Results for 'Digital Rights and Privacy'

985 found
Order:
  1. Digital Rights and Freedoms: A Framework for Surveying Users and Analyzing Policies.Todd Davies - 2014 - In Luca Maria Aiello & Daniel McFarland, Social Informatics: Proceedings of the 6th International Conference (SocInfo 2014). Springer Lecture Notes in Computer Science Vol. 8851. pp. 428-443.
    Interest has been revived in the creation of a "bill of rights" for Internet users. This paper analyzes users' rights into ten broad principles, as a basis for assessing what users regard as important and for comparing different multi-issue Internet policy proposals. Stability of the principles is demonstrated in an experimental survey, which also shows that freedoms of users to participate in the design and coding of platforms appear to be viewed as inessential relative to other rights. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. AI and Ethics in Surveillance: Balancing Security and Privacy in a Digital World.Msbah J. Mosa, Alaa M. Barhoom, Mohammed I. Alhabbash, Fadi E. S. Harara, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (10):8-15.
    Abstract: In an era of rapid technological advancements, artificial intelligence (AI) has transformed surveillance systems, enhancing security capabilities across the globe. However, the deployment of AI-driven surveillance raises significant ethical concerns, particularly in balancing the need for security with the protection of individual privacy. This paper explores the ethical challenges posed by AI surveillance, focusing on issues such as data privacy, consent, algorithmic bias, and the potential for mass surveillance. Through a critical analysis of the tension between security (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  3. The Internet and Privacy.Carissa Veliz - 2019 - In David Edmonds, Ethics and the Contemporary World. New York: Routledge. pp. 149-159.
    In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is important because violations of the right to privacy can harm us individually and collectively, and offer some advice as to how to protect our privacy online.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  5. Privacy and Digital Ethics After the Pandemic.Carissa Véliz - 2021 - Nature Electronics 4:10-11.
    The increasingly prominent role of digital technologies during the coronavirus pandemic has been accompanied by concerning trends in privacy and digital ethics. But more robust protection of our rights in the digital realm is possible in the future. -/- After surveying some of the challenges we face, I argue for the importance of diplomacy. Democratic countries must try to come together and reach agreements on minimum standards and rules regarding cybersecurity, privacy and the governance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Views on Privacy. A Survey.Siân Brooke & Carissa Véliz - 2020 - In Siân Brooke & Carissa Véliz, Data, Privacy, and the Individual.
    The purpose of this survey was to gather individual’s attitudes and feelings towards privacy and the selling of data. A total (N) of 1,107 people responded to the survey. -/- Across continents, age, gender, and levels of education, people overwhelmingly think privacy is important. An impressive 82% of respondents deem privacy extremely or very important, and only 1% deem privacy unimportant. Similarly, 88% of participants either agree or strongly agree with the statement that ‘violations to the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur, The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. First, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Towards an EU Charter of Digital Patients' Rights in the Age of Artificial Intelligence.Hannah van Kolfschooten - manuscript
    The rapid advancement of digital health innovation, including Artificial Intelligence (AI), is transforming healthcare. The growing role the European Union (EU) plays in regulating the use of AI in healthcare renders national laws insufficient to safeguard patients from unique AIrelated risks. This underscores the urgent need for the recognition of a canon of patients' rights in the scope of EU law. This paper proposes the blueprint for an EU Charter for Digital Patients' Rights, consolidating and adapting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  38
    The Ethics of Cybersecurity: Balancing Privacy and Protection in the Digital Age.Lokhande Tina Kishor - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management (Ijmrsetm) 12 (2):490-494.
    The increasing integration of digital technologies into every aspect of modern life has led to a growing concern over cybersecurity, particularly in the context of privacy. As organizations collect vast amounts of personal and sensitive data, the tension between securing this information and preserving individual privacy has become a critical ethical dilemma. This paper explores the ethical challenges faced by cybersecurity professionals, policymakers, and organizations when balancing the need for protection against the potential risks to personal (...). It discusses the implications of surveillance, data collection, and the ethical boundaries of cybersecurity practices. Additionally, it evaluates existing frameworks, legal regulations, and technological solutions that attempt to balance these concerns. The paper also proposes a set of ethical guidelines for cybersecurity practices, focusing on how organizations can protect data while respecting privacy rights. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Philosophy and Digitization: Dangers and Possibilities in the New Digital Worlds.Esther Oluffa Pedersen & Maria Brincker - 2021 - SATS 22 (1):1-9.
    Our world is under going an enormous digital transformation. Nearly no area of our social, informational, political, economic, cultural, and biological spheres are left unchanged. What can philosophy contribute as we try to under- stand and think through these changes? How does digitization challenge past ideas of who we are and where we are headed? Where does it leave our ethical aspirations and cherished ideals of democracy, equality, privacy, trust, freedom, and social embeddedness? Who gets to decide, control, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. The problem of the consent for the processing of health data, particularly for biomedical research purposes, from the perspective of fundamental rights protection in the Digital Era.Joaquín Sarrión Esteve - 2018 - Revista de Derecho y Genoma Humano: Genética, Biotecnología y Medicina Avanzada = Law and the Human Genome Review: Genetics, Biotechnology and Advanced Medicine 48:107-132.
    Health data processing fields face ethical and legal problems regarding fundamental rights. As we know, patients can benefit in the Digital Era from having health or medical information available, and medical decisions can be more effective with a better understanding of clinical histories, medical and health data thanks to the development of Artificial Intelligence, Internet of Things and other Digital technologies. However, at the same time, we need to guarantee fundamental rights, including privacy ones. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Are publicly available (personal) data “up for grabs”? Three privacy arguments.Elisa Orrù - 2024 - In Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta, Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World. London: Hart. pp. 105-123.
    The re-use of publicly available (personal) data for originally unanticipated purposes has become common practice. Without such secondary uses, the development of many AI systems like large language models (LLMs) and ChatGPT would not even have been possible. This chapter addresses the ethical implications of such secondary processing, with a particular focus on data protection and privacy issues. Legal and ethical evaluations of secondary processing of publicly available personal data diverge considerably both among scholars and the general public. While (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Souled out of rights? – predicaments in protecting the human spirit in the age of neuromarketing.Alexander Sieber - 2019 - Life Sciences, Society and Policy 15 (6):1-11.
    Modern neurotechnologies are rapidly infringing on conventional notions of human dignity and they are challenging what it means to be human. This article is a survey analysis of the future of the digital age, reflecting primarily on the effects of neurotechnology that violate universal human rights to dignity, self-determination, and privacy. In particular, this article focuses on neuromarketing to critically assess potentially negative social ramifications of under-regulated neurotechnological application. Possible solutions are critically evaluated, including the human (...) claim to the ‘right to mental privacy’ and the suggestion of a new human right based on spiritual jurisdiction, where the human psyche is a legal space in a substantive legal setting. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Privacy Rights, and Why Negative Control is Not a Dead End: A Reply to Munch and Lundgren.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2021 - Res Publica 28 (2):391-400.
    Lauritz Munch and Björn Lundgren have recently replied to a paper published by us in this journal. In our original paper, we defended a novel version of the so-called ‘control theory’ of the moral right to privacy. We argued that control theorists should define ‘control’ as what we coined ‘Negative Control’. Munch and Lundgren have recently provided a range of interesting and challenging objections to our view. Independently of each other, they give almost identical counterexamples to our definition of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. The right to privacy and the deep self.Leonhard Menges - 2024 - Philosophical Quarterly:1-22.
    This paper presents an account of the right to privacy that is inspired by classic control views on this right and recent developments in moral psychology. The core idea is that the right to privacy is the right that others not make personal information about us flow unless this flow is an expression of and does not conflict with our deep self. The nature of the deep self will be spelled out in terms of stable intrinsic desires. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. ICTs, data and vulnerable people: a guide for citizens.Alexandra Castańeda, Andreas Matheus, Andrzej Klimczuk, Anna BertiSuman, Annelies Duerinckx, Christoforos Pavlakis, Corelia Baibarac-Duignan, Elisabetta Broglio, Federico Caruso, Gefion Thuermer, Helen Feord, Janice Asine, Jaume Piera, Karen Soacha, Katerina Zourou, Katherin Wagenknecht, Katrin Vohland, Linda Freyburg, Marcel Leppée, Marta CamaraOliveira, Mieke Sterken & Tim Woods - 2021 - Bilbao: Upv-Ehu.
    ICTs, personal data, digital rights, the GDPR, data privacy, online security… these terms, and the concepts behind them, are increasingly common in our lives. Some of us may be familiar with them, but others are less aware of the growing role of ICTs and data in our lives - and the potential risks this creates. These risks are even more pronounced for vulnerable groups in society. People can be vulnerable in different, often overlapping, ways, which place them (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Cloud computing and its ethical challenges.Matteo Turilli & Luciano Floridi - manuscript
    The paper analyses six ethical challenges posed by cloud computing, concerning ownership, safety, fairness, responsibility, accountability and privacy. The first part defines cloud computing on the basis of a resource-oriented approach, and outlines the main features that characterise such technology. Following these clarifications, the second part argues that cloud computing reshapes some classic problems often debated in information and computer ethics. To begin with, cloud computing makes possible a complete decoupling of ownership, possession and use of data and this (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Augmented Reality, Augmented Epistemology, and the Real-World Web.Cody Turner - 2022 - Philosophy and Technology 35 (1):1-28.
    Augmented reality (AR) technologies function to ‘augment’ normal perception by superimposing virtual objects onto an agent’s visual field. The philosophy of augmented reality is a small but growing subfield within the philosophy of technology. Existing work in this subfield includes research on the phenomenology of augmented experiences, the metaphysics of virtual objects, and different ethical issues associated with AR systems, including (but not limited to) issues of privacy, property rights, ownership, trust, and informed consent. This paper addresses some (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  21. Privatheit und Identifizierbarkeit - Warum die Verbreitung anonymer Daten die Privatheit verletzen kann.Philipp Schwind - forthcoming - Zeitschrift Für Ethik Und Moralphilosophie.
    The right to privacy extends only to information through which the persons concerned are identifiable. This assumption is widely shared in law and in philosophical debate; it also guides the handling of personal data, for example, in medicine. However, this essay argues that the dissemination of anonymous information can also constitute a violation of privacy. This conclusion arises from two theses: (1) From the perspective of the affected person, judgments by others about anonymous information refer to its originator, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. 50 questions on Active Assisted Living technologies. Global edition.Francisco Florez-Revuelta, Alin Ake-Kob, Pau Climent-Perez, Paulo Coelho, Liane Colonna, Laila Dahabiyeh, Carina Dantas, Esra Dogru-Huzmeli, Hazim Kemal Ekenel, Aleksandar Jevremovic, Nina Hosseini-Kivanani, Aysegul Ilgaz, Mladjan Jovanovic, Andrzej Klimczuk, Maksymilian M. Kuźmicz, Petre Lameski, Ferlanda Luna, Natália Machado, Tamara Mujirishvili, Zada Pajalic, Galidiya Petrova, Nathalie G. S. Puaschitz, Maria Jose Santofimia, Agusti Solanas, Wilhelmina van Staalduinen & Ziya Ata Yazici - 2024 - Alicante: University of Alicante.
    This booklet on Active Assisted Living (AAL) technologies has been created as part of the GoodBrother COST Action, which has run from 2020 to 2024. COST Actions are European research programs that promote collaboration across borders, uniting researchers, professionals, and institutions to address key societal challenges. GoodBrother focused on ethical and privacy concerns surrounding video and audio monitoring in care settings. The aim was to ensure that while AAL technologies help older adults and vulnerable individuals, their privacy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Inferences and the Right to Privacy.Jakob Mainz - 2024 - Journal of Value Inquiry 58 (4):563-581.
    In this paper, I defend what I call the ‘Inference Principle’. This principle holds that if an agent obtains some information legitimately, then the agent can make any inference she wants based on the information, without violating anyone’s right to privacy. This principle is interesting for at least three reasons. First, it constitutes a novel answer to the timely question of whether the widespread use of ‘data analytics’ to infer personal information about individuals is morally permissible. Second, it contradicts (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Bentham: Our Contemporary?Gianluca Andresani & Natalina Stamile - 2020 - Revista da Faculdade de Direito UFPR 65 (3):173-189.
    This article aims to evaluate the contribution of Bentham’s ideas to the jurisprudential debate in view of their relevance vis a vis their contemporary reception. The focus is on Bentham’s revolutionary idea of publicity with its spill-over effects on contemporary debates on the rule of law and accountable and transparent governance. As far as the method is concerned, after having examined Bentham’s ideas on the rule of law and the debate they raised, the focus in the second section of this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Oikopolitics, regulation and privacy: An essay on the governmental nature of the right to private life.Muhammad Ali Nasir - 2019 - Philosophy and Social Criticism 45 (3):334-355.
    This essay focuses on the interrelationship of regulation and private life in human rights. It argues three main points. (1) Article 8 connects the question of protection of private lives and privacies with the question of their management. Thus, Article 8 orients regulatory practices to private lives and privacies. (2) Article 8’s holders are autonomous to the extent that laws respect their private lives and privacies. They are not autonomous in a ‘pre-political’ sense, where we might expect legal rules (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Anti-doping, purported rights to privacy and WADA's whereabouts requirements: A legal analysis.Oskar MacGregor, Richard Griffith, Daniele Ruggiu & Mike McNamee - 2013 - Fair Play 1 (2):13-38.
    Recent discussions among lawyers, philosophers, policy researchers and athletes have focused on the potential threat to privacy posed by the World Anti-Doping Agency’s (WADA) whereabouts requirements. These requirements demand, among other things, that all elite athletes file their whereabouts information for the subsequent quarter on a quarterly basis and comprise data for one hour of each day when the athlete will be available and accessible for no advance notice testing at a specified location of their choosing. Failure to file (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27. (1 other version)Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva 2005 (nov):1-31.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people’s freedom and equality provided by rights of political choice, association and expression, and can (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  28. Privacy and the USA patriot act: Rights, the value of rights, and autonomy.Alan Rubel - 2007 - Law and Philosophy 26 (2):119-159.
    Civil liberty and privacy advocates have criticized the USA PATRIOT Act (Act) on numerous grounds since it was passed in the wake of the World Trade Center attacks in 2001. Two of the primary targets of those criticisms are the Act’s sneak-and-peek search provision, which allows law enforcement agents to conduct searches without informing the search’s subjects, and the business records provision, which allows agents to secretly subpoena a variety of information – most notoriously, library borrowing records. Without attending (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  29. Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  30. Referent tracking for digital rights management.Werner Ceusters & Barry Smith - 2007 - International Journal of Metadata, Semantics and Ontologies 2 (1):45-53.
    Digital Rights Management (DRM) covers the description, identification, trading, protection, monitoring and tracking of all forms of rights over both tangible and intangible assets. The Digital Object Identifier (DOI) system provides a framework for the persistent identification of entities involved in this domain. Although the system has been very well designed to manage object identifiers, some important questions relating to the creation and assignment of identifiers are left open. The paradigm of a Referent Tracking System (RTS) (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  31. Why the NSA didn’t diminish your privacy but might have violated your right to privacy.Lauritz Munch - forthcoming - Analysis.
    According to a popular view, privacy is a function of people not knowing or rationally believing some fact about you. But intuitively it seems possible for a perpetrator to violate your right to privacy without learning any facts about you. For example, it seems plausible to say that the US National Security Agency’s PRISM program violated, or could have violated, the privacy rights of the people whose information was collected, despite the fact that the NSA, for (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  34
    SECURITY AND PRIVACY TECHNIQUE IN BIG DATA: A REVIEW.Pamarthi Kartheek - 2024 - North American Journal of Engineering Research 5 (1).
    The importance of Big Data as a foundational component of the AI and ML landscape is not going away anytime soon. As a result, the past fifteen years have seen a tremendous investment in Big Data research. The purpose of this literature review is to compile the most recent results from Big Data studies conducted over the past fifteen years. The study will address questions about the main applications of Big Data analytics, the main challenges and limitations encountered by researchers, (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  34. Privacy and Assurance: On the Right to Be Forgotten.Scott Casleton - 2024 - Political Philosophy 1 (1):212-235.
    The right to be forgotten enables individuals to remove certain links from search results that appear when their names are entered as search terms. Formulated as a distinct application of the general right to privacy, the right to be forgotten has proven highly controversial, for two reasons. First, it is difficult to see how the specific right to be forgotten can apply to the withdrawal of public information, since the general right to privacy typically covers the disclosure of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Kant and Privacy.Helga Varden - 2021 - In Ansgar Lyssy & Christopher Yeomans, Kant on Morality, Humanity, and Legality: Practical Dimensions of Normativity. London: Palgrave-Macmillan. pp. 229-252.
    In this paper I argue for two things. First, many concerns we have regarding privacy—both regarding what things we do and do not want to protect in its name—can be explained through an account of our moral (legal and ethical) rights. Second, to understand a further set of moral (ethical and legal) concerns regarding privacy—especially the temptation to want to intrude on and disrespect others’ privacy and the gravity of such breaches and denials of privacy—we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Technology and Privacy.Edmund Byrne - 1991 - In Byrne Edmund, The Technology of Discovery and the Discovery of Technology. Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential treatment (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Big Data as Tracking Technology and Problems of the Group and its Members.Haleh Asgarinia - 2023 - In Kevin Macnish & Adam Henschke, The Ethics of Surveillance in Times of Emergency. Oxford University Press. pp. 60-75.
    Digital data help data scientists and epidemiologists track and predict outbreaks of disease. Mobile phone GPS data, social media data, or other forms of information updates such as the progress of epidemics are used by epidemiologists to recognize disease spread among specific groups of people. Targeting groups as potential carriers of a disease, rather than addressing individuals as patients, risks causing harm to groups. While there are rules and obligations at the level of the individual, we have to reach (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. Digital privacy and the law: the challenge of regulatory capture.Bartek Chomanski & Lode Lauwaert - 2024 - AI and Society.
    Digital privacy scholars tend to bemoan ordinary people’s limited knowledge of and lukewarm interest in what happens to their digital data. This general lack of interest and knowledge is often taken as a consideration in favor of legislation aiming to force internet companies into adopting more responsible data practices. While we remain silent on whether any new laws are called for, in this paper we wish to underline a neglected consequence of people’s ignorance of and apathy for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. On human dignity as a foundation for the right to privacy.Luciano Floridi - 2016 - Philosophy and Technology 29 (4):307-312.
    In 2016, the European Parliament approved the General Data Protection Regulation (GDPR) whose core aim is the safeguarding of information privacy, and, by corollary, human dignity. Drawing on the field of philosophical anthropology, this paper analyses various interpretations of human dignity and human exceptionalism. It concludes that privacy is essential for humans to flourish and enable individuals to build a sense of self and the world.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  41.  56
    The Holistic Governance Model (HGM): A Blueprint for the Future.Angelito Malicse - manuscript
    The Holistic Governance Model (HGM): A Blueprint for the Future -/- Introduction -/- Governments today face increasing challenges, from economic instability and climate change to corruption and social inequality. No single government system has fully solved these issues, but by integrating the best aspects of existing models, we can create an optimal governance system. -/- The Holistic Governance Model (HGM) is a hybrid system that combines elements from Social Democracy, Technocracy, Semi-Direct Democracy, China’s Whole-Process People’s Democracy, and the Modified Westminster (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Testimonial entitlement, norms of assertion and privacy.Philip J. Nickel - 2013 - Episteme 10 (2):207-217.
    According to assurance views of testimonial justification, in virtue of the act of testifying a speaker provides an assurance of the truth of what she asserts to the addressee. This assurance provides a special justificatory force and a distinctive normative status to the addressee. It is thought to explain certain asymmetries between addressees and other unintended hearers (bystanders and eavesdroppers), such as the phenomenon that the addressee has a right to blame the speaker for conveying a falsehood but unintended hearers (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  43. Legal aspects of Big Data - GDPR.Nicolae Sfetcu - manuscript
    The use of Big Data presents significant legal problems, especially in terms of data protection. The existing legal framework of the European Union based in particular on the Directive no. 46/95/EC and the General Regulation on the Protection of Personal Data provide adequate protection. But for Big Data, a comprehensive and global strategy is needed. The evolution over time was from the right to exclude others to the right to control their own data and, at present, to the rethinking of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. STC database for SQL Range Queries digital apps with Privacy Preserving.Chandran Sudhin - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):49-59.
    Businesses and people outsource database to realize helpful and low-cost applications and administrations. In arrange to supply adequate usefulness for SQL inquiries, numerous secure database plans have been proposed. In any case, such plans are helpless to protection leakage to cloud server. The most reason is that database is facilitated and handled in cloud server, which is past the control of information proprietors. For the numerical extend inquiry (“>”, “<”, etc.), those plans cannot give adequate protection security against viable challenges, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  19
    Preventing Election Manipulation: Safeguards Against Propaganda and Hidden Motives.Angelito Malicse - manuscript
    Preventing Election Manipulation: Safeguards Against Propaganda and Hidden Motives -/- Elections are the foundation of democratic governance, ensuring that leadership reflects the will of the people. However, history has repeatedly shown that candidates can win by manipulating public perception through propaganda, misinformation, and by hiding their true motives. While such elections may be technically valid, they often lack ethical legitimacy, leading to governance that does not truly serve the public interest. To prevent election manipulation, societies must implement strong safeguards, including (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Group privacy: a defence and an interpretation.Luciano Floridi - 2016 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor, Group privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  48. Online consent: how much do we need to know?Bartek Chomanski & Lode Lauwaert - forthcoming - AI and Society.
    This paper argues, against the prevailing view, that consent to privacy policies that regular internet users usually give is largely unproblematic from the moral point of view. To substantiate this claim, we rely on the idea of the right not to know (RNTK), as developed by bioethicists. Defenders of the RNTK in bioethical literature on informed consent claim that patients generally have the right to refuse medically relevant information. In this article we extend the application of the RNTK to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. (1 other version)Must privacy and sexual equality conflict? A philosophical examination of some legal evidence.Annabelle Lever - 2001 - Social Research: An International Quarterly 67 (4):1137-1171.
    Are rights to privacy consistent with sexual equality? In a brief, but influential, article Catherine MacKinnon trenchantly laid out feminist criticisms of the right to privacy. In “Privacy v. Equality: Beyond Roe v. Wade” she linked familiar objections to the right to privacy and connected them to the fate of abortion rights in the U.S.A. (MacKinnon, 1983, 93-102). For many feminists, the Supreme Court’s decision in Roe v. Wade (1973) had suggested that, notwithstanding a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  50. Climate change and state interference: the case of privacy.Leonhard Menges - 2025 - Philosophical Studies 182 (2):425-443.
    Climate change is one of the most important issues we are currently facing. There are many ways in which states can fight climate change. Some of them involve interfering with citizens’ personal lives. The question of whether such interference is justified is under-explored in philosophy. This paper focuses on a specific aspect of people’s personal lives, namely their informational privacy. It discusses the question of whether, given certain empirical assumptions, it is proportional of the state to risk its citizens’ (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 985