The Ethics of Privacy and Surveillance in The Digital Age
The Ethics of Privacy and Surveillance in The Digital Age
The Ethics of Privacy and Surveillance in The Digital Age
ABSTRACT
This research investigates the ethics of privacy and surveillance in the digital
age, utilizing a quantitative research design to systematically examine the
ethical dimensions of privacy infringements and surveillance practices. The
study population consists of ICT and cyber security experts working in the
Economic and Financial Crimes Commission (EFCC) branch in Akwa Ibom
State, who possess specialized knowledge in information and communication
technology and are directly involved in addressing privacy and surveillance
issues. The sample size of 141 respondents is determined using the Fisher's et al.
(1998) formula, considering a 95% confidence level and an absolute precision
of 0.05. A close-ended questionnaire is utilized as the research instrument,
designed to measure the ethical perspectives, attitudes, and experiences of the
participants regarding privacy and surveillance in the digital age. Data
collection is conducted by a team of research assistants who distribute and
collect the completed questionnaires from the participants. The collected data
is analyzed using descriptive statistics in the Statistical Package for the Social
Sciences (SPSS) software, calculating percentages and frequencies. The
findings of the study highlight privacy as the most crucial ethical
consideration, followed by informed consent and data security. Loss of trust
emerged as the most significant impact of privacy infringements, with
psychological consequences and reputation damage also recognized. The
recommended mitigation strategies include data encryption, access control,
anonymization, privacy policies, and user education. Based on these findings,
it is recommended that organizations and policymakers strengthen data
protection measures, enhance privacy policies and transparency, promote
privacy education and awareness, advocate for ethical guidelines and
regulations, and encourage ethical data practices.
1
CHAPTER ONE
INTRODUCTION
In the digital age, the rapid advancement of technology and the widespread
use of the internet have given rise to complex ethical issues surrounding
have revealed that these platforms often engage in social media surveillance,
2
surveillance and raised concerns about the erosion of privacy rights
(MacAskill et al., 2013). These disclosures created public awareness and led
Klein, 2019). The ubiquity of social media platforms and the practice of social
ethics in the digital age. Social media surveillance refers to the process where
and punish rule violations (Fuchs, 2013). Such extensive monitoring raises
both state and non-state actors, has significantly contributed to the ethical
3
challenges surrounding privacy and surveillance (Hayes, 2012). The
in the case of China, has raised concerns about human rights violations and
the storage of massive amounts of personal data (Zuboff, 2015; Zuboff and
The collection of personal data by state and non-state actors has also raised
often monitor the online presence and behaviors of their employees outside
are not limited to individuals but also extend to society as a whole. The post-
9/11 era has witnessed the emergence of a surveillance society, with political,
4
economic, and socio-technical responses shaping surveillance practices
(Genosko and Thompson, 2006; Galic, Timan, and Koops, 2016). The
increased collection and analysis of personal data have given rise to concerns
about the erosion of privacy rights and the potential for abuse of surveillance
the ethical dimensions of privacy and surveillance in the digital age. This
5
safeguard that information. The ethical dilemmas arising from the
The rapid advancement of technology and the widespread use of the internet
6
This research aims to address the ethical implications of privacy
To address the research problem, this study seeks to answer the following
research questions:
4. What are the potential solutions and ethical frameworks for balancing
7
The main objectives of this study are as follows:
age.
legitimate needs for surveillance in areas such as national security and public
8
organizations, and policymakers in making ethical choices and informed
research. The findings will hopefully provide a foundational base for future
research.
This study focuses on the ethics of privacy and surveillance in the digital
including the collection and use of personal data, the impact on individuals
and society, and the ethical responsibilities and challenges faced by different
actors.
9
CHAPTER TWO
LITERATURE REVIEW
through electronic contact (Lyon, 2015). This is due to the United States'
access to nearly all fiber optic cables worldwide, including those passing
through the United Kingdom (Timberg and Nakashima, 2013). The Internet
10
communicate with one another. Social media platforms like Facebook,
Mathieson and Leafman, 2014; Mick and Middlebrook, 2015; LSI, 2016).
Some researchers argue that social media companies themselves are not the
groups by an entity to further its goals through the exertion of control based
(Black, 2001).
11
Lyon (1999, p7 cited in Wilson, 2012) argues that military surveillance serves
cited in Wilson, 2012). When considering how the modern Nigerian state
authorities engage in the war against terrorism (Oyewole, 2015; Falode, 2016)
12
labour market, medical and legal institutions and in terms of
entertainment and communications. Nevertheless, the relationship
between military and civilian surveillance remains dialectical, with
civilian innovations increasingly being investigated for potential
military application.
Recent studies have revealed that virtual institutions sell user data to
security, technology, and social justice (Zuboff and Klein, 2019). The
13
The advent of blogs and social networking sites like Facebook, Twitter,
Instagram, and Snapchat has given rise to social media surveillance (Fuchs,
behavioral discipline and punish rule violations. Fuchs (2013) defines social
through social media, which may lead to a society that is dictatorial in both
2014; Biddle, 2018; 2019). Fuchs and Dyer-Witheford (2013) advocate for
movements and civil society in this resistance. Privacy International and the
14
The Electronic Frontier Foundation dedicates a section of its website to
9/11 era witnessed the realization of a surveillance society and the growth of
(Galic, Timan, and Koops, 2016). Post-9/11 political, economic, and socio-
(Genosko and Thompson, 2006). The collection of personal data by state and
non-state actors raises concerns among consumers who are unaware of the
(Mosendz, 2017).
Goodrum (2013) argues that voluntarily disclosing personal data can be more
15
often monitor their staff's personalities and online behaviors outside of the
workplace (Ibid.).
Zuboff (2015; Zuboff and Klein, 2019) asserts that surveillance is the new
Zuboff, 2019). She argues that if individuals have nothing to hide, they are
software programs that violate citizens' human rights and store massive
estate (Ibid.).
social, political, and moral space of society. Capurro (2009) has extensively
16
technologies implication on society at large. Currently, there is poor digital
with great dispute even on the basic digital ethics. The biggest challenge in
digital ethics is the study of elements that cannot be seen with naked eyes,
or which does not exist, with varying impacts and results on social morals
perceived outcomes (Floridi & Taddeo, 2016). For instance, the creation of
ethical standards. In society today, digital technology is more like what was
applications in the social, political, and even moral spheres of life (Sargolzaei
the social sphere has become disrupted, with the most attention being given
17
to online social relationships instead of real-life interactions. This article will
assess the digital ethics environment today, to establish the challenges being
protect data.
between people and even commerce, which has both positive and negative
making, without the consent of the owners (Sklavos, 2017). The inference
privacy violation, especially because most of the information owners are not
with privacy and security concerns identified so far (Sklavos, 2017). This is
18
privacy and security issues facing information technologies, to create
solutions that ensure a safe digital environment for all the stakeholders. It is
Dechesne, Sears, Tani, & van der Hof, 2018). The aggregation data
production (Damen, Köhler, & Woodard, 2017). Privacy means any personal
19
without the information owner’s consent (Bouguettaya & Eltoweissy, 2003).
is not necessarily unacceptable if the businesses seek consent from the data
owners. In most cases, enterprises collect user data for use in improving
(Richards & King, 2014). Some organizations request their consumers for
confirmation on the collection and use of their data, and many leading
with third parties, e.g., the latest Facebook case for sharing consumer data
(Schneble, Elger, & Shaw, 2018). Such cases undermine the morality of
personal informed consent on the collection and use of personal data, due to
20
reliability, timeliness, and accessibility of data by the users (Bouguettaya &
society today at the expense of awareness of the privacy risks and issues
information owners without the knowledge of the sole purpose of the data
organizations, through the use of deceptive policies that help them to bypass
collection of data without the owner’s consent (Clubb, Kirch, & Patwa, 2015).
rights, which has made it difficult to implement the existing privacy laws and
21
is clear that consumer behavior regarding privacy laws and consent, has been
ignored due to a lack of awareness, and clear regulations to guide the public
and new digital technology. The diversity of digital technology privacy issues
solutions, but the primary approach that can be used to control the cases of
22
practices even through legislations. Governments can enforce the law to a
Legislation Changes
The European Union (EU) countries have played a significant role in creating
(Custers et al., 2018). The primary approach through which the EU creates
policies, the EU has ensured that organizations comply with the data
and users have the consent of the data owners (Custers et al., 2018). The EU
ensures that the data owners are educated regarding the purpose of the
information, and there is the need for developers to create secure databases
for user information, which can be accessed by the owners. These measures
23
Other legislation solutions include the requirement for complete
control, and data protection. Therefore, such solutions infer that the
and security, and that consumers will be empowered to have control of their
personal information.
procedures, which will equip the public with data safety knowledge to help
campaign can help to develop ethical literacy campaigns that can change the
the information owner to give consent before their information can be used
24
(Clubb, Kirch, & Patwa, 2015). There is a limitation in that a limited period of
education will not suffice in the eradication of data privacy concerns (Har
institutions, which will raise a data security practices aware generation that
parents and relatives who do not understand the data privacy concerns in
Responsible Innovation
Responsible Innovation is a term that owes its origin to the EU’s Framework
put into consideration the effects and possible impact on the environment
25
the societal actors and innovators become mutually responsive to each
The core blueprint for the companies that focus their actions in the IT sector
should not deter their ability to formalize and implement the coveted
companies that are giving rise to them and. This is for the reason that the
former would be more secure due to the more ethical consideration by the
26
potential conflicts as required by the law or in case of a breach in the privacy
requirements.
and they also arouse new and profound debates on the scope of
the group by using the policies that are explicitly outlined in legislation may
the many groups that are derived by big data analytics are not specific
measures call for extensive and intensive joint research conducted by ethics
of its group counterpart, are possible to implement now. Taylor, Floridi, and
27
van der Sloot (2017) established approaches, such as the international
would be able to see the extension of their data, and determine the extent of
CHAPTER THREE
28
RESEARCH METHODLOGY
investigate the ethics of privacy and surveillance in the digital age. The study
ethical dimensions of privacy and surveillance. This design allows for the
The study population comprises ICT and cyber security experts working in
29
The sample size is determined using the Fisher's et al. (1998) formula,
The Fishers’ et al, 1998, formula was used to calculate the required sample
size;
Where;
(0.05)
n=384
30
Since the number of scientists is a finite population and less than 10,000,
the overall sample size was determined using the “finite population
Therefore;
n= 128
The figure 128 is the baseline number that the researcher intended to reach
the sample size, which was 13 more respondents to cater for the unreturned
31
3.4 RESEARCH INSTRUMENT
distribute the questionnaires to the identified ICT and cyber security experts
in the EFCC branch in Akwa Ibom State. The research assistants collect the
Package for the Social Sciences (SPSS) software. Percentages and frequencies
32
are calculated to summarize the responses and provide an overview of the
digital age.
findings. The results obtained from the analysis serve as the basis for
CHAPTER FOUR
33
RESULTS AND FINDINGS
This chapter presents the results and findings of the study on the ethics of
privacy and surveillance in the digital age. The chapter includes the analysis
Gender
- Male 64 50%
- Female 64 50%
Age Group
34
Demographic Characteristic Frequency Percentage
Educational Level
males and 64 females. The respondents' age groups are categorized into four
categories, with 32 respondents (25%) falling into the 20-30 years and 41-50
years age groups, and 48 respondents (37.5%) falling into the 31-40 years age
35
Master's degree, and 8 respondents (6.3%) have a Ph.D. or higher
qualification.
Privacy 56 43.8%
Transparency 32 25%
Fairness 24 18.8%
36
considering it important. Informed consent was rated as important by 48
Table 4.3 presents the frequencies and percentages of the perceived impacts
37
respondents (37.5%) recognizing its importance. Psychological impact was
and surveillance?
Surveillance
Anonymization 40 31.3%
38
Table 4.4 showcases the frequencies and percentages of the respondents'
Question 3. Data encryption was considered the most effective strategy, with
the digital age. The rapid advancements in technology and the widespread
39
private entities has sparked debates about striking a balance between
security measures and individual privacy rights. The aim of this study was to
gain insights into the ethical implications of privacy and surveillance in the
concerns.
topic. The findings from the survey of 128 respondents provide valuable
insights into these areas. The first research question focused on ethical
consideration. This suggests that individuals are highly concerned about the
rights and obtaining informed consent when collecting and using their data.
infringements. The most commonly recognized impact was the loss of trust
40
trust in organizations or systems. Psychological impact (31.3%) and
sensitive data. Access control (37.5%) was another highly regarded strategy,
41
processes. The perceived impacts of privacy infringements emphasize the
address privacy concerns and protect individuals' rights. These findings can
CHAPTER FIVE
the digital age. The ethics of privacy and surveillance in the digital age is a
42
technology and the widespread use of digital platforms, individuals' privacy
is becoming more vulnerable than ever before. This raises important ethical
governments and private entities, raises concerns about the balance between
consideration.
of privacy infringements.
43
These findings emphasize the potential negative effects on
strategy.
highlight the need for robust data protection measures, transparent data
reputation that can result from privacy breaches. The identified mitigation
44
5.2 CONCLUSION
This research on the ethics of privacy and surveillance in the digital age
reaching. First and foremost, they emphasize the need for robust ethical
practices. Privacy should be prioritized and integrated into the design and
45
Furthermore, the identified mitigation strategies, such as data encryption,
5.3 RECOMMENDATIONS
Based on the findings of the study on the ethics of privacy and surveillance
practices.
46
2. Enhance Privacy Policies and Transparency: Clear and comprehensive
rights, data protection, and the potential risks associated with data
47
while also striking a balance with legitimate security concerns. Regular
culture of ethical data practices, where privacy and data protection are
privacy protection.
ethical approach to privacy and surveillance in the digital age. These actions
not only protect individuals' privacy rights but also contribute to building
48
REFERENCES
49
Ahmed, E., Yaqoob, I., Hashem, I. A. T., Khan, I., Ahmed, A. I. A., Imran, M.,
https://doi.org/10.1016/j.comnet.2017.06.013
Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., & Kruegel, C. (2012,
138).
trier.de/db/conf/IEEEares/cd-ares2014.html#Boehmer14
Böse, B., Avasarala, B., Tirthapura, S., Chung, Y. Y., & Steiner, D. (2017).
50
Ernst and Young. (2015). Using cyber analytics to help you get on top of
from http://www.ey.com/Publication/vwLUAssets/ey-third-
generation-security-operations-centers-2015/$FILE/ey-third-
generation-security-operations-centers-2015.pdf
Meng, X.F., Ma, C.H. and Yang, C. (2019). Review of Machine Learning Web
ransomware-attacks-to-fbi/126510/
Mousa A., Karabatak M., & Mustafa T. (2020). Web based Security Threats
51
Nica E., Tudorica B. G., Dusmanescu D. M., Popescu G., & Breaz A. M. (2019).
Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A
Pevnev V., & Kapchynskyi S.(2018). Web based Security, Threats and
https://doi.org/10.20998/25229052.2018.1.13
Zhou, L., Pan, S., Wang, J., & Vasilakos, A. V. (2017). Machine learning on big
Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and
52
APPENDIX
QUESTIONNAIRE
Instructions:
Thank you for participating in this study on the ethics of privacy and
surveillance in the digital age. Your responses are valuable for understanding
53
the diverse perspectives on this crucial issue. Please carefully read each
question and select the option that best represents your views.
1. Gender:
Male
Female
2. Age Group:
20-30 years
31-40 years
41-50 years
Above 50 years
3. Educational Level:
High School
Bachelor's Degree
Master's Degree
Ph.D. or Higher
54
Section 2: Ethical Considerations Related to Privacy and Surveillance
Privacy:
1
2
3
4
5
Informed Consent:
1
2
3
4
55
5
Data Security:
1
2
3
4
5
Transparency:
1
2
3
4
5
Fairness:
1
2
56
3
4
5
"Significant."
Loss of Trust:
1
2
3
4
5
Psychological Impact:
1
57
2
3
4
5
Reputation Damage:
1
2
3
4
5
Social Stigma:
1
2
3
4
5
58
Legal Consequences:
1
2
3
4
5
Surveillance
Responsibility."
Data Encryption:
1
2
3
59
4
5
Access Control:
1
2
3
4
5
Anonymization:
1
2
3
4
5
Privacy Policies:
1
60
2
3
4
5
User Education:
1
2
3
4
5
61