Abstract
The debate on the ethics of privacy has been mainly dominated by Western perspectives, to the exclusion of broader ethical theories and socio-cultural perspectives. This imbalance carries risks; transplanted ethical norms and values can collide with those of the communities in which they are deployed. The consequent homogenization might also represent a missed opportunity to enrich and develop the current paradigm of privacy protection so as to effectively face new technological challenges. This article introduces and discusses the sub-Saharan philosophy of Ubuntu and argues how its conception of the self helps to reinterpret some of the emerging issues revolving digital information technologies. To begin with, a general overview of the debate on the ethics of privacy is provided by distinguishing between individual and relational privacy. Also, the challenges of 'group privacy' are discussed. Then, we introduce basic principles of Ubuntu focusing on how these may have affected privacy conceptions and related legal practices. By outlining opportunities and risks of intercultural information ethics, we argue how Ubuntu—similarly to other communitarian moral philosophies—strengthens the development of the concept of relational privacy and, in particular, of group privacy.
Similar content being viewed by others
Notes
The meme shows a group of children forming a circle with their feet, with the following short tale: “an anthropologist proposed a game to the children of an African tribe. He put a basket of fruit near a tree and told them that whoever came first would win all the fruit. When given the signal to run, the children held hands and ran, sitting down together to enjoy the prize. When asked why they had run together, if only one could get all the fruit, they said, Ubuntu, how could one of us be happy if everyone else is sad?”
Ubuntu is an ethno-philosophy in the sense that it is a system of thought that deals with the collective worldviews of diverse (sub-Saharan) Africans as a unified form of knowledge based on myths, folk wisdom, and proverbs. In other words, the diversity of African peoples, in terms of geographical location, history, and ethnicity, does not take away the fact that Africans have “a unified form of knowledge” that is based on group identity or community. This is what qualifies Ubuntu as an important aspect of ethno-philosophy (Mangena 2016).
Bygrave (2001) comments, however, that this lack of a conceptual consensus on the substance of privacy could be a means to allow more flexibility during a legal interpretation of a right to privacy and consequently data protection, hence wider applicability and better protection for individuals.
Bounded rationality is the idea that individuals are not always rational and that decision-making processes are prone to systematic errors. Kahneman (2003) described two major cognitive systems from which individuals take decisions: an “automatic system” (or System 1) and a “reflective system” (or System 2). While the latter is the slow, effortful, and controlled way to think, the former is efficient, rapid, largely unconscious, and prone to systematic errors.
Wachter and Mittelstadt (2019) highlight a similar legal dilemma while discussing the decision by the European Court of Justice in the case of YS, M and S (Joined Cases C–141 & 372/12, YS, M and S v. Minister voor Immigratie, Integratie en Asiel, (2014)) where the Court failed to give a direct response as to whether the final opinions, results, or inferences about an individual resulting from the analysis personal data (in an application for legal residency) is itself personal data.
With ‘big data,’ we generally refer to very large sets of data that can only be stored, understood, and used with the help of special tools and methods.
Interestingly, Van der Sloot (2016) notes that “one could focus on the initial moment when personal data are gathered and not yet aggregated, but this may only concern the split second which it takes to aggregate data. The same counts for the moment at which group profiles are applied and used to affect a specific person. This only concerns the very end of the data process. By focusing on the individual, his interests and rights, one loses sight of the larger part of the data processing scheme and the general issues concerned with that.”
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
The term Ubuntu (or Botho or Hunhu) is a word of the Nguni family of languages including Zulu, Xhosa, Ndebele, Sesotho, and Shona referring to the moral attribute of a person, who is known in the Bantu languages as, to name a few, Munhu (among the Shona of Zimbabwe), Umuntu (among the Ndebele of Zimbabwe and the Zulu/Xhosa of South Africa), Muthu (among the Tswana of Botswana), and Omundu (among the Herero of Namibia) (Mangena 2016).
In particular Aristotles pros hen; “pros hen pluralism” is a three-layered doctrine, consisting of one requirement for diversity at a cultural level, another for diversity at an ethical theoretic level, and the third for unity at the ethical theoretic level (Ess 2006).
There however has been considerable progress in Africa in terms of (digital) privacy awareness and legislation in the last decade, with over 20 countries having passed personal data protection laws.
It is worth mentioning here that, in Europe, it is not uncommon for legislators to make recourse to ethics to seek solutions for legal problems. Recitals in the GDPR are a good example of a “soft ethics” instrument. Also, the GDPR allows for ethical considerations in data processing by virtue of its Article 5(1)(a) of the GDPR, which requires data protection to be processed “fairly.” This principle of fair processing is not well-elaborated upon in the GDPR, which leaves open the opportunity for a more holistic interpretation extending beyond strict legal constraints to reflect more on ethical considerations when protecting the rights of individuals, including, evidently, their right to privacy.
As Nissenbaum and Barocas (2016) in fact clearly explain: “When analysts can draw rules from the data of a small cohort of consenting individuals that generalize to an entire population, consent loses its practical import. In fact, the value of a particular individual’s withheld consent diminishes the more effectively a company can draw inferences from the set of people that do consent as it approaches a representative sample. (p.32)” This observation further highlights the relationality of privacy and the need to tackle the limitations of individual consent.
References
Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.
Banda, C. (2019). The privatised self? A theological critique of the commodification of human identity in modern technological age in an African context professing Ubuntu. HTS Theological Studies, 75(1), 1–10.
Bannerman, S. (2019). Relational privacy and the networked governance of the self. Information, Communication & Society, 22(14), 2187–2202.
Basu, S. (2012). Privacy protection: a tale of two cultures. Masaryk UJL & Tech., 6, 1.
Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. Privacy, Big data, and the Public Good: Frameworks for Engagement, 1, 44–75.
Bloustein, E. J. (1978). Individual and group privacy. New Brunswick: Transaction Publishers.
Broodryk, J. (1995). Is Ubuntuism unique? Decolonizing the mind, Research Unit for African Philosophy, UNISA, Pretoria, 31–37.
Bygrave, L. A. (2001). The place of privacy in data protection law. UNSWLJ, 24, 277.
Bygrave, L. A. (2004). Privacy protection in a global context–a comparative overview. Scandinavian Studies in Law, 47(2004), 319–348.
Capurro, R. (2005). Privacy. An intercultural perspective. Ethics and Information Technology, 7(1), 37–47.
Capurro, R. (2008). Information ethics for and from Africa. Journal of the American Society for Information Science and Technology, 59(7), 1162–1170.
Capurro, R., Eldred, M., & Nagel, D. (2012). It and privacy from an ethical perspective digital whoness: identity, privacy and freedom in the Cyberworld 171. In Internet privacy (pp. 63–142). Berlin, Heidelberg: Springer Vieweg.
Christians, C. G. (2004). Ubuntu and communitarianism in media ethics. Ecquid Novi: African Journalism Studies, 25(2), 235–256.
Eliastam, J. (2015). Exploring ubuntu discourse in South Africa: Loss, liminality and hope. Verbum et Ecclesia, 36(2)
Ess, C. (2006). Ethical pluralism and global information ethics. Ethics and Information Technology, 8(4), 215–226.
Floridi, L. (2014). Open data, data protection, and group privacy. Philosophy & Technology, 27(1), 1–3.
Floridi, L. (2016). On human dignity as a foundation for the right to privacy. Philosophy & Technology, 29(4), 307–312.
Floridi, L. (2017). Group privacy: A defence and an interpretation. In Group Privacy (pp. 83–100). Springer, Cham.
Fuchs, C. (2011). Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society, 9(4), 220–237.
Fuster, G. G. (2014). The emergence of personal data protection as a fundamental right of the EU (Vol. 16). Springer Science & Business.
Hanks, T. (2008). Ubuntu: a theoretical examination of the potentialities of an emergent humanistic paradigm (Doctoral dissertation, Saybrook University).
Hanno, O. N., Britz, J. J., & Olivier, M. S. (2005). Western privacy and Ubuntu: influences in the forthcoming data privacy bill. Ethics and New Information Technology. CEPE Retrieved from http://martinolivier.com/open/Ubuntu.pdf.
Hiruta, K. (2006). What pluralism, why pluralism, and how? A response to Charles Ess. Ethics and Information Technology, 8(4), 227–236.
Hongladarom, S. (2016a). A Buddhist theory of privacy. In A buddhist theory of privacy (pp. 57–84). Singapore: Springer.
Hongladarom, S. (2016b). Intercultural information ethics: a pragmatic consideration. In Information cultures in the digital age (pp. 191–206). Wiesbaden: Springer VS.
Internet World Stats. (2020). Internet world stats: usage and population statistics, available at: www.internetworldstats.com/stats.htm.
Jobin, A., Ienca, M., & Vayena, E. (2019). The global landscape of AI ethics guidelines. Nature Machine Intelligence, 1(9), 389–399.
Kahneman, D. (2003). A perspective on judgment and choice: mapping bounded rationality. American Psychologist, 58(9), 697.
Kamwangamalu, N. M. (1999). Ubuntu in South Africa: a sociolinguistic perspective to a pan-African concept. Critical Arts, 13(2), 24–41.
Lassiter, J. E. (2000). African culture and personality: bad social science, effective social activism, or a call to reinvent ethnology. African Studies Quarterly, 3(3), 1–21.
Letseka, M. (2000). African philosophy and educational discourse. In P. Higgs, N. C. G. Vakalisa, T. V. Mda, & N. T. Assie-Lumumba (Eds.), African voices in education. Juta: Cape Town.
Letseka, M. (2012). In defence of Ubuntu. Studies in Philosophy and Education, 31(1), 47–60.
Ma, Y. (2019). Relational privacy: where the east and the west could meet. Proceedings of the Association for Information Science and Technology, 56(1), 196–205.
Makhudu, N. (1993). Cultivating a climate of co-operation through Ubuntu. Enterprise Magazine, 48, 40–42.
Makulilo, A. B. (2016). A person is a person through other persons - a critical analysis of privacy and culture in Africa. Beijing Law Review, 7(3), 192–211.
Makulilo, A. B. (2018). The quest for information privacy in Africa. Journal of Information Policy, 8:317
Mangena, F. (2016). Hunhu/Ubuntu in the traditional thought of southern Africa. Internet encyclopedia of philosophy. Retrieved from https://www.iep.utm.edu/hunhu/.
Mantelero, A. (2016). From group privacy to collective privacy: towards a new dimension of privacy and data protection in the big data era. In Group privacy (pp. 139–158). Cham: Springer.
Marwick, A. E., & Boyd, D. (2014). Networked privacy: how teenagers negotiate context in social media. New Media & Society, 16(7), 1051–1067.
Mbiti, J. S. (1969). African religions and philosophy. New York: Praeger Publishers.
Mbiti, J. S. (1992). Introduction to African religion (2nd ed.). Nairobi: East African Educational Publishers, Ltd.
McDonald, D. A. (2010). Ubuntu bashing: the marketisation of ‘African values’ in South Africa. Review of African Political Economy, 37(124), 139–152.
Miller, A. (1971). The assault on privacy. Harvard University Press, Cambridge, MA.
Mittelstadt, B. (2017). From individual to group privacy in big data analytics. Philosophy & Technology, 30(4), 475–494.
Mizutani, M., Dorsey, J., & Moor, J. H. (2004). The internet and Japanese conception of privacy. Ethics and Information Technology, 6(2), 121–128.
Mnyaka, M., & Motlhabi M. (2015). The African concept of and its socio-moral significance. Black Theology, 3(2):215–237.
Moore, A. (2008). Defining privacy. Journal of Social Philosophy, 39(3), 411–428.
Neethling, J. (2005). The concept of privacy in south African law. The South African Law Journal, 122, 18–28.
NESH (Norwegian National Committee for Research Ethics in the Social Sciences and the Humanities). (2006). Guidelines for Research Ethics in the Social Sciences, Law and the Humanities. Retrieved from https://www.etikkom.no/globalassets/documents/english-publications/guidelines-for-research-ethics-in-the-social-sciences-law-and-the-humanities-2006.pdf.
Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32–48.
Nyasani, J. M. (1997). The African psyche. Nairobi: University of Nairobi and Theological Printing Press Ltd.
Olinger, N. H., Britz, J. J., & Olivier, M. S. (2005). Western privacy and Ubuntu: influences in the forthcoming data privacy bill. Ethics and New Information Technology, CEPE.
Praeg, L. (2013). An answer to the question: what is [ubuntu]?. South African Journal of Philosophy, 27(4), 367–385.
Purtova, N. (2017). Do property rights in personal data make sense after the Big Data turn? Individual control and transparency. Journal of Law and Economic Regulation, 10(2).
Purtova, N. (2018). The law of everything. Broad concept of personal data and future of EU data protection law. Law, Innovation and Technology, 10(1), 40–81.a.
Raymond, N. A. (2017). Beyond “do no harm” and individual consent: reckoning with the emerging ethical challenges of civil society’s use of data. In Group privacy (pp. 67–82). Cham: Springer.
Renaud, K., Flowerday, S., ben Othmane, L., & Volkamer, M. (2015). “I am because we are”: Developing and nurturing an African digital security culture. In African Cyber Citizenship Conference, 94.
Roessler, B., & Mokrosinska, D. (2013). Privacy and social interaction. Philosophy & Social Criticism, 39(8), 771–791.
Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90, 1087.
Stoljar, N. (2015). Feminist perspectives on autonomy. In E. N. Zalta (Ed.), The Standford encyclopedia of philosophy. Stanford: The Metaphysics Research Lab Center for the Study of Language and Information.
Taylor, L. (2016). No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Environment and Planning D: Society and Space, 34(2), 319–336.
Taylor, L., Floridi, L., & Van der Sloot, B. (Eds.). (2016). Group privacy: new challenges of data technologies (Vol. 126). Springer.
Van der Sloot, B. (2016). Do groups have a right to protect their group interest in privacy and should they? Peeling the onion of rights and interests protected under article 8 ECHR. In Group privacy (pp. 197–224). Cham: Springer.
Vedder, A. (1999). KDD: The challenge to individualism. Ethics and Information Technology, 1(4), 275–281.
Wachter, S., & Mittelstadt, B. (2019). A right to reasonable inferences: re-thinking data protection law in the age of big data and AI. Columbia Business Law Review, 494.
Westin, A. F. (1967). Privacy and freedom. New York: Atheneum.
Zuboff, S. (2019). The age of surveillance capitalism: the fight for a human future at the new frontier of power. Profile Books.
Funding
Conceptualization, material preparation, review and editing were performed by Urbano Reviglio. The manuscript was written by Urbano Reviglio (section 1, 2, 3.1) and Rogers Alunge (section 3, 4.1 and 4.2), with section 4.3 jointly made. Both authors read and approved the final manuscript.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Reviglio, U., Alunge, R. “I Am Datafied Because We Are Datafied”: an Ubuntu Perspective on (Relational) Privacy. Philos. Technol. 33, 595–612 (2020). https://doi.org/10.1007/s13347-020-00407-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13347-020-00407-6