Switch to: References

Add citations

You must login to add citations.
  1. Good Proctor or “Big Brother”? Ethics of Online Exam Supervision Technologies.Simon Coghlan, Tim Miller & Jeannie Paterson - 2021 - Philosophy and Technology 34 (4):1581-1606.
    Online exam supervision technologies have recently generated significant controversy and concern. Their use is now booming due to growing demand for online courses and for off-campus assessment options amid COVID-19 lockdowns. Online proctoring technologies purport to effectively oversee students sitting online exams by using artificial intelligence systems supplemented by human invigilators. Such technologies have alarmed some students who see them as a “Big Brother-like” threat to liberty and privacy, and as potentially unfair and discriminatory. However, some universities and educators defend (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Saving the World through Sacrificing Liberties? A Critique of some Normative Arguments in Unfit for the Future.Jan Christoph Bublitz - 2016 - Neuroethics 12 (1):23-34.
    The paper critically engages with some of the normative arguments in Julian Savulescu and Ingmar Persson’s book Unfit for the Future. In particular, it scrutinizes the authors’ argument in denial of a moral right to privacy as well as their political proposal to alter humankind’s moral psychology in order to avert climate change, terrorism and to redress global injustice.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Liberal Value of Privacy.Boudewijn de Bruin - 2010 - Law and Philosophy 29 (5):505-534.
    This paper presents an argument for the value of privacy that is based on a purely negative concept of freedom only. I show that privacy invasions may decrease a person’s negative freedom as well as a person’s knowledge about the negative freedom she possesses. I argue that not only invasions that lead to actual interference, but also invasions that lead to potential interference (many cases of identity theft) constitute actual harm to the invadee’s liberty interests, and I critically examine the (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Significant Interests and the Right to Know.Reuven Brandt - 2023 - International Journal of Feminist Approaches to Bioethics 16 (1):201-213.
    In lieu of an abstract, here is a brief excerpt of the content:Significant Interests and the Right to KnowReuven Brandt (bio)1. IntroductionDaniel Groll's book Conceiving People (2021) attempts a novel and insightful defence of why individuals ought to choose open over anonymous gamete donation, barring any special circumstances. In broad strokes, the overall argument proceeds by defending three main claims: (1) that failing to disclose to children that they are donor-conceived is morally problematic, (2) that children who are informed that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Shaheen Borna & Dheeraj Sharma - 2011 - Business and Society Review 116 (3):331-353.
    Download  
     
    Export citation  
     
    Bookmark  
  • Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Perceived Access to Self-relevant Information Mediates Judgments of Privacy Violations in Neuromonitoring and Other Monitoring Technologies.D. A. Baker, N. J. Schweitzer & Evan F. Risko - 2013 - Neuroethics 7 (1):43-50.
    Advances in technology are bringing greater insight into the mind, raising a host of privacy concerns. However, the basic psychological mechanisms underlying the perception of privacy violations are poorly understood. Here, we explore the relation between the perception of privacy violations and access to information related to one’s “self.” In two studies using demographically diverse samples, we find that privacy violations resulting from various monitoring technologies are mediated by the extent to which the monitoring is thought to provide access to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Anti‐theism, the Underground Man, and Escaping Absurdity.Mark B. Anderson - 2022 - Philosophical Forum 53 (2):115-131.
    Guy Kahane holds that theism has unattractive consequences, since it threatens both privacy and autonomy. Here, I suggest that Kahane’s position echoes that of Dostoevsky’s famous Underground Man. But the Underground Man is ensnared in difficulties that resemble the problem of absurdity as developed by Thomas Nagel. Dostoevsky’s own solution to that problem involves love—but love naturally invites compromises with respect to privacy and autonomy. Perhaps the best way to solve the problem of absurdity is to make precisely the opposite (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • If There Is a Hole, It Is Not God Shaped.Guy Kahane - 2018 - In Klaas J. Kraay (ed.), Does God Matter? Essays on the Axiological Implications of Theism. pp. 95-131.
    Some people are deeply dissatisfied by the universe that modern science reveals to us. They long for the world described by traditional religion. They do not believe in God, but they wish He had existed. I argue that this is a mistake. The naturalist world we inhabit is admittedly rather bleak. It is very far from being the best of all possible worlds. But an alternative governed by God is also unwelcome, and the things that might make God’s existence attractive—cosmic (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Respecting privacy in detecting illegitimate enhancements in athletes.Sarah Teetzel - 2007 - Sport, Ethics and Philosophy 1 (2):159 – 170.
    This paper explores the degree of privacy athletes can expect and demand in the era of genetic technology in sport. Detecting genetic enhancements in sport, and consequently doping violations, using genetic tests is problematic because testing requires access to athletes' genetic information, and accessing genetic information creates many potential privacy issues and concerns throughout the world. Whether it is morally acceptable to subject athletes to the tests used to detect genetic modifications in sport is taken up in this paper, and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Undisclosed probing into decision-making capacity: a dilemma in secondary care.Sandip Talukdar - 2021 - BMC Medical Ethics 22 (1):1-14.
    BackgroundThe assessment of patients’ decision-making capacity is ubiquitous in contemporary healthcare. This paper examines the ethics of undisclosed probing of capacity by psychiatrists. The discussion will refer to the law in England and Wales, though the highlighted issues are likely to be relevant in similar jurisdictions.Main textDecision-making capacity is a private attribute, and patients may not necessarily be aware that one of their personal abilities is being explored. Routine exploration of capacity has not historically been a part of psychiatric examination, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Emotional-Freedom Defense of Schadenfreude.Earl Spurgin - 2015 - Ethical Theory and Moral Practice 18 (4):767-784.
    Schadenfreude is the emotion we experience when we obtain pleasure from others’ misfortunes. Typically, we are not proud of it and admit experiencing it only sheepishly or apologetically. Philosophers typically view it, and the disposition to experience it, as moral failings. Two recent defenders of Schadenfreude, however, argue that it is morally permissible because it stems from judgments about the just deserts of those who suffer misfortunes. I also defend Schadenfreude, but on different grounds that overcome two deficiencies of those (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Ethics of Virtual Reality Technology: Social Hazards and Public Policy Recommendations.James S. Spiegel - 2018 - Science and Engineering Ethics 24 (5):1537-1550.
    This article explores four major areas of moral concern regarding virtual reality technologies. First, VR poses potential mental health risks, including Depersonalization/Derealization Disorder. Second, VR technology raises serious concerns related to personal neglect of users’ own actual bodies and real physical environments. Third, VR technologies may be used to record personal data which could be deployed in ways that threaten personal privacy and present a danger related to manipulation of users’ beliefs, emotions, and behaviors. Finally, there are other moral and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Do patients and research subjects have a right to receive their genomic raw data? An ethical and legal analysis.Christoph Schickhardt, Henrike Fleischer & Eva C. Winkler - 2020 - BMC Medical Ethics 21 (1):1-12.
    As Next Generation Sequencing technologies are increasingly implemented in biomedical research and care, the number of study participants and patients who ask for release of their genomic raw data is set to increase. This raises the question whether research participants and patients have a legal and moral right to receive their genomic raw data and, if so, how this right should be implemented into practice. In a first step we clarify some central concepts such as “raw data”; in a second (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Neuroscience, Mind Reading and Mental Privacy.Jesper Ryberg - 2017 - Res Publica 23 (2):197-211.
    Many theorists have expressed the view that current or future applications of neurotechnology may prompt serious ethical problems in terms of privacy. This article concerns the question as to whether involuntary neurotechnological mind reading can plausibly be held to violate a person’s moral right to mental privacy. It is argued that it is difficult to specify what a violation of a right to mental privacy amounts to in a way that is consistent with the fact that we usually regard natural (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Privacy Rights and Public Information.Benedict Rumbold & James Wilson - 2018 - Journal of Political Philosophy 27 (1):3-25.
    This article concerns the nature and limits of individuals’ rights to privacy over information that they have made public. For some, even suggesting that an individual can have a right to privacy over such information may seem paradoxical. First, one has no right to privacy over information that was never private to begin with. Second, insofar as one makes once-private information public – whether intentionally or unintentionally – one waives one’s right to privacy to that information. In this article, however, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Information ethics in the context of smart devices.Brian Roux & Michael Falgoust - 2013 - Ethics and Information Technology 15 (3):183-194.
    In this paper, we employ Extended Cognition as a background for a series of thought experiments about privacy and common used information technology devices. Laptops and smart phones are now widely used devices, but current privacy standards do not adequately address the relationship between the owners of these devices and the information stored on them. Law enforcement treats laptops and smart phones are potential sources of information about criminal activity, but this treatment ignores the use of smart devices as extensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Ethics of Smart Stadia: A Stakeholder Analysis of the Croke Park Project.Fiachra O’Brolcháin, Simone de Colle & Bert Gordijn - 2019 - Science and Engineering Ethics 25 (3):737-769.
    The development of “smart stadia”, i.e. the use of “smart technologies” in the way sports stadia are designed and managed, promises to enhance the experience of attending a live match through innovative and improved services for the audience, as well as for the players, vendors and other stadium stakeholders. These developments offer us a timely opportunity to reflect on the ethical implications of the use of smart technologies and the emerging Internet of Things. The IoT has the potential to radically (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, speech, and values: what we have no business knowing.Adam D. Moore - 2016 - Ethics and Information Technology 18 (1):41-49.
    In the United States the ascendancy of speech protection is due to an expansive and unjustified view of the value or primacy of free expression and access to information. This is perhaps understandable, given that privacy has been understood as a mere interest, whereas speech rights have been seen as more fundamental. I have argued elsewhere that the “mere interest” view of privacy is false. Privacy, properly defined, is a necessary condition for human well-being or flourishing. The opening section of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, public health, and controlling medical information.Adam D. Moore - 2010 - HEC Forum 22 (3):225-240.
    This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy, turning then to consider cases which illustrate when and how privacy may be overridden by public health concerns.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, Interests, and Inalienable Rights.Adam D. Moore - 2018 - Moral Philosophy and Politics 5 (2):327-355.
    Some rights are so important for human autonomy and well-being that many scholars insist they should not be waived, traded, or abandoned. Privacy is a recent addition to this list. At the other end of the spectrum is the belief that privacy is a mere unimportant interest or preference. This paper defends a middle path between viewing privacy as an inalienable, non-waivable, non-transferrable right and the view of privacy as a mere subjective interest. First, an account of privacy is offered (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Defining privacy.Adam Moore - 2008 - Journal of Social Philosophy 39 (3):411-428.
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  • The Internet, children, and privacy: the case against parental monitoring.Kay Mathiesen - 2013 - Ethics and Information Technology 15 (4):263-274.
    It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Human Rights for the Digital Age.Kay Mathiesen - 2014 - Journal of Mass Media Ethics 29 (1):2-18.
    Human rights are those legal and/or moral rights that all persons have simply as persons. In the current digital age, human rights are increasingly being either fulfilled or violated in the online environment. In this article, I provide a way of conceptualizing the relationships between human rights and information technology. I do so by pointing out a number of misunderstandings of human rights evident in Vinton Cerf's recent argument that there is no human right to the Internet. I claim that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Inferences and the Right to Privacy.Jakob Mainz - forthcoming - Journal of Value Inquiry:1-19.
    In this paper, I defend what I call the ‘Inference Principle’. This principle holds that if an agent obtains some information legitimately, then the agent can make any inference she wants based on the information, without violating anyone’s right to privacy. This principle is interesting for at least three reasons. First, it constitutes a novel answer to the timely question of whether the widespread use of ‘data analytics’ to infer personal information about individuals is morally permissible. Second, it contradicts what (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through providing a definition (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Two Concepts of Group Privacy.Michele Loi & Markus Christen - 2020 - Philosophy and Technology 33 (2):207-224.
    Luciano Floridi was not the first to discuss the idea of group privacy, but he was perhaps the first to discuss it in relation to the insights derived from big data analytics. He has argued that it is important to investigate the possibility that groups have rights to privacy that are not reducible to the privacy of individuals forming such groups. In this paper, we introduce a distinction between two concepts of group privacy. The first, the “what happens in Vegas (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?Michele Loi, Christian Hauser & Markus Christen - 2020 - Journal of Business Ethics 175 (1):7-19.
    Clients may feel trapped into sharing their private digital data with insurance companies to get a desired insurance product or premium. However, private insurance must collect some data to offer products and premiums appropriate to the client’s level of risk. This situation creates tension between the value of privacy and common insurance business practice. We argue for three main claims: first, coercion to share private data with insurers is pro tanto wrong because it violates the autonomous choice of a privacy-valuing (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Introduction to the Special Issue on the Ethics of State Mass Surveillance.Peter Königs - 2020 - Moral Philosophy and Politics 7 (1):1-8.
    Recent decades have seen an unprecedented proliferation of surveillance programs by government agencies. This development has been driven both by technological progress, which has made large scale surveillance operations relatively cheap and easy, and by the threat of terrorism, organized crime and pandemics, which supplies a ready justification for surveillance. For a long time, mass surveillance programs have been associated with autocratic regimes, most notoriously with the German Democratic Republic and the Stasi, its secret police. A more recent case in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Government Surveillance, Privacy, and Legitimacy.Peter Königs - 2022 - Philosophy and Technology 35 (1):1-22.
    The recent decades have seen established liberal democracies expand their surveillance capacities on a massive scale. This article explores what is problematic about government surveillance by democracies. It proceeds by distinguishing three potential sources of concern: the concern that governments diminish citizens’ privacy by collecting their data, the concern that they diminish their privacy by accessing their data, and the concern that the collected data may be used for objectionable purposes. Discussing the meaning and value of privacy, the article argues (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The genetic technologies questionnaire: lay judgments about genetic technologies align with ethical theory, are coherent, and predict behaviour.Svenja Küchenhoff, Johannes Doerflinger & Nora Heinzelmann - 2022 - BMC Medical Ethics 23 (54):1-14.
    -/- Policy regulations of ethically controversial genetic technologies should, on the one hand, be based on ethical principles. On the other hand, they should be socially acceptable to ensure implementation. In addition, they should align with ethical theory. Yet to date we lack a reliable and valid scale to measure the relevant ethical judgements in laypeople. We target this lacuna. -/- We developed a scale based on ethical principles to elicit lay judgments: the Genetic Technologies Questionnaire (GTQ). In two pilot (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Epistemological dimensions of informational privacy.Klemens Kappel - 2013 - Episteme 10 (2):179-192.
    It seems obvious that informational privacy has an epistemological component; privacy or lack of privacy concerns certain kinds of epistemic relations between a cogniser and sensitive pieces of information. One striking feature of the fairly substantial philosophical literature on informational privacy is that the nature of this epistemological component of privacy is only sparsely discussed. The main aim of this paper is to shed some light on the epistemological component of informational privacy.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Secrecy, transparency and government whistleblowing.William H. Harwood - 2017 - Philosophy and Social Criticism 43 (2):164-186.
    In the first part of the 21st century, the complicated relationship between transparency and security reached a boiling point with revelations of extra-judicial CIA activities, near universal NSA monitoring and unprecedented whistleblowing – and prosecution of whistleblowers under the Espionage Act. This article examines the dual necessities of security and transparency for any democracy, and the manner in which whistleblowers radically saddle this Janus-faced relationship. Then I will move to contemporary examples of whistleblowing, showing how and why some prove more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy and perfect voyeurism.Tony Doyle - 2009 - Ethics and Information Technology 11 (3):181-189.
    I argue that there is nothing wrong with perfect voyeurism , covert watching or listening that is neither discovered nor publicized. After a brief discussion of privacy I present attempts from Stanley Benn, Daniel Nathan, and James Moor to show that the act is wrong. I argue that these authors fail to make their case. However, I maintain that, if detected or publicized, voyeurism can do grave harm and to that extent should be severely punished. I conclude with some thoughts (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Ethics of Artificial Intelligence.Stefan Buijsman, Michael Klenk & Jeroen van den Hoven - forthcoming - In Nathalie Smuha (ed.), Cambridge Handbook on the Law, Ethics and Policy of AI. Cambridge University Press.
    Artificial Intelligence (AI) is increasingly adopted in society, creating numerous opportunities but at the same time posing ethical challenges. Many of these are familiar, such as issues of fairness, responsibility and privacy, but are presented in a new and challenging guise due to our limited ability to steer and predict the outputs of AI systems. This chapter first introduces these ethical challenges, stressing that overviews of values are a good starting point but frequently fail to suffice due to the context (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A Critical Study of Four Definitions of Privacy From The Viewpoint of Western Ethics.Hamid Shahriari - 2019 - Journal of Philosophical Theological Research 21 (4):103-128.
    This article addresses four definitions of privacy. Initially, the literal meaning of privacy is mentioned; It then discusses the meaning of the term “privacy” in Ethics. The first meaning is the right to be alone and free. The second meaning of privacy is informational and is divided into two types: one is the definition based on expectation and another is a definition based on the state of awareness. The third type is the definition that defines privacy based on control. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Cybernetic Pluralism in an Emerging Global Information and Computing Ethics.Charles Ess - 2007 - International Review of Information Ethics 7:09.
    I trace the development of an emerging global Information and Computing Ethics , arguing that ethical pluralism – as found in both Western and Asian traditions – is crucial to such an ICE. In particular, ethical pluralism – as affiliated with notions of judgment , reson-ance, and harmony – holds together shared ethical norms alongside the irreducible differences that define individual and cultural identities. I demonstrate how such pluralism is already at work in both contemporary theory and praxis, including in (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark  
  • The joy of sharing knowledge: But what if there is no knowledge to share? A critical reflection on human capacity building in Africa.Johannes J. Britz - 2007 - International Review of Information Ethics 7:18-28.
    This article focuses on the current trends and initiatives in human capacity building in Africa. It takes as it starting point that human capacity development is essential for Africa to become an information and know-ledge society and therefore an equal partner in the global sharing of knowledge. Four knowledge areas are identified and discussed. These are education, research and development, brain drain and information and documentation drain. The paper concludes that there is a clear understanding in Africa that its future (...)
    Download  
     
    Export citation  
     
    Bookmark