Abstract
In the fairly standard account, IDM is also sometimes referred to as ‘Access Management.’ In this sense it controls the access and restrictions of ‘identities’ (individuals as well as groups) to their rights, entitlements, opportunities, and accountabilities. In its most elaborate form, IDM encompasses the total of all means necessary in an organization or structure for electronic data processing, including user names, preferences, and access to services and applications. There is however, a related, but broader sense in which IDM can be read, and that is the sense I am alluding to in this chapter. It also affects the registration and identification of persons; in this sense IDM is concerned with the collection of identity related data and the management hereof.
Contribution received in 2010.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Jeroen van den Hoven also mentions Goldman and Thagard’s work in connection with the Internet in van den Hoven 2000, p. 144.
- 2.
Below this point it may compete with other epistemic practices.
- 3.
What we have not discussed here regarding efficiency is the term 'true' in its definition; however, this will be discussed below when we speak of the reliability of the acquired information.
- 4.
This is especially relevant in open infrastructures such as the Internet, and perhaps to a lesser extent in secured infrastructures used for e-government; nonetheless, the entering, monitoring, review, and linking of information leads to similar issues concerning the quality of information.
- 5.
- 6.
- 7.
To quote Derek Parfit 1987, p. 361: ‘It may help to think about this question: how many of us could truly claim, 'Even if railways and motor cars had not been invented, I would still have been born?’.
- 8.
van den Hoven 2000, p. 153 mentions Feinberg’s notion of accumulative harm in ‘The Internet and Varieties of Moral Wrongdoing.’
- 9.
This example was borrowed from Andrew Kernohan, who uses it in his book Liberalism, Equality, and Cultural Oppression to point to the differences in act- and rule- utilitarian thought in attending to this problem. See Kernohan 1998, p. 78.
- 10.
Cf., Anomaly 2009, pp. 423–435.
- 11.
Examples used by Feinberg 1984.
- 12.
Cf., Moohr 2003, pp. 731–784.
- 13.
Cf., Alldridge 2001, pp. 279–319.
- 14.
Interestingly, if we revisit what was said about free-riders in Sect. 5.1, we find that the issue of free-riders, understood as an example of accumulative harm, does not only fuel the identification of citizens and therefore the deployment of technologies such as IDM; in fact, IDM brings on a certain type of accumulative harm itself. Thanks to Sabine Roeser for pointing this out to me.
- 15.
For an appraisal of world population control policies, cf., Connelly 2008.
- 16.
Another discipline where this can be clearly seen is game theory, which holds the basic assumption that players can be identified; there is no point in studying the behavior of unknown players.
- 17.
According to Feinberg 1984, we must distinguish between a non-normative notion of harm as a setback to interests, and a normative notion of harm as a wrong. Yet in Harm to Others he offers a definition of harm as ‘a wrongful set-back to other people's interests’ in which he conflates both conceptions, i.e., setbacks to others’ interests that are wrongs at the same time. For a critical discussion on this topic cf., Hurd 1994, pp. 210–213, and Stewart 2001, pp. 47–67.
- 18.
Thanks to Jeroen van den Hoven for this useful analogy.
- 19.
- 20.
For many purposes, a combination of minimum information and minimum technology is sufficient. A successful example is the project ‘Verwijsindex Risicojongeren’ (VIR). It is part of a Dutch national information system meant to provide insight to different care providers regarding each other’s involvement concerning a particular adolescent. For more information see http://www.verwijsindex.nl/ (available only in Dutch). What makes it a success is that there is no centralized and permanent database; the technology in question only supports the collaboration between associated parties for a clearly confined purpose.
- 21.
For an account of harm on the basis of information cf., van den Hoven 2008, pp. 306–308.
Abbreviations
- IDM:
-
Identity Management Technology
- VCD:
-
Value-Conscious Design
References
Alldridge P (2001) The moral limits of the crime of money laundering. Buffalo Crim Law Rev 5(289):279–319
Anomaly J (2009) Harm to others: the social cost of antibiotics in agriculture. J Agric Environ Ethics 22(5):423–435
Benantar M (2006) Access control systems: security, identity management and trust models. Springer, New York
Cohen A (2009) Compensation for historic injustices: completing the boxill and sher argument. Philos Public Aff 37(1):81–102
Colby K (2009) Current human population dangerous for planet. http://kevincolby.com/2009/04/01/current-human-population-dangerous-for-planet/. Accessed 15 October 2009
Connelly M (2008) Fatal misconception: the struggle to control world population. Belknap, Cambridge
Feinberg J (1984) The moral limits of the criminal law, Volume 1: harm to others. Oxford University Press, Oxford
Flanagan M, Howe D, Nissenbaum H (2005) Values at play: design tradeoffs in socially-oriented game design. Proceedings of CHI 2005, pp 751–760
Flanagan M, Howe D, Nissenbaum H (2008) Embodying values in technology: theory and practice. In: van den Hoven J, Weckert J (eds) Information technology and moral philosophy. Cambridge University Press, pp 322–353
Friedman B, Kahn P, Borning A (2002) Value sensitive design: theory and methods. Technical Report, University of Washington
Gandy O Jr (1993) The panoptic sort: a political economy of personal information. Westview Press, Boulder, CO
Hurd H (1994) What in the world is wrong? J Contemp Leg Issues 5(157):157–216
Kernohan A (1998) Liberalism, equality, and cultural oppression. Cambridge University Press, Cambridge
Laslett P, Fishkin J (eds) (1992) Justice between age groups and generations. Yale University Press, New Haven
Lyon D (ed) (2003) Surveillance as social sorting: privacy, risk, and digital discrimination. Routledge, London
Manders-Huits N, Zimmer M (2009) Values and pragmatic action: the challenges of introducing ethical intelligence in technical design communities. Int Rev Inf Ethics 10:37–44
Moohr GS (2003) The Crime of copyright infringement: an inquiry based on morality, harm, and criminal theory. Boston Univ Law Rev 83(731):731–784
Page E (2006a) Climate change, justice, and future generations. Edward Elgar, Cheltenham
Page E (2006b) The non-identity problem. In: Page E (ed) Climate change, justice, and future generations. Edward Elgar, Cheltenham
Parfit D (1987) Reasons and persons. Clarendon Press, Oxford
Rawls J (1971) A theory of justice. Harvard University Press, Cambridge
Rawls J (1993) Political liberalism. Columbia University Press, Columbia
Regan P (1995) Legislating privacy: technology, social values, and public policy. University of North Carolina Press, Chapel Hill
Simonetta J (2009) Human overpopulation: causes, effects and solutions. Ezine Articles. http://www.ezinearticles.com/?Human-Overpopulation-Causes,-Effects-and-Solutions&id=1985200. Accessed 15 October 2009
Sinnott-Armstrong W (2005) It’s not my fault: global warming and dividual obligations. In: Sinnott-Armstrong W, Howarth R (eds) Perspectives on climate change. JAI Press, Greenwich
Stewart H (2001) Harms, wrongs, and set-backs in Feinberg’s moral limits of the criminal law. Buffalo Crim Law Rev 5(13):47–67
Thagard P (2001) Internet epistemology: contributions of new information technologies to scientific research. In: Crowley K, Schunn CD, Okada T (eds) designing for science: Implications from professional, instructional, and everyday science. Mawah, NJ, Erlbaum, pp 465–485. Also available in preprint (1997) at http://cogsci.uwaterloo.ca/Articles/Pages/Epistemology.html
van den Hoven J (2000) The internet and varieties of moral wrongdoing. In: Langford D (ed) Internet ethics. MacMillan Press, London, pp 127–157
van den Hoven J (2008) Information technology, privacy and the protection of personal data. In: Hoven J van den, Weckert J (eds) Information technology and moral philosophy. Cambridge University Press, Cambridge, pp 301–321
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 T.M.C. ASSER PRESS, The Hague, The Netherlands, and the authors 2011
About this chapter
Cite this chapter
Manders-Huits, N. (2011). Regulating Invisible Harms. In: van der Hof, S., Groothuis, M. (eds) Innovating Government. Information Technology and Law Series, vol 20. T.M.C. Asser Press. https://doi.org/10.1007/978-90-6704-731-9_5
Download citation
DOI: https://doi.org/10.1007/978-90-6704-731-9_5
Published:
Publisher Name: T.M.C. Asser Press
Print ISBN: 978-90-6704-730-2
Online ISBN: 978-90-6704-731-9
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)