Switch to: Citations

Add references

You must login to add references.
  1. Property rights in genetic information.Richard A. Spinello - 2004 - Ethics and Information Technology 6 (1):29-42.
    The primary theme of this paper is the normative case against ownership of one's genetic information along with the source of that information (usually human tissues samples). The argument presented here against such “upstream” property rights is based primarily on utilitarian grounds. This issue has new salience thanks to the Human Genome Project and “bio-prospecting” initiatives based on the aggregation of genetic information, such as the one being managed by deCODE Genetics in Iceland. The rationale for ownership is twofold: ownership (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
    Computer and information ethics, as well as other fields of applied ethics, need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. The proposed theory of just consequentialism emphasizes consequences of policies within the constraints of justice. This makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics.
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Autonomy and Trust in Bioethics.Onora O'Neill - 2002 - New York: Cambridge University Press.
    Why has autonomy been a leading idea in philosophical writing on bioethics, and why has trust been marginal? In this important book, Onora O'Neill suggests that the conceptions of individual autonomy so widely relied on in bioethics are philosophically and ethically inadequate, and that they undermine rather than support relations of trust. She shows how Kant's non-individualistic view of autonomy provides a stronger basis for an approach to medicine, science and biotechnology, and does not marginalize untrustworthiness, while also explaining why (...)
    Download  
     
    Export citation  
     
    Bookmark   267 citations  
  • [Book review] in pursuit of privacy, law, ethics, and the rise of technology. [REVIEW]Judith Wagner DeCew - 1999 - Ethics 109 (2):437-439.
    Download  
     
    Export citation  
     
    Bookmark   53 citations  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  • KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • How the role of computing is driving new genetics public policy.Antonio Marturano & Ruth Chadwick - 2004 - Ethics and Information Technology 6 (1):43-53.
    In this paper we will examine some ethical aspects of the role that computers and computing increasingly play in new genetics. Our claim is that there is no new genetics without computer science. Computer science is important for the new genetics on two levels: from a theoretical perspective, and from the point of view of geneticists practice. With respect to , the new genetics is fully impregnate with concepts that are basic for computer science. Regarding , recent developments in the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy and policy for genetic research.Judith Wagner DeCew - 2004 - Ethics and Information Technology 6 (1):5-14.
    I begin with a discussion of the value of privacy and what we lose without it. I then turn to the difficulties of preserving privacy for genetic information and other medical records in the face of advanced information technology. I suggest three alternative public policy approaches to the problem of protecting individual privacy and also preserving databases for genetic research:(1) governmental guidelines and centralized databases, (2) corporate self-regulation, and (3) my hybrid approach. None of these are unproblematic; I discuss strengths (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Molecular biologists as hackers of human data: Rethinking IPR for bioinformatics research.Antonio Marturano - 2003 - Journal of Information, Communication and Ethics in Society 1 (4):207-215.
    This paper is the result of the research I undertook at Lancaster University with a Marie Curie Fellowship during the academic years 2000‐2002. The objective of this research was to study the limits and the challenges of the analogy between molecular geneticists’ work and hackers’ activities. By focusing on this analogy I aim to explore the different ethical and philosophical issues surrounding new genetics and its IPR regulations. The paper firstly will show the philosophical background lying behind the proposed analogy (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Using genetic information while protecting the privacy of the soul.James H. Moor - 1999 - Ethics and Information Technology 1 (4):257-263.
    Computing plays an important role in genetics (and vice versa).Theoretically, computing provides a conceptual model for thefunction and malfunction of our genetic machinery. Practically,contemporary computers and robots equipped with advancedalgorithms make the revelation of the complete human genomeimminent – computers are about to reveal our genetic soulsfor the first time. Ethically, computers help protect privacyby restricting access in sophisticated ways to genetic information.But the inexorable fact that computers will increasingly collect,analyze, and disseminate abundant amounts of genetic informationmade available through the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. [REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.
    The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues treated in (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The limits of privacy.A. Etzioni - 1999 - Journal of Law Medicine and Ethics 27 (3):288-288.
    Download  
     
    Export citation  
     
    Bookmark   43 citations