Building on the fact that profiling technologies produce a new type of knowledge that will influence the lives of individual citizens in numerous ways, this chapter will elaborate the implications for the identity, subjectivity and agency presumed by constitutional democracy. After a brief excursion into the architecture of our European ‘Rechtsstaat’, the centrality of the human person of flesh and blood will be explored and its relationship with the legal persona and citizenship. The legal persona - a constitutive feature of this ‘Rechtsstaat’ - will be explained in terms of the negative freedom (freedom from) and the positive freedom (freedom to) that it creates for citizens to participate in public and social life and to retreat into their private and intimate relationships (with significant others and with themselves). The privacy that may be at stake with the advance of highly sophisticated profiling technologies concerns freedom to coconstruct one’s own identity in the face of feedback from the social and material environment. Apart from the outright abuse of profiles, e.g., discrimination, unauthorised use or violation of the presumption of innocence, one of the questions raised will be whether advanced, real time and ubiquitous customisation will be heaven or hell for a sustainable vital democracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aarts, E. and Marzano, S., The New Everyday. Views on Ambient Intelligence. 010 Publishers, Rotterdam (Copyright Koninklijke Philips Electronics), 2003.
Agre, P.E. and Rotenberg, M., Technology and Privacy: The New Landscape, MIT Press, Cambridge, Massachusetts, 2001.
Alderman, E. and Kennedy, C., The Right to Privacy, Vintage Books, New York, 1997.
Altman, I., The Environment and Social Behavior. Privacy Personal Space Territory Crowding, Brooks/Cole, Montery, 1975.
Bennett, C.J., ‘Convergence Revisited: Toward a Global Policy for the Protection of Personal Data?’, in Agre, P.E. and Bramhall, G. (eds.), Technology and Privacy: The New Landscape: MIT Press, Cambridge, Massachusetts, 2001, pp. 99–125.
Berlin, I., ‘Two concepts of liberty.’ in Berlin I., Four essays on liberty, Oxford University Press, Oxford New York, 1969, pp. 118–173.
Brownsword, R., ‘Code, control, and choice: why East is East and West is West’, Legal Studies, Vol. 25, No. 1, SLS Publ. Southampton 2005, pp. 1–22.
Clark, A., Natural Born Cyborgs, Oxford University Press, 2003.
Clarke, R, ‘The Digital Persona and its Application to Data Surveillance’, The Information Society, Vol. 10, No. 2, Taylor and Francis Group, 1994, pp. 77–92.
Cohen Varela, A.E., ‘Conclusion: ‘Opening’ ’, Phenomenology and Cognitive Sciences, Vol. 1, No. 2, Springer, Netherlands, 2002, pp. 225–230.
Cohen, S., Visions of Social Control, Polity Press, Cambridge, 1985.
Constant, B., ‘De la Liberté de Anciens Comparée a celle des Modernes.’, in Marcel Gauchet (ed.), De la liberté chez les modernes: Ecrits politiques. Livres de Poche, Paris, 1819/1980.
Custers, B., The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology. Wolf Legal Publishers, Nijmegen, 2004.
Deadman, S., Circles of Trust: The Implications of EU Data Protection and Privacy Law for Establishing a Legal Framework for Identity Federation. Liberty Alliance Project, 2005.
De Mul, J., ‘Digitally mediated (dis)embodiement. Plessner’s concept of excentric positionality explained for cyborgs’, Information, Communication & Society, Vol. 6, No. 2, Routledge, 2003, pp. 247–266.
Foucault, M., Surveiller et punir. Naissance de la prison, Gallimard, Paris, 1975.
Foqué, R. and ‘t Hart, A.C., Instrumentaliteit en rechtsbescherming (Instrumentality and Protection of Law, translation MH), Gouda Quint Kluwer Rechtswetenschappen, Arnhem, 1990.
Glastra van Loon, J.F., Norm en Handeling. Bijdrage tot een kentheoretische fundering van de sociale wetenschappen. Wolters-Noordhoff, Groningen, 1987/1956.
Glenn, H. P., Legal Traditions of the World. Sustainable Diversity of Law (second edition), Oxford, Oxford University Press, 2004.
Gutwirth, S., Privacy and the information age, Rowman & Littlefield Publishers, Inc., Lanham, 2002.
Habermas, J., Strukturwandel der Offentlichkeit. Untersuchungen zu einer Kategorie der burgerlichen Gesellschaft, Suhrkamp, Frankfurt am Main, 1962/1990.
Hendricks, V.F., 500CC Computer Citations, King’s College Publications, London, 2005.
Hildebrandt, M., ‘Privacy and Identity.’ in Claes, E., Duff, A., Gutwirth S. (eds.), Privacy and the Criminal Law, Intersentia, Leuven, 2006.
Hildebrandt, M., Backhouse, J., Descriptive analysis of Profiling practices, FIDIS Deliverable 7.2, European Union IST FIDIS Project, Brussels, 2005. Available at: www.Fidis.net.
Hildebrandt, M., ‘Ambient Intelligence, Criminal Liability and Democracy’, Criminal Law and Philosophy 2008, forthcoming.
Hosein, G., ‘Threatening the Open Society: Comparing Anti-Terror Policies in the US and Europe’, Report Privacy International, London, 2005. Available at: http://www.privacyinternational.org/issues/terrorism/rpt/comparativeterrorreportdec2005.pdf.
Hudson, B., ‘Secrets of Self Punishment and the Right to Privacy’, in Claes, E., Duff, A., Gutwirth, S. (eds.), Privacy and the Criminal Law, Intersentia, Leuven, 2006.
ISTAG (Information Society Technology Advisory Group), Scenarios for Ambient Intelligence in 2010, Brussels, 2001. Available at: http://www.cordis.lu/ist/istag-reports.htm.
ITU (International Telecommunications Union), The Internet of Things, Geneva, 2005. Available (for purchase) at: http://www.itu.int/osg/spu/publications/internetofthings/.
Johnson, J.L., ‘Privacy and the judgment of others’, The Journal of Value Inquiry, Vol. 23, No. 2, Springer Netherlands, 1989, pp. 157–168.
Koops, B.J., Leenes, R. ‘ “Code” and the Slow Erosion of Privacy’, Michigan Telecommunications & Technology Law Review, Vol. 12, No. 1, 2005, pp. 115–188.
Leenes, R. and Koops B.J., ‘ ‘Code’: Privacy’s Death or Saviour?’, International Review of Law Computers & Technology, Vol. 19, No. 3, Taylor and Francis Group, 2005, pp. 329–340.
Lessig, L., Code and other laws of cyberspace. Basic Books, New York, 1999.
Mead, G.H., Mind, Self & Society. From the standpoint of a social behaviorist. The University of Chicago Press, Chicago – Illinois, 1959/1934.
Mill, J.S., On Liberty, Penguin, London, 1859/1974.
Montesquieu, De l’Esprit des Lois. Garnier Frères, Paris, 1973/1748.
Mouffe, C., The democractic paradox, Verso, London New York, 2000.
Nabeth, T., Hildebrandt, M., Inventory of topics and clusters, FIDIS Deliverable 2.1, European Union IST FIDIS Project, Brussels, 2004. Available at: www.fidis.net.
Nagel, T., ‘Concealment and exposure’, Philosophy & Public Affairs, Vol. 27, No. 1, 1998, pp. 3–30.
Oksenberg Rorty, A., The Identities of Persons. University of California Press, Berkeley Los Angelos London, 1976.
Parker, C. et al. (eds.), Regulating Law, Oxford: Oxford University Press 2004.
Plessner, H., Die Stufen des Organischen under der Mensch. Einleitung in die philosophische Anthropologie, Frankfurt, Suhrkamp, 1975.
Ricoeur, P., Oneself as Another. Translated by K. Blamey, The University of Chicago Press, Chicago, 1992.
Reidenberg, J., ‘Lex Informatica: The Formulation of Information Policy Rules Through Technology’, Texas Law Review, Vol. 76, No. 3, Univesity of Texas School of Law, Texas, 1998, pp. 553–585.
Schauer F., Profiles Probabilities and Stereotypes, Belknap Press of Harvard University Press, Cambridge, Mass. London, England, 2003.
Schreurs, W., Hildebrandt, M., Gasson, M., Warwick, K. (eds.), The Report on actual and possible profiling technologies in the field of Ambient Intelligence, FIDIS Deliverable 7.3, European Union IST FIDIS Project, Brussels, 2005. Available at: www.fidis.net.
Smith, R.E., Ben Franklin’s Web Site. Privacy and Curiosity from Plymouth Rock to the Internet. Sheridan Books, 2004.
Solove, D.J., ‘Conceptualizing Privacy’, California Law Review, Vol. 90, No. 4, 2002, pp. 1087–1156.
Solove, D.J., The Digital Person. Technology And Privacy In The Information Age, New York University Press, New York, 2004.
Steinbock, D.J., ‘Data Matching, Data Mining, and Due Process’, Georgia Law Review, Vol. 40, No. 1, University of Georgia School of Law, Athens, Fall 2005, pp 1–84.
Sunstein, C., Republic.com, Princeton University Press, Princeton and Oxford, 2001a.
Sunstein, C., ‘The Daily We. Is the Internet really a blessing for democracy?’, Boston Review, Summer 2001b. Available at: www.bostonreview.net/BR26.3/sunstein.html.
Taylor, C., ‘Responsibility for Self’, pp. 281–301 in Oksenberg Rorty, A. (ed.), The Identities of Persons, University of California Press, Berkeley, Los Angeles, London, 1976.
Tien, L., ‘Architectural Regulation and the Evolution of Social Norms’, International Journal of Communications Law & Policy, No. 9, Part 1, 2004. Available at: http://www.digital-law.net/IJCLP/index.html
van Woudenberg, R., Het mysterie van identiteit. Een analytisch-wijsgerige studie, SUN, Nijmegen, 2000.
Warren, S. and Brandeis, L.D., ‘The Right to Privacy’, Harvard Law Review, Vol. 4, No. 5, The Harvard Law Review Association, Cambridge, 1890, pp. 193–220.
Westin, A., Privacy and Freedom, Atheneum, New York, 1970.
Zarsky, T.Z., ‘ “Mine Your Own Business”: Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion’, Yale Journal of Law & Technology, Vol. 5, 2002–2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science + Business Media B.V
About this chapter
Cite this chapter
Hildebrandt, M. (2008). Profiling and the Identity of the European Citizen. In: Hildebrandt, M., Gutwirth, S. (eds) Profiling the European Citizen. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6914-7_15
Download citation
DOI: https://doi.org/10.1007/978-1-4020-6914-7_15
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-6913-0
Online ISBN: 978-1-4020-6914-7
eBook Packages: Computer ScienceComputer Science (R0)