Results for 'seclusion theory of privacy'

960 found
Order:
  1. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  2.  3
    A Buddhist Theory of Privacy.Soraj Hongladarom - 2016 - Singapore: Imprint: Springer.
    This book offers a new way to justify privacy based on a theory derived from Buddhist insights. It uses insights obtained from the Buddhist teachings on Non-Self to create an alternative theory of privacy. In doing so, the author first spells out the inherent differences between the Buddhist insights and the beliefs underlying conventional theories of privacy. While Buddhism views the self as existing conventionally through interactions with others, as well as through interrelations with other (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  3. Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   71 citations  
  4. An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  6. An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  8.  16
    A Theory of the Nature and Value of Privacy.Jeffery L. Johnson - 1992 - Public Affairs Quarterly 6 (3):271-288.
  9.  19
    Revisiting Moor's Towards a Theory of Privacy in the Information Age.Florence Appel - 2010 - Acm Sigcas Computers and Society 40 (2):31-34.
    Back in 1988, when my department chair encouraged me to pursue my interest in developing a course on the social and ethical impact of computing, I was thrilled at the prospect but had no idea how difficult it would be to find resources to support my teaching. I did some pre-Web digging and found two organizations that delivered on their promises to provide me with valuable sources of material: ACM SIGCAS and CPSR. I quickly joined each group, subscribed to each (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  10. Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  11. Katharina Nieswandt, Concordia University. Authority & Interest in the Theory Of Right - 2019 - In Toh Kevin, Plunkett David & Shapiro Scott (eds.), Dimensions of Normativity: New Essays on Metaethics and Jurisprudence. New York: Oxford University Press.
     
    Export citation  
     
    Bookmark  
  12.  33
    Annabelle Lever: On Privacy: Routledge, 2011. ix and 100 pp. $22.95 ISBN: 0415395704, $110.00 ISBN: 0415395690.D. Mokrosinska - 2015 - Ethical Theory and Moral Practice 18 (3):665-666.
    “On Privacy” introduces philosophical arguments bearing on contemporary debates about privacy protection. The book, written for a non-academic audience, focuses on the value of privacy. Lever’s approach is refreshing. First, she sidesteps the controversies over defining privacy, settling for concepts generally associated with privacy: seclusion and solitude, anonymity and confidentiality, intimacy and domesticity. Second, Lever moves beyond the traditional arguments that value privacy because it protects the interests of individuals: what is at stake (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  8
    Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.Colin J. Bennett - 1991 - Science, Technology and Human Values 16 (1):51-69.
    Public policies designed to regulate the use of information technology to protect personal data have been based on different theoretical assumptions in different states, depending on whether the problem is defined in technological, civil libertarian, or bureaucratic terms. However, the rapid development, dispersal, and decentralization of information technology have facilitated a range of new surveillance practices that have in turn rendered the approaches of the 1960s and 1970s obsolete. The networking of the postindustrial state will require a reconceptualization of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  14.  27
    Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns.Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107-123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers' (...) concerns relates to fairness judgments, which in turn comprise of the two primary components of distributive and procedural justice. Second, we make a number of prescriptions, aimed at both firms and regulators, based on the notion that consumers respond to perceived privacy violations in much the same way they would respond to an unfair exchange. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  15.  15
    Rites of Privacy and the Privacy Trade: On the Limits of Protection for the Self.Elizabeth Neill - 2001 - Mcgill-Queen's University Press.
    In Rites of Privacy and the Privacy Trade Neill constructs an original theory of natural rights and human dignity to ground our right to privacy, arguing that privacy and autonomy are innate natural properties metaphorically represented on the moral level and socially bestowed. She develops her position by drawing on works in history, sociology, metaphor, law, and the moral psychology of Lawrence Kohlberg. The resulting theory provides surprising answers to controversial and pressing questions regarding, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Philosophical Dimensions of Privacy: An Anthology.Ferdinand David Schoeman (ed.) - 1984 - New York: Cambridge University Press.
    The aim of compiling the various essays presented here is to make readily accessible many of the most significant and influential discussions of privacy to be found in the literature. In addition to being representative of the diversity of attitudes toward privacy, this collection has a coherence that results from the authors' focus on the same issues and theories. The main issue addressed in this book is the moral significance of privacy. Some social science and legal treatments (...)
  17.  47
    Towards an alternative concept of privacy.Christian Fuchs - 2011 - Journal of Information, Communication and Ethics in Society 9 (4):220-237.
    PurposeThere are a lot of discussions about privacy in relation to contemporary communication systems (such as Facebook and other “social media” platforms), but discussions about privacy on the internet in most cases misses a profound understanding of the notion of privacy and where this notion is coming from. The purpose of this paper is to challenge the liberal notion of privacy and explore foundations of an alternative privacy conception.Design/methodology/approachA typology of privacy definitions is elaborated (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  18.  96
    Marketing dataveillance and digital privacy: Using theories of justice to understand consumers' online privacy concerns. [REVIEW]Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107 - 123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers’ (...) concerns relates to fairness judgments, which in turn comprise of the two primary components of distributive and procedural justice. Second, we make a number of prescriptions, aimed at both firms and regulators, based on the notion that consumers respond to perceived privacy violations in much the same way they would respond to an unfair exchange. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  19.  65
    The Value of Privacy.Beate Roessler - 2005 - Polity Press.
    This new book by Beate Rossler is a work of real quality and originality on an extremely topical issue: the issue of privacy and the relations between the private and the public. Rossler investigates the reasons why we value privacy and why we ought to value it. In the context of modern, liberal societies, Rossler develops a theory of the private which links privacy and autonomy in a constitutive way: privacy is a necessary condition to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   22 citations  
  20.  43
    Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  21.  90
    A Democratic Conception of Privacy.Annabelle Lever - 2013 - Authorhouse, UK.
    Carol Pateman has said that the public/private distinction is what feminism is all about. I tend to be sceptical about categorical pronouncements of this sort, but this book is a work of feminist political philosophy and the public/private distinction is what it is all about. It is motivated by the belief that we lack a philosophical conception of privacy suitable for a democracy; that feminism has exposed this lack; and that by combining feminist analysis with recent developments in political (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  22.  57
    A cognitive access definition of privacy.Madison Powers - 1996 - Law and Philosophy 15 (4):369 - 386.
    Many of the contemporary disagreements regarding privacy are conceptual in nature. They concern the meaning or definition of privacy and the analytic basis of distinguishing privacy rights from other kinds of rights recognized within moral, political, or legal theories. The two main alternatives within this debate include reductionist views, which seek a narrow account of the kinds of invasions or intrusions distinctly involving privacy losses, and anti-reductionist theories, which treat a much broader array of interferences with (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  23.  46
    The Value of Privacy.Beate Roessler - 2004 - Polity.
    This new book by Beate Rossler is a work of real quality and originality on an extremely topical issue: the issue of privacy and the relations between the private and the public. Rossler investigates the reasons why we value privacy and why we ought to value it. In the context of modern, liberal societies, Rossler develops a theory of the private which links privacy and autonomy in a constitutive way: privacy is a necessary condition to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   32 citations  
  24.  19
    A critical contribution to theoretical foundations of privacy studies.Thomas Allmer - 2011 - Journal of Information, Communication and Ethics in Society 9 (2):83-101.
    PurposeAlthough there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  25.  70
    An Ethical Exploration of Privacy and Radio Frequency Identification.Alan R. Peslak - 2005 - Journal of Business Ethics 59 (4):327-345.
    This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  26.  4
    Adoption of mobile health services using the unified theory of acceptance and use of technology model: Self-efficacy and privacy concerns.Yizhi Liu, Xuan Lu, Gang Zhao, Chengjiang Li & Junyi Shi - 2022 - Frontiers in Psychology 13.
    Mobile health services have been widely used in medical services and health management through mobile devices and multiple channels, such as smartphones, wearable equipment, healthcare applications, and medical platforms. However, the number of the users who are currently receiving the mHealth services is small. In China, more than 70% of internet users have never used mHealth services. Such imbalanced situation could be attributed to users’ traditional concept of medical treatment, psychological factors and privacy concerns. The purpose of this study (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. The Liberal Value of Privacy.Boudewijn de Bruin - 2010 - Law and Philosophy 29 (5):505-534.
    This paper presents an argument for the value of privacy that is based on a purely negative concept of freedom only. I show that privacy invasions may decrease a person’s negative freedom as well as a person’s knowledge about the negative freedom she possesses. I argue that not only invasions that lead to actual interference, but also invasions that lead to potential interference (many cases of identity theft) constitute actual harm to the invadee’s liberty interests, and I critically (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  28.  16
    The Liberal Value of Privacy.Boudewijn Bruin - 2010 - Law and Philosophy 29 (5):505-534.
    This paper presents an argument for the value of privacy that is based on a purely negative concept of freedom only. I show that privacy invasions may decrease a person’s negative freedom as well as a person’s knowledge about the negative freedom she possesses. I argue that not only invasions that lead to actual interference, but also invasions that lead to potential interference (many cases of identity theft) constitute actual harm to the invadee’s liberty interests, and I critically (...)
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  29.  33
    A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  30.  18
    Law and the philosophy of privacy.Annabelle Lever - 2017 - Contemporary Political Theory 16 (3):402-404.
    This is a frustrating book: on the one hand, it promises a new outlook on the philosophy of privacy, based upon the work of Luciano Floridi and Baruch Spinoza, which is a welcome extension of the sources used to think about privacy in contemporary political philosophy; on the other hand, it virtually ignores the existing literature on the philosophy and law of privacy. As the presentation of the legal and philosophical issues tends to be schematic, it is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31.  33
    The concept of privacy from a symbolic interaction perspective.W. H. Foddy & W. R. Finighan - 1980 - Journal for the Theory of Social Behaviour 10 (1):1–18.
    Privacy is defined within a symbolic interaction framework in terms of identity definition and maintenance processes. It is argued that defining privacy within a symbolic interaction framework both generates a number of hypotheses involving the concept of privacy and allows the theorist to draw together several social psychological concepts within the one conceptual schema.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  32.  2
    The Data Privacy Law of Brexit: Theories of Preference Change.Paul M. Schwartz - 2021 - Theoretical Inquiries in Law 22 (2):111-152.
    Upon Brexit, the United Kingdom chose to follow the path of EU data protection and remain tied to the requirements of the General Data Protection Regulation (GDPR). It even enacted the GDPR into its domestic law. This Article evaluates five models relating to preference change, demonstrating how they identify different dimensions of Brexit while providing a rich explanation of why a legal system may or may not reject an established transnational legal order. While market forces and a “Brussels Effect” played (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  5
    Perspective and Boundary Exploration of Privacy Transfer Dilemma in Brain–Computer Interface—Dimension Based on Ethical Matrix.Tong-Kuo Zhang - 2024 - Philosophies 9 (1):10.
    The advent of intelligent technologies, notably Brain–Computer Interfaces (BCIs), has introduced novel privacy dilemmas. Ensuring judicious privacy transfer is imperative for the application of BCI technology and pivotal for fostering economic and technological progress. This study adopts privacy transfer as the research perspective and employs an ethical matrix as the research method. It establishes BCI users as the central core interests, with marketers, developers, and medical personnel as stakeholders. Departing from the binary opposition of public and private (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34. A Theory of Freedom.Stanley I. Benn - 1988 - Cambridge University Press.
    This book is a major contribution to the study of the philosophy of action, moral philosophy, and political philosophy. Its central idea is a radically unorthodox theory of rational action. Most contemporary Anglo-American philosophers believe that action is motivated by desire. Professor Benn rejects the doctrine and replaces it with a reformulation of Kant's ethical and political theory, in which rational action can be determined simply by principles, regardless of consequences. The book analyzes the way in which value (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   49 citations  
  35.  15
    Lost in translation? Conceptions of privacy and independence in the technical development of AI-based AAL.Kris Vera Hartmann, Nadia Primc & Giovanni Rubeis - 2023 - Medicine, Health Care and Philosophy 26 (1):99-110.
    AAL encompasses smart home technologies that are installed in the personal living environment in order to support older, disabled, as well as chronically ill people with the goal of delaying or reducing their need for nursing care in a care facility. Artificial intelligence (AI) is seen as an important tool for assisting the target group in their daily lives. A literature search and qualitative content analysis of 255 articles from computer science and engineering was conducted to explore the usage of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  13
    The racialization of privacy: racial formation as a family affair.Jessica Vasquez-Tokos & Priscilla Yamin - 2021 - Theory and Society 50 (5):717-740.
    A right to family privacy is considered a cornerstone of American life, and yet access to it is apportioned by race. Our notion of the “racialization of privacy” refers to the phenomenon that family privacy, including the freedom to create a family uninhibited by law, pressure, and custom, is delimited by race. Building upon racial formation theory, this article examines three examples: the Native American boarding school system (1870s to 1970s), eugenic laws and practices (early/mid 1900s), (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  41
    The Moral Intensity of Privacy: An Empirical Study of Webmasters' Attitudes. [REVIEW]Thomas R. Shaw - 2003 - Journal of Business Ethics 46 (4):301 - 318.
    Webmasters are a key moral agent in the issue of privacy. This study attempts to understand the factors underlying their attitudes about privacy based on the theory of moral intensity. Webmasters of high-traffic sites were invited via email to participate in a web-based survey. The results support the application of moral intensity to the domain of privacy and the population of webmasters - both outcomes and social norms have statistically significant main effects on attitudes. The results (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  39. The importance of privacy revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
    James Rachels’ seminal paper “ Why Privacy Is Important ” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40. Bios Theoretikos.Bios Politikos: Theory, Practice & the Challenges of A. Nigerian Tradition Of Philosophy - 2018 - In Adeshina Afolayan (ed.), Philosophy and National Development in Nigeria: Towards a Tradition of Nigerian Philosophy. Routledge.
    No categories
     
    Export citation  
     
    Bookmark  
  41. The nature and value of the.Moral Right To Privacy - 2002 - Public Affairs Quarterly 16 (4):329.
     
    Export citation  
     
    Bookmark  
  42.  32
    Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  7
    Neoliberalism and the jurisprudence of privacy: An experiment in feminist theorizing.Sophia Jane Mihic - 2008 - Feminist Theory 9 (2):165-184.
    This essay demonstrates, and critiques, the pervasiveness of economic assumptions in the jurisprudence of privacy in US constitutional law as it extends from birth control and abortion rights to the so-called right to die. Finding in these cases metaphors of neoliberal productive practices and the assumption of the self as human capital, the self understood as a site of investment rather than a repository of worth, the essay brings privacy law into conversation with Kristin Luker's empirical work on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  49
    Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract.Kirsten E. Martin - 2012 - Journal of Business Ethics 111 (4):519-539.
    A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce more practical guidance for organizations and managers who have employees, users, and future customers all with possibly different conceptions of privacy across contexts. However, this theoretical suggestion, while intuitively appealing, has not been (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  45.  5
    Just Interpretations: Law Between Ethics and Politics.Michel Rosenfeld & Professor of Human Rights and Director Program on Global and Comparative Constitutional Theory Michel Rosenfeld - 1998 - Univ of California Press.
    "An important contribution to contemporary jurisprudential debate and to legal thought more generally, Just Interpretations is far ahead of currently available work."--Peter Goodrich, author of Oedipus Lex "I was struck repeatedly by the clarity of expression throughout the book. Rosenfeld's description and criticism of the recent work of leading thinkers distinguishes his work within the legal theory genre. Furthermore, his own theory is quite original and provocative."--Aviam Soifer, author of Law and the Company We Keep.
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  46.  89
    A republican account of the value of privacy.Andrew Roberts - 2015 - European Journal of Political Theory 14 (3):320-344.
    This article provides an account of the value of privacy in securing the republican aims of self-government and conditions of non-domination. It describes how loss of privacy might lead to subjugation to dominating power. The republican concept of domination provides the foundation of a broad and coherent account of the value of privacy. One that encompasses circumstances in which the subject suffers interference as a result of the loss, is aware that he has suffered a loss of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  47.  9
    A Theory of Language and Mind.Ermanno Bencivenga - 1997 - University of California Press.
    In his most recent book, Ermanno Bencivenga offers a stylistically and conceptually exciting investigation of the nature of language, mind, and personhood and the many ways the three connect. Bencivenga, one of the most iconoclastic voices to emerge in contemporary American philosophy, contests the basic assumptions of analytic (and also, to an extent, postmodern) approaches to these topics. His exploration leads through fascinating discussions of education, courage, pain, time and history, selfhood, subjectivity and objectivity, reality, facts, the empirical, power and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  16
    Which Privacy Policy Works, Privacy Assurance or Personalization Declaration? An Investigation of Privacy Policies and Privacy Concerns.Fue Zeng, Qing Ye, Zhilin Yang, Jing Li & Yiping Amy Song - 2020 - Journal of Business Ethics 176 (4):781-798.
    This study focuses on two specific privacy policies, namely privacy assurance and personalization declaration. Specifically, we investigate how these distinct privacy policies affect customers’ privacy concerns and subsequent purchase responses. We have developed a conceptual model that addresses the independent effects of privacy assurance and personalization declaration, as well as the mechanism of these effects. Our model is grounded in motivation theory and supported by a field experiment and a controlled experiment. Our study demonstrates (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  41
    Protecting Privacy in an Information Age: The Problem of Privacy in Public.Helen Nissenbaum - 1998 - Law and Philosophy 17 (5-6):559-596.
    Direct download  
     
    Export citation  
     
    Bookmark   40 citations  
  50.  69
    The Negotiative Theory of Gender Identity and the Limits of First-Person Authority.Burkay Ozturk - 2022 - In Raja Halwani, Jacob M. Held, Natasha McKeever & Alan Soble (eds.), The Philosophy of Sex: Contemporary Readings, 8th edition. Lanham, Md.: Rowman & Littlefield. pp. 261-281.
    This paper assesses the first-person authority account (FPA) of gender, according to which X's self-identification of what X's gender is, is the final say on what X's gender is, such that if others disagree, they are mistaken. One main reason in support of FPA is respecting X's autonomy—that is, overriding X's self-identification amounts to denying X's autonomy. Ozturk criticizes this view using analogies of religious and patriotic self-identifications, such that there are cases in which someone can permissibly claim that another (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 960