Results for 'Privacy Dependencies'

998 found
Order:
  1. The Privacy Dependency Thesis and Self-Defense.Lauritz Aastrup Munch & Jakob Thrane Mainz - forthcoming - AI and Society:1-11.
    If I decide to disclose information about myself, this act can undermine other people’s ability to effectively conceal information about themselves. One case in point involves genetic information: if I share ‘my’ genetic information with others, I thereby also reveal genetic information about my biological relatives. Such dependencies are well-known in the privacy literature and are often referred to as ‘privacy dependencies’. Some take the existence of privacy dependencies to generate a moral duty to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. The Moral Significance of Privacy Dependencies.Lauritz Aastrup Munch & Jakob Thrane Mainz - 2023 - Philosophy and Technology 36 (4):1-19.
    Often, when we share information about ourselves, we contribute to people learning personal things about others. This may happen because what we share about ourselves can be used to infer personal information about others. Such dependencies have become known as privacy dependencies in the literature. It is sometimes claimed that the scope of the right to privacy should be expanded in light of such dependencies. For example, some have argued that inferring information about others can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Brain Privacy and the Case of Cannibal Cop.Mark Tunick - 2017 - Res Publica 23 (2):179-196.
    In light of technology that may reveal the content of a person’s innermost thoughts, I address the question of whether there is a right to ‘brain privacy’—a right not to have one’s inner thoughts revealed to others–even if exposing these thoughts might be beneficial to society. I draw on a conception of privacy as the ability to control who has access to information about oneself and to an account that connects one’s interest in privacy to one’s interests (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In Philosophical Foundations of Medical Law. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At best, data about your health might (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Does a person have a right to attention? Depends on what she is doing.Kaisa Kärki & Visa Kurki - 2023 - Philosophy and Technology 36 (86):1-16.
    It has been debated whether the so-called attention economy, in which the attention of agents is measured and sold, jeopardizes something of value. One strand of this discussion has focused on so-called attention rights, asking: should attention be legally protected, either by introducing novel rights or by extending the scope of pre-existing rights? In this paper, however, in order to further this discussion, we ask: How is attention already protected legally? In what situations does a person have the right to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Mill and the secret ballot: Beyond coercion and corruption.Annabelle Lever - 2007 - Utilitas 19 (3):354-378.
    In Considerations on Representative Government, John Stuart Mill concedes that secrecy in voting is often justified but, nonetheless, maintains that it should be the exception rather than the rule. This paper critically examines Mill’s arguments. It shows that Mill’s idea of voting depends on a sharp public/private distinction which is difficult to square with democratic ideas about the different powers and responsibilities of voters and their representatives, or with legitimate differences of belief and interest amongst voters themselves. Hence, it concludes, (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  7. Granny and the robots: ethical issues in robot care for the elderly.Amanda Sharkey & Noel Sharkey - 2012 - Ethics and Information Technology 14 (1):27-40.
    The growing proportion of elderly people in society, together with recent advances in robotics, makes the use of robots in elder care increasingly likely. We outline developments in the areas of robot applications for assisting the elderly and their carers, for monitoring their health and safety, and for providing them with companionship. Despite the possible benefits, we raise and discuss six main ethical concerns associated with: (1) the potential reduction in the amount of human contact; (2) an increase in the (...)
    Download  
     
    Export citation  
     
    Bookmark   112 citations  
  8. The ethics of cellular reprogramming.Anna Smajdor & Adrian Villalba - forthcoming - Cellular Reprogramming 25.
    Louise Brown's birth in 1978 heralded a new era not just in reproductive technology, but in the relationship between science, cells, and society. For the first time, human embryos could be created, selected, studied, manipulated, frozen, altered, or destroyed, outside the human body. But with this possibility came a plethora of ethical questions. Is it acceptable to destroy a human embryo for the purpose of research? Or to create an embryo with the specific purpose of destroying it for research? In (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. The promise and perils of AI in medicine.Robert Sparrow & Joshua James Hatherley - 2019 - International Journal of Chinese and Comparative Philosophy of Medicine 17 (2):79-109.
    What does Artificial Intelligence (AI) have to contribute to health care? And what should we be looking out for if we are worried about its risks? In this paper we offer a survey, and initial evaluation, of hopes and fears about the applications of artificial intelligence in medicine. AI clearly has enormous potential as a research tool, in genomics and public health especially, as well as a diagnostic aid. It’s also highly likely to impact on the organisational and business practices (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  10. Anonymity and Democracy: Absence as Presence in the Public Sphere.Hans Asenbaum - 2018 - American Political Science Review 112 (3):459–472.
    Although anonymity is a central feature of liberal democracies—not only in the secret ballot, but also in campaign funding, publishing political texts, masked protests, and graffiti—it has so far not been conceptually grounded in democratic theory. Rather, it is treated as a self-explanatory concept related to privacy. To overcome this omission, this article develops a complex understanding of anonymity in the context of democratic theory. Drawing upon the diverse literature on anonymity in political participation, it explains anonymity as a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  11. The moral obligation to obey law.Mark Tunick - 2002 - Journal of Social Philosophy 33 (3):464–482.
    Is it always morally wrong to violate a law and in doing so does one necessarily act badly? I argue that whether in breaking a law one acts badly depends on considerations unique to the particular act of lawbreaking. The moral judgment in question is deeply contextual and cannot be settled by appeal to blanket moral rules such as that it is wrong to break (any) law. The argument is made by focusing on the example of a runner having to (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  12. Big Tech and the Smartification of Agriculture.Anna-Verena Nosthoff & Felix Maschewski - 2022 - Https://Projects.Itforchange.Net/State-of-Big-Tech/Big-Tech-and-the-Smartification-of-Agriculture-a- Critical-Perspective/.
    The paper outlines critical aspects concerning the increasing use of big data in agriculture and farming. In particular, the aim is to shed light on the emerging dominance of the platform economy in the field of agriculture and food production. To analyze those power structures shaping this dynamic, we start with brief observations on the general relationship between digitization and agriculture and explain the platform economy, its general business model, and the proprietary forms of market power emerging from it. Subsequently, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  15. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2014 - In Beaete Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. Privacy, Ethics, and Institutional Research.Alan Rubel - 2019 - New Directions in Institutional Research 2019 (183):5-16.
    Despite widespread agreement that privacy in the context of education is important, it can be difficult to pin down precisely why and to what extent it is important, and it is challenging to determine how privacy is related to other important values. But that task is crucial. Absent a clear sense of what privacy is, it will be difficult to understand the scope of privacy protections in codes of ethics. Moreover, privacy will inevitably conflict with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Symmetric Dependence.Elizabeth Barnes - 2018 - In Ricki Bliss & Graham Priest (eds.), Reality and its Structure: Essays in Fundamentality. Oxford, UK: Oxford University Press. pp. 50-69.
    Metaphysical orthodoxy maintains that the relation of ontological dependence is irreflexive, asymmetric, and transitive. The goal of this paper is to challenge that orthodoxy by arguing that ontological dependence should be understood as non- symmetric, rather than asymmetric. If we give up the asymmetry of dependence, interesting things follow for what we can say about metaphysical explanation— particularly for the prospects of explanatory holism.
    Download  
     
    Export citation  
     
    Bookmark   85 citations  
  21. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  22. Group privacy: a defence and an interpretation.Luciano Floridi - 2017 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group Privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  23.  98
    Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Privacy.Edmund Byrne - 1998 - In Encyclopedia of Applied Ethics. San Diego: Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  26. Bodily Privacy, Toilets, and Sex Discrimination: The Problem of "Manhood" in a Women's Prison.Jami L. Anderson - 2009 - In Olga Gershenson Barbara Penner (ed.), Ladies and Gents. pp. 90.
    Unjustifiable assumptions about sex and gender roles, the untamable potency of maleness, and gynophobic notions about women's bodies inform and influence a broad range of policy-making institutions in this society. In December 2004, the U.S. Court of Appeals for the Sixth Circuit continued this ignoble cultural pastime when they decided Everson v. Michigan Department of Corrections. In this decision, the Everson Court accepted the Michigan Department of Correction's claim that “the very manhood” of male prison guards both threatens the safety (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  28. What to Do When Privacy Is Gone.James Brusseau - 2019 - In Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. pp. 1 - 8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  30. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  31. Views on Privacy. A Survey.Siân Brooke & Carissa Véliz - 2020 - In Siân Brooke & Carissa Véliz (eds.), Data, Privacy, and the Individual.
    The purpose of this survey was to gather individual’s attitudes and feelings towards privacy and the selling of data. A total (N) of 1,107 people responded to the survey. -/- Across continents, age, gender, and levels of education, people overwhelmingly think privacy is important. An impressive 82% of respondents deem privacy extremely or very important, and only 1% deem privacy unimportant. Similarly, 88% of participants either agree or strongly agree with the statement that ‘violations to the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Does privacy undermine community.Mark Tunick - 2001 - Journal of Value Inquiry 35 (4):517-534.
    Does privacy--the condition of being invisible to public scrutiny--in so emphasizing individual rights, undermine community? One objection to privacy is that it is a license to engage in antisocial activity that undermines social norms. Another objection is that privacy encourages isolation and anonymity, also undermining community. Drawing on the political theory of Hegel, I argue that privacy can promote community. Some invasions of privacy can undermine a sort of autonomy essential for maintaining a community. I (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  33. Publicity, Privacy, and Religious Toleration in Hobbes's Leviathan.Arash Abizadeh - 2013 - Modern Intellectual History 10 (2):261-291.
    What motivated an absolutist Erastian who rejected religious freedom, defended uniform public worship, and deemed the public expression of disagreement a catalyst for war to endorse a movement known to history as the champion of toleration, no coercion in religion, and separation of church and state? At least three factors motivated Hobbes’s 1651 endorsement of Independency: the Erastianism of Cromwellian Independency, the influence of the politique tradition, and, paradoxically, the contribution of early-modern practices of toleration to maintaining the public sphere’s (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  34. Privacy During the Pandemic and Beyond.Carissa Vèliz - 2020 - The Philosophers' Magazine 90:107-113.
    This paper is an overview about the state of privacy and power shifts during the pandemic, and the privacy challenges ahead.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Privacy Rights, and Why Negative Control is Not a Dead End: A Reply to Munch and Lundgren.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2021 - Res Publica 28 (2):391-400.
    Lauritz Munch and Björn Lundgren have recently replied to a paper published by us in this journal. In our original paper, we defended a novel version of the so-called ‘control theory’ of the moral right to privacy. We argued that control theorists should define ‘control’ as what we coined ‘Negative Control’. Munch and Lundgren have recently provided a range of interesting and challenging objections to our view. Independently of each other, they give almost identical counterexamples to our definition of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  36. privacy, democracy and freedom of expression.Annabelle Lever - 2015 - In Beate Rossler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. cambridge University Press.
    this paper argues that people are entitled to keep some true facts about themselves to themselves, should they so wish, as a sign of respect for their moral and political status, and in order to protect themselves from being used as a public example in order to educate or to entertain other people. The “outing” - or non-consensual public disclosure - of people’s health records or status, or their sexual behaviour or orientation is usually unjustified, even when its consequences seem (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  37. Privacy, Autonomy, and the Dissolution of Markets.Kiel Brennan-Marquez & Daniel Susser - 2022 - Knight First Amendment Institute.
    Throughout the 20th century, market capitalism was defended on parallel grounds. First, it promotes freedom by enabling individuals to exploit their own property and labor-power; second, it facilitates an efficient allocation and use of resources. Recently, however, both defenses have begun to unravel—as capitalism has moved into its “platform” phase. Today, the pursuit of allocative efficiency, bolstered by pervasive data surveillance, often undermines individual freedom rather than promoting it. And more fundamentally, the very idea that markets are necessary to achieve (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Inner privacy of conscious experiences and quantum information.Danko D. Georgiev - 2020 - Biosystems 187:104051.
    The human mind is constituted by inner, subjective, private, first-person conscious experiences that cannot be measured with physical devices or observed from an external, objective, public, third-person perspective. The qualitative, phenomenal nature of conscious experiences also cannot be communicated to others in the form of a message composed of classical bits of information. Because in a classical world everything physical is observable and communicable, it is a daunting task to explain how an empirically unobservable, incommunicable consciousness could have any physical (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39. Mind-Dependence in Berkeley and the Problem of Perception.Umrao Sethi - 2021 - Australasian Journal of Philosophy 99 (4):648-668.
    ABSTRACT On the traditional picture, accidents must inhere in substances in order to exist. Berkeley famously argues that a particular class of accidents—the sensible qualities—are mere ideas—entities that depend for their existence on minds. To defend this view, Berkeley provides us with an elegant alternative to the traditional framework: sensible qualities depend on a mind, not in virtue of inhering in it, but in virtue of being perceived by it. This metaphysical insight, once correctly understood, gives us the resources to (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  40. The Epistemic Account of Privacy.Martijn Blaauw - 2013 - Episteme 10 (2):167-177.
    Privacy is valued by many. But what it means to have privacy remains less than clear. In this paper, I argue that the notion of privacy should be understood in epistemic terms. What it means to have (some degree of) privacy is that other persons do not stand in significant epistemic relations to those truths one wishes to keep private.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  41. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  42. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  43. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards ( Anderson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Privacy as an Asset.Jarek Gryz - 2017 - In Marcellus Mindel, Kelly Lyons & Joe Wigglesworth (eds.), Proceedings of the 27th CASCON Conference. Markham, Canada: IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Must Privacy and Sexual Equality Conflict? A Philosophical Examination of Some Legal Evidence.Annabelle Lever - 2000 - Social Research: An International Quarterly 67:1137-1172.
    This paper examines MacKinnon’s claims about the relationship of rights to privacy and equality in light of the reasoning in Harris and Bowers. When we contrast the Majority and Minority decisions in these cases, it shows, we can distinguish interpretations of the right to privacy that are consistent with sexual equality from those that are not. This is not simply because the two differ in their consequences – though they do - but because the former, unlike the latter, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  46. Must privacy and sexual equality conflict? A philosophical examination of some legal evidence.Annabelle Lever - 2001 - Social Research: An International Quarterly 67 (4):1137-1171.
    Are rights to privacy consistent with sexual equality? In a brief, but influential, article Catherine MacKinnon trenchantly laid out feminist criticisms of the right to privacy. In “Privacy v. Equality: Beyond Roe v. Wade” she linked familiar objections to the right to privacy and connected them to the fate of abortion rights in the U.S.A. (MacKinnon, 1983, 93-102). For many feminists, the Supreme Court’s decision in Roe v. Wade (1973) had suggested that, notwithstanding a dubious past, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Privacy in Public Places: Do GPS and Video Surveillance Provide Plain Views?Mark Tunick - 2009 - Social Theory and Practice 35 (4):597-622.
    New technologies of surveillance such as Global Positioning Systems (GPS) are increasingly used as convenient substitutes for conventional means of observation. Recent court decisions hold that the government may, without a warrant, use a GPS to track a vehicle’s movements in public places without violating the 4th Amendment, as the vehicle is in plain view and no reasonable expectation of privacy is violated. This emerging consensus of opinions fails to distinguish the unreasonable expectation that we not be seen in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Privacy and the Common Good: G. H. Mead and the Social Value of Privacy.Yuval Goldfus - manuscript
    This article explores the social value of privacy and the intricate relationship between personal autonomy and societal cohesion within the realm of privacy. It contrasts George Herbert Mead’s two models of social organization—hostility and integration—in terms of their impact on the interplay between individuals and society. The model of hostility envisions individuals and society engaged in a zero-sum game, resulting in diminished individuality and an atomistic view of autonomy. In contrast, the model of integration recognizes the interdependence of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 998