About this topic
Summary Over the past decades the ubiquitous use of information technologies and the growth of the Internet contributed to exposing the importance of the ethical dimensions of information. Information ethics addresses the question as to whether information has or should have a moral value. Specifically, the main problem that information ethics addresses is how one should behave when information is collected, shared, produced or destroyed. Information ethics poses questions of normative ethics and metaethics: the issues are about how one should behave (normative ethics) and how right and wrong should be defined when information and its dynamics are considered (metaethics). The scope of such questions is quite wide and as such information ethics ranges over multiple domains and is part of several branches of applied ethics - computer ethics, medical ethics, business ethics and librarian ethics, to name a few.
Key works Conceptual foundations of information ethics as an ethical framework have been provided in Floridi 2013. A collection of essays on issues concerning information and computer ethics can be found in Himma & Tavani 2008 and Floridi 2010. An analysis of information ethics developed following a continental approach has been provided in Capurro 2006. The following are ethical analyses focusing on the moral value of information to address issues such as privacy (Floridi 2006) (Tavani 2008), online trust (Turilli et al 2012), information transparency (Turilli & Floridi 2009), internet neutrality (Turilli et al 2010) and cyber warfare (Taddeo forthcoming).
Introductions Buchanan 1999, Floridi 1999, Floridi 2006
Related

Contents
265 found
Order:
1 — 50 / 265
  1. The Battle of Samoa Revisited.Web Censoring Widens Across Southeast Asia - forthcoming - Journal of Information Ethics.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  2. Ethics across information cultures.Elia V. Chepaitis - forthcoming - International Business Ethics.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  3. On teaching information.Roy Gladstone - forthcoming - Journal of Thought.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  4. Conceptualizing Self-Documentation.Tim Gorichanaz - forthcoming - Online Information Review 43.
    Purpose: Self-documentation is an increasingly common phenomenon, but it is not yet well understood. This paper provides a philosophical framework for analyzing examples of self-documentation on the dimensions of ontology, epistemology and ethics. Design/methodology/approach: The framework addresses these three major areas of philosophic thought by operationalizing insights from philosophy, chiefly the work of Martin Heidegger. Heidegger’s concepts of authenticity and fallenness inform the poles of each dimension of the framework. Findings: Ontologically, self-documentation may manifest as document (authentic) or data (fallen); (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  5. The transfer of patients 'ethics information among cooperating institutions: A future function of ethics networks Jocelyn C. white, md'.Esq Janine Sarti - forthcoming - Hec Forum: An Interdisciplinary Journal on Hospitals' Ethical and Legal Issues.
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  6. Information before information theory: The politics of data beyond the perspective of communication.Colin Koopman - forthcoming - New Media and Society.
    Scholarship on the politics of new media widely assumes that communication functions as a sufficient conceptual paradigm for critically assessing new media politics. This article argues that communication-centric analyses fail to engage the politics of information itself, limiting information only to its consequences for communication, and neglecting information as it reaches into our selves, lives, and actions beyond the confines of communication. Furthering recent new media historiography on the “information theory” of Shannon and Wiener, the article reveals both the primacy (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Ethics at the Intersection: Human-Centered AI & User Experience Design.Christopher Quintana - forthcoming - In Maria Axente, Jean-Louise Denis, Atsuo Kishimoto & Catherine Régis (eds.), Human-Centered AI: a Multidisciplinary Perspective for Policy-Makers, Auditors and Users. Routledge’s Chapman & Hall/CRC Artificial Intelligence and Robotics Series.
    As various forms of artificial intelligence become increasingly integrated into our daily lives, understanding the ethical challenges that can be met by the development of human-centered AI is vital. This paper investigates the intersection of the philosophy of technology, moral philosophy, and user experience design to explore points of interaction between humans and machines. The paper suggests that examining the context in which AI is often deployed, including social and digital environments, offers a rich vein for examining the mechanisms underlying (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  8. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Decision Time: Normative Dimensions of Algorithmic Speed.Daniel Susser - forthcoming - ACM Conference on Fairness, Accountability, and Transparency (FAccT '22).
    Existing discussions about automated decision-making focus primarily on its inputs and outputs, raising questions about data collection and privacy on one hand and accuracy and fairness on the other. Less attention has been devoted to critically examining the temporality of decision-making processes—the speed at which automated decisions are reached. In this paper, I identify four dimensions of algorithmic speed that merit closer analysis. Duration (how much time it takes to reach a judgment), timing (when automated systems intervene in the activity (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  10. Measuring Automated Influence: Between Empirical Evidence and Ethical Values.Daniel Susser & Vincent Grimaldi - forthcoming - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society.
    Automated influence, delivered by digital targeting technologies such as targeted advertising, digital nudges, and recommender systems, has attracted significant interest from both empirical researchers, on one hand, and critical scholars and policymakers on the other. In this paper, we argue for closer integration of these efforts. Critical scholars and policymakers, who focus primarily on the social, ethical, and political effects of these technologies, need empirical evidence to substantiate and motivate their concerns. However, existing empirical research investigating the effectiveness of these (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. From Galton’s Pride to Du Bois’s Pursuit: The Formats of Data-Driven Inequality.Colin Koopman - 2024 - Theory, Culture and Society 41 (1):59-78.
    Data increasingly drive our lives. Often presented as a new trajectory, the deep immersion of our lives in data has a history that is well over a century old. By revisiting the work of early pioneers of what would today be called data science, we can bring into view both assumptions that fund our data-driven moment as well as alternative relations to data. I here excavate insights by contrasting a seemingly unlikely pair of early data technologists, Francis Galton and W.E.B. (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12. Epistemic obligations and free speech.Boyd Millar - 2024 - Analytic Philosophy 65 (2):203-222.
    Largely thanks to Mill’s influence, the suggestion that the state ought to restrict the distribution of misinformation will strike most philosophers as implausible. Two of Mill’s influential assumptions are particularly relevant here: first, that free speech debates should focus on moral considerations such as the harm that certain forms of expression might cause; second, that false information causes minimal harm due to the fact that human beings are psychologically well equipped to distinguish truth and falsehood. However, in addition to our (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  13. Verdadeiro ou Falso? Critérios da Verdade na era das tecnologias digitais.Rafael R. Testa & João Antonio de Moraes - 2024 - Humanitas 175:20-26.
    Na era das tecnologias digitais, entender vieses algorítmicos por meio das teorias da verdade ajuda a fazer perguntas cujas respostas facilitam a filtragem da informação de forma mais eficaz. O ganho é a compreensão aprofundada da realidade.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  14. Reframing data ethics in research methods education: a pathway to critical data literacy.Javiera Atenas, Leo Havemann & Cristian Timmermann - 2023 - International Journal of Educational Technology in Higher Education 20:11.
    This paper presents an ethical framework designed to support the development of critical data literacy for research methods courses and data training programmes in higher education. The framework we present draws upon our reviews of literature, course syllabi and existing frameworks on data ethics. For this research we reviewed 250 research methods syllabi from across the disciplines, as well as 80 syllabi from data science programmes to understand how or if data ethics was taught. We also reviewed 12 data ethics (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15. In Defense of (Some) Online Echo Chambers.Douglas R. Campbell - 2023 - Ethics and Information Technology 25 (3):1-11.
    In this article, I argue that online echo chambers are in some cases and in some respects good. I do not attempt to refute arguments that they are harmful, but I argue that they are sometimes beneficial. In the first section, I argue that it is sometimes good to be insulated from views with which one disagrees. In the second section, I argue that the software-design principles that give rise to online echo chambers have a lot to recommend them. Further, (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Philosophical discourse of information ethics of the future.Alla Lazareva, Viktor Myroshnychenko, Mykola Sanakuiev & Liydmila Gontarenko - 2023 - Futurity Philosophy 2 (1):14–29.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  17. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and ethicality on data scientists, or data engineer (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Digital wormholes.Elizabeth O’Neill - 2023 - AI and Society 38 (6):2713-2715.
    Cameras, microphones, and other sensors continue to proliferate in the world around us. I offer a new metaphor for conceptualizing these technologies: they are _digital wormholes_, transmitting representations of human persons between disparate points in space–time. We frequently cannot tell when they are operational, what kinds of data they are collecting, where the data may reappear in the future, and how the data can be used against us. The wormhole metaphor makes the mysteriousness of digital sensors salient: digital sensors have (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to govern data-driven systems. In (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  20. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur (eds.), The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. First, a change in emphasis from (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  21. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised by other well-understood data collection (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  22. On the Duty to Be an Attention Ecologist.Tim Aylsworth & Clinton Castro - 2022 - Philosophy and Technology 35 (1):1-22.
    The attention economy — the market where consumers’ attention is exchanged for goods and services — poses a variety of threats to individuals’ autonomy, which, at minimum, involves the ability to set and pursue ends for oneself. It has been argued that the threat wireless mobile devices pose to autonomy gives rise to a duty to oneself to be a digital minimalist, one whose interactions with digital technologies are intentional such that they do not conflict with their ends. In this (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23. Contextual Exceptionalism After Death: An Information Ethics Approach to Post-Mortem Privacy in Health Data Research.Marieke A. R. Bak & Dick L. Willems - 2022 - Science and Engineering Ethics 28 (4):1-20.
    In this article, we use the theory of Information Ethics to argue that deceased people have a prima facie moral right to privacy in the context of health data research, and that this should be reflected in regulation and guidelines. After death, people are no longer biological subjects but continue to exist as informational entities which can still be harmed/damaged. We find that while the instrumental value of recognising post-mortem privacy lies in the preservation of the social contract for health (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24. The Business of Liberty: Freedom and Information in Ethics, Politics, and Law.Boudewijn de Bruin - 2022 - Oxford, UK: Oxford University Press.
    What makes political freedom valuable to us? Two well-known arguments are that freedom contributes to our desire satisfaction and to our personal responsibility. Here, Boudewijn de Bruin argues that freedom is valuable when it is accompanied by knowledge. He offers an original and systematic account of the relationship between freedom and knowledge and defends two original normative ideals of known freedom and acknowledged freedom. -/- By combining psychological perspectives on choice and philosophical views on the value of knowledge, he shows (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. An Information Ethics Theory in the Context of Information Philosophy.Nesibe Kantar - 2022 - Entelekya Logico-Metaphysical Review 6 (1):37-45.
    Like all other inventions, advances in the field of digital computational technologies, which we will briefly describe as the information world, have also played an essential role in humanity life. These advances have brought some ethical debates to our individual and social life, as well as the industrial benefit obtained by the digital and analog technological developments that positively or negatively affect and transform all economic and cultural paradigms surrounding human life. The branch of the philosophy of information, which questions (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  26. When data drive health: an archaeology of medical records technology.Colin Koopman, Paul D. G. Showler, Patrick Jones, Mary McLevey & Valerie Simon - 2022 - Biosocieties 17 (4):782-804.
    Medicine is often thought of as a science of the body, but it is also a science of data. In some contexts, it can even be asserted that data drive health. This article focuses on a key piece of data technology central to contemporary practices of medicine: the medical record. By situating the medical record in the perspective of its history, we inquire into how the kinds of data that are kept at sites of clinical encounter often depend on informational (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  27. Yapay Zeka ve Piyasa: Saglikta Dijitallesme ve Etik Sorunlar Ozelinde Bir Değerlendirme.Orhan Onder - 2022 - In Tayyibe Bardakçı & M. Ihsan Karaman (eds.), Yapay Zeka Etiği. Istanbul: Isar Yayınları. pp. 185-200.
  28. An Ethical Framework for Presenting Scientific Results to Policy-Makers.S. Andrew Schroeder - 2022 - Kennedy Institute of Ethics Journal 32 (1):33-67.
    Scientists have the ability to influence policy in important ways through how they present their results. Surprisingly, existing codes of scientific ethics have little to say about such choices. I propose that we can arrive at a set of ethical guidelines to govern scientists’ presentation of information to policymakers by looking to bioethics: roughly, just as a clinician should aim to promote informed decision-making by patients, a scientist should aim to promote informed decision-making by policymakers. Though this may sound like (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  29. Data and the Good?Daniel Susser - 2022 - Surveillance and Society 20 (3):297-301.
    Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new “sociotechnical imaginaries,” new understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of the technology industry’s (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Pandemic surveillance: ethics at the intersection of information, research, and health.Daniel Susser - 2022 - In Margaret Hu (ed.), Pandemic Surveillance: Privacy, Security, and Data Ethics. Cheltenham, UK: Edward Elgar. pp. 187-196.
    This chapter provides a high-level overview of key ethical issues raised by the use of surveillance technologies, such as digital contact tracing, disease surveillance, and vaccine passports, to combat the COVID-19 pandemic. To some extent, these issues are entirely familiar. I argue that they raise old questions in new form and with new urgency, at the intersection of information ethics, research ethics, and public health. Whenever we deal with data-driven technologies, we have to ask how they fare in relation to (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  31. Ethical Analysis on the Application of Neurotechnology for Human Augmentation in Physicians and Surgeons.Soaad Hossain & Syed Ishtiaque Ahmed - 2021 - In Kohei Arai, Supriya Kapoor & Rahul Bhatia (eds.), Proceedings of the Future Technologies Conference (FTC) 2020. Switzerland: pp. 78-99.
    With the shortage of physicians and surgeons and increase in demand worldwide due to situations such as the COVID-19 pandemic, there is a growing interest in finding solutions to help address the problem. A solution to this problem would be to use neurotechnology to provide them augmented cognition, senses and action for optimal diagnosis and treatment. Consequently, doing so can negatively impact them and others. We argue that applying neurotechnology for human enhancement in physicians and surgeons can cause injustices, and (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32. Whistleblowing and Information Ethics.Wim Vandekerckhove - 2021 - In Deborah C. Poff & Alex C. Michalos (eds.), Encyclopedia of Business and Professional Ethics. Springer Verlag. pp. 1897-1899.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  33. Views on Privacy. A Survey.Siân Brooke & Carissa Véliz - 2020 - In Siân Brooke & Carissa Véliz (eds.), Data, Privacy, and the Individual.
    The purpose of this survey was to gather individual’s attitudes and feelings towards privacy and the selling of data. A total (N) of 1,107 people responded to the survey. -/- Across continents, age, gender, and levels of education, people overwhelmingly think privacy is important. An impressive 82% of respondents deem privacy extremely or very important, and only 1% deem privacy unimportant. Similarly, 88% of participants either agree or strongly agree with the statement that ‘violations to the right to privacy are (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Genes are the New Black: Racism and 'Roots' in the Age of 23andMe.William H. Harwood - 2020 - Social Philosophy Today 36:153-177.
    Although there is much discussion in scientific and law journals regarding direct-to-consumer genetic testing (DTCGT), there is a paucity of philosophical-ethical examination of how such services threaten to repeat the essentialist, racial-projects of the past. On the one hand, testing for ancestry can be cathartic: for those lacking familial history as to when and how they came to be where they are, DTCGT can offer powerful access to their lineage and identity-formation. On the other hand, DTCGT inevitably reinscribes problematic epistemologies (...)
    Remove from this list   Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  35. The Ethical Limits of Blockchain-Enabled Markets for Private IoT Data.Georgy Ishmaev - 2020 - Philosophy and Technology 33 (3):411-432.
    This paper looks at the development of blockchain technologies that promise to bring new tools for the management of private data, providing enhanced security and privacy to individuals. Particular interest present solutions aimed at reorganizing data flows in the Internet of Things architectures, enabling the secure and decentralized exchange of data between network participants. However, as this paper argues, the promised benefits are counterbalanced by a significant shift towards the propertization of private data, underlying these proposals. Considering the unique capacity (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36. Beyond the Concept of Anonymity: What is Really at Stake?Björn Lundgren - 2020 - In Kevin Macnish & Jai Galliott (eds.), Big Data and Democracy. Edinburgh University Press. pp. 201-216.
    The aim of this paper is to discuss anonymity and the threats against it—in the form of deanonymization technologies. The question in the title is approached by conceptual analysis: I ask what kind of concept we need and how it ought to be conceptualized given what is really at stake. By what is at stake I mean the values that are threatened by various deanonymization technologies. It will be argued that while previous conceptualizations of anonymity may be reasonable—given a standard (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  37. How software developers can fix part of GDPR’s problem of click-through consents.Björn Lundgren - 2020 - AI and Society 35 (3):759-760.
    It is argued that GDPR suffer from a practical problem of click-through consents, which developers of web browsers should resolve.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38. A sociedade contemporânea à luz da ética informacional.João Moraes & Rafael Testa - 2020 - Acta Scientiarum. Human and Social Sciences 42 (3).
    Qual o lugar da filosofia nos dias atuais? Diante das inúmeras respostas possíveis a esta questão, nos debruçaremos em alguns tópicos que podemos inserir na chamada Ética Informacional, um ramo de investigação filosófico-interdisciplinar relativamente recente que discute problemas oriundos da relação ser humano/tecnologias digitais. Temas como privacidade informacional, arrogância epistêmica e divisão digital serão discutidos e relacionados, com o intuito de ilustrar o papel da filosofia na compreensão da complexidade inerente às dinâmicas sociais no contexto da sociedade da informação. Argumentaremos (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39. The Internet as Cognitive Enhancement.Cristina Voinea, Constantin Vică, Emilian Mihailov & Julian Savulescu - 2020 - Science and Engineering Ethics 26 (4):2345-2362.
    The Internet has been identified in human enhancement scholarship as a powerful cognitive enhancement technology. It offers instant access to almost any type of information, along with the ability to share that information with others. The aim of this paper is to critically assess the enhancement potential of the Internet. We argue that unconditional access to information does not lead to cognitive enhancement. The Internet is not a simple, uniform technology, either in its composition, or in its use. We will (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  40. Democratizing Algorithmic Fairness.Pak-Hang Wong - 2020 - Philosophy and Technology 33 (2):225-244.
    Algorithms can now identify patterns and correlations in the (big) datasets, and predict outcomes based on those identified patterns and correlations with the use of machine learning techniques and big data, decisions can then be made by algorithms themselves in accordance with the predicted outcomes. Yet, algorithms can inherit questionable values from the datasets and acquire biases in the course of (machine) learning, and automated algorithmic decision-making makes it more difficult for people to see algorithms as biased. While researchers have (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  41. Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will then analyse the (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Defining Information Security.Lundgren Björn & Möller Niklas - 2019 - Science and Engineering Ethics 25 (2):419-441.
    This article proposes a new definition of information security, the ‘Appropriate Access’ definition. Apart from providing the basic criteria for a definition—correct demarcation and meaning concerning the state of security—it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called ‘soft issues’ of information security and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Strange Loops: Apparent versus Actual Human Involvement in Automated Decision-Making.Kiel Brennan-Marquez, Karen Levy & Daniel Susser - 2019 - Berkeley Technology Law Journal 34 (3).
    The era of AI-based decision-making fast approaches, and anxiety is mounting about when, and why, we should keep “humans in the loop” (“HITL”). Thus far, commentary has focused primarily on two questions: whether, and when, keeping humans involved will improve the results of decision-making (making them safer or more accurate), and whether, and when, non-accuracy-related values—legitimacy, dignity, and so forth—are vindicated by the inclusion of humans in decision-making. Here, we take up a related but distinct question, which has eluded the (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44. The Canary in the Gold Mine: Ethics, Privacy, and Big Data Analytics.William H. Harwood - 2019 - Dialogue and Universalism 29 (3):141-150.
    This paper offers a sketch of the complicated conflicts which arise—and metastasize seemingly daily—in the era of Big Data. Given the public’s ubiquitous-yet-ostensibly-voluntary data surrender, and industry’s ubiquitous-yet-ostensibly-anodyne collection of the same, inaction is not an option for any near-just society. By revisiting the philosophical basis for Panoptic apparatus, sketching the tumultuous history of US contract law trying to protect the public from itself, and comparing existing industry codes for similarly-situated—read: terrifyingly invasive—fields, the paper will provide a preliminary framework for (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Open Sourcing Normative Assumptions on Privacy and Other Moral Values in Blockchain Applications.Georgy Ishmaev - 2019 - Dissertation, Delft University of Technology
    The moral significance of blockchain technologies is a highly debated and polarised topic, ranging from accusations that cryptocurrencies are tools serving only nefarious purposes such as cybercrime and money laundering, to the assessment of blockchain technology as an enabler for revolutionary positive social transformations of all kinds. Such technological determinism, however, hardly provides insights of sufficient depth on the moral significance of blockchain technology. This thesis argues rather, that very much like the cryptographic tools before them, blockchains develop in a (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. How We Became Our Data: A Genealogy of the Informational Person.Colin Koopman - 2019 - Chicago, IL, USA: University of Chicago Press.
    We are now acutely aware, as if all of the sudden, that data matters enormously to how we live. How did information come to be so integral to what we can do? How did we become people who effortlessly present our lives in social media profiles and who are meticulously recorded in state surveillance dossiers and online marketing databases? What is the story behind data coming to matter so much to who we are? -/- In How We Became Our Data, (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  47. Transparency Trade-Offs: Priority Setting, Scarcity, and Health Fairness.Govind Persad - 2019 - In I. Glenn Cohen, Barbara Evans, Holly Lynch & Carmel Shachar (eds.), Transparency in Health and Health Care. New York: Cambridge UP.
    This chapter argues that rather than viewing transparency as a right, we should regard it as a finite resource whose allocation involves tradeoffs. It then argues that those tradeoffs should be resolved by using a multi-principle approach to distributive justice. The relevant principles include maximizing welfare, maximizing autonomy, and giving priority to the worst off. Finally, it examines some of the implications for law of recognizing the tradeoffs presented by transparency proposals.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48. Era posverdad: Comunicación, política y filosofía.David Villena Saldaña - 2019 - Psicopraxia 1 (1):17-26.
    According to the Oxford dictionaries, the term ‘post-truth’ is the word of the year 2016. This title was granted to ‘post-truth’ because of its virtual omnipresence in the reviews and assessments of several political events that took place during that year. The present essay shows how post-truth politicians try to connect with people, and offers a reflection on the philosophical implications of this new attitude towards truth and empirical evidence.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’t.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that they say little about (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  50. Mind the Gap! How the Digital Turn Upsets Intellectual Property.Constantin Vică & Emanuel-Mihail Socaciu - 2019 - Science and Engineering Ethics 25 (1):247-264.
    Intellectual property is one of the highly divisive issues in contemporary philosophical and political debates. The main objective of this paper is to explore some sources of tension between the formal rules of intellectual property (particularly copyright and patents) and the emerging informal norms of file sharing and open access in online environments. We look into the file sharing phenomena not only to illustrate the deepening gap between the two sets of norms, but to cast some doubt on the current (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 265