Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-wq2xx Total loading time: 0 Render date: 2024-04-19T18:22:47.752Z Has data issue: false hasContentIssue false

8 - Should personal data be a tradable good? On the moral limits of markets in privacy

from Part II - Privacy: practical controversies

Published online by Cambridge University Press:  05 July 2015

Beate Roessler
Affiliation:
Universiteit van Amsterdam
Dorota Mokrosinska
Affiliation:
Universiteit Leiden
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Social Dimensions of Privacy
Interdisciplinary Perspectives
, pp. 141 - 161
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Allen, A. 1988. Uneasy Access: Privacy for Women in a Free Society. Lanham: Rowman and Littlefield.Google Scholar
boyd, d. 2014. It’s Complicated: The Social Lives of Networked Teens. New Haven: Yale University Press.Google Scholar
Celikates, R. and Pollmann, A. 2006. “Baustellen der Vernunft. 25 Jahre Theorie des kommunikativen Handelns. Zur Gegenwart eines Paradigmenwechsels,” WestEnd. Neue Zeitschrift fuer Sozialforschung 3(2): 97113.Google Scholar
Cohen, J. E. 2012. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven: Yale University Press.Google Scholar
Cohen, J. E. 2013. “What privacy is for, Harvard Law Review 126: 1904–33.Google Scholar
Cooke, M. and Juetten, T. (eds.) 2013. “The theory of communicative action after three decades,” Constellations 20(4): 516603.CrossRefGoogle Scholar
Craig, T. and Ludloff, M. E. 2011. Privacy and Big Data. Sebastopol: O’Reilly Media.Google Scholar
Dworkin, R. 1985. “What Justice Isn’t,” in Dworkin, R., A Matter of Principle, Cambridge, MA: Harvard University Press: pp. 214–20.Google Scholar
Ertman, M. M. and Williams, J. C. (eds.) 2005. Rethinking Commodification. Cases and Readings in Law and Culture. New York University Press.Google Scholar
Fuchs, C.et al. 2012. Internet and Surveillance: The Challenges of Web 2.0 and Social Media. London: Routledge.Google Scholar
Habermas, J. 1987. The Theory of Communicative Action, Volume 2: Lifeworld and System: A Critique of Functionalist Reason, translated by T. McCarthy. Cambridge: Polity Press.Google Scholar
Halpern, S. 2013. “Are we puppets in a wired world?” New York Review of Books, November 7.Google Scholar
Herzog, L. 2013. “Markets”, Stanford Encyclopedia of Philosophy (Fall 2013 Edition), edited by Edward N. Zalta. Available at http://plato.stanford.edu/archives/fall2013/entries/markets/.Google Scholar
Honneth, A. 2005. Reification. A New Look at an Old Idea. The Berkely Tanner Lectures, edited by Jay, M.. Oxford University Press.Google Scholar
Kennett, J. and Matthews, S. 2008. “What’s the buzz? Undercover marketing and the corruption of friendship”, Journal of Applied Philosophy 25( 1): 218.CrossRefGoogle Scholar
Lever, A. 2012. On Privacy. New York: Routledge.Google Scholar
Lukes, S. 2004. “Invasions of the Market”, in Dworkin, R. (ed.), From Liberal Values to Democratic Transition. Essays in Honour of Janos Kis. Budapest: Central University Press, pp. 5778.CrossRefGoogle Scholar
Lupton, D. 2013. ‘Understanding the human machine’, IEEE Technology and Society Magazine 32(4): 2530.CrossRefGoogle Scholar
Lupton, D. 2014. “Self-tracking Modes: Reflexive Self-Monitoring and Data Practices,” Paper for the Imminent Citizenships: Personhood and Identity Politics in the Informatic Age Workshop, 27 August 2014, ANU, Canberra.CrossRefGoogle Scholar
Marwick, A. E. 2013. Status Update. Celebrity, Publicity, and Branding in the Social Media Age. New Haven: Yale University Press.Google Scholar
Marwick, A. E. 2014. “How your data are being deeply mined”, New York Review of Books, January 9: 22.Google Scholar
Mayer-Schoenberger, V. and Cukier, K. 2013. Big Data. A Revolution that Will Transform how We Live, Work, and Think. London: John Murray.Google Scholar
Millar, J. 2009. Core Privacy: A Problem for Predictive Data Mining, in Steeves, V., Kerr, I. and Lucock, C. (eds.) Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. Oxford University Press: pp. 103–20.Google Scholar
Morozov, E. 2014. “Selling Your Bulk Online Data Really Means Selling Your Autonomy. Big tech’s war on the meaning of life,” New Republic, May 13.Google Scholar
Nissenbaum, H. 2010. Privacy in Context. Technology, Policy, and the Integrity of Social Life. Stanford University Press.Google Scholar
O’Callaghan, P. 2013. Refining Privacy in Tort Law, Heidelberg: Springer.CrossRefGoogle Scholar
OECD 2013. Exploring the economics of personal data: A survey of methodologies for measuring monetary value. Retrieved from: http://dx.doi.org/10.1787/5k486qtxldmq-en.CrossRefGoogle Scholar
Passig, K. 2012. Unsere Daten, Unser Leben. Internetkolumne, Merkur. Deutsche Zeitschrift fuer europaeisches Denken 756: 420–7.Google Scholar
Phillips, A. 2013. Our Bodies, Whose Property?Oxford University Press.Google Scholar
Phillips, L. 2014. A Market for Personal Data. Available at: http://hubofallthings.com/market-for-personal-data/. accessed October 17, 2014.Google Scholar
Radin, M. J. 1996. Contested Commodities. Cambridge, MA: Harvard University Press.Google Scholar
Radin, M. J. and Sunder, M. 2005. “Introduction: The Subject and Object of Commodification,” in Ertman, M. M., Williams, J. C. (eds.), Rethinking Commodification. New York University Press, pp. 8–33.Google Scholar
Richards, N. M. 2013. “The dangers of surveillance,” Harvard Law Review 126: 1934–65.Google Scholar
Roberts, A. 2015. “A republican account of the value of privacy,” European Journal of Political Theory. DOI: 10.1177/1474885114533262.CrossRefGoogle Scholar
Roessler, B. 2005. The Value of Privacy. Cambridge: Polity Press.Google Scholar
Sandel, M. 2012, What Money Can’t Buy. The Moral Limits of Markets. New York: Farrar, Straus and Giroux.Google Scholar
Satz, D. 2010. Why some Things Should not Be for Sale. The Moral Limits of Markets. Oxford University Press.CrossRefGoogle Scholar
Singer, P. 1973. “Altruism and commerce: a defense of Titmuss against Arrow,” Philosophy and Public Affairs 2(3) (Spring): 312–20.Google ScholarPubMed
Steeves, V. 2015. “Privacy, Sociality and the Failure of Regulation: Lessons Learned from Young Canadians’ Online Experiences”, in Roessler, B. and Mokrosinska, D. (eds.) Social Dimensions of Privacy: Interdisciplinary Perspectives. Cambridge University Press.Google Scholar
Tanner, A. 2014. What Stays in Vegas. New York: Public Affairs.Google Scholar
Till, C. 2014. “Exercise as labour: quantified self and the transformation of exercise into labour,” Societies 4: 446–62; doi:10.3390/soc4030446.CrossRefGoogle Scholar
Titmuss, R. 1971. The Gift Relationship: From Human Blood to Social Policy. New York: Random House.Google Scholar
Turow, J. 2011. The Daily You. New Haven: Yale University Press.Google Scholar
Turow, J. 2012. “How companies are ‘defining your worth’ online.” www.npr.org/2012/02/22/147189154/how-companies-are-defining-your-worth-online (accessed October 17, 2014).Google Scholar
Wacks, R. 1989. Personal Information. Privacy and the Law. Oxford: Clarendon Press.Google Scholar
Wacks, R. 2010. Privacy. A Very Short Introduction. Oxford University Press.CrossRefGoogle Scholar
Walzer, M. 1983. Spheres of Justice. A Defense of Pluralism and Equality. New York: Basic Books.Google Scholar
Zuiderveen Borgesius, F. 2014. Improving Privacy Protection in the Area of Behavioural Targeting. Ph.D. Thesis, Amsterdam.CrossRefGoogle Scholar
Zwick, D. and Dholakia, N. 2001. “Contrasting European and American approaches to privacy in electronic markets: property right versus civil right.” Electronic Markets 11: 116–20.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×