Switch to: References

Add citations

You must login to add citations.
  1. The importance of privacy revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
    James Rachels’ seminal paper “ Why Privacy Is Important ” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Biobank research and the right to privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.
    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Defining privacy.Adam Moore - 2008 - Journal of Social Philosophy 39 (3):411-428.
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  • The ethics of algorithms: key problems and solutions.Andreas Tsamados, Nikita Aggarwal, Josh Cowls, Jessica Morley, Huw Roberts, Mariarosaria Taddeo & Luciano Floridi - 2022 - AI and Society 37 (1):215-230.
    Research on the ethics of algorithms has grown substantially over the past decade. Alongside the exponential development and application of machine learning algorithms, new ethical problems and solutions relating to their ubiquitous use in society have been proposed. This article builds on a review of the ethics of algorithms published in 2016, 2016). The goals are to contribute to the debate on the identification and analysis of the ethical implications of algorithms, to provide an updated analysis of epistemic and normative (...)
    Download  
     
    Export citation  
     
    Bookmark   46 citations  
  • Sobre el concepto de privacidad: la relación entre privacidad e intimidad.Manuel Toscano - 2017 - Isegoría 57:533.
    El derecho a la privacidad está en el centro de muchos de los debates públicos actuales. Sin embargo, a pesar de la extensa literatura filosófica y jurídica sobre el tema, no contamos con una explicación adecuada del sentido y del valor de la privacidad. Esta falta de acuerdo sobre cuestiones conceptuales y normativas ha llevado a algún autor a hablar del ‘caos de la privacidad’. Este artículo se centra en la exploración conceptual de la privacidad. Para ello, en primer lugar, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • The Internet, children, and privacy: the case against parental monitoring.Kay Mathiesen - 2013 - Ethics and Information Technology 15 (4):263-274.
    It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Epistemic restraint and the vice of curiosity.Neil C. Manson - 2012 - Philosophy 87 (2):239-259.
    In recent years there has been wide-ranging discussion of epistemic virtues. Given the value and importance of acquiring knowledge this discussion has tended to focus upon those traits that are relevant to the acquisition of knowledge. This acquisitionist focus ignores or downplays the importance of epistemic restraint: refraining from seeking knowledge. In contrast, in many periods of history, curiosity was viewed as a vice. By drawing upon critiques of curiositas in Middle Platonism and Early Christian philosophy, we gain useful insights (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Privacy as a Matter of Taste and Right.Alexander Rosenberg - 2000 - Social Philosophy and Policy 17 (2):68.
    Privacy is something we all want. We seek privacy to prevent others from securing information about us that is immediately embarrassing, and so causes us pain but not material loss. We also value privacy for strategic reasons in order to prevent others from imposing material and perhaps psychic costs upon us. I use the expression “securing information” so that it covers everything from the immediate sensory data that a voyeur acquires to the financial data a rival may acquire about our (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Piercing the veil: Ethical issues in ethnographic research.Brian Schrag - 2008 - Science and Engineering Ethics 15 (2):135-160.
    It is not unusual for researchers in ethnography (and sometimes Institutional Review Boards) to assume that research of “public” behavior is morally unproblematic. I examine an historical case of ethnographic research and the sustained moral outrage to the research expressed by the subjects of that research. I suggest that the moral outrage was legitimate and articulate some of the ethical issues underlying that outrage. I argue that morally problematic Ethnographic research of public behavior can derive from research practice that includes (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Toward an approach to privacy in public: Challenges of information technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  • Privacy in the information age: Stakeholders, interests and values. [REVIEW]Lucas Introna & Athanasia Pouloudi - 1999 - Journal of Business Ethics 22 (1):27 - 38.
    Privacy is a relational and relative concept that has been defined in a variety of ways. In this paper we offer a systematic discussion of potentially different notions of privacy. We conclude that privacy as the freedom or immunity from the judgement of others is an extremely useful concept to develop ways in which to understand privacy claims and associated risks. To this end, we develop a framework of principles that explores the interrelations of interests and values for various stakeholders (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • P2p networks and the verizon V. RIAA case: Implications for personal privacy and intellectual property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.
    In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The Ethics of Workspace Surveillance.Elin Palm - 2008 - Dissertation, Royal Institute of Technology, Stockholm
    The general framework of this thesis is that of ethical Technology Assessment. Whereas the first essay proposes an inclusive approach to technology assessment by delineating an ethical checklist, the following essays focus on two of the checklist points, i.e. “privacy” and “control, influence and power”, in relation to workspace surveillance. The core idea of Essay I is that, due to its strong social impact, new technology and novel use of existing technology should be considered from the perspective of ethics. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Self-Presentation and Privacy Online.Carissa Véliz - 2022 - Journal of Practical Ethics 2 (9):30-43.
    In this paper, I argue against views that equate privacy with control over self-presentation and explore some of the implications of my criticism for the online world. In section 1, I analyze the relationship between control over self-presentation and privacy and argue that, while they are both tightly connected, they are not one and the same thing. Distinguishing between control over self-presentation and privacy has important practical implications for the online world. In section 2, I investigate self-presentation online and argue (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Ethics of Biosurveillance.S. K. Devitt, P. W. J. Baxter & G. Hamilton - 2019 - Journal of Agricultural and Environmental Ethics 32 (5):709-740.
    Governments must keep agricultural systems free of pests that threaten agricultural production and international trade. Biosecurity surveillance already makes use of a wide range of technologies, such as insect traps and lures, geographic information systems, and diagnostic biochemical tests. The rise of cheap and usable surveillance technologies such as remotely piloted aircraft systems presents value conflicts not addressed in international biosurveillance guidelines. The costs of keeping agriculture pest-free include privacy violations and reduced autonomy for farmers. We argue that physical and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Immunity from the illegitimate focused attention of others: an explanation of our thinking and talking about privacy.Jeffery L. Johnson - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia. pp. 49--70.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy by Design in Personal Health Monitoring.Anders Nordgren - 2015 - Health Care Analysis 23 (2):148-164.
    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • What Peeping Tom Did Wrong.John Draeger - 2011 - Ethical Theory and Moral Practice 14 (1):41-49.
    Voyeurism seems creepy. This paper considers whether these feelings are well-founded. It identifies a variety of ethically troubling features, including harmful consequences, deceit, and the violation of various religious, legal, and conventional norms. Voyeurism is something of a moral misdemeanor that seems worrisome when associated with these other failings. However, because voyeurism remains troubling even in the absence of harm or deceit, we must pay special attention to the ways complex social conventions can be used to show disrespect for others. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
    I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides a (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Chips, tags and scanners: Ethical challenges for radio frequency identification. [REVIEW]Dara J. Glasser, Kenneth W. Goodman & Norman G. Einspruch - 2007 - Ethics and Information Technology 9 (2):101-109.
    Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention of identifying the technology’s benefits and possible misuses. We offer an (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • How is Political Privacy Different from Personal Privacy? An Argument from Democratic Governance.Aleksandra Samonek - 2020 - Diametros:1-14.
    In this paper I discuss the political value of the right to privacy. The classical accounts of privacy do not differentiate between privacy as the right of a citizen against other citizens vs. the right to privacy as the right against the state or the government. I shall argue that this distinction should be made, since the new context of the privacy debate has surpassed the historical frames in which the intelligence methods used by governments were comparable to those available (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Why Extending Actions through Time Can Violate a Moral Right to Privacy.Björn Lundgren - 2021 - Journal of Ethics and Social Philosophy 20 (1):111-118.
    Recently, Ingmar Persson and Julian Savulescu argued that an action that does not violate a moral right to privacy cannot violate that right if it is extended over time. Specifically, they argue that a moral right to privacy does not protect against gawking or stalking. In this reply the reverse position is defended. Specifically, it is argued that their arguments fails on according to their own definition of the right to privacy. Furthermore, it is argued and illustrated by examples that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy Invasion by the News Media: Three Ethical Models.Candace Cummins Gauthier - 2002 - Journal of Mass Media Ethics 17 (1):20-34.
    In this article I provide an overview of philosophical conceptions of privacy and suggest 3 models to assist with the ethical analysis of privacy invasion by the news media. The models are framed by respect for persons, the comparison of harms and benefits, and the transfer of power. After describing the models, I demonstrate how they can be applied to news reporting that invades the privacy of public figures.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Anti-Theism and the Objective Meaningful Life Argument.Kirk Lougheed - 2017 - Dialogue 56 (2).
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Asking for Facebook Logins: An Egoist Case for Privacy.John R. Drake - 2016 - Journal of Business Ethics 139 (3):429-441.
    With the advent of social networking websites, privacy concerns have reached a new high. One particularly problematic concern entails employers requesting login credentials to popular social media platforms. While many people may consider this request unethical, they may not agree on the reasons it is unethical. One reason may be to blame the behavior on egoism. Egoism, however, comes in multiple flavors, not all of which would agree that violating privacy is acceptable. In this paper, we articulate how one egoist (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Review of “Private Goods, Public Goods”. [REVIEW]H. Benjamin Shaeffer - 2006 - Essays in Philosophy 7 (1):16.
    Download  
     
    Export citation  
     
    Bookmark  
  • Emerging Ethical Issues in Living Labs.FaustoJ Sainz - 2012 - Ramon Llull Journal of Applied Ethics 3 (3):47.
    Living labs represent an important step in the development of research solutions based on the inclusive design paradigm. To ensure participants' rights and the adoption of an ethical approach to technological research, this paper presents some tools and strategies that comply with the needs and rights of those less advantaged groups to ensure that their rights and demands are taken into account. There is a gap in the construction and development of norms for a living lab. This article summarizes the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Where should we draw the line between quality of care and other ethical concerns related to medical registries and biobanks?Mats Hansson - 2012 - Theoretical Medicine and Bioethics 33 (4):313-323.
    Together with large biobanks of human samples, medical registries with aggregated data from many clinical centers are vital parts of an infrastructure for maintaining high standards of quality with regard to medical diagnosis and treatment. The rapid development in personalized medicine and pharmaco-genomics only underscores the future need for these infrastructures. However, registries and biobanks have been criticized as constituting great risks to individual privacy. In this article, I suggest that quality with regard to diagnosis and treatment is an inherent, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy and Control.Scott A. Davison - 1997 - Faith and Philosophy 14 (2):137-151.
    In this paper, I explore several privacy issues as they arise with respect to the divine/human relationship. First, in section 1, I discuss the notion of privacy in a general way. Section 2 is devoted to the claim that privacy involves control over information about oneself. In section 3, I summarize the arguments offered recently by Margaret Falls-Corbitt and F. Michael McLain for the conclusion that God respects the privacy of human persons by refraining from knowing certain things about them. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Right to Privacy.Lloyd L. Weinreb - 2000 - Social Philosophy and Policy 17 (2):25.
    The question that I address in this paper is whether there is a right to privacy. It is not the question whether in the United States there is a legal right to privacy or, more particularly, a constitutional right to privacy. There are any number of ordinary legal rights and specific constitutional rights that might be so described, and the U.S. Supreme Court has referred also to a generic “right to privacy” that is implicit in the U.S. Constitution. Nor is (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing of justice and the effective (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Individual autonomy and the family.Steven Robert Walker - unknown
    Thesis (Ph. D.)--University of Hawaii at Manoa, 1995.
    Download  
     
    Export citation  
     
    Bookmark  
  • Cyberspace: The final frontier? [REVIEW]Patrick Sean Liam Flanagan - 1999 - Journal of Business Ethics 19 (1):115 - 122.
    The science fiction series of the '70's, Star Trek, began all its telecastings with the announcement "Space: The Final Frontier." Star Trek chronicled the voyage of a crew navigating their way through space. For the travelers, space seemed like the last unknown entity that needed to be investigated. As they journeyed, they learned of the boundless nature of space. Each episode portrayed a group of folks encountering new situations, attempting to solve another problem, or strategizing how to overcome an obstacle.While (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy and Genetics.Madison Powers - 2002 - In Justine Burley & John Harris (eds.), A Companion to Genethics. Wiley-Blackwell. pp. 364–378.
    The prelims comprise: Introduction: Promise and Perils The History of Privacy as a Moral Concept Genetic Exceptionalism The Moral Basis of Medical Privacy Rights Genetic Paternalism Conclusion.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Ethics awareness among stakeholders in a digital technology research project. Exploring designers and participants’ relationship whith ethical issues and procedures.Fausto J. Sainz de Salces, Rhiannon Thomas & Javier Bustamante Donas - 2017 - Ramon Llull Journal of Applied Ethics 8 (8):183-206.
    In this paper we present the perceptions of those engagedin a digital research project. We explored participants’ ethical knowledge,understanding and feelings about the whole process. We also tried toimplement a plan in order to see if certain proactive actions will benefitthe understanding of ethical issues among those stakeholders.The investigation presented here explored the need for ethical awarenessamong stakeholders in technology research projects.1 The Project tried to overcome the existing accessibility barriers faced by people unfamiliarwith ICT, people with disabilities and older (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva - An Internet Journal of Philosophy 9 (1).
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of solitude, intimacy and confidentiality and shows that, so described, people have legitimate interests in privacy. These interests are both personal and political, and provide the grounds for two different justifications of privacy rights. Though both are based on democratic concerns for the freedom and equality of individuals, these two justifications for privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • The transparent self.Marjolein Lanzing - 2016 - Ethics and Information Technology 18 (1):9-16.
    This paper critically engages with new self-tracking technologies. In particular, it focuses on a conceptual tension between the idea that disclosing personal information increases one’s autonomy and the idea that informational privacy is a condition for autonomous personhood. I argue that while self-tracking may sometimes prove to be an adequate method to shed light on particular aspects of oneself and can be used to strengthen one’s autonomy, self-tracking technologies often cancel out these benefits by exposing too much about oneself to (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Intimacy, Privacy and Publicity.Ernesto Garzón Valdés - 2003 - Analyse & Kritik 25 (1):17-40.
    The article analyses the distinction between the private and the public sphere from a conceptual and from a normative point of view. On the conceptual level, it is argued that the common dichotomous view is incomplete, giving rise to conceptual confusions which can be overcome by a careful distinction between the intimate and the private sphere. While the boundary between the private and the public is a conventional matter, the sphere of intimacy, including thoughts as well as a certain type (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Pluralism about the Value of Privacy.William Bülow - 2011 - International Review of Information Ethics 16:12.
    Download  
     
    Export citation  
     
    Bookmark  
  • Agreeing in Ignorance: Mapping the Routinisation of Consent in ICT-Services.Thomas Ploug & Søren Holm - 2014 - Science and Engineering Ethics 20 (4):1097-1110.
    Many ICT services require that users explicitly consent to conditions of use and policies for the protection of personal information. This consent may become ‘routinised’. We define the concept of routinisation and investigate to what extent routinisation occurs as well as the factors influencing routinisation in a survey study of internet use. We show that routinisation is common and that it is influenced by factors including gender, age, educational level and average daily internet use. We further explore the reasons users (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Bibliographical essay / privacy and criminal justice policies.Ferdinand D. Schoeman - 1983 - Criminal Justice Ethics 2 (2):71-82.
    Download  
     
    Export citation  
     
    Bookmark