Accessible Unlicensed Requires Authentication Published by De Gruyter June 20, 2020

Introduction to the Special Issue on the Ethics of State Mass Surveillance

Peter Königs

References

Allen, A. (1988). Uneasy Access: Privacy for Women in a Free Society (Totowa, NJ: Rowman and Littlefield).Search in Google Scholar

Denyer, S. (2018). ‘China’s Watchful Eye’, The Washington Post, , January 7.Search in Google Scholar

Fried, C. (1970). An Anatomy of Values (Cambridge, MA: Harvard University Press).Search in Google Scholar

Gavinson, R. (1980). ‘Privacy and the Limits of Law’, Yale Law Journal 89 (3): 421–472.Search in Google Scholar

Henschke, A. (2017). Ethics in an Age of Surveillance. Personal Information and Virtual Identities (Cambridge: Cambridge University Press).Search in Google Scholar

Hoye, J.M. and Monaghan, J. (2018). ‘Surveillance, Freedom and the Republic’, European Journal of Political Theory 17 (3): 343–363.Search in Google Scholar

Lyon, D. (2018). The Culture of Surveillance (Cambridge: Polity Press).Search in Google Scholar

Macnish, K. (2014). ‘Just Surveillance? Towards a Normative Theory of Surveillance’, Surveillance & Society 12 (1): 142–153.Search in Google Scholar

Macnish, K. (2018a). The Ethics of Surveillance. An Introduction (Abingdon: Routledge).Search in Google Scholar

Macnish, K. (2018b). ‘Government Surveillance and Why Defining Privacy Matters in a Post-Snowden World’, Journal of Applied Philosophy 35 (2): 417–432.Search in Google Scholar

Moore, A. (2003). ‘Privacy. Its Meaning and Value’, American Philosophical Quarterly 40 (3): 215–227.Search in Google Scholar

Moore, A. (2011). ‘Privacy, Security, and Government Surveillance. Wikileaks and the New Accountability’, Public Affairs Quarterly 25 (2): 141–156.Search in Google Scholar

Penney, J.W. (2016). ‘Chilling Effects. Online Surveillance and Wikipedia Use’, Berkeley Technology Law Journal 31 (1): 117–182.Search in Google Scholar

Penney, J.W. (2017). ‘Internet Surveillance, Regulation, and Chilling Effects. A Comparative Case Study’, Internet Policy Review 6 (2) :1–39.Search in Google Scholar

Persson, I. and Savulescu, J. (2012). Unfit for the Future (Oxford: Oxford University Press).Search in Google Scholar

Pilon, R. and Epstein, R.A. (2013). ‘NSA Surveillance in Perspective’, Chicago Tribune, June 12.Search in Google Scholar

Roberts, A. (2014). ‘A Republican Account of the Value of Privacy’, European Journal of Political Theory 14 (3): 320–344.Search in Google Scholar

Roessler, B. (2005). The Value of Privacy (Cambridge, MA: Polity Press).Search in Google Scholar

Roessler, B. and Mokrosinska, D. (2013). ‘Privacy and Social Interaction’, Philosophy and Social Criticism 39 (8): 771–791.Search in Google Scholar

Roessler, B. and Mokrosinska, D. eds. (2015). Social Dimensions of Privacy. Interdisciplinary Dimensions (Cambridge: Cambridge University Press).Search in Google Scholar

Ryberg, J. (2007). ‘Privacy Rights, Crime Prevention, CCTV, and the Life of Mrs Aremac’, Res Publica 13 (2): 127–143.Search in Google Scholar

Solove, D. (2006). ‘A Taxonomy of Privacy’, University of Pennsylvania Law Review 154 (3): 477–564.Search in Google Scholar

Stahl, T. (2016). ‘Indiscriminate Mass Surveillance and the Public Sphere’, Ethics and Information Technology 18 (1): 33–39.Search in Google Scholar

Taylor, I. (2017). ‘Data Collection, Counterterrorism and the Right to Privacy’, Politics, Philosophy & Economics 16 (3): 326–346.Search in Google Scholar

Taylor, J.S. (2005). ‘In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance’, Public Affairs Quarterly 19 (3): 227–246.Search in Google Scholar

Published Online: 2020-06-20
Published in Print: 2020-05-26

© 2020 Walter de Gruyter GmbH, Berlin/Boston