Switch to: References

Add citations

You must login to add citations.
  1. A critical contribution to theoretical foundations of privacy studies.Thomas Allmer - 2011 - Journal of Information, Communication and Ethics in Society 9 (2):83-101.
    PurposeAlthough there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there is a gap in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Politics of Becoming: Anonymity and Democracy in the Digital Age.Hans Asenbaum - 2023 - Oxford: Oxford University Press.
    When we participate in political debate or protests, we are judged by how we look, which clothes we wear, by our skin colour, gender and body language. This results in exclusions and limits our freedom of expression. The Politics of Becoming explores radical democratic acts of disidentification to counter this problem. Anonymity in masked protest, graffiti, and online de-bate interrupts our everyday identities. This allows us to live our multiple selves. In the digital age, anonymity becomes an inherent part of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  • State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • ‘What is Inconvenient for You is Life-saving for Me’: How Health Inequities are playing out during the COVID-19 Pandemic.Vicki Xafis - 2020 - Asian Bioethics Review 12 (2):223-234.
    The COVID-19 pandemic has had a significant impact globally. Most affected, however, are those individuals and groups routinely disadvantaged by the social injustice created by the misdistribution of power, money, and resources. Simple measures that prevent the spread of COVID-19, such as frequent hand washing and social distancing, are unavailable to millions of people in the wealthiest of nations and in the poorest of nations. Disadvantaged groups are impacted more directly and in disproportionately higher numbers due to existing poor health, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Moral justifications for privacy and intimacy.Samuel P. Winch - 1996 - Journal of Mass Media Ethics 11 (4):197 – 209.
    The right to privacy is a moral concept that has been debated for centuries. This article traces the histo y of the concept and examines how the existence of a right to privacy has been defended by philosophers through the years. This article examines the strategies behind those arguments, showing how some of them are more convincing than others. Following this analysis is a practical argument for recognizing a universal right to privacy over intimate relationships and information. Intimacy is a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Right to Privacy.Lloyd L. Weinreb - 2000 - Social Philosophy and Policy 17 (2):25.
    The question that I address in this paper is whether there is a right to privacy. It is not the question whether in the United States there is a legal right to privacy or, more particularly, a constitutional right to privacy. There are any number of ordinary legal rights and specific constitutional rights that might be so described, and the U.S. Supreme Court has referred also to a generic “right to privacy” that is implicit in the U.S. Constitution. Nor is (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Anonymity.Kathleen Wallace - 1999 - Ethics and Information Technology 1 (1):21-31.
    Anonymity is a form of nonidentifiability which I define as noncoordinatability of traits in a given respect. This definition broadens the concept, freeing it from its primary association with naming. I analyze different ways anonymity can be realized. I also discuss some ethical issues, such as privacy, accountability and other values which anonymity may serve or undermine. My theory can also conceptualize anonymity in information systems where, for example, privacy and accountability are at issue.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  • The scope of privacy in law and ethics.Judith Wagner Decew - 1986 - Law and Philosophy 5 (2):145-173.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Young people online and the social value of privacy.Valerie Steeves & Priscilla Regan - 2014 - Journal of Information, Communication and Ethics in Society 12 (4):298-313.
    Purpose– The purpose of this paper is to develop a conceptual framework to contextualize young people’s lived experiences of privacy and invasion online. Social negotiations in the construction of privacy boundaries are theorized to be dependent on individual preferences, abilities and context-dependent social meanings.Design/methodology/approach– Empirical findings of three related Ottawa-based studies dealing with young people’s online privacy are used to examine the benefits of online publicity, what online privacy means to young people and the social importance of privacy. Earlier philosophical (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Alienation in a World of Data. Toward a Materialist Interpretation of Digital Information Technologies.Michael Steinmann - 2022 - Philosophy and Technology 35 (4):1-24.
    The essay proposes to use alienation as a heuristic and conceptual tool for the analysis of the impact of digital information and communication technologies (ICTs) on users. It follows a historical materialist understanding, according to which data can be considered as things produced in an industrial fashion. A representational interpretation, according to which data would merely reflect a given reality, is untenable. It will be argued instead to understand data as an additional layer which has a transformative impact on reality (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Emotional-Freedom Defense of Schadenfreude.Earl Spurgin - 2015 - Ethical Theory and Moral Practice 18 (4):767-784.
    Schadenfreude is the emotion we experience when we obtain pleasure from others’ misfortunes. Typically, we are not proud of it and admit experiencing it only sheepishly or apologetically. Philosophers typically view it, and the disposition to experience it, as moral failings. Two recent defenders of Schadenfreude, however, argue that it is morally permissible because it stems from judgments about the just deserts of those who suffer misfortunes. I also defend Schadenfreude, but on different grounds that overcome two deficiencies of those (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Justifying Public Health Surveillance: Basic Interests, Unreasonable Exercise, and Privacy.Alan Rubel - 2012 - Kennedy Institute of Ethics Journal 22 (1):1-33.
    Surveillance plays a crucial role in public health, and for obvious reasons conflicts with individual privacy. This paper argues that the predominant approach to the conflict is problematic, and then offers an alternative. It outlines a Basic Interests Approach to public health measures, and the Unreasonable Exercise Argument, which sets forth conditions under which individuals may justifiably exercise individual privacy claims that conflict with public health goals. The view articulated is compatible with a broad range conceptions of the value of (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  • Disentangling Privacy and Intimacy: Intimate Citizenship, Private Boundaries and Public Transgressions.Paul Reynolds - 2010 - Human Affairs 20 (1):33-42.
    Disentangling Privacy and Intimacy: Intimate Citizenship, Private Boundaries and Public Transgressions Recent theorisations of transformations of intimacy—like Ken Plummer's Intimate Citizenship project—concentrate on social and cultural transformations that erode the containment of intimacy within the private sphere. They have less to say about the character of and oppositions to that erosion, and specifically how far the idea of the private stands in opposition to intimacy transgressing into the public. In this essay, the private is explored through its constitutive features—liberal codifications (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • A cognitive access definition of privacy.Madison Powers - 1996 - Law and Philosophy 15 (4):369 - 386.
    Many of the contemporary disagreements regarding privacy are conceptual in nature. They concern the meaning or definition of privacy and the analytic basis of distinguishing privacy rights from other kinds of rights recognized within moral, political, or legal theories. The two main alternatives within this debate include reductionist views, which seek a narrow account of the kinds of invasions or intrusions distinctly involving privacy losses, and anti-reductionist theories, which treat a much broader array of interferences with a person as separate (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Virtue Ethics and Digital 'Flourishing': An Application of Philippa Foot to Life Online.Patrick Lee Plaisance - 2013 - Journal of Mass Media Ethics 28 (2):91-102.
    The neo-Aristotelian virtue theory of Philippa Foot is presented here as an alternative framework that is arguably more useful than deontological approaches and that relies less on the assertions of moral claims about the intrinsic goodness of foundational principles. Instead, this project focuses more on cultivating a true ethic; that is, a set of tools and propositions to enable individuals to negotiate inevitable conflicts among moral values and challenges posed by cultural contexts and technology use. Foot's ?natural normativity? connects the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Toward an approach to privacy in public: Challenges of information technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  • Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   47 citations  
  • Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the thought (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • Using genetic information while protecting the privacy of the soul.James H. Moor - 1999 - Ethics and Information Technology 1 (4):257-263.
    Computing plays an important role in genetics (and vice versa).Theoretically, computing provides a conceptual model for thefunction and malfunction of our genetic machinery. Practically,contemporary computers and robots equipped with advancedalgorithms make the revelation of the complete human genomeimminent – computers are about to reveal our genetic soulsfor the first time. Ethically, computers help protect privacyby restricting access in sophisticated ways to genetic information.But the inexorable fact that computers will increasingly collect,analyze, and disseminate abundant amounts of genetic informationmade available through the (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • The importance of privacy revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
    James Rachels’ seminal paper “ Why Privacy Is Important ” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Free speech, privacy, and autonomy.Adam D. Moore - 2020 - Social Philosophy and Policy 37 (2):31-51.
    While autonomy arguments provide a compelling foundation for free speech, they also support individual privacy rights. Considering how speech and privacy may be justified, I will argue that the speech necessary for self-government does not need to include details that would violate privacy rights. Additionally, I will argue that if viewed as a kind of intangible property right, informational privacy should limit speech and expression in a range of cases. In a world where we have an overabundance of content to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Defining privacy.Adam Moore - 2008 - Journal of Social Philosophy 39 (3):411-428.
  • God and Privacy.F. Michael McLain - 1992 - Faith and Philosophy 9 (3):369-386.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • The Internet, children, and privacy: the case against parental monitoring.Kay Mathiesen - 2013 - Ethics and Information Technology 15 (4):263-274.
    It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • ‘It's Good to Talk’?E. Marshall Sandra - 2001 - Proceedings of the Aristotelian Society 101 (1):129-144.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Inferences and the Right to Privacy.Jakob Mainz - forthcoming - Journal of Value Inquiry:1-19.
    In this paper, I defend what I call the ‘Inference Principle’. This principle holds that if an agent obtains some information legitimately, then the agent can make any inference she wants based on the information, without violating anyone’s right to privacy. This principle is interesting for at least three reasons. First, it constitutes a novel answer to the timely question of whether the widespread use of ‘data analytics’ to infer personal information about individuals is morally permissible. Second, it contradicts what (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing of justice and the effective (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  • Two Concepts of Group Privacy.Michele Loi & Markus Christen - 2020 - Philosophy and Technology 33 (2):207-224.
    Luciano Floridi was not the first to discuss the idea of group privacy, but he was perhaps the first to discuss it in relation to the insights derived from big data analytics. He has argued that it is important to investigate the possibility that groups have rights to privacy that are not reducible to the privacy of individuals forming such groups. In this paper, we introduce a distinction between two concepts of group privacy. The first, the “what happens in Vegas (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Brain Privacy, Intimacy, and Authenticity: Why a Complete Lack of the Former Might Undermine Neither of the Latter!Kasper Lippert-Rasmussen - 2017 - Res Publica 23 (2):227-244.
    In recent years, neuroscience has been making dramatic progress. The discipline holds great promise but also raises a number of important ethical concerns. Among these is the concern that, some day in the distant future, we will have brain scanners capable of reading our minds, thus making our inner thoughts transparent to others. There are at least two reasons why we might regret our resulting loss of privacy. One is, so the argument goes, that this would undermine our ability to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • Toward a foundation for human rights.Haig Khatchadourian - 1985 - Man and World 18 (2):219-240.
  • Privacy and the judgment of others.Jeffery L. Johnson - 1989 - Journal of Value Inquiry 23 (2):157-168.
    This article defends a new model of personal privacy. Privacy should be understood as demarcating culturally defined aspects of an individual's life in which he or she is granted immunity from the judgment of others. Such an analysis is preferable to either of the two favorite models of privacy in the current literature. The judgment of others model preserves all of the insights of the liberty and information models of privacy, But avoids the obvious problems and counterexamples. In addition, This (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  • On having bad persons as friends.Jessica Isserow - 2018 - Philosophical Studies 175 (12):3099-3116.
    Intuitively, one who counts a morally bad person as a friend has gone wrong somewhere. But it is far from obvious where exactly they have gone astray. Perhaps in cultivating a friendship with a bad person, one extends to them certain goods that they do not deserve. Or perhaps the failure lies elsewhere; one may be an abettor to moral transgressions. Yet another option is to identify the mistake as a species of imprudence—one may take on great personal risk in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of our lives or shrinking it to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   42 citations  
  • Privacy and the Right to Privacy.H. J. McCloskey - 1980 - Philosophy 55 (211):17 - 38.
    The right to privacy is one of the rights most widely demanded today. Privacy has not always so been demanded. The reasons for the present concern for privacy are complex and obscure. They obviously relate both to the possibilities for very considerable enjoyment of privacy by the bulk of people living in affluent societies brought about by twentieth-century affluence, and to the development of very efficient methods of thoroughly and systematically invading this newly found privacy. However, interesting and important as (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Privacy, the Internet of Things and State Surveillance: Handling Personal Information within an Inhuman System.Adam Henschke - 2020 - Moral Philosophy and Politics 7 (1):123-149.
    The Internet of Things (IoT) is, in part, an information handling system that can remove humans from the information handling process. The particular problem explored is how we are to understand privacy when considering informational systems that handle personal information in ways that impact people’s lives when there is no human operator in direct contact with that personal information. I argue that these new technologies need to take concepts like privacy into account, but also, that we ought also to take (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Friendship, markets, and companionate robots for children.Mary Healy - 2023 - Journal of Philosophy of Education 57 (3):661-677.
    The aim of this article is to examine how markets enable companionship to be disconnected from the concept of friendship thus enabling an illusion of companionship without the demands of friendship. As friendship is a crucial early relationship for children, this is particularly germane to the world of education. It recognizes the previous lack of philosophical attention to the idea of companionship—a key factor in friendship—and that this omission contributes to a lack of clarity on a variety of issues. Starting (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Human Dignity of “Offenders”: A Limitation on Substantive Criminal Law. [REVIEW]Miriam Gur-Arye - 2012 - Criminal Law and Philosophy 6 (2):187-205.
    The paper argues for attaching a significant role to the dignity of offenders as a limitation on the scope of substantive criminal law. Three different aspects of human dignity are discussed. Human dignity is closely connected with the principle of culpability. Respecting the dignity of offenders requires that we assign criminal liability according to the actual attitudes of the offenders towards the interests protected by the offence. The doctrine of natural and probable consequence of complicity, which allows us to assign (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • The right to privacy: Behavior as property. [REVIEW]Joseph M. Grcic - 1986 - Journal of Value Inquiry 20 (2):137-144.
  • Privacy Invasion by the News Media: Three Ethical Models.Candace Cummins Gauthier - 2002 - Journal of Mass Media Ethics 17 (1):20-34.
    In this article I provide an overview of philosophical conceptions of privacy and suggest 3 models to assist with the ethical analysis of privacy invasion by the news media. The models are framed by respect for persons, the comparison of harms and benefits, and the transfer of power. After describing the models, I demonstrate how they can be applied to news reporting that invades the privacy of public figures.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  • Bibliographical essay / privacy and criminal justice policies.Ferdinand D. Schoeman - 1983 - Criminal Justice Ethics 2 (2):71-82.
  • Divine omniscience, privacy, and the state.David Elliott & Eldon Soifer - 2017 - International Journal for Philosophy of Religion 82 (3):251-271.
    Traditional theism teaches that God engages in a relentless form of observation for every human being. If, as is widely supposed, humans have a right to privacy, then it seems that God constantly violates this right. In this paper we argue that there is both a defensible philosophical excuse and justification for this infringement. We also argue that this defense is extensible to human social and political contexts; it provides the vital elements of a theory of just privacy infringement. This (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy and patient-clergy access: perspectives of patients admitted to hospital.E. Erde - 2006 - Journal of Medical Ethics 32 (7):398-402.
    Background: For patients admitted to hospital both pastoral care and privacy or confidentiality are important. Rules related to each have come into conflict recently in the US. Federal laws and other rules protect confidentiality in ways that countermand hospitals’ methods for facilitating access to pastoral care. This leads to conflicts and poses an unusual type of dilemma—one of conflicting values and rights. As interests are elements necessary for establishing rights, it is important to explore patients’ interests in privacy compared with (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark