Abstract
Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal data, towards making transparent and controlling the profiling process by which knowledge is produced from these data. The tendency in intellectual property law to commodify information embedded in software and profiles could counteract this shift to transparency and control. These rights obstruct the access and contestation of the design of the code that impacts one's personhood. This triggers a political discussion about the public nature of this code and forces us to rethink the relations between property, privacy and personhood in the digital age.
- Aarts, E., Korst, J., & Verhaegh, W. F. J. (2005). Algorithms in ambient intelligence. In W. Weber, J. M. Rabaey, & E. Aarts (Eds.), Ambient Intelligence. Berlijn: Springer.Google Scholar
- Aarts, E., & Marzano, S. (Eds.). (2003). The new everyday. Views on ambient intelligence. Rotterdam: 010 Publishers.Google Scholar
- Agre, P. E., & Rotenberg, M. (2001). Technology and privacy: The new landscape. Cambridge, Massachusetts: MIT Press. Google Scholar
- Boyle, J. (1997). A politics of intellectual property: Environmentalism for the net? Duke Law Journal, 47(87), 87-116.Google Scholar
- Boyle, J. (2003). The second enclosure movement and the construction of the public domain. Law and Contemporary Problems, 66(33), 33-74.Google Scholar
- Bundesrat, Entwurf eines Gesetzes zur Änderung des Bundesdatenschutzgesetzes, Drucksache 548/08. (2008). http://www.bund esrat.de/cln_090/SharedDocs/Drucksachen/2008/0501-600/548- 08,templateId=raw,property=publicationFile.pdf/548-08.pdf.Google Scholar
- Calabresi, G., & Melamed, A. D. (1972). Property rules, liability rules and inalienability rules: One view of the cathedral. Harvard Law Review, 85(6), 1089-1128.Google ScholarCross Ref
- Clarke, R. (1996). The digital persona and its application to data surveillance. Information Society, 10(2), 77-92.Google Scholar
- Cook, D. J., Augusto, J. C., & Jakkula, V. R. (2009). Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing, 5, 277-298. Google ScholarDigital Library
- Custers, B. (Ed.). (2009). Profiling in financial institutions, future of identity in the information society (FIDIS), D.7.16, at http:// www.fidis.net/resources/deliverables/profiling/.Google Scholar
- Foucault, M. (1979). What is an author? In J. V. Harari (Ed.), Textual strategies. New York: Cornell University Press.Google Scholar
- Foucault, M. (1982). The subject and power. In H. L. Dreyfus & P. Rabinow (Eds.), Michel Foucault: Beyond structuralism and hermeneutics. New York: Harvester Weatsheaf.Google Scholar
- Foucault, M. (1991). Discipline and punish. London: Penguin.Google Scholar
- Foucault, M. (1994). La "Gouvernementalité", in Dits et écrits. Paris: Gallimard.Google Scholar
- Foucault, M. (1996). The ethics of the concern for self as a practice of freedom, in Foucault Live (Interviews 1961-1984), Semiotexte.Google Scholar
- Gandy, O. (2000). Exploring identity and identification in cyberspace. Notre Dame Journal of Law, Ethics, and Public Policy, 14(2), 1085-1111.Google Scholar
- Gandy, O. (2002) Data mining and surveillance in the post 9/11 environment, Presentation at IAMCR (pp. 1-18), Barcelona.Google Scholar
- Goss, J. (1995). We know who you are and we know where you live: The instrumental rationality of geodemographic systems. Economic Geography, 71(2), 171-198.Google ScholarCross Ref
- Gutwirth, S. (2002). Privacy and the information age. Lanham: Rowman & Littlefield.Google Scholar
- Gutwirth, S., & De Hert, P. (2008). Regulating profiling in a democratic constitutional state. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European citizen. Cross disciplinary perspectives. Dordrecht: Springer.Google Scholar
- Hacking, I. (2002). Making up people. In Historical Ontology, (Chapter 6). Harvard: Harvard University Press.Google Scholar
- Hansen, M., Hansen, M., Häuser, M., Janneck, K., Krasemann, H., Meints, M., et al. (2007). Verkettung digitaler Identitäten. Germany: Study Commissioned by the Federal Ministery of Education and Research.Google Scholar
- Heller, M. A., & Eisenberg, R. S. (1998). Can patents deter innovation? The Anticommons in Biomedical Research Science, 280, 698.Google Scholar
- Hettinger, E. C. (1989). Justifying intellectual property. Philosophy and Public Affairs, 18(1), 31-52.Google Scholar
- Hildebrandt, M., & Gutwirth, S. (Eds.). (2008). Profiling the European citizen. Cross disciplinary perspectives. Dordrecht: Springer. Google Scholar
- Hildebrandt, M., & Koops, B. J. (2007). A vision of ambient law, FIDIS Consortium, D.7.9, at http://www.fidis.net/resources/ deliverables/profiling/.Google Scholar
- ITU. (2005). The internet of things, executive summary, international telecommunications union (pp. 1-28). Geneva.Google Scholar
- Kamp, M., & Weichert, T. (2005). Scoringsysteme zur Beurteilung der Kreditwürdigkeit, Kiel, available at: http://www.bmelv.de/ cln_045/nn_749972/SharedDocs/downloads/02-Verbrauchersch utz/Markt/scoring.html__nnn=true.Google Scholar
- Lessig, L. (2006). Code 2.0. New York: Basic Books. Google Scholar
- Locke, J. (1689). Two treatises of government. Cambridge: Cambridge University Press, 2005.Google Scholar
- Locke, J. (1690). An essay concerning human understanding. At http://arts.cuhk.edu.hk/Philosophy/Locke/echu/.Google Scholar
- Marx, K. (1842). Debates on the law of thefts of wood, translation by Dutt, C., from Rheinische Zeitung, No. 298, at http://www. marxists.org/archive/marx/works/1842/10/25.htm#p1.Google Scholar
- Marx, K. (1887). Capital, Vol. 1. The process of production of capital, Progress Publishers, Moscow, at http://www.marxists.org/arch ive/marx/works/1867-c1/.Google Scholar
- McLuhan, M., Fiore, Q., & Agel, J. (1967). The medium is the massage. London: Penguin.Google Scholar
- Philips, D. J. (2005). From privacy to visibility. Context, identity, and power in ubiquitous computing environments. Social Text, 23(2), 95-108.Google Scholar
- Prins, J. E. J. (2006). Property and privacy: European perspectives and the commodification of our identity. In L. Guibault & P. B. Hugenholtz (Eds.), The future of the public domain. Dordrecht: Kluwer Law International.Google Scholar
- Radin, M. J. (1982). Property and personhood. Stanford Law Review, 34(957), 957-1016.Google Scholar
- Rousos, G., & Peterson, D. (2003). Mobile identity management: An enacted view. International Journal of Electronic Commerce, 8, 81-100. Google Scholar
- Schreurs, W., Hildebrandt, M., Kindt, E., & Vanfleteren, M. (2008). The role of data protection and non-discrimination law in group profiling in the private sector. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European Citizen. Cross disciplinary perspectives. Dordrecht: Springer.Google Scholar
- Schwartz, P. (2000). Beyond Lessig's code for the internet privacy: Cyberspace filters, privacy-control and fair information practices. Wisconsin law review, 743, 743-788.Google Scholar
- Strowel, A. (1997). Liberté, Propriété, Originalité: Retour aux sources du Droit d'auteur. In B. Libois & A. Strowel (Eds.), Profils de la Création. Brussels: Facultés universitaires Saint-Louis.Google Scholar
- Van Dijk, N. (2009a). Intellectual rights in profiling processes. In: B. Custers (Ed.), Profiling in financial institutions, future of identity in the information society (FIDIS), D.7.16, at http://www. fidis.net/resources/deliverables/profiling/.Google Scholar
- Van Dijk, N. (2009b). The legal status of profiles, in intelligent environments 2009. In: Proceedings of the 5th international conference on intelligent environments, Barcelona, IOS Press.Google Scholar
- Van Dijk, N. (2009c). Intellectual rights as obstacles for transparency in data protection. In: A. Deuker (Ed.), Mobile marketing in the perspective of identity, privacy and transparency, future of identity in the information society (FIDIS), D.11.12. http://www.fidis.net/resources/deliverables/mobility-and-identity/.Google Scholar
- Warren, S., & Brandeis, L. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220.Google ScholarCross Ref
- Weiser, M. (1991). The computer for the twenty-first century (pp. 94-104). Scientific American, 265, 3, New York: Scientific American.Google Scholar
- Westin, A. F. (1967). Privacy and freedom. London: The Bodley Head.Google Scholar
- Wright, D., Gutwirth, S., Friedewald, M., Vildjiounaite, E., & Punie, Y. (Eds.). (2006). Safeguards in a world of ambient intelligence. Berlin: Springer. Google Scholar
Index Terms
- Property, privacy and personhood in a world of ambient intelligence
Recommendations
Freedom and Privacy in Ambient Intelligence
This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing and Intelligent User Interfaces (IUI's). After an introduction to the approach, two key ethical dimensions will be analyzed: ...
Ambient intelligence - a state of the art from artificial intelligence perspective
EPIA'07: Proceedings of the aritficial intelligence 13th Portuguese conference on Progress in artificial intelligenceAmbient Intelligence (AmI) deals with a new world where computing devices are spread everywhere (ubiquity), allowing the human being to interact in physical world environments in an intelligent and unobtrusive way. These environments should be aware of ...
Context-Awareness in Ambient Intelligence
Ambient Intelligence (AmI) deals with the issue of how we can create context-aware, electronic environments which foster seamless human-computer interaction. Ambient Intelligence encompasses the fields of ubiquitous computing, artificially intelligent ...
Comments