Skip to main content
Erschienen in: Ethics and Information Technology 1/2014

01.03.2014 | Original Paper

Surveillance in ubiquitous network societies: normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things

verfasst von: Jenifer Sunrise Winter

Erschienen in: Ethics and Information Technology | Ausgabe 1/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) is an emerging global infrastructure that employs wireless sensors to collect, store, and exchange data. Increasingly, applications for marketing and advertising have been articulated as a means to enhance the consumer shopping experience, in addition to improving efficiency. However, privacy advocates have challenged the mass aggregation of personally-identifiable information in databases and geotracking, the use of location-based services to identify one’s precise location over time. This paper employs the framework of contextual integrity related to privacy developed by Nissenbaum (Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford, 2010) as a tool to understand citizen response to implementation IoT-related technology in the supermarket. The purpose of the study was to identify and understand specific changes in information practices brought about by the IoT that may be perceived as privacy violations. Citizens were interviewed, read a scenario of near-term IoT implementation, and were asked to reflect on changes in the key actors involved, information attributes, and principles of transmission. Areas where new practices may occur with the IoT were then highlighted as potential problems (privacy violations). Issues identified included the mining of medical data, invasive targeted advertising, and loss of autonomy through marketing profiles or personal affect monitoring. While there were numerous aspects deemed desirable by the participants, some developments appeared to tip the balance between consumer benefit and corporate gain. This surveillance power creates an imbalance between the consumer and the corporation that may also impact individual autonomy. The ethical dimensions of this problem are discussed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Acquisti, A. (2010 December 1). The economics of personal data and the economics of privacy. Joint Working Party for Information Security and Privacy (WPISP) and Working Party on the Information Economy (WPIE) Roundtable, background paper 3. Paris: Organisation for Economic Co-operation and Development (OECD). Acquisti, A. (2010 December 1). The economics of personal data and the economics of privacy. Joint Working Party for Information Security and Privacy (WPISP) and Working Party on the Information Economy (WPIE) Roundtable, background paper 3. Paris: Organisation for Economic Co-operation and Development (OECD).
Zurück zum Zitat Beck, U. (1992). Risk society: Towards a new modernity. London: Sage. Beck, U. (1992). Risk society: Towards a new modernity. London: Sage.
Zurück zum Zitat Bennett, C. J. (2008). The privacy advocates: Resisting the spread of surveillance. Cambridge, MA: The MIT Press. Bennett, C. J. (2008). The privacy advocates: Resisting the spread of surveillance. Cambridge, MA: The MIT Press.
Zurück zum Zitat Christakos, H. A., & Mehta, S. N. (2002). Annual review of law and technology. Berkeley Technology Law Journal, , 473. Christakos, H. A., & Mehta, S. N. (2002). Annual review of law and technology. Berkeley Technology Law Journal, , 473.
Zurück zum Zitat Clarke, R. (1988). Information technology and dataveillance. Communications of the ACM, 31(5), 498–512.CrossRef Clarke, R. (1988). Information technology and dataveillance. Communications of the ACM, 31(5), 498–512.CrossRef
Zurück zum Zitat Daly, E. (2010). Personal autonomy in the travel panopticon. Ethics and Information Technology, 12, 97–108.CrossRef Daly, E. (2010). Personal autonomy in the travel panopticon. Ethics and Information Technology, 12, 97–108.CrossRef
Zurück zum Zitat Denning, T., Borning, A. Friedman, B. Gill, B. Kohno, T., & Maisel, W. (2010). Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of CHI 2010 conference on human factors in computing systems (pp. 917–926). New York: Association for Computing Machinery. Denning, T., Borning, A. Friedman, B. Gill, B. Kohno, T., & Maisel, W. (2010). Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of CHI 2010 conference on human factors in computing systems (pp. 917–926). New York: Association for Computing Machinery.
Zurück zum Zitat DePaulo, B. M., & Kashy, D. A. (1998). Everyday lies in close and casual relationships. Journal of Personality and Social Psychology, 74(1), 63–79.CrossRef DePaulo, B. M., & Kashy, D. A. (1998). Everyday lies in close and casual relationships. Journal of Personality and Social Psychology, 74(1), 63–79.CrossRef
Zurück zum Zitat Dourish, P., & Bell, G. (2011). Divining a digital future: Mess and mythology in ubiquitous computing. Cambridge, MA: The MIT Press.CrossRef Dourish, P., & Bell, G. (2011). Divining a digital future: Mess and mythology in ubiquitous computing. Cambridge, MA: The MIT Press.CrossRef
Zurück zum Zitat Dworkin, R. (1986). Law’s empire. Cambridge, MA: Harvard University Press. Dworkin, R. (1986). Law’s empire. Cambridge, MA: Harvard University Press.
Zurück zum Zitat European Commission & Information Society and Media. (2008). Internet of Things in 2020: Roadmap for the future. European technology platform on smart systems integration. Version 1.1 (27 May, 2008). European Commission & Information Society and Media. (2008). Internet of Things in 2020: Roadmap for the future. European technology platform on smart systems integration. Version 1.1 (27 May, 2008).
Zurück zum Zitat Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 2005(7), 185–200.CrossRef Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 2005(7), 185–200.CrossRef
Zurück zum Zitat Friedman, B. (2008). Value Sensitive Design. In D. Schular (Ed.), Liberating voices: A pattern language for communication revolution (pp. 366–368). Cambridge, MA: The MIT Press. Friedman, B. (2008). Value Sensitive Design. In D. Schular (Ed.), Liberating voices: A pattern language for communication revolution (pp. 366–368). Cambridge, MA: The MIT Press.
Zurück zum Zitat Friedman, B., & Nissenbaum, H. (1996). Bias in computer systems. ACM Transactions on Information Systems, 14(3), 330–347.CrossRef Friedman, B., & Nissenbaum, H. (1996). Bias in computer systems. ACM Transactions on Information Systems, 14(3), 330–347.CrossRef
Zurück zum Zitat Glenn, J. (2009). Scenarios. In J. C. Glenn & T. J. Gordon (Eds.), Futures research methodology—Version 3.0. AC/UNU Millennium Project. Washington: American Council for the UN University. Glenn, J. (2009). Scenarios. In J. C. Glenn & T. J. Gordon (Eds.), Futures research methodologyVersion 3.0. AC/UNU Millennium Project. Washington: American Council for the UN University.
Zurück zum Zitat Haggerty, K. D., & Ericson, R. V. (2006). The new politics of surveillance and visibility. In K. D. Haggerty & R. V. Ericson (Eds.), The new politics of surveillance and visibility (pp. 3–25). Toronto: University of Toronto Press. Haggerty, K. D., & Ericson, R. V. (2006). The new politics of surveillance and visibility. In K. D. Haggerty & R. V. Ericson (Eds.), The new politics of surveillance and visibility (pp. 3–25). Toronto: University of Toronto Press.
Zurück zum Zitat Hildner, L. (2006). Defusing the threat of RFID: Protecting consumer privacy through technology-specific legislation at the state level. Harvard Civil Rights-Civil Liberties Law Review, 41, 133–176. Hildner, L. (2006). Defusing the threat of RFID: Protecting consumer privacy through technology-specific legislation at the state level. Harvard Civil Rights-Civil Liberties Law Review, 41, 133–176.
Zurück zum Zitat International Telecommunication Union. (2005). Privacy and Ubiquitous Network Societies: Background paper. In ITU Workshop on Ubiquitous Network Societies, April 6–8, 2005. Geneva: International Telecommunication Union. International Telecommunication Union. (2005). Privacy and Ubiquitous Network Societies: Background paper. In ITU Workshop on Ubiquitous Network Societies, April 6–8, 2005. Geneva: International Telecommunication Union.
Zurück zum Zitat Kling, R. (2000). Learning about information technologies and social change: The contribution of social informatics. The Information Society, 16(3), 217–232.CrossRef Kling, R. (2000). Learning about information technologies and social change: The contribution of social informatics. The Information Society, 16(3), 217–232.CrossRef
Zurück zum Zitat Lyon, D. (2002). Surveillance as social sorting: Computer codes and mobile bodies. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk and automated discrimination (pp. 14–30). London, UK: Routledge. Lyon, D. (2002). Surveillance as social sorting: Computer codes and mobile bodies. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk and automated discrimination (pp. 14–30). London, UK: Routledge.
Zurück zum Zitat Lyon, D. (2006). The search for surveillance theories. In D. Lyon (Ed.), Theorizing surveillance: The panopticon and beyond (pp. 3–20). Portland, OR: Willand. Lyon, D. (2006). The search for surveillance theories. In D. Lyon (Ed.), Theorizing surveillance: The panopticon and beyond (pp. 3–20). Portland, OR: Willand.
Zurück zum Zitat Marx, G. T. (2006). Varieties of personal information as influences on attitudes towards surveillance. In K. D. Haggerty & R. V. Ericson (Eds.), The new politics of surveillance and visibility (pp. 79–110). Toronto: University of Toronto Press. Marx, G. T. (2006). Varieties of personal information as influences on attitudes towards surveillance. In K. D. Haggerty & R. V. Ericson (Eds.), The new politics of surveillance and visibility (pp. 79–110). Toronto: University of Toronto Press.
Zurück zum Zitat Moor, J. H. (2008). Why we need better ethics for emerging technologies. In J. van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy (pp. 26–39)., Cambridge studies in philosophy and public policy Cambridge: Cambridge University Press. Moor, J. H. (2008). Why we need better ethics for emerging technologies. In J. van den Hoven & J. Weckert (Eds.), Information technology and moral philosophy (pp. 26–39)., Cambridge studies in philosophy and public policy Cambridge: Cambridge University Press.
Zurück zum Zitat Neumann, P. G., & Weinstein, L. (2006). Risks of RFID. Communications of the ACM, 49(5), 136.CrossRef Neumann, P. G., & Weinstein, L. (2006). Risks of RFID. Communications of the ACM, 49(5), 136.CrossRef
Zurück zum Zitat Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press. Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press.
Zurück zum Zitat Pommeranz, A., Detweiler, C., Wiggers, P., & Jonker, C. (2011). Elicitation of situated values: Need for tools to help stakeholders and designers to reflect and communicate. Ethics and Information Technology,. doi:10.1007/s10676-011-9282-6. Pommeranz, A., Detweiler, C., Wiggers, P., & Jonker, C. (2011). Elicitation of situated values: Need for tools to help stakeholders and designers to reflect and communicate. Ethics and Information Technology,. doi:10.​1007/​s10676-011-9282-6.
Zurück zum Zitat Schwartz, P. (1996). The art of the long view: Planning for the future in an uncertain world. New York: Currency Doubleday. Schwartz, P. (1996). The art of the long view: Planning for the future in an uncertain world. New York: Currency Doubleday.
Zurück zum Zitat Schwartz, P. M., & Solove, D. (2011). The PII problem: Privacy and a new concept of personally identifiable information. New York University Law Review, 86, 1814–1894. Schwartz, P. M., & Solove, D. (2011). The PII problem: Privacy and a new concept of personally identifiable information. New York University Law Review, 86, 1814–1894.
Zurück zum Zitat Solove, D. (2011). Nothing to hide: The false tradeoff between privacy and security. New Haven, CT: Yale University Press. Solove, D. (2011). Nothing to hide: The false tradeoff between privacy and security. New Haven, CT: Yale University Press.
Zurück zum Zitat Stahl, B. C. (2004). Information, ethics, and computers: The problem of autonomous moral agents. Minds and Machines, 14(1), 67–83.CrossRef Stahl, B. C. (2004). Information, ethics, and computers: The problem of autonomous moral agents. Minds and Machines, 14(1), 67–83.CrossRef
Zurück zum Zitat Turow, J. (2006). Cracking the consumer code: Advertisers, anxiety and surveillance in the digital age. In K. D. Haggerty & R. V. Ericson (Eds.), The new politics of surveillance and visibility (pp. 279–307). Toronto: University of Toronto Press. Turow, J. (2006). Cracking the consumer code: Advertisers, anxiety and surveillance in the digital age. In K. D. Haggerty & R. V. Ericson (Eds.), The new politics of surveillance and visibility (pp. 279–307). Toronto: University of Toronto Press.
Zurück zum Zitat van den Hoven, M. J. (1997). Privacy and the varieties of moral wrong-doing in an information age. Computers and Society, 27(3), 33–37.CrossRef van den Hoven, M. J. (1997). Privacy and the varieties of moral wrong-doing in an information age. Computers and Society, 27(3), 33–37.CrossRef
Zurück zum Zitat Weber, R. H., & Weber, R. (2010). Internet of Things: Legal perspectives. Berlin: Springer.CrossRef Weber, R. H., & Weber, R. (2010). Internet of Things: Legal perspectives. Berlin: Springer.CrossRef
Zurück zum Zitat Winseck, D. (2003). Netscapes of power: Convergence, network design, walled gardens, and other strategies of control in the information age. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk and digital discrimination (pp. 176–198). New York: Routledge. Winseck, D. (2003). Netscapes of power: Convergence, network design, walled gardens, and other strategies of control in the information age. In D. Lyon (Ed.), Surveillance as social sorting: Privacy, risk and digital discrimination (pp. 176–198). New York: Routledge.
Zurück zum Zitat Winter, J. S. (2008). Emerging policy problems related to ubiquitous computing: Negotiating stakeholders’ visions of the future. Knowledge, Technology & Policy, 21, 191–203.CrossRef Winter, J. S. (2008). Emerging policy problems related to ubiquitous computing: Negotiating stakeholders’ visions of the future. Knowledge, Technology & Policy, 21, 191–203.CrossRef
Metadaten
Titel
Surveillance in ubiquitous network societies: normative conflicts related to the consumer in-store supermarket experience in the context of the Internet of Things
verfasst von
Jenifer Sunrise Winter
Publikationsdatum
01.03.2014
Verlag
Springer Netherlands
Erschienen in
Ethics and Information Technology / Ausgabe 1/2014
Print ISSN: 1388-1957
Elektronische ISSN: 1572-8439
DOI
https://doi.org/10.1007/s10676-013-9332-3

Weitere Artikel der Ausgabe 1/2014

Ethics and Information Technology 1/2014 Zur Ausgabe

Premium Partner