Switch to: References

Add citations

You must login to add citations.
  1. Three Control Views on Privacy.Leonhard Menges - 2022 - Social Theory and Practice 48 (4):691-711.
    This paper discusses the idea that the concept of privacy should be understood in terms of control. Three different attempts to spell out this idea will be critically discussed. The conclusion will be that the Source Control View on privacy is the most promising version of the idea that privacy is to be understood in terms of control.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Enforcing social norms: The morality of public shaming.Paul Billingham & Tom Parr - 2020 - European Journal of Philosophy 28 (4):997-1016.
    Public shaming plays an important role in upholding valuable social norms. But, under what conditions, if any, is it morally justifiable? Our aim in this paper is systemically to investigate the morality of public shaming, so as to provide an answer to this neglected question. We develop an overarching framework for assessing the justifiability of this practice, which shows that, while shaming can sometimes be morally justifiable, it very often is not. In turn, our framework highlights several reasons to be (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Bad Question!Sam Berstler - 2023 - Philosophy and Public Affairs 51 (4):413-449.
    Philosophy &Public Affairs, Volume 51, Issue 4, Page 413-449, Fall 2023.
    Download  
     
    Export citation  
     
    Bookmark  
  • What We Owe Past Selves.Lauritz Aastrup Munch - 2023 - Journal of Applied Philosophy 40 (5):936-950.
    Some say that we should respect the privacy of dead people. In this article, I take this idea for granted and use it to motivate the stronger claim that we sometimes ought to respect the privacy of our past selves.
    Download  
     
    Export citation  
     
    Bookmark  
  • To Believe or not to Believe - That is not the (Only) Question: the Hybrid View of Privacy.Lauritz Munch & Jakob Mainz - 2023 - The Journal of Ethics 27 (3):245-261.
    In this paper, we defend what we call the ‘Hybrid View’ of privacy. According to this view, an individual has privacy if, and only if, no one else forms an epistemically warranted belief about the individual’s personal matters, nor perceives them. We contrast the Hybrid View with what seems to be the most common view of what it means to access someone’s personal matters, namely the Belief-Based View. We offer a range of examples that demonstrate why the Hybrid View is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Ethics of Police Body-Worn Cameras.Frej Klem Thomsen - 2020 - Moral Philosophy and Politics 7 (1):97-121.
    Over the past decade, police departments in many countries have experimented with and increasingly adopted the use of police body-worn cameras. This article aims to examine the moral issues raised by the use of PBWCs, and to provide an overall assessment of the conditions under which the use of PBWCs is morally permissible. It first reviews the current evidence for the effects of using PBWCs. On the basis of this review the article sets out a teleological argument for the use (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy, Publicity, and the Right to Be Forgotten.Hannah Carnegy-Arbuthnott - 2023 - Journal of Political Philosophy 31 (4):494-516.
    Journal of Political Philosophy, EarlyView.
    Download  
     
    Export citation  
     
    Bookmark  
  • Post-mortem privacy and informational self-determination.J. C. Buitelaar - 2017 - Ethics and Information Technology 19 (2):129-142.
    Post-mortem privacy is becoming a vital topic of public and scholarly legal concern. Post-mortem privacy is understood as the right of a person to preserve and control what becomes of his reputation and dignity after death. The assumption that the deceased does not qualify for privacy rights, because his bodily presence has been terminated, no longer holds in our networked society. In the digital age, the phenomenon of the digital legacy that an Internet user leaves behind after his demise, has (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Victims, Their Stories, and Our Rights.Vittorio Bufacchi - 2018 - Metaphilosophy 49 (1-2):3-12.
    Diana Meyers argues that breaking the silence of victims and attending to their stories are necessary steps towards realizing human rights. Yet using highly personal victims' stories to promote human rights raises significant moral concerns, hence Meyers suggests that before victims' stories can be accessed and used, it is morally imperative that requirements of informed consent and non-retraumatization are secured. This article argues that while Meyers' proviso is important, and necessary, it may not be sufficient. First, one potential problem with (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • How Does Stalking Wrong the Victim?Elizabeth Brake - 2023 - Ethics 134 (1):4-31.
    Much stalking consists in behavior which would normally be permissible; indeed, many stalking behaviors are protected liberties. How, then, does the stalker wrong the victim? I consider and reject different answers as failing to identify the essential wrong of stalking: stalking perpetuates gender oppression; it threatens or coerces, disrespects autonomy, or violates privacy. I argue that the stalker forces a personal relationship on the target and that our interest in being able to refuse such relationships is strong enough to ground (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy in the digital age: comparing and contrasting individual versus social approaches towards privacy.Marcel Becker - 2019 - Ethics and Information Technology 21 (4):307-317.
    This paper takes as a starting point a recent development in privacy-debates: the emphasis on social and institutional environments in the definition and the defence of privacy. Recognizing the merits of this approach I supplement it in two respects. First, an analysis of the relation between privacy and autonomy teaches that in the digital age more than ever individual autonomy is threatened. The striking contrast between on the one hand offline vocabulary, where autonomy and individual decision making prevail, and on (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The Importance of Forgetting.Rima Basu - 2022 - Episteme 19 (4):471-490.
    Morality bears on what we should forget. Some aspects of our identity are meant to be forgotten and there is a distinctive harm that accompanies the permanence of some content about us, content that prompts a duty to forget. To make the case that forgetting is an integral part of our moral duties to others, the paper proceeds as follows. In §1, I make the case that forgetting is morally evaluable and I survey three kinds of forgetting: no-trace forgetting, archival (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Morality of Belief I: How Beliefs Wrong.Rima Basu - 2023 - Philosophy Compass (7):1-10.
    It is no surprise that we should be careful when it comes to what we believe. Believing false things can be costly. The morality of belief, also known as doxastic wronging, takes things a step further by suggesting that certain beliefs can not only be costly, they can also wrong. This article surveys some accounts of how this could be so. That is, how beliefs wrong.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Using Stars for Moral Navigation: An Ethical Exploration into Celebrity.Alfred Archer & Maureen Sie - 2023 - Journal of Applied Philosophy 40 (2):340-357.
    What role do celebrities play in our moral lives? Philosophers have explored the potential for celebrities to function as moral exemplars and role models. We argue that there are more ways in which celebrities play a role in helping us navigate our moral lives. First, gossiping about celebrities helps us negotiate our moral norms and identify competing styles of life. Second, fandom for celebrities serves as the basis for the development of distinct moral communities and identities. Third, celebrities possess high (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Health, and Race Equity in the Digital Age.Anita L. Allen - 2022 - American Journal of Bioethics 22 (7):60-63.
    Privacy is a basic and foundational human good meriting moral and legal protection. Privacy isn’t, however, everything. Other goods and values matter, too (Solove 2003; Ma...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Do Your Homework! A Rights-Based Zetetic Account of Alleged Cases of Doxastic Wronging.J. Spencer Atkins - forthcoming - Ethical Theory and Moral Practice:1-28.
    This paper offers an alternate explanation of cases from the doxastic wronging literature. These cases violate what I call the degree of inquiry right—a novel account of zetetic obligations to inquire when interests are at stake. The degree of inquiry right is a moral right against other epistemic agents to inquire to a certain threshold when a belief undermines one’s interests. Thus, the agents are sometimes obligated to leave inquiry open. I argue that we have relevant interests in reputation, relationships, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Believable Evidence.Veli Mitova - 2017 - New York: Cambridge University Press.
    Believable Evidence argues that evidence consists of true beliefs. This claim opens up an entirely overlooked space on the ontology of evidence map, between purely factualist positions and purely psychologist ones. Veli Mitova provides a compelling three-level defence of this view in the first contemporary monograph entirely devoted to the ontology of evidence. First, once we see the evidence as a good reason, metaethical considerations show that the evidence must be psychological and veridical. Second, true belief in particular allows epistemologists (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Sobre el concepto de privacidad: la relación entre privacidad e intimidad.Manuel Toscano - 2017 - Isegoría 57:533.
    El derecho a la privacidad está en el centro de muchos de los debates públicos actuales. Sin embargo, a pesar de la extensa literatura filosófica y jurídica sobre el tema, no contamos con una explicación adecuada del sentido y del valor de la privacidad. Esta falta de acuerdo sobre cuestiones conceptuales y normativas ha llevado a algún autor a hablar del ‘caos de la privacidad’. Este artículo se centra en la exploración conceptual de la privacidad. Para ello, en primer lugar, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Data collection, counterterrorism and the right to privacy.Isaac Taylor - 2017 - Politics, Philosophy and Economics 16 (3):326-346.
    Governments around the world collect huge amounts of personal data from their citizens for counterterrorist purposes. While mining this data has arguably increased the security of populations, the practices through which these data are currently collected in many countries have been criticised for violating individuals’ rights to privacy. Yet it is not clear what a permissible data collection regime would look like and thus also how we could reform existing regimes to make them morally acceptable. This article explores a number (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Deepfake Pornography and the Ethics of Non-Veridical Representations.Daniel Story & Ryan Jenkins - 2023 - Philosophy and Technology 36 (3):1-22.
    We investigate the question of whether (and if so why) creating or distributing deepfake pornography of someone without their consent is inherently objectionable. We argue that nonconsensually distributing deepfake pornography of a living person on the internet is inherently pro tanto wrong in virtue of the fact that nonconsensually distributing intentionally non-veridical representations about someone violates their right that their social identity not be tampered with, a right which is grounded in their interest in being able to exercise autonomy over (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Can we borrow your phone? Employee privacy in the BYOD era.William P. Smith - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):397-411.
    PurposeThis paper aims to (a) summarize the legal and ethical foundations of privacy with connections to workplace emails and text messages, (b) describe trends and challenges related to “Bring Your Own Device” (BYOD), and (c) propose legal and nonlegal questions these trends will raise in the foreseeable future.Design/methodology/approachBased on a review of legal cases and scholarship related to workplace privacy, implications for BYOD practices are proposed.FindingsPrimarily due to property rights, employers in the USA have heretofore been granted wide latitude in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Do patients and research subjects have a right to receive their genomic raw data? An ethical and legal analysis.Christoph Schickhardt, Henrike Fleischer & Eva C. Winkler - 2020 - BMC Medical Ethics 21 (1):1-12.
    As Next Generation Sequencing technologies are increasingly implemented in biomedical research and care, the number of study participants and patients who ask for release of their genomic raw data is set to increase. This raises the question whether research participants and patients have a legal and moral right to receive their genomic raw data and, if so, how this right should be implemented into practice. In a first step we clarify some central concepts such as “raw data”; in a second (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy Rights and Public Information.Benedict Rumbold & James Wilson - 2018 - Journal of Political Philosophy 27 (1):3-25.
    This article concerns the nature and limits of individuals’ rights to privacy over information that they have made public. For some, even suggesting that an individual can have a right to privacy over such information may seem paradoxical. First, one has no right to privacy over information that was never private to begin with. Second, insofar as one makes once-private information public – whether intentionally or unintentionally – one waives one’s right to privacy to that information. In this article, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Deepfakes, Deep Harms.Regina Rini & Leah Cohen - 2022 - Journal of Ethics and Social Philosophy 22 (2).
    Deepfakes are algorithmically modified video and audio recordings that project one person’s appearance on to that of another, creating an apparent recording of an event that never took place. Many scholars and journalists have begun attending to the political risks of deepfake deception. Here we investigate other ways in which deepfakes have the potential to cause deeper harms than have been appreciated. First, we consider a form of objectification that occurs in deepfaked ‘frankenporn’ that digitally fuses the parts of different (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Glass Panels and Peepholes: Nonhuman Animals and the Right to Privacy.Angie Pepper - 2020 - Pacific Philosophical Quarterly 101 (4):628-650.
    In this paper, I defend the claim that many sentient nonhuman animals have a right to privacy. I begin by outlining the view that the human right to privacy protects our interest in shaping different kinds of relationships with one another by giving us control over how we present ourselves to others. I then draw on empirical research to show that nonhuman animals also have this interest, which grounds a right to privacy against us. I further argue that we can (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • The Idea of Public Property.Shmuel Nili - 2018 - Ethics 129 (2):344-369.
    Political theory lacks a compelling account of public property. Addressing this gap, I present a “deep public ownership” model, according to which the body politic ultimately owns all the resources within its jurisdiction. I argue that this model is compatible with liberal intuitions regarding private property. I then contend that the model expands the scope of government’s duty to uphold the equality of all citizens, by challenging private property constraints on antidiscriminatory government policies. I anticipate the worry that the model (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • What We Owe Past Selves.Lauritz Aastrup Munch - 2023 - Journal of Applied Philosophy 40 (5):936-950.
    Some say that we should respect the privacy of dead people. In this article, I take this idea for granted and use it to motivate the stronger claim that we sometimes ought to respect the privacy of our past selves.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Moral Significance of Privacy Dependencies.Lauritz Aastrup Munch & Jakob Thrane Mainz - 2023 - Philosophy and Technology 36 (4):1-19.
    Often, when we share information about ourselves, we contribute to people learning personal things about others. This may happen because what we share about ourselves can be used to infer personal information about others. Such dependencies have become known as privacy dependencies in the literature. It is sometimes claimed that the scope of the right to privacy should be expanded in light of such dependencies. For example, some have argued that inferring information about others can violate their right to privacy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • To Believe, or Not to Believe – That is Not the (Only) Question: The Hybrid View of Privacy.Lauritz Munch & Jakob Mainz - 2023 - The Journal of Ethics 27 (3):245-261.
    In this paper, we defend what we call the ‘Hybrid View’ of privacy. According to this view, an individual has privacy if, and only if, no one else forms an epistemically warranted belief about the individual’s personal matters, nor perceives them. We contrast the Hybrid View with what seems to be the most common view of what it means to access someone’s personal matters, namely the Belief-Based View. We offer a range of examples that demonstrate why the Hybrid View is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the thought (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • How Privacy Rights Engender Direct Doxastic Duties.Lauritz Aastrup Munch - 2022 - Journal of Value Inquiry 56 (4):547-562.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Digital Self-Defence: Why you Ought to Preserve Your Privacy for the Sake of Wrongdoers.Lauritz Aastrup Munch - 2022 - Ethical Theory and Moral Practice 25 (2):233-248.
    Most studies on the ethics of privacy focus on what others ought to do to accommodate our interest in privacy. I focus on a related but distinct question that has attracted less attention in the literature: When, if ever, does morality require us to safeguard our own privacy? While we often have prudential reasons for safeguarding our privacy, we are also, at least sometimes, morally required to do so. I argue that we, sometimes, ought to safeguard our privacy for the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A Defense of Privacy as Control.Leonhard Menges - 2021 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions about moral responsibility.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Inferences and the Right to Privacy.Jakob Mainz - forthcoming - Journal of Value Inquiry:1-19.
    In this paper, I defend what I call the ‘Inference Principle’. This principle holds that if an agent obtains some information legitimately, then the agent can make any inference she wants based on the information, without violating anyone’s right to privacy. This principle is interesting for at least three reasons. First, it constitutes a novel answer to the timely question of whether the widespread use of ‘data analytics’ to infer personal information about individuals is morally permissible. Second, it contradicts what (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • How we can make sense of control-based intuitions for limited access-conceptions of the right to privacy.Björn Lundgren - 2021 - Journal of Ethics and Social Philosophy 20 (3).
    Over the years, several counterexamples arguably establish the limits of control-based conceptions of privacy and the right to privacy. Some of these counterexamples focus only on privacy, while the control-based conception of the right to privacy is rejected because of conceptual consistency between privacy and the right to privacy. Yet, these counterexamples do not deny the intuitions of control-based conceptions of the right to privacy. This raises the question whether conceptual consistency is more important than intuitions in determining the right (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A Dilemma for Privacy as Control.Björn Lundgren - 2020 - The Journal of Ethics 24 (2):165-175.
    Although popular, control accounts of privacy suffer from various counterexamples. In this article, it is argued that two such counterexamples—while individually resolvable—can be combined to yield a dilemma for control accounts of privacy. Furthermore, it is argued that it is implausible that control accounts of privacy can defend against this dilemma. Thus, it is concluded that we ought not define privacy in terms of control. Lastly, it is argued that since the concept of privacy is the object of the right (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • Permissible Secrets.Hugh Lazenby & Iason Gabriel - 2018 - Philosophical Quarterly 68 (271):265-285.
    This article offers an account of the information condition on morally valid consent in the context of sexual relations. The account is grounded in rights. It holds that a person has a sufficient amount of information to give morally valid consent if, and only if, she has all the information to which she has a claim-right. A person has a claim-right to a piece of information if, and only if, a. it concerns a deal-breaker for her; b. it does not (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Ethical Design of Intelligent Assistive Technologies for Dementia: A Descriptive Review.Marcello Ienca, Tenzin Wangmo, Fabrice Jotterand, Reto W. Kressig & Bernice Elger - 2018 - Science and Engineering Ethics 24 (4):1035-1055.
    The use of Intelligent Assistive Technology in dementia care opens the prospects of reducing the global burden of dementia and enabling novel opportunities to improve the lives of dementia patients. However, with current adoption rates being reportedly low, the potential of IATs might remain under-expressed as long as the reasons for suboptimal adoption remain unaddressed. Among these, ethical and social considerations are critical. This article reviews the spectrum of IATs for dementia and investigates the prevalence of ethical considerations in the (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Proportionality in cyberwar and just war theory.Fredrik D. Hjorthen & James Pattison - 2023 - Ethics and Global Politics 16 (1):1-24.
    Which harms and benefits should be viewed as relevant when considering whether to launch cyber-measures? In this article, we consider this question, which matters because it is central to determining whether cyber-measures should be launched. Several just war theorists hold a version of what we call the ‘Restrictive View’, according to which there are restrictions on the sorts of harms and benefits that should be included in proportionality assessments about the justifiability of going to war (whether cyber or kinetic). We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Secrecy, transparency and government whistleblowing.William H. Harwood - 2017 - Philosophy and Social Criticism 43 (2):164-186.
    In the first part of the 21st century, the complicated relationship between transparency and security reached a boiling point with revelations of extra-judicial CIA activities, near universal NSA monitoring and unprecedented whistleblowing – and prosecution of whistleblowers under the Espionage Act. This article examines the dual necessities of security and transparency for any democracy, and the manner in which whistleblowers radically saddle this Janus-faced relationship. Then I will move to contemporary examples of whistleblowing, showing how and why some prove more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy Rights Forfeiture.Mark Hanin - 2022 - Journal of Ethics and Social Philosophy 22 (2).
    Privacy rights can surely be waived. But can they also be forfeited? If so, why and under what conditions? This article takes up these questions by developing a novel theory of privacy rights forfeiture that draws inspiration from Judith Thomson’s canonical work on privacy. The paper identifies two species of forfeiture rooted in modes of negligent and reckless conduct and argues that both self-directed and other-regarding considerations play a role in grounding forfeiture. The paper also contributes to the literature by (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Street Photography Ethics.John Hadley - 2022 - Ethical Theory and Moral Practice 25 (4):529-540.
    In this paper I examine the ethics of street photography. I firstly discuss the close-up ‘in-your-face’ style street photography made famous by American photographer, Bruce Gilden. In close-up street photography, the proximity of the camera to the subject and the element of surprise work in tandem to produce a striking and evocative picture. Close-up street photography is shown to be ethically contentious on wellbeing-related and autonomy-related grounds. I next examine the more orthodox ‘respectable distance’ kind of street photography. In orthodox (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy and the Importance of ‘Getting Away With It’.Cressida Gaukroger - 2020 - Journal of Moral Philosophy 17 (4):416-439.
    One reason people value privacy is that it allows them to do or think bad things – things that, if made public, would warrant blame, censure, or punishment. Privacy protects several types of freedom – and one of these is the freedom to be bad. This paper will argue that this is a good thing.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Wrongful Observation.Helen Frowe & Jonathan Parry - 2019 - Philosophy and Public Affairs 47 (1):104-137.
    According to common-sense morality, agents can become morally connected to the wrongdoing of others, such that they incur special obligations to prevent or rectify the wrongs committed by the primary wrongdoer. We argue that, under certain conditions, voluntary and unjustified observation of another agent’s degrading wrongdoing, or of the ‘product’ of their wrongdoing, can render an agent morally liable to bear costs for the sake of the victim of the primary wrong. We develop our account with particular reference to widespread (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Divine omniscience, privacy, and the state.David Elliott & Eldon Soifer - 2017 - International Journal for Philosophy of Religion 82 (3):251-271.
    Traditional theism teaches that God engages in a relentless form of observation for every human being. If, as is widely supposed, humans have a right to privacy, then it seems that God constantly violates this right. In this paper we argue that there is both a defensible philosophical excuse and justification for this infringement. We also argue that this defense is extensible to human social and political contexts; it provides the vital elements of a theory of just privacy infringement. This (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Political Privacy Dilemma: Private Lives and Public Office.John William Devine - forthcoming - Journal of Applied Philosophy.
    Should political leaders have a right to privacy? Incursions by new and traditional media into the private lives of political leaders are commonplace. Are such incursions ethically justifiable? Prima facie, the question of ‘political privacy’ seems to involve a conflict between a politician's self‐interest in retaining a protected private realm and citizens' public interest in having access to information about their representative's private life. Indeed, this is the structure that the debate has typically assumed. I challenge this orthodox view by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Ethics of Biosurveillance.S. K. Devitt, P. W. J. Baxter & G. Hamilton - 2019 - Journal of Agricultural and Environmental Ethics 32 (5):709-740.
    Governments must keep agricultural systems free of pests that threaten agricultural production and international trade. Biosecurity surveillance already makes use of a wide range of technologies, such as insect traps and lures, geographic information systems, and diagnostic biochemical tests. The rise of cheap and usable surveillance technologies such as remotely piloted aircraft systems presents value conflicts not addressed in international biosurveillance guidelines. The costs of keeping agriculture pest-free include privacy violations and reduced autonomy for farmers. We argue that physical and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Respect, Self-respect, and Self-knowledge.Michael Cholbi - forthcoming - The Monist.
    Respect appears to generate a puzzling self-other asymmetry: Respect for others can demand that we avoid knowledge of others or ignore that knowledge in deciding how we treat others. This demand for epistemic distancing lies behind the imperatives not to violate others’ privacy or to treat them paternalistically. Self-respect, in contrast, mandates that we pursue knowledge of ourselves and that we choose and act light of that self-knowledge. Individual agents thus do not have a duty to epistemically distance themselves from (...)
    Download  
     
    Export citation  
     
    Bookmark