Privacy, the theory of communicative action and technology
Files
(Published version)
Date
2013
Authors
Wahlstrom, K.
Fairweather, N.B.
Editors
Bynum, T.W.
Advisors
Journal Title
Journal ISSN
Volume Title
Type:
Conference paper
Citation
The possibilities of ethical ICT: proceedings of the 13th International Conference - ETHICOMP 2013, 2013 / Bynum, T.W. (ed./s), pp.502-510
Statement of Responsibility
Conference Name
ETHICOMP 2013: the possibilities of ethical ICT (12 Jun 2013 - 14 Jun 2013 : Denmark)
Abstract
Privacy is undergoing a reifying integration with regulatory and technical systems. This paper reviews privacy theory and Habermas’s Theory of Communicative Action (TCA) in order to inform two analyses of two technological concepts: an RFID identification scheme and Privacy-Preserving Data Mining. The first analysis seeks to establish whether each technological concept is consistent with privacy theory. The second analysis is informed by the first and it applies the truth, rightness and authenticity validity claims of the TCA. These analyses find that these technological applications may rest on reasonably strong claims to validity with respect to data security and data confidentiality. However, these analyses also find that these technological fields have weak claims to validity with respect to privacy when it is distinguished from data security and data confidentiality.
School/Discipline
Dissertation Note
Provenance
Description
Access Status
Rights
Copyright 2013 The Authors