Switch to: References

Citations of:

An Intrusion Theory of Privacy

Res Publica 20 (2):145-161 (2014)

Add citations

You must login to add citations.
  1. Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In P. Leenes R. Van Brakel R. Gutwirth S. De Hert (ed.), Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by Design (MHbD) model. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privatheit und Identifizierbarkeit - Warum die Verbreitung anonymer Daten die Privatheit verletzen kann.Philipp Schwind - forthcoming - Zeitschrift Für Ethik Und Moralphilosophie.
    The right to privacy extends only to information through which the persons concerned are identifiable. This assumption is widely shared in law and in philosophical debate; it also guides the handling of personal data, for example, in medicine. However, this essay argues that the dissemination of anonymous information can also constitute a violation of privacy. This conclusion arises from two theses: (1) From the perspective of the affected person, judgments by others about anonymous information refer to its originator, even if (...)
    Download  
     
    Export citation  
     
    Bookmark