Switch to: References

Add citations

You must login to add citations.
  1. Net Recommendation: Prudential Appraisals of Digital Media and the Good life.Pak-Hang Wong - 2012 - Dissertation, University of Twente
    Digital media has become an integral part of people’s lives, and its ubiquity and pervasiveness in our everyday lives raise new ethical, social, cultural, political, economic and legal issues. Many of these issues have primarily been dealt with in terms of what is ‘right’ or ‘just’ with digital media and digitally-mediated practices, and questions about the relations between digital media and the good life are often left in the background. In short, what is often missing is an explicit discussion of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral responsibilities (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data.Gordon Hull - 2015 - Ethics and Information Technology 17 (2):89-101.
    The “privacy paradox” refers to the discrepancy between the concern individuals express for their privacy and the apparently low value they actually assign to it when they readily trade personal information for low-value goods online. In this paper, I argue that the privacy paradox masks a more important paradox: the self-management model of privacy embedded in notice-and-consent pages on websites and other, analogous practices can be readily shown to underprotect privacy, even in the economic terms favored by its advocates. The (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Confucian Social Media: An Oxymoron?Pak-Hang Wong - 2013 - Dao: A Journal of Comparative Philosophy 12 (3):283-296.
    International observers and critics often attack China's Internet policy on the basis of liberal values. If China's Internet is designed and built on Confucian values that are distinct from, and sometimes incompatible to, liberal values, then the liberalist critique ought to be reconsidered. In this respect, Mary Bockover's “Confucian Values and the Internet: A Potential Conflict” appears to be the most direct attempt to address this issue. Yet, in light of developments since its publication in 2003, it is time to (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Are publicly available (personal) data “up for grabs”? Three privacy arguments.Elisa Orrù - 2024 - In Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta (eds.), Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World. London: Hart. pp. 105-123.
    The re-use of publicly available (personal) data for originally unanticipated purposes has become common practice. Without such secondary uses, the development of many AI systems like large language models (LLMs) and ChatGPT would not even have been possible. This chapter addresses the ethical implications of such secondary processing, with a particular focus on data protection and privacy issues. Legal and ethical evaluations of secondary processing of publicly available personal data diverge considerably both among scholars and the general public. While some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy self-management and the issue of privacy externalities: of thwarted expectations, and harmful exploitation.Simeon de Brouwer - 2020 - Internet Policy Review 9 (4).
    This article argues that the self-management of one’s privacy is impossible due to privacy externalities. Privacy externalities are the negative by-product of the services offered by some data controllers, whereby the price to ‘pay’ for a service includes not just the provision of the user’s own personal data, but also that of others. This term, related to similar concepts from the literature on privacy such as ‘networked privacy’ or ‘data pollution’, is used here to bring to light the incentives and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Information technology and privacy: conceptual muddles or privacy vacuums? [REVIEW]Kirsten Martin - 2012 - Ethics and Information Technology 14 (4):267-284.
    Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • “Privacy by default” and active “informed consent” by layers.Amaya Noain-Sánchez - 2016 - Journal of Information, Communication and Ethics in Society 14 (2):124-138.
    Purpose The purpose of this paper is to lay out an approach to addressing the problem of privacy protection in the global digital environment based on the importance that information has to improve users’ informational self-determination. Following this reasoning, this paper focuses on the suitable way to provide user with the correct amount of information they may need to maintain a desirable grade of autonomy as far as their privacy protection is concerned and decide whether or not to put their (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • A bibliometric analysis of privacy and ethics in IEEE Security and Privacy.Jonathan Tse, Dawn E. Schrader, Dipayan Ghosh, Tony Liao & David Lundie - 2015 - Ethics and Information Technology 17 (2):153-163.
    The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical and technological dimensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • (1 other version)Observations online: Finding the ethical boundaries of Facebook research.Roxana Willis - 2019 - Research Ethics 15 (1):1-17.
    Informed consent may be unobtainable in online contexts. This article examines the difficulties of obtaining informed consent online through a Facebook case study. It is proposed that there are at least two ways informed consent could be waived in research: first, if the data are public, and second, if the data are textual. Accordingly, the publicness of the Facebook News Feed is considered. Taking account of the wide availability of Facebook users’ data, and reflecting on how public those users perceive (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Contextual integrity’s decision heuristic and the tracking by social network sites.Rath Kanha Sar & Yeslam Al-Saggaf - 2014 - Ethics and Information Technology 16 (1):15-26.
    The findings of our experiments showed that social network sites such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Correspondents theory 1800/2000: philosophical reflections upon epistolary technics and praxis in the analogue and digital. [REVIEW]Anthony John Charles Ross - unknown
    When we talk about things like the 'lost art of letter-writing' or the 'digital communications revolution,' what do we mean? What do we lose and what do we gain as we move towards digital ways of being in the world? Critically engaging with many of the canonical writers in the philosophy of technology , and following what has been termed the 'empirical turn' in that discipline, this thesis answers such questions by means of a philosophical, comparative study of epistolary technics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • (1 other version)Observations online: Finding the ethical boundaries of Facebook research.Roxana Willis - 2019 - Research Ethics 15 (1):1-17.
    Informed consent may be unobtainable in online contexts. This article examines the difficulties of obtaining informed consent online through a Facebook case study. It is proposed that there are at least two ways informed consent could be waived in research: first, if the data are public, and second, if the data are textual. Accordingly, the publicness of the Facebook News Feed is considered. Taking account of the wide availability of Facebook users’ data, and reflecting on how public those users perceive (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations