Switch to: References

Add citations

You must login to add citations.
  1. Privacy Rights, and Why Negative Control is Not a Dead End: A Reply to Munch and Lundgren.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2021 - Res Publica 28 (2):391-400.
    Lauritz Munch and Björn Lundgren have recently replied to a paper published by us in this journal. In our original paper, we defended a novel version of the so-called ‘control theory’ of the moral right to privacy. We argued that control theorists should define ‘control’ as what we coined ‘Negative Control’. Munch and Lundgren have recently provided a range of interesting and challenging objections to our view. Independently of each other, they give almost identical counterexamples to our definition of Negative (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Do Your Homework! A Rights-Based Zetetic Account of Alleged Cases of Doxastic Wronging.J. Spencer Atkins - forthcoming - Ethical Theory and Moral Practice:1-28.
    This paper offers an alternate explanation of cases from the doxastic wronging literature. These cases violate what I call the degree of inquiry right—a novel account of zetetic obligations to inquire when interests are at stake. The degree of inquiry right is a moral right against other epistemic agents to inquire to a certain threshold when a belief undermines one’s interests. Thus, the agents are sometimes obligated to leave inquiry open. I argue that we have relevant interests in reputation, relationships, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy, Informed Consent, and Participant Observation.Julie Zahle - 2017 - Perspectives on Science 25 (4):465-487.
    In the literature on social research, adherence to the principle of informed consent is sometimes recommended on the ground that the privacy of those being studied is hereby protected. The principle has it that before becoming part of a study, a competent individual must receive information about its purpose, use, etc., and on this basis freely agree to participate. Joan Sieber motivates the employment of informed consent as a way to safeguard research participants' privacy as follows: "A research experience regarded (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • The Right to Privacy.Lloyd L. Weinreb - 2000 - Social Philosophy and Policy 17 (2):25.
    The question that I address in this paper is whether there is a right to privacy. It is not the question whether in the United States there is a legal right to privacy or, more particularly, a constitutional right to privacy. There are any number of ordinary legal rights and specific constitutional rights that might be so described, and the U.S. Supreme Court has referred also to a generic “right to privacy” that is implicit in the U.S. Constitution. Nor is (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy: an institutional fact.Marc-André Weber - 2016 - Ethics and Information Technology 18 (1):59-64.
    Let us show how property is grasped as an institutional fact. If Jones steals a computer, he does not own it in the sense of property, but only exercises control towards it. If he buys the computer, he controls it too, and moreover owns it in the sense of property. In other words, simply exercising control towards something is a brute fact. This control counts asproperty only in a certain context: the computer counts as Jones’s property only if he got (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Commodification and privacy: A Lockean perspective.Richard Volkman - 2010 - HEC Forum 22 (3):179-195.
    This paper defends the thesis that privacy as a right is derived from fundamental rights to life, liberty, and property and does not permit restricting the commodification of bodily material; however, privacy as life, liberty, property does require conventions that ensure a robust and just market in bodily material. The analysis proceeds by defending a general commitment to liberty and markets, but not in the manner one might expect from a ‘doctrinaire’ libertarian. Ethical concerns about commodification are legitimate in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Data, Privacy, and Agency: Beyond Transparency to Empowerment.Erika Versalovic, Sara Goering & Eran Klein - 2022 - American Journal of Bioethics 22 (7):63-65.
    Separation-based accounts of privacy define privacy as being left alone and unaccessed. Pyrrho et al. propose a more control-based account where privacy is about having the age...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Biomedical Big Data: New Models of Control Over Access, Use and Governance.Alessandro Blasimme & Effy Vayena - 2017 - Journal of Bioethical Inquiry 14 (4):501-513.
    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Introduction.Bart van der Sloot - 2016 - Ethics and Information Technology 18 (1):1-7.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Biobank research and the right to privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.
    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Nanotechnology Will Change More Than Just One Thing.Tihamer Toth-Fejel - 2009 - American Journal of Bioethics 9 (10):12-13.
  • Sobre el concepto de privacidad: la relación entre privacidad e intimidad.Manuel Toscano - 2017 - Isegoría 57:533.
    El derecho a la privacidad está en el centro de muchos de los debates públicos actuales. Sin embargo, a pesar de la extensa literatura filosófica y jurídica sobre el tema, no contamos con una explicación adecuada del sentido y del valor de la privacidad. Esta falta de acuerdo sobre cuestiones conceptuales y normativas ha llevado a algún autor a hablar del ‘caos de la privacidad’. Este artículo se centra en la exploración conceptual de la privacidad. Para ello, en primer lugar, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Libertarianism, Climate Change, and Individual Responsibility.Olle Torpman - 2021 - Res Publica 28 (1):125-148.
    Much has been written about climate change from an ethical view in general, but less has been written about it from a libertarian point of view in particular. In this paper, I apply the libertarian moral theory to the problem of climate change. I focus on libertarianism’s implications for our individual emissions. I argue that even if our individual emissions cause no harm to others, these emissions cross other people’s boundaries, although the boundary-crossings that are due to our ‘subsistence emissions’ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.
    This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account and illustrates the difficulties of doing so. Having set out the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Ethics of Police Body-Worn Cameras.Frej Klem Thomsen - 2020 - Moral Philosophy and Politics 7 (1):97-121.
    Over the past decade, police departments in many countries have experimented with and increasingly adopted the use of police body-worn cameras. This article aims to examine the moral issues raised by the use of PBWCs, and to provide an overall assessment of the conditions under which the use of PBWCs is morally permissible. It first reviews the current evidence for the effects of using PBWCs. On the basis of this review the article sets out a teleological argument for the use (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Introduction: Hec forum special issue on privacy and commodification. [REVIEW]James Stacey Taylor - 2010 - HEC Forum 22 (3):173-177.
    The papers in this special thematic issue of HEC Forum critically and carefully explore key issues at the intersection of patient privacy and commodification. For example, should hospitals be required to secure a person’s consent to any possible uses to which his discarded body parts might be put after his treatment or should it only be concerned with securing his informed consent to his treatment? Should a hospital be required to raise the possibility of the commodification of such body parts, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Deepfake Pornography and the Ethics of Non-Veridical Representations.Daniel Story & Ryan Jenkins - 2023 - Philosophy and Technology 36 (3):1-22.
    We investigate the question of whether (and if so why) creating or distributing deepfake pornography of someone without their consent is inherently objectionable. We argue that nonconsensually distributing deepfake pornography of a living person on the internet is inherently pro tanto wrong in virtue of the fact that nonconsensually distributing intentionally non-veridical representations about someone violates their right that their social identity not be tampered with, a right which is grounded in their interest in being able to exercise autonomy over (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Saying Privacy, Meaning Confidentiality.Abraham P. Schwab, Lily Frank & Nada Gligorov - 2011 - American Journal of Bioethics 11 (11):44-45.
    The American Journal of Bioethics, Volume 11, Issue 11, Page 44-45, November 2011.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy Rights and Public Information.Benedict Rumbold & James Wilson - 2018 - Journal of Political Philosophy 27 (1):3-25.
    This article concerns the nature and limits of individuals’ rights to privacy over information that they have made public. For some, even suggesting that an individual can have a right to privacy over such information may seem paradoxical. First, one has no right to privacy over information that was never private to begin with. Second, insofar as one makes once-private information public – whether intentionally or unintentionally – one waives one’s right to privacy to that information. In this article, however, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Information ethics in the context of smart devices.Brian Roux & Michael Falgoust - 2013 - Ethics and Information Technology 15 (3):183-194.
    In this paper, we employ Extended Cognition as a background for a series of thought experiments about privacy and common used information technology devices. Laptops and smart phones are now widely used devices, but current privacy standards do not adequately address the relationship between the owners of these devices and the information stored on them. Law enforcement treats laptops and smart phones are potential sources of information about criminal activity, but this treatment ignores the use of smart devices as extensions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy as a Matter of Taste and Right.Alexander Rosenberg - 2000 - Social Philosophy and Policy 17 (2):68.
    Privacy is something we all want. We seek privacy to prevent others from securing information about us that is immediately embarrassing, and so causes us pain but not material loss. We also value privacy for strategic reasons in order to prevent others from imposing material and perhaps psychic costs upon us. I use the expression “securing information” so that it covers everything from the immediate sensory data that a voyeur acquires to the financial data a rival may acquire about our (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • X—Privacy as a Human Right.Beate Roessler - 2017 - Proceedings of the Aristotelian Society 117 (2):187-206.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  • Privacy and personal identity.Wade L. Robison - 1997 - Ethics and Behavior 7 (3):195 – 205.
    What marks the traditional privacy torts of disclosure, intrusion, false light, and appropriation is that they require an invasion, an intrinsic harm caused by someone doing something to us without our consent. But we are now voluntarily giving up information about ourselves--to our physicians, for instance--that is being gathered into databases that are brought and sold and that can be appropriated by those who wish to assume our identities. The way in which our privacy is put at risk is different, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy and Self-Presentation.Juha Räikkä - 2017 - Res Publica 23 (2):213-226.
    It has often been argued that one of the reasons why we should value privacy is that it enables self-presentation and impression management. According to this approach, it is valuable to be able to govern the impression one gives, as the capacity to govern impressions is an instrument by which people take care of their various social relationships. In this paper I will take a closer look at that approach on privacy, with specific reference to the alleged threats to privacy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Protecting Privacy and Confidentiality in Environmental Health Research.David B. Resnik - 2010 - Ethics in Biology, Engineering and Medicine 1 (4):285-291.
  • Internet privacy, technology, and personal information.Marjorie S. Price - 2020 - Ethics and Information Technology 22 (2):163-173.
    Computer programs are used to obtain and store information about the online activities of users of the web. Many people are concerned about this practice because they believe that it can violate users' rights to privacy or result in violations of them. This belief is based on the assumption that the information obtained and stored with the use of the programs includes personal information. My main aim in this paper is to argue that this assumption is false. I discuss the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • A cognitive access definition of privacy.Madison Powers - 1996 - Law and Philosophy 15 (4):369 - 386.
    Many of the contemporary disagreements regarding privacy are conceptual in nature. They concern the meaning or definition of privacy and the analytic basis of distinguishing privacy rights from other kinds of rights recognized within moral, political, or legal theories. The two main alternatives within this debate include reductionist views, which seek a narrow account of the kinds of invasions or intrusions distinctly involving privacy losses, and anti-reductionist theories, which treat a much broader array of interferences with a person as separate (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • The Ties That Blind: Conceptualizing Anonymity.Julie Ponesse - 2014 - Journal of Social Philosophy 45 (3):304-322.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Glass Panels and Peepholes: Nonhuman Animals and the Right to Privacy.Angie Pepper - 2020 - Pacific Philosophical Quarterly 101 (4):628-650.
    In this paper, I defend the claim that many sentient nonhuman animals have a right to privacy. I begin by outlining the view that the human right to privacy protects our interest in shaping different kinds of relationships with one another by giving us control over how we present ourselves to others. I then draw on empirical research to show that nonhuman animals also have this interest, which grounds a right to privacy against us. I further argue that we can (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • Privacy exchanges: restoring consent in privacy self-management.Mario Pascalev - 2017 - Ethics and Information Technology 19 (1):39-48.
    This article reviews the qualitative changes that big data technology introduced to society, particularly changes that affect how individuals control the access, use and retention of their personal data. In particular interest is whether the practice of privacy self-management in this new context could still ensure the informed consent of individuals to the privacy terms of big data companies. It is concluded that that accepting big data companies’ privacy policies falls short of the disclosure and understanding requirements for informed consent. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • What We Owe Past Selves.Lauritz Aastrup Munch - 2023 - Journal of Applied Philosophy 40 (5):936-950.
    Some say that we should respect the privacy of dead people. In this article, I take this idea for granted and use it to motivate the stronger claim that we sometimes ought to respect the privacy of our past selves.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • What We Owe Past Selves.Lauritz Aastrup Munch - 2023 - Journal of Applied Philosophy 40 (5):936-950.
    Some say that we should respect the privacy of dead people. In this article, I take this idea for granted and use it to motivate the stronger claim that we sometimes ought to respect the privacy of our past selves.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Why ‘Negative Control’ is a Dead End: A Reply to Mainz and Uhrenfeldt.Lauritz Aastrup Munch - 2021 - Res Publica 27 (4):661-667.
    Mainz and Uhrenfeldt have recently claimed that a violation of the right to privacy can be defined successfully under reliance on the notion of ‘Negative Control’. In this reply, I show that ‘Negative Control’ is unrelated to privacy right violations. It follows that control theorists have yet to put forth a successful normative account of privacy.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Moral Significance of Privacy Dependencies.Lauritz Aastrup Munch & Jakob Thrane Mainz - 2023 - Philosophy and Technology 36 (4):1-19.
    Often, when we share information about ourselves, we contribute to people learning personal things about others. This may happen because what we share about ourselves can be used to infer personal information about others. Such dependencies have become known as privacy dependencies in the literature. It is sometimes claimed that the scope of the right to privacy should be expanded in light of such dependencies. For example, some have argued that inferring information about others can violate their right to privacy. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • To Believe or not to Believe - That is not the (Only) Question: the Hybrid View of Privacy.Lauritz Munch & Jakob Mainz - 2023 - The Journal of Ethics 27 (3):245-261.
    In this paper, we defend what we call the ‘Hybrid View’ of privacy. According to this view, an individual has privacy if, and only if, no one else forms an epistemically warranted belief about the individual’s personal matters, nor perceives them. We contrast the Hybrid View with what seems to be the most common view of what it means to access someone’s personal matters, namely the Belief-Based View. We offer a range of examples that demonstrate why the Hybrid View is (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • To Believe, or Not to Believe – That is Not the (Only) Question: The Hybrid View of Privacy.Lauritz Munch & Jakob Mainz - 2023 - The Journal of Ethics 27 (3):245-261.
    In this paper, we defend what we call the ‘Hybrid View’ of privacy. According to this view, an individual has privacy if, and only if, no one else forms an epistemically warranted belief about the individual’s personal matters, nor perceives them. We contrast the Hybrid View with what seems to be the most common view of what it means to access someone’s personal matters, namely the Belief-Based View. We offer a range of examples that demonstrate why the Hybrid View is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the thought (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Digital Self-Defence: Why you Ought to Preserve Your Privacy for the Sake of Wrongdoers.Lauritz Aastrup Munch - 2022 - Ethical Theory and Moral Practice 25 (2):233-248.
    Most studies on the ethics of privacy focus on what others ought to do to accommodate our interest in privacy. I focus on a related but distinct question that has attracted less attention in the literature: When, if ever, does morality require us to safeguard our own privacy? While we often have prudential reasons for safeguarding our privacy, we are also, at least sometimes, morally required to do so. I argue that we, sometimes, ought to safeguard our privacy for the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, public health, and controlling medical information.Adam D. Moore - 2010 - HEC Forum 22 (3):225-240.
    This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy, turning then to consider cases which illustrate when and how privacy may be overridden by public health concerns.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Free speech, privacy, and autonomy.Adam D. Moore - 2020 - Social Philosophy and Policy 37 (2):31-51.
    While autonomy arguments provide a compelling foundation for free speech, they also support individual privacy rights. Considering how speech and privacy may be justified, I will argue that the speech necessary for self-government does not need to include details that would violate privacy rights. Additionally, I will argue that if viewed as a kind of intangible property right, informational privacy should limit speech and expression in a range of cases. In a world where we have an overabundance of content to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Defining privacy.Adam Moore - 2008 - Journal of Social Philosophy 39 (3):411-428.
  • Protecting Health Privacy through Reasonable Inferences.Brent Mittelstadt - 2022 - American Journal of Bioethics 22 (7):65-68.
    In the digital age individuals face key choices about whether and how to share intimate details of their lives, “images of the body, biological data in general and diagnostic information” (Pyrrho,...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation