Skip to main content
Log in

The Struggle Between Liberties and Authorities in the Information Age

  • Original Paper
  • Published:
Science and Engineering Ethics Aims and scope Submit manuscript

Abstract

The “struggle between liberties and authorities”, as described by Mill, refers to the tension between individual rights and the rules restricting them that are imposed by public authorities exerting their power over civil society. In this paper I argue that contemporary information societies are experiencing a new form of such a struggle, which now involves liberties and authorities in the cyber-sphere and, more specifically, refers to the tension between cyber-security measures and individual liberties. Ethicists, political philosophers and political scientists have long debated how to strike an ethically sound balance between security measures and individual rights. I argue that such a balance can only be reached once individual rights are clearly defined, and that such a definition cannot prescind from an analysis of individual well-being in the information age. Hence, I propose an analysis of individual well-being which rests on the capability approach, and I then identify a set of rights that individuals should claim for themselves. Finally, I consider a criterion for balancing the proposed set of individual rights with cyber-security measures in the information age.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. The involvement of public authorities in the management and regulation of the cyber-sphere does not come as a novelty when one considers that the design and development of the internet has been since the very beginning a part of governmental research to ensure national and international security; see for example the famous Pentagon Arpanet project (Abbate 2000). At the same time, it is worth recalling that security requirements and the support of military activities are often the goals motivating the design and development of plenty of technologies that have then become commonly used. Computers offer quite an evident example: they went from being a technology used to support military efforts during the Second World War to being a tool people use in their everyday lives (Copeland 2006; Freed and Ishida 1995); the same goes for robotics and AI, Predator (http://en.wikipedia.org/wiki/General_Atomics_MQ-1_Predator) and Taranis offering two interesting examples (http://en.wikipedia.org/wiki/BAE_Systems_Taranis).

  2. The reader interested in the on-going debate on cyber-warfare and on the ethical and regulatory issues that it poses may find relevant the following papers (Arquilla 1998; Denning 1999; Dipert 2010; Lucas 2012) (Taddeo forthcoming, 2014).

  3. http://www.whitehouse.gov/the-press-office/2013/08/09/remarks-president-press-conference.

  4. http://ec.europa.eu/digital-agenda/futurium/en/content/onlife-manifesto-being-human-hyperconnected-era.

  5. A more in details analysis of the work developed under the ‘Onlife Initiative’ has been provided here (Floridi 2014c).

  6. The concept of narrative has been extensively used in the literature focusing on personal identity (Maan 1999; MacIntyre 2007; MacIntyre 1989; Schechtman 2007; Taylor 1989). However, it is worth remarking that the analysis proposed in this paper does not rest on the narrative approach insofar as it is not concerned with the process of constructing personal identities. The reader interested in such a topic may find useful (Ess 2012).

References

  • Abbate, J. (2000). Inventing the internet. Cambridge, Mass: MIT Press.

    Google Scholar 

  • Agre, P. (1997). Technology and privacy the new landscape. http://site.ebrary.com/id/10015368. Retrieved 19 May 2013.

  • Arquilla, J. (1998). Can information warfare ever be just? Ethics and Information Technology, 1(3), 203–212.

    Article  Google Scholar 

  • Australian Psychological Society. (2010). The social and psychological impact of online social networking, APS national psychology week survey. http://www.psychology.org.au/publications/inpsych/2010/december/social/.

  • Cerf, V. G. (2011). First, do no harm. Philosophy and Technology, 24(4), 463–465.

    Article  Google Scholar 

  • Chestnut, H. (1967). Systems engineering methods. New York: Wiley.

    Google Scholar 

  • Coole, D., Frost, S., Bennett, J., Cheah, P., Orlie, M. A., & Grosz, E. (2010). New materialisms: Ontology, agency, and politics. Durham, NC: Duke University Press.

    Book  Google Scholar 

  • Copeland, B. J. (2006). Colossus: The secrets of Bletchley Park’s code-breaking computers. Oxford: Oxford University Press.

    Google Scholar 

  • Denning, D. E. (1999). Information warfare and security. Reading: Addison-Wesley.

    Google Scholar 

  • Dipert, R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9(4), 384–410.

    Article  Google Scholar 

  • Ess, C. (2012). At the intersections between internet studies and philosophy: “Who Am I Online?”. Philosophy & Technology, 25(3), 275–284.

    Article  Google Scholar 

  • Floridi, L. (2007). A look into the future impact of ICT on our lives. The Information Society, 23(1), 59–64. doi:10.1080/01972240601059094.

    Article  Google Scholar 

  • Floridi, L. (2008). The method of levels of abstraction. Minds and Machines, 18(3), 303–329. doi:10.1007/s11023-008-9113-7.

    Article  Google Scholar 

  • Floridi, L. (2013). Ethics of information. Oxford: Oxford University Press.

    Book  Google Scholar 

  • Floridi, L. (2014a). Protection of information and the right to privacy—A new equilibrium? Dordrecht: Springer. http://www.springer.com/law/international/book/978-3-319-05719-4.

  • Floridi, L. (2014b). The fourth revolution: How the infosphere is reshaping human reality. Oxford: Oxford University Press.

    Google Scholar 

  • Floridi, L. (2014c). The onlife manifesto: Being human in a Hyperconnected Era. Dordrecht: Springer. http://www.springer.com/philosophy/epistemology+and+philosophy+of+science/book/978-3-319-04092-9.

  • Floridi, L., & Taddeo, M. (Eds.). (2014). The ethics of information warfare. New York: Springer.

    Google Scholar 

  • Freed, L., & Ishida, S. (1995). History of computers. Hightstown, NJ: Ziff-Davis.

    Google Scholar 

  • Goold, B. J. (2007). Security and human rights. Oxford: Hart.

    Google Scholar 

  • Griffin, J. (1988). Well-being: Its meaning, measurement and moral importance. Oxford: Clarendon Press.

    Book  Google Scholar 

  • Hasebrink, U. (2008). Comparing children’s online opportunities and risks across Europe: Cross-national comparisons for EU Kids Online: [European research on cultural, contextual and risk issues in children’s safe use of the internet and new media (2006–2009)]. London: EU Kids Online. http://www.eukidsonline.net/.

  • Haybron, D. M. (2010). The pursuit of unhappiness: The elusive psychology of well-being. Oxford: Oxford University Press.

    Google Scholar 

  • Hohfeld, W. N. (2000). Fundamental legal conceptions as applied in judicial reasoning. Union, NJ: Lawbook Exchange.

    Google Scholar 

  • Kaufman, A. (2006). Capabilities and freedom. Journal of Political Philosophy, 14(3), 289–300.

    Article  Google Scholar 

  • Lucas, G. R. (2012). Just war and cyber conflict “Can there be an ‘Ethical’ Cyber War?” Presented at the Naval Academy Class 2014.

  • Maan, A. K. (1999). Internarrative identity. Lanham, MD: University Press of America.

    Google Scholar 

  • MacIntyre, A. (1989). The virtues, the unity of a human life and the concept of a tradition. In Why narrative? Grand Rapids, MI: W. B. Eerdmans.

  • MacIntyre, A. C. (2007). After virtue: A study in moral theory. Notre Dame, IN: University of Notre Dame Press.

    Google Scholar 

  • Mill, J. S. (2002). On liberty. New York: Dover.

    Google Scholar 

  • Moor, J. H. (1997). Towards a theory of privacy in the information age. ACM SIGCAS Computers and Society, 27(3), 27–32.

    Article  Google Scholar 

  • Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17(5–6), 559–596.

    Google Scholar 

  • Nussbaum, M. (2003). Capabilities as fundamental entitlements: Sen and social justice. Feminist Economics, 9(2–3), 33–59.

    Article  Google Scholar 

  • Olsaretti, S. (2005). Endorsement and freedom in Amartya Sen’s capability approach. Economics and Philosophy, 21(1), 89–108.

    Article  Google Scholar 

  • Oosterlaken, I. (2012). The capability approach, technology and design. Dordrecht and New York: Springer. doi:10.1007/978-94-007-3879-9.

  • Pidd, M. (2004). Systems modelling: Theory and practice (1st ed.). Chichester and Hoboken, NJ: Wiley.

    Google Scholar 

  • Price, M. E. (2002). Media and sovereignty: The Global information revolution and its challenge to state power. Cambridge, MA: MIT Press.

    Google Scholar 

  • Sapouna, M., Wolke, D., Vannini, N., Watson, S., Woods, S., Schneider, W., et al. (2011). Individual and social network predictors of the short-term stability of bullying victimization in the United Kingdom and Germany. British Journal of Educational Psychology, 82(2), 225–240.

    Article  Google Scholar 

  • Schechtman, M. (2007). The constitution of selves. Ithaca, NY: Cornell University Press.

    Google Scholar 

  • Sen, A. (1980). Equality of what? The Tanner Lecture on Human Values, I, 197–220.

    Google Scholar 

  • Shue, H. (1996). Basic rights: Subsistence, affluence, and U.S. foreign policy. Princeton: Princeton University Press.

    Google Scholar 

  • Suler, J. (2004). The Online disinhibition effect. Cyber Psychology & Behavior, 7(3), 321–326. doi:10.1089/1094931041291295.

    Article  Google Scholar 

  • Sumner, L. W. (1996). Welfare, happiness, and ethics. Oxford: Clarendon Press.

    Google Scholar 

  • Taddeo, M. (2011). Information warfare: A philosophical perspective. Philosophy & Technology, 25(1), 105–120. doi:10.1007/s13347-011-0040-9.

    Article  Google Scholar 

  • Taddeo, M. (2013). Cyber security and individual rights, striking the right balance. Philosophy and Technology, 26(4), 353–356.

  • Taddeo, M. (2014). Just Information Warfare. Topoi. doi:10.1007/s11245-014-9245-8.

  • Taddeo, M. (forthcoming). Information warfare: The ontological and regulatory gap. APA Newsletter on Philosophy & Computer.

  • Taylor, C. (1989). Sources of the self: The making of the modern identity. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Walters, G. J. (2001). Human rights in an information age: A philosophical analysis. Toronto: University of Toronto Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mariarosaria Taddeo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Taddeo, M. The Struggle Between Liberties and Authorities in the Information Age. Sci Eng Ethics 21, 1125–1138 (2015). https://doi.org/10.1007/s11948-014-9586-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11948-014-9586-0

Keywords

Navigation