Abstract
Digitization has not changed the ways in which we can invade another’s privacy: intrusion, disclosure, false light, and appropriation still cover the range of possible invasions. But because of digitization, invasions of privacy have become more penetrating, pervasive, and prevalent. What we have lost is nothing different in kind than what was lost before when we only had to worry about eavesdropping and peeping Toms, but by explaining how digitization has affected the privacy torts, we gain a better understanding of a moral harm that underlies all invasions of privacy—being treated as an object to be viewed, used, and manipulated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Digitization has also made other kinds of harm more prevalent and pervasive—and inexpensive. The radio device used to hack into VW’s locks—for at least 100 million vehicles—costs $40, money well-spent for thieves still interested in stealing a VW (Greenberg 2016b).
- 2.
To use Donald Trump’s expression (Bump 2016).
- 3.
GPS Tracker, by Cellphone Solutions, LLC, downloadable from iTunes at https://itunes.apple.com/us/app/gps-tracker-phone-location/id453761271?mt=8. “Over 2,500,000 downloads!”
- 4.
See also Englehardt and Narayanan (2016). A “stealth installation” occurs via wifi in, say, a Starbucks where everyone is using the same, open wifi. An installer simply fastens onto the wifi, tracking it back to your digital device, as it were, to install whatever malware is needed for the job at hand.
- 5.
See also The Center for Digital Democracy (2016). This second article has a link to the complaint filed with the Federal Trade Commission, providing more detail about Cayla and another toy, I-Que Intelligent Robot.
References
Avirgan J (2016) Internet tracking has moved beyond cookies. FiveThirtyEight. http://fivethirtyeight.com/features/internet-tracking-has-moved-beyond-cookies/. Accessed 3 Sept 3 2016
Bump P (2016) Donald trump blames the media for his own failure to run a general election campaign. The Washington Post. https://www.washingtonpost.com/news/the-fix/wp/2016/08/14/donald-trump-blames-the-media-for-his-own-failure-to-run-a-general-election-campaign/. Accessed 14 Aug 2016
Cambridge Analytica (2017a) https://cambridgeanalytica.org. Accessed 2 July 2017
Cambridge Analytica (2017b) Case study: Donald J. Trump for President 2016. https://ca-political.com/casestudies/casestudydonaldjtrumpforpresident2016. Accessed 2 July 2017
Cheng J (2010) Parents: school used webcam to spy on our kid at home. ArsTechnica. http://arstechnica.com/tech-policy/2010/02/school-under-fire-for-spying-on-kid-via-webcam-at-home/. Accessed 16 Aug 2016
Cheshire T (2016) Behind the scenes at Donald Trump’s UK digital war room. Sky News. http://news.sky.com/story/behind-the-scenes-at-donald-trumps-uk-digital-war-room-10626155. Accessed 2 July 2017
Davies W (2016) The age of post-truth politics. New York Times. http://www.nytimes.com/2016/08/24/opinion/campaign-stops/the-age-of-post-truth-politics.html?_r=0. Accessed 25 Aug 2016
Duhigg C (2012) How companies learn your secrets. New York Times. http:// www.nytimes.com/2012/02/19/magazine/shopping-habits.html?pagewanted=1&_r=2&hp&. Accessed 7 Jan 2017
Editorial Board (2013) Fighting back against revenge porn. New York Times. http://www.nytimes.com/2013/10/13/opinion/sunday/fighting-back-against-revenge-porn.html. Accessed 31 Aug 2016
Englehardt S, Narayanan A (2016) Online tracking: a 1-million-site measurement and analysis. http://randomwalker.info/publications/OpenWPM_1_million_site_tracking_measurement.pdf. Accessed 2 Sept 2016
Fried C (1968) Privacy. Yale Law J 77(3):475–493
Gallie WB (1955–1956) Essentially contested concepts. Proc Aristotelian Soc 56:167–198
Gatehouse G (2017) What was the role of Cambridge Analytica and psychographics in the EU referendum? BBC. http://www.bbc.com/news/av/uk-40423629/what-was-the-role-of-cambridge-analytica-and-psychographics-in-the-eu-referendum. Accessed 4 July 2017
Gerety T (1977) Redefining privacy. Howard Civil Rights Civil Liberties Law Rev 12(2):233–295
Greenberg A (2016a) Flaws in wireless mice and keyboards let hackers type on your pc. Wired. https://www.wired.com/2016/02/flaws-in-wireless-mice-and-keyboards-let-hackers-type-on-your-pc/. Accessed 16 Aug 2016
Greenberg A (2016b) A new wireless hack can unlock 100 million Volkswagens. Wired. https://www.wired.com/2016/08/oh-good-new-hack-can-unlock-100-million-volkswagens/. Accessed 14 Aug 2016
Greenblatt A (2013) When it comes to online privacy, a disconnect for the young. NPR, All Tech Considered. http://www.npr.org/sections/alltechconsidered/2013/06/10/190433719/when-it-comes-to-online-privacy-a-disconnect-for-the-young. Accessed 19 Aug 2016
Higgins A (2016) Foes of Russia say child pornography is planted to ruin them. New York Times. http://www.nytimes.com/2016/12/09/world/europe/vladimir-putin-russia-fake-news-hacking-cybersecurity.html?rref=collection%2Fbyline%2Fandrew-higgins&action=click&contentCollection=undefined®ion=stream&module=stream_unit&version=latest&contentPlacement=3&pgtype=collection&_r=0. Accessed 30 Dec 2016
Identity Theft. USA.gov. https://www.usa.gov/identity-theft. Accessed 1 Sept 2016
Imposter’s luck, and credit, finally ran out (1997) Democrat and Chronicle. www.democraticandchronicle.com. Accessed 1 Jan 1997
Kravets D (2012) Rent-to-own laptops secretly photographed users having sex, FTC says. Wired. https://www.wired.com/2012/09/laptop-rental-spyware-scandal/. Accessed 16 Aug 2016
Leibniz GW (1686) Discourse on metaphysics. English edition: Leibniz GW (1961) Discourse on metaphysics: a translation from the French (trans: Lucas PG, Grant L). Manchester University Press, Manchester
Naylor B (2016) This doll may be recording what children say, privacy groups charge. NPR. http://www.npr.org/sections/alltechconsidered/2016/12/20/506208146/this-doll-may-be-recording-what-children-say-privacy-groups-charge. Accessed 21 Dec 2016
Perlroth N (2016) How spy tech firms let governments see everything on a smart phone. New York Times. http://www.nytimes.com/2016/09/03/technology/nso-group-how-spy-tech-firms-let-governments-see-everything-on-a-smartphone.html. Accessed 3 Sept 2016
Prosser WL (1960) Privacy. Calif Law Rev 48(3):383–423
Robison WL (1997a) False light. In: Larry M, Schonsheck J, Sistare C (eds) Liberty, equality, and plurality. University Press of Kansas, Lawrence, pp 171–190
Robison WL (1997b) Privacy and personal identity. Ethics Behav 7(3):195–205
Siciliano R (2014) 10 unbelievable identity theft cases. Huffington Post. http://www.huffingtonpost.com/robert-siciliano/10-unbelievable-identity_b_5239159.html. Accessed 7 Jan 2017
The Center for Digital Democracy (2016) Internet-connected toys are spying on kids, threatening their privacy and security. https://www.democraticmedia.org/filing/internet-connected-toys-are-spying-kids-threatening-their-privacy-and-security. Accessed 21 Dec 2016
The phony photographer (1997) Newsweek
Thomson JJ (1975) The right to privacy. Philos Public Aff 4:295–314
Trollope A (1867) The last chronicle of Barset. Smith, Elder & Co., London
United States Department of Justice. https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud. Accessed 1 Sept 2016
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Robison, W.L. (2018). Digitizing Privacy. In: Cudd, A., Navin, M. (eds) Core Concepts and Contemporary Issues in Privacy. AMINTAPHIL: The Philosophical Foundations of Law and Justice, vol 8. Springer, Cham. https://doi.org/10.1007/978-3-319-74639-5_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-74639-5_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74638-8
Online ISBN: 978-3-319-74639-5
eBook Packages: Law and CriminologyLaw and Criminology (R0)