Testimonial entitlement, norms of assertion and privacy

Research output: Contribution to journalArticleAcademicpeer-review

11 Citations (Scopus)


According to assurance views of testimonial justification, in virtue of the act of testifying a speaker provides an assurance of the truth of what she asserts to the addressee. This assurance provides a special justificatory force and a distinctive normative status to the addressee. It is thought to explain certain asymmetries between addressees and other unintended hearers (bystanders and eavesdroppers), such as the phenomenon that the addressee has a right to blame the speaker for conveying a falsehood but unintended hearers do not, and the phenomenon that the addressee may deflect challenges to his testimonial belief to the speaker but unintended hearers may not. Here I argue that we can do a better job explaining the normative statuses associated with testimony by reference to epistemic norms of assertion and privacy norms. Following Sanford Goldberg, I argue that epistemic norms of assertion, according to which sincere assertion is appropriate only when the asserter possesses certain epistemic goods, can be ‘put to work’ to explain the normative statuses associated with testimony. When these norms are violated, they give hearers the right to blame the speaker, and they also explain why the speaker takes responsibility for the justification of the statement asserted. Norms of privacy, on the other hand, directly exclude eavesdroppers and bystanders from an informational exchange, implying that they have no standing to do many of the things, such as issue challenges or questions to the speaker, that would be normal for conversational participants. This explains asymmetries of normative status associated with testimony in a way logically independent of speaker assurance.
Original languageEnglish
Pages (from-to)207-217
Number of pages11
Issue number2
Publication statusPublished - 2013


Dive into the research topics of 'Testimonial entitlement, norms of assertion and privacy'. Together they form a unique fingerprint.

Cite this