Results for 'privacy, equality, surveillance, counter terrorism, democracy, security'

958 found
Order:
  1. (1 other version)Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. (1 other version)Democracy and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63 (4):99-110.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Mrs. Aremac and the camera: A response to Ryberg.Annabelle Lever - 2008 - Res Publica 14 (1):35-42.
    In a recent article in Respublica, Jesper Ryberg argues that CCTV can be compared to a little old lady gazing out onto the street below. This article takes issue with the claim that government surveillance can be justified in this manner. Governments have powers and responsibilities that little old ladies lack. Even if CCTV is effective at preventing crime, there may be less intrusive ways of doing so. People have a variety of legitimate interests in privacy, and protection for these (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  4. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen (ed.), Philosophy and Public Policy. New York, USA: Rowman & Littlefield International. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  6. European urban (counter)terrorism's spacetimematterings: More-than-human materialisations in situationscaping times.Evelien Geerts, Katharina Karcher, Yordanka Dimcheva & Mireya Toribio Medina - 2023 - In Alice Martini & Raquel Da Silva (eds.), Contemporary Reflections on Critical Terrorism Studies. Routledge. pp. 31-52.
    Infusing contemporary critical terrorism studies (CTS) with concepts and methodologies from philosophy and critical theory via a Baradian posthumanist agential realist perspective and (counter)terrorist cases and vignettes, this chapter argues for a retheorisation of (counter)terrorism. It does so, firstly, by reconceptualising terrorism and counterterrorism as complex assemblages consisting not only of discursive-material components – an entanglement now largely accepted within CTS and critical security studies (CSS) – but also of affective layers and more-than-human phenomena. Secondly, by analysing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. (1 other version)Sven Ove Hansson and Elin Palm, eds., The Ethics of Workplace Privacy Reviewed by.Annabelle Lever - 2006 - Philosophy in Review 26 (5):348-350.
    Download  
     
    Export citation  
     
    Bookmark  
  8. United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century.Vladimir Rogozhin - 2018 - Academia.
    The conceptual model of United Nations reform - "UN 3.0" includes the General Program of Action on UN Reform, consisting of two stages. The first stage for 2020-2025 envisages the transformation of the main organs of the UN - the General Assembly and the Security Council with measures to improve the effectiveness of the management system, address the "veto problem", problem of financing, improve staff work and administrative and financial control, strengthen UN media, improvement of work with the global (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, in (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  10. (1 other version)Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 January]1 Effective (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. (1 other version)Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva 2005 (nov):1-31.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people’s freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  12. (1 other version)Must privacy and sexual equality conflict? A philosophical examination of some legal evidence.Annabelle Lever - 2001 - Social Research: An International Quarterly 67 (4):1137-1171.
    Are rights to privacy consistent with sexual equality? In a brief, but influential, article Catherine MacKinnon trenchantly laid out feminist criticisms of the right to privacy. In “Privacy v. Equality: Beyond Roe v. Wade” she linked familiar objections to the right to privacy and connected them to the fate of abortion rights in the U.S.A. (MacKinnon, 1983, 93-102). For many feminists, the Supreme Court’s decision in Roe v. Wade (1973) had suggested that, notwithstanding a dubious past, legal rights to privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13. Überwachungskapitalistische Biopolitik: Big Tech und die Regierung der Körper.Anna-Verena Nosthoff & Felix Maschewski - forthcoming - Zeitschrift Für Politikwissenschaft.
    The article introduces the concept of "surveillance-capitalist biopolitics" to problematize the recent expansion of "data extractivism" in health care and health research. As we show, this trend has accelerated during the ongoing Covid pandemic and points to a normalization and institutionalization of self-tracking practices, which, drawing on the "quantified self", points to the emergence of a "quantified collective". Referring to Foucault and Zuboff, and by analyzing key examples of the leading "Big Tech" companies (e.g., Alphabet and Apple), we argue that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Philosophy and Digitization: Dangers and Possibilities in the New Digital Worlds.Esther Oluffa Pedersen & Maria Brincker - 2021 - SATS 22 (1):1-9.
    Our world is under going an enormous digital transformation. Nearly no area of our social, informational, political, economic, cultural, and biological spheres are left unchanged. What can philosophy contribute as we try to under- stand and think through these changes? How does digitization challenge past ideas of who we are and where we are headed? Where does it leave our ethical aspirations and cherished ideals of democracy, equality, privacy, trust, freedom, and social embeddedness? Who gets to decide, control, and harness (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity of citizens (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  16. Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
    Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  18. (1 other version)Will Hominoids or Androids Destroy the Earth? —A Review of How to Create a Mind by Ray Kurzweil (2012).Michael Starks - 2016 - In Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Las Vegas, USA: Reality Press. pp. 675.
    Some years ago I reached the point where I can usually tell from the title of a book, or at least from the chapter titles, what kinds of philosophical mistakes will be made and how frequently. In the case of nominally scientific works these may be largely restricted to certain chapters which wax philosophical or try to draw general conclusions about the meaning or long term significance of the work. Normally however the scientific matters of fact are generously interlarded with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Neuroscience v. privacy? : a democratic perspective.Annabelle Lever - 2012 - In Sarah Richmond, Geraint Rees & Sarah J. L. Edwards (eds.), I know what you're thinking: brain imaging and mental privacy. Oxford: Oxford University Press. pp. 205.
    Recent developments in neuroscience create new opportunities for understanding the human brain. The power to do good, however, is also the power to harm, so scientific advances inevitably foster as many dystopian fears as utopian hopes. For instance, neuroscience lends itself to the fear that people will be forced to reveal thoughts and feelings which they would not have chosen to reveal, and of which they may be unaware. It also lends itself to the worry that people will be encouraged (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Towards a democracy-centred ethics.Annabelle Lever - 2019 - Critical Review of International Social and Political Philosophy 22 (1):18-33.
    The core idea of this paper is that we can use the differences between democratic and undemocratic governments to illuminate ethical problems, particularly in the area of political philosophy. Democratic values, rights and institutions lie between the most abstract considerations of ethics and meta-ethics and the most particularised decisions, outcomes and contexts. Hence, this paper argues, we can use the differences between democratic and undemocratic governments, as we best understand them, to structure our theoretical investigations, to test and organise our (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  22. Effects and Effectiveness of Surveillance Technologies: Mapping Perceptions, Reducing Harm.Elisa Orrù - 2015 - European University Institute Department of Law Research Papers 39:1-52.
    This paper addresses issues regarding perceptions of surveillance technologies in Europe. It analyses existing studies in order to explore how perceptions of surveillance affect and are affected by the negative effects of surveillance and how perceptions and effectiveness of surveillance technologies relate to each other. The paper identifies 12 negative effects of surveillance including, among others, privacy intrusion, the chilling effect and social exclusion, and classifies them into three groups. It further illustrates the different ways in which perceptions and effectiveness (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled to form (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  24. Procedure-Based Substantive Equality: Pure Procedural Justice and Property-Owning Democracy.dai oba - 2020 - Archiv für Rechts- und Sozialphilosophie:107–121.
    This paper examines two ideas of John Rawls that are rarely discussed in conjunction: pure procedural justice (PPJ) and property-owning democracy. Applied to matters of distribu- tion, PPJ orders the establishment of fair procedures under which any private transaction can be considered just. It aims to secure equality without fixating on patterns of distribu- tion. How such an approach is constituted and how it applies to different stages of theori- sation are explored. Three components of PPJ and three guidelines for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  26. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  27. A Sense of Proportion: Some Thoughts on Equality, Security and Justice.Annabelle Lever - 2020 - Res Publica 26 (3):357-371.
    This article develops an intuitive idea of proportionality as a placeholder for a substantive conception of equality, and contrasts it with Ripstein’s ideas, as presented in an annual guest lecture to the Society of Applied Philosophy in 2016. It uses a discussion of racial profiling to illustrate the conceptual and normative differences between the two. The brief conclusion spells out my concern that talk of ‘proportionality’, though often helpful and, sometimes, necessary for moral reasoning, can end up concealing, rather than (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Pandemic surveillance: ethics at the intersection of information, research, and health.Daniel Susser - 2022 - In Margaret Hu (ed.), Pandemic Surveillance: Privacy, Security, and Data Ethics. Cheltenham, UK: Edward Elgar. pp. 187-196.
    This chapter provides a high-level overview of key ethical issues raised by the use of surveillance technologies, such as digital contact tracing, disease surveillance, and vaccine passports, to combat the COVID-19 pandemic. To some extent, these issues are entirely familiar. I argue that they raise old questions in new form and with new urgency, at the intersection of information ethics, research ethics, and public health. Whenever we deal with data-driven technologies, we have to ask how they fare in relation to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. democratic equality and freedom of religion.Annabelle Lever - 2016 - Philosophy and Public Issues - Filosofia E Questioni Pubbliche 6 (1):55-65.
    According to Corey Brettschneider, we can protect freedom of religion and promote equality, by distinguishing religious groups’ claims to freedom of expression and association from their claims to financial and verbal support from the state. I am very sympathetic to this position, which fits well with my own views of democratic rights and duties, and with the importance of recognizing the scope for political choice which democratic politics offers to governments and to citizens. This room for political choice, I believe, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Robust Deliberative Democracy.Daniel Layman - 2016 - Critical Review: A Journal of Politics and Society 28 (3-4):494-516.
    Deliberative democracy aspires to secure political liberty by making citizens the authors of their laws. But how can it do this in the face of deep disagreement, not to mention imperfect knowledge and limited altruism? Deliberative democracy can secure political liberty by affording each citizen an equal position as a co-author of public laws and norms. Moreover, fundamental deliberative democracy—in which institutional design is ultimately accountable to public deliberation but not necessarily subject to its direct control—does not strain knowledge or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. To Be a Face in the Crowd: Surveillance, Facial Recognition, and a Right to Obscurity.Shawn Kaplan - 2023 - In L. Samuelsson, C. Cocq, S. Gelfgren & J. Enbom (eds.), Everyday Life in the Culture of Surveillance. NORDICOM. pp. 45-66.
    This article examines how facial recognition technology reshapes the philosophical debate over the ethics of video surveillance. When video surveillance is augmented with facial recognition, the data collected is no longer anonymous, and the data can be aggregated to produce detailed psychological profiles. I argue that – as this non-anonymous data of people’s mundane activities is collected – unjust risks of harm are imposed upon individuals. In addition, this technology can be used to catalogue all who publicly participate in political, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Political Equality and Epistemic Constraints on Voting.Michele Giavazzi - 2024 - Philosophy and Public Affairs 52 (2):147-176.
    As part of recent epistemic challenges to democracy, some have endorsed the implementation of epistemic constraints on voting, institutional mechanisms that bar incompetent voters from participating in public decision-making procedures. This proposal is often considered incompatible with a commitment to political equality. In this paper, I aim to dispute the strength of this latter claim by offering a theoretical justification for epistemic constraints on voting that does not rest on antiegalitarian commitments. Call this the civic accountability justification for epistemic constraints (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. ‘Liberal Democracy’ in the ‘Post-Corona World’.Shirzad Peik - 2020 - Journal of Philosophical Investigations at University of Tabriz 14 (31):1-29.
    ABSTRACT A new ‘political philosophy’ is indispensable to the ‘post-Corona world,’ and this paper tries to analyze the future of ‘liberal democracy’ in it. It shows that ‘liberal democracy’ faces a ‘global crisis’ that has begun before, but the ‘novel Coronavirus pandemic,’ as a setback for it, strongly encourages that crisis. ‘Liberalism’ and ‘democracy,’ which had long been assumed by ‘political philosophers’ to go together, are now becoming decoupled, and the ‘liberal values’ of ‘democracy’ are eroding. To find why and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Confucian Meritocratic Democracy over Democracy for Minority Interests and Rights.John J. Park - 2024 - Dao: A Journal of Comparative Philosophy 23 (1):25-38.
    In Western political philosophy, democracy is generally the dominant view regarding what the best form of government is, and this holds even in respect to promoting minority rights. However, I argue that there is a better theory for satisfying minority interests and rights. I amass numerous studies from the social sciences demonstrating how democracy does poorly in accounting for minority interests. I then contend that a particular hybrid view that fuses a meritocracy with democracy can do a better job than (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Convergence of the source control and actual access accounts of privacy.Haleh Asgarinia - 2023 - AI and Ethics 3 (1).
    In this paper, it is argued that, when properly revised in the face of counter-examples, the source control and actual access views of privacy are extensionally equivalent but different in their underlying rationales. In this sense, the source control view and the actual access view, when properly modified to meet counter-examples, can be metaphorically compared to ‘climbing the same mountain but from different sides’ (as Parfit [1] has argued about normative theories). These two views can equally apply to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Risk based passenger screening in aviation security: implications and variants of a new paradigm.Sebastian Weydner-Volkmann - 2017 - In Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking surveillance and control : beyond the "security versus privacy" debate. Baden-Baden: Nomos. pp. 49-83.
    In “Risk Based Passenger Screening in Aviation Security: Implications and Variants of a New Paradigm”, Sebastian Weydner-Volkmann describes the current paradigm shift from ‘traditional’ forms of screening to ‘risk based passenger screening’ (RBS) in aviation security. This paradigm shift is put in the context of the wider historical development of risk management approaches. Through a discussion of Michel Foucault, Herfried Münkler and Ulrich Beck, Weydner-Volkmann analyses the shortcomings of such approaches in public security policies, which become especially (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Legal Archetypes and Metadata Collection.Alan Rubel - 2017 - Wisconsin International Law Review 34 (4):823-853.
    In discussions of state surveillance, the values of privacy and security are often set against one another, and people often ask whether privacy is more important than national security.2 I will argue that in one sense privacy is more important than national security. Just what more important means is its own question, though, so I will be more precise. I will argue that national security rationales cannot by themselves justify some kinds of encroachments on individual privacy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Book Review: A Response to James Rule.Annabelle Lever - 2014 - Journal of Law, Culture, and Humanities 10 (1).
    James Rule is puzzled by the ‘idiosyncratic’ approach that I take to the philosophical study of privacy. As evidence for this idiosyncracy, he cites my relative indifference to the distinction between consequentialist and deontological perspectives on privacy although these differences are proof of ‘intricate, yet enormously consequential intellectual tensions’. My choice of philosophical topics is ‘unsystematic’ and more a reflection of my own ‘intellectual hobby-horses’ than a ‘well-worked-out view of what students most need to know’. Finally, Rule concludes, because ‘the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Capitalist Realism And The End Of Democracy.Irfan Ajvazi - 2022 - Critique and Dialectics 2:10.
    As civil liberties are shredded and powerful corporate and political force engage in a range of legal illegalities, the state itself becomes a model for corruption and violence. Violence has become not only the foundation of corporate sovereignty, it has also become the ideological scaffolding of common sense. Under casino capitalism, the state has become the enemy of justice and offers a prototype for types of misguided rebellion that mimic the lawlessness enshrined by corporate sovereignty and the repressive state apparatuses. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Politics After Morality: Toward a Nietzschean Left.Donovan Miyasaki - 2022 - Palgrave Macmillan.
    This book completes the project, begun in Nietzsche’s Immoralism: Politics as First Philosophy, of critically reconstructing a Nietzschean left politics. Nietzsche's incompatibilist ideal of amor fati requires reconceiving legitimacy as the breeding of a people whose material conditions enable it to affirm its social order. Justice is founded in a future, higher type’s right to exist against present individuals who internalize the contradictions of past societies. In opposition to Nietzsche’s self-undermining aristocratism, this right can only be realized through a universal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. The Limits of Liberal Inclusivity: How Defining Islamophobia Normalises Anti-Muslim Racism.Rebecca Ruth Gould - forthcoming - Journal of Law and Religion.
    Responding to recent calls made within UK Parliament for a government-backed definition of Islamophobia, this article considers the unanticipated consequences of such proposals. I argue that, considered in the context of related efforts to regulate hate speech, the formulation and implementation of a government-sponsored definition will generate unforeseen harms for the Muslim community. To the extent that such a definition will fail to address the government’s role in propagating Islamophobia through ill-considered legislation that conflates Islamist discourse with hate speech, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Scenic Design and Countering Terrorism in the Performance of Emma Dandaura’s Venom for Venom.Tochukwu Okeke - 2019 - Hofa: African Journal of Multidisciplinary Research 4 (1).
    The art of the theatre is a collaborative enterprise. It involves the creative efforts of different artists: director, stage manager, set, lighting, properties, costume, make-up and sound designers. These artists work together for the realization of a theatrical production. They work within a production concept which is the guiding principle upon which a production is based. However, as the theatre is audio-visual and immediate, it is the duty of these artists to ensure that every aspect of the production is perfectly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The ethical imperatives of the COVID 19 pandemic: a review from data ethics.Gabriela Arriagada Bruneau, Vincent C. Müller & Mark S. Gilthorpe - 2020 - Veritas: Revista de Filosofía y Teología 46:13-35.
    In this review, we present some ethical imperatives observed in this pandemic from a data ethics perspective. Our exposition connects recurrent ethical problems in the discipline, such as, privacy, surveillance, transparency, accountability, and trust, to broader societal concerns about equality, discrimination, and justice. We acknowledge data ethics role as significant to develop technological, inclusive, and pluralist societies. - - - Resumen: En esta revisión, exponemos algunos de los imperativos éticos observados desde la ética de datos en esta pandemia. Nuestra exposición (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  48
    The Boundary Problem in Democratic Theory: Why the Demos Should Be Bounded by the State.Sarah Song - 2012 - International Theory 4 (1):39-68.
    Democracy is rule by the demos, but by what criteria is the demos constituted? Theorists of democracy have tended to assume that the demos is properly defined by national boundaries or by the territorial boundaries of the modern state. In a recent turn, many democratic theorists have advanced the principles of affected interests and coercion as the basis for defining the boundaries of democracy. According to these principles, it is not co-nationals or fellow citizens but all affected or all subjected (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  46. Transnational macro-narrative descendancy in violent conflict: a case study of the Mujahidin Indonesia Timur in central Sulawesi.Andrew D. Henshaw - unknown
    This thesis investigates transnational macro-narrative decendancy in violent conflicts and identifies enabling dynamics that facilitate re-framing. To date there has been little focus on processes involved, explicitly narrative descendancy, bridging, resonance building, or grafting, representing a critical knowledge gap. -/- This thesis reviews relevant literature on constructivism and rational choice theory and tests the findings against an empirical case study in Central Sulawesi. The findings demonstrate a mixture of approaches is present, though this is likely due to a range of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the audience for this symposium (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. The Panopticon Factor: Privacy and Surveillance in the Digital Age.Jordanco Sekulovski - 2016 - Project Innovative Ethics 1 (9).
    This paper questions the use of new technologies as tools of modern surveillance in order to: (a) advance the research done by Michel Foucault on panoptic techniques of surveillance and dominance; and (b) give new insights on the way we use these new surveillance technologies in violation of democratic principles and legal norms. Furthermore, it questions Foucault’s statements on the expansion of Bentham’s Panopticon scheme as a universal model of modern-day democratic institutions. Therefore the purpose of this paper is to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Carissa Véliz, The Ethics of Privacy and Surveillance (Oxford: Oxford University Press, 2024), 256 pages. ISBN: 9780198870173. [REVIEW]Lauritz Munch & Jakob Mainz - forthcoming - Journal of Moral Philosophy.
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 958