Results for 'Privacy '

428 found
Order:
  1.  33
    Privacy: scepticism, normative approaches and legal protection. A review of the theoretical debate and a discussion of recent developments in the EU.Elisa Orrù - 2022 - Dpce Online 52 (2):779–800.
    Digitalisation has lent the right to privacy increasing philosophical and legal relevance. However, privacy’s epistemic status and associated normative values are constantly subject to radical criticisms. This article investigates the validity, in theory and practice, of three radical critiques of privacy. A review of the philosophical and interdisciplinary discourse on privacy during the last half century is followed by analyses of recent legal developments within the EU. Privacy emerges as a highly differentiated and powerful tool (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  78
    Privacy and Democracy.Paul Voice - 2016 - South African Journal of Philosophy 35 (3):1-9.
    The meaning of privacy has been frequently disputed in the philosophical and -/- legal literature since Warren and Brandeis first argued for it as a distinct and -/- important personal and social value. Nevertheless, while the meaning of privacy -/- is held to be vague, there is general agreement that Warren and Brandeis were -/- correct in their assessment of its value. Theorists of democracy, on the other hand, -/- have been ambivalent towards the realm of the private. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  4. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  5. Does privacy undermine community.Mark Tunick - 2001 - Journal of Value Inquiry 35 (4):517-534.
    Does privacy--the condition of being invisible to public scrutiny--in so emphasizing individual rights, undermine community? One objection to privacy is that it is a license to engage in antisocial activity that undermines social norms. Another objection is that privacy encourages isolation and anonymity, also undermining community. Drawing on the political theory of Hegel, I argue that privacy can promote community. Some invasions of privacy can undermine a sort of autonomy essential for maintaining a community. I (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  6. (1 other version)Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  8. Brain Privacy and the Case of Cannibal Cop.Mark Tunick - 2017 - Res Publica 23 (2):179-196.
    In light of technology that may reveal the content of a person’s innermost thoughts, I address the question of whether there is a right to ‘brain privacy’—a right not to have one’s inner thoughts revealed to others–even if exposing these thoughts might be beneficial to society. I draw on a conception of privacy as the ability to control who has access to information about oneself and to an account that connects one’s interest in privacy to one’s interests (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  9. Group privacy: a defence and an interpretation.Luciano Floridi - 2016 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  10. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  11. Privacy During the Pandemic and Beyond.Carissa Vèliz - 2020 - The Philosophers' Magazine 90:107-113.
    This paper is an overview about the state of privacy and power shifts during the pandemic, and the privacy challenges ahead.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. (1 other version)Must privacy and sexual equality conflict? A philosophical examination of some legal evidence.Annabelle Lever - 2001 - Social Research: An International Quarterly 67 (4):1137-1171.
    Are rights to privacy consistent with sexual equality? In a brief, but influential, article Catherine MacKinnon trenchantly laid out feminist criticisms of the right to privacy. In “Privacy v. Equality: Beyond Roe v. Wade” she linked familiar objections to the right to privacy and connected them to the fate of abortion rights in the U.S.A. (MacKinnon, 1983, 93-102). For many feminists, the Supreme Court’s decision in Roe v. Wade (1973) had suggested that, notwithstanding a dubious past, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  14. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  15.  98
    Digital privacy and the law: the challenge of regulatory capture.Bartek Chomanski & Lode Lauwaert - 2024 - AI and Society.
    Digital privacy scholars tend to bemoan ordinary people’s limited knowledge of and lukewarm interest in what happens to their digital data. This general lack of interest and knowledge is often taken as a consideration in favor of legislation aiming to force internet companies into adopting more responsible data practices. While we remain silent on whether any new laws are called for, in this paper we wish to underline a neglected consequence of people’s ignorance of and apathy for digital (...): their potential to encourage capture by industry interests. In particular, we argue that such laws may be at increased risk of capture because they are unlikely to be democratically responsive. We make this claim on a twofold basis: first, well-known theoretical mechanisms explaining how the absence of responsiveness leads to capture, identified in prior political science and political philosophy literature, yield the prediction that digital privacy legislation is likely to be unresponsive and thus captured; second, empirical data concerning the European Union’s digital privacy laws, with a special focus on the General Data Protection Regulation, appears to confirm these predictions: the bloc’s (world’s?) flagship privacy protection law seems more responsive to corporate than citizen interests. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  18. Privacy, Ethics, and Institutional Research.Alan Rubel - 2019 - New Directions in Institutional Research 2019 (183):5-16.
    Despite widespread agreement that privacy in the context of education is important, it can be difficult to pin down precisely why and to what extent it is important, and it is challenging to determine how privacy is related to other important values. But that task is crucial. Absent a clear sense of what privacy is, it will be difficult to understand the scope of privacy protections in codes of ethics. Moreover, privacy will inevitably conflict with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  20. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Privacy in Public Places: Do GPS and Video Surveillance Provide Plain Views?Mark Tunick - 2009 - Social Theory and Practice 35 (4):597-622.
    New technologies of surveillance such as Global Positioning Systems (GPS) are increasingly used as convenient substitutes for conventional means of observation. Recent court decisions hold that the government may, without a warrant, use a GPS to track a vehicle’s movements in public places without violating the 4th Amendment, as the vehicle is in plain view and no reasonable expectation of privacy is violated. This emerging consensus of opinions fails to distinguish the unreasonable expectation that we not be seen in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  23. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  24. A Defense of Privacy as Control.Leonhard Menges - 2020 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  25. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry:1-16.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  27. Privacy and Digital Ethics After the Pandemic.Carissa Véliz - 2021 - Nature Electronics 4:10-11.
    The increasingly prominent role of digital technologies during the coronavirus pandemic has been accompanied by concerning trends in privacy and digital ethics. But more robust protection of our rights in the digital realm is possible in the future. -/- After surveying some of the challenges we face, I argue for the importance of diplomacy. Democratic countries must try to come together and reach agreements on minimum standards and rules regarding cybersecurity, privacy and the governance of AI.
    Download  
     
    Export citation  
     
    Bookmark  
  28. The Epistemic Account of Privacy.Martijn Blaauw - 2013 - Episteme 10 (2):167-177.
    Privacy is valued by many. But what it means to have privacy remains less than clear. In this paper, I argue that the notion of privacy should be understood in epistemic terms. What it means to have (some degree of) privacy is that other persons do not stand in significant epistemic relations to those truths one wishes to keep private.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  29. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Inner privacy of conscious experiences and quantum information.Danko D. Georgiev - 2020 - Biosystems 187:104051.
    The human mind is constituted by inner, subjective, private, first-person conscious experiences that cannot be measured with physical devices or observed from an external, objective, public, third-person perspective. The qualitative, phenomenal nature of conscious experiences also cannot be communicated to others in the form of a message composed of classical bits of information. Because in a classical world everything physical is observable and communicable, it is a daunting task to explain how an empirically unobservable, incommunicable consciousness could have any physical (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  31. Bodily Privacy, Toilets, and Sex Discrimination: The Problem of "Manhood" in a Women's Prison.Jami Anderson - 2009 - In Olga Gershenson Barbara Penner (ed.), Ladies and Gents: Public Toilets and Gender. Temple University Press. pp. 90.
    Unjustifiable assumptions about sex and gender roles, the untamable potency of maleness, and gynophobic notions about women's bodies inform and influence a broad range of policy-making institutions in this society. In December 2004, the U.S. Court of Appeals for the Sixth Circuit continued this ignoble cultural pastime when they decided Everson v. Michigan Department of Corrections. In this decision, the Everson Court accepted the Michigan Department of Correction's claim that “the very manhood” of male prison guards both threatens the safety (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Privacy as an Asset.Jarek Gryz - 2017 - In Mindel Marcellus, Lyons Kelly & Wigglesworth Joe (eds.), Proceedings of the 27th CASCON Conference. IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  32
    Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World.Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta (eds.) - 2024 - London: Hart.
    Th e re-use of publicly available (personal) data for originally unanticipated purposes has become common practice. Without such secondary uses, the development of many AI systems like large language models (LLMs) and ChatGPT would not even have been possible. Th is chapter addresses the ethical implications of such secondary processing, with a particular focus on data protection and privacy issues. Legal and ethical evaluations of secondary processing of publicly available personal data diverge considerably both among scholars and the general (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Privacy and Assurance: On the Right to Be Forgotten.Scott Casleton - 2024 - Political Philosophy 1 (1):212-235.
    The right to be forgotten enables individuals to remove certain links from search results that appear when their names are entered as search terms. Formulated as a distinct application of the general right to privacy, the right to be forgotten has proven highly controversial, for two reasons. First, it is difficult to see how the specific right to be forgotten can apply to the withdrawal of public information, since the general right to privacy typically covers the disclosure of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  36. Privacy and the USA patriot act: Rights, the value of rights, and autonomy.Alan Rubel - 2007 - Law and Philosophy 26 (2):119-159.
    Civil liberty and privacy advocates have criticized the USA PATRIOT Act (Act) on numerous grounds since it was passed in the wake of the World Trade Center attacks in 2001. Two of the primary targets of those criticisms are the Act’s sneak-and-peek search provision, which allows law enforcement agents to conduct searches without informing the search’s subjects, and the business records provision, which allows agents to secretly subpoena a variety of information – most notoriously, library borrowing records. Without attending (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  37. (1 other version)Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Privacy.Edmund Byrne - 1997 - In Byrne Edmund (ed.), Encyclopedia of Applied Ethics. Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  39. The privacy dependency thesis and self-defense.Lauritz Aastrup Munch & Jakob Thrane Mainz - 2024 - AI and Society 39 (5):2525-2535.
    If I decide to disclose information about myself, this act may undermine other people’s ability to conceal information about them. Such dependencies are called privacy dependencies in the literature. Some say that privacy dependencies generate moral duties to avoid sharing information about oneself. If true, we argue, then it is sometimes justified for others to impose harm on the person sharing information to prevent them from doing so. In this paper, we first show how such conclusions arise. Next, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In Philosophical Foundations of Medical Law. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At best, data about your health might (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards ( Anderson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Privacy, Liberty, Property, and the Genetic Modification of Humans.Adam D. Moore - 2005 - Journal of Philosophical Research 30 (9999):81-94.
    Can one’s genetic profile be owned? How about techniques to improve genetic profi les? A brave new world of genetic enhancement is upon us and we’d better be ready to answer such questions. Adam Moore is ready. He thinks the answers to these questions are resoundingly “yes.” He defends this on the ground of individual liberty in the face of potential government control of such technology. He argues that genetic property is to be assimilated to rights of privacy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Publicity, Privacy, and Religious Toleration in Hobbes's Leviathan.Arash Abizadeh - 2013 - Modern Intellectual History 10 (2):261-291.
    What motivated an absolutist Erastian who rejected religious freedom, defended uniform public worship, and deemed the public expression of disagreement a catalyst for war to endorse a movement known to history as the champion of toleration, no coercion in religion, and separation of church and state? At least three factors motivated Hobbes’s 1651 endorsement of Independency: the Erastianism of Cromwellian Independency, the influence of the politique tradition, and, paradoxically, the contribution of early-modern practices of toleration to maintaining the public sphere’s (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  44. Privacy, autonomy and direct-to-consumer genetic testing: a response to Vayena.Kyle van Oosterum - 2022 - Journal of Medical Ethics 48 (10):774-775.
    In Vayena’s article, ‘direct-to-consumer (DTC) genomics on the scales of autonomy’, she claims that there may be a strong autonomy-based argument for permitting DTC genomic services. In this response, I point out how the diminishment of one’s genetic privacy can cause a relevant autonomy-related harm which must be balanced against the autonomy-related gains DTC services provide. By drawing on conceptual connections between privacy and the Razian conception of autonomy, I show that DTC genetic testing may decrease the range (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Internet and Privacy.Carissa Veliz - 2019 - In David Edmonds (ed.), Ethics and the Contemporary World. New York: Routledge. pp. 149-159.
    In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is important because violations of the right to privacy can harm us individually and collectively, and offer some advice as to how to protect our privacy online.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  46. Privacy Rights, and Why Negative Control is Not a Dead End: A Reply to Munch and Lundgren.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2021 - Res Publica 28 (2):391-400.
    Lauritz Munch and Björn Lundgren have recently replied to a paper published by us in this journal. In our original paper, we defended a novel version of the so-called ‘control theory’ of the moral right to privacy. We argued that control theorists should define ‘control’ as what we coined ‘Negative Control’. Munch and Lundgren have recently provided a range of interesting and challenging objections to our view. Independently of each other, they give almost identical counterexamples to our definition of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. (1 other version)What to Do When Privacy Is Gone.James Brusseau - 2019 - In D. E. Wittkower (ed.), Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Old Dominion. pp. 2-8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Parents, Privacy, and Facebook: Legal and Social Responses to the Problem of Over-Sharing.Renée Nicole Souris - 2018 - In Mark Navin & Ann Cudd (eds.), Core Concepts and Contemporary Issues in Privacy. Cham: Springer Verlag. pp. 175-188.
    This paper examines whether American parents legally violate their children’s privacy rights when they share embarrassing images of their children on social media without their children’s consent. My inquiry is motivated by recent reports that French authorities have warned French parents that they could face fines and imprisonment for such conduct, if their children sue them once their children turn 18. Where French privacy law is grounded in respect for dignity, thereby explaining the French concerns for parental “over-sharing,” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Privacy and the Common Good: G. H. Mead and the Social Value of Privacy.Yuval Goldfus - manuscript
    This article explores the social value of privacy and the intricate relationship between personal autonomy and societal cohesion within the realm of privacy. It contrasts George Herbert Mead’s two models of social organization—hostility and integration—in terms of their impact on the interplay between individuals and society. The model of hostility envisions individuals and society engaged in a zero-sum game, resulting in diminished individuality and an atomistic view of autonomy. In contrast, the model of integration recognizes the interdependence of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50.  51
    Privacy and Machine Learning- Based Artificial Intelligence: Philosophical, Legal, and Technical Investigations.Haleh Asgarinia - 2024 - Dissertation, Department of Philisophy, University of Twente
    This dissertation consists of five chapters, each written as independent research papers that are unified by an overarching concern regarding information privacy and machine learning-based artificial intelligence (AI). This dissertation addresses the issues concerning privacy and AI by responding to the following three main research questions (RQs): RQ1. ‘How does an AI system affect privacy?’; RQ2. ‘How effectively does the General Data Protection Regulation (GDPR) assess and address privacy issues concerning both individuals and groups?’; and RQ3. (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 428