Results for 'Austyn Snowden'

9 found
Order:
  1. Three Case Studies in Making Fair Choices on the Path to Universal Health Coverage.Alex Voorhoeve, Tessa Edejer, Kapiriri Lydia, Ole Frithjof Norheim, James Snowden, Olivier Basenya, Dorjsuren Bayarsaikhan, Ikram Chentaf, Nir Eyal, Amanda Folsom, Rozita Halina Tun Hussein, Cristian Morales, Florian Ostmann, Trygve Ottersen, Phusit Prakongsai & Carla Saenz - 2016 - Health and Human Rights 18 (2):11-22.
    The goal of achieving Universal Health Coverage (UHC) can generally be realized only in stages. Moreover, resource, capacity and political constraints mean governments often face difficult trade-offs on the path to UHC. In a 2014 report, Making fair choices on the path to UHC, the WHO Consultative Group on Equity and Universal Health Coverage articulated principles for making such trade-offs in an equitable manner. We present three case studies which illustrate how these principles can guide practical decision-making. These case studies (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2).
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access account is correct (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  3. Debunking Neosocialism: A review of C. Snowden, Debunking Myths about the Free Market. [REVIEW]Gary James Jason - 2017 - Journal of Ayn Rand Studies 17 (1):84-103.
    This essay is my review of Philip Booth’s Wellbeing and the Role of Government. The book is an anthology of original articles by eminent researchers in modern happiness economics, such as: Booth himself; Paul Omerod; David Sacks, Betsey Stephenson, and Justin Wolfers; Christopher Snowden; J. R. Shackleton; Christian Bjornskov; Peter Boettke and Christopher Coyne; and Pedro Schwartz. I conclude by offering several criticisms of the work.
    Download  
     
    Export citation  
     
    Bookmark  
  4. Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward (...)’s revelation of how the NSA and GCHQ collected Internet and mobile phone data presents us with a gigantic, real-life threatened loss case. In this paper, I will defend the control account of privacy against the argument that is based on threatened loss cases. I will do so by developing a new version of the control account that implies that the agents’ privacy is not diminished in threatened loss cases. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  5. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen (ed.), Philosophy and Public Policy. New York, USA: Rowman & Littlefield International. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  6. The Ethics of Government Whistleblowing.Candice Delmas - 2015 - Social Theory and Practice 41 (1):77-105.
    What is wrong with government whistleblowing and when can it be justified? In my view, ‘government whistleblowing’, i.e., the unauthorized acquisition and disclosure of classified information about the state or government, is a form of ‘political vigilantism’, which involves transgressing the boundaries around state secrets, for the purpose of challenging the allocation or use of power. It may nonetheless be justified when it is suitably constrained and exposes some information that the public ought to know and deliberate about. Government whistleblowing (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  7. (1 other version)Book review of: P. Booth, ...and the Pursuit of Happiness: Wellbeing and the Role of Government.Gary James Jason - 2015 - Reason Papers 37 (1).
    This essay is my review of Philip Booth’s ...and the Pursuit of Happiness: Wellbeing and the Role of Government. The book is an anthology of original articles by eminent researchers in modern happiness economics, such as: Booth himself; Paul Omerod; David Sacks, Betsey Stephenson, and Justin Wolfers; Christopher Snowden; J. R. Shackleton; Christian Bjornskov; Peter Boettke and Christopher Coyne; and Pedro Schwartz. I conclude by offering several criticisms of the work.
    Download  
     
    Export citation  
     
    Bookmark  
  8. Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy.Adam Henschke & Shannon Ford - 2017 - Journal of Cyber Policy 1 (2).
    Cyberspace relies on information technologies to mediate relations between different people, across different communication networks and is reliant on the supporting technology. These interactions typically occur without physical proximity and those working depending on cybersystems must be able to trust the overall human–technical systems that support cyberspace. As such, detailed discussion of cybersecurity policy would be improved by including trust as a key value to help guide policy discussions. Moreover, effective cybersystems must have resilience designed into them. This paper argues (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation