Switch to: References

Add citations

You must login to add citations.
  1. A Practice–Theoretical Account of Privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior (...)
    Direct download (2 more)  
    Export citation  
    Bookmark   1 citation  
  • Digital Footprints: An Emerging Dimension of Digital Inequality.Marina Micheli, Christoph Lutz & Moritz Büchi - 2018 - Journal of Information, Communication and Ethics in Society 16 (3):242-251.
    Purpose This conceptual contribution is based on the observation that digital inequalities literature has not sufficiently considered digital footprints as an important social differentiator. The purpose of the paper is to inspire current digital inequality frameworks to include this new dimension. Design/methodology/approach Literature on digital inequalities is combined with research on privacy, big data and algorithms. The focus on current findings from an interdisciplinary point of view allows for a synthesis of different perspectives and conceptual development of digital footprints as (...)
    No categories
    Direct download (3 more)  
    Export citation  
  • Privacy by Design in Personal Health Monitoring.Anders Nordgren - 2015 - Health Care Analysis 23 (2):148-164.
    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The (...)
    Direct download (4 more)  
    Export citation  
    Bookmark   2 citations