Skip to main content

Magicians and Guerrillas: Transforming Time and Space

  • Chapter
  • First Online:
Information Cultures in the Digital Age
  • 740 Accesses

Abstract

Technology allows us to engage in all kinds of activities any time, any place. These range from mundane web browsing to online purchases, accessing services, inputting information, online chatting, leisure and monitoring our own health. They also include the potential for something or someone to follow our online engagement. This paper explores the tensions and ethical issues that technology throws up as we engage with digital devices and so express, what may very loosely and misleadingly be termed, our digital ‘lives’ and ‘selves’ in time and space. We proceed by drawing on the allegorical form that Rafael Capurro so often uses to help us understand complex issues. Accordingly, we juxtapose the metaphors of magicians and guerrillas to tease out some of the issues arising from our digitally enabled existence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Baum, L. F. (2000). The wonderful wizard of Oz. New York, NY: Airmont Books. (Original work published 1900)

    Google Scholar 

  • Capurro, R. (1999). Die “Wahrheit des Seins” ist ein Schatten der “Wahrheit des ZEN.” Einführung zum Vortrag von Prof. Dr. Riuji Endo, University of Library and Information Science, Tsukuba, Japan.“ZEN-Malerei in Japan” am 28. Juni 1999, im Zentrum für Kunst und Medientechnologie (ZKM) Karlsruhe [“The truth of being” is a shadow of “the truth of ZEN.” Introduction to the lecture of Prof. Dr. Endo Riuji University of Library and Information Science, Tsukuba, Japan. “Zen painting in Japan” on 28 June 1999, the Center for Art and Media (ZKM) in Karlsruhe]. http://www.capurro.de/zen.htm

  • Capurro, R. (2007). Intercultural information ethics. In R. Capurro, J. Frühbauer & T. Hausmanninger (Eds.), Localizing the internet: Ethical issues in intercultural perspective (pp. 21–38). Munich, Germany: Fink. http://www.capurro.de/iie.html

  • Capurro, R. (2011). Never enter your real data. International Review of Information Ethics, 16(12), 74-78.

    Google Scholar 

  • Capurro, R. (2012). Wer ist der Mensch? Überlegungen zu einer vergleichenden Theorie der Agenten. In H.-A. Marsiske (Ed.), Kriegsmaschinen – Roboter im Militäreinsatz (pp. 231-239). Hanover, Germany: Heise Verlag.

    Google Scholar 

  • Capurro, R. (2015). Aspectos interculturales de la privacidad en un mundo digitalmente globalizado. Ponencia keynote en el II Congreso Internacional en Ética de la Comunicación, Universidad de Sevilla, 3-5 de abril de 2013 [Intercultural aspects of privacy in a globalized digital world. Keynote presentation at the Second International Conference on Ethics of Communication, University of Sevilla, 3-5 April 2013]. http://www.capurro.de/privacidad_intercultural.html

  • Capurro, R. (2016). Information literacies: Understanding the digital age. In João Antonio de Moraes and Maria Eunice Quilici Gonzalez (Eds.), Life, information and new technologies, Rio de Janeiro (forthcoming). http://www.capurro.de/moraes.html.

  • Capurro, R., & Britz, J. (2010). In search of a code of global information ethics: The road travelled and new horizons. Ethical Space, 7(2/3), 28-36.

    Google Scholar 

  • Capurro R., Eldred M., & Nagel, D. (2013). Digital whoness: Identity, privacy and freedom in the Cyberworld. Frankfurt, Germany: Ontos Verlag.

    Google Scholar 

  • Del Duca, L. F., Kritzer, A. H., & Nagel, D. (2008). Achieving optimal use of harmonization techniques in an increasingly interrelated twenty-first century world of consumer sales: Moving the EU harmonization process to a global plane. Penn St. Int’l L. Rev., 27, 641.

    Google Scholar 

  • European Group on Ethics in Science and New Technologies (2005). Opinion of the European Group on Ethics in Science and New Technologies to the European Commission on Ethical Aspects of ICT implants in the human body, Rapporteurs S. Rodota & R. Capurro, adopted 16 March 2005, Brussels. http://ec.europa.eu/archives/bepa/european-group-ethics/publications/opinions/index_en.htm

  • European Commission (2015). Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, A digital single market strategy for Europe, COM(2015)192 final. Brussels, Belgium, 6 May 2015.

    Google Scholar 

  • Hern, A. (2015). Windows 10: Microsoft under attack over privacy, The Guardian, 3 August.

    Google Scholar 

  • Information Commissioners Office (ICO). (2014). Data use is getting more complicated: The public need someone they can trust to watch over their information. https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2014/07/data-use-is-getting-more-complicated-the-public-need-someone-they-can-trust-to-watch-over-their-information/

  • International Cyber Security Protection Alliance (2012). Project 2020: Scenarios for future cybercrime, white paper for decision-makers. The Hague: The Netherlands: Europol.

    Google Scholar 

  • Lodge, J. (1994) Transparency and democratic legitimacy. Journal of Common Market Studies, 32 (3), 343–368.

    Google Scholar 

  • Lodge, J. (Ed.). (2007). Are you who you say you are?: The EU and biometric borders. Nijmegen, The Netherlands: Wolf Legal Publishers.

    Google Scholar 

  • Lodge, J. (2009). Transparency and accountability: From structuro-procedural transparency and institutional accountability to communicating (in)security in digi-space. In D.Bigo (Ed.) Europe’s 21st century challenge: Delivering liberty and security, Farnham, United Kingdom: Ashgate Publishing.

    Google Scholar 

  • Lodge, J. (2010). Quantum surveillance and shared secrets—A biometric step too far. CEPS. https://www.ceps.eu/publications/quantum-surveillance-and-%E2%80%98shared-secrets%E2%80%99

  • Lodge, J. (2012a). The dark side of the moon: Accountability, ethics and new biometrics. In Second generation biometrics: The ethical, legal and social context (pp. 305-328). Dordrecht, The Netherlands: Springer.

    Google Scholar 

  • Lodge, J. (2012b). Airports: A mirror for future biometrics? Planet Biometrics. http://www.planet-biometrics.com/creo_files/upload/article-files/airports_-_a_mirror_for_future_biometrics.pdf

  • Lodge, J. (2012c). The promise of ethical secrecy: Can curiosity overcome automated group-think? International Review of Information Ethics, 17(7), 32-36.

    Google Scholar 

  • Lodge, J. (2015). “Fortress Europe”: Borders and the power of information in the European Union. In J. Magone (Ed.) Routledge handbook on European politics (pp. 132-152). London, United Kingdom: Routledge.

    Google Scholar 

  • Nakada, M., & Capurro, R. (Eds.) (2013). An intercultural dialogue on roboethics. In The quest for information ethics and roboethics in East and West (pp. 13-22). Research Report on trends in information ethics and roboethics in Japan and the West. ReGIS (Research Group on the Information Society) and ICIE (International Center for Information Ethics). http://www.capurro.de/intercultural_roboethics.html

  • Perta, V. C., Barbera, M. V., Tyson, G., Haddadi, H., & Mei, A. (2015). A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients. Proceedings on Privacy Enhancing Technologies, 1(1), 77-91.

    Google Scholar 

  • Raymond, M. (1994). Matisse contra de Abstracten, Kroniek van Kunst en Kultur, 1953, cited in: Henri Matisse, Jack D. Flam (Ed.), Cologne, Germany: Könemann.

    Google Scholar 

  • Scheule, R. M., Capurro, R., & Hausmanninger, T. (Eds.). (2004). Vernetzt gespalten: Der Digital Divide in ethischer Perspektive. Munich, Germany: Fink Verlag.

    Google Scholar 

  • Shakespeare, W. (2005). The Oxford Shakespeare: The complete works. Oxford, United Kingdom: Oxford University Press.

    Google Scholar 

  • Solove, D. (2013). Nothing to hide: The false trade-off between privacy and security. New Haven, CT: Yale University Press.

    Google Scholar 

  • Teffer, P. (2015). Google has own idea of what “right to be forgotten” means. EU Observer. 31 July. https://euobserver.com/connected/129814

  • Weimann, T., & Nagel, D. (2011). IPv6 und Datenschutz – Personalisiertes Surfen mit Gefahren für die Privatsphäre. Legal Tribune Online. http://www.lto.de/recht/hintergruende/h/ipv6-und-datenschutz-personalisiertes-surfen-mit-gefahren-fuer-die-privatsphaere/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juliet Lodge .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Lodge, J., Nagel, D. (2016). Magicians and Guerrillas: Transforming Time and Space. In: Kelly, M., Bielby, J. (eds) Information Cultures in the Digital Age. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-14681-8_21

Download citation

Publish with us

Policies and ethics