Results for 'privacy'

981 found
Order:
  1. The nature and value of the.Moral Right To Privacy - 2002 - Public Affairs Quarterly 16 (4):329.
     
    Export citation  
     
    Bookmark  
  2. Respecting Context to Protect Privacy: Why Meaning Matters.Helen Nissenbaum - 2018 - Science and Engineering Ethics 24 (3):831-852.
    In February 2012, the Obama White House endorsed a Privacy Bill of Rights, comprising seven principles. The third, “Respect for Context,” is explained as the expectation that “companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data.” One can anticipate the contested interpretations of this principle as parties representing diverse interests vie to make theirs the authoritative one. In the paper I will discuss three possibilities and explain (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  3. Information technology, privacy, and the protection of personal data.Jeroen Van Den Hoven - 2008 - In M. J. van den Joven & J. Weckert, Information Technology and Moral Philosophy. Cambridge University Press.
    Direct download  
     
    Export citation  
     
    Bookmark   16 citations  
  4.  35
    Trust and privacy in the context of user-generated health data.Brandon Williams, Eliot Storer, Charles Lotterman, Rachel Conrad Bracken, Svetlana Borodina & Kirsten Ostherr - 2017 - Big Data and Society 4 (1).
    This study identifies and explores evolving concepts of trust and privacy in the context of user-generated health data. We define “user-generated health data” as data captured through devices or software and used outside of traditional clinical settings for tracking personal health data. The investigators conducted qualitative research through semistructured interviews with researchers, health technology start-up companies, and members of the general public to inquire why and how they interact with and understand the value of user-generated health data. We found (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  5.  7
    There Is No Ethical Automation: Stanislav Petrov’s Ordeal by Protocol.Technology Antón Barba-Kay A. Center on Privacy, Usab Institute for Practical Ethics Dc, Usaantón Barba-Kay is Distinguished Fellow at the Center on Privacy Ca, Hegel-Studien Nineteenth Century European Philosophy Have Appeared in the Journal of the History of Philosophy, Among Others He has Also Published Essays About Culture The Review of Metaphysics, Commonweal Technology for A. Broader Audience in the New Republic & Other Magazines A. Web of Our Own Making – His Book About What the Internet Is The Point - 2024 - Journal of Military Ethics 23 (3):277-288.
    While the story of Stanislav Petrov – the Soviet Lieutenant Colonel who likely saved the world from nuclear holocaust in 1983 – is often trotted out to advocate for the view that human beings ought to be kept “in the loop” of automated weapons’ responses, I argue that the episode in fact belies this reading. By attending more closely to the features of this event – to Petrov’s professional background, to his familiarity with the warning system, and to his decisions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  22
    A client-side approach for privacy-preserving identity federation.Sébastien Canard, Eric Malville & Jacques Traoré - 2009 - Identity in the Information Society 2 (3):269-295.
    Providing Single Sign-On (SSO) between service providers and enabling service providers to share user personal attributes are critical for both users to benefit from a seamless access to their services, and service providers to realize new business opportunities. Today, however, the users have several independent, partial identities spread over different service providers. Providing SSO and attribute sharing requires that links (federations) are established between (partial) identities. In SAML 2.0 (Maler et al. 2003), the links between identities are stored and managed (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  7.  22
    Response to Open Peer Commentaries on Toward a Framework for Assessing Privacy Risks in Multi-Omic Research and Databases.Charles Dupras & Eline M. Bunnik - 2022 - American Journal of Bioethics 22 (9):4-6.
    In ‘Toward a Framework for Assessing Privacy Risks in Multi-Omic Research and Databases’ (Dupras and Bunnik 2021), we argued against the assessment of privacy risks and protection requirements base...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  57
    Genetic Privacy.Lawrence O. Gostin - 1995 - Journal of Law, Medicine and Ethics 23 (4):320-330.
    Human genomic information is invested with enormous power in a scientifically motivated society. Genomic information has the capacity to produce a great deal of good for society. It can help identify and understand the etiology and pathophysiology of disease. In so doing, medicine and science can expand the ability to prevent and ameliorate human malady through genetic testing, treatment, and reproductive counseling.Genomic information can just as powerfully serve less beneficent ends. Information can be used to discover deeply personal attributes of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  9.  42
    The study of database design must address privacy concerns.Florence Appel - 2006 - Journal of Information, Communication and Ethics in Society 4 (3):155-161.
    The proliferation of electronic databases has given rise to many practices and occurrences that pose serious threats to personal privacy. This paper argues that attention to privacy should be an integral part of the database design process, and that database designers are uniquely positioned to ensure that this happens. To motivate students to become privacy‐conscious database design professionals, computer science programs must meet the challenges of implementing an “ethics across the curriculum” methodology to integrate privacy content (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  10. A new definition of privacy for the law.W. A. Parent - 1983 - Law and Philosophy 2 (3):305 - 338.
    The paper begins with a defence of a new definition of privacy as the absence of undocumented personal knowledge. In the middle section, I criticise alternative accounts of privacy. Finally, I show how my definition can be worked into contemporary American Law.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  11. Chapter outline.A. Myth Versus Reality, D. Publicity not Privacy, E. Guilty Until Proven Innocent, J. Change & Rotation Mentality - forthcoming - Moral Management: Business Ethics.
    No categories
     
    Export citation  
     
    Bookmark  
  12. What Is Protected By The Right To Privacy?Geoffrey Marshall - 1995 - Jahrbuch für Recht Und Ethik 3.
    Arguments about constitutional and personal rights often invoke the concept of privacy. In the United States it has been said that the constitution "embodies a promise that a certain private sphere of individual liberty will be kept largely beyond the reach of government". A number of formulae has been invoked in an attempt to define the sphere of constitutional privacy. They include: Fundamental rights of interests; personal decisions and issues; important questions intimately affecting private lives; and decisions affecting (...)
    No categories
     
    Export citation  
     
    Bookmark  
  13.  33
    Privacy, Confidentiality, and Justice.John G. Francis & Leslie P. Francis - 2014 - Journal of Social Philosophy 45 (3):408-431.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  14. Two Faces of the Right to Privacy in Litigators' Ethics.Gary Chartier - 2006 - Litigation Ethics 4 (2):1+.
    Explores a tension between clients' rights to informational privacy and lawyers' rights to flourishing privates lives.
     
    Export citation  
     
    Bookmark  
  15.  51
    Sperm Donation and the Right to Privacy.Oliver Hallich - 2017 - The New Bioethics 23 (2):107-120.
    Sperm donation is an increasingly common method of assisted reproduction. In the debate on sperm donation, the right to privacy — construed as a right that refers to the limits of the realm of information to which others have access — plays a pivotal role with regard to two questions. The first question is whether the sperm donor’s right to privacy implies his right to retain his anonymity, the second is whether the gamete recipients’ right to privacy (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  83
    The scope of privacy in law and ethics.Judith Wagner DeCew - 1986 - Law and Philosophy 5 (2):145-173.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  17.  59
    Privacy and self-incrimination.Robert S. Gerstein - 1970 - Ethics 80 (2):87-101.
  18.  46
    Covering Public Officials: Gender and Privacy Issue Differences.Bruce Garrison & Sigman Splichal - 2000 - Journal of Mass Media Ethics 15 (3):167-179.
    This article reports the results of two national studies of daily newspaper newsroom managers and their views about coverage of the private lives of politicians and political candidates. The data were collected in 1993 and 1999. The focus of this analysis is on differences between male and female newsroom managers. Studies in both years found some statistical differences between male and female editors, but on different variables from study to study. Overall results, however, found no broad support for the premise (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Privacy and Confidentiality.Leslie Pickering Francis - 2008 - The Monist 91 (1):52-67.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  20.  30
    Natural Law, Slavery, and the Right to Privacy Tort.Anita Allen - unknown
    In 1905 the Supreme Court of Georgia became the first state high court to recognize a freestanding “right to privacy” tort in the common law. The landmark case was Pavesich v. New England Life Insurance Co. Must it be a cause for deep jurisprudential concern that the common law right to privacy in wide currency today originated in Pavesich’s explicit judicial interpretation of the requirements of natural law? Must it be an additional worry that the court which originated (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  26
    The Islamic and Western Cultures and Values of Privacy.Sattam Eid Almutairi - 2019 - Muslim World Journal of Human Rights 16 (1):51-80.
    The paper provides valuable accounts of the general concepts underlying privacy law in both cultures, and great detail about the impact of criminal procedure and evidence rules on privacy in reality rather than legal theory. It is, in this sense, a “realist” approach to privacy, particularly but not exclusively in relation to sexual activity. The distinction which the article draws between the frameworks within which privacy is conceived broadly, self-determination and limited government in the USA, protection (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  14
    Hannah Arendt’s Concept of Privacy and its Norms. 김선욱 - 2020 - Cheolhak-Korean Journal of Philosophy 143:57-86.
    이 논문의 목적은 프라이버시 개념에 내재한 규범성을 드러내 보이는 데 있다. 이를 위해 먼저 아렌트의 프라이버시 개념을 분석하고, 친밀성의 프라이버시 주장과 인권의 충돌에 대해 살펴본 뒤, 개인의 프라이버시 문제를 공간 프라이버시, 자기결정의 프라이버시, 그리고 정보 프라이버시로 나누어 각각의 경우의 규범성을 점검한다. 아렌트는 가장 사적인 영역인 프라이버시가 가장 정치적인 중요성을 갖고 있음을 보여준다. 개인 프라이버시의 영역에서 정보 프라이버시는 한국이나 미국에서 헌법적 권리로 존중되지 않고 공익의 관점에서만 다루어진다. 현대에는 개인과 관련된 정보를 효과적으로 관리하여 국민의 복리를 도모하는 것을 정부의 중요한 역할 가운데 하나로 (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  79
    Policy recommendations for addressing privacy challenges associated with cell-based research and interventions.Ubaka Ogbogu, Sarah Burningham, Adam Ollenberger, Kathryn Calder, Li Du, Khaled El Emam, Robyn Hyde-Lay, Rosario Isasi, Yann Joly, Ian Kerr, Bradley Malin, Michael McDonald, Steven Penney, Gayle Piat, Denis-Claude Roy, Jeremy Sugarman, Suzanne Vercauteren, Griet Verhenneman, Lori West & Timothy Caulfield - 2014 - BMC Medical Ethics 15 (1):7.
    The increased use of human biological material for cell-based research and clinical interventions poses risks to the privacy of patients and donors, including the possibility of re-identification of individuals from anonymized cell lines and associated genetic data. These risks will increase as technologies and databases used for re-identification become affordable and more sophisticated. Policies that require ongoing linkage of cell lines to donors’ clinical information for research and regulatory purposes, and existing practices that limit research participants’ ability to control (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24.  77
    Who should know what?: social science, privacy, and ethics.John Arundel Barnes - 1979 - New York [etc.]: Penguin Books.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  49
    Intimacy, Privacy and Publicity.Ernesto Garzón Valdés - 2003 - Analyse & Kritik 25 (1):17-40.
    The article analyses the distinction between the private and the public sphere from a conceptual and from a normative point of view. On the conceptual level, it is argued that the common dichotomous view is incomplete, giving rise to conceptual confusions which can be overcome by a careful distinction between the intimate and the private sphere. While the boundary between the private and the public is a conventional matter, the sphere of intimacy, including thoughts as well as a certain type (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  71
    Intentionality and Privacy.C. W. Webb - 1987 - Idealistic Studies 17 (2):97-107.
    The two words, except ‘and,’ in the title of this paper are meant to bring to mind two different philosophical claims that, I believe, are intimately related. Both have occasioned much controversy. The relation between them, however, has not been widely recognized. The first claim is the contention that is often expressed by saying that ‘consciousness is always consciousness of something.’ The second claim is the assertion that mental things are distinguished from physical things by their being inherently private. I (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27. 'The Subject of Privacy': A Comment on Moira Gatens.W. Brown - 2004 - In Beate Rössler, Privacies: philosophical evaluations. Stanford, Calif.: Stanford University Press. pp. 133--41.
     
    Export citation  
     
    Bookmark   1 citation  
  28. Chances of Privacy and Trust within the Development of Ubiquitous Computing.J. Heesen & O. Siemoneit - 2007 - International Review of Information Ethics 8.
     
    Export citation  
     
    Bookmark  
  29. Wittgenstein on the Privacy of Sensation.Jack Temkin - 1976 - Dissertation, The University of Wisconsin - Madison
     
    Export citation  
     
    Bookmark  
  30.  8
    A value-centered exploration of data privacy and personalized privacy assistants.Sarah E. Carter - 2022 - Digital Society 1 (27).
    In the current post-GDPR landscape, privacy notices have become ever more prevalent on our phones and online. However, these notices are not well suited to their purpose of helping users make informed decisions. I suggest that instead of utilizing notice to elicit informed consent, we could repurpose privacy notices to create the space for more meaningful, value-centered user decisions. Value-centered privacy decisions, or those that accurately reflect who we are and what we value, encapsulate the intuitive role (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  23
    Care ethics and the responsible management of power and privacy in digitally enhanced disaster response.Paul Hayes & Damian Jackson - 2020 - Journal of Information, Communication and Ethics in Society 18 (1):157-174.
    PurposeThis paper aims to argue that traditional ethical theories used in disaster response may be inadequate and particularly strained by the emergence of new technologies and social media, particularly with regard to privacy. The paper suggests incorporation of care ethics into the disaster ethics nexus to better include the perspectives of disaster affected communities.Design/methodology/approachThis paper presents a theoretical examination of privacy and care ethics in the context of social media/digitally enhanced disaster response.FindingsThe paper proposes an ethics of care (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  85
    Privacy and the Standing to Hold Responsible.Linda Radzik - 2023 - Journal of Moral Philosophy 21 (3-4):333-354.
    In order to be held responsible, it is not enough that you’ve done something blameworthy, someone else must also have the standing to hold you responsible. But a number of critics have claimed that this concept of ‘standing’ doesn’t hold up to scrutiny and that we should excise it from our analyses of accountability practices. In this paper, I examine James Edwards’ (2019) attempt to define standing. I pose objections to some key features of Edwards’ account and defend an alternative. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  6
    Privacy and identity in a networked society: refining privacy impact assessment.Stefan Strauss - 2019 - New York: Routledge, Taylor & Francis Group.
    Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  91
    Privacy and property in the biobank context.Lars Oystein Ursin - 2010 - HEC Forum 22 (3):211-224.
    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  76
    Privacy Is Power.Carissa Véliz - 2020 - London, UK: Penguin (Bantam Press).
    Selected by the Economist as one of the best books of 2020. -/- Privacy Is Power argues that people should protect their personal data because privacy is a kind of power. If we give too much of our data to corporations, the wealthy will rule. If we give too much personal data to governments, we risk sliding into authoritarianism. For democracy to be strong, the bulk of power needs to be with the citizenry, and whoever has the data (...)
    Direct download  
     
    Export citation  
     
    Bookmark   41 citations  
  36.  92
    Privacy preserving electronic petitions.Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss & Girma Nigusse - 2008 - Identity in the Information Society 1 (1):203-219.
    We present the design of a secure and privacy preserving e-petition system that we have implemented as a proof-of-concept demonstrator. We use the Belgian e-ID card as source of authentication, and then proceed to issue an anonymous credential that is used to sign petitions. Our system ensures that duplicate signatures are detectable, while preserving the anonymity of petition signers. We analyze the privacy and security requirements of our application, present an overview of its architecture, and discuss the applicability (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  54
    Privacy and property issues for a familial cancer service.Graeme Suthers - 2008 - Journal of Bioethical Inquiry 5 (1):33-37.
    Approximately 1 in 30 people develop cancer due to an underlying familial predisposition. Genetic counselling and testing for people with (and at risk of) familial cancer are becoming more widely available, but service providers need to address challenging issues in relation to privacy and property. As in any counselling situation, a genetic counsellor seeks to ensure that the principles of autonomy, confidentiality, beneficence, and equity operate in favour of the client. But in dealing with a familial disorder, the application (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38. Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   50 citations  
  39.  61
    Disentangling Privacy and Intimacy: Intimate Citizenship, Private Boundaries and Public Transgressions.Paul Reynolds - 2010 - Human Affairs 20 (1):33-42.
    Disentangling Privacy and Intimacy: Intimate Citizenship, Private Boundaries and Public Transgressions Recent theorisations of transformations of intimacy—like Ken Plummer's (2003) Intimate Citizenship project—concentrate on social and cultural transformations that erode the containment of intimacy within the private sphere. They have less to say about the character of and oppositions to that erosion, and specifically how far the idea of the private stands in opposition to intimacy transgressing into the public. In this essay, the private is explored through its constitutive (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  59
    Privacy and Equality in Diagnostic Genetic Testing.Tarja Nyrhinen, Marja Hietala, Pauli Puukka & Helena Leino-Kilpi - 2007 - Nursing Ethics 14 (3):295-308.
    This study aimed to determine the extent to which the principles of privacy and equality were observed during diagnostic genetic testing according to views held by patients or child patients' parents (n = 106) and by staff (n = 162) from three Finnish university hospitals. The data were collected through a structured questionnaire and analysed using the SAS 8.1 statistical software. In general, the two principles were observed relatively satisfactorily in clinical practice. According to patients/parents, equality in the post-analytic (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  41.  21
    Privacy concerns can stress you out: Investigating the reciprocal relationship between mobile social media privacy concerns and perceived stress.Jörg Matthes, Marina F. Thomas, Kathrin Karsay, Melanie Hirsch, Anna Koemets, Desirée Schmuck & Anja Stevic - 2022 - Communications 47 (3):327-349.
    Mobile social media have become a widespread means to participate in everyday social and professional life. These platforms encourage the disclosure and exchange of personal information, which comes with privacy risks. While past scholarship has listed various predictors and consequences of online privacy concerns, there has been to date no empirical investigation of a conceivable relationship with perceived stress. Using a longitudinal panel study, we examined the reciprocal relationship between mobile social media privacy concerns and perceived stress. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  28
    Privacy concerns with using public data for suicide risk prediction algorithms: a public opinion survey of contextual appropriateness.Michael Zimmer & Sarah Logan - 2022 - Journal of Information, Communication and Ethics in Society 20 (2):257-272.
    Purpose Existing algorithms for predicting suicide risk rely solely on data from electronic health records, but such models could be improved through the incorporation of publicly available socioeconomic data – such as financial, legal, life event and sociodemographic data. The purpose of this study is to understand the complex ethical and privacy implications of incorporating sociodemographic data within the health context. This paper presents results from a survey exploring what the general public’s knowledge and concerns are about such publicly (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  5
    Privacy.Paul Weiss - 1983 - Southern Illinois University Press.
    _Privacy _advances and refines Professor Weiss’s philosophic quest to isolate unmistakable evidences of that which is ultimately real and to trace those evidences to their original sources. The quest began with the publication of _Beyond All Appearances _, was expanded and refined into a more defensible formula­tion by _First Considerations _, and developed to provide a corre­sponding, precise, and systematic treatment of man, as apart from and to oppose and interplay with those final realities, in _You, I, and the Others (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  21
    Privacy and philosophy: new media and affective protocol.Andrew McStay - 2014 - New York: Peter Lang.
    In this book, McStay draws on an array of philosophers to offer a novel approach to privacy matters. Against the backdrop and scrutiny of Arendt, Aristotle, Bentham, Brentano, Deleuze, Engels, Heidegger, Hume, Husserl, James, Kant, Latour, Locke, Marx, Mill, Plato, Rorty, Ryle, Sartre, Skinner, among others, McStay advances a wealth of new ideas and terminology, from affective breaches to zombie media.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry:1-16.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  76
    Unpopular Privacy: What Must We Hide?Anita Allen - 2011 - New York, US: Oup Usa.
    Can the government stick us with privacy we don't want? It can, it does, and according to this author, may need to do more of it. Privacy is a foundational good, she argues, a necessary tool in the liberty-lover's kit for a successful life. A nation committed to personal freedom must be prepared to mandate inalienable, liberty-promoting privacies for its people, whether they eagerly embrace them or not. The eight chapters of this book are reflections on public regulation (...)
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  47. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  48. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  49.  69
    Privacy Rights Forfeiture.Mark Hanin - 2022 - Journal of Ethics and Social Philosophy 22 (2).
    Privacy rights can surely be waived. But can they also be forfeited? If so, why and under what conditions? This article takes up these questions by developing a novel theory of privacy rights forfeiture that draws inspiration from Judith Thomson’s canonical work on privacy. The paper identifies two species of forfeiture rooted in modes of negligent and reckless conduct and argues that both self-directed and other-regarding considerations play a role in grounding forfeiture. The paper also contributes to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  50. Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   19 citations  
1 — 50 / 981