Skip to main content
Social Sci LibreTexts

5.13: The Digital Age and the Struggle for Human Rights

  • Page ID
    307758
  • This page is a draft and is under active development. 

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\dsum}{\displaystyle\sum\limits} \)

    \( \newcommand{\dint}{\displaystyle\int\limits} \)

    \( \newcommand{\dlim}{\displaystyle\lim\limits} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \(\newcommand{\longvect}{\overrightarrow}\)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)
    Learning Objectives

    By the end of this part you will be able to:

    • Explain how digital technologies have reshaped concepts of human rights and citizenship.

    • Identify global frameworks governing internet freedom and privacy.

    • Analyze the tensions between surveillance, security, and liberty in the information age.

    • Evaluate corporate and governmental roles in data governance.

    • Assess how power operates through digital infrastructures and platforms.

    A New Frontier of Rights

    When the Universal Declaration of Human Rights (UDHR, 1948) was drafted, no one imagined smartphones, social media, or AI.
    Today, freedom of expression, privacy, and association play out in cyberspace.
    The “public square” has moved from streets to servers; tweets can spark revolutions or genocides.

    Digital technologies have expanded human capability—connecting people, enabling education, and amplifying marginalized voices.
    Yet they also generate new inequalities: data colonialism, algorithmic bias, and corporate surveillance (Couldry & Mejias, 2019).
    As UN Special Rapporteur David Kaye (2019) notes, online rights are not new rights; they are existing ones “reinterpreted for the digital context.”

    The question is no longer whether technology affects freedom but who controls the code that governs daily life.

    Internet Freedom and Global Governance

    The Architecture of the Internet

    Unlike traditional governance, the internet evolved through decentralized collaboration among engineers, academics, and civic activists.
    Bodies such as ICANN, IETF, and W3C coordinate protocols and domain names rather than laws.
    This distributed structure initially fostered openness—what John Perry Barlow called “a space of freedom and innovation” (Barlow, 1996).

    However, states soon recognized the strategic power of cyberspace.
    By the 2010s, “internet governance” became geopolitical.
    China’s Great Firewall, Russia’s Sovereign Internet Law, and the EU’s General Data Protection Regulation (GDPR) represent competing models: cyber-sovereignty, authoritarian control, and rights-based regulation (DeNardis, 2020).

    Freedom Online Coalition and Digital Rights Norms

    Formed in 2011, the Freedom Online Coalition (FOC) unites 35+ governments committed to protecting online human rights.
    Its Tallinn Agenda (2014) affirms that rights offline must also apply online.
    Civil-society groups—such as Access Now, Electronic Frontier Foundation (EFF), and Privacy International—act as watchdogs against censorship and surveillance.

    Yet global enforcement is fragmented.
    For every right enshrined in a UN resolution, a new national law may restrict it under the banner of “cybersecurity.”
    Balancing sovereignty and universality remains the defining tension of digital governance.

    Surveillance and the Security Dilemma

    From Panopticon to Pan-Data

    Philosopher Michel Foucault (1977) used the panopticon—a circular prison where inmates are always visible—to describe modern power.
    Today, digital surveillance turns societies into vast data panopticons.
    Governments and corporations collect metadata from phones, sensors, and cameras to predict behavior.

    Revelations by Edward Snowden (2013) exposed how the U.S. National Security Agency’s (PRISM) program harvested global communications with tech-company cooperation.
    Similar practices appear worldwide:

    • China’s facial-recognition network in Xinjiang;

    • Israel’s Pegasus spyware used by multiple states;

    • predictive-policing systems in U.S. cities that reinforce racial bias (Benjamin, 2019).

    The Trade-Off Myth

    After 9/11, policymakers framed privacy as something traded for security.
    However, evidence shows mass surveillance rarely prevents terrorism but consistently chills dissent (Zuboff, 2019).
    Amnesty International (2021) calls this the false choice narrative: genuine security arises from human rights, not their erosion.

    Surveillance Capitalism

    Corporate tracking mirrors state surveillance.
    Every click, like, and GPS ping becomes monetized behavioral data.
    Shoshana Zuboff (2019) terms this surveillance capitalism: the commodification of human experience for profit prediction.
    Platforms such as Google, Meta, and TikTok operate as “attention extractive industries.”

    The asymmetry is stark: users generate data, companies reap value, regulators lag behind.
    Attempts like the EU GDPR (2018) and California’s CCPA (2020) mark early steps toward data rights but face loopholes and uneven enforcement (Greenleaf & Waters, 2021).

    The Right to Privacy in a Borderless World

    Privacy underpins autonomy.
    Article 12 of the UDHR protects individuals against “arbitrary interference,” yet digital reality blurs boundaries between public and private.
    Cloud computing scatters personal data across jurisdictions, complicating legal recourse.

    International Standards

    The UN Human Rights Council’s Resolution 68/167 (2013) affirmed that privacy must be protected online.
    The Council of Europe’s Convention 108+ (2018) became the first binding international treaty on data protection.
    Still, only 60 countries have comprehensive privacy laws, many without enforcement capacity (Gellman & Rogers, 2021).

    The Right to Be Forgotten

    The European Court of Justice’s 2014 decision in Google Spain v. AEPD introduced the “right to be forgotten,” enabling individuals to request removal of outdated or irrelevant search results.
    Critics fear censorship; advocates view it as digital dignity.
    Outside Europe, similar debates rage from Argentina to South Korea.

    Data Colonialism

    Beyond individual rights lies a structural question: Who owns collective data?
    Global South countries often provide raw digital resources—user data, clickstreams, labor for AI training—while value accumulates in Silicon Valley or Shenzhen (Couldry & Mejias, 2019).
    This mirrors historical extractivism: the new empire runs on information rather than gold.

    Big Tech and the New Power Geometry

    Platform Governance

    Five conglomerates—Apple, Amazon, Alphabet, Meta, and Microsoft—shape information flows for billions.
    They moderate content, set speech norms, and design algorithms influencing elections.
    Their power approximates sovereignty, yet accountability remains opaque.
    As Tarleton Gillespie (2018) notes, platforms are “custodians of the internet’s public spaces.”

    Self-regulation initiatives—Facebook’s “Oversight Board,” Google’s AI ethics councils—often serve as legitimacy theater.
    Real oversight demands democratic governance: transparency requirements, antitrust enforcement, and user representation (Vaidhyanathan, 2018).

    Algorithmic Power and Bias

    Machine-learning models replicate societal biases embedded in data.
    Facial-recognition systems misidentify darker-skinned faces at far higher rates (Buolamwini & Gebru, 2018).
    Automated credit scoring, predictive policing, and hiring algorithms risk codifying inequality under the guise of objectivity (Eubanks, 2018).

    Global Digital Divides

    Roughly 2.6 billion people remain offline (ITU, 2023).
    Connectivity gaps reflect income, gender, and geography.
    In parts of sub-Saharan Africa and South Asia, internet access is a luxury, not a right.
    Meanwhile, data generated in these regions fuel Western AI products—an ironic form of “participation without power.”

    Efforts like the Alliance for Affordable Internet (A4AI) and Starlink’s satellite internet expand access, but affordability, digital literacy, and linguistic diversity remain obstacles.
    Closing the divide requires infrastructure and inclusion.

    Cyber Rights Movements

    Digital rights activism fuses technical expertise with social justice.
    Groups like EFF, Access Now, and Fight for the Future campaign for net neutrality, encryption, and anti-surveillance laws.
    In Latin America, Derechos Digitales advances digital privacy within human-rights frameworks.
    African initiatives such as Paradigm Initiative lobby against internet shutdowns and promote youth digital literacy.

    The annual RightsCon summit convenes activists, technologists, and policymakers, functioning as a “digital UN for civil society.”
    Such spaces counterbalance corporate and state power, embodying participatory governance in cyberspace.

    Emerging Concepts: Digital Self Determination and Data Justice

    Digital self-determination—a concept gaining traction in Switzerland and at the UN—posits that communities, not just individuals, should govern data that affects them.
    Meanwhile, the Data Justice Lab (Cardiff University) argues for data justice: fairness in how data are collected, used, and shared (Dencik et al., 2019).
    This perspective reframes privacy from an individual commodity to a collective right linked to power and equity.


    5.13: The Digital Age and the Struggle for Human Rights is shared under a not declared license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?