Design for Embedding the Value of Privacy in Personal Information Management Systems

Journal of Ethics and Emerging Technologies 33 (1):1-19 (2024)
  Copy   BIBTEX

Abstract

Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around the design of privacy-friendly systems that comply with legal requirements, there has been relatively limited philosophical discourse on incorporating the value of privacy into these systems. Exploring the connection between privacy and personal autonomy illuminates the instrumental value of privacy and highlights the importance of intentionally embedding the value of privacy into these systems. To translate the value of privacy into concrete design requirements, this study constructs a values hierarchy consisting of values, norms, and design requirements. After analyzing the relationships between privacy and autonomy and identifying norms, the design requirements translated from the norms associated with the components of personal autonomy are specified at the lowest layer. These requirements include a design to prevent unauthorized access and dark patterns and to provide effective and efficient notices and choices. The findings contribute to expanding the requirements for designing the aspect of privacy as a legal requirement to incorporate the value of privacy into systems.

Links

PhilArchive

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Opinion Paper: Pluralism about the Value of Privacy.William Bülow - 2011 - International Review of Information Ethics 16:85-88.
Privacy by Design in Personal Health Monitoring.Anders Nordgren - 2015 - Health Care Analysis 23 (2):148-164.
Rethinking the concept of the right to information privacy: a Japanese perspective.Kiyoshi Murata & Yohko Orito - 2008 - Journal of Information, Communication and Ethics in Society 6 (3):233-245.
Search engines, personal information and the problem of privacy in public.Herman T. Tavani - 2005 - International Review of Information Ethics 3:39-45.
Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
The importance of privacy revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
Privacy and Ethics Are Fundamental to Tech Development.Jill Clayton & Scott Sibbald - 2020 - International Review of Information Ethics 28.
Personal information as communicative acts.Jens-Erik Mai - 2016 - Ethics and Information Technology 18 (1):51-57.

Analytics

Added to PP
2024-01-25

Downloads
98 (#176,172)

6 months
98 (#46,105)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Haleh Asgarinia
University of Twente

Citations of this work

No citations found.

Add more citations

References found in this work

The sources of normativity.Christine M. Korsgaard - 1996 - New York: Cambridge University Press. Edited by Onora O'Neill.
Freedom of the will and the concept of a person.Harry Frankfurt - 2004 - In Tim Crane & Katalin Farkas (eds.), Metaphysics: a guide and anthology. Oxford University Press UK.
Imagining oneself otherwise.Catriona Mackenzie - 2000 - In Catriona Mackenzie & Natalie Stoljar (eds.), Relational Autonomy: Feminist Perspectives on Autonomy, Agency, and the Social Self. New York: Oxford University Press.

View all 19 references / Add more references