Results for 'Privacy as intrusion'

983 found
Order:
  1. An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  20
    Federated Learning: An Intrusion Detection Privacy Preserving Approach to Decentralized AI Model Training for IOT Security.Mittal Mohit - 2018 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 7 (1):1-8.
    There are various aspects to Internet of Things security, such as guaranteeing the safety of both the devices and the Internet of Things networks to which they connect. Many other types of equipment, including industrial robots, smart grids, construction automation systems, entertainment gadgets, and many more, are included in this, despite the fact that they were not designed with network security in mind. When it comes to securing systems, networks, and data, IoT device security must be able to resist a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry:1-16.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen, Philosophy and Public Policy. New York, USA: Rowman & Littlefield International. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the lack (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  6. Not the doctor’s business: Privacy, personal responsibility and data rights in medical settings.Carissa Véliz - 2020 - Bioethics 34 (7):712-718.
    This paper argues that assessing personal responsibility in healthcare settings for the allocation of medical resources would be too privacy-invasive to be morally justifiable. In addition to being an inappropriate and moralizing intrusion into the private lives of patients, it would put patients’ sensitive data at risk, making data subjects vulnerable to a variety of privacy-related harms. Even though we allow privacy-invasive investigations to take place in legal trials, the justice and healthcare systems are not analogous. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  23
    Enhancing Cybersecurity and Privacy using Artificial Intelligence: Trends and Future Directions of Research.V. Talati Dhruvitkumar - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (1):56-64.
    The speed with which cyber threats are evolving is calling for fresh approaches to enhance cybersecurity and protection of privacy. Artificial Intelligence (AI) is proving to be a revolutionary factor in enhancing cybersecurity, providing powerful capabilities for intrusion detection, malware detection, and privacy protection. This article outlines an in-depth review of the use of AI in cybersecurity with particular reference to future directions and trends in research. Applying the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Privacy as an Asset.Jarek Gryz - 2017 - In Mindel Marcellus, Lyons Kelly & Wigglesworth Joe, Proceedings of the 27th CASCON Conference. IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Mrs. Aremac and the camera: A response to Ryberg.Annabelle Lever - 2008 - Res Publica 14 (1):35-42.
    In a recent article in Respublica, Jesper Ryberg argues that CCTV can be compared to a little old lady gazing out onto the street below. This article takes issue with the claim that government surveillance can be justified in this manner. Governments have powers and responsibilities that little old ladies lack. Even if CCTV is effective at preventing crime, there may be less intrusive ways of doing so. People have a variety of legitimate interests in privacy, and protection for (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  10.  34
    Cybersecurity in the Internet of Things (IoT): Challenges and Solutions.R. Surya Kala A. N. Abirama Valli - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (1):344-347.
    The Internet of Things (IoT) is revolutionizing industries by connecting everyday objects to the internet, enabling improved functionality and convenience. However, the rapid adoption of IoT devices has raised significant cybersecurity concerns, as the vast number of connected devices presents new vulnerabilities that can be exploited by cybercriminals. These vulnerabilities are often the result of insecure device configurations, weak authentication mechanisms, and inadequate data protection. This paper explores the cybersecurity challenges associated with IoT, such as device security, network security, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. A Defense of Privacy as Control.Leonhard Menges - 2020 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  12.  27
    Cybersecurity in the Internet of Things (IoT): Challenges and Solutions.R. Surya Kala A. N. Abirama Valli - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 12 (1):344-347.
    The Internet of Things (IoT) is revolutionizing industries by connecting everyday objects to the internet, enabling improved functionality and convenience. However, the rapid adoption of IoT devices has raised significant cybersecurity concerns, as the vast number of connected devices presents new vulnerabilities that can be exploited by cybercriminals. These vulnerabilities are often the result of insecure device configurations, weak authentication mechanisms, and inadequate data protection. This paper explores the cybersecurity challenges associated with IoT, such as device security, network security, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. State of the Art of Audio- and Video-Based Solutions for AAL.Slavisa Aleksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Cartolovni, Pau Climent-Perez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazim Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta, Danila Germanese, Nicole Grech, Steinunn Gróa Sigurđardóttir, Murat Emirzeoglu, Ivo Iliev, Mladjan Jovanovic, Martin Kampel, William Kearns, Andrzej Klimczuk, Lambros Lambrinos, Jennifer Lumetzberger, Wiktor Mucha, Sophie Noiret, Zada Pajalic, Rodrigo Rodriguez Perez, Galidiya Petrova, Sintija Petrovica, Peter Pocta, Angelica Poli, Mara Pudane, Susanna Spinsante, Albert Ali Salah, Maria Jose Santofimia, Anna Sigríđur Islind, Lacramioara Stoicu-Tivadar, Hilda Tellioglu & Andrej Zgank - 2022 - Alicante: University of Alicante.
    It is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In Philosophical Foundations of Medical Law. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At best, data about your health might (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. On human dignity as a foundation for the right to privacy.Luciano Floridi - 2016 - Philosophy and Technology 29 (4):307-312.
    In 2016, the European Parliament approved the General Data Protection Regulation (GDPR) whose core aim is the safeguarding of information privacy, and, by corollary, human dignity. Drawing on the field of philosophical anthropology, this paper analyses various interpretations of human dignity and human exceptionalism. It concludes that privacy is essential for humans to flourish and enable individuals to build a sense of self and the world.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  16. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17. Adopting trust as an ex post approach to privacy.Haleh Asgarinia - 2024 - AI and Ethics 3 (4).
    This research explores how a person with whom information has been shared and, importantly, an artificial intelligence (AI) system used to deduce information from the shared data contribute to making the disclosure context private. The study posits that private contexts are constituted by the interactions of individuals in the social context of intersubjectivity based on trust. Hence, to make the context private, the person who is the trustee (i.e., with whom information has been shared) must fulfil trust norms. According to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Group privacy: a defence and an interpretation.Luciano Floridi - 2016 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor, Group privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  19. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  20. Brain Privacy and the Case of Cannibal Cop.Mark Tunick - 2017 - Res Publica 23 (2):179-196.
    In light of technology that may reveal the content of a person’s innermost thoughts, I address the question of whether there is a right to ‘brain privacy’—a right not to have one’s inner thoughts revealed to others–even if exposing these thoughts might be beneficial to society. I draw on a conception of privacy as the ability to control who has access to information about oneself and to an account that connects one’s interest in privacy to one’s interests (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  22. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce, (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  24. Privacy.Edmund Byrne - 1997 - In Byrne Edmund, Encyclopedia of Applied Ethics. Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. Digital privacy and the law: the challenge of regulatory capture.Bartek Chomanski & Lode Lauwaert - 2024 - AI and Society.
    Digital privacy scholars tend to bemoan ordinary people’s limited knowledge of and lukewarm interest in what happens to their digital data. This general lack of interest and knowledge is often taken as a consideration in favor of legislation aiming to force internet companies into adopting more responsible data practices. While we remain silent on whether any new laws are called for, in this paper we wish to underline a neglected consequence of people’s ignorance of and apathy for digital (...): their potential to encourage capture by industry interests. In particular, we argue that such laws may be at increased risk of capture because they are unlikely to be democratically responsive. We make this claim on a twofold basis: first, well-known theoretical mechanisms explaining how the absence of responsiveness leads to capture, identified in prior political science and political philosophy literature, yield the prediction that digital privacy legislation is likely to be unresponsive and thus captured; second, empirical data concerning the European Union’s digital privacy laws, with a special focus on the General Data Protection Regulation, appears to confirm these predictions: the bloc’s (world’s?) flagship privacy protection law seems more responsive to corporate than citizen interests. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Privacy and Democracy.Paul Voice - 2016 - South African Journal of Philosophy 35 (3):1-9.
    The meaning of privacy has been frequently disputed in the philosophical and -/- legal literature since Warren and Brandeis first argued for it as a distinct and -/- important personal and social value. Nevertheless, while the meaning of privacy -/- is held to be vague, there is general agreement that Warren and Brandeis were -/- correct in their assessment of its value. Theorists of democracy, on the other hand, -/- have been ambivalent towards the realm of the private. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  28. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz, Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  29. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  30. Privacy and Assurance: On the Right to Be Forgotten.Scott Casleton - 2024 - Political Philosophy 1 (1):212-235.
    The right to be forgotten enables individuals to remove certain links from search results that appear when their names are entered as search terms. Formulated as a distinct application of the general right to privacy, the right to be forgotten has proven highly controversial, for two reasons. First, it is difficult to see how the specific right to be forgotten can apply to the withdrawal of public information, since the general right to privacy typically covers the disclosure of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Privacy and the USA patriot act: Rights, the value of rights, and autonomy.Alan Rubel - 2007 - Law and Philosophy 26 (2):119-159.
    Civil liberty and privacy advocates have criticized the USA PATRIOT Act (Act) on numerous grounds since it was passed in the wake of the World Trade Center attacks in 2001. Two of the primary targets of those criticisms are the Act’s sneak-and-peek search provision, which allows law enforcement agents to conduct searches without informing the search’s subjects, and the business records provision, which allows agents to secretly subpoena a variety of information – most notoriously, library borrowing records. Without attending (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  32. Privacy and the Common Good: G. H. Mead and the Social Value of Privacy.Yuval Goldfus - manuscript
    This article explores the social value of privacy and the intricate relationship between personal autonomy and societal cohesion within the realm of privacy. It contrasts George Herbert Mead’s two models of social organization—hostility and integration—in terms of their impact on the interplay between individuals and society. The model of hostility envisions individuals and society engaged in a zero-sum game, resulting in diminished individuality and an atomistic view of autonomy. In contrast, the model of integration recognizes the interdependence of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  34. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2015 - In Beate Roessler & Dorota Mokrosinska, The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  92
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  39. privacy, democracy and freedom of expression.Annabelle Lever - 2015 - In Beate Roessler & Dorota Mokrosinska, The Social Dimensions of Privacy. Cambridge University Press.
    this paper argues that people are entitled to keep some true facts about themselves to themselves, should they so wish, as a sign of respect for their moral and political status, and in order to protect themselves from being used as a public example in order to educate or to entertain other people. The “outing” - or non-consensual public disclosure - of people’s health records or status, or their sexual behaviour or orientation is usually unjustified, even when its consequences seem (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  40. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  41. Belief reports and pragmatic intrusion: the case of null appositives.Alessandro Capone - 2008 - Journal of Pragmatics 40:2019-2040.
    In this paper, I explore Bach’s idea (Bach, 2000) that null appositives, intended as expanded qua-clauses, can resolve the puzzles of belief reports. These puzzles are crucial in understanding the semantics and pragmatics of belief reports and are presented in a section. I propose that Bach’s strategy is not only a way of dealing with puzzles, but also an ideal way of dealing with belief reports. I argue that even simple unproblematic cases of belief reports are cases of pragmatic (...), involving null appositives, or to use the words of Bach, ‘qua-clauses’. The main difference between my pragmatic approach and the one by Salmon (1986) is that this author uses the notion of conversational implicature, whereas I use the notion of pragmatic intrusion and explicature. From my point of view, statements such as ‘‘John believes that Cicero is clever’’ and ‘‘John believes that Tully is clever’’ have got distinct truth-values. In other words, I claim that belief reports in the default case illuminate the hearer on the mental life of the believer, that includes specific modes of presentation of the referents talked about. Furthermore, while in the other pragmatic approaches, it is mysterious how a mode of presentation is assumed to be the main filter of the believer’s mental life, here I provide an explanatory account in terms of relevance, cognitive effects, and processing efforts. The most important part of the paper is devoted to showing that null appositives are required, in the case of belief reports, to explain certain anaphoric effects, which would otherwise be mysterious. My examples show that null appositives are not necessitated at logical form, but only at the level of the explicature, in line with the standard assumptions by Carston and Recanati on pragmatic intrusion. I develop a potentially useful analysis of belief reports by exploiting syntactic and semantic considerations on presuppositional clitics in Romance. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  42. Pictures, Privacy, Augustine, and the Mind.Derek A. McDougall - 2008 - Journal of Philosophical Research 33:33-72.
    This paper weaves together a number of separate strands each relating to an aspect of Wittgenstein’s Philosophical Investigations. The first strand introduces his radical and incoherent idea of a private object. Wittgenstein in § 258 and related passages is not investigating a perfectly ordinary notion of first person privacy; but his critics have treated his question, whether a private language is possible, solely in terms of their quite separate question of how our ordinary sensation terms can be understood, in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Libraries, Electronic Resources, and Privacy: The Case for Positive Intellectual Freedom.Alan Rubel - 2014 - Library Quarterly 84 (2):183-208.
    Public and research libraries have long provided resources in electronic formats, and the tension between providing electronic resources and patron privacy is widely recognized. But assessing trade-offs between privacy and access to electronic resources remains difficult. One reason is a conceptual problem regarding intellectual freedom. Traditionally, the LIS literature has plausibly understood privacy as a facet of intellectual freedom. However, while certain types of electronic resource use may diminish patron privacy, thereby diminishing intellectual freedom, the opportunities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. In the Privacy of Our Streets.Carissa Véliz - 2018 - In Bryce Clayton Newell, Tjerk Timan & Bert-Jaap Koops, Surveillance, Privacy and Public Space. Routledge. pp. 16-32.
    If one lives in a city and wants to be by oneself or have a private conversation with someone else, there are two ways to set about it: either one finds a place of solitude, such as one’s bedroom, or one finds a place crowded enough, public enough, that attention to each person dilutes so much so as to resemble a deserted refuge. Often, one can get more privacy in public places than in the most private of spaces. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Intrusive Uncertainty in Obsessive Compulsive Disorder.Tom Cochrane & Keeley Heaton - 2017 - Mind and Language 32 (2):182-208.
    In this article we examine obsessive compulsive disorder (OCD). We examine and reject two existing models of this disorder: the Dysfunctional Belief Model and the Inference‐Based Approach. Instead, we propose that the main distinctive characteristic of OCD is a hyperactive sub‐personal signal of being in error, experienced by the individual as uncertainty about his or her intentional actions (including mental actions). This signalling interacts with the anxiety sensitivities of the individual to trigger conscious checking processes, including speculations about possible harms. (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  46. Network Intrusion Detection using Machine Learning.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    With the growing sophistication and frequency of cyberattacks, there is a critical need for effective systems that can detect and prevent breaches in real time. The AI/ML-based Network Intrusion Detection System (NIDS) addresses this need by analyzing traffic patterns to identify security breaches in firewalls, routers, and network infrastructures. By integrating machine learning algorithms—K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Random Forest—the system is able to detect both known cyber threats and previously unseen attack vectors. Unlike traditional methods (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Privacy: scepticism, normative approaches and legal protection. A review of the theoretical debate and a discussion of recent developments in the EU.Elisa Orrù - 2022 - Dpce Online 52 (2):779–800.
    Digitalisation has lent the right to privacy increasing philosophical and legal relevance. However, privacy’s epistemic status and associated normative values are constantly subject to radical criticisms. This article investigates the validity, in theory and practice, of three radical critiques of privacy. A review of the philosophical and interdisciplinary discourse on privacy during the last half century is followed by analyses of recent legal developments within the EU. Privacy emerges as a highly differentiated and powerful tool (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Privacy in Public Places: Do GPS and Video Surveillance Provide Plain Views?Mark Tunick - 2009 - Social Theory and Practice 35 (4):597-622.
    New technologies of surveillance such as Global Positioning Systems (GPS) are increasingly used as convenient substitutes for conventional means of observation. Recent court decisions hold that the government may, without a warrant, use a GPS to track a vehicle’s movements in public places without violating the 4th Amendment, as the vehicle is in plain view and no reasonable expectation of privacy is violated. This emerging consensus of opinions fails to distinguish the unreasonable expectation that we not be seen in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  28
    Network Intrusion Classification.O. Sri Nagesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-14.
    The rapid proliferation of interconnected devices and the increasing complexity of digital networks in the modern era have resulted in a surge of diverse and voluminous network traffic. This growth poses considerable challenges in effectively distinguishing between normal and malicious data flows. As cyber threats continue to evolve, traditional traffic classification methods struggle to keep pace with the dynamic and multifaceted security challenges of contemporary networks. In this context, ensuring robust network security has become an imperative. This research aims to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore, Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 983