Switch to: References

Add citations

You must login to add citations.
  1. Respecting privacy in detecting illegitimate enhancements in athletes.Sarah Teetzel - 2007 - Sport, Ethics and Philosophy 1 (2):159 – 170.
    This paper explores the degree of privacy athletes can expect and demand in the era of genetic technology in sport. Detecting genetic enhancements in sport, and consequently doping violations, using genetic tests is problematic because testing requires access to athletes' genetic information, and accessing genetic information creates many potential privacy issues and concerns throughout the world. Whether it is morally acceptable to subject athletes to the tests used to detect genetic modifications in sport is taken up in this paper, and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • A case in studying chat rooms: Ethical and methodological concerns and approaches for enhancing positive research outcomes.Marnie Enos Carroll - 2005 - Journal of Information, Communication and Ethics in Society 3 (1):35-50.
    Increasing the ethicality of a project and the usefulness of the data enhances the probability that social good will result from the research; a combination of ethical and methodological soundness is therefore crucial. From 1999‐2002 I conducted a qualitative study of women’s, men’s, and mixed Internet chat room conversations. In this article, I discuss the particular ethical issues that arose, outlining my ethical decision‐making process within the context of current debates. I also describe the methodological concerns, demonstrating why a synthesized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Liberal Value of Privacy.Boudewijn de Bruin - 2010 - Law and Philosophy 29 (5):505-534.
    This paper presents an argument for the value of privacy that is based on a purely negative concept of freedom only. I show that privacy invasions may decrease a person’s negative freedom as well as a person’s knowledge about the negative freedom she possesses. I argue that not only invasions that lead to actual interference, but also invasions that lead to potential interference (many cases of identity theft) constitute actual harm to the invadee’s liberty interests, and I critically examine the (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Perceptions of ethics in IS: how age can affect awareness.Sara Helen Wilford & Kutoma Jacqueline Wakunuma - 2014 - Journal of Information, Communication and Ethics in Society 12 (4):270-283.
    Purpose – This aim of this paper was to highlight the awareness of ethical issues across the group of information systems professionals from a range of geographical regions. Design/methodology/approach – An initial survey was conducted that informed in-depth interviews with 26 IS professionals from across the globe. The study identified that around 70 per cent of the sample were over 50 years old. This provided an opportunity to consider age-related differences in perception regarding ethical awareness of both current and emerging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Ethics of Workspace Surveillance.Elin Palm - 2008 - Dissertation, Royal Institute of Technology, Stockholm
    The general framework of this thesis is that of ethical Technology Assessment. Whereas the first essay proposes an inclusive approach to technology assessment by delineating an ethical checklist, the following essays focus on two of the checklist points, i.e. “privacy” and “control, influence and power”, in relation to workspace surveillance. The core idea of Essay I is that, due to its strong social impact, new technology and novel use of existing technology should be considered from the perspective of ethics. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • E-mail, terrorism, and the right to privacy.Stephen Coleman - 2006 - Ethics and Information Technology 8 (1):17-27.
    This paper discusses privacy and the monitoring of e-mail in the context of the international nature of the modern world. Its three main aims are: (1) to highlight the problems involved in discussing an essentially philosophical question within a legal framework, and thus to show that providing purely legal answers to an ethical question is an inadequate approach to the problem of privacy on the Internet; (2) to discuss and define what privacy in the medium of the Internet actually is; (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Ethical Exploration of Privacy and Radio Frequency Identification.Alan R. Peslak - 2005 - Journal of Business Ethics 59 (4):327-345.
    This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Spyware – the ethics of Covert software.Mathias Klang - 2004 - Ethics and Information Technology 6 (3):193-202.
    Many computer users are happy to be oblivious of the workings within the machine and yet on some level it is important to know what is occurring therein. This paper discusses an unusual type of surveillance software which may be installed in many computers. The strange aspect of this software is that it has often been downloaded and installed by the user, but without her knowledge. The software is mainly designed to collect information about the user of the computer and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Research ethics in internet-enabled research: Human subjects issues and methodological myopia. [REVIEW]Joseph B. Walther - 2002 - Ethics and Information Technology 4 (3):205-216.
    As Internet resources are usedmore frequently for research on social andpsychological behavior, concerns grow aboutwhether characteristics of such research affecthuman subjects protections. Early efforts toaddress such concerns have done more toidentify potential problems than to evaluatethem or to seek solutions, leaving bodiescharged with human subjects oversight in aquagmire. This article critiques some of theseissues in light of the US Code of FederalRegulations' policies for the Protection ofHuman Subjects, and argues that some of theissues have no pertinence when examined in thecontext (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Miranda Rights and Cyberspace Realities: Risks to "the Right to Remain Silent".William E. Berry - 2003 - Journal of Mass Media Ethics 18 (3-4):230-249.
    This article is a critical and interpretive examination of moral and ethical issues that have emerged as the Internet and other digital information forms have evolved. It considers individual expectations of privacy for one's cyberspace communications against the greater public good for unencumbered access, by government and other organizations, to information that may be harmful to others. I argue for the need to find a reasonable balance between the individual's "right" not to disclose information that might be self-incriminating, as codified (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation