Results for 'Security and privacy patterns'

1000+ found
Order:
  1.  66
    How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone - 2009 - Artificial Intelligence and Law 17 (1):1-30.
    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why, and when such solutions have to be adopted is often unanswered because the answer comes only from a broader perspective, accounting for legal and organizational issues. (...) engineers and legal experts should analyze the business goals of a company and its organizational structure and derive from there the points where security and privacy problems may arise and which solutions best fit such (legal) problems. The paper investigates the methodological support for capturing security and privacy requirements of a concrete health care provider. (shrink)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  2.  18
    Security and privacy of adolescents in social applications and networks: legislative aspects and legal practice of countering cyberbullying on example of developed and developing countries.Ahmad Ghandour, Viktor Shestak & Konstantin Sokolovskiy - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):433-445.
    Purpose This paper aims to study the developed countries’ experience on the cyberbullying legal regulation among adolescents, to identify existing shortcomings in the developing countries’ laws and to develop recommendations for regulatory framework improvement. Design/methodology/approach The authors have studied the state regulatory practice of the UK, the USA, Canada, Malaysia, South Africa, Turkey, UAE and analyzed the statistics of 2018 on the cyberbullying manifestation among adolescents in these countries. Findings The study results can encourage countries to create separate cyberbullying legislation (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  36
    Developing a System for Processing Health Data of Children Using Digitalized Toys: Ethical and Privacy Concerns for the Internet of Things Paradigm.María Luisa Martín-Ruíz, Celia Fernández-Aller, Eloy Portillo, Javier Malagón & Cristina del Barrio - 2018 - Science and Engineering Ethics 24 (4):1057-1076.
    EDUCERE is a government funded research and development project. EDUCERE objectives are to investigate, develop, and evaluate innovative solutions for society to detect changes in psychomotor development through the natural interaction of children with toys and everyday objects, and perform stimulation and early attention activities in real environments such as home and school. In the EDUCERE project, an ethical impact assessment is carried out linked to a minors’ data protection rights. Using a specific methodology, the project has achieved some promising (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  54
    Security and Privacy: Why Privacy Matters. [REVIEW]Stephanie J. Bird - 2013 - Science and Engineering Ethics 19 (3):669-671.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  5.  31
    Privacy, Security and Accountability: Ethics, Law and Policy.Adam D. Moore (ed.) - 2015 - New York: Rowman & Littlefield International.
    This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these important individual and social values.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  7.  17
    A bibliometric analysis of privacy and ethics in IEEE Security and Privacy.Jonathan Tse, Dawn E. Schrader, Dipayan Ghosh, Tony Liao & David Lundie - 2015 - Ethics and Information Technology 17 (2):153-163.
    The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  18
    The Art of Balancing National Security and Privacy in a Global Context.Anne Gerdes - 2018 - Philosophy Study 8 (4).
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9. Privacy, Security, and Shared Access-Can Confidentiality Be Protected in a Networked Society?David Voran - 1998 - Bioethics Forum 14:43-48.
     
    Export citation  
     
    Bookmark  
  10.  78
    Security vs. Privacy in an Era of Terror and Technology.R. J. Lieber - 2014 - Télos 2014 (169):144-149.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  10
    Secure and user privacy-preserving searching in peer-to-peer networks.J. Sen - 2013 - Logic Journal of the IGPL 21 (4):603-629.
  12. National security, brain imaging, and privacy.Jonathan D. Moreno & Sonya Prashar - 2012 - In Sarah Richmond, Geraint Rees & Sarah J. L. Edwards (eds.), I know what you're thinking: brain imaging and mental privacy. Oxford: Oxford University Press.
     
    Export citation  
     
    Bookmark  
  13. Privacy vs. security: Why privacy is not an absolute value or right.Kenneth Einar Himma - manuscript
    In this essay, I consider the relationship between the rights to privacy and security and argue that, in a sense to be made somewhat more precise below, that threats to the right to security outweighs comparable threats to privacy. My argument begins with an assessment of ordinary case judgments and an explanation of the important moral distinction between intrinsic value (i.e., value as an end) and instrumental value (i.e., value as a means), arguing that each approach (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  14.  81
    Rethinking Surveillance and Control. Beyond the 'Security vs. Privacy' Debate.Elisa Orrù, Maria Grazia Porcedda & Sebastian Weydner-Volkmann (eds.) - 2017 - Baden-Baden: Nomos.
    This book is based on the premise that the trade-off between privacy and security is both unsound and con-ceals important aspects of surveillance and control. Accordingly, the authors analyse the symbiotic relati-onship between liberty and security, and the emptiness of both concepts when considered in isolation. They explore and contextualise different notions of risk, surveillance practices and the value of the rights to pri-vate life and data protection. Thereby, they show that surveillance and control neither necessarily attain (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  22
    Rethinking surveillance and control : beyond the "security versus privacy" debate.Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.) - 2017 - Baden-Baden: Nomos.
    This book is based on the premise that the trade-off between privacy and security is both unsound and conceals important aspects of surveillance and control. Accordingly, the authors analyse the symbiotic relationship between liberty and security, and the emptiness of both concepts when considered in isolation. They explore and contextualise different notions of risk, surveillance practices and the value of the rights to private life and data protection. Thereby, they show that surveillance and control neither necessarily attain (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16. Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  17.  32
    Trust and privacy in the future internet—a research perspective.Dirk Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and state (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  19.  6
    Balancing security and care: Gender relations of nursing staff in forensic psychiatric care.Esa Kumpula, Per Ekstrand & Lena-Karin Gustafsson - 2022 - Nursing Inquiry 29 (4):e12478.
    This study departs from the built-in tension of the dual goals of forensic psychiatric care in Sweden, which are to protect society as well as to care for patients. The majority of violence that takes place is perpetrated by men. Therefore, the views of nursing staff on violence as a gendered phenomenon have an impact on the care provision. There is a need for further knowledge of how norms of violence are intertwined with the construction of gender. The aim of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  18
    Privacy and Security Issues with Mobile Health Research Applications.Stacey A. Tovino - 2020 - Journal of Law, Medicine and Ethics 48 (S1):154-158.
    This article examines the privacy and security issues associated with mobile application-mediated health research, concentrating in particular on research conducted or participated in by independent scientists, citizen scientists, and patient researchers. Building on other articles in this issue that examine state research laws and state data protection laws as possible sources of privacy and security protections for mobile research participants, this article focuses on the lack of application of federal standards to mobile application-mediated health research. As (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  85
    Online Security and the Protection of Civil Rights: A Legal Overview. [REVIEW]Ugo Pagallo - 2013 - Philosophy and Technology 26 (4):381-395.
    The paper examines the connection between online security and the protection of civil rights from a legal viewpoint, that is, considering the different types of rights and interests that are at stake in national and international law and whether, and to what extent, they concern matters of balancing. Over the past years, the purpose of several laws, and legislative drafts such as ACTA, has been to impose “zero-sum games”. In light of current statutes, such as HADOPI in France, or (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  22. Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
    I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  23. IFIP WG 2.12 and WG 12.4 International Workshop on Web Semantic (SWWS)-Security, Risk and Privacy for the Semantic Web-An OWL Copyright Ontology for Semantic Digital Rights Management. [REVIEW]Roberto Gil Garcia - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 1745-1754.
     
    Export citation  
     
    Bookmark  
  24.  22
    Legal and ethical aspects of deploying artificial intelligence in climate-smart agriculture.Mahatab Uddin, Ataharul Chowdhury & Muhammad Ashad Kabir - 2024 - AI and Society 39 (1):221-234.
    This study aims to identify artificial intelligence (AI) technologies that are applied in climate-smart agricultural practices and address ethical concerns of deploying those technologies from legal perspectives. As climate-smart agricultural AI, the study considers those AI-based technologies that are used for precision agriculture, monitoring peat lands, deforestation tracking, and improved forest management. The study utilized a systematic literature review approach to identify and analyze AI technologies employed in climate-smart agriculture and associated ethical and legal concerns. The study findings indicate several (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like‐minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions ‐ including our (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  37
    Ontological security, existential anxiety and workplace privacy.William S. Brown - 2000 - Journal of Business Ethics 23 (1):61 - 65.
    The relationship of workers to management has traditionally been one of control. However, the introduction of increasingly sophisticated technology as a means of supervision in the modern workplace has dramatically altered the contours of this relationship, giving workers much less privacy and making workers much more visible than previously possible. The purpose of this paper is to examine the current state of technological control of workers and how it has altered the relationship of worker to organization, through the impact (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  9
    Privacy and Security within Biobanking: The Role of Information Technology.Raymond Heatherly - 2016 - Journal of Law, Medicine and Ethics 44 (1):156-160.
    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29.  12
    Security Glitches: The Failure of the Universal Camouflage Pattern and the Fantasy of “Identity Intelligence”.Rebecca A. Adelman - 2018 - Science, Technology, and Human Values 43 (3):431-463.
    Focusing on the paradoxes revealed in the multibillion dollar mistake of the Universal Camouflage Pattern and the expansive ambit of a leaked National Security Agency briefing on its approach to “identity intelligence,” this article analyzes security glitches arising from the state’s application of mechanized logics to security and visibility. Presuming that a digital-looking pattern would be more deceptive than designs inspired by natural forms, in 2004, the US Army adopted a pixelated “digital” camouflage pattern, a print that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  89
    Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, Kth Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued that the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. “Cyber-Security, Privacy and the Covid-19 Attenuation?”.Vincent Samar - 2021 - Notre Dame Journal of Legislation 47:1-38.
    Large-scale data brokers collect massive amounts of highly personal consumer information to be sold to whoever will pay their price, even at the expense of sacrificing individual privacy and autonomy in the process. In this Article, I will show how a proper understanding and justification for a right to privacy, in context to both protecting private acts and safeguarding information and states of affairs for the performance of such acts, provides a necessary background framework for imposing legal restrictions (...)
    No categories
     
    Export citation  
     
    Bookmark  
  32.  25
    Ethical concerns around privacy and data security in AI health monitoring for Parkinson’s disease: insights from patients, family members, and healthcare professionals.Itai Bavli, Anita Ho, Ravneet Mahal & Martin J. McKeown - forthcoming - AI and Society:1-11.
    Artificial intelligence (AI) technologies in medicine are gradually changing biomedical research and patient care. High expectations and promises from novel AI applications aiming to positively impact society raise new ethical considerations for patients and caregivers who use these technologies. Based on a qualitative content analysis of semi-structured interviews and focus groups with healthcare professionals (HCPs), patients, and family members of patients with Parkinson’s Disease (PD), the present study investigates participant views on the comparative benefits and problems of using human versus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  38
    Linguistic Patterns of Modality in UN Resolutions: The Role of Shall, Should, and May in Security Council Resolutions Relating to the Second Gulf War.Giuseppina Scotto di Carlo - 2017 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 30 (2):223-244.
    This paper will discuss the role of modality in UN Security Council resolutions. As a work in progress on whether the use of strategic vagueness in UN resolutions has contributed to the outbreak of the second Gulf war, this work proposes a qualitative and quantitative analysis on the role of vagueness of the central modal verbs shall, should, and may in the institutional language of the UN, drawing upon Wodak’s Discourse-Historical Approach and Jenkins, Gotti, and Trosborg's theories on modality. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  20
    Anticipatory Governance in Biobanking: Security and Risk Management in Digital Health.Dagmar Rychnovská - 2021 - Science and Engineering Ethics 27 (3):1-18.
    Although big-data research has met with multiple controversies in diverse fields, political and security implications of big data in life sciences have received less attention. This paper explores how threats and risks are anticipated and acted on in biobanking, which builds research repositories for biomedical samples and data. Focusing on the biggest harmonisation cluster of biomedical research in Europe, BBMRI-ERIC, the paper analyses different logics of risk in the anticipatory discourse on biobanking. Based on document analysis, interviews with ELSI (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  13
    Reimbursement Decision-Making and Prescription Patterns of Glitazones in Treatment of Type 2 Diabetes Mellitus Patients in Denmark.P. B. Iversen & H. Vondeling - 2006 - Health Care Analysis 14 (2):79-89.
    There are marked differences between countries with regard to reimbursement decision-making, yet few studies have tried to understand this process and its consequences by a detailed analysis of the local context and decision-making structure. This article describes reimbursement decision-making and subsequent prescribing patterns of new pharmaceuticals by means of a case study on glitazones in treatment of type 2 diabetes mellitus patients in Denmark. The study shows that institutional arrangements, providing the context in which evidence is used, are highly (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36.  8
    4. Privacy and Security Policy: The Historical Situation.Gregory J. Walters - 2001 - In Human Rights in an Information Age a Philosophical Analysis. University of Toronto Press. pp. 117-149.
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  11
    5. Privacy and Security: An Ethical Analysis.Gregory J. Walters - 2001 - In Human Rights in an Information Age a Philosophical Analysis. University of Toronto Press. pp. 150-186.
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  33
    Privacy and security for electronic health records.Virginia A. Sharpe - 2005 - Hastings Center Report 35 (6):3-3.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  39.  9
    Perspective: Privacy and Security for Electronic Health Records.Virginia A. Sharpe - 2005 - Hastings Center Report 35 (6):c3-c3.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40. Mining Privacy and Pattern Matching.Neha Jain & Rajesh Shrivastava - 2012 - In Zdravko Radman (ed.), The Hand. MIT Press. pp. 1--5.
     
    Export citation  
     
    Bookmark  
  41.  55
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  9
    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.Adel R. Alharbi, Jawad Ahmad, Undefined Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis & William J. Buchanan - 2022 - Complexity 2022:1-15.
    With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. Such a solution relies on chaos encryption algorithms over standard cryptographic methods that possess multistage encryption levels, including high speed, high security, low compute overheads, and procedural power, among other characteristics. In this work, a secure image encryption scheme (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43. Computers, Surveillance and Privacy: Book Review. [REVIEW]Douglas Kellner - unknown
    Computers and new information technologies have greatly increased the power of surveillance by government and large corporate entities. The state is a repository of a growing array of data bases that provide it with information on its citizens. Corporations also now possess increasing power to accumulate information on potential consumers. This power to collect information is significant and can be instrumental in securing loans, insurance, and credit; increases the power of law enforcement agencies; makes possible surveillance of workers and the (...)
     
    Export citation  
     
    Bookmark  
  44.  54
    From the bench to the bedside in the big data age: ethics and practices of consent and privacy for clinical genomics and personalized medicine.Peter A. Chow-White, Maggie MacAulay, Anita Charters & Paulina Chow - 2015 - Ethics and Information Technology 17 (3):189-200.
    Scientists and clinicians are starting to translate genomic discoveries from research labs to the clinical setting. In the process, big data genomic technologies are both a risk to individual privacy and a benefit to personalized medicine. There is an opportunity to address the social and ethical demands of various stakeholders and shape the adoption of diagnostic genome technologies. We discuss ethical and practical issues associated with the networking of genomics by comparing how the European Union and North America understand (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45. The nature and value of the.Moral Right To Privacy - 2002 - Public Affairs Quarterly 16 (4):329.
     
    Export citation  
     
    Bookmark  
  46.  24
    Wanting it all – public perceptions of the effectiveness, cost, and privacy of surveillance technology.Michelle Cayford, Wolter Pieters & P. H. A. J. M. van Gelder - 2019 - Journal of Information, Communication and Ethics in Society 18 (1):10-27.
    Purpose This study aims to explore how the public perceives the effectiveness of surveillance technology, and how people’s views on privacy and their views on effectiveness are related. Likewise, it looks at the relation between perceptions of effectiveness and opinions on the acceptable cost of surveillance technology. Design/methodology/approach For this study, surveys of Dutch students and their parents were conducted over three consecutive years. Findings A key finding of this paper is that the public does not engage in a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  84
    Surveillance, Snowden, and Big Data: Capacities, consequences, critique.David Lyon - 2014 - Big Data and Society 1 (2).
    The Snowden revelations about National Security Agency surveillance, starting in 2013, along with the ambiguous complicity of internet companies and the international controversies that followed provide a perfect segue into contemporary conundrums of surveillance and Big Data. Attention has shifted from late C20th information technologies and networks to a C21st focus on data, currently crystallized in “Big Data.” Big Data intensifies certain surveillance trends associated with information technology and networks, and is thus implicated in fresh but fluid configurations. This (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   42 citations  
  48.  95
    Nsa Management Directive #424: Secrecy and Privacy in the Aftermath of Edward Snowden.George R. Lucas - 2014 - Ethics and International Affairs 28 (1):29-38.
    Whatever else one might say concerning the legality, morality, and prudence of his actions, Edward Snowden, the former U.S. National Security Agency contractor, is right about the notion of publicity and informed consent, which together constitute the hallmark of democratic public policy. In order to be morally justifiable, any strategy or policy involving the body politic must be one to which it would voluntarily assent when fully informed about it. This, in essence, was Snowden's argument for leaking, in June (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  49.  17
    Which Privacy Policy Works, Privacy Assurance or Personalization Declaration? An Investigation of Privacy Policies and Privacy Concerns.Fue Zeng, Qing Ye, Zhilin Yang, Jing Li & Yiping Amy Song - 2020 - Journal of Business Ethics 176 (4):781-798.
    This study focuses on two specific privacy policies, namely privacy assurance and personalization declaration. Specifically, we investigate how these distinct privacy policies affect customers’ privacy concerns and subsequent purchase responses. We have developed a conceptual model that addresses the independent effects of privacy assurance and personalization declaration, as well as the mechanism of these effects. Our model is grounded in motivation theory and supported by a field experiment and a controlled experiment. Our study demonstrates that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  21
    The dark side of customer analytics: the ethics of retailing.Chai Lee Goi - 2021 - Asian Journal of Business Ethics 10 (2):411-423.
    The main objective of this article is to analyse the dark side of customer analytics and the ethics issues in the retailing industry. Ethics-related issues in retailing began to be discussed and studied primarily in the 1960s. The rising interest in ethical issues in retailing is in line with social concerns and consumer awareness, especially in the 1970s and 1980s. The use of big data in customer analytics is one of the most strategic weapons in the competitive retail environment, especially (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000