Switch to: References

Citations of:

Privacy, Intimacy, and Isolation

New York, US: OUP Usa (1992)

Add citations

You must login to add citations.
  1. The Moral Significance of Privacy Dependencies.Lauritz Aastrup Munch & Jakob Thrane Mainz - 2023 - Philosophy and Technology 36 (4):1-19.
    Often, when we share information about ourselves, we contribute to people learning personal things about others. This may happen because what we share about ourselves can be used to infer personal information about others. Such dependencies have become known as privacy dependencies in the literature. It is sometimes claimed that the scope of the right to privacy should be expanded in light of such dependencies. For example, some have argued that inferring information about others can violate their right to privacy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Relational Egalitarianism and Informal Social Interaction.Dan Threet - 2019 - Dissertation, Georgetown University
    This dissertation identifies and responds to a problem for liberal relational egalitarians. There is a prima facie worry about the compatibility of liberalism and relational egalitarianism, concerning the requirements of equality in informal social life. Liberalism at least involves a commitment to leaving individuals substantial discretion to pursue their own conceptions of the good. Relational equality is best understood as a kind of deliberative practice about social institutions and practices. Patterns of otherwise innocuous social choices (e.g., where to live, whom (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark  
  • Three Control Views on Privacy.Leonhard Menges - 2022 - Social Theory and Practice 48 (4):691-711.
    This paper discusses the idea that the concept of privacy should be understood in terms of control. Three different attempts to spell out this idea will be critically discussed. The conclusion will be that the Source Control View on privacy is the most promising version of the idea that privacy is to be understood in terms of control.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Technology as Terrorism: Police Control Technologies and Drone Warfare.Jessica Wolfendale - 2021 - In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21.
    Debates about terrorism and technology often focus on the potential uses of technology by non-state terrorist actors and by states as forms of counterterrorism. Yet, little has been written about how technology shapes how we think about terrorism. In this chapter I argue that technology, and the language we use to talk about technology, constrains and shapes our understanding of the nature, scope, and impact of terrorism, particularly in relation to state terrorism. After exploring the ways in which technology shapes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through providing a definition (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • A Critical Study of Four Definitions of Privacy From The Viewpoint of Western Ethics.Hamid Shahriari - 2019 - Journal of Philosophical Theological Research 21 (4):103-128.
    This article addresses four definitions of privacy. Initially, the literal meaning of privacy is mentioned; It then discusses the meaning of the term “privacy” in Ethics. The first meaning is the right to be alone and free. The second meaning of privacy is informational and is divided into two types: one is the definition based on expectation and another is a definition based on the state of awareness. The third type is the definition that defines privacy based on control. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity of citizens (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • A Dilemma for Privacy as Control.Björn Lundgren - 2020 - The Journal of Ethics 24 (2):165-175.
    Although popular, control accounts of privacy suffer from various counterexamples. In this article, it is argued that two such counterexamples—while individually resolvable—can be combined to yield a dilemma for control accounts of privacy. Furthermore, it is argued that it is implausible that control accounts of privacy can defend against this dilemma. Thus, it is concluded that we ought not define privacy in terms of control. Lastly, it is argued that since the concept of privacy is the object of the right (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Trust as an unquestioning attitude.C. Thi Nguyen - 2022 - Oxford Studies in Epistemology 7:214-244.
    According to most accounts of trust, you can only trust other people (or groups of people). To trust is to think that another has goodwill, or something to that effect. I sketch a different form of trust: the unquestioning attitude. What it is to trust, in this sense, is to settle one’s mind about something, to stop questioning it. To trust is to rely on a resource while suspending deliberation over its reliability. Trust lowers the barrier of monitoring, challenging, checking, (...)
    Download  
     
    Export citation  
     
    Bookmark   37 citations  
  • Cultural appropriation and the intimacy of groups.C. Thi Nguyen & Matthew Strohl - 2019 - Philosophical Studies 176 (4):981-1002.
    What could ground normative restrictions concerning cultural appropriation which are not grounded by independent considerations such as property rights or harm? We propose that such restrictions can be grounded by considerations of intimacy. Consider the familiar phenomenon of interpersonal intimacy. Certain aspects of personal life and interpersonal relationships are afforded various protections in virtue of being intimate. We argue that an analogous phenomenon exists at the level of large groups. In many cases, members of a group engage in shared practices (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that the predominant accounts of privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Full‐Frontal Morality: The Naked Truth about Gender.Talia Mae Bettcher - 2012 - Hypatia 27 (2):319-337.
    This paper examines Harold Garfinkel's notion of the natural attitude about sex and his claim that it is fundamentally moral in nature. The author looks beneath the natural attitude in order to explain its peculiar resilience and oppressive force. There she reveals a moral order grounded in the dichotomously sexed bodies so constituted through boundaries governing privacy and decency. In particular, naked bodies are sex-differentiated within a system of genital representation through gender presentation—a system that helps constitute the very boundaries (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • Privatheit und Identifizierbarkeit - Warum die Verbreitung anonymer Daten die Privatheit verletzen kann.Philipp Schwind - forthcoming - Zeitschrift Für Ethik Und Moralphilosophie.
    The right to privacy extends only to information through which the persons concerned are identifiable. This assumption is widely shared in law and in philosophical debate; it also guides the handling of personal data, for example, in medicine. However, this essay argues that the dissemination of anonymous information can also constitute a violation of privacy. This conclusion arises from two theses: (1) From the perspective of the affected person, judgments by others about anonymous information refer to its originator, even if (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A Defense of Privacy as Control.Leonhard Menges - 2020 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions about moral responsibility.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Perspectives regarding privacy in clinical research among research professionals from the Arab region: an exploratory qualitative study.Latifa Adarmouch, Marwan Felaefel, Robert Wachbroit & Henry Silverman - 2020 - BMC Medical Ethics 21 (1):1-16.
    Background Protecting the privacy of research participants is widely recognized as one of the standard ethical requirements for clinical research. It is unknown, however, how research professionals regard concepts of privacy as well as the situations in the research setting that require privacy protections. The aim of this study was to explore the views of research professionals from Arab countries regarding concepts and scope of privacy that occur in clinical research. Methods We adopted an exploratory qualitative approach by the use (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy.Dorota Mokrosinska - 2018 - Law and Philosophy 37 (2):117-143.
    One of the most influential views in privacy scholarship is that privacy protects individual autonomy. On the early liberal view, the exercise of autonomy requires detachment from social and political life and privacy facilitates it. This view of privacy still informs current legal and political practice. As this view of privacy presupposes a tension between privacy and society, it is responsible for the underrating of privacy in legal and political practice. Over the last decades, liberal reflection on autonomy has shifted (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • The transparent self.Marjolein Lanzing - 2016 - Ethics and Information Technology 18 (1):9-16.
    This paper critically engages with new self-tracking technologies. In particular, it focuses on a conceptual tension between the idea that disclosing personal information increases one’s autonomy and the idea that informational privacy is a condition for autonomous personhood. I argue that while self-tracking may sometimes prove to be an adequate method to shed light on particular aspects of oneself and can be used to strengthen one’s autonomy, self-tracking technologies often cancel out these benefits by exposing too much about oneself to (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Disentangling Privacy and Intimacy: Intimate Citizenship, Private Boundaries and Public Transgressions.Paul Reynolds - 2010 - Human Affairs 20 (1):33-42.
    Disentangling Privacy and Intimacy: Intimate Citizenship, Private Boundaries and Public Transgressions Recent theorisations of transformations of intimacy—like Ken Plummer's (2003) Intimate Citizenship project—concentrate on social and cultural transformations that erode the containment of intimacy within the private sphere. They have less to say about the character of and oppositions to that erosion, and specifically how far the idea of the private stands in opposition to intimacy transgressing into the public. In this essay, the private is explored through its constitutive features—liberal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Protecting Health Privacy through Reasonable Inferences.Brent Mittelstadt - 2022 - American Journal of Bioethics 22 (7):65-68.
    In the digital age individuals face key choices about whether and how to share intimate details of their lives, “images of the body, biological data in general and diagnostic information” (Pyrrho,...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been sufficiently investigated. In (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Moral justifications for privacy and intimacy.Samuel P. Winch - 1996 - Journal of Mass Media Ethics 11 (4):197 – 209.
    The right to privacy is a moral concept that has been debated for centuries. This article traces the histo y of the concept and examines how the existence of a right to privacy has been defended by philosophers through the years. This article examines the strategies behind those arguments, showing how some of them are more convincing than others. Following this analysis is a practical argument for recognizing a universal right to privacy over intimate relationships and information. Intimacy is a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Data, Privacy, and Agency: Beyond Transparency to Empowerment.Erika Versalovic, Sara Goering & Eran Klein - 2022 - American Journal of Bioethics 22 (7):63-65.
    Separation-based accounts of privacy define privacy as being left alone and unaccessed. Pyrrho et al. propose a more control-based account where privacy is about having the age...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, the Internet of Things and State Surveillance: Handling Personal Information within an Inhuman System.Adam Henschke - 2020 - Moral Philosophy and Politics 7 (1):123-149.
    The Internet of Things (IoT) is, in part, an information handling system that can remove humans from the information handling process. The particular problem explored is how we are to understand privacy when considering informational systems that handle personal information in ways that impact people’s lives when there is no human operator in direct contact with that personal information. I argue that these new technologies need to take concepts like privacy into account, but also, that we ought also to take (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • När vården flyttar hem till dig – den mobila vårdens etik.Elin Palm - 2010 - Etikk I Praksis - Nordic Journal of Applied Ethics 2 (2):71-92.
    Västvärldens åldrande befolkning anses ofta ställa krav på nya former av vård och omsorg. Olika typer av informations- och kommunikationstekniskt baserat vårdstöd framhålls ofta som en lösning. Tekniken medger en rad olika fördelar, exempelvis tätare tillsyn, kontinuerliga mätningar av vitala funktioner, med möjlighet att kontinuerligt ställa diagnos, och snabb respons på larm, men de tekniska lösningarna får också etiska implikationer. I den här artikeln beskrivs och exemplifieras IKT-baserad vård och omsorg och teknikens påverkan på centrala värden som personlig integritet, autonomi, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Download  
     
    Export citation  
     
    Bookmark  
  • (1 other version)Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva - An Internet Journal of Philosophy 9 (1).
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of solitude, intimacy and confidentiality and shows that, so described, people have legitimate interests in privacy. These interests are both personal and political, and provide the grounds for two different justifications of privacy rights. Though both are based on democratic concerns for the freedom and equality of individuals, these two justifications for privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy, Interests, and Inalienable Rights.Adam D. Moore - 2018 - Moral Philosophy and Politics 5 (2):327-355.
    Some rights are so important for human autonomy and well-being that many scholars insist they should not be waived, traded, or abandoned. Privacy is a recent addition to this list. At the other end of the spectrum is the belief that privacy is a mere unimportant interest or preference. This paper defends a middle path between viewing privacy as an inalienable, non-waivable, non-transferrable right and the view of privacy as a mere subjective interest. First, an account of privacy is offered (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Harm, Consent and the Limits of Privacy.Matthew Weait - 2005 - Feminist Legal Studies 13 (1):97-122.
    Within the context of U.K. law, the right to respect for private life, articulated in Article 8 of the European Convention on Human Rights, and acknowledged more opaquely in domestic legislation and case law, is one whose scope is unclear. Nowhere is this brought into sharper relief than in cases where conduct which manifests a person’s sexual identity, or concerns her intimate relations with others, is prima facie criminal. In this essay I attempt, through a discussion of cases in which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • (1 other version)Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Shaheen Borna & Dheeraj Sharma - 2011 - Business and Society Review 116 (3):331-353.
    Download  
     
    Export citation  
     
    Bookmark  
  • Sobre el concepto de privacidad: la relación entre privacidad e intimidad.Manuel Toscano - 2017 - Isegoría 57:533.
    El derecho a la privacidad está en el centro de muchos de los debates públicos actuales. Sin embargo, a pesar de la extensa literatura filosófica y jurídica sobre el tema, no contamos con una explicación adecuada del sentido y del valor de la privacidad. Esta falta de acuerdo sobre cuestiones conceptuales y normativas ha llevado a algún autor a hablar del ‘caos de la privacidad’. Este artículo se centra en la exploración conceptual de la privacidad. Para ello, en primer lugar, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation