This study investigated the link between meditation, self-reported mindfulness and cognitive flexibility as well as other attentional functions. It compared a group of meditators experienced in mindfulness meditation with a meditation-naïve control group on measures of Stroop interference and the “d2-concentration and endurance test”. Overall the results suggest that attentional performance and cognitive flexibility are positively related to meditation practice and levels of mindfulness. Meditators performed significantly better than non-meditators on all measures of attention. Furthermore, self-reported mindfulness was higher in (...) meditators than non-meditators and correlations with all attention measures were of moderate to high strength. This pattern of results suggests that mindfulness is intimately linked to improvements of attentional functions and cognitive flexibility. The relevance of these findings for mental balance and well-being are discussed. (shrink)
Bodily privacy, understood as a right to control access to one’s body, capacities, and powers, is one of our most cherished rights − a right enshrined in law and notions of common morality. Informational privacy, on the other hand, has yet to attain such a loftily status. As rational project pursuers, who operate and flourish in a world of material objects it is our ability control patterns of association and disassociation with our fellows that afford each of us the room (...) to become distinct individuals. Privacy, whether physical or informational, is valuable for beings like us. Establishing the truth this claim will be the primary focus of this article. Providing reasons, evidence, and support for this claim will take us into the historical and cultural dimensions of privacy. (shrink)
"Provides a definition and defense of individual privacy rights. Applies the proposed theory to issues including privacy versus free speech; drug testing; and national security and public accountability"--Provided by publisher.
We all know that Google stores huge amounts of information about everyone who uses its search tools, that Amazon can recommend new books to us based on our past purchases, and that the U.S. government engaged in many data-mining activities during the Bush administration to acquire information about us, including involving telecommunications companies in monitoring our phone calls. Control over access to our bodies and to special places, like our homes, has traditionally been the focus of concerns about privacy, but (...) access to information about us is raising new challenges for those anxious to protect our privacy. In _Privacy Rights,_ Adam Moore adds informational privacy to physical and spatial privacy as fundamental to developing a general theory of privacy that is well grounded morally and legally. (shrink)
Some rights are so important for human autonomy and well-being that many scholars insist they should not be waived, traded, or abandoned. Privacy is a recent addition to this list. At the other end of the spectrum is the belief that privacy is a mere unimportant interest or preference. This paper defends a middle path between viewing privacy as an inalienable, non-waivable, non-transferrable right and the view of privacy as a mere subjective interest. First, an account of privacy is offered (...) that clarifies the concept and demonstrates how privacy is directly related to human health and well-being. Second, along with considering and rejecting several accounts for why privacy might be considered an inalienable right, an argument is offered for why it is morally permissible to waive, transfer, abandon, or alienate privacy. (shrink)
In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made such surveillance relatively unobtrusive. Video (...) monitoring, global positioning systems, airport body scanners, and biometric technologies, along with data surveillance, provide law enforcement officials with monitoring tools, without also unduly burdening those being watched. Against this view are those who maintain that we should be worried about trading privacy for security. Criminals and terrorists, it is argued, are nowhere near as dangerous as governments. There are too many examples for us to deny Lord Acton’s dictum that “power tends to corrupt, and absolute power corrupts absolutely.” If information control yields power and total information awareness radically expands that power, then we have good reason to pause before trading privacy for security. (shrink)
While the balance between individual privacy and government monitoring or corporate surveillance has been a frequent topic across numerous disciplines, the issue of privacy within the family has been largely ignored in recent privacy debates. Yet privacy intrusions between parents and children or between adult partners or spouses can be just as profound as those found in the more “public spheres” of life. Popular access to increasingly sophisticated forms of electronic surveillance technologies has altered the dynamics of family relationships. Monitoring, (...) mediated and facilitated by practices of both covert and overt electronic surveillance, has changed the nature of privacy within the family. Parents are tracking children via GPS-enabled cell phone tracking software and are monitoring the Internet use of family members. Parents, siblings, and children are also posting information about their family members online, often without consent, and are creating social media profiles for others online. Prior scholarly work in philosophy and law has primarily addressed the privacy of children from third parties, usually commercial entities, and in the context of making medical decisions. Less attention has been directed at exploring a more general right of privacy of one family member against parents, siblings, children, or spouses. In this article, we do just that. We consider several moral rules that determine appropriate privacy boundaries within the family. More specifically, we will consider when overt or covert surveillance of a child, spouse, or partner by an adult family member is morally permitted. (shrink)
While autonomy arguments provide a compelling foundation for free speech, they also support individual privacy rights. Considering how speech and privacy may be justified, I will argue that the speech necessary for self-government does not need to include details that would violate privacy rights. Additionally, I will argue that if viewed as a kind of intangible property right, informational privacy should limit speech and expression in a range of cases. In a world where we have an overabundance of content to (...) consume, much of which could be called “information pollution,” and where there are numerous platforms to broadcast one’s expressions, it is increasingly difficult to maintain that speech should trump privacy. (shrink)
This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these important individual and social values.
A two-systems model of moral judgment proposed by Joshua Greene holds that deontological moral judgments (those based on simple rules concerning action) are often primary and intuitive, and these intuitive judgments must be overridden by reflection in order to yield utilitarian (consequence-based) responses. For example, one dilemma asks whether it is right to push a man onto a track in order to stop a trolley that is heading for five others. Those who favor pushing, the utilitarian response, usually take longer (...) to respond than those who oppose pushing. Greene's model assumes an asymmetry between the processes leading to different responses. We consider an alternative model based on the assumption of symmetric conflict between two response tendencies. By this model, moral dilemmas differ in the "difficulty" of giving a utilitarian response and subjects differ in the "ability" (tendency) to give such responses. (We could just as easily define ability in terms of deontological responses, as the model treats the responses symmetrically.) We thus make an analogy between moral dilemmas and tests of cognitive ability, and we apply the Rasch model, developed for the latter, to estimate the ability-difficulty difference for each dilemma for each subject. We apply this approach to five data sets collected for other purposes by three of the co-authors. Response time (RT), including yes and no responses, is longest when difficulty and ability match, because the subject is indifferent between the two responses, which also have the same RT at this point. When we consider yes/no responses, RT is longest when the model predicts that the response is improbable. Subjects with low ability take longer on the "easier" dilemmas, and vice versa. (shrink)
In this article I address the tension between evaluative surveillance and privacy against the backdrop of the current explosion of information technology. More specifically, and after a brief analysis of privacy rights, I argue that knowledge of the different kinds ofsurveillance used at any given company should be made explicit to the employees. Moreover, there will be certain kinds of evaluativemonitoring that violate privacy rights and should not be used in most cases.
The work of William Sewell and Marshall Sahlins has led to a growing interest in recent years in events as a category of analysis and their role in the transformation of social structures. I argue that tying events solely to instances of significant structural transformation entails problematic theoretical assumptions about stability and change and produces a circumscribed field of events, undercutting the goal of developing an "eventful" account of social life. Social continuity is a state that is achieved just as (...) much as are structural transformations, and events may be constitutive of processes of reproduction as well as change. (shrink)
As the expansion of the Internet and the digital formatting of all kinds of creative works move us further into the information age, intellectual property issues have become paramount. Computer programs costing thousands of research dollars are now copied in an instant. People who would recoil at the thought of stealing cars, computers, or VCRs regularly steal software or copy their favorite music from a friend's CD. Since the Web has no national boundaries, these issues are international concerns. The contributors-philosophers, (...) legal theorists, and business scholars, among others-address questions such as: Can abstract ideas be owned? How does the violation of intellectual property rights compare to the violation of physical property rights? Can computer software and other digital information be protected? And how should legal systems accommodate the ownership of intellectual property in an information age? Intellectual Property is a lively examination of these and other issues, and an invaluable resource for librarians, lawyers, businesspeople, and scholars. (shrink)
In this article I address the tension between evaluative surveillance and privacy against the backdrop of the current explosion of information technology. More specifically, and after a brief analysis of privacy rights, I argue that knowledge of the different kinds ofsurveillance used at any given company should be made explicit to the employees. Moreover, there will be certain kinds of evaluativemonitoring that violate privacy rights and should not be used in most cases.
The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...) why privacy is morally valuable. In the remaining sections, several privacy protecting principles are defended that would limit various sorts of neuro-surveillance promised by advancements in neuroscience. (shrink)
In the United States the ascendancy of speech protection is due to an expansive and unjustified view of the value or primacy of free expression and access to information. This is perhaps understandable, given that privacy has been understood as a mere interest, whereas speech rights have been seen as more fundamental. I have argued elsewhere that the “mere interest” view of privacy is false. Privacy, properly defined, is a necessary condition for human well-being or flourishing. The opening section of (...) this article will provide an overview of this theory. Next, after a few remarks on speech absolutism, privacy absolutism, and balancing theories, I will sketch several of the dominant argument strands that have been offered in support of presumptively weighty speech rights. While these arguments, taken together, establish that free speech is important, they do not support the view that speech should nearly always trump privacy. In final section I will present and defend a way to balance free speech and privacy claims. (shrink)
Setting aside various foundational moral entanglements, I will offer an argument for the protection of intellectual property based on individual self-interest and prudence. In large part, this argument will parallel considerations that arise in a prisoner’s dilemma game. After sketching the salient features of a prisoner’s dilemma, I will briefly examine the nature of intellectual property and how one can view content creation, exclusion, and access as a prisoner’s dilemma. In brief, allowing content to be unprotected in terms of free (...) access leads to a sub-optimal outcome where creation and innovation are suppressed. Finally, I will argue that adopting the institutions of copyright, patent, and trade secret is one way we can avoid these sub-optimal results. (shrink)
Aside from making a few weak, and hopefully widely shared claims about the value of privacy, transparency, and accountability, we will offer an argument for the protection of privacy based on individual self-interest and prudence. In large part, this argument will parallel considerations that arise in a prisoner’s dilemma game. After briefly sketching an account of the value of privacy, transparency, and accountability, along with the salient features of a prisoner’s dilemma games, a game-theory analysis will be offered. In a (...) game where both players want privacy and to avoid transparency and the associated accountability, the dominant action will be to foist accountability and transparency on the other player while attempting to retain one’s own privacy. Simply put, if both players have the ability or power to make the other more accountable and transparent, they will do so for the same reasons that player’s defect in a prisoner’s dilemma game. Ultimately this will lead to a sub-optimal outcome of too much accountability and transparency. While there are several plausible solutions to prisoner dilemma games, we will offer both technical, as well as, law and policy solutions. We need to change the payoffs of the game so that is it in everyone’s interest to balance privacy and accountability rather than foisting transparency on others. (shrink)
This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy, turning then to consider cases which illustrate when and how privacy may be overridden by public health concerns.