Skip to main content

Part of the book series: AMINTAPHIL: The Philosophical Foundations of Law and Justice ((AMIN,volume 8))

Abstract

Digitization has not changed the ways in which we can invade another’s privacy: intrusion, disclosure, false light, and appropriation still cover the range of possible invasions. But because of digitization, invasions of privacy have become more penetrating, pervasive, and prevalent. What we have lost is nothing different in kind than what was lost before when we only had to worry about eavesdropping and peeping Toms, but by explaining how digitization has affected the privacy torts, we gain a better understanding of a moral harm that underlies all invasions of privacy—being treated as an object to be viewed, used, and manipulated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Digitization has also made other kinds of harm more prevalent and pervasive—and inexpensive. The radio device used to hack into VW’s locks—for at least 100 million vehicles—costs $40, money well-spent for thieves still interested in stealing a VW (Greenberg 2016b).

  2. 2.

    To use Donald Trump’s expression (Bump 2016).

  3. 3.

    GPS Tracker, by Cellphone Solutions, LLC, downloadable from iTunes at https://itunes.apple.com/us/app/gps-tracker-phone-location/id453761271?mt=8. “Over 2,500,000 downloads!”

  4. 4.

    See also Englehardt and Narayanan (2016). A “stealth installation” occurs via wifi in, say, a Starbucks where everyone is using the same, open wifi. An installer simply fastens onto the wifi, tracking it back to your digital device, as it were, to install whatever malware is needed for the job at hand.

  5. 5.

    See also The Center for Digital Democracy (2016). This second article has a link to the complaint filed with the Federal Trade Commission, providing more detail about Cayla and another toy, I-Que Intelligent Robot.

References

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Robison, W.L. (2018). Digitizing Privacy. In: Cudd, A., Navin, M. (eds) Core Concepts and Contemporary Issues in Privacy. AMINTAPHIL: The Philosophical Foundations of Law and Justice, vol 8. Springer, Cham. https://doi.org/10.1007/978-3-319-74639-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74639-5_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74638-8

  • Online ISBN: 978-3-319-74639-5

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics