Switch to: References

Add citations

You must login to add citations.
  1. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to this viewpoint, this right (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy preserving or trapping?Xiao-yu Sun & Bin Ye - forthcoming - AI and Society:1-11.
    The development and application of artificial intelligence (AI) technology has raised many concerns about privacy violations in the public. Thus, privacy-preserving computation technologies (PPCTs) have been developed, and it is expected that these new privacy protection technologies can solve the current privacy problems. By not directly using raw data provided by users, PPCTs claim to protect privacy in a better way than their predecessors. They still have technical limitations, and considerable research has treated PPCTs as a privacy-protecting tool and focused (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • The Privacy Dependency Thesis and Self-Defense.Lauritz Aastrup Munch & Jakob Thrane Mainz - forthcoming - AI and Society:1-11.
    If I decide to disclose information about myself, this act can undermine other people’s ability to effectively conceal information about themselves. One case in point involves genetic information: if I share ‘my’ genetic information with others, I thereby also reveal genetic information about my biological relatives. Such dependencies are well-known in the privacy literature and are often referred to as ‘privacy dependencies’. Some take the existence of privacy dependencies to generate a moral duty to sometimes avoid sharing information about oneself. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Others’ information and my privacy: an ethical discussion.Yuanye Ma - 2023 - Journal of Information, Communication and Ethics in Society 21 (3):259-270.
    Purpose Privacy has been understood as about one’s own information, information that is not one’s own is not typically considered with regards to an individual’s privacy. This paper aims to draw attention to this issue for conceptualizing privacy when one’s privacy is breached by others’ information. Design/methodology/approach To illustrate the issue that others' information can breach one's own privacy, this paper uses real-world applications of forensic genealogy and recommender systems to motivate the discussion. Findings In both forensic genealogy and recommender (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Linking Human And Machine Behavior: A New Approach to Evaluate Training Data Quality for Beneficial Machine Learning.Thilo Hagendorff - 2021 - Minds and Machines 31 (4):563-593.
    Machine behavior that is based on learning algorithms can be significantly influenced by the exposure to data of different qualities. Up to now, those qualities are solely measured in technical terms, but not in ethical ones, despite the significant role of training and annotation data in supervised machine learning. This is the first study to fill this gap by describing new dimensions of data quality for supervised machine learning applications. Based on the rationale that different social and psychological backgrounds of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations