Switch to: References

Add citations

You must login to add citations.
  1. Implications of an ethic of privacy for human-centred systems engineering.Peter J. Carew, Larry Stapleton & Gabriel J. Byrne - 2008 - AI and Society 22 (3):385-403.
    Privacy remains an intractable ethical issue for the information society, and one that is exacerbated by modern applications of artificial intelligence. Given its complicity, there is a moral obligation to redress privacy issues in systems engineering practice itself. This paper investigates the role the concept of privacy plays in contemporary systems engineering practice. Ontologically a nominalist human concept, privacy is considered from an appropriate engineering perspective: human-centred design. Two human-centred design standards are selected as exemplars of best practice, and are (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Method in computer ethics: Towards a multi-level interdisciplinary approach. [REVIEW]Philip Brey - 2000 - Ethics and Information Technology 2 (2):125-129.
    This essay considers methodological aspects ofcomputer ethics and argues for a multi-levelinterdisciplinary approach with a central role forwhat is called disclosive computer ethics. Disclosivecomputer ethics is concerned with the moraldeciphering of embedded values and norms in computersystems, applications and practices. In themethodology for computer ethics research proposed inthe essay, research takes place at three levels: thedisclosure level, in which ideally philosophers,computer scientists and social scientists collaborateto disclose embedded normativity in computer systemsand practices, the theoretical level, in whichphilosophers develop and modify (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Disclosive computer ethics.Philip Brey - 2000 - Acm Sigcas Computers and Society 30 (4):10-16.
    This essay provides a critique of mainstream computer ethics and argues for the importance of a complementary approach called disclosive computer ethics, which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. Also, four key values are proposed as starting points for disclosive studies in computer ethics: justice, autonomy, democracy and privacy. Finally, it is argued that research in disclosive computer ethics should be multi-level and interdisciplinary, distinguishing between a disclosure level, a (...)
    Download  
     
    Export citation  
     
    Bookmark   45 citations  
  • Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.
    This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the decision forest data mining algorithm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy online.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (4):11-19.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  • KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • ‘What are these researchers doing in my Wikipedia?’: ethical premises and practical judgment in internet-based ethnography.Christian Pentzold - 2017 - Ethics and Information Technology 19 (2):143-155.
    The article ties together codified ethical premises, proceedings of ethical reasoning, and field-specific ethical reflections so to inform the ethnography of an Internet-based collaborative project. It argues that instead of only obeying formal statutes, practical judgment has to account for multiple understandings of ethical issues in the research field as well as for the self-determination of reflexive participants. The article reflects on the heuristics that guided the decisions of a 4-year participant observation in the English-language and German-language editions of Wikipedia. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy for Sale—Business as Usual in the 21st Century: An Economic and Normative Critique.Wilhelm Peekhaus - 2007 - Journal of Information Ethics 16 (1):83-98.
    Download  
     
    Export citation  
     
    Bookmark  
  • Pop-Ups, Cookies, and Spam: Toward a Deeper Analysis of the Ethical Significance of Internet Marketing Practices.Daniel E. Palmer - 2005 - Journal of Business Ethics 58 (1-3):271-280.
    While e-commerce has grown rapidly in recent years, some of the practices associated with certain aspects of marketing on the Internet, such as pop-ups, cookies, and spam, have raised concerns on the part of Internet users. In this paper I examine the nature of these practices and what I take to be the underlying source of this concern. I argue that the ethical issues surrounding these Internet marketing techniques move us beyond the traditional treatment of the ethics of marketing and (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data.Gordon Hull - 2015 - Ethics and Information Technology 17 (2):89-101.
    The “privacy paradox” refers to the discrepancy between the concern individuals express for their privacy and the apparently low value they actually assign to it when they readily trade personal information for low-value goods online. In this paper, I argue that the privacy paradox masks a more important paradox: the self-management model of privacy embedded in notice-and-consent pages on websites and other, analogous practices can be readily shown to underprotect privacy, even in the economic terms favored by its advocates. The (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Privacy and perfect voyeurism.Tony Doyle - 2009 - Ethics and Information Technology 11 (3):181-189.
    I argue that there is nothing wrong with perfect voyeurism , covert watching or listening that is neither discovered nor publicized. After a brief discussion of privacy I present attempts from Stanley Benn, Daniel Nathan, and James Moor to show that the act is wrong. I argue that these authors fail to make their case. However, I maintain that, if detected or publicized, voyeurism can do grave harm and to that extent should be severely punished. I conclude with some thoughts (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Anita Allen: Unpopular privacy: what must we hide?: Oxford University Press, Oxford, New York, 2011, xv + 259 pp, ISBN: 978-0195141375. [REVIEW]Tony Doyle - 2013 - Ethics and Information Technology 15 (1):63-67.
    Download  
     
    Export citation  
     
    Bookmark