Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

Similar documents
The Synthetic Death of Free Will. Richard Thompson Ford, in Save The Robots: Cyber Profiling and Your So-Called

Artificial intelligence and judicial systems: The so-called predictive justice

Correlation Guide. Wisconsin s Model Academic Standards Level II Text

Privacy Laws, Technological Developments, and Their Impact on You Review of: Understanding Privacy and Data Protection: What You Need to Know

Profiling the European Citizen

DIGITAL CITIZENSHIP EDUCATION (DCE)

Information Sociology

Centre for the Study of Human Rights Master programme in Human Rights Practice, 80 credits (120 ECTS) (Erasmus Mundus)

IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES. K.P Jayant, Research Scholar JJT University Rajasthan

special roundtable Andrew D. Marble Kenneth Lieberthal Emily O. Goldman Robert Sutter Ezra F. Vogel Celeste A. Wallander

9TH INTERNATIONAL CONFERENCE ON INTERNET, LAW AND POLITICS (IDP 2013) BIG DATA: CHALLENGES AND OPPORTUNITIES REPORT

Ethics Guideline for the Intelligent Information Society

CSCI 2070 Introduction to Ethics/Cyber Security. Amar Rasheed

Prof. Roberto V. Zicari Frankfurt Big Data Lab The Human Side of AI SIU Frankfurt, November 20, 2017

GETTING TO KNOW GP:!! AN OVERVIEW! * * *!

CDT Annual Dinner. Center for Democracy and Technology, Washington. 10 March 2015

I m sorry, my friend, but you re implicit in the algorithm Privacy and internal access to #BigDataStream

Building DIGITAL TRUST People s Plan for Digital: A discussion paper

Towards a Magna Carta for Data

Computer Science and Philosophy Information Sheet for entry in 2018

CRITERIA FOR AREAS OF GENERAL EDUCATION. The areas of general education for the degree Associate in Arts are:

Biology Foundation Series Miller/Levine 2010

CENTER OF DESIGN AND CONSTRUCTION SCIENCES UNDERGRADUATE DEGREE IN GRAPHIC DESIGN

Mark Coeckelbergh (University of Twente, NL) FREEDOM, SECURITY, PRIVACY OR HOW TO LIVE WITH NEW INFORMATION AND COMMUNICATION TECHNOLOGIES

COMMUNICATION SCIENCE MASTER S PROGRAMME

Our Final Invention: Artificial Intelligence and the End of the Human Era

We believe that... technological innovation and new uses of data can help solve big societal problems and improve lives.

Eco-Schools Curricular Maps - Litter Topic

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Are you, or do you wish to be, a published writing professional?

Review of Fantasy and the Real World in British Children's Literature: The Power of Story

Tips on argumentative essay writing >>>CLICK HERE<<<

Tuning-CALOHEE Assessment Frameworks for the Subject Area of CIVIL ENGINEERING The Tuning-CALOHEE Assessment Frameworks for Civil Engineering offers

Book Review: Digital Forensic Evidence Examination

AP WORLD HISTORY 2016 SCORING GUIDELINES

WORKSHOP ON BASIC RESEARCH: POLICY RELEVANT DEFINITIONS AND MEASUREMENT ISSUES PAPER. Holmenkollen Park Hotel, Oslo, Norway October 2001

SOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE

Computer and Information Ethics

OUR WORLD YOUR POTENTIAL OUR PROGRAMME

General Education Rubrics

Outline of Presentation

From vision to reality

networked Youth Research for Empowerment in the Digital society MANIFESTO

FACULTY SENATE ACTION TRANSMITTAL FORM TO THE CHANCELLOR

The case for a 'deficit model' of science communication

Environmental Science: Your World, Your Turn 2011

Image, Identity and New Media Introduction. Patrick Prax

Revised East Carolina University General Education Program

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics?

How to publish a paper in Nature

Artificial Intelligence and Society: the Challenges Ahead Yuko Harayama Executive Member Council for Science, Technology and Innovation (CSTI)

The Science In Computer Science

AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara

Earle, Joshua. Deleting the Instrument Clause: Technology as Praxis. Social Epistemology Review and Reply Collective 7, no. 10 (2018):

Communication and dissemination strategy

MPJO : FEATURE WRITING GEORGETOWN UNIVERSITY: MPS- JOURNALISM Tuesdays, 6 p.m. to 9:20 p.m. Summer 2014

Annotated Bibliography: Artificial Intelligence (AI) in Organizing Information By Sara Shupe, Emporia State University, LI 804

The Curated Collection Blog Post Template

Measuring Intangible Assets (IP & Data) for the Knowledge-based and Data-driven Economy

Research strategy

General Questionnaire

R. Cameron Garrison. Managing Partner

Self-Care Revolution Workbook 5 Pillars to Prevent Burnout and Build Sustainable Resilience for Helping Professionals

Privacy: how we do it and when it matters most

Techné 9:2 Winter 2005 Verbeek, The Matter of Technology / 123

Draft for consideration

Technologists and economists both think about the future sometimes, but they each have blind spots.

BUREAU OF LAND MANAGEMENT INFORMATION QUALITY GUIDELINES

Science education at crossroads: Socio-scientific issues and education

design research as critical practice.

Violent Intent Modeling System

Vision. The Hague Declaration on Knowledge Discovery in the Digital Age

About the Authors Shulamit Almog Bibi van den Berg Niels van Dijk

English National Curriculum Key Stage links to Meteorology

Appendix I Engineering Design, Technology, and the Applications of Science in the Next Generation Science Standards

Big Data and the Question of Objectivity

Executive Summary. Correspondence between age and grade. Grade Outside Quebec. Grade In Quebec Secondary

How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory

technologies, Gigaom provides deep insight on the disruptive companies, people and technologies shaping the future for all of us.

Introduction. amy e. earhart and andrew jewell

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP

REINTERPRETING 56 OF FREGE'S THE FOUNDATIONS OF ARITHMETIC

Lumeng Jia. Northeastern University

Running head: THE IMPACT OF COMPUTER ENGINEERING 1

Lesson 1 Opening 1 Level in a Suit

Adam Aziz 1203 Words. Artificial Intelligence vs. Human Intelligence

Excess online coming to terms with users and data. Minna Ruckenstein

ETHICS CASE SKIT SCRIPT AND TOPICS FOR CLASS DISCUSSION

Big Data & Ethics some basic considerations

Environmental Law and Policy Annual Review (ELPAR) Methodology for Trends in Environmental Legal Scholarship

The Third International Conference on Dependability NETWARE July 18-25, Venice/Mestre, Italy

How to write a paper and get it published in a refereed journal

INNOVATION PROCESS AND ETHICS IN TECHNOLOGY:

Resume and Curriculum Vitae (CV)

VALLIAMMAI ENGINEERING COLLEGE

Developing a good scientific writing practice-part one

Visual Arts What Every Child Should Know

Astronomy Project Assignment #4: Journal Entry

General rules for answering exam questions

Years 9 and 10 standard elaborations Australian Curriculum: Digital Technologies

Transcription:

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Edited by Mireille Hildebrandt and Katja de Vries New York, New York, Routledge, 2013, ISBN 978-0-415-64481-5 Price $135.00, pp. 246 pages Reviewed by Elizabeth R. Libro Journal of High Technology Suffolk University Law School {[Privacy]} seems to be about everything, and therefore it appears to be nothing. 1 Mireille Hildebrandt and Katja de Vries s Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology identifies issues of privacy specifically related to the use of computational systems and the study of computational media, also referred to as the computational turn. 2 The increased use of computational systems, such as data analytics, and the extent to which they are relied upon in today s society for profiling and categorizing individuals, raises concerns regarding the existence of violations of an individual s privacy. This review examines individual s right to privacy and due process mainly focusing on their existence in relation to computational systems. 1 MIREILLE HILDEBRANDT & KATJA DE VRIES, PRIVACY, DUE PROCESS AND THE COMPUTATIONAL TURN: THE PHILOSOPHY OF LAW MEETS THE PHILOSOPHY OF TECHNOLOGY 12 (2013). 2 (Data mining, behavioral advertising, government, profiling for intelligence, customer relationship management, smart search engines, personalized news feeds, etc.) 1

The book takes an interesting look into the world of the computational turn and could not have been edited by two more prestigious individuals. 3 Mireille Hildebrandt started her academic career focusing on cultural anthropology later switching her focuses to law. She received her JD from Leyden University and her PhD from Erasmus University Rotterdam. Currently, Ms. Hildebrandt is a tenured Research Professor on Interfacing Law and Technology at Vrije Universiteit Brussels. Additionally, she holds the part time Chair of Smart Environments, Data Protection and the Rule of Law at the Science Faulty, the Institute for Computing and Information Sciences (ICIS) at Radbound University Nijmegen. She is editor and chief of the Netherlands Journal of Legal Philosophy. Ms. Hildebrandt has also co-edited numerous publications including: Profiling the European Citizen (2008) and Law, Human Agency and Automatic Computing (2011). Katja De Vries received three masters degrees with distinction from Leiden University and additionally graduated from Oxford University. She is currently a PhD student at the Centre for Law, Science, Technology, and Society at Vrije Universiteit Brussels where her research is focused on the collisions and interactions between legal and technological modes of thinking. Her published works are focused on probabilistic understandings of rationality and equality, and how they function with advancements made to data technologies and the legal field. This book begins with an introduction that sums up the contents of the book in several pages. Ms. Hildebrandt and Ms. De Vries acknowledge that this specific chapter was written to accommodate what they are calling the average hurried reader. 4 They explain that the purpose of this book is to help readers understand how privacy and due process affect the legal, moral 3 See HILDEBRANDT, supra note 1, at 2-7 (explaining that each chapter was contributed to the book written by different professionals from both the legal and technological fields). 4 See HILDEBRANDT, supra note 1, at 2. 2

and political framework of our constitutional democracy. 5 The chapter further goes on to examine and summarize the contents of the subsequent chapters. Chapter one starts with a parable, which included the use of three robotic dogs to illustrate the concepts, phenomena, and solutions addressed in this book. 6 The chapter further goes on to give a brief overview of exactly what the terms computational turn, privacy and due process mean. It also addresses how society can coexist with advanced technological machines in the future and the various courses of action society can take to properly coexist. The chapter closes by revisiting the robotic dog parable. Four practical lessons are drawn and compared to the era of the computational turn by revisiting the parable. 7 Chapter two examines techniques surrounding the profiling of individuals. It goes on to explain what profiling is, how technological advancements have made it easier to profile individuals, and how easier profiling additionally makes it easier to evaluate patterns or reasoning and behavior. 8 The focus of this chapter is on highlighting how technology has advanced to a point that individual privacy is being taken away specificity because technology can now predict what individuals are going to do in the future. 9 Chapter three focus on knowledge in the current technological world knowledge. It addresses two main concepts: (1) that more value should be given to people as opposed to objects and material things and (2) a new idea of what constitutes knowledge in today s society. 10 The reader is provided the idea that by enhancing free will, freedom, responsibility and ownership of our destinies we ultimately will develop human dignity, but to do so requires 5 See HILDEBRANDT, supra note 1, at 2. 6 See HILDEBRANDT, supra note 1, at 9. 7 See HILDEBRANDT, supra note 1, at 26. 8 See HILDEBRANDT, supra note 1, at 41 9 See HILDEBRANDT, supra note 1, at 41. 10 See HILDEBRANDT, supra note 1, at 68. 3

knowledge of how to do so. 11 Readers are then warned that although these advancements can be greatly benefitted from, they should also be limited for fear of encroachment upon and interfering with an individual s self-realization. Chapter four expands on the idea of knowledge focused on in chapter three. This chapter discusses the development of the law after the computational turn and argues that current scientists find their data inspiration from the bad man theory of law. 12 The author warns that individual due process is at stake with developing predictive technologies to enhance law enforcement. 13 He urges that as a result of these predictive methods due process could eventually be eliminated because the law and the individuals rights will no longer be equally balanced, the law will eventually take over thus eliminating an individual s right to observe and understand that his/her participation in a certain activity could ultimately implicate them. 14 Chapter five analyses web based intelligence. This chapter shifts to show that privacy can be interfered with not only through complex technology, but through our everyday technological use of computers, cell phones, etc. 15 It explains that the data gathered through these everyday uses can be utilized by companies to solicit and make available advertisements for brands that the individual is predicted to possibly purchase. 16 The chapter concludes by warning readers that making such future inferences and predictions can lead to said predictions being fragile and invalid because they won t be used by companies to predict the future, but will eventually be used by individuals to predict their own present. 17 11 See HILDEBRANDT, supra note 1, at 77-79. 12 See HILDEBRANDT, supra note 1, at 95. 13 See HILDEBRANDT, supra note 1, at 98. 14 See HILDEBRANDT, supra note 1, at 110-11. 15 See HILDEBRANDT, supra note 1, at 121. 16 See HILDEBRANDT, supra note 1, at 128. 17 See HILDEBRANDT, supra note 1, at 137. 4

Chapter six argues that the society that emerged following the computational turn is one that does not suppose an individual is rational, moral, intentional, and does not rely on socially tested categorizations. 18 It further asserts that this emerging society has promised to treat individuals as individuals. 19 However, this chapter provides examples specifically showing how technological advancements have only made it easier for individuals to be profiled and categorized, which is contrary to the message of individuality that was originally trying to be reached. It concludes by explaining that categorizing individuals by their profiles only taints any individuality that can potentially be reached. 20 Chapter seven brings forth the idea of obfuscation. It addresses how the modes of obfuscation range from the production of misleading, false or ambiguous data with the intention of confusing and adversary to simply adding to the time or cost of separating bad data from good. 21 This chapter focuses on the idea that as a result of obfuscation, free ridership of companies who perform data collection and contamination of that data collection is a huge problem. It urges that these problematic instances can possibly be avoided by evaluating the ethical and political solutions. 22 Chapter eight evaluates the need to enhance protection of individuals as a result of the computational turn. 23 The author analyzes the limitations surrounding the Data Protection Directive and sets forth two current plans for revising the Directive focusing on reducing the transparency of the subjects getting data collected from. 24 Chapter nine argues almost the exact opposite. It argues that using this technology makes its subjects at most translucent and focuses 18 See HILDEBRANDT, supra note 1, at 144. 19 See HILDEBRANDT, supra note 1, at 144-45. 20 See HILDEBRANDT, supra note 1, at 145, 148-49. 21 See HILDEBRANDT, supra note 1, at 171. 22 See HILDEBRANDT, supra note 1, at 171-72. 23 See HILDEBRANDT, supra note 1, at 196. 24 See HILDEBRANDT, supra note 1, at 197-201. 5

on what the individual is like instead of who they are as an individual. The chapter discusses the Deleuzian concepts of de-realisation and virtualization, which creates large populations of anonymous profiles that are applied to a large population of individual human beings. 25 The chapter concludes by arguing that if society sees this transparency turning into a translucent light there must be some way of preventing this change from fully forming. Overall, this is an intriguing book to read. The editors did an excellent job capturing the audience s attention by having several contributors with different backgrounds write their perspectives regarding the topic. If you are a professional focusing specifically on constitutional law and/or how constitutional law can be affected by technological advancements, this book is for you. If you are an individual who has an interest in the area of constitutional law and privacy rights you would also enjoy the contents of this book. However, the only part of the book written to appeal to the average everyday person is the introduction section. It provides great intellectual insight into the world revolving around constitutional law and analyzes how privacy rights and Due Process rights can be affected by the computational turn, however, there are some points in the book that are philosophically written and hard to understand upon first read. This book does provide great insight into a rather interesting topic by taking several viewpoints and putting them together so individuals can utilize them and get professional understandings and observations in order to form their own opinions. I would earnestly recommend this book to professionals focusing on constitutional law and professionals focusing on data collection. It was informative and provided compelling arguments involving individual s current privacy status. It really was a great read and can be extremely helpful in crafting future laws surrounding privacy and data collection. 25 See HILDEBRANDT, supra note 1, at 222. 6