Switch to: References

Add citations

You must login to add citations.
  1. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Data mining to combat terrorism and the roots of privacy concerns.Frans A. J. Birrer - 2005 - Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Investigations into Information Semantics and Ethics of Computing.Gordana Dodig-Crnkovic - 2005 - Dissertation, Mälardalen
    The recent development of the research field of Computing and Philosophy has triggered investigations into the theoretical foundations of computing and information. This thesis consists of two parts which are the result of studies in two areas of Philosophy of Computing and Philosophy of Information regarding the production of meaning and the value system with applications. The first part develops a unified dual-aspect theory of information and computation, in which information is characterized as structure, and computation is the information dynamics. (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
    Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion of data protection and are central in the discussion. The telecommunications environment is profoundly changing. The traditionally closed markets with closed networks change into an open market with open networks. Within these open networks more privacy sensitive data are generated and have to be exchanged (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation