Skip to main content
Top
Published in: Ethics and Information Technology 4/2018

17-07-2018 | Original paper

A practice–theoretical account of privacy

Author: Wulf Loh

Published in: Ethics and Information Technology | Issue 4/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy (SORM), it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior and role obligations within a specific practice (first level), as well as evaluate the normative structure, the fundamental practice norms as well as the roles and their status (second level). The SORM utilizes the concept of standard authority to explicate privacy with regard to two categories that capture the relevant phenomena of privacy: decisional and informational privacy. Within a practice, an actor is said to have decisional privacy if she as a BCR does not (or does not have to) recognize bearers of accidental roles as standard authorities. Vice versa, an actor is said to enjoy informational privacy if all other BCRs (and especially data collecting actors) recognize her as a standard authority. Additionally, the requirement of mutual recognition by the practice participants as standard authorities introduces a “weak normativity” into the theory, which can be used to identify deficient privacy arrangements within practices.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
1
Beate Roessler distinguishes three historical stages or phases of the debate (Roessler 2016). In short, she claims that the first stage centers around the individual dimensions of privacy, the second around the social dimensions (privacy in and for relationships), and the third around the political dimension (privacy as a prerequisite for democracy).
 
2
Analogous to Roessler’s distinction, Priscilla Regan distinguishes three types of values that can inform our value judgments about privacy: individual value, public value, and common value (Regan 1995, p. 203).
 
3
Following Roessler (2005, Ch. 3.4), I will qualify between a “instrumental/functional value” of privacy, where privacy is valuable for something else (autonomy, authenticity, relationships, democracy etc.) and an “intrinsic value”, where privacy is valued for its own sake (Fried 1984). In this regard, “intrinsic” is used in the sense of “ultimate ends” (Parsons 1949, 75, Fn. 2), not in the sense of the “location or source of the goodness” (Korsgaard 1983, p. 179).
 
4
In my opinion, this is the general downside of Floridi’s ontological concept of privacy as informational friction (Floridi 2005). His system-theoretically informed account allows only for a very basic normative argument about reserving some kind of privacy because of informational entropy.
 
5
In fact, phenomenon adequacy is a fundamental prerequisite for any valid theory or description of a concept, not just in the realm of privacy. However, I specifically point it out here, as it features prominently in Floridi’s four challenges. More importantly, however, especially a unified theory of privacy needs to ensure phenomenon adequacy, as it cannot capture different phenomena by different explanations as e.g. a cluster theory can. Therefore, it is worth making this prerequisite explicit and to be mindful to lay out the theory such that it adequately tracks the main core of the phenomenon.
 
6
For DeCew, this narrow definition is sufficient, since the other areas of decisional privacy are in her conception covered by the notion of accessibility privacy.
 
7
And maybe also for the feasibility of the normative demands it makes in the sense of a “realistic utopia” (Rawls 2003, § 1).
 
8
This has to do with the comparatively high level of theoretical abstraction that most value theories of privacy are situated at. In referring to abstract values such as autonomy, authenticity, intimacy, democracy etc., those theories capture different aspects of our intuitions about what is valuable and why. The respective normative demands that follow from those principles may be equally coherent in themselves, but not compatible to each other. Therefore, an answer to the question “What is privacy?” (i.e. a general theory of privacy) should be able to accommodate as many value judgments about privacy as possible.
 
9
For DeCew’s account, however, I showed above that her three types of interests can be categorized as belonging to either the decisional or the informational domain of privacy.
 
10
In contrast, Pierre Bourdieu as one of the main proponents of practice theory famously refrained from giving a positive definition of social practices (Schmidt 2012, pp. 35–36). According to him, beyond empirical descriptions of actual practices it is to him impossible to provide an accurate overall synthesis (Bourdieu 1990, Ch. 5). In addition, he insists that the practical turn in sociology is not to be limited to the object of scientific observation but must include the scientific observation as a practice as well. In this sense, he claims that the internal “logic” of a given practice must not be confused with the “logic” of the practice theory that is used to describe it (Bourdieu 1977).
 
11
This characterization contends that goals and values that come with the normative status function of roles should also be described in terms of role obligations. For a different account cf. Raz (1999, Ch. 4). I am indebted to Hauke Behrendt for highlighting this point.
 
12
Various accounts of role obligations differentiate between the (generally more uncontroversial) normative status function that comes with a certain role and the ideal of this given role, which is expressed by (oftentimes more contested) “standards of excellence” (MacIntyre 1985, p. 187).
 
13
For the opposite claim that an external observer is not in a privileged position to describe the practice norms more adequately than the participants see e.g. Garfinkel 1967; Geertz 1973; Boltanski and Chiapello 2007.
 
14
Other answers individuate practices by their particular sequence of actions (Wittgenstein 1998) or by a certain set of norms in the form of role obligations (Searle 2008, Ch. 4.II).
 
15
“Fundamental” in this respect means that the motivation is “content-independent” (Raz 1986, p. 35) of the specific practice norms. This provides the participants with reasons to uphold the practice that do not cater to their short-term interests and therefore are not dependent on them. They are, however, also partly motivated to uphold the practice if it furthers their interests. This aspect of their motivation is content-dependent, i.e. it depends on the structure of the practice and the goals that the participants pursue with and in it.
 
16
Since in this example we are talking also about legal norms and obligations, the idea of an equal say may have to revert to more institutionalized forms of standard authority, such as public contestation, legal complaints and lawsuits, voting and policy-making etc. As a patient, however, I still enjoy the standard authority to criticize my doctor directly and demand justification for her—in my eyes faulty—enactment of her role as doctor with regard to her role obligations in terms of informational privacy.
 
17
Note that such an equal say will typically result in very general interpretations of informational privacy norms. From these, experts then have to determine whether we should e.g. employ the idea of dynamic consent (Kaye et al. 2015), sticky policies in database solutions (Mont et al. 2003), or some combination strategies thereof; which models of user authentication (Cavoukian and Jones 2014), ano- and pseudonymity strategies (Hartzog and Stutzman 2013), methods of data minimization (Tene and Polonetsky 2013), and data segregation between personal and content data (Sun et al. 2014) we should favor. This cannot be the task of the practice participant as a standard authority.
 
18
There are, obviously, legal limits to these contestations. However, they can still change a company culture, and within the connected wider practices of labor law and worker protection, also the legal framework of decisional privacy within the practice of work.
 
19
For a more systematic exploration into the different notions of social pathologies cf. Honneth 1996, Freyenhagen 2015, or Loh 2017.
 
20
Note that the pathological nature of this confusion lies in the systematic way it is embedded within each reproduction of the practice. It is not a mistake within one instantiation of the practice, which would most likely be called out as a misinterpretation of the practice’s structure.
 
21
For a more detailed account on the role of the sociologist in the description and explication of deficient or pathological practices see e.g. Bourdieu 1977, 1999; Habermas 1984; Honneth 2014b; Loh 2017.
 
Literature
go back to reference Applbaum, A. I. (1999). Ethics for Adversaries: The morality of roles in public and professional life. Princeton: Princeton University Press. Applbaum, A. I. (1999). Ethics for Adversaries: The morality of roles in public and professional life. Princeton: Princeton University Press.
go back to reference Benn, S. (1984). Privacy, freedom, and respect for persons. In F. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 223–244). Cambridge: Cambridge University Press.CrossRef Benn, S. (1984). Privacy, freedom, and respect for persons. In F. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 223–244). Cambridge: Cambridge University Press.CrossRef
go back to reference Boltanski, L., & Chiapello, E. (2007). The new spirit of capitalism. London: Verso. Boltanski, L., & Chiapello, E. (2007). The new spirit of capitalism. London: Verso.
go back to reference Bourdieu, P. (1977). Outline of a theory of practice. Cambridge: Cambridge University Press.CrossRef Bourdieu, P. (1977). Outline of a theory of practice. Cambridge: Cambridge University Press.CrossRef
go back to reference Bourdieu, P. (1990). The logic of practice. Stanford: Stanford University Press. Bourdieu, P. (1990). The logic of practice. Stanford: Stanford University Press.
go back to reference Bourdieu, P. (1999). The weight of the world: Social suffering in contemporary society. Stanford: Stanford University Press. Bourdieu, P. (1999). The weight of the world: Social suffering in contemporary society. Stanford: Stanford University Press.
go back to reference Brandom, R. B. (1998). Making it explicit: Reasoning, representing and discursive commitment (2nd edn.). Cambridge: Harvard University Press. Brandom, R. B. (1998). Making it explicit: Reasoning, representing and discursive commitment (2nd edn.). Cambridge: Harvard University Press.
go back to reference Bridwell, S. (2007). The dimensions of locational privacy. In H. J. Miller (Ed.), Societies and cities in the age of instant access (pp. 209–225). Berlin: Springer.CrossRef Bridwell, S. (2007). The dimensions of locational privacy. In H. J. Miller (Ed.), Societies and cities in the age of instant access (pp. 209–225). Berlin: Springer.CrossRef
go back to reference Celikates, R. (2009). Kritik als soziale Praxis: Gesellschaftliche Selbstverständigung und kritische Theorie. Frankfurt/Main: Campus. Celikates, R. (2009). Kritik als soziale Praxis: Gesellschaftliche Selbstverständigung und kritische Theorie. Frankfurt/Main: Campus.
go back to reference DeCew, J. (1997). In pursuit of privacy: Law, ethics and the rise of technology. Ithaca: Cornell University Press. DeCew, J. (1997). In pursuit of privacy: Law, ethics and the rise of technology. Ithaca: Cornell University Press.
go back to reference Floridi, L. (2013). The ethics of information. Oxford: Oxford University Press.CrossRef Floridi, L. (2013). The ethics of information. Oxford: Oxford University Press.CrossRef
go back to reference Floridi, L. (2014). The 4th revolution: How the infosphere is reshaping human reality. Oxford: Oxford University Press. Floridi, L. (2014). The 4th revolution: How the infosphere is reshaping human reality. Oxford: Oxford University Press.
go back to reference Freyenhagen, F. (2015). Honneth on social pathologies: A critique. Critical Horizons, 16(2), 131–152.CrossRef Freyenhagen, F. (2015). Honneth on social pathologies: A critique. Critical Horizons, 16(2), 131–152.CrossRef
go back to reference Fried, C. (1984). Privacy: A moral analysis. In F. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 203–222). Cambridge: Cambridge University Press.CrossRef Fried, C. (1984). Privacy: A moral analysis. In F. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 203–222). Cambridge: Cambridge University Press.CrossRef
go back to reference Garfinkel, H. (1967). Studies in ethnomethodology. Oxford: Polity Press. Garfinkel, H. (1967). Studies in ethnomethodology. Oxford: Polity Press.
go back to reference Geertz, C. (1973). The interpretation of cultures: Selected essays. New York: Basic Books. Geertz, C. (1973). The interpretation of cultures: Selected essays. New York: Basic Books.
go back to reference Giddens, A. (1984). The constitution of society: Outline of the theory of structuration. Cambridge: Polity Press. Giddens, A. (1984). The constitution of society: Outline of the theory of structuration. Cambridge: Polity Press.
go back to reference Habermas, J. (1984). The theory of communicative action. Cambridge: Polity; Beacon Press. Habermas, J. (1984). The theory of communicative action. Cambridge: Polity; Beacon Press.
go back to reference Habermas, J. (1995). Theorie des kommunikativen Handelns. Frankfurt/Main: Suhrkamp. Habermas, J. (1995). Theorie des kommunikativen Handelns. Frankfurt/Main: Suhrkamp.
go back to reference Hardimon, M. (1994). Role Obligations. The Journal of Philosophy, 91(7), 333–363.CrossRef Hardimon, M. (1994). Role Obligations. The Journal of Philosophy, 91(7), 333–363.CrossRef
go back to reference Hart, H. L. A. (1994). The concept of law (2nd edn.). Oxford: Clarendon Press. Hart, H. L. A. (1994). The concept of law (2nd edn.). Oxford: Clarendon Press.
go back to reference Hartzog, W., & Stutzman, F. (2013). Obscurity by design. Washington Law Review, 88, 385–418. Hartzog, W., & Stutzman, F. (2013). Obscurity by design. Washington Law Review, 88, 385–418.
go back to reference Hillebrandt, F. (2014). Soziologische Praxistheorien: Eine Einführung. Wiesbaden: Springer VS.CrossRef Hillebrandt, F. (2014). Soziologische Praxistheorien: Eine Einführung. Wiesbaden: Springer VS.CrossRef
go back to reference Honneth, A. (1996). Pathologies of the social: The past and present of social philosophy. In D. M. Rasmussen (Ed.), Handbook of critical theory (pp. 369–398). Oxford: Blackwell. Honneth, A. (1996). Pathologies of the social: The past and present of social philosophy. In D. M. Rasmussen (Ed.), Handbook of critical theory (pp. 369–398). Oxford: Blackwell.
go back to reference Honneth, A. (2014a). Die Krankheiten der Gesellschaft: Annäherung an einen nahezu unmöglichen Begriff. WestEnd - Neue Zeitschrift für Sozialforschung 11(1), 45–60. Honneth, A. (2014a). Die Krankheiten der Gesellschaft: Annäherung an einen nahezu unmöglichen Begriff. WestEnd - Neue Zeitschrift für Sozialforschung 11(1), 45–60.
go back to reference Honneth, A. (2014b). Freedom’s right: The social foundations of democratic life (New directions in critical theory). New York: Columbia University Press.CrossRef Honneth, A. (2014b). Freedom’s right: The social foundations of democratic life (New directions in critical theory). New York: Columbia University Press.CrossRef
go back to reference Houlgate, S. (2008). G.W.F. Hegel - Outlines of the Philosophy of Right. Oxford: Oxford Univ. Press. Houlgate, S. (2008). G.W.F. Hegel - Outlines of the Philosophy of Right. Oxford: Oxford Univ. Press.
go back to reference Jaeggi, R. (2014). Kritik von Lebensformen. Berlin: Suhrkamp. Jaeggi, R. (2014). Kritik von Lebensformen. Berlin: Suhrkamp.
go back to reference Loh, W. (2017). Literaturwissenschaft als Sozialkritik. In A. Albrecht, M. Schramm & T. Venzl (Eds.), Literatur und Anerkennung: Wechselwirkungen und Perspektiven (pp. 159–184). Berlin: LIT. Loh, W. (2017). Literaturwissenschaft als Sozialkritik. In A. Albrecht, M. Schramm & T. Venzl (Eds.), Literatur und Anerkennung: Wechselwirkungen und Perspektiven (pp. 159–184). Berlin: LIT.
go back to reference MacIntyre, A. (1985). After virtue: A study in moral theory (2nd edn.). London: Duckworth. MacIntyre, A. (1985). After virtue: A study in moral theory (2nd edn.). London: Duckworth.
go back to reference Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27–32.CrossRef Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27–32.CrossRef
go back to reference Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17, 559–596. Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17, 559–596.
go back to reference Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119–158. Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119–158.
go back to reference Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford Law Books. Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford Law Books.
go back to reference Parent, W. (1983). Privacy, morality, and the law. Philosophy and Public Affairs, 12(4). Parent, W. (1983). Privacy, morality, and the law. Philosophy and Public Affairs, 12(4).
go back to reference Parsons, T. (1949). The structure of social action: A study in social theory with special references to a group of recent european writers (2nd edn.). Glencoe: The Free Press. Parsons, T. (1949). The structure of social action: A study in social theory with special references to a group of recent european writers (2nd edn.). Glencoe: The Free Press.
go back to reference Rachels, J. (1984). Why privacy is important. In F. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 290–299). Cambridge: Cambridge Univ. Pr.CrossRef Rachels, J. (1984). Why privacy is important. In F. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 290–299). Cambridge: Cambridge Univ. Pr.CrossRef
go back to reference Rawls, J. (2003). The law of peoples: With “The idea of public reason revisited” (5th edn.). Cambridge: Harvard Univ. Press. Rawls, J. (2003). The law of peoples: With “The idea of public reason revisited” (5th edn.). Cambridge: Harvard Univ. Press.
go back to reference Raz, J. (1986). The morality of freedom (Clarendon paperbacks). Oxford: Clarendon Press. Raz, J. (1986). The morality of freedom (Clarendon paperbacks). Oxford: Clarendon Press.
go back to reference Raz, J. (1999). Practical reason and norms. Oxford: Oxford University Press.CrossRef Raz, J. (1999). Practical reason and norms. Oxford: Oxford University Press.CrossRef
go back to reference Reckwitz, A. (2003). Grundelemente einer Theorie sozialer Praktiken: Eine sozialtheoretische Perspektive. Zeitschrift für Soziologie, 32(4), 282–301.CrossRef Reckwitz, A. (2003). Grundelemente einer Theorie sozialer Praktiken: Eine sozialtheoretische Perspektive. Zeitschrift für Soziologie, 32(4), 282–301.CrossRef
go back to reference Reckwitz, A. (2008). Praktiken und Diskurse: Eine sozialtheoretische und methodologische Relation. In H. Kalthoff, S. Hirschauer & G. Lindemann (Eds.), Theoretische Empirie: Zur Relevanz qualitativer Forschung (pp. 188–209). Frankfurt/Main: Suhrkamp. Reckwitz, A. (2008). Praktiken und Diskurse: Eine sozialtheoretische und methodologische Relation. In H. Kalthoff, S. Hirschauer & G. Lindemann (Eds.), Theoretische Empirie: Zur Relevanz qualitativer Forschung (pp. 188–209). Frankfurt/Main: Suhrkamp.
go back to reference Regan, P. (1995). Legislating privacy: Technology, social values, and public policy. Chapel Hill: University of North Carolina Press. Regan, P. (1995). Legislating privacy: Technology, social values, and public policy. Chapel Hill: University of North Carolina Press.
go back to reference Roessler, B. (2005). The value of privacy. Cambridge: Polity Press.MATH Roessler, B. (2005). The value of privacy. Cambridge: Polity Press.MATH
go back to reference Roessler, B. (2015). Should personal data be a tradable good? On the moral limits of markets in privacy. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 141–161). Cambridge: Cambridge University Press.CrossRef Roessler, B. (2015). Should personal data be a tradable good? On the moral limits of markets in privacy. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 141–161). Cambridge: Cambridge University Press.CrossRef
go back to reference Roessler, B. (2016). Wie wir uns regieren. WestEnd(01), 103–118. Roessler, B. (2016). Wie wir uns regieren. WestEnd(01), 103–118.
go back to reference Roessler, B., & Mokrosinska, D. (2015). Introduction. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 1–9). Cambridge: Cambridge University Press.CrossRef Roessler, B., & Mokrosinska, D. (2015). Introduction. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 1–9). Cambridge: Cambridge University Press.CrossRef
go back to reference Schachter, M. (2003). Informational and decisional privacy. Durham N.C.: Carolina Academic Press. Schachter, M. (2003). Informational and decisional privacy. Durham N.C.: Carolina Academic Press.
go back to reference Schatzki, T. R. (1996). Social practices: A wittgensteinian approach to human activity and the social. Cambridge: Cambridge Univ. Press.CrossRef Schatzki, T. R. (1996). Social practices: A wittgensteinian approach to human activity and the social. Cambridge: Cambridge Univ. Press.CrossRef
go back to reference Schatzki, T. R. (2002). The site of the social: A philosophical account of the constitution of social life and change. University Park: Pennsylvania State University Press. Schatzki, T. R. (2002). The site of the social: A philosophical account of the constitution of social life and change. University Park: Pennsylvania State University Press.
go back to reference Schmidt, R. (2012). Soziologie der Praktiken: Konzeptionelle Studien und empirische Analysen. Berlin: Suhrkamp. Schmidt, R. (2012). Soziologie der Praktiken: Konzeptionelle Studien und empirische Analysen. Berlin: Suhrkamp.
go back to reference Searle, J. R. (2008). Speech acts: An essay in the philosophy of language (30th edn.). Cambridge: Cambridge Univ. Press. Searle, J. R. (2008). Speech acts: An essay in the philosophy of language (30th edn.). Cambridge: Cambridge Univ. Press.
go back to reference Solove, D. J. (2008). Understanding privacy. Cambridge: Harvard University Press. Solove, D. J. (2008). Understanding privacy. Cambridge: Harvard University Press.
go back to reference Stahl, T. (2013). Immanente Kritik: Elemente einer Theorie sozialer Praktiken. Frankfurt/Main: Campus. Stahl, T. (2013). Immanente Kritik: Elemente einer Theorie sozialer Praktiken. Frankfurt/Main: Campus.
go back to reference Stahl, T. (2014). The Conditions of Collectivity: Joint Commitment and the Shared Norms of Membership. In A. Konzelmann, Ziv & H. B. Schmid (Eds.), Institutions, Emotions, and Group Agents: Contributions to Social Ontology. Studies in the Philosophy of Sociality (vol. 2, pp. 229–244). Dordrecht: Springer.CrossRef Stahl, T. (2014). The Conditions of Collectivity: Joint Commitment and the Shared Norms of Membership. In A. Konzelmann, Ziv & H. B. Schmid (Eds.), Institutions, Emotions, and Group Agents: Contributions to Social Ontology. Studies in the Philosophy of Sociality (vol. 2, pp. 229–244). Dordrecht: Springer.CrossRef
go back to reference Tene, O., & Polonetsky, J. (2013). Big data for all: Privacy and user control in the age of analytics. Northwestern Journal of Technology and Intellectual Property, 11(5), 239–273. Tene, O., & Polonetsky, J. (2013). Big data for all: Privacy and user control in the age of analytics. Northwestern Journal of Technology and Intellectual Property, 11(5), 239–273.
go back to reference Torra, V. (2017). Data privacy: Foundations, new developments and the big data challenge. Cham: Springer.CrossRef Torra, V. (2017). Data privacy: Foundations, new developments and the big data challenge. Cham: Springer.CrossRef
go back to reference Ulbricht, M., & Weber, K. (2017). Adieu Einwilligung?: Neue Herausforderungen für die informationelle Selbstbestimmung im Angesicht von Big Data-Technologien. In M. Friedewald, J. Lamla, & A. Roßnagel (Eds.), Informationelle Selbstbestimmung Im Digitalen Wandel (pp. 265–286): Vieweg + Teubner, Verlag.CrossRef Ulbricht, M., & Weber, K. (2017). Adieu Einwilligung?: Neue Herausforderungen für die informationelle Selbstbestimmung im Angesicht von Big Data-Technologien. In M. Friedewald, J. Lamla, & A. Roßnagel (Eds.), Informationelle Selbstbestimmung Im Digitalen Wandel (pp. 265–286): Vieweg + Teubner, Verlag.CrossRef
go back to reference Westin, A. F. (1967). Privacy and freedom. New Jork: Atheneum. Westin, A. F. (1967). Privacy and freedom. New Jork: Atheneum.
go back to reference Wittgenstein, L. (1998). Philosophical investigations (2nd edn.). Oxford: Blackwell.MATH Wittgenstein, L. (1998). Philosophical investigations (2nd edn.). Oxford: Blackwell.MATH
Metadata
Title
A practice–theoretical account of privacy
Author
Wulf Loh
Publication date
17-07-2018
Publisher
Springer Netherlands
Published in
Ethics and Information Technology / Issue 4/2018
Print ISSN: 1388-1957
Electronic ISSN: 1572-8439
DOI
https://doi.org/10.1007/s10676-018-9469-1

Other articles of this Issue 4/2018

Ethics and Information Technology 4/2018 Go to the issue

Premium Partner