{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:11:19Z","timestamp":1654114279041},"reference-count":39,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10,1]]},"abstract":"
The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user\u2019s right of privacy not only at the level of a user\u2019s data integrity and security but also at the level of a user\u2019s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal data. However, scant attention has been paid on a virtue ethics approach of information privacy. Plotinus\u2019 discussion of self-determination is related to ethical virtue, human freedom and intellectual autonomy. The Plotinian virtue ethics approach of self-determination is not primarily related to the sphere of moral action, but to the quality of the self prior to moral practice. In this paper, it is argued that the problem of information privacy should be reconsidered in the light of Plotinus\u2019 virtue ethics and his notion of self-determination.<\/p>","DOI":"10.4018\/ijcee.2011100104","type":"journal-article","created":{"date-parts":[[2012,1,13]],"date-time":"2012-01-13T16:39:34Z","timestamp":1326472774000},"page":"35-41","source":"Crossref","is-referenced-by-count":1,"title":["Virtue, Privacy and Self-Determination"],"prefix":"10.4018","volume":"1","author":[{"given":"Giannis","family":"Stamatellos","sequence":"first","affiliation":[{"name":"University of Copenhagen, Denmark"}]}],"member":"2432","reference":[{"key":"ijcee.2011100104-0","volume":"Vol. 1-7","author":"A. H.Armstrong","year":"1988","journal-title":"Plotinus"},{"key":"ijcee.2011100104-1","first-page":"962","article-title":"Privacy as an aspect of human dignity: An answer to Dean Prosser.","volume":"39","author":"E.Bloustein","year":"1964","journal-title":"New York University Law Review"},{"key":"ijcee.2011100104-2","unstructured":"Capurro, R. (2006). Privacy: An intercultural perspective. Retrieved December 22, 2010, from http:\/\/www.capurro.de\/privacy.html"},{"key":"ijcee.2011100104-3","unstructured":"Capurro, R. (2010). Towards a comparative theory of agents. Retrieved December 22, 2010, from http:\/\/www.capurro.de\/agents.html"},{"key":"ijcee.2011100104-4","doi-asserted-by":"crossref","author":"J.DeCew","year":"1997","journal-title":"In pursuit of privacy: Law, ethics, and the rise of technology","DOI":"10.7591\/9781501721243"},{"key":"ijcee.2011100104-5","unstructured":"DeCew, J. (2006). Privacy. Retrieved March 20, 2011 from http:\/\/plato.stanford.edu\/entries\/privacy\/"},{"key":"ijcee.2011100104-6","first-page":"237","article-title":"A motivational approach to self: integration in personality.","volume":"38","author":"E. L.Deci","year":"1990","journal-title":"Nebraska Symposium on Motivation. Nebraska Symposium on Motivation"},{"key":"ijcee.2011100104-7","doi-asserted-by":"publisher","DOI":"10.1017\/CCOL0521470935.014"},{"key":"ijcee.2011100104-8","doi-asserted-by":"publisher","DOI":"10.1163\/ej.9789004166141.i-253"},{"key":"ijcee.2011100104-9","author":"D.Flaherty","year":"1989","journal-title":"Protecting privacy in surveillance societies"},{"key":"ijcee.2011100104-10","doi-asserted-by":"crossref","author":"C.Fried","year":"1970","journal-title":"An anatomy of values","DOI":"10.4159\/harvard.9780674332485"},{"key":"ijcee.2011100104-11","article-title":"Privacy: A rational context","author":"C.Fried","year":"1997","journal-title":"Computer, ethics and society"},{"key":"ijcee.2011100104-12","first-page":"580","article-title":"The practitioner from within: Revisiting the virtues","author":"F.Grodzinsky","year":"2001","journal-title":"Readings in cyberethics"},{"key":"ijcee.2011100104-13","author":"J.Inness","year":"1992","journal-title":"Privacy, intimacy and isolation"},{"key":"ijcee.2011100104-14","doi-asserted-by":"publisher","DOI":"10.2307\/1229286"},{"issue":"1","key":"ijcee.2011100104-15","first-page":"81","article-title":"Privacy, autonomy, and self-concept.","volume":"24","author":"J.Kupfer","year":"1987","journal-title":"American Philosophical Quarterly"},{"key":"ijcee.2011100104-16","author":"G.Leroux","year":"1990","journal-title":"Trait\u00e9 sur la libert\u00e9 et la volont\u00e9 de l'Un"},{"key":"ijcee.2011100104-17","doi-asserted-by":"publisher","DOI":"10.1017\/CCOL0521470935.013"},{"key":"ijcee.2011100104-18","author":"J.Lopez","year":"2008","journal-title":"Securing information and communications systems: Principles, technologies, and applications"},{"key":"ijcee.2011100104-19","author":"C.MacKinnon","year":"1989","journal-title":"Toward a feminist theory of the state"},{"key":"ijcee.2011100104-20","author":"K.McGroarty","year":"2007","journal-title":"Plotinus on Eudaimonia: A commentary on Ennead I.4"},{"key":"ijcee.2011100104-21","doi-asserted-by":"publisher","DOI":"10.1145\/277351.277355"},{"key":"ijcee.2011100104-22","first-page":"269","article-title":"Privacy, morality and the law.","volume":"12","author":"W.Parent","year":"1983","journal-title":"Philosophy & Public Affairs"},{"issue":"2","key":"ijcee.2011100104-23","first-page":"241","article-title":"Plotinus\u2019 ethical theory.","volume":"7","author":"P.Plass","year":"1982","journal-title":"Illinois Classical Studies"},{"key":"ijcee.2011100104-24","author":"P. M.Regan","year":"1995","journal-title":"Legislating privacy: Technology, social values, and public policy"},{"key":"ijcee.2011100104-25","doi-asserted-by":"publisher","DOI":"10.1353\/hph.2006.0006"},{"key":"ijcee.2011100104-26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511597411"},{"key":"ijcee.2011100104-27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511625138"},{"key":"ijcee.2011100104-28","author":"R. J.Severson","year":"1997","journal-title":"The principles of information ethics"},{"key":"ijcee.2011100104-29","first-page":"227","article-title":"The significance of practical ethics for Plotinus","author":"A.Smith","year":"1999","journal-title":"Traditions of Platonism: Essays in honor of John Dillon"},{"key":"ijcee.2011100104-30","author":"G.Stamatellos","year":"2007","journal-title":"Computer ethics: A global perspective"},{"key":"ijcee.2011100104-31","doi-asserted-by":"publisher","DOI":"10.4018\/ijcee.2011010101"},{"key":"ijcee.2011100104-32","unstructured":"Stamatellos, G. (in press) Self-determination and information privacy: a Plotinian virtue ethics approach. In Proceedings of the 4th International Conference on Information Law: Values and Freedoms in Modern Information Law and Ethics."},{"issue":"2","key":"ijcee.2011100104-33","first-page":"331","article-title":"Dual selfhood and self-perfection in the Enneads. Epoch\u00e9","volume":"13","author":"S.Stern-Gillet","year":"2009","journal-title":"Journal of the History of Philosophy"},{"key":"ijcee.2011100104-34","author":"T. H.Tavani","year":"2007","journal-title":"Ethics and technology: Ethical issues in an age of information and communication technology"},{"key":"ijcee.2011100104-35","first-page":"295","article-title":"The right to privacy.","volume":"4","author":"J.Thomson","year":"1975","journal-title":"Philosophy & Public Affairs"},{"key":"ijcee.2011100104-36","doi-asserted-by":"crossref","author":"R.Wacks","year":"2010","journal-title":"Privacy: A very short introduction","DOI":"10.1093\/actrade\/9780198725947.001.0001"},{"key":"ijcee.2011100104-37","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"ijcee.2011100104-38","author":"A.Westin","year":"1967","journal-title":"Privacy and freedom"}],"container-title":["International Journal of Cyber Ethics in Education"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=62637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:31:48Z","timestamp":1654111908000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcee.2011100104"}},"subtitle":["A Plotinian Approach to the Problem of Information Privacy"],"short-title":[],"issued":{"date-parts":[[2011,10,1]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,10]]}},"URL":"http:\/\/dx.doi.org\/10.4018\/ijcee.2011100104","relation":{},"ISSN":["2155-6903","2155-6911"],"issn-type":[{"value":"2155-6903","type":"print"},{"value":"2155-6911","type":"electronic"}],"subject":["General Earth and Planetary Sciences","General Environmental Science"],"published":{"date-parts":[[2011,10,1]]}}}