Skip to main content
Log in

Property, privacy and personhood in a world of ambient intelligence

  • Original Paper
  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal data, towards making transparent and controlling the profiling process by which knowledge is produced from these data. The tendency in intellectual property law to commodify information embedded in software and profiles could counteract this shift to transparency and control. These rights obstruct the access and contestation of the design of the code that impacts one’s personhood. This triggers a political discussion about the public nature of this code and forces us to rethink the relations between property, privacy and personhood in the digital age.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Aarts, E., Korst, J., & Verhaegh, W. F. J. (2005). Algorithms in ambient intelligence. In W. Weber, J. M. Rabaey, & E. Aarts (Eds.), Ambient Intelligence. Berlijn: Springer.

    Google Scholar 

  • Aarts, E., & Marzano, S. (Eds.). (2003). The new everyday. Views on ambient intelligence. Rotterdam: 010 Publishers.

    Google Scholar 

  • Agre, P. E., & Rotenberg, M. (2001). Technology and privacy: The new landscape. Cambridge, Massachusetts: MIT Press.

    Google Scholar 

  • Boyle, J. (1997). A politics of intellectual property: Environmentalism for the net? Duke Law Journal, 47(87), 87–116.

    Article  Google Scholar 

  • Boyle, J. (2003). The second enclosure movement and the construction of the public domain. Law and Contemporary Problems, 66(33), 33–74.

    Google Scholar 

  • Bundesrat, Entwurf eines Gesetzes zur Änderung des Bundesdatenschutzgesetzes, Drucksache 548/08. (2008). http://www.bundesrat.de/cln_090/SharedDocs/Drucksachen/2008/0501-600/548-08,templateId=raw,property=publicationFile.pdf/548-08.pdf.

  • Calabresi, G., & Melamed, A. D. (1972). Property rules, liability rules and inalienability rules: One view of the cathedral. Harvard Law Review, 85(6),1089–1128.

    Google Scholar 

  • Clarke, R. (1996). The digital persona and its application to data surveillance. Information Society, 10(2), 77–92.

    Google Scholar 

  • Cook, D. J., Augusto, J. C., & Jakkula, V. R. (2009). Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing, 5, 277–298.

    Article  Google Scholar 

  • Custers, B. (Ed.). (2009). Profiling in financial institutions, future of identity in the information society (FIDIS), D.7.16, at http://www.fidis.net/resources/deliverables/profiling/.

  • Foucault, M. (1979). What is an author? In J. V. Harari (Ed.), Textual strategies. New York: Cornell University Press.

    Google Scholar 

  • Foucault, M. (1982). The subject and power. In H. L. Dreyfus & P. Rabinow (Eds.), Michel Foucault: Beyond structuralism and hermeneutics. New York: Harvester Weatsheaf.

    Google Scholar 

  • Foucault, M. (1991). Discipline and punish. London: Penguin.

    Google Scholar 

  • Foucault, M. (1994). La “Gouvernementalité”, in Dits et écrits. Paris: Gallimard.

    Google Scholar 

  • Foucault, M. (1996). The ethics of the concern for self as a practice of freedom, in Foucault Live (Interviews 1961–1984), Semiotexte.

  • Gandy, O. (2000). Exploring identity and identification in cyberspace. Notre Dame Journal of Law, Ethics, and Public Policy, 14(2), 1085–1111.

    Google Scholar 

  • Gandy, O. (2002) Data mining and surveillance in the post 9/11 environment, Presentation at IAMCR (pp. 1–18), Barcelona.

  • Goss, J. (1995). We know who you are and we know where you live: The instrumental rationality of geodemographic systems. Economic Geography, 71(2), 171–198.

    Article  MathSciNet  Google Scholar 

  • Gutwirth, S. (2002). Privacy and the information age. Lanham: Rowman & Littlefield.

    Google Scholar 

  • Gutwirth, S., & De Hert, P. (2008). Regulating profiling in a democratic constitutional state. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European citizen. Cross disciplinary perspectives. Dordrecht: Springer.

    Google Scholar 

  • Hacking, I. (2002). Making up people. In Historical Ontology, (Chapter 6). Harvard: Harvard University Press

  • Hansen, M., Hansen, M., Häuser, M., Janneck, K., Krasemann, H., Meints, M., et al. (2007). Verkettung digitaler Identitäten. Germany: Study Commissioned by the Federal Ministery of Education and Research.

  • Heller, M. A., & Eisenberg, R. S. (1998). Can patents deter innovation? The Anticommons in Biomedical Research Science, 280, 698.

    Google Scholar 

  • Hettinger, E. C. (1989). Justifying intellectual property. Philosophy and Public Affairs, 18(1), 31–52.

  • Hildebrandt, M., & Gutwirth, S. (Eds.). (2008). Profiling the European citizen. Cross disciplinary perspectives. Dordrecht: Springer.

    Google Scholar 

  • Hildebrandt, M., & Koops, B. J. (2007). A vision of ambient law, FIDIS Consortium, D.7.9, at http://www.fidis.net/resources/deliverables/profiling/.

  • ITU. (2005). The internet of things, executive summary, international telecommunications union (pp. 1–28). Geneva.

  • Kamp, M., & Weichert, T. (2005). Scoringsysteme zur Beurteilung der Kreditwürdigkeit, Kiel, available at: http://www.bmelv.de/cln_045/nn_749972/SharedDocs/downloads/02-Verbraucherschutz/Markt/scoring.html__nnn=true.

  • Lessig, L. (2006). Code 2.0. New York: Basic Books.

    Google Scholar 

  • Locke, J. (1689). Two treatises of government. Cambridge: Cambridge University Press, 2005.

  • Locke, J. (1690). An essay concerning human understanding. At http://arts.cuhk.edu.hk/Philosophy/Locke/echu/.

  • Marx, K. (1842). Debates on the law of thefts of wood, translation by Dutt, C., from Rheinische Zeitung, No. 298, at http://www.marxists.org/archive/marx/works/1842/10/25.htm#p1.

  • Marx, K. (1887). Capital, Vol. 1. The process of production of capital, Progress Publishers, Moscow, at http://www.marxists.org/archive/marx/works/1867-c1/.

  • McLuhan, M., Fiore, Q., & Agel, J. (1967). The medium is the massage. London: Penguin.

    Google Scholar 

  • Philips, D. J. (2005). From privacy to visibility. Context, identity, and power in ubiquitous computing environments. Social Text, 23(2), 95–108.

    Article  Google Scholar 

  • Prins, J. E. J. (2006). Property and privacy: European perspectives and the commodification of our identity. In L. Guibault & P. B. Hugenholtz (Eds.), The future of the public domain. Dordrecht: Kluwer Law International.

    Google Scholar 

  • Radin, M. J. (1982). Property and personhood. Stanford Law Review, 34(957), 957–1016.

    Article  Google Scholar 

  • Rousos, G., & Peterson, D. (2003). Mobile identity management: An enacted view. International Journal of Electronic Commerce, 8, 81–100.

    Google Scholar 

  • Schreurs, W., Hildebrandt, M., Kindt, E., & Vanfleteren, M. (2008). The role of data protection and non-discrimination law in group profiling in the private sector. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European Citizen. Cross disciplinary perspectives. Dordrecht: Springer.

    Google Scholar 

  • Schwartz, P. (2000). Beyond Lessig′s code for the internet privacy: Cyberspace filters, privacy-control and fair information practices. Wisconsin law review, 743, 743–788.

    Google Scholar 

  • Strowel, A. (1997). Liberté, Propriété, Originalité: Retour aux sources du Droit d’auteur. In B. Libois & A. Strowel (Eds.), Profils de la Création. Brussels: Facultés universitaires Saint-Louis.

    Google Scholar 

  • Van Dijk, N. (2009a). Intellectual rights in profiling processes. In: B. Custers (Ed.), Profiling in financial institutions, future of identity in the information society (FIDIS), D.7.16, at http://www.fidis.net/resources/deliverables/profiling/.

  • Van Dijk, N. (2009b). The legal status of profiles, in intelligent environments 2009. In: Proceedings of the 5th international conference on intelligent environments, Barcelona, IOS Press.

  • Van Dijk, N. (2009c). Intellectual rights as obstacles for transparency in data protection. In: A. Deuker (Ed.), Mobile marketing in the perspective of identity, privacy and transparency, future of identity in the information society (FIDIS), D.11.12. http://www.fidis.net/resources/deliverables/mobility-and-identity/.

  • Warren, S., & Brandeis, L. (1890). The right to privacy. Harvard Law Review, 4(5), 193–220.

    Google Scholar 

  • Weiser, M. (1991). The computer for the twenty-first century (pp. 94–104). Scientific American, 265, 3, New York: Scientific American.

  • Westin, A. F. (1967). Privacy and freedom. London: The Bodley Head.

    Google Scholar 

  • Wright, D., Gutwirth, S., Friedewald, M., Vildjiounaite, E., & Punie, Y. (Eds.). (2006). Safeguards in a world of ambient intelligence. Berlin: Springer.

    Google Scholar 

Download references

Acknowledgments

I would like to thank Mireille Hildebrandt, Serge Gutwirth, Katja de Vries and Sari Depreeuw for their valuable comments on earlier drafts of this article. I would also like the anonymous reviewers whose comments have proved to be very instructive and inspiring.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Niels van Dijk.

Rights and permissions

Reprints and permissions

About this article

Cite this article

van Dijk, N. Property, privacy and personhood in a world of ambient intelligence. Ethics Inf Technol 12, 57–69 (2010). https://doi.org/10.1007/s10676-009-9211-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10676-009-9211-0

Keywords

Navigation