Switch to: References

Citations of:

Privacy and Freedom

Science and Society 34 (3):360-363 (1970)

Add citations

You must login to add citations.
  1. Design for Embedding the Value of Privacy in Personal Information Management Systems.Haleh Asgarinia - 2024 - Journal of Ethics and Emerging Technologies 33 (1):1-19.
    Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around the design of privacy-friendly systems that comply with legal requirements, there has been relatively limited philosophical discourse on incorporating the value of privacy into these systems. Exploring the connection between privacy and personal autonomy illuminates the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • To Each Technology Its Own Ethics: The Problem of Ethical Proliferation.Henrik Skaug Sætra & John Danaher - 2022 - Philosophy and Technology 35 (4):1-26.
    Ethics plays a key role in the normative analysis of the impacts of technology. We know that computers in general and the processing of data, the use of artificial intelligence, and the combination of computers and/or artificial intelligence with robotics are all associated with ethically relevant implications for individuals, groups, and society. In this article, we argue that while all technologies are ethically relevant, there is no need to create a separate ‘ethics of X’ or ‘X ethics’ for each and (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Patients' privacy of the person and human rights.Jay Woogara - 2005 - Nursing Ethics 12 (3):273-287.
    The UK Government published various circulars to indicate the importance of respecting the privacy and dignity of NHS patients following the implementation of the Human Rights Act, 1998. This research used an ethnographic method to determine the extent to which health professionals had in fact upheld the philosophy of these documents. Fieldwork using nonparticipant observation, and unstructured and semistructured interviews with patients and staff, took place over six months in three acute care wards in a large district NHS trust hospital. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • (1 other version)The ethics of online retailing: A scale development and validation from the consumers' perspective. [REVIEW]Sergio Roman - 2007 - Journal of Business Ethics 72 (2):131-148.
    While e-commerce has witnessed extensive growth in recent years, so has consumers’ concerns regarding ethical issues surrounding online shopping. The vast majority of earlier research on this area is conceptual in nature, and limited in scope by focusing on consumers’ privacy issues. This study develops a reliable and valid scale to measure consumers’ perceptions regarding the ethics of online retailers. Findings indicate that the four factors of the scale – security, privacy, non-deception and fulfillment/reliability – are strongly predictive of online (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Privacy concerns in integrating big data in “e-Oman”.Stuti Saxena - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):385-396.
    Purpose Whereas integration of big data in “e-Oman” – the e-government face of Oman – is a significant prospect, this paper aims to underscore the challenges of privacy concerns in effecting such integration. Design/methodology/approach Providing a brief description about the concepts of e-government and big data, the paper follows a discussion on “e-Oman”. While drawing a framework for integration of big data in “e-Oman”, the paper throws light on the privacy concerns in effecting such an integration following a qualitative approach. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • (1 other version)Online privacy as a corporate social responsibility: an empirical study.Irene Pollach - 2011 - Business Ethics: A European Review 20 (1):88-102.
    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two. Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. The findings indicate that only a small proportion of the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Taking Patient Privacy and Autonomy More Seriously: Why an Orwellian Account Is Not Sufficient.Karsten Weber, Uta Bittner, Arne Manzeschke, Elisabeth Rother, Friedericke Quack, Kathrin Dengler & Heiner Fangerau - 2012 - American Journal of Bioethics 12 (9):51-53.
    The American Journal of Bioethics, Volume 12, Issue 9, Page 51-53, September 2012.
    Download  
     
    Export citation  
     
    Bookmark  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Journalists and the character of public officials/figures.Lee Wilkins - 1994 - Journal of Mass Media Ethics 9 (3):157 – 168.
    Political character, the dynamic intersection of personality and public performance within a cultural and historical context, is appropriately the subject of news reports. The article provides journalists with an ethical rationale for covering political character while acknowledging the human need for privacy and then outlines a set of characterrelated issues that journalists should explore. It concludes with the suggestion that journalists should once again begin to cover the public record of political figures in-depth and that this public record be linked (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • What is the ‘personal’ in ‘personal information’?Sille Obelitz Søe, Rikke Frank Jørgensen & Jens-Erik Mai - 2021 - Ethics and Information Technology 23 (4):625-633.
    Contemporary privacy theories and European discussions about data protection employ the notion of ‘personal information’ to designate their areas of concern. The notion of personal information is demarcated from non-personal information—or just information—indicating that we are dealing with a specific kind of information. However, within privacy scholarship the notion of personal information appears undertheorized, rendering the concept somewhat unclear. We argue that in an age of datafication, protection of personal information and privacy is crucial, making the understanding of what is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy self-management and the issue of privacy externalities: of thwarted expectations, and harmful exploitation.Simeon de Brouwer - 2020 - Internet Policy Review 9 (4).
    This article argues that the self-management of one’s privacy is impossible due to privacy externalities. Privacy externalities are the negative by-product of the services offered by some data controllers, whereby the price to ‘pay’ for a service includes not just the provision of the user’s own personal data, but also that of others. This term, related to similar concepts from the literature on privacy such as ‘networked privacy’ or ‘data pollution’, is used here to bring to light the incentives and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A Critical Study of Four Definitions of Privacy From The Viewpoint of Western Ethics.Hamid Shahriari - 2019 - Journal of Philosophical Theological Research 21 (4):103-128.
    This article addresses four definitions of privacy. Initially, the literal meaning of privacy is mentioned; It then discusses the meaning of the term “privacy” in Ethics. The first meaning is the right to be alone and free. The second meaning of privacy is informational and is divided into two types: one is the definition based on expectation and another is a definition based on the state of awareness. The third type is the definition that defines privacy based on control. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • (1 other version)Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva - An Internet Journal of Philosophy 9 (1).
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of solitude, intimacy and confidentiality and shows that, so described, people have legitimate interests in privacy. These interests are both personal and political, and provide the grounds for two different justifications of privacy rights. Though both are based on democratic concerns for the freedom and equality of individuals, these two justifications for privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Social networks, the 2016 US presidential election, and Kantian ethics: applying the categorical imperative to Cambridge Analytica’s behavioral microtargeting.Ken Ward - 2018 - Journal of Media Ethics 33 (3):133-148.
    ABSTRACTThe 2016 US presidential election witnessed the development of ethically dubious methods of political persuasion built and executed on social networking sites. The following analyzes the ethics of behavioral microtargeting practices such as those of Cambridge Analytica, a company that claims to have played a central role in Donald Trump’s successful candidacy through its use of social networking sites such as Facebook. After describing Cambridge Analytica’s method of data manipulation and identifying several threats to individual autonomy posed by such practices, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent.Irene Pollach - 2005 - Journal of Business Ethics 62 (3):221-235.
    The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Perceptions of Privacy in the Care of Elderly People in Five European Countries.Anja Schopp, Helena Leino-Kilpi, Maritta Välimäki, Theo Dassen, Maria Gasull, Chryssoula Lemonidou, P. Anne Scott, Marianne Arndt & Anne Kaljonen - 2003 - Nursing Ethics 10 (1):39-47.
    The focus of this article is on elderly patients’ and nursing staff perceptions of privacy in the care of elderly patients/residents in five European countries. Privacy includes physical, social and informational elements. The results show that perceptions of privacy were strongest in the UK (Scotland) and weakest in Greece. Country comparisons revealed statistically significant differences between the perceptions of elderly patients and also between those of nurses working in the same ward or long-term care facility. Perceptions of privacy by patients (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The Right to Our Personal Memories: Informational Self-determination and the Right to Record and Disclose Our Personal Data.Gabriel Stilman - 2015 - Journal of Evolution and Technology 25 (2):14-24.
    The right to informational self-determination has been widely recognized in many legal systems. It is the right of people to choose freely under what circumstances and to what extent they will expose information about themselves. So far; this notion has served as a means for restricting the circulation of information. By contrast; this paper argues that informational self-determination includes an informational-expansive aspect: the power of the individual to actively process – primarily by recording; storing; and eventually releasing to others - (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Young people online and the social value of privacy.Valerie Steeves & Priscilla Regan - 2014 - Journal of Information, Communication and Ethics in Society 12 (4):298-313.
    Purpose– The purpose of this paper is to develop a conceptual framework to contextualize young people’s lived experiences of privacy and invasion online. Social negotiations in the construction of privacy boundaries are theorized to be dependent on individual preferences, abilities and context-dependent social meanings.Design/methodology/approach– Empirical findings of three related Ottawa-based studies dealing with young people’s online privacy are used to examine the benefits of online publicity, what online privacy means to young people and the social importance of privacy. Earlier philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Internet research: An opportunity to revisit classic ethical problems in behavioral research.David J. Pittenger - 2003 - Ethics and Behavior 13 (1):45 – 60.
    The Internet offers many new opportunities for behavioral researchers to conduct quantitative and qualitative research. Although the ethical guidelines of the American Psychological Association generalize, in part, to research conducted through the Internet, several matters related to Internet research require further analysis. This article reviews several fundamental ethical issues related to Internet research, namely the preservation of privacy, the issuance of informed consent, the use of deception and false feedback, and research methods. In essence, the Internet offers unique challenges to (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Data, Privacy, and Agency: Beyond Transparency to Empowerment.Erika Versalovic, Sara Goering & Eran Klein - 2022 - American Journal of Bioethics 22 (7):63-65.
    Separation-based accounts of privacy define privacy as being left alone and unaccessed. Pyrrho et al. propose a more control-based account where privacy is about having the age...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Book Review: Patients’ autonomy, privacy and informed consent. [REVIEW]Jay Woogara - 2001 - Nursing Ethics 8 (2):166-167.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy issues in a psychiatric context: applying the ISD privacy framework to a psychiatric behavioural monitoring system. [REVIEW]Rusyaizila Ramli & Nasriah Zakaria - 2014 - AI and Society 29 (2):203-213.
    Privacy issues are frequently discussed amongst researchers, practitioners and patients in healthcare. However, psychiatric patients’ privacy issues get less attention in information system development (ISD), whereby they are one of the most important stakeholders. This paper applies Carew and Stapleton’s ISD privacy framework to psychiatric monitoring systems to understand the issues that are related to monitoring psychiatric patients’ behaviour. By understanding the privacy issues amongst patients, the research will be able to provide guidance to system developers to produce a privacy-sensitive (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Property, privacy and personhood in a world of ambient intelligence.Niels van Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • An enquiry into the ethical efficacy of the use of radio frequency identification technology.David M. Wasieleski & Mordechai Gal-Or - 2008 - Ethics and Information Technology 10 (1):27-40.
    This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The ethics of inattention: revitalising civil inattention as a privacy-protecting mechanism in public spaces.Tamar Sharon & Bert-Jaap Koops - 2021 - Ethics and Information Technology 23 (3):331-343.
    Societies evolve practices that reflect social norms of appropriateness in social interaction, for example when and to what extent one should respect the boundaries of another person’s private sphere. One such practice is what the sociologist Erving Goffman called civil inattention—the social norm of showing a proper amount of indifference to others—which functions as an almost unnoticed yet highly potent privacy-preserving mechanism. These practices can be disrupted by technologies that afford new forms of intrusions. In this paper, we show how (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Public Actors Without Public Values: Legitimacy, Domination and the Regulation of the Technology Sector.Linnet Taylor - 2021 - Philosophy and Technology 34 (4):897-922.
    The scale and asymmetry of commercial technology firms’ power over people through data, combined with the increasing involvement of the private sector in public governance, means that increasingly, people do not have the ability to opt out of engaging with technology firms. At the same time, those firms are increasingly intervening on the population level in ways that have implications for social and political life. This creates the potential for power relations of domination, and demands that we decide what constitutes (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Information privacy, the right to receive information and (mobile) ICTs.Litska Strikwerda - 2010 - Etikk I Praksis - Nordic Journal of Applied Ethics 2 (2):27-40.
    The first part of this paper is about the notion of privacy and its grounding in law. It discusses the tension between the right to privacy and the right to receive information. The second part of this paper explores how ICTs challenge and complicate privacy claims and satisfy the right to receive information.
    Download  
     
    Export citation  
     
    Bookmark  
  • Biomedical Big Data: New Models of Control Over Access, Use and Governance.Alessandro Blasimme & Effy Vayena - 2017 - Journal of Bioethical Inquiry 14 (4):501-513.
    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • (1 other version)Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Quantifying privacy in terms of entropy for context aware services.Athanasios S. Voulodimos & Charalampos Z. Patrikakis - 2009 - Identity in the Information Society 2 (2):155-169.
    In this paper, we address the issue of privacy protection in context aware services, through the use of entropy as a means of measuring the capability of locating a user’s whereabouts and identifying personal selections. We present a framework for calculating levels of abstraction in location and personal preferences reporting in queries to a context aware services server. Finally, we propose a methodology for determining the levels of abstraction in location and preferences that should be applied in user data reporting (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation