Skip to main content
Log in

Four challenges for a theory of informational privacy

  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In the conclusion, I discuss some of the work that lies ahead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Ariáes P., Duby. G. (1987) A History of Private Life 5 vols. Belknap Press of Harvard University Press, Cambridge, Mass, London

    Google Scholar 

  2. I. Asimov. The Dead Past. In Astounding Science Fiction, 6–46, 1956. manca qualche informazione, no?

  3. Bäck E., Wikblad K. (1998) Privacy in Hospital. Journal of Advanced Nursing 27(5):940–945

    Article  Google Scholar 

  4. S.I. Benn. Privacy, Freedom, and Respect for Persons. In Richard Wasserstrom, editor, Today’s Moral Problems. Macmillan, New York, 1975

  5. Bloustein E. (1964) Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser. New York University Law Review 39:962–1007

    Google Scholar 

  6. Cohen J. (2000) Examined Lives: Informational Privacy and the Subject as Object. Stanford Law Review 52:1373–1437

    Article  Google Scholar 

  7. C. Ess, editor, Special Issue on Privacy and Data Privacy Protection in Asia (Ethics and Information Technology), 2005

  8. L. Floridi On the Intrinsic Value of Information Objects and the Infosphere. In Ethics and Information Technology, 4(4): 287–304, 2003

  9. L. Floridi Is Information Meaningful Data? In Philosophy and Phenomenological Research 70(2): 351–370, 2005

  10. Floridi L. (2005) The Ontological Interpretation of Informational Privacy. Ethics and Information Technology 7(4):185–200

    Article  Google Scholar 

  11. L. Floridi, Information Ethics. In Jeroen van den Hoven and John Weckert, editors, Moral Philosophy and Information Technology, Cambridge University Press, Cambridge, forthcoming

  12. L. Floridi. The Logic of Being Informed. Logique et Analyse, forthcoming

  13. Floridi L., Sanders J.W. (2004) On the Morality of Artificial Agents. Minds and Machines 14(3):349–379

    Article  Google Scholar 

  14. Floridi L., Sanders. J.W. (2005) Internet Ethics: The Constructionist Values of Homo Poieticus. In Robert Cavalier (editor) The Impact of the Internet on Our Moral Lives. SUNY, New York

    Google Scholar 

  15. Fried C. (1970) An Anatomy of Values: Problems of Personal and Social Choice. Harvard University Press, Cambridge, Mass

    Google Scholar 

  16. Gibson J.J. (1979) The Ecological Approach to Visual Perception. Houghton Mifflin, Boston, London

    Google Scholar 

  17. Hongladarom S. (2006) Analysis and Justification of Privacy from a Buddhist Perspective. In Hongladarom S., Ess C. (editors) Information Technology Ethics: Cultural Perspectives. Idea Publishing, Hershey, Pennsylvania

    Google Scholar 

  18. Inness J.C. (1996) Privacy, Intimacy, and Isolation. Oxford University Press, New York

    Google Scholar 

  19. Introna L.D. (1997) Privacy and the Computer: Why We Need Privacy in the Information Society. Metaphilosophy 28(3):259–275

    Article  Google Scholar 

  20. Johnson D.G. (1985) Computer Ethics. Prentice-Hall, Englewood Cliffs

    Google Scholar 

  21. Johnson D.G. (2001) Computer Ethics, 3rd ed. Prentice-Hall, Upper Saddle River, NJ

    Google Scholar 

  22. Johnson J.L. (1992) A Theory of the Nature of Value of Privacy. Public Affairs Quarterly 6(3):271–288

    Google Scholar 

  23. Kitiyadisai K. (2005) Privacy Rights and Protection: Foreign Values in Modern Thai Context. Ethics and Information Technology 7(1):17–26

    Article  Google Scholar 

  24. Margulis S.T. (2003) Privacy as a Social Issue and Behavioral Concept. Journal of Social Issues. 59(2):243–261

    Article  Google Scholar 

  25. Moor J.H. (1997) Towards a Theory of Privacy in the Information Age. ACM SIGCAS Computers and Society. 27:27–32

    Article  Google Scholar 

  26. Nakada M., Tamura T. (2005) Japanese Conceptions of Privacy: An Intercultural Perspective. Ethics and Information Technology 7(1):27–36

    Article  Google Scholar 

  27. Nissenbaum H. (1998) Protecting Privacy in an Information Age: The Problem of Privacy in Public. Law and Philosophy 17(5–6):559–596

    Article  Google Scholar 

  28. Rachels J. (1975) Why Privacy Is Important. Philosophy and Public Affairs 4:323–333

    Google Scholar 

  29. Reiman J.H. (1976) Privacy, Intimacy, and Personhood. Philosophy and Public Affairs 6(1):26–44

    Google Scholar 

  30. Scanlon T. (1975) Thomson on Privacy. Philosophy and Public Affairs 4:315–322

    Google Scholar 

  31. Schachter M. (2003) Informational and Decisional Privacy. Carolina Academic Press, Durham, N.C

    Google Scholar 

  32. Seltzer W., Anderson M. (2001) The Dark Side of Numbers: The Role of Population Data Systems in Human Rights Abuses. Social Research 68(2):339–371

    Google Scholar 

  33. Solove D.J. (2002) Conceptualizing Privacy. California Law Review 90:1087–1155

    Google Scholar 

  34. Thompson J. (1996) Models of Value: Eighteenth-Century Political Economy and the Novel. Duke University Press, Durham, N.C. London

    Google Scholar 

  35. Thomson J. (1975) The Right to Privacy. Philosophy and Public Affairs 4:295–314

    Google Scholar 

  36. M. Turilli. Ethical Protocols Design, Ethics and Information Technology, forthcoming

  37. Volkman R. (2003) Privacy as Life, Liberty, Property. Ethics and Information Technology 5(4):199–210

    Article  Google Scholar 

  38. S. Warren and L.D. Brandeis. The Right to Privacy. Harvard Law Review, 193(4), 1890

Download references

Acknowledgements

This paper is a fully revised version of a presentation given at the international workshop “Bridging Cultures: Computer Ethics, Culture, and ICT”, organised by the Programme for Applied Ethics in association with the Globalisation programme at NTNU (the Norwegian University of Science and Technology, Trondheim, Norway, June 6th–7th 2005). For that opportunity and for the feedback received, I wish to thank Charles Ess and May Thorseth (co-organisers), Eric Monteiro, Knut Rolland, Johnny Søraker, Bernd Carsten Stahl, Deborah Wheeler and all the students who took part to the workshop, and, for the financial support, NTNU. Charles Ess shared with me some important insights while discussing the final draft, and I hope I managed to take full advantage of his suggestions. As usual, all remaining mistakes are unfortunately mine.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luciano Floridi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Floridi, L. Four challenges for a theory of informational privacy. Ethics Inf Technol 8, 109–119 (2006). https://doi.org/10.1007/s10676-006-9121-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10676-006-9121-3

Keywords

Navigation