Switch to: References

Add citations

You must login to add citations.
  1. Why privacy is not enough privacy in the context of “ubiquitous computing” and “big data”.Tobias Matzner - 2014 - Journal of Information, Communication and Ethics in Society 12 (2):93-106.
    Purpose – Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been suggested, the paper aims to argue that people acting in full conformity to those privacy norms still can infringe the privacy of others in the context of ubiquitous computing and “big data”. Design/methodology/approach – New threats to privacy are described. Helen Nissenbaum's concept of “privacy as contextual integrity” is reviewed concerning (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Computer Ethics as a Field of Applied Ethics.Herman T. Tavani - 2012 - Journal of Information Ethics 21 (2):52-70.
    The present essay includes an overview of key milestones in the development of computer ethics as a field of applied ethics. It also describes the ongoing debate about the proper scope of CE, as a subfield both in applied ethics and computer science. Following a brief description of the cluster of ethical issues that CE scholars and practitioners have generally considered to be the standard or "mainstream" issues comprising the field thus far, the essay speculates about the future direction of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Contextual integrity’s decision heuristic and the tracking by social network sites.Rath Kanha Sar & Yeslam Al-Saggaf - 2014 - Ethics and Information Technology 16 (1):15-26.
    The findings of our experiments showed that social network sites such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations