Switch to: Citations

Add references

You must login to add references.
  1. (1 other version)Artificial intelligence crime: an interdisciplinary analysis of foreseeable threats and solutions.Thomas C. King, Nikita Aggarwal, Mariarosaria Taddeo & Luciano Floridi - 2019 - Science and Engineering Ethics 26 (1):89-120.
    Artificial intelligence research and regulation seek to balance the benefits of innovation against any potential harms and disruption. However, one unintended consequence of the recent surge in AI research is the potential re-orientation of AI technologies to facilitate criminal acts, term in this article AI-Crime. AIC is theoretically feasible thanks to published experiments in automating fraud targeted at social media users, as well as demonstrations of AI-driven manipulation of simulated markets. However, because AIC is still a relatively young and inherently (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Privacy by Design: essential for organizational accountability and strong business practices. [REVIEW]Ann Cavoukian, Scott Taylor & Martin E. Abrams - 2010 - Identity in the Information Society 3 (2):405-413.
    An accountability-based privacy governance model is one where organizations are charged with societal objectives, such as using personal information in a manner that maintains individual autonomy and which protects individuals from social, financial and physical harms, while leaving the actual mechanisms for achieving those objectives to the organization. This paper discusses the essential elements of accountability identified by the Galway Accountability Project, with scholarship from the Centre for Information Policy Leadership at Hunton & Williams LLP. Conceptual _Privacy by Design_ principles (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy and Freedom.Alan F. Westin - 1970 - Science and Society 34 (3):360-363.
    Download  
     
    Export citation  
     
    Bookmark   203 citations  
  • Justice and the Politics of Difference.Iris Marion Young - 1990 - Princeton University Press.
    In this classic work of feminist political thought, Iris Marion Young challenges the prevailing reduction of social justice to distributive justice.
    Download  
     
    Export citation  
     
    Bookmark   887 citations  
  • Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Download  
     
    Export citation  
     
    Bookmark   72 citations  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • (1 other version)Informed Consent: Its History, Meaning, and Present Challenges.Tom L. Beauchamp - 2011 - Cambridge Quarterly of Healthcare Ethics 20 (4):515-523.
    The practice of obtaining informed consent has its history in, and gains its meaning from, medicine and biomedical research. Discussions of disclosure and justified nondisclosure have played a significant role throughout the history of medical ethics, but the term “informed consent” emerged only in the 1950s. Serious discussion of the meaning and ethics of informed consent began in medicine, research, law, and philosophy only around 1972.
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  • Fairer machine learning in the real world: Mitigating discrimination without collecting sensitive data.Reuben Binns & Michael Veale - 2017 - Big Data and Society 4 (2):205395171774353.
    Decisions based on algorithmic, machine learning models can be unfair, reproducing biases in historical data used to train them. While computational techniques are emerging to address aspects of these concerns through communities such as discrimination-aware data mining and fairness, accountability and transparency machine learning, their practical implementation faces real-world challenges. For legal, institutional or commercial reasons, organisations might not hold the data on sensitive attributes such as gender, ethnicity, sexuality or disability needed to diagnose and mitigate emergent indirect discrimination-by-proxy, such (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • Machine Epistemology and Big Data.Gregory Wheeler - 2016 - In Lee C. McIntyre & Alexander Rosenberg (eds.), The Routledge Companion to Philosophy of Social Science. New York: Routledge.
    In the age of big data and a machine epistemology that can anticipate, predict, and intervene on events in our lives, the problem once again is that a few individuals possess the knowledge of how to regulate these activities. But the question we face now is not how to share such knowledge more widely, but rather of how to enjoy the public benefits bestowed by this knowledge without freely sharing it. It is not merely personal privacy that is at stake (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Defining privacy.Adam Moore - 2008 - Journal of Social Philosophy 39 (3):411-428.
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  • Privacy and the Varieties of Informational Wrongdoing.Jeroen van den Hoven - 1999 - Australian Journal of Professional and Applied Ethics 1 (1).
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Privacy and the varieties of moral wrong-doing in an information age.M. J. van den Hoven - 1997 - Acm Sigcas Computers and Society 27 (3):33-37.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • [Book review] legislating privacy, technology, social values, and public policy. [REVIEW]Priscilla M. Regan - 1998 - Business Ethics Quarterly 8 (4):723-742.
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  • Privacy and the Internet.Norman E. Bowie - 2013 - In Hugh LaFollette (ed.), The International Encyclopedia of Ethics. Hoboken, NJ: Blackwell.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • (1 other version)Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions.Thomas C. King, Nikita Aggarwal, Mariarosaria Taddeo & Luciano Floridi - 2021 - In Josh Cowls & Jessica Morley (eds.), The 2020 Yearbook of the Digital Ethics Lab. Springer Verlag. pp. 195-227.
    Artificial Intelligence research and regulation seek to balance the benefits of innovation against any potential harms and disruption. However, one unintended consequence of the recent surge in AI research is the potential re-orientation of AI technologies to facilitate criminal acts, term in this chapter AI-Crime. AIC is theoretically feasible thanks to published experiments in automating fraud targeted at social media users, as well as demonstrations of AI-driven manipulation of simulated markets. However, because AIC is still a relatively young and inherently (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Deep neural networks are more accurate than humans at detecting sexual orientation from facial images.M. Kosinski & Y. Wang - 2018 - Journal of Personality and Social Psychology 114.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • (1 other version)Review of Iris Marion Young: Justice and the Politics of Difference[REVIEW]Debra A. DeBruin - 1993 - Ethics 103 (2):398-400.
    Download  
     
    Export citation  
     
    Bookmark   450 citations  
  • Private traits and attributes are predictable from digital records of human behavior.M. Kosinski, D. Stillwell & T. Graepel - 2013 - Proceedings of the National Academy of Sciences of the United States of America 110.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Signal processing and machine learning with differential privacy: Algorithms and challenges for continuous data.A. D. Sarwate & K. Chaudhuri - 2013 - IEEE Signal Processing Magazine 30.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Three naive Bayes approaches for discrimination-free classification.Toon Calders & Sicco Verwer - 2010 - Data Mining and Knowledge Discovery 21 (2):277-292.
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Psychological targeting as an effective approach to digital mass persuasion.S. C. Matz, M. Kosinski, G. Nave & D. Stillwell - 2017 - Proceedings of the National Academy of Sciences of the United States of America 114.
    Download  
     
    Export citation  
     
    Bookmark   8 citations