Switch to: References

Add citations

You must login to add citations.
  1. Cracking down on autonomy: three challenges to design in IT Law. [REVIEW]U. Pagallo - 2012 - Ethics and Information Technology 14 (4):319-328.
    The paper examines how technology challenges conventional borders of national legal systems, as shown by cases that scholars address as a part of their everyday work in the fields of information technology (IT)-Law, i.e., computer crimes, data protection, digital copyright, and so forth. Information on the internet has in fact a ubiquitous nature that transcends political borders and questions the notion of the law as made of commands enforced through physical sanctions. Whereas many of today’s impasses on jurisdiction, international conflicts (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The Changing Meaning of Privacy, Identity and Contemporary Feminist Philosophy.Janice Richardson - 2011 - Minds and Machines 21 (4):517-532.
    This paper draws upon contemporary feminist philosophy in order to consider the changing meaning of privacy and its relationship to identity, both online and offline. For example, privacy is now viewed by European Court of Human Rights (ECtHR) as a right, which when breached can harm us by undermining our ability to maintain social relations. I briefly outline the meaning of privacy in common law and under the European Convention on Human Rights (ECHR) in order to show the relevance of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Defining privacy.Adam Moore - 2008 - Journal of Social Philosophy 39 (3):411-428.
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  • In Defense of (Some) Online Echo Chambers.Douglas R. Campbell - 2023 - Ethics and Information Technology 25 (3):1-11.
    In this article, I argue that online echo chambers are in some cases and in some respects good. I do not attempt to refute arguments that they are harmful, but I argue that they are sometimes beneficial. In the first section, I argue that it is sometimes good to be insulated from views with which one disagrees. In the second section, I argue that the software-design principles that give rise to online echo chambers have a lot to recommend them. Further, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Social pathologies of informational privacy.Wulf Loh - 2022 - Journal of Social Philosophy (3):541-561.
    Following the recent practice turn in privacy research, informational privacy is increasingly analyzed with regard to the “appropriate flow of information” within a given practice, which preserves the “contextual integrity” of that practice (Nissenbaum, 2010, p. 149; 2015). Such a practice-theoretical take on privacy emphasizes the normative structure of practices as well as its structural injustices and power asymmetries, rather than focusing on the intentions and moral considerations of individual or institutional actors. Since privacy norms are seen to be institutionalized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • (1 other version)The Moral Landscape of Monetary Design.Andrew M. Bailey, Bradley Rettler & Craig Warmke - 2021 - Philosophy Compass 16 (11):1-15.
    In this article, we identify three key design dimensions along which cryptocurrencies differ -- privacy, censorship-resistance, and consensus procedure. Each raises important normative issues. Our discussion uncovers new ways to approach the question of whether Bitcoin or other cryptocurrencies should be used as money, and new avenues for developing a positive answer to that question. A guiding theme is that progress here requires a mixed approach that integrates philosophical tools with the purely technical results of disciplines like computer science and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.
    This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account and illustrates the difficulties of doing so. Having set out the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The threat of comprehensive overstimulation in modern societies.Gregory J. Robson - 2017 - Ethics and Information Technology 19 (1):69-80.
    Members of modern, digital societies experience a tremendous number and diversity of stimuli from sources such as computers, televisions, other electronic media, and various forms of advertising. In this paper, I argue that the presence of a wide range of stimulating items in modern societies poses a special risk to the welfare of members of modern societies. By considering the set of modern stimuli in a more comprehensive way than normative theorists have done so far—as part of a complex system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Epistemological dimensions of informational privacy.Klemens Kappel - 2013 - Episteme 10 (2):179-192.
    It seems obvious that informational privacy has an epistemological component; privacy or lack of privacy concerns certain kinds of epistemic relations between a cogniser and sensitive pieces of information. One striking feature of the fairly substantial philosophical literature on informational privacy is that the nature of this epistemological component of privacy is only sparsely discussed. The main aim of this paper is to shed some light on the epistemological component of informational privacy.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Asking for Facebook Logins: An Egoist Case for Privacy.John R. Drake - 2016 - Journal of Business Ethics 139 (3):429-441.
    With the advent of social networking websites, privacy concerns have reached a new high. One particularly problematic concern entails employers requesting login credentials to popular social media platforms. While many people may consider this request unethical, they may not agree on the reasons it is unethical. One reason may be to blame the behavior on egoism. Egoism, however, comes in multiple flavors, not all of which would agree that violating privacy is acceptable. In this paper, we articulate how one egoist (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Three Roads to P2P Systems and Their Impact on Business Practices and Ethics.Ugo Pagallo & Massimo Durante - 2009 - Journal of Business Ethics 90 (S4):551 - 564.
    This article examines some of the most relevant issues concerning P2P systems so as to take sides in today's strongly polarized debate. The idea is to integrate a context-based perspective with an ontological representation of informational norms; thanks to a procedural outlook which is presented in terms of burden of proof More particularly, we examine three ''roads." First, the topological approach to complex social networks allows us to comprehend the laws according to which information is distributed through P2P systems and (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Consideraciones éticas para el uso académico de sistemas de Inteligencia Artificial.Oscar-Yecid Aparicio-Gómez - 2024 - Revista Internacional de Filosofía Teórica y Práctica 4 (1):175-198.
    Este artículo explora las consideraciones éticas que rodean el uso de la Inteligencia Artificial (IA) en la academia. Se establecen principios éticos generales para la IA en este ámbito, como la transparencia, la equidad, la responsabilidad, la privacidad y la integridad académica. En cuanto a la educación asistida por IA, se enfatiza la importancia de la accesibilidad, la no discriminación y la evaluación crítica de los resultados. Se recomienda que la IA se use para complementar y no para reemplazar la (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • The Dark Side of the Online Self: A Pragmatist Critique of the Growing Plague of Revenge Porn.Scott R. Stroud - 2014 - Journal of Mass Media Ethics 29 (3):168-183.
    This study seeks to understand and critique the growing online trend of “revenge porn,” or the intentional embarrassment of identifiable individuals through the posting of nude images online. This posting of intimate pictures, often done out of motives of revenge for perceived relational scorn, is enhanced by the varying levels of online anonymity. Using the theoretical framework of John Dewey's pragmatism, this study both analyzes this understudied but complex new problem precipitated by the conditions of the online self and establishes (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Should my robot know what's best for me? Human–robot interaction between user experience and ethical design.Nora Fronemann, Kathrin Pollmann & Wulf Loh - 2022 - AI and Society 37 (2):517-533.
    To integrate social robots in real-life contexts, it is crucial that they are accepted by the users. Acceptance is not only related to the functionality of the robot but also strongly depends on how the user experiences the interaction. Established design principles from usability and user experience research can be applied to the realm of human–robot interaction, to design robot behavior for the comfort and well-being of the user. Focusing the design on these aspects alone, however, comes with certain ethical (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Recht auf Vergessen? Ethik der zweiten Chance?Christine Abbt - 2016 - Deutsche Zeitschrift für Philosophie 64 (6):925-946.
    Name der Zeitschrift: Deutsche Zeitschrift für Philosophie Jahrgang: 64 Heft: 6 Seiten: 925-946.
    Download  
     
    Export citation  
     
    Bookmark  
  • Care ethics and the responsible management of power and privacy in digitally enhanced disaster response.Paul Hayes & Damian Jackson - 2020 - Journal of Information, Communication and Ethics in Society 18 (1):157-174.
    PurposeThis paper aims to argue that traditional ethical theories used in disaster response may be inadequate and particularly strained by the emergence of new technologies and social media, particularly with regard to privacy. The paper suggests incorporation of care ethics into the disaster ethics nexus to better include the perspectives of disaster affected communities.Design/methodology/approachThis paper presents a theoretical examination of privacy and care ethics in the context of social media/digitally enhanced disaster response.FindingsThe paper proposes an ethics of care can fruitfully (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Algorithms and values in justice and security.Paul Hayes, Ibo van de Poel & Marc Steen - 2020 - AI and Society 35 (3):533-555.
    This article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology. Here, we explicate and analyse the expression of values of accuracy, privacy, fairness and equality, property and ownership, and accountability and transparency in this context. We find that values are sensitive to disvalue if algorithms are designed, implemented or deployed inappropriately or without sufficient consideration (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • From privacy to anti-discrimination in times of machine learning.Thilo Hagendorff - 2019 - Ethics and Information Technology 21 (4):331-343.
    Due to the technology of machine learning, new breakthroughs are currently being achieved with constant regularity. By using machine learning techniques, computer applications can be developed and used to solve tasks that have hitherto been assumed not to be solvable by computers. If these achievements consider applications that collect and process personal data, this is typically perceived as a threat to information privacy. This paper aims to discuss applications from both fields of personality and image analysis. These applications are often (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Correspondents theory 1800/2000: philosophical reflections upon epistolary technics and praxis in the analogue and digital. [REVIEW]Anthony John Charles Ross - unknown
    When we talk about things like the 'lost art of letter-writing' or the 'digital communications revolution,' what do we mean? What do we lose and what do we gain as we move towards digital ways of being in the world? Critically engaging with many of the canonical writers in the philosophy of technology , and following what has been termed the 'empirical turn' in that discipline, this thesis answers such questions by means of a philosophical, comparative study of epistolary technics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Global ICT‐ethics: the case of privacy.Göran Collste - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):76-87.
    In this paper I will take the right to privacy as an example when discussing the question of the prospects of global value consensus or value conflicts. The question whether privacy is a contextual value will be discussed in the remaining part of my paper and I will take the views of the Japanese ICT-ethicists Yohko Orito and Kiyosho Murata as my point of departure. In “Privacy protection in Japan: cultural influence on the universal value” (2005), they argue against the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Online file sharing: resolving the tensions between privacy and property interests.Frances S. Grodzinsky & Herman T. Tavani - 2008 - Acm Sigcas Computers and Society 38 (4):28-39.
    This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy by Design in Personal Health Monitoring.Anders Nordgren - 2015 - Health Care Analysis 23 (2):148-164.
    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and emerging (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Ethics of Smart Stadia: A Stakeholder Analysis of the Croke Park Project.Fiachra O’Brolcháin, Simone de Colle & Bert Gordijn - 2019 - Science and Engineering Ethics 25 (3):737-769.
    The development of “smart stadia”, i.e. the use of “smart technologies” in the way sports stadia are designed and managed, promises to enhance the experience of attending a live match through innovative and improved services for the audience, as well as for the players, vendors and other stadium stakeholders. These developments offer us a timely opportunity to reflect on the ethical implications of the use of smart technologies and the emerging Internet of Things. The IoT has the potential to radically (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Information ethics in the context of smart devices.Brian Roux & Michael Falgoust - 2013 - Ethics and Information Technology 15 (3):183-194.
    In this paper, we employ Extended Cognition as a background for a series of thought experiments about privacy and common used information technology devices. Laptops and smart phones are now widely used devices, but current privacy standards do not adequately address the relationship between the owners of these devices and the information stored on them. Law enforcement treats laptops and smart phones are potential sources of information about criminal activity, but this treatment ignores the use of smart devices as extensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Search engines and ethics.Herman Tavani - forthcoming - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Taking Patient Privacy and Autonomy More Seriously: Why an Orwellian Account Is Not Sufficient.Karsten Weber, Uta Bittner, Arne Manzeschke, Elisabeth Rother, Friedericke Quack, Kathrin Dengler & Heiner Fangerau - 2012 - American Journal of Bioethics 12 (9):51-53.
    The American Journal of Bioethics, Volume 12, Issue 9, Page 51-53, September 2012.
    Download  
     
    Export citation  
     
    Bookmark  
  • Contextual integrity’s decision heuristic and the tracking by social network sites.Rath Kanha Sar & Yeslam Al-Saggaf - 2014 - Ethics and Information Technology 16 (1):15-26.
    The findings of our experiments showed that social network sites such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Securing privacy at work: The importance of contextualized consent. [REVIEW]Elin Palm - 2009 - Ethics and Information Technology 11 (4):233-241.
    The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important to consider (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • ISPs & Rowdy Web Sites Before the Law: Should We Change Today’s Safe Harbour Clauses?Ugo Pagallo - 2011 - Philosophy and Technology 24 (4):419-436.
    The paper examines today’s debate on the new responsibilities of Internet service providers in connection with legal problems concerning jurisdiction, data processing, people’s privacy and education. The focus is foremost on the default rules and safe harbour clauses for ISPs liability, set up by the US and European legal systems. This framework is deepened in light of the different functions of the services provided on the Internet so as to highlight multiple levels of control over information and, correspondingly, different types (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • A new “Ring of Gyges” and the meaning of invisibility in the information revolution.Ugo Pagallo - 2010 - Journal of Information, Communication and Ethics in Society 8 (4):364-376.
    PurposeThe paper aims to examine the profound transformations engendered by the information revolution in order to determine aspects of what should be visible or invisible in human affairs. It seeks to explore the meaning of invisibility via an interdisciplinary approach, including computer science, law, and ethics.Design/methodology/approachThe method draws on both theoretical and empirical material so as to scrutinise the ways in which today's information revolution is recasting the boundaries between visibility and invisibility.FindingsThe degrees of exposure to public notice can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Web-Rhetoric of Companies Offering Home-Based Personal Health Monitoring.Anders Nordgren - 2012 - Health Care Analysis 20 (2):103-118.
    In this paper I investigate the web-rhetoric of companies offering home-based personal health monitoring to patients and elderly people. Two main rhetorical methods are found, namely a reference to practical benefits and a use of prestige words like “quality of life” and “independence”. I interpret the practical benefits in terms of instrumental values and the prestige words in terms of final values. I also reconstruct the arguments on the websites in terms of six different types of argument. Finally, I articulate (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Personal health monitoring: ethical considerations for stakeholders.Anders Nordgren - 2013 - Journal of Information, Communication and Ethics in Society 11 (3):156-173.
    Purpose – This paper has three purposes: to identify and discuss values that should be promoted and respected in personal health monitoring, to formulate an ethical checklist that can be used by stakeholders, and to construct an ethical matrix that can be used for identifying values, among those in the ethical checklist, that are particularly important to various stakeholders. Design/methodology/approach – On the basis of values that empirical studies have found important to various stakeholders in personal health monitoring, the author (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Self-Perception and Self-Determination in Surveillance Conditions.Saskia K. Nagel & Hartmut Remmers - 2012 - American Journal of Bioethics 12 (9):53-55.
    The American Journal of Bioethics, Volume 12, Issue 9, Page 53-55, September 2012.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • A critical contribution to theoretical foundations of privacy studies.Thomas Allmer - 2011 - Journal of Information, Communication and Ethics in Society 9 (2):83-101.
    PurposeAlthough there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there is a gap in the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations