Regulating Invisible Harms

  • Noëmi Manders-HuitsEmail author
Part of the Information Technology and Law Series book series (ITLS, volume 20)


In the fairly standard account, IDM is also sometimes referred to as ‘Access Management.’ In this sense it controls the access and restrictions of ‘identities’ (individuals as well as groups) to their rights, entitlements, opportunities, and accountabilities. In its most elaborate form, IDM encompasses the total of all means necessary in an organization or structure for electronic data processing, including user names, preferences, and access to services and applications. There is however, a related, but broader sense in which IDM can be read, and that is the sense I am alluding to in this chapter. It also affects the registration and identification of persons; in this sense IDM is concerned with the collection of identity related data and the management hereof. 


Epistemic Belief Traditional Ethic Intergenerational Justice Malicious Intent Informational Infrastructure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



Identity Management Technology


Value-Conscious Design


  1. Alldridge P (2001) The moral limits of the crime of money laundering. Buffalo Crim Law Rev 5(289):279–319Google Scholar
  2. Anomaly J (2009) Harm to others: the social cost of antibiotics in agriculture. J Agric Environ Ethics 22(5):423–435CrossRefGoogle Scholar
  3. Benantar M (2006) Access control systems: security, identity management and trust models. Springer, New YorkGoogle Scholar
  4. Cohen A (2009) Compensation for historic injustices: completing the boxill and sher argument. Philos Public Aff 37(1):81–102CrossRefGoogle Scholar
  5. Colby K (2009) Current human population dangerous for planet. Accessed 15 October 2009
  6. Connelly M (2008) Fatal misconception: the struggle to control world population. Belknap, CambridgeGoogle Scholar
  7. Feinberg J (1984) The moral limits of the criminal law, Volume 1: harm to others. Oxford University Press, OxfordGoogle Scholar
  8. Flanagan M, Howe D, Nissenbaum H (2005) Values at play: design tradeoffs in socially-oriented game design. Proceedings of CHI 2005, pp 751–760Google Scholar
  9. Flanagan M, Howe D, Nissenbaum H (2008) Embodying values in technology: theory and practice. In: van den Hoven J, Weckert J (eds) Information technology and moral philosophy. Cambridge University Press, pp 322–353Google Scholar
  10. Friedman B, Kahn P, Borning A (2002) Value sensitive design: theory and methods. Technical Report, University of WashingtonGoogle Scholar
  11. Gandy O Jr (1993) The panoptic sort: a political economy of personal information. Westview Press, Boulder, COGoogle Scholar
  12. Hurd H (1994) What in the world is wrong? J Contemp Leg Issues 5(157):157–216Google Scholar
  13. Kernohan A (1998) Liberalism, equality, and cultural oppression. Cambridge University Press, CambridgeGoogle Scholar
  14. Laslett P, Fishkin J (eds) (1992) Justice between age groups and generations. Yale University Press, New HavenGoogle Scholar
  15. Lyon D (ed) (2003) Surveillance as social sorting: privacy, risk, and digital discrimination. Routledge, LondonGoogle Scholar
  16. Manders-Huits N, Zimmer M (2009) Values and pragmatic action: the challenges of introducing ethical intelligence in technical design communities. Int Rev Inf Ethics 10:37–44Google Scholar
  17. Moohr GS (2003) The Crime of copyright infringement: an inquiry based on morality, harm, and criminal theory. Boston Univ Law Rev 83(731):731–784Google Scholar
  18. Page E (2006a) Climate change, justice, and future generations. Edward Elgar, CheltenhamGoogle Scholar
  19. Page E (2006b) The non-identity problem. In: Page E (ed) Climate change, justice, and future generations. Edward Elgar, CheltenhamGoogle Scholar
  20. Parfit D (1987) Reasons and persons. Clarendon Press, OxfordGoogle Scholar
  21. Rawls J (1971) A theory of justice. Harvard University Press, CambridgeGoogle Scholar
  22. Rawls J (1993) Political liberalism. Columbia University Press, ColumbiaGoogle Scholar
  23. Regan P (1995) Legislating privacy: technology, social values, and public policy. University of North Carolina Press, Chapel HillGoogle Scholar
  24. Simonetta J (2009) Human overpopulation: causes, effects and solutions. Ezine Articles.,-Effects-and-Solutions&id=1985200. Accessed 15 October 2009
  25. Sinnott-Armstrong W (2005) It’s not my fault: global warming and dividual obligations. In: Sinnott-Armstrong W, Howarth R (eds) Perspectives on climate change. JAI Press, GreenwichGoogle Scholar
  26. Stewart H (2001) Harms, wrongs, and set-backs in Feinberg’s moral limits of the criminal law. Buffalo Crim Law Rev 5(13):47–67Google Scholar
  27. Thagard P (2001) Internet epistemology: contributions of new information technologies to scientific research. In: Crowley K, Schunn CD, Okada T (eds) designing for science: Implications from professional, instructional, and everyday science. Mawah, NJ, Erlbaum, pp 465–485. Also available in preprint (1997) at
  28. van den Hoven J (2000) The internet and varieties of moral wrongdoing. In: Langford D (ed) Internet ethics. MacMillan Press, London, pp 127–157Google Scholar
  29. van den Hoven J (2008) Information technology, privacy and the protection of personal data. In: Hoven J van den, Weckert J (eds) Information technology and moral philosophy. Cambridge University Press, Cambridge, pp 301–321Google Scholar

Copyright information

© T.M.C. ASSER PRESS, The Hague, The Netherlands, and the authors 2011 2011

Authors and Affiliations

  1. 1.3TU Centre for Ethics and TechnologyDelft University of TechnologyDelftThe Netherlands

Personalised recommendations