Switch to: References

Citations of:

Secrets: on the ethics of concealment and revelation

New York: Oxford University Press (1982)

Add citations

You must login to add citations.
  1. Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through providing a definition (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?Michele Loi, Christian Hauser & Markus Christen - 2020 - Journal of Business Ethics 175 (1):7-19.
    Clients may feel trapped into sharing their private digital data with insurance companies to get a desired insurance product or premium. However, private insurance must collect some data to offer products and premiums appropriate to the client’s level of risk. This situation creates tension between the value of privacy and common insurance business practice. We argue for three main claims: first, coercion to share private data with insurers is pro tanto wrong because it violates the autonomous choice of a privacy-valuing (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Conditional shared confidentiality in mental health care.Axel Liégeois & Marc Eneman - 2015 - Medicine, Health Care and Philosophy 18 (2):261-266.
    Because of the development towards community care, care providers not only exchange information in a team, but increasingly also in networks. This is a challenge to confidentiality. The ethical question is how care providers can keep information about the care receiver confidential, whilst at the same time exchanging information about that care receiver in a team or network? Can shared confidentiality be extended from a team to a network? To clarify this question, the article refers to the advice of an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • First, do no harm.Sanford Leikin - 1995 - Ethics and Behavior 5 (2):196 – 199.
    Download  
     
    Export citation  
     
    Bookmark  
  • Theory of Mind and Concealing vs. Forthcoming Communication in Adolescence.Jennifer Lavoie & Victoria Talwar - 2022 - Frontiers in Psychology 13.
    Concealing information requires that adolescents manage the information that they share, which requires cognitive skills, for example, theory of mind. This study explored motivations for concealment that early adolescents endorsed concealing or disclosing to friends and parents, in relation to their theory of mind. We found that adolescents broadly endorsed disclosure to both parents and friends, even when it might mean they would face consequences, be impolite, or face negative identity-related emotions. We found that ToM ability was associated with a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The moral trial: on ethics and economics.Alessandro Lanteri - 2008 - Erasmus Journal for Philosophy and Economics 1 (1):188.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Effect of Perceived Negative Workplace Gossip on Employees’ Behaviors.Ming Kong - 2018 - Frontiers in Psychology 9:320893.
    Negative workplace gossip generates social undermining and great side effects to employees. But, the damage of negative gossip is mainly aimed at the employee who perceived being targeted. The purpose of this study is to develop a conceptual model in which perceived negative workplace gossip influences employees’ in-role behavior and organizational citizenship behavior differentially by changing employees’ self-concept (organizational based self-esteem and perceived insider status). 336 employees from 7 Chinese companies were investigated for empirical analysis on proposed hypotheses, and results (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Do I Hear the Whistle…? A First Attempt to Measure Four Forms of Employee Silence and Their Correlates.Michael Knoll & Rolf Dick - 2013 - Journal of Business Ethics 113 (2):349-362.
    Silence in organizations refers to a state in which employees refrain from calling attention to issues at work such as illegal or immoral practices or developments that violate personal, moral, or legal standards. While Morrison and Milliken (Acad Manag Rev 25:706–725, 2000) discussed how organizational silence as a top-down organizational level phenomenon can cause employees to remain silent, a bottom-up perspective—that is, how employee motives contribute to the occurrence and maintenance of silence in organizations—has not yet been given much research (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Do I Hear the Whistle…? A First Attempt to Measure Four Forms of Employee Silence and Their Correlates.Michael Knoll & Rolf van Dick - 2013 - Journal of Business Ethics 113 (2):349-362.
    Silence in organizations refers to a state in which employees refrain from calling attention to issues at work such as illegal or immoral practices or developments that violate personal, moral, or legal standards. While Morrison and Milliken (Acad Manag Rev 25:706–725, 2000) discussed how organizational silence as a top-down organizational level phenomenon can cause employees to remain silent, a bottom-up perspective—that is, how employee motives contribute to the occurrence and maintenance of silence in organizations—has not yet been given much research (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Intentions to Report Questionable Acts: An Examination of the Influence of Anonymous Reporting Channel, Internal Audit Quality, and Setting.Steven E. Kaplan & Joseph J. Schultz - 2007 - Journal of Business Ethics 71 (2):109-124.
    The Sarbanes–Oxley Act of 2002 requires audit committees of public companies’ boards of directors to install an anonymous reporting channel to assist in deterring and detecting accounting fraud and control weaknesses. While it is generally accepted that the availability of such a reporting channel may reduce the reporting cost of the observer of a questionable act, there is concern that the addition of such a channel may decrease the overall effectiveness compared to a system employing only non-anonymous reporting options. The (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Authenticity in Political Discourse.Ben Jones - 2016 - Ethical Theory and Moral Practice 19 (2):489-504.
    Judith Shklar, David Runciman, and others argue against what they see as excessive criticism of political hypocrisy. Such arguments often assume that communicating in an authentic manner is an impossible political ideal. This article challenges the characterization of authenticity as an unrealistic ideal and makes the case that its value can be grounded in a certain political realism sensitive to the threats posed by representative democracy. First, by analyzing authenticity’s demands for political discourse, I show that authenticity has greater flexibility (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Ethical tension points in whistleblowing.J. Vernon Jensen - 1987 - Journal of Business Ethics 6 (4):321 - 328.
    This paper analyzes the number of procedural and substantive tension points with which a conscientious whistleblower struggles. Included in the former are such questions as: (1) Am I properly depicting the seriousness of the problem? (2) Have I secured the information properly, analyzed it appropriately, and presented it fairly? (3) Are my motives appropriate? (4) Have I tried fully enough to have the problem corrected within the organization? (5) Should I blow the whistle while still a member of the organization (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • Respecting privacy in an information society: A journalist's dilemma.L. Paul Husselbee - 1994 - Journal of Mass Media Ethics 9 (3):145 – 156.
    Private information about individuals contained in computerized data bases is readily available to journalists, who have a moral obligation to inform the masses as a means of redistributing power in society. The journalist's duty to inform, however, conflicts with the duty to respect the privacy of individuals. Because legislation is largely ineffective in protecting individual privacy, the journalist's moral responsibility assumes additional weight. However, the journalist should not allow the claim of privacy to keep him or her from investigating matters (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The epistemological evaluation of oppositional secrets.Catherine Hundleby - 2000 - Hypatia 20 (4):44-58.
    : Although political values guide people who take advice from standpoint epistemologies in deciding whether to reveal secrets used to resist oppression, these decisions can also be understood and evaluated in purely cognitive or epistemological terms. When political considerations direct us to preserve a secret, the cognitive value progressively diminishes because the view of the world projected by the secret is increasingly vulnerable.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Epistemological Evaluation of Oppositional Secrets.Catherine Hundleby - 2000 - Hypatia 20 (4):44-58.
    Although political values guide people who take advice from standpoint epistemolo-gies in deciding whether to reveal secrets used to resist oppression, these decisions can also be understood and evaluated in purely cognitive or epistemological terms. When political considerations direct us to preserve a secret, the cognitive value progressively diminishes because the view of the world projected by the secret is increasingly vulnerable.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The journalist and privacy.Louis Hodges - 1994 - Journal of Mass Media Ethics 9 (4):197 – 212.
    The moral right to privacy consists of the power to determine who may gain access to information about oneself. Individual human beings need some measure of privacy in order to develop a sense of self and to avoid manipulation by the state. Journalists who respect the privacy rights of those on whom they report should especially be careful not to intrude unduly when gathering information, in publishing they should be able to demonstrate a public need to know private information. Individual (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Was Snowden virtuous?Clive Harfield - 2021 - Ethics and Information Technology 23 (3):373-383.
    Professor Shannon Vallor’s theoretical framework of technomoral virtue ethics identifies character traits that can be cultivated to foster a future worth wanting in an environment of emerging technologies. Such technologies and increased citizen participation in the new digital environment have reconfigured what is possible in policing and intelligence-gathering more quickly, perhaps, than sober and sensible policy reflection and formulation can keep pace with. Sensational and dramatic, seismic and devastating, the Snowden disclosures represent a particular expression of dissent against American intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Choosing silence: A case of reverse agenda setting in depression era news coverage.Sandra Haarsager - 1991 - Journal of Mass Media Ethics 6 (1):35 – 46.
    The power to influence decisions is inherent in newspaper practices of publishing or withholding information about significant events - creating profound ethical questions. The two major newspapers in Seattle provide an example of selective coverage of the Great Depression. Area unemployment that reached 25% and galloping bank failures were ignored, as were social implications of such events. Questions are raised here about the moral implications of strategic silence, or reverse agenda setting, as a means of encouraging broadened discussion of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Mitigating Ethical Conflicts in Dual Mission Government Agencies.Valerie George & Robert Boruch - 1988 - Science, Technology, and Human Values 13 (1-2):27-44.
    Download  
     
    Export citation  
     
    Bookmark  
  • "Fruit of the Poisonous Tree": Journalistic Ethics and Voice-Mail Surveillance.Cecilia Friend & Donald Challenger - 2001 - Journal of Mass Media Ethics 16 (4):255-272.
    A 1998 Cincinnati Enquirer investigation into the Central American labor practices of Chiquita Brands International was substantiated by the taped words of company officials themselves. Yet, soon after publication, the Enquirer ran a stunning front-page retraction and disavowed the report without challenging its claims. The Gannett Corporation, the paper's owner, paid Chiquita $14 million to avoid a suit. The resultant outcry by journalists was directed not at Gannett, but at lead reporter Michael Gallagher, who had surreptitiously accessed Chiquita voice mail (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A Greater Means to the Greater Good: Ethical Guidelines to Meet Social Movement Organization Advocacy Challenges.Carrie Packwood Freeman - 2009 - Journal of Mass Media Ethics 24 (4):269-288.
    Existing public relations ethics literature often proves inadequate when applied to social movement campaigns, considering the special communication challenges activists face as marginalized moral visionaries in a commercial public sphere. The communications of counter-hegemonic movements is distinct enough from corporate, nonprofit, and governmental organizations to warrant its own ethical guidelines. The unique communication guidelines most relevant to social movement organizations include promoting asymmetrical advocacy to a greater extent than is required for more powerful organizations and building flexibility into the TARES (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • "You Had to Be There" : The Problem With Reporter Reconstructions.Russell Frank - 1999 - Journal of Mass Media Ethics 14 (3):146-158.
    Newspaper stories that rely on reconstruction of events from police reports, court records, and recollections of witnesses often sacrifice attribution for the sake of immediacy. Such stories make compelling reading, but they mislead readers by erasing the line between information obtained via observation and information obtained from human or documentary sources. This article argues that the lack of attribution is more distracting than it presence--because readers wonder how the reporters know what they know--and calls on reporters to make clear when (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Caution in leaping from functional imaging to functional neurosurgery.Paul J. Ford & Cynthia S. Kubu - 2005 - American Journal of Bioethics 5 (2):23 – 25.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Applying the rules of just war theory to engineers in the arms industry.Aaron Fichtelberg - 2006 - Science and Engineering Ethics 12 (4):685-700.
    Given the close relationship between the modern arms industry and the military, engineers and other professionals who work in the arms industry should be held accountable to the principles of just war theory. While they do not deploy weapons on the battlefield and are not in the military chain of command, technical professionals nonetheless have a moral duty to abide by principles of jus ad bellum and jus in bello. They are morally responsible both for choosing the companies that employ (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Bibliographical essay / privacy and criminal justice policies.Ferdinand D. Schoeman - 1983 - Criminal Justice Ethics 2 (2):71-82.
    Download  
     
    Export citation  
     
    Bookmark  
  • Unnamed Sources: A Utilitarian Exploration of their Justification and Guidelines for Limited Use.Matt J. Duffy & Carrie P. Freeman - 2011 - Journal of Mass Media Ethics 26 (4):297-315.
    This article critically examines the practice of unnamed sourcing in journalism. A literature review highlights arguments in favor of and against their use. The authors examine some common examples of anonymous sourcing using the lens of utilitarianism, the ethical model commonly used to justify the practice. We find that few uses of unnamed sourcing can be justified when weighed against diminished credibility and threats to fair, transparent reporting. The authors suggest specific guidelines for journalists that, if followed, would curb many (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Should Internet Researchers Use Ill-Gotten Information?David M. Douglas - 2018 - Science and Engineering Ethics 24 (4):1221-1240.
    This paper describes how the ethical problems raised by scientific data obtained through harmful and immoral conduct may also emerge in cases where data is collected from the Internet. It describes the major arguments for and against using ill-gotten information in research, and shows how they may be applied to research that either collects information about the Internet itself or which uses data from questionable or unknown sources on the Internet. Three examples demonstrate how researchers address the ethical issues raised (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Doxing: a conceptual analysis.David M. Douglas - 2016 - Ethics and Information Technology 18 (3):199-210.
    Doxing is the intentional public release onto the Internet of personal information about an individual by a third party, often with the intent to humiliate, threaten, intimidate, or punish the identified individual. In this paper I present a conceptual analysis of the practice of doxing and how it differs from other forms of privacy violation. I distinguish between three types of doxing: deanonymizing doxing, where personal information establishing the identity of a formerly anonymous individual is released; targeting doxing, that discloses (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Secrets vs. Lies: Is There A Moral Asymmetry?Mahon James - 2018 - In Lying: Language, Knowledge, Ethics, and Politics. Oxford: Oxford University Press. pp. 161-182.
    In this chapter I argue that the traditional interpretation of the commonly accepted moral asymmetry between secrets and lies is incorrect. On the standard interpretation of the commonly accepted view, lies are prima facie or pro tango morally wrong, whereas secrets are morally permissible. I argue that, when secrets are distinguished from mere acts of reticence and non-acknowledgement, as well as from acts of deception, so that they are defined as acts of not sharing believed-information while believing that the believed-information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Al-Fārābī Metaphysics, and the Construction of Social Knowledge: Is Deception Warranted if it Leads to Happiness?Nicholas Andrew Oschman - unknown
    When questioning whether political deception can be ethically warranted, two competing intuitions jump to the fore. First, political deception is a fact of human life, used in the realpolitik of governance. Second, the ethical warrant of truth asserts itself as inexorably and indefatigably preferable to falsehood. Unfortunately, a cursory examination of the history of philosophy reveals a paucity of models to marry these basic intuitions. Some thinkers (e.g., Augustine, Aquinas, Grotius, Kant, Mill, and Rawls) privilege the truth by neglecting the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Cham, Switzerland: pp. 459-474.
    Experimental design is one aspect of a scientific method. A well-designed, properly conducted experiment aims to control variables in order to isolate and manipulate causal effects and thereby maximize internal validity, support causal inferences, and guarantee reliable results. Traditionally employed in the natural sciences, experimental design has become an important part of research in the social and behavioral sciences. Experimental methods are also endorsed as the most reliable guides to policy effectiveness. Through a discussion of some of the central concepts (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark  
  • The Presumption of Veracity in Testimony and Gossip.Fred J. Kauffeld & John E. Fields - unknown
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Government Secrecy, the Ethics of Wikileaks, and the Fifth Estate.Edward H. Spence - 2012 - International Review of Information Ethics 17:07.
    This paper aims to systematically explore and provide answers to the following key questions: When is government secrecy justified? In a conflict between government secrecy and the public's right to be informed on matters of public interest, which ought to take priority? Is Julian Assange a journalist and what justifies his role as a journalist? Even if Julian Assange is a journalist of the new media, was he justified in disseminating classified information to the public? Who decides what is in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation