Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Vol. 1, No. 2, Dec. 2021 https://doi.org/10.52885/pah.v1i2.52 Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy1 L ÁSZLÓ GERGELY SZÜC S Affiliation: Institute of Philosophy Research Centre for the Humanities Budapest, Hungary Email: szucslasz2020@gmail.com Abstract Examining the interpretations on the “U.S. observation case,” I am trying to answer the question of which contemporary theory may serve as the adequate context for telling the story of the birth of our right to privacy and the modern power structures endeavoring to oppress this right. Relying on the relevant literature, I have attempted to reconstruct two possible theories in light of the strength of the relationship between privacy and power: the paradigm rooted in the sociology of work; and one judicial approach based on human dignity. The analysis of the two privacy paradigms in contrast with each other highlights their advantages and disadvantages. I also attempt to outline normative points of view relevant when analyzing the relationship between power and privacy in the digital age. Keywords: privacy, digital communication, sociology of work , human dignit y, social philosophy The Approach of the Sociology of Work and the “Information Panopticon” My article aims to answer the question of how the normative basis of the individual’s right to privacy can be grasped in the present situation when it is endangered by new threats caused by new digital techniques. The article examines and reconstructs two aspects of this problem without formulating a coherent normative theory on the right to privacy. The first one is that of the perspective of organization sociology or sociology of work —reconstructed here based on William S. Brown’s and Shoshana Zuboff’s works—which tries to comprehend the characteristics of the new power structure that poses threats 1 My research was supported by the Felsőbbfokú Tanulmányok Intézete, Kőszeg (iASK). I am grateful to the co-workers of iASK who helped my work with relevant suggestions and to Györgyi Sárik, who helped me prepare the English version of my paper. László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 31 Vol. 1, No. 2, Dec. 2021 to the private sphere. The other one is the legal perspective holding up the concept of human dignity in the first place, which is reconstructed based on Avishai Margalit’s analyses and using David Alan Sklansky’s writings. The two different viewpoints thus reconstructed are then contrasted to each other. Although the article does not aim to reduce this visible tension, it argues that the description of this theoretical controversy can be useful when elaborating on the normative thinking on the private sphere. In the literature, organizational sociology and the sociology of work—the study of a power structure based on the control of the labor force, as well as work privacy—go back to a long tradition. William S. Brown (1996), a management researcher of the Massachusetts Babson College, thinks that the history of U.S. workplaces can be described as a process during which the power exercised by the employer is based less and less on the personal authority of the employer or the cooperation stipulated in personal agreements (p. 1238). It has been a well-established view in labor organization, at least from the early studies of Winslow Taylor, that “management” means the exercise of hegemony over the employees (and in many cases, over their lifestyles too). In his 1938 work, Chester Barnard described the control over people as a peculiar bilateral “cooperation.” According to this theory, as opposed to management disposing over the technical apparatus serving the control of lifestyles, there appears a labor force for which adjustment may mean the acceptance of impersonal relationships or even self-denial. Thus, the modern approach to management also requires a change in traditional “employees’ virtues”: conformity and compliance squeeze out creativity and the venturing spirit. In Brown’s opinion, the need for self-expression and free association demonstrated in the movements of 1968 did not lead to any radical changes in the power structures at work. In the seventies, certain changes took place in the composition of corporate management. For instance, there was a growth in the number and proportion of female managers. However, the hegemony of management was still based on the depersonalization of the employees, on coercing their adjustment and compliance. In Brown’s (1996) opinion, it was only from the 1990s that the spread of such a level of individualism could be experienced that shatters the acceptance of the general norms of self-abnegation from the part of the employees and the employers and which increases the legal concerns about “work privacy” (p. 1238). However, Brown has to acknowledge that in the same period, work organization based on the control of employees underwent significant technical development. He quotes three examples. On the one hand, the example of those companies which even control the communication of their employees. The most extreme example was that of the company László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 32 Vol. 1, No. 2, Dec. 2021 involved in Alaskan pipeline systems called Alyeska, the management of which checked the phone conversations and e -mail messages of one of the critics of the company by using an observation program, and installed interception equipment near his house. In another part of the text, he relies on the 1994 Fortune 200 research project, which showed that as many as 72% of the employees were subjected to medical examinations or physical tests by their employers in the period when the job offer was valid but the contract had not yet been signed. Brown draws the reader’s attention to “genetic pre-screening” of potential employees being a widespread practice in this period. The novelty of this situation is that the potential employee is often not hired because they cannot fulfill the requirements of the job—not due to their illness but because his employment may incur potential future financial sacrifice for the company, given the employee’s biological features (Brown, 1996, p. 1240). The third important example that Brown quotes is the case of the Citicorp company. It developed the first computerized system in the eighties, which aggregates how many minutes an employee spends talking on the phone, starting financial services, how much time they assign to a work process, and so forth. For each employee, the system generates an electronic social text that gives feedback to the employer on the performance of the individual in question, and on the individual characteristic features and habits cause the decrease in productivity (Brown, 1996, p. 1242). In Brown’s opinion, the history of modern U.S. corporations will become complete when management is not content with the direct control over the work activities anymore—in other words, when using modern technology, the control over personal relationships, private habits, physical and mental conditions, which potentially affect productivity and loyalty, becomes possible. New technologies are generally not built on the direct, personal monitoring of the employees. The employees are able to adjust to a large extent exactly because they are not aware of when they are observed and which activities will be included in the comprehensive reports written about them. This is why Brown accepts the line of thought of Shoshana Zuboff, who describes the development of an “information panopticon” built on total observation in the case of Western corporations (Zuboff, 1988). The Right to Privacy According to Brown, however, the development of the individual’s right to privacy is a process that is parallel to the building of the information panopticon. Brown (1996) does not venture to describe, from a historical and sociological aspect, the “in-depth cultural transformation”2 during which the individual in the modern sense has evolved, one who does 2 Hans Joas (2011) believes that it is only through the adequate historical and sociological László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 33 Vol. 1, No. 2, Dec. 2021 not feel free if they cannot sometimes withdraw from public spaces. He is more interested in is how the right to privacy has been shaped in theoretical thinking and how it appeared in the U.S. legal tradition. The first texts that discuss the right to privacy can be found in the analyses of the nature of tyranny by Plato, Aristotle, Cicero, Tacitus, and Justinian I. In the history of modern philosophy, he finds Locke, Rousseau, and Montesquieu the most influential thinkers who made “privacy” a subject of theoretical examination. These philosophers directly influenced American legal thinking through the Founding Fathers. Firstly, the works of John Adams, Jefferson, and Madison; and secondly, the debates on politics and constitutional law in the Federalist Papers that witness the enormous efforts taken for the redefinition of the philosophical teaching on inalienable rights in the egalitarian context of a democratic society (Brown, 1996, p. 1238). This could be the basis for the birth of the practical notion of freedom. According to this, the individual does not exercise their personal freedom in spheres independent of the central power—in the economy, civil society, or public debates—through the state. 3 While the previously mentioned modern thinkers—from Locke to the Founding Fathers— tried to define the essence of the right to private sphere on the level of theory, the private sphere itself went through great changes. Here it is worth mentioning Jürgen Habermas’ work The Structural Transformation of the Public Sphere. The author argues that the classical approach of modern natural law clearly distinguishes between the civil association of citizens and the sphere of public power. In this dualistic idea, the intimate sphere of families and that of the private economy appear structurally identical, both of them representing the sphere of private freedom. However, the end of the 19th century brought about considerable changes in this respect. On the one hand, a harsh dividing line appeared between private economy and family life. On the other hand, social movements made the “polarisation of private life” visible and shed light on the differences appearing in the way of life, quality of life, and “private sphere” of the members of society. Instead of the development of private autonomy, the movements of the end of the 19 th century fought for equal rights of participation and communication. Therefore, in this new era, the essence of private freedom needs to be redefined considering that political actors and members of the public sphere stop being identical with the independent actors of the private economy. Furthermore, they can refer to the sphere of the private economy and bourgeois family life as the conflict-free zone of private freedom to a smaller degree (Habermas, 1990, pp. 22–24). description of this transformation that one can understand better the normative consequences of individualization (p. 64). 3 See the description of the evolution of this ideal of freedom from the aspect of philosophy and social science in (Habermas, 1978, pp. 63–64). László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 34 Vol. 1, No. 2, Dec. 2021 The idea of the “right to privacy” took root first in the American legal tradition: its first explicit definition appeared as late as 1890. Justices Warren and Brandeis (1890) defined the “right to privacy” as a legitimate claim for “the right to be let alone,” by quoting important parts of the Bill of Rights (p. 193). However, they did not consider the right to privacy a fundamental constitutional right either; and they stressed that it was a derivative right. Brown thought that for the more complex definition of the “right to privacy,” it was, interestingly enough, the debates on humane and fair workplaces that took place in the 1970s and 1980s that were necessary—Brown refers to the works of Nickel, Ewing, and Werhane. In these debates, the “right to privacy” appeared as a legitimate claim for the central regulation and manipulation of all the activities of the individual. However, as opposed to the political-philosophical debates underlining the importance of public freedom, these debates suggested that in the program of the humanization of the institutions and society, the protection of the private individual, who is independent of public influence, has key importance. At any rate, the final outcome of the two “stories” that were outlined is interesting: if Brown’s diagnosis is right, then the most complex definition of the “right to privacy” had appeared exactly before the workplaces became modern panopticons in the eighties. This “coincidence,” at the same time, perhaps promises that the potential antidote for the attack against privacy can be found in the American legal culture. A Possible Diagnosis of an Era Shoshana Zuboff, whose work is an important point of reference for Brown, confutes the plausible view that the need for control based on observation arose alongside computerized work organization or with the advent of the internet. In Zuboff’s work, the problem of observation and control fits in a wide historical context, and the concept of “panopticon” assumes symbolic significance. As is widely known, the plan of a “panopticon” as a disciplinary institution was the idea of utilitarian philosopher Jeremy Bentham in the 18 th century, and it was originally meant for prisons. The point of this structure is that a guard observes the movements of the inmates from a guard tower in the center of a circleor star-shaped building in such a way that he is not visible to the convicts. In principle, the guard can observe everybody but he cannot control everyone at the same time. Since this observation is not mutual, the convicts are not aware of when they are observed, this is why they control their own behavior, so no direct violence is required for this coordination. In his book entitled Discipline and Punish, Michel Foucault (1991) described how the structure of the panopticon had become the example to be followed by modern surveillance systems, not only in prisons but also, in health care institutions, schools, and offices. Foucault also defined a more general thesis. In his view, the most László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 35 Vol. 1, No. 2, Dec. 2021 important tendency of modernization is that obedience is not coerced by those in power with threatening with torture or corporal punishment but rather, by manipulating people’s behavior, by “controlling the spirit and the souls.” In Zuboff’s case, the symbol of the panopticon gains significance in a much more general perspective of the history of civilization. She points out that, from the different mythologies to pieces of modern fantasy literature, the person or magical creature is an important figure in a wide range of literary and artistic works. This figure obtains superhuman powers by getting an insight into everybody’s lives, either due to their particular situation—such as the deity of the sky in ancient Mesopotamia or the inhabitants of the ancient Greek Mount Olympus—or some magic, for example, an object that makes one invisible, such as the ring in Tolkien’s novel. In this broader context, the panopticon is the experiment of the modern human to realize a dream of several millennia, that is, to gain the power provided by “knowing everything about everyone.” It is from this perspective that Zuboff reconsiders the findings of her research into organizational sociology and the sociology of work. In the period between 1978 and 1988, she followed the transformation of several companies and offices that increased their productivity by relying on information technology. She drew her conclusions in the form of identifying three rules: (1) at the organizations, all work processes that could be automated were in fact automated; (2) all information that could be transformed into digital information was in fact transformed into digital information; and (3) all technology that was suitable for observing and controlling the employees was in fact used for this purpose—irrespective of its original function. In all cases, the outcome was the transformation of the company or office into a per fectly functioning “smar t machine” (Zuboff, 1988, p. 390). The employees became well-functioning parts of this machinery because they felt that their activities were probably being observed—this was proven by Zuboff through her interviews. The managers were generally responsible for the assessment of the enormous amount of information that was generated during the work process. However, they were aware that in case of an upcoming issue, even the way that a certain work process was performed, be it even the most insignificant one, could be subsequently controlled by relying on information technology. This is why Zuboff thought that what she saw during the operation of these entities was the panopticon described by Foucault, that is, a system in which the employees’ activities and even their thinking were predictable. Thus, for the creation of the perfect panopticon, it was not the spatial position of the observer and the observed that had to be designed with engineering accuracy but design a system in which those who are observed László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 36 Vol. 1, No. 2, Dec. 2021 continuously generate detailed information about themselves retrievable at any time. In a broader context, this also means that to date, it is the creators and operators of the systems based on information technology that have come closest to realizing the mythological dream of humankind. They have gained total power by having become able to follow each moment of the others by becoming invisible (Zubof f, 2013). What significance does the NSA (US National Security Agency) spying scandal bear from this perspective? According to a plausible view, the explosive spreading of internet access and the use of desktop computers, laptops, smartphones and iPods were favorable for individualization in the positive sense of the word. We may think that interaction between individuals has become less determined by the traditional power lines and bureaucratic structures. Parallel to this, in order for an individual to obtain information or get access to goods, he does not have to rely on intermediaries or institutions anymore, as obtaining information and purchasing goods have become more direct and have adapted to the needs of the individual. From this angle, it is the merit of the large US American internet companies—first of all, Google, Yahoo, Facebook, Microsoft, Skype, Apple, and YouTube—that they recognized the value of the internet-using individual. Of course, these companies pursued their well-calculated business interests, while the platforms that they had built were still used to establish horizontal relations between the individuals. It is the consequence of this that it is considered that the NSA spying scandal means the unveiling of the historical crimes of the US administration—Zuboff identifies this with the standpoint taken by the author of The Facebook Effect, the “technology guru,” David Kirkpatrick. By launching its observation program called Prism in the interests of its particular political goals, not only did the US administration compromise giant corporations, which were forced to collaborate but also destroyed the old desire of power-free democratic communication once and for all. In Zuboff’s view, this narrative is already contradicted by the experience of internet users. Well before the observation incident, it could be experienced that the different products and brands were present on Facebook as “persons” and so, they were integrated into the users’ communities as constantly communicating “ friends.” Also, the users may have suspected for a long time that these companies had been given the oppor tunity to send them tailor-made adver tisements based on users’ profiles and search patterns. Zuboff refers to surveys that suggest that the confidence vested in the large internet companies was already shattered or collapsed long before 2013, as the consumers increasingly felt that only the devices by using which they László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 37 Vol. 1, No. 2, Dec. 2021 generated the contents belonged to them, and others disposed over the contents. According to an opinion poll conducted by the Harris Poll in 2012, only a mere 8 percent of US Americans trusted social media exactly because of this (The Harris Poll, 2012). The distrust of the Germans was even stronger in this period but in Brazil or Indonesia, where social media had spectacular success before, enthusiasm halted by 2012. Looking back, it seems like the giant internet corporations realized, as early as when they started their operations, that they possessed several billion items of such data, especially about the young generation. When used the data, the evolution of consumers’ or electors’ preferences could almost perfectly be calculated in advance, broken down to individuals. Following this recognition, these companies could have decided to base most of their revenues traditionally on services provided to the individual users, while they protect them and their connections organized on the network, as well as their manipulation -free communication from the influence of large companies. However, from the very outset, the larger part of their income has come from selling these data to the creators of the targeted advertisements and those who possessed the best technical apparatus to calculate behavior—in other words, for those who were the most financially interested in buying these data. Zuboff argues that these companies became the creators of “a new type of economic and social logics.” In this economic system, the benefits that come from the gathering of private data do not only supplement the profits of a capitalist entrepreneur. The new capitalist entrepreneur looks at the user not as a contractual partner, not even as a simple consumer but as a “source of raw material.” It is a novelty that the fundamental driver of this new type of economy is the mass of people who shed the information suitable for predicting their behavior in manipulated circumstances, without the chance to obtain meaningful information and without any legal regulation, free of charge and unwittingly. These logics presumably permeate the world of politics as well. This assumption of Zuboff may be interpreted in such a way that gaining the support of masses of people depends less and less on the traditional political merits like rhetoric skills, the ability to govern, or having a comprehensive vision. It much rather depends on exploring the so-far secret emotions of masses of individuals and on maintaining such segmented public. This way, the precalculated messages can be directly forwarded to electors’ groups separated from each other. For this reason, Zuboff, all in all, thinks that “panoptical power” did not remain within the frame of modern work organization but became a comprehensive society-shaping power by the 2010s. László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 38 Vol. 1, No. 2, Dec. 2021 However, I assume that Zuboff does not give a coherent answer to the question concerning the steps that may be taken to protect privacy in the societies organized based on this new logic. Zuboff thinks that, at the time of writing her article, American teenagers are turning from Facebook to other types of social media that give them more personal freedom. In her opinion, the consequence is that if users have the opportunity to find connections and information on the online platforms whose developers and owners are involved in data trading, these users will turn away from these social media and online search engines as known today. She draws attention to that the tech companies that handle huge data traffic still treat the masses of private individuals who are worried about what will happen to their data as a great risk. Therefore, there is still hope that the current internet users will transform into a potential democratic community that expects transparency from the next generation of IT companies, having drawn their conclusions from their bitter experience. However, in Zubof f ’s study, a much more complex picture of the contemporar y “panopticon” unfolds. On the one hand, it is clear that “information panopticons” are not only formed in the world of online communication. The areas of large cities are covered by camera surveillance systems, while facial and gesture recognition software programs are developing explosively. This suggests that the “owners of panoptic power” may even be familiar with such involuntary actions and utterances of ours that are generated offline, and of which we would never think that they may serve as the basis for forecasting behavior. The conscious avoidance of social media or well-known search engines may bring transitional success, but an “exodus” cannot be regarded as a universal strategy for stopping “panoptical power.” At the core of Zuboff’s interpretation stands that it is only one side of the story of the “information panopticon” that every human act and gesture believed to be spontaneous—even emotions that are considered private—become recordable in the form of accurate data. Therefore, the groups of society which have the technical apparatus to process data and the forecast behavior thus come to possess a new type of power. The other side of the story is the peculiar “evolution” of this power. This logic of power can only be maintained if the owners of this power use these technical devices to create the illusion of reconquering spontaneity and privacy amidst the rapidly changing circumstances. If this assumption is valid, then the mere requirement of spontaneous organization does not bring the panoptical power that permeates our lives to a halt. In general, it also poses problems in Zuboff’s works and utterances. What we can see is the image of a social actor who recognizes the legitimate boundaries of their László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 39 Vol. 1, No. 2, Dec. 2021 privacy absolutely naturally, who recognizes that this privacy constitutes a key element of their personal integrity, and who is able to identify the threats in the new situation as well. The idea, still emphatic in the thinking of Brown, for example, is pushed into the background—that one only stands a chance for the protection of their privacy if one takes serious intellectual efforts to re-interpret themselves as “private beings” in the historical-cultural circumstances of their age. If, for example, one always makes an attempt at re-interpreting the normative presumptions of “the right to privacy” in the legal discourse of the age in question. Critical Remarks on the Information-focused Approach Many authors do not think that we have “a priori” knowledge of where the boundaries of our privacy lie. Depending on culturally defined patterns and the context of discourses, we all define the private and public boundaries of our privacy in different ways. The most typical examples are: privacy is sometimes linked to the need to control one’s own body and self-determination that should become independent even from the influence of the closest relatives. At other times, it means the very family, the possibility of becoming free in intimate, loving relationships, which deserve to be protected from the alienating tendencies of the workplace, the market, or the bureaucratic state apparatus.4 The private sphere understood as the “home,” describes these intimate relationships (Sklansky, 2014, p. 1109). Sometimes, however, the metaphors “fort” or “castle” are associated with it, which are, in this case, grasped as a sphere where the individual may exercise tyrannical power over their immediate environment, freed from the judgment of others (Margalit, 2001, pp. 259–260). Privacy is considered in terms of the intrusion of others. If a participant at a discourse considers the unauthorized intrusion of another private individual the greatest threat to privacy, they will refer to it using visual metaphors, for example, “peeping.” If, however, private freedom means legitimate opposition to a political conspiracy, one tends to describe unauthorized invasion by using the analogy of “interception” (Margalit, 2001, p. 257). Adam D. Moore thinks that unauthorized invasion of one’s privacy can best be identified from the perspective of the classical bourgeois committed to the sanctity of ownership. However, he also calls the reader’s attention to that one cannot appropriately interpret all the phenomena of misusing confidential information from this perspective, which means that private freedom also has to be defined from an information theory point 4 Interestingly, Axel Honneth (2011) describes this as a form of social freedom, sharply distinguishing it from private freedom which is described as a retreat to “defense,” becoming free from communicative relations (p. 149). László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 40 Vol. 1, No. 2, Dec. 2021 of view (Moore, 1998, pp. 371–374).5 Margalit (2001) thinks that the protection of privacy appears in the US constitutional tradition with two different meanings: it sometimes appears as the constituent of the human nature of an individual, while at other times, it deserves protection as the guarantee for a “flourishing life” (p. 256). Sometimes it is referred to as a human right, where the individual is protected from encroachments by the state; at other times, as a civil right, it is the right of an active citizen to formulate an independent opinion. We can best understand our individual right to privacy if we consider the plural meaning correlations of this privacy. Professor of Law at Stanford University David Alan Sklansky, however, concluded, after having analyzed the legal, public, and academic disputes of recent years that, by now, the “information focused interpretation” of privacy had squeezed out the other traditional interpretations. Sklansky acknowledges that in the US Constitutional Court decisions, the protection of privacy has traditionally meant the disposal over one’s own body and the protection of intimate autonomy. From the 1970s, however, a new tendency appeared: the decisions on the disposal over one’s body or same-sex marriages were increasingly dominated by the traditional concepts of freedom and equality; thus, the ideals of intimate autonomy and privacy were gradually separated from each other. As a result, the right to privacy to obtain a new and more accurate definition in Constitutional Court disputes has increased. This is why Alan Westin’s proposal has found fertile ground, according to which the expression “protection of privacy” should exclusively be used for those cases when the individual rightfully restricts the spread of information about them (Sklansky, 2014, p. 1093). It was also typical earlier that when the court referred to the “protection of privacy,” this usually meant, very hazily, family matters and relationships with friends. This brought about a very special counterreaction in the leftist public law discourses: many supporters of the critical theory thought that the division of private and public spheres was a fake dichotomy, which concealed that an individual may gain their freedom in social activism. Leftist theoreticians also discovered the “citoyen” merits and increasingly tended to think that it was mostly those who mentioned the intactness of privacy who wished to cover up for the typical cases of oppression in the family. The information-focused approach to privacy—which means that privacy has no fundamental value, only obtains its value from the individual interest calculations—was acceptable from this viewpoint as well (Sklansky, 2014, p. 1093). It was a major scientific discovery of the second half of the twentieth century that, once one interprets the world as a large, impulsive data flow, one may obtain new methodological 5 It is a curious example of the information theory approach that gives the misuse of health care data as an example (Introna-Pouloudi, 1999, pp. 28–30). László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 41 Vol. 1, No. 2, Dec. 2021 instruments for the quantitative analysis of the individual details of reality. After this discovery, information theory had become such an inevitable point of reference for social sciences as Newton’s classical mechanics or Darwinism used to be in the past. The economy also adjusted to the possibilities provided by information technology, and the attention of legal scholars increasingly shifted towards the rules allowing the flow of information. This is how the approach according to which private freedom means the control of personal information also took root in academic discourse (Sklansky, 2014, p. 1094). Sklansky assumes that our views on the protection of privacy are still determined by our experience gained in the Cold War. He thinks that the socialization of Eastern Bloc intellectuals was fundamentally determined by the experience that every moment of their lives may be observed and in order to avoid unpleasant or even fatal conse quences, they had to adjust their actions to the requirements of the single-party state. The vivid descriptions of this experience were substantial sources of understanding the organization of society based on intimidation for the researchers who lived on the other side of the Iron Curtain. In this context, Orwell’s novel Nineteen Eighty-Four was read not only as a piece of fiction of critical importance but also as a guide to understanding the anomalies of modernity. It was at this time that Foucault’s idea, also accepted by Zuboff, became influential. According to it, modern power was organized not by applying direct force but by coercing control and conformity (Sklansky, 2014, pp. 1097–1098). In this period, the question frequently discussed was how the atmosphere of fear could serve as the basis for building up a power structure. It was less important to answer the obvious question of whether continuous observation, the trickling down of agents into everyday life, or the potential sanctions—ranging from losing one’s job to imprisonment and execution—create the atmosphere of fear and coerce cooperation. However, this question remained unanswered even after the Iron Curtain had come down. In this new situation, the apparatus of observation was much more refined—it did not require the presence of agents—and the gathering of data was typically not subjected to the needs of a central power that also applied the means of humiliation. In the new situation, the assumption lived on unreflected, namely, that the mere collection of information or the regular control of habits in itself hinders the development of the individual and independent thinking (Fried, 1968, p. 490), as well as democratic activity (Solove, 2002, p. 1102). Sklansky (2014) calls this idea the “stultification thesis” (p. 1094). Thus, it is an critical question in what circumstances observation coerces conformity. However, in Sklansky’s opinion, the number of empirical studies in which the validity of this assumption is tested is negligible. On the other hand, the empirical research efforts László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 42 Vol. 1, No. 2, Dec. 2021 on this subject frequently weaken the thesis; their findings often contradict each other. For instance, some theoreticians think that audio recording weakens the sincerity of the suspects during interrogation. However, according to the empirical study conducted by Sklansky (2002), the suspects tend to forget about the presence of the audio recording devices (pp. 1263–1264). Researchers at Harvard University found that using a tracking device made some of the inmates expressly nervous and disturbed; however, most of those who wore these ankle monitors were not bothered by this anymore than by wearing a wristwatch (Sklansky, 2014, p. 1095). Data show that the NSA spying scandal in 2013, which unveiled the collaboration between internet companies and the secret services, did not fundamentally change the patterns of using social media. Thus, it may easily be the case that the users become immune to certain forms of monitoring and share private information about themselves without being forced (Sklansky, 2014, p. 1099). Having these examples in mind, Sklansky thinks that the hypothesis on the harmful effects of observation is relevant even these days. However, it is a problem that the testing of this assumption is not the subject of any significant research programs but is present in academic and public discourse with axiomatic validity, without the shadow of a doubt. Sklansky is primarily interested in the impact of these tendencies as a lawyer. He focuses on particular cases of invasion of privacy: when the representatives of an institution, such as a prison or a school, apply the method of strip-searches. These cases, which concern the Fourth Amendment to the United States Constitution, bring up several questions in the judicial procedure. During such a procedure, it should be thoroughly examined whether the person performing the strip search has violated the self-determination of the individual in question or not, and if so, whether the search was done legitimately or not. It should be found out whether the person conducting the strip search was entitled to do so as they represented the government or an institution with special procedures in the case under review. If there was a violation, was it the institution that misunderstood its authorization, or was it the private individual conducting the strip search who misused their momentary power, following their own (racist) prejudices? We could see that the currently dominant discourses fundamentally interpret privacy as the control over personal information and in the context of the relationship between the state and the citizen due to historical reasons. In this respect, Sklansky critically remarks, we do not have the right concepts for sensitively analyzing such cases where the private individuals who have been given power hurt someone as a human by invading their intimacy. Sklansky (2014) thinks that this is why the expression “assault on privacy” should be applied for the particular cases of violating human dignity (p. 1106). László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 43 Vol. 1, No. 2, Dec. 2021 Of course, a society in which all our data are “a part of an enormous information flow,” and in which we can have no control whatsoever over the spread of information about us, is not even acceptable for Sklansky (2014), who criticizes the information theory approach to privacy (p. 1102). However, at first sight, the human-dignity-focused idea of privacy offered by him seems to be rather narrow for distinguishing between the legitimate and illegitimate forms of information gathering and storage. However, what is certain is that if one identifies the paradigmatic cases of assaults on privacy with the painful experience of invading intimacy, the focus of criticism will change as compared to what we have seen in the works of Brown and Zuboff. On the one hand, we may say that the procedures of monitoring online communication should be subjected to broad empirical examinations to find out in which specific cases they lead to shattering of confidentiality between people. However, neither the range of observation nor the level of sophistication of the technical apparatus in itself reveals the extent to which power invades citizens’ privacy. On the other hand, those cases should be subjected to analysis where the state, or a company or an institution, uses information gathering for generating a continuous feeling of shame in the observed subjects during the process of observation. However, we can definitely not identify the cases of efficiently exercising power and misusing power if we identify the presence of the apparatus of information gathering as the gaining ground of a pervasive mysterious power from the very start. Sklansky thinks that one can best identify the many kinds of threats to privacy from the perspective of a person who has suffered humiliations and shame in their lives. He is right in thinking that the cases of invading intimacy may explain that private autonomy obtains its fundamental value as an inalienable part of personal integrity. If, however, one contrasts Sklansky’s line of thought with the earlier analyzed work and organizational sociology theory, then the limits of his theory can also be identified. Through analyzing modern management, Brown and Zuboff have pointed out such forms of exercising power that does not take place by traditional means such as communicative coordination, convincing, or open violence. Their study shows that by relying on modern technology, an increasingly complex picture of the users or citizens can be built: private decisions can be manipulated in such a way that the individuals are less and less aware of such manipulation. Thus, the privacy of an individual may also be violated in such a way that it is not directly linked to the painful experience of the violation of personal integrity. Thus, it seems like the legal or social philosophy perspective, which is sensitive to the viewpoint of human dignity, is only one perspective from which one can assess the threats to one’s privacy. László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 44 Vol. 1, No. 2, Dec. 2021 Based on work sociology research concerning the private sphere and literature on human dignity, the article outlined the two different normative concepts of the right to the private sphere that contribute to the relevant interpretation of the surveillance case in 2013. If outlined, the two approaches appear not to have any common ground that could be the basis of a comprehensive theory of the right to the private sphere. Contrasting the two different approaches, however, can raise relevant questions. Regarding the approach that argues for human dignity, the article raises the question of whether impersonal cases of surveillance that do not imply repression or cause fear can also be considered unlawful or pathological. However, the article also draws attention to the fact that the transformation of the logic of power and the enormous structural changes endangering the privacy of masses cannot be interpreted from the perspective of legal or social philosophy but rather from the one offered by organizational sociology and sociology of work. References Barnard, C. I. (1938). The functions of the executive. Harvard University Press. Brown, W. S. (1996). Technology, workplace privacy and personhood. Journal of Business Ethics, 15(11), 1237–1248. https://doi.org/10.1007/BF00412822 Foucault, M. (1991). Discipline and punish. The birth of the prison. Penguin Books. Fried, Ch. (1968). Privacy. The Yale Law Journal. 77(3) https://digitalcommons.law.yale. edu/ylj/vol77/iss3/3 Habermas, J. (1990). Strukturwandel der Öffentlichkeit: Untersuchungen zu einer Kategorie der bürgerlichen Gesellschaft [The structural transformation of the public sphere]. Suhrkamp. Habermas, J. (1978). Theorie und Praxis—Sozialphilosophische Studien [Theory and practice—Studies in social philosophy]. Suhrkamp. Honneth, A. (2011). Das Recht der Freiheit: Grundriß einer demokratischen Sittlichkeit [Freedom’s right: The social foundations of democratic life]. Suhrkamp. Introna, L. D., & Pouloudi, A. (1999). Privacy in the information age: Stakeholders, interests and values, Journal of Business Ethics, 22(1), 27–38. Ethics of Information and Communication Technology, Oct., 1999. https://doi.org/10.1023/A:1006151900807 Joas, H. (2011). Die Sakralität der Person. Eine neue Genealogie der Menschenrechte [The sacredness of the person: A new geneology of human rights]. Suhrkamp. Johnson, D. (1994). Computer ethics. Prentice-Hall. Margalit, A. (2001). Privacy in the decent society. Social Research, 68(1), 255–268. https://www.jstor.org/stable/40971450 Moore, A. D. (1998). Intangible property: Privacy, power, and information control. American Philosophical Quarterly, 35(4), 365–378. http://faculty.washington.edu/moore2/IPPPC.pdf Sklansky, D. A. (2014). Too much information: How not to think about privacy and the Fourth Amendment. California Law Review, 102(5), 1069–1121. https://doi. org/10.15779/Z38TJ93 Solove, D. J. (2002). Digital dossiers and the dissipation of Fourth Amendment privacy. S. Cal. L. Rev., 75(5), 1083–1167. https://scholarship.law.gwu.edu/cgi/viewcontent. cgi?article=2096&context=faculty_publications László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 45 Vol. 1, No. 2, Dec. 2021 The Harris Poll (2012). Oil, pharmaceutical, health insurance, tobacco, banking and utilities top the list of industries that people would like to see more regulated. The Harris Poll. https://theharrispoll.com/new-york-n-y-december-18-2012-an-annual-harris-pollthat-measures-the-percentage-of-americans-perceiving-19-large-industries-asgenerally-honest-and-trustworthy-finds-that-the-most-trusted-ind/ Warren, S. D., & Brandeis L. D. (1890). The right to privacy. Harvard Law Review 4(5), 193–220. https://doi.org/10.2307/1321160 Zuboff, Sh. (1988). In the age of the smart machine: The future of work and power. Basic Books. Zuboff, Sh. (2013, June 25). “Seid Sand im Getriebe!—Widerstand gegen Datenschnüffelei” [The surveillance paradigm: Be the friction—our response to the new lords of the ring]. https://www.faz.net/aktuell/feuilleton/debatten/widerstand-gegen-datenschnueffelei-seid-sand-im-getriebe-12241589.html László Gergely SZÜCS. Private Sphere in the Age of Digital Communication: Some Normative Aspects of Our Right to Privacy 46