Switch to: References

Add citations

You must login to add citations.
  1. Are publicly available (personal) data “up for grabs”? Three privacy arguments.Elisa Orrù - 2024 - In Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta (eds.), Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World. London: Hart. pp. 105-123.
    The re-use of publicly available (personal) data for originally unanticipated purposes has become common practice. Without such secondary uses, the development of many AI systems like large language models (LLMs) and ChatGPT would not even have been possible. This chapter addresses the ethical implications of such secondary processing, with a particular focus on data protection and privacy issues. Legal and ethical evaluations of secondary processing of publicly available personal data diverge considerably both among scholars and the general public. While some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to govern data-driven systems. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The privacy dependency thesis and self-defense.Lauritz Aastrup Munch & Jakob Thrane Mainz - 2024 - AI and Society 39 (5):2525-2535.
    If I decide to disclose information about myself, this act may undermine other people’s ability to conceal information about them. Such dependencies are called privacy dependencies in the literature. Some say that privacy dependencies generate moral duties to avoid sharing information about oneself. If true, we argue, then it is sometimes justified for others to impose harm on the person sharing information to prevent them from doing so. In this paper, we first show how such conclusions arise. Next, we show (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur (eds.), The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. First, a change in emphasis from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Digital Domination and the Promise of Radical Republicanism.Bernd Hoeksema - 2023 - Philosophy and Technology 36 (1):1-20.
    In this paper, I approach the power of digital platforms by using the republican concept of domination. More specifically, I argue that the traditional, agent-relative interpretation of domination, in the case of digital domination, is best supplemented by a more radical version, on which republicans ought to give priority to structural elements. I show how radical republicanism draws attention to (1) the economic rationales and the socio-technical infrastructures that underlie and support digital platforms and to (2) the forms of influence (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Pandemic surveillance: ethics at the intersection of information, research, and health.Daniel Susser - 2022 - In Margaret Hu (ed.), Pandemic Surveillance: Privacy, Security, and Data Ethics. Cheltenham, UK: Edward Elgar. pp. 187-196.
    This chapter provides a high-level overview of key ethical issues raised by the use of surveillance technologies, such as digital contact tracing, disease surveillance, and vaccine passports, to combat the COVID-19 pandemic. To some extent, these issues are entirely familiar. I argue that they raise old questions in new form and with new urgency, at the intersection of information ethics, research ethics, and public health. Whenever we deal with data-driven technologies, we have to ask how they fare in relation to (...)
    Download  
     
    Export citation  
     
    Bookmark