Results for 'Privacy'

997 found
Order:
See also
  1. Privacy, Autonomy, and Personalised Targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2019 - In Carissa Véliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  28
    Views on Privacy. A Survey.Siân Brooke & Carissa Véliz - 2020 - In Data, Privacy, and the Individual.
    The purpose of this survey was to gather individual’s attitudes and feelings towards privacy and the selling of data. A total (N) of 1,107 people responded to the survey. -/- Across continents, age, gender, and levels of education, people overwhelmingly think privacy is important. An impressive 82% of respondents deem privacy extremely or very important, and only 1% deem privacy unimportant. Similarly, 88% of participants either agree or strongly agree with the statement that ‘violations to the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. In the Privacy of Our Streets.Carissa Véliz - 2018 - In Bryce Newell, Tjerk Timan & Bert-Jaap Koops (eds.), Surveillance, Privacy and Public Space. pp. 16-32.
    If one lives in a city and wants to be by oneself or have a private conversation with someone else, there are two ways to set about it: either one finds a place of solitude, such as one’s bedroom, or one finds a place crowded enough, public enough, that attention to each person dilutes so much so as to resemble a deserted refuge. Often, one can get more privacy in public places than in the most private of spaces. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security, and Accountability: Ethics, Law, and Policy. London, UK: pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  78
    Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6. Privacy in Public and the Contextual Conditions of Agency.Maria Brincker - 2017 - In Tjerk Timan, Bert-Jaap Koops & Bryce Newell (eds.), Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. The Internet and Privacy.Carissa Véliz - 2019 - In David Edmonds (ed.), Ethics and the Contemporary World. Abingdon, UK: pp. 149-159.
    In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is important because violations of the right to privacy can harm us individually and collectively, and offer some advice as to how to protect our privacy online.
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  17
    Privacy in the Family.Bryce Clayton Newell, Cheryl A. Metoyer & Adam Moore - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 104-121.
    While the balance between individual privacy and government monitoring or corporate surveillance has been a frequent topic across numerous disciplines, the issue of privacy within the family has been largely ignored in recent privacy debates. Yet privacy intrusions between parents and children or between adult partners or spouses can be just as profound as those found in the more “public spheres” of life. Popular access to increasingly sophisticated forms of electronic surveillance technologies has altered the dynamics (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Neuroscience V. Privacy? : A Democratic Perspective.Annabelle Lever - 2012 - In Sarah Richmond, Geraint Rees & Sarah J. L. Edwards (eds.), I Know What You're Thinking: Brain Imaging and Mental Privacy. Oxford University Press. pp. 205.
    Recent developments in neuroscience create new opportunities for understanding the human brain. The power to do good, however, is also the power to harm, so scientific advances inevitably foster as many dystopian fears as utopian hopes. For instance, neuroscience lends itself to the fear that people will be forced to reveal thoughts and feelings which they would not have chosen to reveal, and of which they may be unaware. It also lends itself to the worry that people will be encouraged (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  24
    Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Van Brakel Leenes R. (ed.), Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Dordrecht: Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  62
    Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In T. C. de Campos, J. Herring & A. M. Phillips (eds.), Philosophical Foundations of Medical Law. Oxford, U.K.: Oxford University Press. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At best, data about your health might (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2015 - In Beate Rossler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. cambridge University Press.
  14. Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   30 citations  
  15. The Ontological Interpretation of Informational Privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185-200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   43 citations  
  16.  82
    What to Do When Privacy Is Gone.James Brusseau - 2019 - In Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Norfolk, VA, USA: pp. 1 - 8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  21
    Not the Doctor’s Business: Privacy, Personal Responsibility and Data Rights in Medical Settings.Carissa Véliz - forthcoming - Bioethics.
    This paper argues that assessing personal responsibility in healthcare settings for the allocation of medical resources would be too privacy-invasive to be morally justifiable. In addition to being an inappropriate and moralizing intrusion into the private lives of patients, it would put patients’ sensitive data at risk, making data subjects vulnerable to a variety of privacy-related harms. Even though we allow privacy-invasive investigations to take place in legal trials, the justice and healthcare systems are not analogous. The (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18. Bodily Privacy, Toilets, and Sex Discrimination: The Problem of "Manhood" in a Women's Prison.Jami L. Anderson - 2009 - In Olga Gershenson Barbara Penner (ed.), Ladies and Gents. pp. 90.
    Unjustifiable assumptions about sex and gender roles, the untamable potency of maleness, and gynophobic notions about women's bodies inform and influence a broad range of policy-making institutions in this society. In December 2004, the U.S. Court of Appeals for the Sixth Circuit continued this ignoble cultural pastime when they decided Everson v. Michigan Department of Corrections. In this decision, the Everson Court accepted the Michigan Department of Correction's claim that “the very manhood” of male prison guards both threatens the safety (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. Four Challenges for a Theory of Informational Privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109-119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  20. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’T.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that (...)
    Direct download (2 more)  
    Translate
     
     
    Export citation  
     
    Bookmark  
  21. Contextual Gaps: Privacy Issues on Facebook.Gordon Hull, Heather Richter Lipford & Celine Latulipe - 2011 - Ethics and Information Technology 13 (4):289-302.
    Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps are at the root of many (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  22.  46
    Genetic Privacy: A Challenge to Medico-Legal Norms.Graeme Laurie - 2002 - Cambridge University Press.
    The phenomenon of the New Genetics raises complex social problems, particularly those of privacy. This book offers ethical and legal perspectives on the questions of a right to know and not to know genetic information from the standpoint of individuals, their relatives, employers, insurers and the state. Graeme Laurie provides a unique definition of privacy, including a concept of property rights in the person, and argues for stronger legal protection of privacy in the shadow of developments in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   18 citations  
  23.  66
    The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.Fiachra O’Brolcháin, Tim Jacquemard, David Monaghan, Noel O’Connor, Peter Novitzky & Bert Gordijn - 2016 - Science and Engineering Ethics 22 (1):1-29.
    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities and social networks, hereafter VRSNs. We examine a scenario in which a significant segment of the world’s population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  24. The Epistemic Account of Privacy.Martijn Blaauw - 2013 - Episteme 10 (2):167-177.
    Privacy is valued by many. But what it means to have privacy remains less than clear. In this paper, I argue that the notion of privacy should be understood in epistemic terms. What it means to have (some degree of) privacy is that other persons do not stand in significant epistemic relations to those truths one wishes to keep private.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  25. Freedom and Privacy in Ambient Intelligence.Philip Brey - 2005 - Ethics and Information Technology 7 (3):157-166.
    This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed: freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored as well.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  26.  83
    Privacy. An Intercultural Perspective.Rafael Capurro - 2005 - Ethics and Information Technology 7 (1):37-47.
    This paper deals with intercultural aspects of privacy, particularly with regard to differences between Japanese and Western conceptions. It starts with a reconstruction of the genealogy of Western subjectivity and human dignity as the basic assumptions underlying Western views on privacy. An analysis of the Western concept of informational privacy is presented. The Japanese topic of ‘‘denial of self” (Musi) as well as the concepts of Seken, Shakai and Ikai (as analyzed by the authors of the companion (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  27.  91
    Privacy and Democracy: What the Secret Ballot Reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  28. Quantifying Privacy in Terms of Entropy for Context Aware Services.Athanasios S. Voulodimos & Charalampos Z. Patrikakis - 2009 - Identity in the Information Society 2 (2):155-169.
    In this paper, we address the issue of privacy protection in context aware services, through the use of entropy as a means of measuring the capability of locating a user’s whereabouts and identifying personal selections. We present a framework for calculating levels of abstraction in location and personal preferences reporting in queries to a context aware services server. Finally, we propose a methodology for determining the levels of abstraction in location and preferences that should be applied in user data (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Anti-Doping, Purported Rights to Privacy and WADA's Whereabouts Requirements: A Legal Analysis.Oskar MacGregor, Richard Griffith, Daniele Ruggiu & Mike McNamee - 2013 - Fair Play 1 (2):13-38.
    Recent discussions among lawyers, philosophers, policy researchers and athletes have focused on the potential threat to privacy posed by the World Anti-Doping Agency’s (WADA) whereabouts requirements. These requirements demand, among other things, that all elite athletes file their whereabouts information for the subsequent quarter on a quarterly basis and comprise data for one hour of each day when the athlete will be available and accessible for no advance notice testing at a specified location of their choosing. Failure to file (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  30.  53
    What to Do When Privacy Is Gone.James Brusseau - 2019 - In D. E. Wittkower (ed.), Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Norfolk, VA, USA: Old Dominion. pp. 2-8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  32. Privacy, the Workplace and the Internet.Seumas Miller & John Weckert - 2000 - Journal of Business Ethics 28 (3):255 - 265.
    This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and monitoring of employees, arguments which look at the benefits, or supposed benefits, to employees as well as to employers. The paper examines the general monitoring of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  33. Libraries, Electronic Resources, and Privacy: The Case for Positive Intellectual Freedom.Alan Rubel - 2014 - Library Quarterly 84 (2):183-208.
    Public and research libraries have long provided resources in electronic formats, and the tension between providing electronic resources and patron privacy is widely recognized. But assessing trade-offs between privacy and access to electronic resources remains difficult. One reason is a conceptual problem regarding intellectual freedom. Traditionally, the LIS literature has plausibly understood privacy as a facet of intellectual freedom. However, while certain types of electronic resource use may diminish patron privacy, thereby diminishing intellectual freedom, the opportunities (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34.  96
    A Framework for Analyzing and Comparing Privacy States.Alan Rubel & Ryan Biava - 2014 - JASIST: The Journal of the American Society for Information Science and Technology 65 (12):2422-2431.
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove. [REVIEW]Alan Rubel - 2009 - Review of Policy Research 26:633-634.
    Review of Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  73
    Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers' Online Privacy Concerns. [REVIEW]Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107 - 123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers’ (...) concerns relates to fairness judgments, which in turn comprise of the two primary components of distributive and procedural justice. Second, we make a number of prescriptions, aimed at both firms and regulators, based on the notion that consumers respond to perceived privacy violations in much the same way they would respond to an unfair exchange. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  37.  96
    Online Diaries: Reflections on Trust, Privacy, and Exhibitionism. [REVIEW]Paul B. de Laat - 2008 - Ethics and Information Technology 10 (1):57-69.
    Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  38. Feminism, Democracy and the Right to Privacy.Annabelle Lever - 2005 - Minerva 2005 (nov):1-31.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people’s freedom and equality provided by rights of political choice, association and expression, and can help to make (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  39.  29
    The Moral Intensity of Privacy: An Empirical Study of Webmasters' Attitudes. [REVIEW]Thomas R. Shaw - 2003 - Journal of Business Ethics 46 (4):301 - 318.
    Webmasters are a key moral agent in the issue of privacy. This study attempts to understand the factors underlying their attitudes about privacy based on the theory of moral intensity. Webmasters of high-traffic sites were invited via email to participate in a web-based survey. The results support the application of moral intensity to the domain of privacy and the population of webmasters - both outcomes and social norms have statistically significant main effects on attitudes. The results also (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  40. Four Facets of Privacy and Intellectual Freedom in Licensing Contracts for Electronic Journals.Alan Rubel & Mei Zhang - 2015 - College and Research Libraries 4 (76):427-449.
    This is a study of the treatment of library patron privacy in licenses for electronic journals in academic libraries. We begin by distinguishing four facets of privacy and intellectual freedom based on the LIS and philosophical literature. Next, we perform a content analysis of 42 license agreements for electronic journals, focusing on terms for enforcing authorized use and collection and sharing of user data. We compare our findings to model licenses, to recommendations proposed in a recent treatise on (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. Privacy Rights, Crime Prevention, CCTV, and the Life of Mrs Aremac.Jesper Ryberg - 2007 - Res Publica 13 (2):127-143.
    Over the past decade the use of closed circuit television (CCTV) as a means of crime prevention has reached unprecedented levels. Though critics of this development do not speak with one voice and have pointed to a number of different problems in the use of CCTV, one argument has played a dominant role in the debate, namely, that CCTV constitutes an unacceptable violation of people’s right to privacy. The purpose of this paper is to examine this argument critically. It (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  42.  42
    Remote Home Health Care Technologies: How to Ensure Privacy? Build It In: Privacy by Design.Ann Cavoukian, Angus Fisher, Scott Killen & David A. Hoffman - 2010 - Identity in the Information Society 3 (2):363-378.
    Current advances in connectivity, sensor technology, computing power and the development of complex algorithms for processing health-related data are paving the way for the delivery of innovative long-term health care services in the future. Such technological developments will, in particular, assist the elderly and infirm to live independently, at home, for much longer periods. The home is, in fact, becoming a locus for health care innovation that may in the future compete with the hospital. However, along with these advances come (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  43.  46
    A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent.Irene Pollach - 2005 - Journal of Business Ethics 62 (3):221-235.
    The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  44. Why Data Privacy is Key To a Smart Energy Future.Carissa Véliz & Philipp Grunewald - 2018 - Nature Energy 3:702-704.
    The ability to collect fine-grained energy data from smart meters has benefits for utilities and consumers. However, a proactive approach to data privacy is necessary to maximize the potential of these data to support low-carbon energy systems, and innovative business models.
    Direct download  
     
    Export citation  
     
    Bookmark  
  45. Building an Ethical Environment Improves Patient Privacy and Satisfaction in the Crowded Emergency Department: A Quasi-Experimental Study. [REVIEW]Yen-Ko Lin, Wei-Che Lee, Liang-Chi Kuo, Yuan-Chia Cheng, Chia-Ju Lin, Hsing-Lin Lin, Chao-Wen Chen & Tsung-Ying Lin - 2013 - BMC Medical Ethics 14 (1):8-.
    Background: To evaluate the effectiveness of a multifaceted intervention in improving emergency department (ED) patient privacy and satisfaction in the crowded ED setting. Methods: A pre- and post-intervention study was conducted. A multifaceted intervention was implemented in a university-affiliated hospital ED. The intervention developed strategies to improve ED patient privacy and satisfaction, including redesigning the ED environment, process management, access control, and staff education and training, and encouraging ethics consultation. The effectiveness of the intervention was evaluated using patient (...)
    Direct download (16 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  46. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Delegating and distributing morality: Can we inscribe privacy protection in a machine? [REVIEW]Alison Adam - 2005 - Ethics and Information Technology 7 (4):233-242.
    This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with tragic consequences. In some sense this can be regarded as a failure in the process of delegating morality (...)
    Direct download (9 more)  
    Translate
     
     
    Export citation  
     
    Bookmark   5 citations  
  48.  16
    Lifelogging: Privacy and Empowerment with Memories for Life. [REVIEW]Kieron O’Hara, Mischa M. Tuffield & Nigel Shadbolt - 2008 - Identity in the Information Society 1 (1):155-172.
    The growth of information acquisition, storage and retrieval capacity has led to the development of the practice of lifelogging, the undiscriminating collection of information concerning one’s life and behaviour. There are potential problems in this practice, but equally it could be empowering for the individual, and provide a new locus for the construction of an online identity. In this paper we look at the technological possibilities and constraints for lifelogging tools, and set out some of the most important privacy, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  49. Privacy at Work – Ethical Criteria.Anders J. Persson & Sven Ove Hansson - 2003 - Journal of Business Ethics 42 (1):59 - 70.
    New technologies and practices, such as drug testing, genetic testing, and electronic surveillance infringe upon the privacy of workers on workplaces. We argue that employees have a prima facie right to privacy, but this right can be overridden by competing moral principles that follow, explicitly or implicitly, from the contract of employment. We propose a set of criteria for when intrusions into an employee''s privacy are justified. Three types of justification are specified, namely those that refer to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  50.  62
    Privacy as Life, Liberty, Property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.
    The cluster of concerns usually identified asmatters of privacy can be adequately accountedfor by unpacking our natural rights to life,liberty, and property. Privacy as derived fromfundamental natural rights to life, liberty,and property encompasses the advantages of thecontrol and restricted access theories withouttheir attendant difficulties.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   12 citations  
1 — 50 / 997