Nothing Special   »   [go: up one dir, main page]

Skip to main content

On the Philosophical Foundations of Privacy: Five Theses

  • Conference paper
  • First Online:
The Practice of Enterprise Modeling (PoEM 2021)

Abstract

Privacy has emerged as a key concern for companies that deal with Personal Information (PI) since they need to comply with certain privacy requirements. Unfortunately, these requirements are often incomplete or inaccurate due to the vagueness of the privacy concept. This paper tries to tackle this problem, contributing to the philosophical foundations of privacy by addressing several foundational questions such as What is privacy? What makes information a PI? Is PI a property? Do we own our PI? To what extent we are entitled to protect our PI? How do we protect our PI? After answering the aforementioned questions, we characterize the privacy concept that allows providing a more precise and meaningful conceptualization of privacy requirements, which may improve dealing with them during the design of privacy-aware systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    A negative right exists unless someone acts to negate it, while a positive right is a right to be subjected to an action of another person or group.

  2. 2.

    In [17], privacy requirements were further specialized into more refined concepts such as confidentiality, anonymity, unlinkability, unobservability, notice, minimization, transparency, accountability, and the right to erasure/ be forgotten.

  3. 3.

    For reasons of readability, multiplicity and other constraints have been left out.

Reference

  1. Gharib, M., et al.: Privacy requirements: findings and lessons learned in developing a privacy platform. In: the 24th International Requirements Engineering Conference, pp. 256–265. IEEE (2016) https://doi.org/10.1109/RE.2016.13

  2. Gharib, M., Giorgini, P., Mylopoulos, J.: Towards an ontology for privacy requirements via a systematic literature review. In: Mayr, H.C., Guizzardi, G., Ma, H., Pastor, O. (eds.) ER 2017. LNCS, vol. 10650, pp. 193–208. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69904-2_16

    Chapter  Google Scholar 

  3. Solove, D.J.: Conceptualizing privacy. Calif. Law Rev. 90(4), 87–155 (2002). https://doi.org/10.2307/3481326

    Article  Google Scholar 

  4. Altman, I.: Privacy: a conceptual analysis. Environ. Behav. 8(1), 7–29 (1976)

    Article  Google Scholar 

  5. Schoeman, F.D.: Privacy: philosophical dimensions. Am. Philos. Q. 21(3), 199–213 (1984). https://doi.org/10.2307/20014049

    Article  Google Scholar 

  6. Hongladarom, S.: Philosophical foundations of privacy. In: A Buddhist Theory of Privacy, pp. 9–35 (2016) https://doi.org/10.1007/978-981-10-0317-2_2

  7. Waldo, J., Lin, H.S., Millett, L.I.: Engaging Privacy and Information Technology in a Digital Age. National Academies Press, Washington (2007). https://doi.org/10.17226/11896

  8. Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4(5), 193 (1890). https://doi.org/10.2307/1321160

    Article  Google Scholar 

  9. Poel, H.G.: Privacy. Tijdschrift voor Urologie 8(5), 67–67 (2018). https://doi.org/10.1007/s13629-018-00219-6

    Article  Google Scholar 

  10. Richards, N.M., Solove, D.J.: Prosser’s privacy law: a mixed legacy. Calif. L. Rev. 98, 1887 (2010)

    Google Scholar 

  11. Westin, A.F.: Privacy and freedom. Washington Lee Law Rev. 25(1), 166 (1968)

    Google Scholar 

  12. Solove, D.J.: A taxonomy of privacy. Univ. Pennsylvania Law Rev. 154(3), 477 (2006). https://doi.org/10.2307/40041279

    Article  Google Scholar 

  13. Dinev, T., Xu, H., Smith, J.H., Hart, P.: Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. Eur. J. Inf. Syst. 22(3), 295–316 (2013). https://doi.org/10.1057/ejis.2012.23

    Article  Google Scholar 

  14. Parker, R.B.: A definition of privacy. Rutgers L. Rev. 27, 83–104 (1973)

    Google Scholar 

  15. Gharib, M., Mylopoulos, J., Giorgini, P.: COPri - a core ontology for privacy requirements engineering. In: Dalpiaz, F., Zdravkovic, J., Loucopoulos, P. (eds.) RCIS 2020. LNBIP, vol. 385, pp. 472–489. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-50316-1_28

    Chapter  Google Scholar 

  16. Gharib, M., Giorgini, P., Mylopoulos, J.: COPri vol 2 - a core ontology for privacy requirements. Data Knowl. Eng. 133, (2021). https://doi.org/10.1016/j.datak.2021.101888

  17. Gharib, M., Giorgini, P., Mylopoulos, J.: An ontology for privacy requirements via a systematic literature review. J. Data Semant. 9(4), 123–149 (2021). https://doi.org/10.1007/s13740-020-00116-5

    Article  Google Scholar 

  18. Nodelman, U., Allen, C., Perry, J.: Stanford encyclopedia of philosophy. p. 380 (2002). https://doi.org/10.1145/544317.544327

  19. Romano, N.C., Fjermestad, J.: Privacy and security in the age of electronic customer relationship management. Int. J. Inf. Secur. Priv. (IJISP) 1(1), 65–86 (2007). https://doi.org/10.4018/jisp.2007010105

    Article  Google Scholar 

  20. Richardson, J.S.: The ownership of roman land: Tiberius Gracchus and the Italians. J. Roman Stud. 70, 1–11 (1980). https://doi.org/10.2307/299552

    Article  Google Scholar 

  21. Holvast, J.: History of privacy. In The History of Information Security, pp. 737–769. Elsevier Science BV (2007) https://doi.org/10.1016/B978-044451608-4/50028-6

  22. Posner, R.A.: The right of privacy. Ga. L. Rev. 12, 393 (1977)

    Google Scholar 

  23. Milberg, S.J., Smith, H.J., Burke, S.J.: Information privacy: corporate management and national regulation. Organ. Sci. 11(1), 35–57 (2000)

    Article  Google Scholar 

  24. Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. Tech. University Dresden, pp. 1–98 (2010)

    Google Scholar 

  25. Gavison, R.: Privacy and the limits of law. Yale Law 89(3), 421–471 (1980)

    Article  Google Scholar 

  26. Introna, L.D.: Privacy and the computer: why we need privacy in the information society. Metaphilosophy 28(3), 259–275 (1997). https://doi.org/10.1111/1467-9973.00055

    Article  Google Scholar 

  27. Rossler, B.: The Value of Privacy. Wiley, Hoboken (2018)

    Google Scholar 

  28. Solove, D.: Understanding Privacy. Harvard University Press, Cambridge (2008)

    Google Scholar 

  29. Thomson, J.J.: The right to privacy. Philos. Public Aff. 4(4), 295–314 (1975)

    Google Scholar 

  30. Schwartz, P.M.: Property, privacy, and personal data. Harvard Law Rev. 117(7), 2055–2128 (2003)

    Google Scholar 

  31. Samuelson, P.: Privacy as intellectual property? Stanford Law Rev. 52(5), 1125 (2000). https://doi.org/10.2307/1229511

    Article  Google Scholar 

  32. Litman, J.: Information privacy/information property. Stanford Law Rev. 52, 1283–1313 (2000)

    Article  Google Scholar 

  33. Purtova, N.: Property in personal data: second life of an old idea in the age of cloud computing, chain informatisation, and ambient intelligence. In: Gutwirth, S., Poullet, Y., De Hert, P., Leenes, R. (eds.) Computers, Privacy and Data Protection: an Element of Choice, pp. 39–64. Springer, Dordrecht (2011). https://doi.org/10.1007/978-94-007-0641-5_3

  34. Marmor, A.: What is the right to privacy? Philos. Public Aff. 43(1), 3–26 (2015). https://doi.org/10.1111/papa.12040

    Article  MathSciNet  Google Scholar 

  35. Rotenberg, M., Jacobs, D.: Updating the law of information privacy: the new framework of the European union. Harvard J. Law Public Policy 36(2), 605–652 (2013)

    Google Scholar 

  36. Veblen, T.: The beginnings of ownership. Am. J. Sociol. 4(3), 352–365 (1898). https://doi.org/10.4324/9781351311441-4

    Article  Google Scholar 

  37. Janeček, V.: Ownership of personal data in the Internet of Things. Comput. Law Secur. Rev. 34(5), 1039–1052 (2018). https://doi.org/10.1016/j.clsr.2018.04.007

    Article  Google Scholar 

  38. Fairfield, J.A.: Virtual property. Boston Law Rev. 85(4), 1048–1102 (2005)

    Google Scholar 

  39. Massin, O.: The metaphysics of ownership: a reinachian account. Axiomathes 27(5), 577–600 (2017)

    Article  Google Scholar 

  40. Omoronyia, I., Cavallaro, L., Salehie, M., Pasquale, L., Nuseibeh, B.: Engineering adaptive privacy: On the role of privacy awareness requirements. In: Proceedings - International Conference on Software Engineering, pp. 632–641 (2013)

    Google Scholar 

  41. Trepte, S., et al.: Do people know about privacy and data protection strategies? Towards the online privacy literacy scale (OPLIS). In: Reforming European Data Protection Law, pp. 333–365 (2015)

    Google Scholar 

  42. Parliament, E.: Regulation (EU) 2016/679 of the European parliament and of the council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC. Official J. Eur. Commun. 59, 1–88 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamad Gharib .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gharib, M., Mylopoulos, J. (2021). On the Philosophical Foundations of Privacy: Five Theses. In: Serral, E., Stirna, J., Ralyté, J., Grabis, J. (eds) The Practice of Enterprise Modeling. PoEM 2021. Lecture Notes in Business Information Processing, vol 432. Springer, Cham. https://doi.org/10.1007/978-3-030-91279-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91279-6_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91278-9

  • Online ISBN: 978-3-030-91279-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics