Switch to: References

Add citations

You must login to add citations.
  1. The Politics of Becoming: Anonymity and Democracy in the Digital Age.Hans Asenbaum - 2023 - Oxford: Oxford University Press.
    When we participate in political debate or protests, we are judged by how we look, which clothes we wear, by our skin colour, gender and body language. This results in exclusions and limits our freedom of expression. The Politics of Becoming explores radical democratic acts of disidentification to counter this problem. Anonymity in masked protest, graffiti, and online de-bate interrupts our everyday identities. This allows us to live our multiple selves. In the digital age, anonymity becomes an inherent part of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • (1 other version)The Moral Landscape of Monetary Design.Andrew M. Bailey, Bradley Rettler & Craig Warmke - 2021 - Philosophy Compass 16 (11):1-15.
    In this article, we identify three key design dimensions along which cryptocurrencies differ -- privacy, censorship-resistance, and consensus procedure. Each raises important normative issues. Our discussion uncovers new ways to approach the question of whether Bitcoin or other cryptocurrencies should be used as money, and new avenues for developing a positive answer to that question. A guiding theme is that progress here requires a mixed approach that integrates philosophical tools with the purely technical results of disciplines like computer science and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Technology as Terrorism: Police Control Technologies and Drone Warfare.Jessica Wolfendale - 2021 - In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21.
    Debates about terrorism and technology often focus on the potential uses of technology by non-state terrorist actors and by states as forms of counterterrorism. Yet, little has been written about how technology shapes how we think about terrorism. In this chapter I argue that technology, and the language we use to talk about technology, constrains and shapes our understanding of the nature, scope, and impact of terrorism, particularly in relation to state terrorism. After exploring the ways in which technology shapes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Logical Structure of Intentional Anonymity.Michał Barcz, Jarek Gryz & Adam Wierzbicki - 2019 - Diametros 16 (60):1-17.
    It has been noticed by several authors that the colloquial understanding of anonymity as mere unknown-ness is insufficient. This common-sense notion of anonymity does not recognize the role of the goal for which the anonymity is sought. Starting with the distinction between the intentional and unintentional anonymity (which are usually taken to be the same) and the general concept of the non-coordinatability of traits, we offer a logical analysis of anonymity and identification (understood as de-anonymization). In our enquiry, we focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privatheit und Identifizierbarkeit - Warum die Verbreitung anonymer Daten die Privatheit verletzen kann.Philipp Schwind - forthcoming - Zeitschrift Für Ethik Und Moralphilosophie.
    The right to privacy extends only to information through which the persons concerned are identifiable. This assumption is widely shared in law and in philosophical debate; it also guides the handling of personal data, for example, in medicine. However, this essay argues that the dissemination of anonymous information can also constitute a violation of privacy. This conclusion arises from two theses: (1) From the perspective of the affected person, judgments by others about anonymous information refer to its originator, even if (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Truth, Lies, and the Narrative Self.Steve Matthews & Jeanette Kennett - 2012 - American Philosophical Quarterly 49 (4):301-316.
    Social persons routinely tell themselves and others richly elaborated autobiographical stories filled with details about deeds, plans, roles, motivations, values, and character. Saul, let us imagine, is someone who once sailed the world as a young adventurer, going from port to port and living a gypsy existence. In telling his new acquaintance, Jess, of his former exotic life, he shines a light on his present character and this may guide to some extent their interaction here and now. Perhaps Jess also (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Treating sensitive topics online: a privacy dilemma.Paula Helm - 2018 - Ethics and Information Technology 20 (4):303-313.
    This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Moments of identity: dynamics of artist, persona, and audience in electronic music.Giovanni Formilan & David Stark - 2023 - Theory and Society 52 (1):35-64.
    In our account of artistic identities among electronic music artists, we point to the notion of persona as a key element in a triadic framework for studying the dynamics of identity. Building on pragmatist theory, we further draw on Pizzorno’s concept of mask and Luhmann’s notion of second-order observation to highlight the dual properties of persona: whether like a mask that is put on or like a probe that is put out, persona is a part that stands apart. Persona is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, Kth Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued that the current leading definitions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Protesting without a face: Privacy in public demonstrations.Domingo A. Lovera-Parmo - 2023 - Constellations 30 (2):179-191.
    Download  
     
    Export citation  
     
    Bookmark  
  • Public anonymity and the connected world.Tony Doyle & Judy Veranas - 2014 - Ethics and Information Technology 16 (3):207-218.
    We defend public anonymity in the light of the threat posed by digital technology. Once people could reasonably assume that they were fairly anonymous when they left the house. They neither drove nor walked around with GPS devices; they paid their highway tolls in cash; they seldom bought on credit; and no cameras marked their strolls in the park or their walks down the street. Times have changed. We begin with a brief discussion of the concept of anonymity. We then (...)
    Download  
     
    Export citation  
     
    Bookmark