Switch to: Citations

Add references

You must login to add references.
  1. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Why privacy is important.James Rachels - 1975 - Philosophy and Public Affairs 4 (4):323-333.
    Download  
     
    Export citation  
     
    Bookmark   154 citations  
  • Built-in privacy—no panacea, but a necessary condition for effective privacy protection.Alexander Dix - 2010 - Identity in the Information Society 3 (2):257-265.
    Built-in privacy has for too long been neglected by regulators. They have concentrated on reacting to violations of rules. Even imposing severe fines will however not address the basic issue that preventative privacy protection is much more meaningful. The paper discusses this in the context of the International Working Group on Data Protection in Telecommunications (“Berlin Group”) which has published numerous recommendations on privacy-compliant design of technical innovations. Social network services, road pricing schemes, and the distribution of digital media content (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • (1 other version)The Value of Privacy.Beate Roessler - 2004 - Polity.
    This new book by Beate Rossler is a work of real quality and originality on an extremely topical issue: the issue of privacy and the relations between the private and the public. Rossler investigates the reasons why we value privacy and why we ought to value it. In the context of modern, liberal societies, Rossler develops a theory of the private which links privacy and autonomy in a constitutive way: privacy is a necessary condition to lead an autonomous life. The (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  • Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Download  
     
    Export citation  
     
    Bookmark   71 citations  
  • Remote home health care technologies: how to ensure privacy? Build it in: Privacy by Design.Ann Cavoukian, Angus Fisher, Scott Killen & David A. Hoffman - 2010 - Identity in the Information Society 3 (2):363-378.
    Current advances in connectivity, sensor technology, computing power and the development of complex algorithms for processing health-related data are paving the way for the delivery of innovative long-term health care services in the future. Such technological developments will, in particular, assist the elderly and infirm to live independently, at home, for much longer periods. The home is, in fact, becoming a locus for health care innovation that may in the future compete with the hospital. However, along with these advances come (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Privacy as life, liberty, property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.
    The cluster of concerns usually identified asmatters of privacy can be adequately accountedfor by unpacking our natural rights to life,liberty, and property. Privacy as derived fromfundamental natural rights to life, liberty,and property encompasses the advantages of thecontrol and restricted access theories withouttheir attendant difficulties.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Privacy by Design.Peter Schaar - 2010 - Identity in the Information Society 3 (2):267-274.
    In view of rapid and dramatic technological change, it is important to take the special requirements of privacy protection into account early on, because new technological systems often contain hidden dangers which are very difficult to overcome after the basic design has been worked out. So it makes all the more sense to identify and examine possible data protection problems when designing new technology and to incorporate privacy protection into the overall design, instead of having to come up with laborious (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Remote Monitoring or Close Encounters? Ethical Considerations in Priority Setting Regarding Telecare.Anders Nordgren - 2012 - Health Care Analysis 22 (4):325-339.
    The proportion of elderly in society is growing rapidly, leading to increasing health care costs. New remote monitoring technologies are expected to lower these costs by reducing the number of close encounters with health care professionals, for example the number of visits to health care centres. In this paper, I discuss issues of priority setting raised by this expectation. As a starting-point, I analyse the recent debate on principles for priority setting in Sweden. The Swedish debate illustrates that developing an (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations