Switch to: References

Citations of:

Privacy and Freedom

Science and Society 34 (3):360-363 (1970)

Add citations

You must login to add citations.
  1. Mechanisms of Techno-Moral Change: A Taxonomy and Overview.John Danaher & Henrik Skaug Sætra - 2023 - Ethical Theory and Moral Practice 26 (5):763-784.
    The idea that technologies can change moral beliefs and practices is an old one. But how, exactly, does this happen? This paper builds on an emerging field of inquiry by developing a synoptic taxonomy of the mechanisms of techno-moral change. It argues that technology affects moral beliefs and practices in three main domains: decisional (how we make morally loaded decisions), relational (how we relate to others) and perceptual (how we perceive situations). It argues that across these three domains there are (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Towards new human rights in the age of neuroscience and neurotechnology.Marcello Ienca & Roberto Andorno - 2017 - Life Sciences, Society and Policy 13 (1):1-27.
    Rapid advancements in human neuroscience and neurotechnology open unprecedented possibilities for accessing, collecting, sharing and manipulating information from the human brain. Such applications raise important challenges to human rights principles that need to be addressed to prevent unintended consequences. This paper assesses the implications of emerging neurotechnology applications in the context of the human rights framework and suggests that existing human rights may not be sufficient to respond to these emerging issues. After analysing the relationship between neuroscience and human rights, (...)
    Download  
     
    Export citation  
     
    Bookmark   69 citations  
  • Own Data? Ethical Reflections on Data Ownership.Patrik Hummel, Matthias Braun & Peter Dabrock - 2020 - Philosophy and Technology 34 (3):545-572.
    In discourses on digitization and the data economy, it is often claimed that data subjects shall beownersof their data. In this paper, we provide a problem diagnosis for such calls fordata ownership: a large variety of demands are discussed under this heading. It thus becomes challenging to specify what—if anything—unites them. We identify four conceptual dimensions of calls for data ownership and argue that these help to systematize and to compare different positions. In view of this pluralism of data ownership (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • “Strongly Recommended” Revisiting Decisional Privacy to Judge Hypernudging in Self-Tracking Technologies.Marjolein Lanzing - 2019 - Philosophy and Technology 32 (3):549-568.
    This paper explores and rehabilitates the value of decisional privacy as a conceptual tool, complementary to informational privacy, for critiquing personalized choice architectures employed by self-tracking technologies. Self-tracking technologies are promoted and used as a means to self-improvement. Based on large aggregates of personal data and the data of other users, self-tracking technologies offer personalized feedback that nudges the user into behavioral change. The real-time personalization of choice architectures requires continuous surveillance and is a very powerful technology, recently coined as (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • To Each Technology Its Own Ethics: The Problem of Ethical Proliferation.Henrik Skaug Sætra & John Danaher - 2022 - Philosophy and Technology 35 (4):1-26.
    Ethics plays a key role in the normative analysis of the impacts of technology. We know that computers in general and the processing of data, the use of artificial intelligence, and the combination of computers and/or artificial intelligence with robotics are all associated with ethically relevant implications for individuals, groups, and society. In this article, we argue that while all technologies are ethically relevant, there is no need to create a separate ‘ethics of X’ or ‘X ethics’ for each and (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • A Dilemma for Privacy as Control.Björn Lundgren - 2020 - The Journal of Ethics 24 (2):165-175.
    Although popular, control accounts of privacy suffer from various counterexamples. In this article, it is argued that two such counterexamples—while individually resolvable—can be combined to yield a dilemma for control accounts of privacy. Furthermore, it is argued that it is implausible that control accounts of privacy can defend against this dilemma. Thus, it is concluded that we ought not define privacy in terms of control. Lastly, it is argued that since the concept of privacy is the object of the right (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Public Actors Without Public Values: Legitimacy, Domination and the Regulation of the Technology Sector.Linnet Taylor - 2021 - Philosophy and Technology 34 (4):897-922.
    The scale and asymmetry of commercial technology firms’ power over people through data, combined with the increasing involvement of the private sector in public governance, means that increasingly, people do not have the ability to opt out of engaging with technology firms. At the same time, those firms are increasingly intervening on the population level in ways that have implications for social and political life. This creates the potential for power relations of domination, and demands that we decide what constitutes (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The transparent self.Marjolein Lanzing - 2016 - Ethics and Information Technology 18 (1):9-16.
    This paper critically engages with new self-tracking technologies. In particular, it focuses on a conceptual tension between the idea that disclosing personal information increases one’s autonomy and the idea that informational privacy is a condition for autonomous personhood. I argue that while self-tracking may sometimes prove to be an adequate method to shed light on particular aspects of oneself and can be used to strengthen one’s autonomy, self-tracking technologies often cancel out these benefits by exposing too much about oneself to (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Biomedical Big Data: New Models of Control Over Access, Use and Governance.Alessandro Blasimme & Effy Vayena - 2017 - Journal of Bioethical Inquiry 14 (4):501-513.
    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Is Mental Privacy a Component of Personal Identity?Abel Wajnerman Paz - 2021 - Frontiers in Human Neuroscience 15:773441.
    One of the most prominent ethical concerns regarding emerging neurotechnologies is mental privacy. This is the idea that we should have control over access to our neural data and to the information about our mental processes and states that can be obtained by analyzing it. A key issue is whether this information needs more stringent protection than other kinds of personal information. I will articulate and support the view, underlying recent regulatory frameworks, that mental privacy requires a special treatment because (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Property rights of personal data and the financing of pensions.Francis Cheneval - 2021 - Critical Review of International Social and Political Philosophy 24 (2):253-275.
    Property rights of personal data have been advocated for some time. From the perspective of economics of law some argued that they could lower transaction costs for contracts involving personal data. This may be the case, but new transaction costs are introduced by propertization and the issue has not been settled. In this paper, I focus on a different and potentially more important aspect. In the actual situation, data collectors externalize costs and internalize benefits. An ownership regime that enables every (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Two Concepts of Group Privacy.Michele Loi & Markus Christen - 2020 - Philosophy and Technology 33 (2):207-224.
    Luciano Floridi was not the first to discuss the idea of group privacy, but he was perhaps the first to discuss it in relation to the insights derived from big data analytics. He has argued that it is important to investigate the possibility that groups have rights to privacy that are not reducible to the privacy of individuals forming such groups. In this paper, we introduce a distinction between two concepts of group privacy. The first, the “what happens in Vegas (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • “I Am Datafied Because We Are Datafied”: an Ubuntu Perspective on (Relational) Privacy.Urbano Reviglio & Rogers Alunge - 2020 - Philosophy and Technology 33 (4):595-612.
    The debate on the ethics of privacy has been mainly dominated by Western perspectives, to the exclusion of broader ethical theories and socio-cultural perspectives. This imbalance carries risks; transplanted ethical norms and values can collide with those of the communities in which they are deployed. The consequent homogenization might also represent a missed opportunity to enrich and develop the current paradigm of privacy protection so as to effectively face new technological challenges. This article introduces and discusses the sub-Saharan philosophy of (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity of citizens (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • (1 other version)Intercultural information ethics.Rafael Capurro - 2008 - In Elizabeth A. Buchanan (ed.), Case Studies in Library and Information Science Ethics. Mcfarland & Co.. pp. 10.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information.Nick Hajli & Xiaolin Lin - 2016 - Journal of Business Ethics 133 (1):111-123.
    Social networking sites have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to be negatively (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy.Dorota Mokrosinska - 2018 - Law and Philosophy 37 (2):117-143.
    One of the most influential views in privacy scholarship is that privacy protects individual autonomy. On the early liberal view, the exercise of autonomy requires detachment from social and political life and privacy facilitates it. This view of privacy still informs current legal and political practice. As this view of privacy presupposes a tension between privacy and society, it is responsible for the underrating of privacy in legal and political practice. Over the last decades, liberal reflection on autonomy has shifted (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The crisis of consent: how stronger legal protection may lead to weaker consent in data protection.Bart W. Schermer, Bart Custers & Simone van der Hof - 2014 - Ethics and Information Technology 16 (2):171-182.
    In this article we examine the effectiveness of consent in data protection legislation. We argue that the current legal framework for consent, which has its basis in the idea of autonomous authorisation, does not work in practice. In practice the legal requirements for consent lead to ‘consent desensitisation’, undermining privacy protection and trust in data processing. In particular we argue that stricter legal requirements for giving and obtaining consent as proposed in the European Data protection regulation will further weaken the (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • The history of digital ethics.Vincent C. Müller - 2021 - In Carissa Véliz (ed.), The Oxford Handbook of Digital Ethics. Oxford University Press.
    Digital ethics, also known as computer ethics or information ethics, is now a lively field that draws a lot of attention, but how did it come about and what were the developments that lead to its existence? What are the traditions, the concerns, the technological and social developments that pushed digital ethics? How did ethical issues change with digitalisation of human life? How did the traditional discipline of philosophy respond? The article provides an overview, proposing historical epochs: ‘pre-modernity’ prior to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that the predominant accounts of privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Measuring Automated Influence: Between Empirical Evidence and Ethical Values.Daniel Susser & Vincent Grimaldi - forthcoming - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society.
    Automated influence, delivered by digital targeting technologies such as targeted advertising, digital nudges, and recommender systems, has attracted significant interest from both empirical researchers, on one hand, and critical scholars and policymakers on the other. In this paper, we argue for closer integration of these efforts. Critical scholars and policymakers, who focus primarily on the social, ethical, and political effects of these technologies, need empirical evidence to substantiate and motivate their concerns. However, existing empirical research investigating the effectiveness of these (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Surgical patients' and nurses' opinions and expectations about privacy in care.Elif Akyüz & Firdevs Erdemir - 2013 - Nursing Ethics 20 (6):660-671.
    The purpose of this study was to determine the opinions and expectations of patients and nurses about privacy during a hospital admission for surgery. The study explored what enables and maintains privacy from the perspective of Turkish surgical patients and nurses. The study included 102 adult patients having surgery and 47 nurses caring for them. Data were collected via semistructured questionnaire by face-to-face interviews. The results showed that patients were mostly satisfied by the respect shown to their privacy by the (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • The Ethics of Online Retailing: A Scale Development and Validation from the Consumers’ Perspective.Sergio Roman - 2007 - Journal of Business Ethics 72 (2):131-148.
    While e-commerce has witnessed extensive growth in recent years, so has consumers' concerns regarding ethical issues surrounding online shopping. The vast majority of earlier research on this area is conceptual in nature, and limited in scope by focusing on consumers' privacy issues. This study develops a reliable and valid scale to measure consumers' perceptions regarding the ethics of online retailers. Findings indicate that the four factors of the scale - security, privacy, non-deception and fulfillment/reliability - are strongly predictive of online (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Government Surveillance, Privacy, and Legitimacy.Peter Königs - 2022 - Philosophy and Technology 35 (1):1-22.
    The recent decades have seen established liberal democracies expand their surveillance capacities on a massive scale. This article explores what is problematic about government surveillance by democracies. It proceeds by distinguishing three potential sources of concern: the concern that governments diminish citizens’ privacy by collecting their data, the concern that they diminish their privacy by accessing their data, and the concern that the collected data may be used for objectionable purposes. Discussing the meaning and value of privacy, the article argues (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Data identity: privacy and the construction of self.Jens-Erik Mai & Sille Obelitz Søe - 2022 - Synthese 200 (6):1-22.
    This paper argues in favor of a hybrid conception of identity. A common conception of identity in datafied society is a split between a digital self and a real self, which has resulted in concepts such as the data double, algorithmic identity, and data shadows. These data-identity metaphors have played a significant role in the conception of informational privacy as control over information—the control of or restricted access to your digital identity. Through analyses of various data-identity metaphors as well as (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Click here to consent forever: Expiry dates for informed consent.Bart Custers - 2016 - Big Data and Society 3 (1).
    The legal basis for processing personal data and some other types of Big Data is often the informed consent of the data subject involved. Many data controllers, such as social network sites, offer terms and conditions, privacy policies or similar documents to which a user can consent when registering as a user. There are many issues with such informed consent: people get too many consent requests to read everything, policy documents are often very long and difficult to understand and users (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing of justice and the effective (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Patients’ Privacy of the Person and Human Rights.Jay Woogara - 2005 - Nursing Ethics 12 (3):273-287.
    The UK Government published various circulars to indicate the importance of respecting the privacy and dignity of NHS patients following the implementation of the Human Rights Act, 1998. This research used an ethnographic method to determine the extent to which health professionals had in fact upheld the philosophy of these documents. Fieldwork using nonparticipant observation, and unstructured and semistructured interviews with patients and staff, took place over six months in three acute care wards in a large district NHS trust hospital. (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • X—Privacy as a Human Right.Beate Roessler - 2017 - Proceedings of the Aristotelian Society 117 (2):187-206.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent.Irene Pollach - 2005 - Journal of Business Ethics 62 (3):221-235.
    The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking.Priscilla M. Regan & Jolene Jesse - 2019 - Ethics and Information Technology 21 (3):167-179.
    With the increase in the costs of providing education and concerns about financial responsibility, heightened consideration of accountability and results, elevated awareness of the range of teacher skills and student learning styles and needs, more focus is being placed on the promises offered by online software and educational technology. One of the most heavily marketed, exciting and controversial applications of edtech involves the varied educational programs to which different students are exposed based on how big data applications have evaluated their (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Towards an alternative concept of privacy.Christian Fuchs - 2011 - Journal of Information, Communication and Ethics in Society 9 (4):220-237.
    PurposeThere are a lot of discussions about privacy in relation to contemporary communication systems (such as Facebook and other “social media” platforms), but discussions about privacy on the internet in most cases misses a profound understanding of the notion of privacy and where this notion is coming from. The purpose of this paper is to challenge the liberal notion of privacy and explore foundations of an alternative privacy conception.Design/methodology/approachA typology of privacy definitions is elaborated based on Giddens' theory of structuration. (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Comparative legal study on privacy and personal data protection for robots equipped with artificial intelligence: looking at functional and technological aspects.Kaori Ishii - 2019 - AI and Society 34 (3):509-533.
    This paper undertakes a comparative legal study to analyze the challenges of privacy and personal data protection posed by Artificial Intelligence embedded in Robots, and to offer policy suggestions. After identifying the benefits from various AI usages and the risks posed by AI-related technologies, I then analyze legal frameworks and relevant discussions in the EU, USA, Canada, and Japan, and further consider the efforts of Privacy by Design originating in Ontario, Canada. While various AI usages provide great convenience, many issues, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy Rights in the Information EconomyLegislating Privacy: Technology, Social Values and Public Policy.Richard A. Spinello & Priscilla Regan - 1998 - Business Ethics Quarterly 8 (4):723.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Balance or Trade-off? Online Security Technologies and Fundamental Rights.Mireille Hildebrandt - 2013 - Philosophy and Technology 26 (4):357-379.
    In this contribution, I will argue that the image of a balance is often used to defend the idea of a trade-off. To understand the drawbacks of this line of thought, I will explore the relationship between online security technologies and fundamental rights, notably privacy, nondiscrimination, freedom of speech and due process. After discriminating between three types of online security technologies, I will trace the reconfiguration of the notion of privacy in the era of smart environments. This will lead to (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Reframing biometric surveillance: from a means of inspection to a form of control.Avi Marciano - 2019 - Ethics and Information Technology 21 (2):127-136.
    This paper reviews the social scientific literature on biometric surveillance, with particular attention to its potential harms. It maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Demonstrating these harms with examples from the United States, the European Union, and Israel, I propose that biometric surveillance be addressed, evaluated and reframed as a new form of control rather than simply another means of inspection. I (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development.Katie Shilton & Daniel Greene - 2019 - Journal of Business Ethics 155 (1):131-146.
    Privacy is a critical challenge for corporate social responsibility in the mobile device ecosystem. Mobile application firms can collect granular and largely unregulated data about their consumers, and must make ethical decisions about how and whether to collect, store, and share these data. This paper conducts a discourse analysis of mobile application developer forums to discover when and how privacy conversations, as a representative of larger ethical debates, arise during development. It finds that online forums can be useful spaces for (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?Michele Loi, Christian Hauser & Markus Christen - 2020 - Journal of Business Ethics 175 (1):7-19.
    Clients may feel trapped into sharing their private digital data with insurance companies to get a desired insurance product or premium. However, private insurance must collect some data to offer products and premiums appropriate to the client’s level of risk. This situation creates tension between the value of privacy and common insurance business practice. We argue for three main claims: first, coercion to share private data with insurers is pro tanto wrong because it violates the autonomous choice of a privacy-valuing (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Perceptions of Privacy in the Care of Elderly People in Five European Countries.Anja Schopp, Helena Leino-Kilpi, Maritta Välimäki, Theo Dassen, Maria Gasull, Chryssoula Lemonidou, P. Anne Scott, Marianne Arndt & Anne Kaljonen - 2003 - Nursing Ethics 10 (1):39-47.
    The focus of this article is on elderly patients’ and nursing staff perceptions of privacy in the care of elderly patients/residents in five European countries. Privacy includes physical, social and informational elements. The results show that perceptions of privacy were strongest in the UK (Scotland) and weakest in Greece. Country comparisons revealed statistically significant differences between the perceptions of elderly patients and also between those of nurses working in the same ward or long-term care facility. Perceptions of privacy by patients (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • A duty of ignorance.David Matheson - 2013 - Episteme 10 (2):193-205.
    Conjoined with the claim that there is a moral right to privacy, each of the major contemporary accounts of privacy implies a duty of ignorance for those against whom the right is held. In this paper I consider and respond to a compelling argument that challenges these accounts (or the claim about a right to privacy) in the light of this implication. A crucial premise of the argument is that we cannot ever be morally obligated to become ignorant of information (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Privacy, Interests, and Inalienable Rights.Adam D. Moore - 2018 - Moral Philosophy and Politics 5 (2):327-355.
    Some rights are so important for human autonomy and well-being that many scholars insist they should not be waived, traded, or abandoned. Privacy is a recent addition to this list. At the other end of the spectrum is the belief that privacy is a mere unimportant interest or preference. This paper defends a middle path between viewing privacy as an inalienable, non-waivable, non-transferrable right and the view of privacy as a mere subjective interest. First, an account of privacy is offered (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations