Switch to: References

Citations of:

Information technology, privacy, and the protection of personal data

In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press (2008)

Add citations

You must login to add citations.
  1. Pay Secrecy, Discrimination, and Autonomy.Matthew Caulfield - 2020 - Journal of Business Ethics 171 (2):399-420.
    A question facing nearly all private firms is whether they may keep employee pay secret. Many think it is obvious that firms are obligated to disclose a good deal of pay information once we properly appreciate the severity of pay discrimination in our economy and the autonomy-related interests that would be served by pay disclosure. This article puts forth a dissenting voice against the vast majority of recent commentary. It exploits a fissure between reasons we have to support certain coercive (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • VNRs: Is the News Audience Deceived?Matthew Broaddus, Mark D. Harmon & Kristin Farley Mounts - 2011 - Journal of Mass Media Ethics 26 (4):283-296.
    Every day, television news operations have available dozens of video news releases (VNRs), public relations handout videos designed to mimic news formats. Electronic tracking indicates some of these VNRs are used. Critics typically assail VNRs on ethical grounds, that VNRs deceive audience members into thinking they are watching news gathered by reporters, rather than a promotional pitch. Using a snowball technique, the researchers presented survey respondents with authentic-looking local television news stories; 157 respondents evaluated three stories (out of nine). Some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.
    This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the decision forest data mining algorithm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Digital Divide in Asia.Tanveer Zia, Yeslam Al-Saggaf, Md Zahidul Islam, Lihong Zheng & John Weckert - 2009 - Journal of Information Ethics 18 (2):50-76.
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethics and Nanopharmacy: Value Sensitive Design of New Drugs. [REVIEW]Job Timmermans, Yinghuan Zhao & Jeroen van den Hoven - 2011 - NanoEthics 5 (3):269-283.
    Although applications are being developed and have reached the market, nanopharmacy to date is generally still conceived as an emerging technology. Its concept is ill-defined. Nanopharmacy can also be construed as a converging technology, which combines features of multiple technologies, ranging from nanotechnology to medicine and ICT. It is still debated whether its features give rise to new ethical issues or that issues associated with nanopharma are merely an extension of existing issues in the underlying fields. We argue here that, (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • What does it mean to trust blockchain technology?Yan Teng - 2022 - Metaphilosophy 54 (1):145-160.
    This paper argues that the widespread belief that interactions between blockchains and their users are trust-free is inaccurate and misleading, since this belief not only overlooks the vital role played by trust in the lack of knowledge and control but also conceals the moral and normative relevance of relying on blockchain applications. The paper reaches this argument by providing a close philosophical examination of the concept referred to as trust in blockchain technology, clarifying the trustor group, the structure, and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Decolonizing AI Ethics: Relational Autonomy as a Means to Counter AI Harms.Sábëlo Mhlambi & Simona Tiribelli - 2023 - Topoi 42 (3):867-880.
    Many popular artificial intelligence (AI) ethics frameworks center the principle of autonomy as necessary in order to mitigate the harms that might result from the use of AI within society. These harms often disproportionately affect the most marginalized within society. In this paper, we argue that the principle of autonomy, as currently formalized in AI ethics, is itself flawed, as it expresses only a mainstream mainly liberal notion of autonomy as rational self-determination, derived from Western traditional philosophy. In particular, we (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Information technology and privacy: conceptual muddles or privacy vacuums? [REVIEW]Kirsten Martin - 2012 - Ethics and Information Technology 14 (4):267-284.
    Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract.Kirsten E. Martin - 2012 - Journal of Business Ethics 111 (4):519-539.
    A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce more practical guidance for organizations and managers who have employees, users, and future customers all with possibly different conceptions of privacy across contexts. However, this theoretical suggestion, while intuitively appealing, has not been empirically examined. This study (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Justice in the Distribution of Knowledge.Faik Kurtulmus & Gürol Irzik - 2017 - Episteme 14 (2):129-146.
    In this article we develop an account of justice in the distribution of knowledge. We first argue that knowledge is a fundamental interest that grounds claims of justice due to its role in individuals’ deliberations about the common good, their personal good and the pursuit thereof. Second, we identify the epistemic basic structure of a society, namely, the institutions that determine individuals’ opportunities for acquiring knowledge and discuss what justice requires of them. Our main contention is that a systematic lack (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Government Surveillance, Privacy, and Legitimacy.Peter Königs - 2022 - Philosophy and Technology 35 (1):1-22.
    The recent decades have seen established liberal democracies expand their surveillance capacities on a massive scale. This article explores what is problematic about government surveillance by democracies. It proceeds by distinguishing three potential sources of concern: the concern that governments diminish citizens’ privacy by collecting their data, the concern that they diminish their privacy by accessing their data, and the concern that the collected data may be used for objectionable purposes. Discussing the meaning and value of privacy, the article argues (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethics in the COVID-19 pandemic: myths, false dilemmas, and moral overload.Georgy Ishmaev, Matthew Dennis & M. Jeroen van den Hoven - 2021 - Ethics and Information Technology 23 (1):19-34.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy, the Internet of Things and State Surveillance: Handling Personal Information within an Inhuman System.Adam Henschke - 2020 - Moral Philosophy and Politics 7 (1):123-149.
    The Internet of Things (IoT) is, in part, an information handling system that can remove humans from the information handling process. The particular problem explored is how we are to understand privacy when considering informational systems that handle personal information in ways that impact people’s lives when there is no human operator in direct contact with that personal information. I argue that these new technologies need to take concepts like privacy into account, but also, that we ought also to take (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Net Recommendation: Prudential Appraisals of Digital Media and the Good life.Pak-Hang Wong - 2012 - Dissertation, University of Twente
    Digital media has become an integral part of people’s lives, and its ubiquity and pervasiveness in our everyday lives raise new ethical, social, cultural, political, economic and legal issues. Many of these issues have primarily been dealt with in terms of what is ‘right’ or ‘just’ with digital media and digitally-mediated practices, and questions about the relations between digital media and the good life are often left in the background. In short, what is often missing is an explicit discussion of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The moral psychology of Value Sensitive Design: the methodological issues of moral intuitions for responsible innovation.Steven Umbrello - 2018 - Journal of Responsible Innovation 5 (2):186-200.
    This paper argues that although moral intuitions are insufficient for making judgments on new technological innovations, they maintain great utility for informing responsible innovation. To do this, this paper employs the Value Sensitive Design (VSD) methodology as an illustrative example of how stakeholder values can be better distilled to inform responsible innovation. Further, it is argued that moral intuitions are necessary for determining stakeholder values required for the design of responsible technologies. This argument is supported by the claim that the (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations