Skip to main content
Log in

A practice–theoretical account of privacy

  • Original paper
  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy (SORM), it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior and role obligations within a specific practice (first level), as well as evaluate the normative structure, the fundamental practice norms as well as the roles and their status (second level). The SORM utilizes the concept of standard authority to explicate privacy with regard to two categories that capture the relevant phenomena of privacy: decisional and informational privacy. Within a practice, an actor is said to have decisional privacy if she as a BCR does not (or does not have to) recognize bearers of accidental roles as standard authorities. Vice versa, an actor is said to enjoy informational privacy if all other BCRs (and especially data collecting actors) recognize her as a standard authority. Additionally, the requirement of mutual recognition by the practice participants as standard authorities introduces a “weak normativity” into the theory, which can be used to identify deficient privacy arrangements within practices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. Beate Roessler distinguishes three historical stages or phases of the debate (Roessler 2016). In short, she claims that the first stage centers around the individual dimensions of privacy, the second around the social dimensions (privacy in and for relationships), and the third around the political dimension (privacy as a prerequisite for democracy).

  2. Analogous to Roessler’s distinction, Priscilla Regan distinguishes three types of values that can inform our value judgments about privacy: individual value, public value, and common value (Regan 1995, p. 203).

  3. Following Roessler (2005, Ch. 3.4), I will qualify between a “instrumental/functional value” of privacy, where privacy is valuable for something else (autonomy, authenticity, relationships, democracy etc.) and an “intrinsic value”, where privacy is valued for its own sake (Fried 1984). In this regard, “intrinsic” is used in the sense of “ultimate ends” (Parsons 1949, 75, Fn. 2), not in the sense of the “location or source of the goodness” (Korsgaard 1983, p. 179).

  4. In my opinion, this is the general downside of Floridi’s ontological concept of privacy as informational friction (Floridi 2005). His system-theoretically informed account allows only for a very basic normative argument about reserving some kind of privacy because of informational entropy.

  5. In fact, phenomenon adequacy is a fundamental prerequisite for any valid theory or description of a concept, not just in the realm of privacy. However, I specifically point it out here, as it features prominently in Floridi’s four challenges. More importantly, however, especially a unified theory of privacy needs to ensure phenomenon adequacy, as it cannot capture different phenomena by different explanations as e.g. a cluster theory can. Therefore, it is worth making this prerequisite explicit and to be mindful to lay out the theory such that it adequately tracks the main core of the phenomenon.

  6. For DeCew, this narrow definition is sufficient, since the other areas of decisional privacy are in her conception covered by the notion of accessibility privacy.

  7. And maybe also for the feasibility of the normative demands it makes in the sense of a “realistic utopia” (Rawls 2003, § 1).

  8. This has to do with the comparatively high level of theoretical abstraction that most value theories of privacy are situated at. In referring to abstract values such as autonomy, authenticity, intimacy, democracy etc., those theories capture different aspects of our intuitions about what is valuable and why. The respective normative demands that follow from those principles may be equally coherent in themselves, but not compatible to each other. Therefore, an answer to the question “What is privacy?” (i.e. a general theory of privacy) should be able to accommodate as many value judgments about privacy as possible.

  9. For DeCew’s account, however, I showed above that her three types of interests can be categorized as belonging to either the decisional or the informational domain of privacy.

  10. In contrast, Pierre Bourdieu as one of the main proponents of practice theory famously refrained from giving a positive definition of social practices (Schmidt 2012, pp. 35–36). According to him, beyond empirical descriptions of actual practices it is to him impossible to provide an accurate overall synthesis (Bourdieu 1990, Ch. 5). In addition, he insists that the practical turn in sociology is not to be limited to the object of scientific observation but must include the scientific observation as a practice as well. In this sense, he claims that the internal “logic” of a given practice must not be confused with the “logic” of the practice theory that is used to describe it (Bourdieu 1977).

  11. This characterization contends that goals and values that come with the normative status function of roles should also be described in terms of role obligations. For a different account cf. Raz (1999, Ch. 4). I am indebted to Hauke Behrendt for highlighting this point.

  12. Various accounts of role obligations differentiate between the (generally more uncontroversial) normative status function that comes with a certain role and the ideal of this given role, which is expressed by (oftentimes more contested) “standards of excellence” (MacIntyre 1985, p. 187).

  13. For the opposite claim that an external observer is not in a privileged position to describe the practice norms more adequately than the participants see e.g. Garfinkel 1967; Geertz 1973; Boltanski and Chiapello 2007.

  14. Other answers individuate practices by their particular sequence of actions (Wittgenstein 1998) or by a certain set of norms in the form of role obligations (Searle 2008, Ch. 4.II).

  15. “Fundamental” in this respect means that the motivation is “content-independent” (Raz 1986, p. 35) of the specific practice norms. This provides the participants with reasons to uphold the practice that do not cater to their short-term interests and therefore are not dependent on them. They are, however, also partly motivated to uphold the practice if it furthers their interests. This aspect of their motivation is content-dependent, i.e. it depends on the structure of the practice and the goals that the participants pursue with and in it.

  16. Since in this example we are talking also about legal norms and obligations, the idea of an equal say may have to revert to more institutionalized forms of standard authority, such as public contestation, legal complaints and lawsuits, voting and policy-making etc. As a patient, however, I still enjoy the standard authority to criticize my doctor directly and demand justification for her—in my eyes faulty—enactment of her role as doctor with regard to her role obligations in terms of informational privacy.

  17. Note that such an equal say will typically result in very general interpretations of informational privacy norms. From these, experts then have to determine whether we should e.g. employ the idea of dynamic consent (Kaye et al. 2015), sticky policies in database solutions (Mont et al. 2003), or some combination strategies thereof; which models of user authentication (Cavoukian and Jones 2014), ano- and pseudonymity strategies (Hartzog and Stutzman 2013), methods of data minimization (Tene and Polonetsky 2013), and data segregation between personal and content data (Sun et al. 2014) we should favor. This cannot be the task of the practice participant as a standard authority.

  18. There are, obviously, legal limits to these contestations. However, they can still change a company culture, and within the connected wider practices of labor law and worker protection, also the legal framework of decisional privacy within the practice of work.

  19. For a more systematic exploration into the different notions of social pathologies cf. Honneth 1996, Freyenhagen 2015, or Loh 2017.

  20. Note that the pathological nature of this confusion lies in the systematic way it is embedded within each reproduction of the practice. It is not a mistake within one instantiation of the practice, which would most likely be called out as a misinterpretation of the practice’s structure.

  21. For a more detailed account on the role of the sociologist in the description and explication of deficient or pathological practices see e.g. Bourdieu 1977, 1999; Habermas 1984; Honneth 2014b; Loh 2017.

References

  • Applbaum, A. I. (1999). Ethics for Adversaries: The morality of roles in public and professional life. Princeton: Princeton University Press.

    Google Scholar 

  • Baker, A. (2016). Simplicity. The Stanford Encyclopedia of Philosophy. Retrieved February 26, 2018, from https://plato.stanford.edu/entries/simplicity/.

  • Barth, A., Datta, A., Mitchell, J. C., & Nissenbaum, H. (2006). Privacy and contextual integrity: framework and applications. Proceedings of the 2006 IEEE Symposium on Security and Privacy, https://doi.org/10.1109/SP.2006.32.

    Article  Google Scholar 

  • Benn, S. (1984). Privacy, freedom, and respect for persons. In F. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 223–244). Cambridge: Cambridge University Press.

    Chapter  Google Scholar 

  • Boltanski, L., & Chiapello, E. (2007). The new spirit of capitalism. London: Verso.

    Google Scholar 

  • Bourdieu, P. (1977). Outline of a theory of practice. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Bourdieu, P. (1990). The logic of practice. Stanford: Stanford University Press.

    Google Scholar 

  • Bourdieu, P. (1999). The weight of the world: Social suffering in contemporary society. Stanford: Stanford University Press.

    Google Scholar 

  • Brandom, R. B. (1998). Making it explicit: Reasoning, representing and discursive commitment (2nd edn.). Cambridge: Harvard University Press.

    Google Scholar 

  • Bridwell, S. (2007). The dimensions of locational privacy. In H. J. Miller (Ed.), Societies and cities in the age of instant access (pp. 209–225). Berlin: Springer.

    Chapter  Google Scholar 

  • Cavoukian, A., & Jones, J. (2014). Privacy by Design: From Rhetoric to Reality. Retrieved February 27, 2018, from https://www.ipc.on.ca/wp-content/uploads/Resources/PbDBook-From-Rhetoric-to-Reality.pdf.

  • Celikates, R. (2009). Kritik als soziale Praxis: Gesellschaftliche Selbstverständigung und kritische Theorie. Frankfurt/Main: Campus.

    Google Scholar 

  • DeCew, J. (1997). In pursuit of privacy: Law, ethics and the rise of technology. Ithaca: Cornell University Press.

    Google Scholar 

  • Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 7, 185–200 https://doi.org/10.1007/s10676-006-0001-7.

    Article  Google Scholar 

  • Floridi, L. (2006). Four challenges for a theory of informational privacy. Ethics and Information Technology, 8, 109–119. https://doi.org/10.1007/s10676-006-9121-3.

    Article  Google Scholar 

  • Floridi, L. (2013). The ethics of information. Oxford: Oxford University Press.

    Book  Google Scholar 

  • Floridi, L. (2014). The 4th revolution: How the infosphere is reshaping human reality. Oxford: Oxford University Press.

    Google Scholar 

  • Freyenhagen, F. (2015). Honneth on social pathologies: A critique. Critical Horizons, 16(2), 131–152.

    Article  Google Scholar 

  • Fried, C. (1984). Privacy: A moral analysis. In F. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 203–222). Cambridge: Cambridge University Press.

    Chapter  Google Scholar 

  • Garfinkel, H. (1967). Studies in ethnomethodology. Oxford: Polity Press.

    Google Scholar 

  • Geertz, C. (1973). The interpretation of cultures: Selected essays. New York: Basic Books.

    Google Scholar 

  • Giddens, A. (1984). The constitution of society: Outline of the theory of structuration. Cambridge: Polity Press.

    Google Scholar 

  • Habermas, J. (1984). The theory of communicative action. Cambridge: Polity; Beacon Press.

    Google Scholar 

  • Habermas, J. (1995). Theorie des kommunikativen Handelns. Frankfurt/Main: Suhrkamp.

    Google Scholar 

  • Hardimon, M. (1994). Role Obligations. The Journal of Philosophy, 91(7), 333–363.

    Article  Google Scholar 

  • Hart, H. L. A. (1994). The concept of law (2nd edn.). Oxford: Clarendon Press.

    Google Scholar 

  • Hartzog, W., & Stutzman, F. (2013). Obscurity by design. Washington Law Review, 88, 385–418.

    Google Scholar 

  • Hillebrandt, F. (2014). Soziologische Praxistheorien: Eine Einführung. Wiesbaden: Springer VS.

    Book  Google Scholar 

  • Honneth, A. (1996). Pathologies of the social: The past and present of social philosophy. In D. M. Rasmussen (Ed.), Handbook of critical theory (pp. 369–398). Oxford: Blackwell.

    Google Scholar 

  • Honneth, A. (2014a). Die Krankheiten der Gesellschaft: Annäherung an einen nahezu unmöglichen Begriff. WestEnd - Neue Zeitschrift für Sozialforschung 11(1), 45–60.

    Google Scholar 

  • Honneth, A. (2014b). Freedom’s right: The social foundations of democratic life (New directions in critical theory). New York: Columbia University Press.

    Book  Google Scholar 

  • Houlgate, S. (2008). G.W.F. Hegel - Outlines of the Philosophy of Right. Oxford: Oxford Univ. Press.

    Google Scholar 

  • Jaeggi, R. (2014). Kritik von Lebensformen. Berlin: Suhrkamp.

    Google Scholar 

  • Kaye, J., Whitley, E. A., Lund, D., Morrison, M., Teare, H., & Melham, K. (2015). Dynamic consent: a patient interface for twenty-first century research networks. European Journal of Human Genetics, 23, 141–146 (2015). https://doi.org/10.1038/ejhg.2014.71.

    Article  Google Scholar 

  • Korsgaard, C. (1983). Two distinctions in goodness. The Philosophical Review, 92, 169 (1983). https://doi.org/10.2307/2184924.

    Article  Google Scholar 

  • Loh, W. (2017). Literaturwissenschaft als Sozialkritik. In A. Albrecht, M. Schramm & T. Venzl (Eds.), Literatur und Anerkennung: Wechselwirkungen und Perspektiven (pp. 159–184). Berlin: LIT.

    Google Scholar 

  • MacIntyre, A. (1985). After virtue: A study in moral theory (2nd edn.). London: Duckworth.

    Google Scholar 

  • Mont, M., Pearson, S., & Bramhall, P. (2003). Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In Prague, 01.09.2003 (pp. 377–382): IEEE Comput. Soc. https://doi.org/10.1109/DEXA.2003.1232051.

  • Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27–32.

    Article  Google Scholar 

  • Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17, 559–596.

    Google Scholar 

  • Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119–158.

    Google Scholar 

  • Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford Law Books.

    Google Scholar 

  • Parent, W. (1983). Privacy, morality, and the law. Philosophy and Public Affairs, 12(4).

    Google Scholar 

  • Parsons, C. (2015). Beyond privacy: Articulating the broader harms of pervasive mass surveillance. Media and Communication, 3, 1 https://doi.org/10.17645/mac.v3i3.263.

    Article  Google Scholar 

  • Parsons, T. (1949). The structure of social action: A study in social theory with special references to a group of recent european writers (2nd edn.). Glencoe: The Free Press.

    Google Scholar 

  • Patton, J. (2000). Protecting privacy in public? Surveillance technologies and the value of public places. Ethics and Information Technology, 2, 181–187. https://doi.org/10.1023/A:1010057606781.

    Article  Google Scholar 

  • Rachels, J. (1984). Why privacy is important. In F. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 290–299). Cambridge: Cambridge Univ. Pr.

    Chapter  Google Scholar 

  • Rawls, J. (2003). The law of peoples: With “The idea of public reason revisited” (5th edn.). Cambridge: Harvard Univ. Press.

    Google Scholar 

  • Raz, J. (1986). The morality of freedom (Clarendon paperbacks). Oxford: Clarendon Press.

    Google Scholar 

  • Raz, J. (1999). Practical reason and norms. Oxford: Oxford University Press.

    Book  Google Scholar 

  • Reckwitz, A. (2003). Grundelemente einer Theorie sozialer Praktiken: Eine sozialtheoretische Perspektive. Zeitschrift für Soziologie, 32(4), 282–301.

    Article  Google Scholar 

  • Reckwitz, A. (2008). Praktiken und Diskurse: Eine sozialtheoretische und methodologische Relation. In H. Kalthoff, S. Hirschauer & G. Lindemann (Eds.), Theoretische Empirie: Zur Relevanz qualitativer Forschung (pp. 188–209). Frankfurt/Main: Suhrkamp.

    Google Scholar 

  • Regan, P. (1995). Legislating privacy: Technology, social values, and public policy. Chapel Hill: University of North Carolina Press.

    Google Scholar 

  • Roessler, B. (2005). The value of privacy. Cambridge: Polity Press.

    MATH  Google Scholar 

  • Roessler, B. (2015). Should personal data be a tradable good? On the moral limits of markets in privacy. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 141–161). Cambridge: Cambridge University Press.

    Chapter  Google Scholar 

  • Roessler, B. (2016). Wie wir uns regieren. WestEnd(01), 103–118.

  • Roessler, B., & Mokrosinska, D. (2013). Privacy and social interaction. Philosophy & Social Criticism, 39, 771–791 (2013). https://doi.org/10.1177/0191453713494968.

    Article  Google Scholar 

  • Roessler, B., & Mokrosinska, D. (2015). Introduction. In B. Roessler & D. Mokrosinska (Eds.), Social dimensions of privacy: Interdisciplinary perspectives (pp. 1–9). Cambridge: Cambridge University Press.

    Chapter  Google Scholar 

  • Schaar, P. (2010). Privacy by Design. Identity in the Information Society, 3, 267–274 (2010). https://doi.org/10.1007/s12394-010-0055-x.

    Article  Google Scholar 

  • Schachter, M. (2003). Informational and decisional privacy. Durham N.C.: Carolina Academic Press.

    Google Scholar 

  • Schatzki, T. R. (1996). Social practices: A wittgensteinian approach to human activity and the social. Cambridge: Cambridge Univ. Press.

    Book  Google Scholar 

  • Schatzki, T. R. (2002). The site of the social: A philosophical account of the constitution of social life and change. University Park: Pennsylvania State University Press.

    Google Scholar 

  • Schmidt, R. (2012). Soziologie der Praktiken: Konzeptionelle Studien und empirische Analysen. Berlin: Suhrkamp.

    Google Scholar 

  • Searle, J. R. (2008). Speech acts: An essay in the philosophy of language (30th edn.). Cambridge: Cambridge Univ. Press.

    Google Scholar 

  • Shampanier, K., Mazar, N., & Ariely, D. (2007). Zero as a special price: The true value of free products. Marketing Science, 26, 742–757 (2007). https://doi.org/10.1287/mksc.1060.0254.

    Article  Google Scholar 

  • Solove, D. J. (2008). Understanding privacy. Cambridge: Harvard University Press.

    Google Scholar 

  • Stahl, T. (2013). Immanente Kritik: Elemente einer Theorie sozialer Praktiken. Frankfurt/Main: Campus.

    Google Scholar 

  • Stahl, T. (2014). The Conditions of Collectivity: Joint Commitment and the Shared Norms of Membership. In A. Konzelmann, Ziv & H. B. Schmid (Eds.), Institutions, Emotions, and Group Agents: Contributions to Social Ontology. Studies in the Philosophy of Sociality (vol. 2, pp. 229–244). Dordrecht: Springer.

    Chapter  Google Scholar 

  • Stahl, T. (2016). Indiscriminate mass surveillance and the public sphere. Ethics and Information Technology, 18, 33–39. https://doi.org/10.1007/s10676-016-9392-2.

    Article  Google Scholar 

  • Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10, 190903. https://doi.org/10.1155/2014/190903.

    Article  Google Scholar 

  • Tavani, H. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38, 1–22. https://doi.org/10.1111/j.1467-9973.2006.00474.x.

    Article  Google Scholar 

  • Tene, O., & Polonetsky, J. (2013). Big data for all: Privacy and user control in the age of analytics. Northwestern Journal of Technology and Intellectual Property, 11(5), 239–273.

    Google Scholar 

  • Torra, V. (2017). Data privacy: Foundations, new developments and the big data challenge. Cham: Springer.

    Book  Google Scholar 

  • Ulbricht, M., & Weber, K. (2017). Adieu Einwilligung?: Neue Herausforderungen für die informationelle Selbstbestimmung im Angesicht von Big Data-Technologien. In M. Friedewald, J. Lamla, & A. Roßnagel (Eds.), Informationelle Selbstbestimmung Im Digitalen Wandel (pp. 265–286): Vieweg + Teubner, Verlag.

    Chapter  Google Scholar 

  • Westin, A. F. (1967). Privacy and freedom. New Jork: Atheneum.

    Google Scholar 

  • Wittgenstein, L. (1998). Philosophical investigations (2nd edn.). Oxford: Blackwell.

    MATH  Google Scholar 

Download references

Acknowledgements

This work is supported by the German Ministry of Education and Research (BMBF) within the “Be-Greifen” project (16SV7527).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wulf Loh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Loh, W. A practice–theoretical account of privacy. Ethics Inf Technol 20, 233–247 (2018). https://doi.org/10.1007/s10676-018-9469-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10676-018-9469-1

Keywords

Navigation