‘I keep a close watch on this child of mine’: a moral critique of other-tracking apps
- 1.3k Downloads
Smartphones and mobile applications are omnipresent in our lives. At the core of this article are ‘other-tracking apps’, i.e. mobile applications that make it possible, via location technology, to track others. These apps ensure that we are never unconnected from the network of ubiquitous information and, via that network, from others. In specific, focus lies on apps designed for parents to remotely track the whereabouts of their child(ren). This particular case can be considered as one example of broader reflection on what continuous technical connectivity means in moral terms. Other-tracking apps give new ground to moral queries related to information technologies. Even though there is little doubt that parents might implement these technologies with good intention to extend care and responsibility over a distance, our concern is that they mistake control for care. This article seeks to demonstrate that a critical stance towards other-tracking by parents is required, because these apps raise a number of concerns that should be recognized as they are implemented. A number of moral critiques are expressed and discussed. These apps have the potential to engender a situation of ‘over-proximity’. A framework is hence required that emphasizes maintaining the critical distance to respect the other’s heterogeneity, autonomy, and privacy.
KeywordsMobile applications Other-tracking apps Quantified otherness Parent–child relation Moral concerns Care Control
This research article is funded by the Flemish Research Foundation (FWO); the research project is entitled ‘Technical vs. Moral Proximity: The ‘Hidden Morality’ of ‘Continuous Connectivity’. The author is grateful to two anonymous reviewers for their valuable comments and suggestions.
- Barron, C. M. (2014). ‘I had no credit to ring you back’: Children’s strategies of negotiation and resistance to parental surveillance via mobile phones. Surveillance & Society, 12(3), 401–413.Google Scholar
- Baudrillard, J. (2000). The vital illusion (The Wellek library lectures). New York: Columbia University Press.Google Scholar
- Bentham, J. (1995). The panopticon writings. London: Verso.Google Scholar
- Bernstein, G., & Triger, Z. (2010). Over-parenting. University of California Davis Law Review, 44, 1221–1279.Google Scholar
- Boyd, D. (2014). It’s complicated. The social lives of networked teens. New Haven, CT: Yale University Press.Google Scholar
- Clark, L. S. (2013/2014). The parent app: Understanding families in the digital age. Oxford: Oxford University Press.Google Scholar
- Duhigg, C. (2012). How companies learn your secrets, February 16. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?_r=2&hp=&pagewanted=all. Accessed 14 Mar 2016.
- Duysburgh, P., Jansen, A., Decancq, J., Derboven, J., & Jacobs, A. (2015). “Who will help me out of bed today?” Creating a design space for IoT-assisted micromanagement in home care. Pervasive Health Conference, 2015, 1–8.Google Scholar
- Fahlquist, J. N. (2013). Responsibility and privacy—Ethical aspects of using GPS to track children. Children & Society 29(1), 38–47. http://onlinelibrary.wiley.com/doi/10.1111/chso.12016/full.
- Floridi, L. (2014). The 4th revolution. How the infosphere is reshaping human reality. Oxford: Oxford University Press.Google Scholar
- Foucault, M. (1975). Surveiller et punir: Naissance de la prison. Paris: Gallimard.Google Scholar
- Furedi, F. (2002). The culture of fear. London: Continuum.Google Scholar
- Gardner, D. (2008/2009). Risk. The science and politics of fear. London: Virgin Books.Google Scholar
- Gregg, M. (2013). Spousebusting: Intimacy, adultery, and surveillance technology. Surveillance & Society, 11(3), 301–310.Google Scholar
- Jonas, H. (1979/1984). The imperative of responsibility. In search of an ethics for the technological age. Chicago: The University of Chicago Press.Google Scholar
- Levinas, E. (1961/1971). Totalité et infini – Essay sur l’extériorité. Kluwer Academic.Google Scholar
- Lévy, P. (1998). Qu’est-ce que le virtuel? Paris: La découverte.Google Scholar
- Life360. (2015). Life360: Welcome to your new family circle. https://www.life360.com. Accessed 14 Sept 2015.
- Madison, R. (2014). Life360 app aims to become leader in family network. Utah Business, May 21. http://www.utahbusiness.com/articles/view/life360_app_aims_to_become_leader_in_family_networ. Accessed 14 Sept 2015.
- Mandel, E. (2014). How the Napa earthquake affected Bay Area sleepers. The Jawbone blog, August 25. https://jawbone.com/blog/napa-earthquake-effect-on-sleep/. Accessed 14 Sept 2015.
- Mann, S., Nolan, J., & Wellman, B. (2003). Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society, 1(3), 331–355.Google Scholar
- Miedema, F., & Post, B. (2006). Evaluatie pilot elektronische volgsystemen: 4. Samenvatting en conclusies (final report). Nijmegen: WODC. www.wodc.nl/images/1255-samenvatting_tcm44-59339.pdf.
- Mimo. (2015). Mimo: The world’s smartest baby monitor. http://mimobaby.com/. Accessed 14 Sept 2015.
- Morozov, E. (2013/2014). To save everything, click here: Technology, solutionism, and the urge to fix problems that don’t exist. London: Penguin.Google Scholar
- Nelson, M. K. (2010). Parenting out of control: Anxious parents in uncertain times. New York: NYU Press.Google Scholar
- Pasquale, F. (2015). The algorithmic self. The Hedgehog review: Critical reflections on contemporary culture (Vol. 17, No. 1). http://www.iasc-culture.org/THR/THR_article_2015_Spring_Pasquale.php.
- Pinker, S. (2011). The better angels of our nature: Why violence has declined. New York: Viking Penguin.Google Scholar
- RookieDongle. (2016). RookieDongle: Protecting young drivers. https://www.rookiedongle.com/. Accessed 14 Mar 2016.
- Rose, D. (2014). Enchanted objects: Design, human desire, and the Internet of Things. New York: Scribner.Google Scholar
- SafeT. (2014). SafeT children tracker. http://www.safet.me. Accessed 14 Sept 2015.
- Schneier, B. (2015). Data and Goliath. The hidden battles to collect your data and control your world. London: W. W. Norton & Company.Google Scholar
- Scoble, R., & Israel, S. (2014). Age of context: Mobile, sensors, data and the future of privacy. US: Patrick Brewster Press.Google Scholar
- Shellenbarger, S. (2005). Tucking the kids in—In the dorm: Colleges ward off overinvolved parents. The Wall Street Journal, July 28. http://www.wsj.com/articles/SB112250452603298007. Accessed 21 Mar 2016.
- Silverstone, R. (2002). Proper distance: Towards an ethics for cyberspace. In G. Liestøl, A. Morrison, & T. Rasmussen (Eds.), Innovations. Cambridge, MA: MIT press.Google Scholar
- Silverstone, R. (2007). Media and morality: On the rise of the Mediapolis. Cambridge: Polity Press.Google Scholar
- Tomas, D. (1991/1992). Old rituals for new space: Rites de passage and Wiliam Gibson’s cultural model of cyberspace. In M. Benedikt (Ed.), Cyberspace: First steps (pp. 31–48). Cambridge, MA: MIT Press.Google Scholar
- TopSpy (2014). FAQs—1TopSpy cell phone spy app. http://www.1topspy.com/faq.html. Accessed 14 Sept 2015.
- United Nations Human Rights Office of the High Commissioner. (1989). Convention on the rights of the child, November 20. http://www.ohchr.org/en/professionalinterest/pages/crc.aspx. Accessed 14 Mar 2016.
- van den Hoven, J., & Weckert, J. (Eds.). (2008). Information technology and moral philosophy. Cambridge: Cambridge University Press.Google Scholar
- Zimmer-Gembeck, M. J., & Collins, W. A. (2003). Autonomy development during adolescence. In G. R. Adams & M. Berzonsky (Eds.), Blackwell handbook of adolescence (pp. 175–204). Oxford: Blackwell Publishers.Google Scholar