Switch to: References

Add citations

You must login to add citations.
  1. Defending the “private” in constitutional privacy.Judith W. Decew - 1987 - Journal of Value Inquiry 21 (3):171-184.
    Suppose we agree to reject the view that privacy has narrow scope and consequently is irrelevant to the constitutional privacy cases. We then have (at least) these two options: (1) We might further emphasize and draw out similarities between tort and constitutional privacy claims in order to develop a notion of privacy fundamental to informational and Fourth Amendment privacy concerns as well as the constitutional cases. We can cite examples indicating this is a promising position. Consider consenting homosexuality conducted in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Global ICT‐ethics: the case of privacy.Göran Collste - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):76-87.
    In this paper I will take the right to privacy as an example when discussing the question of the prospects of global value consensus or value conflicts. The question whether privacy is a contextual value will be discussed in the remaining part of my paper and I will take the views of the Japanese ICT-ethicists Yohko Orito and Kiyosho Murata as my point of departure. In “Privacy protection in Japan: cultural influence on the universal value” (2005), they argue against the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Property rights of personal data and the financing of pensions.Francis Cheneval - 2021 - Critical Review of International Social and Political Philosophy 24 (2):253-275.
    Property rights of personal data have been advocated for some time. From the perspective of economics of law some argued that they could lower transaction costs for contracts involving personal data. This may be the case, but new transaction costs are introduced by propertization and the issue has not been settled. In this paper, I focus on a different and potentially more important aspect. In the actual situation, data collectors externalize costs and internalize benefits. An ownership regime that enables every (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Property rights of personal data and the financing of pensions.Francis Cheneval - 2021 - Critical Review of International Social and Political Philosophy 24 (2):253-275.
    Property rights of personal data have been advocated for some time. From the perspective of economics of law some argued that they could lower transaction costs for contracts involving personal data. This may be the case, but new transaction costs are introduced by propertization and the issue has not been settled. In this paper, I focus on a different and potentially more important aspect. In the actual situation, data collectors externalize costs and internalize benefits. An ownership regime that enables every (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • How Does Stalking Wrong the Victim?Elizabeth Brake - 2023 - Ethics 134 (1):4-31.
    Much stalking consists in behavior which would normally be permissible; indeed, many stalking behaviors are protected liberties. How, then, does the stalker wrong the victim? I consider and reject different answers as failing to identify the essential wrong of stalking: stalking perpetuates gender oppression; it threatens or coerces, disrespects autonomy, or violates privacy. I argue that the stalker forces a personal relationship on the target and that our interest in being able to refuse such relationships is strong enough to ground (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Shaheen Borna & Dheeraj Sharma - 2011 - Business and Society Review 116 (3):331-353.
    Download  
     
    Export citation  
     
    Bookmark  
  • Bad Question!Sam Berstler - 2023 - Philosophy and Public Affairs 51 (4):413-449.
    Philosophy &Public Affairs, Volume 51, Issue 4, Page 413-449, Fall 2023.
    Download  
     
    Export citation  
     
    Bookmark  
  • Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Ethical Framework for Hacking Operations.Ross W. Bellaby - 2021 - Ethical Theory and Moral Practice 24 (1):231-255.
    In recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Perceived Access to Self-relevant Information Mediates Judgments of Privacy Violations in Neuromonitoring and Other Monitoring Technologies.D. A. Baker, N. J. Schweitzer & Evan F. Risko - 2013 - Neuroethics 7 (1):43-50.
    Advances in technology are bringing greater insight into the mind, raising a host of privacy concerns. However, the basic psychological mechanisms underlying the perception of privacy violations are poorly understood. Here, we explore the relation between the perception of privacy violations and access to information related to one’s “self.” In two studies using demographically diverse samples, we find that privacy violations resulting from various monitoring technologies are mediated by the extent to which the monitoring is thought to provide access to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A critical contribution to theoretical foundations of privacy studies.Thomas Allmer - 2011 - Journal of Information, Communication and Ethics in Society 9 (2):83-101.
    PurposeAlthough there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there is a gap in the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Reconstructing the Right to Privacy.Mark Alfino & G. Randolph Mayes - 2003 - Social Theory & Practice 29 (1):1-18.
    The article undertakes to develop a theory of privacy considered as a fundamental moral right. The authors remind that the conception of the right to privacy is silent on the prospect of protecting informational privacy on consequentialist grounds. However, laws that prevent efficient marketing practices, speedy medical attention, equitable distribution of social resources, and criminal activity could all be justified by appeal to informational privacy as a fundamental right. Finally, the authors show that in the specter of terrorism, privacy can (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • If There Is a Hole, It Is Not God Shaped.Guy Kahane - 2018 - In Klaas J. Kraay (ed.), Does God Matter? Essays on the Axiological Implications of Theism. pp. 95-131.
    Some people are deeply dissatisfied by the universe that modern science reveals to us. They long for the world described by traditional religion. They do not believe in God, but they wish He had existed. I argue that this is a mistake. The naturalist world we inhabit is admittedly rather bleak. It is very far from being the best of all possible worlds. But an alternative governed by God is also unwelcome, and the things that might make God’s existence attractive—cosmic (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy and property in the biobank context.Lars Oystein Ursin - 2010 - HEC Forum 22 (3):211-224.
    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.
    This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account and illustrates the difficulties of doing so. Having set out the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Ethical issues in electronic comemrce.Bette Ann Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75 - 85.
    This article reviews the incredible growth of electronic commerce (e-commerce) and presents ethical issues that have emerged. Security concerns, spamming, Web sites that do not carry an "advertising" label, cybersquatters, online marketing to children, conflicts of interest, manufacturers competing with intermediaries online, and "dinosaurs" are discussed. The power of the Internet to spotlight issues is noted as a significant force in providing a kind of self-regulation that supports an ethical e-commerce environment.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Ethical Issues in Electronic Commerce.Bette Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75-85.
    This article reviews the incredible growth of electronic commerce (e-commerce) and presents ethical issues that have emerged. Security concerns, spamming, Web sites that do not carry an "advertising" label, cybersquatters, online marketing to children, conflicts of interest, manufacturers competing with intermediaries online, and "dinosaurs" are discussed. The power of the Internet to spotlight issues is noted as a significant force in providing a kind of self-regulation that supports an ethical e-commerce environment.
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity of citizens (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Emotional-Freedom Defense of Schadenfreude.Earl Spurgin - 2015 - Ethical Theory and Moral Practice 18 (4):767-784.
    Schadenfreude is the emotion we experience when we obtain pleasure from others’ misfortunes. Typically, we are not proud of it and admit experiencing it only sheepishly or apologetically. Philosophers typically view it, and the disposition to experience it, as moral failings. Two recent defenders of Schadenfreude, however, argue that it is morally permissible because it stems from judgments about the just deserts of those who suffer misfortunes. I also defend Schadenfreude, but on different grounds that overcome two deficiencies of those (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Is there room for privacy in medical crowdfunding?Jeremy Snyder & Valorie A. Crooks - 2021 - Journal of Medical Ethics 47 (12):e49-e49.
    When people use online platforms to solicit funds from others for health-related needs, they are engaging in medical crowdfunding. This form of crowdfunding is growing in popularity, and its visibility is increasing as campaigns are commonly shared via social networking. A number of ethical issues have been raised about medical crowdfunding, one of which is that it introduces a number of privacy concerns. While campaigners are encouraged to share very personal details to encourage donations, the sharing of such details may (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Saying Privacy, Meaning Confidentiality.Abraham P. Schwab, Lily Frank & Nada Gligorov - 2011 - American Journal of Bioethics 11 (11):44-45.
    The American Journal of Bioethics, Volume 11, Issue 11, Page 44-45, November 2011.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • How is Political Privacy Different from Personal Privacy? An Argument from Democratic Governance.Aleksandra Samonek - 2020 - Diametros:1-14.
    In this paper I discuss the political value of the right to privacy. The classical accounts of privacy do not differentiate between privacy as the right of a citizen against other citizens vs. the right to privacy as the right against the state or the government. I shall argue that this distinction should be made, since the new context of the privacy debate has surpassed the historical frames in which the intelligence methods used by governments were comparable to those available (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy Rights and Public Information.Benedict Rumbold & James Wilson - 2018 - Journal of Political Philosophy 27 (1):3-25.
    This article concerns the nature and limits of individuals’ rights to privacy over information that they have made public. For some, even suggesting that an individual can have a right to privacy over such information may seem paradoxical. First, one has no right to privacy over information that was never private to begin with. Second, insofar as one makes once-private information public – whether intentionally or unintentionally – one waives one’s right to privacy to that information. In this article, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that the predominant accounts of privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Privacy and the USA patriot act: Rights, the value of rights, and autonomy.Alan Rubel - 2007 - Law and Philosophy 26 (2):119-159.
    Civil liberty and privacy advocates have criticized the USA PATRIOT Act (Act) on numerous grounds since it was passed in the wake of the World Trade Center attacks in 2001. Two of the primary targets of those criticisms are the Act’s sneak-and-peek search provision, which allows law enforcement agents to conduct searches without informing the search’s subjects, and the business records provision, which allows agents to secretly subpoena a variety of information – most notoriously, library borrowing records. Without attending to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy as a Matter of Taste and Right.Alexander Rosenberg - 2000 - Social Philosophy and Policy 17 (2):68.
    Privacy is something we all want. We seek privacy to prevent others from securing information about us that is immediately embarrassing, and so causes us pain but not material loss. We also value privacy for strategic reasons in order to prevent others from imposing material and perhaps psychic costs upon us. I use the expression “securing information” so that it covers everything from the immediate sensory data that a voyeur acquires to the financial data a rival may acquire about our (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Brain imaging and privacy.Juha Räikkä - 2010 - Neuroethics 3 (1):5-12.
    I will argue that the fairly common assumption that brain imaging may compromise people’s privacy in an undesirable way only if moral crimes are committed is false. Sometimes persons’ privacy is compromised because of failures of privacy. A normal emotional reaction to failures of privacy is embarrassment and shame, not moral resentment like in the cases of violations of right to privacy. I will claim that if (1) neuroimaging will provide all kinds of information about persons’ inner life and not (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy and Genetics.Madison Powers - 2004 - In Justine Burley & John Harris (eds.), A Companion to Genethics. Oxford, UK: Blackwell. pp. 364–378.
    The prelims comprise: Introduction: Promise and Perils The History of Privacy as a Moral Concept Genetic Exceptionalism The Moral Basis of Medical Privacy Rights Genetic Paternalism Conclusion.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A cognitive access definition of privacy.Madison Powers - 1996 - Law and Philosophy 15 (4):369 - 386.
    Many of the contemporary disagreements regarding privacy are conceptual in nature. They concern the meaning or definition of privacy and the analytic basis of distinguishing privacy rights from other kinds of rights recognized within moral, political, or legal theories. The two main alternatives within this debate include reductionist views, which seek a narrow account of the kinds of invasions or intrusions distinctly involving privacy losses, and anti-reductionist theories, which treat a much broader array of interferences with a person as separate (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Andre on privacy.B. C. Postow - 1988 - Journal of Value Inquiry 22 (4):327-330.
    Download  
     
    Export citation  
     
    Bookmark  
  • An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The ethics of clinical photography and social media.César Palacios-González - 2015 - Medicine, Health Care and Philosophy 18 (1):63-70.
    Clinical photography is an important tool for medical practice, training and research. While in the past clinical pictures were confined to the stringent controls of surgeries and hospitals technological advances have made possible to take pictures and share them through the internet with only a few clicks. Confronted with this possibility I explore if a case could be made for using clinical photography in tandem with social media. In order to do this I explore: if patient’s informed consent is required (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Ethics of Smart Stadia: A Stakeholder Analysis of the Croke Park Project.Fiachra O’Brolcháin, Simone de Colle & Bert Gordijn - 2019 - Science and Engineering Ethics 25 (3):737-769.
    The development of “smart stadia”, i.e. the use of “smart technologies” in the way sports stadia are designed and managed, promises to enhance the experience of attending a live match through innovative and improved services for the audience, as well as for the players, vendors and other stadium stakeholders. These developments offer us a timely opportunity to reflect on the ethical implications of the use of smart technologies and the emerging Internet of Things. The IoT has the potential to radically (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Download  
     
    Export citation  
     
    Bookmark   48 citations  
  • What We Owe Past Selves.Lauritz Aastrup Munch - 2023 - Journal of Applied Philosophy 40 (5):936-950.
    Some say that we should respect the privacy of dead people. In this article, I take this idea for granted and use it to motivate the stronger claim that we sometimes ought to respect the privacy of our past selves.
    Download  
     
    Export citation  
     
    Bookmark  
  • What We Owe Past Selves.Lauritz Aastrup Munch - 2023 - Journal of Applied Philosophy 40 (5):936-950.
    Some say that we should respect the privacy of dead people. In this article, I take this idea for granted and use it to motivate the stronger claim that we sometimes ought to respect the privacy of our past selves.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Why ‘Negative Control’ is a Dead End: A Reply to Mainz and Uhrenfeldt.Lauritz Aastrup Munch - 2021 - Res Publica 27 (4):661-667.
    Mainz and Uhrenfeldt have recently claimed that a violation of the right to privacy can be defined successfully under reliance on the notion of ‘Negative Control’. In this reply, I show that ‘Negative Control’ is unrelated to privacy right violations. It follows that control theorists have yet to put forth a successful normative account of privacy.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Right to Privacy, Control Over Self‐Presentation, and Subsequent Harm.Lauritz Aastrup Munch - 2020 - Journal of Applied Philosophy 37 (1):141-154.
    Andrei Marmor has recently offered a narrow interpretation of the right to privacy as a right to having a reasonable amount of control over one's self‐presentation. He claims that the interest people have in preventing others from abusing their personal information to do harm is not directly protected by the right to privacy. This article rejects that claim and defends a view according to which concerns about abuse play a central role in fleshing out the appropriate scope of a general (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the thought (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • How Privacy Rights Engender Direct Doxastic Duties.Lauritz Aastrup Munch - 2022 - Journal of Value Inquiry 56 (4):547-562.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Digital Self-Defence: Why you Ought to Preserve Your Privacy for the Sake of Wrongdoers.Lauritz Aastrup Munch - 2022 - Ethical Theory and Moral Practice 25 (2):233-248.
    Most studies on the ethics of privacy focus on what others ought to do to accommodate our interest in privacy. I focus on a related but distinct question that has attracted less attention in the literature: When, if ever, does morality require us to safeguard our own privacy? While we often have prudential reasons for safeguarding our privacy, we are also, at least sometimes, morally required to do so. I argue that we, sometimes, ought to safeguard our privacy for the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation