Switch to: References

Citations of:

Privacy and Freedom

Science and Society 34 (3):360-363 (1970)

Add citations

You must login to add citations.
  1. Research in the Biotech Age: Can Informational Privacy Compete?Wilhelm Peekhaus - 2008 - Bulletin of Science, Technology and Society 28 (1):48-59.
    This article examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government's broader neoliberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational privacy and the need for medical information for research purposes. Consideration is given to the debate about whether privacy for medical information serves or hinders the “public good” in respect of medical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Is Mental Privacy a Component of Personal Identity?Abel Wajnerman Paz - 2021 - Frontiers in Human Neuroscience 15:773441.
    One of the most prominent ethical concerns regarding emerging neurotechnologies is mental privacy. This is the idea that we should have control over access to our neural data and to the information about our mental processes and states that can be obtained by analyzing it. A key issue is whether this information needs more stringent protection than other kinds of personal information. I will articulate and support the view, underlying recent regulatory frameworks, that mental privacy requires a special treatment because (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Panel Comment: Legislating Privacy: The HIV Experience.Wendy E. Parmet - 1995 - Journal of Law, Medicine and Ethics 23 (4):371-374.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been sufficiently investigated. In (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • A new “Ring of Gyges” and the meaning of invisibility in the information revolution.Ugo Pagallo - 2010 - Journal of Information, Communication and Ethics in Society 8 (4):364-376.
    PurposeThe paper aims to examine the profound transformations engendered by the information revolution in order to determine aspects of what should be visible or invisible in human affairs. It seeks to explore the meaning of invisibility via an interdisciplinary approach, including computer science, law, and ethics.Design/methodology/approachThe method draws on both theoretical and empirical material so as to scrutinise the ways in which today's information revolution is recasting the boundaries between visibility and invisibility.FindingsThe degrees of exposure to public notice can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Self-Perception and Self-Determination in Surveillance Conditions.Saskia K. Nagel & Hartmut Remmers - 2012 - American Journal of Bioethics 12 (9):53-55.
    The American Journal of Bioethics, Volume 12, Issue 9, Page 53-55, September 2012.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Rethinking the concept of the right to information privacy: a Japanese perspective.Kiyoshi Murata & Yohko Orito - 2008 - Journal of Information, Communication and Ethics in Society 6 (3):233-245.
    PurposeThe purpose of this paper is to reconsider the concept of the right to information privacy and to propose, from a Japanese perspective, a revised conception of this right that is suitable for the modern information society.Design/methodology/approachFirst, the concept of privacy and personal information protection in the information society is briefly explained. After that, confused situations in Japan caused by the enforcement of Act on the Protection of Personal Information are described followed by the analysis of the Japanese socio‐cultural circumstances (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Moral Significance of Privacy Dependencies.Lauritz Aastrup Munch & Jakob Thrane Mainz - 2023 - Philosophy and Technology 36 (4):1-19.
    Often, when we share information about ourselves, we contribute to people learning personal things about others. This may happen because what we share about ourselves can be used to infer personal information about others. Such dependencies have become known as privacy dependencies in the literature. It is sometimes claimed that the scope of the right to privacy should be expanded in light of such dependencies. For example, some have argued that inferring information about others can violate their right to privacy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, speech, and values: what we have no business knowing.Adam D. Moore - 2016 - Ethics and Information Technology 18 (1):41-49.
    In the United States the ascendancy of speech protection is due to an expansive and unjustified view of the value or primacy of free expression and access to information. This is perhaps understandable, given that privacy has been understood as a mere interest, whereas speech rights have been seen as more fundamental. I have argued elsewhere that the “mere interest” view of privacy is false. Privacy, properly defined, is a necessary condition for human well-being or flourishing. The opening section of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, public health, and controlling medical information.Adam D. Moore - 2010 - HEC Forum 22 (3):225-240.
    This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy, turning then to consider cases which illustrate when and how privacy may be overridden by public health concerns.
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy, Interests, and Inalienable Rights.Adam D. Moore - 2018 - Moral Philosophy and Politics 5 (2):327-355.
    Some rights are so important for human autonomy and well-being that many scholars insist they should not be waived, traded, or abandoned. Privacy is a recent addition to this list. At the other end of the spectrum is the belief that privacy is a mere unimportant interest or preference. This paper defends a middle path between viewing privacy as an inalienable, non-waivable, non-transferrable right and the view of privacy as a mere subjective interest. First, an account of privacy is offered (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Why states have no right to privacy, but may be entitled to secrecy: a non-consequentialist defense of state secrecy.Dorota Mokrosinska - 2020 - Critical Review of International Social and Political Philosophy 23 (4):415-444.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Why states have no right to privacy, but may be entitled to secrecy: a non-consequentialist defense of state secrecy.Dorota Mokrosinska - 2020 - Critical Review of International Social and Political Philosophy 23 (4):415-444.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy and the Integrity of Liberal Politics: The Case of Governmental Internet Searches.Dorota Mokrosinska - 2014 - Journal of Social Philosophy 45 (3):369-389.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy.Dorota Mokrosinska - 2018 - Law and Philosophy 37 (2):117-143.
    One of the most influential views in privacy scholarship is that privacy protects individual autonomy. On the early liberal view, the exercise of autonomy requires detachment from social and political life and privacy facilitates it. This view of privacy still informs current legal and political practice. As this view of privacy presupposes a tension between privacy and society, it is responsible for the underrating of privacy in legal and political practice. Over the last decades, liberal reflection on autonomy has shifted (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Empathic media and advertising: Industry, policy, legal and citizen perspectives.Andrew McStay - 2016 - Big Data and Society 3 (2).
    Drawing on interviews with people from the advertising and technology industry, legal experts and policy makers, this paper assesses the rise of emotion detection in digital out-of-home advertising, a practice that often involves facial coding of emotional expressions in public spaces. Having briefly outlined how bodies contribute to targeting processes and the optimisation of the ads themselves, it progresses to detail industrial perspectives, intentions and attitudes to data ethics. Although the paper explores possibilities of this sector, it pays careful attention (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Internet, children, and privacy: the case against parental monitoring.Kay Mathiesen - 2013 - Ethics and Information Technology 15 (4):263-274.
    It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy concerns can stress you out: Investigating the reciprocal relationship between mobile social media privacy concerns and perceived stress.Jörg Matthes, Marina F. Thomas, Kathrin Karsay, Melanie Hirsch, Anna Koemets, Desirée Schmuck & Anja Stevic - 2022 - Communications 47 (3):327-349.
    Mobile social media have become a widespread means to participate in everyday social and professional life. These platforms encourage the disclosure and exchange of personal information, which comes with privacy risks. While past scholarship has listed various predictors and consequences of online privacy concerns, there has been to date no empirical investigation of a conceivable relationship with perceived stress. Using a longitudinal panel study, we examined the reciprocal relationship between mobile social media privacy concerns and perceived stress. Results supported the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Human Rights for the Digital Age.Kay Mathiesen - 2014 - Journal of Mass Media Ethics 29 (1):2-18.
    Human rights are those legal and/or moral rights that all persons have simply as persons. In the current digital age, human rights are increasingly being either fulfilled or violated in the online environment. In this article, I provide a way of conceptualizing the relationships between human rights and information technology. I do so by pointing out a number of misunderstandings of human rights evident in Vinton Cerf's recent argument that there is no human right to the Internet. I claim that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • A duty of ignorance.David Matheson - 2013 - Episteme 10 (2):193-205.
    Conjoined with the claim that there is a moral right to privacy, each of the major contemporary accounts of privacy implies a duty of ignorance for those against whom the right is held. In this paper I consider and respond to a compelling argument that challenges these accounts (or the claim about a right to privacy) in the light of this implication. A crucial premise of the argument is that we cannot ever be morally obligated to become ignorant of information (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Reframing biometric surveillance: from a means of inspection to a form of control.Avi Marciano - 2019 - Ethics and Information Technology 21 (2):127-136.
    This paper reviews the social scientific literature on biometric surveillance, with particular attention to its potential harms. It maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Demonstrating these harms with examples from the United States, the European Union, and Israel, I propose that biometric surveillance be addressed, evaluated and reframed as a new form of control rather than simply another means of inspection. I (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Information technology and privacy: conceptual muddles or privacy vacuums? [REVIEW]Kirsten Martin - 2012 - Ethics and Information Technology 14 (4):267-284.
    Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract.Kirsten E. Martin - 2012 - Journal of Business Ethics 111 (4):519-539.
    A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce more practical guidance for organizations and managers who have employees, users, and future customers all with possibly different conceptions of privacy across contexts. However, this theoretical suggestion, while intuitively appealing, has not been empirically examined. This study (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Data identity: privacy and the construction of self.Jens-Erik Mai & Sille Obelitz Søe - 2022 - Synthese 200 (6):1-22.
    This paper argues in favor of a hybrid conception of identity. A common conception of identity in datafied society is a split between a digital self and a real self, which has resulted in concepts such as the data double, algorithmic identity, and data shadows. These data-identity metaphors have played a significant role in the conception of informational privacy as control over information—the control of or restricted access to your digital identity. Through analyses of various data-identity metaphors as well as (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Internet Users’ Valuation of Enhanced Data Protection on Social Media: Which Aspects of Privacy Are Worth the Most?Jasmin Mahmoodi, Jitka Čurdová, Christoph Henking, Marvin Kunz, Karla Matić, Peter Mohr & Maja Vovko - 2018 - Frontiers in Psychology 9.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Trust and digital privacy in healthcare: a cross-sectional descriptive study of trust and attitudes towards uses of electronic health data among the general public in Sweden.Niels Lynøe, Gert Helgesson & Sara Belfrage - 2022 - BMC Medical Ethics 23 (1):1-8.
    BackgroundThe ability of healthcare to protect sensitive personal data in medical records and registers might influence public trust, which in turn might influence willingness to allow healthcare to use such data. The aim of this study was to examine how the general public’s trust relates to their attitudes towards uses of health data.MethodsA stratified sample from the general Swedish population received a questionnaire about their willingness to share health data. Respondents were also asked about their trust in the management and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A Dilemma for Privacy as Control.Björn Lundgren - 2020 - The Journal of Ethics 24 (2):165-175.
    Although popular, control accounts of privacy suffer from various counterexamples. In this article, it is argued that two such counterexamples—while individually resolvable—can be combined to yield a dilemma for control accounts of privacy. Furthermore, it is argued that it is implausible that control accounts of privacy can defend against this dilemma. Thus, it is concluded that we ought not define privacy in terms of control. Lastly, it is argued that since the concept of privacy is the object of the right (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing of justice and the effective (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Protesting without a face: Privacy in public demonstrations.Domingo A. Lovera-Parmo - 2023 - Constellations 30 (2):179-191.
    Download  
     
    Export citation  
     
    Bookmark  
  • Solitude: An exploration of benefits of being alone.Christopher R. Long & James R. Averill - 2003 - Journal for the Theory of Social Behaviour 33 (1):21–44.
    Historically, philosophers, artists, and spiritual leaders have extolled the benefits of solitude; currently, advice on how to achieve solitude is the subject of many popular books and articles. Seldom, however, has solitude been studied by psychologists, who have focused instead on the negative experiences associated with being alone, particularly loneliness. Solitude, in contrast to loneliness, is often a positive state—one that may be sought rather than avoided. In this article, we examine some of the benefits that have been attributed to (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Two Concepts of Group Privacy.Michele Loi & Markus Christen - 2020 - Philosophy and Technology 33 (2):207-224.
    Luciano Floridi was not the first to discuss the idea of group privacy, but he was perhaps the first to discuss it in relation to the insights derived from big data analytics. He has argued that it is important to investigate the possibility that groups have rights to privacy that are not reducible to the privacy of individuals forming such groups. In this paper, we introduce a distinction between two concepts of group privacy. The first, the “what happens in Vegas (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?Michele Loi, Christian Hauser & Markus Christen - 2020 - Journal of Business Ethics 175 (1):7-19.
    Clients may feel trapped into sharing their private digital data with insurance companies to get a desired insurance product or premium. However, private insurance must collect some data to offer products and premiums appropriate to the client’s level of risk. This situation creates tension between the value of privacy and common insurance business practice. We argue for three main claims: first, coercion to share private data with insurers is pro tanto wrong because it violates the autonomous choice of a privacy-valuing (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Cybersecurity in health – disentangling value tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.
    Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity. Design/methodology/approach This paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four principles of medical (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The transparent self.Marjolein Lanzing - 2016 - Ethics and Information Technology 18 (1):9-16.
    This paper critically engages with new self-tracking technologies. In particular, it focuses on a conceptual tension between the idea that disclosing personal information increases one’s autonomy and the idea that informational privacy is a condition for autonomous personhood. I argue that while self-tracking may sometimes prove to be an adequate method to shed light on particular aspects of oneself and can be used to strengthen one’s autonomy, self-tracking technologies often cancel out these benefits by exposing too much about oneself to (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • “Strongly Recommended” Revisiting Decisional Privacy to Judge Hypernudging in Self-Tracking Technologies.Marjolein Lanzing - 2019 - Philosophy and Technology 32 (3):549-568.
    This paper explores and rehabilitates the value of decisional privacy as a conceptual tool, complementary to informational privacy, for critiquing personalized choice architectures employed by self-tracking technologies. Self-tracking technologies are promoted and used as a means to self-improvement. Based on large aggregates of personal data and the data of other users, self-tracking technologies offer personalized feedback that nudges the user into behavioral change. The real-time personalization of choice architectures requires continuous surveillance and is a very powerful technology, recently coined as (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Freedom in the Society of Control: Ethical challenges.Yevhen Laniuk - 2020 - Ethics and Bioethics (in Central Europe) 10 (3-4):203-220.
    The Society of Control is a philosophical concept developed by Gilles Deleuze in the early 1990s to highlight the transition from Michel Foucault’s Disciplinary Society to a new social constitution of power assisted by digital technologies. The Society of Control is organized around switches, which convert data, and, in this way, exercise power. These switches take data inputs (digitized information about individuals) and transform them into outputs (decisions) based on their pre-programmed instructions. I call these switches “automated decision-making algorithms” (ADMAs) (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Assessing Security Technology’s Impact: Old Tools for New Problems.Reinhard Kreissl - 2014 - Science and Engineering Ethics 20 (3):659-673.
    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy of Patients in the Forensic Department of a Psychiatric Clinic: a phenomenological Study.K. Koller & V. Hantikainen - 2002 - Nursing Ethics 9 (4):347-360.
    This study, based on the phenomenological approach, was aimed at exploring the meaning of privacy for forensic psychiatric patients. The narratives of two such patients, diagnosed with schizophrenia and hospitalized on a forensic unit because of a killing offence, were analysed by means of qualitative content analysis. The study was conducted in a Swiss psychiatric clinic with forensic units. The results demonstrated that ‘privacy’ is not a question of luxury but a very basic human right. The ethical implications for nurses (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The role of victimization in normative judgment and justification: An empirical investigation.Nicola Knight - 2010 - Philosophical Psychology 23 (6):797-820.
    Are all norms cognized in the same way? I present experimental evidence suggesting that they are not. I propose a distinction between two main classes of violations—the victimful and the victimless—and show that while people tend to rate acts belonging to either category as impermissible, the justifications for their judgments refer to salient features of the act only in the former case. I further show that Feinberg's distinction between harmful and offensive acts is useful in discriminating between different types of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Government Surveillance, Privacy, and Legitimacy.Peter Königs - 2022 - Philosophy and Technology 35 (1):1-22.
    The recent decades have seen established liberal democracies expand their surveillance capacities on a massive scale. This article explores what is problematic about government surveillance by democracies. It proceeds by distinguishing three potential sources of concern: the concern that governments diminish citizens’ privacy by collecting their data, the concern that they diminish their privacy by accessing their data, and the concern that the collected data may be used for objectionable purposes. Discussing the meaning and value of privacy, the article argues (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Comparative legal study on privacy and personal data protection for robots equipped with artificial intelligence: looking at functional and technological aspects.Kaori Ishii - 2019 - AI and Society 34 (3):509-533.
    This paper undertakes a comparative legal study to analyze the challenges of privacy and personal data protection posed by Artificial Intelligence embedded in Robots, and to offer policy suggestions. After identifying the benefits from various AI usages and the risks posed by AI-related technologies, I then analyze legal frameworks and relevant discussions in the EU, USA, Canada, and Japan, and further consider the efforts of Privacy by Design originating in Ontario, Canada. While various AI usages provide great convenience, many issues, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Workplace surveillance, privacy and distributive justice.Lucas D. Introna - 2000 - Acm Sigcas Computers and Society 30 (4):33-39.
    Modern technologies are providing unprecedented opportunities for surveillance. In the workplace surveillance technology is being built into the very infrastructure of work. Can the employee legitimately resist this increasingly pervasive net of surveillance? The employers argue that workplace surveillance is essential for security, safety, and productivity in increasingly competitive markets. They argue that they have a right to ensure that they 'get what they pay for', furthermore, that the workplace is a place of 'work' which by its very definition excludes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy in the information age: Stakeholders, interests and values. [REVIEW]Lucas Introna & Athanasia Pouloudi - 1999 - Journal of Business Ethics 22 (1):27 - 38.
    Privacy is a relational and relative concept that has been defined in a variety of ways. In this paper we offer a systematic discussion of potentially different notions of privacy. We conclude that privacy as the freedom or immunity from the judgement of others is an extremely useful concept to develop ways in which to understand privacy claims and associated risks. To this end, we develop a framework of principles that explores the interrelations of interests and values for various stakeholders (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Towards new human rights in the age of neuroscience and neurotechnology.Marcello Ienca & Roberto Andorno - 2017 - Life Sciences, Society and Policy 13 (1):1-27.
    Rapid advancements in human neuroscience and neurotechnology open unprecedented possibilities for accessing, collecting, sharing and manipulating information from the human brain. Such applications raise important challenges to human rights principles that need to be addressed to prevent unintended consequences. This paper assesses the implications of emerging neurotechnology applications in the context of the human rights framework and suggests that existing human rights may not be sufficient to respond to these emerging issues. After analysing the relationship between neuroscience and human rights, (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations