS to track children. Children & Society 29(1), 38–47. http://onlinelibrary.wiley.com/doi/10.1111/chso.12016/full.
  13. Fleming, M. (2005). Adolescent autonomy: Desire, achievement and disobeying parents between early and late adolescence. Australian Journal of Education and Developmental Psychology, 5, 1–16.MathSciNetGoogle Scholar
  14. Floridi, L. (2014). The 4th revolution. How the infosphere is reshaping human reality. Oxford: Oxford University Press.Google Scholar
  15. Foucault, M. (1975). Surveiller et punir: Naissance de la prison. Paris: Gallimard.Google Scholar
  16. Furedi, F. (2002). The culture of fear. London: Continuum.Google Scholar
  17. Gardner, D. (2008/2009). Risk. The science and politics of fear. London: Virgin Books.Google Scholar
  18. Gregg, M. (2013). Spousebusting: Intimacy, adultery, and surveillance technology. Surveillance & Society, 11(3), 301–310.Google Scholar
  19. Introna, L. (2001). Virtuality and morality: On (not) being disturbed by the other. Philosophy in the Contemporary World, 8(1), 11–19.CrossRefGoogle Scholar
  20. Jewkes, Y., & Wykes, M. (2012). Reconstructing the sexual abuse of children: ‘cyber-paeds’, panic and power. Sexualities, 15(8), 934–952.CrossRefGoogle Scholar
  21. Jonas, H. (1979/1984). The imperative of responsibility. In search of an ethics for the technological age. Chicago: The University of Chicago Press.Google Scholar
  22. Lanzing, M. (2016). The transparent self. Ethics and Information Technology. doi: 10.1007/s10676-016-9396-y.Google Scholar
  23. Levinas, E. (1961/1971). Totalité et infiniEssay sur l’extériorité. Kluwer Academic.Google Scholar
  24. Lévy, P. (1998). Qu’est-ce que le virtuel? Paris: La découverte.Google Scholar
  25. Life360. (2015). Life360: Welcome to your new family circle. https://www.life360.com. Accessed 14 Sept 2015.
  26. Locke, J., Campbell, M. A., & Kavanagh, D. J. (2012). Can a parent do too much for their child? An examination by parenting professionals of the concept of overparenting. Australian Journal of Guidance and Counseling, 22(2), 249–265.CrossRefGoogle Scholar
  27. Madison, R. (2014). Life360 app aims to become leader in family network. Utah Business, May 21. http://www.utahbusiness.com/articles/view/life360_app_aims_to_become_leader_in_family_networ. Accessed 14 Sept 2015.
  28. Malone, K. (2007). The bubble-wrap generation: Children growing up in walled gardens. Environmental Education Research, 13(4), 513–527. doi: 10.1080/13504620701581612.CrossRefGoogle Scholar
  29. Mandel, E. (2014). How the Napa earthquake affected Bay Area sleepers. The Jawbone blog, August 25. https://jawbone.com/blog/napa-earthquake-effect-on-sleep/. Accessed 14 Sept 2015.
  30. Mann, S., Nolan, J., & Wellman, B. (2003). Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society, 1(3), 331–355.Google Scholar
  31. Miedema, F., & Post, B. (2006). Evaluatie pilot elektronische volgsystemen: 4. Samenvatting en conclusies (final report). Nijmegen: WODC. www.wodc.nl/images/1255-samenvatting_tcm44-59339.pdf.
  32. Mimo. (2015). Mimo: The world’s smartest baby monitor. http://mimobaby.com/. Accessed 14 Sept 2015.
  33. Morozov, E. (2013/2014). To save everything, click here: Technology, solutionism, and the urge to fix problems that don’t exist. London: Penguin.Google Scholar
  34. Nelson, M. K. (2010). Parenting out of control: Anxious parents in uncertain times. New York: NYU Press.Google Scholar
  35. Palen, L., & Hughes, A. (2007). When home base is not a place: Parents’ use of mobile telephones. Personal and Ubiquitous Computing, 11, 339–348.CrossRefGoogle Scholar
  36. Pasquale, F. (2015). The algorithmic self. The Hedgehog review: Critical reflections on contemporary culture (Vol. 17, No. 1). http://www.iasc-culture.org/THR/THR_article_2015_Spring_Pasquale.php.
  37. Pinker, S. (2011). The better angels of our nature: Why violence has declined. New York: Viking Penguin.Google Scholar
  38. RookieDongle. (2016). RookieDongle: Protecting young drivers. https://www.rookiedongle.com/. Accessed 14 Mar 2016.
  39. Rose, D. (2014). Enchanted objects: Design, human desire, and the Internet of Things. New York: Scribner.Google Scholar
  40. SafeT. (2014). SafeT children tracker. http://www.safet.me. Accessed 14 Sept 2015.
  41. Schiffrin, H. H., Liss, M., Miles-McLean, H., Geary, K. A., Erchull, M. J., & Tashner, T. (2014). Helping or hovering? The effects of helicopter parenting on college students’ well-being. Journal of Child and Family Studies, 23, 548–557.CrossRefGoogle Scholar
  42. Schneier, B. (2015). Data and Goliath. The hidden battles to collect your data and control your world. London: W. W. Norton & Company.Google Scholar
  43. Scoble, R., & Israel, S. (2014). Age of context: Mobile, sensors, data and the future of privacy. US: Patrick Brewster Press.Google Scholar
  44. Shellenbarger, S. (2005). Tucking the kids in—In the dorm: Colleges ward off overinvolved parents. The Wall Street Journal, July 28. http://www.wsj.com/articles/SB112250452603298007. Accessed 21 Mar 2016.
  45. Shields, R. (2003). The virtual. London: Routledge.zbMATHGoogle Scholar
  46. Silverstone, R. (2002). Proper distance: Towards an ethics for cyberspace. In G. Liestøl, A. Morrison, & T. Rasmussen (Eds.), Innovations. Cambridge, MA: MIT press.Google Scholar
  47. Silverstone, R. (2007). Media and morality: On the rise of the Mediapolis. Cambridge: Polity Press.Google Scholar
  48. Simpson, B. (2014). Tracking children, constructing fear: GPS and the manufacture of family safety. Information & Communications Technology Law, 23(3), 273–285. doi: 10.1080/13600834.2014.970377.CrossRefGoogle Scholar
  49. Stattin, H., & Kerr, M. (2000). Parental monitoring: A reinterpretation. Child Development, 71(4), 1072–1085.CrossRefGoogle Scholar
  50. Steinberg, L., & Silverberg, S. B. (1986). The vicissitudes of autonomy in early adolescence. Child Development, 57, 841–851.CrossRefGoogle Scholar
  51. Striphas, T. (2015). Algorithmic culture. European Journal of Cultural Studies, 18(4–5), 395–412.CrossRefGoogle Scholar
  52. Swan, M. (2013). The quantified self: Fundamental disruption in big data science and biological discovery. Big Data, 1(2), 85–99.CrossRefGoogle Scholar
  53. Thumala, A., Goold, B., & Loader, I. (2015). Tracking devices: On the reception of a novel security good. Criminology & Criminal Justice, 15(1), 3–22.CrossRefGoogle Scholar
  54. Tomas, D. (1991/1992). Old rituals for new space: Rites de passage and Wiliam Gibson’s cultural model of cyberspace. In M. Benedikt (Ed.), Cyberspace: First steps (pp. 31–48). Cambridge, MA: MIT Press.Google Scholar
  55. TopSpy (2014). FAQs—1TopSpy cell phone spy app. http://www.1topspy.com/faq.html. Accessed 14 Sept 2015.
  56. United Nations Human Rights Office of the High Commissioner. (1989). Convention on the rights of the child, November 20. http://www.ohchr.org/en/professionalinterest/pages/crc.aspx. Accessed 14 Mar 2016.
  57. van den Hoven, J., & Weckert, J. (Eds.). (2008). Information technology and moral philosophy. Cambridge: Cambridge University Press.Google Scholar
  58. Verbeek, P. P. (2011). Moralizing technology: Understanding and designing the morality of things. Chicago: University of Chicago press.CrossRefGoogle Scholar
  59. Zimmer-Gembeck, M. J., & Collins, W. A. (2003). Autonomy development during adolescence. In G. R. Adams & M. Berzonsky (Eds.), Blackwell handbook of adolescence (pp. 175–204). Oxford: Blackwell Publishers.Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2016

Authors and Affiliations

  1. 1.Department of Philosophy and Moral SciencesVrije Universiteit BrusselBrusselsBelgium

Personalised recommendations