Switch to: References

Add citations

You must login to add citations.
  1. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1).
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to this viewpoint, this right (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Give me liberty and give me surveillance: a case study of the US Government's discourse of surveillance.Maria A. Simone - 2009 - Critical Discourse Studies 6 (1):1-14.
    This article reports the critical discourse analysis of www.lifeandliberty.gov, a website constructed by the US Department of Justice, with the expressed intention to explain provisions of the USA PATRIOT Act. The analysis reveals a four-part deductive argument that asserts the Act's ability to preserve liberty while enhancing security. Discursive themes appealing to governmental responsibility and authority, national security, individual liberty, historical consistency and legislative efficiency and efficacy support the argument's claims. Despite claims of ‘educating citizens’, the site's discourse is more (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Confidentiality, Consent and Autonomy in the Physician-Patient Relationship.Beverly Woodward - 2001 - Health Care Analysis 9 (3):337-351.
    In the practice of medicine there has long been a conflict between patient management and respect for patient autonomy. In recent years this conflict has taken on a new form as patient management has increasingly been shifted from physicians to insurers, employers, and health care bureaucracies. The consequence has been a diminshment of both physician and patient autonomy and a parallel diminishment of medical record confidentiality. Although the new managers pay lip service to the rights of patients to confidentiality of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy online.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (4):11-19.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  • Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of using data-mining techniques, whether (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Alienation in a World of Data. Toward a Materialist Interpretation of Digital Information Technologies.Michael Steinmann - 2022 - Philosophy and Technology 35 (4):1-24.
    The essay proposes to use alienation as a heuristic and conceptual tool for the analysis of the impact of digital information and communication technologies (ICTs) on users. It follows a historical materialist understanding, according to which data can be considered as things produced in an industrial fashion. A representational interpretation, according to which data would merely reflect a given reality, is untenable. It will be argued instead to understand data as an additional layer which has a transformative impact on reality (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  • Privacy and discrete "social spheres".Jonathan Schonscheck - 1997 - Ethics and Behavior 7 (3):221 – 228.
    To be human is to be engaged in relationships of friendship, trust, and love. These relationships cannot flourish unless information essential to each relationship is kept within the confines of that relationship--unless the individuals involved have knowledge of, and control over, the information about themselves that is available within their particular relationships. This knowledge of and control over information about oneself is the core of "privacy"; privacy's role in maintaining relationships explains its importance to us. Technological advances in computing have (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking.Priscilla M. Regan & Jolene Jesse - 2019 - Ethics and Information Technology 21 (3):167-179.
    With the increase in the costs of providing education and concerns about financial responsibility, heightened consideration of accountability and results, elevated awareness of the range of teacher skills and student learning styles and needs, more focus is being placed on the promises offered by online software and educational technology. One of the most heavily marketed, exciting and controversial applications of edtech involves the varied educational programs to which different students are exposed based on how big data applications have evaluated their (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Research in the Biotech Age: Can Informational Privacy Compete?Wilhelm Peekhaus - 2008 - Bulletin of Science, Technology and Society 28 (1):48-59.
    This article examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government's broader neoliberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational privacy and the need for medical information for research purposes. Consideration is given to the debate about whether privacy for medical information serves or hinders the “public good” in respect of medical (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Securing privacy at work: The importance of contextualized consent. [REVIEW]Elin Palm - 2009 - Ethics and Information Technology 11 (4):233-241.
    The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important to consider (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been sufficiently investigated. In (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
    This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed by the Copenhagen School of International Relations.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Toward an approach to privacy in public: Challenges of information technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  • Respecting Context to Protect Privacy: Why Meaning Matters.Helen Nissenbaum - 2018 - Science and Engineering Ethics 24 (3):831-852.
    In February 2012, the Obama White House endorsed a Privacy Bill of Rights, comprising seven principles. The third, “Respect for Context,” is explained as the expectation that “companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data.” One can anticipate the contested interpretations of this principle as parties representing diverse interests vie to make theirs the authoritative one. In the paper I will discuss three possibilities and explain why (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Accountability in a computerized society.Helen Nissenbaum - 1996 - Science and Engineering Ethics 2 (1):25-42.
    This essay warns of eroding accountability in computerized societies. It argues that assumptions about computing and features of situations in which computers are produced create barriers to accountability. Drawing on philosophical analyses of moral blame and responsibility, four barriers are identified: 1) the problem of many hands, 2) the problem of bugs, 3) blaming the computer, and 4) software ownership without liability. The paper concludes with ideas on how to reverse this trend.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   47 citations  
  • Privacy and the Integrity of Liberal Politics: The Case of Governmental Internet Searches.Dorota Mokrosinska - 2014 - Journal of Social Philosophy 45 (3):369-389.
  • What’s new about the “new surveillance”?: Classifying for change and continuity.Gary T. Marx - 2004 - Knowledge, Technology & Policy 17 (1):18-37.
  • Privacy and Social Stratification.Gary T. Marx - 2007 - Knowledge, Technology & Policy 20 (2):91-95.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms.Kirsten Martin - 2020 - Business Ethics Quarterly 30 (1):65-96.
    ABSTRACT:The oft-cited privacy paradox is the perceived disconnect between individuals’ stated privacy expectations, as captured in surveys, and consumer market behavior in going online: individuals purport to value privacy yet still disclose information to firms. The goal of this paper is to empirically examine the conceptualization of privacy postdisclosure assumed in the privacy paradox. Contrary to the privacy paradox, the results here suggest consumers retain strong privacy expectations even after disclosing information. Privacy violations are valued akin to security violations in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Facing the future: Seeking ethics for everyday surveillance. [REVIEW]David Lyon - 2001 - Ethics and Information Technology 3 (3):171-180.
    Surveillance has become a routine, everyday occurrence ininformational societies. Many agencies have an interest in personal data, and a wide spectrum of them use searchabledatabases to classify and catalogue such data. From policingto welfare to the Internet and e-commerce, personal data havebecome very valuable, economically and administratively. Whilequestions of privacy are indeed raised by such surveillance,the processes described here have as much to do with social sorting,and thus present new problems of automated categorization of datasubjects. Privacy and data protection measures (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good.Zbigniew Kwecka, William Buchanan, Burkhard Schafer & Judith Rauhofer - 2014 - Artificial Intelligence and Law 22 (2):113-139.
    The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This idea finds its correspondence in our approach to privacy protection through obfuscation, where everybody in a group takes a small privacy risk to protect the anonymity of fellow group members. We show how these ideas can be computationally realised in an Investigative Data Acquisition Platform. IDAP is an efficient symmetric Private Information Retrieval protocol optimised for the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • From privacy to anti-discrimination in times of machine learning.Thilo Hagendorff - 2019 - Ethics and Information Technology 21 (4):331-343.
    Due to the technology of machine learning, new breakthroughs are currently being achieved with constant regularity. By using machine learning techniques, computer applications can be developed and used to solve tasks that have hitherto been assumed not to be solvable by computers. If these achievements consider applications that collect and process personal data, this is typically perceived as a threat to information privacy. This paper aims to discuss applications from both fields of personality and image analysis. These applications are often (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, democracy and the politics of disease surveillance.Amy L. Fairchild, Ronald Bayer & James Colgrove - 2008 - Public Health Ethics 1 (1):30-38.
    Fairchild, Center for the History and Ethics of Public Health in the Department of Sociomedical Sciences at Columbia University's Mailman School of Public Health Abstract Surveillance is a cornerstone of public health. It permits us to recognize disease outbreaks, to track the incidence and prevalence of threats to public health, and to monitor the effectiveness of our interventions. But surveillance also challenges our understandings of the significance and role of privacy in a liberal democracy. In this paper we trace the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Corporate appropriation of privacy: The transformation of the personal and public spheres.Timothy H. Engström - 1997 - Ethics and Behavior 7 (3):239 – 252.
    The primary thesis of this article is that the rights and powers of corporations--to collect, recombine, and resell personal data--have accrued in such a way as to fundamentally circumvent traditional and conventional conceptions of privacy, especially with respect to the sphere of informational privacy. In so doing, informational capitalism has also altered in fundamental ways the public and social sphere itself, the sphere through which one might expect these corporate forces and uses of technology to be controlled.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Public anonymity and the connected world.Tony Doyle & Judy Veranas - 2014 - Ethics and Information Technology 16 (3):207-218.
    We defend public anonymity in the light of the threat posed by digital technology. Once people could reasonably assume that they were fairly anonymous when they left the house. They neither drove nor walked around with GPS devices; they paid their highway tolls in cash; they seldom bought on credit; and no cameras marked their strolls in the park or their walks down the street. Times have changed. We begin with a brief discussion of the concept of anonymity. We then (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Individual Autonomy, Law, and Technology: Should Soft Determinism Guide Legal Analysis?Arthur J. Cockfield - 2010 - Bulletin of Science, Technology and Society 30 (1):4-8.
    How one thinks about the relationship between individual autonomy (sometimes referred to as individual willpower or human agency) and technology can influence the way legal thinkers develop policy at the intersection of law and technology. Perspectives that fall toward the `machines control us' end of the spectrum may support more interventionist legal policies while those who identify more closely with the `we are in charge of machines' position may refuse to interfere with technological developments. The concept of soft determinism charts (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
  • Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Cham, Switzerland: pp. 459-474.
    Experimental design is one aspect of a scientific method. A well-designed, properly conducted experiment aims to control variables in order to isolate and manipulate causal effects and thereby maximize internal validity, support causal inferences, and guarantee reliable results. Traditionally employed in the natural sciences, experimental design has become an important part of research in the social and behavioral sciences. Experimental methods are also endorsed as the most reliable guides to policy effectiveness. Through a discussion of some of the central concepts (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Technology as Terrorism: Police Control Technologies and Drone Warfare.Jessica Wolfendale - 2021 - In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21.
    Debates about terrorism and technology often focus on the potential uses of technology by non-state terrorist actors and by states as forms of counterterrorism. Yet, little has been written about how technology shapes how we think about terrorism. In this chapter I argue that technology, and the language we use to talk about technology, constrains and shapes our understanding of the nature, scope, and impact of terrorism, particularly in relation to state terrorism. After exploring the ways in which technology shapes (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Emergence of the Physical World from Information Processing.Brian Whitworth - 2010 - Quantum Biosystems 2 (1):221-249.
    This paper links the conjecture that the physical world is a virtual reality to the findings of modern physics. What is usually the subject of science fiction is here proposed as a scientific theory open to empirical evaluation. We know from physics how the world behaves, and from computing how information behaves, so whether the physical world arises from ongoing information processing is a question science can evaluate. A prima facie case for the virtual reality conjecture is presented. If a (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations