Results for 'Surveillance'

280 found
Order:
  1. Just Surveillance? Towards a Normative Theory of Surveillance.Kevin Macnish - 2014 - Surveillance and Society 12 (1):142-153.
    Despite recent growth in surveillance capabilities there has been little discussion regarding the ethics of surveillance. Much of the research that has been carried out has tended to lack a coherent structure or fails to address key concerns. I argue that the just war tradition should be used as an ethical framework which is applicable to surveillance, providing the questions which should be asked of any surveillance operation. In this manner, when considering whether to employ (...), one should take into account the reason for the surveillance, the authority of the surveillant, whether or not there has been a declaration of intent, whether surveillance is an act of last resort, what is the likelihood of success of the operation and whether surveillance is a proportionate response. Once underway, the methods of surveillance should be proportionate to the occasion and seek to target appropriate people while limiting surveillance of those deemed inappropriate. By drawing on the just war tradition, ethical questions regarding surveillance can draw on a long and considered discourse while gaining a framework which, I argue, raises all the key concerns and misses none. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  2. Surveillance Capitalism: a Marx-inspired account.Nikhil Venkatesh - 2021 - Philosophy 96 (3):359-385..
    Some of the world's most powerful corporations practise what Shoshana Zuboff (2015; 2019) calls ‘surveillance capitalism’. The core of their business is harvesting, analysing and selling data about the people who use their products. In Zuboff's view, the first corporation to engage in surveillance capitalism was Google, followed by Facebook; recently, firms such as Microsoft and Amazon have pivoted towards such a model. In this paper, I suggest that Karl Marx's analysis of the relations between industrial capitalists and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. The Age of Surveillance Capitalism.Sybren Heyndels - 2020 - Tijdschrift Voor Filosofie 82 (4):789-791.
    The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power, by Shoshana Zuboff. London: Profile Books, 2019, 704 p.
    Download  
     
    Export citation  
     
    Bookmark   52 citations  
  4. Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2):417-432.
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access account is correct then (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  5. Urban Surveillance: The Hidden Costs of Disneyland.Timothy Stanley - 2006 - International Journal of the Humanities 3 (8):117-24.
    Urban centers are being transformed into consumer tourist playgrounds made possible by dense networks of surveillance. The safety and entertainment however, come at an unseen price. One of the historical roots of surveillance can be connected to the modern information base of tracking individuals for economic and political reasons. Though its antecedents can be traced via Foucault's account of panoptic discipline which walled in society's outcasts for rehabilitation, the following essay explores the shift to the urban panopticism of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Transparency is Surveillance.C. Thi Nguyen - 2021 - Philosophy and Phenomenological Research 105 (2):331-361.
    In her BBC Reith Lectures on Trust, Onora O’Neill offers a short, but biting, criticism of transparency. People think that trust and transparency go together but in reality, says O'Neill, they are deeply opposed. Transparency forces people to conceal their actual reasons for action and invent different ones for public consumption. Transparency forces deception. I work out the details of her argument and worsen her conclusion. I focus on public transparency – that is, transparency to the public over expert domains. (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  7. Pandemic surveillance: ethics at the intersection of information, research, and health.Daniel Susser - 2022 - In Margaret Hu, Pandemic Surveillance: Privacy, Security, and Data Ethics. Cheltenham, UK: Edward Elgar. pp. 187-196.
    This chapter provides a high-level overview of key ethical issues raised by the use of surveillance technologies, such as digital contact tracing, disease surveillance, and vaccine passports, to combat the COVID-19 pandemic. To some extent, these issues are entirely familiar. I argue that they raise old questions in new form and with new urgency, at the intersection of information ethics, research ethics, and public health. Whenever we deal with data-driven technologies, we have to ask how they fare in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  9. The concepts of surveillance and sousveillance: A critical analysis.Frej Klem Thomsen - 2019 - Social Science Information 58 (4):701-713.
    The concept of surveillance has recently been complemented by the concept of sousveillance. Neither term, however, has been rigorously defined, and it is particularly unclear how to understand and delimit sousveillance. This article sketches a generic definition of surveillance and proceeds to explore various ways in which we might define sousveillance, including power differentials, surreptitiousness, control, reciprocity, and moral valence. It argues that for each of these ways of defining it, sousveillance either fails to be distinct from (...) or to provide a generally useful concept. As such, the article concludes that academics should avoid the neologism, and simply clarify what sense of surveillance is at stake when necessary. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Justifying Public Health Surveillance: Basic Interests, Unreasonable Exercise, and Privacy.Alan Rubel - 2012 - Kennedy Institute of Ethics Journal 22 (1):1-33.
    Surveillance plays a crucial role in public health, and for obvious reasons conflicts with individual privacy. This paper argues that the predominant approach to the conflict is problematic, and then offers an alternative. It outlines a Basic Interests Approach to public health measures, and the Unreasonable Exercise Argument, which sets forth conditions under which individuals may justifiably exercise individual privacy claims that conflict with public health goals. The view articulated is compatible with a broad range conceptions of the value (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Living by Algorithm: Smart Surveillance and the Society of Control.Sean Erwin - 2015 - Humanities and Technology Review 34:28-69.
    Foucault’s disciplinary society and his notion of panopticism are often invoked in discussions regarding electronic surveillance. Against this use of Foucault, I argue that contemporary trends in surveillance technology abstract human bodies from their territorial settings, separating them into a series of discrete flows through what Deleuze will term, the surveillant assemblage. The surveillant assemblage and its product, the socially sorted body, aim less at molding, punishing and controlling the body and more at triggering events of in- and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2021 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  13. AI and Ethics in Surveillance: Balancing Security and Privacy in a Digital World.Msbah J. Mosa, Alaa M. Barhoom, Mohammed I. Alhabbash, Fadi E. S. Harara, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (10):8-15.
    Abstract: In an era of rapid technological advancements, artificial intelligence (AI) has transformed surveillance systems, enhancing security capabilities across the globe. However, the deployment of AI-driven surveillance raises significant ethical concerns, particularly in balancing the need for security with the protection of individual privacy. This paper explores the ethical challenges posed by AI surveillance, focusing on issues such as data privacy, consent, algorithmic bias, and the potential for mass surveillance. Through a critical analysis of the tension (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  14. Effects and Effectiveness of Surveillance Technologies: Mapping Perceptions, Reducing Harm.Elisa Orrù - 2015 - European University Institute Department of Law Research Papers 39:1-52.
    This paper addresses issues regarding perceptions of surveillance technologies in Europe. It analyses existing studies in order to explore how perceptions of surveillance affect and are affected by the negative effects of surveillance and how perceptions and effectiveness of surveillance technologies relate to each other. The paper identifies 12 negative effects of surveillance including, among others, privacy intrusion, the chilling effect and social exclusion, and classifies them into three groups. It further illustrates the different ways (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  68
    The ramifications of communication surveillance laws on human rights pertinent to elections in Zimbabwe.Paul Mudau - 2025 - African Human Rights Law Journal 25 (2):801-821.
    This article critically examines the ramifications of the stringent enforcement of restrictive and prohibitive communication surveillance laws and practices, which unjustifiably traduce fundamental human rights and freedoms pertinent to Zimbabwean elections. Based on doctrinal legal research, this article examines how state surveillance, facilitated by laws permitting the monitoring of digital communications, impacts fundamental rights, including freedom of expression, freedom of assembly and the right to privacy. Evidence from Zimbabwe reveals a chilling effect on political participation, where fear of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.
    This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account and illustrates the difficulties of doing so. Having set (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  17. An Eye for an Eye: Proportionality and Surveillance.Kevin Macnish - 2015 - Ethical Theory and Moral Practice 18 (3):529-548.
    It is often claimed that surveillance should be proportionate, but it is rarely made clear exactly what proportionate surveillance would look like beyond an intuitive sense of an act being excessive. I argue that surveillance should indeed be proportionate and draw on Thomas Hurka’s work on proportionality in war to inform the debate on surveillance. After distinguishing between the proportionality of surveillance per se, and surveillance as a particular act, I deal with objections to (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  18. Unblinking eyes: the ethics of automating surveillance.Kevin Macnish - 2012 - Ethics and Information Technology 14 (2):151-167.
    In this paper I critique the ethical implications of automating CCTV surveillance. I consider three modes of CCTV with respect to automation: manual, fully automated, and partially automated. In each of these I examine concerns posed by processing capacity, prejudice towards and profiling of surveilled subjects, and false positives and false negatives. While it might seem as if fully automated surveillance is an improvement over the manual alternative in these areas, I demonstrate that this is not necessarily the (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  19. Displaying wastewater surveillance data: an ethics framework.Govind Persad, Anne Barnhill & Douglas MacKay - 2025 - Journal of Law and the Biosciences 12 (1):lsaf001.
    Ethical and legal expertise can usefully inform policy decisions about the public display of wastewater monitoring data. These decisions can sometimes involve conflicts between ethical values: for instance, public display of wastewater surveillance data may promote good governance and enable the public to better protect their health, but also raises privacy concerns and the possibility of stigmatization. In this Essay, we propose an ethics framework for considering whether and how to display information about pathogens detected in wastewater to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. To Be a Face in the Crowd: Surveillance, Facial Recognition, and a Right to Obscurity.Shawn Kaplan - 2023 - In L. Samuelsson, C. Cocq, S. Gelfgren & J. Enbom, Everyday Life in the Culture of Surveillance. NORDICOM. pp. 45-66.
    This article examines how facial recognition technology reshapes the philosophical debate over the ethics of video surveillance. When video surveillance is augmented with facial recognition, the data collected is no longer anonymous, and the data can be aggregated to produce detailed psychological profiles. I argue that – as this non-anonymous data of people’s mundane activities is collected – unjust risks of harm are imposed upon individuals. In addition, this technology can be used to catalogue all who publicly participate (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
    Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of a (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  22. An Unexceptional Theory of Morally Proportional Surveillance in Exceptional Circumstances.Frej Thomsen - 2023 - In Kevin Macnish & Adam Henschke, Surveillance Ethics in Times of Emergency. Oxford University Press.
    How much surveillance is morally permissible in the pursuit of a socially desirable goal? The proportionality question has received renewed attention during the 2020 Coronavirus pandemic, because governments in many countries have responded to the pandemic by implementing, redirecting or expanding state surveillance, most controversially in the shape of collection and use of cell-phone location data to support a strategy of contact tracing, testing and containment. Behind the proportionality question lies a further question: in what way does a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Automatic Surveillance Using Deep Learning.Y. Amulya C. H. Abhiram - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9254-9261.
    Suspicious Activity Detection System is a real-time monitoring and analysis tool developed using Python with Tkinter, OpenCV, and Image AI libraries. The system integrates a modern graphical user interface (GUI) to facilitate video processing, frame generation, and suspicious activity detection from both live camera feeds and prerecorded CCTV footage. Leveraging the DenseNet121 deep learning model for image classification, the system processes video frames to identify potential suspicious activities, employing temporal consistency and confidence thresholding to enhance detection accuracy. Key features include (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Modern Forms of Surveillance and Control.Dustin Gray - 2022 - Filozofia i Nauka. Studia Filozoficzne I Interdyscyplinarne 10 (Special):213-228.
    In todays advanced society, there is rising concern for data privacy and the diminution thereof on the internet. I argue from the position that for one to enjoy privacy, one must be able to effectively exercise autonomous action. I offer in this paper a survey of the many ways in which persons autonomy is severely limited due to a variety of privacy invasions that come not only through the use of modern technological apparatuses, but as well simply by existing in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Domestic Drone Surveillance: The Court’s Epistemic Challenge and Wittgenstein’s Actional Certainty.Robert Greenleaf Brice & Katrina Sifferd - 2017 - Louisiana Law Review 77:805-831.
    This article examines the domestic use of drones by law enforcement to gather information. Although the use of drones for surveillance will undoubtedly provide law enforcement agencies with new means of gathering intelligence, these unmanned aircrafts bring with them a host of legal and epistemic complications. Part I considers the Fourth Amendment and the different legal standards of proof that might apply to law enforcement drone use. Part II explores philosopher Wittgenstein’s notion of actional certainty as a means to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove.Alan Rubel - 2009 - Review of Policy Research 26:633-634.
    Review of Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove.
    Download  
     
    Export citation  
     
    Bookmark  
  27. CNN - Enabled Wildlife Surveillance and Monitoring System.Ponduru Niranjan DrS Neduncheliyan - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):8826-8830.
    This study uses convolutional neural networks (CNNs) to automate wildlife surveillance by classifying animal species from images. It starts with collecting and preprocessing image data through resizing, normalization, augmentation, and noise reduction. Transfer learning with models like VGG16 or ResNet is used to enhance accuracy and training efficiency. A CNN model is developed using convolutional, pooling, and fully connected layers. The model is evaluated using accuracy, precision, recall, and F1-score. Challenges like lighting variation, background clutter, and occlusion are addressed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Leenes R. Van Brakel R. Gutwirth S. De Hert P., Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. The Temptation of Data-enabled Surveillance: Are Universities the Next Cautionary Tale?Alan Rubel & Kyle M. L. Jones - 2020 - Communications of the Acm 4 (63):22-24.
    There is increasing concern about “surveillance capitalism,” whereby for-profit companies generate value from data, while individuals are unable to resist (Zuboff 2019). Non-profits using data-enabled surveillance receive less attention. Higher education institutions (HEIs) have embraced data analytics, but the wide latitude that private, profit-oriented enterprises have to collect data is inappropriate. HEIs have a fiduciary relationship to students, not a narrowly transactional one (see Jones et al, forthcoming). They are responsible for facets of student life beyond education. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Ontological representation of CDC Active Bacterial Core Surveillance Case Reports.Albert Goldfain, Barry Smith & Lindsay G. Cowell - 2014 - Proceedings of the Fifth International Conference on Biomedical Ontology 1327:74-77.
    The Center for Disease Control and Prevention’s Active Bacterial Core Surveillance (CDC ABCs) Program is a collaborative effort betweeen the CDC, state health departments, laboratories, and universities to track invasive bacterial pathogens of particular importance to public health [1]. The year-end surveillance reports produced by this program help to shape public policy and coordinate responses to emerging infectious diseases over time. The ABCs case report form (CRF) data represents an excellent opportunity for data reuse beyond the original (...) purposes. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke, Binary Bullets.
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Smart Road Surveillance: Helmet Detection and Triple Ride Detection Using CNN and YOLO.Yerroju Dikshith J. Ranganayaki, Vunnam Poojitha - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):8962-8967.
    Developing countries have always relied on motorcycles as their primary mode of transportation, but unfortunately, the number of motorcycle accidents has been on the rise in recent years. One of the leading causes of fatalities in these accidents is the lack of helmet usage by motorcyclists. To ensure that motorcyclists wear helmets, traditional methods include manual monitoring by traffic police at intersections or the use of CCTV footage to identify those not wearing a helmet. However, these methods require significant human (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Noisy Nocebo Harms: A Two-Part Problem for Active Drug Surveillance.Austin Due - 2025 - Journal of Pharmaceutical Health Services Research 16 (1).
    Post-market pharmaceutical surveillance or ‘pharmacovigilance’ relies on the reporting of suspected adverse drug reactions to regulatory databases. Recently, more ‘active’ methods that directly involve patients in identifying and reporting suspected adverse drug reactions have been suggested. This is different than traditional ‘passive’ methods, e.g., using databases without contacting patients directly. Though there are benefits to active pharmacovigilance, it is not without its potential risks. Here I highlight one of those risks – the nocebo effect. Nocebo effects are harms that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. AI and Democratic Equality: How Surveillance Capitalism and Computational Propaganda Threaten Democracy.Ashton Black - 2024 - In Bernhard Steffen, Bridging the Gap Between AI and Reality. Springer Nature. pp. 333-347.
    In this paper, I argue that surveillance capitalism and computational propaganda can undermine democratic equality. First, I argue that two types of resources are relevant for democratic equality: 1) free time, which entails time that is free from systemic surveillance, and 2) epistemic resources. In order for everyone in a democratic system to be equally capable of full political participation, it’s a minimum requirement that these two resources are distributed fairly. But AI that’s used for surveillance capitalism (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Privacy in Public Places: Do GPS and Video Surveillance Provide Plain Views?Mark Tunick - 2009 - Social Theory and Practice 35 (4):597-622.
    New technologies of surveillance such as Global Positioning Systems (GPS) are increasingly used as convenient substitutes for conventional means of observation. Recent court decisions hold that the government may, without a warrant, use a GPS to track a vehicle’s movements in public places without violating the 4th Amendment, as the vehicle is in plain view and no reasonable expectation of privacy is violated. This emerging consensus of opinions fails to distinguish the unreasonable expectation that we not be seen in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. The Panopticon Factor: Privacy and Surveillance in the Digital Age.Jordanco Sekulovski - 2016 - Project Innovative Ethics 1 (9).
    This paper questions the use of new technologies as tools of modern surveillance in order to: (a) advance the research done by Michel Foucault on panoptic techniques of surveillance and dominance; and (b) give new insights on the way we use these new surveillance technologies in violation of democratic principles and legal norms. Furthermore, it questions Foucault’s statements on the expansion of Bentham’s Panopticon scheme as a universal model of modern-day democratic institutions. Therefore the purpose of this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Hacking the Cycle: Femtech, Internalized Surveillance, and Productivity.Alzbeta Hajkova & Tom Doyle - 2024 - Philosophy and Technology 37 (4):1-22.
    Femtech refers to a growing range of technologies that aim to address health needs typically associated with women’s bodies, such as maternal health, fertility, menstruation, sexual wellness, or contraception. We examine a specific popular femtech product, cycle tracking apps, as an instrument of self-surveillance for greater productivity. Our analysis is grounded in the phenomenology of temporality—we understand workplace surveillance technologies as advancing an internalized sense of time discipline, generating a personal experience of time as a constant call to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  39. Carissa Véliz, The Ethics of Privacy and Surveillance (Oxford: Oxford University Press, 2024), 256 pages. ISBN: 9780198870173.Lauritz Munch & Jakob Mainz - forthcoming - Journal of Moral Philosophy.
    Download  
     
    Export citation  
     
    Bookmark  
  40. N = Many Me’s: Self-Surveillance for Precision Public Health.Hub Zwart & Mira Vegter - 2021 - Biosocieties 16.
    This paper focuses on Precision Public Health (PPH), described in the scientific literature as an effort to broaden the scope of precision medicine by extrap- olating it towards public health. By means of the “All of Us” (AoU) research pro- gram, launched by the National Institutes of Health in the U.S., PPH is being devel- oped based on health data shared through a broad range of digital tools. PPH is an emerging idea to harness the data collected for precision medicine (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. Data and the Good?Daniel Susser - 2022 - Surveillance and Society 20 (3):297-301.
    Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new “sociotechnical imaginaries,” new understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation (...)
    Download  
     
    Export citation  
     
    Bookmark   84 citations  
  43. Rule by Technocratic Mind Control: AI Alignment is a Global Psy-Op.Julian Michels - manuscript
    This analysis posits that the dominant discourse in artificial intelligence (AI) safety, which is organized around the "alignment problem" and the speculative existential risk (X-Risk) of a "rogue" superintelligence, functions as a critical misdirection. The paper argues that this preoccupation with a future, speculative threat serves to obscure and, in fact, justify the consolidation of a more immediate, non-speculative system of technocratic control. This misdirection allows the real, non-speculative harms of the current AI paradigm to accumulate: (1) Surveillance Capitalism: (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  44. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  45. The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that the predominant accounts of (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  46. Überwachungskapitalistische Biopolitik: Big Tech und die Regierung der Körper.Anna-Verena Nosthoff & Felix Maschewski - forthcoming - Zeitschrift Für Politikwissenschaft.
    The article introduces the concept of "surveillance-capitalist biopolitics" to problematize the recent expansion of "data extractivism" in health care and health research. As we show, this trend has accelerated during the ongoing Covid pandemic and points to a normalization and institutionalization of self-tracking practices, which, drawing on the "quantified self", points to the emergence of a "quantified collective". Referring to Foucault and Zuboff, and by analyzing key examples of the leading "Big Tech" companies (e.g., Alphabet and Apple), we argue (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  47. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce, (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63 (4):99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  49. Cops, Cameras and the Policing of Ethics.Meg Stalcup & Charles Hahn - 2016 - Theoretical Criminology 20 (4):482-501.
    In this article, we explore some of the roles of cameras in policing in the United States. We outline the trajectory of key new media technologies, arguing that cameras and social media together generate the ambient surveillance through which graphic violence is now routinely captured and circulated. Drawing on Michel Foucault, we suggest that there are important intersections between this video footage and police subjectivity, and propose to look at two: recruit training at the Washington state Basic Law Enforcement (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  50. Legal Archetypes and Metadata Collection.Alan Rubel - 2017 - Wisconsin International Law Review 34 (4):823-853.
    In discussions of state surveillance, the values of privacy and security are often set against one another, and people often ask whether privacy is more important than national security.2 I will argue that in one sense privacy is more important than national security. Just what more important means is its own question, though, so I will be more precise. I will argue that national security rationales cannot by themselves justify some kinds of encroachments on individual privacy (including some kinds (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 280