Switch to: References

Add citations

You must login to add citations.
  1. Surveillance and persuasion.Michael Nagenborg - 2014 - Ethics and Information Technology 16 (1):43-49.
    This paper is as much about surveillance as about persuasive technologies (PTs). With regard to PTs it raises the question about the ethical limits of persuasion. It will be argued that even some forms of self-imposed persuasive soft surveillance technologies may be considered unethical. Therefore, the ethical evaluation of surveillance technologies should not be limited to privacy issues. While it will also be argued that PTs may become instrumental in pre-commitment strategies, it will also be demonstrated that the use of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Building theory from consumer reactions to RFID: discovering Connective Proximity.Anna Margulis, Harold Boeck, Ygal Bendavid & Fabien Durif - 2016 - Ethics and Information Technology 18 (2):81-101.
    Academic research into RFID technology has largely neglected ethics. What scarce research was being performed has now dwindled despite having some consumers continue to express their ethical concerns. This article aims at reducing this apparent void by exploring the antecedents that cause the public to react when consumers are targeted by RFID technology. Through the analysis of 11 real RFID implementations used to target consumers, our research indicates that several factors can influence consumer response through the distinct nature of the (...)
    Download  
     
    Export citation  
     
    Bookmark