IEEE Technology and Society Magazine - Summer 2014 - 72

Moral Harm
Non-consensual taking of an individual's image is a moral harm because
it infringes individual privacy. Other
than in circumstances where religious or cultural beliefs are profoundly offended by image-taking,
in itself it is a moral harm unlikely to
have significant actual harmful consequences. A more significant moral
harm comes with the second element
of the intrusion, the infringement of
autonomy and the use of information
from such images by third parties.
Greater moral harm (and potentially significant actual harm) occurs
when the image-subject not only
has no control over how the images
and information are used but also is
directly or indirectly harmed by their
subsequent use. The moral theory
of policing provides an account in
which lawful, proportionate and
necessary non-consensual imagetaking leading to subsequent moral
and actual harm (e.g., conviction and
punishment) can be morally justified
in certain circumstances.
Taking official use of surveillance and CCTV as its initial context, this article has considered
ethical aspects of non-consensual
image-taking. Official use of BWV
can be accommodated within the
same moral conversation. But private citizen use of BWV for surveillant seeing changes the moral
dynamic through promiscuous
image-sharing and the absence of
effective redress mechanisms for
image-subjects.
The ethical concerns raised by
CCTV camera surveillance and
by covert investigation surveillance have begun to be addressed
with a number of protections: for
example, prior use-authorization
regimes; data protection legislation; automatic periodic deletion; subject access protocols; and
privacy-protection software [7].
Within the paradigm of public

72

|

sector accountability, together with
Von Hirsch's framework for ethical routine surveillance of public
areas, such measures bring ethicsbased regulation to official use
of camera surveillance: a regime
which can incorporate official use
of BWV. In this sense BWV is
merely a different manifestation of
how State and citizen interact. The
basic principle is the same as in
other forms of interaction: regulating use of State power in relation to
a citizen in order to prevent (or else
remedy) abuse of that power.
The use of BWV technology by
private citizens to capture information about other private citizens
empowers the user to the extent
that the user acquires usable information about another person, thus
creating an asymmetrical power
relationship. The ethics of surveillance as social control have been
widely considered and sousveillance can be accommodated within
that ethical account. But such an
account is found wanting in connection with citizen use of BWV
surveillance because there is no
obvious morally justifiable counterweight to the prima facie moral
harms engaged.
The digital environment is redefining social interaction and creating
a need for new ethical accounts [3].
Superficially empowered through
social networking, individuals have
in fact lost the last vestiges of control over how they manage information about self to present a desired
public personality. Communications
technology facilitates interaction
between people: it can also neutralize
social inhibitions if the user perceives
their interaction to be primarily with
the technology rather than with the
recipient of the message - hence the
concept of "netiquette" establishing conventions about acceptable
ways of expressing self in email. For
similar reasons, general recognition

and understanding of what is acceptable and unacceptable in relation to
private use of BWV technology is
required. Because the immediate
outcome of such use is the acquisition of information about others, the
onus of ethical responsibility lies
firmly with the users of images and
recordings made with BWV technology when surveillance is used as a
means of private seeing for the purpose of public sharing.

Author Information
Clive Harfield is an Adjunct Fellow, Griffith university, Qld, Australia, and Associate Investigator at
the ArC Centre of Excellence in
Policing & Security.

Acknowledgment
The author is grateful to Seth Lazar,
School of Philosophy, The Australian National university, and to two
anonymous peer reviewers for comments on early drafts of this paper.

References

[1] C. Burt, "Privacy as security: comparative developments in Canada, the u.K. and
the u.S.A." in Eyes Everywhere: The Global
Growth of Camera Surveillance, A. Doyle, r.
Lippert and D. Lyon, Eds. Abingdon, u.K.:
routledge, 2012, pp. 354-369.
[2] K. Michael, "For now we see through a
glass, darkly," IEEE Technology & Society
Mag., pp. 4-5, Wint. 2013.
[3] K. Michael, "No limits to watching?," Commun. ACM, vol. 56, no. 11, pp. 26-28, Nov. 2013.
[4] S. Miller and J. Blackler, Ethical Issues in
Policing. Aldershot, u.K.: Ashgate, 2005, p. 26.
[5] J. rachels, "Why privacy is important,"
Philosophy and Public Affairs, vol. 4, no. 4,
pp. 323-333, 326, 1975.
[6] P. roberts, "Privacy, autonomy and criminal justice rights: philosophical preliminaries"
in Personal Autonomy, the Private Sphere and
the Criminal Law, P. Alldridge and C. Brants,
Eds. Oxford, u.K.: Hart, 2001, pp. 49-78.
[7] A. Senior, "Privacy protection in a video
surveillance system" in Protecting Privacy in
Video Surveillance, A. Senior, Ed. London,
u.K.: Springer-Verlag, 2009, pp. 35-47.
[8] S. Sontag, On Photography. London, u.K.:
Penguin, 1979.
[9] A. von Hirsch, "The ethics of public television surveillance," in Ethical and Social Perspectives on Situational Crime Prevention,
A. von Hirsch, D. Garland, and A. Wakefield,
Eds. Oxford, u.K.: Hart, 2000, pp. 59-76.

IEEE TECHNOLOGY AND SOCIETY MAGAZINE

|

SuMMEr 2014



Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - Summer 2014

IEEE Technology and Society Magazine - Summer 2014 - Cover1
IEEE Technology and Society Magazine - Summer 2014 - Cover2
IEEE Technology and Society Magazine - Summer 2014 - 1
IEEE Technology and Society Magazine - Summer 2014 - 2
IEEE Technology and Society Magazine - Summer 2014 - 3
IEEE Technology and Society Magazine - Summer 2014 - 4
IEEE Technology and Society Magazine - Summer 2014 - 5
IEEE Technology and Society Magazine - Summer 2014 - 6
IEEE Technology and Society Magazine - Summer 2014 - 7
IEEE Technology and Society Magazine - Summer 2014 - 8
IEEE Technology and Society Magazine - Summer 2014 - 9
IEEE Technology and Society Magazine - Summer 2014 - 10
IEEE Technology and Society Magazine - Summer 2014 - 11
IEEE Technology and Society Magazine - Summer 2014 - 12
IEEE Technology and Society Magazine - Summer 2014 - 13
IEEE Technology and Society Magazine - Summer 2014 - 14
IEEE Technology and Society Magazine - Summer 2014 - 15
IEEE Technology and Society Magazine - Summer 2014 - 16
IEEE Technology and Society Magazine - Summer 2014 - 17
IEEE Technology and Society Magazine - Summer 2014 - 18
IEEE Technology and Society Magazine - Summer 2014 - 19
IEEE Technology and Society Magazine - Summer 2014 - 20
IEEE Technology and Society Magazine - Summer 2014 - 21
IEEE Technology and Society Magazine - Summer 2014 - 22
IEEE Technology and Society Magazine - Summer 2014 - 23
IEEE Technology and Society Magazine - Summer 2014 - 24
IEEE Technology and Society Magazine - Summer 2014 - 25
IEEE Technology and Society Magazine - Summer 2014 - 26
IEEE Technology and Society Magazine - Summer 2014 - 27
IEEE Technology and Society Magazine - Summer 2014 - 28
IEEE Technology and Society Magazine - Summer 2014 - 29
IEEE Technology and Society Magazine - Summer 2014 - 30
IEEE Technology and Society Magazine - Summer 2014 - 31
IEEE Technology and Society Magazine - Summer 2014 - 32
IEEE Technology and Society Magazine - Summer 2014 - 33
IEEE Technology and Society Magazine - Summer 2014 - 34
IEEE Technology and Society Magazine - Summer 2014 - 35
IEEE Technology and Society Magazine - Summer 2014 - 36
IEEE Technology and Society Magazine - Summer 2014 - 37
IEEE Technology and Society Magazine - Summer 2014 - 38
IEEE Technology and Society Magazine - Summer 2014 - 39
IEEE Technology and Society Magazine - Summer 2014 - 40
IEEE Technology and Society Magazine - Summer 2014 - 41
IEEE Technology and Society Magazine - Summer 2014 - 42
IEEE Technology and Society Magazine - Summer 2014 - 43
IEEE Technology and Society Magazine - Summer 2014 - 44
IEEE Technology and Society Magazine - Summer 2014 - 45
IEEE Technology and Society Magazine - Summer 2014 - 46
IEEE Technology and Society Magazine - Summer 2014 - 47
IEEE Technology and Society Magazine - Summer 2014 - 48
IEEE Technology and Society Magazine - Summer 2014 - 49
IEEE Technology and Society Magazine - Summer 2014 - 50
IEEE Technology and Society Magazine - Summer 2014 - 51
IEEE Technology and Society Magazine - Summer 2014 - 52
IEEE Technology and Society Magazine - Summer 2014 - 53
IEEE Technology and Society Magazine - Summer 2014 - 54
IEEE Technology and Society Magazine - Summer 2014 - 55
IEEE Technology and Society Magazine - Summer 2014 - 56
IEEE Technology and Society Magazine - Summer 2014 - 57
IEEE Technology and Society Magazine - Summer 2014 - 58
IEEE Technology and Society Magazine - Summer 2014 - 59
IEEE Technology and Society Magazine - Summer 2014 - 60
IEEE Technology and Society Magazine - Summer 2014 - 61
IEEE Technology and Society Magazine - Summer 2014 - 62
IEEE Technology and Society Magazine - Summer 2014 - 63
IEEE Technology and Society Magazine - Summer 2014 - 64
IEEE Technology and Society Magazine - Summer 2014 - 65
IEEE Technology and Society Magazine - Summer 2014 - 66
IEEE Technology and Society Magazine - Summer 2014 - 67
IEEE Technology and Society Magazine - Summer 2014 - 68
IEEE Technology and Society Magazine - Summer 2014 - 69
IEEE Technology and Society Magazine - Summer 2014 - 70
IEEE Technology and Society Magazine - Summer 2014 - 71
IEEE Technology and Society Magazine - Summer 2014 - 72
IEEE Technology and Society Magazine - Summer 2014 - 73
IEEE Technology and Society Magazine - Summer 2014 - 74
IEEE Technology and Society Magazine - Summer 2014 - 75
IEEE Technology and Society Magazine - Summer 2014 - 76
IEEE Technology and Society Magazine - Summer 2014 - 77
IEEE Technology and Society Magazine - Summer 2014 - 78
IEEE Technology and Society Magazine - Summer 2014 - 79
IEEE Technology and Society Magazine - Summer 2014 - 80
IEEE Technology and Society Magazine - Summer 2014 - Cover3
IEEE Technology and Society Magazine - Summer 2014 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com