Skip to main content

The Right to Privacy as a Cornerstone of Human Individuality and Freedom?

  • Chapter
  • First Online:
Computers, People, and Thought
  • 380 Accesses

Abstract

The second quote above might be seen as disturbingly prescient of our almost mindless modern-day acceptance and, yes, even love of many aspects of modern technology. This is in spite of the fact that manifestly and from many perspectives a significant number of these technologies are, in fact, doing us harm in the long term. Modern mass media and social media promote the idea that we cannot be happy in our spare time unless we are busy in chat rooms, on social media, inter-acting with our smart TV, etc. And with a reason. Because with each of these seemingly insignificant interactions more information can be gathered about our interests, our hobbies, and other, more personal data.

Deep human solitude is a place of great affinity and of tension. When you come into your solitude you come into companionship with everything and everyone. When you extend yourself frenetically outwards, seeking refuge in your external image or role, you are going into exile. When you come patiently and silently home to yourself, you come into unity and into belonging.

—John O’Donohue (1997) Anam Cara: Spiritual Wisdom from the Celtic World

...everything was all right. His struggle was finished. he had won the victory over himself. He loved Big Brother.

—George Orwell (1949). Nineteen Eighty-Four

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.idc.com/getdoc.jsp?containerId=prUS45213219

References

  • Bachrach, Y., Graepel, T., Kohli, P., Kosinski, M., & Stillwell, D. (2014, May). Your digital image: factors behind demographic and psychometric predictions from social network profiles. In Proceedings of the 2014 International conference on Autonomous agents and multi-agent systems (pp. 1649-1650). International Foundation for Autonomous Agents and Multiagent Systems.

    Google Scholar 

  • Beckel, C., Sadamori, L., Staake, T., & Santini, S. (2014). Revealing household characteristics from smart meter data. Energy, 78, 397-410.

    Article  Google Scholar 

  • Brill, J. (2014). The internet of things: Building trust and maximizing benefits through consumer control. Fordham L. Rev., 83, 205.

    Google Scholar 

  • Garcia, F. D., & Jacobs, B. (2011). Privacy-friendly energy-metering via homomorphic encryption. In International Workshop on Security and Trust Management (pp. 226-238). Springer, Berlin, Heidelberg.

    Google Scholar 

  • Helbing, D., Frey, B. S., Gigerenzer, G., Hafen, E., Hagner, M., Hofstetter, Y., ... & Zwitter, A. (2017). Digitale Demokratie statt Datendiktatur. In Unsere digitale Zukunft (pp. 3-21). Springer, Berlin, Heidelberg.

    Google Scholar 

  • O’Donohue, J. (1997) Anam Cara: Spiritual Wisdom from the Celtic World, Bantam Press.

    Google Scholar 

  • Orwell, George, (1949). Nineteen Eighty-Four, 1990 ed. Penguin, London.

    Google Scholar 

  • Ozawa, A., Furusato, R., & Yoshida, Y. (2016). Determining the relationship between a household’s lifestyle and its electricity consumption in Japan by analyzing measured electric load profiles. Energy and Buildings, 119, 200-210.

    Article  Google Scholar 

  • Porambage, P., Ylianttila, M., Schmitt, C., Kumar, P., Gurtov, A., & Vasilakos, A. V. (2016). The quest for privacy in the internet of things. IEEE Cloud Computing, 3(2), 36-45.

    Article  Google Scholar 

  • Turing, A. M. (1950). Computing machinery and intelligence. Mind, 59, 433–460.

    Article  MathSciNet  Google Scholar 

  • Valente, J., Wynn, M. A., & Cardenas, A. A. (2019). Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices. IEEE Security & Privacy, 17(5), 10-21.

    Article  Google Scholar 

  • Wang, Y., & Kosinski, M. (2018). Deep neural networks are more accurate than humans at detecting sexual orientation from facial images. Journal of personality and social psychology, 114(2), 246.

    Article  Google Scholar 

  • Webb, G. (5th February 2015) Say Goodbye to Privacy. WIRED editorial.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Eaton, M. (2020). The Right to Privacy as a Cornerstone of Human Individuality and Freedom?. In: Computers, People, and Thought. Springer, Cham. https://doi.org/10.1007/978-3-030-55300-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-55300-5_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-55299-2

  • Online ISBN: 978-3-030-55300-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics