Switch to: References

Citations of:

Secrets: on the ethics of concealment and revelation

New York: Oxford University Press (1982)

Add citations

You must login to add citations.
  1. Knowing Persons.David Matheson - 2010 - Dialogue 49 (3):435-453.
    There is an intuitive distinction between knowing someone in a detached manner and knowing someone in a more intimate fashion — personally. The latter seems to involve the specially active participation of the person known in a way that the former does not. In this paper I present a novel, communication account of knowing someone personally that successfully explains this participation. The account also illuminates the propositional and testimonial character of the personal knowledge of persons, the conditions of limited transferability (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Trust and testimony.Philip J. Nickel - 2012 - Pacific Philosophical Quarterly 93 (3):301-316.
    Some recent accounts of testimonial warrant base it on trust, and claim that doing so helps explain asymmetries between the intended recipient of testimony and other non-intended hearers, e.g. differences in their entitlement to challenge the speaker or to rebuke the speaker for lying. In this explanation ‘dependence-responsiveness’ is invoked as an essential feature of trust: the trustor believes the trustee to be motivationally responsive to the fact that the trustor is relying on the trustee. I argue that dependence-responsiveness is (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • The Political Philosophy of Sissela Bok.Caroline Farey - 1991 - Journal of Applied Philosophy 8 (1):87-94.
    ABSTRACT Sissela Bok's two main works, on lying and secrets, have not received all the attention they deserve. This is possibly because the underlying structure from which she is working is not, at least according to the critics, made sufficiently explicit. I believe that this structure is found in Sissela Bok's commitment to the fundamental tenets of democracy. This not only provides a framework that is clearly discernible but also gives her books an urgency, and supplies the solid basis necessary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The model of the principled advocate and the pathological Partisan: A virtue ethics construct of opposing archetypes of public relations and advertising practitioners.Sherry Baker - 2008 - Journal of Mass Media Ethics 23 (3):235 – 253.
    Drawing upon contemporary virtue ethics theory, The Model of The Principled Advocate and The Pathological Partisan is introduced. Profiles are developed of diametrically opposed archetypes of public relations and advertising practitioners. The Principled Advocate represents the advocacy virtues of humility, truth, transparency, respect, care, authenticity, equity, and social responsibility. The Pathological Partisan represents the opposing vices of arrogance, deceit, secrecy, manipulation, disregard, artifice, injustice, and raw self-interest. One becomes either a Principled Advocate or a Pathological Partisan by habitually enacting or (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Truthfulness and Business.Lubomira Radoilska - 2008 - Journal of Business Ethics 79 (1-2):21 - 28.
    According to a common assumption, truthfulness cannot have an intrinsic value in business. Instead, it is considered only instrumentally valuable for business, because it contributes to successful trust-building. Some authors deny truthfulness even this limited role by claiming that truth-telling is not an essential part of business, which is a sui generis practice like poker. In this article, I argue that truthfulness has indeed an intrinsic value in business and identify the conceptual confusions underlying the opposite view. My account of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The journalist and privacy.Louis Hodges - 1994 - Journal of Mass Media Ethics 9 (4):197 – 212.
    The moral right to privacy consists of the power to determine who may gain access to information about oneself. Individual human beings need some measure of privacy in order to develop a sense of self and to avoid manipulation by the state. Journalists who respect the privacy rights of those on whom they report should especially be careful not to intrude unduly when gathering information, in publishing they should be able to demonstrate a public need to know private information. Individual (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Tackling Hermeneutical Injustices in Gender-Affirming Healthcare.Nick Clanchy - forthcoming - Hypatia.
    Previously proposed strategies for tackling hermeneutical injustices take for granted the interests people have in certain things about them being intelligible to them and/or to others, and seek to enable them to satisfy these interests. Strategies of this sort I call interests-as-given strategies. I propose that some hermeneutical injustices can instead be tackled by doing away with certain of these interests, and so with the possibility of their unfair non-satisfaction. Strategies of this sort I call interests-in-question strategies. As a case (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?Michele Loi, Christian Hauser & Markus Christen - 2020 - Journal of Business Ethics 175 (1):7-19.
    Clients may feel trapped into sharing their private digital data with insurance companies to get a desired insurance product or premium. However, private insurance must collect some data to offer products and premiums appropriate to the client’s level of risk. This situation creates tension between the value of privacy and common insurance business practice. We argue for three main claims: first, coercion to share private data with insurers is pro tanto wrong because it violates the autonomous choice of a privacy-valuing (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Technology as Terrorism: Police Control Technologies and Drone Warfare.Jessica Wolfendale - 2021 - In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21.
    Debates about terrorism and technology often focus on the potential uses of technology by non-state terrorist actors and by states as forms of counterterrorism. Yet, little has been written about how technology shapes how we think about terrorism. In this chapter I argue that technology, and the language we use to talk about technology, constrains and shapes our understanding of the nature, scope, and impact of terrorism, particularly in relation to state terrorism. After exploring the ways in which technology shapes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through providing a definition (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • (1 other version)Conspiracy theories on the basis of the evidence.M. R. X. Dentith - 2019 - Synthese 196 (6):2243-2261.
    Conspiracy theories are often portrayed as unwarranted beliefs, typically supported by suspicious kinds of evidence. Yet contemporary work in Philosophy argues provisional belief in conspiracy theories is—at the very—least understandable (because conspiracies occur) and if we take an evidential approach—judging individual conspiracy theories on their particular merits—belief in such theories turns out to be warranted in a range of cases. Drawing on this work, I examine the kinds of evidence typically associated with conspiracy theories, showing that the evidential problems typically (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  • "You Had to Be There" : The Problem With Reporter Reconstructions.Russell Frank - 1999 - Journal of Mass Media Ethics 14 (3):146-158.
    Newspaper stories that rely on reconstruction of events from police reports, court records, and recollections of witnesses often sacrifice attribution for the sake of immediacy. Such stories make compelling reading, but they mislead readers by erasing the line between information obtained via observation and information obtained from human or documentary sources. This article argues that the lack of attribution is more distracting than it presence--because readers wonder how the reporters know what they know--and calls on reporters to make clear when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Springer. pp. 459-474.
    Experimental design is one aspect of a scientific method. A well-designed, properly conducted experiment aims to control variables in order to isolate and manipulate causal effects and thereby maximize internal validity, support causal inferences, and guarantee reliable results. Traditionally employed in the natural sciences, experimental design has become an important part of research in the social and behavioral sciences. Experimental methods are also endorsed as the most reliable guides to policy effectiveness. Through a discussion of some of the central concepts (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Secrecy and conspiracy.Matthew R. X. Dentith & Martin Orr - 2017 - Episteme 15 (4):433-450.
    In the literature on conspiracy theories, the least contentious part of the academic discourse would appear to be what we mean by a “conspiracy”: a secretive plot between two or more people toward some end. Yet what, exactly, is the connection between something being a conspiracy and it being secret? Is it possible to conspire without also engaging in secretive behavior? To dissect the role of secrecy in con- spiracies – and thus contribute to the larger debate on the epistemology (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Doxing: a conceptual analysis.David M. Douglas - 2016 - Ethics and Information Technology 18 (3):199-210.
    Doxing is the intentional public release onto the Internet of personal information about an individual by a third party, often with the intent to humiliate, threaten, intimidate, or punish the identified individual. In this paper I present a conceptual analysis of the practice of doxing and how it differs from other forms of privacy violation. I distinguish between three types of doxing: deanonymizing doxing, where personal information establishing the identity of a formerly anonymous individual is released; targeting doxing, that discloses (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • (1 other version)Conspiracy theories on the basis of the evidence.Matthew Dentith - 2017 - Synthese:1-19.
    Conspiracy theories are often portrayed as unwarranted beliefs, typically supported by suspicious kinds of evidence. Yet contemporary work in Philosophy argues provisional belief in conspiracy theories is at the very least understandable---because conspiracies occur---and that if we take an evidential approach, judging individual conspiracy theories on their particular merits, belief in such theories turns out to be warranted in a range of cases. -/- Drawing on this work, I examine the kinds of evidence typically associated with conspiracy theories, and show (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  • A justification of whistleblowing.Daniele Santoro & Manohar Kumar - 2017 - Philosophy and Social Criticism 43 (7):669-684.
    Whistleblowing is the act of disclosing information from a public or private organization in order to reveal cases of corruption that are of immediate or potential danger to the public. Blowing the whistle involves personal risk, especially when legal protection is absent, and charges of betrayal, which often come in the form of legal prosecution under treason laws. In this article we argue that whistleblowing is justified when disclosures are made with the proper intent and fulfill specific communicative constraints in (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Authenticity in Political Discourse.Ben Jones - 2016 - Ethical Theory and Moral Practice 19 (2):489-504.
    Judith Shklar, David Runciman, and others argue against what they see as excessive criticism of political hypocrisy. Such arguments often assume that communicating in an authentic manner is an impossible political ideal. This article challenges the characterization of authenticity as an unrealistic ideal and makes the case that its value can be grounded in a certain political realism sensitive to the threats posed by representative democracy. First, by analyzing authenticity’s demands for political discourse, I show that authenticity has greater flexibility (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The most important thing about climate change.John Broome - 2010 - In Jonathan Boston, Andrew Bradstock & David L. Eng (eds.), Public policy: why ethics matters. Acton, A.C.T.: ANUE Press. pp. 101-16.
    This book chapter is not available in ORA, but you may download, display, print and reproduce this chapter in unaltered form only for your personal, non-commercial use or use within your organization from the ANU E Press website.
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Sharing the responsibility of dealing with climate change: Interpreting the principle of common but differentiated responsibilities.Dan Weijers, David Eng & Ramon Das - 2010 - In Jonathan Boston, Andrew Bradstock & David L. Eng (eds.), Public policy: why ethics matters. Acton, A.C.T.: ANUE Press. pp. 141-158.
    In this chapter we first discuss the main principles of justice and note the standard objections to them, which we believe necessitate a hybrid approach. The hybrid account we defend is primarily based on the distributive principle of sufficientarianism, which we interpret as the idea that each country should have the means to provide a minimally decent quality of life for each of its citizens. We argue that sufficientarian considerations give good reason to think that what we call the ‘ability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Place of Knowledge A Methodological Survey.Adi Ophir & Steven Shapin - 1991 - Science in Context 4 (1):3-22.
    A generation ago scientific ideas floated free in the air, as historians gazed up at them in wonder and admiration. From time to time, historians agreed, the ideas that made up the body of scientific truth became incarnate: they were embedded into the fleshly forms of human culture and attached to particular times and places. How this incarnation occurred was a great mystery. How could spirit be made flesh? How did the transcendent and the timeless enter the forms of the (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  • Recommendations for Hosting Audience Comments Based on Discourse Ethics.Yu Zhang & Mark Cenite - 2010 - Journal of Mass Media Ethics 25 (4):293-309.
    As a result of simultaneous developments, including the proliferation of opportunities for online feedback, the application of discourse ethics to journalism, and a greater emphasis on journalistic accountability, the time is ripe for revisiting opportunities that online mechanisms provide for holding journalists accountable to audiences. This paper proposes recommendations to guide hosting online comments in light of the Habermasian framework of discourse ethics developed by Glasser and Ettema (2008). It also explores the limits of such approaches in nations with different (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Are journalistic ethics self-generated?Erling Skorpen - 1989 - Journal of Mass Media Ethics 4 (2):157 – 173.
    Ethicists in and out of the profession have argued that a journalist's precept to report only the truth is deduced, say, from utilitarianism's appeal to social utility or Rawls' appeal to justice as fairness. The mistake in this is indicated by an argument that the physician owes his or her professional ethic to the human need for health and the lawyer's to the human need for justice. The journalist, therefore, may well owe his or her professional regard for truthful reporting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • AIDS: Bioethics and public policy.Udo Schuklenk - 2003 - New Review of Bioethics 1 (1):127-144.
    In few other areas of bioethical inquiry exists as close a connection between bioethical professional advice and policy development as is the case with HIV and AIDS. Historically, the reasons for this have much to do with one of the groups initially affected most severely by HIV and AIDS, namely well-educated middle-class gay men in developed countries. This particular group of people, highly sophisticated and used to political activism in its pursuit of civil rights-related objectives, engaged the medical profession as (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Applying the rules of just war theory to engineers in the arms industry.Aaron Fichtelberg - 2006 - Science and Engineering Ethics 12 (4):685-700.
    Given the close relationship between the modern arms industry and the military, engineers and other professionals who work in the arms industry should be held accountable to the principles of just war theory. While they do not deploy weapons on the battlefield and are not in the military chain of command, technical professionals nonetheless have a moral duty to abide by principles of jus ad bellum and jus in bello. They are morally responsible both for choosing the companies that employ (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Secrets vs. Lies: Is There A Moral Asymmetry?Mahon James - 2018 - In Eliot Michaelson & Andreas Stokke (eds.), Lying: Language, Knowledge, Ethics, and Politics. Oxford: Oxford University Press. pp. 161-182.
    In this chapter I argue that the traditional interpretation of the commonly accepted moral asymmetry between secrets and lies is incorrect. On the standard interpretation of the commonly accepted view, lies are prima facie or pro tango morally wrong, whereas secrets are morally permissible. I argue that, when secrets are distinguished from mere acts of reticence and non-acknowledgement, as well as from acts of deception, so that they are defined as acts of not sharing believed-information while believing that the believed-information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Visibility, transparency and gossip: How did the religion of some (Muslims) become the public concern of others?Valérie Amiraux - 2016 - Critical Research on Religion 4 (1):37-56.
    Over the last 30 years, the publicly visible “otherness” embodied by the Muslim population in the member states of the European Union has sparked movements of transnational public discussions mainly driven by the fear of the collapse of “national cohesion.” This paper engages theoretically with the idea that these debates have become an ordinary trap for European publics, France being the main illustration in the text. It is more specifically concerned with the discussions surrounding the recent ban on the wearing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Al-Fārābī Metaphysics, and the Construction of Social Knowledge: Is Deception Warranted if it Leads to Happiness?Nicholas Andrew Oschman - unknown
    When questioning whether political deception can be ethically warranted, two competing intuitions jump to the fore. First, political deception is a fact of human life, used in the realpolitik of governance. Second, the ethical warrant of truth asserts itself as inexorably and indefatigably preferable to falsehood. Unfortunately, a cursory examination of the history of philosophy reveals a paucity of models to marry these basic intuitions. Some thinkers (e.g., Augustine, Aquinas, Grotius, Kant, Mill, and Rawls) privilege the truth by neglecting the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Effect of Perceived Negative Workplace Gossip on Employees’ Behaviors.Ming Kong - 2018 - Frontiers in Psychology 9:320893.
    Negative workplace gossip generates social undermining and great side effects to employees. But, the damage of negative gossip is mainly aimed at the employee who perceived being targeted. The purpose of this study is to develop a conceptual model in which perceived negative workplace gossip influences employees in-role behavior and organizational citizenship behavior differentially by changing employees’ self-concept (organizational-based self-esteem and perceived insider status). 336 employees from seven Chinese companies were investigated for empirical analysis on proposed hypotheses, and results show (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • When is a lie more of a lie? Moral judgment mediates the relationship between perceived benefits of others and lie-labeling.Piotr Szarota & Katarzyna Cantarero - 2017 - Polish Psychological Bulletin 48 (2):315-325.
    Lay perceptions of lying are argued to consist of a lie prototype. The latter was found to entail the intention to deceive, belief in falsity and falsity. We proposed and found that the perceptions of the benefits of others are also an important factor that influences the extent, to which an act of intentional misleading someone to foster a false belief is labeled as a lie. Drawing from the intuitionist model of moral judgments we assumed that moral judgment of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • (1 other version)A Model for Evaluating Journalist Resistance to Business Constraints.Sandra L. Borden - 2000 - Journal of Mass Media Ethics 15 (3):149-166.
    Should journalists resist business constraints they perceive as a threat to their professional integrity? This article suggests that the answer, at least sometimes, is yes. But in choosing a resistance strategy, journalists should not consider the "take this job and shove it" stance as the only option with moral integrity-or even as the best ethical option. This article develops a model of resistance strategies using the experiences of journalists at one newspaper to illustrate the range of options available for resisting (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Intentions to Report Questionable Acts: An Examination of the Influence of Anonymous Reporting Channel, Internal Audit Quality, and Setting.Steven E. Kaplan & Joseph J. Schultz - 2007 - Journal of Business Ethics 71 (2):109-124.
    The Sarbanes–Oxley Act of 2002 requires audit committees of public companies’ boards of directors to install an anonymous reporting channel to assist in deterring and detecting accounting fraud and control weaknesses. While it is generally accepted that the availability of such a reporting channel may reduce the reporting cost of the observer of a questionable act, there is concern that the addition of such a channel may decrease the overall effectiveness compared to a system employing only non-anonymous reporting options. The (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Newsgathering and Privacy: Expanding Ethics Codes to Reflect Change in the Digital Media Age.Ginny Whitehouse - 2010 - Journal of Mass Media Ethics 25 (4):310-327.
    Media ethics codes concerning privacy must be updated considering the ease with which information now can be gathered from social networks and disseminated widely. Existing codes allow for deception and privacy invasion in cases of overriding public need when no alternate means are available but do not adequately define what constitutes need or alternate means, or weigh in the harm such acts do to the public trust and the profession. Building on the ethics theories of Sissela Bok and Helen Nissenbaum, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Moral justifications for privacy and intimacy.Samuel P. Winch - 1996 - Journal of Mass Media Ethics 11 (4):197 – 209.
    The right to privacy is a moral concept that has been debated for centuries. This article traces the histo y of the concept and examines how the existence of a right to privacy has been defended by philosophers through the years. This article examines the strategies behind those arguments, showing how some of them are more convincing than others. Following this analysis is a practical argument for recognizing a universal right to privacy over intimate relationships and information. Intimacy is a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Journalist as source: The moral dilemma of news rescue.David J. Vergobbi - 1992 - Journal of Mass Media Ethics 7 (4):233 – 245.
    Sometimes a news organization withholds information for reasons other than news judgment. But if one news agency will not publish certain information, does this prevent a staff member from making it possible for a different agency to publish the facts and thus rescue the story from secrecy? This study reveals that most journalists accept such news rescue incidents as part of the game, but raise ethical and legal concerns pitting news ownership against right to information.
    Download  
     
    Export citation  
     
    Bookmark  
  • Brains, genes, and the making of the self.Lynette Reid & Françoise Baylis - 2005 - American Journal of Bioethics 5 (2):21 – 23.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Casuistry: A case-based methods for journalists.David E. Boeyink - 1992 - Journal of Mass Media Ethics 7 (2):107 – 120.
    Linking abstract principles and concrete cases is not always easy. Beginning deductively with ethical theory requires an a priori choice of ethical principles which, when applied, may not take account of the complexity of real problems. But beginning with cases can result in a situationalism in which the normative role of ethical principles is slighted. Casuistry, a case-centered methodology, offers one way to bridge this gap. Casuistry's bottom-up strategy develops policy guidelines out of case analysis, building a middle ground between (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Should Internet Researchers Use Ill-Gotten Information?David M. Douglas - 2018 - Science and Engineering Ethics 24 (4):1221-1240.
    This paper describes how the ethical problems raised by scientific data obtained through harmful and immoral conduct may also emerge in cases where data is collected from the Internet. It describes the major arguments for and against using ill-gotten information in research, and shows how they may be applied to research that either collects information about the Internet itself or which uses data from questionable or unknown sources on the Internet. Three examples demonstrate how researchers address the ethical issues raised (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Gossip and Social Punishment.Linda Radzik - 2016 - Res Philosophica 93 (1):185-204.
    Is gossip ever appropriate as a response to other people’s misdeeds or character flaws? Gossip is arguably the most common means through which communities hold people responsible for their vices and transgressions. Yet, gossiping itself is traditionally considered wrong. This essay develops an account of social punishment in order to ask whether gossip can serve as a legitimate means of enforcing moral norms. In the end, however, I argue that gossip is most likely to be permissible where it resembles punishment (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Loyalty in public relations: When does it cross the line between virtue and vice?Kevin Stoker - 2005 - Journal of Mass Media Ethics 20 (4):269 – 287.
    Public relations practitioners place a premium on loyalty - particularly in terms of cultivating relationships. However, little scholarly research has been done on the subject. This essay analyzes loyalty in terms of organizational deterioration and decline. The ethical dimensions of Hirschman's concept of "exit, voice, and loyalty, " and Royce's notion about loyalty, are explored, as is the concept of "loyalty to loyalty. " The essay concludes with a 7-step model intended to help practitioners determine the demands of ethical loyalty.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • (1 other version)On political conspiracy theories.Juha Räikkä - 2008 - Journal of Political Philosophy 17 (2):185-201.
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Transparency: An assessment of the Kantian roots of a key element in media ethics practice.Patrick Lee Plaisance - 2007 - Journal of Mass Media Ethics 22 (2-3):187 – 207.
    This study argues that the notion of transparency requires reconsideration as an essence of ethical agency. It provides a brief explication of the concept of transparency, rooted in the principle of human dignity of Immanuel Kant, and suggests that it has been inadequately appreciated by media ethics scholars and instructors more focused on relatively simplistic applications of his categorical imperative. This study suggests that the concept's Kantian roots raise a radical challenge to conventional understandings of human interaction and, by extension, (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Political surplus of whistleblowing: A case study.Abraham Mansbach - 2007 - Business Ethics, the Environment and Responsibility 16 (2):124–131.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Birth of an Action Repertoire: On the Origins of the Concept of Whistleblowing.Thomas Olesen - 2022 - Journal of Business Ethics 179 (1):13-24.
    The standard account in whistleblowing research fixes the birth of the whistleblowing concept in the early 1970s. Surprisingly, there are no efforts to discuss why whistleblowing emerged as a distinct new action repertoire at this particular moment in time. Whistleblowing is a historical latecomer to an ethos of field transgression, which includes well-established forms of intervention such as watchdog journalism and political activism. Whistleblowing has strong affinities with these practices, but also holds its own unique place in ethics and democracy. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Was Snowden virtuous?Clive Harfield - 2021 - Ethics and Information Technology 23 (3):373-383.
    Professor Shannon Vallor’s theoretical framework of technomoral virtue ethics identifies character traits that can be cultivated to foster a future worth wanting in an environment of emerging technologies. Such technologies and increased citizen participation in the new digital environment have reconfigured what is possible in policing and intelligence-gathering more quickly, perhaps, than sober and sensible policy reflection and formulation can keep pace with. Sensational and dramatic, seismic and devastating, the Snowden disclosures represent a particular expression of dissent against American intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Freemasonry, friendship and noblewomen: The role of the secret society in bringing enlightenment thought to pre-revolutionary women elites.Janet M. Burke - 1989 - History of European Ideas 10 (3):283-293.
    Download  
     
    Export citation  
     
    Bookmark