Switch to: References

Add citations

You must login to add citations.
  1. (1 other version)Reconstructing the Right to Privacy.Mark Alfino & G. Randolph Mayes - 2003 - Social Theory & Practice 29 (1):1-18.
    The article undertakes to develop a theory of privacy considered as a fundamental moral right. The authors remind that the conception of the right to privacy is silent on the prospect of protecting informational privacy on consequentialist grounds. However, laws that prevent efficient marketing practices, speedy medical attention, equitable distribution of social resources, and criminal activity could all be justified by appeal to informational privacy as a fundamental right. Finally, the authors show that in the specter of terrorism, privacy can (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy and the Right to Privacy.H. J. McCloskey - 1980 - Philosophy 55 (211):17 - 38.
    The right to privacy is one of the rights most widely demanded today. Privacy has not always so been demanded. The reasons for the present concern for privacy are complex and obscure. They obviously relate both to the possibilities for very considerable enjoyment of privacy by the bulk of people living in affluent societies brought about by twentieth-century affluence, and to the development of very efficient methods of thoroughly and systematically invading this newly found privacy. However, interesting and important as (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • Deepfake Technology and Individual Rights.Francesco Stellin Sturino - 2023 - Social Theory and Practice 49 (1):161-187.
    Deepfake technology can be used to produce videos of real individuals, saying and doing things that they never in fact said or did, that appear highly authentic. Having accepted the premise that Deepfake content can constitute a legitimate form of expression, it is not immediately clear where the rights of content producers and distributors end, and where the rights of individuals whose likenesses are used in this content begin. This paper explores the question of whether it can be plausibly argued (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy Rights, and Why Negative Control is Not a Dead End: A Reply to Munch and Lundgren.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2021 - Res Publica 28 (2):391-400.
    Lauritz Munch and Björn Lundgren have recently replied to a paper published by us in this journal. In our original paper, we defended a novel version of the so-called ‘control theory’ of the moral right to privacy. We argued that control theorists should define ‘control’ as what we coined ‘Negative Control’. Munch and Lundgren have recently provided a range of interesting and challenging objections to our view. Independently of each other, they give almost identical counterexamples to our definition of Negative (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • A cognitive access definition of privacy.Madison Powers - 1996 - Law and Philosophy 15 (4):369 - 386.
    Many of the contemporary disagreements regarding privacy are conceptual in nature. They concern the meaning or definition of privacy and the analytic basis of distinguishing privacy rights from other kinds of rights recognized within moral, political, or legal theories. The two main alternatives within this debate include reductionist views, which seek a narrow account of the kinds of invasions or intrusions distinctly involving privacy losses, and anti-reductionist theories, which treat a much broader array of interferences with a person as separate (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Principles of liberty and the right to privacy.RobertB Hallborg - 1986 - Law and Philosophy 5 (2):175 - 218.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy and perfect voyeurism.Tony Doyle - 2009 - Ethics and Information Technology 11 (3):181-189.
    I argue that there is nothing wrong with perfect voyeurism , covert watching or listening that is neither discovered nor publicized. After a brief discussion of privacy I present attempts from Stanley Benn, Daniel Nathan, and James Moor to show that the act is wrong. I argue that these authors fail to make their case. However, I maintain that, if detected or publicized, voyeurism can do grave harm and to that extent should be severely punished. I conclude with some thoughts (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  • Meddlesome Blame and Negotiating Standing.Justin Snedegar - forthcoming - Noûs.
    Blaming others for things that are not our business can attract charges of meddling and dismissals of blame. It is well known that such charges are often contentious because the content and applicability of anti-meddling norms can be difficult to nail down. This paper argues that another important source of contention is that it is often not settled in advance whether some wrongdoing is or is not the business of a would-be blamer. Thinking about the grounds of anti-meddling norms—privacy, intimacy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Moral Significance of Privacy Dependencies.Lauritz Aastrup Munch & Jakob Thrane Mainz - 2023 - Philosophy and Technology 36 (4):1-19.
    Often, when we share information about ourselves, we contribute to people learning personal things about others. This may happen because what we share about ourselves can be used to infer personal information about others. Such dependencies have become known as privacy dependencies in the literature. It is sometimes claimed that the scope of the right to privacy should be expanded in light of such dependencies. For example, some have argued that inferring information about others can violate their right to privacy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Do Your Homework! A Rights-Based Zetetic Account of Alleged Cases of Doxastic Wronging.J. Spencer Atkins - forthcoming - Ethical Theory and Moral Practice:1-28.
    This paper offers an alternate explanation of cases from the doxastic wronging literature. These cases violate what I call the degree of inquiry right—a novel account of zetetic obligations to inquire when interests are at stake. The degree of inquiry right is a moral right against other epistemic agents to inquire to a certain threshold when a belief undermines one’s interests. Thus, the agents are sometimes obligated to leave inquiry open. I argue that we have relevant interests in reputation, relationships, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Publicity, and the Right to Be Forgotten.Hannah Carnegy-Arbuthnott - 2023 - Journal of Political Philosophy 31 (4):494-516.
    Journal of Political Philosophy, EarlyView.
    Download  
     
    Export citation  
     
    Bookmark  
  • Deepfake Pornography and the Ethics of Non-Veridical Representations.Daniel Story & Ryan Jenkins - 2023 - Philosophy and Technology 36 (3):1-22.
    We investigate the question of whether (and if so why) creating or distributing deepfake pornography of someone without their consent is inherently objectionable. We argue that nonconsensually distributing deepfake pornography of a living person on the internet is inherently pro tanto wrong in virtue of the fact that nonconsensually distributing intentionally non-veridical representations about someone violates their right that their social identity not be tampered with, a right which is grounded in their interest in being able to exercise autonomy over (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Bad Question!Sam Berstler - 2023 - Philosophy and Public Affairs 51 (4):413-449.
    Philosophy &Public Affairs, Volume 51, Issue 4, Page 413-449, Fall 2023.
    Download  
     
    Export citation  
     
    Bookmark  
  • What We Owe Past Selves.Lauritz Aastrup Munch - 2023 - Journal of Applied Philosophy 40 (5):936-950.
    Some say that we should respect the privacy of dead people. In this article, I take this idea for granted and use it to motivate the stronger claim that we sometimes ought to respect the privacy of our past selves.
    Download  
     
    Export citation  
     
    Bookmark  
  • To Believe or not to Believe - That is not the (Only) Question: the Hybrid View of Privacy.Lauritz Munch & Jakob Mainz - 2023 - The Journal of Ethics 27 (3):245-261.
    In this paper, we defend what we call the ‘Hybrid View’ of privacy. According to this view, an individual has privacy if, and only if, no one else forms an epistemically warranted belief about the individual’s personal matters, nor perceives them. We contrast the Hybrid View with what seems to be the most common view of what it means to access someone’s personal matters, namely the Belief-Based View. We offer a range of examples that demonstrate why the Hybrid View is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A principlist framework for cybersecurity ethics.Paul Formosa, Michael Wilson & Deborah Richards - 2021 - Computers and Security 109.
    The ethical issues raised by cybersecurity practices and technologies are of critical importance. However, there is disagreement about what is the best ethical framework for understanding those issues. In this paper we seek to address this shortcoming through the introduction of a principlist ethical framework for cybersecurity that builds on existing work in adjacent fields of applied ethics, bioethics, and AI ethics. By redeploying the AI4People framework, we develop a domain-relevant specification of five ethical principles in cybersecurity: beneficence, non-maleficence, autonomy, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the rise of new information and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Inferences and the Right to Privacy.Jakob Mainz - forthcoming - Journal of Value Inquiry:1-19.
    In this paper, I defend what I call the ‘Inference Principle’. This principle holds that if an agent obtains some information legitimately, then the agent can make any inference she wants based on the information, without violating anyone’s right to privacy. This principle is interesting for at least three reasons. First, it constitutes a novel answer to the timely question of whether the widespread use of ‘data analytics’ to infer personal information about individuals is morally permissible. Second, it contradicts what (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Importance of Forgetting.Rima Basu - 2022 - Episteme 19 (4):471-490.
    Morality bears on what we should forget. Some aspects of our identity are meant to be forgotten and there is a distinctive harm that accompanies the permanence of some content about us, content that prompts a duty to forget. To make the case that forgetting is an integral part of our moral duties to others, the paper proceeds as follows. In §1, I make the case that forgetting is morally evaluable and I survey three kinds of forgetting: no-trace forgetting, archival (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Wronging Oneself.Daniel Muñoz & Nathaniel Baron-Schmitt - 2024 - Journal of Philosophy 121 (4):181-207.
    When, if ever, do we wrong ourselves? The Self-Other Symmetric answer is: when we do to ourselves what would wrong a consenting other. The standard objection, which has gone unchallenged for decades, is that Symmetry seems to imply that we wrong ourselves in too many cases—where rights are unwaivable, or “self-consent” is lacking. We argue that Symmetry not only survives these would-be counterexamples; it explains and unifies them. The key to Symmetry is not, as critics have supposed, the bizarre claim (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark  
  • Government Surveillance, Privacy, and Legitimacy.Peter Königs - 2022 - Philosophy and Technology 35 (1):1-22.
    The recent decades have seen established liberal democracies expand their surveillance capacities on a massive scale. This article explores what is problematic about government surveillance by democracies. It proceeds by distinguishing three potential sources of concern: the concern that governments diminish citizens’ privacy by collecting their data, the concern that they diminish their privacy by accessing their data, and the concern that the collected data may be used for objectionable purposes. Discussing the meaning and value of privacy, the article argues (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Why ‘Negative Control’ is a Dead End: A Reply to Mainz and Uhrenfeldt.Lauritz Aastrup Munch - 2021 - Res Publica 27 (4):661-667.
    Mainz and Uhrenfeldt have recently claimed that a violation of the right to privacy can be defined successfully under reliance on the notion of ‘Negative Control’. In this reply, I show that ‘Negative Control’ is unrelated to privacy right violations. It follows that control theorists have yet to put forth a successful normative account of privacy.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the thought (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • A Defense of Privacy as Control.Leonhard Menges - 2021 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions about moral responsibility.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Libertarianism and Climate Change.Olle Torpman - 2016 - Dissertation, Stockholm University
    In this dissertation, I investigate the implications of libertarian morality in relation to the problem of climate change. This problem is explicated in the first chapter, where preliminary clarifications are also made. In the second chapter, I briefly explain the characteristics of libertarianism relevant to the subsequent study, including the central non-aggression principle. In chapter three, I examine whether our individual emissions of greenhouse gases, which together give rise to climate change, meet this principle. I do this based on the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A Tale of Two Doctrines: Moral Encroachment and Doxastic Wronging.Rima Basu - 2021 - In Jennifer Lackey (ed.), Applied Epistemology. New York, NY: Oxford University Press. pp. 99-118.
    In this paper, I argue that morality might bear on belief in at least two conceptually distinct ways. The first is that morality might bear on belief by bearing on questions of justification. The claim that it does is the doctrine of moral encroachment. The second, is that morality might bear on belief given the central role belief plays in mediating and thereby constituting our relationships with one another. The claim that it does is the doctrine of doxastic wronging. Though (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will then analyse the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Own Data? Ethical Reflections on Data Ownership.Patrik Hummel, Matthias Braun & Peter Dabrock - 2020 - Philosophy and Technology 34 (3):545-572.
    In discourses on digitization and the data economy, it is often claimed that data subjects shall beownersof their data. In this paper, we provide a problem diagnosis for such calls fordata ownership: a large variety of demands are discussed under this heading. It thus becomes challenging to specify what—if anything—unites them. We identify four conceptual dimensions of calls for data ownership and argue that these help to systematize and to compare different positions. In view of this pluralism of data ownership (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Internet privacy, technology, and personal information.Marjorie S. Price - 2020 - Ethics and Information Technology 22 (2):163-173.
    Computer programs are used to obtain and store information about the online activities of users of the web. Many people are concerned about this practice because they believe that it can violate users' rights to privacy or result in violations of them. This belief is based on the assumption that the information obtained and stored with the use of the programs includes personal information. My main aim in this paper is to argue that this assumption is false. I discuss the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Wrongful Observation.Helen Frowe & Jonathan Parry - 2019 - Philosophy and Public Affairs 47 (1):104-137.
    According to common-sense morality, agents can become morally connected to the wrongdoing of others, such that they incur special obligations to prevent or rectify the wrongs committed by the primary wrongdoer. We argue that, under certain conditions, voluntary and unjustified observation of another agent’s degrading wrongdoing, or of the ‘product’ of their wrongdoing, can render an agent morally liable to bear costs for the sake of the victim of the primary wrong. We develop our account with particular reference to widespread (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Ethics of Police Body-Worn Cameras.Frej Klem Thomsen - 2020 - Moral Philosophy and Politics 7 (1):97-121.
    Over the past decade, police departments in many countries have experimented with and increasingly adopted the use of police body-worn cameras. This article aims to examine the moral issues raised by the use of PBWCs, and to provide an overall assessment of the conditions under which the use of PBWCs is morally permissible. It first reviews the current evidence for the effects of using PBWCs. On the basis of this review the article sets out a teleological argument for the use (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.
    This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account and illustrates the difficulties of doing so. Having set out the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • What We Owe to Ourselves: Essays on Rights and Supererogation.Daniel Muñoz - 2019 - Dissertation, MIT
    Some sacrifices—like giving a kidney or heroically dashing into a burning building—are supererogatory: they are good deeds beyond the call of duty. But if such deeds are really so good, philosophers ask, why shouldn’t morality just require them? The standard answer is that morality recognizes a special role for the pursuit of self-interest, so that everyone may treat themselves as if they were uniquely important. This idea, however, cannot be reconciled with the compelling picture of morality as impartial—the view that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Springer. pp. 459-474.
    Experimental design is one aspect of a scientific method. A well-designed, properly conducted experiment aims to control variables in order to isolate and manipulate causal effects and thereby maximize internal validity, support causal inferences, and guarantee reliable results. Traditionally employed in the natural sciences, experimental design has become an important part of research in the social and behavioral sciences. Experimental methods are also endorsed as the most reliable guides to policy effectiveness. Through a discussion of some of the central concepts (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Smart homes, private homes? An empirical study of technology researchers’ perceptions of ethical issues in developing smart-home health technologies.Giles Birchley, Richard Huxtable, Madeleine Murtagh, Ruud ter Meulen, Peter Flach & Rachael Gooberman-Hill - 2017 - BMC Medical Ethics 18 (1):23.
    Smart-home technologies, comprising environmental sensors, wearables and video are attracting interest in home healthcare delivery. Development of such technology is usually justified on the basis of the technology’s potential to increase the autonomy of people living with long-term conditions. Studies of the ethics of smart-homes raise concerns about privacy, consent, social isolation and equity of access. Few studies have investigated the ethical perspectives of smart-home engineers themselves. By exploring the views of engineering researchers in a large smart-home project, we sought (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Brain Privacy, Intimacy, and Authenticity: Why a Complete Lack of the Former Might Undermine Neither of the Latter!Kasper Lippert-Rasmussen - 2017 - Res Publica 23 (2):227-244.
    In recent years, neuroscience has been making dramatic progress. The discipline holds great promise but also raises a number of important ethical concerns. Among these is the concern that, some day in the distant future, we will have brain scanners capable of reading our minds, thus making our inner thoughts transparent to others. There are at least two reasons why we might regret our resulting loss of privacy. One is, so the argument goes, that this would undermine our ability to (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy and Self-Presentation.Juha Räikkä - 2017 - Res Publica 23 (2):213-226.
    It has often been argued that one of the reasons why we should value privacy is that it enables self-presentation and impression management. According to this approach, it is valuable to be able to govern the impression one gives, as the capacity to govern impressions is an instrument by which people take care of their various social relationships. In this paper I will take a closer look at that approach on privacy, with specific reference to the alleged threats to privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Seat Belt Mandates and Paternalism.Jessica Flanigan - 2017 - Journal of Moral Philosophy 14 (3):291-314.
    _ Source: _Page Count 24 Seat belt mandates seem like a paradigmatic case of justified paternalism. Even those who generally object to paternalism often concede that seat belt laws are justified. Against this near-consensus in favor of mandates, I argue that seat belt laws are unjust and public officials should not enforce them. The most plausible exceptions to a principle of anti-paternalism do not justify seat belt mandates. Some argue that seat belt mandates are not paternalistic because unbelted riders are (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Seat Belt Mandates and Paternalism.Jessica Flanigan - 2017 - Journal of Moral Philosophy 14 (3):291-314.
    Seat belt mandates seem like a paradigmatic case of justified paternalism. Even those who generally object to paternalism often concede that seat belt laws are justified. Against this near-consensus in favor of mandates, I argue that seat belt laws are unjust and public officials should not enforce them. The most plausible exceptions to a principle of anti-paternalism do not justify seat belt mandates. Some argue that seat belt mandates are not paternalistic because unbelted riders are not fully autonomous. Others claim (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Information ethics in the context of smart devices.Brian Roux & Michael Falgoust - 2013 - Ethics and Information Technology 15 (3):183-194.
    In this paper, we employ Extended Cognition as a background for a series of thought experiments about privacy and common used information technology devices. Laptops and smart phones are now widely used devices, but current privacy standards do not adequately address the relationship between the owners of these devices and the information stored on them. Law enforcement treats laptops and smart phones are potential sources of information about criminal activity, but this treatment ignores the use of smart devices as extensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Brain Machine Interface and Human Enhancement – An Ethical Review.Karim Jebari - 2013 - Neuroethics 6 (3):617-625.
    Brain machine interface (BMI) technology makes direct communication between the brain and a machine possible by means of electrodes. This paper reviews the existing and emerging technologies in this field and offers a systematic inquiry into the relevant ethical problems that are likely to emerge in the following decades.
    Download  
     
    Export citation  
     
    Bookmark   9 citations