Switch to: Citations

Add references

You must login to add references.
  1. (1 other version)The Value of Privacy.Beate Roessler - 2004 - Polity.
    This new book by Beate Rossler is a work of real quality and originality on an extremely topical issue: the issue of privacy and the relations between the private and the public. Rossler investigates the reasons why we value privacy and why we ought to value it. In the context of modern, liberal societies, Rossler develops a theory of the private which links privacy and autonomy in a constitutive way: privacy is a necessary condition to lead an autonomous life. The (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  • Individual Complicity in Collective Wrongdoing.Brian Lawson - 2013 - Ethical Theory and Moral Practice 16 (2):227-243.
    Some instances of right and wrongdoing appear to be of a distinctly collective kind. When, for example, one group commits genocide against another, the genocide is collective in the sense that the wrongness of genocide seems morally distinct from the aggregation of individual murders that make up the genocide. The problem, which I refer to as the problem of collective wrongs, is that it is unclear how to assign blame for distinctly collective wrongdoing to individual contributors when none of those (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Ontology and Social Construction.Sally Haslanger - 1995 - Philosophical Topics 23 (2):95-125.
    Download  
     
    Export citation  
     
    Bookmark   99 citations  
  • The importance of privacy revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
    James Rachels’ seminal paper “ Why Privacy Is Important ” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Doctrine of double effect.Alison McIntyre - 2008 - Stanford Encyclopedia of Philosophy.
    The doctrine (or principle) of double effect is often invoked to explain the permissibility of an action that causes a serious harm, such as the death of a human being, as a side effect of promoting some good end. According to the principle of double effect, sometimes it is permissible to cause a harm as a side effect (or “double effect”) of bringing about a good result even though it would not be permissible to cause such a harm as a (...)
    Download  
     
    Export citation  
     
    Bookmark   64 citations  
  • (2 other versions)Special sciences (or: The disunity of science as a working hypothesis).Jerry Fodor - 1974 - Synthese 28 (2):97-115.
    Download  
     
    Export citation  
     
    Bookmark   650 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Why privacy is important.James Rachels - 1975 - Philosophy and Public Affairs 4 (4):323-333.
    Download  
     
    Export citation  
     
    Bookmark   158 citations  
  • (1 other version)How to define theoretical terms.David Lewis - 1970 - Journal of Philosophy 67 (13):427-446.
    Download  
     
    Export citation  
     
    Bookmark   580 citations  
  • (2 other versions)Special sciences.Jerry A. Fodor - 1974 - Synthese 28 (2):97-115.
    Download  
     
    Export citation  
     
    Bookmark   609 citations  
  • Electronic Coins.Craig Warmke - 2022 - Cryptoeconomic Systems 2 (1).
    In the bitcoin whitepaper, Satoshi Nakamoto (2008: 2) defines an electronic coin as a chain of digital signatures. Many have since defined a bitcoin as a chain of digital signatures. This latter definition continues to appear in reports from central banks, advocacy centers, and governments, as well as in academic papers across the disciplines of law, economics, computer science, cryptography, management, and philosophy. Some have even used it to argue that what we now call bitcoin is not the real bitcoin. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Should Bitcoin Be Classified as Money?Asya Passinsky - 2020 - Journal of Social Ontology 6 (2):281-292.
    The advent of virtual currencies such as bitcoin raises a pressing question for lawmakers, regulators, and judges: should bitcoin and other virtual currencies be classified as money or currency for legal and regulatory purposes? I examine two different approaches to answering this question—a descriptive approach and a normative approach. The descriptive approach says that bitcoin and other virtual currencies should be classified as money or currency just in case they really are money or currency, whereas the normative approach says that (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • What is Bitcoin?Craig Warmke - 2021 - Inquiry: An Interdisciplinary Journal of Philosophy.
    Many want to know what bitcoin is and how it works. But bitcoin is as complex as it is controversial, and relatively few have the technical background to understand it. In this paper, I offer an accessible on-ramp for understanding bitcoin in the form of a model. My model reveals both what bitcoin is and how it works. More specifically, it reveals that bitcoin is a fictional substance in a massively coauthored story on a network that automates and distributes jobs (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Private Government: How Employers Rule Our Lives.Elizabeth Anderson - 2017 - Princeton University Press.
    Why our workplaces are authoritarian private governments—and why we can’t see it One in four American workers says their workplace is a “dictatorship.” Yet that number almost certainly would be higher if we recognized employers for what they are—private governments with sweeping authoritarian power over our lives. Many employers minutely regulate workers’ speech, clothing, and manners on the job, and employers often extend their authority to the off-duty lives of workers, who can be fired for their political speech, recreational activities, (...)
    Download  
     
    Export citation  
     
    Bookmark   148 citations  
  • The Internet and Privacy.Carissa Veliz - 2019 - In David Edmonds (ed.), Ethics and the Contemporary World. New York: Routledge. pp. 149-159.
    In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is important because violations of the right to privacy can harm us individually and collectively, and offer some advice as to how to protect our privacy online.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Socio-Technological Lives of Bitcoin.Adam Hayes - 2019 - Theory, Culture and Society 36 (4):49-72.
    Bitcoin, cryptocurrencies, and blockchains have become buzzwords in the media and are attracting increasing academic interest, mainly from the fields of computer science and financial economics. In...
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • How the Other Half Banks: Exclusion, Exploitation, and the Threat to Democracy.Mehrsa Baradaran - 2015 - Cambridge, USA: Harvard University Press.
    The United States has two separate banking systems today—one serving the well-to-do and another exploiting everyone else. How the Other Half Banks contributes to the growing conversation on American inequality by highlighting one of its prime causes: unequal credit. Mehrsa Baradaran examines how a significant portion of the population, deserted by banks, is forced to wander through a Wild West of payday lenders and check-cashing services to cover emergency expenses and pay for necessities—all thanks to deregulation that began in the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The metaphysics of social kinds.Rebecca Mason - 2016 - Philosophy Compass 11 (12):841-850.
    It is a truism that humans are social animals. Thus, it is no surprise that we understand the world, each other, and ourselves in terms of social kinds such as money and marriage, war and women, capitalists and cartels, races, recessions, and refugees. Social kinds condition our expectations, inform our preferences, and guide our behavior. Despite the prevalence and importance of social kinds, philosophy has historically devoted relatively little attention to them. With few exceptions, philosophers have given pride of place (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  • Anonymity and the Social Self.Steve Matthews - 2010 - American Philosophical Quarterly 47 (4):351 - 363.
    We will analyze the concept of anonymity, along with cognate notions, and their relation to privacy, with a view to developing an understanding of how we control our identity in public and why such control is important in developing and maintaining our social selves. We will take anonymity to be representative of a suite of techniques of nonidentifiability that persons use to manage and protect their privacy. At the core of these techniques is the aim of being untrackable; this means (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • The Social Life of Bitcoin.Nigel Dodd - 2018 - Theory, Culture and Society 35 (3):35-56.
    This paper challenges the notion that Bitcoin is ‘trust-free’ money by highlighting the social practices, organizational structures and utopian ambitions that sustain it. At the paper's heart is the paradox that if Bitcoin succeeds in its own terms as an ideology, it will fail in practical terms as a form of money. The main reason for this is that the new currency is premised on the idea of money as a ‘thing’ that must be abstracted from social life in order (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Privacy, Interests, and Inalienable Rights.Adam D. Moore - 2018 - Moral Philosophy and Politics 5 (2):327-355.
    Some rights are so important for human autonomy and well-being that many scholars insist they should not be waived, traded, or abandoned. Privacy is a recent addition to this list. At the other end of the spectrum is the belief that privacy is a mere unimportant interest or preference. This paper defends a middle path between viewing privacy as an inalienable, non-waivable, non-transferrable right and the view of privacy as a mere subjective interest. First, an account of privacy is offered (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • philosophy of money and finance.Boudewijn De Bruin, Lisa Maria Herzog, Martin O'Neill & Joakim Sandberg - 2012 - In Ed Zalta (ed.), Stanford Encyclopedia of Philosophy. Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Cryptocurrencies and Business Ethics.Claus Dierksmeier & Peter Seele - 2018 - Journal of Business Ethics 152 (1):1-14.
    Cryptocurrencies such as Bitcoin, SETLcoin, Ether, Solar Coin, or Liberty Reserve exist since 2009. Because of their decentralized control, they are often considered a threat or alternative to the conventional centralized banking system. While the technological implication of some such currencies, especially of Bitcoin, has attracted much attention, so far there is little discussion about the entire field of cryptocurrencies and very little academic literature addressing its ethical significance. In this article, we thus address the impact of “blockchain technology” on (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Central banking and inequalities: Taking off the blinders.Peter Dietsch, François Claveau & Clément Fontan - 2016 - Politics, Philosophy and Economics 15 (4):319-357.
    What is the relation between monetary policy and inequalities in income and wealth? This question has received insufficient attention, especially in light of the unconventional policies introduced since the 2008 financial crisis. The article analyzes three ways in which the concern central banks show for inequalities in their official statements remains incomplete and underdeveloped. First, central banks tend to care about inequality for instrumental reasons only. When they do assign intrinsic value to containing inequalities, they shy away from trade-offs with (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good.Zbigniew Kwecka, William Buchanan, Burkhard Schafer & Judith Rauhofer - 2014 - Artificial Intelligence and Law 22 (2):113-139.
    The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This idea finds its correspondence in our approach to privacy protection through obfuscation, where everybody in a group takes a small privacy risk to protect the anonymity of fellow group members. We show how these ideas can be computationally realised in an Investigative Data Acquisition Platform. IDAP is an efficient symmetric Private Information Retrieval protocol optimised for the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Causes and Consequences of Inflation.Philipp Bagus, David Howden & Amadeus Gabriel - 2014 - Business and Society Review 119 (4):497-517.
    Download  
     
    Export citation  
     
    Bookmark   3 citations