Switch to: References

Add citations

You must login to add citations.
  1. A Critique of Information Ethics.Tony Doyle - 2010 - Knowledge, Technology & Policy 23 (1-2):163-175.
    Luciano Floridi presents Information Ethics (IE) as an alternative to traditional moral theories. IE consists of two tenets. First, reality can be interpreted at numerous, mutually consistent levels of abstraction, the highest of which is information. This level, unlike the others, applies to all of reality. Second, everything, insofar as it is an information object, has some degree of intrinsic value and hence moral dignity. I criticize IE, arguing that Floridi fails to show that the moral community should be expanded (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • Using genetic information while protecting the privacy of the soul.James H. Moor - 1999 - Ethics and Information Technology 1 (4):257-263.
    Computing plays an important role in genetics (and vice versa).Theoretically, computing provides a conceptual model for thefunction and malfunction of our genetic machinery. Practically,contemporary computers and robots equipped with advancedalgorithms make the revelation of the complete human genomeimminent – computers are about to reveal our genetic soulsfor the first time. Ethically, computers help protect privacyby restricting access in sophisticated ways to genetic information.But the inexorable fact that computers will increasingly collect,analyze, and disseminate abundant amounts of genetic informationmade available through the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy and perfect voyeurism.Tony Doyle - 2009 - Ethics and Information Technology 11 (3):181-189.
    I argue that there is nothing wrong with perfect voyeurism , covert watching or listening that is neither discovered nor publicized. After a brief discussion of privacy I present attempts from Stanley Benn, Daniel Nathan, and James Moor to show that the act is wrong. I argue that these authors fail to make their case. However, I maintain that, if detected or publicized, voyeurism can do grave harm and to that extent should be severely punished. I conclude with some thoughts (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The Priority of Privacy for Medical Information.Judith Wagner DeCew - 2000 - Social Philosophy and Policy 17 (2):213.
    Individuals care about and guard their privacy intensely in many areas. With respect to patient medical records, people are exceedingly concerned about privacy protection, because they recognize that health care generates the most sensitive sorts of personal information. In an age of advancing technology, with the switch from paper medical files to massive computer databases, privacy protection for medical information poses a dramatic challenge. Given high-speed computers and Internet capabilities, as well as other advanced communications technologies, the potential for abuse (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy and policy for genetic research.Judith Wagner DeCew - 2004 - Ethics and Information Technology 6 (1):5-14.
    I begin with a discussion of the value of privacy and what we lose without it. I then turn to the difficulties of preserving privacy for genetic information and other medical records in the face of advanced information technology. I suggest three alternative public policy approaches to the problem of protecting individual privacy and also preserving databases for genetic research:(1) governmental guidelines and centralized databases, (2) corporate self-regulation, and (3) my hybrid approach. None of these are unproblematic; I discuss strengths (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations