Skip to main content
Log in

Nudging as a Threat to Privacy

  • Published:
Review of Philosophy and Psychology Aims and scope Submit manuscript

Abstract

Nudges can pose serious threats to citizens’ privacy. The essay discusses several examples of nudges that must appear problematic to anyone valuing privacy. The paper also re-draws a well established connection between privacy and autonomy and argues that insofar as nudges incur too great a loss of privacy, they are incompatible with the libertarianism that libertarian paternalism is committed to by virtue of its very name.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Thaler and Sunstein (2008), p. 6.

  2. The solution to the spillage problem is a tiny fly painted on the inside of the urinal. Apparently, men cannot resist the urge to aim at the fly.

  3. OIRA is one of the most powerful government agencies in the US, able to review, reject and delay many proposed regulations. Originally, however, its scope was more limited, in that it reviewed only regulations involving information collection from the public. This might suggest that it was set up as a data protection agency. However, while Sunstein in an executive memorandum mentions the protection of privacy among a cluster of topics to be kept in mind, it is not among the three main functions of the agency he singles out. One of these is to ensure that “the collection of information (…) maximizes the practical utility of and public benefit from information collected by or for the Federal Government.” (Sunstein 2011, p.5) Privacy enhancing measures such as timely destruction of records are surely far from maximizing such practical utility.

  4. See Dworkin (2014).

  5. While other actors and institutions can act paternalistically, we are only concerned with paternalistic governments.

  6. Bundesverfassungsgericht (Federal Constitutional Court), Neue Juristische Wochenschrift 1987, 180.

  7. See, e.g., Sunstein and Thaler (2003), p.1193.

  8. See Sunstein (2013b), p. 1875–1878.

  9. See Solove (2008) for an extensive critique of these conceptions and an account of privacy as a nexus of many concepts that share a Wittgensteinian family resemblance.

  10. See Rössler (2005) and, more concisely, Rössler (2008).

  11. Other taxonomies speak of “locational” privacy, which concerns access to information about your whereabouts. In Rössler’s framework, this would fall under informational privacy.

  12. These are main categories in the taxonomy of privacy harms in Solove (2006).

  13. See Rössler (2008) p. 703.

  14. See Sunstein and Thaler (2003), Mitchell (2005).

  15. Rössler (2008) and the references therein are a good start for accounts of other valuable aspects of privacy.

  16. Unless indicated otherwise, we will from now mean informational privacy whenever we simply write privacy.

  17. Richards (2008), p. 404.

  18. An example that shows that great ideas sometimes require an immense amount of undisturbed privacy is Andrew Wiles’s solution to Fermat’s famous last theorem, which had exercised the best mathematical minds of the last 350 years. Wiles had been working on this problem for many years without telling anyone about it. After his triumphant disclosure of the proof, he stressed the impossibility of working on this famous problem “out in the open”. He would have been unable to stomach the disbelieving interest, the possible comments about his intellectual hubris, the ridicule and the dissuasions of his colleagues (see Singh 1997).

  19. Richards (2008), p. 404.

  20. Cohen (2000), p. 1426–1427.

  21. See Foucault (1977).

  22. See Mill (1869).

  23. See also Allen (2011), de Bruin (2010), Rössler (2005), Rössler (2013) Slobogin (2002) and Solove (2008).

  24. See Nissenbaum (2011), p. 36.

  25. See Sunstein (2013a), p. 102. Willis (2013), p. 1202 gives a list of examples of actual privacy regulation proposals in this vein.

  26. In practice, it is a matter of some debate whether such defaults would work as well for privacy protection as they do for organ donorship (see Willis 2013). However, we are more concerned here with the question of whether a policy should be rejected on normative grounds rather than on the grounds of practical efficiency.

  27. Porat and Strahilevitz (2013).

  28. Porat and Strahilevitz 2013, p. 1468.

  29. Sunstein (2013c). It is especially interesting to compare this manuscript with an earlier draft from 2012, which at the point of this writing is also available online. The sections on privacy are among the main changes, suggesting that the kinds of problems we discuss here have been on Sunstein’s mind lately, as well.

  30. Sunstein (2013c), p. 40. Active choosing here refers to an alternative to default setting, namely to prompt individual users to actively make their privacy choices themselves.

  31. Sunstein (2013c), p. 40.

  32. See, e.g., http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html.

  33. On the factual falsity of most pronouncements of the claim “I’ve got nothing to hide”, see Solove 2007.

  34. Our claim might be questioned if at issue is the more exclusive understanding of paternalism, according to which measures can only be considered paternalistic if they overrule the preferences of the individuals solely for their own good. Might there not be a secondary benefit to universally informed governments that might save Sunstein’s fantasy from being paternalistic? Indeed, we know that governments collect vast amounts of information about their citizens in the name of national safety; what harm could there be in letting the “nudging unit” look over the information the NSA has collected? This sort of information sharing between government agencies, however, has already been shown to be far from unproblematic in the famous census decision of the German Federal Constitutional Court in 1983 (translation available at 5 Human Rights Law Journal 1984, p. 94–116 (100)). Even back then it was recognized that free flow of information between such agencies dramatically increases the threats to citizens’ privacy as it increases uncertainty about which persons have access to sensitive information. It also makes data theft and leakage more likely and leads to other related problems. The preference of privacy conscious citizens would be that information about them, if it must be collected, should not be freely distributed to other agencies such as the nudging unit. Even if the collection of the data might itself not be paternalistic (in the narrow sense), as it might serve some purpose unrelated to the citizens’ own good, using it to find out more about their ends in order to serve those ends surely is.

  35. See Thaler and Sunstein (2008), p. 68 et seq.

  36. Solove (2006) gives a taxonomy of privacy harms that might serve as guide for such checks.

  37. Sunstein (2014).

  38. See e.g., https://www.facebook.com/pages/Drunk-Detector/251632671590218?sk=info&tab=page_info.

  39. See Wang et al. (2013).

  40. See https://www.youtube.com/watch?v=F7pYHN9iC9I.

  41. See Thaler and Sunstein (2008), p. 24 on availability biases.

  42. Also, the effect on those who merely watch the video would have to beb e factored in. We would guess that watching the video isn’t near as effective as being a victim of the magician, in part because of the persistent overoptimism that behavioral economics has observed time and again: People are aware of risks, but they grossly underestimate the chance that they themselves could fall victim to those risks. Smokers think that smoking is causing cancer, but tend to believe that their personal chance of getting cancer isn’t any higher than that of non-smokers, etc. On the other hand, many more people might watch the video than could feasibly be directly targeted by such a demonstration, so that the net benefit might be comparable in the end.

References

  • Allen, A.L. 2011. Unpopular privacy. Oxford: Oxford University Press.

    Book  Google Scholar 

  • Cohen, J.E. 2000. Examined lives: informational privacy and the subject as object. Stanford Law Review Online 52: 1373–1438.

    Article  Google Scholar 

  • de Bruin, B. 2010. The liberal value of privacy. Law and Philosophy 29: 505–534.

    Article  Google Scholar 

  • Dworkin, G. 2014. Paternalism, The Stanford Encyclopedia of Philosophy (Summer 2014 Edition), <http://plato.stanford.edu/archives/sum2014/entries/paternalism/>. 22nd January 2015

  • Foucault, M. 1977. Discipline and punish: the birth of the prison. New York: Random House LLC.

  • Mill, J. S. 1869. On liberty. London: Longmans, Green, Reader, and Dyer.

  • Mitchell, G. 2005. Libertarian paternalism is an oxymoron. Northwestern University Law Review 99: 1245–1277.

    Google Scholar 

  • Nissenbaum, H. 2011. A contextual approach to privacy online. Daedalus, the Journal of the American Academy of Arts and Sciences 140: 32–48.

    Google Scholar 

  • Porat, A., and L. Strahilevitz. 2013. Personalizing default rules and disclosure with big data. Michigan Law Review 112: 1417–1478.

    Google Scholar 

  • Richards, N. 2008. Intellectual privacy. Texas Law Review 87: 387–445.

    Google Scholar 

  • Rössler, B. 2005. The value of privacy. Cambridge: Polity.

  • Rössler, B. 2008. New ways of thinking about privacy. In The Oxford Handbook of political theory, ed. Dryzek, Honig, and Phillips, 694–712. Oxford: Oxford University Press.

    Google Scholar 

  • Rössler, B. 2013. Autonomy, paternalism, and privacy: some remarks on Anita Allen. APA Newsletter 13(1): 14–18.

    Google Scholar 

  • Singh, S. 1997. Fermat’s last theorem. London: Fourth Estate.

  • Slobogin, C. (2002). Public Privacy: Camera Surveillance of Public Places and the Right toAnonymity. Mississippi Law Journal, 72, p. 213-299.

  • Solove, D. 2006. A taxonomy of privacy. University of Pennsylvania Law Review 154: 477–560.

    Article  Google Scholar 

  • Solove, D. 2007. ‘I’ve got nothing to hide’ and other misunderstandings of privacy. San Diego Law Review 44: 745–772.

    Google Scholar 

  • Solove, D. 2008. Understanding privacy. Cambridge: Harvard University Press.

    Google Scholar 

  • Sunstein, C. 2011. Memorandum for the heads of executive departments and agencies, and of independent regulatory agencies: Executive Order 13563, “Improving Regulation and Regulatory Review”.

  • Sunstein, C. 2013a. Simpler: the future of government. New York: Simon and Schuster.

    Google Scholar 

  • Sunstein, C. 2013b. The storrs lectures: behavioral economics and paternalism. Yale Law Journal 122: 1826–1899.

    Google Scholar 

  • Sunstein, C. 2013c. Impersonal default rules vs. active choices vs. personalized default rules: a triptych. Manuscript available at SSRN: http://ssrn.com/abstract=2171343 or doi:10.2139/ssrn.2171343, earlier version mentioned in the text available at http://dash.harvard.edu/handle/1/9876090. 22nd January 2015.

  • Sunstein, C. 2014. Valuing life. Chicago: Chicago University Press.

    Book  Google Scholar 

  • Sunstein, C., and R. Thaler. 2003. Libertarian paternalism is not an oxymoron. The University of Chicago Law Review 70: 1159–1202.

    Article  Google Scholar 

  • Thaler, R., and C. Sunstein. 2008. Nudge: improving decisions about health, wealth, and happiness. New Haven: Yale University Press.

    Google Scholar 

  • Wang, Y., et al. 2013. From facebook regrets to facebook privacy nudges. Ohio State Law Journal 74: 1307–1344.

    Google Scholar 

  • Willis, L. 2013. When nudges fail: slippery defaults. The University of Chicago Law Review 80: 1155–1229.

    Google Scholar 

Download references

Acknowledgments

The research of the first author was funded by the German Research Foundation (Project PI 1082/1-1 0228 885 2134).

We would like to thank Simon Garnett, Prof. Gerrit Hornung, three anonymous referees and the editors for helpful comments on this paper.

Compliance with ethical standards

The work complies with all ethical standards as listed on the ROPP webpage.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andreas Kapsner.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kapsner, A., Sandfuchs, B. Nudging as a Threat to Privacy. Rev.Phil.Psych. 6, 455–468 (2015). https://doi.org/10.1007/s13164-015-0261-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13164-015-0261-4

Keywords

Navigation