Switch to: References

Add citations

You must login to add citations.
  1. Permissible Secrets.Hugh Lazenby & Iason Gabriel - 2018 - Philosophical Quarterly 68 (271):265-285.
    This article offers an account of the information condition on morally valid consent in the context of sexual relations. The account is grounded in rights. It holds that a person has a sufficient amount of information to give morally valid consent if, and only if, she has all the information to which she has a claim-right. A person has a claim-right to a piece of information if, and only if, a. it concerns a deal-breaker for her; b. it does not (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The transparent self.Marjolein Lanzing - 2016 - Ethics and Information Technology 18 (1):9-16.
    This paper critically engages with new self-tracking technologies. In particular, it focuses on a conceptual tension between the idea that disclosing personal information increases one’s autonomy and the idea that informational privacy is a condition for autonomous personhood. I argue that while self-tracking may sometimes prove to be an adequate method to shed light on particular aspects of oneself and can be used to strengthen one’s autonomy, self-tracking technologies often cancel out these benefits by exposing too much about oneself to (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Epistemological dimensions of informational privacy.Klemens Kappel - 2013 - Episteme 10 (2):179-192.
    It seems obvious that informational privacy has an epistemological component; privacy or lack of privacy concerns certain kinds of epistemic relations between a cogniser and sensitive pieces of information. One striking feature of the fairly substantial philosophical literature on informational privacy is that the nature of this epistemological component of privacy is only sparsely discussed. The main aim of this paper is to shed some light on the epistemological component of informational privacy.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • You’ve got a friend in me: sociable robots for older adults in an age of global pandemics.Nancy S. Jecker - 2020 - Ethics and Information Technology 23 (S1):35-43.
    Social isolation and loneliness are ongoing threats to health made worse by the coronavirus disease 2019 pandemic. During the pandemic, half the globe's population have been placed under strict physical distancing orders and many long-term care facilities serving older adults went into lockdown mode, restricting access to all visitors, including family members. Before the pandemic emerged, a 2020 National Academy of Sciences, Engineering and Medicine report warned of the underappreciated adverse effects of social isolation and loneliness on health, especially among (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy in the information age: Stakeholders, interests and values. [REVIEW]Lucas Introna & Athanasia Pouloudi - 1999 - Journal of Business Ethics 22 (1):27 - 38.
    Privacy is a relational and relative concept that has been defined in a variety of ways. In this paper we offer a systematic discussion of potentially different notions of privacy. We conclude that privacy as the freedom or immunity from the judgement of others is an extremely useful concept to develop ways in which to understand privacy claims and associated risks. To this end, we develop a framework of principles that explores the interrelations of interests and values for various stakeholders (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of our lives or shrinking it to (...)
    Download  
     
    Export citation  
     
    Bookmark   46 citations  
  • Privacy and the Right to Privacy.H. J. McCloskey - 1980 - Philosophy 55 (211):17 - 38.
    The right to privacy is one of the rights most widely demanded today. Privacy has not always so been demanded. The reasons for the present concern for privacy are complex and obscure. They obviously relate both to the possibilities for very considerable enjoyment of privacy by the bulk of people living in affluent societies brought about by twentieth-century affluence, and to the development of very efficient methods of thoroughly and systematically invading this newly found privacy. However, interesting and important as (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Download  
     
    Export citation  
     
    Bookmark  
  • Treating sensitive topics online: a privacy dilemma.Paula Helm - 2018 - Ethics and Information Technology 20 (4):303-313.
    This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Was Snowden virtuous?Clive Harfield - 2021 - Ethics and Information Technology 23 (3):373-383.
    Professor Shannon Vallor’s theoretical framework of technomoral virtue ethics identifies character traits that can be cultivated to foster a future worth wanting in an environment of emerging technologies. Such technologies and increased citizen participation in the new digital environment have reconfigured what is possible in policing and intelligence-gathering more quickly, perhaps, than sober and sensible policy reflection and formulation can keep pace with. Sensational and dramatic, seismic and devastating, the Snowden disclosures represent a particular expression of dissent against American intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Secrecy, transparency and government whistleblowing.William H. Harwood - 2017 - Philosophy and Social Criticism 43 (2):164-186.
    In the first part of the 21st century, the complicated relationship between transparency and security reached a boiling point with revelations of extra-judicial CIA activities, near universal NSA monitoring and unprecedented whistleblowing – and prosecution of whistleblowers under the Espionage Act. This article examines the dual necessities of security and transparency for any democracy, and the manner in which whistleblowers radically saddle this Janus-faced relationship. Then I will move to contemporary examples of whistleblowing, showing how and why some prove more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Where should we draw the line between quality of care and other ethical concerns related to medical registries and biobanks?Mats Hansson - 2012 - Theoretical Medicine and Bioethics 33 (4):313-323.
    Together with large biobanks of human samples, medical registries with aggregated data from many clinical centers are vital parts of an infrastructure for maintaining high standards of quality with regard to medical diagnosis and treatment. The rapid development in personalized medicine and pharmaco-genomics only underscores the future need for these infrastructures. However, registries and biobanks have been criticized as constituting great risks to individual privacy. In this article, I suggest that quality with regard to diagnosis and treatment is an inherent, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • P2p networks and the verizon V. RIAA case: Implications for personal privacy and intellectual property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.
    In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Chips, tags and scanners: Ethical challenges for radio frequency identification. [REVIEW]Dara J. Glasser, Kenneth W. Goodman & Norman G. Einspruch - 2007 - Ethics and Information Technology 9 (2):101-109.
    Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention of identifying the technology’s benefits and possible misuses. We offer an (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy and the Importance of ‘Getting Away With It’.Cressida Gaukroger - 2020 - Journal of Moral Philosophy 17 (4):416-439.
    One reason people value privacy is that it allows them to do or think bad things – things that, if made public, would warrant blame, censure, or punishment. Privacy protects several types of freedom – and one of these is the freedom to be bad. This paper will argue that this is a good thing.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy Invasion by the News Media: Three Ethical Models.Candace Cummins Gauthier - 2002 - Journal of Mass Media Ethics 17 (1):20-34.
    In this article I provide an overview of philosophical conceptions of privacy and suggest 3 models to assist with the ethical analysis of privacy invasion by the news media. The models are framed by respect for persons, the comparison of harms and benefits, and the transfer of power. After describing the models, I demonstrate how they can be applied to news reporting that invades the privacy of public figures.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Towards an alternative concept of privacy.Christian Fuchs - 2011 - Journal of Information, Communication and Ethics in Society 9 (4):220-237.
    PurposeThere are a lot of discussions about privacy in relation to contemporary communication systems (such as Facebook and other “social media” platforms), but discussions about privacy on the internet in most cases misses a profound understanding of the notion of privacy and where this notion is coming from. The purpose of this paper is to challenge the liberal notion of privacy and explore foundations of an alternative privacy conception.Design/methodology/approachA typology of privacy definitions is elaborated based on Giddens' theory of structuration. (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Wrongful Observation.Helen Frowe & Jonathan Parry - 2019 - Philosophy and Public Affairs 47 (1):104-137.
    According to common-sense morality, agents can become morally connected to the wrongdoing of others, such that they incur special obligations to prevent or rectify the wrongs committed by the primary wrongdoer. We argue that, under certain conditions, voluntary and unjustified observation of another agent’s degrading wrongdoing, or of the ‘product’ of their wrongdoing, can render an agent morally liable to bear costs for the sake of the victim of the primary wrong. We develop our account with particular reference to widespread (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • AI Recruitment Algorithms and the Dehumanization Problem.Megan Fritts & Frank Cabrera - 2021 - Ethics and Information Technology (4):1-11.
    According to a recent survey by the HR Research Institute, as the presence of artificial intelligence (AI) becomes increasingly common in the workplace, HR professionals are worried that the use of recruitment algorithms will lead to a “dehumanization” of the hiring process. Our main goals in this paper are threefold: i) to bring attention to this neglected issue, ii) to clarify what exactly this concern about dehumanization might amount to, and iii) to sketch an argument for why dehumanizing the hiring (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  • Cyberspace: The final frontier? [REVIEW]Patrick Sean Liam Flanagan - 1999 - Journal of Business Ethics 19 (1):115 - 122.
    The science fiction series of the '70's, Star Trek, began all its telecastings with the announcement "Space: The Final Frontier." Star Trek chronicled the voyage of a crew navigating their way through space. For the travelers, space seemed like the last unknown entity that needed to be investigated. As they journeyed, they learned of the boundless nature of space. Each episode portrayed a group of folks encountering new situations, attempting to solve another problem, or strategizing how to overcome an obstacle.While (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Bibliographical essay / privacy and criminal justice policies.Ferdinand D. Schoeman - 1983 - Criminal Justice Ethics 2 (2):71-82.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy and Intimacy.David Elliott & Eldon Soifer - 2010 - Journal of Value Inquiry 44 (4):489-497.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • What Peeping Tom Did Wrong.John Draeger - 2011 - Ethical Theory and Moral Practice 14 (1):41-49.
    Voyeurism seems creepy. This paper considers whether these feelings are well-founded. It identifies a variety of ethically troubling features, including harmful consequences, deceit, and the violation of various religious, legal, and conventional norms. Voyeurism is something of a moral misdemeanor that seems worrisome when associated with these other failings. However, because voyeurism remains troubling even in the absence of harm or deceit, we must pay special attention to the ways complex social conventions can be used to show disrespect for others. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Asking for Facebook Logins: An Egoist Case for Privacy.John R. Drake - 2016 - Journal of Business Ethics 139 (3):429-441.
    With the advent of social networking websites, privacy concerns have reached a new high. One particularly problematic concern entails employers requesting login credentials to popular social media platforms. While many people may consider this request unethical, they may not agree on the reasons it is unethical. One reason may be to blame the behavior on egoism. Egoism, however, comes in multiple flavors, not all of which would agree that violating privacy is acceptable. In this paper, we articulate how one egoist (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Ethics of Biosurveillance.S. K. Devitt, P. W. J. Baxter & G. Hamilton - 2019 - Journal of Agricultural and Environmental Ethics 32 (5):709-740.
    Governments must keep agricultural systems free of pests that threaten agricultural production and international trade. Biosecurity surveillance already makes use of a wide range of technologies, such as insect traps and lures, geographic information systems, and diagnostic biochemical tests. The rise of cheap and usable surveillance technologies such as remotely piloted aircraft systems presents value conflicts not addressed in international biosurveillance guidelines. The costs of keeping agriculture pest-free include privacy violations and reduced autonomy for farmers. We argue that physical and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Design for Embedding the Value of Privacy in Personal Information Management Systems.Haleh Asgarinia - 2024 - Journal of Ethics and Emerging Technologies 33 (1):1-19.
    Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around the design of privacy-friendly systems that comply with legal requirements, there has been relatively limited philosophical discourse on incorporating the value of privacy into these systems. Exploring the connection between privacy and personal autonomy illuminates the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the rise of new information and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Individual autonomy and the family.Steven Robert Walker - unknown
    Thesis (Ph. D.)--University of Hawaii at Manoa, 1995.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Privacy as Informational Commodity.Jarek Gryz - 2013 - Proceedings of IACAP Conference.
    Many attempts to define privacy have been made since the publication of the seminal paper by Warren and Brandeis (Warren & Brandeis, 1890). Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva - An Internet Journal of Philosophy 9 (1).
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of solitude, intimacy and confidentiality and shows that, so described, people have legitimate interests in privacy. These interests are both personal and political, and provide the grounds for two different justifications of privacy rights. Though both are based on democratic concerns for the freedom and equality of individuals, these two justifications for privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Data and the Good?Daniel Susser - 2022 - Surveillance and Society 20 (3):297-301.
    Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new “sociotechnical imaginaries,” new understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of the technology industry’s (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Immunity from the illegitimate focused attention of others: an explanation of our thinking and talking about privacy.Jeffery L. Johnson - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia. pp. 49--70.
    Download  
     
    Export citation  
     
    Bookmark  
  • The Ethics of Workspace Surveillance.Elin Palm - 2008 - Dissertation, Royal Institute of Technology, Stockholm
    The general framework of this thesis is that of ethical Technology Assessment. Whereas the first essay proposes an inclusive approach to technology assessment by delineating an ethical checklist, the following essays focus on two of the checklist points, i.e. “privacy” and “control, influence and power”, in relation to workspace surveillance. The core idea of Essay I is that, due to its strong social impact, new technology and novel use of existing technology should be considered from the perspective of ethics. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Cham, Switzerland: pp. 459-474.
    Experimental design is one aspect of a scientific method. A well-designed, properly conducted experiment aims to control variables in order to isolate and manipulate causal effects and thereby maximize internal validity, support causal inferences, and guarantee reliable results. Traditionally employed in the natural sciences, experimental design has become an important part of research in the social and behavioral sciences. Experimental methods are also endorsed as the most reliable guides to policy effectiveness. Through a discussion of some of the central concepts (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Self-Presentation and Privacy Online.Carissa Véliz - 2022 - Journal of Practical Ethics 2 (9):30-43.
    In this paper, I argue against views that equate privacy with control over self-presentation and explore some of the implications of my criticism for the online world. In section 1, I analyze the relationship between control over self-presentation and privacy and argue that, while they are both tightly connected, they are not one and the same thing. Distinguishing between control over self-presentation and privacy has important practical implications for the online world. In section 2, I investigate self-presentation online and argue (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark  
  • A Framework for Analyzing and Comparing Privacy States.Alan Rubel & Ryan Biava - 2014 - JASIST: The Journal of the American Society for Information Science and Technology 65 (12):2422-2431.
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the nature and value of privacy. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, Kth Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued that the current leading definitions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethics awareness among stakeholders in a digital technology research project. Exploring designers and participants’ relationship whith ethical issues and procedures.Fausto J. Sainz de Salces, Rhiannon Thomas & Javier Bustamante Donas - 2017 - Ramon Llull Journal of Applied Ethics 8 (8):183-206.
    In this paper we present the perceptions of those engagedin a digital research project. We explored participants’ ethical knowledge,understanding and feelings about the whole process. We also tried toimplement a plan in order to see if certain proactive actions will benefitthe understanding of ethical issues among those stakeholders.The investigation presented here explored the need for ethical awarenessamong stakeholders in technology research projects.1 The Project tried to overcome the existing accessibility barriers faced by people unfamiliarwith ICT, people with disabilities and older (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Review of “Private Goods, Public Goods”. [REVIEW]H. Benjamin Shaeffer - 2006 - Essays in Philosophy 7 (1):16.
    Download  
     
    Export citation  
     
    Bookmark  
  • Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • In the Privacy of Our Streets.Carissa Véliz - 2018 - In Bryce Newell, Tjerk Timan & Bert-Jaap Koops (eds.), Surveillance, Privacy and Public Space. pp. 16-32.
    If one lives in a city and wants to be by oneself or have a private conversation with someone else, there are two ways to set about it: either one finds a place of solitude, such as one’s bedroom, or one finds a place crowded enough, public enough, that attention to each person dilutes so much so as to resemble a deserted refuge. Often, one can get more privacy in public places than in the most private of spaces. The home (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Pluralism about the Value of Privacy.William Bülow - 2011 - International Review of Information Ethics 16:12.
    Download  
     
    Export citation  
     
    Bookmark