Switch to: References

Citations of:

Privacy and Social Freedom

Cambridge University Press (1992)

Add citations

You must login to add citations.
  1. Deepfake Technology and Individual Rights.Francesco Stellin Sturino - 2023 - Social Theory and Practice 49 (1):161-187.
    Deepfake technology can be used to produce videos of real individuals, saying and doing things that they never in fact said or did, that appear highly authentic. Having accepted the premise that Deepfake content can constitute a legitimate form of expression, it is not immediately clear where the rights of content producers and distributors end, and where the rights of individuals whose likenesses are used in this content begin. This paper explores the question of whether it can be plausibly argued (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Smart homes, private homes? An empirical study of technology researchers’ perceptions of ethical issues in developing smart-home health technologies.Giles Birchley, Richard Huxtable, Madeleine Murtagh, Ruud ter Meulen, Peter Flach & Rachael Gooberman-Hill - 2017 - BMC Medical Ethics 18 (1):23.
    Smart-home technologies, comprising environmental sensors, wearables and video are attracting interest in home healthcare delivery. Development of such technology is usually justified on the basis of the technology’s potential to increase the autonomy of people living with long-term conditions. Studies of the ethics of smart-homes raise concerns about privacy, consent, social isolation and equity of access. Few studies have investigated the ethical perspectives of smart-home engineers themselves. By exploring the views of engineering researchers in a large smart-home project, we sought (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • In on the Joke: The Ethics of Humor and Comedy.Thomas Wilk & Steven Gimbel - 2024 - De Gruyter.
    Who is morally permitted to tell jokes about Jews? Poles? Women? Only those in the group? Only those who would be punching up? Anyone, since they are just jokes? All of the standard approaches are too broad or too narrow. In on the Joke provides a more sophisticated approach according to which each person possesses "joke capital" that can serve as "comic insurance" covering certain jokes in certain contexts. When Bob tells a joke about Jews, we can never know exactly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • P2P surveillance in the global village.Jeremy Weissman - 2019 - Ethics and Information Technology 21 (1):29-47.
    New ubiquitous information and communication technologies, in particular recording-enabled smart devices and social media programs, are giving rise to a profound new power for ordinary people to monitor and track each other on a global scale. Along with this growing capacity to monitor one another is a new capacity to explicitly and publicly judge one another—to rate, rank, comment on, shame and humiliate each other through the net. Drawing upon warnings from Kierkegaard and Mill on the power of public opinion (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Biobank research and the right to privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.
    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Peacemaking in Domestic Violence: From an Ethics of Care to an Ethics of Advocacy.Sally J. Scholz - 1998 - Journal of Social Philosophy 29 (2):46-58.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • The Good, the Bad, and the Ugly: Applying Rawlsian Ethics in Data Mining Marketing.Stephen Cory Robinson - 2015 - Journal of Media Ethics 30 (1):19-30.
    Using a Rawlsian approach to analyze the ethical implications of data mining within three major codes of ethics used by American marketing firms, the author argues that marketers should re-conceptualize their business conduct, as defined in their individual codes of ethics, to incorporate a Rawlsian concern for society's least advantaged members. Rawls's concept of primary goods provides the framework for the argument that anonymity, a component of privacy, is vital for consumers whose autonomy is affected by data mining. A combination (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Gossip and Social Punishment.Linda Radzik - 2016 - Res Philosophica 93 (1):185-204.
    Is gossip ever appropriate as a response to other people’s misdeeds or character flaws? Gossip is arguably the most common means through which communities hold people responsible for their vices and transgressions. Yet, gossiping itself is traditionally considered wrong. This essay develops an account of social punishment in order to ask whether gossip can serve as a legitimate means of enforcing moral norms. In the end, however, I argue that gossip is most likely to be permissible where it resembles punishment (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Informed consent and registry-based research - the case of the Danish circumcision registry.Thomas Ploug & Søren Holm - 2017 - BMC Medical Ethics 18 (1):53.
    Research into personal health data holds great potential not only for improved treatment but also for economic growth. In these years many countries are developing policies aimed at facilitating such research often under the banner of ‘big data’. A central point of debate is whether the secondary use of health data requires informed consent if the data is anonymised. In 2013 the Danish Minister of Health established a new register collecting data about all ritual male childhood circumcisions in Denmark. The (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Agreeing in Ignorance: Mapping the Routinisation of Consent in ICT-Services.Thomas Ploug & Søren Holm - 2014 - Science and Engineering Ethics 20 (4):1097-1110.
    Many ICT services require that users explicitly consent to conditions of use and policies for the protection of personal information. This consent may become ‘routinised’. We define the concept of routinisation and investigate to what extent routinisation occurs as well as the factors influencing routinisation in a survey study of internet use. We show that routinisation is common and that it is influenced by factors including gender, age, educational level and average daily internet use. We further explore the reasons users (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Virtue Ethics and Digital 'Flourishing': An Application of Philippa Foot to Life Online.Patrick Lee Plaisance - 2013 - Journal of Mass Media Ethics 28 (2):91-102.
    The neo-Aristotelian virtue theory of Philippa Foot is presented here as an alternative framework that is arguably more useful than deontological approaches and that relies less on the assertions of moral claims about the intrinsic goodness of foundational principles. Instead, this project focuses more on cultivating a true ethic; that is, a set of tools and propositions to enable individuals to negotiate inevitable conflicts among moral values and challenges posed by cultural contexts and technology use. Foot's ?natural normativity? connects the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • An Ethical Exploration of Privacy and Radio Frequency Identification.Alan R. Peslak - 2005 - Journal of Business Ethics 59 (4):327-345.
    This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy for Sale—Business as Usual in the 21st Century: An Economic and Normative Critique.Wilhelm Peekhaus - 2007 - Journal of Information Ethics 16 (1):83-98.
    Download  
     
    Export citation  
     
    Bookmark  
  • An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy and the Integrity of Liberal Politics: The Case of Governmental Internet Searches.Dorota Mokrosinska - 2014 - Journal of Social Philosophy 45 (3):369-389.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy.Dorota Mokrosinska - 2018 - Law and Philosophy 37 (2):117-143.
    One of the most influential views in privacy scholarship is that privacy protects individual autonomy. On the early liberal view, the exercise of autonomy requires detachment from social and political life and privacy facilitates it. This view of privacy still informs current legal and political practice. As this view of privacy presupposes a tension between privacy and society, it is responsible for the underrating of privacy in legal and political practice. Over the last decades, liberal reflection on autonomy has shifted (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Equal Opportunity or Equal Social Outcome?Marc Fleurbaey - 1995 - Economics and Philosophy 11 (1):25.
    John Rawls's work has greatly contributed to rehabilitating equality as a basic social value, after decades of utilitarian hegemony,particularly in normative economics, but Rawls also emphasized that full equality of welfare is not an adequate goal either. This thesis was echoed in Dworkin's famous twin papers on equality, and it is now widely accepted that egalitarianism must be selective. The bulk of the debate on ‘Equality of What?’ thus deals with what variables ought to be submitted for selection and how (...)
    Download  
     
    Export citation  
     
    Bookmark   96 citations  
  • Freedom in the Age of surveillance capitalism: Lessons from Shoshana Zuboff.Yevhen Laniuk - 2021 - Ethics and Bioethics (in Central Europe) 11 (1-2):67-81.
    The Age of surveillance capitalism is a profound economical, sociological, political, philosophical, and ethical work by the American author, Harvard University Professor Shoshana Zuboff. In this work, she analyzes the new economic system, which she calls “surveillance capitalism.” This system revolves around the commodification of personal data, which allows human behavior to be predicted and “nudged” towards profitable ends. This system is historically unprecedented and has only become possible in the technological milieu of interconnected devices, which appeared in the 21st (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Interpretation of the Right to Privacy from the Perspective of the Use of New Technologies.Justyna E. Kulikowska-Kulesza - 2020 - Studies in Logic, Grammar and Rhetoric 65 (1):93-102.
    Today’s reality, largely based on the development of technology, carries with it many dangers for various spheres of our lives. One of the areas most at risk is our privacyand thus our right to privacy. It is one of the fundamental human rights, but unfortunately today it is exposed to many violations. This article is an attempt to interpret the right to privacy, and it shows selected threats to this right from the perspective of the development of new technologies.
    Download  
     
    Export citation  
     
    Bookmark  
  • The open agent society as a platform for the user-friendly information society.Jeremy Pitt - 2005 - AI and Society 19 (2):123-158.
    A thematic priority of the European Union’s Framework V research and development programme was the creation of a user-friendly information society which met the needs of citizens and enterprises. In practice, though, for example in the case of on-line digital music, the needs of citizens and enterprises may be in conflict. This paper proposes to leverage the appearance of ‘intelligence’ in the platform layer of a layered communications architecture to avoid such conflicts in similar applications in the future. The key (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • You’ve got a friend in me: sociable robots for older adults in an age of global pandemics.Nancy S. Jecker - 2020 - Ethics and Information Technology 23 (S1):35-43.
    Social isolation and loneliness are ongoing threats to health made worse by the coronavirus disease 2019 pandemic. During the pandemic, half the globe's population have been placed under strict physical distancing orders and many long-term care facilities serving older adults went into lockdown mode, restricting access to all visitors, including family members. Before the pandemic emerged, a 2020 National Academy of Sciences, Engineering and Medicine report warned of the underappreciated adverse effects of social isolation and loneliness on health, especially among (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy Invasion by the News Media: Three Ethical Models.Candace Cummins Gauthier - 2002 - Journal of Mass Media Ethics 17 (1):20-34.
    In this article I provide an overview of philosophical conceptions of privacy and suggest 3 models to assist with the ethical analysis of privacy invasion by the news media. The models are framed by respect for persons, the comparison of harms and benefits, and the transfer of power. After describing the models, I demonstrate how they can be applied to news reporting that invades the privacy of public figures.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Authenticity as a normative category.Alessandro Ferrara - 1997 - Philosophy and Social Criticism 23 (3):77-92.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Politics in a State of Nature.William A. Edmundson - 2013 - Ratio Juris 26 (2):149-186.
    Aristotle thought we are by nature political animals, but the state-of-nature tradition sees political society not as natural but as an artifice. For this tradition, political society can usefully be conceived as emerging from a pre-political state of nature by the exercise of innate normative powers. Those powers, together with the rest of our native normative endowment, both make possible the construction of the state, and place sharp limits on the state's just powers and prerogatives. A state-of-nature theory has three (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   23 citations