Switch to: References

Add citations

You must login to add citations.
  1. A framework for the ethical impact assessment of information technology.David Wright - 2011 - Ethics and Information Technology 13 (3):199-226.
    This paper proposes a framework for an ethical impact assessment which can be performed in regard to any policy, service, project or programme involving information technology. The framework is structured on the four principles posited by Beauchamp and Childress together with a separate section on privacy and data protection. The framework identifies key social values and ethical issues, provides some brief explanatory contextual information which is then followed by a set of questions aimed at the technology developer or policy-maker to (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • Facing the future: Seeking ethics for everyday surveillance. [REVIEW]David Lyon - 2001 - Ethics and Information Technology 3 (3):171-180.
    Surveillance has become a routine, everyday occurrence ininformational societies. Many agencies have an interest in personal data, and a wide spectrum of them use searchabledatabases to classify and catalogue such data. From policingto welfare to the Internet and e-commerce, personal data havebecome very valuable, economically and administratively. Whilequestions of privacy are indeed raised by such surveillance,the processes described here have as much to do with social sorting,and thus present new problems of automated categorization of datasubjects. Privacy and data protection measures (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Technology ethics assessment: Politicising the ‘Socratic approach’.Robert Sparrow - 2023 - Business Ethics, the Environment and Responsibility (2):454-466.
    That technologies may raise ethical issues is now widely recognised. The ‘responsible innovation’ literature – as well as, to a lesser extent, the applied ethics and bioethics literature – has responded to the need for ethical reflection on technologies by developing a number of tools and approaches to facilitate such reflection. Some of these instruments consist of lists of questions that people are encouraged to ask about technologies – a methodology known as the ‘Socratic approach’. However, to date, these instruments (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Eye for an Eye: Proportionality and Surveillance.Kevin Macnish - 2015 - Ethical Theory and Moral Practice 18 (3):529-548.
    It is often claimed that surveillance should be proportionate, but it is rarely made clear exactly what proportionate surveillance would look like beyond an intuitive sense of an act being excessive. I argue that surveillance should indeed be proportionate and draw on Thomas Hurka’s work on proportionality in war to inform the debate on surveillance. After distinguishing between the proportionality of surveillance per se, and surveillance as a particular act, I deal with objections to using proportionality as a legitimate ethical (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Just Surveillance? Towards a Normative Theory of Surveillance.Kevin Macnish - 2014 - Surveillance and Society 12 (1):142-153.
    Despite recent growth in surveillance capabilities there has been little discussion regarding the ethics of surveillance. Much of the research that has been carried out has tended to lack a coherent structure or fails to address key concerns. I argue that the just war tradition should be used as an ethical framework which is applicable to surveillance, providing the questions which should be asked of any surveillance operation. In this manner, when considering whether to employ surveillance, one should take into (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Portable Digital Devices: Meeting Challenges to Psychotherapeutic Privacy.Daniel O. Taube - 2013 - Ethics and Behavior 23 (2):81-97.
    Portable digital devices, such as smartphones, tablets, and netbooks, now permeate our society. These devices allow substantial efficiencies in access to and communication of information by mental health professionals. They also bring with them risks to psychotherapist–client privacy. This article reviews these threats and offers suggestions as to their mitigation.
    Download  
     
    Export citation  
     
    Bookmark  
  • To Each Technology Its Own Ethics: The Problem of Ethical Proliferation.Henrik Skaug Sætra & John Danaher - 2022 - Philosophy and Technology 35 (4):1-26.
    Ethics plays a key role in the normative analysis of the impacts of technology. We know that computers in general and the processing of data, the use of artificial intelligence, and the combination of computers and/or artificial intelligence with robotics are all associated with ethically relevant implications for individuals, groups, and society. In this article, we argue that while all technologies are ethically relevant, there is no need to create a separate ‘ethics of X’ or ‘X ethics’ for each and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Out of Proportion? On Surveillance and the Proportionality Requirement.Kira Vrist Rønn & Kasper Lippert-Rasmussen - 2020 - Ethical Theory and Moral Practice 23 (1):181-199.
    In this article, we critically scrutinize the principle of proportionality when used in the context of security and government surveillance. We argue that McMahan’s distinction from just warfare between narrow proportionality and wide proportionality can generally apply to the context of surveillance. We argue that narrow proportionality applies more or less directly to cases in which the surveilled is liable and that the wide proportionality principle applies to cases characterized by ‘collateral intrusion’. We argue, however, that a more demanding criterion (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Holding the Project Accountable: Research Governance, Ethics, and Democracy.Matthias Leese - 2017 - Science and Engineering Ethics 23 (6):1597-1616.
    This paper seeks to address research governance by highlighting the notion of public accountability as a complementary tool for the establishment of an ethical resonance space for emerging technologies. Public accountability can render development and design process of emerging technologies transparent through practices of holding those in charge of research accountable for their actions, thereby fostering ethical engagement with their potential negative consequences or side-effects. Through practices such as parliamentary questions, audits, and open letters emerging technologies could be effectively rendered (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Murky conceptual waters: The public and the private. [REVIEW]Gary T. Marx - 2001 - Ethics and Information Technology 3 (3):157-169.
    In discussions on the ethics of surveillanceand consequently surveillance policy, thepublic/private distinction is often implicitlyor explicitly invoked as a way to structure thediscussion and the arguments. In thesediscussions, the distinction public and private is often treated as a uni-dimensional,rigidly dichotomous and absolute, fixed anduniversal concept, whose meaning could bedetermined by the objective content of thebehavior. Nevertheless, if we take a closerlook at the distinction in diverse empiricalcontexts we find them to be more subtle,diffused and ambiguous than suggested. Thus,the paper argues (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • An Ethical Framework for Hacking Operations.Ross W. Bellaby - 2021 - Ethical Theory and Moral Practice 24 (1):231-255.
    In recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical challenges in online research: Public/private perceptions.Lisa Sugiura, Rosemary Wiles & Catherine Pope - 2017 - Research Ethics 13 (3-4):184-199.
    With its wealth of readily and often publicly available information about Web users’ lives, the Web has created new opportunities for conducting online research. Although digital data are easily accessible, ethical guidelines are inconsistent about how researchers should use them. Some academics claim that traditional ethical principles are sufficient and applicable to online research. However, the Web poses new challenges that compel researchers to reconsider concerns of consent, privacy and anonymity. Based on doctoral research into the investigation of online medicine (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • What’s new about the “new surveillance”?: Classifying for change and continuity.Gary T. Marx - 2004 - Knowledge, Technology & Policy 17 (1):18-37.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Technology and ethical dilemmas in a medical setting: Privacy, professional autonomy, life and death. [REVIEW]Gloria Lankshear & David Mason - 2001 - Ethics and Information Technology 3 (3):223-233.
    A growing literature addresses the ethical implications of electronic surveillance at work, frequently assigning ethical priority to values such as the right to privacy. This paper suggests that, in practice, the issues are sociologically more complex than some accounts suggest. This is because many workplace electronic technologies not designed or deployed for surveillance purposes nevertheless embody surveillance capacity. This capacity may not be immediately obvious to participants or lend itself to simple deployment. Moreover, because of their primary functions, such systems (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations