Results for ' passive privacy'

999 found
Order:
  1. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  2.  14
    Disclosure to genetic relatives without consent – Australian genetic professionals’ awareness of the health privacy law.Jane Fleming, Ainsley J. Newson, Kate Dunlop, Kristine Barlow-Stewart & Natalia Meggiolaro - 2020 - BMC Medical Ethics 21 (1):1-10.
    Background: When a genetic mutation is identified in a family member, internationally, it is usually the proband’s or another responsible family member’s role to disclose the information to at-risk relatives. However, both active and passive non-disclosure in families occurs: choosing not to communicate the information or failing to communicate the information despite intention to do so, respectively. The ethical obligations to prevent harm to at-risk relatives and promote the duty of care by genetic health professionals is in conflict with (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  3. The nature and value of the.Moral Right To Privacy - 2002 - Public Affairs Quarterly 16 (4):329.
     
    Export citation  
     
    Bookmark  
  4. Chapter outline.A. Myth Versus Reality, D. Publicity not Privacy, E. Guilty Until Proven Innocent, J. Change & Rotation Mentality - forthcoming - Moral Management: Business Ethics.
    No categories
     
    Export citation  
     
    Bookmark  
  5.  62
    Four Pillars of Internet Research Ethics with Web 2.0.Barry Rooke - 2013 - Journal of Academic Ethics 11 (4):265-268.
    The proliferation of social media and web 2.0 applications (Facebook, MySpace, Twitter, blogs, etc.) in the previous 5 years has created a new social research opportunity, with over an estimated 552 million active daily users on Facebook (Facebook Press 2012). As with all research, boundaries must be set out to create valid and accurate data, keeping ethical practices at the forefront of the data gathering process. The lack of standardized practices requires an in-depth look into the use of such methods, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  7
    Patient-centered empirical research on ethically relevant psychosocial and cultural aspects of cochlear, glaucoma and cardiovascular implants – a scoping review.Sabine Schulz, Laura Harzheim, Constanze Hübner, Mariya Lorke, Saskia Jünger & Christiane Woopen - 2023 - BMC Medical Ethics 24 (1):1-22.
    Background The significance of medical implants goes beyond technical functioning and reaches into everyday life, with consequences for individuals as well as society. Ethical aspects associated with the everyday use of implants are relevant for individuals’ lifeworlds and need to be considered in implant care and in the course of technical developments. Methods This scoping review aimed to provide a synthesis of the existing evidence regarding ethically relevant psychosocial and cultural aspects in cochlear, glaucoma and cardiovascular implants in patient-centered empirical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  20
    Global Bioethics: Global Equity and Disabilities: Reflections of a Mother from Hell.Christine M. Reed - 1997 - Cambridge Quarterly of Healthcare Ethics 6 (1):106-110.
    “Power is the ability to take one's place in whatever discourse is essential to action” With these words, Carolyn Heilbran urges women to rewrite their lives. Their angry and frustrated voices, heard in the privacy of letters and quiet conversations, tell their true stories, while their public biographies are sentimental and passive. Women, she says, need to learn how to declare their right to public power. With this advice In mind, I recently joined a conversation with colleagues from (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  8.  1
    Informatiegaring en meningsuiting in de pers : enkele bedenkingen over de actualiteit van het Belgisch persrecht.Jan Ceuleers - 1989 - Res Publica 31 (4):505-512.
    Belgian Constitution needs a face-lifting. The right of information, both active and passive, must be recognized, along with a prohibition ofcensorship; this right implies the right of free communication and freedom of the media. It also implies the abolition of the notion press-delict and of special administration of criminal law.Legislation too has to be actualized: expansion of the right of answer to all means of communication.Furthermore, introduction of the duty of speech for anyone who holds information that may concern (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  9.  38
    Digital footprints: an emerging dimension of digital inequality.Marina Micheli, Christoph Lutz & Moritz Büchi - 2018 - Journal of Information, Communication and Ethics in Society 16 (3):242-251.
    Purpose This conceptual contribution is based on the observation that digital inequalities literature has not sufficiently considered digital footprints as an important social differentiator. The purpose of the paper is to inspire current digital inequality frameworks to include this new dimension. Design/methodology/approach Literature on digital inequalities is combined with research on privacy, big data and algorithms. The focus on current findings from an interdisciplinary point of view allows for a synthesis of different perspectives and conceptual development of digital footprints (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  47
    Identity crisis: Face recognition technology and freedom of the will.Benjamin Hale - 2005 - Ethics, Place and Environment 8 (2):141 – 158.
    In this paper I present the position that the use of face recognition technology (FRT) in law enforcement and in business is restrictive of individual autonomy. I reason that FRT severely undermines autonomous self-determination by hobbling the idea of freedom of the will. I distinguish this position from two other common arguments against surveillance technologies: the privacy argument (that FRT is an invasion of privacy) and the objective freedom argument (that FRT is restrictive of one's freedom to act). (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  4
    Equidad política, pluralidad cultural y comprensión del pasado histórico.Aníbal Fornari - 2001 - Tópicos 8:81-104.
    Para Rawls, el problema de la filosofía política es la existencia duradera de una sociedad democrática, cuyos ciudadanos, sin embargo, no dejan de estar “profundamente divididos” por doctrinas religiosas, filosóficas y morales razonables. La convivencia de tal pluralidad en un espacio jurídico-estatal, está conformada por ideas intuitivas básicas, decantadas en un consenso superpuesto, que expresa la historicidad cultural de tal sociedad. Pero la trascendentalidad reflexiva del concepto ético-político de ciudadano debe realizar una epokhé sobre los procesos culturales de identificación que (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  50
    Revealing the commercialized and compliant Facebook user.Stephen Lilley, Frances S. Grodzinsky & Andra Gumbus - 2012 - Journal of Information, Communication and Ethics in Society 10 (2):82-92.
    PurposeFacebook users are both producers and consumers, in the sense that they produce the disclosures that allow for Facebook's business success and they consume services. The purpose of this paper is to examine how best to characterize the commercialized and compliant members. The authors question the Facebook assertion that members knowingly and willingly approve of personal and commercial transparency and argue, instead, that complicity is engineered.Design/methodology/approachA survey of Facebook users was conducted between December 2010 and April 2011 at one private (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  14
    Inner Strength of Female Characters in Loitering with Intent and The Public Image by Muriel Spark.Monika Rogalińska - 2011 - Text Matters - a Journal of Literature, Theory and Culture 1 (1):135-144.
    Inner Strength of Female Characters in Loitering with Intent and The Public Image by Muriel Spark Women characters in Muriel Spark's novels are diverse, some strong and powerful, some weak and unable to make decisions. And there are characters who develop throughout the novel and learn from their own mistakes. From being passive, they gradually start acting and making their own choices. Loitering with Intent and The Public Image present women characters who go through metamorphosis, from being dependent on (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  14. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  15. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  16. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  65
    Unpopular Privacy: What Must We Hide?Anita Allen - 2011 - New York, US: Oup Usa.
    Can the government stick us with privacy we don't want? It can, it does, and according to this author, may need to do more of it. Privacy is a foundational good, she argues, a necessary tool in the liberty-lover's kit for a successful life. A nation committed to personal freedom must be prepared to mandate inalienable, liberty-promoting privacies for its people, whether they eagerly embrace them or not. The eight chapters of this book are reflections on public regulation (...)
    Direct download  
     
    Export citation  
     
    Bookmark   19 citations  
  18. Passive avoidance learning in individuals with psychopathy: modulation by reward but not by punishment.R. J. R. Blair, D. G. V. Mitchell, A. Leonard, S. Budhani, K. S. Peschardt & C. Newman - 2004 - Personality and Individual Differences 37:1179–1192.
    This study investigates the ability of individuals with psychopathy to perform passive avoidance learning and whether this ability is modulated by level of reinforcement/punishment. Nineteen psychopathic and 21 comparison individuals, as defined by the Hare Psychopathy Checklist Revised (Hare, 1991), were given a passive avoidance task with a graded reinforcement schedule. Response to each rewarding number gained a point reward specific to that number (i.e., 1, 700, 1400 or 2000 points). Response to each punishing number lost a point (...)
     
    Export citation  
     
    Bookmark   17 citations  
  19. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  26
    Privacy Is Power.Carissa Véliz - 2020 - London, UK: Penguin (Bantam Press).
    Selected by the Economist as one of the best books of 2020. -/- Privacy Is Power argues that people should protect their personal data because privacy is a kind of power. If we give too much of our data to corporations, the wealthy will rule. If we give too much personal data to governments, we risk sliding into authoritarianism. For democracy to be strong, the bulk of power needs to be with the citizenry, and whoever has the data (...)
    Direct download  
     
    Export citation  
     
    Bookmark   27 citations  
  21.  48
    Disentangling Privacy and Intimacy: Intimate Citizenship, Private Boundaries and Public Transgressions.Paul Reynolds - 2010 - Human Affairs 20 (1):33-42.
    Disentangling Privacy and Intimacy: Intimate Citizenship, Private Boundaries and Public Transgressions Recent theorisations of transformations of intimacy—like Ken Plummer's (2003) Intimate Citizenship project—concentrate on social and cultural transformations that erode the containment of intimacy within the private sphere. They have less to say about the character of and oppositions to that erosion, and specifically how far the idea of the private stands in opposition to intimacy transgressing into the public. In this essay, the private is explored through its constitutive (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2014 - In Beaete Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  52
    The privacy of the psychical.Amihud Gilead - 2011 - Amsterdam: Rodopi.
    This book argues that the irreducible singularity of each person as a psychical subject implies the privacy of the psychical and that of experience, and yet the private accessibility of each person to his or her mind is compatible with interpersonal communication and understanding. The book treats these major issues against the background of the author's original metaphysics--panenmentalism."--Publisher's website.
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  24.  48
    Privacy and Health Practices in the Digital Age.Monique Pyrrho, Leonardo Cambraia & Viviane Ferreira de Vasconcelos - 2022 - American Journal of Bioethics 22 (7):50-59.
    Increasing privacy concerns are arising from expanding use of aggregated personal information in health practices. Conversely, in light of the promising benefits of data driven healthcare, privacy...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  25. Privacy, Ethics, and Institutional Research.Alan Rubel - 2019 - New Directions in Institutional Research 2019 (183):5-16.
    Despite widespread agreement that privacy in the context of education is important, it can be difficult to pin down precisely why and to what extent it is important, and it is challenging to determine how privacy is related to other important values. But that task is crucial. Absent a clear sense of what privacy is, it will be difficult to understand the scope of privacy protections in codes of ethics. Moreover, privacy will inevitably conflict with (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  26. Transparency, Privacy and Civil Inattention.Emmanuel Alloa - 2021 - In Cultures of Transparency: Between Promise and Peril. London/New York: pp. 171-191.
    The demand for more transparency is hardly ever questioned. When it is, it is generally questioned in the name of a protection of privacy. In a traditional liberal understanding, there is a non-alienable “right to privacy” (Warren/Brandeis, 1890). Many political struggles, however, involved ignoring such boundaries, and making public things that were meant to remain private (domestic violence, gender oppression, child abuse etc.). While holding that the distinction between private and public is necessary, it must remain mobile and (...)
     
    Export citation  
     
    Bookmark   1 citation  
  27.  13
    Privacy and philosophy: new media and affective protocol.Andrew McStay - 2014 - New York: Peter Lang.
    In this book, McStay draws on an array of philosophers to offer a novel approach to privacy matters. Against the backdrop and scrutiny of Arendt, Aristotle, Bentham, Brentano, Deleuze, Engels, Heidegger, Hume, Husserl, James, Kant, Latour, Locke, Marx, Mill, Plato, Rorty, Ryle, Sartre, Skinner, among others, McStay advances a wealth of new ideas and terminology, from affective breaches to zombie media.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  17
    Is Passive Syntax Semantically Constrained? Evidence From Adult Grammaticality Judgment and Comprehension Studies.Ben Ambridge, Amy Bidgood, Julian M. Pine, Caroline F. Rowland & Daniel Freudenthal - 2016 - Cognitive Science 40 (6):1435-1459.
    To explain the phenomenon that certain English verbs resist passivization, Pinker proposed a semantic constraint on the passive in the adult grammar: The greater the extent to which a verb denotes an action where a patient is affected or acted upon, the greater the extent to which it is compatible with the passive. However, a number of comprehension and production priming studies have cast doubt upon this claim, finding no difference between highly affecting agent-patient/theme-experiencer passives and non-actional experiencer (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  29. Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   42 citations  
  30. Privacy, trust and business ethics for mobile business social networks.Hungarian Academy of Sciences Istvan Mezgar & Sonja Grabner-Kräuter Hungary - 2015 - In Daniel E. Palmer (ed.), Handbook of research on business ethics and corporate responsibilities. Hershey: Business Science Reference, An Imprint of IGI Global.
     
    Export citation  
     
    Bookmark  
  31.  85
    Privacy and ethics in brain-computer interface research.Eran Klein & Alan Rubel - 2018 - In Eran Klein & Alan Rubel (eds.), Brain–Computer Interfaces Handbook: Technological and Theoretical Advances. pp. 653-655.
    Neural engineers and clinicians are starting to translate advances in electrodes, neural computation, and signal processing into clinically useful devices to allow control of wheelchairs, spellers, prostheses, and other devices. In the process, large amounts of brain data are being generated from participants, including intracortical, subdural and extracranial sources. Brain data is a vital resource for BCI research but there are concerns about whether the collection and use of this data generates risk to privacy. Further, the nature of BCI (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  10
    The right to privacy.Janet E. Smith - 2008 - San Francisco: Ignatius Press.
    Foreword by Robert H. Bork -- Culture wars -- A distorted understanding of rights -- The right to privacy -- Griswold and contraception -- Roe and abortion -- Assisted suicide and homosexuality -- Political connections and natural consequences.
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  56
    Passivity in Aesthetic Experience: Husserlian and Enactive Perspectives.Tone Roald & Simon Høffding - 2019 - Journal of Aesthetics and Phenomenology 6 (1):1-20.
    This paper argues that the Husserlian notion of “passive synthesis” can make a substantial contribution to the understanding of aesthetic experience. The argument is based on two empirical cases of qualitative interview material obtained from museum visitors and a world-renowned string quartet, which show that aesthetic experience contains an irreducible dimension of passive undergoing and surprise. Analyzing this material through the lens of passive syntheses helps explain these experiences, as well as the sense of subject–object fusion that (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  34.  28
    Turning Privacy Inside Out.Julie E. Cohen - 2019 - Theoretical Inquiries in Law 20 (1):1-31.
    The problem of theorizing privacy moves on two levels, the first consisting of an inadequate conceptual vocabulary and the second consisting of an inadequate institutional grammar. Privacy rights are supposed to protect individual subjects, and so conventional ways of understanding privacy are subject-centered, but subject-centered approaches to theorizing privacy also wrestle with deeply embedded contradictions. And privacy’s most enduring institutional failure modes flow from its insistence on placing the individual and individualized control at the center. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  35. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  36.  5
    Privacy.Fritz Allhoff, Patrick Lin & Daniel Moore - 2010 - In What is Nanotechnology and why does it Matter? Oxford, UK: Wiley‐Blackwell. pp. 185–214.
    This chapter contains sections titled: Historical and Legal Background Philosophical Foundations Radio Frequency Identity Chips Item‐Level Tagging Human Implants RFID‐Chipped Identification Is RFID a Threat to Privacy?
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37. Group privacy: a defence and an interpretation.Luciano Floridi - 2017 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group Privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   11 citations  
  38.  48
    Privacy in the digital age: comparing and contrasting individual versus social approaches towards privacy.Marcel Becker - 2019 - Ethics and Information Technology 21 (4):307-317.
    This paper takes as a starting point a recent development in privacy-debates: the emphasis on social and institutional environments in the definition and the defence of privacy. Recognizing the merits of this approach I supplement it in two respects. First, an analysis of the relation between privacy and autonomy teaches that in the digital age more than ever individual autonomy is threatened. The striking contrast between on the one hand offline vocabulary, where autonomy and individual decision making (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  39.  32
    Understanding Privacy in Occupational Health Services.Anne Heikkinen, Gustav Wickström & Helena Leino-Kilpi - 2006 - Nursing Ethics 13 (5):515-530.
    The aim of this study was to gain a deeper understanding of privacy in occupational health services. Data were collected through in-depth theme interviews with occupational health professionals (n=15), employees (n=15) and employers (n=14). Our findings indicate that privacy, in this context, is a complex and multilayered concept, and that companies as well as individual employees have their own core secrets. Co-operation between the three groups proved challenging: occupational health professionals have to consider carefully in which situations and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  98
    Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  41. The Passivity Assumption of the Sensation—Perception Distinction.Aaron Ben-Zeev - 1984 - British Journal for the Philosophy of Science 35 (December):327-343.
    The sensation-perception distinction did not appear before the seventeenth century, but since then various formulations of it have gained wide acceptance. This is not an historical accident and the article suggests an explanation for its appearance. Section 1 describes a basic assumption underlying the sensation-perception distinction, to wit, the postulation of a pure sensory stage--viz. sensation--devoid of active influence of the agent's cognitive, emotional, and evaluative frameworks. These frameworks are passive in that stage. I call this postulation the passivity (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  42. Passive frame theory: A new synthesis.Ezequiel Morsella, Godwin Christine, Jantz Tiffany, Krieger Stephen & Gazzaley Adam - forthcoming - Behavioral and Brain Sciences.
    Passive frame theory attempts to illuminate what consciousness is, in mechanistic and functional terms; it does not address the “implementation” level of analysis (how neurons instantiate conscious states), an enigma for various disciplines. However, in response to the commentaries, we discuss how our framework provides clues regarding this enigma. In the framework, consciousness is passive albeit essential. Without consciousness, there would not be adaptive skeletomotor action.
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  43.  87
    Genetic Privacy: A Challenge to Medico-Legal Norms.Graeme Laurie - 2002 - New York: Cambridge University Press.
    The phenomenon of the New Genetics raises complex social problems, particularly those of privacy. This book offers ethical and legal perspectives on the questions of a right to know and not to know genetic information from the standpoint of individuals, their relatives, employers, insurers and the state. Graeme Laurie provides a unique definition of privacy, including a concept of property rights in the person, and argues for stronger legal protection of privacy in the shadow of developments in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  44. Privacy.Edmund Byrne - 1998 - In Encyclopedia of Applied Ethics. San Diego: Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  45. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  46. Bodily Privacy, Toilets, and Sex Discrimination: The Problem of "Manhood" in a Women's Prison.Jami L. Anderson - 2009 - In Olga Gershenson Barbara Penner (ed.), Ladies and Gents. pp. 90.
    Unjustifiable assumptions about sex and gender roles, the untamable potency of maleness, and gynophobic notions about women's bodies inform and influence a broad range of policy-making institutions in this society. In December 2004, the U.S. Court of Appeals for the Sixth Circuit continued this ignoble cultural pastime when they decided Everson v. Michigan Department of Corrections. In this decision, the Everson Court accepted the Michigan Department of Correction's claim that “the very manhood” of male prison guards both threatens the safety (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Privacy. An intercultural perspective.Rafael Capurro - 2005 - Ethics and Information Technology 7 (1):37-47.
    This paper deals with intercultural aspects of privacy, particularly with regard to differences between Japanese and Western conceptions. It starts with a reconstruction of the genealogy of Western subjectivity and human dignity as the basic assumptions underlying Western views on privacy. An analysis of the Western concept of informational privacy is presented. The Japanese topic of ‘‘denial of self” (Musi) as well as the concepts of Seken, Shakai and Ikai (as analyzed by the authors of the companion (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  48.  33
    Privacy Rights Forfeiture.Mark Hanin - 2022 - Journal of Ethics and Social Philosophy 22 (2).
    Privacy rights can surely be waived. But can they also be forfeited? If so, why and under what conditions? This article takes up these questions by developing a novel theory of privacy rights forfeiture that draws inspiration from Judith Thomson’s canonical work on privacy. The paper identifies two species of forfeiture rooted in modes of negligent and reckless conduct and argues that both self-directed and other-regarding considerations play a role in grounding forfeiture. The paper also contributes to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49.  67
    Why Privacy Isn't Everything: Feminist Reflections on Personal Accountability.Anita L. Allen - 2003 - Rowman & Littlefield Publishers.
    Accountability protects public health and safety, facilitates law enforcement, and enhances national security, but it is much more than a bureaucratic concern for corporations, public administrators, and the criminal justice system. In Why Privacy Isn't Everything, Anita L. Allen provides a highly original treatment of neglected issues affecting the intimacies of everyday life, and freshly examines how a preeminent liberal society accommodates the competing demands of vital privacy and vital accountability for personal matters. Thus, "None of your business!" (...)
  50. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   8 citations  
1 — 50 / 999