Results for 'privacy'

964 found
Order:
  1. The nature and value of the.Moral Right To Privacy - 2002 - Public Affairs Quarterly 16 (4):329.
     
    Export citation  
     
    Bookmark  
  2. Chapter outline.A. Myth Versus Reality, D. Publicity not Privacy, E. Guilty Until Proven Innocent, J. Change & Rotation Mentality - forthcoming - Moral Management: Business Ethics.
    No categories
     
    Export citation  
     
    Bookmark  
  3.  61
    Liberal and communitarian defenses of workplace privacy.Rita C. Manning - 1997 - Journal of Business Ethics 16 (8):817-823.
    In this paper, I survey liberal and communitarian defenses of privacy, paying particular attention to defenses of privacy in the workplace. I argue that liberalism cannot explain all our of intuitions about the wrongness of workplace invasions of privacy. Communitarianism, on the other hand, is able to account for these intuitions.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  4. What Is Protected By The Right To Privacy?Geoffrey Marshall - 1995 - Jahrbuch für Recht Und Ethik 3.
    Arguments about constitutional and personal rights often invoke the concept of privacy. In the United States it has been said that the constitution "embodies a promise that a certain private sphere of individual liberty will be kept largely beyond the reach of government". A number of formulae has been invoked in an attempt to define the sphere of constitutional privacy. They include: Fundamental rights of interests; personal decisions and issues; important questions intimately affecting private lives; and decisions affecting (...)
    No categories
     
    Export citation  
     
    Bookmark  
  5.  32
    Surgical patients' and nurses' opinions and expectations about privacy in care.Elif Akyüz & Firdevs Erdemir - 2013 - Nursing Ethics 20 (6):660-671.
    The purpose of this study was to determine the opinions and expectations of patients and nurses about privacy during a hospital admission for surgery. The study explored what enables and maintains privacy from the perspective of Turkish surgical patients and nurses. The study included 102 adult patients having surgery and 47 nurses caring for them. Data were collected via semistructured questionnaire by face-to-face interviews. The results showed that patients were mostly satisfied by the respect shown to their (...) by the nurses but were less confident of the confidentiality of their personal data. It was found that patients have expectations regarding nursing approaches and attitudes about acknowledging and respecting patient autonomy and confidentiality. It is remarkable that while nurses focused on the physical dimension of privacy, patients focused on informational and psychosocial dimensions of privacy, as well as its physical dimension. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  6. Why the NSA didn’t diminish your privacy but might have violated your right to privacy.Lauritz Munch - forthcoming - Analysis.
    According to a popular view, privacy is a function of people not knowing or rationally believing some fact about you. But intuitively it seems possible for a perpetrator to violate your right to privacy without learning any facts about you. For example, it seems plausible to say that the US National Security Agency’s PRISM program violated, or could have violated, the privacy rights of the people whose information was collected, despite the fact that the NSA, for the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. The Japanese sense of information privacy.Andrew A. Adams, Kiyoshi Murata & Yohko Orito - 2009 - AI and Society 24 (4):327-341.
    We analyse the contention that privacy is an alien concept within Japanese society, put forward in various presentations of Japanese cultural norms at least as far back as Benedict in The chrysanthemum and the sword: patterns of Japanese culture. Houghton Mifflin, Boston, 1946. In this paper we distinguish between information privacy and physical privacy. As we show, there is good evidence for social norms of limits on the sharing and use of personal information (i.e. information privacy) (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  8.  37
    Will AI end privacy? How do we avoid an Orwellian future.Toby Walsh - 2023 - AI and Society 38 (3):1239-1240.
  9.  33
    An ethical duty to protect one's own information privacy?Anita L. Allen - 2013 - Alabama Law Review 64 (4):845-866.
    People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  10.  58
    Grappling with “Data Power”: Normative Nudges from Data Protection and Privacy.Orla Lynskey - 2019 - Theoretical Inquiries in Law 20 (1):189-220.
    The power exercised by technology companies is attracting the attention of policymakers, regulatory bodies and the general public. This power can be categorized in several ways, ranging from the “soft power” of technology companies to influence public policy agendas to the “market power” they may wield to exclude equally efficient competitors from the marketplace. This Article is concerned with the “data power” exercised by technology companies occupying strategic positions in the digital ecosystem. This data power is a multifaceted power that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  67
    `Watching' medicine: Do bioethicists respect patients' privacy?Donald C. Ainslie - 2000 - Theoretical Medicine and Bioethics 21 (6):537-552.
    Agich has identified `watching' – the formal orinformal observation of the medical setting – as oneof the four main roles of the clinical bioethicist. By an analysis of a case study involving a bioethicsstudent who engaged in watching at an HIV/AIDS clinicas part of his training, I raise questions about theethical justification of watching. I argue that theinvasion of privacy that watching entails makes theactivity unacceptable unless the watcher has receivedprior consent from the patients who are beingobserved. I conclude (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  24
    Life after privacy: Reclaiming democracy in a surveillance society.Lowry Pressly - 2024 - Contemporary Political Theory 23 (3):492-495.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13. New Ways of Thinking about Privacy.B. Roessler - 2006 - In Anne Philips Bonnie Honig & John Dryzek (eds.), Oxford Handbook of Political Theory. Oxford University Press. pp. 694-713.
    This article examines the new conceptualizing and thinking about privacy. It discusses older theories of privacy and explains why they became obsolete. It suggests that the reconceptualization of privacy was influenced by the developments in information technologies, radical changes in the relation between the sexes, and the intrusion of intimacy into the public realm. It describes the normative problems associated with privacy and differentiates the three dimensions of privacy: decisional privacy, informational privacy, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  14.  38
    Disclosure 'downunder': misadventures in Australian genetic privacy law.B. Arnold & W. Bonython - 2014 - Journal of Medical Ethics 40 (3):168-172.
    Along with many jurisdictions, Australia is struggling with the unique issues raised by genetic information in the context of privacy laws and medical ethics. Although the consequences of disclosure of most private information are generally confined to individuals, disclosure of genetic information has far-reaching consequences, with a credible argument that genetic relatives have a right to know about potential medical conditions. In 2006, the Privacy Act was amended to permit disclosure of an individual's genetic information, without their consent, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  15.  13
    Locating Biobanks in the Canadian Privacy Maze.Katie M. Saulnier & Yann Joly - 2016 - Journal of Law, Medicine and Ethics 44 (1):7-19.
    Although Canada has not yet enacted any biobanking-specific privacy law, guidance and oversight are provided via various federal and provincial health and privacy-related laws as well as via ethics and policy documents. The primary policy document governing health research, the Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans, provides the framework for the strong role of Research Ethics Boards in Canada, and limits research funding from Canada's three main federal funding agencies to those who agree to adhere (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  18
    Is a Moral Right to Privacy Limited by Agents’ Lack of Epistemic Control?Björn Lundgren - 2024 - Logos and Episteme 15 (1):83-87.
    In their Unfit for the Future, Ingmar Persson and Julian Savulescu argued that there is no moral right to privacy, which resulted in a string of papers. This paper addresses an argument in their most recent contribution, according to which there is no moral right to privacy because individuals cannot control their access to information. Here their argument is first denied after which their epistemic conception of a moral right to privacy is criticized.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  25
    Natural Law, Slavery, and the Right to Privacy Tort.Anita Allen - unknown
    In 1905 the Supreme Court of Georgia became the first state high court to recognize a freestanding “right to privacy” tort in the common law. The landmark case was Pavesich v. New England Life Insurance Co. Must it be a cause for deep jurisprudential concern that the common law right to privacy in wide currency today originated in Pavesich’s explicit judicial interpretation of the requirements of natural law? Must it be an additional worry that the court which originated (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  31
    The study of database design must address privacy concerns.Florence Appel - 2006 - Journal of Information, Communication and Ethics in Society 4 (3):155-161.
    The proliferation of electronic databases has given rise to many practices and occurrences that pose serious threats to personal privacy. This paper argues that attention to privacy should be an integral part of the database design process, and that database designers are uniquely positioned to ensure that this happens. To motivate students to become privacy‐conscious database design professionals, computer science programs must meet the challenges of implementing an “ethics across the curriculum” methodology to integrate privacy content (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  19.  31
    Correction to: Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3797-3797.
    A correction to this paper has been published: https://doi.org/10.1007/s11098-021-01640-1.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  5
    A reflective commentary of teaching critical thinking of privacy and surveillance in UK higher education.Yu-Wei Lin - 2017 - Big Data and Society 4 (1).
    The importance of data literacy and the need of raising and improving it through formal educational channel or public engagement has repeatedly been flagged up in each of the past Economic and Social Research Council-funded Data-Psst! Seminar I attended in 2014–2016. There is a real demand for action taking. I took advantage of the knowledge I learned from the Data-Psst seminars and devised a module teaching Level 5 undergraduate media students about critical issues in today’s data-centric digital society, including (...) and surveillance. In this article, I share how the class activities were devised and carried out, and how guided engagement with the current debate in privacy and surveillance were realised. I also draw on relevant pedagogical theories to discuss my educational approaches, student performance, the challenges of the project, and evaluate and reflect upon the outcomes. This report from the field provides fresh first-hand information about the data ethics of the younger public who are practising media arts and their behaviours and attitudes towards privacy and surveillance. This article shall open up the discussion about the role educators play in enriching public engagement with critical thinking about Big Data. The lessons learned can also contextualise the pedagogical implication of the recent scholarly research on Big Data and privacy, and provide a framework for constructing future collaborative or creative projects. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  29
    Taking Patient Privacy and Autonomy More Seriously: Why an Orwellian Account Is Not Sufficient.Karsten Weber, Uta Bittner, Arne Manzeschke, Elisabeth Rother, Friedericke Quack, Kathrin Dengler & Heiner Fangerau - 2012 - American Journal of Bioethics 12 (9):51-53.
    The American Journal of Bioethics, Volume 12, Issue 9, Page 51-53, September 2012.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22. A Short History of the 'Right to Privacy'.Anthony Bendall - 2009 - Agora (History Teachers' Association of Victoria) 44 (1):37.
     
    Export citation  
     
    Bookmark  
  23.  32
    Covering Public Officials: Gender and Privacy Issue Differences.Bruce Garrison & Sigman Splichal - 2000 - Journal of Mass Media Ethics 15 (3):167-179.
    This article reports the results of two national studies of daily newspaper newsroom managers and their views about coverage of the private lives of politicians and political candidates. The data were collected in 1993 and 1999. The focus of this analysis is on differences between male and female newsroom managers. Studies in both years found some statistical differences between male and female editors, but on different variables from study to study. Overall results, however, found no broad support for the premise (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  8
    Adoption of mobile health services using the unified theory of acceptance and use of technology model: Self-efficacy and privacy concerns.Yizhi Liu, Xuan Lu, Gang Zhao, Chengjiang Li & Junyi Shi - 2022 - Frontiers in Psychology 13.
    Mobile health services have been widely used in medical services and health management through mobile devices and multiple channels, such as smartphones, wearable equipment, healthcare applications, and medical platforms. However, the number of the users who are currently receiving the mHealth services is small. In China, more than 70% of internet users have never used mHealth services. Such imbalanced situation could be attributed to users’ traditional concept of medical treatment, psychological factors and privacy concerns. The purpose of this study (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  65
    Perceived Access to Self-relevant Information Mediates Judgments of Privacy Violations in Neuromonitoring and Other Monitoring Technologies.D. A. Baker, N. J. Schweitzer & Evan F. Risko - 2013 - Neuroethics 7 (1):43-50.
    Advances in technology are bringing greater insight into the mind, raising a host of privacy concerns. However, the basic psychological mechanisms underlying the perception of privacy violations are poorly understood. Here, we explore the relation between the perception of privacy violations and access to information related to one’s “self.” In two studies using demographically diverse samples, we find that privacy violations resulting from various monitoring technologies are mediated by the extent to which the monitoring is thought (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  26. Drug testing and the right to privacy: Arguing the ethics of workplace drug testing. [REVIEW]Michael Cranford - 1998 - Journal of Business Ethics 17 (16):1805-1815.
    As drug testing has become increasingly used to maximize corporate profits by minimizing the economic impact of employee substance abuse, numerous arguments have been advanced which draw the ethical justification for such testing into question, including the position that testing amounts to a violation of employee privacy by attempting to regulate an employee's behavior in her own home, outside the employer's legitimate sphere of control. This article first proposes that an employee's right to privacy is violated when personal (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  27. Privacy and Assurance: On the Right to Be Forgotten.Scott Casleton - 2024 - Political Philosophy 1 (1):212-235.
    The right to be forgotten enables individuals to remove certain links from search results that appear when their names are entered as search terms. Formulated as a distinct application of the general right to privacy, the right to be forgotten has proven highly controversial, for two reasons. First, it is difficult to see how the specific right to be forgotten can apply to the withdrawal of public information, since the general right to privacy typically covers the disclosure of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28. Privacy as Informational Commodity.Jarek Gryz - 2013 - Proceedings of IACAP Conference.
    Many attempts to define privacy have been made since the publication of the seminal paper by Warren and Brandeis (Warren & Brandeis, 1890). Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy became an urgent issue as legal and business problems regarding privacy started to (...)
     
    Export citation  
     
    Bookmark  
  29. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  30. Ari Adut holds a Ph. D. from the University of Chicago and is Assistant Professor of Sociology at the University of Texas at Austin. His research focuses on political scandals, the legalization of political and social life, and privacy. He is currently writing a book on scandal as a general social form. [REVIEW]Deborah Barrettis, Charles Kurzman & Mark S. Mizruchi - 2004 - Theory and Society 33 (619).
     
    Export citation  
     
    Bookmark   2 citations  
  31. Book review: Privacy, Confidentiality, and Health Research, written by William H. Lowrance. [REVIEW]Peter G. N. West-Oram - 2014 - European Journal of Health Law 21 (2): 233 – 237.
  32.  79
    Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  33.  62
    Privacy and the Standing to Hold Responsible.Linda Radzik - 2023 - Journal of Moral Philosophy 21 (3-4):333-354.
    In order to be held responsible, it is not enough that you’ve done something blameworthy, someone else must also have the standing to hold you responsible. But a number of critics have claimed that this concept of ‘standing’ doesn’t hold up to scrutiny and that we should excise it from our analyses of accountability practices. In this paper, I examine James Edwards’ (2019) attempt to define standing. I pose objections to some key features of Edwards’ account and defend an alternative. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  35.  3
    Digital privacy and the law: the challenge of regulatory capture.Bartlomiej Chomanski & Lode Lauwaert - forthcoming - AI and Society:1-11.
    Digital privacy scholars tend to bemoan ordinary people’s limited knowledge of and lukewarm interest in what happens to their digital data. This general lack of interest and knowledge is often taken as a consideration in favor of legislation aiming to force internet companies into adopting more responsible data practices. While we remain silent on whether any new laws are called for, in this paper we wish to underline a neglected consequence of people’s ignorance of and apathy for digital (...): their potential to encourage capture by industry interests. In particular, we argue that such laws may be at increased risk of capture because they are unlikely to be democratically responsive. We make this claim on a twofold basis: first, well-known theoretical mechanisms explaining how the absence of responsiveness leads to capture, identified in prior political science and political philosophy literature, yield the prediction that digital privacy legislation is likely to be unresponsive and thus captured; second, empirical data concerning the European Union’s digital privacy laws, with a special focus on the General Data Protection Regulation, appears to confirm these predictions: the bloc’s (world’s?) flagship privacy protection law seems more responsive to corporate than citizen interests. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36.  64
    Privacy in the information age: Stakeholders, interests and values. [REVIEW]Lucas Introna & Athanasia Pouloudi - 1999 - Journal of Business Ethics 22 (1):27 - 38.
    Privacy is a relational and relative concept that has been defined in a variety of ways. In this paper we offer a systematic discussion of potentially different notions of privacy. We conclude that privacy as the freedom or immunity from the judgement of others is an extremely useful concept to develop ways in which to understand privacy claims and associated risks. To this end, we develop a framework of principles that explores the interrelations of interests and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  37.  51
    Layering privacy on operating systems, social networks, and other platforms by design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
    Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (3) the evolution of the PeCAN (Personal Context Agent Networking) architecture to a platform for pervasively providing multiple contexts for user privacy preferences and online informational (...) services, and (4) use of platform network effects for increasing wide-scale user adoption of privacy services. One implication of this paper’s concepts is that platform-mediated networks, which are reportedly the vehicles for most of the revenue earned by 60 of the world’s largest companies, and other platforms that commonly host millions of users, will not have to individually reinvent and manage sophisticated user services for privacy protection since universal privacy platforms can be layered on them in future. (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  12
    Privacy.Fritz Allhoff, Patrick Lin & Daniel Moore - 2009 - In Fritz Allhoff, Patrick Lin & Daniel Moore (eds.), What is Nanotechnology and Why Does It Matter: From Science to Ethics. Wiley-Blackwell. pp. 185–214.
    This chapter contains sections titled: Historical and Legal Background Philosophical Foundations Radio Frequency Identity Chips Item‐Level Tagging Human Implants RFID‐Chipped Identification Is RFID a Threat to Privacy?
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  59
    Privacy Is Power.Carissa Véliz - 2020 - London, UK: Penguin (Bantam Press).
    Selected by the Economist as one of the best books of 2020. -/- Privacy Is Power argues that people should protect their personal data because privacy is a kind of power. If we give too much of our data to corporations, the wealthy will rule. If we give too much personal data to governments, we risk sliding into authoritarianism. For democracy to be strong, the bulk of power needs to be with the citizenry, and whoever has the data (...)
    Direct download  
     
    Export citation  
     
    Bookmark   27 citations  
  40. Accountable privacy supporting services.Jan Camenisch, Thomas Groß & Thomas Scott Heydt-Benjamin - 2009 - Identity in the Information Society 2 (3):241-267.
    As privacy concerns among consumers rise, service providers increasingly want to provide services that support privacy enhancing technologies. At the same time, online service providers must be able to protect themselves against misbehaving users. For instance, users that do not pay their bill must be held accountable for their behavior. This tension between privacy and accountability is fundamental, however a tradeoff is not always required. In this article we propose the concept of a time capsule, that is, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  41.  49
    Patients’ Privacy of the Person and Human Rights.Jay Woogara - 2005 - Nursing Ethics 12 (3):273-287.
    The UK Government published various circulars to indicate the importance of respecting the privacy and dignity of NHS patients following the implementation of the Human Rights Act, 1998. This research used an ethnographic method to determine the extent to which health professionals had in fact upheld the philosophy of these documents. Fieldwork using nonparticipant observation, and unstructured and semistructured interviews with patients and staff, took place over six months in three acute care wards in a large district NHS trust (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  42.  54
    Privacy, Health, and Race Equity in the Digital Age.Anita L. Allen - 2022 - American Journal of Bioethics 22 (7):60-63.
    Privacy is a basic and foundational human good meriting moral and legal protection. Privacy isn’t, however, everything. Other goods and values matter, too (Solove 2003; Ma...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  62
    Informational privacy and moral values.Michael Scanlan - 2001 - Ethics and Information Technology 3 (1):3-12.
    A case from 1996 in Oregon in which citizens' legally publicmotor vehicle information was disseminated on a World Wide Website is considered. The case evoked widespread moral outrageamong Oregonians and led to changes in the Oregon records laws.The application of either consequentialist ornon-consequentialist moral theories to this and otherinformational privacy cases is found to be inadequate.Adjudication of conflicting desires is offered as the appropriateanalytical model for moral disputes. The notion of adjudicationoffered here diverges from traditional moral theories in itsindeterminate (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  44.  42
    Privacy: What Everyone Needs to Know®.Leslie Francis & John G. Francis - 2017 - Oup Usa.
    Privacy is one of our most essential values, but popular understanding of it lags far behind the heat the concept generates. It's easy to understand why. The concept itself has shifted in U.S. law from autonomy, to property, to confidentiality. Further, with a host of cultural differences as to how privacy is understood globally and in different religions, and with nonstop technological advancements, its significance is continually evolving. Leslie P. and John G. Francis draw upon their extensive expertise (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  3
    Privacy and identity in a networked society: refining privacy impact assessment.Stefan Strauss - 2019 - New York: Routledge, Taylor & Francis Group.
    Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46. Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   47 citations  
  47.  94
    Privacy and the Dead.Geoffrey F. Scarre - 2012 - Philosophy in the Contemporary World 19 (1):1-16.
    The privacy of the dead might be thought to be violated by, for instance, the disinterment for research purposes of human physical remains or the posthumous revelation of embarrassing facts about people's private lives. But are there any moral rights to privacy which extend beyond the grave? Although this notion can be challenged on the ground that death marks the end of the personal subject, with the consequent extinction of her interests, I argue that a right to (...) belongs to deceased persons in virtue of their moral status while alive and reflects their interest in the preservation of their dignity. The paper investigates what prima-facie privacy rights and interests may plausibly be ascribed to the dead and why these need to be taken seriously by those, such as archaeologists or biographers, who have "dealings with the dead.". (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  16
    Privacy and anti-surveillance advocacy: the role/challenge of issue salience.Smith Oduro-Marfo - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):422-437.
    Purpose The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse profiling and social sorting. There is a heightened need for dedicated advocacy and activism to consistently demand accountability and transparency from African states, governments and their allies regarding surveillance. The purpose of this paper is to understand the issue frames that accompany anti-surveillance and privacy advocacy in Ghana and the related implications. Design/methodology/approach (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. Privacy Versus Public Interest In Developing Human Genetic Databases.Baoqi Su & Darryl Macer - 2004 - Eubios Journal of Asian and International Bioethics 14 (3):82-85.
    The issue of large-scale, population based DNA collections has become a world-wide discussion, which is hoped to bring substantial improvements in medicine. Continuous access to clinical data linked to the genetic samples is very important for some research that aims to find significant association between genes and diseases. This raises ethical issues related to privacy and confidentiality of medical records and the genetic information of the individuals who may be involved in the research. Genetic databases can also raise challenges (...)
     
    Export citation  
     
    Bookmark   1 citation  
  50.  17
    Privacy Law’s Indeterminacy.Ryan Calo - 2019 - Theoretical Inquiries in Law 20 (1):33-52.
    Fools rush in. ALEXANDER POPE, AN ESSAY ON CRITICISM (London, 1711). The full quotation is, “For Fools rush in where Angels fear to tread.” Id. at 66. She who hesitates is lost. Adaptation of the line, “The woman that deliberates is lost.” JOSEPH ADDISON, CATO: A TRAGEDY, AND SELECTED ESSAYS 30 (2004). See also OLIVER WENDALL HOLMES, SR., THE AUTOCRAT AT THE BREAKFAST TABLE 29 (1858) (“The woman who ‘calculates’ is lost.”). American legal realism numbers among the most important theoretical (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 964