Results for 'information theory, legal theory, computational turn, privacy, data protection'

1000+ found
Order:
  1.  11
    Information, Freedom and Property: The Philosophy of Law Meets the Philosophy of Technology.Mireille Hildebrandt & Bibi van den Berg (eds.) - 2016 - Routledge.
    This book addresses issues on the nexus of freedom of and property in information, while acknowledging that both hiding and exposing information may affect our privacy. It inquires into the physics, the technologies, the business models, the governmental strategies and last but not least the legal frameworks concerning access, organisation and control of information. It debates whether it is in the very nature of information to be either free or monopolized, or both. Analysing upcoming power (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  8
    Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.Colin J. Bennett - 1991 - Science, Technology and Human Values 16 (1):51-69.
    Public policies designed to regulate the use of information technology to protect personal data have been based on different theoretical assumptions in different states, depending on whether the problem is defined in technological, civil libertarian, or bureaucratic terms. However, the rapid development, dispersal, and decentralization of information technology have facilitated a range of new surveillance practices that have in turn rendered the approaches of the 1960s and 1970s obsolete. The networking of the postindustrial state will require a (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  9
    Privacy, due process and the computational turn.Mireille Hildebrandt & Katja de Vries (eds.) - 2013 - Abingdon, Oxon, [England] ; New York: Routledge.
    Privacy, Due process and the Computational Turn: The Philosophy of Law Meets the Philosophy of Technology engages with the rapidly developing computational aspects of our world including data mining, behavioural advertising, iGovernment, profiling for intelligence, customer relationship management, smart search engines, personalized news feeds, and so on in order to consider their implications for the assumptions on which our legal framework has been built. The contributions to this volume focus on the issue of privacy, which is (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  4.  48
    Is Your Neural Data Part of Your Mind? Exploring the Conceptual Basis of Mental Privacy.Abel Wajnerman Paz - 2022 - Minds and Machines 32 (2):395-415.
    It has been argued that neural data are an especially sensitive kind of personal information that could be used to undermine the control we should have over access to our mental states, and therefore need a stronger legal protection than other kinds of personal data. The Morningside Group, a global consortium of interdisciplinary experts advocating for the ethical use of neurotechnology, suggests achieving this by treating legally ND as a body organ. Although the proposal is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  5.  12
    Moral autonomy of patients and legal barriers to a possible duty of health related data sharing.Anton Vedder & Daniela Spajić - 2023 - Ethics and Information Technology 25 (1):1-11.
    Informed consent bears significant relevance as a legal basis for the processing of personal data and health data in the current privacy, data protection and confidentiality legislations. The consent requirements find their basis in an ideal of personal autonomy. Yet, with the recent advent of the global pandemic and the increased use of eHealth applications in its wake, a more differentiated perspective with regards to this normative approach might soon gain momentum. This paper discusses the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  8
    Virtuality and Capabilities in a World of Ambient Intelligence: New Challenges to Privacy and Data Protection.Luiz Costa - 2016 - Cham: Imprint: Springer.
    This book is about power and freedoms in our technological world and has two main objectives. The first is to demonstrate that a theoretical exploration of the algorithmic governmentality hypothesis combined with the capability approach is useful for a better understanding of power and freedoms in Ambient Intelligence, a world where information and communication technologies are invisible, interconnected, context aware, personalized, adaptive to humans and act autonomously. The second is to argue that these theories are useful for a better (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  76
    Built-in privacy—no panacea, but a necessary condition for effective privacy protection.Alexander Dix - 2010 - Identity in the Information Society 3 (2):257-265.
    Built-in privacy has for too long been neglected by regulators. They have concentrated on reacting to violations of rules. Even imposing severe fines will however not address the basic issue that preventative privacy protection is much more meaningful. The paper discusses this in the context of the International Working Group on Data Protection in Telecommunications (“Berlin Group”) which has published numerous recommendations on privacy-compliant design of technical innovations. Social network services, road pricing schemes, and the distribution of (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  14
    Data makes the story come to life:” understanding the ethical and legal implications of Big Data research involving ethnic minority healthcare workers in the United Kingdom—a qualitative study.Robert Free, David Ford, Kamlesh Khunti, Sue Carr, Louise Wain, Martin D. Tobin, Keith R. Abrams, Amit Gupta, Ibrahim Abubakar, Katherine Woolf, I. Chris McManus, Catherine Johns, Anna L. Guyatt, Laura B. Nellums, Laura Gray, Manish Pareek, Ruby Reed-Berendt & Edward S. Dove - 2022 - BMC Medical Ethics 23 (1):1-14.
    The aim of UK-REACH (“The United Kingdom Research study into Ethnicity And COVID-19 outcomes in Healthcare workers”) is to understand if, how, and why healthcare workers (HCWs) in the United Kingdom (UK) from ethnic minority groups are at increased risk of poor outcomes from COVID-19. In this article, we present findings from the ethical and legal stream of the study, which undertook qualitative research seeking to understand and address legal, ethical, and social acceptability issues around data (...), privacy, and information governance associated with the linkage of HCWs’ registration data and healthcare data. We interviewed 22 key opinion leaders in healthcare and health research from across the UK in two-to-one semi-structured interviews. Transcripts were coded using qualitative thematic analysis. Participants told us that a significant aspect of Big Data research in public health is varying drivers of mistrust—of the research itself, research staff and funders, and broader concerns of mistrust within participant communities, particularly in the context of COVID-19 and those situated in more marginalised community settings. However, despite the challenges, participants also identified ways in which legally compliant and ethically informed approaches to research can be crafted to mitigate or overcome mistrust and establish greater confidence in Big Data public health research. Overall, our research indicates that a “Big Data Ethics by Design” approach to research in this area can help assure (1) that meaningful community and participant engagement is taking place and that extant challenges are addressed, and (2) that any new challenges or hitherto unknown unknowns can be rapidly and properly considered to ensure potential (but material) harms are identified and minimised where necessary. Our findings indicate such an approach, in turn, will help drive better scientific breakthroughs that translate into medical innovations and effective public health interventions, which benefit the publics studied, including those who are often marginalised in research. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  17
    Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study.Effy Vayena, Marcello Ienca & James Scheibner - 2022 - BMC Medical Ethics 23 (1):1-13.
    BackgroundIncreasingly, hospitals and research institutes are developing technical solutions for sharing patient data in a privacy preserving manner. Two of these technical solutions are homomorphic encryption and distributed ledger technology. Homomorphic encryption allows computations to be performed on data without this data ever being decrypted. Therefore, homomorphic encryption represents a potential solution for conducting feasibility studies on cohorts of sensitive patient data stored in distributed locations. Distributed ledger technology provides a permanent record on all transfers and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  8
    New Technology, Big Data and the Law.Marcelo Corrales Compagnucci, Mark Fenwick & Nikolaus Forgó (eds.) - 2017 - Singapore: Imprint: Springer.
    This edited collection brings together a series of interdisciplinary contributions in the field of Information Technology Law. The topics addressed in this book cover a wide range of theoretical and practical legal issues that have been created by cutting-edge Internet technologies, primarily Big Data, the Internet of Things, and Cloud computing. Consideration is also given to more recent technological breakthroughs that are now used to assist, and - at times - substitute for, human work, such as automation, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. Why privacy is not enough privacy in the context of “ubiquitous computing” and “big data”.Tobias Matzner - 2014 - Journal of Information, Communication and Ethics in Society 12 (2):93-106.
    Purpose – Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been suggested, the paper aims to argue that people acting in full conformity to those privacy norms still can infringe the privacy of others in the context of ubiquitous computing and “big data”. Design/methodology/approach – New threats to privacy are described. Helen Nissenbaum's concept of “privacy as contextual integrity” is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  12.  13
    Protection of information and the right to privacy - a new equilibrium?Luciano Floridi (ed.) - 2014 - Cham: Springer.
    This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security, and the right to informational privacy. Given the complexity of the topics addressed, the book shows how old legal and ethical frameworks may need to be not only updated, but also supplemented and complemented by new conceptual solutions. Neither a conservative attitude (“more of the same”) nor a revolutionary zeal (“never seen before”) is likely (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  56
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  15.  13
    Lost in Transduction: From Law and Code’s Intra-actions to the Right to Explanation in the European Data Protection Regulations.Miriam Tedeschi & Mika Viljanen - forthcoming - Law and Critique:1-18.
    Recent algorithmic technologies have challenged law’s anthropocentric assumptions. In this article, we develop a set of theoretical tools drawn from new materialisms and the philosophy of information to unravel the complex intra-actions between law and computer code. Accordingly, we first propose a framework for understanding the enmeshing of law and code based on a diffractive reading of Barad’s agential realism and Simondon’s theory of information. We argue that once law and code are understood as material entities that intra-act (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  17.  4
    The European Union as Guardian of Internet Privacy: The Story of Art 16 TFEU.Hielke Hijmans - 2016 - Cham: Imprint: Springer.
    This book examines the role of the EU in ensuring privacy and data protection on the internet. It describes and demonstrates the importance of privacy and data protection for our democracies and how the enjoyment of these rights is challenged by, particularly, big data and mass surveillance. The book takes the perspective of the EU mandate under Article 16 TFEU. It analyses the contributions of the specific actors and roles within the EU framework: the judiciary, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  3
    Data protection for networked and robotic toys - a legal perspective.Rocco Panetta & Federico Sartore - 2018 - International Review of Information Ethics 27.
    This paper is aimed to understand the state of the art and the resulting consequences of the legal framework in Europe, with regard to the protection of children's data. Especially when they interact with networked and robotic toys, like in 'My friend Cayla' case. In order to evaluate the practical implications of the use of IoT devices by children or teenager users, the first part of the paper presents an analysis of the international guiding principles of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  24
    Privacy Rights: Moral and Legal Foundations.Adam D. Moore - 2010 - Pennsylvania State University Press.
    We all know that Google stores huge amounts of information about everyone who uses its search tools, that Amazon can recommend new books to us based on our past purchases, and that the U.S. government engaged in many data-mining activities during the Bush administration to acquire information about us, including involving telecommunications companies in monitoring our phone calls. Control over access to our bodies and to special places, like our homes, has traditionally been the focus of concerns (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  20.  74
    Privacy rights and protection: Foreign values in modern thai context. [REVIEW]Krisana Kitiyadisai - 2005 - Ethics and Information Technology 7 (1):17-26.
    The concept of privacy as a basic human right which has to be protected by law is a recently adopted concept in Thailand, as the protection of human rights was only legally recognized by the National Human Rights Act in 1999. Moreover, along with other drafted legislation on computer crime, the law on privacy protection has not yet been enacted. The political reform and the influences of globalization have speeded up the process of westernization of the urban, educated (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  21. Delegating and distributing morality: Can we inscribe privacy protection in a machine? [REVIEW]Alison Adam - 2005 - Ethics and Information Technology 7 (4):233-242.
    This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with tragic consequences. In some sense this can be regarded as a failure in the process (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  22.  29
    COVID-19, Personal Data Protection and Privacy in India.Mohamad Ayub Dar & Shahnawaz Ahmad Wani - 2022 - Asian Bioethics Review 15 (2):125-140.
    The corona pandemic altered many traditional and historical norms of society and law. COVID-19 created a humanitarian crisis in some parts of globe, while pandemic privacy and civil liberties were under threat all over world. To combat the deadly virus, individual liberty and equality were compromised. This paper focuses on how India’s health problem has compromised people’s right to privacy. It will highlight how strict executive policies led to the creation of a massive surveillance system in the name of combating (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  5
    Health Information Privacy: A Disappearing Concept.Marcia J. Weiss - 2000 - Bulletin of Science, Technology and Society 20 (2):115-122.
    Rapid advances and exponential growth in computer and telecommunications technology have taken individual records and papers revealing the most intimate details of one’s life, habits, and genetic predisposition from the private sector into the public arena in derogation of privacy considerations. Although computerized medical information offers a means of streamlining and improving the health care delivery system through speed and enormous storage capacity, it also presents new challenges as it affects the right of privacy and expectation of confidentiality, creating (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  13
    Laboratory Specimens and Genetic Privacy: Evolution of Legal Theory.Michelle Huckaby Lewis - 2013 - Journal of Law, Medicine and Ethics 41 (s1):65-68.
    Human biological tissue samples are an invaluable resource for biomedical research designed to find causes of diseases and their treatments. Controversy has arisen, however, when research has been conducted with laboratory specimens either without the consent of the source of the specimen or when the research conducted with the specimen has expanded beyond the scope of the original consent agreement. Moreover, disputes have arisen regarding which party, the researcher or the source of the specimen, has control over who may use (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  32
    Privacy as Protection of the Incomputable Self: From Agnostic to Agonistic Machine Learning.Mireille Hildebrandt - 2019 - Theoretical Inquiries in Law 20 (1):83-121.
    This Article takes the perspective of law and philosophy, integrating insights from computer science. First, I will argue that in the era of big data analytics we need an understanding of privacy that is capable of protecting what is uncountable, incalculable or incomputable about individual persons. To instigate this new dimension of the right to privacy, I expand previous work on the relational nature of privacy, and the productive indeterminacy of human identity it implies, into an ecological understanding of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  26. Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
    Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion of data protection and are central in the discussion. The telecommunications environment is profoundly changing. The traditionally closed markets with closed networks change into an open market with open networks. Within these open networks more privacy sensitive data are (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27. The crisis of consent: how stronger legal protection may lead to weaker consent in data protection.Bart W. Schermer, Bart Custers & Simone van der Hof - 2014 - Ethics and Information Technology 16 (2):171-182.
    In this article we examine the effectiveness of consent in data protection legislation. We argue that the current legal framework for consent, which has its basis in the idea of autonomous authorisation, does not work in practice. In practice the legal requirements for consent lead to ‘consent desensitisation’, undermining privacy protection and trust in data processing. In particular we argue that stricter legal requirements for giving and obtaining consent as proposed in the European (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  28.  18
    Privacy Behaviour: A Model for Online Informed Consent.Gary Burkhardt, Frederic Boy, Daniele Doneddu & Nick Hajli - 2022 - Journal of Business Ethics 186 (1):237-255.
    An online world exists in which businesses have become burdened with managerial and legal duties regarding the seeking of informed consent and the protection of privacy and personal data, while growing public cynicism regarding personal data collection threatens the healthy development of marketing and e-commerce. This research seeks to address such cynicism by assisting organisations to devise ethical consent management processes that consider an individual’s attitudes, their subjective norms and their perceived sense of control during the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  29.  19
    Privacy, confidentiality and automated health information systems.H. Vuori - 1977 - Journal of Medical Ethics 3 (4):174-178.
    Professor Vuori's paper, first presented at the fourth Medico-legal Conference in Prague in the spring of this year, deals with the problem of the maintenance of confidentiality in computerized health records. Although more and more information is required, the hardware of the computer systems is so sophisticated that it would be very expensive indeed to 'break in' and steal from a modern data bank. Those concerned with programming computers are becoming more aware of their responsibilities concerning confidentiality (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  30.  7
    Reforming European Data Protection Law.Paul de Hert, Serge Gutwirth & Ronald Leenes (eds.) - 2015 - Dordrecht: Imprint: Springer.
    This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  20
    Contextual Exceptionalism After Death: An Information Ethics Approach to Post-Mortem Privacy in Health Data Research.Marieke A. R. Bak & Dick L. Willems - 2022 - Science and Engineering Ethics 28 (4):1-20.
    In this article, we use the theory of Information Ethics to argue that deceased people have a prima facie moral right to privacy in the context of health data research, and that this should be reflected in regulation and guidelines. After death, people are no longer biological subjects but continue to exist as informational entities which can still be harmed/damaged. We find that while the instrumental value of recognising post-mortem privacy lies in the preservation of the social contract (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  14
    Privacy and the Media.Kevin Macnish & Haleh Asgarinia - 2024 - In Carl Fox & Joe Saunders (eds.), Routledge Handbook of Philosophy and Media Ethics. Routledge.
    In this chapter, Macnish and Asgarinia introduce current thinking and debate around issues of privacy as these relate to the media. Starting with controversies over the definition of privacy, they consider what the content of privacy should be and why it is we consider privacy to be valuable. This latter includes the social implications of privacy and the only recently-recognised concept of group privacy, contrasting it with individual privacy, as well as legal implications arising through laws such as the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. Why a right to explanation of automated decision-making does not exist in the General Data Protection Regulation.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - International Data Privacy Law 1 (2):76-99.
    Since approval of the EU General Data Protection Regulation (GDPR) in 2016, it has been widely and repeatedly claimed that the GDPR will legally mandate a ‘right to explanation’ of all decisions made by automated or artificially intelligent algorithmic systems. This right to explanation is viewed as an ideal mechanism to enhance the accountability and transparency of automated decision-making. However, there are several reasons to doubt both the legal existence and the feasibility of such a right. In (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   63 citations  
  34.  29
    Property, privacy and personhood in a world of ambient intelligence.Niels Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  97
    Property, privacy and personhood in a world of ambient intelligence.Niels van Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  75
    The General Data Protection Regulation in the Age of Surveillance Capitalism.Jane Andrew & Max Baker - 2019 - Journal of Business Ethics 168 (3):565-578.
    Clicks, comments, transactions, and physical movements are being increasingly recorded and analyzed by Big Data processors who use this information to trace the sentiment and activities of markets and voters. While the benefits of Big Data have received considerable attention, it is the potential social costs of practices associated with Big Data that are of interest to us in this paper. Prior research has investigated the impact of Big Data on individual privacy rights, however, there (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  37.  14
    Do managerial ethics and legal education influence online privacy policies in Greater China?David C. Li - 2018 - Asian Journal of Business Ethics 7 (2):117-136.
    This study evaluated the online privacy policies of business-to-consumer e-commerce firms in five industries of mainland China, Taiwan, and Hong Kong. Based on the neo-institutional theory, we also tested whether the four institutional factors, top management’s legal education, managerial ethics, rule of law in information privacy protection and peer practices, had any effects on e-information and e-communication content. Results from a content analysis of 229 websites found that the privacy policy contents that complied with generally accepted (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  89
    Comparative legal study on privacy and personal data protection for robots equipped with artificial intelligence: looking at functional and technological aspects.Kaori Ishii - 2019 - AI and Society 34 (3):509-533.
    This paper undertakes a comparative legal study to analyze the challenges of privacy and personal data protection posed by Artificial Intelligence embedded in Robots, and to offer policy suggestions. After identifying the benefits from various AI usages and the risks posed by AI-related technologies, I then analyze legal frameworks and relevant discussions in the EU, USA, Canada, and Japan, and further consider the efforts of Privacy by Design originating in Ontario, Canada. While various AI usages provide (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  16
    Show Us the Data: The Critical Role Health Information Plays in Health System Transformation.Jane Hyatt Thorpe, Elizabeth A. Gray & Lara Cartwright-Smith - 2016 - Journal of Law, Medicine and Ethics 44 (4):592-597.
    Truly transforming the healthcare delivery and payment system turns on the ability to engage in the interoperable electronic exchange of patient health information across and beyond the care continuum. Achieving transformation requires a legal framework that supports information sharing with appropriate privacy and security protections and a trusted governance structure.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  59
    The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data[REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.
    The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  41.  45
    Reinventing data protection?Btihaj Ajana - 2009 - Identity in the Information Society 2 (3):355-358.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  42.  12
    Reflections on Turkish Personal Data Protection Law and Genetic Data in Focus Group Discussions.Özlem Özkan, Melike Şahinol, Arsev Umur Aydinoglu & Yesim Aydin Son - 2022 - NanoEthics 16 (3):297-312.
    Since the 1970s and more rigorously since the 1990s, many countries have regulated data protection and privacy laws in order to ensure the safety and privacy of personal data. First, a comparison is made of different acts regarding genetic information that are in force in the EU, the USA, and China. In Turkey, changes were adopted only recently following intense debates. This study aims to explore the experts’ opinions on the regulations of the health information (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  32
    Information Communication Technology.Christopher Quintana - 2023 - In Mortimer Sellers & Stephan Kirste (eds.), Encyclopedia of the Philosophy of Law and Social Philosophy. Springer Dordrecht.
    This encyclopedia entry provides an introductory examination information communication technology (ICT) as a subject of moral, social, and legal analysis. The entry begins with a survey of philosophical perspectives on human-computer interaction such as the moral agency of artifacts, mediation theory, trans or posthumanism, and extension theory. The entry then turns to survey normative and epistemic issues in ICT including the nature of socially disruptive technology, the outsourcing of human capabilities, privacy, echo chambers, epistemic bubbles, and the effect (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. Privacy by Design.Peter Schaar - 2010 - Identity in the Information Society 3 (2):267-274.
    In view of rapid and dramatic technological change, it is important to take the special requirements of privacy protection into account early on, because new technological systems often contain hidden dangers which are very difficult to overcome after the basic design has been worked out. So it makes all the more sense to identify and examine possible data protection problems when designing new technology and to incorporate privacy protection into the overall design, instead of having to (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  45.  35
    Predictive privacy: towards an applied ethics of data analytics.Rainer Mühlhoff - 2021 - Ethics and Information Technology 23 (4):675-690.
    Data analytics and data-driven approaches in Machine Learning are now among the most hailed computing technologies in many industrial domains. One major application is predictive analytics, which is used to predict sensitive attributes, future behavior, or cost, risk and utility functions associated with target groups or individuals based on large sets of behavioral and usage data. This paper stresses the severe ethical and data protection implications of predictive analytics if it is used to predict sensitive (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  46.  75
    Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing of justice and the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  47.  17
    Legislative and Ethical Peculiarities of Human Genetic Data Protection.Danielius Serapinas - 2013 - Jurisprudencija: Mokslo darbu žurnalas 20 (1):165-179.
    Genetics is a biomedical science that investigates heredity, variability, occurrence of genetic diseases and their prevention. Genetic science has many fields of science, which deal with different genetic processes, methods, aspects and fields of application. The genetic research in Europe related to the individual as the main subject of the research is exposed to a wide range of ethical and legal issues. From the developments in genetic science other sciences have evolved, thanks to which the modern world is able (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  28
    What is the ‘personal’ in ‘personal information’?Sille Obelitz Søe, Rikke Frank Jørgensen & Jens-Erik Mai - 2021 - Ethics and Information Technology 23 (4):625-633.
    Contemporary privacy theories and European discussions about data protection employ the notion of ‘personal information’ to designate their areas of concern. The notion of personal information is demarcated from non-personal information—or just information—indicating that we are dealing with a specific kind of information. However, within privacy scholarship the notion of personal information appears undertheorized, rendering the concept somewhat unclear. We argue that in an age of datafication, protection of personal information (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
    An introductory message from Peter Hustinx, European Data Protection Supervisor, delivered at Privacy by Design: The Definitive Workshop. This presentation looks back at the origins of Privacy by Design, notably the publication of the first report on “Privacy Enhancing Technologies” by a joint team of the Information and Privacy Commissioner of Ontario, Canada and the Dutch Data Protection Authority in 1995. It looks ahead and adresses the question of how the promises of these concepts could (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  50.  23
    Assessing data protection and governance in health information systems: a novel methodology of Privacy and Ethics Impact and Performance Assessment.Concetta Tania Di Iorio, Fabrizio Carinci, Jillian Oderkirk, David Smith, Manuela Siano, Dorotea Alessandra de Marco, Simon de Lusignan, Paivi Hamalainen & Massimo Massi Benedetti - 2021 - Journal of Medical Ethics 47 (12):e23-e23.
    BackgroundData processing of health research databases often requires a Data Protection Impact Assessment to evaluate the severity of the risk and the appropriateness of measures taken to comply with the European Union General Data Protection Regulation. We aimed to define and apply a comprehensive method for the evaluation of privacy, data governance and ethics among research networks involved in the EU Project Bridge Health.MethodsComputerised survey among associated partners of main EU Consortia, using a targeted instrument (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000