Show Less
Restricted access

Privacy and Philosophy

New Media and Affective Protocol

Series:

Andrew McStay

What can philosophy tell us about privacy? Quite a lot as it turns out. With Privacy and Philosophy: New Media and Affective Protocol Andrew McStay draws on an array of philosophers to offer a refreshingly novel approach to privacy matters. Against the backdrop and scrutiny of Arendt, Aristotle, Bentham, Brentano, Deleuze, Engels, Heidegger, Hume, Husserl, James, Kant, Latour, Locke, Marx, Mill, Plato, Rorty, Ryle, Sartre, Skinner, Spinoza, Whitehead and Wittgenstein, among others, McStay advances a wealth of new ideas and terminology, from affective breaches to zombie media. Theorizing privacy as an affective principle of interaction between human and non-human actors, McStay progresses to make unique arguments on transparency, the publicness of subjectivity, our contemporary techno-social condition and the nature of empathic media in an age of intentional machines.
Reconstructing our most basic assumptions about privacy, this book is a must-read for theoreticians, empirical analysts, students, those contributing to policy and anyone interested in the steering philosophical ideas that inform their own orientation and thinking about privacy.
Show Summary Details
Restricted access

Appendix: An A to Z of privacy: New theories and terminology

← 162 | 163 → APPENDIX

Extract

•   A-historical data mining: the capacity for equal recall to either recent or older behavioral traces.

•   Affective breach: that visceral sense of discord that occurs when undergoing a privacy event and when privacy protocol has been contravened.

•   Body-doubles: an inversion of ‘data-double’ that is less interested in our mediated self than the impact of mediated behavioral traces on our corporeal self.

•   Border-based privacy: a foundational binary principle of privacy (i.e., in/out). While easily criticized it continues to permeate discourse on privacy.

•   Co-evolving authorship: the ways in which by means of interaction with machines we collaboratively publish our own heterogeneous media content.

You are not authenticated to view the full text of this chapter or article.

This site requires a subscription or purchase to access the full text of books or journals.

Do you have any questions? Contact us.

Or login to access all content.