Switch to: References

Citations of:

The Virtuous Spy

The Monist 91 (1):3-22 (2008)

Add citations

You must login to add citations.
  1. A bibliometric analysis of privacy and ethics in IEEE Security and Privacy.Jonathan Tse, Dawn E. Schrader, Dipayan Ghosh, Tony Liao & David Lundie - 2015 - Ethics and Information Technology 17 (2):153-163.
    The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical and technological dimensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Young people online and the social value of privacy.Valerie Steeves & Priscilla Regan - 2014 - Journal of Information, Communication and Ethics in Society 12 (4):298-313.
    Purpose– The purpose of this paper is to develop a conceptual framework to contextualize young people’s lived experiences of privacy and invasion online. Social negotiations in the construction of privacy boundaries are theorized to be dependent on individual preferences, abilities and context-dependent social meanings.Design/methodology/approach– Empirical findings of three related Ottawa-based studies dealing with young people’s online privacy are used to examine the benefits of online publicity, what online privacy means to young people and the social importance of privacy. Earlier philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • An Eye for an Eye: Proportionality and Surveillance.Kevin Macnish - 2015 - Ethical Theory and Moral Practice 18 (3):529-548.
    It is often claimed that surveillance should be proportionate, but it is rarely made clear exactly what proportionate surveillance would look like beyond an intuitive sense of an act being excessive. I argue that surveillance should indeed be proportionate and draw on Thomas Hurka’s work on proportionality in war to inform the debate on surveillance. After distinguishing between the proportionality of surveillance per se, and surveillance as a particular act, I deal with objections to using proportionality as a legitimate ethical (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • The Ethics of Online Military Information Activities.Justin S. Hempson-Jones - 2018 - Journal of Military Ethics 17 (4):211-223.
    ABSTRACTThis article argues that new forms of conducting military information activities using the Internet require renewed consideration of the ethical frameworks in which conduct of such activities can be grounded: frameworks that require these operations to be considered on their own terms rather than as a subset of wider categories. In this online context the article explores the interlinked areas of proportionality and privacy, delineations between combatant and non-combatant, and limits to acceptable deceptive practices. The article argues that the “soft” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Care ethics and the responsible management of power and privacy in digitally enhanced disaster response.Paul Hayes & Damian Jackson - 2020 - Journal of Information, Communication and Ethics in Society 18 (1):157-174.
    PurposeThis paper aims to argue that traditional ethical theories used in disaster response may be inadequate and particularly strained by the emergence of new technologies and social media, particularly with regard to privacy. The paper suggests incorporation of care ethics into the disaster ethics nexus to better include the perspectives of disaster affected communities.Design/methodology/approachThis paper presents a theoretical examination of privacy and care ethics in the context of social media/digitally enhanced disaster response.FindingsThe paper proposes an ethics of care can fruitfully (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Just Surveillance? Towards a Normative Theory of Surveillance.Kevin Macnish - 2014 - Surveillance and Society 12 (1):142-153.
    Despite recent growth in surveillance capabilities there has been little discussion regarding the ethics of surveillance. Much of the research that has been carried out has tended to lack a coherent structure or fails to address key concerns. I argue that the just war tradition should be used as an ethical framework which is applicable to surveillance, providing the questions which should be asked of any surveillance operation. In this manner, when considering whether to employ surveillance, one should take into (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations