Switch to: References

Add citations

You must login to add citations.
  1. An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy.Dorota Mokrosinska - 2018 - Law and Philosophy 37 (2):117-143.
    One of the most influential views in privacy scholarship is that privacy protects individual autonomy. On the early liberal view, the exercise of autonomy requires detachment from social and political life and privacy facilitates it. This view of privacy still informs current legal and political practice. As this view of privacy presupposes a tension between privacy and society, it is responsible for the underrating of privacy in legal and political practice. Over the last decades, liberal reflection on autonomy has shifted (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Virtue Ethics and Digital 'Flourishing': An Application of Philippa Foot to Life Online.Patrick Lee Plaisance - 2013 - Journal of Mass Media Ethics 28 (2):91-102.
    The neo-Aristotelian virtue theory of Philippa Foot is presented here as an alternative framework that is arguably more useful than deontological approaches and that relies less on the assertions of moral claims about the intrinsic goodness of foundational principles. Instead, this project focuses more on cultivating a true ethic; that is, a set of tools and propositions to enable individuals to negotiate inevitable conflicts among moral values and challenges posed by cultural contexts and technology use. Foot's ?natural normativity? connects the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Smart homes, private homes? An empirical study of technology researchers’ perceptions of ethical issues in developing smart-home health technologies.Giles Birchley, Richard Huxtable, Madeleine Murtagh, Ruud ter Meulen, Peter Flach & Rachael Gooberman-Hill - 2017 - BMC Medical Ethics 18 (1):23.
    Smart-home technologies, comprising environmental sensors, wearables and video are attracting interest in home healthcare delivery. Development of such technology is usually justified on the basis of the technology’s potential to increase the autonomy of people living with long-term conditions. Studies of the ethics of smart-homes raise concerns about privacy, consent, social isolation and equity of access. Few studies have investigated the ethical perspectives of smart-home engineers themselves. By exploring the views of engineering researchers in a large smart-home project, we sought (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • (1 other version)Equal Opportunity or Equal Social Outcome?Marc Fleurbaey - 1995 - Economics and Philosophy 11 (1):25.
    John Rawls's work has greatly contributed to rehabilitating equality as a basic social value, after decades of utilitarian hegemony,particularly in normative economics, but Rawls also emphasized that full equality of welfare is not an adequate goal either. This thesis was echoed in Dworkin's famous twin papers on equality, and it is now widely accepted that egalitarianism must be selective. The bulk of the debate on ‘Equality of What?’ thus deals with what variables ought to be submitted for selection and how (...)
    Download  
     
    Export citation  
     
    Bookmark   101 citations  
  • Authenticity as a normative category.Alessandro Ferrara - 1997 - Philosophy and Social Criticism 23 (3):77-92.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Biobank research and the right to privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.
    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Gossip and Social Punishment.Linda Radzik - 2016 - Res Philosophica 93 (1):185-204.
    Is gossip ever appropriate as a response to other people’s misdeeds or character flaws? Gossip is arguably the most common means through which communities hold people responsible for their vices and transgressions. Yet, gossiping itself is traditionally considered wrong. This essay develops an account of social punishment in order to ask whether gossip can serve as a legitimate means of enforcing moral norms. In the end, however, I argue that gossip is most likely to be permissible where it resembles punishment (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy Invasion by the News Media: Three Ethical Models.Candace Cummins Gauthier - 2002 - Journal of Mass Media Ethics 17 (1):20-34.
    In this article I provide an overview of philosophical conceptions of privacy and suggest 3 models to assist with the ethical analysis of privacy invasion by the news media. The models are framed by respect for persons, the comparison of harms and benefits, and the transfer of power. After describing the models, I demonstrate how they can be applied to news reporting that invades the privacy of public figures.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • An Ethical Exploration of Privacy and Radio Frequency Identification.Alan R. Peslak - 2005 - Journal of Business Ethics 59 (4):327-345.
    This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Informed consent and registry-based research - the case of the Danish circumcision registry.Thomas Ploug & Søren Holm - 2017 - BMC Medical Ethics 18 (1):53.
    Research into personal health data holds great potential not only for improved treatment but also for economic growth. In these years many countries are developing policies aimed at facilitating such research often under the banner of ‘big data’. A central point of debate is whether the secondary use of health data requires informed consent if the data is anonymised. In 2013 the Danish Minister of Health established a new register collecting data about all ritual male childhood circumcisions in Denmark. The (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Download  
     
    Export citation  
     
    Bookmark  
  • Politics in a State of Nature.William A. Edmundson - 2013 - Ratio Juris 26 (2):149-186.
    Aristotle thought we are by nature political animals, but the state-of-nature tradition sees political society not as natural but as an artifice. For this tradition, political society can usefully be conceived as emerging from a pre-political state of nature by the exercise of innate normative powers. Those powers, together with the rest of our native normative endowment, both make possible the construction of the state, and place sharp limits on the state's just powers and prerogatives. A state-of-nature theory has three (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy and the Integrity of Liberal Politics: The Case of Governmental Internet Searches.Dorota Mokrosinska - 2014 - Journal of Social Philosophy 45 (3):369-389.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • P2P surveillance in the global village.Jeremy Weissman - 2019 - Ethics and Information Technology 21 (1):29-47.
    New ubiquitous information and communication technologies, in particular recording-enabled smart devices and social media programs, are giving rise to a profound new power for ordinary people to monitor and track each other on a global scale. Along with this growing capacity to monitor one another is a new capacity to explicitly and publicly judge one another—to rate, rank, comment on, shame and humiliate each other through the net. Drawing upon warnings from Kierkegaard and Mill on the power of public opinion (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The open agent society as a platform for the user-friendly information society.Jeremy Pitt - 2005 - AI and Society 19 (2):123-158.
    A thematic priority of the European Union’s Framework V research and development programme was the creation of a user-friendly information society which met the needs of citizens and enterprises. In practice, though, for example in the case of on-line digital music, the needs of citizens and enterprises may be in conflict. This paper proposes to leverage the appearance of ‘intelligence’ in the platform layer of a layered communications architecture to avoid such conflicts in similar applications in the future. The key (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Agreeing in Ignorance: Mapping the Routinisation of Consent in ICT-Services.Thomas Ploug & Søren Holm - 2014 - Science and Engineering Ethics 20 (4):1097-1110.
    Many ICT services require that users explicitly consent to conditions of use and policies for the protection of personal information. This consent may become ‘routinised’. We define the concept of routinisation and investigate to what extent routinisation occurs as well as the factors influencing routinisation in a survey study of internet use. We show that routinisation is common and that it is influenced by factors including gender, age, educational level and average daily internet use. We further explore the reasons users (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy for Sale—Business as Usual in the 21st Century: An Economic and Normative Critique.Wilhelm Peekhaus - 2007 - Journal of Information Ethics 16 (1):83-98.
    Download  
     
    Export citation  
     
    Bookmark