Show Less
Restricted access

Privacy and Philosophy

New Media and Affective Protocol


Andrew McStay

What can philosophy tell us about privacy? Quite a lot as it turns out. With Privacy and Philosophy: New Media and Affective Protocol Andrew McStay draws on an array of philosophers to offer a refreshingly novel approach to privacy matters. Against the backdrop and scrutiny of Arendt, Aristotle, Bentham, Brentano, Deleuze, Engels, Heidegger, Hume, Husserl, James, Kant, Latour, Locke, Marx, Mill, Plato, Rorty, Ryle, Sartre, Skinner, Spinoza, Whitehead and Wittgenstein, among others, McStay advances a wealth of new ideas and terminology, from affective breaches to zombie media. Theorizing privacy as an affective principle of interaction between human and non-human actors, McStay progresses to make unique arguments on transparency, the publicness of subjectivity, our contemporary techno-social condition and the nature of empathic media in an age of intentional machines.
Reconstructing our most basic assumptions about privacy, this book is a must-read for theoreticians, empirical analysts, students, those contributing to policy and anyone interested in the steering philosophical ideas that inform their own orientation and thinking about privacy.
Show Summary Details
Restricted access

Advance Praise for Privacy and Philosophy



“Contemporary privacy issues tend to be discussed in legal, policy or sociological terms. McStay adds a welcome philosophical context to this discussion. Impressively erudite, Privacy and Philosophy takes the reader on a trans-century tour that enlarges our understanding of the idea and its implications.”

—Joseph Turow, The Annenberg School for Communication

“More than at any other time in recent history we are confronted with the pressing questions and contradictions raised by the notion of privacy—and McStay’s brilliantly illuminating philosophical tour of the concept provides thoughtful and original answers that will serve as touchstones for discussions of privacy in the era of Facebook, NSA data mining and beyond.”

—Mark Andrejevic, The University of Queensland

You are not authenticated to view the full text of this chapter or article.

This site requires a subscription or purchase to access the full text of books or journals.

Do you have any questions? Contact us.

Or login to access all content.