Switch to: References

Add citations

You must login to add citations.
  1. Identity and distinctness in online interaction: encountering a problem for narrative accounts of self.Alexander D. Carruth & David W. Hill - 2015 - Ethics and Information Technology 17 (2):103-112.
    This paper examines the prevalent assumption that when people interact online via proxies—avatars—they encounter each other. Through an exploration of the ontology of users and their avatars we argue that, contrary to the trend within current discussions of interaction online, this cannot be unproblematically assumed. If users could be considered in some sense identical to their avatars, then it would be clear how an encounter with an avatar could ground an encounter with another user. We therefore engage in a systematic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Identity as Convention: Biometric Passports and the Promise of Security.Maren Behrensen - 2014 - Journal of Information, Communication and Ethics in Society 12 (1):44-59.
    Purpose – The paper is a conceptual investigation of the metaphysics of personal identity and the ethics of biometric passports. The paper aims to discuss these issues. Design/methodology/approach – Philosophical argument, discussing both the metaphysical and the social ethics/computer ethics literature on personal identity and biometry. Findings – The author argues for three central claims in this paper: passport are not simply representations of personal identity, they help constitute personal identity. Personal identity is not a metaphysical fact, but a set (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Challenges of ethical and legal responsibilities when technologies' uses and users change: social networking sites, decision-making capacity and dementia. [REVIEW]Rachel Batchelor, Ania Bobrowicz, Robin Mackenzie & Alisoun Milne - 2012 - Ethics and Information Technology 14 (2):99-108.
    Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms, and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Practical versus moral identities in identity management.Noëmi Manders-Huits - 2010 - Ethics and Information Technology 12 (1):43-55.
    Over the past decade Identity Management has become a central theme in information technology, policy, and administration in the public and private sectors. In these contexts the term ‘Identity Management’ is used primarily to refer to ways and methods of dealing with registration and authorization issues regarding persons in organizational and service-oriented domains. Especially due to the growing range of choices and options for, and the enhanced autonomy and rights of, employees, citizens, and customers, there is a growing demand for (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Negotiating Privacy Through Phatic Communication. A Case Study of the Blogging Self.Stine Lomborg - 2012 - Philosophy and Technology 25 (3):415-434.
    The article provides an instructive in-depth analysis of communicative practices in the personal blog. Its aim is to document the discursive dynamics and interactional ethics of blogging, with a specific focus on negotiations of the blogging self in-between public and private. Based on key findings from an empirical case study of personal blogs, the article addresses the negotiation of the blogging self from three interdependent perspectives: the network structures, patterns of interaction, and thematic orientations of the blog. Instead of approaching (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Sovereignty, privacy, and ethics in blockchain-based identity management systems.Georgy Ishmaev - 2020 - Ethics and Information Technology 23 (3):239-252.
    Self-sovereign identity solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the concept of individual control over identity relevant private data, capacity to choose where such data is stored, and the ability to provide it to those who need to validate it. It is also (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy as Informational Commodity.Jarek Gryz - 2013 - Proceedings of IACAP Conference.
    Many attempts to define privacy have been made since the publication of the seminal paper by Warren and Brandeis (Warren & Brandeis, 1890). Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy as an Asset.Jarek Gryz - 2017 - In Marcellus Mindel, Kelly Lyons & Joe Wigglesworth (eds.), Proceedings of the 27th CASCON Conference. Markham, Canada: IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a definition of informational privacy (...)
    Download  
     
    Export citation  
     
    Bookmark