Switch to: References

Add citations

You must login to add citations.
  1. The most important thing about climate change.John Broome - 2010 - In Jonathan Boston, Andrew Bradstock & David L. Eng (eds.), Public policy: why ethics matters. Acton, A.C.T.: ANUE Press. pp. 101-16.
    This book chapter is not available in ORA, but you may download, display, print and reproduce this chapter in unaltered form only for your personal, non-commercial use or use within your organization from the ANU E Press website.
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Sharing the responsibility of dealing with climate change: Interpreting the principle of common but differentiated responsibilities.Dan Weijers, David Eng & Ramon Das - 2010 - In Jonathan Boston, Andrew Bradstock & David L. Eng (eds.), Public policy: why ethics matters. Acton, A.C.T.: ANUE Press. pp. 141-158.
    In this chapter we first discuss the main principles of justice and note the standard objections to them, which we believe necessitate a hybrid approach. The hybrid account we defend is primarily based on the distributive principle of sufficientarianism, which we interpret as the idea that each country should have the means to provide a minimally decent quality of life for each of its citizens. We argue that sufficientarian considerations give good reason to think that what we call the ‘ability (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Hypocrisy and Epistemic Injustice.Brian Carey - forthcoming - Ethical Theory and Moral Practice:1-18.
    In this article I argue that we should understand some forms of hypocritical behaviour in terms of epistemic injustice; a type of injustice in which a person is wronged in their capacity as a knower. If each of us has an interest in knowing what morality requires of us, this can be undermined when hypocritical behaviour distorts our perception of the moral landscape by misrepresenting the demandingness of putative moral obligations. This suggests that a complete theory of the wrongness of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Midnight Rider: The Tragic Absence of Autonomy.Ginny Whitehouse - 2014 - Journal of Mass Media Ethics 29 (4):273-274.
    The Journal of Mass Media Ethics publishes case studies in which scholars and media professionals outline how they would address a particular ethical problem. Cases are drawn from actual experience...
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark  
  • On political conspiracy theories.Juha Räikkä - 2008 - Journal of Political Philosophy 17 (2):185-201.
  • Newsgathering and Privacy: Expanding Ethics Codes to Reflect Change in the Digital Media Age.Ginny Whitehouse - 2010 - Journal of Mass Media Ethics 25 (4):310-327.
    Media ethics codes concerning privacy must be updated considering the ease with which information now can be gathered from social networks and disseminated widely. Existing codes allow for deception and privacy invasion in cases of overriding public need when no alternate means are available but do not adequately define what constitutes need or alternate means, or weigh in the harm such acts do to the public trust and the profession. Building on the ethics theories of Sissela Bok and Helen Nissenbaum, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Friendship and Education.Patricia White - 1990 - Journal of Philosophy of Education 24 (1):81-92.
    Patricia White; Friendship and Education, Journal of Philosophy of Education, Volume 24, Issue 1, 30 May 2006, Pages 81–92, https://doi.org/10.1111/j.1467-9752.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
    I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides a (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  • When is a lie more of a lie? Moral judgment mediates the relationship between perceived benefits of others and lie-labeling.Piotr Szarota & Katarzyna Cantarero - 2017 - Polish Psychological Bulletin 48 (2):315-325.
    Lay perceptions of lying are argued to consist of a lie prototype. The latter was found to entail the intention to deceive, belief in falsity and falsity. We proposed and found that the perceptions of the benefits of others are also an important factor that influences the extent, to which an act of intentional misleading someone to foster a false belief is labeled as a lie. Drawing from the intuitionist model of moral judgments we assumed that moral judgment of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Loyalty in public relations: When does it cross the line between virtue and vice?Kevin Stoker - 2005 - Journal of Mass Media Ethics 20 (4):269 – 287.
    Public relations practitioners place a premium on loyalty - particularly in terms of cultivating relationships. However, little scholarly research has been done on the subject. This essay analyzes loyalty in terms of organizational deterioration and decline. The ethical dimensions of Hirschman's concept of "exit, voice, and loyalty, " and Royce's notion about loyalty, are explored, as is the concept of "loyalty to loyalty. " The essay concludes with a 7-step model intended to help practitioners determine the demands of ethical loyalty.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • “Secret” Casualties: Images of Injury and Death in the Iraq War Across Media Platforms.B. William Silcock, Carol B. Schwalbe & Susan Keith - 2008 - Journal of Mass Media Ethics 23 (1):36 – 50.
    This study examined more than 2,500 war images from U.S. television news, newspapers, news magazines, and online news sites during the first five weeks of the U.S.-led invasion of Iraq in 2003 and found that only 10% showed injury or death. The paper analyzes which media platforms were most willing to show casualties and offers insights on when journalists should use gruesome war images or keep them secret.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • “Secret” Casualties: Images of Injury and Death in the Iraq War Across Media Platforms.B. William Silcock, Carol B. Schwalbe & Susan Keith - 2008 - Journal of Mass Media Ethics 23 (1):36-50.
    This study examined more than 2,500 war images from U.S. television news, newspapers, news magazines, and online news sites during the first five weeks of the U.S.-led invasion of Iraq in 2003 and found that only 10% showed injury or death. The paper analyzes which media platforms were most willing to show casualties and offers insights on when journalists should use gruesome war images or keep them secret.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Confidentiality within physiotherapy: perceptions and attitudes of clinical practitioners.S. Cross - 2000 - Journal of Medical Ethics 26 (6):447-453.
    Objectives—This study examined the issue of confidentiality in relation to i) undergraduate curriculum content in physiotherapy, and ii) the awareness, experiences and attitudes of clinical physiotherapists.Design—Postal survey of universities and focus group interviews with physiotherapists.Setting—Twenty-five universities in the UK and Ireland and 44 therapists in five hospitals in southern England.Results—The survey of universities indicated that legal and ethical aspects of confidentiality featured in virtually all preregistration courses that responded. However, whereas its inclusion was rated as extremely important, the degree of (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • A justification of whistleblowing.Daniele Santoro & Manohar Kumar - 2017 - Philosophy and Social Criticism 43 (7):669-684.
    Whistleblowing is the act of disclosing information from a public or private organization in order to reveal cases of corruption that are of immediate or potential danger to the public. Blowing the whistle involves personal risk, especially when legal protection is absent, and charges of betrayal, which often come in the form of legal prosecution under treason laws. In this article we argue that whistleblowing is justified when disclosures are made with the proper intent and fulfill specific communicative constraints in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • On Political Conspiracy Theories.Juha Räikkä - 2009 - Journal of Political Philosophy 17 (2):185-201.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  • Brains, genes, and the making of the self.Lynette Reid & Françoise Baylis - 2005 - American Journal of Bioethics 5 (2):21 – 23.
  • Truthfulness and Business.Lubomira Radoilska - 2008 - Journal of Business Ethics 79 (1-2):21 - 28.
    According to a common assumption, truthfulness cannot have an intrinsic value in business. Instead, it is considered only instrumentally valuable for business, because it contributes to successful trust-building. Some authors deny truthfulness even this limited role by claiming that truth-telling is not an essential part of business, which is a sui generis practice like poker. In this article, I argue that truthfulness has indeed an intrinsic value in business and identify the conceptual confusions underlying the opposite view. My account of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • The Ties That Blind: Conceptualizing Anonymity.Julie Ponesse - 2014 - Journal of Social Philosophy 45 (3):304-322.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Transparency: An assessment of the Kantian roots of a key element in media ethics practice.Patrick Lee Plaisance - 2007 - Journal of Mass Media Ethics 22 (2-3):187 – 207.
    This study argues that the notion of transparency requires reconsideration as an essence of ethical agency. It provides a brief explication of the concept of transparency, rooted in the principle of human dignity of Immanuel Kant, and suggests that it has been inadequately appreciated by media ethics scholars and instructors more focused on relatively simplistic applications of his categorical imperative. This study suggests that the concept's Kantian roots raise a radical challenge to conventional understandings of human interaction and, by extension, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  • Intelligence and Social Epistemology - Toward a Social Epistemological Theory of Intelligence.Giangiuseppe Pili - 2019 - Social Epistemology 33 (6):574-592.
    ABSTRACTEvidence, beliefs, and knowledge are words that are currently used in the intelligence community. The primary goal of intelligence is to provide knowledge and foreknowledge of an enemy’s in...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Glass Panels and Peepholes: Nonhuman Animals and the Right to Privacy.Angie Pepper - 2020 - Pacific Philosophical Quarterly 101 (4):628-650.
    In this paper, I defend the claim that many sentient nonhuman animals have a right to privacy. I begin by outlining the view that the human right to privacy protects our interest in shaping different kinds of relationships with one another by giving us control over how we present ourselves to others. I then draw on empirical research to show that nonhuman animals also have this interest, which grounds a right to privacy against us. I further argue that we can (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • The Place of Knowledge A Methodological Survey.Adi Ophir & Steven Shapin - 1991 - Science in Context 4 (1):3-22.
    A generation ago scientific ideas floated free in the air, as historians gazed up at them in wonder and admiration. From time to time, historians agreed, the ideas that made up the body of scientific truth became incarnate: they were embedded into the fleshly forms of human culture and attached to particular times and places. How this incarnation occurred was a great mystery. How could spirit be made flesh? How did the transcendent and the timeless enter the forms of the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   55 citations  
  • Ethical Considerations in International Nursing Research: a report from the international centre for nursing ethics.Chair Douglas P. Olsen - 2003 - Nursing Ethics 10 (2):122-137.
    Ethical issues in international nursing research are identified and the perspectives of the International Centre for Nursing Ethics are offered in an effort to develop an international consensus of ethical behaviour in research. First, theoretical issues are reviewed, then initial conditions for ethical conduct are defined, and protocol design and procedure considerations are examined. A concerted effort is made to identify and avoid a western bias. Broad guiding principles for designing and reviewing research are offered: (1) respect for persons; (2) (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • The Birth of an Action Repertoire: On the Origins of the Concept of Whistleblowing.Thomas Olesen - 2022 - Journal of Business Ethics 179 (1):13-24.
    The standard account in whistleblowing research fixes the birth of the whistleblowing concept in the early 1970s. Surprisingly, there are no efforts to discuss why whistleblowing emerged as a distinct new action repertoire at this particular moment in time. Whistleblowing is a historical latecomer to an ethos of field transgression, which includes well-established forms of intervention such as watchdog journalism and political activism. Whistleblowing has strong affinities with these practices, but also holds its own unique place in ethics and democracy. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Trust and testimony.Philip J. Nickel - 2012 - Pacific Philosophical Quarterly 93 (3):301-316.
    Some recent accounts of testimonial warrant base it on trust, and claim that doing so helps explain asymmetries between the intended recipient of testimony and other non-intended hearers, e.g. differences in their entitlement to challenge the speaker or to rebuke the speaker for lying. In this explanation ‘dependence-responsiveness’ is invoked as an essential feature of trust: the trustor believes the trustee to be motivationally responsive to the fact that the trustor is relying on the trustee. I argue that dependence-responsiveness is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  • Secret Law Revisited.Benjamin L. S. Nelson - 2019 - Ratio Juris 32 (4):473-486.
    What follows is an attempt to do some conceptual housekeeping around the notion of secret law as provided by Christopher Kutz (2013). First I consider low-salience (or merely obscure) law, suggesting that it fails to capture the legal and moral facts that are at stake in the case which Kutz used to motivate it. Then I outline a theoretical contrast between mere obscurity and secrecy, in contrast to the 'neutral' account of secrecy provided by Sissela Bok (1989). The upshot of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Does Type of Wrongdoing Affect the Whistle-Blowing Process?Janet P. Near, Michael T. Rehg, James R. Van Scotter & Marcia P. Miceli - 2004 - Business Ethics Quarterly 14 (2):219-242.
    Abstract:We analyzed data from a survey of employees of a large military base in order to assess possible differences in the whistle-blowing process due to type of wrongdoing observed. Employees who observed perceived wrongdoing involving mismanagement, sexual harassment, or unspecified legal violations were significantly more likely to report it than were employees who observed stealing, waste, safety problems, or discrimination. Further, type of wrongdoing was significantly related to reasons given by employees who observed wrongdoing but did not report it, across (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   46 citations  
  • Why states have no right to privacy, but may be entitled to secrecy: a non-consequentialist defense of state secrecy.Dorota Mokrosinska - 2020 - Critical Review of International Social and Political Philosophy 23 (4):415-444.
  • Why states have no right to privacy, but may be entitled to secrecy: a non-consequentialist defense of state secrecy.Dorota Mokrosinska - 2020 - Critical Review of International Social and Political Philosophy 23 (4):415-444.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Knowing Persons.David Matheson - 2010 - Dialogue 49 (3):435-453.
    ABSTRACT: There is an intuitive distinction between knowing someone in a detached manner and knowing someone in a more intimate fashion — personally. The latter seems to involve the specially active participation of the person known in a way that the former does not. In this paper I present a novel, communication account of knowing someone personally that successfully explains this participation. The account also illuminates the propositional and testimonial character of the personal knowledge of persons, the conditions of limited (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Political surplus of whistleblowing: a case study.Abraham Mansbach - 2007 - Business Ethics, the Environment and Responsibility 16 (2):124-131.
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through providing a definition (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?Michele Loi, Christian Hauser & Markus Christen - 2020 - Journal of Business Ethics 175 (1):7-19.
    Clients may feel trapped into sharing their private digital data with insurance companies to get a desired insurance product or premium. However, private insurance must collect some data to offer products and premiums appropriate to the client’s level of risk. This situation creates tension between the value of privacy and common insurance business practice. We argue for three main claims: first, coercion to share private data with insurers is pro tanto wrong because it violates the autonomous choice of a privacy-valuing (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • An Egalitarian Perspective on Information Sharing: The Example of Health Care Priorities.Jenny Lindberg, Linus Broström & Mats Johansson - forthcoming - Health Care Analysis:1-15.
    In health care, the provision of pertinent information to patients is not just a moral imperative but also a legal obligation, often articulated through the lens of obtaining informed consent. Codes of medical ethics and many national laws mandate the disclosure of basic information about diagnosis, prognosis, and treatment alternatives. However, within publicly funded health care systems, other kinds of information might also be important to patients, such as insights into the health care priorities that underlie treatment offers made. While (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Conditional shared confidentiality in mental health care.Axel Liégeois & Marc Eneman - 2015 - Medicine, Health Care and Philosophy 18 (2):261-266.
    Because of the development towards community care, care providers not only exchange information in a team, but increasingly also in networks. This is a challenge to confidentiality. The ethical question is how care providers can keep information about the care receiver confidential, whilst at the same time exchanging information about that care receiver in a team or network? Can shared confidentiality be extended from a team to a network? To clarify this question, the article refers to the advice of an (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Theory of Mind and Concealing vs. Forthcoming Communication in Adolescence.Jennifer Lavoie & Victoria Talwar - 2022 - Frontiers in Psychology 13.
    Concealing information requires that adolescents manage the information that they share, which requires cognitive skills, for example, theory of mind. This study explored motivations for concealment that early adolescents endorsed concealing or disclosing to friends and parents, in relation to their theory of mind. We found that adolescents broadly endorsed disclosure to both parents and friends, even when it might mean they would face consequences, be impolite, or face negative identity-related emotions. We found that ToM ability was associated with a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Care to Share? Children's Cognitive Skills and Concealing Responses to a Parent.Jennifer Lavoie & Victoria Talwar - 2018 - Topics in Cognitive Science 12 (2):485-503.
    Lavoie and Talwar examine the phenomenon of prosocial lie telling: lying with the intention to benefit others. They investigate how well children aged 4 to 11 are able to conceal information about a surprise gift from their parents based on these children’s responses to their parents’ questions. Lavoie and Talwar conclude that, as children’s theory of mind abilities and working memory improve, their ability to conceal information from others also develops.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • The moral trial: on ethics and economics.Alessandro Lanteri - 2008 - Erasmus Journal for Philosophy and Economics 1 (1):188.
  • The Curious Case of the Excellent Gossiper.Alkis Kotsonis - 2021 - Philosophia 50 (3):1207-1222.
    My main aim in this paper is to examine whether gossip should be categorized as an epistemically valuable character trait. Gossip satisfies the necessary and jointly sufficient conditions for an acquired character trait to be classified as an intellectual virtue under the responsibilist understanding of the concept of virtue. The excellent gossiper is motivated to acquire epistemic goods through gossiping, reliably successful in acquiring epistemic goods through gossiping, competent at the activity of gossiping and good at judging when, with whom (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Effect of Perceived Negative Workplace Gossip on Employees’ Behaviors.Ming Kong - 2018 - Frontiers in Psychology 9:320893.
    Negative workplace gossip generates social undermining and great side effects to employees. But, the damage of negative gossip is mainly aimed at the employee who perceived being targeted. The purpose of this study is to develop a conceptual model in which perceived negative workplace gossip influences employees’ in-role behavior and organizational citizenship behavior differentially by changing employees’ self-concept (organizational based self-esteem and perceived insider status). 336 employees from 7 Chinese companies were investigated for empirical analysis on proposed hypotheses, and results (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Do I Hear the Whistle…? A First Attempt to Measure Four Forms of Employee Silence and Their Correlates.Michael Knoll & Rolf Dick - 2013 - Journal of Business Ethics 113 (2):349-362.
    Silence in organizations refers to a state in which employees refrain from calling attention to issues at work such as illegal or immoral practices or developments that violate personal, moral, or legal standards. While Morrison and Milliken (Acad Manag Rev 25:706–725, 2000) discussed how organizational silence as a top-down organizational level phenomenon can cause employees to remain silent, a bottom-up perspective—that is, how employee motives contribute to the occurrence and maintenance of silence in organizations—has not yet been given much research (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Authenticity in Political Discourse.Ben Jones - 2016 - Ethical Theory and Moral Practice 19 (2):489-504.
    Judith Shklar, David Runciman, and others argue against what they see as excessive criticism of political hypocrisy. Such arguments often assume that communicating in an authentic manner is an impossible political ideal. This article challenges the characterization of authenticity as an unrealistic ideal and makes the case that its value can be grounded in a certain political realism sensitive to the threats posed by representative democracy. First, by analyzing authenticity’s demands for political discourse, I show that authenticity has greater flexibility (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • The epistemological evaluation of oppositional secrets.Catherine Hundleby - 2000 - Hypatia 20 (4):44-58.
    : Although political values guide people who take advice from standpoint epistemologies in deciding whether to reveal secrets used to resist oppression, these decisions can also be understood and evaluated in purely cognitive or epistemological terms. When political considerations direct us to preserve a secret, the cognitive value progressively diminishes because the view of the world projected by the secret is increasingly vulnerable.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Epistemological Evaluation of Oppositional Secrets.Catherine Hundleby - 2005 - Hypatia 20 (4):44-58.
    Although political values guide people who take advice from standpoint epistemolo-gies in deciding whether to reveal secrets used to resist oppression, these decisions can also be understood and evaluated in purely cognitive or epistemological terms. When political considerations direct us to preserve a secret, the cognitive value progressively diminishes because the view of the world projected by the secret is increasingly vulnerable.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Epistemological Evaluation of Oppositional Secrets.Catherine Hundleby - 2000 - Hypatia 20 (4):44-58.
    Although political values guide people who take advice from standpoint epistemolo-gies in deciding whether to reveal secrets used to resist oppression, these decisions can also be understood and evaluated in purely cognitive or epistemological terms. When political considerations direct us to preserve a secret, the cognitive value progressively diminishes because the view of the world projected by the secret is increasingly vulnerable.
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Was Snowden virtuous?Clive Harfield - 2021 - Ethics and Information Technology 23 (3):373-383.
    Professor Shannon Vallor’s theoretical framework of technomoral virtue ethics identifies character traits that can be cultivated to foster a future worth wanting in an environment of emerging technologies. Such technologies and increased citizen participation in the new digital environment have reconfigured what is possible in policing and intelligence-gathering more quickly, perhaps, than sober and sensible policy reflection and formulation can keep pace with. Sensational and dramatic, seismic and devastating, the Snowden disclosures represent a particular expression of dissent against American intelligence (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation