David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Ezio Di Nucci
Jack Alan Reynolds
Learn more about PhilPapers
Ethics and Behavior 7 (3):195 – 205 (1997)
What marks the traditional privacy torts of disclosure, intrusion, false light, and appropriation is that they require an invasion, an intrinsic harm caused by someone doing something to us without our consent. But we are now voluntarily giving up information about ourselves--to our physicians, for instance--that is being gathered into databases that are brought and sold and that can be appropriated by those who wish to assume our identities. The way in which our privacy is put at risk is different, and this leads to a new understanding of the concept of privacy. Others appropriate our identities, treating us as objects; by doing so, our standing as autonomous moral agents, controlling how we present ourselves to the world, is thus denied.
|Keywords||No keywords specified (fix it)|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
Judith Jarvis Thomson (1975). The Right to Privacy. Philosophy and Public Affairs 4 (4):295-314.
Citations of this work BETA
David W. Shoemaker (2010). Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity. [REVIEW] Ethics and Information Technology 12 (1):3-15.
Similar books and articles
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
Lawrence O. Gostin (2001). Health Information: Reconciling Personal Privacy with the Public Good of Human Health. [REVIEW] Health Care Analysis 9 (3):321-335.
Edmund Wall (2011). Privacy and the Moral Right to Personal Autonomy. International Journal of Applied Philosophy 25 (1):69-85.
Jennifer Hendry & Kay Goodall, Facebook and the Commercialisation of Personal Information: Some Questions of Provider-to-User Privacy.
Steven Davis (2009). Is There a Right to Privacy? Pacific Philosophical Quarterly 90 (4):450-475.
Chris Toumey (2007). Privacy in the Shadow of Nanotechnology. NanoEthics 1 (3):211-222.
Luciano Floridi (2005). The Ontological Interpretation of Informational Privacy. Ethics and Information Technology 7 (4):185-200.
Norman Mooradian (2009). The Importance of Privacy Revisited. Ethics and Information Technology 11 (3):163-174.
Herman T. Tavani (1999). Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1 (2):137-145.
Added to index2009-01-28
Total downloads28 ( #133,969 of 1,789,925 )
Recent downloads (6 months)1 ( #423,018 of 1,789,925 )
How can I increase my downloads?