Privacy and Manipulation in the Digital Age

Theoretical Inquiries in Law 20 (1):157-188 (2019)
  Copy   BIBTEX

Abstract

The digital age brings with it novel forms of data flow. As a result, individuals are constantly being monitored while consuming products, services and content. These abilities have given rise to a variety of concerns, which are most often framed using “privacy” and “data protection”-related paradigms. An important, oft-noted yet undertheorized concern is that these dynamics might facilitate the manipulation of subjects; a process in which firms strive to motivate and influence individuals to take specific steps and make particular decisions in a manner considered to be socially unacceptable. That it is important and imperative to battle manipulation carries with it a strong intuitive appeal. Intuition, however, does not always indicate the existence of a sound justification or policy option. For that, a deeper analytic and academic discussion is called for. This Article begins by emphasizing the importance of addressing the manipulation-based argument, which derives from several crucial problems and flaws in the legal and policy setting currently striving to meet the challenges of the digital age. Next, the Article examines whether the manipulation-based concerns are sustainable, or are merely a visceral response to changing technologies which cannot be provided with substantial analytical backing. Here the Article details the reasons for striving to block manipulative conduct and, on the other hand, reasons why legal intervention should be, in the best case, limited. The Article concludes with some general implications of this discussion for the broader themes and future directions of privacy law, while trying to ascertain whether the rise of the manipulation-based discourse will lead to information privacy’s expansion or perhaps its demise.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,571

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
Counter-Manipulation and Health Promotion.T. M. Wilkinson - 2017 - Public Health Ethics 10 (3):257-266.
Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva - An Internet Journal of Philosophy 9 (1).
Photographic Manipulation and Photographic Deception.Zsolt Batori - 2018 - Aisthesis. Pratiche, Linguaggi E Saperi Dell’Estetico 11 (2):35-47.
New Ways of Thinking about Privacy.B. Roessler - 2006 - In Anne Philips Bonnie Honig & John Dryzek (eds.), Oxford Handbook of Political Theory. Oxford University Press. pp. 694-713.

Analytics

Added to PP
2019-03-30

Downloads
38 (#416,558)

6 months
8 (#351,566)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Social Media and its Negative Impacts on Autonomy.Siavosh Sahebi & Paul Formosa - 2022 - Philosophy and Technology 35 (3):1-24.

Add more citations

References found in this work

No references found.

Add more references