Advertisement

Digitizing Privacy

  • Wade L. Robison
Chapter
Part of the AMINTAPHIL: The Philosophical Foundations of Law and Justice book series (AMIN, volume 8)

Abstract

Digitization has not changed the ways in which we can invade another’s privacy: intrusion, disclosure, false light, and appropriation still cover the range of possible invasions. But because of digitization, invasions of privacy have become more penetrating, pervasive, and prevalent. What we have lost is nothing different in kind than what was lost before when we only had to worry about eavesdropping and peeping Toms, but by explaining how digitization has affected the privacy torts, we gain a better understanding of a moral harm that underlies all invasions of privacy—being treated as an object to be viewed, used, and manipulated.

References

  1. Avirgan J (2016) Internet tracking has moved beyond cookies. FiveThirtyEight. http://fivethirtyeight.com/features/internet-tracking-has-moved-beyond-cookies/. Accessed 3 Sept 3 2016
  2. Bump P (2016) Donald trump blames the media for his own failure to run a general election campaign. The Washington Post. https://www.washingtonpost.com/news/the-fix/wp/2016/08/14/donald-trump-blames-the-media-for-his-own-failure-to-run-a-general-election-campaign/. Accessed 14 Aug 2016
  3. Cambridge Analytica (2017a) https://cambridgeanalytica.org. Accessed 2 July 2017
  4. Cambridge Analytica (2017b) Case study: Donald J. Trump for President 2016. https://ca-political.com/casestudies/casestudydonaldjtrumpforpresident2016. Accessed 2 July 2017
  5. Cheng J (2010) Parents: school used webcam to spy on our kid at home. ArsTechnica. http://arstechnica.com/tech-policy/2010/02/school-under-fire-for-spying-on-kid-via-webcam-at-home/. Accessed 16 Aug 2016
  6. Cheshire T (2016) Behind the scenes at Donald Trump’s UK digital war room. Sky News. http://news.sky.com/story/behind-the-scenes-at-donald-trumps-uk-digital-war-room-10626155. Accessed 2 July 2017
  7. Davies W (2016) The age of post-truth politics. New York Times. http://www.nytimes.com/2016/08/24/opinion/campaign-stops/the-age-of-post-truth-politics.html?_r=0. Accessed 25 Aug 2016
  8. Duhigg C (2012) How companies learn your secrets. New York Times. http:// www.nytimes.com/2012/02/19/magazine/shopping-habits.html?pagewanted=1&_r=2&hp&. Accessed 7 Jan 2017
  9. Editorial Board (2013) Fighting back against revenge porn. New York Times. http://www.nytimes.com/2013/10/13/opinion/sunday/fighting-back-against-revenge-porn.html. Accessed 31 Aug 2016
  10. Englehardt S, Narayanan A (2016) Online tracking: a 1-million-site measurement and analysis. http://randomwalker.info/publications/OpenWPM_1_million_site_tracking_measurement.pdf. Accessed 2 Sept 2016
  11. Fried C (1968) Privacy. Yale Law J 77(3):475–493CrossRefGoogle Scholar
  12. Gallie WB (1955–1956) Essentially contested concepts. Proc Aristotelian Soc 56:167–198CrossRefGoogle Scholar
  13. Gatehouse G (2017) What was the role of Cambridge Analytica and psychographics in the EU referendum? BBC. http://www.bbc.com/news/av/uk-40423629/what-was-the-role-of-cambridge-analytica-and-psychographics-in-the-eu-referendum. Accessed 4 July 2017
  14. Gerety T (1977) Redefining privacy. Howard Civil Rights Civil Liberties Law Rev 12(2):233–295Google Scholar
  15. Greenberg A (2016a) Flaws in wireless mice and keyboards let hackers type on your pc. Wired. https://www.wired.com/2016/02/flaws-in-wireless-mice-and-keyboards-let-hackers-type-on-your-pc/. Accessed 16 Aug 2016
  16. Greenberg A (2016b) A new wireless hack can unlock 100 million Volkswagens. Wired. https://www.wired.com/2016/08/oh-good-new-hack-can-unlock-100-million-volkswagens/. Accessed 14 Aug 2016
  17. Greenblatt A (2013) When it comes to online privacy, a disconnect for the young. NPR, All Tech Considered. http://www.npr.org/sections/alltechconsidered/2013/06/10/190433719/when-it-comes-to-online-privacy-a-disconnect-for-the-young. Accessed 19 Aug 2016
  18. Identity Theft. USA.gov. https://www.usa.gov/identity-theft. Accessed 1 Sept 2016
  19. Imposter’s luck, and credit, finally ran out (1997) Democrat and Chronicle. www.democraticandchronicle.com. Accessed 1 Jan 1997
  20. Kravets D (2012) Rent-to-own laptops secretly photographed users having sex, FTC says. Wired. https://www.wired.com/2012/09/laptop-rental-spyware-scandal/. Accessed 16 Aug 2016
  21. Leibniz GW (1686) Discourse on metaphysics. English edition: Leibniz GW (1961) Discourse on metaphysics: a translation from the French (trans: Lucas PG, Grant L). Manchester University Press, ManchesterGoogle Scholar
  22. Naylor B (2016) This doll may be recording what children say, privacy groups charge. NPR. http://www.npr.org/sections/alltechconsidered/2016/12/20/506208146/this-doll-may-be-recording-what-children-say-privacy-groups-charge. Accessed 21 Dec 2016
  23. Perlroth N (2016) How spy tech firms let governments see everything on a smart phone. New York Times. http://www.nytimes.com/2016/09/03/technology/nso-group-how-spy-tech-firms-let-governments-see-everything-on-a-smartphone.html. Accessed 3 Sept 2016
  24. Prosser WL (1960) Privacy. Calif Law Rev 48(3):383–423CrossRefGoogle Scholar
  25. Robison WL (1997a) False light. In: Larry M, Schonsheck J, Sistare C (eds) Liberty, equality, and plurality. University Press of Kansas, Lawrence, pp 171–190Google Scholar
  26. Robison WL (1997b) Privacy and personal identity. Ethics Behav 7(3):195–205CrossRefGoogle Scholar
  27. Siciliano R (2014) 10 unbelievable identity theft cases. Huffington Post. http://www.huffingtonpost.com/robert-siciliano/10-unbelievable-identity_b_5239159.html. Accessed 7 Jan 2017
  28. The Center for Digital Democracy (2016) Internet-connected toys are spying on kids, threatening their privacy and security. https://www.democraticmedia.org/filing/internet-connected-toys-are-spying-kids-threatening-their-privacy-and-security. Accessed 21 Dec 2016
  29. The phony photographer (1997) NewsweekGoogle Scholar
  30. Thomson JJ (1975) The right to privacy. Philos Public Aff 4:295–314Google Scholar
  31. Trollope A (1867) The last chronicle of Barset. Smith, Elder & Co., LondonGoogle Scholar
  32. United States Department of Justice. https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud. Accessed 1 Sept 2016

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Wade L. Robison
    • 1
  1. 1.Rochester Institute of TechnologyRochesterUSA

Personalised recommendations