Results for 'Electronic surveillance. '

993 found
Order:
  1.  8
    Electronic surveillance and personal privacy: an historical perspective.Jan Yestingsmeier - 1984 - Acm Sigcas Computers and Society 13 (4, 1-3):10-13.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  2. Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets.
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  18
    The role of control and other factors in the electronic surveillance workplace.Jengchung V. Chen & Yangil Park - 2005 - Journal of Information, Communication and Ethics in Society 3 (2):79-91.
    Many office workers use computers and the Internet not only to get their daily jobs done but also to deal with their personal businesses. Therefore employers nowadays monitor their employees electronically to prevent the misuse of the company resources. The use of electronic monitoring in organizations causes issues of trust and privacy. This study is dedicated to developing a conceptual model on the two issues under electronic monitoring. Control, considered as the essence of the definition of privacy as (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  77
    A Modern Pascal's Wager for Mass Electronic Surveillance.D. Danks - 2014 - Télos 2014 (169):155-161.
    Debates about the moral permissibility of mass electronic surveillance often turn on whether consequentialist considerations legitimately trump relevant deontological rights and principles. In order to establish such overriding consequences, many proponents of mass surveillance employ a modern analogue of Pascal’s wager: they contend that the consequences of no surveillance are so severe that any probability of such outcomes legitimates the abrogation of the relevant rights. In this paper, I briefly review Pascal’s original wager about whether to live a pious (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  5.  43
    Management and Legal Issues Regarding Electronic Surveillance of Employees in the Workplace.David Halpern, Patrick J. Reville & Donald Grunewald - 2008 - Journal of Business Ethics 80 (2):175-180.
    Since the attack on the World Trade Center in New York, and on the Pentagon in the United States, concerns over security issues have been at an all-time high in this country. Both state and federal governments continue to discuss legislation on these issues amid much controversy. One key concern of both employers and employees is the extent that employers, espousing a "need to know" mentality, continue to expand their capability and implementation of surveillance of employees in the workplace. With (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  38
    Ethical Considerations in the Conduct of Electronic Surveillance Research.Ashok J. Bharucha, Alex John London, David Barnard, Howard Wactlar, Mary Amanda Dew & Charles F. Reynolds - 2006 - Journal of Law, Medicine and Ethics 34 (3):611-619.
    The extant clinical literature indicates profound problems in the assessment, monitoring, and documentation of care in long-term care facilities. The lack of adequate resources to accommodate higher staff-to-resident ratios adds additional urgency to the goal of identifying more costeffective mechanisms to provide care oversight. The ever expanding array of electronic monitoring technologies in the clinical research arena demands a conceptual and pragmatic framework for the resolution of ethical tensions inherent in the use of such innovative tools. CareMedia is a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  57
    Ethics, public policy, and managing advanced technologies: The case of electronic surveillance. [REVIEW]Edward J. Ottensmeyer & Mark A. Heroux - 1991 - Journal of Business Ethics 10 (7):519 - 526.
    A vigorous debate has developed surrounding electronic surveillance in the workplace. This controversial practice is one element of the more general issues of employee dignity and management control, revolving around the use of polygraph and drug testing, integrity exams, and the like. Managers, under pressure from competitors, are making greater use of technologically advanced employee monitoring methods because they are available, and hold the promise of productivity improvement. In this paper, the context of electronic surveillance is described and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  8.  4
    The National Communications System and Federal Electronic Surveillance Policy.Fred W. Weingarten & Priscilla M. Regan - 1986 - Science, Technology, and Human Values 11 (4):17-30.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  21
    Managing Electronic Workplace Surveillance to Respect Employee Autonomy.Emma Rooksby & Natasha Cica - 2008 - Philosophy of Management 6 (3):75-85.
    Electronic surveillance of employees in the workplace presents both opportunities and risks to contemporary managers. Some of the moral risks associated with electronic workplace surveillance are well-known and discussed in the literature. A lesser-known risk, which is explored and addressed in this article, is the threat that electronic surveillance poses, when used inappropriately, to employees’ personal autonomy. This article elaborates the concept of personal autonomy, illustrates how electronic workplace surveillance might be used to violate personal autonomy, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  10.  9
    Public Health Surveillance: Electronic Reporting as a Point of Reference.Jennifer Black, Rachel Hulkower, Walter Suarez, Shreya Patel & Brandon Elliott - 2019 - Journal of Law, Medicine and Ethics 47 (S2):19-22.
    Federal, state, and local laws shape the use of health information for public health purposes, such as the mandated collection of data through electronic disease reporting systems. Health professionals can leverage these data to better anticipate and plan for the needs of communities, which is seen in the use of electronic case reporting.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  16
    Surveillance Studies: Perspektiven eines Forschungsfeldes.Nils Zurawski (ed.) - 2007 - Farmington Hills [MI]: Budrich.
    Am Beginn des 21. Jahrhunderts sind die gesellschaftlichen Konsequenzen neuer Formen der Sammlung, Verwendung und Vernetzung von Daten zur Überwachung und Beeinflussung von Menschen und Gruppen noch nicht vollends absehbar. Mit den Surveillance Studies können die Bedingungen und Diskurse von Sicherheit, Überwachung und Kontrolle im Rahmen einer interdisziplinären Forschungsinitiative analysiert werden. Verschiedene Pespektiven werden hier einführend dargestellt. Beiträge aus der Rechtswissenschaft, der Kriminologie, der Geographie, Soziologie und Kunstgeschichte zeigen, welche unterschiedlichen Perspektiven es gibt, um die komplexen und folgenreichen Zusammenhänge der (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12. Living by Algorithm: Smart Surveillance and the Society of Control.Sean Erwin - 2015 - Humanities and Technology Review 34:28-69.
    Foucault’s disciplinary society and his notion of panopticism are often invoked in discussions regarding electronic surveillance. Against this use of Foucault, I argue that contemporary trends in surveillance technology abstract human bodies from their territorial settings, separating them into a series of discrete flows through what Deleuze will term, the surveillant assemblage. The surveillant assemblage and its product, the socially sorted body, aim less at molding, punishing and controlling the body and more at triggering events of in- and ex-clusion (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  9
    Electronic Performance Monitoring in the Digital Workplace: Conceptualization, Review of Effects and Moderators, and Future Research Opportunities.Thomas Kalischko & René Riedl - 2021 - Frontiers in Psychology 12:633031.
    The rise of digital and interconnected technology within the workplace, including programs that facilitate monitoring and surveillance of employees is unstoppable. The COVID-19-induced lockdowns and the resulting increase in home office adoption even increased this trend. Apart from major benefits that may come along with such information and communication technologies (e.g., productivity increases, better resource planning, and increased worker safety), they also enable comprehensive Electronic Performance Monitoring (EPM) which may also have negative effects (e.g., increased stress and a reduction (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  50
    Telecare, Surveillance, and the Welfare State.Tom Sorell & Heather Draper - 2012 - American Journal of Bioethics 12 (9):36-44.
    In Europe, telecare is the use of remote monitoring technology to enable vulnerable people to live independently in their own homes. The technology includes electronic tags and sensors that transmit information about the user's location and patterns of behavior in the user's home to an external hub, where it can trigger an intervention in an emergency. Telecare users in the United Kingdom sometimes report their unease about being monitored by a ?Big Brother,? and the same kind of electronic (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  15.  32
    Communicable Disease Surveillance Ethics in the Age of Big Data and New Technology.Gwendolyn L. Gilbert, Chris Degeling & Jane Johnson - 2019 - Asian Bioethics Review 11 (2):173-187.
    Surveillance is essential for communicable disease prevention and control. Traditional notification of demographic and clinical information, about individuals with selected infectious diseases, allows appropriate public health action and is protected by public health and privacy legislation, but is slow and insensitive. Big data–based electronic surveillance, by commercial bodies and government agencies, which draws on a plethora of internet- and mobile device–based sources, has been widely accepted, if not universally welcomed. Similar anonymous digital sources also contain syndromic information, which can (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  16.  74
    Surveilling the City.John Fiske - 1998 - Theory, Culture and Society 15 (2):67-88.
    This article details the rapid extension of the video surveillance of downtown `public' spaces. Its main argument is that this surveillance is racially differentiated, and that it zones the city differently for Blacks and whites, eroding the Black freedoms of movement and association, while leaving those of whites intact. It also considers isses of privacy as a political zone of potential social change, and raises concern about its video-electronic erosion. The argument is set within the overall argument that underneath (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  57
    Observing bodies. Camera surveillance and the significance of the body.Lynsey Dubbeld - 2003 - Ethics and Information Technology 5 (3):151-162.
    At the most mundane level, CCTV observes bodies, and as such attaches great importance to the specific features of the human body. At the same time, however, bodies tend to disappear, as they are represented electronically by the camera monitors and, in the case of image recording, by the computer systems processing data. The roles of bodies(either as targets of surveillance or as translations into flows of disembodied information), however, are not unimportant or inconsequential, but may in fact give rise (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark  
  18.  54
    Surveillance in employment: The case of teleworking. [REVIEW]N. Ben Fairweather - 1999 - Journal of Business Ethics 22 (1):39 - 49.
    This paper looks at various ways teleworking can be linked to surveillance in employment, making recommendations about how telework can be made more acceptable. Technological methods can allow managers to monitor the actions of teleworkers as closely as they could monitor "on site" workers, and in more detail than the same managers could traditionally. Such technological methods of surveillance or monitoring have been associated with low employee morale. For an employer to ensure health and safety may require inspections of the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  9
    Limits on surveillance: Frictions, fragilities and failures in the operation of camera surveillance.Lynsey Dubbeld - 2004 - Journal of Information, Communication and Ethics in Society 2 (1):9-19.
    Public video surveillance tends to be discussed in either utopian or dystopian terms: proponents maintain that camera surveillance is the perfect tool in the fight against crime, while critics argue that the use of security cameras is central to the development of a panoptic, Orwellian surveillance society. This paper provides an alternative, more nuanced view. On the basis of an empirical case study, the paper explores how camera surveillance applications do not simply augment surveillance capacities, but rather have to deal (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  6
    Trust and transparency in an age of surveillance.Lora Anne Viola & Paweł Laidler (eds.) - 2021 - New York, NY: Routledge.
    Investigating the theoretical and empirical relationships between transparency and trust in the context of surveillance, this volume argues that neither transparency nor trust provides a simple and self-evident path for mitigating the negative political and social consequences of state surveillance practices. Dominant in both the scholarly literature and public debate is the conviction that transparency can promote better-informed decisions, greater oversight, and restore trust damaged by the secrecy of surveillance. The contributions to this volume challenge this conventional wisdom by considering (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  95
    studiVZ: social networking in the surveillance society. [REVIEW]Christian Fuchs - 2010 - Ethics and Information Technology 12 (2):171-185.
    This paper presents some results of a case study of the usage of the social networking platform studiVZ by students in Salzburg, Austria. The topic is framed by the context of electronic surveillance. An online survey that was based on questionnaire that consisted of 35 (single and multiple) choice questions, 3 open-ended questions, and 5 interval-scaled questions, was carried out (N = 674). The knowledge that students have in general was assessed with by calculating a surveillance knowledge index, the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  49
    An ethics for the new surveillance (abstract).Gary T. Marx - 1998 - Acm Sigcas Computers and Society 28 (2):1.
    The Principles of Fair Information Practice are almost three decades old and need to be broadened to take account of new technologies for collecting personal information such as drug testing, video cameras, electronic location monitoring and the internet. I argue that the ethics of surveillance activity must be judged according to the means, the context and conditions of data collection and the uses/goals and suggest 29 questions related to this. The more one can answer these questions in a way (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  23.  11
    Biometric Bodies, Or How to Make Electronic Fingerprinting Work in India.Ursula Rao - 2018 - Body and Society 24 (3):68-94.
    The rapid spread of electronic fingerprinting not only creates new regimes of surveillance but compels users to adopt novel ways of performing their bodies to suit the new technology. This ethnography uses two Indian case studies – of a welfare office and a workplace – to unpack the processes by which biometric devices become effective tools for determining identity. While in the popular imaginary biometric technology is often associated with providing disinterested and thus objective evaluation of identity, in practice (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Big brother and the sweatshop: Computer surveillance in the automated office.Paul Attewell - 1987 - Sociological Theory 5 (1):87-100.
    Several authoritative sources have raised the possibility that computer counting and monitoring of work in automated workplaces will transform offices into electronic sweatshops. This paper examines this idea from the vantage point of industrial sociology and managerial theory. Five theoretical models are developed, each of which generates hypotheses about the contexts in which work monitoring becomes important. A brief history of clerical work is given which shows the antecedents of surveillance and work-measurement in this sphere, and a case study (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  25.  17
    Open AI meets open notes: surveillance capitalism, patient privacy and online record access.Charlotte Blease - 2024 - Journal of Medical Ethics 50 (2):84-89.
    Patient online record access (ORA) is spreading worldwide, and in some countries, including Sweden, and the USA, access is advanced with patients obtaining rapid access to their full records. In the UK context, from 31 October 2023 as part of the new NHS England general practitioner (GP) contract it will be mandatory for GPs to offer ORA to patients aged 16 and older. Patients report many benefits from reading their clinical records including feeling more empowered, better understanding and remembering their (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  23
    Symposium on Public Health Law Surveillance: The Nexus of Information Technology and Public Health Law.Angela McGowan, Michael Schooley, Helen Narvasa, Jocelyn Rankin & Daniel M. Sosin - 2003 - Journal of Law, Medicine and Ethics 31 (s4):41-42.
    The Centers for Disease Control and Prevention’s goal is to develop a surveillance system of public health laws that would both support research and analysis among policymakers and legislators, and support the scientific basis for public health law. This session was convened, in part, to discuss the value of creating an electronic system to track public health legal information. Public health surveillance is the “ongoing, systematic collection, analysis, interpretation, and dissemination of data regarding a health-related event for use in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  4
    Symposium on Public Health Law Surveillance: The Nexus of Information Technology and Public Health Law.Angela McGowan, Michael Schooley, Helen Narvasa, Jocelyn Rankin & Daniel M. Sosin - 2003 - Journal of Law, Medicine and Ethics 31 (S4):41-42.
    The Centers for Disease Control and Prevention’s goal is to develop a surveillance system of public health laws that would both support research and analysis among policymakers and legislators, and support the scientific basis for public health law. This session was convened, in part, to discuss the value of creating an electronic system to track public health legal information. Public health surveillance is the “ongoing, systematic collection, analysis, interpretation, and dissemination of data regarding a health-related event for use in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  64
    “Carnivore personal edition”: exploring distributed data surveillance. [REVIEW]Alexander R. Galloway - 2006 - AI and Society 20 (4):483-492.
    The goal of this paper is to offer, in straight forward terms, some practical insight into distributed data surveillance. I will use the software project Carnivore as a case study. Carnivore is a public domain riff on the U.S. Federal Bureau of Investigation’s software “Carnivore,” which was developed to perform electronic wiretaps of email. As founder of the Radical Software Group (RSG), and lead developer on the Carnivore project, I will describe the technological, philosophical, and political reasons for launching (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  23
    The Role of Law in Supporting Secondary Uses of Electronic Health Information.Tara Ramanathan, Cason Schmit, Akshara Menon & Chanelle Fox - 2015 - Journal of Law, Medicine and Ethics 43 (S1):48-51.
    For decades, health information has been collected and shared for health care delivery and public health purposes. While the “primary use” of patient data for providing direct health care services is the cornerstone of health care practice, health departments rely on data sharing for research and analysis to support disease prevention and health promotion in the population. As the U.S. health system undergoes a digital revolution, health information that was previously captured in paper form now can be captured electronically. (...) health information has transformed the efficiency, capacity, and functions of the U.S. health system. For this reason, there is increased attention to the “secondary use” of electronic patient data for public health uses, including disease reporting and investigation, syndromic surveillance, and patient-specific or population-level communications about health conditions and their associated risk factors. Secondary uses may also encompass clinical research, licensure, and payment for services. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  30.  31
    "Fruit of the Poisonous Tree": Journalistic Ethics and Voice-Mail Surveillance.Cecilia Friend & Donald Challenger - 2001 - Journal of Mass Media Ethics 16 (4):255-272.
    A 1998 Cincinnati Enquirer investigation into the Central American labor practices of Chiquita Brands International was substantiated by the taped words of company officials themselves. Yet, soon after publication, the Enquirer ran a stunning front-page retraction and disavowed the report without challenging its claims. The Gannett Corporation, the paper's owner, paid Chiquita $14 million to avoid a suit. The resultant outcry by journalists was directed not at Gannett, but at lead reporter Michael Gallagher, who had surreptitiously accessed Chiquita voice mail (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  24
    Ethical issues in the use of electronic health records for pharmacy medicines sales.Richard Cooper - 2007 - Journal of Information, Communication and Ethics in Society 5 (1):7-19.
    – Pharmacy sales of over‐the‐counter medicines in the UK represent an economically significant and important mechanism by which customers self‐medicate. Sales are supervised in pharmacies, but this paper seeks to question whether patients' electronic health records – due to be introduced nationally – could be used, ethically, by pharmacists to ensure safe medicines sales., – Using theoretical arguments, three areas of ethical concern are identified and explored in relation to pharmacists' access to EHRs‐consequentialsim, analogies and confidentiality/privacy., – Consequentialist arguments (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  32.  11
    Imagining past and present: a rhetorical strategy in Aeschines 3, Against Ctesiphon.Electronic Antiquity - 2007 - Classical Quarterly 57:490-501.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  41
    Privacy in the Family.Bryce Clayton Newell, Cheryl A. Metoyer & Adam Moore - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 104-121.
    While the balance between individual privacy and government monitoring or corporate surveillance has been a frequent topic across numerous disciplines, the issue of privacy within the family has been largely ignored in recent privacy debates. Yet privacy intrusions between parents and children or between adult partners or spouses can be just as profound as those found in the more “public spheres” of life. Popular access to increasingly sophisticated forms of electronic surveillance technologies has altered the dynamics of family relationships. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  34. Privacy at work – ethical criteria.Anders J. Persson & Sven Ove Hansson - 2003 - Journal of Business Ethics 42 (1):59 - 70.
    New technologies and practices, such as drug testing, genetic testing, and electronic surveillance infringe upon the privacy of workers on workplaces. We argue that employees have a prima facie right to privacy, but this right can be overridden by competing moral principles that follow, explicitly or implicitly, from the contract of employment. We propose a set of criteria for when intrusions into an employee''s privacy are justified. Three types of justification are specified, namely those that refer to the employer''s (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  35. The Retrieval of Liberalism in Policing.Luke William Hunt - 2019 - New York, NY, USA: Oxford University Press.
    There is a growing sense that many liberal states are in the midst of a shift in legal and political norms—a shift that is happening slowly and for a variety of reasons relating to security. The internet and tech booms—paving the way for new forms of electronic surveillance—predated the 9/11 attacks by several years, while the police’s vast use of secret informants and deceptive operations began well before that. On the other hand, the recent uptick in reactionary movements—movements in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  36.  15
    The Ethics of Intelligence: A New Framework.Ross Bellaby - 2014 - New York: Routledge.
    This book starts from the proposition that the field of intelligence lacks any systematic ethical review, and then develops a framework based on the notion of harm and the establishment of Just Intelligence Principles. As the professional practice of intelligence collection adapts to the changing environment of the twenty-first century, many academic experts and intelligence professionals have called for a coherent ethical framework that outlines exactly when, by what means and to what ends intelligence is justified. Recent controversies, including reports (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  37.  84
    Cultural visions of technology.Lauge Baungaard Rasmussen - 2013 - AI and Society 28 (2):177-188.
    The essential premise of the human-centered technology paradigm was clearly formulated by Howard Rosenbrock in the 1970s: technology should enrich rather than impoverish people’s work and life conditions. The increasing influence of technology in modern societies has been seen by some as offering great promise for the future, but by others as creating the electronic surveillance and/or manipulation of human genes, minds and beliefs. This paper approaches technological worlds as cultural visions in order to discuss and reflect the paradoxical (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  55
    Disattendability, Civil Inattention, and the Epistemology of Privacy.Axel Gelfert - 2014 - Philosophical Analysis 31:151-181.
    The concept of privacy is intimately related to epistemological concepts such as information and knowledge, yet for the longest time had received only scant attention from epistemologists. This has begun to change in recent years, and different philosophical accounts have been proposed. On the liberal model of privacy, what privacy aims at is the protection of individuals from interference in personal matters. On the (more narrowly epistemological) informational model, privacy is a matter of limiting access to (or maintaining control over) (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  20
    Legislating clear-statement regimes in national-security law.Jonathan F. Mitchell & GMU Law School Submitter - unknown
    Congress's national-security legislation will often require clear and specific congressional authorization before the executive can undertake certain actions. The War Powers Resolution, for example, prohibits any law from authorizing military hostilities unless it "specifically authorizes" them. And the Foreign Intelligence Surveillance Act of 1978 required laws to amend FISA or repeal its "exclusive means" provision before they could authorize warrantless electronic surveillance. But efforts to legislate clear-statement regimes in national-security law have failed to induce compliance. The Clinton Administration inferred (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  6
    Crossing the Line: Online Violence.Wanda Teays - 2019 - In Analyzing Violence Against Women. Springer. pp. 225-237.
    The Internet has a dark side that disproportionately affects women. In this chapter I will look at three forms of online abuse: Posting non-consensual nude photographs or videos, Cyberstalking, and Doxing—publishing private information that could lead to identity theft. The result can be loss of jobs, electronic surveillance, threatened rape or murder, scare tactics and being targeted for unwanted attention. I discuss the sorts of problems—and harms—of each of these and note some of the steps that have been taken (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  1
    La dictature de la transparence: essai.Mazarine Pingeot - 2016 - Paris: Robert Laffont.
    Peu de notions semblent a priori aussi vertueuses, donc aussi inoffensives, que celle de " transparence ", synonyme de clarté, de sincérité voire de rectitude morale. Mais en philosophie, c'est bien connu, aucun concept n'est bon ou mauvais en soi. Et, à y bien regarder, rien n'est si clair qu'il n'y paraît lorsqu'il s'agit de transparence. Chaque citoyen a par exemple le droit d'être informé de la façon la plus objective. Faut-il pour autant tout montrer dans les médias, y compris (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  56
    Technology and ethical dilemmas in a medical setting: Privacy, professional autonomy, life and death. [REVIEW]Gloria Lankshear & David Mason - 2001 - Ethics and Information Technology 3 (3):223-233.
    A growing literature addresses the ethical implications of electronic surveillance at work, frequently assigning ethical priority to values such as the right to privacy. This paper suggests that, in practice, the issues are sociologically more complex than some accounts suggest. This is because many workplace electronic technologies not designed or deployed for surveillance purposes nevertheless embody surveillance capacity. This capacity may not be immediately obvious to participants or lend itself to simple deployment. Moreover, because of their primary functions, (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43.  14
    Gambling with COVID-19 Makes More Sense: Ethical and Practical Challenges in COVID-19 Responses in Communalistic Resource-Limited Africa. [REVIEW]David Nderitu & Eunice Kamaara - 2020 - Journal of Bioethical Inquiry 17 (4):607-611.
    Informed by evidence from past studies and experiences with epidemics, an intervention combining quarantine, lockdowns, curfews, social distancing, and washing of hands has been adopted as “international best practice” in COVID-19 response. With massive total lockdowns complemented by electronic surveillance, China successfully controlled the pandemic in country within a few months. But would this work for Africa and other communalistic resource-poor settings where social togetherness translates to effective sharing of basic needs? What ethical and practical challenges would this pose? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  23
    Open sky.Paul Virilio - 1997 - New york: Verso.
    “One day the day will come when the day will not come.” Bleak, but passionately political in its analysis of the social destruction wrought by modern technologies of communication and surveillance, Open Sky is Paul Virilio's most far-reaching and radical book. Deepening and extending his earlier work, he explores the growing danger of what he calls a “generalized accident,” provoked by the breakdown of our collective and individual relation to time, space and movement in the context of global electronic (...)
    Direct download  
     
    Export citation  
     
    Bookmark   19 citations  
  45.  10
    Big Bad Data: Law, Public Health, and Biomedical Databases.Sharona Hoffman & Andy Podgurski - 2013 - Journal of Law, Medicine and Ethics 41 (s1):56-60.
    The accelerating adoption of electronic health record systems will have profound impacts on clinical care. It will also have far-reaching implications for public health research and surveillance, which in turn could lead to changes in public policy, statutes, and regulations. The public health benefits of EHR use can be significant. However, researchers and analysts who rely on EHR data must proceed with caution and understand the potential limitations of EHRs.Much has been written about the risk of EHR privacy breaches. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  46.  47
    The Fourth Generation of Human Rights: Epistemic Rights in Digital Lifeworlds.Mathias Risse - 2021 - Moral Philosophy and Politics 8 (2):351-378.
    In contrast to China’s efforts to upgrade its system of governance around a stupefying amount of data collection and electronic scoring, countries committed to democracy and human rights did not upgrade their systems. Instead, those countries ended up with surveillance capitalism. It is vital for the survival of those ideas about governance to perform such an upgrade. This paper aims to contribute to that goal. I propose a framework of epistemic actorhood in terms of four roles and characterize digital (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  27
    The Right to Know and the Right Not to Know: Genetic Privacy and Responsibility.Ruth Chadwick, Mairi Levitt & Darren Shickle (eds.) - 2014 - Cambridge University Press.
    The privacy concerns discussed in the 1990s in relation to the New Genetics failed to anticipate the relevant issues for individuals, families, geneticists and society. Consumers, for example, can now buy their personal genetic information and share it online. The challenges facing genetic privacy have evolved as new biotechnologies have developed, and personal privacy is increasingly challenged by the irrepressible flow of electronic data between the personal and public spheres and by surveillance for terrorism and security risks. This book (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  48. Supermax as a technology of punishment.Lorna A. Rhodes - 2007 - Social Research: An International Quarterly 74 (2):547-566.
    Supermax prisons are often described as "high_tech." Observers seem to mean two things by this. The first is that these "prisons within prisons" are a technology in themselves: hard_edged and brightly lit, the fortress_like supermax clearly signals its specialized purpose of isolation and control. The second is that supermax prisons rely heavily on specialized, relatively new technologies: computerized systems produce new forms of intensive surveillance while special teams armed with electronic shields maintain control over prisoners.But as Leo Marx observed (...)
     
    Export citation  
     
    Bookmark   2 citations  
  49.  63
    Ethics, Information Technology, and Public Health: New Challenges for the Clinician-Patient Relationship.Kenneth W. Goodman - 2010 - Journal of Law, Medicine and Ethics 38 (1):58-63.
    Increasingly widespread adoption of health information technology tools in clinical care increases interest in ethical and legal issues related to the use of these tools for public health and the effects of these uses on the clinician-patient relationship. It is argued that patients, clinicians, and society have generally uncontroversial duties to support civil society's public health mission, information technology supports this mission, and the effects of automated and computerized public health surveillance are likely to have little if any effect on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  50.  30
    Ethics, Information Technology, and Public Health: New Challenges for the Clinician-Patient Relationship.Kenneth W. Goodman - 2010 - Journal of Law, Medicine and Ethics 38 (1):58-63.
    One of the largest, oldest, and most interesting challenges in health care is the balancing act in which clinicians have generally uncontroversial duties both to individual patients and to communities. Physicians and nurses must — so we teach them — put patients first, and at the same time recognize that individuals are members of communities. Individuals affect the health of communities, and communities affect the health of individuals. Thus, the moral and professional duties that result are sometimes in conflict.Moreover, the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 993