Abstract
This chapter draws together the conclusions of the book as a whole, namely that the available typologies of group privacy, such as collective action lawsuits or the articulation of the rights of political or activist groups, are intuitively insufficient to address the landscape emerging from the new data analytic technologies. The book has demonstrated that there are multiple and often divergent perspectives on what a group is and how it should be addressed with regard to privacy, but this divergence is also an important tool for understanding which elements of the problem can be addressed using current legal and conceptual tools and which will require new approaches. The chapter outlines the authors’ contributions to the typology of group privacy concerns, then identifies the gaps and limitations that arise from a group perspective on privacy, and the conceptual and practical implications of taking the group level into account. Finally, it suggests ways forward for future research, discussion and action.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
- 2.
X. v. Iceland.
Bibliography
Bengtsson, L., X. Lu, A. Thorson, R. Garfield, and J. von Schreeb. 2011. Improved response to disasters and outbreaks by tracking population movements with mobile phone network data: A post-earthquake geospatial study in haiti. PLoS Medicine 8(8): e1001083 1–9. http://doi.org/10.1371/journal.pmed.1001083
Bettencourt, L.M.A. 2013. The uses of big data in cities (No. SFI working paper: 2013-09-029).
Bloustein, E.J. 1978. Individual and group privacy. New Brunswick: Transaction Publishers.
Boyd, D. 2010. Social network sites as networked publics: Affordances, dynamics, and implications. In Networked self: Identity, community, and culture on social network sites, ed. Z. Papacharissi, 39–58. New York: Routledge.
Dewey, J. 1927. The public and its problems. Athens: Swallow Press/Ohio University Press.
Gelles, R.J., and M.A. Straus. 1988. Intimate violence: The causes and consequences of abuse in the American family. New York: Simon & Schuster.
Gillespie, T. 2014. The relevance of algorithms. In Media technologies: Essays on communication, materiality, and society, ed. T. Gillespie, P. Boczkowski, and K. Foot, 167–194. Cambridge, MA: MIT Press.
Lyon, D. 2014. Surveillance, snowden, and big data: Capacities, consequences, critique. Big Data & Society 1(2). http://doi.org/10.1177/2053951714541861.
Mizuko, I. 2008. Introduction. In Networked publics, ed. K. Varnelis, 1–14. Cambridge, MA: MIT Press.
Mundie, C. 2014, March/April. Privacy pragmatism. Foreign Affairs. Retrieved from http://www.foreignaffairs.com/articles/140741/craig-mundie/privacy-pragmatism
Wesolowski, A., N. Eagle, A.J. Tatem, D.L Smith, A.M. Noor, R.W. Snow, and C.O. Buckee 2012. Quantifying the impact of human mobility on malaria. Science:267–270. http://doi.org/10.1126/science.1223467
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Taylor, L., van der Sloot, B., Floridi, L. (2017). Conclusion: What Do We Know About Group Privacy?. In: Taylor, L., Floridi, L., van der Sloot, B. (eds) Group Privacy. Philosophical Studies Series, vol 126. Springer, Cham. https://doi.org/10.1007/978-3-319-46608-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-46608-8_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-46606-4
Online ISBN: 978-3-319-46608-8
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)