Switch to: References

Add citations

You must login to add citations.
  1. AI and privacy concerns: a smart meter case study.Jillian Carmody, Samir Shringarpure & Gerhard Van de Venter - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):492-505.
    Purpose The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection. Design/methodology/approach The authors illustrate how, through smart meter obtained energy data, home energy providers can use (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Self-censorship in social networking sites (SNSs) – privacy concerns, privacy awareness, perceived vulnerability and information management.Mark Warner & Victoria Wang - 2019 - Journal of Information, Communication and Ethics in Society 17 (4):375-394.
    PurposeThis paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In particular, it examines the relationships between SC and four related factors: privacy concerns (PC), privacy awareness (PA), perceived vulnerability (PV) and information management (IM).Design/methodology/approachA national wide survey was conducted in the UK (N= 519). The data were analysed to present both descriptive and inferential statistical findings.FindingsThe level of online SC increases as the level of privacy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy and brain-computer interfaces.Kirsten Wahlstrom, N. Ben Fairweather & Helen Ashman - 2016 - Acm Sigcas Computers and Society 46 (1):41-53.
    Brain-Computer Interfaces interpret neural activity, applying it to the control of external devices. As BCIs approach market viability, ethical implications come under consideration. This paper identifies potential privacy disruptions. BCI literature is reviewed in order to identify a BCI typology likely to support a privacy analysis. The typology describes the active, reactive, passive and hybrid types of BCI and, where possible, includes examples that are further classified as existing, prospective or speculative. A review of privacy theory supports an analysis that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Editorial - Computing by everyone for everyone.Simon Rogerson - 2019 - Journal of Information, Communication and Ethics in Society 17 (4):373-374.
    Computing is no longer the sole domain of professionals, educated and trained through traditional routes to service public and private sector organisations under paid contracts. Computing has been democratised with the advent of economically accessible hardware, a multitude of software tools and the internet. Computing is by everyone for everyone.
    Download  
     
    Export citation  
     
    Bookmark   2 citations