Switch to: References

Citations of:

Intimacy and privacy

Ethics 89 (1):76-81 (1978)

Add citations

You must login to add citations.
  1. Bad Question!Sam Berstler - 2023 - Philosophy and Public Affairs 51 (4):413-449.
    Philosophy &Public Affairs, Volume 51, Issue 4, Page 413-449, Fall 2023.
    Download  
     
    Export citation  
     
    Bookmark  
  • Social pathologies of informational privacy.Wulf Loh - 2022 - Journal of Social Philosophy.
    Following the recent practice turn in privacy research, informational privacy is increasingly analyzed with regard to the “appropriate flow of information” within a given practice, which preserves the “contextual integrity” of that practice (Nissenbaum, 2010, p. 149; 2015). Such a practice-theoretical take on privacy emphasizes the normative structure of practices as well as its structural injustices and power asymmetries, rather than focusing on the intentions and moral considerations of individual or institutional actors. Since privacy norms are seen to be institutionalized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Doxastic Harm.Anne Baril - 2022 - Midwest Studies in Philosophy 46:281-306.
    In this article, I will consider whether, and in what way, doxastic states can harm. I’ll first consider whether, and in what way, a person’s doxastic state can harm her, before turning to the question of whether, and in what way, it can harm someone else.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy, Publicity, and the Right to Be Forgotten.Hannah Carnegy-Arbuthnott - 2023 - Journal of Political Philosophy 31 (4):494-516.
    Journal of Political Philosophy, EarlyView.
    Download  
     
    Export citation  
     
    Bookmark  
  • Full‐Frontal Morality: The Naked Truth about Gender.Talia Mae Bettcher - 2012 - Hypatia 27 (2):319-337.
    This paper examines Harold Garfinkel's notion of the natural attitude about sex and his claim that it is fundamentally moral in nature. The author looks beneath the natural attitude in order to explain its peculiar resilience and oppressive force. There she reveals a moral order grounded in the dichotomously sexed bodies so constituted through boundaries governing privacy and decency. In particular, naked bodies are sex-differentiated within a system of genital representation through gender presentation—a system that helps constitute the very boundaries (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Privacy as a value and as a right.Judith Andre - 1986 - Journal of Value Inquiry 20 (4):309-317.
    Knowledge of others, then, has value; so does immunity from being known. The ability to extend one's knowledge has value; so does the ability to limit other's knowledge of oneself. I have claimed that no interest can count as a right unless it clearly outweighs opposing interests whose presence is logically entailed. I see no way to establish that my interest in not being known, simply as such, outweighs your desire to know about me. I acknowledge the intuitive attractiveness of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • A critical contribution to theoretical foundations of privacy studies.Thomas Allmer - 2011 - Journal of Information, Communication and Ethics in Society 9 (2):83-101.
    PurposeAlthough there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there is a gap in the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Sobre el concepto de privacidad: la relación entre privacidad e intimidad.Manuel Toscano - 2017 - Isegoría 57:533.
    El derecho a la privacidad está en el centro de muchos de los debates públicos actuales. Sin embargo, a pesar de la extensa literatura filosófica y jurídica sobre el tema, no contamos con una explicación adecuada del sentido y del valor de la privacidad. Esta falta de acuerdo sobre cuestiones conceptuales y normativas ha llevado a algún autor a hablar del ‘caos de la privacidad’. Este artículo se centra en la exploración conceptual de la privacidad. Para ello, en primer lugar, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Emotional-Freedom Defense of Schadenfreude.Earl Spurgin - 2015 - Ethical Theory and Moral Practice 18 (4):767-784.
    Schadenfreude is the emotion we experience when we obtain pleasure from others’ misfortunes. Typically, we are not proud of it and admit experiencing it only sheepishly or apologetically. Philosophers typically view it, and the disposition to experience it, as moral failings. Two recent defenders of Schadenfreude, however, argue that it is morally permissible because it stems from judgments about the just deserts of those who suffer misfortunes. I also defend Schadenfreude, but on different grounds that overcome two deficiencies of those (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Protecting Privacy and Confidentiality in Environmental Health Research.David B. Resnik - 2010 - Ethics in Biology, Engineering and Medicine 1 (4):285-291.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been sufficiently investigated. In (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Toward an approach to privacy in public: Challenges of information technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  • A Defense of Privacy as Control.Leonhard Menges - 2021 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions about moral responsibility.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Human Rights for the Digital Age.Kay Mathiesen - 2014 - Journal of Mass Media Ethics 29 (1):2-18.
    Human rights are those legal and/or moral rights that all persons have simply as persons. In the current digital age, human rights are increasingly being either fulfilled or violated in the online environment. In this article, I provide a way of conceptualizing the relationships between human rights and information technology. I do so by pointing out a number of misunderstandings of human rights evident in Vinton Cerf's recent argument that there is no human right to the Internet. I claim that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing of justice and the effective (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Privacy in the information age: Stakeholders, interests and values. [REVIEW]Lucas Introna & Athanasia Pouloudi - 1999 - Journal of Business Ethics 22 (1):27 - 38.
    Privacy is a relational and relative concept that has been defined in a variety of ways. In this paper we offer a systematic discussion of potentially different notions of privacy. We conclude that privacy as the freedom or immunity from the judgement of others is an extremely useful concept to develop ways in which to understand privacy claims and associated risks. To this end, we develop a framework of principles that explores the interrelations of interests and values for various stakeholders (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Friendship, Intimacy and Humor.Mordechai Gordon - 2014 - Educational Philosophy and Theory 46 (2):162-174.
    A review of the literature in philosophy in the past 20 years indicates that relatively little has been written on the connection between friendship, intimacy and humor. This article is intended to begin to address the neglect of this topic among philosophers by focusing on some interesting aspects of the relationship between friendship, intimacy and humor. The author begins his analysis by examining the different types of friendships while highlighting the characteristics of the particular kind of friendship that involves intimacy. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Towards an alternative concept of privacy.Christian Fuchs - 2011 - Journal of Information, Communication and Ethics in Society 9 (4):220-237.
    PurposeThere are a lot of discussions about privacy in relation to contemporary communication systems (such as Facebook and other “social media” platforms), but discussions about privacy on the internet in most cases misses a profound understanding of the notion of privacy and where this notion is coming from. The purpose of this paper is to challenge the liberal notion of privacy and explore foundations of an alternative privacy conception.Design/methodology/approachA typology of privacy definitions is elaborated based on Giddens' theory of structuration. (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Caller ID – whose privacy is it, anyway?Kenneth G. Ferguson - 2001 - Journal of Business Ethics 29 (3):227 - 237.
    Caller ID or CND (Calling Number Display) is an internationally-available telecommunication service first introduced into the United States about ten years ago. Caller ID utilizes a new form of technology which enables telephone subscribers to identify the numbers (and/or names) of callers before picking up their telephones. This service has been widely assailed as an invasion of the caller''s right to anonymity, a right which allegedly subsists as an important component of the caller''s right to privacy. However, if privacy is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Bibliographical essay / privacy and criminal justice policies.Ferdinand D. Schoeman - 1983 - Criminal Justice Ethics 2 (2):71-82.
    Download  
     
    Export citation  
     
    Bookmark  
  • The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the rise of new information and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Individual autonomy and the family.Steven Robert Walker - unknown
    Thesis (Ph. D.)--University of Hawaii at Manoa, 1995.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • The Ethics of Workspace Surveillance.Elin Palm - 2008 - Dissertation, Royal Institute of Technology, Stockholm
    The general framework of this thesis is that of ethical Technology Assessment. Whereas the first essay proposes an inclusive approach to technology assessment by delineating an ethical checklist, the following essays focus on two of the checklist points, i.e. “privacy” and “control, influence and power”, in relation to workspace surveillance. The core idea of Essay I is that, due to its strong social impact, new technology and novel use of existing technology should be considered from the perspective of ethics. We (...)
    Download  
     
    Export citation  
     
    Bookmark