Zero-Order Privacy Violations and Automated Decision-Making about Individuals

Authors

DOI:

https://doi.org/10.26512/rfmc.v8i3.34503

Keywords:

Zero-Order Privacy Violations. Privacy. Artificial Agents. Data. Information.

Abstract

In this article, it is presented the notion of zero-order privacy violation as a grounding practice within a new type of human exploitation, namely, data colonialism: massive appropriation of social life through data extraction, acquiring digital “territory” and resources from which economic value can be extracted by capital (Couldry & Mejias, 2019). At first, I claim that privacy violations do not depend on the nature of the agents involved. Robots read your email, and not having humans involved in the process does not make it less of a violation. It is considered that the harvested data stream is better understood as being a commodity when clean, well-formed, meaningful data standards are respected. Then, it is suggested that scenarios like the covid-19 pandemic make a perfect case to expand surveillance via tracking applications. Companies and governments with pre-existing tendencies to secrecy, tech-enabled authoritarianism, and austerity, capitalize on disinformation strategies. Finally, remarks on the value of encryption, and strategic deleting as measures to reinforce privacy are made.

Downloads

Download data is not yet available.

Author Biography

Bernardo Alonso, Universidade Federal do Mato Grosso, UFMT

Professor of epistemology at the Universidade Federal do Mato Grosso (UFMT). PhD in philosophy from the Universidade Federal do Rio de Janeiro (UFRJ).

References

Austin, L. (2003). “Privacy and the Question of Technology”. Law and Philosophy 22:119-166.

Cohen, Julie E. 2018. “The Biopolitical Public Domain: The Legal Construction of the Surveillance Economy.” Philosophy & Technology. 31 (2): 213”“33.

Couldry, N.; Meijas, U. (2019). The Costs of Connection: How data is colonizing human life and appropriating it for capitalism. Stanford University Press.

Caliskan, Aylin; Bryson, Joanna J.; Narayanan, Arvind. (2017). “Semantics derived automatically from language corpora contain human-like biases”. Science. 356 (6334): 183”“186. arXiv:1608.07187.

Dowrk, C.; Roth, A. (2014). “The Algorithmic Foundations of Differential Privacy”. Nos. Vol. 09 3-4:211-417.

Etzioni, A. (2014). “A Cyber Age Privacy Doctrine: A Liberal Communitarian Approach”. I/S Journal of Law and Policy for the Information Society, 10 (2):641-669.

De Rizzo, J. (2020). “Grounding grounds necessity”. Analysis. anz083.

Fine, K. (2012). Guide to ground. In Metaphysical Grounding: Understanding the Structure of Reality, eds. F. Correia and B. Schnieder, 37”“80. Cambridge: Cambridge University Press.

Fine, K. 2017. A theory of truthmaker content I: conjunction, disjunction and negation.

Journal of Philosophical Logic 46: 625”“74.

Floridi, L. (2004). “Outline of a Theory of Strongly Semantic Information”. Minds and Machines 14: 197.

Floridi, L. (2014). The 4th Revolution: How Infosphere is Reshaping Human Reality. Oxford University Press.

Frey, S. (2018, July 3). Ensuring your security and privacy within Gmail [blog post]. Retrieved from https://www.blog.google/technology/safety-security/ensuring-your-security-and-privacy-within-gmail.

Jackson, Matthew O.; Morelli, Massimo (2011). "The Reasons for Wars ”“ an Updated Survey". In Coyne, Chris J.; Mathers, Rachel L. (eds.). The Handbook on the Political Economy of War. Edward Elgar Publishing.

Kleinman, Z. (2018, March 20). Cambridge Analytica: The data firm's global influence. Retrieved from https://www.bbc.com/news/world-43476762.

Lessig, L. (2006). Code: version 2.0, Basic Books, New York.

Liu et al. (2020). “Evolving Normalization-Activation Layers”, Machine Learning, arXiv:2004.02967 [cs.LG].

Parrales et al. (2016). “DNAJA1 controls the fate of misfolded mutant p53 through the mevalonate pathway”. Nature Cell Biology, 18 (11): 1233.

Pyysalo et al. 2020. “WikiBERT models: deep transfer learning for many languages”. Computation and Language, arXiv:2006.01538 [cs.CL].

Snowden. E. (2015). Just days left to kill mass surveillance under Section 215 of the Patriot Act. We are Edward Snowden and the ACLU's Jameel Jaffer. AUA. ”¢ /r/IAmA”. Reddit. Retrieved at https://www.reddit.com/r/IAmA/comments/36ru89/just_days_left_to_kill_mass_surveillance_under

Vedula et al. (2020). “Automatic Discovery of Novel Intents & Domains from Text Utterances”. Computation and Language, arXiv:2006.01208 [cs.CL].

Warren & Brandeis. (1890). “The Right To Privacy”. Harvard Law Review. Vol. IV, 5.

Westin, A. (1968). Privacy and Freedom (Fifth ed.). Atheneum, New York.

https://en.wikipedia.org/wiki/Olmstead_v._United_States Retrieved 12-07-2020.

Downloads

Published

2021-01-31

How to Cite

ALONSO, Bernardo. Zero-Order Privacy Violations and Automated Decision-Making about Individuals. Journal of Modern and Contemporary Philosophy, [S. l.], v. 8, n. 3, p. 69–80, 2021. DOI: 10.26512/rfmc.v8i3.34503. Disponível em: https://periodicos.unb.br/index.php/fmc/article/view/34503. Acesso em: 21 nov. 2024.