Abstract
The “struggle between liberties and authorities”, as described by Mill, refers to the tension between individual rights and the rules restricting them that are imposed by public authorities exerting their power over civil society. In this paper I argue that contemporary information societies are experiencing a new form of such a struggle, which now involves liberties and authorities in the cyber-sphere and, more specifically, refers to the tension between cyber-security measures and individual liberties. Ethicists, political philosophers and political scientists have long debated how to strike an ethically sound balance between security measures and individual rights. I argue that such a balance can only be reached once individual rights are clearly defined, and that such a definition cannot prescind from an analysis of individual well-being in the information age. Hence, I propose an analysis of individual well-being which rests on the capability approach, and I then identify a set of rights that individuals should claim for themselves. Finally, I consider a criterion for balancing the proposed set of individual rights with cyber-security measures in the information age.
Similar content being viewed by others
Notes
The involvement of public authorities in the management and regulation of the cyber-sphere does not come as a novelty when one considers that the design and development of the internet has been since the very beginning a part of governmental research to ensure national and international security; see for example the famous Pentagon Arpanet project (Abbate 2000). At the same time, it is worth recalling that security requirements and the support of military activities are often the goals motivating the design and development of plenty of technologies that have then become commonly used. Computers offer quite an evident example: they went from being a technology used to support military efforts during the Second World War to being a tool people use in their everyday lives (Copeland 2006; Freed and Ishida 1995); the same goes for robotics and AI, Predator (http://en.wikipedia.org/wiki/General_Atomics_MQ-1_Predator) and Taranis offering two interesting examples (http://en.wikipedia.org/wiki/BAE_Systems_Taranis).
A more in details analysis of the work developed under the ‘Onlife Initiative’ has been provided here (Floridi 2014c).
The concept of narrative has been extensively used in the literature focusing on personal identity (Maan 1999; MacIntyre 2007; MacIntyre 1989; Schechtman 2007; Taylor 1989). However, it is worth remarking that the analysis proposed in this paper does not rest on the narrative approach insofar as it is not concerned with the process of constructing personal identities. The reader interested in such a topic may find useful (Ess 2012).
References
Abbate, J. (2000). Inventing the internet. Cambridge, Mass: MIT Press.
Agre, P. (1997). Technology and privacy the new landscape. http://site.ebrary.com/id/10015368. Retrieved 19 May 2013.
Arquilla, J. (1998). Can information warfare ever be just? Ethics and Information Technology, 1(3), 203–212.
Australian Psychological Society. (2010). The social and psychological impact of online social networking, APS national psychology week survey. http://www.psychology.org.au/publications/inpsych/2010/december/social/.
Cerf, V. G. (2011). First, do no harm. Philosophy and Technology, 24(4), 463–465.
Chestnut, H. (1967). Systems engineering methods. New York: Wiley.
Coole, D., Frost, S., Bennett, J., Cheah, P., Orlie, M. A., & Grosz, E. (2010). New materialisms: Ontology, agency, and politics. Durham, NC: Duke University Press.
Copeland, B. J. (2006). Colossus: The secrets of Bletchley Park’s code-breaking computers. Oxford: Oxford University Press.
Denning, D. E. (1999). Information warfare and security. Reading: Addison-Wesley.
Dipert, R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9(4), 384–410.
Ess, C. (2012). At the intersections between internet studies and philosophy: “Who Am I Online?”. Philosophy & Technology, 25(3), 275–284.
Floridi, L. (2007). A look into the future impact of ICT on our lives. The Information Society, 23(1), 59–64. doi:10.1080/01972240601059094.
Floridi, L. (2008). The method of levels of abstraction. Minds and Machines, 18(3), 303–329. doi:10.1007/s11023-008-9113-7.
Floridi, L. (2013). Ethics of information. Oxford: Oxford University Press.
Floridi, L. (2014a). Protection of information and the right to privacy—A new equilibrium? Dordrecht: Springer. http://www.springer.com/law/international/book/978-3-319-05719-4.
Floridi, L. (2014b). The fourth revolution: How the infosphere is reshaping human reality. Oxford: Oxford University Press.
Floridi, L. (2014c). The onlife manifesto: Being human in a Hyperconnected Era. Dordrecht: Springer. http://www.springer.com/philosophy/epistemology+and+philosophy+of+science/book/978-3-319-04092-9.
Floridi, L., & Taddeo, M. (Eds.). (2014). The ethics of information warfare. New York: Springer.
Freed, L., & Ishida, S. (1995). History of computers. Hightstown, NJ: Ziff-Davis.
Goold, B. J. (2007). Security and human rights. Oxford: Hart.
Griffin, J. (1988). Well-being: Its meaning, measurement and moral importance. Oxford: Clarendon Press.
Hasebrink, U. (2008). Comparing children’s online opportunities and risks across Europe: Cross-national comparisons for EU Kids Online: [European research on cultural, contextual and risk issues in children’s safe use of the internet and new media (2006–2009)]. London: EU Kids Online. http://www.eukidsonline.net/.
Haybron, D. M. (2010). The pursuit of unhappiness: The elusive psychology of well-being. Oxford: Oxford University Press.
Hohfeld, W. N. (2000). Fundamental legal conceptions as applied in judicial reasoning. Union, NJ: Lawbook Exchange.
Kaufman, A. (2006). Capabilities and freedom. Journal of Political Philosophy, 14(3), 289–300.
Lucas, G. R. (2012). Just war and cyber conflict “Can there be an ‘Ethical’ Cyber War?” Presented at the Naval Academy Class 2014.
Maan, A. K. (1999). Internarrative identity. Lanham, MD: University Press of America.
MacIntyre, A. (1989). The virtues, the unity of a human life and the concept of a tradition. In Why narrative? Grand Rapids, MI: W. B. Eerdmans.
MacIntyre, A. C. (2007). After virtue: A study in moral theory. Notre Dame, IN: University of Notre Dame Press.
Mill, J. S. (2002). On liberty. New York: Dover.
Moor, J. H. (1997). Towards a theory of privacy in the information age. ACM SIGCAS Computers and Society, 27(3), 27–32.
Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17(5–6), 559–596.
Nussbaum, M. (2003). Capabilities as fundamental entitlements: Sen and social justice. Feminist Economics, 9(2–3), 33–59.
Olsaretti, S. (2005). Endorsement and freedom in Amartya Sen’s capability approach. Economics and Philosophy, 21(1), 89–108.
Oosterlaken, I. (2012). The capability approach, technology and design. Dordrecht and New York: Springer. doi:10.1007/978-94-007-3879-9.
Pidd, M. (2004). Systems modelling: Theory and practice (1st ed.). Chichester and Hoboken, NJ: Wiley.
Price, M. E. (2002). Media and sovereignty: The Global information revolution and its challenge to state power. Cambridge, MA: MIT Press.
Sapouna, M., Wolke, D., Vannini, N., Watson, S., Woods, S., Schneider, W., et al. (2011). Individual and social network predictors of the short-term stability of bullying victimization in the United Kingdom and Germany. British Journal of Educational Psychology, 82(2), 225–240.
Schechtman, M. (2007). The constitution of selves. Ithaca, NY: Cornell University Press.
Sen, A. (1980). Equality of what? The Tanner Lecture on Human Values, I, 197–220.
Shue, H. (1996). Basic rights: Subsistence, affluence, and U.S. foreign policy. Princeton: Princeton University Press.
Suler, J. (2004). The Online disinhibition effect. Cyber Psychology & Behavior, 7(3), 321–326. doi:10.1089/1094931041291295.
Sumner, L. W. (1996). Welfare, happiness, and ethics. Oxford: Clarendon Press.
Taddeo, M. (2011). Information warfare: A philosophical perspective. Philosophy & Technology, 25(1), 105–120. doi:10.1007/s13347-011-0040-9.
Taddeo, M. (2013). Cyber security and individual rights, striking the right balance. Philosophy and Technology, 26(4), 353–356.
Taddeo, M. (2014). Just Information Warfare. Topoi. doi:10.1007/s11245-014-9245-8.
Taddeo, M. (forthcoming). Information warfare: The ontological and regulatory gap. APA Newsletter on Philosophy & Computer.
Taylor, C. (1989). Sources of the self: The making of the modern identity. Cambridge, MA: Harvard University Press.
Walters, G. J. (2001). Human rights in an information age: A philosophical analysis. Toronto: University of Toronto Press.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Taddeo, M. The Struggle Between Liberties and Authorities in the Information Age. Sci Eng Ethics 21, 1125–1138 (2015). https://doi.org/10.1007/s11948-014-9586-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11948-014-9586-0