HOW DO VIOLATIONS OF PRIVACY AND MORAL AUTONOMY THREATEN THE BASIS OF OUR DEMOCRACY?; pp. 369–381Full article in PDF format | DOI: 10.3176/tr.2012.4.05
Behavior detection technologies are currently being developed to monitor and manage malintents and abnormal behavior from a distance in order to prevent terrorism and criminal attacks. We will show that serious ethical concerns are raised by capturing biometric features without informing people about the processing of their personal data. Our study of a range of European projects of second-generation biometrics, particularly of Intelligent information system supporting observation, searching and detection for security of citizens in urban environments (INDECT) and Automatic Detection of Abnormal Behaviour and Threats in crowded Spaces (ADABTS), shows that violations of privacy put several other values in jeopardy. We will argue that since privacy is in functional relationship with other values such as autonomy, liberty, equal treatment and trust, one should take this into account when limiting privacy for protecting our security. If indeed it should become necessary to restrict our privacy in specific situations, thoughtful consideration must be given to other ways of securing the values that form the foundation of our liberal democratic society.
Aristotle (1996) The Politics. Stephen Everson, ed. Cambridge: Cambridge University Press.
Aristotle (2002) Nicomachean Ethics. Roger Crisp, trans. and ed. Cambridge: Cambridge University Press.
Automatic Detection of Abnormal Behavior and Threats in crowded Spaces (ADABTS) (2010) “ADABTS WP3 abnormal behaviour. D.3”. Available at <https://www.informationsystems. foi.se/main.php/ADABTS_D3.1_Abnormal_Behaviour_Definition_Public_%28PU%29_final.pdf?fileitem=49119233>. Accessed on 17.08.2012.
Automatic Detection of Abnormal Behavior and Threats in crowded Spaces (ADABTS) (2011) “ADABTS WP2 user needs. D.2.1”. Available at <https://www.informationsystems.foi.se/ main.php/ADABTS_D2%201_User_Needs_Final.pdf?fileitem=10010654>. Accessed on 17.08.2012.
Automatic Detection of Abnormal Behavior and Threats in crowded Spaces (ADABTS) (2012) Homepage. Available at <https://www.informationsystems.foi.se/~adabts-fp7>. Accessed on 17.08.2012.
Detection Technologies, Terrorism, Ethics and Human Rights (DETECTER) (2008) “D25. Moral risks of preventive policing in counter-terrorism”. Available at: <http://www.detecter. bham.ac.uk/pdfs/D05.1MoralRisksofPreventivePolicingv2.pdf>. Accessed on 09.09.2012.
Dupré, Louis (1993) “The common good and the open society”. Review of Politics 55, 687–712.
Future of Identity in the Information Society (FIDIS) (2009a) “D3.10. Biometrics in identity management”. Available at <http://www.fidis.net/resources/deliverables/hightechid/#c2057>. Accessed on 17.08.2012.
Future of Identity in the Information Society (FIDIS) (2009b) “D7.12. Behavioural biometric profiling and transparency enhancing tools”. Available at <http://www.fidis.net/fileadmin/fidis/ deliverables/fidis-wp7-del7.12_behavioural-biometric_profiling_and_transparency_enhancing_ tools.pdf >. Accessed on 17.08.2012.
Gavison, Ruth (1980) “Privacy and the limits of law”. The Yale Law Journal 89, 3, 421–471.
Gray, Mitchell (2003) “Urban surveillance and panopticism: will we recognize the facial recognition society?”. Surveillance & Society 1, 3, 314–330.
Heck, Wilmer (2009) “EU to monitor deviant behavior in fight against terrorism”. Spiegel Online, Published online: 21 October. Available at <http://www.spiegel.de/international/europe/ 0,1518,656468,00.html>. Accessed on 02.10.2012.
Häyry, Matti and Tuija Takala (2001) “Genetic information, rights, and autonomy”. Theoretical Medicine 22, 403–414.
Intelligent information system supporting observation, searching and detection for security of citizens in urban environment (INDECT) (2012a) Homepage. Available at <http://www.indect-project.eu/>. Accessed on 17.08.2012.
Intelligent information system supporting observation, searching and detection for security of citizens in urban environment (INDECT) (2012b) “D7.2 Creation of event model in order to detect dangerous events”. Available: <http://www.indect-project.eu/files/deliverables/public/ INDECT_Deliverable_D7.2_v20100430_final.pdf/view>. Accessed on 17.08.2012.
Intelligent information system supporting observation, searching and detection for security of citizens in urban environment (INDECT) (2012c) “D7.3 Biometric feature analysis component based on video and image information”. Available: <http://www.indect-project.eu/files/deliverables/ public/deliverable-7.3/view. >. Accessed on 17.08.2012.
Kupfer, Joseph (1987) “Privacy, autonomy, and self-concept”. American Philosophical Quarterly 24, 1, 81–89.
Lodge, Juliet (2010) “Quantum surveillance and “shared secrets”: a biometric step too far?”. In Justice and home affairs. CEPS Liberty and Security in Europe, 1–39. Available at <http:// www.policypointers.org/Page/View/11489>. Accessed on 02.10.2012.
Lyon, David (2001) “Facing the future: seeking ethics for everyday surveillance”. Ethics and Information Technology 3, 171–181.
Manders-Huits, Noëmi and Jeroen van der Hoven (2008) “Moral identification in identity management systems”. In The future of identity in the information society, 77–91. Simone Fischer-Hübner, Penny Duquenoy, Albin Zuccato, and Leonardo Martucci, eds. New York: Springer.
McCarthy, Paul (2012) “Biometric technologies”. In Encyclopaedia of applied ethics. 2nd ed. Ruth Chadwick, ed. Amsterdam: Elsevier.
Moore, Adam (2008) “Defining privacy”. Journal of Social Philosophy 39, 3, 411–428.
Nissenbaum, Helen (1997) “Toward an approach to privacy in public: challenges of information technology”. Ethics and Behavior 7, 3, 207–219.
Nissenbaum, Helen (2010) Privacy in context: Technology, policy, and the integrity of social life. Stanford, California: Stanford University Press.
Persson, Anders J. and Sven O. Hansson (2003) “Privacy at work – ethical criteria”. Journal of Business Ethics 42, 59–70.
Rössler, Beate (2005) The value of privacy. Cambridge: Polity Press.
Solove, David J. (2007) “‘I’ve got nothing to hide’ and other misunderstandings of privacy”. San Diego Law Review 44, 745–772.
Sutrop, Margit and Katrin Laas-Mikko (2012) “From identity verification to behaviour prediction: ethical implications of second-generation biometrics”. Review of Policy Research 29, 1, 21–36.
Terchek, Ronald J. and David K. Moore (2000) “Recovering the political Aristotle: a critical response to Smith”. The American Political Science Review 94, 4, 905–911.
Travis, Alan (2009) “Fight against terror ‘spells end of privacy’”. The Guardian, Published online: 25 February. Available at <http://www.guardian.co.uk/uk/2009/feb/25/personal-data-terrorism-surveillance>. Accessed on 05.10.2012.Williams, Bernard (1973) Problems of the self. Cambridge: Cambridge University Press.
Back to Issue