Skip to main content

Advertisement

Log in

The Changing Meaning of Privacy, Identity and Contemporary Feminist Philosophy

  • Published:
Minds and Machines Aims and scope Submit manuscript

Abstract

This paper draws upon contemporary feminist philosophy in order to consider the changing meaning of privacy and its relationship to identity, both online and offline. For example, privacy is now viewed by European Court of Human Rights (ECtHR) as a right, which when breached can harm us by undermining our ability to maintain social relations. I briefly outline the meaning of privacy in common law and under the European Convention on Human Rights (ECHR) in order to show the relevance of contemporary feminist thought, in particular the image of selfhood that stresses its relationality. I argue that the meaning of privacy is in the process of altering as a result of a number of contingent factors including both changes in technology, particularly computer mediated communication (CMC), and changes in the status of women. This latter point can be illustrated by the feminist critique of the traditional reluctance of the liberal state to interfere with violence and injustice within the “privacy” of the home. In asking the question: “how is the meaning of “privacy” changing?” I consider not only contemporary legal case law but also Thomas Nagel’s influential philosophical analysis of privacy. Nagel’s position is useful because of the detail with which he outlines what privacy used to mean, whilst bemoaning its passing. I agree with his view that its meaning is changing but am critical of his perspective. In particular, I challenge his claim regarding the traditional “neutrality of language” and consider it in the context of online identity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. Online selves could now be added to this list as there is no reason to assume that these are any less “me” than my bank account. I will discuss online identity below.

  2. For a useful examination of Eastern approaches to the self in the context of privacy see Hongladarom (2009).

  3. For a discussion of different concepts of self within the social contract tradition see Richardson (2009).

  4. For a critique of this market-orientated approach to privacy see Floridi (2006, 115–116). For a broader critique of the political implications of this view of ourselves as owners of “property in the person” such that aspects of ourselves are treated as commodities in a market see Marx (2004, 280), Pateman (2002), Cohen (1995).

  5. Argyll v Argyll [1967] 1 Ch. 302.

  6. Giller v Procopets [2008] VSCA 236. Depending on the jurisdiction, the civil courts (compared with criminal) allow the woman, if she can fund it, to get to court quickly for an injunction, keeping greater control of proceedings, to join a internet provider in the same proceedings to expedite the removal of the image and to go for damages. The burden of proof is on the balance of probabilities so it is also easier to prove fault.

  7. Wainwright v Home Office [2002] Q.B. 1334. Note ECtHR disapproval of the UK failure to provide a remedy to this unlawful strip search in breach of prison rules, prior to the enactment of HRA, in Wainwright v UK (2006) 156 N.L.J. 1524.

  8. The House of Lords had already moved in this direction in the pre-HRA case Attorney General v Guardian Newspapers (No 2) [1990] 1 AC 109 “Spycatcher Case”. There was no relationship between the defendant newspaper and the claimant but the information concerned official secrets. For the House of Lords, this was sufficient to grant an injunction initially (until the information was too widely available to be viewed as confidential).

  9. Campbell v Mirror Group Newspapers [2004] 2 AC 457.

  10. Max Mosley v News Group Newspapers [2008] EWHC 1777.

  11. Author of a Blog v Times Newspapers Ltd [2009] EWHC 1358 (QB).

  12. Sheffield Wednesday Football Club Ltd v Hargreaves [2007] EWHC 2375 (QB).

  13. Peckv- UK [2003] EMLR 15.

  14. Doe v Australian Broadcasting Corporation & Ors [2007] VCC 281.

  15. For a discussion of the way in which “fractured identity is core to Lacanian psychoanalysis” see, for example Elliott and Frosh (1995, 238).

  16. There may be some exceptional cases of multiple personality, which are interestingly explored by Daniel Dennett and Ian Hacking (Dennett and Humphrey 1989; Hacking 1991, 1992, 1994, 1995) but they are not the subject of discussion here.

  17. Foucault (1990) famously argues that “we other Victorians” have not kept quiet about sex and that our discourse around it is productive of “who we are”. However, his analysis of the confessional and “psy professions”, does not undermine Nagel’s sketch of manners and conception of privacy, which affords insight into a way of life that is being lost.

References

  • Battersby, C. (1998). The phenomenal woman: Feminist metaphysics and the patterns of identity. London: Routledge.

    Google Scholar 

  • Baym, N. (2010). Personal connections in the digital age. Polity Press.

  • Berlin, I. (1969). Four essays on liberty. Oxford Paperbacks.

  • Bromseth, J., & Sundén, J. (2010). Queering internet studies: Intersections of gender and sexuality. In R. Burnett, M. Consalvo, & C. Ess (Eds.), The handbook of internet studies. Handbooks in communication and media. London: Wiley.

  • Cocking, D. (2008). Plural selves and relational identity: Intimacy and privacy online. In Information technology and moral philosophy (1st ed., pp. 123–141). Cambridge: Cambridge University Press.

  • Cohen, G. A. (1995). Self-ownership, freedom, and equality. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Constant, B. (1988). Political writings. In B. Fontana (Ed.), Cambridge: Cambridge University Press.

  • Cornell, D. (1995). The imaginary domain: Abortion, pornography & sexual harassment. London: Routledge.

    Google Scholar 

  • Damasio, A. (2010). Self comes to mind: Constructing the conscious brain: The evolution of consciousness. William Heinemann.

  • Dennett, D. C., & Humphrey, N. (1989). Speaking for ourselves: An assessment of multiple personality disorder. In Brainchildren (pp. 31–58). London: Penguin.

  • Donath, J. S. (1998). Identity and deception in the virtual community. In P. Kollock & M. Smith (Eds.), Communities in cyberspace (1st ed., pp. 29–59). Routledge.

  • Elliott, A., & Frosh, S. (1995). Psychoanalysis in contexts: Paths between theory and modern culture (1st ed.). Routledge.

  • Floridi, L. (2006). Four challenges for a theory of informational privacy. Ethics and Information Technology, 8, 109–119.

    Article  Google Scholar 

  • Foucault, M. (1990). The history of sexuality: An introduction (R. Hurley, Trans.). London: Vintage.

  • Fricker, M. (2007). Epistemic injustice: Power and the ethics of knowing. Oxford: Oxford University Press.

    Book  Google Scholar 

  • Fried, C. (1984). Privacy [a moral analysis]. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy an anthology (pp. 203–222). Cambridge: Cambridge University Press.

    Chapter  Google Scholar 

  • Gatens, M. (1995). Imaginary bodies ethics, power and corporeality. London: Routledge.

    Google Scholar 

  • Griffith, J. A. G. (2010). Politics of the judiciary (5th ed.) (Reissue). Fontana Press.

  • Hacking, I. (1991). Two souls in one body. Critical Inquiry, 17(4):838–867. doi:http://www.jstor.org/stable/1343746.

  • Hacking, I. (1992). Multiple personality disorder and its hosts. History of the Human Sciences, 5(2), 3–31. doi:10.1177/095269519200500202.

    Article  Google Scholar 

  • Hacking, I. (1994). Memoro-politics, trauma and the soul. History of the Human Sciences, 7(2), 29–52. doi:10.1177/095269519400700203.

    Article  Google Scholar 

  • Hacking, I. (1995). Rewriting the soul: Multiple personality and the sciences of memory. Princeton, NJ: Princeton University Press.

    Google Scholar 

  • Hampton, J. (2007). The intrinsic worth of persons: Contractarianism in moral and political philosophy. In D. Farnham (Ed.). Cambridge: Cambridge University Press.

  • Hobbes, T. (1994). Leviathan: with selected variants from the latin edition of 1668. In E. Curley (Ed.). Cambridge: Hackett.

  • Hongladarom, S. (2009). Privacy, the individual and genetic information: A buddhist perspective. Bioethics, 23(7), 403–412.

    Article  Google Scholar 

  • James, W. (1957). The principles of psychology, Vol. 1 (New edition). Dover Publications Inc.

  • James, H. (2009). The golden bowl (Reprint). Penguin Classics.

  • Kant, I. (2006). Anthropology from a pragmatic point of view. In M. Kuehn & R. Louden (Eds.). Cambridge University Press.

  • Kennedy, H. (1992). Eve was framed women and British justice. London: Chatto & Windus.

    Google Scholar 

  • Marx, K. (2004). Capital: Critique of political economy, Vol. 1 (New Ed.). Penguin Classics.

  • Menchik, D. A., & Tian, X. (2008). Putting social context into text: The semiotics of e‐mail interaction. The American Journal of Sociology, 114(2), 332–370.

    Article  Google Scholar 

  • Mill, J. S. (2008). On liberty and other essays. In J. Gray (Ed.). Oxford: Oxford Paperbacks.

  • Nagel, T. (1998). Concealment and exposure. Philosophy & Public Affairs, 27(1), 3–30.

    Article  Google Scholar 

  • Nussbaum, M. (2002). Rawls and feminism. In The Cambridge companion to rawls (pp. 488–499). Cambridge: Cambridge University Press.

  • Okin, S. M. (1989). Justice, gender, and the family. New York: Basic Books.

    Google Scholar 

  • Pateman, C. (2002). Self-ownership and property in the person: Democratization and a tale of two concepts. The Journal of Political Philosophy, 10(1), 20–53. doi:10.1111/1467-9760.00141.

    Article  Google Scholar 

  • Ramirez, A., et al. (2002). Information-seeking strategies, uncertainty and computer mediated communication: Towards a conceptual model. Human Communication Research, 28(2), 213–228.

    Google Scholar 

  • Rawls, J. (1971). A theory of justice (1st ed.). Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Richardson, J. (2009). The classic social contractarians. London: Ashgate Publishing.

    Google Scholar 

  • Rousseau, J.-J. (1987). La Nouvelle Heloise: Julie, or the New Eloise: Letters of two lovers, inhabitants of a small town at the foot of the Alps (J. H. McDowell, Trans.). Abridged. University Park, PA: Pennsylvania State University Press.

  • Slater, D. (2002). Social relationships and identity online and offline. In Handbook of new media: social shaping and consequences of ICTs (pp. 533–546). Sage Publications Ltd.

  • Sproull, L., & Kiesler, S. (1986). Reducing social context cues: Electronic mail in organizational communication. Management Science, 32(11), 1492–1512.

    Article  Google Scholar 

  • Sveningsson-Elm, M. (2008). How do notions of privacy influence research choices? In Internet inquiry: Conversations about method. Sage Publications, Inc.

  • Tavani, H. T. (2007). Philosophical theories of privacy: Imprications for an adequate online privacy policy. Metaphilosophy, 38(1), 1–22. doi:10.1111/j.1467-9973.2006.00474.x.

    Article  Google Scholar 

  • Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193–220.

    Google Scholar 

  • Whittle, S. (1998). The trans-Cyberian mail way. Social & Legal Studies, 7(3), 389–408. doi:10.1177/096466399800700304.

    Article  MathSciNet  Google Scholar 

  • Woolf, V. (2002). A Room of One’s Own (New Ed.). Penguin Classics.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Janice Richardson.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Richardson, J. The Changing Meaning of Privacy, Identity and Contemporary Feminist Philosophy. Minds & Machines 21, 517–532 (2011). https://doi.org/10.1007/s11023-011-9257-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11023-011-9257-8

Keywords

Navigation