Results for 'privacy enhancing technologies'

1000+ found
Order:
  1. Privacy-enhancing technologies as a panacea for online privacy concerns. Some ethical considerations.Herman Tavani - 2000 - Journal of Information Ethics 9 (2):26-36.
     
    Export citation  
     
    Bookmark   2 citations  
  2.  21
    “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good.Zbigniew Kwecka, William Buchanan, Burkhard Schafer & Judith Rauhofer - 2014 - Artificial Intelligence and Law 22 (2):113-139.
    The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This idea finds its correspondence in our approach to privacy protection through obfuscation, where everybody in a group takes a small privacy risk to protect the anonymity of fellow group members. We show how these ideas can be computationally realised in an Investigative Data Acquisition Platform. IDAP is an efficient symmetric Private (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  31
    " I am Spartacus"–privacy enhancing technologies and privacy as a public good.Zbigniew Kwecka, William J. Buchanan & Burkhard Schafer - forthcoming - Artificial Intelligence and Law.
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  5.  74
    Inaccuracy as a privacy-enhancing tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
    The accuracy principle is one of the key standards of informational privacy. It epitomises the obligation for those processing personal data to keep their records accurate and up-to-date, with the aim of protecting individuals from unfair decisions. Currently, however, different practices being put in place in order to enhance the protection of individuals appear to deliberately rely on the use of ‘inaccurate’ personal information. This article explores such practices and tries to assess their potential for privacy protection, giving (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  6. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  7.  21
    Designing databases that enhance people’s privacy without hindering organizations: Towards informational self-determination.Thomas B. Hodel-Widmer - 2006 - Ethics and Information Technology 8 (1):3-15.
    We argue that future database systems must provide autonomy for individuals for the privacy of data they manage. We propose a design for such a system, identify challenges and problems, and suggest some approaches to these. We enunciate the reasons for informational self-determination systems, which include legal, organizational and technical issues. Our main goal is to achieve a widely-accepted realistic and practical solution in order to ensure privacy for individuals in our future world, yet without hindering business and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  65
    Respecting privacy in detecting illegitimate enhancements in athletes.Sarah Teetzel - 2007 - Sport, Ethics and Philosophy 1 (2):159 – 170.
    This paper explores the degree of privacy athletes can expect and demand in the era of genetic technology in sport. Detecting genetic enhancements in sport, and consequently doping violations, using genetic tests is problematic because testing requires access to athletes' genetic information, and accessing genetic information creates many potential privacy issues and concerns throughout the world. Whether it is morally acceptable to subject athletes to the tests used to detect genetic modifications in sport is taken up in this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  71
    Ownership, Privacy and Monitoring in the Workplace: A Debate on Technology and Ethics.Karen D. Loch, Sue Conger & Effy Oz - 1998 - Journal of Business Ethics 17 (6):653-663.
    A panel held at the International Conference on Information Systems, December 5–7, 1993, addressed the importance and ethicality of several issues relating to ethics and information technology use. The substance of the debate and results of audience votes on the issues are presented in this paper as a means of initiating a broader debate on the issues, for it is with debate that we reach a group consensus on acceptable behavior and practice. With consensus, we can begin to develop codes (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  10.  42
    Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others. The basis of modern privacy laws and practices around the world, informational privacy has become a challenging concept to protect and promote in a world of ubiquitous and unlimited data sharing and storage among organizations. The paper advocates a “user-centric” approach to managing personal data online. However, user-centricity can be problematic when the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  11. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12. Accountable privacy supporting services.Jan Camenisch, Thomas Groß & Thomas Scott Heydt-Benjamin - 2009 - Identity in the Information Society 2 (3):241-267.
    As privacy concerns among consumers rise, service providers increasingly want to provide services that support privacy enhancing technologies. At the same time, online service providers must be able to protect themselves against misbehaving users. For instance, users that do not pay their bill must be held accountable for their behavior. This tension between privacy and accountability is fundamental, however a tradeoff is not always required. In this article we propose the concept of a time capsule, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  13.  29
    Property, privacy and personhood in a world of ambient intelligence.Niels Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  92
    Privacy by Design: essential for organizational accountability and strong business practices. [REVIEW]Ann Cavoukian, Scott Taylor & Martin E. Abrams - 2010 - Identity in the Information Society 3 (2):405-413.
    An accountability-based privacy governance model is one where organizations are charged with societal objectives, such as using personal information in a manner that maintains individual autonomy and which protects individuals from social, financial and physical harms, while leaving the actual mechanisms for achieving those objectives to the organization. This paper discusses the essential elements of accountability identified by the Galway Accountability Project, with scholarship from the Centre for Information Policy Leadership at Hunton & Williams LLP. Conceptual _Privacy by Design_ (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  15.  31
    Community perspectives on the benefits and risks of technologically enhanced communicable disease surveillance systems: a report on four community juries.Chris Degeling, Stacy M. Carter, Antoine M. van Oijen, Jeremy McAnulty, Vitali Sintchenko, Annette Braunack-Mayer, Trent Yarwood, Jane Johnson & Gwendolyn L. Gilbert - 2020 - BMC Medical Ethics 21 (1):1-14.
    Background Outbreaks of infectious disease cause serious and costly health and social problems. Two new technologies – pathogen whole genome sequencing and Big Data analytics – promise to improve our capacity to detect and control outbreaks earlier, saving lives and resources. However, routinely using these technologies to capture more detailed and specific personal information could be perceived as intrusive and a threat to privacy. Method Four community juries were convened in two demographically different Sydney municipalities and two (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  97
    Property, privacy and personhood in a world of ambient intelligence.Niels van Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D. [REVIEW]Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):247-251.
    In November, 2009, a prominent group of privacy professionals, business leaders, information technology specialists, and academics gathered in Madrid to discuss how the next set of threats to privacy could best be addressed.The event, Privacy by Design: The Definitive Workshop, was co-hosted by my office and that of the Israeli Law, Information and Technology Authority. It marked the latest step in a journey that I began in the 1990’s, when I first focused on enlisting the support of (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  18.  85
    Privacy and ethics in brain-computer interface research.Eran Klein & Alan Rubel - 2018 - In Eran Klein & Alan Rubel (eds.), Brain–Computer Interfaces Handbook: Technological and Theoretical Advances. pp. 653-655.
    Neural engineers and clinicians are starting to translate advances in electrodes, neural computation, and signal processing into clinically useful devices to allow control of wheelchairs, spellers, prostheses, and other devices. In the process, large amounts of brain data are being generated from participants, including intracortical, subdural and extracranial sources. Brain data is a vital resource for BCI research but there are concerns about whether the collection and use of this data generates risk to privacy. Further, the nature of BCI (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  15
    Care ethics and the responsible management of power and privacy in digitally enhanced disaster response.Paul Hayes & Damian Jackson - 2020 - Journal of Information, Communication and Ethics in Society 18 (1):157-174.
    PurposeThis paper aims to argue that traditional ethical theories used in disaster response may be inadequate and particularly strained by the emergence of new technologies and social media, particularly with regard to privacy. The paper suggests incorporation of care ethics into the disaster ethics nexus to better include the perspectives of disaster affected communities.Design/methodology/approachThis paper presents a theoretical examination of privacy and care ethics in the context of social media/digitally enhanced disaster response.FindingsThe paper proposes an ethics of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
    An introductory message from Peter Hustinx, European Data Protection Supervisor, delivered at Privacy by Design: The Definitive Workshop. This presentation looks back at the origins of Privacy by Design, notably the publication of the first report on “Privacy Enhancing Technologies” by a joint team of the Information and Privacy Commissioner of Ontario, Canada and the Dutch Data Protection Authority in 1995. It looks ahead and adresses the question of how the promises of these concepts (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  22.  32
    Trust and privacy in the future internet—a research perspective.Dirk Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  13
    Privacy and anti-surveillance advocacy: the role/challenge of issue salience.Smith Oduro-Marfo - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):422-437.
    Purpose The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse profiling and social sorting. There is a heightened need for dedicated advocacy and activism to consistently demand accountability and transparency from African states, governments and their allies regarding surveillance. The purpose of this paper is to understand the issue frames that accompany anti-surveillance and privacy advocacy in Ghana and the related (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  4
    Adoption of mobile health services using the unified theory of acceptance and use of technology model: Self-efficacy and privacy concerns.Yizhi Liu, Xuan Lu, Gang Zhao, Chengjiang Li & Junyi Shi - 2022 - Frontiers in Psychology 13.
    Mobile health services have been widely used in medical services and health management through mobile devices and multiple channels, such as smartphones, wearable equipment, healthcare applications, and medical platforms. However, the number of the users who are currently receiving the mHealth services is small. In China, more than 70% of internet users have never used mHealth services. Such imbalanced situation could be attributed to users’ traditional concept of medical treatment, psychological factors and privacy concerns. The purpose of this study (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  66
    How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone - 2009 - Artificial Intelligence and Law 17 (1):1-30.
    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why, and when such solutions have to be adopted is often unanswered because the answer comes only from a broader perspective, accounting for legal and organizational issues. Security engineers (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  26.  30
    Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns.Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107-123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers' (...) concerns relates to fairness judgments, which in turn comprise of the two primary components of distributive and procedural justice. Second, we make a number of prescriptions, aimed at both firms and regulators, based on the notion that consumers respond to perceived privacy violations in much the same way they would respond to an unfair exchange. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  27. Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made such surveillance relatively (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  28.  43
    Patient privacy protection among university nursing students: A cross-sectional study.Dorothy N. S. Chan, Kai-Chow Choi, Miranda H. Y. To, Summer K. N. Ha & Gigi C. C. Ling - 2022 - Nursing Ethics 29 (5):1280-1292.
    Background Protecting a person’s right to privacy and confidentiality is important in healthcare services. As future health professionals, nursing students should bear the same responsibility as qualified health professionals in protecting patient privacy. Objectives To investigate nursing students’ practices of patient privacy protection and to identify factors associated with their practices. Research design A cross-sectional study design was adopted. A two-part survey was used to collect two types of data on nursing students: (1) personal characteristics, including demographics, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  97
    Marketing dataveillance and digital privacy: Using theories of justice to understand consumers' online privacy concerns. [REVIEW]Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107 - 123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers’ (...) concerns relates to fairness judgments, which in turn comprise of the two primary components of distributive and procedural justice. Second, we make a number of prescriptions, aimed at both firms and regulators, based on the notion that consumers respond to perceived privacy violations in much the same way they would respond to an unfair exchange. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  30.  35
    Patron Privacy in the "2.0" Era.Michael Zimmer - 2013 - Journal of Information Ethics 22 (1):44-59.
    As libraries begin to embrace Web 2.0 technologies to serve patrons—ushering in the era of Library 2.0—unique dilemmas arise in the realm of information ethics, especially regarding patron privacy. The norms of Web 2.0 promote the open sharing of information—often personal information—and the design of many Library 2.0 services capitalize on access to patron information and might require additional tracking, collection, and aggregation of patron activities. Thus, embracing Library 2.0 potentially threatens the traditional ethics of librarianship, where protecting (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Freedom and privacy in ambient intelligence.Philip Brey - 2005 - Ethics and Information Technology 7 (3):157-166.
    This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed: freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored as well.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  32.  25
    Ethical concerns around privacy and data security in AI health monitoring for Parkinson’s disease: insights from patients, family members, and healthcare professionals.Itai Bavli, Anita Ho, Ravneet Mahal & Martin J. McKeown - forthcoming - AI and Society:1-11.
    Artificial intelligence (AI) technologies in medicine are gradually changing biomedical research and patient care. High expectations and promises from novel AI applications aiming to positively impact society raise new ethical considerations for patients and caregivers who use these technologies. Based on a qualitative content analysis of semi-structured interviews and focus groups with healthcare professionals (HCPs), patients, and family members of patients with Parkinson’s Disease (PD), the present study investigates participant views on the comparative benefits and problems of using (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  37
    The Confidentiality and Privacy Implications of Functional Magnetic Resonance Imaging.Stacey A. Tovino - 2005 - Journal of Law, Medicine and Ethics 33 (4):844-850.
    Advances in science and technology frequently raise new ethical, legal, and social issues, and developments in neuroscience and neuroimaging technology are no exception. Within the field of neuroethics, leading scientists, ethicists, and humanists are exploring the implications of efforts to image, study, treat, and enhance the human brain.This article focuses on one aspect of neuroethics: the confidentiality and privacy implications of advances in functional magnetic resonance imaging. Following a brief orientation to fMRI and an overview of some of its (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  34.  33
    The Confidentiality and Privacy Implications of Functional Magnetic Resonance Imaging.Stacey A. Tovino - 2005 - Journal of Law, Medicine and Ethics 33 (4):844-850.
    Advances in science and technology frequently raise new ethical, legal, and social issues, and developments in neuroscience and neuroimaging technology are no exception. Within the field of neuroethics, leading scientists, ethicists, and humanists are exploring the implications of efforts to image, study, treat, and enhance the human brain.This article focuses on one aspect of neuroethics: the confidentiality and privacy implications of advances in functional magnetic resonance imaging. Following a brief orientation to fMRI and an overview of some of its (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  35.  12
    Openness and privacy in born-digital archives: reflecting the role of AI development.Angeliki Tzouganatou - 2022 - AI and Society 37 (3):991-999.
    Galleries, libraries, archives and museums are striving to retain audience attention to issues related to cultural heritage, by implementing various novel opportunities for audience engagement through technological means online. Although born-digital assets for cultural heritage may have inundated the Internet in some areas, most of the time they are stored in “digital warehouses,” and the questions of the digital ecosystem’s sustainability, meaningful public participation and creative reuse of data still remain. Emerging technologies, such as artificial intelligence, are used to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  69
    PETs and their users: a critical review of the potentials and limitations of the privacy as confidentiality paradigm. [REVIEW]Seda Gürses - 2010 - Identity in the Information Society 3 (3):539-563.
    Privacy as confidentiality” has been the dominant paradigm in computer science privacy research. Privacy Enhancing Technologies (PETs) that guarantee confidentiality of personal data or anonymous communication have resulted from such research. The objective of this paper is to show that such PETs are indispensable but are short of being the privacy solutions they sometimes claim to be given current day circumstances. Using perspectives from surveillance studies we will argue that the computer scientists’ conception of (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark  
  37. AI as IA: The use and abuse of artificial intelligence (AI) for human enhancement through intellectual augmentation (IA).Alexandre Erler & Vincent C. Müller - 2023 - In Fabrice Jotterand & Marcello Ienca (eds.), The Routledge Handbook of the Ethics of Human Enhancement. Routledge. pp. 187-199.
    This paper offers an overview of the prospects and ethics of using AI to achieve human enhancement, and more broadly what we call intellectual augmentation (IA). After explaining the central notions of human enhancement, IA, and AI, we discuss the state of the art in terms of the main technologies for IA, with or without brain-computer interfaces. Given this picture, we discuss potential ethical problems, namely inadequate performance, safety, coercion and manipulation, privacy, cognitive liberty, authenticity, and fairness in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  38.  55
    Individual Differences in the Acceptability of Unethical Information Technology Practices: The Case of Machiavellianism and Ethical Ideology.Susan J. Winter, Antonis C. Stylianou & Robert A. Giacalone - 2004 - Journal of Business Ethics 54 (3):275-296.
    While information technologies present organizations with opportunities to become more competitive, unsettled social norms and lagging legislation guiding the use of these technologies present organizations and individuals with ethical dilemmas. This paper presents two studies investigating the relationship between intellectual property and privacy attitudes, Machiavellianism and Ethical Ideology, and working in R&D and computer literacy in the form of programming experience. In Study 1, Machiavellians believed it was more acceptable to ignore the intellectual property and privacy (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  39.  20
    Should Digital Contact Tracing Technologies be used to Control COVID-19? Perspectives from an Australian Public Deliberation.Chris Degeling, Julie Hall, Jane Johnson, Roba Abbas, Shopna Bag & Gwendolyn L. Gilbert - 2022 - Health Care Analysis 30 (2):97-114.
    Mobile phone-based applications (apps) can promote faster targeted actions to control COVID-19. However, digital contact tracing systems raise concerns about data security, system effectiveness, and their potential to normalise privacy-invasive surveillance technologies. In the absence of mandates, public uptake depends on the acceptability and perceived legitimacy of using technologies that log interactions between individuals to build public health capacity. We report on six online deliberative workshops convened in New South Wales to consider the appropriateness of using the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  8
    A roadmap towards improving managed security services from a privacy perspective.Nils Ulltveit-Moe - 2014 - Ethics and Information Technology 16 (3):227-240.
    This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  2
    Body Enhancement Technology and Virtue Ethics - Focusing on Request of Virtue Ethics due to loss of Community solidarity and Humility. 김광연 - 2018 - Journal of the New Korean Philosophical Association 94:397-418.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. Enhancement technologies and human identity.David Degrazia - 2005 - Journal of Medicine and Philosophy 30 (3):261 – 283.
    As the President's Council on Bioethics emphasized in a recent report, rapid growth of biotechnologies creates increasingly many possibilities for enhancing human traits. This article addresses the claim that enhancement via biotechnology is inherently problematic for reasons pertaining to our identity. After clarifying the concept of enhancement, and providing a framework for understanding human identity, I examine the relationship between enhancement and identity. Then I investigate two identity-related challenges to biotechnological enhancements: (1) the charge of inauthenticity and (2) the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   46 citations  
  43.  37
    Cross-cultural perspectives on intelligent assistive technology in dementia care: comparing Israeli and German experts’ attitudes.Hanan AboJabel, Johannes Welsch & Silke Schicktanz - 2024 - BMC Medical Ethics 25 (1):1-13.
    Background Despite the great benefits of intelligent assistive technology (IAT) for dementia care – for example, the enhanced safety and increased independence of people with dementia and their caregivers – its practical adoption is still limited. The social and ethical issues pertaining to IAT in dementia care, shaped by factors such as culture, may explain these limitations. However, most studies have focused on understanding these issues within one cultural setting only. Therefore, the aim of this study was to explore and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44. Assessing Enhancement Technologies: Authenticity as a Social Virtue and Experiment.Cristian Iftode - 2019 - The New Bioethics 25 (1):24-38.
    This paper argues for a revised concept of authenticity entailing two demands that must be balanced. The first demand moves authenticity from the position of a strictly self-regarding virtue towards the position of a fully social virtue, acknowledging the crucial feature of steadiness, i.e. self-consistency, as being precisely what we ‘naturally’ lack. Nevertheless, the value of personal authenticity in a modern, open society comes from the fact that it brings about not only steadiness, but also the public development of a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  45.  61
    Data Science and Designing for Privacy.Michael Falgoust - 2016 - Techné: Research in Philosophy and Technology 20 (1):51-68.
    Unprecedented advances in the ability to store, analyze, and retrieve data is the hallmark of the information age. Along with enhanced capability to identify meaningful patterns in large data sets, contemporary data science renders many classical models of privacy protection ineffective. Addressing these issues through privacy-sensitive design is insufficient because advanced data science is mutually exclusive with preserving privacy. The special privacy problem posed by data analysis has so far escaped even leading accounts of informational (...). Here, I argue that accounts of privacy must include norms about information processing in addition to norms about information flow. Ultimately, users need the resources to control how and when personal information is processed and the knowledge to make information decisions about that control. While privacy is an insufficient design constraint, value-sensitive design around control and transparency can support privacy in the information age. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46. Enhancement technologies and inequality.Walter Veit - 2018 - Proceedings of the IX Conference of the Spanish Society of Logic, Methodology and Philosophy of Science.
    Recognizing the variety of dystopian science-fiction novels and movies, from Brave New World to Gattaca and more recently Star Trek, on the future of humanity in which eugenic policies are implemented, genetic engineering has been getting a bad reputation for valid but arguably, mostly historical reasons. In this paper, I critically examine the claim from Mehlman & Botkin (1998: ch. 6) that human enhancement will inevitably accentuate existing inequality in a free market and analyze whether prohibition is the optimal public (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  47. Performance-enhancing technologies and moral responsibility in the military.Jessica Wolfendale - 2008 - American Journal of Bioethics 8 (2):28 – 38.
    New scientific advances have created previously unheard of possibilities for enhancing combatants' performance. Future war fighters may be smarter, stronger, and braver than ever before. If these technologies are safe, is there any reason to reject their use? In this article, I argue that the use of enhancements is constrained by the importance of maintaining the moral responsibility of military personnel. This is crucial for two reasons: the military's ethical commitments require military personnel to be morally responsible agents, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  48. Enhancement technologies and inequality.Walter Veit - 2018 - In Cristian Saborido, Sergi Oms & Javier González de Prado (eds.), Proceedings of the IX Conference of the Spanish Society of Lógic, Methodology and Philosophy of Science. pp. 471–476.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  49. Brain Machine Interface and Human Enhancement – An Ethical Review.Karim Jebari - 2013 - Neuroethics 6 (3):617-625.
    Brain machine interface (BMI) technology makes direct communication between the brain and a machine possible by means of electrodes. This paper reviews the existing and emerging technologies in this field and offers a systematic inquiry into the relevant ethical problems that are likely to emerge in the following decades.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  50.  25
    Human enhancement technologies and the arguments for cosmopolitanism.Javier Rodríguez-Alcázar & Lilian Bermejo-Luque - 2024 - Enrahonar: Quaderns de Filosofía 72:15-33.
    According to political minimalism, a debate is considered political when it revolves around the question “What shall we do?” This account suggests that certain issues related to human enhancement technologies (HETs), which have traditionally been addressed in the realm of applied ethics, could be better approached from a political standpoint. However, this raises the question of who constitutes the “we” – the communities that face the political challenges posed by HETs. We argue that there is a global human community (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000