Switch to: References

Add citations

You must login to add citations.
  1. Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Strange DNA: The rise of DNA Analysis for Family Reunification and its Ethical Implications.Martin G. Weiss - 2011 - Genomics, Society and Policy 7 (1):1-20.
    DNA analysis for family reunification is a longstanding and widespread practice, but also a highly problematic one, as it is a battleground of conflicting values and interests, which have to be carefully weighed against each other: on the one hand, the right of the sovereign state to regulate immigration and prevent fraud and child trafficking; on the other hand, the right to privacy and family life. Beyond the problem of how to balance these different interests, DNA analysis for family reunification (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Double effect, double intention, and asymmetric warfare.Steven Lee - 2004 - Journal of Military Ethics 3 (3):233-251.
    Modern warfare cannot be conducted without civilians being killed. In order to reconcile this fact with the principle of discrimination in just war theory, the principle is applied through the doctrine of double effect. But this doctrine is morally inadequate because it is too permissive regarding the risk to civilians. For this reason, Michael Walzer has suggested that the doctrine be supplemented with what he calls the idea of double intention: combatants are not only to refrain from intending to harm (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  • Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Emotional-Freedom Defense of Schadenfreude.Earl Spurgin - 2015 - Ethical Theory and Moral Practice 18 (4):767-784.
    Schadenfreude is the emotion we experience when we obtain pleasure from others’ misfortunes. Typically, we are not proud of it and admit experiencing it only sheepishly or apologetically. Philosophers typically view it, and the disposition to experience it, as moral failings. Two recent defenders of Schadenfreude, however, argue that it is morally permissible because it stems from judgments about the just deserts of those who suffer misfortunes. I also defend Schadenfreude, but on different grounds that overcome two deficiencies of those (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Ethics of Virtual Reality Technology: Social Hazards and Public Policy Recommendations.James S. Spiegel - 2018 - Science and Engineering Ethics 24 (5):1537-1550.
    This article explores four major areas of moral concern regarding virtual reality technologies. First, VR poses potential mental health risks, including Depersonalization/Derealization Disorder. Second, VR technology raises serious concerns related to personal neglect of users’ own actual bodies and real physical environments. Third, VR technologies may be used to record personal data which could be deployed in ways that threaten personal privacy and present a danger related to manipulation of users’ beliefs, emotions, and behaviors. Finally, there are other moral and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Integration and authority: rescuing the ‘one thought too many’ problem.Nicholas Smyth - 2018 - Canadian Journal of Philosophy 48 (6):812-830.
    Four decades ago, Bernard Williams accused Kantian moral theory of providing agents with ‘one thought too many’. The general consensus among contemporary Kantians is that this objection has been decisively answered. In this paper, I reconstruct the problem, showing that Williams was not principally concerned with how agents are to think in emergency situations, but rather with how moral theories are to be integrated into recognizably human lives. I show that various Kantian responses to Williams provide inadequate materials for solving (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Autonomy, Competence and Non-interference.Joseph T. F. Roberts - 2018 - HEC Forum 30 (3):235-252.
    In light of the variety of uses of the term autonomy in recent bioethics literature, in this paper, I suggest that competence, not being as contested, is better placed to play the anti-paternalistic role currently assigned to autonomy. The demonstration of competence, I will argue, can provide individuals with robust spheres of non-interference in which they can pursue their lives in accordance with their own values. This protection from paternalism is achieved by granting individuals rights to non-interference upon demonstration of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Agreeing in Ignorance: Mapping the Routinisation of Consent in ICT-Services.Thomas Ploug & Søren Holm - 2014 - Science and Engineering Ethics 20 (4):1097-1110.
    Many ICT services require that users explicitly consent to conditions of use and policies for the protection of personal information. This consent may become ‘routinised’. We define the concept of routinisation and investigate to what extent routinisation occurs as well as the factors influencing routinisation in a survey study of internet use. We show that routinisation is common and that it is influenced by factors including gender, age, educational level and average daily internet use. We further explore the reasons users (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy, public health, and controlling medical information.Adam D. Moore - 2010 - HEC Forum 22 (3):225-240.
    This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy, turning then to consider cases which illustrate when and how privacy may be overridden by public health concerns.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • In Defense of the Ideal of a Life Plan.Joe Mintoff - 2009 - Southern Journal of Philosophy 47 (2):159-186.
    Aristotle claims at Eudemian Ethics 1.2 that everyone who can live according to his own choice should adopt some goal for the good life, which he will keep in view in all his actions, for not to have done so is a sign of folly. This is an opinion shared by other ancients as well as some moderns. Others believe, however, that this view is false to the human condition, and provide a number of objections: (1) you can’t plan love; (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Two Concepts of Group Privacy.Michele Loi & Markus Christen - 2020 - Philosophy and Technology 33 (2):207-224.
    Luciano Floridi was not the first to discuss the idea of group privacy, but he was perhaps the first to discuss it in relation to the insights derived from big data analytics. He has argued that it is important to investigate the possibility that groups have rights to privacy that are not reducible to the privacy of individuals forming such groups. In this paper, we introduce a distinction between two concepts of group privacy. The first, the “what happens in Vegas (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Cybersecurity in health – disentangling value tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.
    Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity. Design/methodology/approach This paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four principles of medical (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Which Orphans Will Find a Home? The Rule of Rescue in Resource Allocation for Rare Diseases.Emily A. Largent & Steven D. Pearson - 2012 - Hastings Center Report 42 (1):27-34.
    The rule of rescue describes the moral impulse to save identifiable lives in immediate danger at any expense. Think of the extremes taken to rescue a small child who has fallen down a well, a woman pinned beneath the rubble of an earthquake, or a submarine crew trapped on the ocean floor. No effort is deemed too great. Yet should this same moral instinct to rescue, regardless of cost, be applied in the emergency room, the hospital, or the community clinic? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Disarming nuclear apologists.Robert E. Goodin - 1985 - Inquiry: An Interdisciplinary Journal of Philosophy 28 (1-4):153 – 176.
    Here I distinguish the four logically possible ways in which nuclear weapons might be used: in an all?out nuclear strike, either first or second; or in a limited strike, either first or second. I go on to show that neither of the two most basic moral perspectives, consequentialistic or deontological, would permit nuclear weapons to be used in any of those four ways; nor would they permit an empty threat to use them. Nuclear weapons are thus shown to be morally (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  • Full‐Frontal Morality: The Naked Truth about Gender.Talia Mae Bettcher - 2012 - Hypatia 27 (2):319-337.
    This paper examines Harold Garfinkel's notion of the natural attitude about sex and his claim that it is fundamentally moral in nature. The author looks beneath the natural attitude in order to explain its peculiar resilience and oppressive force. There she reveals a moral order grounded in the dichotomously sexed bodies so constituted through boundaries governing privacy and decency. In particular, naked bodies are sex-differentiated within a system of genital representation through gender presentation—a system that helps constitute the very boundaries (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  • A pragmatic theory of truth and ontology.Stewart Edward Granger - unknown
    At the heart of my pragmatic theory of truth and ontology is a view of the relation between language and reality which I term internal justification: a way of explaining how sentences may have truth-values which we cannot discover without invoking the need for the mystery of a correspondence relation. The epistemology upon which the theory depend~ is fallibilist and holistic ; places heavy reliance on modal idioms ; and leads to the conclusion that current versions of realism and anti-realism (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations