Switch to: References

Citations of:

Privacy and Freedom

Science and Society 34 (3):360-363 (1970)

Add citations

You must login to add citations.
  1. Towards new human rights in the age of neuroscience and neurotechnology.Marcello Ienca & Roberto Andorno - 2017 - Life Sciences, Society and Policy 13 (1):1-27.
    Rapid advancements in human neuroscience and neurotechnology open unprecedented possibilities for accessing, collecting, sharing and manipulating information from the human brain. Such applications raise important challenges to human rights principles that need to be addressed to prevent unintended consequences. This paper assesses the implications of emerging neurotechnology applications in the context of the human rights framework and suggests that existing human rights may not be sufficient to respond to these emerging issues. After analysing the relationship between neuroscience and human rights, (...)
    Download  
     
    Export citation  
     
    Bookmark   60 citations  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Shaheen Borna & Dheeraj Sharma - 2011 - Business and Society Review 116 (3):331-353.
    Download  
     
    Export citation  
     
    Bookmark  
  • Locating a space for ethics to appear in decision-making: Privacy as an exemplar. [REVIEW]William Bonner - 2007 - Journal of Business Ethics 70 (3):221 - 234.
    Using concepts from Ulrich Beck’s Risk Society, this paper argues that as expertise proliferates questions of ethics in decision-making fall through gaps between domains of expertise. As a consequence, unethical outcomes are unattached to actions taken with no one accountable or responsible for these outcomes. Using Actor-Network Theory (ANT), a case study is presented showing how the sale of students’ personal information by the Calgary Board of Education (CBE) escaped questions of ethics. The sale of student information was the product (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Locating a Space for Ethics to Appear in Decision-making: Privacy as an Exemplar.William Bonner - 2007 - Journal of Business Ethics 70 (3):221-234.
    Using concepts from Ulrich Beck's Risk Society, this paper argues that as expertise proliferates questions of ethics in decision-making fall through gaps between domains of expertise. As a consequence, unethical outcomes are unattached to actions taken with no one accountable or responsible for these outcomes. Using Actor-Network Theory, a case study is presented showing how the sale of students' personal information by the Calgary Board of Education escaped questions of ethics. The sale of student information was the product of the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Treating Inmates as Moral Agents: A Defense of the Right to Privacy in Prison.William Bülow - 2014 - Criminal Justice Ethics 33 (1):1-20.
    This paper addresses the question of prison inmates' right to privacy from an ethical perspective. I argue that the right to privacy is important because of its connection to moral agency and that the protection of privacy is warranted by different established philosophical theories about the justification of legal punishment. I discuss the practical implications of this argument by addressing two potential problems. First, how much privacy should be allowed during imprisonment in order to meet the criteria of respecting inmates (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy.Dorota Mokrosinska - 2018 - Law and Philosophy 37 (2):117-143.
    One of the most influential views in privacy scholarship is that privacy protects individual autonomy. On the early liberal view, the exercise of autonomy requires detachment from social and political life and privacy facilitates it. This view of privacy still informs current legal and political practice. As this view of privacy presupposes a tension between privacy and society, it is responsible for the underrating of privacy in legal and political practice. Over the last decades, liberal reflection on autonomy has shifted (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Online privacy behavior among youth in the Global South.Jan Michael Alexandre Cortez Bernadas & Cheryll Ruth Soriano - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):17-30.
    Purpose The purpose of this paper is two-fold. First, it explores the extent to which diversity of connectivity or the connection through multiple internet access points may facilitate online privacy behavior. Second, it explains the diversity of connectivity-online privacy behavior link in terms of information literacy. Design/methodology/approach Situated in the context of urban poor youth in the Philippines, this paper used a quantitative approach, specifically an interview-administered survey technique. Respondents were from three cities in Metro Manila. To test for indirect (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The paradox of secrecy.Beryl L. Bellman - 1979 - Human Studies 4 (1):1 - 24.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • The Right to Privacy and the Right to Die.Tom L. Beauchamp - 2000 - Social Philosophy and Policy 17 (2):276-292.
    Western ethics and law have been slow to come to conclusions about the right to choose the time and manner of one's death. However, policies, practices, and legal precedents have evolved quickly in the last quarter of the twentieth century, from the forgoing of respirators to the use of Do Not Resuscitate (DNR) orders, to the forgoing of all medical technologies (including hydration and nutrition), and now, in one U.S. state, to legalized physician-assisted suicide. The sweep of history—from the Quinlan (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Learning from Law's Past: A Call for Caution in Incorporating New Innovations in Neuroscience.Jennifer S. Bard - 2007 - American Journal of Bioethics 7 (9):73-75.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Audience surveillance and the right to anonymous reading in interactive media.Lemi Baruh - 2004 - Knowledge, Technology & Policy 17 (1):59-73.
    Download  
     
    Export citation  
     
    Bookmark  
  • Human Rights and Patients’ Privacy in UK Hospitals.Jay Woogara - 2001 - Nursing Ethics 8 (3):234-246.
    The European Convention on Human Rights has been incorporated into UK domestic law. It gives many rights to patients within the National Health Service. This article explores the concept of patients’ right to privacy. It stresses that privacy is a basic human right, and that its respect by health professionals is vital for a patient’s physical, mental, emotional and spiritual well-being. I argue that health professionals can violate patients’ privacy in a variety of ways. For example: the right to enjoy (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • A dynamic logic for privacy compliance.Guillaume Aucher, Guido Boella & Leendert Torre - 2011 - Artificial Intelligence and Law 19 (2-3):187-231.
    Knowledge based privacy policies are more declarative than traditional action based ones, because they specify only what is permitted or forbidden to know, and leave the derivation of the permitted actions to a security monitor. This inference problem is already non trivial with a static privacy policy, and becomes challenging when privacy policies can change over time. We therefore introduce a dynamic modal logic that permits not only to reason about permitted and forbidden knowledge to derive the permitted actions, but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A dynamic logic for privacy compliance.Guillaume Aucher, Guido Boella & Leendert van der Torre - 2011 - Artificial Intelligence and Law 19 (2-3):187-231.
    Knowledge based privacy policies are more declarative than traditional action based ones, because they specify only what is permitted or forbidden to know, and leave the derivation of the permitted actions to a security monitor. This inference problem is already non trivial with a static privacy policy, and becomes challenging when privacy policies can change over time. We therefore introduce a dynamic modal logic that permits not only to reason about permitted and forbidden knowledge to derive the permitted actions, but (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges.Corey M. Angst - 2009 - Journal of Business Ethics 90 (S2):169 - 178.
    When information is transformed from what has traditionally been a paper-based format into digitized elements with meaning associated to them, new and intriguing discussions begin surrounding proper and improper uses of this codified and easily transmittable information. As these discussions continue, some health care providers, insurers, laboratories, pharmacies, and other healthcare stakeholders are creating and retroactively digitizing our medical information with the unambiguous endorsement of the federal government.Some argue that these enormous databases of medical information offer improved access to timely (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Brain Privacy: How Can We Protect It?Sheri Alpert - 2007 - American Journal of Bioethics 7 (9):70-73.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, Health, and Race Equity in the Digital Age.Anita L. Allen - 2022 - American Journal of Bioethics 22 (7):60-63.
    Privacy is a basic and foundational human good meriting moral and legal protection. Privacy isn’t, however, everything. Other goods and values matter, too (Solove 2003; Ma...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A critical contribution to theoretical foundations of privacy studies.Thomas Allmer - 2011 - Journal of Information, Communication and Ethics in Society 9 (2):83-101.
    PurposeAlthough there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there is a gap in the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Unplanned effects of intelligent agents on Internet use: a social informatics approach. [REVIEW]Alexander Serenko, Umar Ruhi & Mihail Cocosila - 2007 - AI and Society 21 (1-2):141-166.
    This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens of analysis, the study identifies several unanticipated consequences of using intelligent agents for information- and commerce-based tasks on the Internet. The effects include those that transpire over time at the organizational level, such as e-commerce transformation, operational encumbrance and security overload, as well as those that emerge on a cultural level, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Impact of Individual Ethics on Reactions to Potentially Invasive HR Practices.G. Stoney Alder, Marshall Schminke & Terry W. Noel - 2007 - Journal of Business Ethics 75 (2):201-214.
    In recent years, the practices of work organizations have raised increasing concerns regarding individual privacy at work. It is clear that people expect and value privacy in their personal lives. However, the extent to which privacy perceptions influence individuals’ work attitudes is less clear. Research has explored the extent to which employee perceptions of privacy derive from characteristics of the programs themselves. However, there is a paucity of research that examines how the characteristics of the individual employee may influence perceptions (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Surgical patients' and nurses' opinions and expectations about privacy in care.E. Akyuz & F. Erdemir - 2013 - Nursing Ethics 20 (6):660-671.
    The purpose of this study was to determine the opinions and expectations of patients and nurses about privacy during a hospital admission for surgery. The study explored what enables and maintains privacy from the perspective of Turkish surgical patients and nurses. The study included 102 adult patients having surgery and 47 nurses caring for them. Data were collected via semistructured questionnaire by face-to-face interviews. The results showed that patients were mostly satisfied by the respect shown to their privacy by the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Digital Vigilantism as Weaponisation of Visibility.Daniel Trottier - 2017 - Philosophy and Technology 30 (1):55-72.
    This paper considers an emerging practice whereby citizen’s use of ubiquitous and domesticated technologies enable a parallel form of criminal justice. Here, weaponised visibility supersedes police intervention as an appropriate response. Digital vigilantism is a user-led violation of privacy that not only transcends online/offline distinctions but also complicates relations of visibility and control between police and the public. This paper develops a theoretically nuanced and empirically grounded understanding of digital vigilantism in order to advance a research agenda in this area (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been sufficiently investigated. In (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent.Irene Pollach - 2005 - Journal of Business Ethics 62 (3):221-235.
    The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information.Nick Hajli & Xiaolin Lin - 2016 - Journal of Business Ethics 133 (1):111-123.
    Social networking sites have challenged ethical issues about users’ information security and privacy. SNS users are concerned about their privacy and need to control the information they share and its use. This paper examines the security of SNS by taking a look at the influence of users’ perceived control of information over their information-sharing behaviors. Employing an empirical study, this paper demonstrates the importance of perceived control in SNS users’ information-sharing behaviors. Specifically, perceived control has been found to be negatively (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Towards an alternative concept of privacy.Christian Fuchs - 2011 - Journal of Information, Communication and Ethics in Society 9 (4):220-237.
    PurposeThere are a lot of discussions about privacy in relation to contemporary communication systems (such as Facebook and other “social media” platforms), but discussions about privacy on the internet in most cases misses a profound understanding of the notion of privacy and where this notion is coming from. The purpose of this paper is to challenge the liberal notion of privacy and explore foundations of an alternative privacy conception.Design/methodology/approachA typology of privacy definitions is elaborated based on Giddens' theory of structuration. (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Perceptions of Privacy in the Care of Elderly People in Five European Countries.Anja Schopp, Helena Leino-Kilpi, Maritta Välimäki, Theo Dassen, Maria Gasull, Chryssoula Lemonidou, P. Anne Scott, Marianne Arndt & Anne Kaljonen - 2003 - Nursing Ethics 10 (1):39-47.
    The focus of this article is on elderly patients’ and nursing staff perceptions of privacy in the care of elderly patients/residents in five European countries. Privacy includes physical, social and informational elements. The results show that perceptions of privacy were strongest in the UK (Scotland) and weakest in Greece. Country comparisons revealed statistically significant differences between the perceptions of elderly patients and also between those of nurses working in the same ward or long-term care facility. Perceptions of privacy by patients (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy of Patients in the Forensic Department of a Psychiatric Clinic: a phenomenological Study.K. Koller & V. Hantikainen - 2002 - Nursing Ethics 9 (4):347-360.
    This study, based on the phenomenological approach, was aimed at exploring the meaning of privacy for forensic psychiatric patients. The narratives of two such patients, diagnosed with schizophrenia and hospitalized on a forensic unit because of a killing offence, were analysed by means of qualitative content analysis. The study was conducted in a Swiss psychiatric clinic with forensic units. The results demonstrated that ‘privacy’ is not a question of luxury but a very basic human right. The ethical implications for nurses (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Information technology and privacy: conceptual muddles or privacy vacuums? [REVIEW]Kirsten Martin - 2012 - Ethics and Information Technology 14 (4):267-284.
    Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that the predominant accounts of privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Internet research: An opportunity to revisit classic ethical problems in behavioral research.David J. Pittenger - 2003 - Ethics and Behavior 13 (1):45 – 60.
    The Internet offers many new opportunities for behavioral researchers to conduct quantitative and qualitative research. Although the ethical guidelines of the American Psychological Association generalize, in part, to research conducted through the Internet, several matters related to Internet research require further analysis. This article reviews several fundamental ethical issues related to Internet research, namely the preservation of privacy, the issuance of informed consent, the use of deception and false feedback, and research methods. In essence, the Internet offers unique challenges to (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Solitude: An exploration of benefits of being alone.Christopher R. Long & James R. Averill - 2003 - Journal for the Theory of Social Behaviour 33 (1):21–44.
    Historically, philosophers, artists, and spiritual leaders have extolled the benefits of solitude; currently, advice on how to achieve solitude is the subject of many popular books and articles. Seldom, however, has solitude been studied by psychologists, who have focused instead on the negative experiences associated with being alone, particularly loneliness. Solitude, in contrast to loneliness, is often a positive state—one that may be sought rather than avoided. In this article, we examine some of the benefits that have been attributed to (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Designing databases that enhance people’s privacy without hindering organizations: Towards informational self-determination.Thomas B. Hodel-Widmer - 2006 - Ethics and Information Technology 8 (1):3-15.
    We argue that future database systems must provide autonomy for individuals for the privacy of data they manage. We propose a design for such a system, identify challenges and problems, and suggest some approaches to these. We enunciate the reasons for informational self-determination systems, which include legal, organizational and technical issues. Our main goal is to achieve a widely-accepted realistic and practical solution in order to ensure privacy for individuals in our future world, yet without hindering business and security.
    Download  
     
    Export citation  
     
    Bookmark  
  • Protesting without a face: Privacy in public demonstrations.Domingo A. Lovera-Parmo - 2023 - Constellations 30 (2):179-191.
    Download  
     
    Export citation  
     
    Bookmark  
  • To Each Technology Its Own Ethics: The Problem of Ethical Proliferation.Henrik Skaug Sætra & John Danaher - 2022 - Philosophy and Technology 35 (4):1-26.
    Ethics plays a key role in the normative analysis of the impacts of technology. We know that computers in general and the processing of data, the use of artificial intelligence, and the combination of computers and/or artificial intelligence with robotics are all associated with ethically relevant implications for individuals, groups, and society. In this article, we argue that while all technologies are ethically relevant, there is no need to create a separate ‘ethics of X’ or ‘X ethics’ for each and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Own Data? Ethical Reflections on Data Ownership.Patrik Hummel, Matthias Braun & Peter Dabrock - 2020 - Philosophy and Technology 34 (3):545-572.
    In discourses on digitization and the data economy, it is often claimed that data subjects shall beownersof their data. In this paper, we provide a problem diagnosis for such calls fordata ownership: a large variety of demands are discussed under this heading. It thus becomes challenging to specify what—if anything—unites them. We identify four conceptual dimensions of calls for data ownership and argue that these help to systematize and to compare different positions. In view of this pluralism of data ownership (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Social networks, the 2016 US presidential election, and Kantian ethics: applying the categorical imperative to Cambridge Analytica’s behavioral microtargeting.Ken Ward - 2018 - Journal of Media Ethics 33 (3):133-148.
    ABSTRACTThe 2016 US presidential election witnessed the development of ethically dubious methods of political persuasion built and executed on social networking sites. The following analyzes the ethics of behavioral microtargeting practices such as those of Cambridge Analytica, a company that claims to have played a central role in Donald Trump’s successful candidacy through its use of social networking sites such as Facebook. After describing Cambridge Analytica’s method of data manipulation and identifying several threats to individual autonomy posed by such practices, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • “Strongly Recommended” Revisiting Decisional Privacy to Judge Hypernudging in Self-Tracking Technologies.Marjolein Lanzing - 2019 - Philosophy and Technology 32 (3):549-568.
    This paper explores and rehabilitates the value of decisional privacy as a conceptual tool, complementary to informational privacy, for critiquing personalized choice architectures employed by self-tracking technologies. Self-tracking technologies are promoted and used as a means to self-improvement. Based on large aggregates of personal data and the data of other users, self-tracking technologies offer personalized feedback that nudges the user into behavioral change. The real-time personalization of choice architectures requires continuous surveillance and is a very powerful technology, recently coined as (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Comparative legal study on privacy and personal data protection for robots equipped with artificial intelligence: looking at functional and technological aspects.Kaori Ishii - 2019 - AI and Society 34 (3):509-533.
    This paper undertakes a comparative legal study to analyze the challenges of privacy and personal data protection posed by Artificial Intelligence embedded in Robots, and to offer policy suggestions. After identifying the benefits from various AI usages and the risks posed by AI-related technologies, I then analyze legal frameworks and relevant discussions in the EU, USA, Canada, and Japan, and further consider the efforts of Privacy by Design originating in Ontario, Canada. While various AI usages provide great convenience, many issues, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development.Katie Shilton & Daniel Greene - 2019 - Journal of Business Ethics 155 (1):131-146.
    Privacy is a critical challenge for corporate social responsibility in the mobile device ecosystem. Mobile application firms can collect granular and largely unregulated data about their consumers, and must make ethical decisions about how and whether to collect, store, and share these data. This paper conducts a discourse analysis of mobile application developer forums to discover when and how privacy conversations, as a representative of larger ethical debates, arise during development. It finds that online forums can be useful spaces for (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • An Ethical Exploration of Privacy and Radio Frequency Identification.Alan R. Peslak - 2005 - Journal of Business Ethics 59 (4):327-345.
    This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • The crisis of consent: how stronger legal protection may lead to weaker consent in data protection.Bart W. Schermer, Bart Custers & Simone van der Hof - 2014 - Ethics and Information Technology 16 (2):171-182.
    In this article we examine the effectiveness of consent in data protection legislation. We argue that the current legal framework for consent, which has its basis in the idea of autonomous authorisation, does not work in practice. In practice the legal requirements for consent lead to ‘consent desensitisation’, undermining privacy protection and trust in data processing. In particular we argue that stricter legal requirements for giving and obtaining consent as proposed in the European Data protection regulation will further weaken the (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • A new “Ring of Gyges” and the meaning of invisibility in the information revolution.Ugo Pagallo - 2010 - Journal of Information, Communication and Ethics in Society 8 (4):364-376.
    PurposeThe paper aims to examine the profound transformations engendered by the information revolution in order to determine aspects of what should be visible or invisible in human affairs. It seeks to explore the meaning of invisibility via an interdisciplinary approach, including computer science, law, and ethics.Design/methodology/approachThe method draws on both theoretical and empirical material so as to scrutinise the ways in which today's information revolution is recasting the boundaries between visibility and invisibility.FindingsThe degrees of exposure to public notice can be (...)
    Download  
     
    Export citation  
     
    Bookmark