Results for 'Attentional Privacy'

1000+ found
Order:
  1.  11
    Balancing Privacy and Free Speech: Unwanted Attention in the Age of Social Media.Mark Tunick - 2014 - London: Routledge.
    In an age of smartphones, Facebook and You Tube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe, and elsewhere, I ask whether privacy interests can ever be weightier than society’s interest in free speech and access to information. Taking a comparative and interdisciplinary approach, and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  3.  12
    Privacy and Positive Intellectual Freedom.Alan Rubel - 2014 - Journal of Social Philosophy 45 (3):390-407.
    Privacy is often linked to freedom. Protection against unreasonable searches and seizures is a hallmark of a free society, and pervasive state‐sponsored surveillance is generally considered to correlate closely with authoritarianism. One link between privacy and freedom is prominent in the library and information studies field and has recently been receiving attention in legal and philosophical scholarship. Specifically, scholars and professionals argue that privacy is an essential component of intellectual freedom. However, the nature of intellectual freedom and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  7
    Privacy in the Family.Bryce Clayton Newell, Cheryl A. Metoyer & Adam Moore - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 104-121.
    While the balance between individual privacy and government monitoring or corporate surveillance has been a frequent topic across numerous disciplines, the issue of privacy within the family has been largely ignored in recent privacy debates. Yet privacy intrusions between parents and children or between adult partners or spouses can be just as profound as those found in the more “public spheres” of life. Popular access to increasingly sophisticated forms of electronic surveillance technologies has altered the dynamics (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  5.  17
    Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  6.  15
    Surveillance, privacy and the ethics of vehicle safety communication technologies.M. Zimmer - 2005 - Ethics and Information Technology 7 (4):201-210.
    Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  7.  19
    Privacy and data privacy issues in contemporary china.Lü Yao-Huai - 2005 - Ethics and Information Technology 7 (1):7-15.
    Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional Chinese emphases on (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  8.  11
    Others’ information and my privacy: an ethical discussion.Yuanye Ma - 2023 - Journal of Information, Communication and Ethics in Society 21 (3):259-270.
    Purpose Privacy has been understood as about one’s own information, information that is not one’s own is not typically considered with regards to an individual’s privacy. This paper aims to draw attention to this issue for conceptualizing privacy when one’s privacy is breached by others’ information. Design/methodology/approach To illustrate the issue that others' information can breach one's own privacy, this paper uses real-world applications of forensic genealogy and recommender systems to motivate the discussion. Findings In (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  24
    Sovereignty, privacy, and ethics in blockchain-based identity management systems.Georgy Ishmaev - 2020 - Ethics and Information Technology 23 (3):239-252.
    Self-sovereign identity solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the concept of individual control over identity relevant private data, capacity to choose where such data is stored, and the ability to provide it to those who need to validate it. It is also (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  10.  1
    Can the obstacles to privacy self-management be overcome? Exploring the consent intermediary approach.Yki Kortesniemi & Tuukka Lehtiniemi - 2017 - Big Data and Society 4 (2).
    In privacy self-management, people are expected to perform cost–benefit analysis on the use of their personal data, and only consent when their subjective benefits outweigh the costs. However, the ubiquitous collection of personal data and Big Data analytics present increasing challenges to successful privacy management. A number of services and research initiatives have proposed similar solutions to provide people with more control over their data by consolidating consent decisions under a single interface. We have named this the ‘consent (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  12.  5
    Privacy Law’s Indeterminacy.Ryan Calo - 2019 - Theoretical Inquiries in Law 20 (1):33-52.
    Fools rush in. ALEXANDER POPE, AN ESSAY ON CRITICISM (London, 1711). The full quotation is, “For Fools rush in where Angels fear to tread.” Id. at 66. She who hesitates is lost. Adaptation of the line, “The woman that deliberates is lost.” JOSEPH ADDISON, CATO: A TRAGEDY, AND SELECTED ESSAYS 30 (2004). See also OLIVER WENDALL HOLMES, SR., THE AUTOCRAT AT THE BREAKFAST TABLE 29 (1858) (“The woman who ‘calculates’ is lost.”). American legal realism numbers among the most important theoretical (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Oikopolitics, regulation and privacy: An essay on the governmental nature of the right to private life.Muhammad Ali Nasir - 2019 - Philosophy and Social Criticism 45 (3):334-355.
    This essay focuses on the interrelationship of regulation and private life in human rights. It argues three main points. Article 8 connects the question of protection of private lives and privacies with the question of their management. Thus, Article 8 orients regulatory practices to private lives and privacies. Article 8’s holders are autonomous to the extent that laws respect their private lives and privacies. They are not autonomous in a ‘pre-political’ sense, where we might expect legal rules to protect an (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14. In the Privacy of Our Streets.Carissa Véliz - 2018 - In Bryce Clayton Newell, Tjerk Timan & Bert-Jaap Koops (eds.), Surveillance, Privacy and Public Space. Routledge. pp. 16-32.
    If one lives in a city and wants to be by oneself or have a private conversation with someone else, there are two ways to set about it: either one finds a place of solitude, such as one’s bedroom, or one finds a place crowded enough, public enough, that attention to each person dilutes so much so as to resemble a deserted refuge. Often, one can get more privacy in public places than in the most private of spaces. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  30
    Blind-sided by privacy? Digital contact tracing, the Apple/Google API and big tech’s newfound role as global health policy makers.Tamar Sharon - 2020 - Ethics and Information Technology 23 (S1):45-57.
    Since the outbreak of COVID-19, governments have turned their attention to digital contact tracing. In many countries, public debate has focused on the risks this technology poses to privacy, with advocates and experts sounding alarm bells about surveillance and mission creep reminiscent of the post 9/11 era. Yet, when Apple and Google launched their contact tracing API in April 2020, some of the world’s leading privacy experts applauded this initiative for its privacy-preserving technical specifications. In an interesting (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  16.  8
    19 Privacy and/in the Public Sphere.Beate Roessler - 2016 - Yearbook for Eastern and Western Philosophy 2016 (1):243-256.
    Talking about privacy in the public prima facie seems to be a contradiction: why should privacy have to play a role within the public sphere? What could possibly be private in the public? However, quite a number of theories of privacy conceptualize privacy as a protective shield which we carry with us wherever we are: respect for privacy in public then means, for instance, not listening in on private conversations between friends on the street or (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  1
    Information, Privacy, and Just War Theory.Jack McDonald - 2020 - Ethics and International Affairs 34 (3):379-400.
    Are the sources of a combatant's knowledge in war morally relevant? This article argues that privacy is relevant to just war theory in that it draws attention to privacy harms associated with the conduct of war. Since we cannot assume that information is made available to combatants in a morally neutral manner, we must therefore interrogate the relationship between privacy harms and the acts that they enable in war. Here, I argue that there is ample evidence that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  12
    Privacy, Feminism, and Moral Responsibility in the Work of Elizabeth Lane Beardsley.Julie Van Camp - 2022 - Journal of the History of Women Philosophers and Scientists 1 (1):99-114.
    I wonder why women philosophers, once recognized, too often seem to drop from the intellectual radar screen or, at least, to drop mainly to the land of footnotes and bibliographies. I consider one distinguished moral philosopher, Elizabeth Lane Beardsley, both to highlight her philosophical contributions and as a case study that suggests more widespread problems in recognizing t5he work of female philosophers and ensuring their rightful place in our professional dialogue. I consider sociological and professional factors which might partially explain (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19. Does a person have a right to attention? Depends on what she is doing.Kaisa Kärki & Visa Kurki - 2023 - Philosophy and Technology 36 (86):1-16.
    It has been debated whether the so-called attention economy, in which the attention of agents is measured and sold, jeopardizes something of value. One strand of this discussion has focused on so-called attention rights, asking: should attention be legally protected, either by introducing novel rights or by extending the scope of pre-existing rights? In this paper, however, in order to further this discussion, we ask: How is attention already protected legally? In what situations does a person have the right to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  21
    Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  21.  11
    Privacy at risk? Understanding the perceived privacy protection of health code apps in China.Wenhong Chen, An Hu & Gejun Huang - 2022 - Big Data and Society 9 (2).
    As a key constituent of China's approach to fighting COVID-19, Health Code apps (HCAs) not only serve the pandemic control imperatives but also exercise the agency of digital surveillance. As such, HCAs pave a new avenue for ongoing discussions on contact tracing solutions and privacy amid the global pandemic. This article attends to the perceived privacy protection among HCA users via the lens of the contextual integrity theory. Drawing on an online survey of adult HCA users in Wuhan (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  7
    Openness and privacy in born-digital archives: reflecting the role of AI development.Angeliki Tzouganatou - 2022 - AI and Society 37 (3):991-999.
    Galleries, libraries, archives and museums are striving to retain audience attention to issues related to cultural heritage, by implementing various novel opportunities for audience engagement through technological means online. Although born-digital assets for cultural heritage may have inundated the Internet in some areas, most of the time they are stored in “digital warehouses,” and the questions of the digital ecosystem’s sustainability, meaningful public participation and creative reuse of data still remain. Emerging technologies, such as artificial intelligence, are used to bring (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  14
    Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  9
    Privacy issues in a psychiatric context: applying the ISD privacy framework to a psychiatric behavioural monitoring system. [REVIEW]Rusyaizila Ramli & Nasriah Zakaria - 2014 - AI and Society 29 (2):203-213.
    Privacy issues are frequently discussed amongst researchers, practitioners and patients in healthcare. However, psychiatric patients’ privacy issues get less attention in information system development (ISD), whereby they are one of the most important stakeholders. This paper applies Carew and Stapleton’s ISD privacy framework to psychiatric monitoring systems to understand the issues that are related to monitoring psychiatric patients’ behaviour. By understanding the privacy issues amongst patients, the research will be able to provide guidance to system developers (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  11
    Two Concepts of Group Privacy.Michele Loi & Markus Christen - 2020 - Philosophy and Technology 33 (2):207-224.
    Luciano Floridi was not the first to discuss the idea of group privacy, but he was perhaps the first to discuss it in relation to the insights derived from big data analytics. He has argued that it is important to investigate the possibility that groups have rights to privacy that are not reducible to the privacy of individuals forming such groups. In this paper, we introduce a distinction between two concepts of group privacy. The first, the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  26. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur (eds.), The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. First, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  13
    Privacy and patient-clergy access: perspectives of patients admitted to hospital.E. Erde - 2006 - Journal of Medical Ethics 32 (7):398-402.
    Background: For patients admitted to hospital both pastoral care and privacy or confidentiality are important. Rules related to each have come into conflict recently in the US. Federal laws and other rules protect confidentiality in ways that countermand hospitals’ methods for facilitating access to pastoral care. This leads to conflicts and poses an unusual type of dilemma—one of conflicting values and rights. As interests are elements necessary for establishing rights, it is important to explore patients’ interests in privacy (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  28.  4
    Users or Students? Privacy in University MOOCS.Meg Leta Jones & Lucas Regner - 2016 - Science and Engineering Ethics 22 (5):1473-1496.
    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for (...) laws intended to regulate information practices exercised by educational institutions. Are MOOCs part of the educational institutions these laws and policies aim to regulate? Are MOOC users students whose data are protected by aforementioned laws and policies? Many university researchers and faculty members are asked to participate as designers and instructors in MOOCs but may not know how to approach the issues proposed. While recent scholarship has addressed the disruptive nature of MOOCs, student privacy generally, and data privacy in the K-12 system, we provide an in-depth description and analysis of the MOOC phenomenon and the privacy laws and policies that guide and regulate educational institutions today. We offer privacy case studies of three major MOOC providers active in the market today to reveal inconsistencies among MOOC platform and the level and type of legal uncertainty surrounding them. Finally, we provide a list of organizational questions to pose internally to navigate the uncertainty presented to university MOOC teams. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  5
    Privacy and Surveillance.Roos Slegers - 2023 - In Wim Dubbink & Willem van der Deijl (eds.), Business Ethics: A Philosophical Introduction. Springer Nature Switzerland. pp. 177-186.
    Living in the digital world, we have little choice but to share our personal data with big tech companies. These companies use our data to direct our attention so that they can make money from advertising. In a so-called surveillance society, we stand in an asymmetrical power relationship to these companies (and sometimes governments) and have little to no control over what happens to our data. Our dependence on these asymmetrical relationships is increasing as “big tech” uses the information it (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  12
    Reconstructing the Right to Privacy.Mark Alfino & G. Randolph Mayes - 2003 - Social Theory & Practice 29 (1):1-18.
    The article undertakes to develop a theory of privacy considered as a fundamental moral right. The authors remind that the conception of the right to privacy is silent on the prospect of protecting informational privacy on consequentialist grounds. However, laws that prevent efficient marketing practices, speedy medical attention, equitable distribution of social resources, and criminal activity could all be justified by appeal to informational privacy as a fundamental right. Finally, the authors show that in the specter (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  31.  22
    Cyberstalking, personal privacy, and moral responsibility.Herman T. Tavani & Frances S. Grodzinsky - 2002 - Ethics and Information Technology 4 (2):123-132.
    This essay examines some ethical aspects of stalkingincidents in cyberspace. Particular attention is focused on the Amy Boyer/Liam Youens case of cyberstalking, which has raised a number of controversial ethical questions. We limit our analysis to three issues involving this particular case. First, we suggest that the privacy of stalking victims is threatened because of the unrestricted access to on-linepersonal information, including on-line public records, currently available to stalkers. Second, we consider issues involving moral responsibility and legal liability for (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  32. Immunity from the illegitimate focused attention of others: an explanation of our thinking and talking about privacy.Jeffery L. Johnson - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia. pp. 49--70.
  33.  1
    Disattendability, Civil Inattention, and the Epistemology of Privacy.Axel Gelfert - 2014 - Philosophical Analysis 31:151-181.
    The concept of privacy is intimately related to epistemological concepts such as information and knowledge, yet for the longest time had received only scant attention from epistemologists. This has begun to change in recent years, and different philosophical accounts have been proposed. On the liberal model of privacy, what privacy aims at is the protection of individuals from interference in personal matters. On the (more narrowly epistemological) informational model, privacy is a matter of limiting access to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  9
    Inaccuracy as a privacy-enhancing tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
    The accuracy principle is one of the key standards of informational privacy. It epitomises the obligation for those processing personal data to keep their records accurate and up-to-date, with the aim of protecting individuals from unfair decisions. Currently, however, different practices being put in place in order to enhance the protection of individuals appear to deliberately rely on the use of ‘inaccurate’ personal information. This article explores such practices and tries to assess their potential for privacy protection, giving (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  35.  5
    Can we borrow your phone? Employee privacy in the BYOD era.William P. Smith - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):397-411.
    PurposeThis paper aims to (a) summarize the legal and ethical foundations of privacy with connections to workplace emails and text messages, (b) describe trends and challenges related to “Bring Your Own Device” (BYOD), and (c) propose legal and nonlegal questions these trends will raise in the foreseeable future.Design/methodology/approachBased on a review of legal cases and scholarship related to workplace privacy, implications for BYOD practices are proposed.FindingsPrimarily due to property rights, employers in the USA have heretofore been granted wide (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36.  18
    The value of privacy for people with dementia.Eike Buhr & Mark Schweda - 2022 - Ethik in der Medizin 34 (4):591-607.
    Definition of the problemThe concept of privacy has been astonishingly absent in the discussion about dementia care. In general, questions of privacy receive a lot of attention in nursing ethics; however, when it comes to dementia care, hardly any systematic ethical debate on the topic can be found. It almost seems as though people with dementia had lost any comprehensible interest in privacy and no longer had any private sphere that needed to be considered or protected. However, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37. “Cyber-Security, Privacy and the Covid-19 Attenuation?”.Vincent Samar - 2021 - Notre Dame Journal of Legislation 47:1-38.
    Large-scale data brokers collect massive amounts of highly personal consumer information to be sold to whoever will pay their price, even at the expense of sacrificing individual privacy and autonomy in the process. In this Article, I will show how a proper understanding and justification for a right to privacy, in context to both protecting private acts and safeguarding information and states of affairs for the performance of such acts, provides a necessary background framework for imposing legal restrictions (...)
    No categories
     
    Export citation  
     
    Bookmark  
  38.  13
    Toward a Framework for Assessing Privacy Risks in Multi-Omic Research and Databases.Charles Dupras & Eline M. Bunnik - 2021 - American Journal of Bioethics 21 (12):46-64.
    While the accumulation and increased circulation of genomic data have captured much attention over the past decade, privacy risks raised by the diversification and integration of omics have been la...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  39.  5
    The Genetic Privacy Act: An Analysis of Privacy and Research Concerns.Edwin S. Flores Troy - 1997 - Journal of Law, Medicine and Ethics 25 (4):256-272.
    In the last few years, a great deal of attention has been paid to the effects that the achievements of the Human Genome Project will have on the confidentiality of medical information. The Genetic Privacy Act is an attempt to address the privacy, confidentiality, and property rights relating to obtaining, requesting, using, storing, and disposing of genetic material. The GPA grew out of concerns over the vast amount of genetic information that is a product of the Human Genome (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  40. Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva 2005 (nov):1-31.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people’s freedom and equality provided by rights of political choice, association and expression, and can help to make (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  41.  17
    The culture industry revisited: Sociophilosophical reflections on ‘privacy’ in the digital age.Sandra Seubert & Carlos Becker - 2019 - Philosophy and Social Criticism 45 (8):930-947.
    Digital communication now pervades all spheres of life, creating new possibilities for commodification: personal data and communication are the new resources of surplus value. This in turn brings about a totally new category of threats to privacy. With recourse to the culture industry critique of early critical theory, this article seeks to challenge basic theoretical assumptions held within a liberal account of privacy. It draws the attention to the entanglement of technical and socio-economic transformations and aims at elaborating (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  42. The Hart-Rawls debate: libel, privacy infringement, reflective equilibrium.Terence Rajivan Edward - manuscript
    H.L.A. Hart objects to John Rawls’s liberty principle by drawing attention to how our legal system accepts the restriction of liberty to protect against other harms than liberty-deprivation, such as by laws against slander, libel, and publications which grossly infringe privacy. What is the solution for John Rawls, faced with this criticism? One solution is, by the reflective equilibrium method, to justify abandoning the judgment that these actions are immoral.
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  7
    Genetic Privacy: Might There Be a Moral Duty to Share One's Genetic Information?Heidi Malm - 2009 - American Journal of Bioethics 9 (6-7):52-54.
    In discussions about direct-to-consumer availability of genetic testing, much attention has been given to identifying the various risks and benefits that individuals might incur. For example, upon...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44.  22
    Digital Self-Defence: Why you Ought to Preserve Your Privacy for the Sake of Wrongdoers.Lauritz Aastrup Munch - 2022 - Ethical Theory and Moral Practice 25 (2):233-248.
    Most studies on the ethics of privacy focus on what others ought to do to accommodate our interest in privacy. I focus on a related but distinct question that has attracted less attention in the literature: When, if ever, does morality require us to safeguard our own privacy? While we often have prudential reasons for safeguarding our privacy, we are also, at least sometimes, morally required to do so. I argue that we, sometimes, ought to safeguard (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Theoretical conceptualization of online privacy-related decision making – Introducing the tripartite self-disclosure decision model.Sina Ostendorf & Matthias Brand - 2022 - Frontiers in Psychology 13.
    Self-disclosures on online social networks have received increased attention in the last two decades. Researchers from different disciplines investigated manifold influencing variables, and studies applied different theories to explain why many users share very sensitive and personal information despite potential risks and negative consequences, whereas others do not. Oftentimes, it is argued that self-disclosure decisions result from a kind of rational “calculus” of risks and benefits. However, such an assumption of rationality can and has been criticized. Nevertheless, fundamental cognitive and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  3
    The Right to Privacy: Gays, Lesbians, and the Constitution.Vincent Samar - 1992 - Temple University Press.
    Where did the right to privacy come from and what does it mean? Grappling with the critical issues involving women and gays that relate to the current Supreme Court appointment, Vincent J. Samar develops a definition of legal privacy, discusses the reasons why and the degree to which privacy should be protected, and shows the relationship between privacy and personal autonomy. He answers former Supreme Court nominee Robert Bork's questions about scope, content, and legal justification for (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  6
    The Genetic Privacy Act: An Analysis of Privacy and Research Concerns.Edwin S. Flores Troy - 1997 - Journal of Law, Medicine and Ethics 25 (4):256-272.
    In the last few years, a great deal of attention has been paid to the effects that the achievements of the Human Genome Project will have on the confidentiality of medical information. The Genetic Privacy Act is an attempt to address the privacy, confidentiality, and property rights relating to obtaining, requesting, using, storing, and disposing of genetic material. The GPA grew out of concerns over the vast amount of genetic information that is a product of the Human Genome (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  14
    Treating sensitive topics online: a privacy dilemma.Paula Helm - 2018 - Ethics and Information Technology 20 (4):303-313.
    This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49.  5
    Digitalization of contact tracing: balancing data privacy with public health benefit.Jeremy Wacksman - 2021 - Ethics and Information Technology 23 (4):855-861.
    The COVID-19 pandemic has brought the long-standing public health practice of contact tracing into the public spotlight. While contact tracing and case investigation have been carefully designed to protect privacy, the huge volume of tracing which is being carried out as part of the pandemic response in the United States is highlighting potential concerns around privacy, legality, and equity. Contact tracing during the pandemic has gained particular attention for the new use of digital technologies—both on the consumer side (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  10
    Grappling with “Data Power”: Normative Nudges from Data Protection and Privacy.Orla Lynskey - 2019 - Theoretical Inquiries in Law 20 (1):189-220.
    The power exercised by technology companies is attracting the attention of policymakers, regulatory bodies and the general public. This power can be categorized in several ways, ranging from the “soft power” of technology companies to influence public policy agendas to the “market power” they may wield to exclude equally efficient competitors from the marketplace. This Article is concerned with the “data power” exercised by technology companies occupying strategic positions in the digital ecosystem. This data power is a multifaceted power that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000