|Abstract||In this essay, I consider the relationship between the rights to privacy and security and argue that, in a sense to be made somewhat more precise below, that threats to the right to security outweighs comparable threats to privacy. My argument begins with an assessment of ordinary case judgments and an explanation of the important moral distinction between intrinsic value (i.e., value as an end) and instrumental value (i.e., value as a means), arguing that each approach assigns more moral value, other things being equal, to security interests than to privacy interests. I then consider the issue from with a number of mainstream approaches to normative theories of state legitimacy, including social contract theories (new and old), utilitarian theories, Scanlon's contractualism, and various communitarian theories assign security rights a higher place on the moral hierarchy than privacy rights. I then conclude that, under ordinary intuitions and each of these theories, security interests trump (or outweigh) privacy interests when the two come into “direct” conflict – although I make no attempt to give an algorithm or theory for answering the important question of when these interests come into direct conflict and how to weigh them when, say, minor interests in security conflict with major interests in privacy.|
|Keywords||No keywords specified (fix it)|
|Through your library||Only published papers are available at libraries|
Similar books and articles
Alan L. Lockwood (1977). Values Education and the Right to Privacy. Journal of Moral Education 7 (1):9-26.
Steven Davis (2009). Is There a Right to Privacy? Pacific Philosophical Quarterly 90 (4):450-475.
Lucas Introna & Athanasia Pouloudi (1999). Privacy in the Information Age: Stakeholders, Interests and Values. Journal of Business Ethics 22 (1):27 - 38.
Anders J. Persson & Sven Ove Hansson (2003). Privacy at Work – Ethical Criteria. Journal of Business Ethics 42 (1):59 - 70.
Ferdinand David Schoeman (ed.) (1984). Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press.
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
Paul El Khoury Luca Compagna, Fabio Massacci Alžběta Krausová & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1).
Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1):1-30.
Paul B. Thompson (2001). Privacy, Secrecy and Security. Ethics and Information Technology 3 (1):13-19.
Added to index2009-01-28
Total downloads58 ( #16,866 of 549,087 )
Recent downloads (6 months)2 ( #37,333 of 549,087 )
How can I increase my downloads?