Abstract
This chapter examines how state paternalism affects autonomy. Paternalism is described as active and passive, both of which affect personal liberty but can be regarded as beneficial. The ethico-legal issues associated with paternalism are considered in detail and how the state might claim the right to use face recognition technology without consent is examined.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
Pomeroy (1994).
- 3.
Mann (1984).
- 4.
ibid pp. 187–188.
- 5.
ibid p. 188.
- 6.
Wikipedia (n.d.).
- 7.
Mann (1984), p. 188.
- 8.
Petit (1996), pp. 578–604.
- 9.
ibid p. 578.
- 10.
ibid p. 580.
- 11.
- 12.
Hobbes (1651).
- 13.
Petit (1996), p. 596.
- 14.
- 15.
Petit (1996) p. 596.
- 16.
ibid p. 599.
- 17.
ibid p. 600.
- 18.
See Chap. 3.
- 19.
Chesterman (2011), p. 9.
- 20.
Nelson (2011), p. 66.
- 21.
Doyal and Gough (1991), p. 89.
- 22.
American Constitution.
- 23.
Mill (1859) in Gray J, Smith GW (1991), p. 33. My italics.
- 24.
ibid p. 30.
- 25.
McClory (2010).
- 26.
- 27.
Gray (1991), p. 197.
- 28.
Mill (1859), pp. 74–75.
- 29.
See Quattrociocchi et al. (2016).
- 30.
Mill (1859), p. 90.
- 31.
Dworkin (1988) (reprinted 1997), p. 10.
- 32.
See Smart and Williams (1973).
- 33.
See Fine (1984), pp. 20–26.
- 34.
- 35.
Dworkin (1988), p. 11.
- 36.
Mill (1859), p. 33.
- 37.
Dworkin (1988), pp. 16–17.
- 38.
Mill (1859), p. 90.
- 39.
The random checks are indicative of the political will not to attribute social typologies and avoid social sorting. Further discussion of this phenomena is beyond the scope of this book.
- 40.
Nelson (2011), p. 165.
- 41.
CCTV & Surveillance Cameras. For example, crime prevention on London buses.
- 42.
Nelson (2011), p. 167.
- 43.
See Whitehead (2013), p. 86.
- 44.
Mill (1859), pp. 30–31.
- 45.
Nelson (2011), p. 106.
- 46.
Kremer (2014), p. 128.
- 47.
Van de Veer (1986), p. 41.
- 48.
TSA-OSO Form 1000 (Rev. 1-13-2010).
- 49.
Accardo and Chaudhry Ahmed (2014), pp. 198–200.
- 50.
ibid p. 199.
- 51.
Nelson (2011), p. 171 reflecting on Hart HLA ‘Paternalism “the protection of people against themselves” according to Hart, is necessary to the preservation of society, but the enforcement of morality requires justification that society finds acceptable lest the exercise of power be viewed as illegitimate’.
- 52.
For example, the United States ‘Secure Flight Program’.
- 53.
- 54.
Nelson (2011), p. 192.
- 55.
Beauchamp and Childress (2001).
- 56.
For instance, social networks and the interoperability of multiple data dossiers that contain identity photographs. The potential aggregation of data is not second-order compliant because consenting to one use may leverage unconsented use elsewhere.
- 57.
The often dense and incomprehensible terms and conditions (T&Cs) may eventually disappear as the GDPR takes effect. However, if the T&Cs are not entirely clear and understandable, then they cannot be said to be providing information that allows consent to be informed.
- 58.
See Sect. 3.3.1 Public Disclosure.
- 59.
- 60.
Ponemon Institute.
- 61.
EEOC v. CONSOL Energy, Inc. and Consolidation Coal Company.
- 62.
EEOC sues Consol Energy and Consolidation Coal Company for religious discrimination.
- 63.
Curry (1997), p. 688.
- 64.
Gray (2003), p. 317.
- 65.
Legatum Institute Prosperity Index 2018.
- 66.
Royal Academy of Engineering (2007), p. 33.
- 67.
ibid, p. 11.
- 68.
Berle (2011).
- 69.
Dworkin (1988), p. 18.
- 70.
Foucault (1977).
References
Accardo J, Chaudhry Ahmed M (2014) Radiation exposure and privacy concerns surrounding full-body scanners in airports. J Radiat Res Appl Sci 7:198–200. http://www.sciencedirect.com/science/article/pii/S1687850714000168. Accessed 26 Aug 2019
American Constitution, https://www.law.cornell.edu/constitution/preamble. Accessed 26 August 2019
BBC News, 04-11-2013 ‘Tesco petrol stations use face-scan tech to target ads’ http://www.bbc.co.uk/news/technology-24803378. Accessed 26 Aug 2019
Beauchamp TL, Childress JF (2001) Principles of biomedical ethics, 5th edn. Oxford University Press, New York
Berle I (2011) Privacy and confidentiality: what’s the difference? J Visual Commun 34(1):43–44. https://www.tandfonline.com/doi/abs/10.3109/17453054.2011.550845?journalCode=ijau20. Accessed 26 Aug 2019
CCTV & Surveillance Cameras, https://www.tfl.gov.uk/corporate/privacy-and-cookies/cctv. Accessed 22 Sept 2019
Chesterman S (2011) One nation under surveillance: a new social contract to defend freedom without sacrificing liberty. Oxford University Press, Oxford, p 9
Collingridge D (1981) The social control of technology. Palgrave Macmillan
Curry MR (1997) The digital individual and the private realm. Ann Assoc Am Geogr 87(4):681–699. http://onlinelibrary.wiley.com/doi/10.1111/1467-8306.00073/abstract. Accessed 26 Aug 2019
Doyal L, Gough I (1991) A theory of human need. MacMillan Press Limited, Basingstoke, p 89
Dworkin G (1988) (reprinted 1997) The theory and practice of autonomy. Cambridge University Press, p 10
EEOC sues Consol Energy and Consolidation Coal Company for religious discrimination. http://www.eeoc.gov/eeoc/newsroom/release/9-25-13d.cfm; and https://www.eeoc.gov/eeoc/newsroom/release/8-27-15a.cfm. Accessed 26 Aug 2019
Fine B (1984) Marx’s capital: ‘commodity production. Palgrave, London, pp 20–26
Foucault M (1977) Discipline and Punish, Birth of the Prison, translated by Alan Sheridan. (First published as ‘Surveiller et punir: Naissance de la prison’ by Éditions Gallimard, Paris, 1975; Penguin Books 1991)
Gray J (1991) Mill’s conception of happiness. In: Gray J, Smith GW (eds) On liberty in focus. Routledge, London, p 197
Gray M (2003) Urban surveillance and panopticism: will we recognize the facial recognition society? Surveill Soc 1(3):314–330. https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3343. Accessed 26 Aug 2019
Hobbes T (1651) Leviathan. http://www.gutenberg.org/files/3207/3207-h/3207-h.htm. Accessed 26 Aug 2019
Kremer J (2014) On the end of freedom in public spaces: legal challenges of wide-area and multiple-sensor surveillance systems. In: Davis F, Mcgarrity N, Williams G (eds) Surveillance, counter-terrorism and comparative constitutionalism. Routledge, Oxford, p 128
Legatum Institute Prosperity Index 2018. http://prosperity.com/#!/ranking. Accessed 26 Aug 2019
Mann M (1984) The autonomous power of the state: its origins, mechanisms and results. Eur J Sociol 25(2):185–213 Archives européennes de sociologie 1984, published by Cambridge University Press. www.jstor.org/stable/23999270. Accessed 22 Sept 2019
McClory J (2010) The new persuaders: an international ranking of soft power. Institute of Government. http://www.instituteforgovernment.org.uk/sites/default/files/publications/The%20new%20persuaders_0.pdf. Accessed 26 Aug 2019
Mill JS (1859) In: Gray J, Smith GW (eds) (1991) On liberty in focus. Routledge, London, 1991, p 33
Nelson LS (2011) American identified: biometric technology and society. Massachusetts Institute of Technology, published by the MIT Press, p 66
Petit P (1996) Freedom as antipower. Ethics 106(3):578–604. University of Chicago Press. https://www.jstor.org/stable/2382272?seq=1#page_scan_tab_contents. Accessed 26 August
Pomeroy SB (1975) Goddesses, whores, wives, & slaves: women in classical antiquity. Pimlico 1994
Ponemon Institute National Survey on Data Security Breach Notification 2005. Cached on Google
Quattrociocchi W, Scala A, Sunstein CR (2016) Echo Chambers on Facebook (June 13, 2016). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2795110. Accessed 26 Aug 2019
Rawls J (1971) (Rev 1999) A theory of justice. Revised Edition 1999. The Belknap Press of Harvard University Press, Cambridge
Royal Academy of Engineering (2007) Dilemmas of Privacy and Surveillance Challenges of Technological Change. https://www.raeng.org.uk/publications/reports?q=Dilemmas%20of%20Privacy%20and%20Surveillance%20Challenges%20of%20Technological%20Change. Accessed 26 Aug 2019
Rule JB (2007) Privacy in peril. Oxford University Press, Oxford
Samuelson P (1999) Property as intellectual property. Stanf Law Rev 1126–1173. Stan Law Rev 52:1125, p 1146–1151. https://scholarship.law.berkeley.edu/facpubs/2137/. Accessed 26 Aug 2019
Smart JJC, Williams B (1973) Utilitarianism: for and against. Cambridge University Press, Cambridge
Solove DJ (2011) Nothing to hide: the false trade off between privacy and security. Yale University Press, New Haven
TSA-OSO Form 1000 (Rev. 1-13-2010) Section 110(b) of the Aviation and Transportation Security Act of 2001, 49 U.S.C. 44901(c)-(e)
(United States Equal Employment Opportunity Commission) EEOC v. CONSOL Energy, Inc. and Consolidation Coal Company, Civil Action No. 1:13-cv-00215-IMK
United States ‘Secure Flight Program’. http://www.tsa.gov/stakeholders/secure-flight-program. Accessed 26 Aug 2019
Van de Veer D (1986) Paternalistic intervention: the moral bounds of benevolence. Princeton University Press, Princeton, p 41
Veak TJ (ed) (2006) Democratizing technology. State University of New York Press
von Hippel E (2005) Democratizing innovation. MIT Press
Whitehead JW (2013) A government of wolves: the emerging American Police State. Select Books Inc, New York
Wikipedia (n.d.) Stasi. https://en.wikipedia.org/wiki/Stasi#Personnel_and_recruitment; Mass Surveillance in East Germany. https://en.wikipedia.org/wiki/Mass_surveillance_in_East_Germany. Accessed 26 Aug 2019
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Berle, I. (2020). State Paternalism and Autonomy. In: Face Recognition Technology. Law, Governance and Technology Series, vol 41. Springer, Cham. https://doi.org/10.1007/978-3-030-36887-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-36887-6_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36886-9
Online ISBN: 978-3-030-36887-6
eBook Packages: Law and CriminologyLaw and Criminology (R0)