Switch to: References

Add citations

You must login to add citations.
  1. Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the thought (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • The importance of privacy revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
    James Rachels’ seminal paper “ Why Privacy Is Important ” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, speech, and values: what we have no business knowing.Adam D. Moore - 2016 - Ethics and Information Technology 18 (1):41-49.
    In the United States the ascendancy of speech protection is due to an expansive and unjustified view of the value or primacy of free expression and access to information. This is perhaps understandable, given that privacy has been understood as a mere interest, whereas speech rights have been seen as more fundamental. I have argued elsewhere that the “mere interest” view of privacy is false. Privacy, properly defined, is a necessary condition for human well-being or flourishing. The opening section of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, Interests, and Inalienable Rights.Adam D. Moore - 2018 - Moral Philosophy and Politics 5 (2):327-355.
    Some rights are so important for human autonomy and well-being that many scholars insist they should not be waived, traded, or abandoned. Privacy is a recent addition to this list. At the other end of the spectrum is the belief that privacy is a mere unimportant interest or preference. This paper defends a middle path between viewing privacy as an inalienable, non-waivable, non-transferrable right and the view of privacy as a mere subjective interest. First, an account of privacy is offered (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Free speech, privacy, and autonomy.Adam D. Moore - 2020 - Social Philosophy and Policy 37 (2):31-51.
    While autonomy arguments provide a compelling foundation for free speech, they also support individual privacy rights. Considering how speech and privacy may be justified, I will argue that the speech necessary for self-government does not need to include details that would violate privacy rights. Additionally, I will argue that if viewed as a kind of intangible property right, informational privacy should limit speech and expression in a range of cases. In a world where we have an overabundance of content to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Defining privacy.Adam Moore - 2008 - Journal of Social Philosophy 39 (3):411-428.
  • Privacy and the Integrity of Liberal Politics: The Case of Governmental Internet Searches.Dorota Mokrosinska - 2014 - Journal of Social Philosophy 45 (3):369-389.
  • Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy.Dorota Mokrosinska - 2018 - Law and Philosophy 37 (2):117-143.
    One of the most influential views in privacy scholarship is that privacy protects individual autonomy. On the early liberal view, the exercise of autonomy requires detachment from social and political life and privacy facilitates it. This view of privacy still informs current legal and political practice. As this view of privacy presupposes a tension between privacy and society, it is responsible for the underrating of privacy in legal and political practice. Over the last decades, liberal reflection on autonomy has shifted (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • A Defense of Privacy as Control.Leonhard Menges - 2021 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions about moral responsibility.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • The Internet, children, and privacy: the case against parental monitoring.Kay Mathiesen - 2013 - Ethics and Information Technology 15 (4):263-274.
    It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Human Rights for the Digital Age.Kay Mathiesen - 2014 - Journal of Mass Media Ethics 29 (1):2-18.
    Human rights are those legal and/or moral rights that all persons have simply as persons. In the current digital age, human rights are increasingly being either fulfilled or violated in the online environment. In this article, I provide a way of conceptualizing the relationships between human rights and information technology. I do so by pointing out a number of misunderstandings of human rights evident in Vinton Cerf's recent argument that there is no human right to the Internet. I claim that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  • Epistemic restraint and the vice of curiosity.Neil C. Manson - 2012 - Philosophy 87 (2):239-259.
    In recent years there has been wide-ranging discussion of epistemic virtues. Given the value and importance of acquiring knowledge this discussion has tended to focus upon those traits that are relevant to the acquisition of knowledge. This acquisitionist focus ignores or downplays the importance of epistemic restraint: refraining from seeking knowledge. In contrast, in many periods of history, curiosity was viewed as a vice. By drawing upon critiques of curiositas in Middle Platonism and Early Christian philosophy, we gain useful insights (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Why Extending Actions through Time Can Violate a Moral Right to Privacy.Björn Lundgren - 2021 - Journal of Ethics and Social Philosophy 20 (1):111-118.
    Recently, Ingmar Persson and Julian Savulescu argued that an action that does not violate a moral right to privacy cannot violate that right if it is extended over time. Specifically, they argue that a moral right to privacy does not protect against gawking or stalking. In this reply the reverse position is defended. Specifically, it is argued that their arguments fails on according to their own definition of the right to privacy. Furthermore, it is argued and illustrated by examples that (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • A Dilemma for Privacy as Control.Björn Lundgren - 2020 - The Journal of Ethics 24 (2):165-175.
    Although popular, control accounts of privacy suffer from various counterexamples. In this article, it is argued that two such counterexamples—while individually resolvable—can be combined to yield a dilemma for control accounts of privacy. Furthermore, it is argued that it is implausible that control accounts of privacy can defend against this dilemma. Thus, it is concluded that we ought not define privacy in terms of control. Lastly, it is argued that since the concept of privacy is the object of the right (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing of justice and the effective (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  • Anti-Theism and the Objective Meaningful Life Argument.Kirk Lougheed - 2017 - Dialogue 56 (2).
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  • A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Brain Privacy, Intimacy, and Authenticity: Why a Complete Lack of the Former Might Undermine Neither of the Latter!Kasper Lippert-Rasmussen - 2017 - Res Publica 23 (2):227-244.
    In recent years, neuroscience has been making dramatic progress. The discipline holds great promise but also raises a number of important ethical concerns. Among these is the concern that, some day in the distant future, we will have brain scanners capable of reading our minds, thus making our inner thoughts transparent to others. There are at least two reasons why we might regret our resulting loss of privacy. One is, so the argument goes, that this would undermine our ability to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Permissible Secrets.Hugh Lazenby & Iason Gabriel - 2018 - Philosophical Quarterly 68 (271):265-285.
    This article offers an account of the information condition on morally valid consent in the context of sexual relations. The account is grounded in rights. It holds that a person has a sufficient amount of information to give morally valid consent if, and only if, she has all the information to which she has a claim-right. A person has a claim-right to a piece of information if, and only if, a. it concerns a deal-breaker for her; b. it does not (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • The transparent self.Marjolein Lanzing - 2016 - Ethics and Information Technology 18 (1):9-16.
    This paper critically engages with new self-tracking technologies. In particular, it focuses on a conceptual tension between the idea that disclosing personal information increases one’s autonomy and the idea that informational privacy is a condition for autonomous personhood. I argue that while self-tracking may sometimes prove to be an adequate method to shed light on particular aspects of oneself and can be used to strengthen one’s autonomy, self-tracking technologies often cancel out these benefits by exposing too much about oneself to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  • Epistemological dimensions of informational privacy.Klemens Kappel - 2013 - Episteme 10 (2):179-192.
    It seems obvious that informational privacy has an epistemological component; privacy or lack of privacy concerns certain kinds of epistemic relations between a cogniser and sensitive pieces of information. One striking feature of the fairly substantial philosophical literature on informational privacy is that the nature of this epistemological component of privacy is only sparsely discussed. The main aim of this paper is to shed some light on the epistemological component of informational privacy.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • You’ve got a friend in me: sociable robots for older adults in an age of global pandemics.Nancy S. Jecker - 2020 - Ethics and Information Technology 23 (S1):35-43.
    Social isolation and loneliness are ongoing threats to health made worse by the coronavirus disease 2019 pandemic. During the pandemic, half the globe's population have been placed under strict physical distancing orders and many long-term care facilities serving older adults went into lockdown mode, restricting access to all visitors, including family members. Before the pandemic emerged, a 2020 National Academy of Sciences, Engineering and Medicine report warned of the underappreciated adverse effects of social isolation and loneliness on health, especially among (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy in the information age: Stakeholders, interests and values. [REVIEW]Lucas Introna & Athanasia Pouloudi - 1999 - Journal of Business Ethics 22 (1):27 - 38.
    Privacy is a relational and relative concept that has been defined in a variety of ways. In this paper we offer a systematic discussion of potentially different notions of privacy. We conclude that privacy as the freedom or immunity from the judgement of others is an extremely useful concept to develop ways in which to understand privacy claims and associated risks. To this end, we develop a framework of principles that explores the interrelations of interests and values for various stakeholders (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of our lives or shrinking it to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   42 citations  
  • Privacy and the Right to Privacy.H. J. McCloskey - 1980 - Philosophy 55 (211):17 - 38.
    The right to privacy is one of the rights most widely demanded today. Privacy has not always so been demanded. The reasons for the present concern for privacy are complex and obscure. They obviously relate both to the possibilities for very considerable enjoyment of privacy by the bulk of people living in affluent societies brought about by twentieth-century affluence, and to the development of very efficient methods of thoroughly and systematically invading this newly found privacy. However, interesting and important as (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Treating sensitive topics online: a privacy dilemma.Paula Helm - 2018 - Ethics and Information Technology 20 (4):303-313.
    This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Was Snowden virtuous?Clive Harfield - 2021 - Ethics and Information Technology 23 (3):373-383.
    Professor Shannon Vallor’s theoretical framework of technomoral virtue ethics identifies character traits that can be cultivated to foster a future worth wanting in an environment of emerging technologies. Such technologies and increased citizen participation in the new digital environment have reconfigured what is possible in policing and intelligence-gathering more quickly, perhaps, than sober and sensible policy reflection and formulation can keep pace with. Sensational and dramatic, seismic and devastating, the Snowden disclosures represent a particular expression of dissent against American intelligence (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Secrecy, transparency and government whistleblowing.William H. Harwood - 2017 - Philosophy and Social Criticism 43 (2):164-186.
    In the first part of the 21st century, the complicated relationship between transparency and security reached a boiling point with revelations of extra-judicial CIA activities, near universal NSA monitoring and unprecedented whistleblowing – and prosecution of whistleblowers under the Espionage Act. This article examines the dual necessities of security and transparency for any democracy, and the manner in which whistleblowers radically saddle this Janus-faced relationship. Then I will move to contemporary examples of whistleblowing, showing how and why some prove more (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Where should we draw the line between quality of care and other ethical concerns related to medical registries and biobanks?Mats Hansson - 2012 - Theoretical Medicine and Bioethics 33 (4):313-323.
    Together with large biobanks of human samples, medical registries with aggregated data from many clinical centers are vital parts of an infrastructure for maintaining high standards of quality with regard to medical diagnosis and treatment. The rapid development in personalized medicine and pharmaco-genomics only underscores the future need for these infrastructures. However, registries and biobanks have been criticized as constituting great risks to individual privacy. In this article, I suggest that quality with regard to diagnosis and treatment is an inherent, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • P2p networks and the verizon V. RIAA case: Implications for personal privacy and intellectual property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.
    In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Chips, tags and scanners: Ethical challenges for radio frequency identification. [REVIEW]Dara J. Glasser, Kenneth W. Goodman & Norman G. Einspruch - 2007 - Ethics and Information Technology 9 (2):101-109.
    Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention of identifying the technology’s benefits and possible misuses. We offer an (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy and the Importance of ‘Getting Away With It’.Cressida Gaukroger - 2020 - Journal of Moral Philosophy 17 (4):416-439.
    One reason people value privacy is that it allows them to do or think bad things – things that, if made public, would warrant blame, censure, or punishment. Privacy protects several types of freedom – and one of these is the freedom to be bad. This paper will argue that this is a good thing.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy Invasion by the News Media: Three Ethical Models.Candace Cummins Gauthier - 2002 - Journal of Mass Media Ethics 17 (1):20-34.
    In this article I provide an overview of philosophical conceptions of privacy and suggest 3 models to assist with the ethical analysis of privacy invasion by the news media. The models are framed by respect for persons, the comparison of harms and benefits, and the transfer of power. After describing the models, I demonstrate how they can be applied to news reporting that invades the privacy of public figures.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Towards an alternative concept of privacy.Christian Fuchs - 2011 - Journal of Information, Communication and Ethics in Society 9 (4):220-237.
    PurposeThere are a lot of discussions about privacy in relation to contemporary communication systems (such as Facebook and other “social media” platforms), but discussions about privacy on the internet in most cases misses a profound understanding of the notion of privacy and where this notion is coming from. The purpose of this paper is to challenge the liberal notion of privacy and explore foundations of an alternative privacy conception.Design/methodology/approachA typology of privacy definitions is elaborated based on Giddens' theory of structuration. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Wrongful Observation.Helen Frowe & Jonathan Parry - 2019 - Philosophy and Public Affairs 47 (1):104-137.
    According to common-sense morality, agents can become morally connected to the wrongdoing of others, such that they incur special obligations to prevent or rectify the wrongs committed by the primary wrongdoer. We argue that, under certain conditions, voluntary and unjustified observation of another agent’s degrading wrongdoing, or of the ‘product’ of their wrongdoing, can render an agent morally liable to bear costs for the sake of the victim of the primary wrong. We develop our account with particular reference to widespread (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • AI Recruitment Algorithms and the Dehumanization Problem.Megan Fritts & Frank Cabrera - 2021 - Ethics and Information Technology (4):1-11.
    According to a recent survey by the HR Research Institute, as the presence of artificial intelligence (AI) becomes increasingly common in the workplace, HR professionals are worried that the use of recruitment algorithms will lead to a “dehumanization” of the hiring process. Our main goals in this paper are threefold: i) to bring attention to this neglected issue, ii) to clarify what exactly this concern about dehumanization might amount to, and iii) to sketch an argument for why dehumanizing the hiring (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   57 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  • Cyberspace: The final frontier? [REVIEW]Patrick Sean Liam Flanagan - 1999 - Journal of Business Ethics 19 (1):115 - 122.
    The science fiction series of the '70's, Star Trek, began all its telecastings with the announcement "Space: The Final Frontier." Star Trek chronicled the voyage of a crew navigating their way through space. For the travelers, space seemed like the last unknown entity that needed to be investigated. As they journeyed, they learned of the boundless nature of space. Each episode portrayed a group of folks encountering new situations, attempting to solve another problem, or strategizing how to overcome an obstacle.While (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Bibliographical essay / privacy and criminal justice policies.Ferdinand D. Schoeman - 1983 - Criminal Justice Ethics 2 (2):71-82.
  • Privacy and Intimacy.David Elliott & Eldon Soifer - 2010 - Journal of Value Inquiry 44 (4):489-497.
  • What Peeping Tom Did Wrong.John Draeger - 2011 - Ethical Theory and Moral Practice 14 (1):41-49.
    Voyeurism seems creepy. This paper considers whether these feelings are well-founded. It identifies a variety of ethically troubling features, including harmful consequences, deceit, and the violation of various religious, legal, and conventional norms. Voyeurism is something of a moral misdemeanor that seems worrisome when associated with these other failings. However, because voyeurism remains troubling even in the absence of harm or deceit, we must pay special attention to the ways complex social conventions can be used to show disrespect for others. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Asking for Facebook Logins: An Egoist Case for Privacy.John R. Drake - 2016 - Journal of Business Ethics 139 (3):429-441.
    With the advent of social networking websites, privacy concerns have reached a new high. One particularly problematic concern entails employers requesting login credentials to popular social media platforms. While many people may consider this request unethical, they may not agree on the reasons it is unethical. One reason may be to blame the behavior on egoism. Egoism, however, comes in multiple flavors, not all of which would agree that violating privacy is acceptable. In this paper, we articulate how one egoist (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Ethics of Biosurveillance.S. K. Devitt, P. W. J. Baxter & G. Hamilton - 2019 - Journal of Agricultural and Environmental Ethics 32 (5):709-740.
    Governments must keep agricultural systems free of pests that threaten agricultural production and international trade. Biosecurity surveillance already makes use of a wide range of technologies, such as insect traps and lures, geographic information systems, and diagnostic biochemical tests. The rise of cheap and usable surveillance technologies such as remotely piloted aircraft systems presents value conflicts not addressed in international biosurveillance guidelines. The costs of keeping agriculture pest-free include privacy violations and reduced autonomy for farmers. We argue that physical and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark