Switch to: References

Add citations

You must login to add citations.
  1. ISPs & Rowdy Web Sites Before the Law: Should We Change Today’s Safe Harbour Clauses?Ugo Pagallo - 2011 - Philosophy and Technology 24 (4):419-436.
    The paper examines today’s debate on the new responsibilities of Internet service providers in connection with legal problems concerning jurisdiction, data processing, people’s privacy and education. The focus is foremost on the default rules and safe harbour clauses for ISPs liability, set up by the US and European legal systems. This framework is deepened in light of the different functions of the services provided on the Internet so as to highlight multiple levels of control over information and, correspondingly, different types (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • Three Roads to P2P Systems and Their Impact on Business Practices and Ethics.Ugo Pagallo & Massimo Durante - 2009 - Journal of Business Ethics 90 (S4):551 - 564.
    This article examines some of the most relevant issues concerning P2P systems so as to take sides in today's strongly polarized debate. The idea is to integrate a context-based perspective with an ontological representation of informational norms; thanks to a procedural outlook which is presented in terms of burden of proof More particularly, we examine three ''roads." First, the topological approach to complex social networks allows us to comprehend the laws according to which information is distributed through P2P systems and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Ethics among peers: file sharing on the internet between openness and precaution.U. Pagallo - 2010 - Journal of Information, Communication and Ethics in Society 8 (2):136-149.
    PurposeThe paper suggests overcoming the polarization of today's debate on peer‐to‐peer systems by defining a fair balance between the principle of precaution and the principle of openness. Threats arising from these file sharing applications‐systems should not be a pretext to limit freedom of research, speech or the right “freely to participate in the cultural life of the community”, as granted by the Universal Declaration of Human Rights from 1948. The paper aims to take sides in today's debate.Design/methodology/approachThe paper adopts an (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • A new “Ring of Gyges” and the meaning of invisibility in the information revolution.Ugo Pagallo - 2010 - Journal of Information, Communication and Ethics in Society 8 (4):364-376.
    PurposeThe paper aims to examine the profound transformations engendered by the information revolution in order to determine aspects of what should be visible or invisible in human affairs. It seeks to explore the meaning of invisibility via an interdisciplinary approach, including computer science, law, and ethics.Design/methodology/approachThe method draws on both theoretical and empirical material so as to scrutinise the ways in which today's information revolution is recasting the boundaries between visibility and invisibility.FindingsThe degrees of exposure to public notice can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Private use as fair use: is it fair?F. S. Grodzinsky & M. C. Bottis - 2007 - Acm Sigcas Computers and Society 37 (2):11-24.
    The age of digital technology has introduced new complications into the issues of fair and private use of copyrighted material. In fact, the question of private use of another's work has been transformed from a side issue in intellectual property jurisprudence into the very center of intellectual property discussions about rights and privileges in a networked world. This paper will explore the nuanced difference between fair and private use as articulated in the US and the European Copyright Laws. Part One (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and emerging (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Online file sharing: resolving the tensions between privacy and property interests.Frances S. Grodzinsky & Herman T. Tavani - 2008 - Acm Sigcas Computers and Society 38 (4):28-39.
    This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations