Zero-Order Privacy Violations and Automated Decision-Making about Individuals
DOI:
https://doi.org/10.26512/rfmc.v8i3.34503Parole chiave:
Zero-Order Privacy Violations. Privacy. Artificial Agents. Data. Information.Abstract
In this article, it is presented the notion of zero-order privacy violation as a grounding practice within a new type of human exploitation, namely, data colonialism: massive appropriation of social life through data extraction, acquiring digital “territory” and resources from which economic value can be extracted by capital (Couldry & Mejias, 2019). At first, I claim that privacy violations do not depend on the nature of the agents involved. Robots read your email, and not having humans involved in the process does not make it less of a violation. It is considered that the harvested data stream is better understood as being a commodity when clean, well-formed, meaningful data standards are respected. Then, it is suggested that scenarios like the covid-19 pandemic make a perfect case to expand surveillance via tracking applications. Companies and governments with pre-existing tendencies to secrecy, tech-enabled authoritarianism, and austerity, capitalize on disinformation strategies. Finally, remarks on the value of encryption, and strategic deleting as measures to reinforce privacy are made.
Downloads
Riferimenti bibliografici
Austin, L. (2003). “Privacy and the Question of Technology”. Law and Philosophy 22:119-166.
Cohen, Julie E. 2018. “The Biopolitical Public Domain: The Legal Construction of the Surveillance Economy.” Philosophy & Technology. 31 (2): 213”“33.
Couldry, N.; Meijas, U. (2019). The Costs of Connection: How data is colonizing human life and appropriating it for capitalism. Stanford University Press.
Caliskan, Aylin; Bryson, Joanna J.; Narayanan, Arvind. (2017). “Semantics derived automatically from language corpora contain human-like biases”. Science. 356 (6334): 183”“186. arXiv:1608.07187.
Dowrk, C.; Roth, A. (2014). “The Algorithmic Foundations of Differential Privacy”. Nos. Vol. 09 3-4:211-417.
Etzioni, A. (2014). “A Cyber Age Privacy Doctrine: A Liberal Communitarian Approach”. I/S Journal of Law and Policy for the Information Society, 10 (2):641-669.
De Rizzo, J. (2020). “Grounding grounds necessity”. Analysis. anz083.
Fine, K. (2012). Guide to ground. In Metaphysical Grounding: Understanding the Structure of Reality, eds. F. Correia and B. Schnieder, 37”“80. Cambridge: Cambridge University Press.
Fine, K. 2017. A theory of truthmaker content I: conjunction, disjunction and negation.
Journal of Philosophical Logic 46: 625”“74.
Floridi, L. (2004). “Outline of a Theory of Strongly Semantic Information”. Minds and Machines 14: 197.
Floridi, L. (2014). The 4th Revolution: How Infosphere is Reshaping Human Reality. Oxford University Press.
Frey, S. (2018, July 3). Ensuring your security and privacy within Gmail [blog post]. Retrieved from https://www.blog.google/technology/safety-security/ensuring-your-security-and-privacy-within-gmail.
Jackson, Matthew O.; Morelli, Massimo (2011). "The Reasons for Wars ”“ an Updated Survey". In Coyne, Chris J.; Mathers, Rachel L. (eds.). The Handbook on the Political Economy of War. Edward Elgar Publishing.
Kleinman, Z. (2018, March 20). Cambridge Analytica: The data firm's global influence. Retrieved from https://www.bbc.com/news/world-43476762.
Lessig, L. (2006). Code: version 2.0, Basic Books, New York.
Liu et al. (2020). “Evolving Normalization-Activation Layers”, Machine Learning, arXiv:2004.02967 [cs.LG].
Parrales et al. (2016). “DNAJA1 controls the fate of misfolded mutant p53 through the mevalonate pathway”. Nature Cell Biology, 18 (11): 1233.
Pyysalo et al. 2020. “WikiBERT models: deep transfer learning for many languages”. Computation and Language, arXiv:2006.01538 [cs.CL].
Snowden. E. (2015). Just days left to kill mass surveillance under Section 215 of the Patriot Act. We are Edward Snowden and the ACLU's Jameel Jaffer. AUA. ”¢ /r/IAmA”. Reddit. Retrieved at https://www.reddit.com/r/IAmA/comments/36ru89/just_days_left_to_kill_mass_surveillance_under
Vedula et al. (2020). “Automatic Discovery of Novel Intents & Domains from Text Utterances”. Computation and Language, arXiv:2006.01208 [cs.CL].
Warren & Brandeis. (1890). “The Right To Privacy”. Harvard Law Review. Vol. IV, 5.
Westin, A. (1968). Privacy and Freedom (Fifth ed.). Atheneum, New York.
https://en.wikipedia.org/wiki/Olmstead_v._United_States Retrieved 12-07-2020.
##submission.downloads##
Pubblicato
Come citare
Fascicolo
Sezione
Licenza
Copyright (c) 2021 Journal of Modern and Contemporary Philosophy
Questo lavoro è fornito con la licenza Creative Commons Attribuzione - Non commerciale - Non opere derivate 4.0 Internazionale.
Direitos Autorais para artigos publicados nesta revista são do autor, com direitos da primeira publicação para a revista. Em virtude dos artigos aparecerem nesta revista de acesso público, os artigos são de uso gratuito, com atribuições próprias, em aplicações educacionais e não-comerciais.