Abstract
In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In the conclusion, I discuss some of the work that lies ahead.
Similar content being viewed by others
References
Ariáes P., Duby. G. (1987) A History of Private Life 5 vols. Belknap Press of Harvard University Press, Cambridge, Mass, London
I. Asimov. The Dead Past. In Astounding Science Fiction, 6–46, 1956. manca qualche informazione, no?
Bäck E., Wikblad K. (1998) Privacy in Hospital. Journal of Advanced Nursing 27(5):940–945
S.I. Benn. Privacy, Freedom, and Respect for Persons. In Richard Wasserstrom, editor, Today’s Moral Problems. Macmillan, New York, 1975
Bloustein E. (1964) Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser. New York University Law Review 39:962–1007
Cohen J. (2000) Examined Lives: Informational Privacy and the Subject as Object. Stanford Law Review 52:1373–1437
C. Ess, editor, Special Issue on Privacy and Data Privacy Protection in Asia (Ethics and Information Technology), 2005
L. Floridi On the Intrinsic Value of Information Objects and the Infosphere. In Ethics and Information Technology, 4(4): 287–304, 2003
L. Floridi Is Information Meaningful Data? In Philosophy and Phenomenological Research 70(2): 351–370, 2005
Floridi L. (2005) The Ontological Interpretation of Informational Privacy. Ethics and Information Technology 7(4):185–200
L. Floridi, Information Ethics. In Jeroen van den Hoven and John Weckert, editors, Moral Philosophy and Information Technology, Cambridge University Press, Cambridge, forthcoming
L. Floridi. The Logic of Being Informed. Logique et Analyse, forthcoming
Floridi L., Sanders J.W. (2004) On the Morality of Artificial Agents. Minds and Machines 14(3):349–379
Floridi L., Sanders. J.W. (2005) Internet Ethics: The Constructionist Values of Homo Poieticus. In Robert Cavalier (editor) The Impact of the Internet on Our Moral Lives. SUNY, New York
Fried C. (1970) An Anatomy of Values: Problems of Personal and Social Choice. Harvard University Press, Cambridge, Mass
Gibson J.J. (1979) The Ecological Approach to Visual Perception. Houghton Mifflin, Boston, London
Hongladarom S. (2006) Analysis and Justification of Privacy from a Buddhist Perspective. In Hongladarom S., Ess C. (editors) Information Technology Ethics: Cultural Perspectives. Idea Publishing, Hershey, Pennsylvania
Inness J.C. (1996) Privacy, Intimacy, and Isolation. Oxford University Press, New York
Introna L.D. (1997) Privacy and the Computer: Why We Need Privacy in the Information Society. Metaphilosophy 28(3):259–275
Johnson D.G. (1985) Computer Ethics. Prentice-Hall, Englewood Cliffs
Johnson D.G. (2001) Computer Ethics, 3rd ed. Prentice-Hall, Upper Saddle River, NJ
Johnson J.L. (1992) A Theory of the Nature of Value of Privacy. Public Affairs Quarterly 6(3):271–288
Kitiyadisai K. (2005) Privacy Rights and Protection: Foreign Values in Modern Thai Context. Ethics and Information Technology 7(1):17–26
Margulis S.T. (2003) Privacy as a Social Issue and Behavioral Concept. Journal of Social Issues. 59(2):243–261
Moor J.H. (1997) Towards a Theory of Privacy in the Information Age. ACM SIGCAS Computers and Society. 27:27–32
Nakada M., Tamura T. (2005) Japanese Conceptions of Privacy: An Intercultural Perspective. Ethics and Information Technology 7(1):27–36
Nissenbaum H. (1998) Protecting Privacy in an Information Age: The Problem of Privacy in Public. Law and Philosophy 17(5–6):559–596
Rachels J. (1975) Why Privacy Is Important. Philosophy and Public Affairs 4:323–333
Reiman J.H. (1976) Privacy, Intimacy, and Personhood. Philosophy and Public Affairs 6(1):26–44
Scanlon T. (1975) Thomson on Privacy. Philosophy and Public Affairs 4:315–322
Schachter M. (2003) Informational and Decisional Privacy. Carolina Academic Press, Durham, N.C
Seltzer W., Anderson M. (2001) The Dark Side of Numbers: The Role of Population Data Systems in Human Rights Abuses. Social Research 68(2):339–371
Solove D.J. (2002) Conceptualizing Privacy. California Law Review 90:1087–1155
Thompson J. (1996) Models of Value: Eighteenth-Century Political Economy and the Novel. Duke University Press, Durham, N.C. London
Thomson J. (1975) The Right to Privacy. Philosophy and Public Affairs 4:295–314
M. Turilli. Ethical Protocols Design, Ethics and Information Technology, forthcoming
Volkman R. (2003) Privacy as Life, Liberty, Property. Ethics and Information Technology 5(4):199–210
S. Warren and L.D. Brandeis. The Right to Privacy. Harvard Law Review, 193(4), 1890
Acknowledgements
This paper is a fully revised version of a presentation given at the international workshop “Bridging Cultures: Computer Ethics, Culture, and ICT”, organised by the Programme for Applied Ethics in association with the Globalisation programme at NTNU (the Norwegian University of Science and Technology, Trondheim, Norway, June 6th–7th 2005). For that opportunity and for the feedback received, I wish to thank Charles Ess and May Thorseth (co-organisers), Eric Monteiro, Knut Rolland, Johnny Søraker, Bernd Carsten Stahl, Deborah Wheeler and all the students who took part to the workshop, and, for the financial support, NTNU. Charles Ess shared with me some important insights while discussing the final draft, and I hope I managed to take full advantage of his suggestions. As usual, all remaining mistakes are unfortunately mine.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Floridi, L. Four challenges for a theory of informational privacy. Ethics Inf Technol 8, 109–119 (2006). https://doi.org/10.1007/s10676-006-9121-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10676-006-9121-3