Switch to: References

Citations of:

Privacy and Freedom

Science and Society 34 (3):360-363 (1970)

Add citations

You must login to add citations.
  1. Design for Embedding the Value of Privacy in Personal Information Management Systems.Haleh Asgarinia - 2024 - Journal of Ethics and Emerging Technologies 33 (1):1-19.
    Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around the design of privacy-friendly systems that comply with legal requirements, there has been relatively limited philosophical discourse on incorporating the value of privacy into these systems. Exploring the connection between privacy and personal autonomy illuminates the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Mechanisms of Techno-Moral Change: A Taxonomy and Overview.John Danaher & Henrik Skaug Sætra - 2023 - Ethical Theory and Moral Practice 26 (5):763-784.
    The idea that technologies can change moral beliefs and practices is an old one. But how, exactly, does this happen? This paper builds on an emerging field of inquiry by developing a synoptic taxonomy of the mechanisms of techno-moral change. It argues that technology affects moral beliefs and practices in three main domains: decisional (how we make morally loaded decisions), relational (how we relate to others) and perceptual (how we perceive situations). It argues that across these three domains there are (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur (eds.), The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. First, a change in emphasis from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The history of digital ethics.Vincent C. Müller - 2023 - In Carissa Véliz (ed.), The Oxford Handbook of Digital Ethics. Oxford University Press. pp. 1-18.
    Digital ethics, also known as computer ethics or information ethics, is now a lively field that draws a lot of attention, but how did it come about and what were the developments that lead to its existence? What are the traditions, the concerns, the technological and social developments that pushed digital ethics? How did ethical issues change with digitalisation of human life? How did the traditional discipline of philosophy respond? The article provides an overview, proposing historical epochs: ‘pre-modernity’ prior to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Protesting without a face: Privacy in public demonstrations.Domingo A. Lovera-Parmo - 2023 - Constellations 30 (2):179-191.
    Download  
     
    Export citation  
     
    Bookmark  
  • To Each Technology Its Own Ethics: The Problem of Ethical Proliferation.Henrik Skaug Sætra & John Danaher - 2022 - Philosophy and Technology 35 (4):1-26.
    Ethics plays a key role in the normative analysis of the impacts of technology. We know that computers in general and the processing of data, the use of artificial intelligence, and the combination of computers and/or artificial intelligence with robotics are all associated with ethically relevant implications for individuals, groups, and society. In this article, we argue that while all technologies are ethically relevant, there is no need to create a separate ‘ethics of X’ or ‘X ethics’ for each and (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Basic issues in AI policy.Vincent C. Müller - 2022 - In Maria Amparo Grau-Ruiz (ed.), Interactive robotics: Legal, ethical, social and economic aspects. Springer. pp. 3-9.
    This extended abstract summarises some of the basic points of AI ethics and policy as they present themselves now. We explain the notion of AI, the main ethical issues in AI and the main policy aims and means.
    Download  
     
    Export citation  
     
    Bookmark  
  • Binding the Smart City Human-Digital System with Communicative Processes.Brandt Dainow - 2021 - In Michael Nagenborg, Taylor Stone, Margoth González Woge & Pieter E. Vermaas (eds.), Technology and the City: Towards a Philosophy of Urban Technologies. Springer Verlag. pp. 389-411.
    This chapter will explore the dynamics of power underpinning ethical issues within smart cities via a new paradigm derived from Systems Theory. The smart city is an expression of technology as a socio-technical system. The vision of the smart city contains a deep fusion of many different technical systems into a single integrated “ambient intelligence”. ETICA Project, 2010, p. 102). Citizens of the smart city will not experience a succession of different technologies, but a single intelligent and responsive environment through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Trust and digital privacy in healthcare: a cross-sectional descriptive study of trust and attitudes towards uses of electronic health data among the general public in Sweden.Niels Lynøe, Gert Helgesson & Sara Belfrage - 2022 - BMC Medical Ethics 23 (1):1-8.
    BackgroundThe ability of healthcare to protect sensitive personal data in medical records and registers might influence public trust, which in turn might influence willingness to allow healthcare to use such data. The aim of this study was to examine how the general public’s trust relates to their attitudes towards uses of health data.MethodsA stratified sample from the general Swedish population received a questionnaire about their willingness to share health data. Respondents were also asked about their trust in the management and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Government Surveillance, Privacy, and Legitimacy.Peter Königs - 2022 - Philosophy and Technology 35 (1):1-22.
    The recent decades have seen established liberal democracies expand their surveillance capacities on a massive scale. This article explores what is problematic about government surveillance by democracies. It proceeds by distinguishing three potential sources of concern: the concern that governments diminish citizens’ privacy by collecting their data, the concern that they diminish their privacy by accessing their data, and the concern that the collected data may be used for objectionable purposes. Discussing the meaning and value of privacy, the article argues (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The history of digital ethics.Vincent C. Müller - 2023 - In Carissa Véliz (ed.), The Oxford Handbook of Digital Ethics. Oxford University Press.
    Digital ethics, also known as computer ethics or information ethics, is now a lively field that draws a lot of attention, but how did it come about and what were the developments that lead to its existence? What are the traditions, the concerns, the technological and social developments that pushed digital ethics? How did ethical issues change with digitalisation of human life? How did the traditional discipline of philosophy respond? The article provides an overview, proposing historical epochs: ‘pre-modernity’ prior to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Measuring Automated Influence: Between Empirical Evidence and Ethical Values.Daniel Susser & Vincent Grimaldi - forthcoming - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society.
    Automated influence, delivered by digital targeting technologies such as targeted advertising, digital nudges, and recommender systems, has attracted significant interest from both empirical researchers, on one hand, and critical scholars and policymakers on the other. In this paper, we argue for closer integration of these efforts. Critical scholars and policymakers, who focus primarily on the social, ethical, and political effects of these technologies, need empirical evidence to substantiate and motivate their concerns. However, existing empirical research investigating the effectiveness of these (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?Michele Loi, Christian Hauser & Markus Christen - 2020 - Journal of Business Ethics 175 (1):7-19.
    Clients may feel trapped into sharing their private digital data with insurance companies to get a desired insurance product or premium. However, private insurance must collect some data to offer products and premiums appropriate to the client’s level of risk. This situation creates tension between the value of privacy and common insurance business practice. We argue for three main claims: first, coercion to share private data with insurers is pro tanto wrong because it violates the autonomous choice of a privacy-valuing (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The value of privileged access.Jared Peterson - 2020 - European Journal of Philosophy 29 (2):365-378.
    European Journal of Philosophy, EarlyView.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Deleuze’s Postscript on the Societies of Control Updated for Big Data and Predictive Analytics.James Brusseau - 2020 - Theoria: A Journal of Social and Political Theory 67 (164):1-25.
    In 1990, Gilles Deleuze publishedPostscript on the Societies of Control, an introduction to the potentially suffocating reality of the nascent control society. This thirty-year update details how Deleuze’s conception has developed from a broad speculative vision into specific economic mechanisms clustering around personal information, big data, predictive analytics, and marketing. The central claim is that today’s advancing control society coerces without prohibitions, and through incentives that are not grim but enjoyable, even euphoric because they compel individuals to obey their own (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • AI Human Impact: Toward a Model for Ethical Investing in AI-Intensive Companies.James Brusseau - manuscript
    Does AI conform to humans, or will we conform to AI? An ethical evaluation of AI-intensive companies will allow investors to knowledgeably participate in the decision. The evaluation is built from nine performance indicators that can be analyzed and scored to reflect a technology’s human-centering. When summed, the scores convert into objective investment guidance. The strategy of incorporating ethics into financial decisions will be recognizable to participants in environmental, social, and governance investing, however, this paper argues that conventional ESG frameworks (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • “I Am Datafied Because We Are Datafied”: an Ubuntu Perspective on (Relational) Privacy.Urbano Reviglio & Rogers Alunge - 2020 - Philosophy and Technology 33 (4):595-612.
    The debate on the ethics of privacy has been mainly dominated by Western perspectives, to the exclusion of broader ethical theories and socio-cultural perspectives. This imbalance carries risks; transplanted ethical norms and values can collide with those of the communities in which they are deployed. The consequent homogenization might also represent a missed opportunity to enrich and develop the current paradigm of privacy protection so as to effectively face new technological challenges. This article introduces and discusses the sub-Saharan philosophy of (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Own Data? Ethical Reflections on Data Ownership.Patrik Hummel, Matthias Braun & Peter Dabrock - 2020 - Philosophy and Technology 34 (3):545-572.
    In discourses on digitization and the data economy, it is often claimed that data subjects shall beownersof their data. In this paper, we provide a problem diagnosis for such calls fordata ownership: a large variety of demands are discussed under this heading. It thus becomes challenging to specify what—if anything—unites them. We identify four conceptual dimensions of calls for data ownership and argue that these help to systematize and to compare different positions. In view of this pluralism of data ownership (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity of citizens (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Two Concepts of Group Privacy.Michele Loi & Markus Christen - 2020 - Philosophy and Technology 33 (2):207-224.
    Luciano Floridi was not the first to discuss the idea of group privacy, but he was perhaps the first to discuss it in relation to the insights derived from big data analytics. He has argued that it is important to investigate the possibility that groups have rights to privacy that are not reducible to the privacy of individuals forming such groups. In this paper, we introduce a distinction between two concepts of group privacy. The first, the “what happens in Vegas (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • A Framework for Analyzing and Comparing Privacy States.Alan Rubel & Ryan Biava - 2014 - JASIST: The Journal of the American Society for Information Science and Technology 65 (12):2422-2431.
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the nature and value of privacy. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Right to Our Personal Memories: Informational Self-determination and the Right to Record and Disclose Our Personal Data.Gabriel Stilman - 2015 - Journal of Evolution and Technology 25 (2):14-24.
    The right to informational self-determination has been widely recognized in many legal systems. It is the right of people to choose freely under what circumstances and to what extent they will expose information about themselves. So far; this notion has served as a means for restricting the circulation of information. By contrast; this paper argues that informational self-determination includes an informational-expansive aspect: the power of the individual to actively process – primarily by recording; storing; and eventually releasing to others - (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking.Priscilla M. Regan & Jolene Jesse - 2019 - Ethics and Information Technology 21 (3):167-179.
    With the increase in the costs of providing education and concerns about financial responsibility, heightened consideration of accountability and results, elevated awareness of the range of teacher skills and student learning styles and needs, more focus is being placed on the promises offered by online software and educational technology. One of the most heavily marketed, exciting and controversial applications of edtech involves the varied educational programs to which different students are exposed based on how big data applications have evaluated their (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Information privacy, the right to receive information and (mobile) ICTs.Litska Strikwerda - 2010 - Etikk I Praksis - Nordic Journal of Applied Ethics 2 (2):27-40.
    The first part of this paper is about the notion of privacy and its grounding in law. It discusses the tension between the right to privacy and the right to receive information. The second part of this paper explores how ICTs challenge and complicate privacy claims and satisfy the right to receive information.
    Download  
     
    Export citation  
     
    Bookmark  
  • Social networks, the 2016 US presidential election, and Kantian ethics: applying the categorical imperative to Cambridge Analytica’s behavioral microtargeting.Ken Ward - 2018 - Journal of Media Ethics 33 (3):133-148.
    ABSTRACTThe 2016 US presidential election witnessed the development of ethically dubious methods of political persuasion built and executed on social networking sites. The following analyzes the ethics of behavioral microtargeting practices such as those of Cambridge Analytica, a company that claims to have played a central role in Donald Trump’s successful candidacy through its use of social networking sites such as Facebook. After describing Cambridge Analytica’s method of data manipulation and identifying several threats to individual autonomy posed by such practices, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Biomedical Big Data: New Models of Control Over Access, Use and Governance.Alessandro Blasimme & Effy Vayena - 2017 - Journal of Bioethical Inquiry 14 (4):501-513.
    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Privacy, Informed Consent, and Participant Observation.Julie Zahle - 2017 - Perspectives on Science 25 (4):465-487.
    In the literature on social research, adherence to the principle of informed consent is sometimes recommended on the ground that the privacy of those being studied is hereby protected. The principle has it that before becoming part of a study, a competent individual must receive information about its purpose, use, etc., and on this basis freely agree to participate. Joan Sieber motivates the employment of informed consent as a way to safeguard research participants' privacy as follows: "A research experience regarded (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Human Rights and Patients’ Privacy in UK Hospitals.Jay Woogara - 2001 - Nursing Ethics 8 (3):234-246.
    The European Convention on Human Rights has been incorporated into UK domestic law. It gives many rights to patients within the National Health Service (NHS). This article explores the concept of patients’ right to privacy. It stresses that privacy is a basic human right, and that its respect by health professionals is vital for a patient’s physical, mental, emotional and spiritual well-being. I argue that health professionals can violate patients’ privacy in a variety of ways. For example: the right to (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Digital Vigilantism as Weaponisation of Visibility.Daniel Trottier - 2017 - Philosophy and Technology 30 (1):55-72.
    This paper considers an emerging practice whereby citizen’s use of ubiquitous and domesticated technologies enable a parallel form of criminal justice. Here, weaponised visibility supersedes police intervention as an appropriate response. Digital vigilantism is a user-led violation of privacy that not only transcends online/offline distinctions but also complicates relations of visibility and control between police and the public. This paper develops a theoretically nuanced and empirically grounded understanding of digital vigilantism in order to advance a research agenda in this area (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • (1 other version)Online privacy as a corporate social responsibility: an empirical study.Irene Pollach - 2011 - Business Ethics: A European Review 20 (1):88-102.
    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two. Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. The findings indicate that only a small proportion of the (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Online Deliberation: Design, Research, and Practice.Todd Davies & Seeta Peña Gangadharan (eds.) - 2009 - CSLI Publications/University of Chicago Press.
    Can new technology enhance purpose-driven, democratic dialogue in groups, governments, and societies? Online Deliberation: Design, Research, and Practice is the first book that attempts to sample the full range of work on online deliberation, forging new connections between academic research, technology designers, and practitioners. Since some of the most exciting innovations have occurred outside of traditional institutions, and those involved have often worked in relative isolation from each other, work in this growing field has often failed to reflect the full (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information.Nick Hajli & Xiaolin Lin - 2016 - Journal of Business Ethics 133 (1):111-123.
    Social networking sites have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to be negatively (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Human Rights for the Digital Age.Kay Mathiesen - 2014 - Journal of Mass Media Ethics 29 (1):2-18.
    Human rights are those legal and/or moral rights that all persons have simply as persons. In the current digital age, human rights are increasingly being either fulfilled or violated in the online environment. In this article, I provide a way of conceptualizing the relationships between human rights and information technology. I do so by pointing out a number of misunderstandings of human rights evident in Vinton Cerf's recent argument that there is no human right to the Internet. I claim that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Understanding Privacy in Occupational Health Services.Anne Heikkinen, Gustav Wickström & Helena Leino-Kilpi - 2006 - Nursing Ethics 13 (5):515-530.
    The aim of this study was to gain a deeper understanding of privacy in occupational health services. Data were collected through in-depth theme interviews with occupational health professionals (n=15), employees (n=15) and employers (n=14). Our findings indicate that privacy, in this context, is a complex and multilayered concept, and that companies as well as individual employees have their own core secrets. Co-operation between the three groups proved challenging: occupational health professionals have to consider carefully in which situations and how much (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Perceptions of Privacy in the Care of Elderly People in Five European Countries.Anja Schopp, Helena Leino-Kilpi, Maritta Välimäki, Theo Dassen, Maria Gasull, Chryssoula Lemonidou, P. Anne Scott, Marianne Arndt & Anne Kaljonen - 2003 - Nursing Ethics 10 (1):39-47.
    The focus of this article is on elderly patients’ and nursing staff perceptions of privacy in the care of elderly patients/residents in five European countries. Privacy includes physical, social and informational elements. The results show that perceptions of privacy were strongest in the UK (Scotland) and weakest in Greece. Country comparisons revealed statistically significant differences between the perceptions of elderly patients and also between those of nurses working in the same ward or long-term care facility. Perceptions of privacy by patients (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Self-Perception and Self-Determination in Surveillance Conditions.Saskia K. Nagel & Hartmut Remmers - 2012 - American Journal of Bioethics 12 (9):53-55.
    The American Journal of Bioethics, Volume 12, Issue 9, Page 53-55, September 2012.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Taking Patient Privacy and Autonomy More Seriously: Why an Orwellian Account Is Not Sufficient.Karsten Weber, Uta Bittner, Arne Manzeschke, Elisabeth Rother, Friedericke Quack, Kathrin Dengler & Heiner Fangerau - 2012 - American Journal of Bioethics 12 (9):51-53.
    The American Journal of Bioethics, Volume 12, Issue 9, Page 51-53, September 2012.
    Download  
     
    Export citation  
     
    Bookmark  
  • Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract.Kirsten E. Martin - 2012 - Journal of Business Ethics 111 (4):519-539.
    A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce more practical guidance for organizations and managers who have employees, users, and future customers all with possibly different conceptions of privacy across contexts. However, this theoretical suggestion, while intuitively appealing, has not been empirically examined. This study (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy.Meng-Hsiang Hsu & Feng-Yang Kuo - 2003 - Journal of Business Ethics 42 (4):305 - 320.
    In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows that (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • (1 other version)Online privacy as a corporate social responsibility: an empirical study.Irene Pollach - 2011 - Business Ethics, the Environment and Responsibility 20 (1):88-102.
    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two. Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. The findings indicate that only a small proportion of the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Brain Privacy: How Can We Protect It?Sheri Alpert - 2007 - American Journal of Bioethics 7 (9):70-73.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Unplanned effects of intelligent agents on Internet use: a social informatics approach. [REVIEW]Alexander Serenko, Umar Ruhi & Mihail Cocosila - 2006 - AI and Society 21 (1):141-166.
    This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens of analysis, the study identifies several unanticipated consequences of using intelligent agents for information- and commerce-based tasks on the Internet. The effects include those that transpire over time at the organizational level, such as e-commerce transformation, operational encumbrance and security overload, as well as those that emerge on a cultural level, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing of justice and the effective (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations