Switch to: Citations

Add references

You must login to add references.
  1. Seizing control?: The experience capture experiments of ringley & Mann. [REVIEW]Jane Bailey & Ian Kerr - 2007 - Ethics and Information Technology 9 (2):129-139.
    Will the proliferation of devices that provide the continuous archival and retrieval of personal experiences (CARPE) improve control over, access to and the record of collective knowledge as Vannevar Bush once predicted with his futuristic memex? Or is it possible that their increasing ubiquity might pose fundamental risks to humanity, as Donald Norman contemplated in his investigation of an imaginary CARPE device he called the “Teddy”? Through an examination of the webcam experiment of Jenni Ringley and the EyeTap experiments of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Uneasy Access: Privacy for Women in a Free Society.Anita L. Allen - 1988 - Rowman & Littlefield Publishers.
    'Anita L. Allen breaks new ground...A stunning indictment of women's status in contemporary society, her book provides vital original scholarly research and insight.' |s-NEW DIRECTIONS FOR WOMEN.
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  • Online diaries: Reflections on trust, privacy, and exhibitionism. [REVIEW]Paul B. de Laat - 2008 - Ethics and Information Technology 10 (1):57-69.
    Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Online diaries: Reflections on trust, privacy, and exhibitionism.Paul Laat - 2008 - Ethics and Information Technology 10 (1):57-69.
    Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations