Switch to: Citations

Add references

You must login to add references.
  1. Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Download  
     
    Export citation  
     
    Bookmark   71 citations  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Download  
     
    Export citation  
     
    Bookmark   48 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • P2p networks and the verizon V. RIAA case: Implications for personal privacy and intellectual property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.
    In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • [Book review] in pursuit of privacy, law, ethics, and the rise of technology. [REVIEW]Judith Wagner DeCew - 1999 - Ethics 109 (2):437-439.
    Download  
     
    Export citation  
     
    Bookmark   54 citations  
  • Toward an approach to privacy in public: Challenges of information technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  • Protecting Privacy in an Information Age: The Problem of Privacy in Public.Helen Nissenbaum - 1998 - Law and Philosophy 17 (5-6):559-596.
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Ethical disobedience.Litman Jessica - 2003 - Ethics and Information Technology 5 (4):217-223.
    The heated rhetoric surroundingdigital copyright in general, and peer-to-peerfile sharing in particular, has inspired greatconfusion about what the copyright law does anddoes not prohibit. Most of the key legalquestions are still unsettled, in part becausecopyright defendants have run out of money andgone out of business before their cases couldgo to trial. In that vacuum, some copyrightowners are claiming that their preferred rulesof conduct are well-established legalrequirements. But those claims are strategic;those rules have never been endorsed by thecourts. They are made-up (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Private use as fair use: is it fair?F. S. Grodzinsky & M. C. Bottis - 2007 - Acm Sigcas Computers and Society 37 (2):11-24.
    The age of digital technology has introduced new complications into the issues of fair and private use of copyrighted material. In fact, the question of private use of another's work has been transformed from a side issue in intellectual property jurisprudence into the very center of intellectual property discussions about rights and privileges in a networked world. This paper will explore the nuanced difference between fair and private use as articulated in the US and the European Copyright Laws. Part One (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Surveillance, privacy and the ethics of vehicle safety communication technologies.M. Zimmer - 2005 - Ethics and Information Technology 7 (4):201-210.
    Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • A moral analysis of the ‘RIAA v. Verizon’ case.Richard A. Spinello - 2004 - Journal of Information, Communication and Ethics in Society 2 (4):203-215.
    The RIAA v. Verizon case offers an opportunity to analyze the scope of an Internet service provider’s responsibility to help deter copyright infringement. In this case, the RIAA served Verizon with a subpoena requesting the identity of two users who were making available copyrighted recordings for downloading on peer‐to‐peer networks. The main axis of discussion is whether or not Verizon has a moral obligation to reveal the names of these individuals. Should Verizon cooperate with the RIAA or should it seek (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations