“I Am Datafied Because We Are Datafied”: an Ubuntu Perspective on (Relational) Privacy

Abstract

The debate on the ethics of privacy has been mainly dominated by Western perspectives, to the exclusion of broader ethical theories and socio-cultural perspectives. This imbalance carries risks; transplanted ethical norms and values can collide with those of the communities in which they are deployed. The consequent homogenization might also represent a missed opportunity to enrich and develop the current paradigm of privacy protection so as to effectively face new technological challenges. This article introduces and discusses the sub-Saharan philosophy of Ubuntu and argues how its conception of the self helps to reinterpret some of the emerging issues revolving digital information technologies. To begin with, a general overview of the debate on the ethics of privacy is provided by distinguishing between individual and relational privacy. Also, the challenges of 'group privacy' are discussed. Then, we introduce basic principles of Ubuntu focusing on how these may have affected privacy conceptions and related legal practices. By outlining opportunities and risks of intercultural information ethics, we argue how Ubuntu—similarly to other communitarian moral philosophies—strengthens the development of the concept of relational privacy and, in particular, of group privacy.

This is a preview of subscription content, log in to check access.

Notes

  1. 1.

    The meme shows a group of children forming a circle with their feet, with the following short tale: “an anthropologist proposed a game to the children of an African tribe. He put a basket of fruit near a tree and told them that whoever came first would win all the fruit. When given the signal to run, the children held hands and ran, sitting down together to enjoy the prize. When asked why they had run together, if only one could get all the fruit, they said, Ubuntu, how could one of us be happy if everyone else is sad?”

  2. 2.

    Ubuntu is an ethno-philosophy in the sense that it is a system of thought that deals with the collective worldviews of diverse (sub-Saharan) Africans as a unified form of knowledge based on myths, folk wisdom, and proverbs. In other words, the diversity of African peoples, in terms of geographical location, history, and ethnicity, does not take away the fact that Africans have “a unified form of knowledge” that is based on group identity or community. This is what qualifies Ubuntu as an important aspect of ethno-philosophy (Mangena 2016).

  3. 3.

    Bygrave (2001) comments, however, that this lack of a conceptual consensus on the substance of privacy could be a means to allow more flexibility during a legal interpretation of a right to privacy and consequently data protection, hence wider applicability and better protection for individuals.

  4. 4.

    Bounded rationality is the idea that individuals are not always rational and that decision-making processes are prone to systematic errors. Kahneman (2003) described two major cognitive systems from which individuals take decisions: an “automatic system” (or System 1) and a “reflective system” (or System 2). While the latter is the slow, effortful, and controlled way to think, the former is efficient, rapid, largely unconscious, and prone to systematic errors.

  5. 5.

    Wachter and Mittelstadt (2019) highlight a similar legal dilemma while discussing the decision by the European Court of Justice in the case of YS, M and S (Joined Cases C–141 & 372/12, YS, M and S v. Minister voor Immigratie, Integratie en Asiel, (2014)) where the Court failed to give a direct response as to whether the final opinions, results, or inferences about an individual resulting from the analysis personal data (in an application for legal residency) is itself personal data.

  6. 6.

    With ‘big data,’ we generally refer to very large sets of data that can only be stored, understood, and used with the help of special tools and methods.

  7. 7.

    Interestingly, Van der Sloot (2016) notes that “one could focus on the initial moment when personal data are gathered and not yet aggregated, but this may only concern the split second which it takes to aggregate data. The same counts for the moment at which group profiles are applied and used to affect a specific person. This only concerns the very end of the data process. By focusing on the individual, his interests and rights, one loses sight of the larger part of the data processing scheme and the general issues concerned with that.”

  8. 8.

    Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data

  9. 9.

    The term Ubuntu (or Botho or Hunhu) is a word of the Nguni family of languages including Zulu, Xhosa, Ndebele, Sesotho, and Shona referring to the moral attribute of a person, who is known in the Bantu languages as, to name a few, Munhu (among the Shona of Zimbabwe), Umuntu (among the Ndebele of Zimbabwe and the Zulu/Xhosa of South Africa), Muthu (among the Tswana of Botswana), and Omundu (among the Herero of Namibia) (Mangena 2016).

  10. 10.

    In particular Aristotles pros hen; “pros hen pluralism” is a three-layered doctrine, consisting of one requirement for diversity at a cultural level, another for diversity at an ethical theoretic level, and the third for unity at the ethical theoretic level (Ess 2006).

  11. 11.

    There however has been considerable progress in Africa in terms of (digital) privacy awareness and legislation in the last decade, with over 20 countries having passed personal data protection laws.

  12. 12.

    It is worth mentioning here that, in Europe, it is not uncommon for legislators to make recourse to ethics to seek solutions for legal problems. Recitals in the GDPR are a good example of a “soft ethics” instrument. Also, the GDPR allows for ethical considerations in data processing by virtue of its Article 5(1)(a) of the GDPR, which requires data protection to be processed “fairly.” This principle of fair processing is not well-elaborated upon in the GDPR, which leaves open the opportunity for a more holistic interpretation extending beyond strict legal constraints to reflect more on ethical considerations when protecting the rights of individuals, including, evidently, their right to privacy.

  13. 13.

    As Nissenbaum and Barocas (2016) in fact clearly explain: “When analysts can draw rules from the data of a small cohort of consenting individuals that generalize to an entire population, consent loses its practical import. In fact, the value of a particular individual’s withheld consent diminishes the more effectively a company can draw inferences from the set of people that do consent as it approaches a representative sample. (p.32)” This observation further highlights the relationality of privacy and the need to tackle the limitations of individual consent.

References

  1. Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.

    Google Scholar 

  2. Banda, C. (2019). The privatised self? A theological critique of the commodification of human identity in modern technological age in an African context professing Ubuntu. HTS Theological Studies, 75(1), 1–10.

    Google Scholar 

  3. Bannerman, S. (2019). Relational privacy and the networked governance of the self. Information, Communication & Society, 22(14), 2187–2202.

    Google Scholar 

  4. Basu, S. (2012). Privacy protection: a tale of two cultures. Masaryk UJL & Tech., 6, 1.

  5. Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. Privacy, Big data, and the Public Good: Frameworks for Engagement, 1, 44–75.

  6. Bloustein, E. J. (1978). Individual and group privacy. New Brunswick: Transaction Publishers.

    Google Scholar 

  7. Broodryk, J. (1995). Is Ubuntuism unique? Decolonizing the mind, Research Unit for African Philosophy, UNISA, Pretoria, 31–37.

  8. Bygrave, L. A. (2001). The place of privacy in data protection law. UNSWLJ, 24, 277.

    Google Scholar 

  9. Bygrave, L. A. (2004). Privacy protection in a global context–a comparative overview. Scandinavian Studies in Law, 47(2004), 319–348.

    Google Scholar 

  10. Capurro, R. (2005). Privacy. An intercultural perspective. Ethics and Information Technology, 7(1), 37–47.

    Google Scholar 

  11. Capurro, R. (2008). Information ethics for and from Africa. Journal of the American Society for Information Science and Technology, 59(7), 1162–1170.

    Google Scholar 

  12. Capurro, R., Eldred, M., & Nagel, D. (2012). It and privacy from an ethical perspective digital whoness: identity, privacy and freedom in the Cyberworld 171. In Internet privacy (pp. 63–142). Berlin, Heidelberg: Springer Vieweg.

    Google Scholar 

  13. Christians, C. G. (2004). Ubuntu and communitarianism in media ethics. Ecquid Novi: African Journalism Studies, 25(2), 235–256.

    Google Scholar 

  14. Eliastam, J. (2015). Exploring ubuntu discourse in South Africa: Loss, liminality and hope. Verbum et Ecclesia,36(2)

  15. Ess, C. (2006). Ethical pluralism and global information ethics. Ethics and Information Technology, 8(4), 215–226.

    Google Scholar 

  16. Floridi, L. (2014). Open data, data protection, and group privacy. Philosophy & Technology, 27(1), 1–3.

    Google Scholar 

  17. Floridi, L. (2016). On human dignity as a foundation for the right to privacy. Philosophy & Technology, 29(4), 307–312.

    Google Scholar 

  18. Floridi, L. (2017). Group privacy: A defence and an interpretation. In Group Privacy (pp. 83–100). Springer, Cham.

  19. Fuchs, C. (2011). Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society, 9(4), 220–237.

    Google Scholar 

  20. Fuster, G. G. (2014). The emergence of personal data protection as a fundamental right of the EU (Vol. 16). Springer Science & Business.

  21. Hanks, T. (2008). Ubuntu: a theoretical examination of the potentialities of an emergent humanistic paradigm (Doctoral dissertation, Saybrook University).

  22. Hanno, O. N., Britz, J. J., & Olivier, M. S. (2005). Western privacy and Ubuntu: influences in the forthcoming data privacy bill. Ethics and New Information Technology. CEPE Retrieved from http://martinolivier.com/open/Ubuntu.pdf.

  23. Hiruta, K. (2006). What pluralism, why pluralism, and how? A response to Charles Ess. Ethics and Information Technology, 8(4), 227–236.

    Google Scholar 

  24. Hongladarom, S. (2016a). A Buddhist theory of privacy. In A buddhist theory of privacy (pp. 57–84). Singapore: Springer.

    Google Scholar 

  25. Hongladarom, S. (2016b). Intercultural information ethics: a pragmatic consideration. In Information cultures in the digital age (pp. 191–206). Wiesbaden: Springer VS.

    Google Scholar 

  26. Internet World Stats. (2020). Internet world stats: usage and population statistics, available at: www.internetworldstats.com/stats.htm.

  27. Jobin, A., Ienca, M., & Vayena, E. (2019). The global landscape of AI ethics guidelines. Nature Machine Intelligence, 1(9), 389–399.

    Google Scholar 

  28. Kahneman, D. (2003). A perspective on judgment and choice: mapping bounded rationality. American Psychologist, 58(9), 697.

    Google Scholar 

  29. Kamwangamalu, N. M. (1999). Ubuntu in South Africa: a sociolinguistic perspective to a pan-African concept. Critical Arts, 13(2), 24–41.

    Google Scholar 

  30. Lassiter, J. E. (2000). African culture and personality: bad social science, effective social activism, or a call to reinvent ethnology. African Studies Quarterly, 3(3), 1–21.

    Google Scholar 

  31. Letseka, M. (2000). African philosophy and educational discourse. In P. Higgs, N. C. G. Vakalisa, T. V. Mda, & N. T. Assie-Lumumba (Eds.), African voices in education. Juta: Cape Town.

    Google Scholar 

  32. Letseka, M. (2012). In defence of Ubuntu. Studies in Philosophy and Education, 31(1), 47–60.

    Google Scholar 

  33. Ma, Y. (2019). Relational privacy: where the east and the west could meet. Proceedings of the Association for Information Science and Technology, 56(1), 196–205.

    Google Scholar 

  34. Makhudu, N. (1993). Cultivating a climate of co-operation through Ubuntu. Enterprise Magazine, 48, 40–42.

    Google Scholar 

  35. Makulilo, A. B. (2016). A person is a person through other persons - a critical analysis of privacy and culture in Africa. Beijing Law Review, 7(3), 192–211.

    Google Scholar 

  36. Makulilo, A. B. (2018). The quest for information privacy in Africa. Journal of Information Policy, 8:317

  37. Mangena, F. (2016). Hunhu/Ubuntu in the traditional thought of southern Africa. Internet encyclopedia of philosophy. Retrieved from https://www.iep.utm.edu/hunhu/.

  38. Mantelero, A. (2016). From group privacy to collective privacy: towards a new dimension of privacy and data protection in the big data era. In Group privacy (pp. 139–158). Cham: Springer.

    Google Scholar 

  39. Marwick, A. E., & Boyd, D. (2014). Networked privacy: how teenagers negotiate context in social media. New Media & Society, 16(7), 1051–1067.

    Google Scholar 

  40. Mbiti, J. S. (1969). African religions and philosophy. New York: Praeger Publishers.

    Google Scholar 

  41. Mbiti, J. S. (1992). Introduction to African religion (2nd ed.). Nairobi: East African Educational Publishers, Ltd.

    Google Scholar 

  42. McDonald, D. A. (2010). Ubuntu bashing: the marketisation of ‘African values’ in South Africa. Review of African Political Economy, 37(124), 139–152.

    Google Scholar 

  43. Miller, A. (1971). The assault on privacy. Harvard University Press, Cambridge, MA.

  44. Mittelstadt, B. (2017). From individual to group privacy in big data analytics. Philosophy & Technology, 30(4), 475–494.

  45. Mizutani, M., Dorsey, J., & Moor, J. H. (2004). The internet and Japanese conception of privacy. Ethics and Information Technology, 6(2), 121–128.

  46. Mnyaka, M., & Motlhabi M. (2015). The African concept of and its socio-moral significance. Black Theology, 3(2):215–237.

  47. Moore, A. (2008). Defining privacy. Journal of Social Philosophy, 39(3), 411–428.

    Google Scholar 

  48. Neethling, J. (2005). The concept of privacy in south African law. The South African Law Journal, 122, 18–28.

    Google Scholar 

  49. NESH (Norwegian National Committee for Research Ethics in the Social Sciences and the Humanities). (2006). Guidelines for Research Ethics in the Social Sciences, Law and the Humanities. Retrieved from https://www.etikkom.no/globalassets/documents/english-publications/guidelines-for-research-ethics-in-the-social-sciences-law-and-the-humanities-2006.pdf.

  50. Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32–48.

    Google Scholar 

  51. Nyasani, J. M. (1997). The African psyche. Nairobi: University of Nairobi and Theological Printing Press Ltd.

    Google Scholar 

  52. Olinger, N. H., Britz, J. J., & Olivier, M. S. (2005). Western privacy and Ubuntu: influences in the forthcoming data privacy bill. Ethics and New Information Technology, CEPE.

  53. Praeg, L. (2013). An answer to the question: what is [ubuntu]?. South African Journal of Philosophy, 27(4), 367–385.

  54. Purtova, N. (2017). Do property rights in personal data make sense after the Big Data turn? Individual control and transparency. Journal of Law and Economic Regulation,10(2).

  55. Purtova, N. (2018). The law of everything. Broad concept of personal data and future of EU data protection law. Law, Innovation and Technology, 10(1), 40–81.a.

    Google Scholar 

  56. Raymond, N. A. (2017). Beyond “do no harm” and individual consent: reckoning with the emerging ethical challenges of civil society’s use of data. In Group privacy (pp. 67–82). Cham: Springer.

    Google Scholar 

  57. Renaud, K., Flowerday, S., ben Othmane, L., & Volkamer, M. (2015). “I am because we are”: Developing and nurturing an African digital security culture. In African Cyber Citizenship Conference, 94.

  58. Roessler, B., & Mokrosinska, D. (2013). Privacy and social interaction. Philosophy & Social Criticism, 39(8), 771–791.

    Google Scholar 

  59. Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90, 1087.

    Google Scholar 

  60. Stoljar, N. (2015). Feminist perspectives on autonomy. In E. N. Zalta (Ed.), The Standford encyclopedia of philosophy. Stanford: The Metaphysics Research Lab Center for the Study of Language and Information.

    Google Scholar 

  61. Taylor, L. (2016). No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Environment and Planning D: Society and Space, 34(2), 319–336.

    Google Scholar 

  62. Taylor, L., Floridi, L., & Van der Sloot, B. (Eds.). (2016). Group privacy: new challenges of data technologies (Vol. 126). Springer.

  63. Van der Sloot, B. (2016). Do groups have a right to protect their group interest in privacy and should they? Peeling the onion of rights and interests protected under article 8 ECHR. In Group privacy (pp. 197–224). Cham: Springer.

    Google Scholar 

  64. Vedder, A. (1999). KDD: The challenge to individualism. Ethics and Information Technology, 1(4), 275–281.

    Google Scholar 

  65. Wachter, S., & Mittelstadt, B. (2019). A right to reasonable inferences: re-thinking data protection law in the age of big data and AI. Columbia Business Law Review, 494.

  66. Westin, A. F. (1967). Privacy and freedom. New York: Atheneum.

  67. Zuboff, S. (2019). The age of surveillance capitalism: the fight for a human future at the new frontier of power. Profile Books.

Download references

Funding

Conceptualization, material preparation, review and editing were performed by Urbano Reviglio. The manuscript was written by Urbano Reviglio (section 1, 2, 3.1) and Rogers Alunge (section 3, 4.1 and 4.2), with section 4.3 jointly made. Both authors read and approved the final manuscript.

Author information

Affiliations

Authors

Corresponding author

Correspondence to Urbano Reviglio.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Reviglio, U., Alunge, R. “I Am Datafied Because We Are Datafied”: an Ubuntu Perspective on (Relational) Privacy. Philos. Technol. (2020). https://doi.org/10.1007/s13347-020-00407-6

Download citation

Keywords

  • Privacy
  • Ethics
  • Ubuntu
  • Intercultural ethics
  • Relational privacy
  • Group privacy