skip to main content
article

Property, privacy and personhood in a world of ambient intelligence

Authors Info & Claims
Published:01 March 2010Publication History
Skip Abstract Section

Abstract

Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal data, towards making transparent and controlling the profiling process by which knowledge is produced from these data. The tendency in intellectual property law to commodify information embedded in software and profiles could counteract this shift to transparency and control. These rights obstruct the access and contestation of the design of the code that impacts one's personhood. This triggers a political discussion about the public nature of this code and forces us to rethink the relations between property, privacy and personhood in the digital age.

References

  1. Aarts, E., Korst, J., & Verhaegh, W. F. J. (2005). Algorithms in ambient intelligence. In W. Weber, J. M. Rabaey, & E. Aarts (Eds.), Ambient Intelligence. Berlijn: Springer.Google ScholarGoogle Scholar
  2. Aarts, E., & Marzano, S. (Eds.). (2003). The new everyday. Views on ambient intelligence. Rotterdam: 010 Publishers.Google ScholarGoogle Scholar
  3. Agre, P. E., & Rotenberg, M. (2001). Technology and privacy: The new landscape. Cambridge, Massachusetts: MIT Press. Google ScholarGoogle Scholar
  4. Boyle, J. (1997). A politics of intellectual property: Environmentalism for the net? Duke Law Journal, 47(87), 87-116.Google ScholarGoogle Scholar
  5. Boyle, J. (2003). The second enclosure movement and the construction of the public domain. Law and Contemporary Problems, 66(33), 33-74.Google ScholarGoogle Scholar
  6. Bundesrat, Entwurf eines Gesetzes zur Änderung des Bundesdatenschutzgesetzes, Drucksache 548/08. (2008). http://www.bund esrat.de/cln_090/SharedDocs/Drucksachen/2008/0501-600/548- 08,templateId=raw,property=publicationFile.pdf/548-08.pdf.Google ScholarGoogle Scholar
  7. Calabresi, G., & Melamed, A. D. (1972). Property rules, liability rules and inalienability rules: One view of the cathedral. Harvard Law Review, 85(6), 1089-1128.Google ScholarGoogle ScholarCross RefCross Ref
  8. Clarke, R. (1996). The digital persona and its application to data surveillance. Information Society, 10(2), 77-92.Google ScholarGoogle Scholar
  9. Cook, D. J., Augusto, J. C., & Jakkula, V. R. (2009). Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing, 5, 277-298. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Custers, B. (Ed.). (2009). Profiling in financial institutions, future of identity in the information society (FIDIS), D.7.16, at http:// www.fidis.net/resources/deliverables/profiling/.Google ScholarGoogle Scholar
  11. Foucault, M. (1979). What is an author? In J. V. Harari (Ed.), Textual strategies. New York: Cornell University Press.Google ScholarGoogle Scholar
  12. Foucault, M. (1982). The subject and power. In H. L. Dreyfus & P. Rabinow (Eds.), Michel Foucault: Beyond structuralism and hermeneutics. New York: Harvester Weatsheaf.Google ScholarGoogle Scholar
  13. Foucault, M. (1991). Discipline and punish. London: Penguin.Google ScholarGoogle Scholar
  14. Foucault, M. (1994). La "Gouvernementalité", in Dits et écrits. Paris: Gallimard.Google ScholarGoogle Scholar
  15. Foucault, M. (1996). The ethics of the concern for self as a practice of freedom, in Foucault Live (Interviews 1961-1984), Semiotexte.Google ScholarGoogle Scholar
  16. Gandy, O. (2000). Exploring identity and identification in cyberspace. Notre Dame Journal of Law, Ethics, and Public Policy, 14(2), 1085-1111.Google ScholarGoogle Scholar
  17. Gandy, O. (2002) Data mining and surveillance in the post 9/11 environment, Presentation at IAMCR (pp. 1-18), Barcelona.Google ScholarGoogle Scholar
  18. Goss, J. (1995). We know who you are and we know where you live: The instrumental rationality of geodemographic systems. Economic Geography, 71(2), 171-198.Google ScholarGoogle ScholarCross RefCross Ref
  19. Gutwirth, S. (2002). Privacy and the information age. Lanham: Rowman & Littlefield.Google ScholarGoogle Scholar
  20. Gutwirth, S., & De Hert, P. (2008). Regulating profiling in a democratic constitutional state. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European citizen. Cross disciplinary perspectives. Dordrecht: Springer.Google ScholarGoogle Scholar
  21. Hacking, I. (2002). Making up people. In Historical Ontology, (Chapter 6). Harvard: Harvard University Press.Google ScholarGoogle Scholar
  22. Hansen, M., Hansen, M., Häuser, M., Janneck, K., Krasemann, H., Meints, M., et al. (2007). Verkettung digitaler Identitäten. Germany: Study Commissioned by the Federal Ministery of Education and Research.Google ScholarGoogle Scholar
  23. Heller, M. A., & Eisenberg, R. S. (1998). Can patents deter innovation? The Anticommons in Biomedical Research Science, 280, 698.Google ScholarGoogle Scholar
  24. Hettinger, E. C. (1989). Justifying intellectual property. Philosophy and Public Affairs, 18(1), 31-52.Google ScholarGoogle Scholar
  25. Hildebrandt, M., & Gutwirth, S. (Eds.). (2008). Profiling the European citizen. Cross disciplinary perspectives. Dordrecht: Springer. Google ScholarGoogle Scholar
  26. Hildebrandt, M., & Koops, B. J. (2007). A vision of ambient law, FIDIS Consortium, D.7.9, at http://www.fidis.net/resources/ deliverables/profiling/.Google ScholarGoogle Scholar
  27. ITU. (2005). The internet of things, executive summary, international telecommunications union (pp. 1-28). Geneva.Google ScholarGoogle Scholar
  28. Kamp, M., & Weichert, T. (2005). Scoringsysteme zur Beurteilung der Kreditwürdigkeit, Kiel, available at: http://www.bmelv.de/ cln_045/nn_749972/SharedDocs/downloads/02-Verbrauchersch utz/Markt/scoring.html__nnn=true.Google ScholarGoogle Scholar
  29. Lessig, L. (2006). Code 2.0. New York: Basic Books. Google ScholarGoogle Scholar
  30. Locke, J. (1689). Two treatises of government. Cambridge: Cambridge University Press, 2005.Google ScholarGoogle Scholar
  31. Locke, J. (1690). An essay concerning human understanding. At http://arts.cuhk.edu.hk/Philosophy/Locke/echu/.Google ScholarGoogle Scholar
  32. Marx, K. (1842). Debates on the law of thefts of wood, translation by Dutt, C., from Rheinische Zeitung, No. 298, at http://www. marxists.org/archive/marx/works/1842/10/25.htm#p1.Google ScholarGoogle Scholar
  33. Marx, K. (1887). Capital, Vol. 1. The process of production of capital, Progress Publishers, Moscow, at http://www.marxists.org/arch ive/marx/works/1867-c1/.Google ScholarGoogle Scholar
  34. McLuhan, M., Fiore, Q., & Agel, J. (1967). The medium is the massage. London: Penguin.Google ScholarGoogle Scholar
  35. Philips, D. J. (2005). From privacy to visibility. Context, identity, and power in ubiquitous computing environments. Social Text, 23(2), 95-108.Google ScholarGoogle Scholar
  36. Prins, J. E. J. (2006). Property and privacy: European perspectives and the commodification of our identity. In L. Guibault & P. B. Hugenholtz (Eds.), The future of the public domain. Dordrecht: Kluwer Law International.Google ScholarGoogle Scholar
  37. Radin, M. J. (1982). Property and personhood. Stanford Law Review, 34(957), 957-1016.Google ScholarGoogle Scholar
  38. Rousos, G., & Peterson, D. (2003). Mobile identity management: An enacted view. International Journal of Electronic Commerce, 8, 81-100. Google ScholarGoogle Scholar
  39. Schreurs, W., Hildebrandt, M., Kindt, E., & Vanfleteren, M. (2008). The role of data protection and non-discrimination law in group profiling in the private sector. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European Citizen. Cross disciplinary perspectives. Dordrecht: Springer.Google ScholarGoogle Scholar
  40. Schwartz, P. (2000). Beyond Lessig's code for the internet privacy: Cyberspace filters, privacy-control and fair information practices. Wisconsin law review, 743, 743-788.Google ScholarGoogle Scholar
  41. Strowel, A. (1997). Liberté, Propriété, Originalité: Retour aux sources du Droit d'auteur. In B. Libois & A. Strowel (Eds.), Profils de la Création. Brussels: Facultés universitaires Saint-Louis.Google ScholarGoogle Scholar
  42. Van Dijk, N. (2009a). Intellectual rights in profiling processes. In: B. Custers (Ed.), Profiling in financial institutions, future of identity in the information society (FIDIS), D.7.16, at http://www. fidis.net/resources/deliverables/profiling/.Google ScholarGoogle Scholar
  43. Van Dijk, N. (2009b). The legal status of profiles, in intelligent environments 2009. In: Proceedings of the 5th international conference on intelligent environments, Barcelona, IOS Press.Google ScholarGoogle Scholar
  44. Van Dijk, N. (2009c). Intellectual rights as obstacles for transparency in data protection. In: A. Deuker (Ed.), Mobile marketing in the perspective of identity, privacy and transparency, future of identity in the information society (FIDIS), D.11.12. http://www.fidis.net/resources/deliverables/mobility-and-identity/.Google ScholarGoogle Scholar
  45. Warren, S., & Brandeis, L. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220.Google ScholarGoogle ScholarCross RefCross Ref
  46. Weiser, M. (1991). The computer for the twenty-first century (pp. 94-104). Scientific American, 265, 3, New York: Scientific American.Google ScholarGoogle Scholar
  47. Westin, A. F. (1967). Privacy and freedom. London: The Bodley Head.Google ScholarGoogle Scholar
  48. Wright, D., Gutwirth, S., Friedewald, M., Vildjiounaite, E., & Punie, Y. (Eds.). (2006). Safeguards in a world of ambient intelligence. Berlin: Springer. Google ScholarGoogle Scholar

Index Terms

  1. Property, privacy and personhood in a world of ambient intelligence
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access