Switch to: References

Citations of:

Privacy and Freedom

Science and Society 34 (3):360-363 (1970)

Add citations

You must login to add citations.
  1. Patients' privacy of the person and human rights.Jay Woogara - 2005 - Nursing Ethics 12 (3):273-287.
    The UK Government published various circulars to indicate the importance of respecting the privacy and dignity of NHS patients following the implementation of the Human Rights Act, 1998. This research used an ethnographic method to determine the extent to which health professionals had in fact upheld the philosophy of these documents. Fieldwork using nonparticipant observation, and unstructured and semistructured interviews with patients and staff, took place over six months in three acute care wards in a large district NHS trust hospital. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Book Review: Patients’ autonomy, privacy and informed consent. [REVIEW]Jay Woogara - 2001 - Nursing Ethics 8 (2):166-167.
    Download  
     
    Export citation  
     
    Bookmark  
  • Journalists and the character of public officials/figures.Lee Wilkins - 1994 - Journal of Mass Media Ethics 9 (3):157 – 168.
    Political character, the dynamic intersection of personality and public performance within a cultural and historical context, is appropriately the subject of news reports. The article provides journalists with an ethical rationale for covering political character while acknowledging the human need for privacy and then outlines a set of characterrelated issues that journalists should explore. It concludes with the suggestion that journalists should once again begin to cover the public record of political figures in-depth and that this public record be linked (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Taking Patient Privacy and Autonomy More Seriously: Why an Orwellian Account Is Not Sufficient.Karsten Weber, Uta Bittner, Arne Manzeschke, Elisabeth Rother, Friedericke Quack, Kathrin Dengler & Heiner Fangerau - 2012 - American Journal of Bioethics 12 (9):51-53.
    The American Journal of Bioethics, Volume 12, Issue 9, Page 51-53, September 2012.
    Download  
     
    Export citation  
     
    Bookmark  
  • An enquiry into the ethical efficacy of the use of radio frequency identification technology.David M. Wasieleski & Mordechai Gal-Or - 2008 - Ethics and Information Technology 10 (1):27-40.
    This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Social networks, the 2016 US presidential election, and Kantian ethics: applying the categorical imperative to Cambridge Analytica’s behavioral microtargeting.Ken Ward - 2018 - Journal of Media Ethics 33 (3):133-148.
    ABSTRACTThe 2016 US presidential election witnessed the development of ethically dubious methods of political persuasion built and executed on social networking sites. The following analyzes the ethics of behavioral microtargeting practices such as those of Cambridge Analytica, a company that claims to have played a central role in Donald Trump’s successful candidacy through its use of social networking sites such as Facebook. After describing Cambridge Analytica’s method of data manipulation and identifying several threats to individual autonomy posed by such practices, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Quantifying privacy in terms of entropy for context aware services.Athanasios S. Voulodimos & Charalampos Z. Patrikakis - 2009 - Identity in the Information Society 2 (2):155-169.
    In this paper, we address the issue of privacy protection in context aware services, through the use of entropy as a means of measuring the capability of locating a user’s whereabouts and identifying personal selections. We present a framework for calculating levels of abstraction in location and personal preferences reporting in queries to a context aware services server. Finally, we propose a methodology for determining the levels of abstraction in location and preferences that should be applied in user data reporting (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Data, Privacy, and Agency: Beyond Transparency to Empowerment.Erika Versalovic, Sara Goering & Eran Klein - 2022 - American Journal of Bioethics 22 (7):63-65.
    Separation-based accounts of privacy define privacy as being left alone and unaccessed. Pyrrho et al. propose a more control-based account where privacy is about having the age...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Biomedical Big Data: New Models of Control Over Access, Use and Governance.Alessandro Blasimme & Effy Vayena - 2017 - Journal of Bioethical Inquiry 14 (4):501-513.
    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Property, privacy and personhood in a world of ambient intelligence.Niels van Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Digital Vigilantism as Weaponisation of Visibility.Daniel Trottier - 2017 - Philosophy and Technology 30 (1):55-72.
    This paper considers an emerging practice whereby citizen’s use of ubiquitous and domesticated technologies enable a parallel form of criminal justice. Here, weaponised visibility supersedes police intervention as an appropriate response. Digital vigilantism is a user-led violation of privacy that not only transcends online/offline distinctions but also complicates relations of visibility and control between police and the public. This paper develops a theoretically nuanced and empirically grounded understanding of digital vigilantism in order to advance a research agenda in this area (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Public Actors Without Public Values: Legitimacy, Domination and the Regulation of the Technology Sector.Linnet Taylor - 2021 - Philosophy and Technology 34 (4):897-922.
    The scale and asymmetry of commercial technology firms’ power over people through data, combined with the increasing involvement of the private sector in public governance, means that increasingly, people do not have the ability to opt out of engaging with technology firms. At the same time, those firms are increasingly intervening on the population level in ways that have implications for social and political life. This creates the potential for power relations of domination, and demands that we decide what constitutes (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • To Each Technology Its Own Ethics: The Problem of Ethical Proliferation.Henrik Skaug Sætra & John Danaher - 2022 - Philosophy and Technology 35 (4):1-26.
    Ethics plays a key role in the normative analysis of the impacts of technology. We know that computers in general and the processing of data, the use of artificial intelligence, and the combination of computers and/or artificial intelligence with robotics are all associated with ethically relevant implications for individuals, groups, and society. In this article, we argue that while all technologies are ethically relevant, there is no need to create a separate ‘ethics of X’ or ‘X ethics’ for each and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Information privacy, the right to receive information and (mobile) ICTs.Litska Strikwerda - 2010 - Etikk I Praksis - Nordic Journal of Applied Ethics 2 (2):27-40.
    The first part of this paper is about the notion of privacy and its grounding in law. It discusses the tension between the right to privacy and the right to receive information. The second part of this paper explores how ICTs challenge and complicate privacy claims and satisfy the right to receive information.
    Download  
     
    Export citation  
     
    Bookmark  
  • Young people online and the social value of privacy.Valerie Steeves & Priscilla Regan - 2014 - Journal of Information, Communication and Ethics in Society 12 (4):298-313.
    Purpose– The purpose of this paper is to develop a conceptual framework to contextualize young people’s lived experiences of privacy and invasion online. Social negotiations in the construction of privacy boundaries are theorized to be dependent on individual preferences, abilities and context-dependent social meanings.Design/methodology/approach– Empirical findings of three related Ottawa-based studies dealing with young people’s online privacy are used to examine the benefits of online publicity, what online privacy means to young people and the social importance of privacy. Earlier philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Virtue, Privacy and Self-Determination.Giannis Stamatellos - 2011 - International Journal of Cyber Ethics in Education 1 (4):35-41.
    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Privacy Rights in the Information EconomyLegislating Privacy: Technology, Social Values and Public Policy.Richard A. Spinello & Priscilla Regan - 1998 - Business Ethics Quarterly 8 (4):723.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Can we borrow your phone? Employee privacy in the BYOD era.William P. Smith - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):397-411.
    PurposeThis paper aims to (a) summarize the legal and ethical foundations of privacy with connections to workplace emails and text messages, (b) describe trends and challenges related to “Bring Your Own Device” (BYOD), and (c) propose legal and nonlegal questions these trends will raise in the foreseeable future.Design/methodology/approachBased on a review of legal cases and scholarship related to workplace privacy, implications for BYOD practices are proposed.FindingsPrimarily due to property rights, employers in the USA have heretofore been granted wide latitude in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Defining privacy in employee health screening cases: Ethical ramifications concerning the employee/employer relationship. [REVIEW]Michele Simms - 1994 - Journal of Business Ethics 13 (5):315 - 325.
    Issues of privacy and employee health screening rank as two of the most important ethical concerns organizations will face in the next five years. Despite the increasing numbers of social scientists researching personal privacy and the current focus on workplace privacy rights as one of the most dynamic areas of employment law, the concept of privacy remains relatively abstract. Understanding how the courts define privacy and use the expectation of privacy standards is paramount given the strategic importance of the law (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development.Katie Shilton & Daniel Greene - 2019 - Journal of Business Ethics 155 (1):131-146.
    Privacy is a critical challenge for corporate social responsibility in the mobile device ecosystem. Mobile application firms can collect granular and largely unregulated data about their consumers, and must make ethical decisions about how and whether to collect, store, and share these data. This paper conducts a discourse analysis of mobile application developer forums to discover when and how privacy conversations, as a representative of larger ethical debates, arise during development. It finds that online forums can be useful spaces for (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The ethics of inattention: revitalising civil inattention as a privacy-protecting mechanism in public spaces.Tamar Sharon & Bert-Jaap Koops - 2021 - Ethics and Information Technology 23 (3):331-343.
    Societies evolve practices that reflect social norms of appropriateness in social interaction, for example when and to what extent one should respect the boundaries of another person’s private sphere. One such practice is what the sociologist Erving Goffman called civil inattention—the social norm of showing a proper amount of indifference to others—which functions as an almost unnoticed yet highly potent privacy-preserving mechanism. These practices can be disrupted by technologies that afford new forms of intrusions. In this paper, we show how (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Dheeraj Sharma Shaheen Borna - 2011 - Business and Society Review 116 (3):331-353.
    ABSTRACTThe main objective of this study is to discuss the ramifications of considering privacy as a public good for business organizations. Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: What are the historical and philosophical roots of privacy? How is the concept of privacy defined and what are the controversies surrounding different definitions of privacy? Does an individual have a right to privacy? If the answer to question three (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • What is the ‘personal’ in ‘personal information’?Sille Obelitz Søe, Rikke Frank Jørgensen & Jens-Erik Mai - 2021 - Ethics and Information Technology 23 (4):625-633.
    Contemporary privacy theories and European discussions about data protection employ the notion of ‘personal information’ to designate their areas of concern. The notion of personal information is demarcated from non-personal information—or just information—indicating that we are dealing with a specific kind of information. However, within privacy scholarship the notion of personal information appears undertheorized, rendering the concept somewhat unclear. We argue that in an age of datafication, protection of personal information and privacy is crucial, making the understanding of what is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The culture industry revisited: Sociophilosophical reflections on ‘privacy’ in the digital age.Sandra Seubert & Carlos Becker - 2019 - Philosophy and Social Criticism 45 (8):930-947.
    Digital communication now pervades all spheres of life, creating new possibilities for commodification: personal data and communication are the new resources of surplus value. This in turn brings about a totally new category of threats to privacy. With recourse to the culture industry critique of early critical theory, this article seeks to challenge basic theoretical assumptions held within a liberal account of privacy. It draws the attention to the entanglement of technical and socio-economic transformations and aims at elaborating an alternative (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The crisis of consent: how stronger legal protection may lead to weaker consent in data protection.Bart W. Schermer, Bart Custers & Simone van der Hof - 2014 - Ethics and Information Technology 16 (2):171-182.
    In this article we examine the effectiveness of consent in data protection legislation. We argue that the current legal framework for consent, which has its basis in the idea of autonomous authorisation, does not work in practice. In practice the legal requirements for consent lead to ‘consent desensitisation’, undermining privacy protection and trust in data processing. In particular we argue that stricter legal requirements for giving and obtaining consent as proposed in the European Data protection regulation will further weaken the (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Perceptions of Privacy in the Care of Elderly People in Five European Countries.Anja Schopp, Helena Leino-Kilpi, Maritta Välimäki, Theo Dassen, Maria Gasull, Chryssoula Lemonidou, P. Anne Scott, Marianne Arndt & Anne Kaljonen - 2003 - Nursing Ethics 10 (1):39-47.
    The focus of this article is on elderly patients’ and nursing staff perceptions of privacy in the care of elderly patients/residents in five European countries. Privacy includes physical, social and informational elements. The results show that perceptions of privacy were strongest in the UK (Scotland) and weakest in Greece. Country comparisons revealed statistically significant differences between the perceptions of elderly patients and also between those of nurses working in the same ward or long-term care facility. Perceptions of privacy by patients (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy concerns in integrating big data in “e-Oman”.Stuti Saxena - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):385-396.
    Purpose Whereas integration of big data in “e-Oman” – the e-government face of Oman – is a significant prospect, this paper aims to underscore the challenges of privacy concerns in effecting such integration. Design/methodology/approach Providing a brief description about the concepts of e-government and big data, the paper follows a discussion on “e-Oman”. While drawing a framework for integration of big data in “e-Oman”, the paper throws light on the privacy concerns in effecting such an integration following a qualitative approach. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • How is Political Privacy Different from Personal Privacy? An Argument from Democratic Governance.Aleksandra Samonek - 2020 - Diametros:1-14.
    In this paper I discuss the political value of the right to privacy. The classical accounts of privacy do not differentiate between privacy as the right of a citizen against other citizens vs. the right to privacy as the right against the state or the government. I shall argue that this distinction should be made, since the new context of the privacy debate has surpassed the historical frames in which the intelligence methods used by governments were comparable to those available (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that the predominant accounts of privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • The ethics of online retailing: A scale development and validation from the consumers' perspective. [REVIEW]Sergio Roman - 2007 - Journal of Business Ethics 72 (2):131-148.
    While e-commerce has witnessed extensive growth in recent years, so has consumers’ concerns regarding ethical issues surrounding online shopping. The vast majority of earlier research on this area is conceptual in nature, and limited in scope by focusing on consumers’ privacy issues. This study develops a reliable and valid scale to measure consumers’ perceptions regarding the ethics of online retailers. Findings indicate that the four factors of the scale – security, privacy, non-deception and fulfillment/reliability – are strongly predictive of online (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • The Ethics of Online Retailing: A Scale Development and Validation from the Consumers’ Perspective.Sergio Roman - 2007 - Journal of Business Ethics 72 (2):131-148.
    While e-commerce has witnessed extensive growth in recent years, so has consumers' concerns regarding ethical issues surrounding online shopping. The vast majority of earlier research on this area is conceptual in nature, and limited in scope by focusing on consumers' privacy issues. This study develops a reliable and valid scale to measure consumers' perceptions regarding the ethics of online retailers. Findings indicate that the four factors of the scale - security, privacy, non-deception and fulfillment/reliability - are strongly predictive of online (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • X—Privacy as a Human Right.Beate Roessler - 2017 - Proceedings of the Aristotelian Society 117 (2):187-206.
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • All News is “Glocal?” Considerations of Community and Personal Privacy with Global Publication of Local News.Chris Roberts - 2019 - Journal of Media Ethics 34 (4):205-214.
    ABSTRACTCommunity-focused journalists increasingly publish their work for global audiences. This project defines a circle of “community privacy”—the understanding that some information is ethically...
    Download  
     
    Export citation  
     
    Bookmark  
  • “I Am Datafied Because We Are Datafied”: an Ubuntu Perspective on (Relational) Privacy.Urbano Reviglio & Rogers Alunge - 2020 - Philosophy and Technology 33 (4):595-612.
    The debate on the ethics of privacy has been mainly dominated by Western perspectives, to the exclusion of broader ethical theories and socio-cultural perspectives. This imbalance carries risks; transplanted ethical norms and values can collide with those of the communities in which they are deployed. The consequent homogenization might also represent a missed opportunity to enrich and develop the current paradigm of privacy protection so as to effectively face new technological challenges. This article introduces and discusses the sub-Saharan philosophy of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking.Priscilla M. Regan & Jolene Jesse - 2019 - Ethics and Information Technology 21 (3):167-179.
    With the increase in the costs of providing education and concerns about financial responsibility, heightened consideration of accountability and results, elevated awareness of the range of teacher skills and student learning styles and needs, more focus is being placed on the promises offered by online software and educational technology. One of the most heavily marketed, exciting and controversial applications of edtech involves the varied educational programs to which different students are exposed based on how big data applications have evaluated their (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy issues in a psychiatric context: applying the ISD privacy framework to a psychiatric behavioural monitoring system. [REVIEW]Rusyaizila Ramli & Nasriah Zakaria - 2014 - AI and Society 29 (2):203-213.
    Privacy issues are frequently discussed amongst researchers, practitioners and patients in healthcare. However, psychiatric patients’ privacy issues get less attention in information system development (ISD), whereby they are one of the most important stakeholders. This paper applies Carew and Stapleton’s ISD privacy framework to psychiatric monitoring systems to understand the issues that are related to monitoring psychiatric patients’ behaviour. By understanding the privacy issues amongst patients, the research will be able to provide guidance to system developers to produce a privacy-sensitive (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Online privacy as a corporate social responsibility: an empirical study.Irene Pollach - 2011 - Business Ethics, the Environment and Responsibility 20 (1):88-102.
    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two. Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. The findings indicate that only a small proportion of the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Online privacy as a corporate social responsibility: an empirical study.Irene Pollach - 2011 - Business Ethics: A European Review 20 (1):88-102.
    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two. Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. The findings indicate that only a small proportion of the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent.Irene Pollach - 2005 - Journal of Business Ethics 62 (3):221-235.
    The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Internet research: An opportunity to revisit classic ethical problems in behavioral research.David J. Pittenger - 2003 - Ethics and Behavior 13 (1):45 – 60.
    The Internet offers many new opportunities for behavioral researchers to conduct quantitative and qualitative research. Although the ethical guidelines of the American Psychological Association generalize, in part, to research conducted through the Internet, several matters related to Internet research require further analysis. This article reviews several fundamental ethical issues related to Internet research, namely the preservation of privacy, the issuance of informed consent, the use of deception and false feedback, and research methods. In essence, the Internet offers unique challenges to (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • An Ethical Exploration of Privacy and Radio Frequency Identification.Alan R. Peslak - 2005 - Journal of Business Ethics 59 (4):327-345.
    This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy for Sale—Business as Usual in the 21st Century: An Economic and Normative Critique.Wilhelm Peekhaus - 2007 - Journal of Information Ethics 16 (1):83-98.
    Download  
     
    Export citation  
     
    Bookmark