Results for 'Privacy and security'

1000+ found
Order:
  1.  7
    Privacy and Security Issues with Mobile Health Research Applications.Stacey A. Tovino - 2020 - Journal of Law, Medicine and Ethics 48 (S1):154-158.
    This article examines the privacy and security issues associated with mobile application-mediated health research, concentrating in particular on research conducted or participated in by independent scientists, citizen scientists, and patient researchers. Building on other articles in this issue that examine state research laws and state data protection laws as possible sources of privacy and security protections for mobile research participants, this article focuses on the lack of application of federal standards to mobile application-mediated health research. As (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  1
    Privacy and Security within Biobanking: The Role of Information Technology.Raymond Heatherly - 2016 - Journal of Law, Medicine and Ethics 44 (1):156-160.
    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  2
    4. Privacy and Security Policy: The Historical Situation.Gregory J. Walters - 2001 - In Human Rights in an Information Age a Philosophical Analysis. University of Toronto Press. pp. 117-149.
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  2
    5. Privacy and Security: An Ethical Analysis.Gregory J. Walters - 2001 - In Human Rights in an Information Age a Philosophical Analysis. University of Toronto Press. pp. 150-186.
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  6
    Privacy and security for electronic health records.Virginia A. Sharpe - 2005 - Hastings Center Report 35 (6):3-3.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  2
    Perspective: Privacy and Security for Electronic Health Records.Virginia A. Sharpe - 2005 - Hastings Center Report 35 (6):c3-c3.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  3
    Cop to Cop: Negotiating Privacy and Security in the Examining Room.Sondra S. Crosby & George J. Annas - 2020 - Journal of Law, Medicine and Ethics 48 (1):169-171.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  26
    Ethical concerns around privacy and data security in AI health monitoring for Parkinson’s disease: insights from patients, family members, and healthcare professionals.Itai Bavli, Anita Ho, Ravneet Mahal & Martin J. McKeown - forthcoming - AI and Society:1-11.
    Artificial intelligence (AI) technologies in medicine are gradually changing biomedical research and patient care. High expectations and promises from novel AI applications aiming to positively impact society raise new ethical considerations for patients and caregivers who use these technologies. Based on a qualitative content analysis of semi-structured interviews and focus groups with healthcare professionals (HCPs), patients, and family members of patients with Parkinson’s Disease (PD), the present study investigates participant views on the comparative benefits and problems of using human versus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  6
    Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
    I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  10.  9
    Privacy vs. security: Why privacy is not an absolute value or right.Kenneth Einar Himma - manuscript
    In this essay, I consider the relationship between the rights to privacy and security and argue that, in a sense to be made somewhat more precise below, that threats to the right to security outweighs comparable threats to privacy. My argument begins with an assessment of ordinary case judgments and an explanation of the important moral distinction between intrinsic value (i.e., value as an end) and instrumental value (i.e., value as a means), arguing that each approach (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  11. “Cyber-Security, Privacy and the Covid-19 Attenuation?”.Vincent Samar - 2021 - Notre Dame Journal of Legislation 47:1-38.
    Large-scale data brokers collect massive amounts of highly personal consumer information to be sold to whoever will pay their price, even at the expense of sacrificing individual privacy and autonomy in the process. In this Article, I will show how a proper understanding and justification for a right to privacy, in context to both protecting private acts and safeguarding information and states of affairs for the performance of such acts, provides a necessary background framework for imposing legal restrictions (...)
    No categories
     
    Export citation  
     
    Bookmark  
  12.  12
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  62
    Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like‐minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions ‐ including our (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  9
    A bibliometric analysis of privacy and ethics in IEEE Security and Privacy.Jonathan Tse, Dawn E. Schrader, Dipayan Ghosh, Tony Liao & David Lundie - 2015 - Ethics and Information Technology 17 (2):153-163.
    The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  1
    The Emergence of State Data Privacy and Security Laws Affects Employers.Joseph J. Lazzarotti - unknown - Emergence: Complexity and Organization 1:1-2008.
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  73
    Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  17
    Privacy and artificial intelligence: challenges for protecting health information in a new era.Blake Murdoch - 2021 - BMC Medical Ethics 22 (1):1-5.
    BackgroundAdvances in healthcare artificial intelligence (AI) are occurring rapidly and there is a growing discussion about managing its development. Many AI technologies end up owned and controlled by private entities. The nature of the implementation of AI could mean such corporations, clinics and public bodies will have a greater than typical role in obtaining, utilizing and protecting patient health information. This raises privacy issues relating to implementation and data security. Main bodyThe first set of concerns includes access, use (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  18.  10
    Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, Kth Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued that the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  5
    Daniel J. Solove, Nothing to Hide: The False Tradeoff between Privacy and Security: New Haven and London: Yale University Press, 2011. ISBN 10:0300172311, $25.00, Hbk. [REVIEW]Tony Doyle - 2012 - Journal of Value Inquiry 46 (1):107-112.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  21.  8
    Privacy and surveillance concerns in machine learning fall prediction models: implications for geriatric care and the internet of medical things.Russell Yang - forthcoming - AI and Society:1-5.
    Fall prediction using machine learning has become one of the most fruitful and socially relevant applications of computer vision in gerontological research. Since its inception in the early 2000s, this subfield has proliferated into a robust body of research underpinned by various machine learning algorithms (including neural networks, support vector machines, and decision trees) as well as statistical modeling approaches (Markov chains, Gaussian mixture models, and hidden Markov models). Furthermore, some advancements have been translated into commercial and clinical practice, with (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  1
    Privacy and identity in a networked society: refining privacy impact assessment.Stefan Strauss - 2019 - New York: Routledge, Taylor & Francis Group.
    Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  14
    Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  24.  8
    19 Privacy and/in the Public Sphere.Beate Roessler - 2016 - Yearbook for Eastern and Western Philosophy 2016 (1):243-256.
    Talking about privacy in the public prima facie seems to be a contradiction: why should privacy have to play a role within the public sphere? What could possibly be private in the public? However, quite a number of theories of privacy conceptualize privacy as a protective shield which we carry with us wherever we are: respect for privacy in public then means, for instance, not listening in on private conversations between friends on the street or (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  4
    HIPPA, privacy and organizational change: a challenge for management.Bradley K. Jensen, Melinda Cline & Carl S. Guynes - 2007 - Acm Sigcas Computers and Society 37 (1):12-17.
    Organizational change surrounding the security of identifiable health information has become imperative. This is a significant challenge for managers who are held responsible for loss of privacy through faulty security procedures. Management cannot completely secure the organization and still provide employees and customers with the information and services they need. Organizations must decide how much and what type of security they need, how to assign priorities, and how to manage security as the organization evolves in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  26.  14
    Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  13
    Rethinking surveillance and control : beyond the "security versus privacy" debate.Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.) - 2017 - Baden-Baden: Nomos.
    This book is based on the premise that the trade-off between privacy and security is both unsound and conceals important aspects of surveillance and control. Accordingly, the authors analyse the symbiotic relationship between liberty and security, and the emptiness of both concepts when considered in isolation. They explore and contextualise different notions of risk, surveillance practices and the value of the rights to private life and data protection. Thereby, they show that surveillance and control neither necessarily attain (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  67
    Democracy and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63 (4):99-110.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  29.  82
    Democracy and Security.Annabelle Lever - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International.
    This chapter is concerned with the role of democracy in preventing terrorism, identifying and apprehending terrorists, and in minimizing and alleviating the damage created by terrorism.1 Specifically, it considers the role of democracy as a resource, not simply a limitation, on counterterrorism.2 I am mainly concerned with the ways in which counterterrorism is similar to more familiar forms of public policy, such as the prevention of crime or the promotion of economic prosperity, and so nothing that I say turns on (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  30. Personal privacy and electronic data transfers.David Perry - manuscript
    From a speech given at a conference sponsored by the Electronic Funds Transfer Association (EFTA) on "The Puzzle of Data Security and Consumer Privacy," Washington, DC, 16 November 1992. At that time, Dr. Perry was a Consultant in Advisory Services for the Ethics Resource Center.
     
    Export citation  
     
    Bookmark  
  31.  11
    Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  32.  4
    Privacy, Security and Accountability: Ethics, Law and Policy.Adam D. Moore (ed.) - 2015 - New York: Rowman & Littlefield International.
    This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these important individual and social values.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  13
    A Right to Privacy and Confidentiality: Ethical Medical Care for Patients in United States Immigration Detention.Amanda M. Gutierrez, Jacob D. Hofstetter, Emma L. Dishner, Elizabeth Chiao, Dilreet Rai & Amy L. McGuire - 2020 - Journal of Law, Medicine and Ethics 48 (1):161-168.
    Recently, John Doe, an undocumented immigrant who was detained by United States Immigration and Customs Enforcement, was admitted to a hospital off-site from a detention facility. Custodial officers accompanied Mr. Doe into the exam room and refused to leave as physicians examined him. In this analysis, we examine the ethical dilemmas this case brings to light concerning the treatment of patients in immigration detention and their rights to privacy. We analyze what US law and immigration detention standards allow regarding (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  10
    Privacy and Health Information Technology.Deven McGraw - 2009 - Journal of Law, Medicine and Ethics 37 (s2):121-149.
    The increased use of health information technology is a common element of nearly every health reform proposal because it has the potential to decrease costs, improve health outcomes, coordinate care, and improve public health. However, it raises concerns about security and privacy of medical information. This paper examines some of the “gaps” in privacy protections that arise out of the current federal health privacy standard, the Health Insurance Portability and Accountability Privacy Rule, which is the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  41
    Defusing the legal and ethical minefield of epigenetic applications in the military, defence and security context.Gratien Dalpe, Katherine Huerne, Charles Dupras, Katherine Cheung, Nicole Palmour, Eva Winkler, Karla Alex, Maxwell Mehlmann, John W. Holloway, Eline Bunnik, Harald König, Isabelle M. Mansuy, Marianne G. Rots, Cheryl Erwin, Alexandre Erler, Emanuele Libertini & Yann Joly - 2023 - Journal of Law and the Biosciences 10 (2):1-32.
    Epigenetic research has brought several important technological achievements, including identifying epigenetic clocks and signatures, and developing epigenetic editing. The potential military applications of such technologies we discuss are stratifying soldiers’ health, exposure to trauma using epigenetic testing, information about biological clocks, confirming child soldiers’ minor status using epigenetic clocks, and inducing epigenetic modifications in soldiers. These uses could become a reality. This article presents a comprehensive literature review, and analysis by interdisciplinary experts of the scientific, legal, ethical, and societal issues (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  8
    Retaining the Genetic Profile of Innocent People: A Difficult Balance Between Respecting the Individual's Privacy and Public Security.Luciana Caenazzo & Pamela Tozzo - 2013 - Synesis: A Journal of Science, Technology, Ethics, and Policy 4 (1).
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  11
    Rethinking Surveillance and Control. Beyond the 'Security vs. Privacy' Debate.Elisa Orrù, Maria Grazia Porcedda & Sebastian Weydner-Volkmann (eds.) - 2017 - Baden-Baden: Nomos.
    This book is based on the premise that the trade-off between privacy and security is both unsound and con-ceals important aspects of surveillance and control. Accordingly, the authors analyse the symbiotic relati-onship between liberty and security, and the emptiness of both concepts when considered in isolation. They explore and contextualise different notions of risk, surveillance practices and the value of the rights to pri-vate life and data protection. Thereby, they show that surveillance and control neither necessarily attain (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  7
    Workplace surveillance, privacy and distributive justice.Lucas D. Introna - 2000 - Acm Sigcas Computers and Society 30 (4):33-39.
    Modern technologies are providing unprecedented opportunities for surveillance. In the workplace surveillance technology is being built into the very infrastructure of work. Can the employee legitimately resist this increasingly pervasive net of surveillance? The employers argue that workplace surveillance is essential for security, safety, and productivity in increasingly competitive markets. They argue that they have a right to ensure that they 'get what they pay for', furthermore, that the workplace is a place of 'work' which by its very definition (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  4
    Ontological security, existential anxiety and workplace privacy.William S. Brown - 2000 - Journal of Business Ethics 23 (1):61 - 65.
    The relationship of workers to management has traditionally been one of control. However, the introduction of increasingly sophisticated technology as a means of supervision in the modern workplace has dramatically altered the contours of this relationship, giving workers much less privacy and making workers much more visible than previously possible. The purpose of this paper is to examine the current state of technological control of workers and how it has altered the relationship of worker to organization, through the impact (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  6
    Found Your DNA on the Web: Reconciling Privacy and Progress.Amy Gutmann & James W. Wagner - 2013 - Hastings Center Report 43 (3):15-18.
    An article by Melissa Gymrek and colleagues, published this January in Science, described how the researchers used surname inferences from commercial genealogy databases and Internet searches to deduce the identity of nearly fifty research participants whose supposedly private data were stored in large, publicly available datasets. This news comes just months after the Presidential Commission for the Study of Bioethical Issues published a report that expressed serious concerns about personal privacy and security in whole genome sequencing. The bioethics (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  8
    The Right to Know and the Right Not to Know: Genetic Privacy and Responsibility.Ruth Chadwick, Mairi Levitt & Darren Shickle (eds.) - 2014 - Cambridge University Press.
    The privacy concerns discussed in the 1990s in relation to the New Genetics failed to anticipate the relevant issues for individuals, families, geneticists and society. Consumers, for example, can now buy their personal genetic information and share it online. The challenges facing genetic privacy have evolved as new biotechnologies have developed, and personal privacy is increasingly challenged by the irrepressible flow of electronic data between the personal and public spheres and by surveillance for terrorism and security (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  42.  7
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, gain insights from (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  10
    Security and privacy of adolescents in social applications and networks: legislative aspects and legal practice of countering cyberbullying on example of developed and developing countries.Ahmad Ghandour, Viktor Shestak & Konstantin Sokolovskiy - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):433-445.
    Purpose This paper aims to study the developed countries’ experience on the cyberbullying legal regulation among adolescents, to identify existing shortcomings in the developing countries’ laws and to develop recommendations for regulatory framework improvement. Design/methodology/approach The authors have studied the state regulatory practice of the UK, the USA, Canada, Malaysia, South Africa, Turkey, UAE and analyzed the statistics of 2018 on the cyberbullying manifestation among adolescents in these countries. Findings The study results can encourage countries to create separate cyberbullying legislation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  6
    After Snowden – the evolving landscape of privacy and technology.Robin Wilton - 2017 - Journal of Information, Communication and Ethics in Society 15 (3):328-335.
    Purpose This paper aims to provide a non-academic perspective on the research reports of the JICES “Post-Snowden” special edition, from the viewpoint of a privacy advocate with an IT background. Design/methodology/approach This paper was written after reviewing the country reports for Japan, New Zealand, PRC and Taiwan, Spain and Sweden, as well as the Introduction paper. The author has also drawn on online sources such as news articles to substantiate his analysis of attitudes to technical privacy protection post-Snowden. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  13
    Algorithms and values in justice and security.Paul Hayes, Ibo van de Poel & Marc Steen - 2020 - AI and Society 35 (3):533-555.
    This article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology. Here, we explicate and analyse the expression of values of accuracy, privacy, fairness and equality, property and ownership, and accountability and transparency in this context. We find that values are sensitive to disvalue if algorithms are designed, implemented or deployed inappropriately or without (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  46.  6
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  4
    Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms.Kirsten Martin - 2020 - Business Ethics Quarterly 30 (1):65-96.
    ABSTRACT:The oft-cited privacy paradox is the perceived disconnect between individuals’ stated privacy expectations, as captured in surveys, and consumer market behavior in going online: individuals purport to value privacy yet still disclose information to firms. The goal of this paper is to empirically examine the conceptualization of privacy postdisclosure assumed in the privacy paradox. Contrary to the privacy paradox, the results here suggest consumers retain strong privacy expectations even after disclosing information. Privacy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  48.  7
    Managed care, medical privacy, and the paradigm of consent.Maxwell Gregg Bloche - 1997 - Kennedy Institute of Ethics Journal 7 (4):381-386.
    : The market success of managed health plans in the 1990s is bringing to medicine the easy availability of electronically stored information that is characteristic of the securities and consumer credit industries. Protection for medical confidentiality, however, has not kept pace with this information revolution. Employers, the managed care industry, and legal and ethics commentators frequently look to the concept of informed consent to justify particular uses of health information, but the elastic use of informed consent as a way of (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  9
    The European Union's Adequacy Approach to Privacy and International Data Sharing in Health Research.Jennifer Stoddart, Benny Chan & Yann Joly - 2016 - Journal of Law, Medicine and Ethics 44 (1):143-155.
    The European Union approach to data protection consists of assessing the adequacy of the data protection offered by the laws of a particular jurisdiction against a set of principles that includes purpose limitation, transparency, quality, proportionality, security, access, and rectification. The EU's Data Protection Directive sets conditions on the transfer of data to third countries by prohibiting Member States from transferring to such countries as have been deemed inadequate in terms of the data protection regimes. In theory, each jurisdiction (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  50.  3
    Digital identity: Contemporary challenges for data protection, privacy and non-discrimination rights.Ana Beduschi - 2019 - Big Data and Society 6 (2).
    The World Bank estimates that over one billion people currently lack official identity documents. To tackle this crucial issue, the United Nations included the aim to provide legal identity for all by 2030 among the Sustainable Development Goals. Technology can be a powerful tool to reach this target. In the digital age, new technologies increasingly mediate identity verification and identification of individuals. Currently, State-led and public–private initiatives use technology to provide official identification, to control and secure external borders, and to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000