Privacy, the theory of communicative action and technology

Date

2013

Authors

Wahlstrom, K.
Fairweather, N.B.

Editors

Bynum, T.W.

Advisors

Journal Title

Journal ISSN

Volume Title

Type:

Conference paper

Citation

The possibilities of ethical ICT: proceedings of the 13th International Conference - ETHICOMP 2013, 2013 / Bynum, T.W. (ed./s), pp.502-510

Statement of Responsibility

Conference Name

ETHICOMP 2013: the possibilities of ethical ICT (12 Jun 2013 - 14 Jun 2013 : Denmark)

Abstract

Privacy is undergoing a reifying integration with regulatory and technical systems. This paper reviews privacy theory and Habermas’s Theory of Communicative Action (TCA) in order to inform two analyses of two technological concepts: an RFID identification scheme and Privacy-Preserving Data Mining. The first analysis seeks to establish whether each technological concept is consistent with privacy theory. The second analysis is informed by the first and it applies the truth, rightness and authenticity validity claims of the TCA. These analyses find that these technological applications may rest on reasonably strong claims to validity with respect to data security and data confidentiality. However, these analyses also find that these technological fields have weak claims to validity with respect to privacy when it is distinguished from data security and data confidentiality.

School/Discipline

Dissertation Note

Provenance

Description

Access Status

Rights

Copyright 2013 The Authors

License

Grant ID

Published Version

Call number

Persistent link to this record