Switch to: References

Citations of:

Privacy and Freedom

Science and Society 34 (3):360-363 (1970)

Add citations

You must login to add citations.
  1. Information ethics and the law of data representations.Dan L. Burk - 2008 - Ethics and Information Technology 10 (2-3):135-147.
    The theories of information ethics articulated by Luciano Floridi and his collaborators have clear implications for law. Information law, including the law of privacy and of intellectual property, is especially likely to benefit from a coherent and comprehensive theory of information ethics. This article illustrates how information ethics might apply to legal doctrine, by examining legal questions related to the ownership and control of the personal data representations, including photographs, game avatars, and consumer profiles, that have become ubiquitous with the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Editor's Note.Jacquelyn Burkell - 2008 - Bulletin of Science, Technology and Society 28 (1):3-3.
    Download  
     
    Export citation  
     
    Bookmark  
  • #stayathome als Kolonialisierung der lokalen Privatheit? Eine ethische Auseinandersetzung mit dem Wert des Privaten in Zeiten einer globalen Pandemie.Eike Buhr - 2020 - Zeitschrift für Praktische Philosophie 7 (2):385-416.
    Im Rahmen der Maßnahmen zur Eindämmung der Covid-19- Pandemie sind die Bürgerinnen und Bürger in Deutschland und vielen anderen Ländern dazu angehalten, weitestgehend in ihren Privatwohnungen zu bleiben. Wurde der Wert des Privaten in der liberalen Tradition gerade im Rückzug von und als Schutz vor der politischen Öffentlichkeit sowie administrativen Eingriffen gesehen, wird das Private damit nun unmittelbar politischen Anforderungen unterworfen. Indem die Kontrolle über die Gewährung und Verwehrung des Zugangs zum Privaten eingeschränkt worden ist und keinen frei gewählten Rückzugsort (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The value of privacy for people with dementia.Eike Buhr & Mark Schweda - 2022 - Ethik in der Medizin 34 (4):591-607.
    Definition of the problemThe concept of privacy has been astonishingly absent in the discussion about dementia care. In general, questions of privacy receive a lot of attention in nursing ethics; however, when it comes to dementia care, hardly any systematic ethical debate on the topic can be found. It almost seems as though people with dementia had lost any comprehensible interest in privacy and no longer had any private sphere that needed to be considered or protected. However, this not only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Der Wert des Privaten für Menschen mit Demenz.Eike Buhr & Mark Schweda - 2022 - Ethik in der Medizin 34 (4):591–607.
    Zusammenfassung Der Begriff der Privatheit markiert eine erstaunliche Leerstelle in der Diskussion um die Pflege von Menschen mit Demenz (MmD). Der sonst intensiv geführte pflegeethische Diskurs über Fragen der Privatheit scheint hier nahezu vollständig zu verstummen, so als verlören MmD im Verlauf ihrer Erkrankung jedes nachvollziehbare Interesse an einer Privatsphäre und verfügten über keinerlei privaten Bereich mehr, den man bei ihrer pflegerischen Versorgung beachten oder schützen müsste. Eine solche Vorstellung widerspricht allerdings nicht nur verbreiteten moralischen Intuitionen, sondern auch den Auffassungen (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Deleuze’s Postscript on the Societies of Control Updated for Big Data and Predictive Analytics.James Brusseau - 2020 - Theoria: A Journal of Social and Political Theory 67 (164):1-25.
    In 1990, Gilles Deleuze publishedPostscript on the Societies of Control, an introduction to the potentially suffocating reality of the nascent control society. This thirty-year update details how Deleuze’s conception has developed from a broad speculative vision into specific economic mechanisms clustering around personal information, big data, predictive analytics, and marketing. The central claim is that today’s advancing control society coerces without prohibitions, and through incentives that are not grim but enjoyable, even euphoric because they compel individuals to obey their own (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Shaheen Borna & Dheeraj Sharma - 2011 - Business and Society Review 116 (3):331-353.
    Download  
     
    Export citation  
     
    Bookmark  
  • Locating a Space for Ethics to Appear in Decision-making: Privacy as an Exemplar.William Bonner - 2007 - Journal of Business Ethics 70 (3):221-234.
    Using concepts from Ulrich Beck's Risk Society, this paper argues that as expertise proliferates questions of ethics in decision-making fall through gaps between domains of expertise. As a consequence, unethical outcomes are unattached to actions taken with no one accountable or responsible for these outcomes. Using Actor-Network Theory, a case study is presented showing how the sale of students' personal information by the Calgary Board of Education escaped questions of ethics. The sale of student information was the product of the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Locating a space for ethics to appear in decision-making: Privacy as an exemplar. [REVIEW]William Bonner - 2007 - Journal of Business Ethics 70 (3):221 - 234.
    Using concepts from Ulrich Beck’s Risk Society, this paper argues that as expertise proliferates questions of ethics in decision-making fall through gaps between domains of expertise. As a consequence, unethical outcomes are unattached to actions taken with no one accountable or responsible for these outcomes. Using Actor-Network Theory (ANT), a case study is presented showing how the sale of students’ personal information by the Calgary Board of Education (CBE) escaped questions of ethics. The sale of student information was the product (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Treating Inmates as Moral Agents: A Defense of the Right to Privacy in Prison.William Bülow - 2014 - Criminal Justice Ethics 33 (1):1-20.
    This paper addresses the question of prison inmates' right to privacy from an ethical perspective. I argue that the right to privacy is important because of its connection to moral agency and that the protection of privacy is warranted by different established philosophical theories about the justification of legal punishment. I discuss the practical implications of this argument by addressing two potential problems. First, how much privacy should be allowed during imprisonment in order to meet the criteria of respecting inmates (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Online privacy behavior among youth in the Global South.Jan Michael Alexandre Cortez Bernadas & Cheryll Ruth Soriano - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):17-30.
    Purpose The purpose of this paper is two-fold. First, it explores the extent to which diversity of connectivity or the connection through multiple internet access points may facilitate online privacy behavior. Second, it explains the diversity of connectivity-online privacy behavior link in terms of information literacy. Design/methodology/approach Situated in the context of urban poor youth in the Philippines, this paper used a quantitative approach, specifically an interview-administered survey technique. Respondents were from three cities in Metro Manila. To test for indirect (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.Colin J. Bennett - 1991 - Science, Technology and Human Values 16 (1):51-69.
    Public policies designed to regulate the use of information technology to protect personal data have been based on different theoretical assumptions in different states, depending on whether the problem is defined in technological, civil libertarian, or bureaucratic terms. However, the rapid development, dispersal, and decentralization of information technology have facilitated a range of new surveillance practices that have in turn rendered the approaches of the 1960s and 1970s obsolete. The networking of the postindustrial state will require a reconceptualization of the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The paradox of secrecy.Beryl L. Bellman - 1979 - Human Studies 4 (1):1 - 24.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • The Right to Privacy and the Right to Die.Tom L. Beauchamp - 2000 - Social Philosophy and Policy 17 (2):276-292.
    Western ethics and law have been slow to come to conclusions about the right to choose the time and manner of one's death. However, policies, practices, and legal precedents have evolved quickly in the last quarter of the twentieth century, from the forgoing of respirators to the use of Do Not Resuscitate (DNR) orders, to the forgoing of all medical technologies (including hydration and nutrition), and now, in one U.S. state, to legalized physician-assisted suicide. The sweep of history—from the Quinlan (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Learning from Law's Past: A Call for Caution in Incorporating New Innovations in Neuroscience.Jennifer S. Bard - 2007 - American Journal of Bioethics 7 (9):73-75.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Audience surveillance and the right to anonymous reading in interactive media.Lemi Baruh - 2004 - Knowledge, Technology & Policy 17 (1):59-73.
    Download  
     
    Export citation  
     
    Bookmark  
  • Towards trust-based governance of health data research.Marieke A. R. Bak, M. Corrette Ploem, Hanno L. Tan, M. T. Blom & Dick L. Willems - 2023 - Medicine, Health Care and Philosophy 26 (2):185-200.
    Developments in medical big data analytics may bring societal benefits but are also challenging privacy and other ethical values. At the same time, an overly restrictive data protection regime can form a serious threat to valuable observational studies. Discussions about whether data privacy or data solidarity should be the foundational value of research policies, have remained unresolved. We add to this debate with an empirically informed ethical analysis. First, experiences with the implementation of the General Data Protection Regulation (GDPR) within (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Control Yourself, or at Least Your Core Self.Lisa M. Austin - 2010 - Bulletin of Science, Technology and Society 30 (1):26-29.
    Contemporary privacy debates regarding new technologies often define privacy in terms of control over personal information such that the privacy “problem” is a lack of control and the privacy “solution” is increased control. This article questions the control-paradigm by pointing to its parallels with earlier debates in the philosophy of technology regarding technology that was out-of-control. What first-generation philosophers of technology understood was that at the root of the questioning of technology lay a need to question the modern self itself. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A dynamic logic for privacy compliance.Guillaume Aucher, Guido Boella & Leendert Torre - 2011 - Artificial Intelligence and Law 19 (2-3):187-231.
    Knowledge based privacy policies are more declarative than traditional action based ones, because they specify only what is permitted or forbidden to know, and leave the derivation of the permitted actions to a security monitor. This inference problem is already non trivial with a static privacy policy, and becomes challenging when privacy policies can change over time. We therefore introduce a dynamic modal logic that permits not only to reason about permitted and forbidden knowledge to derive the permitted actions, but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A dynamic logic for privacy compliance.Guillaume Aucher, Guido Boella & Leendert van der Torre - 2011 - Artificial Intelligence and Law 19 (2-3):187-231.
    Knowledge based privacy policies are more declarative than traditional action based ones, because they specify only what is permitted or forbidden to know, and leave the derivation of the permitted actions to a security monitor. This inference problem is already non trivial with a static privacy policy, and becomes challenging when privacy policies can change over time. We therefore introduce a dynamic modal logic that permits not only to reason about permitted and forbidden knowledge to derive the permitted actions, but (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Human Rights and Patients’ Privacy in UK Hospitals.Jay Woogara - 2001 - Nursing Ethics 8 (3):234-246.
    The European Convention on Human Rights has been incorporated into UK domestic law. It gives many rights to patients within the National Health Service. This article explores the concept of patients’ right to privacy. It stresses that privacy is a basic human right, and that its respect by health professionals is vital for a patient’s physical, mental, emotional and spiritual well-being. I argue that health professionals can violate patients’ privacy in a variety of ways. For example: the right to enjoy (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Understanding Privacy in Occupational Health Services.Anne Heikkinen, Gustav Wickström & Helena Leino-Kilpi - 2006 - Nursing Ethics 13 (5):515-530.
    The aim of this study was to gain a deeper understanding of privacy in occupational health services. Data were collected through in-depth theme interviews with occupational health professionals (n=15), employees (n=15) and employers (n=14). Our findings indicate that privacy, in this context, is a complex and multilayered concept, and that companies as well as individual employees have their own core secrets. Co-operation between the three groups proved challenging: occupational health professionals have to consider carefully in which situations and how much (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges.Corey M. Angst - 2009 - Journal of Business Ethics 90 (S2):169 - 178.
    When information is transformed from what has traditionally been a paper-based format into digitized elements with meaning associated to them, new and intriguing discussions begin surrounding proper and improper uses of this codified and easily transmittable information. As these discussions continue, some health care providers, insurers, laboratories, pharmacies, and other healthcare stakeholders are creating and retroactively digitizing our medical information with the unambiguous endorsement of the federal government.Some argue that these enormous databases of medical information offer improved access to timely (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Brain Privacy: How Can We Protect It?Sheri Alpert - 2007 - American Journal of Bioethics 7 (9):70-73.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, Health, and Race Equity in the Digital Age.Anita L. Allen - 2022 - American Journal of Bioethics 22 (7):60-63.
    Privacy is a basic and foundational human good meriting moral and legal protection. Privacy isn’t, however, everything. Other goods and values matter, too (Solove 2003; Ma...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A critical contribution to theoretical foundations of privacy studies.Thomas Allmer - 2011 - Journal of Information, Communication and Ethics in Society 9 (2):83-101.
    PurposeAlthough there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there is a gap in the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Unplanned effects of intelligent agents on Internet use: a social informatics approach. [REVIEW]Alexander Serenko, Umar Ruhi & Mihail Cocosila - 2007 - AI and Society 21 (1-2):141-166.
    This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens of analysis, the study identifies several unanticipated consequences of using intelligent agents for information- and commerce-based tasks on the Internet. The effects include those that transpire over time at the organizational level, such as e-commerce transformation, operational encumbrance and security overload, as well as those that emerge on a cultural level, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Impact of Individual Ethics on Reactions to Potentially Invasive HR Practices.G. Stoney Alder, Marshall Schminke & Terry W. Noel - 2007 - Journal of Business Ethics 75 (2):201-214.
    In recent years, the practices of work organizations have raised increasing concerns regarding individual privacy at work. It is clear that people expect and value privacy in their personal lives. However, the extent to which privacy perceptions influence individuals’ work attitudes is less clear. Research has explored the extent to which employee perceptions of privacy derive from characteristics of the programs themselves. However, there is a paucity of research that examines how the characteristics of the individual employee may influence perceptions (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Surgical patients' and nurses' opinions and expectations about privacy in care.E. Akyuz & F. Erdemir - 2013 - Nursing Ethics 20 (6):660-671.
    The purpose of this study was to determine the opinions and expectations of patients and nurses about privacy during a hospital admission for surgery. The study explored what enables and maintains privacy from the perspective of Turkish surgical patients and nurses. The study included 102 adult patients having surgery and 47 nurses caring for them. Data were collected via semistructured questionnaire by face-to-face interviews. The results showed that patients were mostly satisfied by the respect shown to their privacy by the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Information technology and moral values.John Sullins - forthcoming - Stanford Encyclopedia of Philosophy.
    A encyclopedia entry on the moral impacts that happen when information technologies are used to record, communicate and organize information. including the moral challenges of information technology, specific moral and cultural challenges such as online games, virtual worlds, malware, the technology transparency paradox, ethical issues in AI and robotics, and the acceleration of change in technologies. It concludes with a look at information technology as a model for moral change, moral systems and moral agents.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Hypocrisy and Epistemic Injustice.Brian Carey - forthcoming - Ethical Theory and Moral Practice:1-18.
    In this article I argue that we should understand some forms of hypocritical behaviour in terms of epistemic injustice; a type of injustice in which a person is wronged in their capacity as a knower. If each of us has an interest in knowing what morality requires of us, this can be undermined when hypocritical behaviour distorts our perception of the moral landscape by misrepresenting the demandingness of putative moral obligations. This suggests that a complete theory of the wrongness of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Basic issues in AI policy.Vincent C. Müller - 2022 - In Maria Amparo Grau-Ruiz (ed.), Interactive robotics: Legal, ethical, social and economic aspects. Springer. pp. 3-9.
    This extended abstract summarises some of the basic points of AI ethics and policy as they present themselves now. We explain the notion of AI, the main ethical issues in AI and the main policy aims and means.
    Download  
     
    Export citation  
     
    Bookmark  
  • Binding the Smart City Human-Digital System with Communicative Processes.Brandt Dainow - 2021 - In Michael Nagenborg, Taylor Stone, Margoth González Woge & Pieter E. Vermaas (eds.), Technology and the City: Towards a Philosophy of Urban Technologies. Springer Verlag. pp. 389-411.
    This chapter will explore the dynamics of power underpinning ethical issues within smart cities via a new paradigm derived from Systems Theory. The smart city is an expression of technology as a socio-technical system. The vision of the smart city contains a deep fusion of many different technical systems into a single integrated “ambient intelligence”. ETICA Project, 2010, p. 102). Citizens of the smart city will not experience a succession of different technologies, but a single intelligent and responsive environment through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, Informed Consent, and Participant Observation.Julie Zahle - 2017 - Perspectives on Science 25 (4):465-487.
    In the literature on social research, adherence to the principle of informed consent is sometimes recommended on the ground that the privacy of those being studied is hereby protected. The principle has it that before becoming part of a study, a competent individual must receive information about its purpose, use, etc., and on this basis freely agree to participate. Joan Sieber motivates the employment of informed consent as a way to safeguard research participants' privacy as follows: "A research experience regarded (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Patients' privacy of the person and human rights.Jay Woogara - 2005 - Nursing Ethics 12 (3):273-287.
    The UK Government published various circulars to indicate the importance of respecting the privacy and dignity of NHS patients following the implementation of the Human Rights Act, 1998. This research used an ethnographic method to determine the extent to which health professionals had in fact upheld the philosophy of these documents. Fieldwork using nonparticipant observation, and unstructured and semistructured interviews with patients and staff, took place over six months in three acute care wards in a large district NHS trust hospital. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Book Review: Patients’ autonomy, privacy and informed consent. [REVIEW]Jay Woogara - 2001 - Nursing Ethics 8 (2):166-167.
    Download  
     
    Export citation  
     
    Bookmark  
  • Journalists and the character of public officials/figures.Lee Wilkins - 1994 - Journal of Mass Media Ethics 9 (3):157 – 168.
    Political character, the dynamic intersection of personality and public performance within a cultural and historical context, is appropriately the subject of news reports. The article provides journalists with an ethical rationale for covering political character while acknowledging the human need for privacy and then outlines a set of characterrelated issues that journalists should explore. It concludes with the suggestion that journalists should once again begin to cover the public record of political figures in-depth and that this public record be linked (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Taking Patient Privacy and Autonomy More Seriously: Why an Orwellian Account Is Not Sufficient.Karsten Weber, Uta Bittner, Arne Manzeschke, Elisabeth Rother, Friedericke Quack, Kathrin Dengler & Heiner Fangerau - 2012 - American Journal of Bioethics 12 (9):51-53.
    The American Journal of Bioethics, Volume 12, Issue 9, Page 51-53, September 2012.
    Download  
     
    Export citation  
     
    Bookmark  
  • An enquiry into the ethical efficacy of the use of radio frequency identification technology.David M. Wasieleski & Mordechai Gal-Or - 2008 - Ethics and Information Technology 10 (1):27-40.
    This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Social networks, the 2016 US presidential election, and Kantian ethics: applying the categorical imperative to Cambridge Analytica’s behavioral microtargeting.Ken Ward - 2018 - Journal of Media Ethics 33 (3):133-148.
    ABSTRACTThe 2016 US presidential election witnessed the development of ethically dubious methods of political persuasion built and executed on social networking sites. The following analyzes the ethics of behavioral microtargeting practices such as those of Cambridge Analytica, a company that claims to have played a central role in Donald Trump’s successful candidacy through its use of social networking sites such as Facebook. After describing Cambridge Analytica’s method of data manipulation and identifying several threats to individual autonomy posed by such practices, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Quantifying privacy in terms of entropy for context aware services.Athanasios S. Voulodimos & Charalampos Z. Patrikakis - 2009 - Identity in the Information Society 2 (2):155-169.
    In this paper, we address the issue of privacy protection in context aware services, through the use of entropy as a means of measuring the capability of locating a user’s whereabouts and identifying personal selections. We present a framework for calculating levels of abstraction in location and personal preferences reporting in queries to a context aware services server. Finally, we propose a methodology for determining the levels of abstraction in location and preferences that should be applied in user data reporting (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Data, Privacy, and Agency: Beyond Transparency to Empowerment.Erika Versalovic, Sara Goering & Eran Klein - 2022 - American Journal of Bioethics 22 (7):63-65.
    Separation-based accounts of privacy define privacy as being left alone and unaccessed. Pyrrho et al. propose a more control-based account where privacy is about having the age...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Biomedical Big Data: New Models of Control Over Access, Use and Governance.Alessandro Blasimme & Effy Vayena - 2017 - Journal of Bioethical Inquiry 14 (4):501-513.
    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Property, privacy and personhood in a world of ambient intelligence.Niels van Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Digital Vigilantism as Weaponisation of Visibility.Daniel Trottier - 2017 - Philosophy and Technology 30 (1):55-72.
    This paper considers an emerging practice whereby citizen’s use of ubiquitous and domesticated technologies enable a parallel form of criminal justice. Here, weaponised visibility supersedes police intervention as an appropriate response. Digital vigilantism is a user-led violation of privacy that not only transcends online/offline distinctions but also complicates relations of visibility and control between police and the public. This paper develops a theoretically nuanced and empirically grounded understanding of digital vigilantism in order to advance a research agenda in this area (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Public Actors Without Public Values: Legitimacy, Domination and the Regulation of the Technology Sector.Linnet Taylor - 2021 - Philosophy and Technology 34 (4):897-922.
    The scale and asymmetry of commercial technology firms’ power over people through data, combined with the increasing involvement of the private sector in public governance, means that increasingly, people do not have the ability to opt out of engaging with technology firms. At the same time, those firms are increasingly intervening on the population level in ways that have implications for social and political life. This creates the potential for power relations of domination, and demands that we decide what constitutes (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations