Switch to: References

Add citations

You must login to add citations.
  1. Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Miranda Rights and Cyberspace Realities: Risks to "the Right to Remain Silent".William E. Berry - 2003 - Journal of Mass Media Ethics 18 (3-4):230-249.
    This article is a critical and interpretive examination of moral and ethical issues that have emerged as the Internet and other digital information forms have evolved. It considers individual expectations of privacy for one's cyberspace communications against the greater public good for unencumbered access, by government and other organizations, to information that may be harmful to others. I argue for the need to find a reasonable balance between the individual's "right" not to disclose information that might be self-incriminating, as codified (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • The Ethics of Workspace Surveillance.Elin Palm - 2008 - Dissertation, Royal Institute of Technology, Stockholm
    The general framework of this thesis is that of ethical Technology Assessment. Whereas the first essay proposes an inclusive approach to technology assessment by delineating an ethical checklist, the following essays focus on two of the checklist points, i.e. “privacy” and “control, influence and power”, in relation to workspace surveillance. The core idea of Essay I is that, due to its strong social impact, new technology and novel use of existing technology should be considered from the perspective of ethics. We (...)
    Download  
     
    Export citation  
     
    Bookmark