Switch to: References

Add citations

You must login to add citations.
  1. Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Social networks, the 2016 US presidential election, and Kantian ethics: applying the categorical imperative to Cambridge Analytica’s behavioral microtargeting.Ken Ward - 2018 - Journal of Media Ethics 33 (3):133-148.
    ABSTRACTThe 2016 US presidential election witnessed the development of ethically dubious methods of political persuasion built and executed on social networking sites. The following analyzes the ethics of behavioral microtargeting practices such as those of Cambridge Analytica, a company that claims to have played a central role in Donald Trump’s successful candidacy through its use of social networking sites such as Facebook. After describing Cambridge Analytica’s method of data manipulation and identifying several threats to individual autonomy posed by such practices, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy and perfect voyeurism.Tony Doyle - 2009 - Ethics and Information Technology 11 (3):181-189.
    I argue that there is nothing wrong with perfect voyeurism , covert watching or listening that is neither discovered nor publicized. After a brief discussion of privacy I present attempts from Stanley Benn, Daniel Nathan, and James Moor to show that the act is wrong. I argue that these authors fail to make their case. However, I maintain that, if detected or publicized, voyeurism can do grave harm and to that extent should be severely punished. I conclude with some thoughts (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Correspondents theory 1800/2000: philosophical reflections upon epistolary technics and praxis in the analogue and digital. [REVIEW]Anthony John Charles Ross - unknown
    When we talk about things like the 'lost art of letter-writing' or the 'digital communications revolution,' what do we mean? What do we lose and what do we gain as we move towards digital ways of being in the world? Critically engaging with many of the canonical writers in the philosophy of technology , and following what has been termed the 'empirical turn' in that discipline, this thesis answers such questions by means of a philosophical, comparative study of epistolary technics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical EU eJustice: elusive or illusionary?Juliet Lodge - 2006 - Journal of Information, Communication and Ethics in Society 4 (3):131-144.
    eJudicial cooperation is a goal of EU policy. It appears to offer procedural and technical ICT solutions to enhancing EU security. This paper outlines particular dilemmas posed by operationalising ejudicial cooperation within the EU and its member states, and assesses how political weakness is reconfigured as a problem of technical ethics. The application of biometrics and ICT based ejustice potentially bring the EU closer to the citizen without closing the confidence and trust deficit. The paper first outlines three political dilemmas (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation