Skip to main content

Regulating Invisible Harms

  • Chapter
  • First Online:
Book cover Innovating Government

Part of the book series: Information Technology and Law Series ((ITLS,volume 20))

Abstract 

In the fairly standard account, IDM is also sometimes referred to as ‘Access Management.’ In this sense it controls the access and restrictions of ‘identities’ (individuals as well as groups) to their rights, entitlements, opportunities, and accountabilities. In its most elaborate form, IDM encompasses the total of all means necessary in an organization or structure for electronic data processing, including user names, preferences, and access to services and applications. There is however, a related, but broader sense in which IDM can be read, and that is the sense I am alluding to in this chapter. It also affects the registration and identification of persons; in this sense IDM is concerned with the collection of identity related data and the management hereof. 

Contribution received in 2010.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Jeroen van den Hoven also mentions Goldman and Thagard’s work in connection with the Internet in van den Hoven 2000, p. 144.

  2. 2.

    Below this point it may compete with other epistemic practices.

  3. 3.

    What we have not discussed here regarding efficiency is the term 'true' in its definition; however, this will be discussed below when we speak of the reliability of the acquired information.

  4. 4.

    This is especially relevant in open infrastructures such as the Internet, and perhaps to a lesser extent in secured infrastructures used for e-government; nonetheless, the entering, monitoring, review, and linking of information leads to similar issues concerning the quality of information.

  5. 5.

    Cf., Laslett and Fishkin 1992 and Page 2006b.

  6. 6.

    For challenging cases on this topic, e.g., resource depletion and the unborn child of a 14-year old cf., Parfit 1987. See also Cohen 2009 for a discussion of claims to compensation for a wrong that was also a condition of a person’s existence.

  7. 7.

    To quote Derek Parfit 1987, p. 361: ‘It may help to think about this question: how many of us could truly claim, 'Even if railways and motor cars had not been invented, I would still have been born?’.

  8. 8.

    van den Hoven 2000, p. 153 mentions Feinberg’s notion of accumulative harm in ‘The Internet and Varieties of Moral Wrongdoing.’

  9. 9.

    This example was borrowed from Andrew Kernohan, who uses it in his book Liberalism, Equality, and Cultural Oppression to point to the differences in act- and rule- utilitarian thought in attending to this problem. See Kernohan 1998, p. 78.

  10. 10.

    Cf., Anomaly 2009, pp. 423–435.

  11. 11.

    Examples used by Feinberg 1984.

  12. 12.

    Cf., Moohr 2003, pp. 731–784.

  13. 13.

    Cf., Alldridge 2001, pp. 279–319.

  14. 14.

    Interestingly, if we revisit what was said about free-riders in Sect. 5.1, we find that the issue of free-riders, understood as an example of accumulative harm, does not only fuel the identification of citizens and therefore the deployment of technologies such as IDM; in fact, IDM brings on a certain type of accumulative harm itself. Thanks to Sabine Roeser for pointing this out to me.

  15. 15.

    For an appraisal of world population control policies, cf., Connelly 2008.

  16. 16.

    Another discipline where this can be clearly seen is game theory, which holds the basic assumption that players can be identified; there is no point in studying the behavior of unknown players.

  17. 17.

    According to Feinberg 1984, we must distinguish between a non-normative notion of harm as a setback to interests, and a normative notion of harm as a wrong. Yet in Harm to Others he offers a definition of harm as ‘a wrongful set-back to other people's interests’ in which he conflates both conceptions, i.e., setbacks to others’ interests that are wrongs at the same time. For a critical discussion on this topic cf., Hurd 1994, pp. 210–213, and Stewart 2001, pp. 47–67.

  18. 18.

    Thanks to Jeroen van den Hoven for this useful analogy.

  19. 19.

    For frameworks included under this heading cf., ‘Design for Values’, Jean Camp, (n.d.), ‘Values at Play’, Flanagan et al. 2005; Flanagan et al. 2008, and Friedman et al. 2002.

  20. 20.

    For many purposes, a combination of minimum information and minimum technology is sufficient. A successful example is the project ‘Verwijsindex Risicojongeren’ (VIR). It is part of a Dutch national information system meant to provide insight to different care providers regarding each other’s involvement concerning a particular adolescent. For more information see http://www.verwijsindex.nl/ (available only in Dutch). What makes it a success is that there is no centralized and permanent database; the technology in question only supports the collaboration between associated parties for a clearly confined purpose.

  21. 21.

    For an account of harm on the basis of information cf., van den Hoven 2008, pp. 306–308.

Abbreviations

IDM:

Identity Management Technology

VCD:

Value-Conscious Design

References

  • Alldridge P (2001) The moral limits of the crime of money laundering. Buffalo Crim Law Rev 5(289):279–319

    Google Scholar 

  • Anomaly J (2009) Harm to others: the social cost of antibiotics in agriculture. J Agric Environ Ethics 22(5):423–435

    Article  Google Scholar 

  • Benantar M (2006) Access control systems: security, identity management and trust models. Springer, New York

    Google Scholar 

  • Cohen A (2009) Compensation for historic injustices: completing the boxill and sher argument. Philos Public Aff 37(1):81–102

    Article  Google Scholar 

  • Colby K (2009) Current human population dangerous for planet. http://kevincolby.com/2009/04/01/current-human-population-dangerous-for-planet/. Accessed 15 October 2009

  • Connelly M (2008) Fatal misconception: the struggle to control world population. Belknap, Cambridge

    Google Scholar 

  • Feinberg J (1984) The moral limits of the criminal law, Volume 1: harm to others. Oxford University Press, Oxford

    Google Scholar 

  • Flanagan M, Howe D, Nissenbaum H (2005) Values at play: design tradeoffs in socially-oriented game design. Proceedings of CHI 2005, pp 751–760

    Google Scholar 

  • Flanagan M, Howe D, Nissenbaum H (2008) Embodying values in technology: theory and practice. In: van den Hoven J, Weckert J (eds) Information technology and moral philosophy. Cambridge University Press, pp 322–353

    Google Scholar 

  • Friedman B, Kahn P, Borning A (2002) Value sensitive design: theory and methods. Technical Report, University of Washington

    Google Scholar 

  • Gandy O Jr (1993) The panoptic sort: a political economy of personal information. Westview Press, Boulder, CO

    Google Scholar 

  • Hurd H (1994) What in the world is wrong? J Contemp Leg Issues 5(157):157–216

    Google Scholar 

  • Kernohan A (1998) Liberalism, equality, and cultural oppression. Cambridge University Press, Cambridge

    Google Scholar 

  • Laslett P, Fishkin J (eds) (1992) Justice between age groups and generations. Yale University Press, New Haven

    Google Scholar 

  • Lyon D (ed) (2003) Surveillance as social sorting: privacy, risk, and digital discrimination. Routledge, London

    Google Scholar 

  • Manders-Huits N, Zimmer M (2009) Values and pragmatic action: the challenges of introducing ethical intelligence in technical design communities. Int Rev Inf Ethics 10:37–44

    Google Scholar 

  • Moohr GS (2003) The Crime of copyright infringement: an inquiry based on morality, harm, and criminal theory. Boston Univ Law Rev 83(731):731–784

    Google Scholar 

  • Page E (2006a) Climate change, justice, and future generations. Edward Elgar, Cheltenham

    Google Scholar 

  • Page E (2006b) The non-identity problem. In: Page E (ed) Climate change, justice, and future generations. Edward Elgar, Cheltenham

    Google Scholar 

  • Parfit D (1987) Reasons and persons. Clarendon Press, Oxford

    Google Scholar 

  • Rawls J (1971) A theory of justice. Harvard University Press, Cambridge

    Google Scholar 

  • Rawls J (1993) Political liberalism. Columbia University Press, Columbia

    Google Scholar 

  • Regan P (1995) Legislating privacy: technology, social values, and public policy. University of North Carolina Press, Chapel Hill

    Google Scholar 

  • Simonetta J (2009) Human overpopulation: causes, effects and solutions. Ezine Articles. http://www.ezinearticles.com/?Human-Overpopulation-Causes,-Effects-and-Solutions&id=1985200. Accessed 15 October 2009

  • Sinnott-Armstrong W (2005) It’s not my fault: global warming and dividual obligations. In: Sinnott-Armstrong W, Howarth R (eds) Perspectives on climate change. JAI Press, Greenwich

    Google Scholar 

  • Stewart H (2001) Harms, wrongs, and set-backs in Feinberg’s moral limits of the criminal law. Buffalo Crim Law Rev 5(13):47–67

    Google Scholar 

  • Thagard P (2001) Internet epistemology: contributions of new information technologies to scientific research. In: Crowley K, Schunn CD, Okada T (eds) designing for science: Implications from professional, instructional, and everyday science. Mawah, NJ, Erlbaum, pp 465–485. Also available in preprint (1997) at http://cogsci.uwaterloo.ca/Articles/Pages/Epistemology.html

  • van den Hoven J (2000) The internet and varieties of moral wrongdoing. In: Langford D (ed) Internet ethics. MacMillan Press, London, pp 127–157

    Google Scholar 

  • van den Hoven J (2008) Information technology, privacy and the protection of personal data. In: Hoven J van den, Weckert J (eds) Information technology and moral philosophy. Cambridge University Press, Cambridge, pp 301–321

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Noëmi Manders-Huits .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 T.M.C. ASSER PRESS, The Hague, The Netherlands, and the authors 2011

About this chapter

Cite this chapter

Manders-Huits, N. (2011). Regulating Invisible Harms. In: van der Hof, S., Groothuis, M. (eds) Innovating Government. Information Technology and Law Series, vol 20. T.M.C. Asser Press. https://doi.org/10.1007/978-90-6704-731-9_5

Download citation

Publish with us

Policies and ethics

Societies and partnerships