Privacy, Contingency, Identity, and the Group

Privacy, Contingency, Identity, and the Group

Soraj Hongladarom (Chulalongkorn University, Thailand)
Copyright: © 2009 |Pages: 16
DOI: 10.4018/978-1-60566-022-6.ch032
OnDemand PDF Download:
$37.50

Abstract

The chapter argues that there is a way to justify privacy without relying on the metaphysical assumption of an independently existing self or person, which is normally taken to underlie personal identity. The topic of privacy is an important one in technoethics because advances in science and technology today have resulted in threats to privacy. I propose furthermore that privacy is a contingent matter, and that this conception is more convenient in helping us understand the complex issues surrounding deliberating thoughtfully about privacy in many dimensions. It is the very contingency of privacy that makes it malleable enough to serve our purposes. Basically, the argument is that it is possible for there to be a society where individuals there do not have any privacy at all, but they are still autonomous moral agents. This argument has some close affinities with the Buddhist perspective, though in this chapter I do not intend to presuppose it. Then I discuss the issue of group privacy. This is a rather neglected issue in the literature, but group privacy has become more important now that contemporary genomics and bioinformatics have the power to manipulate large amount of population data, which could lead to discrimination. The proposed conception of privacy is more suitable for justifying group privacy than the one that presupposes the inherently existing individual.
Chapter Preview
Top

Introduction

Privacy has become a primary concern in many circles nowadays. The increasingly pervasive use of electronic and information technologies has resulted in more sophisticated tools that are used for surveillance and data mining, which threaten privacy rights of citizens. Furthermore, privacy has become a concern not only in the West, but also in Asia, where there has been significant economic growth in recent decades. This concern has led many scholars to ponder on how the concept of privacy and its implementation could be justified, especially in the context of the East where privacy is generally perceived to be a part of the modern West where Asia has had no exact counterpart, a situation that prompted many papers on how privacy could be justified in Asian contexts (E.g., Ess, 2005; Lü, 2005; Kitiyadisai, 2005; Rananand, 2007; Nakada and Tamura, 2005; Hongladarom, 2007). What I would like to accomplish in this chapter is related to those attempts; however, the chapter is not intended as another contribution to how privacy is to be justified or even criticized from the Asian perspective. It is instead an attempt to map out the conceptual terrain of privacy without relying too heavily on the literature of the traditions of Asia, which in fact has been my concern elsewhere (Hongladarom, 2007). That is to say, I intend what follows in the chapter to be generally applicable in most cultural contexts. This should not be taken to be an argument for the supremacy of one culture over others; rather my concern is to find out a common ground that should be acceptable for all cultures, without privileging one over another.

The overall aim of this chapter is, then, to present a philosophical analysis and justification of privacy that differs from what is available in most literature on the topic. The topic is of direct relevance to technoethics, conceived of as an investigation of the ethical implications of science and technology, because these advances have resulted in actual and potential violation of privacy of either individuals or groups of them. It is well known that current technologies, such as genetic databanking, smart ID cards, and others have made it possible to collect, store, and systematize a vast amount of information related to particular individuals. In Thailand, for example, the previous government introduced what is called ‘smart ID cards’ (Thailand introduces national ID with biometric technology, 2007). Basically these are supposed to function as identification cards for each and every Thai citizen, which has been around in Thailand for decades. However, in recent years the government ordered that a new type of card be issued with a microchip, which is capable of storing a very large amount of information. The rationale was that this new type of card would facilitate interaction with public agencies, as important information that is required for an individual to contact the government would be stored in the microchip, eliminating the need to carry a number of paper documents. However, since the card identifies an individual citizen, it is conceivable that deeper level of individual information might be stored in the card, enhancing the possibility that the government or the authorities might use the resulting huge database in profiling or perhaps discriminating one group against others in one way or another, and so on, thus undermining the privacy of the individuals. Many research works have in fact been done on the Thai smart ID cards, and its potential for misuse.1

The idea to be presented here is that there is an area within and surrounding an individual and indeed group of individuals that should be protected, and that the boundary demarcating the area is an imaginative line, much like the longitudes and latitudes are. In the chapter, I show that the idea of privacy is strongly related to the philosophical concepts of identity, either that of an individual or to a group.2 Privacy is connected to identity because it does not seem at first sight to make much sense in saying that there is a privacy to an individual while the identity of that individual changes through time. In other words, privacy seems to presuppose a rather strict identity of an individual. Without such a strict identity, it would be hard, or so it seems, to identify whose privacy should be protected.

Key Terms in this Chapter

Virtuality: The existence of presence in the online platform which may be defined by the lack of materiality.

Ethics: The notion of right or wrong that can influence conduct of people.

Privacy: According to the Merriam-Webster online dictionary, privacy is defined as “the quality or state of being apart from company or observation.” One feels that privacy is needed when one feels that there is something about oneself that needs to be kept away from the eyes of others. The chapter develops the notion of ‘group privacy,’ which is the privacy belonging to a group of individuals, such as ethnic groups or close communities or the family, rather than to particular individuals.

Communitarianism: By contrast, communitarianism argues that there is something fundamentally wrong in liberalism because liberalism accords the individual a primacy in devising a political system. What is wrong in that conception is that liberalism presupposes that the individual can exist freely on her own as if existing in a vacuum having no essential relation to her communities or surroundings. As communities are in the real world, the norms and expectations of the particular community in fact informs the decisions by the individual.

Identity: This is another difficult philosophical term. An individual’s identity is whatever that all together make up that particular individual to be the person he or she is. Thus recently technology has made it possible for one’s identity to be stolen, i.e., information pertaining to a particular individual taken away such that the perpetrator assumes the identity of the individual and engages in business dealings in the latter’s name, at the latter’s expenses. This is the reason why privacy has become so important in today’s world.

Child Pornography: Sexually explicit material of children.

Liberalism: This is a standard philosophical term which is difficult to pin down what it means exactly. Basically liberalism is a term in political philosophy referring to a system of political theory wherein the individual is emphasized as autonomous moral agent and thus is free to enter into political agreements or contracts. According to John Rawls, “[e]ach person is to have an equal right to the most extensive total system of equal basic liberties compatible with a similar system for all” (Rawls, 1971 AU12: The in-text citation "Rawls, 1971" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. : 302).

Buddhism: A world religion founded by Siddhartha Gautama more than 2,500 years ago in northern India. Gautama achieved the ultimate realization into the nature of reality and thus became the ‘Buddha,’ literally ‘one who is awaken.’ The goal of Buddhism is to achieve Enlightenment, or nirvana , a state of total bliss unspoiled by suffering. Buddhism teaches that the individual self is a construct and is not there ultimately in reality.

Contingency: What is ‘contingent’ is contrasted to what is ‘necessary’. The latter has to happen as a matter of natural law or some other law of such kind, whereas the former does not have to do so. In the chapter, it is argued that one’s identity is a contingent matter because it is liable to change and grow and the necessary core of one’s identity cannot be found.

Cyber Porn: Sexually explicit material available in the online environment as images and text or in audio-visual formats.

Pseudo-Photograph: This as an image, whether made by computer graphics or otherwise, which appears to be a photograph.

Community Standards: Protocols or norms applied by a collective body to evaluate a given issue.

Autonomy: The quality of being able to ‘make law for oneself,’ thus implying that one has certain rights and liberty such that the state or other authorities cannot take away. In the context of this chapter autonomy usually is used to refer to the quality of an individual in so far as he or she is a rational being capable of rational judgment. An ‘autonomous moral agent’ is thus a being (not necessarily a human one) who is capable of judging what is right or wrong to act without having to rely on others to tell them.

Pornography: Sexually explicit material.

Complete Chapter List

Search this Book:
Reset
Editorial Advisory Board
Table of Contents
Preface
Rocci Luppicini, Rebecca Adell
Acknowledgment
Rocci Luppicini, Rebecca Adell
Chapter 1
Rocci Luppicini
Over the last 30 years, an amassing body of work has focused on ethical dimensions of technology in a variety of contexts impacting society. This... Sample PDF
The Emerging Field of Technoethics
$37.50
Chapter 2
Marc J. de Vries
In this chapter it is argued that a multidisciplinary approach to technoethics is necessary to do justice to the complexity of technology.... Sample PDF
A Multi-Disciplinary Approach to Technoethics
$37.50
Chapter 3
Daniela Cerqui, Kevin Warwick
Common ethical issues related to technology are formulated in terms of impact. With an anthropological approach, every technological device is... Sample PDF
Technoethics: An Anthropological Approach
$37.50
Chapter 4
Michael S. Billinger
Despite the fact that analyses of biological populations within species have become increasing sophisticated in recent years, the language used to... Sample PDF
A Technoethical Approach to the Race Problem in Anthropology
$37.50
Chapter 5
Andy Miah
This chapter outlines a technoethics for sport by addressing the relationship between sport ethics and bioethics. The purpose of this chapter is to... Sample PDF
The Ethics of Human Enhancement in Sport
$37.50
Chapter 6
Darryl Macer
This chapter examines some of the cultural variation in the ethical factors associated with the use of science and technology. The issues discussed... Sample PDF
Education of Ethics of Science and Technology Across Cultures
$37.50
Chapter 7
Seppo Visala
Within the organisational development people’s arguments rise from their personal or group interests, which in turn are based on the systemic... Sample PDF
Planning, Interests, and Argumentation
$37.50
Chapter 8
Alireza Bagheri
This chapter elaborates on some of the existing concerns and ethical issues that may arise when biomedical research protocols are proposed or funded... Sample PDF
Ethics Review on Externally- Sponsored Research in Developing Countries
$37.50
Chapter 9
Gerrhard Fortwengel
At the beginning of this section the authors provide a definition of biomedical research and an interpretation of the meaning of ethics and social... Sample PDF
Social and Ethical Aspects of Biomedical Research
$37.50
Chapter 10
Stefano Fait
In assessing the ethical implications of genomics and biotechnology, it is important to acknowledge that science, technology, and bioethics do not... Sample PDF
Ethical Aspects of Genetic Engineering and Biotechnology
$37.50
Chapter 11
Timothy F. Murphy
Military researchers are working to exploit advances in nanoscale research for military uniforms, medical diagnosis and treatment, enhanced soldier... Sample PDF
Nanoscale Research, Ethics, and the Military
$37.50
Chapter 12
Keith Bauer
This chapter reviews key debates about the meaning of telehealth and also considers how new and emerging systems in telehealth work to protect... Sample PDF
Healthcare Ethics in the Information Age
$37.50
Chapter 13
Matthew Charlesworth, David Sewry
The development of cybernetics and digital computers prompted the need for a greater exploration of computer ethics. Information ethics, as... Sample PDF
Ethical Theories and Computer Ethics
$37.50
Chapter 14
John P. Sullins
This chapter will argue that artificial agents created or synthesized by technologies such as artificial life (ALife), artificial intelligence (AI)... Sample PDF
Artificial Moral Agency in Technoethics
$37.50
Chapter 15
Pilar Alejandra Cortés Pascual
‘What positive and negative aspects are perceived of Information and Communications Technologies (ICT)?’ and ‘What dilemmas arise regarding these... Sample PDF
Ethical Controversy over Information and Communication Technology
$37.50
Chapter 16
Martin Ryder
This chapter provides a brief summary of the technical and social hurdles that define the so-called ‘digital divide’ and it considers the celebrated... Sample PDF
The Cyborg and the Noble Savage: Ethics in the War on Information Poverty
$37.50
Chapter 17
Mike Ribble
In todays changing global society, digital technology users need to be prepared to interact and work with users from around the world. Digital... Sample PDF
Becoming a Digital Citizen in a Technological World
$37.50
Chapter 18
Deb Gearhart
Are we developing a (global) society where our youth think it is ok to copy and paste whatever they see on the Internet and turn it in for homework;... Sample PDF
Technoethics in Education for the Twenty-First Century
$37.50
Chapter 19
May Thorseth
The purpose of this chapter is to discuss important ethical aspects of online communication of global scope. We focus particularly on procedural... Sample PDF
The Ethics of Global Communication Online
$37.50
Chapter 20
Cameron Norman, Adrian Guta, Sarah Flicker
New information technologies are creating virtual spaces that allow youth to network and express themselves with unprecedented freedom and... Sample PDF
Engaging Youth in Health Promotion Using Multimedia Technologies: Reflecting on 10 Years of TeenNet Research Ethics and Practice
$37.50
Chapter 21
Samantha Mei-che Pang
In Hong Kong, end-of-life practice ideally adheres to values that include respect for the patient’s selfdetermination and an understanding shared by... Sample PDF
Ethical Challenges of Engaging Chinese in End-of-Life Talk
$37.50
Chapter 22
Busi Nkala
An estimated 39.5 million people are living with HIV worldwide. There were 4.3 million new infections in 2006 with 2.8 million (65%) of these... Sample PDF
Community Education in New HIV Prevention Technologies Research
$37.50
Chapter 23
Makoto Nakada, Rafael Capurro
In this article we give an overview of the range and characteristics of intercultural information ethics (IIE) focusing on the public/private debate... Sample PDF
The Public / Private Debate: A Contribution to Intercultural Information Ethics
$37.50
Chapter 24
Arsalan Butt
Consumer software piracy is widespread in many parts of the world. P2P based websites have made it easier to access pirated software, which has... Sample PDF
Ethical, Cultural and Socio- Economic Factors of Software Piracy Determinants in a Developing Country: Comparative Analysis of Pakistani and Canadian University Students
$37.50
Chapter 25
A. Anderson, S. Allan, A. Petersen, C. Wilkinson
Recent evidence on genetically modified crops, cloning and stem cell research suggests that the news media play a significant role in shaping wider... Sample PDF
Nanoethics: The Role of News Media in Shaping Debate
$37.50
Chapter 26
Russell W. Robbins, Kenneth R. Fleischmann, William A. Wallace
This chapter explains and integrates new approaches to teaching computing and information ethics (CIE) and researching CIE education. We first... Sample PDF
Computing and Information Ethics Education Research
$37.50
Chapter 27
Jennifer Candor
The allocation of resources for assistive technology does not have to result in a gap between general and special education. This case study... Sample PDF
The Ethical Dilemma over Money in Special Education
$37.50
Chapter 28
Pilar Alejandra Cortés Pascual
Educational orientation should be set within a specific socio-historical context, which is nowadays characterized by the Society of Information.... Sample PDF
Educational Technoethics Applied to Career Guidance
$37.50
Chapter 29
A.K. Haghi
In this book chapter, the authors summarize their retrospections as an engineering educator for more than 20 years. Consideration is given to a... Sample PDF
The Scholarship of Teaching Engineering: Some Fundamental Issues
$37.50
Chapter 30
Antoinette Rouvroy
The aim of the present chapter is to elucidate the paradoxical position of the individual legal subject in the context of human genetics. It first... Sample PDF
Which Rights for Which Subjects? Genetic Confidentiality and Privacy in the Post-Genomic Era
$37.50
Chapter 31
Eduardo A. Rueda
This chapter focuses on showing legitimate ways for coping with uncertainties within the informed consent process of predictive genetic testing. It... Sample PDF
Predictive Genetic Testing,Uncertainty, and Informed Consent
$37.50
Chapter 32
Soraj Hongladarom
The chapter argues that there is a way to justify privacy without relying on the metaphysical assumption of an independently existing self or... Sample PDF
Privacy, Contingency, Identity, and the Group
$37.50
Chapter 33
Y. Ibrahim
This chapter situates the current debates on pornography in the virtual realm and its ethical and legal implications for users and researchers. It... Sample PDF
The Ethics of Gazing: The Politics of Online Pornography
$37.50
Chapter 34
Neil C. Rowe
We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories... Sample PDF
The Ethics of Deception in Cyberspace
$37.50
Chapter 35
Cyber Identity Theft  (pages 542-557)
Lynne D. Roberts
Information and communication technologies (ICTs) provide substantial benefits to governments, organizations and individuals through providing low... Sample PDF
Cyber Identity Theft
$37.50
Chapter 36
A. Pablo Iannone
This chapter asks: What is information overload? At what levels of existence does it occur? Are there any features common to information overload at... Sample PDF
Walking the Information Overload Tightrope
$37.50
Chapter 37
Cyber-Victimization  (pages 575-592)
Lynne D. Roberts
Information and communication technologies (ICTs); while providing a range of benefits to individuals, organisations and governments; also provide... Sample PDF
Cyber-Victimization
$37.50
Chapter 38
Spyware  (pages 593-608)
Mathias Klang
It is well known that technology can be use as to effectively monitor the behavior of crows and individuals and in many cases this knowledge may b... Sample PDF
Spyware
$37.50
Chapter 39
D. Gareth Jones
The advent of in vitro fertilization (IVF) marked a watershed in the scientific understanding of the human embryo. This, in turn, led to a... Sample PDF
In Vitro Fertilization and the Embryonic Revolution
$37.50
Chapter 40
Joyce Yi- Hui Lee
In this chapter we argue that even though conflict has been explored at an intra-organizational level, its effect and role at an... Sample PDF
Inter-Organizational Conflicts in Virtual Alliances
$37.50
Chapter 41
Andreas Matthias
Creation of autonomously acting, learning artifacts has reached a point where humans cannot any more be justly held responsible for the actions of... Sample PDF
From Coder to Creator: Responsibility Issues in Intelligent Artifact Design
$37.50
Chapter 42
J. José Cortez
Fundamental democratic principles and values that guide our social relationships have been important concerns in the evolution of this nation’s... Sample PDF
Historical Perspective of Technoethics in Education
$37.50
Chapter 43
Heidi L. Schnackenberg
On the cutting edge of current technologies are portable media, where users can download information and take it with them to digest it anytime... Sample PDF
Podcasting and Vodcasting in Education and Training
$37.50
Chapter 44
Technoethics in Schools  (pages 680-699)
Darren Pullen
School students are used to digital technology-they blog, create movies for public viewing on the web, create and download music and use instant... Sample PDF
Technoethics in Schools
$37.50
Chapter 45
Charles R Crowell
This chapter discusses the ways in which moral psychology can inform information ethics. A “Four Component Model” of moral behavior is described... Sample PDF
Moral Psychology and Information Ethics: Psychological Distance and the Components of Moral Behavior in a Digital World
$37.50
Chapter 46
José-Rodrigo Córdoba
Current developments in information systems (IS) evaluation emphasise stakeholder participation in order to ensure adequate and beneficial IS... Sample PDF
A Critical Systems View of Power-Ethics Interactions in Information Systems Evaluation
$37.50
Chapter 47
Joan D. McMahon
If you were to survey course syllabi on your campus, you would probably find the standard syllabi to include: • Course title and number •... Sample PDF
Ethical Issues in Web-Based Learning
$37.50
Chapter 48
Barbara Paterson
Computer ethicists foresee that as information and communication technology (ICT) increasingly pervades more and more aspects of life, ethical... Sample PDF
We Cannot Eat Data: The Need for Computer Ethics to Address the Cultural and Ecological Impacts of Computing
$37.50
Chapter 49
Bernd Carsten Stahl, Simon Rogerson
The ever-changing face of ICT can render its deployment rather problematic in sensitive areas of applications, such as healthcare. The ethical... Sample PDF
Current and Future State of ICT Deployment and Utilization in Healthcare: An Analysis of Cross-Cultural Ethical Issues
$37.50
Chapter 50
Sue Conger
With each new technology, new ethical issues emerge that threaten both individual and household privacy. This chapter investigates issues relating... Sample PDF
Emerging Technologies, Emerging Privacy Issues
$37.50
Chapter 51
Robert N. Barger
This chapter discusses the ethics of a proof-of-concept demonstration of “parasitic computing.” A “parasite” computer attempts to solve a complex... Sample PDF
Ethics of "Parasitic Computing": Fair Use or Abuse of TCP/IP Over the Internet?
$37.50
Chapter 52
Cecilia Andrews
“Counter-terrorism refers to the practices, tactics and strategies that governments, militaries and other groups adopt in order to fight terrorism.”... Sample PDF
Simulating Complexity-Based Ethics for Crucial Decision Making in Counter Terrorism
$37.50
Chapter 53
Gundars Kaupins
This article summarizes the legal and ethical implications associated with employee location monitoring. It states that few international laws and... Sample PDF
Legal and Ethical Implications of Employee Location Monitoring
$37.50
Chapter 54
Fjodor Ruzic
In today’s dynamic e-business environment where fast time to market is imperative, where information and telecommunications technology is costly and... Sample PDF
New Ethics for E-Business Offshore Outsourcing
$37.50
About the Contributors