David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Studies in Ethics, Law, and Technology 2 (1) (2008)
This paper identifies the unprecedented challenges that the prospects of an `ambient intelligence' era raise from the points of view of `privacy' and data protection. Privacy and data protection are identified, in line with Agre's conceptualization, as complementary and interdependent legal instruments aimed at preserving the individual freedom to build one's own personality without excessive constrains and influences, and to control some aspects of one's identity that one projects on the world. The `performativity' and the distribution of agency that characterize AmI systems are exposed as transversal concerns that threaten the fundamental value grounding both privacy and data protection laws: respect for individual autonomy. The relevance, applicability and adequacy of the European privacy and data protection legal frameworks to deal with those unprecedented challenges are then assessed. That assessment required the rethinking of the scope and the normative grounds of what is meant by the `right to privacy.' Privacy, it is argued, is an instrument for fostering the specific yet changing autonomic capabilities of individuals that are, in a given society at a given time, necessary for sustaining a vivid democracy. What those needed capabilities are is obviously contingent both on the characteristics of the constituency considered, and on the state of the technological, economic and social forces that must be weighed against each other through the operation of legislative balancing. Capacity for both reflexive autonomy allowing one to resist social pressures to conform with dominant drifts, and for deliberative abilities allowing one to participate in deliberative processes are arguably among the skills that a vivid democracy needs citizens to have in the circumstances of our times. The value of privacy today, it will be argued, resides in the support it provides for individuals to develop those aptitudes. Acknowledging both the `intermediate' value of privacy, and its `social-structural' value, the paper aims at clarifying the conceptual intricacies characterizing privacy and data protection, in view of the emerging challenges raised by the exponential development of information and communication technologies on the threshold of an `ambient intelligence era.' Finally the applicability of the European data protection scheme to the types of data processing involved in Ambient Intelligence, and the compatibility of the technical visions embedded in those systems with the fundamental data protection principles, are critically explored
|Keywords||No keywords specified (fix it)|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
Oscar H. Gandy (2010). Engaging Rational Discrimination: Exploring Reasons for Placing Regulatory Constraints on Decision Support Systems. [REVIEW] Ethics and Information Technology 12 (1):29-42.
Similar books and articles
Philip Brey (2005). Freedom and Privacy in Ambient Intelligence. Ethics and Information Technology 7 (3):157-166.
Eleni Kosta, Olli Pitkänen, Marketta Niemelä & Eija Kaasinen (2010). Mobile-Centric Ambient Intelligence in Health- and Homecare—Anticipating Ethical and Legal Challenges. Science and Engineering Ethics 16 (2):303-323.
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. [REVIEW] Identity in the Information Society 3 (2):253-255.
Niels van Dijk (2010). Property, Privacy and Personhood in a World of Ambient Intelligence. Ethics and Information Technology 12 (1):57-69.
Jacques Penders (2004). Privacy in (Mobile) Telecommunications Services. Ethics and Information Technology 6 (4):247-260.
Peter Schaar (2010). Privacy by Design. Identity in the Information Society 3 (2):267-274.
Alexander Dix (2010). Built-in Privacy—No Panacea, but a Necessary Condition for Effective Privacy Protection. Identity in the Information Society 3 (2):257-265.
Gloria González Fuster (2010). Inaccuracy as a Privacy-Enhancing Tool. Ethics and Information Technology 12 (1):87-95.
Herman T. Tavani (1999). Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1 (2):137-145.
Elin Palm (2009). Privacy Expectations at Work—What is Reasonable and Why? Ethical Theory and Moral Practice 12 (2):201 - 215.
Charles Ess (2005). “Lost in translation”?: Intercultural dialogues on privacy and information ethics (introduction to special issue on privacy and data privacy protection in asia). [REVIEW] Ethics and Information Technology 7 (1):1-6.
Herman T. Tavani (1999). KDD, Data Mining, and the Challenge for Normative Privacy. Ethics and Information Technology 1 (4):265-273.
Dag Elgesem (1999). The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data. [REVIEW] Ethics and Information Technology 1 (4):283-293.
Luciano Floridi (2006). Four Challenges for a Theory of Informational Privacy. Ethics and Information Technology 8 (3):109-119.
Added to index2010-09-14
Total downloads12 ( #147,356 of 1,679,325 )
Recent downloads (6 months)4 ( #60,347 of 1,679,325 )
How can I increase my downloads?