The Struggle Between Liberties and Authorities in the Information Age
The “struggle between liberties and authorities”, as described by Mill, refers to the tension between individual rights and the rules restricting them that are imposed by public authorities exerting their power over civil society. In this paper I argue that contemporary information societies are experiencing a new form of such a struggle, which now involves liberties and authorities in the cyber-sphere and, more specifically, refers to the tension between cyber-security measures and individual liberties. Ethicists, political philosophers and political scientists have long debated how to strike an ethically sound balance between security measures and individual rights. I argue that such a balance can only be reached once individual rights are clearly defined, and that such a definition cannot prescind from an analysis of individual well-being in the information age. Hence, I propose an analysis of individual well-being which rests on the capability approach, and I then identify a set of rights that individuals should claim for themselves. Finally, I consider a criterion for balancing the proposed set of individual rights with cyber-security measures in the information age.
KeywordsCapability approach Cyber-security Individual rights Levels of abstraction Online persona Well-being
- Abbate, J. (2000). Inventing the internet. Cambridge, Mass: MIT Press.Google Scholar
- Agre, P. (1997). Technology and privacy the new landscape. http://site.ebrary.com/id/10015368. Retrieved 19 May 2013.
- Australian Psychological Society. (2010). The social and psychological impact of online social networking, APS national psychology week survey. http://www.psychology.org.au/publications/inpsych/2010/december/social/.
- Chestnut, H. (1967). Systems engineering methods. New York: Wiley.Google Scholar
- Copeland, B. J. (2006). Colossus: The secrets of Bletchley Park’s code-breaking computers. Oxford: Oxford University Press.Google Scholar
- Denning, D. E. (1999). Information warfare and security. Reading: Addison-Wesley.Google Scholar
- Floridi, L. (2014a). Protection of information and the right to privacy—A new equilibrium? Dordrecht: Springer. http://www.springer.com/law/international/book/978-3-319-05719-4.
- Floridi, L. (2014b). The fourth revolution: How the infosphere is reshaping human reality. Oxford: Oxford University Press.Google Scholar
- Floridi, L. (2014c). The onlife manifesto: Being human in a Hyperconnected Era. Dordrecht: Springer. http://www.springer.com/philosophy/epistemology+and+philosophy+of+science/book/978-3-319-04092-9.
- Floridi, L., & Taddeo, M. (Eds.). (2014). The ethics of information warfare. New York: Springer.Google Scholar
- Freed, L., & Ishida, S. (1995). History of computers. Hightstown, NJ: Ziff-Davis.Google Scholar
- Goold, B. J. (2007). Security and human rights. Oxford: Hart.Google Scholar
- Hasebrink, U. (2008). Comparing children’s online opportunities and risks across Europe: Cross-national comparisons for EU Kids Online: [European research on cultural, contextual and risk issues in children’s safe use of the internet and new media (2006–2009)]. London: EU Kids Online. http://www.eukidsonline.net/.
- Haybron, D. M. (2010). The pursuit of unhappiness: The elusive psychology of well-being. Oxford: Oxford University Press.Google Scholar
- Hohfeld, W. N. (2000). Fundamental legal conceptions as applied in judicial reasoning. Union, NJ: Lawbook Exchange.Google Scholar
- Lucas, G. R. (2012). Just war and cyber conflict “Can there be an ‘Ethical’ Cyber War?” Presented at the Naval Academy Class 2014. Google Scholar
- Maan, A. K. (1999). Internarrative identity. Lanham, MD: University Press of America.Google Scholar
- MacIntyre, A. (1989). The virtues, the unity of a human life and the concept of a tradition. In Why narrative? Grand Rapids, MI: W. B. Eerdmans.Google Scholar
- MacIntyre, A. C. (2007). After virtue: A study in moral theory. Notre Dame, IN: University of Notre Dame Press.Google Scholar
- Mill, J. S. (2002). On liberty. New York: Dover.Google Scholar
- Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17(5–6), 559–596.Google Scholar
- Oosterlaken, I. (2012). The capability approach, technology and design. Dordrecht and New York: Springer. doi:10.1007/978-94-007-3879-9.
- Pidd, M. (2004). Systems modelling: Theory and practice (1st ed.). Chichester and Hoboken, NJ: Wiley.Google Scholar
- Price, M. E. (2002). Media and sovereignty: The Global information revolution and its challenge to state power. Cambridge, MA: MIT Press.Google Scholar
- Sapouna, M., Wolke, D., Vannini, N., Watson, S., Woods, S., Schneider, W., et al. (2011). Individual and social network predictors of the short-term stability of bullying victimization in the United Kingdom and Germany. British Journal of Educational Psychology, 82(2), 225–240.CrossRefGoogle Scholar
- Schechtman, M. (2007). The constitution of selves. Ithaca, NY: Cornell University Press.Google Scholar
- Sen, A. (1980). Equality of what? The Tanner Lecture on Human Values, I, 197–220.Google Scholar
- Shue, H. (1996). Basic rights: Subsistence, affluence, and U.S. foreign policy. Princeton: Princeton University Press.Google Scholar
- Sumner, L. W. (1996). Welfare, happiness, and ethics. Oxford: Clarendon Press.Google Scholar
- Taddeo, M. (2013). Cyber security and individual rights, striking the right balance. Philosophy and Technology, 26(4), 353–356.Google Scholar
- Taddeo, M. (2014). Just Information Warfare. Topoi. doi:10.1007/s11245-014-9245-8.
- Taddeo, M. (forthcoming). Information warfare: The ontological and regulatory gap. APA Newsletter on Philosophy & Computer.Google Scholar
- Taylor, C. (1989). Sources of the self: The making of the modern identity. Cambridge, MA: Harvard University Press.Google Scholar
- Walters, G. J. (2001). Human rights in an information age: A philosophical analysis. Toronto: University of Toronto Press.Google Scholar