Results for 'nonintrusion theory of privacy'

998 found
Order:
  1. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  2. An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  3. An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational (...)
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  5. Privacy and the Common Good: G. H. Mead and the Social Value of Privacy.Yuval Goldfus - manuscript
    This article explores the social value of privacy and the intricate relationship between personal autonomy and societal cohesion within the realm of privacy. It contrasts George Herbert Mead’s two models of social organization—hostility and integration—in terms of their impact on the interplay between individuals and society. The model of hostility envisions individuals and society engaged in a zero-sum game, resulting in diminished individuality and an atomistic view of autonomy. In contrast, the model of integration recognizes the interdependence of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. The Theatre of Privacy: Vision, Self, and Narrative in Nabokov's Russian Language Novels.Gregory Khasin - 1999 - Dissertation, The University of Chicago
    This dissertation is an attempt to find a single framework for understanding two seemingly conflicting aspects of Nabokov's Russian novels---the metaphysical and the existential. The metaphysical aspect is analyzed according to Leibniz's "Monadology," with its key concepts of the monad, pre-established harmony, the optimization of the universe, and sufficient reason. The existential aspect is examined according to Sartre's theory of the gaze from "Being and Nothingness"; its main notions are being-for-another, radical individuation and intersubjective struggle. Concern with the level (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. The Negotiative Theory of Gender Identity and the Limits of First-Person Authority.Burkay Ozturk - 2022 - In Raja Halwani, Jacob M. Held, Natasha McKeever & Alan G. Soble (eds.), The Philosophy of Sex: Contemporary Readings, 8th edition. Lanham, MD: Rowman & Littlefield. pp. 261-281.
    This paper assesses the first-person authority account (FPA) of gender, according to which X's self-identification of what X's gender is, is the final say on what X's gender is, such that if others disagree, they are mistaken. One main reason in support of FPA is respecting X's autonomy—that is, overriding X's self-identification amounts to denying X's autonomy. Ozturk criticizes this view using analogies of religious and patriotic self-identifications, such that there are cases in which someone can permissibly claim that another (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Electromagnetic-Field Theories of Mind.Mostyn W. Jones - 2013 - Journal of Consciousness Studies 20 (11-12):124-149.
    Neuroscience investigates how neuronal processing circuits work, but it has problems explaining experiences this way. For example, it hasn’t explained how colour and shape circuits bind together in visual processing, nor why colours and other qualia are experienced so differently yet processed by circuits so similarly, nor how to get from processing circuits to pictorial images spread across inner space. Some theorists turn from these circuits to their electromagnetic fields to deal with such difficulties concerning the mind’s qualia, unity, (...), and causality. They include Kohler, Libet, Popper, Lindahl, Arhem, Charman, Pockett, John, McFadden, Fingelkurts, Maxwell, and Jones. They’re classifiable as computationalist, reductionist, dualist, realist, interactionist, epiphenomenalist, globalist, and localist. However, they’ve never been analysed together as a whole, which hinders evaluations of them. This article tries to rectify this. It concludes that while field theories face challenges, they aren’t easily dismissed, for they draw on considerable evidence and may avoid serious problems in neuroscience concerning the mind’s qualia, unity, causality, and ontology. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  9.  90
    Convergence of the source control and actual access accounts of privacy.Haleh Asgarinia - 2023 - AI and Ethics 3 (1).
    In this paper, it is argued that, when properly revised in the face of counter-examples, the source control and actual access views of privacy are extensionally equivalent but different in their underlying rationales. In this sense, the source control view and the actual access view, when properly modified to meet counter-examples, can be metaphorically compared to ‘climbing the same mountain but from different sides’ (as Parfit [1] has argued about normative theories). These two views can equally apply to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Bad by Nature, An Axiological Theory of Pain.Olivier Massin - 2017 - In Jennifer Corns (ed.), The Routledge Handbook of Philosophy of Pain. New York: Routledge. pp. 321-333.
    This chapter defends an axiological theory of pain according to which pains are bodily episodes that are bad in some way. Section 1 introduces two standard assumptions about pain that the axiological theory constitutively rejects: (i) that pains are essentially tied to consciousness and (ii) that pains are not essentially tied to badness. Section 2 presents the axiological theory by contrast to these and provides a preliminary defense of it. Section 3 introduces the paradox of pain and (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  11. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Privacy and the USA patriot act: Rights, the value of rights, and autonomy.Alan Rubel - 2007 - Law and Philosophy 26 (2):119-159.
    Civil liberty and privacy advocates have criticized the USA PATRIOT Act (Act) on numerous grounds since it was passed in the wake of the World Trade Center attacks in 2001. Two of the primary targets of those criticisms are the Act’s sneak-and-peek search provision, which allows law enforcement agents to conduct searches without informing the search’s subjects, and the business records provision, which allows agents to secretly subpoena a variety of information – most notoriously, library borrowing records. Without attending (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  13. Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Privacy as an Asset.Jarek Gryz - 2017 - In Marcellus Mindel, Kelly Lyons & Joe Wigglesworth (eds.), Proceedings of the 27th CASCON Conference. Markham, Canada: IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Social pathologies of informational privacy.Wulf Loh - 2022 - Journal of Social Philosophy.
    Following the recent practice turn in privacy research, informational privacy is increasingly analyzed with regard to the “appropriate flow of information” within a given practice, which preserves the “contextual integrity” of that practice (Nissenbaum, 2010, p. 149; 2015). Such a practice-theoretical take on privacy emphasizes the normative structure of practices as well as its structural injustices and power asymmetries, rather than focusing on the intentions and moral considerations of individual or institutional actors. Since privacy norms are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  18. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  19. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20. PHIL*4230 Photocopy Packet Privacy (edited by V. I. Burke).Victoria I. Burke - 2014 - Guelph, Canada: University of Guelph.
    This out-of-print collection in the area of the history, politics, ethics, and theory of privacy includes selections from Peter Gay, Alan Westin, Walter Benjamin, Catharine MacKinnon, Seyla Benhabib, Anita Allen, Ann Jennings, Charles Taylor, Richard Sennett, Mark Wicclair, Martha Nussbaum, and Robert Nozick.
    Download  
     
    Export citation  
     
    Bookmark  
  21. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  22. Privacy Rights, and Why Negative Control is Not a Dead End: A Reply to Munch and Lundgren.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2021 - Res Publica 28 (2):391-400.
    Lauritz Munch and Björn Lundgren have recently replied to a paper published by us in this journal. In our original paper, we defended a novel version of the so-called ‘control theory’ of the moral right to privacy. We argued that control theorists should define ‘control’ as what we coined ‘Negative Control’. Munch and Lundgren have recently provided a range of interesting and challenging objections to our view. Independently of each other, they give almost identical counterexamples to our definition (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  24. Does privacy undermine community.Mark Tunick - 2001 - Journal of Value Inquiry 35 (4):517-534.
    Does privacy--the condition of being invisible to public scrutiny--in so emphasizing individual rights, undermine community? One objection to privacy is that it is a license to engage in antisocial activity that undermines social norms. Another objection is that privacy encourages isolation and anonymity, also undermining community. Drawing on the political theory of Hegel, I argue that privacy can promote community. Some invasions of privacy can undermine a sort of autonomy essential for maintaining a community. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  25. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  26. Three Control Views on Privacy.Leonhard Menges - 2022 - Social Theory and Practice 48 (4):691-711.
    This paper discusses the idea that the concept of privacy should be understood in terms of control. Three different attempts to spell out this idea will be critically discussed. The conclusion will be that the Source Control View on privacy is the most promising version of the idea that privacy is to be understood in terms of control.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Privacy in Public Places: Do GPS and Video Surveillance Provide Plain Views?Mark Tunick - 2009 - Social Theory and Practice 35 (4):597-622.
    New technologies of surveillance such as Global Positioning Systems (GPS) are increasingly used as convenient substitutes for conventional means of observation. Recent court decisions hold that the government may, without a warrant, use a GPS to track a vehicle’s movements in public places without violating the 4th Amendment, as the vehicle is in plain view and no reasonable expectation of privacy is violated. This emerging consensus of opinions fails to distinguish the unreasonable expectation that we not be seen in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Speech Act Theory and Ethics of Speech Processing as Distinct Stages: the ethics of collecting, contextualizing and the releasing of (speech) data.Jolly Thomas, Lalaram Arya, Mubarak Hussain & Prasanna Srm - 2023 - 2023 Ieee International Symposium on Ethics in Engineering, Science, and Technology (Ethics), West Lafayette, in, Usa.
    Using speech act theory from the Philosophy of Language, this paper attempts to develop an ethical framework for the phenomenon of speech processing. We use the concepts of the illocutionary force and the illocutionary content of a speech act to explain the ethics of speech processing. By emphasizing the different stages involved in speech processing, we explore the distinct ethical issues that arise in relation to each stage. Input, processing, and output are the different ethically relevant stages under which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur (eds.), The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. A Theory of Metaphysical Indeterminacy.Elizabeth Barnes & J. Robert G. Williams - 2011 - In Karen Bennett & Dean W. Zimmerman (eds.), Oxford Studies in Metaphysics Volume 6. Oxford University Press UK. pp. 103-148.
    If the world itself is metaphysically indeterminate in a specified respect, what follows? In this paper, we develop a theory of metaphysical indeterminacy answering this question.
    Download  
     
    Export citation  
     
    Bookmark   140 citations  
  31. Classifying theories of welfare.Christopher Woodard - 2013 - Philosophical Studies 165 (3):787-803.
    This paper argues that we should replace the common classification of theories of welfare into the categories of hedonism, desire theories, and objective list theories. The tripartite classification is objectionable because it is unduly narrow and it is confusing: it excludes theories of welfare that are worthy of discussion, and it obscures important distinctions. In its place, the paper proposes two independent classifications corresponding to a distinction emphasised by Roger Crisp: a four-category classification of enumerative theories (about which items constitute (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  32. Proof Theory of Finite-valued Logics.Richard Zach - 1993 - Dissertation, Technische Universität Wien
    The proof theory of many-valued systems has not been investigated to an extent comparable to the work done on axiomatizatbility of many-valued logics. Proof theory requires appropriate formalisms, such as sequent calculus, natural deduction, and tableaux for classical (and intuitionistic) logic. One particular method for systematically obtaining calculi for all finite-valued logics was invented independently by several researchers, with slight variations in design and presentation. The main aim of this report is to develop the proof theory of (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  33. The General Theory of Second Best Is More General Than You Think.David Wiens - 2020 - Philosophers' Imprint 20 (5):1-26.
    Lipsey and Lancaster's "general theory of second best" is widely thought to have significant implications for applied theorizing about the institutions and policies that most effectively implement abstract normative principles. It is also widely thought to have little significance for theorizing about which abstract normative principles we ought to implement. Contrary to this conventional wisdom, I show how the second-best theorem can be extended to myriad domains beyond applied normative theorizing, and in particular to more abstract theorizing about the (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  34. The Theory of Aḥwāl and Arguments against the Law of Non-Contradiction.Behnam Zolghadr - 2020 - In Yearbook of the Maimonides Centre for Advanced Studies. Berlin, Germany: pp. 31-52.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Can Social Media Be Seen as a New Public Sphere in the Context of Hannah Arendt's Public Sphere Theory?Metehan Karakurt & Aykut Aykutalp - 2020 - Londra, Birleşik Krallık: IJOPEC Publication Limited.
    With the 21st century, we are witnessing the mass spread of the communication technologies and social media revolution. Interactive networks built on a global scale have led to the formation of a virtual world of reality that is connecting the whole world. With the global spread of communication networks, the question of whether social media points to a new public sphere has been raised. Social media applications such as Facebook, Twitter and Instagram are nowadays seen as a place where political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. The internalist virtue theory of knowledge.Ralph Wedgwood - 2020 - Synthese 197 (12):5357–5378.
    Here is a definition of knowledge: for you to know a proposition p is for you to have an outright belief in p that is correct precisely because it manifests the virtue of rationality. This definition resembles Ernest Sosa’s “virtue theory”, except that on this definition, the only virtue that must be manifested in all instances of knowledge is rationality, and no reductive account of rationality is attempted—rationality is assumed to be an irreducibly normative notion. This definition is compatible (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  37. Perfectoid Diamonds and n-Awareness. A Meta-Model of Subjective Experience.Shanna Dobson & Robert Prentner - manuscript
    In this paper, we propose a mathematical model of subjective experience in terms of classes of hierarchical geometries of representations (“n-awareness”). We first outline a general framework by recalling concepts from higher category theory, homotopy theory, and the theory of (infinity,1)-topoi. We then state three conjectures that enrich this framework. We first propose that the (infinity,1)-category of a geometric structure known as perfectoid diamond is an (infinity,1)-topos. In order to construct a topology on the (infinity,1)-category of diamonds (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38. Mystical Theology of St. Simeon New Theologian.Metropolitan Hilarion of Volokolamsk - 2015 - European Journal for Philosophy of Religion 7 (2):3-20.
    The article deals with the problem of the divine light in the mystical works of St Symeon the New Theologian in the context of the Eastern Christian ascetical tradition. The author focuses on the passages referring to the divine light in the works of Evagrios Pontikos, St Isaac the Syrian, St Maximus the Confessor, and in the Makarian corpus. As is shown in the present contribution, none of these authors created a fully-developed theory of the vision of the divine (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Ethics of Artificial Intelligence.Stefan Buijsman, Michael Klenk & Jeroen van den Hoven - forthcoming - In Nathalie Smuha (ed.), Cambridge Handbook on the Law, Ethics and Policy of AI. Cambridge University Press.
    Artificial Intelligence (AI) is increasingly adopted in society, creating numerous opportunities but at the same time posing ethical challenges. Many of these are familiar, such as issues of fairness, responsibility and privacy, but are presented in a new and challenging guise due to our limited ability to steer and predict the outputs of AI systems. This chapter first introduces these ethical challenges, stressing that overviews of values are a good starting point but frequently fail to suffice due to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Iudicium ex Machinae – The Ethical Challenges of Automated Decision-Making in Criminal Sentencing.Frej Thomsen - 2022 - In Julian Roberts & Jesper Ryberg (eds.), Principled Sentencing and Artificial Intelligence. Oxford University Press.
    Automated decision making for sentencing is the use of a software algorithm to analyse a convicted offender’s case and deliver a sentence. This chapter reviews the moral arguments for and against employing automated decision making for sentencing and finds that its use is in principle morally permissible. Specifically, it argues that well-designed automated decision making for sentencing will better approximate the just sentence than human sentencers. Moreover, it dismisses common concerns about transparency, privacy and bias as unpersuasive or inapplicable. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  42. The Rights of Foreign Intelligence Targets.Michael Skerker - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 89-106.
    I develop a contractualist theory of just intelligence collection based on the collective moral responsibility to deliver security to a community and use the theory to justify certain kinds of signals interception. I also consider the rights of various intelligence targets like intelligence officers, service personnel, government employees, militants, and family members of all of these groups in order to consider how targets' waivers or forfeitures might create the moral space for just surveillance. Even people who are not (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Sphere transgressions: reflecting on the risks of big tech expansionism.Marthe Stevens, Steven R. Kraaijeveld & Tamar Sharon - forthcoming - Information, Communication and Society.
    The rapid expansion of Big Tech companies into various societal domains (e.g., health, education, and agriculture) over the past decade has led to increasing concerns among governments, regulators, scholars, and civil society. While existing theoretical frameworks—often revolving around privacy and data protection, or market and platform power—have shed light on important aspects of Big Tech expansionism, there are other risks that these frameworks cannot fully capture. In response, this editorial proposes an alternative theoretical framework based on the notion of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. New Frontiers in the Philosophy of Intellectual Property.Annabelle Lever - 2012 - Cambridge University Press.
    The new frontiers in the philosophy of intellectual property lie squarely in territories belonging to moral and political philosophy, as well as legal philosophy and philosophy of economics – or so this collection suggests. Those who wish to understand the nature and justification of intellectual property may now find themselves immersed in philosophical debates on the structure and relative merits of consequentialist and deontological moral theories, or disputes about the nature and value of privacy, or the relationship between national (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  45. Why the Late Justice Scalia Was Wrong: The Fallacies of Constitutional Textualism.Ken Levy - 2017 - Lewis and Clark Law Review 21 (1):45-96.
    My article concerns constitutional interpretation and substantive due process, issues that played a central role in Obergefell v. Hodges (2015), one of the two same-sex marriage cases. (The other same-sex marriage case was United States v. Windsor (2013).) -/- The late Justice Scalia consistently maintained that the Court “invented” substantive due process and continues to apply this legal “fiction” not because the Constitution supports it but simply because the justices like it. Two theories underlay his cynical conclusion. First is the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. A Defense of Privacy as Control.Leonhard Menges - 2021 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  47. Toward Linguistic Responsibility: The Harm of Speech Acts.Emanuele Costa - 2021 - Public Philosophy Journal 4 (1).
    In this short article, I analyze forms of public speech by individuals in positions of power through a framework based on Austin’s theory of speech acts. I argue that because of the illocutionary and perlocutionary force attached to such individuals’ offices and their public figures, their public speech qualifies for being framed as speech acts—which are not covered by even a broad understanding of freedom of speech or right to privacy. Therefore, I formulate a call for the assessment (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Biometrics and the Metaphysics of Personal Identity.Amy Kind - forthcoming - IET Biometrics.
    The vast advances in biometrics over the past several decades have brought with them a host of pressing concerns. Philosophical scrutiny has already been devoted to many of the relevant ethical and political issues, especially ones arising from matters of privacy, bias, and security in data collection. But philosophers have devoted surprisingly little attention to the relevant metaphysical issues, in particular, ones concerning matters of personal identity. This paper aims to take some initial steps to correct this oversight. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Pattern theory of self and situating moral aspects: the need to include authenticity, autonomy and responsibility in understanding the effects of deep brain stimulation.Przemysław Zawadzki - 2022 - Phenomenology and the Cognitive Sciences 21 (3):559-582.
    The aims of this paper are to: (1) identify the best framework for comprehending multidimensional impact of deep brain stimulation on the self; (2) identify weaknesses of this framework; (3) propose refinements to it; (4) in pursuing (3), show why and how this framework should be extended with additional moral aspects and demonstrate their interrelations; (5) define how moral aspects relate to the framework; (6) show the potential consequences of including moral aspects on evaluating DBS’s impact on patients’ selves. Regarding (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  50. Souled out of rights? – predicaments in protecting the human spirit in the age of neuromarketing.Alexander Sieber - 2019 - Life Sciences, Society and Policy 15 (6):1-11.
    Modern neurotechnologies are rapidly infringing on conventional notions of human dignity and they are challenging what it means to be human. This article is a survey analysis of the future of the digital age, reflecting primarily on the effects of neurotechnology that violate universal human rights to dignity, self-determination, and privacy. In particular, this article focuses on neuromarketing to critically assess potentially negative social ramifications of under-regulated neurotechnological application. Possible solutions are critically evaluated, including the human rights claim to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 998