Switch to: References

Add citations

You must login to add citations.
  1. Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy.Dorota Mokrosinska - 2018 - Law and Philosophy 37 (2):117-143.
    One of the most influential views in privacy scholarship is that privacy protects individual autonomy. On the early liberal view, the exercise of autonomy requires detachment from social and political life and privacy facilitates it. This view of privacy still informs current legal and political practice. As this view of privacy presupposes a tension between privacy and society, it is responsible for the underrating of privacy in legal and political practice. Over the last decades, liberal reflection on autonomy has shifted (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of profound consequence for an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Disentangling Privacy and Intimacy: Intimate Citizenship, Private Boundaries and Public Transgressions.Paul Reynolds - 2010 - Human Affairs 20 (1):33-42.
    Disentangling Privacy and Intimacy: Intimate Citizenship, Private Boundaries and Public Transgressions Recent theorisations of transformations of intimacy—like Ken Plummer's (2003) Intimate Citizenship project—concentrate on social and cultural transformations that erode the containment of intimacy within the private sphere. They have less to say about the character of and oppositions to that erosion, and specifically how far the idea of the private stands in opposition to intimacy transgressing into the public. In this essay, the private is explored through its constitutive features—liberal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Gender and computer ethics.Alison Adam - 2000 - Acm Sigcas Computers and Society 30 (4):17-24.
    This paper reviews the relatively small body of work in computer ethics which looks at the question of whether gender makes any difference to ethical decisions. There are two strands of writing on gender and computer ethics. The first focuses on problems of women's access to computer technology; the second concentrates on whether there are differences between men and women's ethical decision making in relation to information and computing technologies. I criticize the latter area, arguing that such studies survey student (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Online file sharing: resolving the tensions between privacy and property interests.Frances S. Grodzinsky & Herman T. Tavani - 2008 - Acm Sigcas Computers and Society 38 (4):28-39.
    This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Justifying Public Health Surveillance: Basic Interests, Unreasonable Exercise, and Privacy.Alan Rubel - 2012 - Kennedy Institute of Ethics Journal 22 (1):1-33.
    Surveillance plays a crucial role in public health, and for obvious reasons conflicts with individual privacy. This paper argues that the predominant approach to the conflict is problematic, and then offers an alternative. It outlines a Basic Interests Approach to public health measures, and the Unreasonable Exercise Argument, which sets forth conditions under which individuals may justifiably exercise individual privacy claims that conflict with public health goals. The view articulated is compatible with a broad range conceptions of the value of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that the predominant accounts of privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Der Wert des Privaten für Menschen mit Demenz.Eike Buhr & Mark Schweda - 2022 - Ethik in der Medizin 34 (4):591–607.
    Zusammenfassung Der Begriff der Privatheit markiert eine erstaunliche Leerstelle in der Diskussion um die Pflege von Menschen mit Demenz (MmD). Der sonst intensiv geführte pflegeethische Diskurs über Fragen der Privatheit scheint hier nahezu vollständig zu verstummen, so als verlören MmD im Verlauf ihrer Erkrankung jedes nachvollziehbare Interesse an einer Privatsphäre und verfügten über keinerlei privaten Bereich mehr, den man bei ihrer pflegerischen Versorgung beachten oder schützen müsste. Eine solche Vorstellung widerspricht allerdings nicht nur verbreiteten moralischen Intuitionen, sondern auch den Auffassungen (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, Ethics, and Institutional Research.Alan Rubel - 2019 - New Directions in Institutional Research 2019 (183):5-16.
    Despite widespread agreement that privacy in the context of education is important, it can be difficult to pin down precisely why and to what extent it is important, and it is challenging to determine how privacy is related to other important values. But that task is crucial. Absent a clear sense of what privacy is, it will be difficult to understand the scope of privacy protections in codes of ethics. Moreover, privacy will inevitably conflict with other values, and understanding the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A Framework for Analyzing and Comparing Privacy States.Alan Rubel & Ryan Biava - 2014 - JASIST: The Journal of the American Society for Information Science and Technology 65 (12):2422-2431.
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the nature and value of privacy. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • (1 other version)Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva - An Internet Journal of Philosophy 9 (1).
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of solitude, intimacy and confidentiality and shows that, so described, people have legitimate interests in privacy. These interests are both personal and political, and provide the grounds for two different justifications of privacy rights. Though both are based on democratic concerns for the freedom and equality of individuals, these two justifications for privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • (1 other version)Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • (1 other version)Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Miranda Rights and Cyberspace Realities: Risks to "the Right to Remain Silent".William E. Berry - 2003 - Journal of Mass Media Ethics 18 (3-4):230-249.
    This article is a critical and interpretive examination of moral and ethical issues that have emerged as the Internet and other digital information forms have evolved. It considers individual expectations of privacy for one's cyberspace communications against the greater public good for unencumbered access, by government and other organizations, to information that may be harmful to others. I argue for the need to find a reasonable balance between the individual's "right" not to disclose information that might be self-incriminating, as codified (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • (1 other version)Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice.Leigh A. Clark & Sherry J. Roberts - 2010 - Journal of Business Ethics 95 (4):507-525.
    The Internet has drastically changed how people interact, communicate, conduct business, seek jobs, find partners, and shop. Millions of people are using social networking sites to connect with others, and employers are using these sites as a source of background information on job applicants. Employers report making decisions not to hire people based on the information posted on social networking sites. Few employers have policies in place to govern when and how these online character checks should be used and how (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • (1 other version)Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Shaheen Borna & Dheeraj Sharma - 2011 - Business and Society Review 116 (3):331-353.
    Download  
     
    Export citation  
     
    Bookmark  
  • (1 other version)Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Taking Responsibility for Children.Samantha Brennan & Robert Noggle (eds.) - 2007 - Wilfrid Laurier Univ. Press.
    What do we as a society, and as parents in particular, owe to our children? Each chapter in Taking Responsibility for Children offers part of an answer to that question. Although they vary in the approaches they take and the conclusions they draw, each contributor explores some aspect of the moral obligations owed to children by their caregivers. Some focus primarily on the responsibilities of parents, while others focus on the responsibilities of society and government. The essays reflect a mix (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Meddlesome Blame and Negotiating Standing.Justin Snedegar - forthcoming - Noûs.
    Blaming others for things that are not our business can attract charges of meddling and dismissals of blame. It is well known that such charges are often contentious because the content and applicability of anti-meddling norms can be difficult to nail down. This paper argues that another important source of contention is that it is often not settled in advance whether some wrongdoing is or is not the business of a would-be blamer. Thinking about the grounds of anti-meddling norms—privacy, intimacy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • (1 other version)Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice. [REVIEW]Leigh A. Clark & Sherry J. Roberts - 2010 - Journal of Business Ethics 95 (4):507 - 525.
    The Internet has drastically changed how people interact, communicate, conduct business, seek jobs, find partners, and shop. Millions of people are using social networking sites to connect with others, and employers are using these sites as a source of background information on jobapplicants.Employers report making decisions not to hire people based on the information posted on social networking sites. Few employers have policies in place to govern when and how these online character checks should be used and how to ensure (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy, Informed Consent, and Participant Observation.Julie Zahle - 2017 - Perspectives on Science 25 (4):465-487.
    In the literature on social research, adherence to the principle of informed consent is sometimes recommended on the ground that the privacy of those being studied is hereby protected. The principle has it that before becoming part of a study, a competent individual must receive information about its purpose, use, etc., and on this basis freely agree to participate. Joan Sieber motivates the employment of informed consent as a way to safeguard research participants' privacy as follows: "A research experience regarded (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Privacy as life, liberty, property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.
    The cluster of concerns usually identified asmatters of privacy can be adequately accountedfor by unpacking our natural rights to life,liberty, and property. Privacy as derived fromfundamental natural rights to life, liberty,and property encompasses the advantages of thecontrol and restricted access theories withouttheir attendant difficulties.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of using data-mining techniques, whether (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The moral value of informational privacy in cyberspace.Diane P. Michelfelder - 2001 - Ethics and Information Technology 3 (2):129-135.
    Solutions to the problem ofprotecting informational privacy in cyberspacetend to fall into one of three categories:technological solutions, self-regulatorysolutions, and legislative solutions. In thispaper, I suggest that the legal protection ofthe right to online privacy within the USshould be strengthened. Traditionally, inidentifying where support can be found in theUS Constitution for a right to informationalprivacy, the point of focus has been on theFourth Amendment; protection in this contextfinds its moral basis in personal liberty,personal dignity, self-esteem, and othervalues. On the other hand, (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • P2p networks and the verizon V. RIAA case: Implications for personal privacy and intellectual property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.
    In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy and policy for genetic research.Judith Wagner DeCew - 2004 - Ethics and Information Technology 6 (1):5-14.
    I begin with a discussion of the value of privacy and what we lose without it. I then turn to the difficulties of preserving privacy for genetic information and other medical records in the face of advanced information technology. I suggest three alternative public policy approaches to the problem of protecting individual privacy and also preserving databases for genetic research:(1) governmental guidelines and centralized databases, (2) corporate self-regulation, and (3) my hybrid approach. None of these are unproblematic; I discuss strengths (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • On the autonomy and justification of nanoethics.Fritz Allhoff - 2007 - NanoEthics 1 (3):185-210.
    In this paper, I take a critical stance on the emerging field of nanoethics. After an introductory section, “Conceptual Foundations of Nanotechnology” considers the conceptual foundations of nanotechnology, arguing that nanoethics can only be as coherent as nanotechnology itself and then discussing concerns with this latter concept; the conceptual foundations of nanoethics are then explicitly addressed in “Conceptual Foundations of Nanoethics”. “Issues in Nanoethics” considers ethical issues that will be raised through nanotechnology and, in “What’s New?”, it is argued that (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Cyberstalking and internet pornography: Gender and the gaze. [REVIEW]Alison Adam - 2002 - Ethics and Information Technology 4 (2):133-142.
    This paper is based on the premise that the analysis of some cyberethics problems would benefit from a feminist treatment. It is argued that both cyberstalking and Internet child pornography are two such areas which have a `gendered' aspect which has rarely been explored in the literature. Against a wide ranging feminist literature of potential relevance, the paper explores a number of cases through a focused approach which weaves together feminist concepts of privacy and the gaze.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Why states have no right to privacy, but may be entitled to secrecy: a non-consequentialist defense of state secrecy.Dorota Mokrosinska - 2020 - Critical Review of International Social and Political Philosophy 23 (4):415-444.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Legal conventionalism in the U.s. Constitutional law of privacy*: Mark Tushnet.Mark Tushnet - 2000 - Social Philosophy and Policy 17 (2):141-164.
    Drawing on themes important in moral and political philosophy, much of the scholarship on the constitutional law of privacy in the United States distinguishes between privacy understood as a person's control over information and privacy understood as a person's ability to make autonomous decisions. For example, Katz v. United States established the framework for analyzing whether police activity constituted a “search” subject to the Fourth Amendment's requirement that the police either obtain a warrant before conducting a search or otherwise act (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The value of privacy for people with dementia.Eike Buhr & Mark Schweda - 2022 - Ethik in der Medizin 34 (4):591-607.
    Definition of the problemThe concept of privacy has been astonishingly absent in the discussion about dementia care. In general, questions of privacy receive a lot of attention in nursing ethics; however, when it comes to dementia care, hardly any systematic ethical debate on the topic can be found. It almost seems as though people with dementia had lost any comprehensible interest in privacy and no longer had any private sphere that needed to be considered or protected. However, this not only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy, speech, and values: what we have no business knowing.Adam D. Moore - 2016 - Ethics and Information Technology 18 (1):41-49.
    In the United States the ascendancy of speech protection is due to an expansive and unjustified view of the value or primacy of free expression and access to information. This is perhaps understandable, given that privacy has been understood as a mere interest, whereas speech rights have been seen as more fundamental. I have argued elsewhere that the “mere interest” view of privacy is false. Privacy, properly defined, is a necessary condition for human well-being or flourishing. The opening section of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Strange DNA: The rise of DNA Analysis for Family Reunification and its Ethical Implications.Martin G. Weiss - 2011 - Genomics, Society and Policy 7 (1):1-20.
    DNA analysis for family reunification is a longstanding and widespread practice, but also a highly problematic one, as it is a battleground of conflicting values and interests, which have to be carefully weighed against each other: on the one hand, the right of the sovereign state to regulate immigration and prevent fraud and child trafficking; on the other hand, the right to privacy and family life. Beyond the problem of how to balance these different interests, DNA analysis for family reunification (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Health Information Privacy: A Disappearing Concept.Marcia J. Weiss - 2000 - Bulletin of Science, Technology and Society 20 (2):115-122.
    Rapid advances and exponential growth in computer and telecommunications technology have taken individual records and papers revealing the most intimate details of one’s life, habits, and genetic predisposition from the private sector into the public arena in derogation of privacy considerations. Although computerized medical information offers a means of streamlining and improving the health care delivery system through speed and enormous storage capacity, it also presents new challenges as it affects the right of privacy and expectation of confidentiality, creating serious (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy and property in the biobank context.Lars Oystein Ursin - 2010 - HEC Forum 22 (3):211-224.
    A research biobank is a collection of personal health and lifestyle information, including genetic samples of yet unknown but possibly large information potential about the participant. For the participants, the risk of taking part is not bodily harm but infringements of their privacy and the harmful consequences such infringements might have. But what do we mean by privacy? Which harms are we talking about? To address such questions we need to get a grip on what privacy is all about and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy online.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (4):11-19.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Why states have no right to privacy, but may be entitled to secrecy: a non-consequentialist defense of state secrecy.Dorota Mokrosinska - 2020 - Critical Review of International Social and Political Philosophy 23 (4):415-444.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Codes of ethics in the light of fairness and harm.Dan Munter - 2013 - Business Ethics: A European Review 22 (2):174-188.
    Nine codes of ethics from companies in the Swedish financial sector were subjected to a content analysis to determine how they address and treat employees. The codes say a great deal about employee conduct and misconduct but next to nothing about employee rights, their rightful expectations or their value to the firm. The normative analysis – echoing some of the value-based HRM literature – draws on the foundational values of respect, equality, reciprocity and care. The analysis shows that most of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Victims' Stories of Human Rights Abuse: The Ethics of Ownership, Dissemination, and Reception.Diana Tietjens Meyers - 2018 - Metaphilosophy 49 (1-2):40-57.
    This paper addresses three commentaries on Victims' Stories and the Advancement of Human Rights. In response to Vittorio Bufacchi, it argues that asking victims to tell their stories needn't be coercive or unjust and that victims are entitled to decide whether and under what conditions to tell their stories. In response to Serene Khader, it argues that empathy with victims' stories can contribute to building a culture of human rights provided that measures are taken to overcome the implicit biases and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Download  
     
    Export citation  
     
    Bookmark  
  • The Priority of Privacy for Medical Information.Judith Wagner DeCew - 2000 - Social Philosophy and Policy 17 (2):213.
    Individuals care about and guard their privacy intensely in many areas. With respect to patient medical records, people are exceedingly concerned about privacy protection, because they recognize that health care generates the most sensitive sorts of personal information. In an age of advancing technology, with the switch from paper medical files to massive computer databases, privacy protection for medical information poses a dramatic challenge. Given high-speed computers and Internet capabilities, as well as other advanced communications technologies, the potential for abuse (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations