Results for 'software privacy'

1000+ found
Order:
  1.  15
    Privacy, Deontic Epistemic Action Logic and Software Agents.V. Wiegel, M. J. Van den Hoven & G. J. C. Lokhorst - 2005 - Ethics and Information Technology 7 (4):251-264.
    In this paper we present an executable approach to model interactions between agents that involve sensitive, privacy-related information. The approach is formal and based on deontic, epistemic and action logic. It is conceptually related to the Belief-Desire-Intention model of Bratman. Our approach uses the concept of sphere as developed by Waltzer to capture the notion that information is provided mostly with restrictions regarding its application. We use software agent technology to create an executable approach. Our agents hold beliefs (...)
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  2.  31
    This Essay Will Address the Practical Conflicts for Journalists, Their Employers, the Owners of News Organizations, and the Public Regarding Issues of Privacy in Reporting the News. Privacy Will Be Understood, Here, as Control Over Access to Oneself and to Certain Kinds of Information About Oneself. First, the Relevant Inter-Ests of the Public, Journalists, and News Organizations Will Be Discussed. Then, Building on Deni Elliott and David Ozar (Chap. 1 in This Volume), Ethical Principles Will Be ... [REVIEW]Respecting Privacy - 2010 - In Christopher Meyers (ed.), Journalism Ethics: A Philosophical Approach. Oxford University Press. pp. 215.
    Direct download  
     
    Export citation  
     
    My bibliography  
  3.  9
    A Software Platform to Analyse the Ethical Issues of Electronic Patient Privacy Policy: The S3P Example.M. A. Mizani & N. Baykal - 2007 - Journal of Medical Ethics 33 (12):695-698.
    Paper-based privacy policies fail to resolve the new changes posed by electronic healthcare. Protecting patient privacy through electronic systems has become a serious concern and is the subject of several recent studies. The shift towards an electronic privacy policy introduces new ethical challenges that cannot be solved merely by technical measures. Structured Patient Privacy Policy (S3P) is a software tool assuming an automated electronic privacy policy in an electronic healthcare setting. It is designed to (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  4.  1
    Privacy, Deontic Epistemic Action Logic and Software Agents.V. Wiegel, M. Hoven & G. Lokhorst - 2006 - Ethics and Information Technology 7 (4):251-264.
    Direct download  
     
    Export citation  
     
    My bibliography  
  5.  90
    Ethics in Information Technology and Software Use.Vincent J. Calluzzo & Charles J. Cante - 2004 - Journal of Business Ethics 51 (3):301-312.
    The emerging concern about software piracy and illegal or unauthorized use of information technology and software has been evident in the media and open literature for the last few years. In the course of conducting their academic assignments, the authors began to compare observations from classroom experiences related to ethics in the use of software and information technology and systems. Qualitatively and anecdotally, it appeared that many if not most, students had misconceptions about what represented ethical and (...)
    Direct download (8 more)  
     
    Export citation  
     
    My bibliography   8 citations  
  6.  7
    How to Approximate Users' Values While Preserving Privacy: Experiences with Using Attitudes Towards Work Tasks as Proxies for Personal Value Elicitation. [REVIEW]Sven H. Koch, Rumyana Proynova, Barbara Paech & Thomas Wetter - 2013 - Ethics and Information Technology 15 (1):45-61.
    Software users have different sets of personal values, such as benevolence, self-direction, and tradition. Among other factors, these personal values influence users’ emotions, preferences, motivations, and ways of performing tasks—and hence, information needs. Studies of user acceptance indicate that personal traits like values and related soft issues are important for the user’s approval of software. If a user’s dominant personal value were known, software could automatically show an interface variant which offers information and functionality that best matches (...)
    Direct download (8 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  7.  8
    Designing Trust with Software Agents: A Case Study.Stijn Bernaer, Martin Meganck, Greet Vanden Berghe & Patrick De Causmaecker - 2006 - Journal of Information, Communication and Ethics in Society 4 (1):37-48.
    In this paper, we will address anonymity, privacy and trust issues that arise during the research on a communication platform for multi-modal transport. Though most logistic information is currently available in electronic form, it is not widely accessible yet to all the parties concerned with transport. The major goal of a communication platform is to improve the conditions for exchanging information, which should lead to better organisation/collaboration within the transport sector. We need to merit credibility by faithfully modelling all (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  8.  7
    A Comparison of Privacy Issues in Collaborative Workspaces and Social Networks.Martin Pekárek & Stefanie Pötzsch - 2009 - Identity in the Information Society 2 (1):81-93.
    With the advent of Web 2.0, numerous social software applications allow people to publish and share information on the Internet. Two of these types of applications – collaborative workspaces and social network sites – have a number of features in common, which are explored to provide a basis for comparative analysis. This basis is extended with a suitable definition of privacy, a sociological perspective and an applicable adversary model in order to facilitate an investigation of similarities and differences (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography  
  9.  11
    Predicting Accounting Students’ Intentions to Engage in Software and Music Piracy.Philmore Alleyne, Sherlexis Soleyn & Terry Harris - 2015 - Journal of Academic Ethics 13 (4):291-309.
    The purpose of this study is to investigate the salient factors that influence accounting students to engage in software and music piracy. This study uses the theory of reasoned action and the theory of planned behavior, and extends these models to incorporate other variables to predict individuals’ behavioral intentions. Specifically, we hypothesize that attitudes toward the behavior, subjective norms, perceived behavioral control, moral obligation and perceived prosecution risk influence intentions to engage in software and music piracy. Data were (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  10.  39
    Anonymity and Software Agents: An Interdisciplinary Challenge. [REVIEW]Frances Brazier, Anja Oskamp, Corien Prins, Maurice Schellekens & Niek Wijngaards - 2004 - Artificial Intelligence and Law 12 (1-2):137-157.
    Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit cards and bank accounts. This paper discusses whether this is necessary: whether human users and software agents are allowed to be anonymous under the relevant legal regimes and whether an adequate interaction and balance between law and anonymity can be realised from both the perspective of Computer Systems and the perspective of (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  11. Privacy in the Family.Bryce Clayton Newell, Cheryl A. Metoyer & Adam Moore - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 104-121.
    While the balance between individual privacy and government monitoring or corporate surveillance has been a frequent topic across numerous disciplines, the issue of privacy within the family has been largely ignored in recent privacy debates. Yet privacy intrusions between parents and children or between adult partners or spouses can be just as profound as those found in the more “public spheres” of life. Popular access to increasingly sophisticated forms of electronic surveillance technologies has altered the dynamics (...)
    Direct download  
     
    Export citation  
     
    My bibliography  
  12.  4
    Patients' Privacy and Satisfaction in the Emergency Department: A Descriptive Analytical Study.N. D. Nayeri & M. Aghajani - 2010 - Nursing Ethics 17 (2):167-177.
    Respecting privacy and patients’ satisfaction are amongst the main indicators of quality of care and one of the basic goals of health services. This study, carried out in 2007, aimed to investigate the extent to which patient privacy is observed and its correlation with patient satisfaction in three emergency departments of Tehran University of Medical Science, Iran. Questionnaire data were collected from a convenience sample of 360 patients admitted to emergency departments and analysed using SPSS software. The (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   4 citations  
  13. Spyware – the Ethics of Covert Software.Mathias Klang - 2004 - Ethics and Information Technology 6 (3):193-202.
    Many computer users are happy to be oblivious of the workings within the machine and yet on some level it is important to know what is occurring therein. This paper discusses an unusual type of surveillance software which may be installed in many computers. The strange aspect of this software is that it has often been downloaded and installed by the user, but without her knowledge. The software is mainly designed to collect information about the user of (...)
    Direct download (7 more)  
     
    Export citation  
     
    My bibliography  
  14.  56
    Property, Privacy and Personhood in a World of Ambient Intelligence.Niels van Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal (...)
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  15.  55
    The Freedoms of Software and its Ethical Uses.Samir Chopra & Scott Dexter - 2009 - Ethics and Information Technology 11 (4):287-297.
    The “free” in “free software” refers to a cluster of four specific freedoms identified by the Free Software Definition. The first freedom, termed “Freedom Zero,” intends to protect the right of the user to deploy software in whatever fashion, towards whatever end, he or she sees fit. But software may be used to achieve ethically questionable ends. This highlights a tension in the provision of software freedoms: while the definition explicitly forbids direct restrictions on users’ (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography  
  16.  13
    Property, Privacy and Personhood in a World of Ambient Intelligence.Niels Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal (...)
    Direct download (8 more)  
     
    Export citation  
     
    My bibliography  
  17.  26
    Software Vulnerability Due to Practical Drift.Christian V. Lundestad & Anique Hommels - 2007 - Ethics and Information Technology 9 (2):89-100.
    The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we (...)
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography  
  18.  11
    Privacy Impact Assessment in the Design of Transnational Public Health Information Systems: The BIRO Project.C. T. di Iorio, F. Carinci, J. Azzopardi, V. Baglioni, P. Beck, S. Cunningham, A. Evripidou, G. Leese, K. F. Loevaas, G. Olympios, M. O. Federici, S. Pruna, P. Palladino, S. Skeie, P. Taverner, V. Traynor & M. M. Benedetti - 2009 - Journal of Medical Ethics 35 (12):753-761.
    Objectives: To foster the development of a privacy-protective, sustainable cross-border information system in the framework of a European public health project. Materials and methods: A targeted privacy impact assessment was implemented to identify the best architecture for a European information system for diabetes directly tapping into clinical registries. Four steps were used to provide input to software designers and developers: a structured literature search, analysis of data flow scenarios or options, creation of an ad hoc questionnaire and (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  19.  17
    Returning Students' Right to Access, Choice and Notice: A Proposed Code of Ethics for Instructors Using Turnitin. [REVIEW]Bastiaan Vanacker - 2011 - Ethics and Information Technology 13 (4):327-338.
    This paper identifies the ethical issues associated with college instructors’ use of plagiarism detection software (PDS), specifically the Turnitin program. It addresses the pros and cons of using such software in higher education, arguing that its use is justified on the basis that it increases institutional trust, and demonstrating that two common criticisms of such software are not universally valid. An analysis of the legal issues surrounding Turnitin, however, indicates that the way it is designed and operates (...)
    Direct download (7 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  20.  41
    Ethics and the Practice of Software Design.Matteo Turilli - 2008 - In P. Brey, A. Briggle & K. Waelbers (eds.), Current Issues in Computing and Philosophy. IOS Press.
    The paper offers an analysis of the problem of integrating ethical principles into the practice of software design. The approach is grounded on a review of the relevant literature from Computer Ethics and Professional Ethics. The paper is divided into four sections. The first section reviews some key questions that arise when the ethical impact of computational artefacts is analysed. The inner informational nature of such questions is used to argue in favour of the need for a specific branch (...)
    Direct download  
    Translate
     
     
    Export citation  
     
    My bibliography   1 citation  
  21.  23
    Privacy and Equality in Diagnostic Genetic Testing.Tarja Nyrhinen, Marja Hietala, Pauli Puukka & Helena Leino-Kilpi - 2007 - Nursing Ethics 14 (3):295-308.
    This study aimed to determine the extent to which the principles of privacy and equality were observed during diagnostic genetic testing according to views held by patients or child patients' parents (n = 106) and by staff (n = 162) from three Finnish university hospitals. The data were collected through a structured questionnaire and analysed using the SAS 8.1 statistical software. In general, the two principles were observed relatively satisfactorily in clinical practice. According to patients/parents, equality in the (...)
    Direct download (8 more)  
     
    Export citation  
     
    My bibliography  
  22.  9
    From Computer Ethics to Responsible Research and Innovation in ICT.Bernd Carsten Stahl, Grace Eden, Marina Jirotka & Mark Coeckelbergh - 2014 - Information and Management 51 (6):810-818.
    The discourse concerning computer ethics qualifies as a reference discourse for ethics-related IS research. Theories, topics and approaches of computer ethics are reflected in IS. The paper argues that there is currently a broader development in the area of research governance, which is referred to as 'responsible research and innovation'. RRI applied to information and communication technology addresses some of the limitations of computer ethics and points toward a broader approach to the governance of science, technology and innovation. Taking this (...)
    Direct download  
     
    Export citation  
     
    My bibliography   1 citation  
  23.  40
    Overblocking Autonomy: The Case of Mandatory Library Filtering Software.Gordon Hull - 2009 - Continental Philosophy Review 42 (1):81-100.
    In U.S. v. American Library Association (2003), the Supreme Court upheld the Child Internet Protection Act (CIPA), which mandated that libraries receiving federal funding for public Internet access install content-filtering programs on computers which provide that access. These programs analyze incoming content, and block the receipt of objectionable material, in particular pornography. Thus, patrons at public libraries are protected from unintentionally (or intentionally) accessing objectionable material, and, in the case of minors, from accessing potentially damaging material. At least, that is (...)
    Direct download (7 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  24.  36
    Organizational Commitment and Ethical Behavior: An Empirical Study of Information System Professionals. [REVIEW]Effy Oz - 2001 - Journal of Business Ethics 34 (2):137 - 142.
    IS professionals have been reported to have one of the highest turnover rates. They have also often been accused of unethical conduct, specifically, pirating software, hacking, giving professional opinion that exceeds their knowledge, and not protecting people''s privacy. In a sample of 71 IS professionals and 250 members of other professions we found that IS professionals were more committed to their organizations than the other professionals, and that IS professionals were, indeed, less ethical with respect to software (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   12 citations  
  25. Key Dialectics in Cloud Services.Brandt Dainow - 2015 - Acm Sigcas Computers and Society 45 (3):52-59.
    This paper will identify three central dialectics within cloud services. These constitute defining positions regarding the nature of cloud services in terms of privacy, ethical responsibility, technical architecture and economics. These constitute the main frameworks within which ethical discussions of cloud services occur. The first dialectic concerns the question of whether it is it essential that personal privacy be reduced in order to deliver personalised cloud services. I shall evaluate the main arguments in favour of the view that (...)
    Direct download (3 more)  
     
    Export citation  
     
    My bibliography  
  26.  49
    An Ethical Decision-Making Process for Computing Professionals.Edward J. O'Boyle - 2002 - Ethics and Information Technology 4 (4):267-277.
    Our comments focus on the ACMCode of Ethics and situate the Code within ageneral ethical decision-making process tospecify the five steps which logically precedehuman action in ethical matters and determinethat action, and the individual differencetraits in these five steps which bear upon theresolution of an ethical problem and lead tomorally responsible action. Our main purpose isto present a cognitive moral processing modelwhich computing professionals can use to betterunderstand their professional rights andduties. It is clear that the Code providessubstantial guidance in (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography   3 citations  
  27.  93
    Privacy in Public and the Contextual Conditions of Agency.Maria Brincker - 2017 - In Tjerk Timan, Bert-Jaap Koops & Bryce Newell (eds.), Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Direct download  
     
    Export citation  
     
    My bibliography  
  28. Neuroscience V. Privacy? : A Democratic Perspective.Annabelle Lever - 2012 - In Sarah Richmond, Geraint Rees & Sarah J. L. Edwards (eds.), I Know What You're Thinking: Brain Imaging and Mental Privacy. Oxford University Press. pp. 205.
    Recent developments in neuroscience create new opportunities for understanding the human brain. The power to do good, however, is also the power to harm, so scientific advances inevitably foster as many dystopian fears as utopian hopes. For instance, neuroscience lends itself to the fear that people will be forced to reveal thoughts and feelings which they would not have chosen to reveal, and of which they may be unaware. It also lends itself to the worry that people will be encouraged (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  29.  11
    Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Van Brakel Leenes R. (ed.), Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Dordrecht: Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by (...)
    Direct download  
     
    Export citation  
     
    My bibliography  
  30.  27
    Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  31. Software is an Abstract Artifact.Nurbay Irmak - 2012 - Grazer Philosophische Studien 86 (1):55-72.
    Software is a ubiquitous artifact, yet not much has been done to understand its ontological nature. There are a few accounts offered so far about the nature of software. I argue that none of those accounts give a plausible picture of the nature of software. I draw attention to the striking similarities between software and musical works. These similarities motivate to look more closely on the discussions regarding the nature of the musical works. With the lessons (...)
    Direct download  
     
    Export citation  
     
    My bibliography   7 citations  
  32. The Impact of National Culture on Software Piracy.Bryan W. Husted - 2000 - Journal of Business Ethics 26 (3):197 - 211.
    This paper examines the impact of the level of economic development, income inequality, and five cultural variables on the rate of software piracy at the country level. The study finds that software piracy is significantly correlated to GNP per capita, income inequality, and individualism. Implications for anti-piracy programs and suggestions for future research are developed.
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   50 citations  
  33. Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   23 citations  
  34. The Ontological Interpretation of Informational Privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185-200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography   28 citations  
  35. Quantifying Privacy in Terms of Entropy for Context Aware Services.Athanasios S. Voulodimos & Charalampos Z. Patrikakis - 2009 - Identity in the Information Society 2 (2):155-169.
    In this paper, we address the issue of privacy protection in context aware services, through the use of entropy as a means of measuring the capability of locating a user’s whereabouts and identifying personal selections. We present a framework for calculating levels of abstraction in location and personal preferences reporting in queries to a context aware services server. Finally, we propose a methodology for determining the levels of abstraction in location and preferences that should be applied in user data (...)
    Direct download (4 more)  
     
    Export citation  
     
    My bibliography   1 citation  
  36. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2015 - In Beate Rossler & Dorota Mokrosinska (eds.), Social Dimensions of Privacy. cambridge University Press.
    Direct download  
     
    Export citation  
     
    My bibliography   1 citation  
  37. Copyright or Copyleft?: An Analysis of Property Regimes for Software Development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  38.  63
    Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior.Chechen Liao, Hong-Nan Lin & Yu-Ping Liu - 2010 - Journal of Business Ethics 91 (2):237-252.
    As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. Four (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   11 citations  
  39. Four Challenges for a Theory of Informational Privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109-119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can (...)
    Direct download (9 more)  
     
    Export citation  
     
    My bibliography   17 citations  
  40. Anti-Doping, Purported Rights to Privacy and WADA's Whereabouts Requirements: A Legal Analysis.Oskar MacGregor, Richard Griffith, Daniele Ruggiu & Mike McNamee - 2013 - Fair Play 1 (2):13-38.
    Recent discussions among lawyers, philosophers, policy researchers and athletes have focused on the potential threat to privacy posed by the World Anti-Doping Agency’s (WADA) whereabouts requirements. These requirements demand, among other things, that all elite athletes file their whereabouts information for the subsequent quarter on a quarterly basis and comprise data for one hour of each day when the athlete will be available and accessible for no advance notice testing at a specified location of their choosing. Failure to file (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  41. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   2 citations  
  42. Bodily Privacy, Toilets, and Sex Discrimination: The Problem of "Manhood" in a Women's Prison.Jami L. Anderson - 2009 - In Olga Gershenson Barbara Penner (ed.), Ladies and Gents. pp. 90.
    Unjustifiable assumptions about sex and gender roles, the untamable potency of maleness, and gynophobic notions about women's bodies inform and influence a broad range of policy-making institutions in this society. In December 2004, the U.S. Court of Appeals for the Sixth Circuit continued this ignoble cultural pastime when they decided Everson v. Michigan Department of Corrections. In this decision, the Everson Court accepted the Michigan Department of Correction's claim that “the very manhood” of male prison guards both threatens the safety (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography  
  43.  71
    The Joint Moderating Impact of Moral Intensity and Moral Judgment on Consumer's Use Intention of Pirated Software.Mei-Fang Chen, Ching-Ti Pan & Ming-Chuan Pan - 2009 - Journal of Business Ethics 90 (3):361 - 373.
    Moral issues have been included in the studies of consumer misbehavior research, but little is known about the joint moderating effect of moral intensity and moral judgment on the consumer’s use intention of pirated software. This study aims to understand the consumer’s use intention of pirated software in Taiwan based on the theory of planned behavior (TPB) proposed by Ajzen (Organizational Behavior and Human Decision Processes, 50, 179, 1991). In addition, moral intensity and moral judgment are adopted as (...)
    Direct download (5 more)  
     
    Export citation  
     
    My bibliography   12 citations  
  44.  83
    Freedom and Privacy in Ambient Intelligence.Philip Brey - 2005 - Ethics and Information Technology 7 (3):157-166.
    This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing and Intelligent User Interfaces (IUI’s). After an introduction to the approach, two key ethical dimensions will be analyzed: freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored as well.
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography   17 citations  
  45. Open Source Software: A New Mertonian Ethos?Paul B. de Laat - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia.
    Hacker communities of the 1970s and 1980s developed a quite characteristic work ethos. Its norms are explored and shown to be quite similar to those which Robert Merton suggested govern academic life: communism, universalism, disinterestedness, and organized scepticism. In the 1990s the Internet multiplied the scale of these communities, allowing them to create successful software programs like Linux and Apache. After renaming themselves the `open source software' movement, with an emphasis on software quality, they succeeded in gaining (...)
    Direct download  
     
    Export citation  
     
    My bibliography   2 citations  
  46. Contextual Gaps: Privacy Issues on Facebook.Gordon Hull, Heather Richter Lipford & Celine Latulipe - 2011 - Ethics and Information Technology 13 (4):289-302.
    Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps are at the root of many (...)
    Direct download (13 more)  
     
    Export citation  
     
    My bibliography   8 citations  
  47. Student Attitudes on Software Piracy and Related Issues of Computer Ethics.Robert M. Siegfried - 2004 - Ethics and Information Technology 6 (4):215-222.
    Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The (...)
    Direct download (10 more)  
     
    Export citation  
     
    My bibliography   16 citations  
  48.  66
    Privacy. An Intercultural Perspective.Rafael Capurro - 2005 - Ethics and Information Technology 7 (1):37-47.
    This paper deals with intercultural aspects of privacy, particularly with regard to differences between Japanese and Western conceptions. It starts with a reconstruction of the genealogy of Western subjectivity and human dignity as the basic assumptions underlying Western views on privacy. An analysis of the Western concept of informational privacy is presented. The Japanese topic of ‘‘denial of self” (Musi) as well as the concepts of Seken, Shakai and Ikai (as analyzed by the authors of the companion (...)
    Direct download (11 more)  
     
    Export citation  
     
    My bibliography   15 citations  
  49. Privacy, the Workplace and the Internet.Seumas Miller & John Weckert - 2000 - Journal of Business Ethics 28 (3):255 - 265.
    This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and monitoring of employees, arguments which look at the benefits, or supposed benefits, to employees as well as to employers. The paper examines the general monitoring of (...)
    Direct download (6 more)  
     
    Export citation  
     
    My bibliography   16 citations  
  50.  40
    The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.Fiachra O’Brolcháin, Tim Jacquemard, David Monaghan, Noel O’Connor, Peter Novitzky & Bert Gordijn - 2016 - Science and Engineering Ethics 22 (1):1-29.
    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities and social networks, hereafter VRSNs. We examine a scenario in which a significant segment of the world’s population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with (...)
    Direct download (2 more)  
     
    Export citation  
     
    My bibliography   4 citations  
1 — 50 / 1000