Abstract
Many computer users are happy to be oblivious of the workings within the machine and yet on some level it is important to know what is occurring therein. This paper discusses an unusual type of surveillance software which may be installed in many computers. The strange aspect of this software is that it has often been downloaded and installed by the user, but without her knowledge. The software is mainly designed to collect information about the user of the computer and relay this information back to the software manufacturer. The download, installation, data collection and data transfer all take place within the users own computer but very seldom with the users knowledge. It is the intention of this paper to describe the technology involved and thereafter discuss how this new technology is affecting the online privacy debate. The paper continues to discuss the basis for legitimacy of technology and also the current level of technological deterrents available. The paper concludes with a comparison of two approaches at resolving the current problem, via legislation or the market approach.
Similar content being viewed by others
References
P.H. Arne and M.M. Bosse. Overview of Clickwrap Agreements, Practising Law Institute, January–March, 2003
R. Barbook. The Hi-Tech Gift Economy, First Monday, Volume 3 Number 12–December 7th. 1998, http://www.firstmonday.dk/issues/issue3_12/barbrook/
J. Benner. Spyware in a Galaxy Near You. Wired News 24 January, 2002, http://www.wired.com/news/technology/0,1282,49960,00.html
J. Bentham. The Panopticon Writings. M. Bozovic. editor Verso Books, 1995
N. Bobbio. Rättigheternas Epok. Fovet W. (translator from original L’età dei diritti) Daidalos Publishing, 2001
D. Cave. The Parasite Economy, August 02, 2001, Salon.com http://archive.salon.com/tech/feature/2001/08/02/parasite_capital/.
M. Delio. Xupiter Mongers Deal Spam, Scams, Wired News 5 February, 2003A, http://www.wired.com/news/infostructure/0,1377,57553,00.html
M. Delio. Sneaky Toolbar Hijacks Browsers, Wired News 30 January, 2003B, http://www.wired.com/news/ infostructure/0,1377,57467,00.html
M. Foucault (1979) Discipline & Punish: The birth of the prison Vintage Books New York
M. Friedman, (1970) The Social Responsibility of Business Is to Increase Its Profits. New York Times Magazine (1␣September 1970). Reprinted in T. Beauchamp, and N.␣Bowie. Ethical Theory and Business, Prentice-Hall, Englewood Cliffs, N.J., 1993.
M.P. Furmston (Eds) (1996) Cheshire, Fifoot & Furmston’s Law of Contract Butterworths London
P. Gordley (Eds) (1991) The Philosophical Origins of the Modern Contract. Doctrine. Clarendon Press Oxford
J. Habermas (1989) The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society MIT Press Cambridge, MA
I. Kant. Grounding for the Metaphysics of Morals. H.J. Paton (trans), New York Harper Torchbooks, 1964
S. Kern. The Culture of Time and Space 1880-1918, Harvard Univ. Press, Cambridge, MA, 1983
R.L. McArthur (2001) ArticleTitleReasonable Expectations of Privacy. Ethics and Information Technology 3 123–128
J. McCormick. Habermas’s Discourse Theory of Law: Bridging Anglo-American and Continental Legal Traditions, The Modern Law Review, 60, 1997.
B. McWilliams. Cursor Company’s Conduct Cursed, Wired News 6 June, 2002, http://www.wired.com/news/privacy/0,1848,52985,00.html
S. Miles. Ad-Aware Maker LavaSoft Frustrates Internet Advertisers, The Wall Street Journal Online, 2002, http://online.wsj.com/article/0,,SB1035830...231.djm,00.html
H. Nissenbaum (1995) Should I Copy My Neighbor’s Software? D. Johnson H. Nissenbaum (Eds) Computers, Ethics, and Social Responsibility Prentice-Hall NJ 201–213
C. Oakes. Mouse Pointer Records Clicks, Wired News 30 November, 1999, http://www.wired.com/news/technology/ 0,1282,32788,00.html
P. Rojas. Kazaa Lite no Spyware aftertaste, Wired News 18 April, 2002, http://www.wired.com/news/mp3/0,1285,51916,00.html
D. Rowland and E. McDonald. Information Technology Law, 2nd ed. Cavendish Publishing, 2000
S. Warren and L.D. Brandeis. The Right to Privacy, Harvard Law Review, 6(5) December 15. 1890
R. Wong. Privacy: Charting its Developments & Prospects. In Klang & Murray editions, Human Rights in the Digital Age, Cavendish Publishing, 2004
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Klang, M. Spyware – the ethics of covert software. Ethics Inf Technol 6, 193–202 (2004). https://doi.org/10.1007/s10676-004-3392-3
Issue Date:
DOI: https://doi.org/10.1007/s10676-004-3392-3