Switch to: References

Add citations

You must login to add citations.
  1. Journalism ethics: a philosophical approach.Christopher Meyers (ed.) - 2010 - New York: Oxford University Press.
    Since the introduction of radio and television news, journalism has gone through multiple transformations, but each time it has been sustained by a commitment to basic values and best practices. Journalism Ethics is a reminder, a defense and an elucidation of core journalistic values, with particular emphasis on the interplay of theory, conceptual analysis and practice. The book begins with a sophisticated model for ethical decision-making, one that connects classical theories with the central purposes of journalism. Top scholars from philosophy, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • He/She/They/Ze.Robin Dembroff & Daniel Wodak - 2018 - Ergo: An Open Access Journal of Philosophy 5.
    In this paper, we defend two main claims. The first is a moderate claim: we have a negative duty to not use binary gender-specific pronouns he or she to refer to genderqueer individuals. We defend this with an argument by analogy. It was gravely wrong for Mark Latham to refer to Catherine McGregor, a transgender woman, using the pronoun he; we argue that such cases of misgendering are morally analogous to referring to Angel Haze, who identifies as genderqueer, as he (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  • Privacy and Control.Scott A. Davison - 1997 - Faith and Philosophy 14 (2):137-151.
    In this paper, I explore several privacy issues as they arise with respect to the divine/human relationship. First, in section 1, I discuss the notion of privacy in a general way. Section 2 is devoted to the claim that privacy involves control over information about oneself. In section 3, I summarize the arguments offered recently by Margaret Falls-Corbitt and F. Michael McLain for the conclusion that God respects the privacy of human persons by refraining from knowing certain things about them. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy and justification.Alexandra Couto - 2006 - Res Publica 12 (3):223-248.
    In this paper, I aim to demonstrate the importance of liberal engagement in public debate, in the face of Nagel’s claim that respect for privacy requires liberals to withdraw from their ‘control of the culture’. The paper starts by outlining a pluralist conception of privacy. I then proceed to examine whether there really is liberal cultural control, as Nagel affirms it, and whether such control truly involves a violation of privacy. Moreover, I argue that Nagel’s desire to leave the social (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Global ICT‐ethics: the case of privacy.Göran Collste - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):76-87.
    In this paper I will take the right to privacy as an example when discussing the question of the prospects of global value consensus or value conflicts. The question whether privacy is a contextual value will be discussed in the remaining part of my paper and I will take the views of the Japanese ICT-ethicists Yohko Orito and Kiyosho Murata as my point of departure. In “Privacy protection in Japan: cultural influence on the universal value” (2005), they argue against the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Good Proctor or “Big Brother”? Ethics of Online Exam Supervision Technologies.Simon Coghlan, Tim Miller & Jeannie Paterson - 2021 - Philosophy and Technology 34 (4):1581-1606.
    Online exam supervision technologies have recently generated significant controversy and concern. Their use is now booming due to growing demand for online courses and for off-campus assessment options amid COVID-19 lockdowns. Online proctoring technologies purport to effectively oversee students sitting online exams by using artificial intelligence systems supplemented by human invigilators. Such technologies have alarmed some students who see them as a “Big Brother-like” threat to liberty and privacy, and as potentially unfair and discriminatory. However, some universities and educators defend (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy perception and protection on Chinese social media: a case study of WeChat.Zhen Troy Chen & Ming Cheung - 2018 - Ethics and Information Technology 20 (4):279-289.
    In this study, the under-examined area of privacy perception and protection on Chinese social media is investigated. The prevalence of digital technology shapes the social, political and cultural aspects of the lives of urban young adults. The influential Chinese social media platform WeChat is taken as a case study, and the ease of connection, communication and transaction combined with issues of commercialisation and surveillance are discussed in the framework of the privacy paradox. Protective behaviour and tactics are examined through different (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Publicity, and the Right to Be Forgotten.Hannah Carnegy-Arbuthnott - 2023 - Journal of Political Philosophy 31 (4):494-516.
    Journal of Political Philosophy, EarlyView.
    Download  
     
    Export citation  
     
    Bookmark  
  • Technology, workplace privacy and personhood.William S. Brown - 1996 - Journal of Business Ethics 15 (11):1237 - 1248.
    This paper traces the intellectual development of the workplace privacy construct in the course of American thinking. The role of technological development in this process is examined, particularly in regard to the information gathering/dissemination dilemmas faced by employers and employees alike. The paper concludes with some preliminary considerations toward a theory of workplace privacy.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • How Does Stalking Wrong the Victim?Elizabeth Brake - 2023 - Ethics 134 (1):4-31.
    Much stalking consists in behavior which would normally be permissible; indeed, many stalking behaviors are protected liberties. How, then, does the stalker wrong the victim? I consider and reject different answers as failing to identify the essential wrong of stalking: stalking perpetuates gender oppression; it threatens or coerces, disrespects autonomy, or violates privacy. I argue that the stalker forces a personal relationship on the target and that our interest in being able to refuse such relationships is strong enough to ground (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Regressive De-Moralization.David A. Borman - 2023 - Radical Philosophy Review 26 (2):179-203.
    As Allen Buchanan and Russell Powell have observed, de-moralization—the retreat of normative regulation from specific areas of human life—represents an under-theorized component of the study of moral change. However, Buchanan and Powell, like Philip Kitcher, focus exclusively on instances of de-moralization that they regard as morally progressive. Indeed, the existing literature on moral change is almost silent on the matter of moral regression, and doubly so on the matter of regressive de-moralization. This paper attempts to define and defend a particular, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Shaheen Borna & Dheeraj Sharma - 2011 - Business and Society Review 116 (3):331-353.
    Download  
     
    Export citation  
     
    Bookmark  
  • Full‐Frontal Morality: The Naked Truth about Gender.Talia Mae Bettcher - 2012 - Hypatia 27 (2):319-337.
    This paper examines Harold Garfinkel's notion of the natural attitude about sex and his claim that it is fundamentally moral in nature. The author looks beneath the natural attitude in order to explain its peculiar resilience and oppressive force. There she reveals a moral order grounded in the dichotomously sexed bodies so constituted through boundaries governing privacy and decency. In particular, naked bodies are sex-differentiated within a system of genital representation through gender presentation—a system that helps constitute the very boundaries (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Willingness to Share yet Maintain Influence: A Cross-Sectional Study on Attitudes in Sweden to the Use of Electronic Health Data.Sara Belfrage, Niels Lynöe & Gert Helgesson - 2021 - Public Health Ethics 14 (1):23-34.
    We have investigated attitudes towards the use of health data among the Swedish population by analyzing data from a survey answered by 1645 persons. Health data are potentially useful for a variety of purposes. Yet information about health remains sensitive. A balance therefore has to be struck between these opposing considerations in a number of contexts. The attitudes among those whose data is concerned will influence the perceived legitimacy of policies regulating health data use. We aimed to investigate what views (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The paradox of secrecy.Beryl L. Bellman - 1979 - Human Studies 4 (1):1 - 24.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Privacy in the digital age: comparing and contrasting individual versus social approaches towards privacy.Marcel Becker - 2019 - Ethics and Information Technology 21 (4):307-317.
    This paper takes as a starting point a recent development in privacy-debates: the emphasis on social and institutional environments in the definition and the defence of privacy. Recognizing the merits of this approach I supplement it in two respects. First, an analysis of the relation between privacy and autonomy teaches that in the digital age more than ever individual autonomy is threatened. The striking contrast between on the one hand offline vocabulary, where autonomy and individual decision making prevail, and on (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The Moral Landscape of Monetary Design.Andrew M. Bailey, Bradley Rettler & Craig Warmke - 2021 - Philosophy Compass 16 (11):1-15.
    In this article, we identify three key design dimensions along which cryptocurrencies differ -- privacy, censorship-resistance, and consensus procedure. Each raises important normative issues. Our discussion uncovers new ways to approach the question of whether Bitcoin or other cryptocurrencies should be used as money, and new avenues for developing a positive answer to that question. A guiding theme is that progress here requires a mixed approach that integrates philosophical tools with the purely technical results of disciplines like computer science and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Use of Data Mining by Private Health Insurance Companies and Customers’ Privacy.Yeslam Al-Saggaf - 2015 - Cambridge Quarterly of Healthcare Ethics 24 (3):281-292.
    :This article examines privacy threats arising from the use of data mining by private Australian health insurance companies. Qualitative interviews were conducted with key experts, and Australian governmental and nongovernmental websites relevant to private health insurance were searched. Using Rationale, a critical thinking tool, the themes and considerations elicited through this empirical approach were developed into an argument about the use of data mining by private health insurance companies. The argument is followed by an ethical analysis guided by classical philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.
    This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the decision forest data mining algorithm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A critical contribution to theoretical foundations of privacy studies.Thomas Allmer - 2011 - Journal of Information, Communication and Ethics in Society 9 (2):83-101.
    PurposeAlthough there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there is a gap in the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Reconstructing the Right to Privacy.Mark Alfino & G. Randolph Mayes - 2003 - Social Theory & Practice 29 (1):1-18.
    The article undertakes to develop a theory of privacy considered as a fundamental moral right. The authors remind that the conception of the right to privacy is silent on the prospect of protecting informational privacy on consequentialist grounds. However, laws that prevent efficient marketing practices, speedy medical attention, equitable distribution of social resources, and criminal activity could all be justified by appeal to informational privacy as a fundamental right. Finally, the authors show that in the specter of terrorism, privacy can (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Intimacy, Privacy and Publicity.Ernesto Garzón Valdés - 2003 - Analyse & Kritik 25 (1):17-40.
    The article analyses the distinction between the private and the public sphere from a conceptual and from a normative point of view. On the conceptual level, it is argued that the common dichotomous view is incomplete, giving rise to conceptual confusions which can be overcome by a careful distinction between the intimate and the private sphere. While the boundary between the private and the public is a conventional matter, the sphere of intimacy, including thoughts as well as a certain type (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • What Makes Personal Data Processing by Social Networking Services Permissible?Lichelle Wolmarans & Alex Voorhoeve - 2022 - Canadian Journal of Philosophy 52 (1):93-108.
    Social Networking Services provide services in return for rights to commercialize users’ personal data. We argue that what makes this transaction permissible is not users’ autonomous consent but the provision of sufficiently valuable opportunities to exchange data for services. We argue that the value of these opportunities should be assessed for both (a) a range of users with different decision-making abilities and (b) third parties. We conclude that regulation should shift from aiming to ensure autonomous consent towards ensuring that users (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Right to Privacy.Lloyd L. Weinreb - 2000 - Social Philosophy and Policy 17 (2):25.
    The question that I address in this paper is whether there is a right to privacy. It is not the question whether in the United States there is a legal right to privacy or, more particularly, a constitutional right to privacy. There are any number of ordinary legal rights and specific constitutional rights that might be so described, and the U.S. Supreme Court has referred also to a generic “right to privacy” that is implicit in the U.S. Constitution. Nor is (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Biomedical Big Data: New Models of Control Over Access, Use and Governance.Alessandro Blasimme & Effy Vayena - 2017 - Journal of Bioethical Inquiry 14 (4):501-513.
    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Biobank research and the right to privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.
    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are not readily accessible, or (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The ethics of algorithms: key problems and solutions.Andreas Tsamados, Nikita Aggarwal, Josh Cowls, Jessica Morley, Huw Roberts, Mariarosaria Taddeo & Luciano Floridi - 2021 - AI and Society.
    Research on the ethics of algorithms has grown substantially over the past decade. Alongside the exponential development and application of machine learning algorithms, new ethical problems and solutions relating to their ubiquitous use in society have been proposed. This article builds on a review of the ethics of algorithms published in 2016, 2016). The goals are to contribute to the debate on the identification and analysis of the ethical implications of algorithms, to provide an updated analysis of epistemic and normative (...)
    Download  
     
    Export citation  
     
    Bookmark   42 citations  
  • The ethics of algorithms: key problems and solutions.Andreas Tsamados, Nikita Aggarwal, Josh Cowls, Jessica Morley, Huw Roberts, Mariarosaria Taddeo & Luciano Floridi - 2022 - AI and Society 37 (1):215-230.
    Research on the ethics of algorithms has grown substantially over the past decade. Alongside the exponential development and application of machine learning algorithms, new ethical problems and solutions relating to their ubiquitous use in society have been proposed. This article builds on a review of the ethics of algorithms published in 2016, 2016). The goals are to contribute to the debate on the identification and analysis of the ethical implications of algorithms, to provide an updated analysis of epistemic and normative (...)
    Download  
     
    Export citation  
     
    Bookmark   44 citations  
  • Sobre el concepto de privacidad: la relación entre privacidad e intimidad.Manuel Toscano - 2017 - Isegoría 57:533.
    El derecho a la privacidad está en el centro de muchos de los debates públicos actuales. Sin embargo, a pesar de la extensa literatura filosófica y jurídica sobre el tema, no contamos con una explicación adecuada del sentido y del valor de la privacidad. Esta falta de acuerdo sobre cuestiones conceptuales y normativas ha llevado a algún autor a hablar del ‘caos de la privacidad’. Este artículo se centra en la exploración conceptual de la privacidad. Para ello, en primer lugar, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.
    This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account and illustrates the difficulties of doing so. Having set out the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Ethics of Police Body-Worn Cameras.Frej Klem Thomsen - 2020 - Moral Philosophy and Politics 7 (1):97-121.
    Over the past decade, police departments in many countries have experimented with and increasingly adopted the use of police body-worn cameras. This article aims to examine the moral issues raised by the use of PBWCs, and to provide an overall assessment of the conditions under which the use of PBWCs is morally permissible. It first reviews the current evidence for the effects of using PBWCs. On the basis of this review the article sets out a teleological argument for the use (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
    I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides a (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Deepfake Pornography and the Ethics of Non-Veridical Representations.Daniel Story & Ryan Jenkins - 2023 - Philosophy and Technology 36 (3):1-22.
    We investigate the question of whether (and if so why) creating or distributing deepfake pornography of someone without their consent is inherently objectionable. We argue that nonconsensually distributing deepfake pornography of a living person on the internet is inherently pro tanto wrong in virtue of the fact that nonconsensually distributing intentionally non-veridical representations about someone violates their right that their social identity not be tampered with, a right which is grounded in their interest in being able to exercise autonomy over (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Alienation in a World of Data. Toward a Materialist Interpretation of Digital Information Technologies.Michael Steinmann - 2022 - Philosophy and Technology 35 (4):1-24.
    The essay proposes to use alienation as a heuristic and conceptual tool for the analysis of the impact of digital information and communication technologies (ICTs) on users. It follows a historical materialist understanding, according to which data can be considered as things produced in an industrial fashion. A representational interpretation, according to which data would merely reflect a given reality, is untenable. It will be argued instead to understand data as an additional layer which has a transformative impact on reality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity of citizens (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Emotional-Freedom Defense of Schadenfreude.Earl Spurgin - 2015 - Ethical Theory and Moral Practice 18 (4):767-784.
    Schadenfreude is the emotion we experience when we obtain pleasure from others’ misfortunes. Typically, we are not proud of it and admit experiencing it only sheepishly or apologetically. Philosophers typically view it, and the disposition to experience it, as moral failings. Two recent defenders of Schadenfreude, however, argue that it is morally permissible because it stems from judgments about the just deserts of those who suffer misfortunes. I also defend Schadenfreude, but on different grounds that overcome two deficiencies of those (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Ethics of Virtual Reality Technology: Social Hazards and Public Policy Recommendations.James S. Spiegel - 2018 - Science and Engineering Ethics 24 (5):1537-1550.
    This article explores four major areas of moral concern regarding virtual reality technologies. First, VR poses potential mental health risks, including Depersonalization/Derealization Disorder. Second, VR technology raises serious concerns related to personal neglect of users’ own actual bodies and real physical environments. Third, VR technologies may be used to record personal data which could be deployed in ways that threaten personal privacy and present a danger related to manipulation of users’ beliefs, emotions, and behaviors. Finally, there are other moral and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Piercing the veil: Ethical issues in ethnographic research.Brian Schrag - 2008 - Science and Engineering Ethics 15 (2):135-160.
    It is not unusual for researchers in ethnography (and sometimes Institutional Review Boards) to assume that research of “public” behavior is morally unproblematic. I examine an historical case of ethnographic research and the sustained moral outrage to the research expressed by the subjects of that research. I suggest that the moral outrage was legitimate and articulate some of the ethical issues underlying that outrage. I argue that morally problematic Ethnographic research of public behavior can derive from research practice that includes (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • How is Political Privacy Different from Personal Privacy? An Argument from Democratic Governance.Aleksandra Samonek - 2020 - Diametros:1-14.
    In this paper I discuss the political value of the right to privacy. The classical accounts of privacy do not differentiate between privacy as the right of a citizen against other citizens vs. the right to privacy as the right against the state or the government. I shall argue that this distinction should be made, since the new context of the privacy debate has surpassed the historical frames in which the intelligence methods used by governments were comparable to those available (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Emerging Ethical Issues in Living Labs.FaustoJ Sainz - 2012 - Ramon Llull Journal of Applied Ethics 3 (3):47.
    Living labs represent an important step in the development of research solutions based on the inclusive design paradigm. To ensure participants' rights and the adoption of an ethical approach to technological research, this paper presents some tools and strategies that comply with the needs and rights of those less advantaged groups to ensure that their rights and demands are taken into account. There is a gap in the construction and development of norms for a living lab. This article summarizes the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that the predominant accounts of privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations