{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:30:03Z","timestamp":1740137403569,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T00:00:00Z","timestamp":1692403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T00:00:00Z","timestamp":1692403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002808","name":"Carlsbergfondet","doi-asserted-by":"publisher","award":["CF20-0257"],"award-info":[{"award-number":["CF20-0257"]}],"id":[{"id":"10.13039\/501100002808","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Royal Danish Library, Aarhus University Library"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>If <jats:italic>I<\/jats:italic> decide to disclose information about myself, this act may undermine <jats:italic>other<\/jats:italic> people\u2019s ability to conceal information about them. Such dependencies are called privacy dependencies in the literature. Some say that privacy dependencies generate moral duties to avoid sharing information about oneself. If true, we argue, then it is sometimes justified for others to impose harm on the person sharing information to prevent them from doing so. In this paper, we first show how such conclusions arise. Next, we show that the existence of such a dependency between the moral significance you are inclined to attribute to privacy dependencies and judgments about permissible self-defense puts pressure on at least some ways of spelling out the idea that privacy dependencies ought to constrain our data-sharing conduct.<\/jats:p>","DOI":"10.1007\/s00146-023-01734-w","type":"journal-article","created":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T09:07:23Z","timestamp":1692436043000},"page":"2525-2535","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The privacy dependency thesis and self-defense"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3510-5422","authenticated-orcid":false,"given":"Lauritz Aastrup","family":"Munch","sequence":"first","affiliation":[]},{"given":"Jakob Thrane","family":"Mainz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,19]]},"reference":[{"key":"1734_CR1","first-page":"555","volume":"95","author":"S Barocas","year":"2019","unstructured":"Barocas S, Levy K (2019) Privacy dependencies. Wash Law Rev 95:555","journal-title":"Wash Law Rev"},{"issue":"3","key":"1734_CR2","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1163\/17455243-20213535","volume":"19","author":"C Barry","year":"2021","unstructured":"Barry C, McTernan E (2021) A puzzle of enforceability: why do moral duties differ in their enforceability? J Moral Philos 19(3):229\u2013253","journal-title":"J Moral Philos"},{"key":"1734_CR3","volume-title":"Configuring the networked self: law, code, and the play of everyday practice","author":"JE Cohen","year":"2012","unstructured":"Cohen JE (2012) Configuring the networked self: law, code, and the play of everyday practice. Yale University Press, New Haven"},{"key":"1734_CR6","first-page":"385","volume":"65","author":"J Fairfield","year":"2015","unstructured":"Fairfield J, Engel C (2015) Privacy as a public good. Duke Law J 65:385\u2013457","journal-title":"Duke Law J"},{"key":"1734_CR7","first-page":"365","volume":"108","author":"H Frowe","year":"2008","unstructured":"Frowe H (2008) Threats, bystanders and obstructors. Proc Aristot Soc 108:365\u2013372","journal-title":"Proc Aristot Soc"},{"key":"1734_CR8","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199609857.001.0001","volume-title":"Defensive killing","author":"H Frowe","year":"2014","unstructured":"Frowe H (2014) Defensive killing. Oxford University Press, Oxford"},{"issue":"1","key":"1734_CR9","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1111\/papa.12142","volume":"47","author":"H Frowe","year":"2019","unstructured":"Frowe H, Parry J (2019) Wrongful observation. Philos Public Aff 47(1):104\u2013137","journal-title":"Philos Public Aff"},{"key":"1734_CR10","unstructured":"Frowe H, Parry J (2022) Self-defense. In: Zalta EN (ed) The Stanford encyclopedia of philosophy. https:\/\/plato.stanford.edu\/archives\/sum2022\/entries\/self-defense\/"},{"issue":"1","key":"1734_CR12","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1111\/j.1088-4963.2005.00024.x","volume":"33","author":"T Hurka","year":"2005","unstructured":"Hurka T (2005) Proportionality in the morality of war. Philos Public Aff 33(1):34\u201366","journal-title":"Philos Public Aff"},{"key":"1734_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1111\/j.1088-4963.2012.01214.x","volume":"40","author":"S Lazar","year":"2012","unstructured":"Lazar S (2012) Necessity in self-defense and war. Philos Public Aff 40:3\u201344","journal-title":"Philos Public Aff"},{"key":"1734_CR15","first-page":"425","volume":"6","author":"M MacCarthy","year":"2011","unstructured":"MacCarthy M (2011) New directions in privacy: disclosure, unfairness and externalities. 6 I\/s J Law Policy Inf Soc 6:425","journal-title":"6 I\/s J Law Policy Inf Soc"},{"key":"1734_CR40","unstructured":"Mainz J (forthcoming) Inferences and the right to privacy. J Value Inquiry"},{"issue":"1","key":"1734_CR17","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1111\/j.1533-6077.2005.00073.x","volume":"15","author":"J McMahan","year":"2005","unstructured":"McMahan J (2005) The basis of moral liability to defensive killing. Philos Issues 15(1):386\u2013405","journal-title":"Philos Issues"},{"issue":"4","key":"1734_CR19","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1111\/japp.12592","volume":"39","author":"K Mills","year":"2022","unstructured":"Mills K (2022) Consent and the right to privacy. J Appl Philos 39(4):721\u2013735","journal-title":"J Appl Philos"},{"key":"1734_CR20","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/s10676-021-09606-x","volume":"23","author":"R M\u00fchlhoff","year":"2021","unstructured":"M\u00fchlhoff R (2021) Predictive privacy: towards an applied ethics of data analytics. Ethics Inf Technol 23:675\u2013690","journal-title":"Ethics Inf Technol"},{"key":"1734_CR21","doi-asserted-by":"publisher","first-page":"3777","DOI":"10.1007\/s11098-021-01625-0","volume":"178","author":"L Munch","year":"2021","unstructured":"Munch L (2021) Privacy rights and \u2018naked\u2019 statistical evidence. Philos Stud 178:3777\u20133795","journal-title":"Philos Stud"},{"key":"1734_CR22","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s10677-022-10269-w","volume":"25","author":"LA Munch","year":"2022","unstructured":"Munch LA (2022a) Digital self-defence: why you ought to preserve your privacy for the sake of wrongdoers. Ethic Theory Moral Prac 25:233\u2013248","journal-title":"Ethic Theory Moral Prac"},{"key":"1734_CR41","doi-asserted-by":"crossref","unstructured":"Munch LA (2022b) How privacy rights engender direct doxastic duties. J Value Inquiry 56:547\u2013562","DOI":"10.1007\/s10790-020-09790-x"},{"issue":"4","key":"1734_CR23","doi-asserted-by":"publisher","DOI":"10.1111\/phc3.12587","volume":"14","author":"J Nefsky","year":"2019","unstructured":"Nefsky J (2019) Collective harm and the inefficacy problem. Philos Compass 14(4):e12587","journal-title":"Philos Compass"},{"key":"1734_CR24","volume-title":"Privacy in context: technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, Stanford"},{"key":"1734_CR25","first-page":"44","volume-title":"Privacy, big data, and the public good: frameworks for engagement","author":"H Nissenbaum","year":"2014","unstructured":"Nissenbaum H, Barocas S (2014) Big data\u2019s end run around anonymity and consent. In: Lane J, Stodden V, Bender S, Nissenbaum H (eds) Privacy, big data, and the public good: frameworks for engagement. Cambridge University Press, Cambridge, pp 44\u201375"},{"key":"1734_CR26","volume-title":"Obfuscation. A user's guide for privacy and protest","author":"H Nissenbaum","year":"2016","unstructured":"Nissenbaum H, Brunton F (2016) Obfuscation. A user\u2019s guide for privacy and protest. MIT Press, Cambridge"},{"key":"1734_CR27","volume-title":"Anarchy, state, and utopia","author":"R Nozick","year":"1974","unstructured":"Nozick R (1974) Anarchy, state, and utopia. Basic Books, New York"},{"key":"1734_CR28","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1086\/597595","volume":"119","author":"J Quong","year":"2009","unstructured":"Quong J (2009) Killing in self-defense. Ethics 119:507\u2013537","journal-title":"Ethics"},{"key":"1734_CR29","doi-asserted-by":"crossref","unstructured":"Reidenberg J et al (2014) Privacy harms and the effectiveness of the notice and choice framework. In: TPRC Conference Paper, Fordham Law Legal Studies Research Paper No. 2418247","DOI":"10.2139\/ssrn.2418247"},{"issue":"1","key":"1734_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1111\/jopp.12158","volume":"27","author":"B Rumbold","year":"2018","unstructured":"Rumbold B, Wilson J (2018) Privacy rights and public information. J Polit Philos 27(1):3\u201325","journal-title":"J Polit Philos"},{"key":"1734_CR32","first-page":"1880","volume":"126","author":"D Solove","year":"2012","unstructured":"Solove D (2012) Privacy self-management and the consent dilemma. Harvard Law Rev 126:1880","journal-title":"Harvard Law Rev"},{"key":"1734_CR35","first-page":"37","volume":"9","author":"D Susser","year":"2019","unstructured":"Susser D (2019) Notice after notice-and-consent: why privacy disclosures are valuable even if consent frameworks aren\u2019t. J Inf Policy 9:37\u201362","journal-title":"J Inf Policy"},{"key":"1734_CR36","first-page":"283","volume":"20","author":"J Thomson","year":"1991","unstructured":"Thomson J (1991) Self-defense. Philos Public Aff 20:283\u2013310","journal-title":"Philos Public Aff"},{"key":"1734_CR37","volume-title":"Privacy is power","author":"C V\u00e9liz","year":"2020","unstructured":"V\u00e9liz C (2020) Privacy is power. Bantam Press, London"},{"key":"1734_CR39","first-page":"13","volume":"56","author":"T Zarsky","year":"2004","unstructured":"Zarsky T (2004) Desperately seeking solutions: using implementation-based solutions for the troubles of information privacy in the age of data mining and the internet society. Me Law Rev 56:13","journal-title":"Me Law Rev"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-023-01734-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00146-023-01734-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-023-01734-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T04:13:17Z","timestamp":1726805597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00146-023-01734-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,19]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1734"],"URL":"https:\/\/doi.org\/10.1007\/s00146-023-01734-w","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"type":"print","value":"0951-5666"},{"type":"electronic","value":"1435-5655"}],"subject":[],"published":{"date-parts":[[2023,8,19]]},"assertion":[{"value":"5 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no competing interests to be declared.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}}]}}