Switch to: References

Add citations

You must login to add citations.
  1. Privacy for the weak, transparency for the powerful: the cypherpunk ethics of Julian Assange.Patrick D. Anderson - 2020 - Ethics and Information Technology 23 (3):295-308.
    WikiLeaks is among the most controversial institutions of the last decade, and this essay contributes to an understanding of WikiLeaks by revealing the philosophical paradigm at the foundation of Julian Assange’s worldview: cypherpunk ethics. The cypherpunk movement emerged in the early-1990s, advocating the widespread use of strong cryptography as the best means for defending individual privacy and resisting authoritarian governments in the digital age. For the cypherpunks, censorship and surveillance were the twin evils of the computer age, but they viewed (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • A justification of whistleblowing.Daniele Santoro & Manohar Kumar - 2017 - Philosophy and Social Criticism 43 (7):669-684.
    Whistleblowing is the act of disclosing information from a public or private organization in order to reveal cases of corruption that are of immediate or potential danger to the public. Blowing the whistle involves personal risk, especially when legal protection is absent, and charges of betrayal, which often come in the form of legal prosecution under treason laws. In this article we argue that whistleblowing is justified when disclosures are made with the proper intent and fulfill specific communicative constraints in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy, speech, and values: what we have no business knowing.Adam D. Moore - 2016 - Ethics and Information Technology 18 (1):41-49.
    In the United States the ascendancy of speech protection is due to an expansive and unjustified view of the value or primacy of free expression and access to information. This is perhaps understandable, given that privacy has been understood as a mere interest, whereas speech rights have been seen as more fundamental. I have argued elsewhere that the “mere interest” view of privacy is false. Privacy, properly defined, is a necessary condition for human well-being or flourishing. The opening section of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Introduction to the Special Issue on the Ethics of State Mass Surveillance.Peter Königs - 2020 - Moral Philosophy and Politics 7 (1):1-8.
    Recent decades have seen an unprecedented proliferation of surveillance programs by government agencies. This development has been driven both by technological progress, which has made large scale surveillance operations relatively cheap and easy, and by the threat of terrorism, organized crime and pandemics, which supplies a ready justification for surveillance. For a long time, mass surveillance programs have been associated with autocratic regimes, most notoriously with the German Democratic Republic and the Stasi, its secret police. A more recent case in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation