Results for 'Privacy by Design '

997 found
Order:
  1.  61
    Privacy by Design in Personal Health Monitoring.Anders Nordgren - 2015 - Health Care Analysis 23 (2):148-164.
    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by (...) and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Privacy by Design.Peter Schaar - 2010 - Identity in the Information Society 3 (2):267-274.
    In view of rapid and dramatic technological change, it is important to take the special requirements of privacy protection into account early on, because new technological systems often contain hidden dangers which are very difficult to overcome after the basic design has been worked out. So it makes all the more sense to identify and examine possible data protection problems when designing new technology and to incorporate privacy protection into the overall design, instead of having to (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  3.  91
    Privacy by Design: essential for organizational accountability and strong business practices. [REVIEW]Ann Cavoukian, Scott Taylor & Martin E. Abrams - 2010 - Identity in the Information Society 3 (2):405-413.
    An accountability-based privacy governance model is one where organizations are charged with societal objectives, such as using personal information in a manner that maintains individual autonomy and which protects individuals from social, financial and physical harms, while leaving the actual mechanisms for achieving those objectives to the organization. This paper discusses the essential elements of accountability identified by the Galway Accountability Project, with scholarship from the Centre for Information Policy Leadership at Hunton & Williams LLP. Conceptual _Privacy by Design_ (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  4. Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D. [REVIEW]Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):247-251.
    In November, 2009, a prominent group of privacy professionals, business leaders, information technology specialists, and academics gathered in Madrid to discuss how the next set of threats to privacy could best be addressed.The event, Privacy by Design: The Definitive Workshop, was co-hosted by my office and that of the Israeli Law, Information and Technology Authority. It marked the latest step in a journey that I began in the 1990’s, when I first focused on enlisting the support (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  5.  20
    Ciência da informação e privacy by design.Jonas Ferrigolo Melo, Moisés Rockembach & Armando Manuel Barreiros Malheiro da Silva - 2023 - Logeion Filosofia da Informação 9 (2):124-143.
    Este artigo apresenta o mapeamento das possibilidades de pesquisa no âmbito da Ciência da Informação (CI) que tratam sobre o conceito de Privacy by Design (PbD). Se busca responder como a CI e os usos da teoria do PbD podem influenciar no alcance de maior privacidade aos usuários de sistemas de informação desde a concepção de produtos científicos até a pesquisa aplicada. Para responder esta pergunta, foram analisados 202 artigos, que balizaram a composição do mapa de possibilidades de (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  97
    Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
    An introductory message from Peter Hustinx, European Data Protection Supervisor, delivered at Privacy by Design: The Definitive Workshop. This presentation looks back at the origins of Privacy by Design, notably the publication of the first report on “Privacy Enhancing Technologies” by a joint team of the Information and Privacy Commissioner of Ontario, Canada and the Dutch Data Protection Authority in 1995. It looks ahead and adresses the question of how the promises of these concepts (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  69
    Remote home health care technologies: how to ensure privacy? Build it in: Privacy by Design.Ann Cavoukian, Angus Fisher, Scott Killen & David A. Hoffman - 2010 - Identity in the Information Society 3 (2):363-378.
    Current advances in connectivity, sensor technology, computing power and the development of complex algorithms for processing health-related data are paving the way for the delivery of innovative long-term health care services in the future. Such technological developments will, in particular, assist the elderly and infirm to live independently, at home, for much longer periods. The home is, in fact, becoming a locus for health care innovation that may in the future compete with the hospital. However, along with these advances come (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  8.  55
    Extending the value chain to incorporate privacy by design principles.Julie Smith David & Marilyn Prosch - 2010 - Identity in the Information Society 3 (2):295-318.
    Morgan et al. examine the notion of corporate citizenship and suggest that for it to be effective companies need to minimize harm and maximize benefits through its activities and, in so doing, take account of and be responsive to a full range of stakeholders. Specifically, they call for a “next generation” approach to corporate citizenship that embeds structures, systems, processes and policies into and across the company’s value chain. We take this notion of corporate citizenship and apply it to (...) by Design concepts in a value chain model. Privacy by Design is comprised of Seven Foundational Principles, and as we develop the Privacy by Design Value Chain, those principles are incorporated. First, we examine the primary activities in the value chain and consider each of these seven principles, and then we extend the analysis to the support activities. Finally, we consider privacy implications and the challenges to be faced in supply chain and federated environments. Designing privacy into the value chain model is a practical, business view of organizational and privacy issues. This puts privacy where it belongs in an organization—everywhere personal information exists. We conclude that further research is needed to consider the internal stakeholders’ communications among the various departments within an organization with the goal of better communications and shared values, and we believe the value chain approach helps to further this research agenda. Also, federated environments necessitate that organizations can “trust” their third parties providers. Research and case studies are needed regarding how these organizations can create value and competitive advantages by voluntarily providing their customers with privacy practice compliance reports. For the most part, the future is bright for the protection of personal information because solutions, not problems are being proposed, researched, developed and implemented. (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  9.  37
    Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Leenes R. Van Brakel R. Gutwirth S. De Hert P. (ed.), Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  14
    Role-Playing Computer Ethics: Designing and Evaluating the Privacy by Design (PbD) Simulation.Katie Shilton, Donal Heidenblad, Adam Porter, Susan Winter & Mary Kendig - 2020 - Science and Engineering Ethics 26 (6):2911-2926.
    There is growing consensus that teaching computer ethics is important, but there is little consensus on how to do so. One unmet challenge is increasing the capacity of computing students to make decisions about the ethical challenges embedded in their technical work. This paper reports on the design, testing, and evaluation of an educational simulation to meet this challenge. The privacy by design simulation enables more relevant and effective computer ethics education by letting students experience and make (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  8
    Medical research, Big Data and the need for privacy by design.Jean Popma & Bart Jacobs - 2019 - Big Data and Society 6 (1).
    Medical research data is sensitive personal data that needs to be protected from unauthorized access and unintentional disclosure. In a research setting, sharing of data within the scientific community is necessary in order to make progress and maximize scientific benefits derived from valuable and costly data. At the same time, convincingly protecting the privacy of people participating in medical research is a prerequisite for maintaining trust and willingness to share. In this commentary, we will address this issue and the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  39
    A pragmatic approach to privacy risk optimization: privacy by design for business practices. [REVIEW]Terry McQuay & Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):379-396.
    This paper introduces Nymity’s Privacy Risk Optimization Process (PROP), a process that enables the implementation of privacy into operational policies and procedures, which embodies in Privacy by Design for business practices. The PROP is based on the International Organization for Standardization (ISO) concept that risk can be positive and negative; and further defines Risk Optimization as a process whereby organizations strive to maximize positive risks and mitigate negative ones. The PROP uses these concepts to implement (...) into operational policies and procedures. This paper was produced by Nymity and the Office of the Information and Privacy Commissioner of Ontario, Canada. It was presented by Terry McQuay, President of Nymity, at Privacy by Design: The Definitive Workshop, in Madrid, Spain, on November 2nd, 2009. The workshop was hosted by Dr. Ann Cavoukian, Information and Privacy Commissioner of Ontario, Canada, and Yoram Hacohen, Head of the Israeli Law, Information and Technology Authority. (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  13.  13
    Privacy-centered design for social robots.Tanja Heuer, Ina Schiering & Reinhard Gerndt - 2019 - Interaction Studies. Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies / Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies 20 (3):509-529.
    Social robots as companions play an increasingly important role in our everyday life. However, reaching the full potential of social robots and the interaction between humans and robots requires permanent collection and processing of personal data of users, e.g. video and audio data for image and speech recognition. In order to foster user acceptance, trust and to address legal requirements as the General Data Protection Regulation of the EU, privacy needs to be integrated in the design process of (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14.  22
    Privacy by default” and active “informed consent” by layers.Amaya Noain-Sánchez - 2016 - Journal of Information, Communication and Ethics in Society 14 (2):124-138.
    Purpose The purpose of this paper is to lay out an approach to addressing the problem of privacy protection in the global digital environment based on the importance that information has to improve users’ informational self-determination. Following this reasoning, this paper focuses on the suitable way to provide user with the correct amount of information they may need to maintain a desirable grade of autonomy as far as their privacy protection is concerned and decide whether or not to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  15.  42
    Layering privacy on operating systems, social networks, and other platforms by design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
    Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (3) the evolution of the PeCAN (Personal Context Agent Networking) architecture to a platform for pervasively providing multiple contexts for user privacy preferences and online informational (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  36
    Towards Transparency by Design for Artificial Intelligence.Heike Felzmann, Eduard Fosch-Villaronga, Christoph Lutz & Aurelia Tamò-Larrieux - 2020 - Science and Engineering Ethics 26 (6):3333-3361.
    In this article, we develop the concept of Transparency by Design that serves as practical guidance in helping promote the beneficial functions of transparency while mitigating its challenges in automated-decision making environments. With the rise of artificial intelligence and the ability of AI systems to make automated and self-learned decisions, a call for transparency of how such systems reach decisions has echoed within academic and policy circles. The term transparency, however, relates to multiple concepts, fulfills many functions, and holds (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  17.  14
    Research ethics by design: A collaborative research design proposal.Donald S. Borrett, Heather Sampson & Ann Cavoukian - 2017 - Research Ethics 13 (2):84-91.
    Privacy by Design, a globally accepted framework for personal data management and privacy protection, advances the view that privacy cannot be assured solely by compliance with regulatory frameworks but must become an organisation’s default mode of operation. We are proposing a similar template for the research ethics review process. The Research Ethics by Design framework involves research ethics committees engaging researchers during the design phase of the proposal so that ethical considerations may be directly (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  6
    Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network.James Stewart & Ben Collier - 2022 - Science, Technology, and Human Values 47 (5):910-936.
    This paper explores, through empirical research, how values, engineering practices, and technological design decisions shape one another in the development of privacy technologies. We propose the concept of “privacy worlds” to explore the values and design practices of the engineers of one of the world’s most notable privacy technologies: the Tor network. By following Tor’s design and development we show a privacy world emerging—one centered on a construction of privacy understood through the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  8
    Ethical aspects in eHealth – design of a privacy-friendly system.Milica Milutinovic & Bart De Decker - 2016 - Journal of Information, Communication and Ethics in Society 14 (1):49-69.
    Purpose– The medical advances and historical fluctuations in the demographics are contributing to the rise of the average age. These changes are increasing the pressure to organize adequate care to a growing number of individuals. As a way to provide efficient and cost-effective care, eHealth systems are gaining importance. However, this trend is creating new ethical concerns. Major issues are privacy and patients’ control over their data. To deploy these systems on a large scale, they need to offer strict (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  6
    The “silence of the chips” concept: towards an ethics(-by-design) for IoT.Caroline Rizza & Laura Draetta - 2014 - International Review of Information Ethics 22:23-31.
    In this position paper, we would like to promote the alternative approach positioned between the two extreme positions consisting in refusing any innovation or in adopting technology without questioning it. This approach proposes a reflexive and responsible innovation based on a compromise between industrial and economic potentialities and a common respect of our human rights and values. We argue that the “silence of the chips right” is timely, relevant and sustainable to face ethical challenges raised by IoT such as protecting (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. The design of the internet’s architecture by the Internet Engineering Task Force (IETF) and human rights.Corinne Cath & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (2):449–468.
    The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet’s architecture. The technical decisions made by Internet Standard Developing Organisations that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically mediated public sphere, including which rights (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  27
    Law, ethics and medicine: Privacy impact assessment in the design of transnational public health information systems: the BIRO project.C. Di Iorio, F. Carinci, J. Azzopardi, V. Baglioni & P. Beck - 2009 - Journal of Medical Ethics 35 (12):753-761.
    Objectives: To foster the development of a privacy-protective, sustainable cross-border information system in the framework of a European public health project. Materials and methods: A targeted privacy impact assessment was implemented to identify the best architecture for a European information system for diabetes directly tapping into clinical registries. Four steps were used to provide input to software designers and developers: a structured literature search, analysis of data flow scenarios or options, creation of an ad hoc questionnaire and conduction (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  23.  60
    Data Science and Designing for Privacy.Michael Falgoust - 2016 - Techné: Research in Philosophy and Technology 20 (1):51-68.
    Unprecedented advances in the ability to store, analyze, and retrieve data is the hallmark of the information age. Along with enhanced capability to identify meaningful patterns in large data sets, contemporary data science renders many classical models of privacy protection ineffective. Addressing these issues through privacy-sensitive design is insufficient because advanced data science is mutually exclusive with preserving privacy. The special privacy problem posed by data analysis has so far escaped even leading accounts of informational (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  25.  47
    SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. [REVIEW]Ann Cavoukian, Jules Polonetsky & Christopher Wolf - 2010 - Identity in the Information Society 3 (2):275-294.
    The 2003 blackout in the northern and eastern U.S. and Canada which caused a $6 billion loss in economic revenue is one of many indicators that the current electrical grid is outdated. Not only must the grid become more reliable, it must also become more efficient, reduce its impact on the environment, incorporate alternative energy sources, allow for more consumer choices, and ensure cyber security. In effect, it must become smart. Significant investments in the billions of dollars are being made (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  84
    Comparative legal study on privacy and personal data protection for robots equipped with artificial intelligence: looking at functional and technological aspects.Kaori Ishii - 2019 - AI and Society 34 (3):509-533.
    This paper undertakes a comparative legal study to analyze the challenges of privacy and personal data protection posed by Artificial Intelligence embedded in Robots, and to offer policy suggestions. After identifying the benefits from various AI usages and the risks posed by AI-related technologies, I then analyze legal frameworks and relevant discussions in the EU, USA, Canada, and Japan, and further consider the efforts of Privacy by Design originating in Ontario, Canada. While various AI usages provide great (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  27.  67
    Surveillance, privacy and the ethics of vehicle safety communication technologies.M. Zimmer - 2005 - Ethics and Information Technology 7 (4):201-210.
    Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  28. Imaginative Value Sensitive Design: Using Moral Imagination Theory to Inform Responsible Technology Design.Steven Umbrello - 2020 - Science and Engineering Ethics 26 (2):575-595.
    Safe-by-Design (SBD) frameworks for the development of emerging technologies have become an ever more popular means by which scholars argue that transformative emerging technologies can safely incorporate human values. One such popular SBD methodology is called Value Sensitive Design (VSD). A central tenet of this design methodology is to investigate stakeholder values and design those values into technologies during early stage research and development (R&D). To accomplish this, the VSD framework mandates that designers consult the philosophical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  29. Group privacy: a defence and an interpretation.Luciano Floridi - 2017 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group Privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  30. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. Imaginative Value Sensitive Design: How Moral Imagination Exceeds Moral Law Theories in Informing Responsible Innovation.Steven Umbrello - 2018 - Dissertation, University of Edinburgh
    Safe-by-Design (SBD) frameworks for the development of emerging technologies have become an ever more popular means by which scholars argue that transformative emerging technologies can safely incorporate human values. One such popular SBD methodology is called Value Sensitive Design (VSD). A central tenet of this design methodology is to investigate stakeholder values and design those values into technologies during early stage research and development (R&D). To accomplish this, the VSD framework mandates that designers consult the philosophical (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  16
    The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano, Gian Piero Fici, Ugo Pagallo, Stefano Primatesta & Fulvia Quagliotti - 2019 - Minds and Machines 29 (4):579-601.
    Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  16
    The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano, Gian Piero Fici, Ugo Pagallo, Stefano Primatesta & Fulvia Quagliotti - 2019 - Minds and Machines 29 (4):579-601.
    Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  27
    The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano, Gian Piero Fici, Ugo Pagallo, Stefano Primatesta & Fulvia Quagliotti - 2019 - Minds and Machines 29 (4):579-601.
    Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  36.  27
    Privacy as Protection of the Incomputable Self: From Agnostic to Agonistic Machine Learning.Mireille Hildebrandt - 2019 - Theoretical Inquiries in Law 20 (1):83-121.
    This Article takes the perspective of law and philosophy, integrating insights from computer science. First, I will argue that in the era of big data analytics we need an understanding of privacy that is capable of protecting what is uncountable, incalculable or incomputable about individual persons. To instigate this new dimension of the right to privacy, I expand previous work on the relational nature of privacy, and the productive indeterminacy of human identity it implies, into an ecological (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  37.  52
    Togetherness and respect: ethical concerns of privacy in Global Web Societies.Gordana Dodig-Crnkovic & Virginia Horniak - 2006 - AI and Society 20 (3):372-383.
    Today’s computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated internet-based attacks are almost impossible to prevent. At the same time, information and communication technology, ICT offers the technical possibility of embedded privacy protection. Making technology legitimate by design is a part of the intentional design for democracy. This means incorporating options for socially acceptable behaviour in technical systems, and making the basic principles of privacy protection, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  28
    Property, privacy and personhood in a world of ambient intelligence.Niels Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  31
    Trust and privacy in the future internet—a research perspective.Dirk Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  81
    Property, privacy and personhood in a world of ambient intelligence.Niels van Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  11
    Ethical Design and Use of Robotic Care of the Elderly.Carolyn Johnston - 2022 - Journal of Bioethical Inquiry 19 (1):11-14.
    The Australian Royal Commission into Aged Care Quality and Safety acknowledged understaffing and substandard care in residential aged care and home care services, and recommendations were made that that the Australian Government should promote assistive technology within aged care. Robotic care assistants can provide care and companionship for the elderly—both in their own homes and within health and aged care institutions. Although more research is required into their use, studies indicate benefits, including enabling the elderly to live independently at home, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  42.  18
    Patient Privacy.Orhan Onder, Ilhan Ilkilic & Cuneyt Kucur (eds.) - 2020 - İstanbul, Türkiye: ISAR Publications.
    The sense of shame is part of human nature. What, then, is the role and significance of such a particular sensation, one that causes mental anxiety in a sick person’s weakest and the most vulnerable state? We know from historical documents going back as far as ancient Greece and Egypt that respecting patient privacy should be regarded as a moral duty for physicians in charge of treatment. However much today’s healthcare may have changed compared to centuries past, we note (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  21
    Others’ information and my privacy: an ethical discussion.Yuanye Ma - 2023 - Journal of Information, Communication and Ethics in Society 21 (3):259-270.
    Purpose Privacy has been understood as about one’s own information, information that is not one’s own is not typically considered with regards to an individual’s privacy. This paper aims to draw attention to this issue for conceptualizing privacy when one’s privacy is breached by others’ information. Design/methodology/approach To illustrate the issue that others' information can breach one's own privacy, this paper uses real-world applications of forensic genealogy and recommender systems to motivate the discussion. Findings (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  11
    Privacy and anti-surveillance advocacy: the role/challenge of issue salience.Smith Oduro-Marfo - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):422-437.
    Purpose The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse profiling and social sorting. There is a heightened need for dedicated advocacy and activism to consistently demand accountability and transparency from African states, governments and their allies regarding surveillance. The purpose of this paper is to understand the issue frames that accompany anti-surveillance and privacy advocacy in Ghana and the related implications. (...)/methodology/approach Using a qualitative and interpretivist approach, the author focuses on three different surveillance-oriented incidents/programs in Ghana and analyzes the frames underpinning the related advocacy and narratives of various non-state actors. Findings Privacy and anti-surveillance advocacy in Ghana tends to be less framed in the context of privacy rights and is more driven by concerns about corruption and value for money. Such pecuniary emphasis is rational per issue salience calculations as it elevates principles of economic probity, transparency and accountability and pursues a high public shock value and resonance. Practical implications Economics-centered critiques of surveillance could be counterproductive as they create a low bar for surveillance promoters and sustains a culture of permissible statist intrusions into citizens’ lives once economic virtues are satisfied. Originality/value While anti-surveillance and privacy advocacy is budding across African countries, little is known about its nature, frames and modus compared to such advocacy in European and North American settings. To the best of the author’s knowledge, this is likely the first paper or one of the first dedicated fully to anti-surveillance and advocacy in Africa. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  74
    Built-in privacy—no panacea, but a necessary condition for effective privacy protection.Alexander Dix - 2010 - Identity in the Information Society 3 (2):257-265.
    Built-in privacy has for too long been neglected by regulators. They have concentrated on reacting to violations of rules. Even imposing severe fines will however not address the basic issue that preventative privacy protection is much more meaningful. The paper discusses this in the context of the International Working Group on Data Protection in Telecommunications (“Berlin Group”) which has published numerous recommendations on privacy-compliant design of technical innovations. Social network services, road pricing schemes, and the distribution (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  47
    Towards an alternative concept of privacy.Christian Fuchs - 2011 - Journal of Information, Communication and Ethics in Society 9 (4):220-237.
    PurposeThere are a lot of discussions about privacy in relation to contemporary communication systems (such as Facebook and other “social media” platforms), but discussions about privacy on the internet in most cases misses a profound understanding of the notion of privacy and where this notion is coming from. The purpose of this paper is to challenge the liberal notion of privacy and explore foundations of an alternative privacy conception.Design/methodology/approachA typology of privacy definitions is (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  47.  33
    Patron Privacy in the "2.0" Era.Michael Zimmer - 2013 - Journal of Information Ethics 22 (1):44-59.
    As libraries begin to embrace Web 2.0 technologies to serve patrons—ushering in the era of Library 2.0—unique dilemmas arise in the realm of information ethics, especially regarding patron privacy. The norms of Web 2.0 promote the open sharing of information—often personal information—and the design of many Library 2.0 services capitalize on access to patron information and might require additional tracking, collection, and aggregation of patron activities. Thus, embracing Library 2.0 potentially threatens the traditional ethics of librarianship, where protecting (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Contextual gaps: privacy issues on Facebook.Gordon Hull, Heather Richter Lipford & Celine Latulipe - 2011 - Ethics and Information Technology 13 (4):289-302.
    Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps are at the root of many (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  49.  38
    Exploring How Personality Affects Privacy Control Behavior on Social Networking Sites.Yuhui Li, Zhaoxing Huang, Yenchun Jim Wu & Zhiqiang Wang - 2019 - Frontiers in Psychology 10:468452.
    Few studies have examined the relationship between personality traits and social networking sites (SNSs) with a dominant concentration on the personality alterations under SNSs influence. The relationship between personality and privacy control was less focused and discussed. In order to figure out the internal mechanism of such link among youth SNSs users, the Theory of Planned Behavior (TPB) was extended by including Five-Factor Model of Personality to explore how personality traits interact with privacy control behavior on SNSs. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  50.  70
    AI and privacy concerns: a smart meter case study.Jillian Carmody, Samir Shringarpure & Gerhard Van de Venter - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):492-505.
    Purpose The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection. Design/methodology/approach The authors illustrate how, through smart meter obtained energy data, home (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 997