- Correspondents theory 1800/2000: philosophical reflections upon epistolary technics and praxis in the analogue and digital. [REVIEW]Anthony John Charles Ross - unknowndetails
|
|
Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.details
|
|
Granny and the robots: ethical issues in robot care for the elderly.Amanda Sharkey & Noel Sharkey - 2012 - Ethics and Information Technology 14 (1):27-40.details
|
|
“But the data is already public”: on the ethics of research in Facebook.Michael Zimmer - 2010 - Ethics and Information Technology 12 (4):313-325.details
|
|
Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.details
|
|
Surveillance, privacy and the ethics of vehicle safety communication technologies.M. Zimmer - 2005 - Ethics and Information Technology 7 (4):201-210.details
|
|
Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.details
|
|
Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.details
|
|
Inferences and the Right to Privacy.Jakob Mainz - 2024 - Journal of Value Inquiry 58 (4):563-581.details
|
|
Government Surveillance, Privacy, and Legitimacy.Peter Königs - 2022 - Philosophy and Technology 35 (1):1-22.details
|
|
Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets.details
|
|
Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.details
|
|
Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms.Kirsten Martin - 2020 - Business Ethics Quarterly 30 (1):65-96.details
|
|
The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.details
|
|
Anonymity, Pseudonymity, and Deliberation: Why Not Everything Should Be Connected.Alfred Moore - 2017 - Journal of Political Philosophy 26 (2):169-192.details
|
|
Ethical aspects of facial recognition systems in public places.Philip Brey - 2004 - Journal of Information, Communication and Ethics in Society 2 (2):97-109.details
|
|
Privacy, public health, and controlling medical information.Adam D. Moore - 2010 - HEC Forum 22 (3):225-240.details
|
|
Online file sharing: resolving the tensions between privacy and property interests.Frances S. Grodzinsky & Herman T. Tavani - 2008 - Acm Sigcas Computers and Society 38 (4):28-39.details
|
|
Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.details
|
|
Anita Allen: Unpopular privacy: what must we hide?: Oxford University Press, Oxford, New York, 2011, xv + 259 pp, ISBN: 978-0195141375. [REVIEW]Tony Doyle - 2013 - Ethics and Information Technology 15 (1):63-67.details
|
|
Public anonymity and the connected world.Tony Doyle & Judy Veranas - 2014 - Ethics and Information Technology 16 (3):207-218.details
|
|
An Institutionalist Approach to AI Ethics: Justifying the Priority of Government Regulation over Self-Regulation.Thomas Ferretti - 2022 - Moral Philosophy and Politics 9 (2):239-265.details
|
|
Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.details
|
|
Information ethics in the context of smart devices.Brian Roux & Michael Falgoust - 2013 - Ethics and Information Technology 15 (3):183-194.details
|
|
Some ethical reflections on cyberstalking.Frances S. Grodzinsky & Herman T. Tavani - 2002 - Acm Sigcas Computers and Society 32 (1):22-32.details
|
|
Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.details
|
|
Privacy as life, liberty, property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.details
|
|
The state of computer ethics as a philosophical field of inquiry: Some contemporary perspectives, future projections, and current resources. [REVIEW]Herman T. Tavani - 2001 - Ethics and Information Technology 3 (2):97-108.details
|
|
Are publicly available (personal) data “up for grabs”? Three privacy arguments.Elisa Orrù - 2024 - In Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta (eds.), Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World. London: Hart. pp. 105-123.details
|
|
Privatheit und Identifizierbarkeit - Warum die Verbreitung anonymer Daten die Privatheit verletzen kann.Philipp Schwind - forthcoming - Zeitschrift Für Ethik Und Moralphilosophie.details
|
|
Legal conventionalism in the U.s. Constitutional law of privacy*: Mark Tushnet.Mark Tushnet - 2000 - Social Philosophy and Policy 17 (2):141-164.details
|
|
(In)visibility Before Privacy: A Theological Ethics of Surveillance as Social Sorting.Eric Stoddart - 2014 - Studies in Christian Ethics 27 (1):33-49.details
|
|
Research ethics in internet-enabled research: Human subjects issues and methodological myopia. [REVIEW]Joseph B. Walther - 2002 - Ethics and Information Technology 4 (3):205-216.details
|
|
Can You Hear Me Now? Audio and Visual Interactions That Change App Choices.Shakthidhar Reddy Gopavaram, Omkar Bhide & L. Jean Camp - 2020 - Frontiers in Psychology 11.details
|
|
Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.details
|
|
Privacy, Publicity, and the Right to Be Forgotten.Hannah Carnegy-Arbuthnott - 2023 - Journal of Political Philosophy 31 (4):494-516.details
|
|
Piercing the veil: Ethical issues in ethnographic research.Brian Schrag - 2008 - Science and Engineering Ethics 15 (2):135-160.details
|
|
Why privacy is not enough privacy in the context of “ubiquitous computing” and “big data”.Tobias Matzner - 2014 - Journal of Information, Communication and Ethics in Society 12 (2):93-106.details
|
|
The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.Fiachra O’Brolcháin, Tim Jacquemard, David Monaghan, Noel O’Connor, Peter Novitzky & Bert Gordijn - 2016 - Science and Engineering Ethics 22 (1):1-29.details
|
|
The Struggle Between Liberties and Authorities in the Information Age.Mariarosaria Taddeo - 2015 - Science and Engineering Ethics 21 (5):1125-1138.details
|
|
Privacy as Informational Commodity.Jarek Gryz - 2013 - Proceedings of IACAP Conference.details
|
|
Search engines and ethics.Herman Tavani - forthcoming - Stanford Encyclopedia of Philosophy.details
|
|
A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.details
|
|
Contextual integrity’s decision heuristic and the tracking by social network sites.Rath Kanha Sar & Yeslam Al-Saggaf - 2014 - Ethics and Information Technology 16 (1):15-26.details
|
|
Microsystems and Nanoscience for Biomedical Applications: A View to the Future.Christopher J. Backhouse, Karan V. I. S. Kaler, Timothy Caulfield, Michael D. Mehta & Linda M. Pilarski - 2004 - Bulletin of Science, Technology and Society 24 (1):40-45.details
|
|
Legal Analysis of the ALA's Support of the Freedom to Read Protection Act.Roberta Munoz - 2004 - Journal of Information Ethics 13 (2):58-77.details
|
|