David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Ezio Di Nucci
Jack Alan Reynolds
Learn more about PhilPapers
Ethics and Information Technology 3 (1):13-19 (2001)
I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides a clearer statement of what is ethicallyimportant, as well as what is ethically problematic. Once theissues of security have been articulated clearly, it becomespossible to make out genuine issues of privacy in contrast tothem.
|Keywords||data-security logical security personal security privacy risk|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
Jacques Penders (2004). Privacy in (Mobile) Telecommunications Services. Ethics and Information Technology 6 (4):247-260.
Frans A. J. Birrer (2005). Data Mining to Combat Terrorism and the Roots of Privacy Concerns. Ethics and Information Technology 7 (4):211-220.
Similar books and articles
Matthias Assel, Stefan Wesner & Alexander Kipp (2009). A Security Framework for Dynamic Collaborative Working Environments. Identity in the Information Society 2 (2):171-187.
Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1):1-30.
Paul El Khoury Luca Compagna, Fabio Massacci Alžběta Krausová & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1).
Krisana Kitiyadisai (2005). Privacy Rights and Protection: Foreign Values in Modern Thai Context. [REVIEW] Ethics and Information Technology 7 (1):17-26.
Ferdinand David Schoeman (ed.) (1984). Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press.
David B. Resnik (2005). Openness Versus Secrecy in Scientific Research. Episteme 2 (3):135-147.
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
Anton Alterman (2003). ``A Piece of Yourself'': Ethical Issues in Biometric Identification. [REVIEW] Ethics and Information Technology 5 (3):139-150.
Thomas B. Hodel-Widmer (2006). Designing Databases That Enhance People's Privacy Without Hindering Organizations. Ethics and Information Technology 8 (1):3-15.
Added to index2009-01-28
Total downloads44 ( #94,134 of 1,796,218 )
Recent downloads (6 months)1 ( #468,533 of 1,796,218 )
How can I increase my downloads?