Switch to: Citations

Add references

You must login to add references.
  1. A theory of justice.John Rawls - unknown
    Though the revised edition of A Theory of Justice, published in 1999, is the definitive statement of Rawls's view, so much of the extensive literature on Rawls's theory refers to the first edition.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   4023 citations  
  • A Theory of Justice: Revised Edition.John Rawls - 1999 - Harvard University Press.
    Previous edition, 1st, published in 1971.
  • Group privacy.Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.) - 2016 - Springer Verlag.
    The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the different approaches and methods that can be used to address them. In doing so, it will help the reader to gain a better grasp of the ethical and legal conundrums posed by group profiling. The volume first maps the (...)
    No categories
  • Philosophical Arguments.Charles Taylor - 1997 - Philosophical Quarterly 47 (186):94-96.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   177 citations  
  • Actions, intentions, and consequences: The doctrine of doing and allowing.Warren S. Quinn - 1989 - Philosophical Review 98 (3):287-312.
  • National self-determination.Avishai Margalit & Joseph Raz - 1990 - Journal of Philosophy 87 (9):439-461.
  • Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through providing a definition (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Risky Killing and the Ethics of War.Seth Lazar - 2015 - Ethics 126 (1):91-117.
    Killing civilians is worse than killing soldiers. Although this principle is widely affirmed, recent military practice and contemporary just war theory have undermined it. This article argues that killing an innocent person is worse the likelier it was, when you acted, that he would be innocent: riskier killings are worse than less risky killings. In war, killing innocent civilians is almost always riskier than killing innocent soldiers. So killing innocent civilians is worse than killing innocent soldiers. Since almost all civilians (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Moral Status and Agent-Centred Options.Seth Lazar - 2019 - Utilitas 31 (1):83-105.
    If we were required to sacrifice our own interests whenever doing so was best overall, or prohibited from doing so unless it was optimal, then we would be mere sites for the realisation of value. Our interests, not ourselves, would wholly determine what we ought to do. We are not mere sites for the realisation of value — instead we, ourselves, matter unconditionally. So we have options to act suboptimally. These options have limits, grounded in the very same considerations. Though (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • A Liberal Defence of (Some) Duties to Compatriots.Seth Lazar - 2010 - Journal of Applied Philosophy 27 (3):246-257.
    This paper asks whether we can defend associative duties to our compatriots that are grounded solely in the relationship of liberal co-citizenship. The sort of duties that are especially salient to this relationship are duties of justice, duties to protect and improve the institutions that constitute that relationship, and a duty to favour the interests of compatriots over those of foreigners. Critics have argued that the liberal conception of citizenship is too insubstantial to sustain these duties — indeed, that it (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Program explanation: a general perspective.Frank Jackson & Alonso Church - 1990 - Analysis 50 (2):107.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   121 citations  
  • Program explanation: A general perspective.Frank Jackson & Philip Pettit - 1990 - Analysis 50 (2):107-17.
    Some properties are causally relevant for a certain effect, others are not. In this paper we describe a problem for our understanding of this notion and then offer a solution in terms of the notion of a program explanation.
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   216 citations  
  • What is a (social) structural explanation?Sally Haslanger - 2016 - Philosophical Studies 173 (1):113-130.
    A philosophically useful account of social structure must accommodate the fact that social structures play an important role in structural explanation. But what is a structural explanation? How do structural explanations function in the social sciences? This paper offers a way of thinking about structural explanation and sketches an account of social structure that connects social structures with structural explanation.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   138 citations  
  • The Biopolitical Public Domain: the Legal Construction of the Surveillance Economy.Julie E. Cohen - 2018 - Philosophy and Technology 31 (2):213-233.
    Within the political economy of informational capitalism, commercial surveillance practices are tools for resource extraction. That process requires an enabling legal construct, which this essay identifies and explores. Contemporary practices of personal information processing constitute a new type of public domain—a repository of raw materials that are there for the taking and that are framed as inputs to particular types of productive activity. As a legal construct, the biopolitical public domain shapes practices of appropriation and use of personal information in (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • The Biopolitical Public Domain: the Legal Construction of the Surveillance Economy.Julie E. Cohen - 2018 - Philosophy and Technology 31 (2):213-233.
    Within the political economy of informational capitalism, commercial surveillance practices are tools for resource extraction. That process requires an enabling legal construct, which this essay identifies and explores. Contemporary practices of personal information processing constitute a new type of public domain—a repository of raw materials that are there for the taking and that are framed as inputs to particular types of productive activity. As a legal construct, the biopolitical public domain shapes practices of appropriation and use of personal information in (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Privacy in the digital age: comparing and contrasting individual versus social approaches towards privacy.Marcel Becker - 2019 - Ethics and Information Technology 21 (4):307-317.
    This paper takes as a starting point a recent development in privacy-debates: the emphasis on social and institutional environments in the definition and the defence of privacy. Recognizing the merits of this approach I supplement it in two respects. First, an analysis of the relation between privacy and autonomy teaches that in the digital age more than ever individual autonomy is threatened. The striking contrast between on the one hand offline vocabulary, where autonomy and individual decision making prevail, and on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Technologically scaffolded atypical cognition: The case of YouTube’s recommender system.Mark Alfano, Amir Ebrahimi Fard, J. Adam Carter, Peter Clutton & Colin Klein - 2020 - Synthese (1-2):1-24.
    YouTube has been implicated in the transformation of users into extremists and conspiracy theorists. The alleged mechanism for this radicalizing process is YouTube’s recommender system, which is optimized to amplify and promote clips that users are likely to watch through to the end. YouTube optimizes for watch-through for economic reasons: people who watch a video through to the end are likely to then watch the next recommended video as well, which means that more advertisements can be served to them. This (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  • Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Direct download  
     
    Export citation  
     
    Bookmark   29 citations  
  • Coercion.Alan Wertheimer - 1989 - Ethics 99 (3):642-644.
     
    Export citation  
     
    Bookmark   121 citations