Skip to main content
Log in

Spyware – the ethics of covert software

  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

Many computer users are happy to be oblivious of the workings within the machine and yet on some level it is important to know what is occurring therein. This paper discusses an unusual type of surveillance software which may be installed in many computers. The strange aspect of this software is that it has often been downloaded and installed by the user, but without her knowledge. The software is mainly designed to collect information about the user of the computer and relay this information back to the software manufacturer. The download, installation, data collection and data transfer all take place within the users own computer but very seldom with the users knowledge. It is the intention of this paper to describe the technology involved and thereafter discuss how this new technology is affecting the online privacy debate. The paper continues to discuss the basis for legitimacy of technology and also the current level of technological deterrents available. The paper concludes with a comparison of two approaches at resolving the current problem, via legislation or the market approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • P.H. Arne and M.M. Bosse. Overview of Clickwrap Agreements, Practising Law Institute, January–March, 2003

  • R. Barbook. The Hi-Tech Gift Economy, First Monday, Volume 3 Number 12–December 7th. 1998, http://www.firstmonday.dk/issues/issue3_12/barbrook/

  • J. Benner. Spyware in a Galaxy Near You. Wired News 24 January, 2002, http://www.wired.com/news/technology/0,1282,49960,00.html

  • J. Bentham. The Panopticon Writings. M. Bozovic. editor Verso Books, 1995

  • N. Bobbio. Rättigheternas Epok. Fovet W. (translator from original L’età dei diritti) Daidalos Publishing, 2001

  • D. Cave. The Parasite Economy, August 02, 2001, Salon.com http://archive.salon.com/tech/feature/2001/08/02/parasite_capital/.

  • M. Delio. Xupiter Mongers Deal Spam, Scams, Wired News 5 February, 2003A, http://www.wired.com/news/infostructure/0,1377,57553,00.html

  • M. Delio. Sneaky Toolbar Hijacks Browsers, Wired News 30 January, 2003B, http://www.wired.com/news/ infostructure/0,1377,57467,00.html

  • M. Foucault (1979) Discipline & Punish: The birth of the prison Vintage Books New York

    Google Scholar 

  • M. Friedman, (1970) The Social Responsibility of Business Is to Increase Its Profits. New York Times Magazine (1␣September 1970). Reprinted in T. Beauchamp, and N.␣Bowie. Ethical Theory and Business, Prentice-Hall, Englewood Cliffs, N.J., 1993.

  • M.P. Furmston (Eds) (1996) Cheshire, Fifoot & Furmston’s Law of Contract Butterworths London

    Google Scholar 

  • P. Gordley (Eds) (1991) The Philosophical Origins of the Modern Contract. Doctrine. Clarendon Press Oxford

    Google Scholar 

  • J. Habermas (1989) The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society MIT Press Cambridge, MA

    Google Scholar 

  • I. Kant. Grounding for the Metaphysics of Morals. H.J. Paton (trans), New York Harper Torchbooks, 1964

  • S. Kern. The Culture of Time and Space 1880-1918, Harvard Univ. Press, Cambridge, MA, 1983

  • R.L. McArthur (2001) ArticleTitleReasonable Expectations of Privacy. Ethics and Information Technology 3 123–128

    Google Scholar 

  • J. McCormick. Habermas’s Discourse Theory of Law: Bridging Anglo-American and Continental Legal Traditions, The Modern Law Review, 60, 1997.

  • B. McWilliams. Cursor Company’s Conduct Cursed, Wired News 6 June, 2002, http://www.wired.com/news/privacy/0,1848,52985,00.html

  • S. Miles. Ad-Aware Maker LavaSoft Frustrates Internet Advertisers, The Wall Street Journal Online, 2002, http://online.wsj.com/article/0,,SB1035830...231.djm,00.html

  • H. Nissenbaum (1995) Should I Copy My Neighbor’s Software? D. Johnson H. Nissenbaum (Eds) Computers, Ethics, and Social Responsibility Prentice-Hall NJ 201–213

    Google Scholar 

  • C. Oakes. Mouse Pointer Records Clicks, Wired News 30 November, 1999, http://www.wired.com/news/technology/ 0,1282,32788,00.html

  • P. Rojas. Kazaa Lite no Spyware aftertaste, Wired News 18 April, 2002, http://www.wired.com/news/mp3/0,1285,51916,00.html

  • D. Rowland and E. McDonald. Information Technology Law, 2nd ed. Cavendish Publishing, 2000

  • S. Warren and L.D. Brandeis. The Right to Privacy, Harvard Law Review, 6(5) December 15. 1890

  • R. Wong. Privacy: Charting its Developments & Prospects. In Klang & Murray editions, Human Rights in the Digital Age, Cavendish Publishing, 2004

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mathias Klang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Klang, M. Spyware – the ethics of covert software. Ethics Inf Technol 6, 193–202 (2004). https://doi.org/10.1007/s10676-004-3392-3

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10676-004-3392-3

Keywords

Navigation