Abstract
This paper deals with the topic of privacy in the cyberspace. It answers the question: What is the situation regarding privacy in the cyberspace and what new threats privacy faces in the cyberspace? It starts with the specification of privacy and analyses the new situation the development of information technologies has put us in. Our environment has changed and privacy is affected. The article continues with the analysis of the threats to privacy emanating from the new environment. The threats include violation of autonomy, lack of freedom and free decisions, insecurity, information asymmetries, blackmailing, vulnerability, physical and mental suffering, financial and other losses, harms to reputation, etc. Further, the paper identifies how privacy is threatened by new technologies and technological inventions. To illustrate possible impacts of information technologies on society, three dystopian visions are presented, namely Orwell’s depiction from the novels Nineteen Eighty-Four, Kafka’s The Trial, and Huxley’s Brave New World. They present three deterrent examples of social reactions to the options provided by the new information technologies. The first one is unfriendly totality, the second one consists in nontransparent society, and the third one in voluntary surrender of privacy. To evaluate current situation, the legal regulation of privacy in EU and USA is summarized.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Arendt, H. (1958). The human condition. Chicago: University of Chicago Press.
Ball, J. (2013). NSA’s Prism surveillance program: How it works and what it can do. theguardian. http://www.theguardian.com/world/2013/jun/08/nsa-prism-server-collection-facebook-google. Accessed 12 Nov 2014.
Boehm, F. (2015). A comparison between US and EU data protection legislation for law enforcement purposes. http://www.europarl.europa.eu/RegData/etudes/STUD/2015/536459/IPOL_STU(2015)536459_EN.pdf. Accessed 26 June 2016.
Campbell, D. F. J., Carayannis, E. G., & Rehman, S. S. (2015). Quadruple helix structures of quality of democracy in innovation systems: The USA, OECD countries, and EU member countries in global comparison. Journal of the Knowledge Economy, 6(3), 467–493. https://doi.org/10.1007/s13132-015-0246-7.
Cohen, J. E. (2012). What privacy is for. Harvard Law Review, 126, 1904–1933.
Cooper, J., & James, A. (2009). Challenges for database management in the internet of things. IETE Technical Review, 26(5), 320–328.
Descheemaeker, E. (2015). The harms of privacy. Edinburgh School of Law research paper no. 2015/27. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2644285. Accessed 21 June 2016.
Federal Trade Commission (FTC). (2012). Protecting consumer privacy in an Era of Rapid change: Recommendations for business and policymakers. https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf. Accessed 26 June 2016.
Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 7(4), 185–200.
Frost & Sullivan. (2015). World’s top global mega trends to 2025 and implications to business, society and cultures. http://www.investinbsr.com/ipaforum/wp-content/uploads/Iain-Jawad-IPA-Forum-2014-Presentation.pdf. Accessed 18 Dec 2015.
Gartner. (2015). http://www.gartner.com/it-glossary/big-data. Accessed 18 Dec 2015.
Gavison, R. (1980). Privacy and the limits of law. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy (pp. 346–402). Cambridge: Cambridge University Press.
Gelman, R. 2016. Fair information practices: A basic history. http://bobgellman.com/rg-docs/rg-FIPShistory.pdf. Accessed 26 June 2016.
Harper, D. (2001). Online etymology dictionary. http://www.etymonline.com/index.php?term=private&allowed_in_frame=0. Accessed 20 June 2016.
Horkheimer, M., & Adorno, T. W. (2002). The dialectic of enlightenment. Stanford: Stanford University Press.
Hunton & Williams. (2016). EU general data protection regulation finally adopted. https://www.huntonprivacyblog.com/2016/04/14/eu-general-data-protection-regulation-finally-adopted/. Accessed 26 June 2016.
Huxley, A. (1932). Brave new world. New York: Harper & Brothers.
Kafka, F. (1998). The trial. New York: Schocken Books.
Klitou, D. (2014). Privacy-invading technologies and privacy by design. Hague: T.M.C. Asser Press.
Meyers, D. (2014). Big data: A competitive weapon for the enterprise. VizWorld. http://www.vizworld.com/2014/12/big-data-a-competitive-weapon-for-the-enterprise-infographic/. Accessed 18 Dec 2015.
Moor, J. H. (1990). The ethics of privacy protection. Library Trends, 39(1), 69–82.
Nakashima, E., & Horwitz, S. (2013). Newly declassified documents on phone records program released. The Washington Post. July 31 2013. https://www.washingtonpost.com/world/national-security/governments-secret-order-to-verizon-to-be-unveiled-at-senate-hearing/2013/07/31/233fdd3a-f9cf-11e2-a369-d1954abcb7e3_story.html. Accessed 12 Nov 2014.
OECD. (2013). The OECD privacy framework. https://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf. Accessed 25 June 2016.
Orwell, G. (1949). Nineteen eighty-four. New York: Harcourt, Brace & Co.
Petinary, D. (2001). Cyberstalking investigation and prevention. Computer Crime Research Center. http://www.crime-research.org/library/Cyberstalking.htm. Accessed 12 June 2016.
Pitofsky, R., Azcuenaga, M. L., Anthon, S. F., Thompson, M. W., & Swindle, O. (1998). Privacy online: A report to Congress, Federal Trade Commission June 1998. https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-report-congress/priv-23a.pdf. Accessed 12 June 2016.
Postman, N. (1985). Amusing ourselves to death: Public discourse in the age of show business. New York: Penguin.
Rössler, B. (2004). The value of privacy. Cambridge: Polity.
Sennet, R. (1977). The fall of public man. New York: Knopf.
Solove, D. (2001). Privacy and power: Computer databases and metaphors for information privacy. Stanford Law Review, 53(6), 1393–1462.
Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477–560.
Statista. (2016). Leading social networks worldwide as of April 2016. http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/. Accessed 21 June 2016.
Van de Hoven, J. (2001). Privacy and the varieties of informational wrongdoing. In R. A. Spinello & H. T. Tavani (Eds.), Readings in cyber ethics (pp. 488–500). Sudbury: Jones and Bartlett Publishers.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this entry
Cite this entry
Sigmund, T. (2018). Privacy in the Cyberspace: Threats and Prospects. In: Carayannis, E., Campbell, D., Efthymiopoulos, M. (eds) Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, Cham. https://doi.org/10.1007/978-3-319-09069-6_42
Download citation
DOI: https://doi.org/10.1007/978-3-319-09069-6_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09068-9
Online ISBN: 978-3-319-09069-6
eBook Packages: Economics and FinanceReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences