Results for ' passive privacy'

999 found
Order:
  1. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  2.  10
    Disclosure to genetic relatives without consent – Australian genetic professionals’ awareness of the health privacy law.Jane Fleming, Ainsley J. Newson, Kate Dunlop, Kristine Barlow-Stewart & Natalia Meggiolaro - 2020 - BMC Medical Ethics 21 (1):1-10.
    Background: When a genetic mutation is identified in a family member, internationally, it is usually the proband’s or another responsible family member’s role to disclose the information to at-risk relatives. However, both active and passive non-disclosure in families occurs: choosing not to communicate the information or failing to communicate the information despite intention to do so, respectively. The ethical obligations to prevent harm to at-risk relatives and promote the duty of care by genetic health professionals is in conflict with (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  3. The nature and value of the.Moral Right To Privacy - 2002 - Public Affairs Quarterly 16 (4):329.
     
    Export citation  
     
    Bookmark  
  4. Chapter outline.A. Myth Versus Reality, D. Publicity not Privacy, E. Guilty Until Proven Innocent, J. Change & Rotation Mentality - forthcoming - Moral Management: Business Ethics.
    No categories
     
    Export citation  
     
    Bookmark  
  5.  59
    Four Pillars of Internet Research Ethics with Web 2.0.Barry Rooke - 2013 - Journal of Academic Ethics 11 (4):265-268.
    The proliferation of social media and web 2.0 applications (Facebook, MySpace, Twitter, blogs, etc.) in the previous 5 years has created a new social research opportunity, with over an estimated 552 million active daily users on Facebook (Facebook Press 2012). As with all research, boundaries must be set out to create valid and accurate data, keeping ethical practices at the forefront of the data gathering process. The lack of standardized practices requires an in-depth look into the use of such methods, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  6
    Patient-centered empirical research on ethically relevant psychosocial and cultural aspects of cochlear, glaucoma and cardiovascular implants – a scoping review.Sabine Schulz, Laura Harzheim, Constanze Hübner, Mariya Lorke, Saskia Jünger & Christiane Woopen - 2023 - BMC Medical Ethics 24 (1):1-22.
    Background The significance of medical implants goes beyond technical functioning and reaches into everyday life, with consequences for individuals as well as society. Ethical aspects associated with the everyday use of implants are relevant for individuals’ lifeworlds and need to be considered in implant care and in the course of technical developments. Methods This scoping review aimed to provide a synthesis of the existing evidence regarding ethically relevant psychosocial and cultural aspects in cochlear, glaucoma and cardiovascular implants in patient-centered empirical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  19
    Global Bioethics: Global Equity and Disabilities: Reflections of a Mother from Hell.Christine M. Reed - 1997 - Cambridge Quarterly of Healthcare Ethics 6 (1):106-110.
    “Power is the ability to take one's place in whatever discourse is essential to action” With these words, Carolyn Heilbran urges women to rewrite their lives. Their angry and frustrated voices, heard in the privacy of letters and quiet conversations, tell their true stories, while their public biographies are sentimental and passive. Women, she says, need to learn how to declare their right to public power. With this advice In mind, I recently joined a conversation with colleagues from (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  8.  1
    Informatiegaring en meningsuiting in de pers : enkele bedenkingen over de actualiteit van het Belgisch persrecht.Jan Ceuleers - 1989 - Res Publica 31 (4):505-512.
    Belgian Constitution needs a face-lifting. The right of information, both active and passive, must be recognized, along with a prohibition ofcensorship; this right implies the right of free communication and freedom of the media. It also implies the abolition of the notion press-delict and of special administration of criminal law.Legislation too has to be actualized: expansion of the right of answer to all means of communication.Furthermore, introduction of the duty of speech for anyone who holds information that may concern (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  9.  46
    Identity crisis: Face recognition technology and freedom of the will.Benjamin Hale - 2005 - Ethics, Place and Environment 8 (2):141 – 158.
    In this paper I present the position that the use of face recognition technology (FRT) in law enforcement and in business is restrictive of individual autonomy. I reason that FRT severely undermines autonomous self-determination by hobbling the idea of freedom of the will. I distinguish this position from two other common arguments against surveillance technologies: the privacy argument (that FRT is an invasion of privacy) and the objective freedom argument (that FRT is restrictive of one's freedom to act). (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  4
    Equidad política, pluralidad cultural y comprensión del pasado histórico.Aníbal Fornari - 2001 - Tópicos 8:81-104.
    Para Rawls, el problema de la filosofía política es la existencia duradera de una sociedad democrática, cuyos ciudadanos, sin embargo, no dejan de estar “profundamente divididos” por doctrinas religiosas, filosóficas y morales razonables. La convivencia de tal pluralidad en un espacio jurídico-estatal, está conformada por ideas intuitivas básicas, decantadas en un consenso superpuesto, que expresa la historicidad cultural de tal sociedad. Pero la trascendentalidad reflexiva del concepto ético-político de ciudadano debe realizar una epokhé sobre los procesos culturales de identificación que (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  34
    Digital footprints: an emerging dimension of digital inequality.Marina Micheli, Christoph Lutz & Moritz Büchi - 2018 - Journal of Information, Communication and Ethics in Society 16 (3):242-251.
    Purpose This conceptual contribution is based on the observation that digital inequalities literature has not sufficiently considered digital footprints as an important social differentiator. The purpose of the paper is to inspire current digital inequality frameworks to include this new dimension. Design/methodology/approach Literature on digital inequalities is combined with research on privacy, big data and algorithms. The focus on current findings from an interdisciplinary point of view allows for a synthesis of different perspectives and conceptual development of digital footprints (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  43
    Revealing the commercialized and compliant Facebook user.Stephen Lilley, Frances S. Grodzinsky & Andra Gumbus - 2012 - Journal of Information, Communication and Ethics in Society 10 (2):82-92.
    PurposeFacebook users are both producers and consumers, in the sense that they produce the disclosures that allow for Facebook's business success and they consume services. The purpose of this paper is to examine how best to characterize the commercialized and compliant members. The authors question the Facebook assertion that members knowingly and willingly approve of personal and commercial transparency and argue, instead, that complicity is engineered.Design/methodology/approachA survey of Facebook users was conducted between December 2010 and April 2011 at one private (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  13
    Inner Strength of Female Characters in Loitering with Intent and The Public Image by Muriel Spark.Monika Rogalińska - 2011 - Text Matters - a Journal of Literature, Theory and Culture 1 (1):135-144.
    Inner Strength of Female Characters in Loitering with Intent and The Public Image by Muriel Spark Women characters in Muriel Spark's novels are diverse, some strong and powerful, some weak and unable to make decisions. And there are characters who develop throughout the novel and learn from their own mistakes. From being passive, they gradually start acting and making their own choices. Loitering with Intent and The Public Image present women characters who go through metamorphosis, from being dependent on (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  14. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  25
    Group Privacy: New Challenges of Data Technologies.Luciano Floridi, Linnet Taylor & Bart van der Sloot (eds.) - 2017 - Cham: Imprint: Springer.
    The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the different approaches and methods that can be used to address them. In doing so, it will help the reader to gain a better grasp of the ethical and legal conundrums posed by group profiling. The volume first maps the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   11 citations  
  16.  13
    Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  26
    Privacy Is Power.Carissa Véliz - 2020 - London, UK: Penguin (Bantam Press).
    Selected by the Economist as one of the best books of 2020. -/- Privacy Is Power argues that people should protect their personal data because privacy is a kind of power. If we give too much of our data to corporations, the wealthy will rule. If we give too much personal data to governments, we risk sliding into authoritarianism. For democracy to be strong, the bulk of power needs to be with the citizenry, and whoever has the data (...)
    Direct download  
     
    Export citation  
     
    Bookmark   22 citations  
  18.  4
    On passivity: a philosophical dialogue.Nicholas J. Pappas - 2021 - New York: Algora Publishing.
    Is it always better to be active than passive? Is passivity a sign of cowardice - or prudence? Are people who keep their thoughts to themselves passive, or might they be actively preparing for well-considered future actions? Seemingly simple concepts turn out to be deeper and more significant than they first appear.
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  41
    Privacy and Health Practices in the Digital Age.Monique Pyrrho, Leonardo Cambraia & Viviane Ferreira de Vasconcelos - 2022 - American Journal of Bioethics 22 (7):50-59.
    Increasing privacy concerns are arising from expanding use of aggregated personal information in health practices. Conversely, in light of the promising benefits of data driven healthcare, privacy...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  20.  5
    Passive Synthesis und Intersubjektivität bei Edmund Husserl.Ichiro Yamaguchi - 1982 - Hingham, MA: Springer.
    Das Problem der Intersubjektivitiit Intersubjektivität ist Husserl schon seit der Darstellung der Ideen I in Zusammenhang mit dem Problem der phiinomenologischen phänomenologischen Reduk tion sehr stark bewusst und wird, wie die neue VerOffentlichung Veröffentlichung 'Zur Phänome Phiinome nologie der Intersubjektivität'l Intersubjektivitiit'l ausdrücklich ausdrucklich zeigt, zeit seines Lebens in seinem Denken mit mehr oder weniger Intensitiit Intensität behandelt. Bekanntlich hat Husserl Hussed die Einfühlungslehre EinfUhlungslehre in seinem spiiten späten Versuch mit der 'Selbstobjektivation' 'Selbstobjektivation',, 'Selbstauslegung' des absoluten, anonymen, transzen 2 dentalen ego (...)
    Direct download  
     
    Export citation  
     
    Bookmark   14 citations  
  21.  8
    Privacy Protections in and across Contexts: Why We Need More Than Contextual Integrity.Sara Goering, Asad Beck, Natalie Dorfman, Sofia Schwarzwalder & Nicolai Wohns - 2024 - American Journal of Bioethics Neuroscience 15 (2):149-151.
    Do we need a right to mental privacy? In an era of increasing sophistication in recording, interpreting, and directly intervening on our neural activity – not to mention efforts at combining neural...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  62
    Unpopular Privacy: What Must We Hide?Anita Allen - 2011 - New York, US: Oup Usa.
    Can the government stick us with privacy we don't want? It can, it does, and according to this author, may need to do more of it. Privacy is a foundational good, she argues, a necessary tool in the liberty-lover's kit for a successful life. A nation committed to personal freedom must be prepared to mandate inalienable, liberty-promoting privacies for its people, whether they eagerly embrace them or not. The eight chapters of this book are reflections on public regulation (...)
    Direct download  
     
    Export citation  
     
    Bookmark   19 citations  
  23. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  24. Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   42 citations  
  25. Accountable privacy supporting services.Jan Camenisch, Thomas Groß & Thomas Scott Heydt-Benjamin - 2009 - Identity in the Information Society 2 (3):241-267.
    As privacy concerns among consumers rise, service providers increasingly want to provide services that support privacy enhancing technologies. At the same time, online service providers must be able to protect themselves against misbehaving users. For instance, users that do not pay their bill must be held accountable for their behavior. This tension between privacy and accountability is fundamental, however a tradeoff is not always required. In this article we propose the concept of a time capsule, that is, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  26.  11
    Privacy and philosophy: new media and affective protocol.Andrew McStay - 2014 - New York: Peter Lang.
    In this book, McStay draws on an array of philosophers to offer a novel approach to privacy matters. Against the backdrop and scrutiny of Arendt, Aristotle, Bentham, Brentano, Deleuze, Engels, Heidegger, Hume, Husserl, James, Kant, Latour, Locke, Marx, Mill, Plato, Rorty, Ryle, Sartre, Skinner, among others, McStay advances a wealth of new ideas and terminology, from affective breaches to zombie media.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  28. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  2
    Privacy and identity in a networked society: refining privacy impact assessment.Stefan Strauss - 2019 - New York: Routledge, Taylor & Francis Group.
    Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  30. Group privacy: a defence and an interpretation.Luciano Floridi - 2017 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group Privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  31.  87
    Genetic Privacy: A Challenge to Medico-Legal Norms.Graeme Laurie - 2002 - New York: Cambridge University Press.
    The phenomenon of the New Genetics raises complex social problems, particularly those of privacy. This book offers ethical and legal perspectives on the questions of a right to know and not to know genetic information from the standpoint of individuals, their relatives, employers, insurers and the state. Graeme Laurie provides a unique definition of privacy, including a concept of property rights in the person, and argues for stronger legal protection of privacy in the shadow of developments in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  32.  41
    Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others. The basis of modern privacy laws and practices around the world, informational privacy has become a challenging concept to protect and promote in a world of ubiquitous and unlimited data sharing and storage among organizations. The paper advocates a “user-centric” approach to managing personal data online. However, user-centricity can be problematic when the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  34. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  70
    Privacy preserving electronic petitions.Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss & Girma Nigusse - 2008 - Identity in the Information Society 1 (1):203-219.
    We present the design of a secure and privacy preserving e-petition system that we have implemented as a proof-of-concept demonstrator. We use the Belgian e-ID card as source of authentication, and then proceed to issue an anonymous credential that is used to sign petitions. Our system ensures that duplicate signatures are detectable, while preserving the anonymity of petition signers. We analyze the privacy and security requirements of our application, present an overview of its architecture, and discuss the applicability (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  30
    Privacy Rights Forfeiture.Mark Hanin - 2022 - Journal of Ethics and Social Philosophy 22 (2).
    Privacy rights can surely be waived. But can they also be forfeited? If so, why and under what conditions? This article takes up these questions by developing a novel theory of privacy rights forfeiture that draws inspiration from Judith Thomson’s canonical work on privacy. The paper identifies two species of forfeiture rooted in modes of negligent and reckless conduct and argues that both self-directed and other-regarding considerations play a role in grounding forfeiture. The paper also contributes to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  38. Passive avoidance learning in individuals with psychopathy: modulation by reward but not by punishment.R. J. R. Blair, D. G. V. Mitchell, A. Leonard, S. Budhani, K. S. Peschardt & C. Newman - 2004 - Personality and Individual Differences 37:1179–1192.
    This study investigates the ability of individuals with psychopathy to perform passive avoidance learning and whether this ability is modulated by level of reinforcement/punishment. Nineteen psychopathic and 21 comparison individuals, as defined by the Hare Psychopathy Checklist Revised (Hare, 1991), were given a passive avoidance task with a graded reinforcement schedule. Response to each rewarding number gained a point reward specific to that number (i.e., 1, 700, 1400 or 2000 points). Response to each punishing number lost a point (...)
     
    Export citation  
     
    Bookmark   17 citations  
  39.  49
    Passivity in Aesthetic Experience: Husserlian and Enactive Perspectives.Tone Roald & Simon Høffding - 2019 - Journal of Aesthetics and Phenomenology 6 (1):1-20.
    This paper argues that the Husserlian notion of “passive synthesis” can make a substantial contribution to the understanding of aesthetic experience. The argument is based on two empirical cases of qualitative interview material obtained from museum visitors and a world-renowned string quartet, which show that aesthetic experience contains an irreducible dimension of passive undergoing and surprise. Analyzing this material through the lens of passive syntheses helps explain these experiences, as well as the sense of subject–object fusion that (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  40. Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  41. Protecting privacy in public? Surveillance technologies and the value of public places.Jason W. Patton - 2000 - Ethics and Information Technology 2 (3):181-187.
    While maintaining the importance of privacy for critical evaluations of surveillance technologies, I suggest that privacy also constrains the debate by framing analyses in terms of the individual. Public space provides a site for considering what is at stake with surveillance technologies besides privacy. After describing two accounts of privacy and one of public space, I argue that surveillance technologies simultaneously add an ambiguityand a specificity to public places that are detrimental to the social, cultural, and (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  42.  52
    The privacy of the psychical.Amihud Gilead - 2011 - Amsterdam: Rodopi.
    This book argues that the irreducible singularity of each person as a psychical subject implies the privacy of the psychical and that of experience, and yet the private accessibility of each person to his or her mind is compatible with interpersonal communication and understanding. The book treats these major issues against the background of the author's original metaphysics--panenmentalism."--Publisher's website.
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  43.  9
    Privacy and the Media.Kevin Macnish & Haleh Asgarinia - 2024 - In Carl Fox & Joe Saunders (eds.), Routledge Handbook of Philosophy and Media Ethics. Routledge.
    In this chapter, Macnish and Asgarinia introduce current thinking and debate around issues of privacy as these relate to the media. Starting with controversies over the definition of privacy, they consider what the content of privacy should be and why it is we consider privacy to be valuable. This latter includes the social implications of privacy and the only recently-recognised concept of group privacy, contrasting it with individual privacy, as well as legal implications (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. Privacy, Autonomy, and Personalised Targeting: rethinking how personal data is used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  50
    Group privacy.Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.) - 2016 - Springer Verlag.
    The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the different approaches and methods that can be used to address them. In doing so, it will help the reader to gain a better grasp of the ethical and legal conundrums posed by group profiling. The volume first maps the (...)
    No categories
  46. Privacy Rights and Public Information.Benedict Rumbold & James Wilson - 2018 - Journal of Political Philosophy 27 (1):3-25.
    This article concerns the nature and limits of individuals’ rights to privacy over information that they have made public. For some, even suggesting that an individual can have a right to privacy over such information may seem paradoxical. First, one has no right to privacy over information that was never private to begin with. Second, insofar as one makes once-private information public – whether intentionally or unintentionally – one waives one’s right to privacy to that information. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  47. Privacy. An intercultural perspective.Rafael Capurro - 2005 - Ethics and Information Technology 7 (1):37-47.
    This paper deals with intercultural aspects of privacy, particularly with regard to differences between Japanese and Western conceptions. It starts with a reconstruction of the genealogy of Western subjectivity and human dignity as the basic assumptions underlying Western views on privacy. An analysis of the Western concept of informational privacy is presented. The Japanese topic of ‘‘denial of self” (Musi) as well as the concepts of Seken, Shakai and Ikai (as analyzed by the authors of the companion (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  48. Privacy at work – ethical criteria.Anders J. Persson & Sven Ove Hansson - 2003 - Journal of Business Ethics 42 (1):59 - 70.
    New technologies and practices, such as drug testing, genetic testing, and electronic surveillance infringe upon the privacy of workers on workplaces. We argue that employees have a prima facie right to privacy, but this right can be overridden by competing moral principles that follow, explicitly or implicitly, from the contract of employment. We propose a set of criteria for when intrusions into an employee''s privacy are justified. Three types of justification are specified, namely those that refer to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  49.  3
    Passive voices: on the subject of phenomenology and other figures of speech.Kristina Mendicino - 2023 - Albany: State University of New York Press.
    Addresses the question of how language affects the subject of speech through readings of confessional, philosophical, and fictional writings.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50. The Privacy Dependency Thesis and Self-Defense.Lauritz Aastrup Munch & Jakob Thrane Mainz - forthcoming - AI and Society:1-11.
    If I decide to disclose information about myself, this act can undermine other people’s ability to effectively conceal information about themselves. One case in point involves genetic information: if I share ‘my’ genetic information with others, I thereby also reveal genetic information about my biological relatives. Such dependencies are well-known in the privacy literature and are often referred to as ‘privacy dependencies’. Some take the existence of privacy dependencies to generate a moral duty to sometimes avoid sharing (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999