Switch to: References

Citations of:

Uneasy Access: Privacy for Women in a Free Society

Rowman & Littlefield Publishers (1988)

Add citations

You must login to add citations.
  1. The Ethics of Smart Stadia: A Stakeholder Analysis of the Croke Park Project.Fiachra O’Brolcháin, Simone de Colle & Bert Gordijn - 2019 - Science and Engineering Ethics 25 (3):737-769.
    The development of “smart stadia”, i.e. the use of “smart technologies” in the way sports stadia are designed and managed, promises to enhance the experience of attending a live match through innovative and improved services for the audience, as well as for the players, vendors and other stadium stakeholders. These developments offer us a timely opportunity to reflect on the ethical implications of the use of smart technologies and the emerging Internet of Things. The IoT has the potential to radically (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, Informed Consent, and Participant Observation.Julie Zahle - 2017 - Perspectives on Science 25 (4):465-487.
    In the literature on social research, adherence to the principle of informed consent is sometimes recommended on the ground that the privacy of those being studied is hereby protected. The principle has it that before becoming part of a study, a competent individual must receive information about its purpose, use, etc., and on this basis freely agree to participate. Joan Sieber motivates the employment of informed consent as a way to safeguard research participants' privacy as follows: "A research experience regarded (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • privacy, democracy and freedom of expression.Annabelle Lever - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press.
    this paper argues that people are entitled to keep some true facts about themselves to themselves, should they so wish, as a sign of respect for their moral and political status, and in order to protect themselves from being used as a public example in order to educate or to entertain other people. The “outing” - or non-consensual public disclosure - of people’s health records or status, or their sexual behaviour or orientation is usually unjustified, even when its consequences seem (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been sufficiently investigated. In (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The Epistemic Account of Privacy.Martijn Blaauw - 2013 - Episteme 10 (2):167-177.
    Privacy is valued by many. But what it means to have privacy remains less than clear. In this paper, I argue that the notion of privacy should be understood in epistemic terms. What it means to have (some degree of) privacy is that other persons do not stand in significant epistemic relations to those truths one wishes to keep private.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that the predominant accounts of privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Health Information: Reconciling Personal Privacy with the Public Good of Human Health. [REVIEW]Lawrence O. Gostin - 2001 - Health Care Analysis 9 (3):321-335.
    The success of the health care system depends on the accuracy, correctness and trustworthiness of the information, and the privacy rights of individuals to control the disclosure of personal information. A national policy on health informational privacy should be guided by ethical principles that respect individual autonomy while recognizing the important collective interests in the use of health information. At present there are no adequate laws or constitutional principles to help guide a rational privacy policy. The laws are scattered and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Home and identity: In memory of Iris Marion young.Allison Weir - 2008 - Hypatia 23 (3):pp. 4-21.
    Drawing on Iris Marion Young’s essay, “House and Home: Feminist Variations on a Theme,” Weir argues for an alternative ideal of home that involves: (1) the risk of connection, and of sustaining relationship through conflict; (2) relational identities, constituted through both relations of power and relations of mutuality, love, and flourishing; (3) relational autonomy: freedom as the capacity to be in relationships one desires, and freedom as expansion of self in relationship; and (4) connection to past and future, through reinterpretive (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Analytic feminism.Ann Garry - 2008 - Stanford Encyclopedia of Philosophy.
    Analytic feminists are philosophers who believe that both philosophy and feminism are well served by using some of the concepts, theories and methods of analytic philosophy modified by feminist values and insights. By using ‘ analytic feminist’ to characterize their style of feminist philosophizing, these philosophers acknowledge their dual feminist and analytic roots and their intention to participate in the ongoing conversations within both traditions. In addition, the use of ‘ analytic feminist’ attempts to rebut two frequently made presumptions: that (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. [REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.
    The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues treated in (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • To Believe or not to Believe - That is not the (Only) Question: the Hybrid View of Privacy.Lauritz Munch & Jakob Mainz - 2023 - The Journal of Ethics 27 (3):245-261.
    In this paper, we defend what we call the ‘Hybrid View’ of privacy. According to this view, an individual has privacy if, and only if, no one else forms an epistemically warranted belief about the individual’s personal matters, nor perceives them. We contrast the Hybrid View with what seems to be the most common view of what it means to access someone’s personal matters, namely the Belief-Based View. We offer a range of examples that demonstrate why the Hybrid View is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Data and the Good?Daniel Susser - 2022 - Surveillance and Society 20 (3):297-301.
    Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new “sociotechnical imaginaries,” new understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of the technology industry’s (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Health, and Race Equity in the Digital Age.Anita L. Allen - 2022 - American Journal of Bioethics 22 (7):60-63.
    Privacy is a basic and foundational human good meriting moral and legal protection. Privacy isn’t, however, everything. Other goods and values matter, too (Solove 2003; Ma...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • How is Political Privacy Different from Personal Privacy? An Argument from Democratic Governance.Aleksandra Samonek - 2020 - Diametros:1-14.
    In this paper I discuss the political value of the right to privacy. The classical accounts of privacy do not differentiate between privacy as the right of a citizen against other citizens vs. the right to privacy as the right against the state or the government. I shall argue that this distinction should be made, since the new context of the privacy debate has surpassed the historical frames in which the intelligence methods used by governments were comparable to those available (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • #stayathome als Kolonialisierung der lokalen Privatheit? Eine ethische Auseinandersetzung mit dem Wert des Privaten in Zeiten einer globalen Pandemie.Eike Buhr - 2020 - Zeitschrift für Praktische Philosophie 7 (2):385-416.
    Im Rahmen der Maßnahmen zur Eindämmung der Covid-19- Pandemie sind die Bürgerinnen und Bürger in Deutschland und vielen anderen Ländern dazu angehalten, weitestgehend in ihren Privatwohnungen zu bleiben. Wurde der Wert des Privaten in der liberalen Tradition gerade im Rückzug von und als Schutz vor der politischen Öffentlichkeit sowie administrativen Eingriffen gesehen, wird das Private damit nun unmittelbar politischen Anforderungen unterworfen. Indem die Kontrolle über die Gewährung und Verwehrung des Zugangs zum Privaten eingeschränkt worden ist und keinen frei gewählten Rückzugsort (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Three Control Views on Privacy.Leonhard Menges - 2022 - Social Theory and Practice 48 (4):691-711.
    This paper discusses the idea that the concept of privacy should be understood in terms of control. Three different attempts to spell out this idea will be critically discussed. The conclusion will be that the Source Control View on privacy is the most promising version of the idea that privacy is to be understood in terms of control.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Technology as Terrorism: Police Control Technologies and Drone Warfare.Jessica Wolfendale - 2021 - In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21.
    Debates about terrorism and technology often focus on the potential uses of technology by non-state terrorist actors and by states as forms of counterterrorism. Yet, little has been written about how technology shapes how we think about terrorism. In this chapter I argue that technology, and the language we use to talk about technology, constrains and shapes our understanding of the nature, scope, and impact of terrorism, particularly in relation to state terrorism. After exploring the ways in which technology shapes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Ethics, and Institutional Research.Alan Rubel - 2019 - New Directions in Institutional Research 2019 (183):5-16.
    Despite widespread agreement that privacy in the context of education is important, it can be difficult to pin down precisely why and to what extent it is important, and it is challenging to determine how privacy is related to other important values. But that task is crucial. Absent a clear sense of what privacy is, it will be difficult to understand the scope of privacy protections in codes of ethics. Moreover, privacy will inevitably conflict with other values, and understanding the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Introduction to the Special Issue on the Ethics of State Mass Surveillance.Peter Königs - 2020 - Moral Philosophy and Politics 7 (1):1-8.
    Recent decades have seen an unprecedented proliferation of surveillance programs by government agencies. This development has been driven both by technological progress, which has made large scale surveillance operations relatively cheap and easy, and by the threat of terrorism, organized crime and pandemics, which supplies a ready justification for surveillance. For a long time, mass surveillance programs have been associated with autocratic regimes, most notoriously with the German Democratic Republic and the Stasi, its secret police. A more recent case in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through providing a definition (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • A Framework for Analyzing and Comparing Privacy States.Alan Rubel & Ryan Biava - 2014 - JASIST: The Journal of the American Society for Information Science and Technology 65 (12):2422-2431.
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the nature and value of privacy. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Libraries, Electronic Resources, and Privacy: The Case for Positive Intellectual Freedom.Alan Rubel - 2014 - Library Quarterly 84 (2):183-208.
    Public and research libraries have long provided resources in electronic formats, and the tension between providing electronic resources and patron privacy is widely recognized. But assessing trade-offs between privacy and access to electronic resources remains difficult. One reason is a conceptual problem regarding intellectual freedom. Traditionally, the LIS literature has plausibly understood privacy as a facet of intellectual freedom. However, while certain types of electronic resource use may diminish patron privacy, thereby diminishing intellectual freedom, the opportunities created by such resources (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva - An Internet Journal of Philosophy 9 (1).
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of solitude, intimacy and confidentiality and shows that, so described, people have legitimate interests in privacy. These interests are both personal and political, and provide the grounds for two different justifications of privacy rights. Though both are based on democratic concerns for the freedom and equality of individuals, these two justifications for privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Springer. pp. 459-474.
    Experimental design is one aspect of a scientific method. A well-designed, properly conducted experiment aims to control variables in order to isolate and manipulate causal effects and thereby maximize internal validity, support causal inferences, and guarantee reliable results. Traditionally employed in the natural sciences, experimental design has become an important part of research in the social and behavioral sciences. Experimental methods are also endorsed as the most reliable guides to policy effectiveness. Through a discussion of some of the central concepts (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • “Strongly Recommended” Revisiting Decisional Privacy to Judge Hypernudging in Self-Tracking Technologies.Marjolein Lanzing - 2019 - Philosophy and Technology 32 (3):549-568.
    This paper explores and rehabilitates the value of decisional privacy as a conceptual tool, complementary to informational privacy, for critiquing personalized choice architectures employed by self-tracking technologies. Self-tracking technologies are promoted and used as a means to self-improvement. Based on large aggregates of personal data and the data of other users, self-tracking technologies offer personalized feedback that nudges the user into behavioral change. The real-time personalization of choice architectures requires continuous surveillance and is a very powerful technology, recently coined as (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • X—Privacy as a Human Right.Beate Roessler - 2017 - Proceedings of the Aristotelian Society 117 (2):187-206.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy.Dorota Mokrosinska - 2018 - Law and Philosophy 37 (2):117-143.
    One of the most influential views in privacy scholarship is that privacy protects individual autonomy. On the early liberal view, the exercise of autonomy requires detachment from social and political life and privacy facilitates it. This view of privacy still informs current legal and political practice. As this view of privacy presupposes a tension between privacy and society, it is responsible for the underrating of privacy in legal and political practice. Over the last decades, liberal reflection on autonomy has shifted (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Home and Identity: In Memory of Iris Marion Young.Allison Weir - 2008 - Hypatia 23 (3):4-21.
    Drawing on Iris Marion Young's essay, “House and Home: Feminist Variations on a Theme,” Weir argues for an alternative ideal of home that involves: the risk of connection, and of sustaining relationship through conflict; relational identities, constituted through both relations of power and relations of mutuality, love, and flourishing; relational autonomy: freedom as the capacity to be in relationships one desires, and freedom as expansion of self in relationship; and connection to past and future, through reinterpretive preservation and transformative identification.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Spinoza, Feminism and Privacy: Exploring an Immanent Ethics of Privacy.Janice Richardson - 2014 - Feminist Legal Studies 22 (3):225-241.
    In this article I explore the usefulness of Spinoza’s ethics for feminism by considering ways in which it allows feminists to rethink privacy. I draw upon some of Spinoza’s central ideas to address the following question: when should information be classed as private and when should it be communicated? This is a question that is considered by the common law courts. Attempts to find a moral underpinning for such a tortious action against invasions of privacy have tended to draw upon (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Download  
     
    Export citation  
     
    Bookmark  
  • What’s new about the “new surveillance”?: Classifying for change and continuity.Gary T. Marx - 2004 - Knowledge, Technology & Policy 17 (1):18-37.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Lifelogging: Privacy and empowerment with memories for life. [REVIEW]Kieron O’Hara, Mischa M. Tuffield & Nigel Shadbolt - 2008 - Identity in the Information Society 1 (1):155-172.
    The growth of information acquisition, storage and retrieval capacity has led to the development of the practice of lifelogging, the undiscriminating collection of information concerning one’s life and behaviour. There are potential problems in this practice, but equally it could be empowering for the individual, and provide a new locus for the construction of an online identity. In this paper we look at the technological possibilities and constraints for lifelogging tools, and set out some of the most important privacy, identity (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Surveillance, privacy and the ethics of vehicle safety communication technologies.M. Zimmer - 2005 - Ethics and Information Technology 7 (4):201-210.
    Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Murky conceptual waters: The public and the private. [REVIEW]Gary T. Marx - 2001 - Ethics and Information Technology 3 (3):157-169.
    In discussions on the ethics of surveillanceand consequently surveillance policy, thepublic/private distinction is often implicitlyor explicitly invoked as a way to structure thediscussion and the arguments. In thesediscussions, the distinction public and private is often treated as a uni-dimensional,rigidly dichotomous and absolute, fixed anduniversal concept, whose meaning could bedetermined by the objective content of thebehavior. Nevertheless, if we take a closerlook at the distinction in diverse empiricalcontexts we find them to be more subtle,diffused and ambiguous than suggested. Thus,the paper argues (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations