Wahlstrom, K.Fairweather, N.B.Bynum, T.W.2025-12-172025-12-172013The possibilities of ethical ICT: proceedings of the 13th International Conference - ETHICOMP 2013, 2013 / Bynum, T.W. (ed./s), pp.502-5109788792646729https://hdl.handle.net/1959.8/151937Privacy is undergoing a reifying integration with regulatory and technical systems. This paper reviews privacy theory and Habermas’s Theory of Communicative Action (TCA) in order to inform two analyses of two technological concepts: an RFID identification scheme and Privacy-Preserving Data Mining. The first analysis seeks to establish whether each technological concept is consistent with privacy theory. The second analysis is informed by the first and it applies the truth, rightness and authenticity validity claims of the TCA. These analyses find that these technological applications may rest on reasonably strong claims to validity with respect to data security and data confidentiality. However, these analyses also find that these technological fields have weak claims to validity with respect to privacy when it is distinguished from data security and data confidentiality.enCopyright 2013 The Authorsprivacyinformation technologytheory of communicative actionPrivacy, the theory of communicative action and technologyConference paper