Switch to: References

Add citations

You must login to add citations.
  1. Brain Privacy, Intimacy, and Authenticity: Why a Complete Lack of the Former Might Undermine Neither of the Latter!Kasper Lippert-Rasmussen - 2017 - Res Publica 23 (2):227-244.
    In recent years, neuroscience has been making dramatic progress. The discipline holds great promise but also raises a number of important ethical concerns. Among these is the concern that, some day in the distant future, we will have brain scanners capable of reading our minds, thus making our inner thoughts transparent to others. There are at least two reasons why we might regret our resulting loss of privacy. One is, so the argument goes, that this would undermine our ability to (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The democratic ethics of artificially intelligent polling.Roberto Cerina & Élise Rouméas - forthcoming - AI and Society:1-15.
    This paper examines the democratic ethics of artificially intelligent polls. Driven by machine learning, AI electoral polls have the potential to generate predictions with an unprecedented level of granularity. We argue that their predictive power is potentially desirable for electoral democracy. We do so by critically engaging with four objections: (1) the privacy objection, which focuses on the potential harm of the collection, storage, and publication of granular data about voting preferences; (2) the autonomy objection, which argues that polls are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Recognizing the Right Not to Know: Conceptual, Professional, and Legal Implications.Graeme Laurie - 2014 - Journal of Law, Medicine and Ethics 42 (1):53-63.
    The right not to know is a contested matter. This can be because the inversion of the normal framing of entitlement to information about one's own health is thought to be illogical and inconsistent with self-authorship and/or because the very idea of claiming a right not to know information is an inappropriate appeal to the discourse of rights that places impossible responsibilities on others. Notwithstanding, there has been a sustained increase in this kind of appeal in recent years fueled in (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • (1 other version)Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • An Emotional-Freedom Defense of Schadenfreude.Earl Spurgin - 2015 - Ethical Theory and Moral Practice 18 (4):767-784.
    Schadenfreude is the emotion we experience when we obtain pleasure from others’ misfortunes. Typically, we are not proud of it and admit experiencing it only sheepishly or apologetically. Philosophers typically view it, and the disposition to experience it, as moral failings. Two recent defenders of Schadenfreude, however, argue that it is morally permissible because it stems from judgments about the just deserts of those who suffer misfortunes. I also defend Schadenfreude, but on different grounds that overcome two deficiencies of those (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Global ICT‐ethics: the case of privacy.Göran Collste - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):76-87.
    In this paper I will take the right to privacy as an example when discussing the question of the prospects of global value consensus or value conflicts. The question whether privacy is a contextual value will be discussed in the remaining part of my paper and I will take the views of the Japanese ICT-ethicists Yohko Orito and Kiyosho Murata as my point of departure. In “Privacy protection in Japan: cultural influence on the universal value” (2005), they argue against the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy and lack of knowledge.Don Fallis - 2013 - Episteme 10 (2):153-166.
    Two sorts of connections between privacy and knowledge (or lack thereof) have been suggested in the philosophical literature. First, Alvin Goldman has suggested that protecting privacy typically leads to less knowledge being acquired. Second, several other philosophers (e.g. Parent, Matheson, Blaauw and Peels) have claimed that lack of knowledge is definitive of having privacy. In other words, someone not knowing something is necessary and sufficient for someone else having privacy about that thing. Or equivalently, someone knowing something is necessary and (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that the predominant accounts of privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Privacy as a Matter of Taste and Right.Alexander Rosenberg - 2000 - Social Philosophy and Policy 17 (2):68.
    Privacy is something we all want. We seek privacy to prevent others from securing information about us that is immediately embarrassing, and so causes us pain but not material loss. We also value privacy for strategic reasons in order to prevent others from imposing material and perhaps psychic costs upon us. I use the expression “securing information” so that it covers everything from the immediate sensory data that a voyeur acquires to the financial data a rival may acquire about our (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy and the USA patriot act: Rights, the value of rights, and autonomy.Alan Rubel - 2007 - Law and Philosophy 26 (2):119-159.
    Civil liberty and privacy advocates have criticized the USA PATRIOT Act (Act) on numerous grounds since it was passed in the wake of the World Trade Center attacks in 2001. Two of the primary targets of those criticisms are the Act’s sneak-and-peek search provision, which allows law enforcement agents to conduct searches without informing the search’s subjects, and the business records provision, which allows agents to secretly subpoena a variety of information – most notoriously, library borrowing records. Without attending to (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Download  
     
    Export citation  
     
    Bookmark   51 citations  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Caller ID – whose privacy is it, anyway?Kenneth G. Ferguson - 2001 - Journal of Business Ethics 29 (3):227 - 237.
    Caller ID or CND (Calling Number Display) is an internationally-available telecommunication service first introduced into the United States about ten years ago. Caller ID utilizes a new form of technology which enables telephone subscribers to identify the numbers (and/or names) of callers before picking up their telephones. This service has been widely assailed as an invasion of the caller''s right to anonymity, a right which allegedly subsists as an important component of the caller''s right to privacy. However, if privacy is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Meddlesome Blame and Negotiating Standing.Justin Snedegar - forthcoming - Noûs.
    Blaming others for things that are not our business can attract charges of meddling and dismissals of blame. It is well known that such charges are often contentious because the content and applicability of anti-meddling norms can be difficult to nail down. This paper argues that another important source of contention is that it is often not settled in advance whether some wrongdoing is or is not the business of a would-be blamer. Thinking about the grounds of anti-meddling norms—privacy, intimacy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • How Does Stalking Wrong the Victim?Elizabeth Brake - 2023 - Ethics 134 (1):4-31.
    Much stalking consists in behavior which would normally be permissible; indeed, many stalking behaviors are protected liberties. How, then, does the stalker wrong the victim? I consider and reject different answers as failing to identify the essential wrong of stalking: stalking perpetuates gender oppression; it threatens or coerces, disrespects autonomy, or violates privacy. I argue that the stalker forces a personal relationship on the target and that our interest in being able to refuse such relationships is strong enough to ground (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Bad Question!Sam Berstler - 2023 - Philosophy and Public Affairs 51 (4):413-449.
    Philosophy &Public Affairs, Volume 51, Issue 4, Page 413-449, Fall 2023.
    Download  
     
    Export citation  
     
    Bookmark  
  • What We Owe Past Selves.Lauritz Aastrup Munch - 2023 - Journal of Applied Philosophy 40 (5):936-950.
    Some say that we should respect the privacy of dead people. In this article, I take this idea for granted and use it to motivate the stronger claim that we sometimes ought to respect the privacy of our past selves.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • If There Is a Hole, It Is Not God Shaped.Guy Kahane - 2018 - In Klaas Kraay (ed.), Does God Matter? Essays on the Axiological Implications of Theism. pp. 95-131.
    Some people are deeply dissatisfied by the universe that modern science reveals to us. They long for the world described by traditional religion. They do not believe in God, but they wish He had existed. I argue that this is a mistake. The naturalist world we inhabit is admittedly rather bleak. It is very far from being the best of all possible worlds. But an alternative governed by God is also unwelcome, and the things that might make God’s existence attractive—cosmic (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the thought (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Three Control Views on Privacy.Leonhard Menges - 2022 - Social Theory and Practice 48 (4):691-711.
    This paper discusses the idea that the concept of privacy should be understood in terms of control. Three different attempts to spell out this idea will be critically discussed. The conclusion will be that the Source Control View on privacy is the most promising version of the idea that privacy is to be understood in terms of control.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Is there room for privacy in medical crowdfunding?Jeremy Snyder & Valorie A. Crooks - 2021 - Journal of Medical Ethics 47 (12):e49-e49.
    When people use online platforms to solicit funds from others for health-related needs, they are engaging in medical crowdfunding. This form of crowdfunding is growing in popularity, and its visibility is increasing as campaigns are commonly shared via social networking. A number of ethical issues have been raised about medical crowdfunding, one of which is that it introduces a number of privacy concerns. While campaigners are encouraged to share very personal details to encourage donations, the sharing of such details may (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A Defense of Privacy as Control.Leonhard Menges - 2020 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions about moral responsibility.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy and the Importance of ‘Getting Away With It’.Cressida Gaukroger - 2020 - Journal of Moral Philosophy 17 (4):416-439.
    One reason people value privacy is that it allows them to do or think bad things – things that, if made public, would warrant blame, censure, or punishment. Privacy protects several types of freedom – and one of these is the freedom to be bad. This paper will argue that this is a good thing.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity of citizens (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.
    This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account and illustrates the difficulties of doing so. Having set out the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Two Concepts of Group Privacy.Michele Loi & Markus Christen - 2020 - Philosophy and Technology 33 (2):207-224.
    Luciano Floridi was not the first to discuss the idea of group privacy, but he was perhaps the first to discuss it in relation to the insights derived from big data analytics. He has argued that it is important to investigate the possibility that groups have rights to privacy that are not reducible to the privacy of individuals forming such groups. In this paper, we introduce a distinction between two concepts of group privacy. The first, the “what happens in Vegas (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • A Framework for Analyzing and Comparing Privacy States.Alan Rubel & Ryan Biava - 2014 - JASIST: The Journal of the American Society for Information Science and Technology 65 (12):2422-2431.
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the nature and value of privacy. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Springer. pp. 459-474.
    Experimental design is one aspect of a scientific method. A well-designed, properly conducted experiment aims to control variables in order to isolate and manipulate causal effects and thereby maximize internal validity, support causal inferences, and guarantee reliable results. Traditionally employed in the natural sciences, experimental design has become an important part of research in the social and behavioral sciences. Experimental methods are also endorsed as the most reliable guides to policy effectiveness. Through a discussion of some of the central concepts (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, Kth Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued that the current leading definitions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Leenes R. Van Brakel R. Gutwirth S. De Hert P. (ed.), Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by Design (MHbD) model. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Egalitarian Justice versus the Right to Privacy?Richard J. Arneson - 2000 - Social Philosophy and Policy 17 (2):91-119.
    In their celebrated essay “The Right to Privacy,” legal scholars Samuel Warren and Louis Brandeis identified as the generic privacy value “the right to be let alone.” This same phrase occurs in Justice Brandeis's dissent inOlmstead v. U.S.(1927). This characterization of privacy has been found objectionable by philosophers acting as conceptual police. For example, moral philosopher William Parent asserts that one can wrongfully fail to let another person alone in all sorts of ways—such as assault—that intuitively do not qualify as (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • The ethics of clinical photography and social media.César Palacios-González - 2015 - Medicine, Health Care and Philosophy 18 (1):63-70.
    Clinical photography is an important tool for medical practice, training and research. While in the past clinical pictures were confined to the stringent controls of surgeries and hospitals technological advances have made possible to take pictures and share them through the internet with only a few clicks. Confronted with this possibility I explore if a case could be made for using clinical photography in tandem with social media. In order to do this I explore: if patient’s informed consent is required (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Perceived Access to Self-relevant Information Mediates Judgments of Privacy Violations in Neuromonitoring and Other Monitoring Technologies.D. A. Baker, N. J. Schweitzer & Evan F. Risko - 2013 - Neuroethics 7 (1):43-50.
    Advances in technology are bringing greater insight into the mind, raising a host of privacy concerns. However, the basic psychological mechanisms underlying the perception of privacy violations are poorly understood. Here, we explore the relation between the perception of privacy violations and access to information related to one’s “self.” In two studies using demographically diverse samples, we find that privacy violations resulting from various monitoring technologies are mediated by the extent to which the monitoring is thought to provide access to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • (1 other version)Reconstructing the Right to Privacy.Mark Alfino & G. Randolph Mayes - 2003 - Social Theory & Practice 29 (1):1-18.
    The article undertakes to develop a theory of privacy considered as a fundamental moral right. The authors remind that the conception of the right to privacy is silent on the prospect of protecting informational privacy on consequentialist grounds. However, laws that prevent efficient marketing practices, speedy medical attention, equitable distribution of social resources, and criminal activity could all be justified by appeal to informational privacy as a fundamental right. Finally, the authors show that in the specter of terrorism, privacy can (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Brain imaging and privacy.Juha Räikkä - 2010 - Neuroethics 3 (1):5-12.
    I will argue that the fairly common assumption that brain imaging may compromise people’s privacy in an undesirable way only if moral crimes are committed is false. Sometimes persons’ privacy is compromised because of failures of privacy. A normal emotional reaction to failures of privacy is embarrassment and shame, not moral resentment like in the cases of violations of right to privacy. I will claim that if (1) neuroimaging will provide all kinds of information about persons’ inner life and not (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Constitutional privacy.Jeffery L. Johnson - 1994 - Law and Philosophy 13 (2):161 - 193.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Defining privacy.Adam Moore - 2008 - Journal of Social Philosophy 39 (3):411-428.
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  • Ethical issues in electronic comemrce.Bette Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75 - 85.
    This article reviews the incredible growth of electronic commerce (e-commerce) and presents ethical issues that have emerged. Security concerns, spamming, Web sites that do not carry an "advertising" label, cybersquatters, online marketing to children, conflicts of interest, manufacturers competing with intermediaries online, and "dinosaurs" are discussed. The power of the Internet to spotlight issues is noted as a significant force in providing a kind of self-regulation that supports an ethical e-commerce environment.
    Download  
     
    Export citation  
     
    Bookmark   21 citations