In D. E. Wittkower (ed.), Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Norfolk, VA, USA: Old Dominion. pp. 2-8 (2019)

James Brusseau
Pace University
Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, transient existence responds to privacy’s loss by ceaselessly generating new personal identities, which translates into constantly producing temporarily unviolated private information. The ethics is explored through Gilles Deleuze’s metaphysics of difference applied in linguistic terms to the formation of the self. Comparing the exposure and transience alternatives leads to the conclusion that today’s big data reality splits the traditional ethical link between authenticity and freedom. Exposure provides authenticity, but negates human freedom. Transience provides freedom, but disdains authenticity.
Keywords Big data  Privacy  Personal identity  Freedom  Authenticity  Artificial Intelligence  Ethics
Categories (categorize this paper)
Buy the book Find it on
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

PhilArchive copy

 PhilArchive page | Other versions
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

Introduction to Data Ethics.James Brusseau - 2018 - In The Business Ethics Workshop, 3rd Edition. Boston, USA: Boston Academic Publishing / Flatworld Knowledge. pp. 349-376.
Informational Privacy, Data Mining, and the Internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Four Challenges for a Theory of Informational Privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
Inaccuracy as a Privacy-Enhancing Tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
Freedom and Privacy in Ambient Intelligence.Philip Brey - 2005 - Ethics and Information Technology 7 (3):157-166.
The Importance of Privacy Revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
Data Science and Designing for Privacy.Michael Falgoust - 2016 - Techné: Research in Philosophy and Technology 20 (1):51-68.
Opinion Paper: Pluralism About the Value of Privacy.William Bülow - 2011 - International Review of Information Ethics 16:85-88.
KDD, Data Mining, and the Challenge for Normative Privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
The Ontological Interpretation of Informational Privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.


Added to PP index

Total views
89 ( #122,264 of 2,454,617 )

Recent downloads (6 months)
14 ( #47,227 of 2,454,617 )

How can I increase my downloads?


My notes