Results for 'covert surveillance'

992 found
Order:
  1.  16
    Trust, Covert Surveillance and Fiduciary Obligations.Wayne Vaught - 2003 - Philosophy in the Contemporary World 10 (1):87-92.
    Health professionals, by agreeing to provide care, accept a fiduciary role that entails an obligation to preserve trust. We trust health professionals to be competent, to promote patient interests, and to properly utilize their discretionary power. While some health professionals argue that such activities as secretly screening for drugs or sexually transmitted diseases are necessary to fulfill their fiduciary obligations, these may actually constitute a breach of trust. In this paper, I argue that, in the specific case of Munchausen’s Syndrome (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  26
    Covert surveillance by doctors for life-threatening Munchausen's syndrome by proxy.R. Gillon - 1995 - Journal of Medical Ethics 21 (3):131-132.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  75
    Covert video surveillance--an assessment of the Staffordshire protocol.T. Thomas - 1996 - Journal of Medical Ethics 22 (1):22-25.
    An assessment of a protocol devised to guide practitioners thinking of using covert video surveillance. Such surveillance is particularly used to help identify cases of Munchausen's syndrome by proxy. The protocol in question has been written by staff at the Academic Department of Paediatrics, North Staffordshire Hospital, Stoke-on-Trent in association with their local Area Child Protection Committee and has been commended by the Department of Health to others wishing to implement covert video surveillance.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  4.  61
    Covert video surveillance -- a response to Professor Southall and Dr. Samuels.D. Evans - 1996 - Journal of Medical Ethics 22 (1):29-31.
    In their reply to my recent paper on Munchausen's syndrome by proxy, Professor Southall and Dr. Samuels concede that some things may be learned from my observations. They do not attend to the main argument of the paper, however, that the proportion of research interest in their use of covert video surveillance merits consideration of the research protocol by an independent research ethics committee. It will not do simply to assert that the use of this technology for the (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  5.  51
    Covert video surveillance and the principle of double effect: a response to criticism.E. A. Shinebourne - 1996 - Journal of Medical Ethics 22 (1):26-31.
    In some young children brought by their parents for diagnosis of acute life-threatening events investigations suggested imposed apnoea as the cause rather than spontaneous occurrence. Covert video surveillance of the cot in which the baby was monitored allowed confirmation or rebuttal of this diagnosis. That parents were not informed of the video recording was essential for diagnosis and we assert ethically justifiable as the child was the patient to whom a predominant duty of care was owed. The procedure (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  6.  43
    Covert video surveillance: the Staffordshire Protocol--a response to Dr Shinebourne.T. Thomas - 1996 - Journal of Medical Ethics 22 (6):349-351.
    This paper is a response to Dr Shinebourne's response to my recent paper assessing the relative merits of the Staffordshire Protocol on covert video surveillance. Dr Shinebourne does not take the opportunity to rebut the criticisms made of the text of the protocol. It is further suggested that judicial oversight of the use of CVS might accord the process a degree of proportionality.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  7.  62
    Covert video surveillance of parents suspected of child abuse: The british experience and alternative approaches. [REVIEW]Keith Bauer - 2004 - Theoretical Medicine and Bioethics 25 (4):311-327.
    One million cases of child maltreatment and twelve hundred child deaths due to abuse and neglect occur per year. But since many cases of abuse and neglect remain either unreported or unsubstantiated due to insufficient evidence, the number of children who are abused, neglected, and killed at the hands of family caregivers is probably higher. One approach to combat child abuse in the U.K. has been the employment of hospital-based covert video surveillance (CVS) to monitor parents suspected of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  8. Covert video surveillance continues to provoke debate.E. A. Shinebourne - 1996 - Journal of Medical Ethics 22 (6):351-351.
    When the editor invites comment on a response to an analysis of a criticism of a protocol already defended by the author in this journal, the issue is clearly contentious. I will comment briefly on Thomas's paper in this issue of the journal, and look at points of agreement as well as dissent.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  9.  66
    Some ethical issues surrounding covert video surveillance--a response.D. P. Southall & M. P. Samuels - 1995 - Journal of Medical Ethics 21 (2):104-115.
    In a recent article in this journal our unit was accused of a number of errors of judgment in applying covert video surveillance (CVS) to infants and children suspected of life-threatening abuse. The article implied, that on moving from the Royal Brompton Hospital in London to North Staffordshire Hospital, we failed to present our work to the Research Ethics Committee (REC). We did send our protocol to the REC though we did not consider that, after a total of (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  10.  13
    Covert Video Surveillance in Pediatric Care: The Fiduciary Relationship with a Child.Steven R. Leuthner - 2004 - Journal of Clinical Ethics 15 (2):173-175.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  47
    Internet surveillance after Snowden.Christian Fuchs & Daniel Trottier - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):412-444.
    PurposeThis paper aims to present results of a study that focused on the question of how computer and data experts think about Internet and social media surveillance after Edward Snowden’s revelations about the existence of mass-surveillance systems of the Internet such as Prism, XKeyscore and Tempora. Computer and data experts’ views are of particular relevance because they are confronted day by day with questions about the processing of personal data, privacy and data protection.Design/methodology/approachThe authors conducted two focus groups (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  12.  11
    Case Study: Covert Video Surveillance in Pediatric Care.Wayne Vaught & Janet Fleetwood - 2002 - Hastings Center Report 32 (6):10.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  22
    Parents, Lies, and Videotape: Covert Video Surveillance in Pediatric Care.Wayne Vaught - 2004 - Journal of Clinical Ethics 15 (2):161-172.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  4
    Symposium on covert video surveillance: Guidelines for the multi-agency management of patients suspected or at risk of suffering from life-threatening abuse resulting in cyanotic-apnoeic episodes.David P. Southall & Martin P. Samuels - 1996 - Journal of Medical Ethics 22 (1):16-21.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  6
    Symposium on covert video surveillance-Covert video surveillance-A reply.D. P. Southall & M. P. Samuels - 1996 - Journal of Medical Ethics 22 (1):32-32.
  16.  19
    Reply to Dr. Evans re covert video surveillance.D. P. Southall & M. P. Samuels - 1996 - Journal of Medical Ethics 22 (1):32-32.
  17.  47
    Ethical issues in the use of Covert video surveillance in the diagnosis of munchausen syndrome by proxy: The atlanta study - an ethical challenge for medecine. [REVIEW]Robert Connelly - 2003 - HEC Forum 15 (1):21-41.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Spyware – the ethics of Covert software.Mathias Klang - 2004 - Ethics and Information Technology 6 (3):193-202.
    Many computer users are happy to be oblivious of the workings within the machine and yet on some level it is important to know what is occurring therein. This paper discusses an unusual type of surveillance software which may be installed in many computers. The strange aspect of this software is that it has often been downloaded and installed by the user, but without her knowledge. The software is mainly designed to collect information about the user of the computer (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  6
    The Fog of Peace: War on Terror, Surveillance States, and Post-human Governance.Nandita Biswas Mellamphy - 2023 - Washington University Review of Philosophy 3:63-82.
    The War on Terror is an ambiguous term that has been used to circumvent the international laws of warfare. Instead of moving toward peace by way of limited warfare, and instead of preserving the independence of war and peace, War on Terror advances by masking itself in a fog of peace; it proliferates by overlapping the logic of “war-time” and “peace-time” operations. The fog of peace—as it shall herein be called—is a condition wherein the uncertainty qua “fog” of war,2 along (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  16
    Facial Recognition in War Contexts: Mass Surveillance and Mass Atrocity.Juan Espindola - 2023 - Ethics and International Affairs 37 (2):177-192.
    The use of facial recognition technology (FRT) as a form of intelligence has recently made a prominent public appearance in the theater of war. During the early months of Russia's invasion of Ukraine, Ukrainian authorities relied on FRT as part of the country's defensive activities, harnessing the technology for a variety of purposes, such as unveiling covert Russian agents operating amid the Ukrainian population; revealing the identity of Russian soldiers who committed war crimes; and even identifying dead Russian soldiers. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  41
    Privacy in the Family.Bryce Clayton Newell, Cheryl A. Metoyer & Adam Moore - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 104-121.
    While the balance between individual privacy and government monitoring or corporate surveillance has been a frequent topic across numerous disciplines, the issue of privacy within the family has been largely ignored in recent privacy debates. Yet privacy intrusions between parents and children or between adult partners or spouses can be just as profound as those found in the more “public spheres” of life. Popular access to increasingly sophisticated forms of electronic surveillance technologies has altered the dynamics of family (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  22.  16
    Nanomedicine–emerging or re-emerging ethical issues? A discussion of four ethical themes.Christian Lenk & Nikola Biller-Andorno - 2007 - Medicine, Health Care and Philosophy 10 (2):173-184.
    Nanomedicine plays a prominent role among emerging technologies. The spectrum of potential applications is as broad as it is promising. It includes the use of nanoparticles and nanodevices for diagnostics, targeted drug delivery in the human body, the production of new therapeutic materials as well as nanorobots or nanoprotheses. Funding agencies are investing large sums in the development of this area, among them the European Commission, which has launched a large network for life-sciences related nanotechnology. At the same time government (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  23. Truth, trust and medicine.Jennifer C. Jackson - 2001 - New York: Routledge.
    Truth, Trust and Medicine investigates the notion of trust and honesty in medicine, and questions whether honesty and openness are of equal importance in maintaining the trust necessary in doctor-patient relationships. Jackson begins with the premise that those in the medical profession have a basic duty to be worthy of the trust their patients place in them. Yet questions of the ethics of withholding information and consent and covert surveillance in care units persist. This book boldly addresses these (...)
     
    Export citation  
     
    Bookmark   13 citations  
  24. The Virtuous Spy.Anita L. Allen - 2008 - The Monist 91 (1):3-22.
    Is there any reason not to spy on other people as necessary to get the facts straight, especially if you can put the facts you uncover to good use? To “spy” is secretly to monitor or investigate another's beliefs, intentions, actions, omissions, or capacities, especially as revealed in otherwise concealed or confidential conduct, communications and documents. By definition, spying involves secret, covert activity, though not necessarily lies, fraud or dishonesty. Nor does spying necessarily involve the use of special equipment, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  25.  20
    The Role of Moral Experts in Secret Policy.Lars Christie - 2023 - Res Publica 30 (1):107-123.
    Is it morally permissible to spy on allied countries? What type of otherwise criminal acts may covert intelligence agents commit in order to keep their cover? Is it permissible to subject children of high-value targets to covert surveillance? In this article, I ask whether democratically elected politicians ought to rely on advice from ethics committees in answering moral choices in secret policy. I argue that ethics committees should not advise politicians on how they ought to conclude secret (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation (...)
    Direct download  
     
    Export citation  
     
    Bookmark   33 citations  
  27.  53
    The investigation of life-threatening child abuse and Munchausen syndrome by proxy.D. Evans - 1995 - Journal of Medical Ethics 21 (1):9-13.
    The use of covert video surveillance in the investigation of suspected life-threatening child abuse and Munchausen syndrome by proxy raises important ethical questions. That the recently reported provision of this facility in North Staffordshire was not presented to a Local Research Ethics Committee (LREC) for approval as a research exercise raises important questions about the ethical review of research and practice. The case made for avoiding such review is first set out and then examined. The three main premisses (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  28. Whistleblowing as civil disobedience.William E. Scheuerman - 2014 - Philosophy and Social Criticism 40 (7):609-628.
    The media hoop-la about Edward Snowden has obscured a less flashy yet more vital – and philosophically relevant – part of the story, namely the moral and political seriousness with which he acted to make the hitherto covert scope and scale of NSA surveillance public knowledge. Here I argue that we should interpret Snowden’s actions as meeting most of the demanding tests outlined in sophisticated political thinking about civil disobedience. Like Thoreau, Gandhi, King and countless other grass-roots activists, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  29. From a View to a Kill.Derek Gregory - 2011 - Theory, Culture and Society 28 (7-8):188-215.
    The proponents of late modern war like to argue that it has become surgical, sensitive and scrupulous, and remotely operated Unmanned Aerial Vehicles or ‘drones’ have become diagnostic instruments in contemporary debates over the conjunction of virtual and ‘virtuous’ war. Advocates for the use of Predators and Reapers in counterinsurgency and counterterrorism campaigns have emphasized their crucial role in providing intelligence, reconnaissance and surveillance, in strengthening the legal armature of targeting, and in conducting precision-strikes. Critics claim that their use (...)
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  30.  26
    Cyber Warfare Ethics.Michael Skerker & David Whetham (eds.) - 2021 - Howgate Publishing.
    Cyber technology gives states the ability to accomplish effects that once required kinetic action. These effects can now be achieved with cyber means in a manner that is covert, deniable, cheap, and technologically feasible for many governments. In some cases, cyber means are morally preferable to conventional military operations, but in other cases, cyber's unique qualities can lead to greater mischief than governments would have chanced using kinetic means. This volume addresses the applicability of traditional military ethics to cyber (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  5
    Following Snowden: a cross-cultural study on the social impact of Snowden’s revelations.Kiyoshi Murata, Andrew A. Adams & Ana María Lara Palma - 2017 - Journal of Information, Communication and Ethics in Society 15 (3):183-196.
    Purpose This paper aims to introduce a cross-cultural study of the views and implications of Snowden’s revelations about NSA/GCHQ surveillance practices, undertaken through surveys administered in eight countries. The aims and academic and social significance are explained, and justification is offered for the methods used. Design/methodology/approach Pilot surveys were deployed in two countries, following which revised versions were deployed in eight countries. Quantitative analysis of suitable answer sets and quantitative analysis were performed. Findings Through the pilot survey studies conducted (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  18
    Knowing who to trust: women and public health.Cressida Auckland - 2022 - Journal of Medical Ethics 48 (8):501-503.
    In this issue of the JME, age-old questions around how to balance the interests of mother and fetus are revisited in two separate contexts: alcohol consumption during pregnancy, and maternal request caesarean sections. Both have been the subject of recent controversy in the UK, with March 2022 seeing the introduction of new National Institute for Clinical Excellence Quality Standards on combatting foetal alcohol spectrum disorder 1; and the publication of the long-awaited Ockenden Review into a series of failures in NHS (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33. Privacy and perfect voyeurism.Tony Doyle - 2009 - Ethics and Information Technology 11 (3):181-189.
    I argue that there is nothing wrong with perfect voyeurism , covert watching or listening that is neither discovered nor publicized. After a brief discussion of privacy I present attempts from Stanley Benn, Daniel Nathan, and James Moor to show that the act is wrong. I argue that these authors fail to make their case. However, I maintain that, if detected or publicized, voyeurism can do grave harm and to that extent should be severely punished. I conclude with some (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  34.  11
    Protecting the Continuing Duties of Loyalty and Confidentiality in Ineffective Assistance of Counsel Claims.Lawrence J. Fox, Darcy Covert & Megan Mumford - 2020 - Criminal Justice Ethics 39 (1):23-53.
    The success or failure of an ineffective assistance of counsel claim turns largely on the testimony of trial counsel. It is therefore common for the government to communicate ex parte with trial co...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  37
    Book Review Section 3. [REVIEW]Patricia R. Lawler, Ann Byrne von Hoffman, Thomas A. Barlow, David O. Porter, Teddie W. Porter, D. L. Bachelor, James R. Covert, Joan L. Roberts, Roy R. Nasstrom, Cole S. Brembeck, Lois S. Steinbert, John S. Packard, A. L. Sebaley, James Steve Counelis, Stephen P. Philips, Stephen W. Brown, Hector Correa & Robert E. Taylor - 1974 - Educational Studies 5 (1-2):64-78.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  29
    Book Review Section 3. [REVIEW]Patricia R. Lawler, Ann Byrne von Hoffman, Thomas A. Barlow, David O. Porter, Teddie W. Porter, D. L. Bachelor, James R. Covert, Joan L. Roberts, Roy R. Nasstrom, Cole S. Brembeck, Lois S. Steinbert, John S. Packard, A. L. Sebaley, James Steve Counelis, Stephen P. Philips, Stephen W. Brown, Hector Correa & Robert E. Taylor - 1974 - Educational Studies: A Jrnl of the American Educ. Studies Assoc 5 (1&2):64-78.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  50
    An ethics for the new surveillance (abstract).Gary T. Marx - 1998 - Acm Sigcas Computers and Society 28 (2):1.
    The Principles of Fair Information Practice are almost three decades old and need to be broadened to take account of new technologies for collecting personal information such as drug testing, video cameras, electronic location monitoring and the internet. I argue that the ethics of surveillance activity must be judged according to the means, the context and conditions of data collection and the uses/goals and suggest 29 questions related to this. The more one can answer these questions in a way (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  38.  15
    Covert Moral Enhancement: Are Dirty Hands Needed to Save the Planet?Gabriel Andrade - forthcoming - Ethics, Policy and Environment.
    Michael Walzer’s article ‘Political action: the problem of dirty hands’ initiated a new wave of discussion over a persistent problem in moral philosophy: are there situations in which ethical rules must be relaxed so as to bring about a greater good? In this article, we consider whether this ‘dirty hands’ approach may be applied to our current climate crisis. One proposed solution to the problem of global warming is the administration of moral enhancements to the population. Assuming that the administration (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39. Covert Mixed Quotation.Cameron Domenico Kirk-Giannini - 2024 - Semantics and Pragmatics 17 (5):1-52.
    The term 'covert mixed quotation' describes cases in which linguistic material is interpreted in the manner of mixed quotation — that is, used in addition to being mentioned — despite the superficial absence of any commonly recognized conventional devices indicating quotation. After developing a novel theory of mixed quotation, I show that positing covert mixed quotation allows us to give simple and unified treatments of a number of puzzling semantic phenomena, including the projective behavior of conventional implicature items (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40. On Covert Civil Disobedience and Animal Rescue.Daniel Weltman - 2023 - Journal of Ethics and Social Philosophy 25 (2).
    Tony Milligan argues that some forms of covert non-human animal rescue, wherein activists anonymously and illegally free non-human animals from confinement, should be understood as acts of civil disobedience. However, most traditional understandings of civil disobedience require that the civil disobedient act publicly rather than covertly. Thus Milligan’s proposal is that we revise our understanding of civil disobedience to allow for covert in addition to public disobedience. I argue we should not. Milligan cannot justify using paradigm cases to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  41. Just Surveillance? Towards a Normative Theory of Surveillance.Kevin Macnish - 2014 - Surveillance and Society 12 (1):142-153.
    Despite recent growth in surveillance capabilities there has been little discussion regarding the ethics of surveillance. Much of the research that has been carried out has tended to lack a coherent structure or fails to address key concerns. I argue that the just war tradition should be used as an ethical framework which is applicable to surveillance, providing the questions which should be asked of any surveillance operation. In this manner, when considering whether to employ (...), one should take into account the reason for the surveillance, the authority of the surveillant, whether or not there has been a declaration of intent, whether surveillance is an act of last resort, what is the likelihood of success of the operation and whether surveillance is a proportionate response. Once underway, the methods of surveillance should be proportionate to the occasion and seek to target appropriate people while limiting surveillance of those deemed inappropriate. By drawing on the just war tradition, ethical questions regarding surveillance can draw on a long and considered discourse while gaining a framework which, I argue, raises all the key concerns and misses none. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  42. Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  43.  36
    Covert treatment in psychiatry: Do no harm, true, but also dare to care.Ajai R. Singh - 2008 - Mens Sana Monographs 6 (1):81.
    _Covert treatment raises a number of ethical and practical issues in psychiatry. Viewpoints differ from the standpoint of psychiatrists, caregivers, ethicists, lawyers, neighbours, human rights activists and patients. There is little systematic research data on its use but it is quite certain that there is relatively widespread use. The veil of secrecy around the procedure is due to fear of professional censure. Whenever there is a veil of secrecy around anything, which is aided and abetted by vociferous opposition from some (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  44.  28
    Covert moral bioenhancement, public health, and autonomy.Alexander Zambrano - 2019 - Bioethics 33 (6):725-728.
    In a recent article in this journal, Parker Crutchfield argues that if moral bioenhancement ought to be compulsory, as some authors claim, then it ought to be covert, i.e., performed without the knowledge of the population that is being morally enhanced. Crutchfield argues that since the aim of compulsory moral bioenhancement is to prevent ultimate harm to the population, compulsory moral bioenhancement is best categorized as a public health issue, and should therefore be governed by the norms and values (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45. Covert Animal Rescue: Civil Disobedience or Subrevolution?Daniel Weltman - 2022 - Environmental Ethics 44 (1):61-83.
    We should conceive of illegal covert animal rescue as acts of “subrevolution” rather than as civil disobedience. Subrevolutions are revolutions that aim to overthrow some part of the government rather than the entire government. This framework better captures the relevant values than the opposing suggestion that we treat illegal covert animal rescue as civil disobedience. If animals have rights like the right not to be unjustly imprisoned and mistreated, then it does not make sense that an instance of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  35
    AI Surveillance during Pandemics: Ethical Implementation Imperatives.Carmel Shachar, Sara Gerke & Eli Y. Adashi - 2020 - Hastings Center Report 50 (3):18-21.
    Artificial intelligence surveillance can be used to diagnose individual cases, track the spread of Covid‐19, and help provide care. The use of AI for surveillance purposes (such as detecting new Covid‐19 cases and gathering data from healthy and ill individuals) in a pandemic raises multiple concerns ranging from privacy to discrimination to access to care. Luckily, there exist several frameworks that can help guide stakeholders, especially physicians but also AI developers and public health officials, as they navigate these (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  37
    Surveillance, Self and Smartphones: Tracking Practices in the Nightlife.Tjerk Timan & Anders Albrechtslund - 2018 - Science and Engineering Ethics 24 (3):853-870.
    This paper is the result of the EMERGING ICT FOR CITIZEN VEILLANCE-workshop organized by the JRC, Ispra, Italy, March 2014. The aim of this paper is to explore how the subject participates in surveillance situations with a particular focus on how users experience everyday tracking technologies and practices. Its theoretical points of departure stem from Surveillance Studies in general and notions of participatory surveillance and empowering exhibitionism :199–215, 2004) in particular. We apply these theoretical notions on smartphones (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  4
    Convict Surveillance and Reform in Theory and Practice.Matthew Allen - 2022 - Revue D’Études Benthamiennes 21.
    Thanks to Michel Foucault, Jeremy Bentham's panopticon has become the iconic modern prison. But Foucault and most of his readers neglect the fact that a significant proportion of Bentham's panoptical writings were concerned with critically contrasting his ideal prison with the reality of penal transportation to New South Wales. Among his many criticisms, Bentham focussed particular attention on the problem of convict reform, arguing that surveillance was necessary to ensure genuine reformation, and that such surveillance was impossible in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  43
    Surveillance and persuasion.Michael Nagenborg - 2014 - Ethics and Information Technology 16 (1):43-49.
    This paper is as much about surveillance as about persuasive technologies (PTs). With regard to PTs it raises the question about the ethical limits of persuasion. It will be argued that even some forms of self-imposed persuasive soft surveillance technologies may be considered unethical. Therefore, the ethical evaluation of surveillance technologies should not be limited to privacy issues. While it will also be argued that PTs may become instrumental in pre-commitment strategies, it will also be demonstrated that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  38
    Answering questions about consciousness by modeling perception as covert behavior.Gustav Markkula - 2015 - Frontiers in Psychology 6.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 992