Switch to: References

Add citations

You must login to add citations.
  1. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the rise of new information and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will then analyse the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Springer. pp. 459-474.
    Experimental design is one aspect of a scientific method. A well-designed, properly conducted experiment aims to control variables in order to isolate and manipulate causal effects and thereby maximize internal validity, support causal inferences, and guarantee reliable results. Traditionally employed in the natural sciences, experimental design has become an important part of research in the social and behavioral sciences. Experimental methods are also endorsed as the most reliable guides to policy effectiveness. Through a discussion of some of the central concepts (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy.Dorota Mokrosinska - 2018 - Law and Philosophy 37 (2):117-143.
    One of the most influential views in privacy scholarship is that privacy protects individual autonomy. On the early liberal view, the exercise of autonomy requires detachment from social and political life and privacy facilitates it. This view of privacy still informs current legal and political practice. As this view of privacy presupposes a tension between privacy and society, it is responsible for the underrating of privacy in legal and political practice. Over the last decades, liberal reflection on autonomy has shifted (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral responsibilities (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Towards an alternative concept of privacy.Christian Fuchs - 2011 - Journal of Information, Communication and Ethics in Society 9 (4):220-237.
    PurposeThere are a lot of discussions about privacy in relation to contemporary communication systems (such as Facebook and other “social media” platforms), but discussions about privacy on the internet in most cases misses a profound understanding of the notion of privacy and where this notion is coming from. The purpose of this paper is to challenge the liberal notion of privacy and explore foundations of an alternative privacy conception.Design/methodology/approachA typology of privacy definitions is elaborated based on Giddens' theory of structuration. (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Download  
     
    Export citation  
     
    Bookmark  
  • Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the analysis will have to be (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Trust and New Communication Technologies: Vicious Circles, Virtuous Circles, Possible Futures. [REVIEW]Charles M. Ess - 2010 - Knowledge, Technology & Policy 23 (3):287-305.
    I approach the philosophical analyses of the phenomenon of trust vis-à-vis online communication beginning with an overview from within the framework of computer-mediated communication (CMC) of concerns and paradigmatic failures of trust in the history of online communication. I turn to the more directly philosophical analyses of trust online by first offering an introductory taxonomy of diverse accounts of trust that have emerged over the past decade or so. In the face of important objections to the possibility of establishing and (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • What Kind of Media, and When? Public Opinion about Press Coverage of Politicians' Private Lives.Bartosz W. Wojdynski & Daniel Riffe - 2011 - Journal of Mass Media Ethics 26 (3):206 - 223.
    Respondents in a southern state telephone survey agreed that media coverage of public leaders' private lives is an important news media responsibility, with agreement greater for legacy media than for online media, and differing depending on hypothetical scenario. The data also suggest increasing tolerance for such coverage and growing belief in responsibility of media to report on private indiscretions relative to previous studies.
    Download  
     
    Export citation  
     
    Bookmark  
  • Looking to the internet for models of governance.Charles Vincent & Jean Camp - 2004 - Ethics and Information Technology 6 (3):161-173.
    If code is law then standards bodies are governments. This flawed but powerful metaphor suggests the need to examine more closely those standards bodies that are defining standards for the Internet. In this paper we examine the International Telecommunications Union, the Institute for Electrical and Electronics Engineers Standards Association, the Internet Engineering Task Force, and the World Wide Web Consortium. We compare the organizations on the basis of participation, transparency, authority, openness, security and interoperability. We conclude that the IETF and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Are New Technologies the Enemy of Privacy?Amitai Etzioni - 2007 - Knowledge, Technology & Policy 20 (2):115-119.
    Download  
     
    Export citation  
     
    Bookmark  
  • Biobank research and the right to privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.
    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Murky conceptual waters: The public and the private. [REVIEW]Gary T. Marx - 2001 - Ethics and Information Technology 3 (3):157-169.
    In discussions on the ethics of surveillanceand consequently surveillance policy, thepublic/private distinction is often implicitlyor explicitly invoked as a way to structure thediscussion and the arguments. In thesediscussions, the distinction public and private is often treated as a uni-dimensional,rigidly dichotomous and absolute, fixed anduniversal concept, whose meaning could bedetermined by the objective content of thebehavior. Nevertheless, if we take a closerlook at the distinction in diverse empiricalcontexts we find them to be more subtle,diffused and ambiguous than suggested. Thus,the paper argues (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms.Kirsten Martin - 2020 - Business Ethics Quarterly 30 (1):65-96.
    ABSTRACT:The oft-cited privacy paradox is the perceived disconnect between individuals’ stated privacy expectations, as captured in surveys, and consumer market behavior in going online: individuals purport to value privacy yet still disclose information to firms. The goal of this paper is to empirically examine the conceptualization of privacy postdisclosure assumed in the privacy paradox. Contrary to the privacy paradox, the results here suggest consumers retain strong privacy expectations even after disclosing information. Privacy violations are valued akin to security violations in (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy Invasion by the News Media: Three Ethical Models.Candace Cummins Gauthier - 2002 - Journal of Mass Media Ethics 17 (1):20-34.
    In this article I provide an overview of philosophical conceptions of privacy and suggest 3 models to assist with the ethical analysis of privacy invasion by the news media. The models are framed by respect for persons, the comparison of harms and benefits, and the transfer of power. After describing the models, I demonstrate how they can be applied to news reporting that invades the privacy of public figures.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • What’s new about the “new surveillance”?: Classifying for change and continuity.Gary T. Marx - 2004 - Knowledge, Technology & Policy 17 (1):18-37.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Designing databases that enhance people’s privacy without hindering organizations: Towards informational self-determination.Thomas B. Hodel-Widmer - 2006 - Ethics and Information Technology 8 (1):3-15.
    We argue that future database systems must provide autonomy for individuals for the privacy of data they manage. We propose a design for such a system, identify challenges and problems, and suggest some approaches to these. We enunciate the reasons for informational self-determination systems, which include legal, organizational and technical issues. Our main goal is to achieve a widely-accepted realistic and practical solution in order to ensure privacy for individuals in our future world, yet without hindering business and security.
    Download  
     
    Export citation  
     
    Bookmark  
  • The Portable Home: The Domestication of Public Space.Krishan Kumar & Ekaterina Makarova - 2008 - Sociological Theory 26 (4):324-343.
    Much commentary indicates that, starting from the 19th century, the home has become the privileged site of private life. In doing so it has established an increasingly rigid separation between the private and public spheres. This article does not disagree with this basic conviction. But we argue that, in more recent times, there has been a further development, in that the private life of the home has been carried into the public sphere--what we call "the domestication of public space." This (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • (2 other versions)Privacy Rights On The Internet.Norman E. Bowie & Karim Jamal - 2006 - Business Ethics Quarterly 16 (3):323-342.
    Consumer surveys indicate that concerns about privacy are a principal factor discouraging consumers from shopping online. The keypublic policy issue regarding privacy is whether the US should follow its current self-regulation course (where the FTC encourages websites to obtain private “privacy web-seals”), or whether a European style formal legal regulation approach should be adopted in the US.We conclude that the use of assurance seals has worked reasonably well and websites should be free to decide whether they have aprivacy seal or (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Privacy online.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (4):11-19.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Research in the Biotech Age: Can Informational Privacy Compete?Wilhelm Peekhaus - 2008 - Bulletin of Science, Technology and Society 28 (1):48-59.
    This article examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government's broader neoliberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational privacy and the need for medical information for research purposes. Consideration is given to the debate about whether privacy for medical information serves or hinders the “public good” in respect of medical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Medical Records: Enhancing Privacy, Preserving the Common Good.Amitai Etzioni - 1999 - Hastings Center Report 29 (2):14.
    Personal medical information is now bought and sold on the open market. Companies use it to make hiring and firing decisions and to identify customers for new products. The justification for providing such access to medical information is that doing so benefits the public by securing public safety, controlling costs, and supporting medical research. And individuals have supposedly consented to it. But we can achieve the common goods while better protecting privacy by making institutional changes in the way information is (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • (1 other version)Genetic Exceptionalism vs. Paradigm Shift: Lessons from HIV.Lainie Friedman Ross - 2001 - Journal of Law, Medicine and Ethics 29 (2):141-148.
    The term “exceptionalism” was introduced into health care in 1991 when Bayer described “HIV exceptionalism” as the policy of treating the human immunodeficiency virus different from other infectious diseases, particularly other sexually transmitted diseases. It was reflected in the following practices: pre- and post-HIV test counseling, the development of specific separate consent forms for HIV testing, and stringent requirements for confidentiality of HIV test results. The justification for these practices was the belief that testing was essential for prevention and that (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Personal data are political. A feminist view on privacy and big data.Sara Suárez-Gonzalo - 2019 - Recerca.Revista de Pensament I Anàlisi 24 (2):173-192.
    The second-wave feminist critique of privacy defies the liberal opposition between the public-political and the private-personal. Feminist thinkers such as Hanisch, Young or Fraser note that, according to this liberal conception, public institutions often keep asymmetric power relations between private agents away from political discussion and action. The resulting subordination of some agents to others tends, therefore, to be naturalised and redefined as a «personal problem». Drawing on these contributions, this article reviews the social and political implications of big data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • (1 other version)Intercultural information ethics.Rafael Capurro - 2008 - In Elizabeth A. Buchanan (ed.), Case Studies in Library and Information Science Ethics. Mcfarland & Co.. pp. 10.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • On a communitarian approach to bioethics.Amitai Etzioni - 2011 - Theoretical Medicine and Bioethics 32 (5):363-374.
    A communitarian approach to bioethics adds a core value to a field that is often more concerned with considerations of individual autonomy. Some interpretations of liberalism put the needs of the patient over those of the community; authoritarian communitarianism privileges the needs of society over those of the patient. Responsive communitarianism’s main starting point is that we face two conflicting core values, autonomy and the common good, and that neither should be a priori privileged, and that we have principles and (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • SMEs, Social Capital and the Common Good.Laura J. Spence & René Schmidpeter - 2003 - Journal of Business Ethics 45 (1/2):93 - 108.
    In this paper we report on empirical research which investigates social capital of Small and Medium Sized Enterprises (SMEs). Bringing an international perspective to the work, we make a comparison between 30 firms located in West London and Munich in the sectors of food manufacturing/production, marketing services and garages. Here we present 6 case studies, which we use to illustrate the early findings from this pilot project. We identify differences in approach to associational membership in Germany and the U.K., with (...)
    Download  
     
    Export citation  
     
    Bookmark   52 citations  
  • Empowering the Invisible: Women, Local Culture and Global Human Rights Protection.Sirkku K. Hellsten - 2010 - Thought and Practice: A Journal of the Philosophical Association of Kenya 2 (1):37-57.
    This paper examines the problems that various contemporary human rights discourses face with relativism, with special reference to the global protection of women’s rights. These problems are set within the theoretical debate between the Western liberal individualism on the one hand, and African, Asian and Islamic collectivist communitarianism on the other. Instead of trying to prove the superiority of one theoretical approach over the other, the purpose here is to point out some of the most common logical fallacies and cultural (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Social capital: a review from an ethics perspective.Angela Ayios, Ronald Jeurissen, Paul Manning & Laura J. Spence - 2013 - Business Ethics: A European Review 23 (1):108-124.
    Social capital has as its key element the value of social relationships to generate positive outcomes, both for the key parties involved and for wider society. Some authors have noted that social capital nevertheless has a dark side. There is a moral element to such a conceptualisation, yet there is scarce discussion of ethics within the social capital literature. In this paper ethical theory is applied to four traditions or approaches to economic social capital: neo-capitalism; network/reputation; neo-Tocquevellian; and development. Each (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Introduction.Bart van der Sloot - 2016 - Ethics and Information Technology 18 (1):1-7.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Audience surveillance and the right to anonymous reading in interactive media.Lemi Baruh - 2004 - Knowledge, Technology & Policy 17 (1):59-73.
    Download  
     
    Export citation  
     
    Bookmark  
  • Treating sensitive topics online: a privacy dilemma.Paula Helm - 2018 - Ethics and Information Technology 20 (4):303-313.
    This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Book Review: The Limits of Privacy. [REVIEW]Beverly Woodward - 1999 - Journal of Law, Medicine and Ethics 27 (2):194-195.
    Download  
     
    Export citation  
     
    Bookmark  
  • A critical contribution to theoretical foundations of privacy studies.Thomas Allmer - 2011 - Journal of Information, Communication and Ethics in Society 9 (2):83-101.
    PurposeAlthough there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there is a gap in the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations