Results for 'privacy, equality, surveillance, counter terrorism, democracy, security'

1000+ found
Order:
  1. Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like‐minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions ‐ including our (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Democracy and Security.Annabelle Lever - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International.
    This chapter is concerned with the role of democracy in preventing terrorism, identifying and apprehending terrorists, and in minimizing and alleviating the damage created by terrorism.1 Specifically, it considers the role of democracy as a resource, not simply a limitation, on counterterrorism.2 I am mainly concerned with the ways in which counterterrorism is similar to more familiar forms of public policy, such as the prevention of crime or the promotion of economic prosperity, and so nothing that I say turns on (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  3. Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Democracy and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63 (4):99-110.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  5.  90
    Messy morality: The challenge of politics – by C. A. J. Coady the trouble with terror: Liberty, security and the response to terrorism – by Tamar Meisels terrorism and counter-terrorism: Ethics and liberal democracy – by Seumas Miller. [REVIEW]Paul Gilbert - 2009 - Journal of Applied Philosophy 26 (4):418-420.
  6. Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made such surveillance (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  7.  22
    Rethinking surveillance and control : beyond the "security versus privacy" debate.Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.) - 2017 - Baden-Baden: Nomos.
    This book is based on the premise that the trade-off between privacy and security is both unsound and conceals important aspects of surveillance and control. Accordingly, the authors analyse the symbiotic relationship between liberty and security, and the emptiness of both concepts when considered in isolation. They explore and contextualise different notions of risk, surveillance practices and the value of the rights to private life and data protection. Thereby, they show that surveillance and control neither necessarily attain (...), nor always pose a threat to privacy and, conversely, that protecting privacy does not necessarily hamper security provision. Moreover, they appreciate how surveillance and control, mediated through technology, express and sustain specific power relationships. The book thus offers a kaleidoscope of perspectives, ranging from critical studies to international relations, law, philosophy and sociology, to rethink surveillance and control. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  14
    Life After Privacy: Reclaiming Democracy in a Surveillance Society.Firmin DeBrabander - 2020 - Cambridge University Press.
    Privacy is gravely endangered in the digital age, and we, the digital citizens, are its principal threat, willingly surrendering it to avail ourselves of new technology, and granting the government and corporations immense power over us. In this highly original work, Firmin DeBrabander begins with this premise and asks how we can ensure and protect our freedom in the absence of privacy. Can—and should—we rally anew to support this institution? Is privacy so important to political liberty after all? DeBrabander makes (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  15
    Theorizing Privacy in a Liberal Democracy: Canadian Jurisprudence, Anti-Terrorism, and Social Memory After 9/11.Valerie Steeves - 2019 - Theoretical Inquiries in Law 20 (1):323-341.
    The creation of new search powers in the Canadian Anti-Terrorism Act post-9/11 to make citizens more transparent to state surveillance was less a new phenomenon than an extension of preexisting tendencies to make citizens transparent to the state, so the risks they pose can be efficiently managed. However, 9/11 brought about a shift in the ways in which the Supreme Court of Canada talked about terrorism; terrorism was no longer placed on a continuum of criminal activity but was elevated to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  18
    Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma.H. M. Verhelst, A. W. Stannat & G. Mecacci - 2020 - Science and Engineering Ethics 26 (6):2975-2984.
    Rapid advancements in machine learning techniques allow mass surveillance to be applied on larger scales and utilize more and more personal data. These developments demand reconsideration of the privacy-security dilemma, which describes the tradeoffs between national security interests and individual privacy concerns. By investigating mass surveillance techniques that use bulk data collection and machine learning algorithms, we show why these methods are unlikely to pinpoint terrorists in order to prevent attacks. The diverse characteristics of terrorist attacks—especially when considering (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Mrs. Aremac and the camera: A response to Ryberg.Annabelle Lever - 2008 - Res Publica 14 (1):35-42.
    In a recent article in Respublica, Jesper Ryberg argues that CCTV can be compared to a little old lady gazing out onto the street below. This article takes issue with the claim that government surveillance can be justified in this manner. Governments have powers and responsibilities that little old ladies lack. Even if CCTV is effective at preventing crime, there may be less intrusive ways of doing so. People have a variety of legitimate interests in privacy, and protection for these (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  12.  38
    Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Leenes R. Van Brakel R. Gutwirth S. De Hert P. (ed.), Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by Design (MHbD) (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  22
    Security and democratic equality.Brian Milstein - 2021 - Contemporary Political Theory 20 (4):836-857.
    After a recent spate of terrorist attacks in European and American cities, liberal democracies are reintroducing emergency securitarian measures that curtail rights and/or expand police powers. Political theorists who study ESMs are familiar with how such measures become instruments of discrimination and abuse, but the fundamental conflict ESMs pose for not just civil liberty but also democratic equality still remains insufficiently explored. Such phenomena are usually explained as a function of public panic or fear-mongering in times of crisis, but I (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  2
    Terrorism‐as‐Crime.Seumas Miller - 2008-05-30 - In Michael Boylan (ed.), Terrorism and Counter‐Terrorism. Blackwell. pp. 83–116.
    This chapter contains sections titled: Terrorism‐as‐Crime Terrorism‐as‐Crime and Police Institutions Counter‐Terrorism and Human Rights in Liberal Democracies at Peace Conclusion.
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  27
    The Right to Know and the Right Not to Know: Genetic Privacy and Responsibility.Ruth Chadwick, Mairi Levitt & Darren Shickle (eds.) - 2014 - Cambridge University Press.
    The privacy concerns discussed in the 1990s in relation to the New Genetics failed to anticipate the relevant issues for individuals, families, geneticists and society. Consumers, for example, can now buy their personal genetic information and share it online. The challenges facing genetic privacy have evolved as new biotechnologies have developed, and personal privacy is increasingly challenged by the irrepressible flow of electronic data between the personal and public spheres and by surveillance for terrorism and security risks. This book (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  16.  19
    9/11 and the Rise of Global Anti-Terrorism Law: How the Un Security Council Rules the World.Arianna Vedaschi & Kim Lane Scheppele (eds.) - 2021 - Cambridge University Press.
    Twenty years after the outbreak of the threat posed by international jihadist terrorism, which triggered the need for democracies to balance fundamental rights and security needs, 9/11 and the Rise of Global Anti-Terrorism Law offers an overview of counter-terrorism and of the interplay among the main actors involved in the field since 2001. This book aims to give a picture of the complex and evolving interaction between the international, regional and domestic levels in framing counter-terrorism law and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  54
    On Privacy.Annabelle Lever - 2011 - Routledge.
    This book explores the Janus-faced features of privacy, and looks at their implications for the control of personal information, for sexual and reproductive freedom, and for democratic politics. It asks what, if anything, is wrong with asking women to get licenses in order to have children, given that pregnancy and childbirth can seriously damage your health. It considers whether employers should be able to monitor the friendships and financial affairs of employees, and whether we are entitled to know whenever someone (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  18. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  73
    Counter-Majoritarian Democracy: Persistent Minorities, Federalism, and the Power of Numbers.Arash Abizadeh - 2021 - American Political Science Review 115 (3):742-756.
    The majoritarian conception of democracy implies that counter-majoritarian institutions such as federalism—and even representative institutions—are derogations from democracy. The majoritarian conception is mistaken for two reasons. First, it is incoherent: majoritarianism ultimately stands against one of democracy’s core normative commitments—namely, political equality. Second, majoritarianism is premised on a mistaken view of power, which fails to account for the power of numbers and thereby fails to explain the inequality faced by members of persistent minorities. Although strict majority rule serves the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  20.  42
    Terrorism and Counter-Terrorism: Ethics and Liberal Democracy.Bruce Landesman - 2011 - Australasian Journal of Philosophy 89 (2):364 - 367.
    Australasian Journal of Philosophy, Volume 89, Issue 2, Page 364-367, June 2011.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  40
    Preventive Policing, Surveillance, and European Counter-Terrorism.Tom Sorell - 2011 - Criminal Justice Ethics 30 (1):1-22.
    A European Union counter-terrorism strategy was devised in 2005.1 Of its four strands—prevent, pursue, protect, and respond—only two have a direct connection with policing. Perhaps surprisingly, th...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  22.  8
    Counter-Terrorism: Narrative Strategies.Ajit Maan - 2014 - Upa.
    Counter-Terrorism makes a connection, unique to terrorism studies, between the mechanisms of colonizing narratives and psychological warfare aimed at recruitment. There is an urgent need to understand the narrative tactics of terrorist recruitment and an equal if not greater need to destabilize and exploit the weaknesses of those narratives.
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  17
    Privacy and surveillance concerns in machine learning fall prediction models: implications for geriatric care and the internet of medical things.Russell Yang - forthcoming - AI and Society:1-5.
    Fall prediction using machine learning has become one of the most fruitful and socially relevant applications of computer vision in gerontological research. Since its inception in the early 2000s, this subfield has proliferated into a robust body of research underpinned by various machine learning algorithms (including neural networks, support vector machines, and decision trees) as well as statistical modeling approaches (Markov chains, Gaussian mixture models, and hidden Markov models). Furthermore, some advancements have been translated into commercial and clinical practice, with (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  10
    Relationship between Security and Human Rights in Counter-Terrorism: A Case of Introducing Body Scanners in Civil Aviation.Iztok Prezelj - 2015 - International Studies. Interdisciplinary Political and Cultural Journal 17 (1):145-158.
    Changes in security environment after the end of Cold War and 9/11 have strongly affected our security concepts and paradigms. In the field of counter-terrorism, a serious conceptual and practical debate on the relationship between security and human rights and freedoms has begun. The goal of this paper is to reflect on this complex relationship at the conceptual level and introduce the empirical debate on this relationship in the field of civil aviation. The paper’s results show (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25. European urban (counter)terrorism's spacetimematterings: More-than-human materialisations in situationscaping times.Evelien Geerts, Katharina Karcher, Yordanka Dimcheva & Mireya Toribio Medina - 2023 - In Alice Martini & Raquel Da Silva (eds.), Contemporary Reflections on Critical Terrorism Studies. Routledge. pp. 31-52.
    Infusing contemporary critical terrorism studies (CTS) with concepts and methodologies from philosophy and critical theory via a Baradian posthumanist agential realist perspective and (counter)terrorist cases and vignettes, this chapter argues for a retheorisation of (counter)terrorism. It does so, firstly, by reconceptualising terrorism and counterterrorism as complex assemblages consisting not only of discursive-material components – an entanglement now largely accepted within CTS and critical security studies (CSS) – but also of affective layers and more-than-human phenomena. Secondly, by analysing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  56
    Introduction to the Special Issue on the Ethics of State Mass Surveillance.Peter Königs - 2020 - Moral Philosophy and Politics 7 (1):1-8.
    Recent decades have seen an unprecedented proliferation of surveillance programs by government agencies. This development has been driven both by technological progress, which has made large scale surveillance operations relatively cheap and easy, and by the threat of terrorism, organized crime and pandemics, which supplies a ready justification for surveillance. For a long time, mass surveillance programs have been associated with autocratic regimes, most notoriously with the German Democratic Republic and the Stasi, its secret police. A more recent case in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  81
    Rethinking Surveillance and Control. Beyond the 'Security vs. Privacy' Debate.Elisa Orrù, Maria Grazia Porcedda & Sebastian Weydner-Volkmann (eds.) - 2017 - Baden-Baden: Nomos.
    This book is based on the premise that the trade-off between privacy and security is both unsound and con-ceals important aspects of surveillance and control. Accordingly, the authors analyse the symbiotic relati-onship between liberty and security, and the emptiness of both concepts when considered in isolation. They explore and contextualise different notions of risk, surveillance practices and the value of the rights to pri-vate life and data protection. Thereby, they show that surveillance and control neither necessarily attain (...), nor always pose a threat to privacy and, conversely, that protecting privacy does not necessarily hamper security provision. Moreover, they argue that surveillance and control, mediated through technolo-gy, express and sustain specific power relationships. The book offers a kaleidoscope of perspectives, ranging from critical studies to international relations, law, philosophy and sociology, to rethink surveillance and control. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28.  22
    Morphing the counter-terrorist response: Beating the bombers in London’s financial heart.Jon Coaffee - 2003 - Knowledge, Technology & Policy 16 (2):63-83.
    Since the 1970s Western governments have sought to defend selective urban areas from terrorist attack through a plethora of measures aimed at territorially controlling space both physically and technologically where the disruption to the orderly flow of commerce, or other activities, is minimized. Drawing on recent historical accounts, this paper seeks to track the changes to the landscape of Britain’s financial heart, the City of London, from the 1990s to the current day, as its leaders and security agents have (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  23
    How to do Things with Security Post 9/11.Dora Kostakopoulou - 2008 - Oxford Journal of Legal Studies 28 (2):317-342.
    Discourses and the ideas, perceptions and templates upon which they are based exert a powerful influence on law-making, push policy-making in a precise direction and determine operational action and outcomes. British counterterrorist law and policy post 9/11 is heavily mediated through a conceptual filter that evokes a siege mode of democracy, which deliberately displaces the traditional rights-based model, and a security narrative based on a double asymmetry. By blending a discursive theoretical approach with an institutionalist perspective, the discussion examines (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  30.  11
    TRAC: Developing Counterintelligence for Strategic Application into the Counter-Terrorism Space.Andrew D. Henshaw - 2014 - Intelligence Analysis.
    SummaryThe practice of counterintelligence traditionally lies in its application to the function of catching spies, stopping espionage and protecting national security and the national interest. More recently though counterintelligence has matured and is frequently being deployed into fields such as counter-terrorism, however it still remains that counterintelligence is often poorly understood, and the practice of counterintelligence operations in the counter-terrorism space presents new challenges as well as conflicts of purpose with the contemporary partners of intelligence and (...) services such as law enforcement and the military. This article, the first in a series, will discuss issues surrounding the common understanding of counterintelligence, the development and practice of offensive missions, and its role in counter-terrorism from its current functions across intelligence, military and law enforcement spheres, as well as its potential to realize new outcomes. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  37
    Rights in the Context of Counter-Terrorism Measures: United States of America.Andrius Lygutas - 2009 - Jurisprudencija: Mokslo darbu žurnalas 117 (3):145-161.
    The terror attacks of September 11, 2001, facilitated a transformation in federal Governance in the United States of America (hereinafter – the USA). The events of that day showed that the counter-terrorism system of the USA was ineffective. Law enforcement agencies failed to prevent terrorist attacks and thus changes were necessary. The most significant transformations were the following: dozens of new laws were passed; the bureaucracy of the US Government was reorganized; a war was launched to eliminate a sanctuary (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  6
    Flourishing thought: democracy in an age of data hoards.Ruth Austin Miller - 2016 - Ann Arbor: University of Michigan Press.
    Challenging the posthumanist canon which celebrates the pre-eminence of matter, Ruth Miller, inFlourishingThoughtargues that what nonhuman systems contribute to democracy is thought. Drawing on recent feminist theories of nonhuman life and politics, Miller shows that reproduction and flourishing are not antithetical to contemplation and sensitivity. After demonstrating processes of life and processes of thought are indistinguishable, Miller finds that four menacing accumulations of matter and information--global surveillance, stored embryos, human clones, and reproductive trash--are politically productive rather than threats to democratic (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. Privacy, democracy and the politics of disease surveillance.Amy L. Fairchild, Ronald Bayer & James Colgrove - 2008 - Public Health Ethics 1 (1):30-38.
    Fairchild, Center for the History and Ethics of Public Health in the Department of Sociomedical Sciences at Columbia University's Mailman School of Public Health Abstract Surveillance is a cornerstone of public health. It permits us to recognize disease outbreaks, to track the incidence and prevalence of threats to public health, and to monitor the effectiveness of our interventions. But surveillance also challenges our understandings of the significance and role of privacy in a liberal democracy. In this paper we trace the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  34.  24
    Wanting it all – public perceptions of the effectiveness, cost, and privacy of surveillance technology.Michelle Cayford, Wolter Pieters & P. H. A. J. M. van Gelder - 2019 - Journal of Information, Communication and Ethics in Society 18 (1):10-27.
    Purpose This study aims to explore how the public perceives the effectiveness of surveillance technology, and how people’s views on privacy and their views on effectiveness are related. Likewise, it looks at the relation between perceptions of effectiveness and opinions on the acceptable cost of surveillance technology. Design/methodology/approach For this study, surveys of Dutch students and their parents were conducted over three consecutive years. Findings A key finding of this paper is that the public does not engage in a trade-off (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Sven Ove Hansson and Elin Palm, eds., The Ethics of Workplace Privacy Reviewed by.Annabelle Lever - 2006 - Philosophy in Review 26 (5):348-350.
  36. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2014 - In Beaete Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 January]1 Effective (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  20
    Security and privacy of adolescents in social applications and networks: legislative aspects and legal practice of countering cyberbullying on example of developed and developing countries.Ahmad Ghandour, Viktor Shestak & Konstantin Sokolovskiy - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):433-445.
    Purpose This paper aims to study the developed countries’ experience on the cyberbullying legal regulation among adolescents, to identify existing shortcomings in the developing countries’ laws and to develop recommendations for regulatory framework improvement. Design/methodology/approach The authors have studied the state regulatory practice of the UK, the USA, Canada, Malaysia, South Africa, Turkey, UAE and analyzed the statistics of 2018 on the cyberbullying manifestation among adolescents in these countries. Findings The study results can encourage countries to create separate cyberbullying legislation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  47
    The moral dimension of asymmetrical warfare: counter-terrorism, democratic values and military ethics.Ted van Baarda & Désirée Verweij (eds.) - 2009 - Boston: Martinus Nijhoff.
    PART I The superpower and asymmetry PART II Jus ad bellum, jus in bello, jus post bellum PART III Leadership and accountability PART IV Soldiersa (TM) ...
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  32
    Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare.George R. Lucas - 2016 - New York, US: Oxford University Press USA.
    From North Korea's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. Indeed, like terrorism, cyber warfare is commonly believed to be a war without rules. Given the prevalence cyber warfare, developing a practical moral code for this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  12
    Life After Privacy: Reclaiming Democracy in a Surveillance Society.Dan Steinberg - 2021 - Kennedy Institute of Ethics Journal 31 (4):31-39.
    In “Life After Privacy: Reclaiming Democracy in a Surveillance Society,” Firmin DeBrabander proposes that the stakes associated with the loss of personal privacy are even higher than is generally acknowledged. Personal privacy is a compelling issue, and his review of it is engaging and accessible. He is successful in demonstrating that powerful forces—corporations, governments, and partisan activists—have many ways of intruding on our private lives and thoughts. DeBrabander’s largest contribution to the ongoing dialogue about privacy, however, is an assertion that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  42. Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  43. Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva 2005 (nov):1-31.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people’s freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  44.  21
    Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva - An Internet Journal of Philosophy 9 (1).
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of solitude, intimacy and confidentiality and shows that, so described, people have legitimate interests in privacy. These interests are both personal and political, and provide the grounds for two different justifications of privacy rights. Though both are based on democratic concerns for the freedom and equality of individuals, these two justifications for privacy (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  45.  17
    Life after privacy: Reclaiming democracy in a surveillance society.Lowry Pressly - forthcoming - Contemporary Political Theory:1-4.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46. Must Privacy and Sexual Equality Conflict? A Philosophical Examination of Some Legal Evidence.Annabelle Lever - 2000 - Social Research: An International Quarterly 67:1137-1172.
    This paper examines MacKinnon’s claims about the relationship of rights to privacy and equality in light of the reasoning in Harris and Bowers. When we contrast the Majority and Minority decisions in these cases, it shows, we can distinguish interpretations of the right to privacy that are consistent with sexual equality from those that are not. This is not simply because the two differ in their consequences – though they do - but because the former, unlike the latter, rely on (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  33
    Workplace surveillance, privacy and distributive justice.Lucas D. Introna - 2000 - Acm Sigcas Computers and Society 30 (4):33-39.
    Modern technologies are providing unprecedented opportunities for surveillance. In the workplace surveillance technology is being built into the very infrastructure of work. Can the employee legitimately resist this increasingly pervasive net of surveillance? The employers argue that workplace surveillance is essential for security, safety, and productivity in increasingly competitive markets. They argue that they have a right to ensure that they 'get what they pay for', furthermore, that the workplace is a place of 'work' which by its very definition (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Data mining to combat terrorism and the roots of privacy concerns.Frans A. J. Birrer - 2005 - Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  9
    Democracy and the death of shame: political equality and social disturbance.Jill Locke - 2016 - New York, NY: Cambridge University Press.
    Is shame dead? With personal information made so widely available, an eroding public/private distinction, and a therapeutic turn in public discourse, many seem to think so. People across the political spectrum have criticized these developments and sought to resurrect shame in order to protect privacy and invigorate democratic politics. Democracy and the Death of Shame reads the fear that 'shame is dead' as an expression of anxiety about the social disturbance endemic to democratic politics. Far from an essential supplement to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  50.  12
    “The Circumstances of Democracy”: Why Random Selection Is Not Better Than Elections if We Value Political Equality and Privacy.Annabelle Lever - 2023 - Washington University Review of Philosophy 3:100-114.
    Elections are generally considered the only way to create a democratic legislature where direct democracy is not an option. However, in recent years that assumption has been challenged by individuals who claim that lotteries are a democratic way of selecting people for office, elections are aristocratic or oligarchic, not democratic, and that elections as we know them are inadequate if true democracy is prioritized. In opposition to this wave, my paper argues that the assertions made to support the democratic merits (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000