Switch to: References

Citations of:

The Social Dimensions of Privacy

Cambridge University Press (2015)

Add citations

You must login to add citations.
  1. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity of citizens (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • The culture industry revisited: Sociophilosophical reflections on ‘privacy’ in the digital age.Sandra Seubert & Carlos Becker - 2019 - Philosophy and Social Criticism 45 (8):930-947.
    Digital communication now pervades all spheres of life, creating new possibilities for commodification: personal data and communication are the new resources of surplus value. This in turn brings about a totally new category of threats to privacy. With recourse to the culture industry critique of early critical theory, this article seeks to challenge basic theoretical assumptions held within a liberal account of privacy. It draws the attention to the entanglement of technical and socio-economic transformations and aims at elaborating an alternative (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • X—Privacy as a Human Right.Beate Roessler - 2017 - Proceedings of the Aristotelian Society 117 (2):187-206.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Law and the philosophy of privacy.Annabelle Lever - 2017 - Contemporary Political Theory 16 (3):402-404.
    This is a frustrating book: on the one hand, it promises a new outlook on the philosophy of privacy, based upon the work of Luciano Floridi and Baruch Spinoza, which is a welcome extension of the sources used to think about privacy in contemporary political philosophy; on the other hand, it virtually ignores the existing literature on the philosophy and law of privacy. As the presentation of the legal and philosophical issues tends to be schematic, it is quite difficult to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Contact tracing apps: an ethical roadmap.Marjolein Lanzing - 2020 - Ethics and Information Technology 23 (S1):87-90.
    This research statement presents a roadmap for the ethical evaluation of contact tracing apps. Assuming the possible development of an effective and secure contact tracing app, this roadmap explores three ethical concerns—privacy, data monopolists and coercion- based on three scenarios. The first scenario envisions and critically evaluates an app that is built on the conceptualization of privacy as anonymity and a mere individual right rather than a social value. The second scenario sketches and critically discusses an app that adequately addresses (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Trading Social Visibility for Economic Amenability: Data-based Value Translation on a “Health and Fitness Platform”.Jörn Lamla, Barbara Büttner & Carsten Ochs - 2021 - Science, Technology, and Human Values 46 (3):480-506.
    Research on privacy practices in digital environments has oftentimes discovered a paradoxical relationship between users’ discursive appraisal of privacy and their actual practices: the “privacy paradox.” The emergence of this paradox prompts us to conduct ethnography of a health and fitness platform in order to flesh out the structural mechanisms generating this paradox. We provide an ethnographic analysis of surveillance capitalism in action that relates front-end practices empirically to the data economy’s back-end operations to show how this material-semiotic setup elicits (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Introduction to the Special Issue on the Ethics of State Mass Surveillance.Peter Königs - 2020 - Moral Philosophy and Politics 7 (1):1-8.
    Recent decades have seen an unprecedented proliferation of surveillance programs by government agencies. This development has been driven both by technological progress, which has made large scale surveillance operations relatively cheap and easy, and by the threat of terrorism, organized crime and pandemics, which supplies a ready justification for surveillance. For a long time, mass surveillance programs have been associated with autocratic regimes, most notoriously with the German Democratic Republic and the Stasi, its secret police. A more recent case in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Symbiosis or assimilation: critical reflections on the ontological self at the precipice of Total Data.Peter J. Carew - 2018 - AI and Society 33 (3):357-368.
    Contemporary data practices are inducing a convergent saturation point wherein every human action, reaction, interaction, transaction, thought or desire is quantified, reified, recorded and used. Physical or virtual, all is recorded, known or unknown, seen or unseen, until data permeates every facet of our shared human existence. The implications of this eventuality are potentially so far reaching that the very notion or concept of who we are might be fundamentally altered, resulting in new ontologies of the self in a world (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
  • Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Cham, Switzerland: pp. 459-474.
    Experimental design is one aspect of a scientific method. A well-designed, properly conducted experiment aims to control variables in order to isolate and manipulate causal effects and thereby maximize internal validity, support causal inferences, and guarantee reliable results. Traditionally employed in the natural sciences, experimental design has become an important part of research in the social and behavioral sciences. Experimental methods are also endorsed as the most reliable guides to policy effectiveness. Through a discussion of some of the central concepts (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Technology as Terrorism: Police Control Technologies and Drone Warfare.Jessica Wolfendale - 2021 - In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21.
    Debates about terrorism and technology often focus on the potential uses of technology by non-state terrorist actors and by states as forms of counterterrorism. Yet, little has been written about how technology shapes how we think about terrorism. In this chapter I argue that technology, and the language we use to talk about technology, constrains and shapes our understanding of the nature, scope, and impact of terrorism, particularly in relation to state terrorism. After exploring the ways in which technology shapes (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation