David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
In this essay, I consider the relationship between the rights to privacy and security and argue that, in a sense to be made somewhat more precise below, that threats to the right to security outweighs comparable threats to privacy. My argument begins with an assessment of ordinary case judgments and an explanation of the important moral distinction between intrinsic value (i.e., value as an end) and instrumental value (i.e., value as a means), arguing that each approach assigns more moral value, other things being equal, to security interests than to privacy interests. I then consider the issue from with a number of mainstream approaches to normative theories of state legitimacy, including social contract theories (new and old), utilitarian theories, Scanlon's contractualism, and various communitarian theories assign security rights a higher place on the moral hierarchy than privacy rights. I then conclude that, under ordinary intuitions and each of these theories, security interests trump (or outweigh) privacy interests when the two come into “direct” conflict – although I make no attempt to give an algorithm or theory for answering the important question of when these interests come into direct conflict and how to weigh them when, say, minor interests in security conflict with major interests in privacy.
|Keywords||No keywords specified (fix it)|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library||
References found in this work BETA
No references found.
Citations of this work BETA
Kay Mathiesen (2013). The Internet, Children, and Privacy: The Case Against Parental Monitoring. [REVIEW] Ethics and Information Technology 15 (4):263-274.
Similar books and articles
Alan L. Lockwood (1977). Values Education and the Right to Privacy. Journal of Moral Education 7 (1):9-26.
Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1):1-30.
Paul El Khoury Luca Compagna, Fabio Massacci Alžběta Krausová & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1).
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
Ferdinand David Schoeman (ed.) (1984). Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press.
Anders J. Persson & Sven Ove Hansson (2003). Privacy at Work – Ethical Criteria. Journal of Business Ethics 42 (1):59 - 70.
Lucas Introna & Athanasia Pouloudi (1999). Privacy in the Information Age: Stakeholders, Interests and Values. [REVIEW] Journal of Business Ethics 22 (1):27 - 38.
Steven Davis (2009). Is There a Right to Privacy? Pacific Philosophical Quarterly 90 (4):450-475.
Paul B. Thompson (2001). Privacy, Secrecy and Security. Ethics and Information Technology 3 (1):13-19.
Added to index2009-01-28
Total downloads84 ( #16,566 of 1,100,145 )
Recent downloads (6 months)8 ( #33,348 of 1,100,145 )
How can I increase my downloads?