Switch to: Citations

Add references

You must login to add references.
  1. A Matter of Principle.Law's Empire.Ronald Dworkin - 1987 - Journal of Philosophy 84 (5):284-291.
    Download  
     
    Export citation  
     
    Bookmark   131 citations  
  • Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
    Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Download  
     
    Export citation  
     
    Bookmark   71 citations  
  • Privacy: Philosophical Dimensions.Ferdinand Schoeman - 1984 - American Philosophical Quarterly 21 (3):199 - 213.
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • The Priority of Privacy for Medical Information.Judith Wagner DeCew - 2000 - Social Philosophy and Policy 17 (2):213.
    Individuals care about and guard their privacy intensely in many areas. With respect to patient medical records, people are exceedingly concerned about privacy protection, because they recognize that health care generates the most sensitive sorts of personal information. In an age of advancing technology, with the switch from paper medical files to massive computer databases, privacy protection for medical information poses a dramatic challenge. Given high-speed computers and Internet capabilities, as well as other advanced communications technologies, the potential for abuse (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Moral thinking: its levels, method, and point.R. M. Hare (ed.) - 1981 - Oxford: Oxford University Press.
    In this work, the author has fashioned out of the logical and linguistic theses of his earlier books a full-scale but readily intelligible account of moral argument.
    Download  
     
    Export citation  
     
    Bookmark   341 citations  
  • The Right to Privacy*: LLOYD L. WEINREB.Lloyd L. Weinreb - 2000 - Social Philosophy and Policy 17 (2):25-44.
    The question that I address in this paper is whether there is a right to privacy. It is not the question whether in the United States there is a legal right to privacy or, more particularly, a constitutional right to privacy. There are any number of ordinary legal rights and specific constitutional rights that might be so described, and the U.S. Supreme Court has referred also to a generic “right to privacy” that is implicit in the U.S. Constitution. Nor is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of using data-mining techniques, whether (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Privacy, intimacy, and personhood.Jeffrey Reiman - 1976 - Philosophy and Public Affairs 6 (1):26-44.
    Download  
     
    Export citation  
     
    Bookmark   78 citations  
  • Using genetic information while protecting the privacy of the soul.James H. Moor - 1999 - Ethics and Information Technology 1 (4):257-263.
    Computing plays an important role in genetics (and vice versa).Theoretically, computing provides a conceptual model for thefunction and malfunction of our genetic machinery. Practically,contemporary computers and robots equipped with advancedalgorithms make the revelation of the complete human genomeimminent – computers are about to reveal our genetic soulsfor the first time. Ethically, computers help protect privacyby restricting access in sophisticated ways to genetic information.But the inexorable fact that computers will increasingly collect,analyze, and disseminate abundant amounts of genetic informationmade available through the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
    Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics.
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Privacy: Its Meaning and Value.Adam D. Moore - 2003 - American Philosophical Quarterly 40 (3):215 - 227.
    Bodily privacy, understood as a right to control access to one’s body, capacities, and powers, is one of our most cherished rights − a right enshrined in law and notions of common morality. Informational privacy, on the other hand, has yet to attain such a loftily status. As rational project pursuers, who operate and flourish in a world of material objects it is our ability control patterns of association and disassociation with our fellows that afford each of us the room (...)
    Download  
     
    Export citation  
     
    Bookmark   46 citations  
  • Review of Ronald Dworkin: A matter of principle[REVIEW]Ronald Dworkin - 1987 - Ethics 97 (2):481-483.
    Download  
     
    Export citation  
     
    Bookmark   188 citations  
  • A Theory of Freedom.Richard Warner - 1992 - Philosophical Review 101 (2):468.
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  • Modern Utilitarianism.James Griffin - 1982 - Revue Internationale de Philosophie 36 (3):331.
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Recent Work on the Concept of Privacy.W. A. Parent - 1983 - American Philosophical Quarterly 20 (4):341 - 355.
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • The Right to Privacy.Lloyd L. Weinreb - 2000 - Social Philosophy and Policy 17 (2):25.
    The question that I address in this paper is whether there is a right to privacy. It is not the question whether in the United States there is a legal right to privacy or, more particularly, a constitutional right to privacy. There are any number of ordinary legal rights and specific constitutional rights that might be so described, and the U.S. Supreme Court has referred also to a generic “right to privacy” that is implicit in the U.S. Constitution. Nor is (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Reconstructing the Right to Privacy.Mark Alfino & G. Randolph Mayes - 2003 - Social Theory & Practice 29 (1):1-18.
    The article undertakes to develop a theory of privacy considered as a fundamental moral right. The authors remind that the conception of the right to privacy is silent on the prospect of protecting informational privacy on consequentialist grounds. However, laws that prevent efficient marketing practices, speedy medical attention, equitable distribution of social resources, and criminal activity could all be justified by appeal to informational privacy as a fundamental right. Finally, the authors show that in the specter of terrorism, privacy can (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy and the judgment of others.Jeffery L. Johnson - 1989 - Journal of Value Inquiry 23 (2):157-168.
    This article defends a new model of personal privacy. Privacy should be understood as demarcating culturally defined aspects of an individual's life in which he or she is granted immunity from the judgment of others. Such an analysis is preferable to either of the two favorite models of privacy in the current literature. The judgment of others model preserves all of the insights of the liberty and information models of privacy, But avoids the obvious problems and counterexamples. In addition, This (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • The right to privacy.Judith Jarvis Thomson - 1975 - Philosophy and Public Affairs 4 (4):295-314.
    Download  
     
    Export citation  
     
    Bookmark   127 citations  
  • Moral Thinking. Its Levels, Method and Point.R. M. Hare - 1983 - Zeitschrift für Philosophische Forschung 37 (4):643-646.
    Download  
     
    Export citation  
     
    Bookmark   134 citations  
  • A Theory of Freedom.Stanley I. Benn - 1988 - Cambridge University Press.
    This book is a major contribution to the study of the philosophy of action, moral philosophy, and political philosophy. Its central idea is a radically unorthodox theory of rational action. Most contemporary Anglo-American philosophers believe that action is motivated by desire. Professor Benn rejects the doctrine and replaces it with a reformulation of Kant's ethical and political theory, in which rational action can be determined simply by principles, regardless of consequences. The book analyzes the way in which value conflicts can (...)
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  • Driving to the panopticon: A philosophical exploration of the risks to privacy posed by the information technology of the future.Jeffrey Reiman - 2004 - In Beate Rössler (ed.), Privacies: philosophical evaluations. Stanford, Calif.: Stanford University Press. pp. 194--214.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy.Charles Culver, James Moor, William Duerfeldt, Marshall Kapp & Mark Sullivan - 1994 - Professional Ethics, a Multidisciplinary Journal 3 (3):3-25.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Just looking: Voyeurism and the grounds of privacy.Daniel O. Nathan - 1990 - Public Affairs Quarterly 4 (4):365-386.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Privacy, Control, and Talk of Rights: R. G. FREY.R. G. Frey - 2000 - Social Philosophy and Policy 17 (2):45-67.
    An alleged moral right to informational privacy assumes that we should have control over information about ourselves. What is the philosophical justification for this control? I think that one prevalent answer to this question—an answer that has to do with the justification of negative rights generally—will not do.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Privacy and Autonomy: A Reappraisal.James Stacey Taylor - 2002 - Southern Journal of Philosophy 40 (4):587-604.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Moral Thinking. Its Levels, Method and Point.R. M. Hare - 1985 - Revue de Métaphysique et de Morale 90 (2):271-273.
    Download  
     
    Export citation  
     
    Bookmark   152 citations  
  • A Theory of the Nature and Value of Privacy.Jeffery L. Johnson - 1992 - Public Affairs Quarterly 6 (3):271-288.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy.Mark Sullivan - 1994 - Professional Ethics, a Multidisciplinary Journal 3 (3-4):3-25.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Reconstructing the Right to Privacy.G. Randolph Mayes - 2003 - Social Theory and Practice 29 (1):1-18.
    Download  
     
    Export citation  
     
    Bookmark   6 citations