Abstract
Smartphones and mobile applications are omnipresent in our lives. At the core of this article are ‘other-tracking apps’, i.e. mobile applications that make it possible, via location technology, to track others. These apps ensure that we are never unconnected from the network of ubiquitous information and, via that network, from others. In specific, focus lies on apps designed for parents to remotely track the whereabouts of their child(ren). This particular case can be considered as one example of broader reflection on what continuous technical connectivity means in moral terms. Other-tracking apps give new ground to moral queries related to information technologies. Even though there is little doubt that parents might implement these technologies with good intention to extend care and responsibility over a distance, our concern is that they mistake control for care. This article seeks to demonstrate that a critical stance towards other-tracking by parents is required, because these apps raise a number of concerns that should be recognized as they are implemented. A number of moral critiques are expressed and discussed. These apps have the potential to engender a situation of ‘over-proximity’. A framework is hence required that emphasizes maintaining the critical distance to respect the other’s heterogeneity, autonomy, and privacy.
Similar content being viewed by others
Notes
Some of these apps also offer additional features, such as the web pages your child has visited, their call logs, text messages, and so forth.
Literature on adolescence often distinguishes between early, middle, and late adolescence (see e.g. Zimmer-Gembeck and Collins 2003, p. 14). There is no clear-cut consensus on the age ranges of early adolescence: others demarcate the age range between 12 and 13 years (e.g. Fleming 2005) or between 13 and 15 years (e.g. Fabes et al. 1999).
I am grateful to an anonymous referee for pointing this out.
There is, of course, an important difference between knowing that you are being tracked versus being tracked or monitored in a secret, hidden way. For instance, users of ‘Life360’ have given their consent, whereas the app ‘1TopSpy’ (cf. supra) is secretly installed in the target phone.
References
Barron, C. M. (2014). ‘I had no credit to ring you back’: Children’s strategies of negotiation and resistance to parental surveillance via mobile phones. Surveillance & Society, 12(3), 401–413.
Baudrillard, J. (2000). The vital illusion (The Wellek library lectures). New York: Columbia University Press.
Bentham, J. (1995). The panopticon writings. London: Verso.
Bernstein, G., & Triger, Z. (2010). Over-parenting. University of California Davis Law Review, 44, 1221–1279.
Boyd, D. (2014). It’s complicated. The social lives of networked teens. New Haven, CT: Yale University Press.
Carlo, G., Fabes, R. A., Laible, D., & Kupanoff, K. (1999). Early adolescence and prosocial/moral behavior II: The role of social and contextual influences. Journal of Early Adolescence, 19(2), 133–147.
Clark, L. S. (2013/2014). The parent app: Understanding families in the digital age. Oxford: Oxford University Press.
Crawford, K., Lingel, J., & Karppi, T. (2015). Our metrics, our selves: A hundred years of self-tracking from the weight scale to the wrist wearable device. European Journal of Cultural Studies, 18(4), 479–496.
Duhigg, C. (2012). How companies learn your secrets, February 16. http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?_r=2&hp=&pagewanted=all. Accessed 14 Mar 2016.
Duysburgh, P., Jansen, A., Decancq, J., Derboven, J., & Jacobs, A. (2015). “Who will help me out of bed today?” Creating a design space for IoT-assisted micromanagement in home care. Pervasive Health Conference, 2015, 1–8.
Fabes, R. A., Carlo, G., Kupanoff, K., & Liable, D. (1999). Early adolescence and prosocial/moral behavior I: The role of individual processes. Journal of Early Adolescence, 19(1), 5–16.
Fahlquist, J. N. (2013). Responsibility and privacy—Ethical aspects of using GPS to track children. Children & Society 29(1), 38–47. http://onlinelibrary.wiley.com/doi/10.1111/chso.12016/full.
Fleming, M. (2005). Adolescent autonomy: Desire, achievement and disobeying parents between early and late adolescence. Australian Journal of Education and Developmental Psychology, 5, 1–16.
Floridi, L. (2014). The 4th revolution. How the infosphere is reshaping human reality. Oxford: Oxford University Press.
Foucault, M. (1975). Surveiller et punir: Naissance de la prison. Paris: Gallimard.
Furedi, F. (2002). The culture of fear. London: Continuum.
Gardner, D. (2008/2009). Risk. The science and politics of fear. London: Virgin Books.
Gregg, M. (2013). Spousebusting: Intimacy, adultery, and surveillance technology. Surveillance & Society, 11(3), 301–310.
Introna, L. (2001). Virtuality and morality: On (not) being disturbed by the other. Philosophy in the Contemporary World, 8(1), 11–19.
Jewkes, Y., & Wykes, M. (2012). Reconstructing the sexual abuse of children: ‘cyber-paeds’, panic and power. Sexualities, 15(8), 934–952.
Jonas, H. (1979/1984). The imperative of responsibility. In search of an ethics for the technological age. Chicago: The University of Chicago Press.
Lanzing, M. (2016). The transparent self. Ethics and Information Technology. doi:10.1007/s10676-016-9396-y.
Levinas, E. (1961/1971). Totalité et infini – Essay sur l’extériorité. Kluwer Academic.
Lévy, P. (1998). Qu’est-ce que le virtuel? Paris: La découverte.
Life360. (2015). Life360: Welcome to your new family circle. https://www.life360.com. Accessed 14 Sept 2015.
Locke, J., Campbell, M. A., & Kavanagh, D. J. (2012). Can a parent do too much for their child? An examination by parenting professionals of the concept of overparenting. Australian Journal of Guidance and Counseling, 22(2), 249–265.
Madison, R. (2014). Life360 app aims to become leader in family network. Utah Business, May 21. http://www.utahbusiness.com/articles/view/life360_app_aims_to_become_leader_in_family_networ. Accessed 14 Sept 2015.
Malone, K. (2007). The bubble-wrap generation: Children growing up in walled gardens. Environmental Education Research, 13(4), 513–527. doi:10.1080/13504620701581612.
Mandel, E. (2014). How the Napa earthquake affected Bay Area sleepers. The Jawbone blog, August 25. https://jawbone.com/blog/napa-earthquake-effect-on-sleep/. Accessed 14 Sept 2015.
Mann, S., Nolan, J., & Wellman, B. (2003). Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society, 1(3), 331–355.
Miedema, F., & Post, B. (2006). Evaluatie pilot elektronische volgsystemen: 4. Samenvatting en conclusies (final report). Nijmegen: WODC. www.wodc.nl/images/1255-samenvatting_tcm44-59339.pdf.
Mimo. (2015). Mimo: The world’s smartest baby monitor. http://mimobaby.com/. Accessed 14 Sept 2015.
Morozov, E. (2013/2014). To save everything, click here: Technology, solutionism, and the urge to fix problems that don’t exist. London: Penguin.
Nelson, M. K. (2010). Parenting out of control: Anxious parents in uncertain times. New York: NYU Press.
Palen, L., & Hughes, A. (2007). When home base is not a place: Parents’ use of mobile telephones. Personal and Ubiquitous Computing, 11, 339–348.
Pasquale, F. (2015). The algorithmic self. The Hedgehog review: Critical reflections on contemporary culture (Vol. 17, No. 1). http://www.iasc-culture.org/THR/THR_article_2015_Spring_Pasquale.php.
Pinker, S. (2011). The better angels of our nature: Why violence has declined. New York: Viking Penguin.
RookieDongle. (2016). RookieDongle: Protecting young drivers. https://www.rookiedongle.com/. Accessed 14 Mar 2016.
Rose, D. (2014). Enchanted objects: Design, human desire, and the Internet of Things. New York: Scribner.
SafeT. (2014). SafeT children tracker. http://www.safet.me. Accessed 14 Sept 2015.
Schiffrin, H. H., Liss, M., Miles-McLean, H., Geary, K. A., Erchull, M. J., & Tashner, T. (2014). Helping or hovering? The effects of helicopter parenting on college students’ well-being. Journal of Child and Family Studies, 23, 548–557.
Schneier, B. (2015). Data and Goliath. The hidden battles to collect your data and control your world. London: W. W. Norton & Company.
Scoble, R., & Israel, S. (2014). Age of context: Mobile, sensors, data and the future of privacy. US: Patrick Brewster Press.
Shellenbarger, S. (2005). Tucking the kids in—In the dorm: Colleges ward off overinvolved parents. The Wall Street Journal, July 28. http://www.wsj.com/articles/SB112250452603298007. Accessed 21 Mar 2016.
Shields, R. (2003). The virtual. London: Routledge.
Silverstone, R. (2002). Proper distance: Towards an ethics for cyberspace. In G. Liestøl, A. Morrison, & T. Rasmussen (Eds.), Innovations. Cambridge, MA: MIT press.
Silverstone, R. (2007). Media and morality: On the rise of the Mediapolis. Cambridge: Polity Press.
Simpson, B. (2014). Tracking children, constructing fear: GPS and the manufacture of family safety. Information & Communications Technology Law, 23(3), 273–285. doi:10.1080/13600834.2014.970377.
Stattin, H., & Kerr, M. (2000). Parental monitoring: A reinterpretation. Child Development, 71(4), 1072–1085.
Steinberg, L., & Silverberg, S. B. (1986). The vicissitudes of autonomy in early adolescence. Child Development, 57, 841–851.
Striphas, T. (2015). Algorithmic culture. European Journal of Cultural Studies, 18(4–5), 395–412.
Swan, M. (2013). The quantified self: Fundamental disruption in big data science and biological discovery. Big Data, 1(2), 85–99.
Thumala, A., Goold, B., & Loader, I. (2015). Tracking devices: On the reception of a novel security good. Criminology & Criminal Justice, 15(1), 3–22.
Tomas, D. (1991/1992). Old rituals for new space: Rites de passage and Wiliam Gibson’s cultural model of cyberspace. In M. Benedikt (Ed.), Cyberspace: First steps (pp. 31–48). Cambridge, MA: MIT Press.
TopSpy (2014). FAQs—1TopSpy cell phone spy app. http://www.1topspy.com/faq.html. Accessed 14 Sept 2015.
United Nations Human Rights Office of the High Commissioner. (1989). Convention on the rights of the child, November 20. http://www.ohchr.org/en/professionalinterest/pages/crc.aspx. Accessed 14 Mar 2016.
van den Hoven, J., & Weckert, J. (Eds.). (2008). Information technology and moral philosophy. Cambridge: Cambridge University Press.
Verbeek, P. P. (2011). Moralizing technology: Understanding and designing the morality of things. Chicago: University of Chicago press.
Zimmer-Gembeck, M. J., & Collins, W. A. (2003). Autonomy development during adolescence. In G. R. Adams & M. Berzonsky (Eds.), Blackwell handbook of adolescence (pp. 175–204). Oxford: Blackwell Publishers.
Acknowledgments
This research article is funded by the Flemish Research Foundation (FWO); the research project is entitled ‘Technical vs. Moral Proximity: The ‘Hidden Morality’ of ‘Continuous Connectivity’. The author is grateful to two anonymous reviewers for their valuable comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Gabriels, K. ‘I keep a close watch on this child of mine’: a moral critique of other-tracking apps. Ethics Inf Technol 18, 175–184 (2016). https://doi.org/10.1007/s10676-016-9405-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10676-016-9405-1