Ethics and Information Technology 3 (1):13-19 (2001)
|Abstract||I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides a clearer statement of what is ethicallyimportant, as well as what is ethically problematic. Once theissues of security have been articulated clearly, it becomespossible to make out genuine issues of privacy in contrast tothem.|
|Keywords||data-security logical security personal security privacy risk|
|Categories||categorize this paper)|
|Through your library||Configure|
Similar books and articles
Matthias Assel, Stefan Wesner & Alexander Kipp (2009). A Security Framework for Dynamic Collaborative Working Environments. Identity in the Information Society 2 (2):171-187.
Thomas B. Hodel-Widmer (2006). Designing Databases That Enhance People's Privacy Without Hindering Organizations. Ethics and Information Technology 8 (1):3-15.
Anton Alterman (2003). ``A Piece of Yourself'': Ethical Issues in Biometric Identification. [REVIEW] Ethics and Information Technology 5 (3):139-150.
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
David B. Resnik (2005). Openness Versus Secrecy in Scientific Research. Episteme 2 (3):135-147.
Ferdinand David Schoeman (ed.) (1984). Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press.
Krisana Kitiyadisai (2005). Privacy Rights and Protection: Foreign Values in Modern Thai Context. [REVIEW] Ethics and Information Technology 7 (1):17-26.
Paul El Khoury Luca Compagna, Fabio Massacci Alžběta Krausová & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1).
Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1):1-30.
Added to index2009-01-28
Total downloads20 ( #68,234 of 722,877 )
Recent downloads (6 months)1 ( #60,917 of 722,877 )
How can I increase my downloads?