Abstract
The Internet of Things (IoT) is, in part, an information handling system that can remove humans from the information handling process. The particular problem explored is how we are to understand privacy when considering informational systems that handle personal information in ways that impact people’s lives when there is no human operator in direct contact with that personal information. I argue that these new technologies need to take concepts like privacy into account, but also, that we ought also to take these technologies into account to reconsider and perhaps reconceptualise privacy. This paper argues that while an inhuman system like the IoT does not necessarily violate the interpersonal privacy of people, if the IoT is used as part of a state surveillance program, a political notion of privacy may be violated.
Funding statement: This work was supported by European Research Council, Funder Id:, Grant Number: Project Title: Global Terrorism and Collective Mor, Australian Research Council, Funder Id: https://doi.org/10.13039/501100000923, Grant Number: DP180103439: Intelligence And National Security: E.
Acknowledgements
I thank CJ O’Connor for useful feedback on this paper, Kevin Macnish for insightful discussions on the nature of privacy, and the anonymous reviewers and editor for their useful feedback, comments, and suggestions.
Research for this paper was supported by funding from the Australia Research Council for DP180103439, ‘Intelligence and National Security: Ethics, Efficacy and Accountability’ and the European Research Council grant on ‘Global Terrorism and Collective Moral Responsibility: Redesigning Military, Police and Intelligence Institutions in Liberal Democracies.’
References
AAP (2019). ‘Google Listens to User Speaker Recordings’, SBS News, July 11.Search in Google Scholar
Allenby, B. (2013). ‘Emerging Technologies and Just War Theory’, in F. Allhoff, N.G. Evans and A. Henschke (eds.). Routledge Handbook of Ethics and War: Just War in the Twenty-First Century (Abingdon: Routledge), pp. 289–300.10.4324/9780203107164.ch21Search in Google Scholar
Allhoff, F. (2011). ‘What Are Applied Ethics?’ Science And Engineering Ethics 17 (1): 19.10.1007/s11948-010-9200-zSearch in Google Scholar
Allhoff, F. and Henschke, A. (2018). ‘The Internet of Things: Foundational Ethical Issues’, Internet Of Things 1-2: 55–66. doi: https://doi.org/10.1016/j.iot.2018.08.005.Search in Google Scholar
Bianchi, M.T. (2015). ‘Consumer Sleep Apps: When It Comes to the Big Picture, It’s All about the Frame’, Journal Of Clinical Sleep Medicine 11 (7): 695–696.10.5664/jcsm.4834Search in Google Scholar
Bogle, A. (2018). ‘Strava Has Published Details about Secret Military Bases, and an Australian Was the First to Know’, ABC News, 30 January.Search in Google Scholar
Cheng, K. (2019). ‘Police in Chinese City Punish Jaywalkers by Classifying Them as “Untrustworthy People” in Country’s Social Credit System’, Daily Mail, July 9.Search in Google Scholar
Cohen, J.E. (2012). ‘What Privacy Is For’, Harvard Law Review 126: 1904.Search in Google Scholar
Connor, K. (2019a). ‘Schedule an Uber or Lyft with Your Amazon Echo. Here’s How.’ C|net, June 24.Search in Google Scholar
Connor, K. (2019b). ‘Skip the Swiping and Ask Amazon Echo to Order Your Pizza for You’, C|net, June 17.Search in Google Scholar
D’Onfro, J. (2019). ‘Amazon’s New Delivery Drone Will Start Shipping Packages “In a Matter of Months”, Forbes, June 5.Search in Google Scholar
Ferguson, A.G. (2018). ‘Alexa, What Is Probable Cause?’ Slate, November 20.Search in Google Scholar
Floridi, L. (2002). ‘What Is the Philosophy of Information?’ Metaphilosophy 33 (1&2): 123–145.10.1093/acprof:oso/9780199232383.003.0001Search in Google Scholar
Floridi, L. (2004). ‘Information’, in F. Luciano (ed.). The Blackwell Guide to the Philosophy of Computing and Information (Oxford: Blackwell Publishing), pp. 40–62.10.1002/9780470757017Search in Google Scholar
Floridi, L. (2005). ‘Is Semantic Information Meaningful Data?’ Philosophy and Phenomenological Research 70 (2): 351–370. doi: 10.1111/j.1933-1592.2005.tb00531.x.Search in Google Scholar
Floridi, L. (2011). The Philosophy Of Information (Oxford: Oxford University Press).10.1093/acprof:oso/9780199232383.001.0001Search in Google Scholar
Floridi, L. (2019). ‘Semantic Conceptions of Information’, in E.N. Zalta (ed.). The Stanford Encyclopedia of Philosophy. <https://plato.stanford.edu/archives/win2019/entries/information-semantic/>.Search in Google Scholar
Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (New York: Metropolitan Books).Search in Google Scholar
Grice, H.P. (1957). ‘Meaning’, The Philosophical Review 66 (3): 377–388.10.2307/2182440Search in Google Scholar
Griffin, J. (2008). On Human Rights Oxford: Oxford University Press.10.1093/acprof:oso/9780199238781.001.0001Search in Google Scholar
Harwell, D. (2019). ‘Doorbell-Camera Firm Ring Has Partnered with 400 Police Forces, Extending Surveillance Concerns’, Washington Post, August 29.Search in Google Scholar
Hearn, L. (2010). ‘Google on Privacy: Change Your Name’, Sydney Morning Herald, August 17.Search in Google Scholar
Henschke, A. (2017a). Ethics in an Age of Surveillance: Virtual Identities and Personal Information (New York: Cambridge University Press).10.1017/9781316417249Search in Google Scholar
Henschke, A. (2017b). ‘The Internet of Things and Dual Layers of Ethical Concern’, in P. Lin, K. Abney and R. Jenkins (eds.). Robot Ethics (Oxford: Oxford University Press), pp. 55–66.10.1093/oso/9780190652951.003.0015Search in Google Scholar
Henschke, A. (2018). ‘Conceptualising Proportionality and Its Relation to Metadata’, in D. Baldino and R. Crawley. Intelligence and the Function of Government (Melbourne: Melbourne University Press), pp. 221–242.Search in Google Scholar
Hill, K. (2012). ‘How Target Figured Out a Teen Girl Was Pregnant before Her Father Did’, Forbes, February 16.Search in Google Scholar
Inness, J.C. (1992). Privacy, Intimacy, and Isolation (New York: Oxford University Press).Search in Google Scholar
Knaus, C. (2018). ‘Just 53 Australians Used Facebook App Responsible For Cambridge Analytica Breach’, The Guardian, April 10.Search in Google Scholar
Koops, B.-J., Newell, B.C., Timan, T., Skorvanek, I., Chokrevski, T., and Galic, M. (2016). ‘A Typology Of Privacy’, University of Pennsylvania Journal of International Law 38 (2): 483.Search in Google Scholar
Kuo, L. (2019). ‘China Bans 23m from Buying Travel Tickets as Part of “Social Credit” System’, The Guardian, March 2.Search in Google Scholar
Lewis, P. (2018). ‘Trump Adviser John Bolton Worked with Cambridge Analytica on YouTube Voter Experiment’, The Guardian, March 23.Search in Google Scholar
Li, S., Xu, L.D., and Zhao, S. (2015). ‘The Internet of Things: A Survey’, Information Systems Frontiers 17 (2): 243–259. doi: 10.1007/s10796-014-9492-7.Search in Google Scholar
Macnish, K. (2018). ‘Government Surveillance and Why Defining Privacy Matters in a Post-Snowden World’, Journal Of Applied Philosophy 35 (2): 417–432.10.1111/japp.12219Search in Google Scholar
Marshall, A. (2019. ‘A Bet on Uber Is A Bet on Self Driving’, Wired, October 5.Search in Google Scholar
Matyszczyk, C. (2015). ‘Samsung’s Warning: Our Smart TVs Record Your Living Room Chatter’, CNet, February 8.Search in Google Scholar
Michaelsen, C. (2010). ‘The Proportionality Principle, Counterterrorism and Human Rights: A German-Australian Comparison’, City University Of Hong Kong Law Review 21 (1): 19–43.Search in Google Scholar
Mokrosinska, D. (2014). ‘Privacy and the Integrity of Liberal Politics: The Case of Governmental Internet Searches’, Journal Of Social Philosophy 45 (3): 369–389. doi: 10.1111/josp.12068.Search in Google Scholar
Neale, S. (1992). ‘Paul Grice and the Philosophy of Language’, Linguistics And Philosophy 15 (5): 509–559.10.1007/BF00630629Search in Google Scholar
Nissenbaum, H. (2004). ‘Privacy as Contextual Integrity’, Washington Law Review 79 (1): 119–158.Search in Google Scholar
Nissenbaum, H. (2009). Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford: Stanford University Press).10.1515/9780804772891Search in Google Scholar
Reiman, J.H. (1976). ‘Privacy, Intimacy, and Personhood’, Philosophy and Public Affairs 6 (1): 26–44.Search in Google Scholar
Schiffer, Z. (2019). ‘Smart TVs are Data-Collecting Machines, New Study Shows’, The Verge, October 11.Search in Google Scholar
Solove, D. (2006). ‘A Taxonomy Of Privacy’, University Of Pennsylvania Law Review 154 (3): 477–564.10.2307/40041279Search in Google Scholar
Solove, D. (2008). Understanding Privacy (Harvard: Harvard University Press).Search in Google Scholar
van den Hoven, J. (1999). ‘Privacy and the Varieties of Informational Wrongdoing’, Australian Journal of Professional and Applied Ethics 1: 30–43.10.4324/9781315259697-34Search in Google Scholar
van den Hoven, J. (2007). ‘Privacy and the Varieties of Informational Wrongdoing’, in J. Weckert (ed.). Computer Ethics (Aldershot: Ashgate Publishing), pp. 317–330.Search in Google Scholar
van den Hoven, J. (2008). ‘Information Technology, Privacy and the Protection of Personal Data’, in J. van den Hoven and J. Weckert (eds.). Information Technology and Moral Philosophy (Cambridge: Cambridge University Press), pp. 301–321.10.1017/CBO9780511498725.016Search in Google Scholar
Warren, S.D. and Brandeis, L.D. (1890). ‘The Right to Privacy’, Harvard Law Review 4 (5): 193–220.10.7312/gold91730-002Search in Google Scholar
Weber, M. (1920/2012). The Theory of Social and Economic Organization (Eastford: Martino Fine Books).Search in Google Scholar
Whitney, L. (2019). ‘How to Shop on Amazon with Alexa Voice Shopping’, PC Mag, 4 June.Search in Google Scholar
Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (New York: Public Affairs).Search in Google Scholar
© 2020 Walter de Gruyter GmbH, Berlin/Boston