Switch to: References

Add citations

You must login to add citations.
  1. Privacy Rights, and Why Negative Control is Not a Dead End: A Reply to Munch and Lundgren.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2021 - Res Publica 28 (2):391-400.
    Lauritz Munch and Björn Lundgren have recently replied to a paper published by us in this journal. In our original paper, we defended a novel version of the so-called ‘control theory’ of the moral right to privacy. We argued that control theorists should define ‘control’ as what we coined ‘Negative Control’. Munch and Lundgren have recently provided a range of interesting and challenging objections to our view. Independently of each other, they give almost identical counterexamples to our definition of Negative (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Law and the philosophy of privacy.Annabelle Lever - 2017 - Contemporary Political Theory 16 (3):402-404.
    This is a frustrating book: on the one hand, it promises a new outlook on the philosophy of privacy, based upon the work of Luciano Floridi and Baruch Spinoza, which is a welcome extension of the sources used to think about privacy in contemporary political philosophy; on the other hand, it virtually ignores the existing literature on the philosophy and law of privacy. As the presentation of the legal and philosophical issues tends to be schematic, it is quite difficult to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Confusion and the Role of Intuitions in the Debate on the Conception of the Right to Privacy.Björn Lundgren - 2021 - Res Publica 27 (4):669-674.
    Recently, Jakob Thraine Mainz and Rasmus Uhrenfeldt defended a control-based conception of a moral right to privacy —focusing on conceptualizing necessary and jointly sufficient conditions for a privacy right violation. This reply comments on a number of mistakes they make, which have long reverberated through the debate on the conceptions of privacy and the right to privacy and therefore deserve to be corrected. Moreover, the reply provides a sketch of a general response for defending the limited access conception of the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Ethics of Biosurveillance.S. K. Devitt, P. W. J. Baxter & G. Hamilton - 2019 - Journal of Agricultural and Environmental Ethics 32 (5):709-740.
    Governments must keep agricultural systems free of pests that threaten agricultural production and international trade. Biosecurity surveillance already makes use of a wide range of technologies, such as insect traps and lures, geographic information systems, and diagnostic biochemical tests. The rise of cheap and usable surveillance technologies such as remotely piloted aircraft systems presents value conflicts not addressed in international biosurveillance guidelines. The costs of keeping agriculture pest-free include privacy violations and reduced autonomy for farmers. We argue that physical and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy, public health, and controlling medical information.Adam D. Moore - 2010 - HEC Forum 22 (3):225-240.
    This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy, turning then to consider cases which illustrate when and how privacy may be overridden by public health concerns.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   55 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   37 citations  
  • Information ethics in the context of smart devices.Brian Roux & Michael Falgoust - 2013 - Ethics and Information Technology 15 (3):183-194.
    In this paper, we employ Extended Cognition as a background for a series of thought experiments about privacy and common used information technology devices. Laptops and smart phones are now widely used devices, but current privacy standards do not adequately address the relationship between the owners of these devices and the information stored on them. Law enforcement treats laptops and smart phones are potential sources of information about criminal activity, but this treatment ignores the use of smart devices as extensions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Asking for Facebook Logins: An Egoist Case for Privacy.John R. Drake - 2016 - Journal of Business Ethics 139 (3):429-441.
    With the advent of social networking websites, privacy concerns have reached a new high. One particularly problematic concern entails employers requesting login credentials to popular social media platforms. While many people may consider this request unethical, they may not agree on the reasons it is unethical. One reason may be to blame the behavior on egoism. Egoism, however, comes in multiple flavors, not all of which would agree that violating privacy is acceptable. In this paper, we articulate how one egoist (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of our lives or shrinking it to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  • Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through providing a definition (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The Ethics of Police Body-Worn Cameras.Frej Klem Thomsen - 2020 - Moral Philosophy and Politics 7 (1):97-121.
    Over the past decade, police departments in many countries have experimented with and increasingly adopted the use of police body-worn cameras. This article aims to examine the moral issues raised by the use of PBWCs, and to provide an overall assessment of the conditions under which the use of PBWCs is morally permissible. It first reviews the current evidence for the effects of using PBWCs. On the basis of this review the article sets out a teleological argument for the use (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Saving the World through Sacrificing Liberties? A Critique of some Normative Arguments in Unfit for the Future.Jan Christoph Bublitz - 2016 - Neuroethics 12 (1):23-34.
    The paper critically engages with some of the normative arguments in Julian Savulescu and Ingmar Persson’s book Unfit for the Future. In particular, it scrutinizes the authors’ argument in denial of a moral right to privacy as well as their political proposal to alter humankind’s moral psychology in order to avert climate change, terrorism and to redress global injustice.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy, Informed Consent, and Participant Observation.Julie Zahle - 2017 - Perspectives on Science 25 (4):465-487.
    In the literature on social research, adherence to the principle of informed consent is sometimes recommended on the ground that the privacy of those being studied is hereby protected. The principle has it that before becoming part of a study, a competent individual must receive information about its purpose, use, etc., and on this basis freely agree to participate. Joan Sieber motivates the employment of informed consent as a way to safeguard research participants' privacy as follows: "A research experience regarded (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • The Right to Privacy.Lloyd L. Weinreb - 2000 - Social Philosophy and Policy 17 (2):25.
    The question that I address in this paper is whether there is a right to privacy. It is not the question whether in the United States there is a legal right to privacy or, more particularly, a constitutional right to privacy. There are any number of ordinary legal rights and specific constitutional rights that might be so described, and the U.S. Supreme Court has referred also to a generic “right to privacy” that is implicit in the U.S. Constitution. Nor is (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy: an institutional fact.Marc-André Weber - 2016 - Ethics and Information Technology 18 (1):59-64.
    Let us show how property is grasped as an institutional fact. If Jones steals a computer, he does not own it in the sense of property, but only exercises control towards it. If he buys the computer, he controls it too, and moreover owns it in the sense of property. In other words, simply exercising control towards something is a brute fact. This control counts asproperty only in a certain context: the computer counts as Jones’s property only if he got (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Commodification and privacy: A Lockean perspective.Richard Volkman - 2010 - HEC Forum 22 (3):179-195.
    This paper defends the thesis that privacy as a right is derived from fundamental rights to life, liberty, and property and does not permit restricting the commodification of bodily material; however, privacy as life, liberty, property does require conventions that ensure a robust and just market in bodily material. The analysis proceeds by defending a general commitment to liberty and markets, but not in the manner one might expect from a ‘doctrinaire’ libertarian. Ethical concerns about commodification are legitimate in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Data, Privacy, and Agency: Beyond Transparency to Empowerment.Erika Versalovic, Sara Goering & Eran Klein - 2022 - American Journal of Bioethics 22 (7):63-65.
    Separation-based accounts of privacy define privacy as being left alone and unaccessed. Pyrrho et al. propose a more control-based account where privacy is about having the age...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Biomedical Big Data: New Models of Control Over Access, Use and Governance.Alessandro Blasimme & Effy Vayena - 2017 - Journal of Bioethical Inquiry 14 (4):501-513.
    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  • Introduction.Bart van der Sloot - 2016 - Ethics and Information Technology 18 (1):1-7.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Biobank research and the right to privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.
    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Nanotechnology Will Change More Than Just One Thing.Tihamer Toth-Fejel - 2009 - American Journal of Bioethics 9 (10):12-13.
  • Sobre el concepto de privacidad: la relación entre privacidad e intimidad.Manuel Toscano - 2017 - Isegoría 57:533.
    El derecho a la privacidad está en el centro de muchos de los debates públicos actuales. Sin embargo, a pesar de la extensa literatura filosófica y jurídica sobre el tema, no contamos con una explicación adecuada del sentido y del valor de la privacidad. Esta falta de acuerdo sobre cuestiones conceptuales y normativas ha llevado a algún autor a hablar del ‘caos de la privacidad’. Este artículo se centra en la exploración conceptual de la privacidad. Para ello, en primer lugar, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Libertarianism, Climate Change, and Individual Responsibility.Olle Torpman - 2022 - Res Publica 28 (1):125-148.
    Much has been written about climate change from an ethical view in general, but less has been written about it from a libertarian point of view in particular. In this paper, I apply the libertarian moral theory to the problem of climate change. I focus on libertarianism’s implications for our individual emissions. I argue that even if our individual emissions cause no harm to others, these emissions cross other people’s boundaries, although the boundary-crossings that are due to our ‘subsistence emissions’ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.
    This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account and illustrates the difficulties of doing so. Having set out the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Introduction: Hec forum special issue on privacy and commodification. [REVIEW]James Stacey Taylor - 2010 - HEC Forum 22 (3):173-177.
    The papers in this special thematic issue of HEC Forum critically and carefully explore key issues at the intersection of patient privacy and commodification. For example, should hospitals be required to secure a person’s consent to any possible uses to which his discarded body parts might be put after his treatment or should it only be concerned with securing his informed consent to his treatment? Should a hospital be required to raise the possibility of the commodification of such body parts, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Saying Privacy, Meaning Confidentiality.Abraham P. Schwab, Lily Frank & Nada Gligorov - 2011 - American Journal of Bioethics 11 (11):44-45.
    The American Journal of Bioethics, Volume 11, Issue 11, Page 44-45, November 2011.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy Rights and Public Information.Benedict Rumbold & James Wilson - 2019 - Journal of Political Philosophy 27 (1):3-25.
    This article concerns the nature and limits of individuals’ rights to privacy over information that they have made public. For some, even suggesting that an individual can have a right to privacy over such information may seem paradoxical. First, one has no right to privacy over information that was never private to begin with. Second, insofar as one makes once-private information public – whether intentionally or unintentionally – one waives one’s right to privacy to that information. In this article, however, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy as a Matter of Taste and Right.Alexander Rosenberg - 2000 - Social Philosophy and Policy 17 (2):68.
    Privacy is something we all want. We seek privacy to prevent others from securing information about us that is immediately embarrassing, and so causes us pain but not material loss. We also value privacy for strategic reasons in order to prevent others from imposing material and perhaps psychic costs upon us. I use the expression “securing information” so that it covers everything from the immediate sensory data that a voyeur acquires to the financial data a rival may acquire about our (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • X—Privacy as a Human Right.Beate Roessler - 2017 - Proceedings of the Aristotelian Society 117 (2):187-206.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Privacy and personal identity.Wade L. Robison - 1997 - Ethics and Behavior 7 (3):195 – 205.
    What marks the traditional privacy torts of disclosure, intrusion, false light, and appropriation is that they require an invasion, an intrinsic harm caused by someone doing something to us without our consent. But we are now voluntarily giving up information about ourselves--to our physicians, for instance--that is being gathered into databases that are brought and sold and that can be appropriated by those who wish to assume our identities. The way in which our privacy is put at risk is different, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy and Self-Presentation.Juha Räikkä - 2017 - Res Publica 23 (2):213-226.
    It has often been argued that one of the reasons why we should value privacy is that it enables self-presentation and impression management. According to this approach, it is valuable to be able to govern the impression one gives, as the capacity to govern impressions is an instrument by which people take care of their various social relationships. In this paper I will take a closer look at that approach on privacy, with specific reference to the alleged threats to privacy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Protecting Privacy and Confidentiality in Environmental Health Research.David B. Resnik - 2010 - Ethics in Biology, Engineering and Medicine 1 (4):285-291.
  • Internet privacy, technology, and personal information.Marjorie S. Price - 2020 - Ethics and Information Technology 22 (2):163-173.
    Computer programs are used to obtain and store information about the online activities of users of the web. Many people are concerned about this practice because they believe that it can violate users' rights to privacy or result in violations of them. This belief is based on the assumption that the information obtained and stored with the use of the programs includes personal information. My main aim in this paper is to argue that this assumption is false. I discuss the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • A cognitive access definition of privacy.Madison Powers - 1996 - Law and Philosophy 15 (4):369 - 386.
    Many of the contemporary disagreements regarding privacy are conceptual in nature. They concern the meaning or definition of privacy and the analytic basis of distinguishing privacy rights from other kinds of rights recognized within moral, political, or legal theories. The two main alternatives within this debate include reductionist views, which seek a narrow account of the kinds of invasions or intrusions distinctly involving privacy losses, and anti-reductionist theories, which treat a much broader array of interferences with a person as separate (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  • The Ties That Blind: Conceptualizing Anonymity.Julie Ponesse - 2014 - Journal of Social Philosophy 45 (3):304-322.
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Glass Panels and Peepholes: Nonhuman Animals and the Right to Privacy.Angie Pepper - 2020 - Pacific Philosophical Quarterly 101 (4):628-650.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy exchanges: restoring consent in privacy self-management.Mario Pascalev - 2017 - Ethics and Information Technology 19 (1):39-48.
    This article reviews the qualitative changes that big data technology introduced to society, particularly changes that affect how individuals control the access, use and retention of their personal data. In particular interest is whether the practice of privacy self-management in this new context could still ensure the informed consent of individuals to the privacy terms of big data companies. It is concluded that that accepting big data companies’ privacy policies falls short of the disclosure and understanding requirements for informed consent. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Why ‘Negative Control’ is a Dead End: A Reply to Mainz and Uhrenfeldt.Lauritz Aastrup Munch - 2021 - Res Publica 27 (4):661-667.
    Mainz and Uhrenfeldt have recently claimed that a violation of the right to privacy can be defined successfully under reliance on the notion of ‘Negative Control’. In this reply, I show that ‘Negative Control’ is unrelated to privacy right violations. It follows that control theorists have yet to put forth a successful normative account of privacy.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • To Believe, or Not to Believe – That is Not the (Only) Question: The Hybrid View of Privacy.Lauritz Munch & Jakob Mainz - forthcoming - The Journal of Ethics:1-17.
    In this paper, we defend what we call the ‘Hybrid View’ of privacy. According to this view, an individual has privacy if, and only if, no one else forms an epistemically warranted belief about the individual’s personal matters, nor perceives them. We contrast the Hybrid View with what seems to be the most common view of what it means to access someone’s personal matters, namely the Belief-Based View. We offer a range of examples that demonstrate why the Hybrid View is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the thought (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations