Switch to: References

Add citations

You must login to add citations.
  1. The ethics of algorithms: mapping the debate.Brent Mittelstadt, Patrick Allo, Mariarosaria Taddeo, Sandra Wachter & Luciano Floridi - 2016 - Big Data and Society 3 (2):2053951716679679.
    In information societies, operations, decisions and choices previously left to humans are increasingly delegated to algorithms, which may advise, if not decide, about how data should be interpreted and what actions should be taken as a result. More and more often, algorithms mediate social processes, business transactions, governmental decisions, and how we perceive, understand, and interact among ourselves and with the environment. Gaps between the design and operation of algorithms and our understanding of their ethical implications can have severe consequences (...)
    Download  
     
    Export citation  
     
    Bookmark   209 citations  
  • Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.
    This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the decision forest data mining algorithm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers may be (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Do we Need a Special Ethics for Research?Sven Ove Hansson - 2011 - Science and Engineering Ethics 17 (1):21-29.
    Research is subject to more stringent ethical requirements than most other human activities, and a procedure that is otherwise allowed may be forbidden in research. Hence, risk-taking is more restricted in scientific research than in most non-research contexts, and privacy is better protected in scientific questionnaires than in marketing surveys. Potential arguments for this difference are scrutinized. The case in its favour appears to be weak. A stronger case can be made in favour of a difference in the opposite direction: (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Brain–Computer Interfaces: Lessons to Be Learned from the Ethics of Algorithms.Andreas Wolkenstein, Ralf J. Jox & Orsolya Friedrich - 2018 - Cambridge Quarterly of Healthcare Ethics 27 (4):635-646.
    :Brain–computer interfaces are driven essentially by algorithms; however, the ethical role of such algorithms has so far been neglected in the ethical assessment of BCIs. The goal of this article is therefore twofold: First, it aims to offer insights into whether the problems related to the ethics of BCIs can be better grasped with the help of already existing work on the ethics of algorithms. As a second goal, the article explores what kinds of solutions are available in that body (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The Use of Data Mining by Private Health Insurance Companies and Customers’ Privacy.Yeslam Al-Saggaf - 2015 - Cambridge Quarterly of Healthcare Ethics 24 (3):281-292.
    :This article examines privacy threats arising from the use of data mining by private Australian health insurance companies. Qualitative interviews were conducted with key experts, and Australian governmental and nongovernmental websites relevant to private health insurance were searched. Using Rationale, a critical thinking tool, the themes and considerations elicited through this empirical approach were developed into an argument about the use of data mining by private health insurance companies. The argument is followed by an ethical analysis guided by classical philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Implications of an ethic of privacy for human-centred systems engineering.Peter J. Carew, Larry Stapleton & Gabriel J. Byrne - 2008 - AI and Society 22 (3):385-403.
    Privacy remains an intractable ethical issue for the information society, and one that is exacerbated by modern applications of artificial intelligence. Given its complicity, there is a moral obligation to redress privacy issues in systems engineering practice itself. This paper investigates the role the concept of privacy plays in contemporary systems engineering practice. Ontologically a nominalist human concept, privacy is considered from an appropriate engineering perspective: human-centred design. Two human-centred design standards are selected as exemplars of best practice, and are (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Good, the Bad, and the Ugly: Applying Rawlsian Ethics in Data Mining Marketing.Stephen Cory Robinson - 2015 - Journal of Media Ethics 30 (1):19-30.
    Using a Rawlsian approach to analyze the ethical implications of data mining within three major codes of ethics used by American marketing firms, the author argues that marketers should re-conceptualize their business conduct, as defined in their individual codes of ethics, to incorporate a Rawlsian concern for society's least advantaged members. Rawls's concept of primary goods provides the framework for the argument that anonymity, a component of privacy, is vital for consumers whose autonomy is affected by data mining. A combination (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent.Irene Pollach - 2005 - Journal of Business Ethics 62 (3):221-235.
    The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Building theory from consumer reactions to RFID: discovering Connective Proximity.Anna Margulis, Harold Boeck, Ygal Bendavid & Fabien Durif - 2016 - Ethics and Information Technology 18 (2):81-101.
    Academic research into RFID technology has largely neglected ethics. What scarce research was being performed has now dwindled despite having some consumers continue to express their ethical concerns. This article aims at reducing this apparent void by exploring the antecedents that cause the public to react when consumers are targeted by RFID technology. Through the analysis of 11 real RFID implementations used to target consumers, our research indicates that several factors can influence consumer response through the distinct nature of the (...)
    Download  
     
    Export citation  
     
    Bookmark