Skip to main content

Advertisement

Log in

James Moor’s Privacy Framework: A Theory in Need of Further Exploration

  • Published:
Minds and Machines Aims and scope Submit manuscript

Abstract

This paper is intended as a tribute to the late James Moor. An esteemed Dartmouth professor, who published in many areas of philosophy, including logic, Moor is perhaps best remembered today for his pioneering work in the field of computer ethics. His seminal (and award-winning) article, “What Is Computer Ethics?” (Metaphilosophy, 1985) was highly influential both in defining and shaping the then nascent field of computer ethics. Many other computer-ethics-related papers followed over the next quarter century, in which Moor examined a range of topics – from moral responsibility to autonomy to privacy in the context of computing and emerging technologies, including nanotechnology and AI. And while the insights and frameworks put forth in many of his published works have received the acclaim they deserve, Moor’s contribution to the privacy literature remains, in my view, underappreciated. In trying to show why his privacy theory deserves much more attention than received to date, I also briefly describe the evolution of Moor’s position on privacy – from his earlier publications on that topic to a comprehensive and systematic privacy framework. I then suggest that a further exploration of his privacy theory would benefit researchers working in technology ethics in general, and AI ethics in particular. Finally, I encourage privacy scholars to take a closer look at Moor’s privacy framework to see whether they might be able to tease out and disclose some potential insights and features that may still be embedded in that robust theory of privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Allen, A. (1988). Uneasy Access: Privacy for women in a Free Society. Rowman and Littlefield.

  • DeCew, J. W. (1997). Pursuit of privacy: Law, Ethics, and the rise of Technology. Cornell University Press.

  • Fried, C. (1990). Privacy. In M. D. Ermann, M. B. Williams, and C. Gutierrez, eds. (1990). Computers, Ethics, and Society. New York: Oxford University Press, 51–67.

  • Heath, J. (2014). Contemporary privacy theory contributions to learning analytics. Journal of Learning Analytics, 1(1), 140–149.

    Article  MATH  Google Scholar 

  • Masevic, I. (2022). An examination of privacy concerns in the Internet of Things (IoT): A restricted access/limited control (RALC) theory perspective. Doctoral Thesis. Queens Business School (QBS), Queens University, Belfast. Available at: https://pure.qub.ac.uk/en/studentTheses/an-examination-of-privacy-concerns-in-the-internet-of-things-iot

  • Moor, J. H. (1989). How to invade and protect privacy with computers. In Carol Gould (Ed.), The information web: Ethical and social implications of computer networking (pp. 57–70). Westview.

  • Moor, J. H. (1990). The Ethics of Privacy Protection. Library Trends, Vol. 39, Nos. 1 and 2, 69–82.

  • Moor, J. H. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27–32.

    Article  MATH  Google Scholar 

  • Moor, J. H. (1999). Just Consequentialism and Computing. Ethics and Information Technology, 1(1), 65–69.

    Article  MATH  Google Scholar 

  • Nissenbaum, H. (2004). Privacy as Contextual Integrity. Washington Law Review, 79(1), 119–157.

    MATH  Google Scholar 

  • Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.

  • Spreeuwenberg, L. (2016). Justifying a Right to Privacy. Master thesis. The Netherlands: Tilburg University: Philosophy, Science and Society. Available at https://arno.uvt.nl/show.cgi?fid=141811#:~:text=With%20his%20Restricted%20Access%20/%20Limited,alleging%20a%20violation%20or%20invasion

  • Tavani, H. T. (1996). Computer Matching and Personal Privacy: Can They Be Compatible? In Proceedings of the Second ACM-SIGCAS (Association for Computing – Special Interest Group on Computers and Society) Symposium on Computers and the Quality of Life (Edited by Charles Huff). New York: ACM Press, 1996, pp. 97–101.

  • Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1–22.

    Article  MATH  Google Scholar 

  • Tavani, H. T., & Moor, J. H. (2001). Privacy Protection, Control of Information, and privacy-enhancing technologies. ACM SIGCAS Computers and Society, 31(1), 6–11.

Download references

Acknowledgements

Special thanks to Lloyd Carr and Charles Ess for their helpful comments on an earlier draft of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Herman T. Tavani.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tavani, H.T. James Moor’s Privacy Framework: A Theory in Need of Further Exploration. Minds & Machines 35, 20 (2025). https://doi.org/10.1007/s11023-025-09717-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11023-025-09717-0

Keywords