Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s

Science, Technology and Human Values 16 (1):51-69 (1991)
  Copy   BIBTEX

Abstract

Public policies designed to regulate the use of information technology to protect personal data have been based on different theoretical assumptions in different states, depending on whether the problem is defined in technological, civil libertarian, or bureaucratic terms. However, the rapid development, dispersal, and decentralization of information technology have facilitated a range of new surveillance practices that have in turn rendered the approaches of the 1960s and 1970s obsolete. The networking of the postindustrial state will require a reconceptualization of the dynamic relationship between organizational practices and information technology and a more comprehensive appreciation of the privacy problem. With the call for the development of a more coherent information policy in a number of countries, there is evidence that policymakers have been taking this more holistic view.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,897

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Inaccuracy as a privacy-enhancing tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
Privacy and policy for genetic research.Judith Wagner DeCew - 2004 - Ethics and Information Technology 6 (1):5-14.
Search engines, personal information and the problem of privacy in public.Herman T. Tavani - 2005 - International Review of Information Ethics 3:39-45.
Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Data Science and Designing for Privacy.Michael Falgoust - 2016 - Techné: Research in Philosophy and Technology 20 (1):51-68.
Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
Privacy exchanges: restoring consent in privacy self-management.Mario Pascalev - 2017 - Ethics and Information Technology 19 (1):39-48.
From privacy to anti-discrimination in times of machine learning.Thilo Hagendorff - 2019 - Ethics and Information Technology 21 (4):331-343.
Spyware – the ethics of Covert software.Mathias Klang - 2004 - Ethics and Information Technology 6 (3):193-202.

Analytics

Added to PP
2020-11-26

Downloads
8 (#1,318,140)

6 months
4 (#790,314)

Historical graph of downloads
How can I increase my downloads?