Switch to: References

Citations of:

Privacy and Freedom

Science and Society 34 (3):360-363 (1970)

Add citations

You must login to add citations.
  1. Own Data? Ethical Reflections on Data Ownership.Patrik Hummel, Matthias Braun & Peter Dabrock - 2020 - Philosophy and Technology 34 (3):545-572.
    In discourses on digitization and the data economy, it is often claimed that data subjects shall beownersof their data. In this paper, we provide a problem diagnosis for such calls fordata ownership: a large variety of demands are discussed under this heading. It thus becomes challenging to specify what—if anything—unites them. We identify four conceptual dimensions of calls for data ownership and argue that these help to systematize and to compare different positions. In view of this pluralism of data ownership (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy.Meng-Hsiang Hsu & Feng-Yang Kuo - 2003 - Journal of Business Ethics 42 (4):305 - 320.
    In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows that (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The journalist and privacy.Louis Hodges - 1994 - Journal of Mass Media Ethics 9 (4):197 – 212.
    The moral right to privacy consists of the power to determine who may gain access to information about oneself. Individual human beings need some measure of privacy in order to develop a sense of self and to avoid manipulation by the state. Journalists who respect the privacy rights of those on whom they report should especially be careful not to intrude unduly when gathering information, in publishing they should be able to demonstrate a public need to know private information. Individual (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Designing databases that enhance people’s privacy without hindering organizations: Towards informational self-determination.Thomas B. Hodel-Widmer - 2006 - Ethics and Information Technology 8 (1):3-15.
    We argue that future database systems must provide autonomy for individuals for the privacy of data they manage. We propose a design for such a system, identify challenges and problems, and suggest some approaches to these. We enunciate the reasons for informational self-determination systems, which include legal, organizational and technical issues. Our main goal is to achieve a widely-accepted realistic and practical solution in order to ensure privacy for individuals in our future world, yet without hindering business and security.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, technology, and social change.Daniel P. Hillyard & Sarah M. Knight - 2004 - Knowledge, Technology & Policy 17 (1):81-101.
    Download  
     
    Export citation  
     
    Bookmark  
  • Balance or Trade-off? Online Security Technologies and Fundamental Rights.Mireille Hildebrandt - 2013 - Philosophy and Technology 26 (4):357-379.
    In this contribution, I will argue that the image of a balance is often used to defend the idea of a trade-off. To understand the drawbacks of this line of thought, I will explore the relationship between online security technologies and fundamental rights, notably privacy, nondiscrimination, freedom of speech and due process. After discriminating between three types of online security technologies, I will trace the reconfiguration of the notion of privacy in the era of smart environments. This will lead to (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Sharing personal genetic information: the impact of privacy concern and awareness of benefit.Don Heath, Ali Ardestani & Hamid Nemati - 2016 - Journal of Information, Communication and Ethics in Society 14 (3):288-308.
    Purpose Human genomic research demands very large pools of data to generate meaningful inference. Yet, the sharing of one’s genetic data for research is a voluntary act. The collection of data sufficient to fuel rapid advancement is contingent on individuals’ willingness to share. Privacy risks associated with sharing this unique and intensely personal data are significant. Genetic data are an unambiguous identifier. Public linkage of donor to their genetic data could reveal predisposition to diseases, behaviors, paternity, heredity, intelligence, etc. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information.Nick Hajli & Xiaolin Lin - 2016 - Journal of Business Ethics 133 (1):111-123.
    Social networking sites have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to be negatively (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Linking Human And Machine Behavior: A New Approach to Evaluate Training Data Quality for Beneficial Machine Learning.Thilo Hagendorff - 2021 - Minds and Machines 31 (4):563-593.
    Machine behavior that is based on learning algorithms can be significantly influenced by the exposure to data of different qualities. Up to now, those qualities are solely measured in technical terms, but not in ethical ones, despite the significant role of training and annotation data in supervised machine learning. This is the first study to fill this gap by describing new dimensions of data quality for supervised machine learning applications. Based on the rationale that different social and psychological backgrounds of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • From privacy to anti-discrimination in times of machine learning.Thilo Hagendorff - 2019 - Ethics and Information Technology 21 (4):331-343.
    Due to the technology of machine learning, new breakthroughs are currently being achieved with constant regularity. By using machine learning techniques, computer applications can be developed and used to solve tasks that have hitherto been assumed not to be solvable by computers. If these achievements consider applications that collect and process personal data, this is typically perceived as a threat to information privacy. This paper aims to discuss applications from both fields of personality and image analysis. These applications are often (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Surveillance Technologies, Wrongful Criminalisation, and the Presumption of Innocence.Katerina Hadjimatheou - 2017 - Philosophy and Technology 30 (1):39-54.
    The potential of surveillance practices to undermine the presumption of innocence is a growing concern amongst critics of surveillance. This paper attempts to assess the impact of surveillance on the presumption of innocence. It defends an account of the presumption of innocence as a protection against wrongful criminalisation against alternatives, and considers both the ways in which surveillance might undermine that protection and the—hitherto overlooked—ways in which it might promote it. It draws on empirical work on the causes of erroneous (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Ripples down under: New Zealand youngsters’ attitudes and conduct following Snowden.Gehan Gunasekara, Andrew A. Adams & Kiyoshi Murata - 2017 - Journal of Information, Communication and Ethics in Society 15 (3):297-310.
    Purpose This study aims to test the attitudes towards and social consequences of Edward Snowden’s revelations in New Zealand, taking into account New Zealand’s socio-cultural and political environment especially as regards privacy and state surveillance. Design/methodology/approach A questionnaire survey of 66 university students and semi-structured follow-up interviews with 18 respondents were conducted, in addition to reviews of the literature on privacy and state surveillance in New Zealand. The outcomes of the survey were statistically analysed and qualitative analyses of the interview (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • PETs and their users: a critical review of the potentials and limitations of the privacy as confidentiality paradigm. [REVIEW]Seda Gürses - 2010 - Identity in the Information Society 3 (3):539-563.
    “Privacy as confidentiality” has been the dominant paradigm in computer science privacy research. Privacy Enhancing Technologies (PETs) that guarantee confidentiality of personal data or anonymous communication have resulted from such research. The objective of this paper is to show that such PETs are indispensable but are short of being the privacy solutions they sometimes claim to be given current day circumstances. Using perspectives from surveillance studies we will argue that the computer scientists’ conception of privacy through data or communication confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Health Information: Reconciling Personal Privacy with the Public Good of Human Health. [REVIEW]Lawrence O. Gostin - 2001 - Health Care Analysis 9 (3):321-335.
    The success of the health care system depends on the accuracy, correctness and trustworthiness of the information, and the privacy rights of individuals to control the disclosure of personal information. A national policy on health informational privacy should be guided by ethical principles that respect individual autonomy while recognizing the important collective interests in the use of health information. At present there are no adequate laws or constitutional principles to help guide a rational privacy policy. The laws are scattered and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Podium.Janlori Goldman - 2001 - Journal of Law, Medicine and Ethics 29 (3-4):395-400.
    Download  
     
    Export citation  
     
    Bookmark  
  • The Podium.Janlori Goldman - 2001 - Journal of Law, Medicine and Ethics 29 (3-4):395-400.
    Download  
     
    Export citation  
     
    Bookmark  
  • The New Federal Health Privacy Regulations: How Will States Take the Lead?Janlori Goldman - 2001 - Journal of Law, Medicine and Ethics 29 (3-4):395-400.
    Download  
     
    Export citation  
     
    Bookmark  
  • Towards an alternative concept of privacy.Christian Fuchs - 2011 - Journal of Information, Communication and Ethics in Society 9 (4):220-237.
    PurposeThere are a lot of discussions about privacy in relation to contemporary communication systems (such as Facebook and other “social media” platforms), but discussions about privacy on the internet in most cases misses a profound understanding of the notion of privacy and where this notion is coming from. The purpose of this paper is to challenge the liberal notion of privacy and explore foundations of an alternative privacy conception.Design/methodology/approachA typology of privacy definitions is elaborated based on Giddens' theory of structuration. (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The concept of privacy from a symbolic interaction perspective.W. H. Foddy & W. R. Finighan - 1980 - Journal for the Theory of Social Behaviour 10 (1):1–18.
    Privacy is defined within a symbolic interaction framework in terms of identity definition and maintenance processes. It is argued that defining privacy within a symbolic interaction framework both generates a number of hypotheses involving the concept of privacy and allows the theorist to draw together several social psychological concepts within the one conceptual schema.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Bibliographical essay / privacy and criminal justice policies.Ferdinand D. Schoeman - 1983 - Criminal Justice Ethics 2 (2):71-82.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, democracy and the politics of disease surveillance.Amy L. Fairchild, Ronald Bayer & James Colgrove - 2008 - Public Health Ethics 1 (1):30-38.
    Fairchild, Center for the History and Ethics of Public Health in the Department of Sociomedical Sciences at Columbia University's Mailman School of Public Health Abstract Surveillance is a cornerstone of public health. It permits us to recognize disease outbreaks, to track the incidence and prevalence of threats to public health, and to monitor the effectiveness of our interventions. But surveillance also challenges our understandings of the significance and role of privacy in a liberal democracy. In this paper we trace the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. [REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.
    The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues treated in (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph.Josep Domingo-Ferrer & Alberto Blanco-Justicia - 2020 - Science and Engineering Ethics 26 (3):1267-1285.
    Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies. The pervasiveness and democratization of ICTs have allowed people from all backgrounds to access and use them, which has resulted in new information-based assets. At the same time, this phenomenon has brought a new class of problems, in the form of activists, criminals and state actors that target the new assets to achieve their goals, legitimate or not. Cybersecurity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Property, privacy and personhood in a world of ambient intelligence.Niels Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Online Deliberation: Design, Research, and Practice.Todd Davies & Seeta Peña Gangadharan (eds.) - 2009 - CSLI Publications/University of Chicago Press.
    Can new technology enhance purpose-driven, democratic dialogue in groups, governments, and societies? Online Deliberation: Design, Research, and Practice is the first book that attempts to sample the full range of work on online deliberation, forging new connections between academic research, technology designers, and practitioners. Since some of the most exciting innovations have occurred outside of traditional institutions, and those involved have often worked in relative isolation from each other, work in this growing field has often failed to reflect the full (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Design for Embedding the Value of Privacy in Personal Information Management Systems.Haleh Asgarinia - 2024 - Journal of Ethics and Emerging Technologies 33 (1):1-19.
    Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around the design of privacy-friendly systems that comply with legal requirements, there has been relatively limited philosophical discourse on incorporating the value of privacy into these systems. Exploring the connection between privacy and personal autonomy illuminates the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A Critical Study of Four Definitions of Privacy From The Viewpoint of Western Ethics.Hamid Shahriari - 2019 - Journal of Philosophical Theological Research 21 (4):103-128.
    This article addresses four definitions of privacy. Initially, the literal meaning of privacy is mentioned; It then discusses the meaning of the term “privacy” in Ethics. The first meaning is the right to be alone and free. The second meaning of privacy is informational and is divided into two types: one is the definition based on expectation and another is a definition based on the state of awareness. The third type is the definition that defines privacy based on control. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva - An Internet Journal of Philosophy 9 (1).
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of solitude, intimacy and confidentiality and shows that, so described, people have legitimate interests in privacy. These interests are both personal and political, and provide the grounds for two different justifications of privacy rights. Though both are based on democratic concerns for the freedom and equality of individuals, these two justifications for privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Privacy self-management and the issue of privacy externalities: of thwarted expectations, and harmful exploitation.Simeon de Brouwer - 2020 - Internet Policy Review 9 (4).
    This article argues that the self-management of one’s privacy is impossible due to privacy externalities. Privacy externalities are the negative by-product of the services offered by some data controllers, whereby the price to ‘pay’ for a service includes not just the provision of the user’s own personal data, but also that of others. This term, related to similar concepts from the literature on privacy such as ‘networked privacy’ or ‘data pollution’, is used here to bring to light the incentives and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • AI Human Impact: Toward a Model for Ethical Investing in AI-Intensive Companies.James Brusseau - manuscript
    Does AI conform to humans, or will we conform to AI? An ethical evaluation of AI-intensive companies will allow investors to knowledgeably participate in the decision. The evaluation is built from nine performance indicators that can be analyzed and scored to reflect a technology’s human-centering. When summed, the scores convert into objective investment guidance. The strategy of incorporating ethics into financial decisions will be recognizable to participants in environmental, social, and governance investing, however, this paper argues that conventional ESG frameworks (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark  
  • A Framework for Analyzing and Comparing Privacy States.Alan Rubel & Ryan Biava - 2014 - JASIST: The Journal of the American Society for Information Science and Technology 65 (12):2422-2431.
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the nature and value of privacy. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Correspondents theory 1800/2000: philosophical reflections upon epistolary technics and praxis in the analogue and digital. [REVIEW]Anthony John Charles Ross - unknown
    When we talk about things like the 'lost art of letter-writing' or the 'digital communications revolution,' what do we mean? What do we lose and what do we gain as we move towards digital ways of being in the world? Critically engaging with many of the canonical writers in the philosophy of technology , and following what has been termed the 'empirical turn' in that discipline, this thesis answers such questions by means of a philosophical, comparative study of epistolary technics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Right to Our Personal Memories: Informational Self-determination and the Right to Record and Disclose Our Personal Data.Gabriel Stilman - 2015 - Journal of Evolution and Technology 25 (2):14-24.
    The right to informational self-determination has been widely recognized in many legal systems. It is the right of people to choose freely under what circumstances and to what extent they will expose information about themselves. So far; this notion has served as a means for restricting the circulation of information. By contrast; this paper argues that informational self-determination includes an informational-expansive aspect: the power of the individual to actively process – primarily by recording; storing; and eventually releasing to others - (...)
    Download  
     
    Export citation  
     
    Bookmark