Results for ' mental privacy'

965 found
Order:
  1. Is Mental Privacy a Component of Personal Identity?Abel Wajnerman Paz - 2021 - Frontiers in Human Neuroscience 15:773441.
    One of the most prominent ethical concerns regarding emerging neurotechnologies is mental privacy. This is the idea that we should have control over access to our neural data and to the information about our mental processes and states that can be obtained by analyzing it. A key issue is whether this information needs more stringent protection than other kinds of personal information. I will articulate and support the view, underlying recent regulatory frameworks, that mental privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  2. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry:1-16.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. The ethics of the extended mind: Mental privacy, manipulation and agency.Robert William Clowes, Paul R. Smart & Richard Heersmink - 2024 - In Jan-Hendrik Heinrichs, Birgit Beck & Orsolya Friedrich (eds.), Neuro-ProsthEthics: Ethical Implications of Applied Situated Cognition. Berlin, Germany: J. B. Metzler. pp. 13–35.
    According to proponents of the extended mind, bio-external resources, such as a notebook or a smartphone, are candidate parts of the cognitive and mental machinery that realises cognitive states and processes. The present chapter discusses three areas of ethical concern associated with the extended mind, namely mental privacy, mental manipulation, and agency. We also examine the ethics of the extended mind from the standpoint of three general normative frameworks, namely, consequentialism, deontology, and virtue ethics.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  5. Neuroscience v. privacy? : a democratic perspective.Annabelle Lever - 2012 - In Sarah Richmond, Geraint Rees & Sarah J. L. Edwards (eds.), I know what you're thinking: brain imaging and mental privacy. Oxford: Oxford University Press. pp. 205.
    Recent developments in neuroscience create new opportunities for understanding the human brain. The power to do good, however, is also the power to harm, so scientific advances inevitably foster as many dystopian fears as utopian hopes. For instance, neuroscience lends itself to the fear that people will be forced to reveal thoughts and feelings which they would not have chosen to reveal, and of which they may be unaware. It also lends itself to the worry that people will be encouraged (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Reclaiming Care and Privacy in the Age of Social Media.Hugh Desmond - 2022 - Royal Institute of Philosophy Supplement 92:45-66.
    Social media has invaded our private, professional, and public lives. While corporations continue to portray social media as a celebration of self-expression and freedom, public opinion, by contrast, seems to have decidedly turned against social media. Yet we continue to use it just the same. What is social media, and how should we live with it? Is it the promise of a happier and more interconnected humanity, or a vehicle for toxic self-promotion? In this essay I examine the very structure (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Souled out of rights? – predicaments in protecting the human spirit in the age of neuromarketing.Alexander Sieber - 2019 - Life Sciences, Society and Policy 15 (6):1-11.
    Modern neurotechnologies are rapidly infringing on conventional notions of human dignity and they are challenging what it means to be human. This article is a survey analysis of the future of the digital age, reflecting primarily on the effects of neurotechnology that violate universal human rights to dignity, self-determination, and privacy. In particular, this article focuses on neuromarketing to critically assess potentially negative social ramifications of under-regulated neurotechnological application. Possible solutions are critically evaluated, including the human rights claim to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Mindmelding, Chapter 2: An alternative framework.William Hirstein - 2012 - In Mindmelding: Consciousness, Neuroscience, and the Mind's Privacy. New York: Oxford University Press.
    This chapter presents the following hypothesis: There is a perfectly sensible conception of the mind, consciousness, the self, what we mean by ‘I,’ how we perceive and know, and how we remember and decide, all of which cohere amongst one another as well as with what we know about the brain, according to which it is possible for one person to experience directly the conscious states of another person. Not only can one person be directly aware of the conscious states (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  10. How to read minds.Tim Bayne - 2012 - In Sarah Richmond, Geraint Rees & Sarah J. L. Edwards (eds.), I know what you're thinking: brain imaging and mental privacy. Oxford: Oxford University Press. pp. 41.
    Most animals have mental states of one sort or another, but few species share our capacity for self-awareness. We are aware of our own mental states via introspection, and we are aware of the mental states of our fellow human beings on the basis of what they do and say. This chapter is not concerned with these traditional forms of mind-reading—forms whose origins predate the beginnings of recorded history—but with the prospects of a rather different and significantly (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Mindmelding, Chapter 9: Sharing conscious states.William Hirstein - 2012 - In Mindmelding: Consciousness, Neuroscience, and the Mind's Privacy. New York: Oxford University Press.
    This chapter explains how mindmelding — the direct experience by one person of another's conscious states — is in fact possible. The temporal lobes causally interact with the prefrontal lobes by way of fiber bundles that run underneath the cortical surface. This provides the perfect first experiment in mindmelding: to ‘branch’ those fiber bundles and run the other end into the brain of another person. Evidence is provided that these bundles have close connections to consciousness, in that whatever affects them (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. The emergence of “truth machines”?: Artificial intelligence approaches to lie detection.Jo Ann Oravec - 2022 - Ethics and Information Technology 24 (1):1-10.
    This article analyzes emerging artificial intelligence (AI)-enhanced lie detection systems from ethical and human resource (HR) management perspectives. I show how these AI enhancements transform lie detection, followed with analyses as to how the changes can lead to moral problems. Specifically, I examine how these applications of AI introduce human rights issues of fairness, mental privacy, and bias and outline the implications of these changes for HR management. The changes that AI is making to lie detection are altering (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. A matter of trust: : Higher education institutions as information fiduciaries in an age of educational data mining and learning analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student success (however defined). (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Can Machines Read our Minds?Christopher Burr & Nello Cristianini - 2019 - Minds and Machines 29 (3):461-494.
    We explore the question of whether machines can infer information about our psychological traits or mental states by observing samples of our behaviour gathered from our online activities. Ongoing technical advances across a range of research communities indicate that machines are now able to access this information, but the extent to which this is possible and the consequent implications have not been well explored. We begin by highlighting the urgency of asking this question, and then explore its conceptual underpinnings, (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  15. Is Pain “All in your Mind”? Examining the General Public’s Views of Pain.Tim V. Salomons, Richard Harrison, Nat Hansen, James Stazicker, Astrid Grith Sorensen, Paula Thomas & Emma Borg - 2022 - Review of Philosophy and Psychology 13 (3):683-698.
    By definition, pain is a sensory and emotional experience that is felt in a particular part of the body. The precise relationship between somatic events at the site where pain is experienced, and central processing giving rise to the mental experience of pain remains the subject of debate, but there is little disagreement in scholarly circles that both aspects of pain are critical to its experience. Recent experimental work, however, suggests a public view that is at odds with this (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. BEIJING CONSENSUS OF ARTIFICIAL INTELLIGENCE FOR CHILDREN: AN EFFORT TO PREVENT JUVENILE DELINQUENCY.Ammar Younas - manuscript
    This article is an attempt to highlights the importance of Beijing Principle of Artificial Intelligence for Children for preventing the Juvenile Delinquency. The article argues that the artificial intelligence products should protect children's privacy, promote children's physical and mental health, and control potential risks.
    Download  
     
    Export citation  
     
    Bookmark  
  17. Reclaiming Control: Extended Mindreading and the Tracking of Digital Footprints.Uwe Peters - 2022 - Social Epistemology 36 (3):267-282.
    It is well known that on the Internet, computer algorithms track our website browsing, clicks, and search history to infer our preferences, interests, and goals. The nature of this algorithmic tracking remains unclear, however. Does it involve what many cognitive scientists and philosophers call ‘mindreading’, i.e., an epistemic capacity to attribute mental states to people to predict, explain, or influence their actions? Here I argue that it does. This is because humans are in a particular way embedded in the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. Mindmelding: Connected Brains and the Problem of Consciousness.William Hirstein - 2008 - Mens Sana Monographs 6 (1):110-130.
    Contrary to the widely-held view that our conscious states are necessarily private (in that only one person can ever experience them directly), in this paper I argue that it is possible for a person to directly experience the conscious states of another. This possibility removes an obstacle to thinking of conscious states as physical, since their apparent privacy makes them different from all other physical states. A separation can be made in the brain between our conscious mental representations (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Ethical issues in genomics research on neurodevelopmental disorders: a critical interpretive review.Signe Mezinska, L. Gallagher, M. Verbrugge & E. M. Bunnik - 2021 - Human Genomics 16 (15).
    Background Genomic research on neurodevelopmental disorders (NDDs), particularly involving minors, combines and amplifies existing research ethics issues for biomedical research. We performed a review of the literature on the ethical issues associated with genomic research involving children affected by NDDs as an aid to researchers to better anticipate and address ethical concerns. Results Qualitative thematic analysis of the included articles revealed themes in three main areas: research design and ethics review, inclusion of research participants, and communication of research results. Ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Neural Implants as Gateways to Digital-Physical Ecosystems and Posthuman Socioeconomic Interaction.Matthew E. Gladden - 2016 - In Łukasz Jonak, Natalia Juchniewicz & Renata Włoch (eds.), Digital Ecosystems: Society in the Digital Age. Digital Economy Lab, University of Warsaw. pp. 85-98.
    For many employees, ‘work’ is no longer something performed while sitting at a computer in an office. Employees in a growing number of industries are expected to carry mobile devices and be available for work-related interactions even when beyond the workplace and outside of normal business hours. In this article it is argued that a future step will increasingly be to move work-related information and communication technology (ICT) inside the human body through the use of neuroprosthetics, to create employees who (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  23.  63
    Digital privacy and the law: the challenge of regulatory capture.Bartek Chomanski & Lode Lauwaert - 2024 - AI and Society.
    Digital privacy scholars tend to bemoan ordinary people’s limited knowledge of and lukewarm interest in what happens to their digital data. This general lack of interest and knowledge is often taken as a consideration in favor of legislation aiming to force internet companies into adopting more responsible data practices. While we remain silent on whether any new laws are called for, in this paper we wish to underline a neglected consequence of people’s ignorance of and apathy for digital (...): their potential to encourage capture by industry interests. In particular, we argue that such laws may be at increased risk of capture because they are unlikely to be democratically responsive. We make this claim on a twofold basis: first, well-known theoretical mechanisms explaining how the absence of responsiveness leads to capture, identified in prior political science and political philosophy literature, yield the prediction that digital privacy legislation is likely to be unresponsive and thus captured; second, empirical data concerning the European Union’s digital privacy laws, with a special focus on the General Data Protection Regulation, appears to confirm these predictions: the bloc’s (world’s?) flagship privacy protection law seems more responsive to corporate than citizen interests. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Group privacy: a defence and an interpretation.Luciano Floridi - 2016 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  25. Privacy, Ethics, and Institutional Research.Alan Rubel - 2019 - New Directions in Institutional Research 2019 (183):5-16.
    Despite widespread agreement that privacy in the context of education is important, it can be difficult to pin down precisely why and to what extent it is important, and it is challenging to determine how privacy is related to other important values. But that task is crucial. Absent a clear sense of what privacy is, it will be difficult to understand the scope of privacy protections in codes of ethics. Moreover, privacy will inevitably conflict with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Does privacy undermine community.Mark Tunick - 2001 - Journal of Value Inquiry 35 (4):517-534.
    Does privacy--the condition of being invisible to public scrutiny--in so emphasizing individual rights, undermine community? One objection to privacy is that it is a license to engage in antisocial activity that undermines social norms. Another objection is that privacy encourages isolation and anonymity, also undermining community. Drawing on the political theory of Hegel, I argue that privacy can promote community. Some invasions of privacy can undermine a sort of autonomy essential for maintaining a community. I (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27. (1 other version)Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  29. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  30. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31. Brain Privacy and the Case of Cannibal Cop.Mark Tunick - 2017 - Res Publica 23 (2):179-196.
    In light of technology that may reveal the content of a person’s innermost thoughts, I address the question of whether there is a right to ‘brain privacy’—a right not to have one’s inner thoughts revealed to others–even if exposing these thoughts might be beneficial to society. I draw on a conception of privacy as the ability to control who has access to information about oneself and to an account that connects one’s interest in privacy to one’s interests (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  32. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  33. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  34. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  36. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. (1 other version)Must privacy and sexual equality conflict? A philosophical examination of some legal evidence.Annabelle Lever - 2001 - Social Research: An International Quarterly 67 (4):1137-1171.
    Are rights to privacy consistent with sexual equality? In a brief, but influential, article Catherine MacKinnon trenchantly laid out feminist criticisms of the right to privacy. In “Privacy v. Equality: Beyond Roe v. Wade” she linked familiar objections to the right to privacy and connected them to the fate of abortion rights in the U.S.A. (MacKinnon, 1983, 93-102). For many feminists, the Supreme Court’s decision in Roe v. Wade (1973) had suggested that, notwithstanding a dubious past, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39. Representing Mental Functioning: Ontologies for Mental Health and Disease.Janna Hastings, Werner Ceusters, Mark Jensen, Kevin Mulligan & Barry Smith - 2012 - In Janna Hastings, Werner Ceusters, Mark Jensen, Kevin Mulligan & Barry Smith (eds.), Towards an Ontology of Mental Functioning (ICBO Workshop). CEUR.
    Mental and behavioral disorders represent a significant portion of the public health burden in all countries. The human cost of these disorders is immense, yet treatment options for sufferers are currently limited, with many patients failing to respond sufficiently to available interventions and drugs. High quality ontologies facilitate data aggregation and comparison across different disciplines, and may therefore speed up the translation of primary research into novel therapeutics. Realism-based ontologies describe entities in reality and the relationships between them in (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  40. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  41. The Privacy Dependency Thesis and Self-Defense.Lauritz Aastrup Munch & Jakob Thrane Mainz - forthcoming - AI and Society:1-11.
    If I decide to disclose information about myself, this act can undermine other people’s ability to effectively conceal information about themselves. One case in point involves genetic information: if I share ‘my’ genetic information with others, I thereby also reveal genetic information about my biological relatives. Such dependencies are well-known in the privacy literature and are often referred to as ‘privacy dependencies’. Some take the existence of privacy dependencies to generate a moral duty to sometimes avoid sharing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Inner privacy of conscious experiences and quantum information.Danko D. Georgiev - 2020 - Biosystems 187:104051.
    The human mind is constituted by inner, subjective, private, first-person conscious experiences that cannot be measured with physical devices or observed from an external, objective, public, third-person perspective. The qualitative, phenomenal nature of conscious experiences also cannot be communicated to others in the form of a message composed of classical bits of information. Because in a classical world everything physical is observable and communicable, it is a daunting task to explain how an empirically unobservable, incommunicable consciousness could have any physical (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43. The Epistemic Account of Privacy.Martijn Blaauw - 2013 - Episteme 10 (2):167-177.
    Privacy is valued by many. But what it means to have privacy remains less than clear. In this paper, I argue that the notion of privacy should be understood in epistemic terms. What it means to have (some degree of) privacy is that other persons do not stand in significant epistemic relations to those truths one wishes to keep private.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  44. Privacy as an Asset.Jarek Gryz - 2017 - In Mindel Marcellus, Lyons Kelly & Wigglesworth Joe (eds.), Proceedings of the 27th CASCON Conference. IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Privacy and the Common Good: G. H. Mead and the Social Value of Privacy.Yuval Goldfus - manuscript
    This article explores the social value of privacy and the intricate relationship between personal autonomy and societal cohesion within the realm of privacy. It contrasts George Herbert Mead’s two models of social organization—hostility and integration—in terms of their impact on the interplay between individuals and society. The model of hostility envisions individuals and society engaged in a zero-sum game, resulting in diminished individuality and an atomistic view of autonomy. In contrast, the model of integration recognizes the interdependence of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Privacy During the Pandemic and Beyond.Carissa Vèliz - 2020 - The Philosophers' Magazine 90:107-113.
    This paper is an overview about the state of privacy and power shifts during the pandemic, and the privacy challenges ahead.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Bodily Privacy, Toilets, and Sex Discrimination: The Problem of "Manhood" in a Women's Prison.Jami Anderson - 2009 - In Olga Gershenson Barbara Penner (ed.), Ladies and Gents: Public Toilets and Gender. Temple University Press. pp. 90.
    Unjustifiable assumptions about sex and gender roles, the untamable potency of maleness, and gynophobic notions about women's bodies inform and influence a broad range of policy-making institutions in this society. In December 2004, the U.S. Court of Appeals for the Sixth Circuit continued this ignoble cultural pastime when they decided Everson v. Michigan Department of Corrections. In this decision, the Everson Court accepted the Michigan Department of Correction's claim that “the very manhood” of male prison guards both threatens the safety (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Privacy.Edmund Byrne - 1997 - In Byrne Edmund (ed.), Encyclopedia of Applied Ethics. Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
1 — 50 / 965