Skip to main content
Erschienen in: Ethics and Information Technology 4/2012

01.12.2012 | Original Paper

Cracking down on autonomy: three challenges to design in IT Law

verfasst von: U. Pagallo

Erschienen in: Ethics and Information Technology | Ausgabe 4/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The paper examines how technology challenges conventional borders of national legal systems, as shown by cases that scholars address as a part of their everyday work in the fields of information technology (IT)-Law, i.e., computer crimes, data protection, digital copyright, and so forth. Information on the internet has in fact a ubiquitous nature that transcends political borders and questions the notion of the law as made of commands enforced through physical sanctions. Whereas many of today’s impasses on jurisdiction, international conflicts of law and diverging interpretations of statutes can be addressed by embedding legal safeguards in ICT and other kinds of technology, to overcome the ineffectiveness of state action by design entails its own risks, e.g., threats of paternalism hinging on the regulatory tools of technology. Rather than modelling people’s behaviour by design, the article suggests that design policies should respect individual and collective autonomy by decreasing the impact of harm-generating behaviour (e.g., security measures and default settings for data protection), or by widening the range of people’s choices (e.g., user friendly interfaces).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
See the Economist’s issue from 6 April 2006 with the special report on “the new paternalism: the avuncular state.”
 
Literatur
Zurück zum Zitat Bekey, G. A. (2005). Autonomous robots: From biological inspiration to implementation and control. Cambridge, Mass: The MIT Press. Bekey, G. A. (2005). Autonomous robots: From biological inspiration to implementation and control. Cambridge, Mass: The MIT Press.
Zurück zum Zitat Bingham, T. (2011). The rule of law. London: Penguin. Bingham, T. (2011). The rule of law. London: Penguin.
Zurück zum Zitat Boyd, D. (2010). Social networks sites as networked publics: affordances, dynamics, and implications. In Z. Papacharissi (Ed.), Networked self: Identity, community, and culture on social networks sites (pp. 39–58). London: Routledge. Boyd, D. (2010). Social networks sites as networked publics: affordances, dynamics, and implications. In Z. Papacharissi (Ed.), Networked self: Identity, community, and culture on social networks sites (pp. 39–58). London: Routledge.
Zurück zum Zitat Butler, J. (2005). Giving an account of oneself. New York: Fordham University Press.CrossRef Butler, J. (2005). Giving an account of oneself. New York: Fordham University Press.CrossRef
Zurück zum Zitat Cavoukian, A. (2010). Privacy by design: The definitive workshop. Identity in the Information Society, 3(2), 247–251.CrossRef Cavoukian, A. (2010). Privacy by design: The definitive workshop. Identity in the Information Society, 3(2), 247–251.CrossRef
Zurück zum Zitat Dworkin, G. (1988). The theory and practice of autonomy. Cambridge, Mass: Cambridge University Press.CrossRef Dworkin, G. (1988). The theory and practice of autonomy. Cambridge, Mass: Cambridge University Press.CrossRef
Zurück zum Zitat Faden, R., & Beauchamp, Th. (1986). A history and theory of informed consent. New York: Oxford University Press. Faden, R., & Beauchamp, Th. (1986). A history and theory of informed consent. New York: Oxford University Press.
Zurück zum Zitat Flanagan, M., Howe, D. C., & Nissenbaum, M. (2008). Embodying values in technology: Theory and practice. In J. van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy (pp. 322–353). New York: Cambridge University Press. Flanagan, M., Howe, D. C., & Nissenbaum, M. (2008). Embodying values in technology: Theory and practice. In J. van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy (pp. 322–353). New York: Cambridge University Press.
Zurück zum Zitat Floridi, L. (2003). On the intrinsic value of information objects and the infosphere. Ethics and Information Technology, 4, 287–304.CrossRef Floridi, L. (2003). On the intrinsic value of information objects and the infosphere. Ethics and Information Technology, 4, 287–304.CrossRef
Zurück zum Zitat Floridi, L., & Sanders, J. (2004). On the morality of artificial agents. Minds and Machines, 14(3), 349–379.CrossRef Floridi, L., & Sanders, J. (2004). On the morality of artificial agents. Minds and Machines, 14(3), 349–379.CrossRef
Zurück zum Zitat Goldsmith, J. (1998). Against cyberanarchy. University of Chicago Law Review, 65(4), 1199–1250.CrossRef Goldsmith, J. (1998). Against cyberanarchy. University of Chicago Law Review, 65(4), 1199–1250.CrossRef
Zurück zum Zitat Grodzinsky, F. S., Miller, K. A., & Wolf, M. J. (2008). The ethics of designing artificial agents. Ethics and Information Technology, 10, 115–121.CrossRef Grodzinsky, F. S., Miller, K. A., & Wolf, M. J. (2008). The ethics of designing artificial agents. Ethics and Information Technology, 10, 115–121.CrossRef
Zurück zum Zitat Hildebrandt, M. (2011) Autonomic and autonomous ‘thinking.’ Preconditions for criminal accountability. In M. Hildebrandt & A. Rouvroy (Eds.), The philosophy of law meets the philosophy of technology (pp. 141–160). Abingdon: Routledge. Hildebrandt, M. (2011) Autonomic and autonomous ‘thinking.’ Preconditions for criminal accountability. In M. Hildebrandt & A. Rouvroy (Eds.), The philosophy of law meets the philosophy of technology (pp. 141–160). Abingdon: Routledge.
Zurück zum Zitat Himma, K. (2009). Artificial agency, consciousness, and the criteria for moral agency: What properties must an artificial agent have to be a moral agent? Ethics and Information Society, 11(1), 19–29.CrossRef Himma, K. (2009). Artificial agency, consciousness, and the criteria for moral agency: What properties must an artificial agent have to be a moral agent? Ethics and Information Society, 11(1), 19–29.CrossRef
Zurück zum Zitat Hustinx, P. (2007). Opinion of the European Data Protection Supervisor on the Communication from the Commission to the European Parliament and the Council on the follow-up of the Work Programme for better implementation of the Data Protection Directive. Official Journal of the European Union, 2007/C 2551/01, July 25th 2007. Hustinx, P. (2007). Opinion of the European Data Protection Supervisor on the Communication from the Commission to the European Parliament and the Council on the follow-up of the Work Programme for better implementation of the Data Protection Directive. Official Journal of the European Union, 2007/C 2551/01, July 25th 2007.
Zurück zum Zitat Jutla, D. N. (2010). Layering privacy on operating systems, social networks, and other platforms by design. Identity in the Information Society, 3(2), 319–341.CrossRef Jutla, D. N. (2010). Layering privacy on operating systems, social networks, and other platforms by design. Identity in the Information Society, 3(2), 319–341.CrossRef
Zurück zum Zitat Kallinikos, J. (2006). The consequences of information: institutional implications of technological change. Elgar, Cheltenham, Northampton, Mass. Kallinikos, J. (2006). The consequences of information: institutional implications of technological change. Elgar, Cheltenham, Northampton, Mass.
Zurück zum Zitat Kant, I. (1795). Kant’s principles of politics, including his essay on perpetual peace. A contribution to political science. (edition 1891) (trans: Hastie W), Edinburgh, Clark. Kant, I. (1795). Kant’s principles of politics, including his essay on perpetual peace. A contribution to political science. (edition 1891) (trans: Hastie W), Edinburgh, Clark.
Zurück zum Zitat Katyal, N. (2003). Digital architecture as crime control. Yale Law Journal, 112(6), 101–129.CrossRef Katyal, N. (2003). Digital architecture as crime control. Yale Law Journal, 112(6), 101–129.CrossRef
Zurück zum Zitat Kelsen, H. (1949). General theory of the law and the state. Cambridge, Mass: Harvard University Press. Kelsen, H. (1949). General theory of the law and the state. Cambridge, Mass: Harvard University Press.
Zurück zum Zitat Kesan, J. P., & Shah, R. C. (2006). Setting software defaults: Perspectives from law, computer science and behavioural economics. Notre Dame Law Review, 82, 583–634. Kesan, J. P., & Shah, R. C. (2006). Setting software defaults: Perspectives from law, computer science and behavioural economics. Notre Dame Law Review, 82, 583–634.
Zurück zum Zitat Kuner, Ch. (2003). European data privacy law and online business. Oxford, London: Oxford University Press. Kuner, Ch. (2003). European data privacy law and online business. Oxford, London: Oxford University Press.
Zurück zum Zitat Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books. Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books.
Zurück zum Zitat Lessig, L. (2004). Free culture: The nature and future of creativity. New York: Penguin Press. Lessig, L. (2004). Free culture: The nature and future of creativity. New York: Penguin Press.
Zurück zum Zitat Lockton, D., Harrison, D. J., & Stanton, N. A. (2010). The design with intent method: A design tool for influencing user behaviour. Applied Ergonomics, 41(3), 382–392.CrossRef Lockton, D., Harrison, D. J., & Stanton, N. A. (2010). The design with intent method: A design tool for influencing user behaviour. Applied Ergonomics, 41(3), 382–392.CrossRef
Zurück zum Zitat Morozov, E. (2011). The net delusion: The dark side of internet freedom. New York: Public Affairs. Morozov, E. (2011). The net delusion: The dark side of internet freedom. New York: Public Affairs.
Zurück zum Zitat Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119–158. Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119–158.
Zurück zum Zitat Pagallo, U. (2010). As law goes by: Topology, ontology, evolution. In P. Casanovas, et al. (Eds.), AI approaches to the complexity of legal systems (pp. 12–26). Berlin: Springer. Pagallo, U. (2010). As law goes by: Topology, ontology, evolution. In P. Casanovas, et al. (Eds.), AI approaches to the complexity of legal systems (pp. 12–26). Berlin: Springer.
Zurück zum Zitat Pagallo, U. (2011a). Designing data protection safeguards ethically. Information, 2(2), 247–265.CrossRef Pagallo, U. (2011a). Designing data protection safeguards ethically. Information, 2(2), 247–265.CrossRef
Zurück zum Zitat Pagallo, U. (2011b). ISPs & rowdy sites before the law: Should we change today’s safe harbor clauses? Philosophy & Technology, 24(4), 419–436.CrossRef Pagallo, U. (2011b). ISPs & rowdy sites before the law: Should we change today’s safe harbor clauses? Philosophy & Technology, 24(4), 419–436.CrossRef
Zurück zum Zitat Post, D. G. (2002). Against “against cyberanarchy”. Berkeley Technology Law Journal, 17(4), 1365–1383.MathSciNet Post, D. G. (2002). Against “against cyberanarchy”. Berkeley Technology Law Journal, 17(4), 1365–1383.MathSciNet
Zurück zum Zitat Prigogine, I. & Stengers, I. (1981). Vincolo, Enciclopedia Einaudi, 14, 1064–1080. Einaudi, Torino. Prigogine, I. & Stengers, I. (1981). Vincolo, Enciclopedia Einaudi, 14, 1064–1080. Einaudi, Torino.
Zurück zum Zitat Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1–22.CrossRef Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1–22.CrossRef
Zurück zum Zitat Tavani, H. T. (in press), Ethical aspects of autonomous systems. In M. Decker & M. Gutmann (eds), Information- and robot-ethics: Some fundamentals, Verlag Berlin, Germany. Tavani, H. T. (in press), Ethical aspects of autonomous systems. In M. Decker & M. Gutmann (eds), Information- and robot-ethics: Some fundamentals, Verlag Berlin, Germany.
Zurück zum Zitat Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5(4), 199–210.CrossRef Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5(4), 199–210.CrossRef
Zurück zum Zitat von Ahn, L., Maurer, B., McMillen, C., Abraham, D., & Blum, M. (2008). reCAPTCHA: Human-based character recognition via web security measures. Science, 321(5895), 1465–1468.MathSciNetMATHCrossRef von Ahn, L., Maurer, B., McMillen, C., Abraham, D., & Blum, M. (2008). reCAPTCHA: Human-based character recognition via web security measures. Science, 321(5895), 1465–1468.MathSciNetMATHCrossRef
Zurück zum Zitat WP 29. (2002). EU Working Party art. 29 D-95/46/EC. The international application of EU data protection law to personal data processing on the Internet by non-EU based web sites, WP 56, May 30th 2002. WP 29. (2002). EU Working Party art. 29 D-95/46/EC. The international application of EU data protection law to personal data processing on the Internet by non-EU based web sites, WP 56, May 30th 2002.
Zurück zum Zitat WP 29. (2009a). EU Working Party art. 29 D-95/46/EC. Online social networking, WP 163, June 12th, 2009. WP 29. (2009a). EU Working Party art. 29 D-95/46/EC. Online social networking, WP 163, June 12th, 2009.
Zurück zum Zitat WP 29. (2009b). EU Working Party art. 29 D-95/46/EC. The future of privacy. WP 168, December 1st 2009. WP 29. (2009b). EU Working Party art. 29 D-95/46/EC. The future of privacy. WP 168, December 1st 2009.
Zurück zum Zitat Yeung, K. (2007). Towards an understanding of regulation by design. In R. Brownsword & K. Yeung (Eds.), Regulating technologies: Legal futures, regulatory frames and technological fixes (pp. 79–108). London: Hart Publishing. Yeung, K. (2007). Towards an understanding of regulation by design. In R. Brownsword & K. Yeung (Eds.), Regulating technologies: Legal futures, regulatory frames and technological fixes (pp. 79–108). London: Hart Publishing.
Zurück zum Zitat Zittrain, J. (2007). Perfect enforcement on tomorrow’s internet. In R. Brownsword & K. Yeung (Eds.), Regulating technologies: Legal futures, regulatory frames and technological fixes (pp. 125–156). London: Hart Publishing. Zittrain, J. (2007). Perfect enforcement on tomorrow’s internet. In R. Brownsword & K. Yeung (Eds.), Regulating technologies: Legal futures, regulatory frames and technological fixes (pp. 125–156). London: Hart Publishing.
Metadaten
Titel
Cracking down on autonomy: three challenges to design in IT Law
verfasst von
U. Pagallo
Publikationsdatum
01.12.2012
Verlag
Springer Netherlands
Erschienen in
Ethics and Information Technology / Ausgabe 4/2012
Print ISSN: 1388-1957
Elektronische ISSN: 1572-8439
DOI
https://doi.org/10.1007/s10676-012-9295-9

Weitere Artikel der Ausgabe 4/2012

Ethics and Information Technology 4/2012 Zur Ausgabe