Switch to: Citations

Add references

You must login to add references.
  1. Information without truth.Andrea Scarantino & Gualtiero Piccinini - 2010 - Metaphilosophy 41 (3):313-330.
    Abstract: According to the Veridicality Thesis, information requires truth. On this view, smoke carries information about there being a fire only if there is a fire, the proposition that the earth has two moons carries information about the earth having two moons only if the earth has two moons, and so on. We reject this Veridicality Thesis. We argue that the main notions of information used in cognitive science and computer science allow A to have information about the obtaining of (...)
    Download  
     
    Export citation  
     
    Bookmark   44 citations  
  • Why a right to explanation of automated decision-making does not exist in the General Data Protection Regulation.Sandra Wachter, Brent Mittelstadt & Luciano Floridi - 2017 - International Data Privacy Law 1 (2):76-99.
    Since approval of the EU General Data Protection Regulation (GDPR) in 2016, it has been widely and repeatedly claimed that the GDPR will legally mandate a ‘right to explanation’ of all decisions made by automated or artificially intelligent algorithmic systems. This right to explanation is viewed as an ideal mechanism to enhance the accountability and transparency of automated decision-making. However, there are several reasons to doubt both the legal existence and the feasibility of such a right. In contrast to the (...)
    Download  
     
    Export citation  
     
    Bookmark   63 citations  
  • Data feminism.Catherine D'Ignazio - 2020 - Cambridge, Massachusetts: The MIT Press. Edited by Lauren F. Klein.
    We have seen through many examples that data science and artificial intelligence can reinforce structural inequalities like sexism and racism. Data is power, and that power is distributed unequally. This book offers a vision for a feminist data science that can challenge power and work towards justice. This book takes a stand against a world that benefits some (including the authors, two white women) at the expense of others. It seeks to provide concrete steps for data scientists seeking to learn (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  • Logic and Conversation.H. P. Grice - 1975 - In Donald Davidson (ed.), The logic of grammar. Encino, Calif.: Dickenson Pub. Co.. pp. 64-75.
    Download  
     
    Export citation  
     
    Bookmark   1087 citations  
  • “I Am Datafied Because We Are Datafied”: an Ubuntu Perspective on (Relational) Privacy.Urbano Reviglio & Rogers Alunge - 2020 - Philosophy and Technology 33 (4):595-612.
    The debate on the ethics of privacy has been mainly dominated by Western perspectives, to the exclusion of broader ethical theories and socio-cultural perspectives. This imbalance carries risks; transplanted ethical norms and values can collide with those of the communities in which they are deployed. The consequent homogenization might also represent a missed opportunity to enrich and develop the current paradigm of privacy protection so as to effectively face new technological challenges. This article introduces and discusses the sub-Saharan philosophy of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Bentham, Deleuze and Beyond: An Overview of Surveillance Theories from the Panopticon to Participation.Maša Galič, Tjerk Timan & Bert-Jaap Koops - 2017 - Philosophy and Technology 30 (1):9-37.
    This paper aims to provide an overview of surveillance theories and concepts that can help to understand and debate surveillance in its many forms. As scholars from an increasingly wide range of disciplines are discussing surveillance, this literature review can offer much-needed common ground for the debate. We structure surveillance theory in three roughly chronological/thematic phases. The first two conceptualise surveillance through comprehensive theoretical frameworks which are elaborated in the third phase. The first phase, featuring Bentham and Foucault, offers architectural (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • On human dignity as a foundation for the right to privacy.Luciano Floridi - 2016 - Philosophy and Technology 29 (4):307-312.
    In 2016, the European Parliament approved the General Data Protection Regulation (GDPR) whose core aim is the safeguarding of information privacy, and, by corollary, human dignity. Drawing on the field of philosophical anthropology, this paper analyses various interpretations of human dignity and human exceptionalism. It concludes that privacy is essential for humans to flourish and enable individuals to build a sense of self and the world.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Open data, data protection, and group privacy.Luciano Floridi - 2014 - Philosophy and Technology 27 (1):1–3.
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  • Post-mortem privacy and informational self-determination.J. C. Buitelaar - 2017 - Ethics and Information Technology 19 (2):129-142.
    Post-mortem privacy is becoming a vital topic of public and scholarly legal concern. Post-mortem privacy is understood as the right of a person to preserve and control what becomes of his reputation and dignity after death. The assumption that the deceased does not qualify for privacy rights, because his bodily presence has been terminated, no longer holds in our networked society. In the digital age, the phenomenon of the digital legacy that an Internet user leaves behind after his demise, has (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Leenes R. Van Brakel R. Gutwirth S. De Hert P. (ed.), Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by Design (MHbD) model. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy as Protection of the Incomputable Self: From Agnostic to Agonistic Machine Learning.Mireille Hildebrandt - 2019 - Theoretical Inquiries in Law 20 (1):83-121.
    This Article takes the perspective of law and philosophy, integrating insights from computer science. First, I will argue that in the era of big data analytics we need an understanding of privacy that is capable of protecting what is uncountable, incalculable or incomputable about individual persons. To instigate this new dimension of the right to privacy, I expand previous work on the relational nature of privacy, and the productive indeterminacy of human identity it implies, into an ecological understanding of privacy, (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Datatrust: Or, the political quest for numerical evidence and the epistemologies of Big Data.Gernot Rieder & Judith Simon - 2016 - Big Data and Society 3 (1).
    Recently, there has been renewed interest in so-called evidence-based policy making. Enticed by the grand promises of Big Data, public officials seem increasingly inclined to experiment with more data-driven forms of governance. But while the rise of Big Data and related consequences has been a major issue of concern across different disciplines, attempts to develop a better understanding of the phenomenon's historical foundations have been rare. This short commentary addresses this gap by situating the current push for numerical evidence within (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Contextual Integrity Up and Down the Data Food Chain.Helen Nissenbaum - 2019 - Theoretical Inquiries in Law 20 (1):221-256.
    According to the theory of contextual integrity (CI), privacy norms prescribe information flows with reference to five parameters — sender, recipient, subject, information type, and transmission principle. Because privacy is grasped contextually (e.g., health, education, civic life, etc.), the values of these parameters range over contextually meaningful ontologies — of information types (or topics) and actors (subjects, senders, and recipients), in contextually defined capacities. As an alternative to predominant approaches to privacy, which were ineffective against novel information practices enabled by (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Nonnatural Personal Information. Accounting for Misleading and Non-misleading Personal Information.Sille Obelitz Søe - 2021 - Philosophy and Technology 34 (4):1243-1262.
    Personal information is key to informational privacy and the algorithmically generated profiles of individuals. However, the concept of personal information and its nature is rarely discussed. The concept of personal information thus seems to be based on an idea of information as objective and truthful—as natural information—that is depicted as digital footprints in the online and digital realm. I argue that the concept of personal information should exit the realm of natural information and enter the realm of nonnatural information—grounded in (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Algorithmic Personalization as a Mode of Individuation.Celia Lury - 2019 - Theory, Culture and Society 36 (2):17-37.
    Recognizing that many of the modern categories with which we think about people and their activities were put in place through the use of numbers, we ask how numbering practices compose contemporary sociality. Focusing on particular forms of algorithmic personalization, we describe a pathway of a-typical individuation in which repeated and recursive tracking is used to create partial orders in which individuals are always more and less than one. Algorithmic personalization describes a mode of numbering that involves forms of de- (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations