Results for 'nonintrusion theory of privacy'

954 found
Order:
  1. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  2. An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  5.  68
    Privacy: scepticism, normative approaches and legal protection. A review of the theoretical debate and a discussion of recent developments in the EU.Elisa Orrù - 2022 - Dpce Online 52 (2):779–800.
    Digitalisation has lent the right to privacy increasing philosophical and legal relevance. However, privacy’s epistemic status and associated normative values are constantly subject to radical criticisms. This article investigates the validity, in theory and practice, of three radical critiques of privacy. A review of the philosophical and interdisciplinary discourse on privacy during the last half century is followed by analyses of recent legal developments within the EU. Privacy emerges as a highly differentiated and powerful (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Convergence of the source control and actual access accounts of privacy.Haleh Asgarinia - 2023 - AI and Ethics 3 (1).
    In this paper, it is argued that, when properly revised in the face of counter-examples, the source control and actual access views of privacy are extensionally equivalent but different in their underlying rationales. In this sense, the source control view and the actual access view, when properly modified to meet counter-examples, can be metaphorically compared to ‘climbing the same mountain but from different sides’ (as Parfit [1] has argued about normative theories). These two views can equally apply to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. The Theatre of Privacy: Vision, Self, and Narrative in Nabokov's Russian Language Novels.Gregory Khasin - 1999 - Dissertation, The University of Chicago
    This dissertation is an attempt to find a single framework for understanding two seemingly conflicting aspects of Nabokov's Russian novels---the metaphysical and the existential. The metaphysical aspect is analyzed according to Leibniz's "Monadology," with its key concepts of the monad, pre-established harmony, the optimization of the universe, and sufficient reason. The existential aspect is examined according to Sartre's theory of the gaze from "Being and Nothingness"; its main notions are being-for-another, radical individuation and intersubjective struggle. Concern with the level (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Privacy and the Common Good: G. H. Mead and the Social Value of Privacy.Yuval Goldfus - manuscript
    This article explores the social value of privacy and the intricate relationship between personal autonomy and societal cohesion within the realm of privacy. It contrasts George Herbert Mead’s two models of social organization—hostility and integration—in terms of their impact on the interplay between individuals and society. The model of hostility envisions individuals and society engaged in a zero-sum game, resulting in diminished individuality and an atomistic view of autonomy. In contrast, the model of integration recognizes the interdependence of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Electromagnetic-Field Theories of Mind.Mostyn W. Jones - 2013 - Journal of Consciousness Studies 20 (11-12):124-149.
    Neuroscience investigates how neuronal processing circuits work, but it has problems explaining experiences this way. For example, it hasn’t explained how colour and shape circuits bind together in visual processing, nor why colours and other qualia are experienced so differently yet processed by circuits so similarly, nor how to get from processing circuits to pictorial images spread across inner space. Some theorists turn from these circuits to their electromagnetic fields to deal with such difficulties concerning the mind’s qualia, unity, (...), and causality. They include Kohler, Libet, Popper, Lindahl, Arhem, Charman, Pockett, John, McFadden, Fingelkurts, Maxwell, and Jones. They’re classifiable as computationalist, reductionist, dualist, realist, interactionist, epiphenomenalist, globalist, and localist. However, they’ve never been analysed together as a whole, which hinders evaluations of them. This article tries to rectify this. It concludes that while field theories face challenges, they aren’t easily dismissed, for they draw on considerable evidence and may avoid serious problems in neuroscience concerning the mind’s qualia, unity, causality, and ontology. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  10. Bad by Nature, An Axiological Theory of Pain.Olivier Massin - 2017 - In Jennifer Corns (ed.), The Routledge Handbook of Philosophy of Pain. New York: Routledge. pp. 321-333.
    This chapter defends an axiological theory of pain according to which pains are bodily episodes that are bad in some way. Section 1 introduces two standard assumptions about pain that the axiological theory constitutively rejects: (i) that pains are essentially tied to consciousness and (ii) that pains are not essentially tied to badness. Section 2 presents the axiological theory by contrast to these and provides a preliminary defense of it. Section 3 introduces the paradox of pain and (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  11. Privacy and the USA patriot act: Rights, the value of rights, and autonomy.Alan Rubel - 2007 - Law and Philosophy 26 (2):119-159.
    Civil liberty and privacy advocates have criticized the USA PATRIOT Act (Act) on numerous grounds since it was passed in the wake of the World Trade Center attacks in 2001. Two of the primary targets of those criticisms are the Act’s sneak-and-peek search provision, which allows law enforcement agents to conduct searches without informing the search’s subjects, and the business records provision, which allows agents to secretly subpoena a variety of information – most notoriously, library borrowing records. Without attending (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  12. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Social pathologies of informational privacy.Wulf Loh - 2022 - Journal of Social Philosophy (3):541-561.
    Following the recent practice turn in privacy research, informational privacy is increasingly analyzed with regard to the “appropriate flow of information” within a given practice, which preserves the “contextual integrity” of that practice (Nissenbaum, 2010, p. 149; 2015). Such a practice-theoretical take on privacy emphasizes the normative structure of practices as well as its structural injustices and power asymmetries, rather than focusing on the intentions and moral considerations of individual or institutional actors. Since privacy norms are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  15. Privacy as an Asset.Jarek Gryz - 2017 - In Mindel Marcellus, Lyons Kelly & Wigglesworth Joe (eds.), Proceedings of the 27th CASCON Conference. IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  19. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20. Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Leenes R. Van Brakel R. Gutwirth S. De Hert P. (ed.), Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  21. Does privacy undermine community.Mark Tunick - 2001 - Journal of Value Inquiry 35 (4):517-534.
    Does privacy--the condition of being invisible to public scrutiny--in so emphasizing individual rights, undermine community? One objection to privacy is that it is a license to engage in antisocial activity that undermines social norms. Another objection is that privacy encourages isolation and anonymity, also undermining community. Drawing on the political theory of Hegel, I argue that privacy can promote community. Some invasions of privacy can undermine a sort of autonomy essential for maintaining a community. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  22. PHIL*4230 Photocopy Packet Privacy (edited by V. I. Burke).Victoria I. Burke - 2014 - Guelph, Canada: University of Guelph.
    This out-of-print collection in the area of the history, politics, ethics, and theory of privacy includes selections from Peter Gay, Alan Westin, Walter Benjamin, Catharine MacKinnon, Seyla Benhabib, Anita Allen, Ann Jennings, Charles Taylor, Richard Sennett, Mark Wicclair, Martha Nussbaum, and Robert Nozick.
    Download  
     
    Export citation  
     
    Bookmark  
  23. Privacy Rights, and Why Negative Control is Not a Dead End: A Reply to Munch and Lundgren.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2021 - Res Publica 28 (2):391-400.
    Lauritz Munch and Björn Lundgren have recently replied to a paper published by us in this journal. In our original paper, we defended a novel version of the so-called ‘control theory’ of the moral right to privacy. We argued that control theorists should define ‘control’ as what we coined ‘Negative Control’. Munch and Lundgren have recently provided a range of interesting and challenging objections to our view. Independently of each other, they give almost identical counterexamples to our definition (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  25. Privacy in Public Places: Do GPS and Video Surveillance Provide Plain Views?Mark Tunick - 2009 - Social Theory and Practice 35 (4):597-622.
    New technologies of surveillance such as Global Positioning Systems (GPS) are increasingly used as convenient substitutes for conventional means of observation. Recent court decisions hold that the government may, without a warrant, use a GPS to track a vehicle’s movements in public places without violating the 4th Amendment, as the vehicle is in plain view and no reasonable expectation of privacy is violated. This emerging consensus of opinions fails to distinguish the unreasonable expectation that we not be seen in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  27. Three Control Views on Privacy.Leonhard Menges - 2022 - Social Theory and Practice 48 (4):691-711.
    This paper discusses the idea that the concept of privacy should be understood in terms of control. Three different attempts to spell out this idea will be critically discussed. The conclusion will be that the Source Control View on privacy is the most promising version of the idea that privacy is to be understood in terms of control.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Toward Linguistic Responsibility: The Harm of Speech Acts.Emanuele Costa - 2021 - Public Philosophy Journal 4 (1).
    In this short article, I analyze forms of public speech by individuals in positions of power through a framework based on Austin’s theory of speech acts. I argue that because of the illocutionary and perlocutionary force attached to such individuals’ offices and their public figures, their public speech qualifies for being framed as speech acts—which are not covered by even a broad understanding of freedom of speech or right to privacy. Therefore, I formulate a call for the assessment (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur (eds.), The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Speech Act Theory and Ethics of Speech Processing as Distinct Stages: the ethics of collecting, contextualizing and the releasing of (speech) data.Jolly Thomas, Lalaram Arya, Mubarak Hussain & Prasanna Srm - 2023 - 2023 Ieee International Symposium on Ethics in Engineering, Science, and Technology (Ethics), West Lafayette, in, Usa.
    Using speech act theory from the Philosophy of Language, this paper attempts to develop an ethical framework for the phenomenon of speech processing. We use the concepts of the illocutionary force and the illocutionary content of a speech act to explain the ethics of speech processing. By emphasizing the different stages involved in speech processing, we explore the distinct ethical issues that arise in relation to each stage. Input, processing, and output are the different ethically relevant stages under which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Sphere transgressions: reflecting on the risks of big tech expansionism.Marthe Stevens, Steven R. Kraaijeveld & Tamar Sharon - forthcoming - Information, Communication and Society.
    The rapid expansion of Big Tech companies into various societal domains (e.g., health, education, and agriculture) over the past decade has led to increasing concerns among governments, regulators, scholars, and civil society. While existing theoretical frameworks—often revolving around privacy and data protection, or market and platform power—have shed light on important aspects of Big Tech expansionism, there are other risks that these frameworks cannot fully capture. In response, this editorial proposes an alternative theoretical framework based on the notion of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  33. Perfectoid Diamonds and n-Awareness. A Meta-Model of Subjective Experience.Shanna Dobson & Robert Prentner - manuscript
    In this paper, we propose a mathematical model of subjective experience in terms of classes of hierarchical geometries of representations (“n-awareness”). We first outline a general framework by recalling concepts from higher category theory, homotopy theory, and the theory of (infinity,1)-topoi. We then state three conjectures that enrich this framework. We first propose that the (infinity,1)-category of a geometric structure known as perfectoid diamond is an (infinity,1)-topos. In order to construct a topology on the (infinity,1)-category of diamonds (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  34. Iudicium ex Machinae – The Ethical Challenges of Automated Decision-Making in Criminal Sentencing.Frej Thomsen - 2022 - In Julian Roberts & Jesper Ryberg (eds.), Principled Sentencing and Artificial Intelligence. Oxford University Press.
    Automated decision making for sentencing is the use of a software algorithm to analyse a convicted offender’s case and deliver a sentence. This chapter reviews the moral arguments for and against employing automated decision making for sentencing and finds that its use is in principle morally permissible. Specifically, it argues that well-designed automated decision making for sentencing will better approximate the just sentence than human sentencers. Moreover, it dismisses common concerns about transparency, privacy and bias as unpersuasive or inapplicable. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. The Rights of Foreign Intelligence Targets.Michael Skerker - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 89-106.
    I develop a contractualist theory of just intelligence collection based on the collective moral responsibility to deliver security to a community and use the theory to justify certain kinds of signals interception. I also consider the rights of various intelligence targets like intelligence officers, service personnel, government employees, militants, and family members of all of these groups in order to consider how targets' waivers or forfeitures might create the moral space for just surveillance. Even people who are not (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. New Frontiers in the Philosophy of Intellectual Property.Annabelle Lever - 2012 - Cambridge University Press.
    The new frontiers in the philosophy of intellectual property lie squarely in territories belonging to moral and political philosophy, as well as legal philosophy and philosophy of economics – or so this collection suggests. Those who wish to understand the nature and justification of intellectual property may now find themselves immersed in philosophical debates on the structure and relative merits of consequentialist and deontological moral theories, or disputes about the nature and value of privacy, or the relationship between national (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  37. Why the Late Justice Scalia Was Wrong: The Fallacies of Constitutional Textualism.Ken Levy - 2017 - Lewis and Clark Law Review 21 (1):45-96.
    My article concerns constitutional interpretation and substantive due process, issues that played a central role in Obergefell v. Hodges (2015), one of the two same-sex marriage cases. (The other same-sex marriage case was United States v. Windsor (2013).) -/- The late Justice Scalia consistently maintained that the Court “invented” substantive due process and continues to apply this legal “fiction” not because the Constitution supports it but simply because the justices like it. Two theories underlay his cynical conclusion. First is the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Can Social Media Be Seen as a New Public Sphere in the Context of Hannah Arendt's Public Sphere Theory?Metehan Karakurt & Aykut Aykutalp - 2020 - Londra, Birleşik Krallık: IJOPEC Publication Limited.
    With the 21st century, we are witnessing the mass spread of the communication technologies and social media revolution. Interactive networks built on a global scale have led to the formation of a virtual world of reality that is connecting the whole world. With the global spread of communication networks, the question of whether social media points to a new public sphere has been raised. Social media applications such as Facebook, Twitter and Instagram are nowadays seen as a place where political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Biometrics and the Metaphysics of Personal Identity.Amy Kind - forthcoming - IET Biometrics.
    The vast advances in biometrics over the past several decades have brought with them a host of pressing concerns. Philosophical scrutiny has already been devoted to many of the relevant ethical and political issues, especially ones arising from matters of privacy, bias, and security in data collection. But philosophers have devoted surprisingly little attention to the relevant metaphysical issues, in particular, ones concerning matters of personal identity. This paper aims to take some initial steps to correct this oversight. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Mapping ethical issues in the use of smart home health technologies to care for older persons: a systematic review.Nadine Andrea Felber, Yi Jiao Tian, Félix Pageau, Bernice Simone Elger & Tenzin Wangmo - 2023 - BMC Medical Ethics 24 (1):1-13.
    Background The worldwide increase in older persons demands technological solutions to combat the shortage of caregiving and to enable aging in place. Smart home health technologies (SHHTs) are promoted and implemented as a possible solution from an economic and practical perspective. However, ethical considerations are equally important and need to be investigated. Methods We conducted a systematic review according to the PRISMA guidelines to investigate if and how ethical questions are discussed in the field of SHHTs in caregiving for older (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  41. Souled out of rights? – predicaments in protecting the human spirit in the age of neuromarketing.Alexander Sieber - 2019 - Life Sciences, Society and Policy 15 (6):1-11.
    Modern neurotechnologies are rapidly infringing on conventional notions of human dignity and they are challenging what it means to be human. This article is a survey analysis of the future of the digital age, reflecting primarily on the effects of neurotechnology that violate universal human rights to dignity, self-determination, and privacy. In particular, this article focuses on neuromarketing to critically assess potentially negative social ramifications of under-regulated neurotechnological application. Possible solutions are critically evaluated, including the human rights claim to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Ethics of Artificial Intelligence.Stefan Buijsman, Michael Klenk & Jeroen van den Hoven - forthcoming - In Nathalie Smuha (ed.), Cambridge Handbook on the Law, Ethics and Policy of AI. Cambridge University Press.
    Artificial Intelligence (AI) is increasingly adopted in society, creating numerous opportunities but at the same time posing ethical challenges. Many of these are familiar, such as issues of fairness, responsibility and privacy, but are presented in a new and challenging guise due to our limited ability to steer and predict the outputs of AI systems. This chapter first introduces these ethical challenges, stressing that overviews of values are a good starting point but frequently fail to suffice due to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. The Focus Theory of Hope.Andrew Chignell - 2023 - Philosophical Quarterly 73 (1):44-63.
    Most elpistologists now agree that hope for a specific outcome involves more than just desire plus the presupposition that the outcome is possible. This paper argues that the additional element of hope is a disposition to focus on the desired outcome in a certain way. I first survey the debate about the nature of hope in the recent literature, offer objections to some important competing accounts, and describe and defend the view that hope involves a kind of focus or attention. (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  44. (1 other version)A property cluster theory of cognition.Cameron Buckner - 2013 - Philosophical Psychology (3):1-30.
    Our prominent definitions of cognition are too vague and lack empirical grounding. They have not kept up with recent developments, and cannot bear the weight placed on them across many different debates. I here articulate and defend a more adequate theory. On this theory, behaviors under the control of cognition tend to display a cluster of characteristic properties, a cluster which tends to be absent from behaviors produced by non-cognitive processes. This cluster is reverse-engineered from the empirical tests (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  45. Prospects for an Expressivist Theory of Meaning.Nate Charlow - 2015 - Philosophers' Imprint 15:1-43.
    Advocates of Expressivism about basically any kind of language are best-served by abandoning a traditional content-centric approach to semantic theorizing, in favor of an update-centric or dynamic approach (or so this paper argues). The type of dynamic approach developed here — in contrast to the content-centric approach — is argued to yield canonical, if not strictly classical, "explanations" of the core semantic properties of the connectives. (The cases on which I focus most here are negation and disjunction.) I end the (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  46. Weighting for a plausible Humean theory of reasons.Mark Schroeder - 2007 - Noûs 41 (1):110–132.
    This paper addresses the two extensional objections to the Humean Theory of Reasons—that it allows for too many reasons, and that it allows for too few. Although I won’t argue so here, manyof the other objections to the Humean Theoryof Reasons turn on assuming that it cannot successfully deal with these two objections.1 What I will argue, is that the force of the too many and the too few objections to the Humean Theorydepend on whether we assume that Humeans (...)
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  47. Ethical Concerns in Computational Linguistic Field National Defense: A Philosophical Investigation of Language and Security.Mhd Halkis Malkis4 - 2024 - Linguistic and Philosophical Investigations 23 (1):386–396.
    This research examines ethical issues in computational linguistics that can be applied to national defense by analyzing philosophical and security language. The increasing use of language contexts, such as intelligence and communication data analysis, raises ethical and philosophical challenges related to privacy, control, and accuracy. This research aims to identify and analyze ethical issues, especially in the use of computational linguistics in defense applications, as well as their implications for the protection of individual rights and privacy. This method (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Two switches in the theory of counterfactuals: A study of truth conditionality and minimal change.Ivano Ciardelli, Linmin Zhang & Lucas Champollion - 2018 - Linguistics and Philosophy (6).
    Based on a crowdsourced truth value judgment experiment, we provide empirical evidence challenging two classical views in semantics, and we develop a novel account of counterfactuals that combines ideas from inquisitive semantics and causal reasoning. First, we show that two truth-conditionally equivalent clauses can make different semantic contributions when embedded in a counterfactual antecedent. Assuming compositionality, this means that the meaning of these clauses is not fully determined by their truth conditions. This finding has a clear explanation in inquisitive semantics: (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  49. The Modal Future: A Theory of Future-Directed Thought and Talk.Fabrizio Cariani - 2021 - Cambridge, UK: Cambridge University Press.
    Provisional draft, pre-production copy of my book “The Modal Future” (forthcoming with Cambridge University Press).
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  50. City and Soul in Plato and Alfarabi: An Explanation for the Differences Between Plato’s and Alfarabi’s Theory of City in Terms of Their Distinct Psychology.Ishraq Ali & Mingli Qin - 2020 - Axiomathes 30 (1):91-105.
    In his political treatise, Mabadi ara ahl al-madina al-fadhila, Abu Nasr Alfarabi, the medieval Muslim philosopher, proposes a theory of virtuous city which, according to prominent scholars, is modeled on Plato’s utopia of the Republic. No doubt that Alfarabi was well-versed in the philosophy of Plato and the basic framework of his theory of city is platonic. However, his theory of city is not an exact reproduction of the Republic’s theory and, despite glaring similarities, the two (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 954