David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Ethics and Information Technology 3 (1):13-19 (2001)
I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides a clearer statement of what is ethicallyimportant, as well as what is ethically problematic. Once theissues of security have been articulated clearly, it becomespossible to make out genuine issues of privacy in contrast tothem.
|Keywords||data-security logical security personal security privacy risk|
|Categories||categorize this paper)|
|Through your library||Configure|
Similar books and articles
Matthias Assel, Stefan Wesner & Alexander Kipp (2009). A Security Framework for Dynamic Collaborative Working Environments. Identity in the Information Society 2 (2):171-187.
Thomas B. Hodel-Widmer (2006). Designing Databases That Enhance People's Privacy Without Hindering Organizations. Ethics and Information Technology 8 (1):3-15.
Anton Alterman (2003). ``A Piece of Yourself'': Ethical Issues in Biometric Identification. [REVIEW] Ethics and Information Technology 5 (3):139-150.
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
David B. Resnik (2005). Openness Versus Secrecy in Scientific Research. Episteme 2 (3):135-147.
Ferdinand David Schoeman (ed.) (1984). Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press.
Krisana Kitiyadisai (2005). Privacy Rights and Protection: Foreign Values in Modern Thai Context. [REVIEW] Ethics and Information Technology 7 (1):17-26.
Paul El Khoury Luca Compagna, Fabio Massacci Alžběta Krausová & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1).
Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1):1-30.
Added to index2009-01-28
Total downloads21 ( #67,420 of 1,008,456 )
Recent downloads (6 months)1 ( #64,735 of 1,008,456 )
How can I increase my downloads?