This category needs an editor. We encourage you to help if you are qualified.
Volunteer, or read more about what this involves.
Related categories

105 found
Order:
1 — 50 / 105
  1. The Moral Landscape of Monetary Design.Andrew M. Bailey, Bradley Rettler & Craig Warmke - forthcoming - Philosophy Compass.
    In this article, we identify three key design dimensions along which cryptocurrencies differ -- privacy, censorship-resistance, and consensus procedure. Each raises important normative issues. Our discussion uncovers new ways to approach the question of whether Bitcoin or other cryptocurrencies should be used as money, and new avenues for developing a positive answer to that question. A guiding theme is that progress here requires a mixed approach that integrates philosophical tools with the purely technical results of disciplines like computer science and (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  2. A Matter of Trust: : Higher Education Institutions as Information Fiduciaries in an Age of Educational Data Mining and Learning Analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student success (however defined). Learning (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  3. Three Control Views on Privacy.Leonhard Menges - forthcoming - Social Theory and Practice.
    This paper discusses the idea that the concept of privacy should be understood in terms of control. Three different attempts to spell out this idea will be critically discussed. The conclusion will be that the so-called Source Control View on privacy is the most promising version of the idea that privacy is to be understood in terms of control.
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Digital wormholes.Elizabeth O’Neill - forthcoming - AI and Society:1-3.
    Cameras, microphones, and other sensors continue to proliferate in the world around us. I offer a new metaphor for conceptualizing these technologies: they are digital wormholes, transmitting representations of human persons between disparate points in space–time. We frequently cannot tell when they are operational, what kinds of data they are collecting, where the data may reappear in the future, and how the data can be used against us. The wormhole metaphor makes the mysteriousness of digital sensors salient: digital sensors have (...)
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  5. Privacy, Autonomy, and the Dissolution of Markets.Kiel Brennan-Marquez & Daniel Susser - 2022 - Knight First Amendment Institute Data and Democracy Essay Series.
    Throughout the 20th century, market capitalism was defended on parallel grounds. First, it promotes freedom by enabling individuals to exploit their own property and labor-power; second, it facilitates an efficient allocation and use of resources. Recently, however, both defenses have begun to unravel—as capitalism has moved into its “platform” phase. Today, the pursuit of allocative efficiency, bolstered by pervasive data surveillance, often undermines individual freedom rather than promoting it. And more fundamentally, the very idea that markets are necessary to achieve (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  6. That’s None of Your Business! On the Limits of Employer Control of Employee Behavior Outside of Working Hours.Matthew J. Lister - 2022 - Canadian Journal of Law and Jurisprudence 35 (2):405-26.
    Employers seeking to control employee behavior outside of working hours is nothing new. However, recent developments have extended efforts to control employee behavior into new areas, with new significance. Employers seek to control legal behavior by employees outside of working hours, to have significant influence over employee’s health-related behavior, and to monitor and control employee’s social media, even when this behavior has nothing to do with the workplace. In this article, I draw on the work of political theorists Jon Elster, (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7. Health Privacy, Racialization, and the Causal Potential of Legal Regulations.Joanna Malinowska & Bartek Chomanski - 2022 - American Journal of Bioethics 22 (7):76-78.
    Pyrrho and colleagues (2022) argue that the loss of health privacy can damage democratic values by increasing social polarization, removing individual choice, and limiting self-determination. As a remedy, the authors propose a data-regulation regime that prohibits companies from using such data for discriminatory purposes. Our commentary addresses three issues. First, we point out an additional problematic dimension of excessive health privacy loss, namely, the potential racialization of groups and individuals that it may likely contribute to. Second, we note that, in (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Consent and the Right to Privacy.Kevin Mills - 2022 - Journal of Applied Philosophy 39 (4):721-735.
    There is currently intense debate about the significance of user consent to data practices. Consent is often taken to legitimate virtually any data practice, no matter how invasive. Many scholars argue, however, that user consent is typically so defective as to be ‘meaningless’ and that user privacy should thus be protected by substantive legislation that does not rely (or does not rely heavily) on consent. I argue that both views rest on serious mistakes about the validity conditions for consent. User (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9. Digital Self-Defence: Why you Ought to Preserve Your Privacy for the Sake of Wrongdoers.Lauritz Aastrup Munch - 2022 - Ethical Theory and Moral Practice 25 (2):233-248.
    Most studies on the ethics of privacy focus on what others ought to do to accommodate our interest in privacy. I focus on a related but distinct question that has attracted less attention in the literature: When, if ever, does morality require us to safeguard our own privacy? While we often have prudential reasons for safeguarding our privacy, we are also, at least sometimes, morally required to do so. I argue that we, sometimes, ought to safeguard our privacy for the (...)
    Remove from this list   Direct download (3 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  10. Relativistic Conceptions of Trustworthiness: Implications for the Trustworthy Status of National Identification Systems.Paul Smart, Wendy Hall & Michael Boniface - 2022 - Data and Policy 4 (e21):1-16.
    Trustworthiness is typically regarded as a desirable feature of national identification systems (NISs); but the variegated nature of the trustor communities associated with such systems makes it difficult to see how a single system could be equally trustworthy to all actual and potential trustors. This worry is accentuated by common theoretical accounts of trustworthiness. According to such accounts, trustworthiness is relativized to particular individuals and particular areas of activity, such that one can be trustworthy with regard to some individuals in (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11. Data and the Good?Daniel Susser - 2022 - Surveillance and Society 20 (3):297-301.
    Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new “sociotechnical imaginaries,” new understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of the technology industry’s (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  12. Privacy, Autonomy and Direct-to-Consumer Genetic Testing: A Response to Vayena.Kyle van Oosterum - 2022 - Journal of Medical Ethics 48 (10):774-775.
    In Vayena’s article, ‘direct-to-consumer (DTC) genomics on the scales of autonomy’, she claims that there may be a strong autonomy-based argument for permitting DTC genomic services. In this response, I point out how the diminishment of one’s genetic privacy can cause a relevant autonomy-related harm which must be balanced against the autonomy-related gains DTC services provide. By drawing on conceptual connections between privacy and the Razian conception of autonomy, I show that DTC genetic testing may decrease the range of valuable (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  13. Self-Presentation and Privacy Online.Carissa Véliz - 2022 - Journal of Practical Ethics 2 (9):30-43.
    In this paper, I argue against views that equate privacy with control over self-presentation and explore some of the implications of my criticism for the online world. In section 1, I analyze the relationship between control over self-presentation and privacy and argue that, while they are both tightly connected, they are not one and the same thing. Distinguishing between control over self-presentation and privacy has important practical implications for the online world. In section 2, I investigate self-presentation online and argue (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  14. Ethical Dimensions of Facial Recognition and Video Analytics in Surveillance.Rosalie Waelen & Philip Brey - 2022 - In Michael Boylan & Wanda Teays (eds.), Ethics in the AI, Technology, and Information Age. pp. 15.
    This chapter identifies and analyzes ethical issues in video surveillance, with a focus on applications that involve video analytics and facial recognition technology. The first part of the analysis focuses on ethical issues in video analytics, which are techniques that automatically analyze preexisting or gathered video data. Ethical issues are discussed in relation to processes of identification, classification, detection, and tracking of persons. Next, facial recognition technology is discussed, particularly its use in surveillance, and its ethical challenges are investigated. Finally, (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  15. State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. Disoriented and Alone in the “Experience Machine” - On Netflix, Shared World Deceptions and the Consequences of Deepening Algorithmic Personalization.Maria Brincker - 2021 - SATS 22 (1):75-96.
    Most online platforms are becoming increasingly algorithmically personalized. The question is if these practices are simply satisfying users preferences or if something is lost in this process. This article focuses on how to reconcile the personalization with the importance of being able to share cultural objects - including fiction – with others. In analyzing two concrete personalization examples from the streaming giant Netflix, several tendencies are observed. One is to isolate users and sometimes entirely eliminate shared world aspects. Another tendency (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17. How We Can Make Sense of Control-Based Intuitions for Limited Access-Conceptions of the Right to Privacy.Björn Lundgren - 2021 - Journal of Ethics and Social Philosophy 20 (3).
    Over the years, several counterexamples arguably establish the limits of control-based conceptions of privacy and the right to privacy. Some of these counterexamples focus only on privacy, while the control-based conception of the right to privacy is rejected because of conceptual consistency between privacy and the right to privacy. Yet, these counterexamples do not deny the intuitions of control-based conceptions of the right to privacy. This raises the question whether conceptual consistency is more important than intuitions in determining the right (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Why Extending Actions Through Time Can Violate a Moral Right to Privacy.Björn Lundgren - 2021 - Journal of Ethics and Social Philosophy 20 (1).
    Recently, Ingmar Persson and Julian Savulescu argued that an action that does not violate a moral right to privacy cannot violate that right if it is extended over time. Specifically, they argue that a moral right to privacy does not protect against gawking or stalking. In this reply the reverse position is defended. Specifically, it is argued that their arguments fails on according to their own definition of the right to privacy. Furthermore, it is argued and illustrated by examples that (...)
    Remove from this list   Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19. A Defense of Privacy as Control.Leonhard Menges - 2021 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions about moral responsibility.
    Remove from this list   Direct download (4 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   5 citations  
  20. Philosophy and Digitization: Dangers and Possibilities in the New Digital Worlds.Esther Oluffa Pedersen & Maria Brincker - 2021 - SATS 22 (1):1-9.
    Our world is under going an enormous digital transformation. Nearly no area of our social, informational, political, economic, cultural, and biological spheres are left unchanged. What can philosophy contribute as we try to under- stand and think through these changes? How does digitization challenge past ideas of who we are and where we are headed? Where does it leave our ethical aspirations and cherished ideals of democracy, equality, privacy, trust, freedom, and social embeddedness? Who gets to decide, control, and harness (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21. A Theory of Group Privacy.Anuj Puri - 2021 - Cornell Journal of Law and Public Policy 30 (3):477-538.
    In the age of Big Data Analytics and Covid-19 Apps, the conventional conception of privacy that focuses excessively on the identification of the individual is inadequate to safeguard the individual’s identity and autonomy. An individual’s autonomy can be impaired and their control over their social identity diminished, even without infringing the anonymity surrounding their personal identity. A century-old individualistic conception of privacy that aimed at safeguarding a person from unwarranted social interference is incapable of protecting their autonomy and identity when (...)
    Remove from this list  
     
    Export citation  
     
    Bookmark  
  22. The Evolving Landscape of Ethical Digital Technology.Simon Rogerson - 2021 - Boca Raton: CRC Press, Taylor & Francis Group.
    In a world that is awash in ubiquitous technology, even the least tech-savvy know that we must take care how that technology affects individuals and society. That governments and organizations around the world now focus on these issues, that universities and research institutes in many different languages dedicate significant resources to study the issues, and that international professional organizations have adopted standards and directed resources toward ethical issues in technology is in no small part the result of the work of (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. ≪null>me<null≫: Algorithmic Governmentality and the Notion of Subjectivity in Project Itoh's Harmony.Fatemeh Savaedi & Maryam Alavi Nia - 2021 - Journal of Science Fiction and Philosophy 4:1-19.
    Algorithmic governmentality is a new form of political governance interconnected with technology and computation. By coining the term “algorithmic governmentality,” Antoinette Rouvroy argues that this mode of governance reduces everything to data, and people are no longer individuals but dividuals (able to be divided) or readable data profiles. Implementing the concept of algorithmic governmentality, the current study analyses Project Itoh’s award-winning novel Harmony in terms of such relevant concepts as “subjectivity,” “infra-individuality” and “control,” as suggested by Rouvroy and colleagues. The (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24. Privacy and Digital Ethics After the Pandemic.Carissa Véliz - 2021 - Nature Electronics 4:10-11.
    The increasingly prominent role of digital technologies during the coronavirus pandemic has been accompanied by concerning trends in privacy and digital ethics. But more robust protection of our rights in the digital realm is possible in the future. -/- After surveying some of the challenges we face, I argue for the importance of diplomacy. Democratic countries must try to come together and reach agreements on minimum standards and rules regarding cybersecurity, privacy and the governance of AI.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. Views on Privacy. A Survey.Siân Brooke & Carissa Véliz - 2020 - In Data, Privacy, and the Individual.
    The purpose of this survey was to gather individual’s attitudes and feelings towards privacy and the selling of data. A total (N) of 1,107 people responded to the survey. -/- Across continents, age, gender, and levels of education, people overwhelmingly think privacy is important. An impressive 82% of respondents deem privacy extremely or very important, and only 1% deem privacy unimportant. Similarly, 88% of participants either agree or strongly agree with the statement that ‘violations to the right to privacy are (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. The Ethical Imperatives of the COVID 19 Pandemic: A Review From Data Ethics.Gabriela Arriagada Bruneau, Vincent C. Müller & Mark S. Gilthorpe - 2020 - Veritas: Revista de Filosofía y Teología 46:13-35.
    In this review, we present some ethical imperatives observed in this pandemic from a data ethics perspective. Our exposition connects recurrent ethical problems in the discipline, such as, privacy, surveillance, transparency, accountability, and trust, to broader societal concerns about equality, discrimination, and justice. We acknowledge data ethics role as significant to develop technological, inclusive, and pluralist societies. - - - Resumen: En esta revisión, exponemos algunos de los imperativos éticos observados desde la ética de datos en esta pandemia. Nuestra exposición (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Privacy Self-Management and the Issue of Privacy Externalities: Of Thwarted Expectations, and Harmful Exploitation.Simeon de Brouwer - 2020 - Internet Policy Review 9 (4).
    This article argues that the self-management of one’s privacy is impossible due to privacy externalities. Privacy externalities are the negative by-product of the services offered by some data controllers, whereby the price to ‘pay’ for a service includes not just the provision of the user’s own personal data, but also that of others. This term, related to similar concepts from the literature on privacy such as ‘networked privacy’ or ‘data pollution’, is used here to bring to light the incentives and (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  28. On Being Known: God and the Private-I.Ronald L. Hall - 2020 - Sophia 59 (4):621-636.
    Given recent discussions of personal privacy, or more particularly, its invasion via the internet, it is not surprising to find the issue of personal privacy emerging regarding God’s relation to our private lives. Two different and opposing views of this God-person relation have surfaced in the literature: ‘God and Privacy’ by Falls-Corbitt and Michael McLain, and ‘Privacy and Control’ by Scott Davison. I discuss key elements in both sides of this debate. Even though I will register my sympathy with both (...)
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  29. The Ethical Limits of Blockchain-Enabled Markets for Private IoT Data.Georgy Ishmaev - 2020 - Philosophy and Technology 33 (3):411-432.
    This paper looks at the development of blockchain technologies that promise to bring new tools for the management of private data, providing enhanced security and privacy to individuals. Particular interest present solutions aimed at reorganizing data flows in the Internet of Things architectures, enabling the secure and decentralized exchange of data between network participants. However, as this paper argues, the promised benefits are counterbalanced by a significant shift towards the propertization of private data, underlying these proposals. Considering the unique capacity (...)
    Remove from this list   Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  30. Two Concepts of Group Privacy.Michele Loi & Markus Christen - 2020 - Philosophy and Technology 33 (2):207-224.
    Luciano Floridi was not the first to discuss the idea of group privacy, but he was perhaps the first to discuss it in relation to the insights derived from big data analytics. He has argued that it is important to investigate the possibility that groups have rights to privacy that are not reducible to the privacy of individuals forming such groups. In this paper, we introduce a distinction between two concepts of group privacy. The first, the “what happens in Vegas (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  31. Beyond the Concept of Anonymity: What is Really at Stake?Björn Lundgren - 2020 - In Kevin Macnish & Jai Galliott (eds.), Big Data and Democracy. pp. 201-216.
    The aim of this paper is to discuss anonymity and the threats against it—in the form of deanonymization technologies. The question in the title is approached by conceptual analysis: I ask what kind of concept we need and how it ought to be conceptualized given what is really at stake. By what is at stake I mean the values that are threatened by various deanonymization technologies. It will be argued that while previous conceptualizations of anonymity may be reasonable—given a standard (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  32. How Software Developers Can Fix Part of GDPR’s Problem of Click-Through Consents.Björn Lundgren - 2020 - AI and Society 35 (3):759-760.
    It is argued that GDPR suffer from a practical problem of click-through consents, which developers of web browsers should resolve.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33. Against AI-Improved Personal Memory.Björn Lundgren - 2020 - In Aging between Participation and Simulation. pp. 223–234.
    In 2017, Tom Gruber held a TED talk, in which he presented a vision of improving and enhancing humanity with AI technology. Specifically, Gruber suggested that an AI-improved personal memory (APM) would benefit people by improving their “mental gain”, making us more creative, improving our “social grace”, enabling us to do “science on our own data about what makes us feel good and stay healthy”, and, for people suffering from dementia, it “could make a difference between a life of isolation (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  34. A Dilemma for Privacy as Control.Björn Lundgren - 2020 - The Journal of Ethics 24 (2):165-175.
    Although popular, control accounts of privacy suffer from various counterexamples. In this article, it is argued that two such counterexamples—while individually resolvable—can be combined to yield a dilemma for control accounts of privacy. Furthermore, it is argued that it is implausible that control accounts of privacy can defend against this dilemma. Thus, it is concluded that we ought not define privacy in terms of control. Lastly, it is argued that since the concept of privacy is the object of the right (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  35. El consentimiento informado en los Estados Unidos de América. Génesis, evolución, fundamentos y breve comparación crítica con el modelo español.Noelia Martinez-Doallo - 2020 - DS: Derecho y Salud 30 (2):57-83.
    El análisis de la protección jurídica del consentimiento informado del paciente en los Estados Unidos de América pasa ante todo por considerar las soluciones proporcionadas por el common law, sin perjuicio de las previsiones establecidas en las diversas legislaciones estatales en la materia y la posible vía de protección constitucional, aun cuando se constatan ciertas dificultades que no han de ser consideradas insalvables. El presente artículo se propone ofrecer una revisión pormenorizada acerca del origen, la evolución y los fundamentos de (...)
    Remove from this list   Direct download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  36. Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37. The Eyes of God.Nigel R. Shadbolt & Paul Smart - 2020 - In Timothy Shanahan & Paul R. Smart (eds.), Blade Runner 2049: A Philosophical Exploration. Abingdon, UK: Routledge. pp. 206–227.
  38. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity of citizens (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  39. Ethical Considerations for Digitally Targeted Public Health Interventions.Daniel Susser - 2020 - American Journal of Public Health 110 (S3).
    Public health scholars and public health officials increasingly worry about health-related misinformation online, and they are searching for ways to mitigate it. Some have suggested that the tools of digital influence are themselves a possible answer: we can use targeted, automated digital messaging to counter health-related misinformation and promote accurate information. In this commentary, I raise a number of ethical questions prompted by such proposals—and familiar from the ethics of influence and ethics of AI—highlighting hidden costs of targeted digital messaging (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  40. Privacy During the Pandemic and Beyond.Carissa Vèliz - 2020 - The Philosophers' Magazine 90:107-113.
    This paper is an overview about the state of privacy and power shifts during the pandemic, and the privacy challenges ahead.
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Privacy Is Power.Carissa Véliz - 2020 - London, UK: Penguin (Bantam Press).
    Selected by the Economist as one of the best books of 2020. -/- Privacy Is Power argues that people should protect their personal data because privacy is a kind of power. If we give too much of our data to corporations, the wealthy will rule. If we give too much personal data to governments, we risk sliding into authoritarianism. For democracy to be strong, the bulk of power needs to be with the citizenry, and whoever has the data will have (...)
    Remove from this list  
     
    Export citation  
     
    Bookmark   14 citations  
  42. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years have (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  43. What to Do When Privacy Is Gone.James Brusseau - 2019 - In Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Norfolk, VA, USA: pp. 1 - 8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, transient existence responds (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44. What to Do When Privacy Is Gone.James Brusseau - 2019 - In D. E. Wittkower (ed.), Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Norfolk, VA, USA: Old Dominion. pp. 2-8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, transient existence responds (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45. Personal Trust, Public Accountability, and the Justification of Whistleblowing.Emanuela Ceva & Michele Bocchiola - 2019 - Journal of Political Philosophy 27 (2):187-206.
    Whistleblowing (WB) is the practice of reporting immoral or illegal behavior by members of a legitimate organization with privileged access to information concerning an alleged wrongdoing within that organization. A common critique of WB draws on its supposed consequence of generating a climate of mutual distrust. This wariness is heightened in the case of external WB, which may lead to weakening public trust in an organization by diminishing its credibility. Accordingly, even the defenders of WB have presented it as an (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  46. The Canary in the Gold Mine: Ethics, Privacy, and Big Data Analytics.William H. Harwood - 2019 - Dialogue and Universalism 29 (3):141-150.
    This paper offers a sketch of the complicated conflicts which arise—and metastasize seemingly daily—in the era of Big Data. Given the public’s ubiquitous-yet-ostensibly-voluntary data surrender, and industry’s ubiquitous-yet-ostensibly-anodyne collection of the same, inaction is not an option for any near-just society. By revisiting the philosophical basis for Panoptic apparatus, sketching the tumultuous history of US contract law trying to protect the public from itself, and comparing existing industry codes for similarly-situated—read: terrifyingly invasive—fields, the paper will provide a preliminary framework for (...)
    Remove from this list   Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47. Privacy, Ethics, and Institutional Research.Alan Rubel - 2019 - New Directions in Institutional Research 2019 (183):5-16.
    Despite widespread agreement that privacy in the context of education is important, it can be difficult to pin down precisely why and to what extent it is important, and it is challenging to determine how privacy is related to other important values. But that task is crucial. Absent a clear sense of what privacy is, it will be difficult to understand the scope of privacy protections in codes of ethics. Moreover, privacy will inevitably conflict with other values, and understanding the (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark  
  48. Privacy Rights and Public Information.Benedict Rumbold & James Wilson - 2019 - Journal of Political Philosophy 27 (1):3-25.
    This article concerns the nature and limits of individuals’ rights to privacy over information that they have made public. For some, even suggesting that an individual can have a right to privacy over such information may seem paradoxical. First, one has no right to privacy over information that was never private to begin with. Second, insofar as one makes once-private information public – whether intentionally or unintentionally – one waives one’s right to privacy to that information. In this article, however, (...)
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  49. Privatheitsrechte und politische Öffentlichkeit.Titus Stahl - 2019 - In Hauke Behrendt, Wulf Loh, Matzner Tobias & Catrin Misselhorn (eds.), Privatsphäre 4.0: Eine Neuverortung des Privaten im Zeitalter der Digitalisierung. Stuttgart: Metzler. pp. 123-143.
    The link between the right to privacy and the right to democratic self-determination is often understood to imply that privacy rights have only instrumental value for democratic participation, and that they consist solely in the possibility to retreat from participation in a public. I examine three arguments for an internal link between both sets of rights: The right to privacy protects political public spheres from epistemic inequality, it protects groups in public from a loss of their deliberative autonomy and it (...)
    Remove from this list   Direct download (3 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  50. Technology, Autonomy, and Manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, by targeting (...)
    Remove from this list   Direct download  
    Translate
     
     
    Export citation  
     
    Bookmark   15 citations  
1 — 50 / 105