Results for 'Privacy by design'

1000+ found
Order:
  1. Responsible innovation at work: gamification, public engagement, and privacy by design.Blok Vincent, Ruggio Daniele & Coenen Christopher - 2022 - Journal of Responsible Innovation.
    Download  
     
    Export citation  
     
    Bookmark  
  2. The design of the internet’s architecture by the Internet Engineering Task Force (IETF) and human rights.Corinne Cath & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (2):449–468.
    The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet’s architecture. The technical decisions made by Internet Standard Developing Organisations that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically mediated public sphere, including which rights (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  4. Imaginative Value Sensitive Design: Using Moral Imagination Theory to Inform Responsible Technology Design.Steven Umbrello - 2020 - Science and Engineering Ethics 26 (2):575-595.
    Safe-by-Design (SBD) frameworks for the development of emerging technologies have become an ever more popular means by which scholars argue that transformative emerging technologies can safely incorporate human values. One such popular SBD methodology is called Value Sensitive Design (VSD). A central tenet of this design methodology is to investigate stakeholder values and design those values into technologies during early stage research and development (R&D). To accomplish this, the VSD framework mandates that designers consult the philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  5. Group privacy: a defence and an interpretation.Luciano Floridi - 2017 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group Privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  6. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. Imaginative Value Sensitive Design: How Moral Imagination Exceeds Moral Law Theories in Informing Responsible Innovation.Steven Umbrello - 2018 - Dissertation, University of Edinburgh
    Safe-by-Design (SBD) frameworks for the development of emerging technologies have become an ever more popular means by which scholars argue that transformative emerging technologies can safely incorporate human values. One such popular SBD methodology is called Value Sensitive Design (VSD). A central tenet of this design methodology is to investigate stakeholder values and design those values into technologies during early stage research and development (R&D). To accomplish this, the VSD framework mandates that designers consult the philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. How to design AI for social good: seven essential factors.Luciano Floridi, Josh Cowls, Thomas C. King & Mariarosaria Taddeo - 2020 - Science and Engineering Ethics 26 (3):1771–1796.
    The idea of artificial intelligence for social good is gaining traction within information societies in general and the AI community in particular. It has the potential to tackle social problems through the development of AI-based solutions. Yet, to date, there is only limited understanding of what makes AI socially good in theory, what counts as AI4SG in practice, and how to reproduce its initial successes in terms of policies. This article addresses this gap by identifying seven ethical factors that are (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  10. Quantum Technologies in Industry 4.0: Navigating the Ethical Frontier with Value-Sensitive Design.Steven Umbrello - 2024 - Procedia Computer Science 232:1654-1662.
    With the emergence of quantum technologies such as quantum computing, quantum communications, and quantum sensing, new potential has emerged for smart manufacturing and Industry 4.0. These technologies, however, present ethical concerns that must be addressed in order to ensure they are developed and used responsibly. This article outlines some of the ethical challenges that quantum technologies may raise for Industry 4.0 and presents the value sensitive design methodology as a strategy for ethics-by-design of quantum computing in Industry 4.0. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Regulation by design: features, practices, limitations, and governance implications.Kostina Prifti, Jessica Morley, Claudio Novelli & Luciano Floridi - manuscript
    Regulation by design (RBD) is a growing research field that explores, develops, and criticises the regulative function of design. In this article, we provide a qualitative thematic synthesis of the existing literature. The aim is to explore and analyse RBD's core features, practices, limitations, and related governance implications. To fulfil this aim, we examine the extant literature on RBD in the context of digital technologies. We start by identifying and structuring the core features of RBD, namely the goals, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Online information of vaccines: information quality, not only privacy, is an ethical responsibility of search engines.Pietro Ghezzi, Peter Bannister, Gonzalo Casino, Alessia Catalani, Michel Goldman, Jessica Morley, Marie Neunez, Andreu Prados-Bo, Pierre Robert Smeeters, Mariarosaria Taddeo, Tania Vanzolini & Luciano Floridi - 2021 - Frontiers in Medicine 7.
    The fact that Internet companies may record our personal data and track our online behavior for commercial or political purpose has emphasized aspects related to online privacy. This has also led to the development of search engines that promise no tracking and privacy. Search engines also have a major role in spreading low-quality health information such as that of anti-vaccine websites. This study investigates the relationship between search engines’ approach to privacy and the scientific quality of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
    Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. A principlist-based study of the ethical design and acceptability of artificial social agents.Paul Formosa - 2023 - International Journal of Human-Computer Studies 172.
    Artificial Social Agents (ASAs), which are AI software driven entities programmed with rules and preferences to act autonomously and socially with humans, are increasingly playing roles in society. As their sophistication grows, humans will share greater amounts of personal information, thoughts, and feelings with ASAs, which has significant ethical implications. We conducted a study to investigate what ethical principles are of relative importance when people engage with ASAs and whether there is a relationship between people’s values and the ethical principles (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Sex by design: a new account of the animal sexes.Maximiliana Jewett Rifkin & Justin Garson - 2023 - Biology and Philosophy 38 (2):1-17.
    What is it for an animal to be female, or male? An emerging consensus among philosophers of biology is that sex is grounded in some manner or another on anisogamy, that is, the ability to produce either large gametes (egg) or small gametes (sperm), though the exact nature of this grounding remains contentious. Here we argue for a new conception of this relation. In our view, one’s sex doesn’t depend on the kind of gamete one is capable of making, but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Effects and Effectiveness of Surveillance Technologies: Mapping Perceptions, Reducing Harm.Elisa Orrù - 2015 - European University Institute Department of Law Research Papers 39:1-52.
    This paper addresses issues regarding perceptions of surveillance technologies in Europe. It analyses existing studies in order to explore how perceptions of surveillance affect and are affected by the negative effects of surveillance and how perceptions and effectiveness of surveillance technologies relate to each other. The paper identifies 12 negative effects of surveillance including, among others, privacy intrusion, the chilling effect and social exclusion, and classifies them into three groups. It further illustrates the different ways in which perceptions and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. State of the Art on Ethical, Legal, and Social Issues Linked to Audio- and Video-Based AAL Solutions.Alin Ake-Kob, Aurelija Blazeviciene, Liane Colonna, Anto Cartolovni, Carina Dantas, Anton Fedosov, Francisco Florez-Revuelta, Eduard Fosch-Villaronga, Zhicheng He, Andrzej Klimczuk, Maksymilian Kuźmicz, Adrienn Lukacs, Christoph Lutz, Renata Mekovec, Cristina Miguel, Emilio Mordini, Zada Pajalic, Barbara Krystyna Pierscionek, Maria Jose Santofimia Romero, Albert AliSalah, Andrzej Sobecki, Agusti Solanas & Aurelia Tamo-Larrieux - 2021 - Alicante: University of Alicante.
    Ambient assisted living technologies are increasingly presented and sold as essential smart additions to daily life and home environments that will radically transform the healthcare and wellness markets of the future. An ethical approach and a thorough understanding of all ethics in surveillance/monitoring architectures are therefore pressing. AAL poses many ethical challenges raising questions that will affect immediate acceptance and long-term usage. Furthermore, ethical issues emerge from social inequalities and their potential exacerbation by AAL, accentuating the existing access gap between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  87
    Space by Design: Aesthetic and Moral Issues in Planning Space Communities.Arnold Berleant & Sarah B. Fowler - 1988 - The Monist 71 (1):72-87.
    We live in an age in which outer space has changed from a theme for flights of science fiction to the actual locus of exploration and travel.1 Space no longer has merely speculative significance for thinking about possible worlds; it has become a real factor in understanding the nature and conditions of the human world that we are constantly refashioning. Our entry into outer space brings with it changes in conditions and experience that require us to rethink the concepts through (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Safe-(for whom?)-by-Design: Adopting a Posthumanist Ethics for Technology Design.Steven Umbrello - 2018 - Dissertation, York University
    This research project aims to accomplish two primary objectives: (1) propose an argument that a posthuman ethics in the design of technologies is sound and thus warranted and, (2) how can existent SBD approaches begin to envision principled and methodological ways of incorporating nonhuman values into design. In order to do this this MRP will provide a rudimentary outline of what constitutes SBD approaches. A particular design approach - Value Sensitive Design (VSD) - is taken up (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20. Babies By Design.Edgar Dahl - 2004 - Reproductive Biomedicine Online 9 (6):597-598.
    Download  
     
    Export citation  
     
    Bookmark  
  21. Maximizing team synergy in AI-related interdisciplinary groups: an interdisciplinary-by-design iterative methodology.Piercosma Bisconti, Davide Orsitto, Federica Fedorczyk, Fabio Brau, Marianna Capasso, Lorenzo De Marinis, Hüseyin Eken, Federica Merenda, Mirko Forti, Marco Pacini & Claudia Schettini - 2022 - AI and Society 1 (1):1-10.
    In this paper, we propose a methodology to maximize the benefits of interdisciplinary cooperation in AI research groups. Firstly, we build the case for the importance of interdisciplinarity in research groups as the best means to tackle the social implications brought about by AI systems, against the backdrop of the EU Commission proposal for an Artificial Intelligence Act. As we are an interdisciplinary group, we address the multi-faceted implications of the mass-scale diffusion of AI-driven technologies. The result of our exercise (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  84
    Design for Embedding the Value of Privacy in Personal Information Management Systems.Haleh Asgarinia - 2024 - Journal of Ethics and Emerging Technologies 33 (1):1-19.
    Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around the design of privacy-friendly systems that comply with legal requirements, there has been relatively limited philosophical discourse on incorporating the value of privacy into these systems. Exploring the connection between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. State of the Art of Audio- and Video-Based Solutions for AAL.Slavisa Aleksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Cartolovni, Pau Climent-Perez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazim Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta, Danila Germanese, Nicole Grech, Steinunn Gróa Sigurđardóttir, Murat Emirzeoglu, Ivo Iliev, Mladjan Jovanovic, Martin Kampel, William Kearns, Andrzej Klimczuk, Lambros Lambrinos, Jennifer Lumetzberger, Wiktor Mucha, Sophie Noiret, Zada Pajalic, Rodrigo Rodriguez Perez, Galidiya Petrova, Sintija Petrovica, Peter Pocta, Angelica Poli, Mara Pudane, Susanna Spinsante, Albert Ali Salah, Maria Jose Santofimia, Anna Sigríđur Islind, Lacramioara Stoicu-Tivadar, Hilda Tellioglu & Andrej Zgank - 2022 - Alicante: University of Alicante.
    It is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Arguments for and against Germline Intervention: A Critical Review of Ronald Green’s Babies by Design.Marvin J. H. Lee & Sophia Lozowski - 2017 - Journal of Healthcare Ethics and Administration 3 (1).
    It seems certain that one day we will allow the genetic technology which will enhance our offspring. A highly effective new tool, called CRISPR, which allows for carving out genes, is already being used to edit the genomes of animals. In July 2017, the FDA legalized that germline drugs for therapeutic purposes could be sold in the market. It is a high time, now, that we need engage in discussions about the ethics of germline intervention. To contribute to the discussion (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Without a Trace: Why did Corona Apps Fail?Lucie White & Philippe van Basshuysen - 2021 - Journal of Medical Ethics 47 (12):1-4.
    At the beginning of the COVID-19 pandemic, high hopes were put on digital contact tracing, using mobile phone apps to record and immediately notify contacts when a user reports as infected. Such apps can now be downloaded in many countries, but as second waves of COVID-19 are raging, these apps are playing a less important role than anticipated. We argue that this is because most countries have opted for app configurations that cannot provide a means of rapidly informing users of (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  26. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Iudicium ex Machinae – The Ethical Challenges of Automated Decision-Making in Criminal Sentencing.Frej Thomsen - 2022 - In Julian Roberts & Jesper Ryberg (eds.), Principled Sentencing and Artificial Intelligence. Oxford University Press.
    Automated decision making for sentencing is the use of a software algorithm to analyse a convicted offender’s case and deliver a sentence. This chapter reviews the moral arguments for and against employing automated decision making for sentencing and finds that its use is in principle morally permissible. Specifically, it argues that well-designed automated decision making for sentencing will better approximate the just sentence than human sentencers. Moreover, it dismisses common concerns about transparency, privacy and bias as unpersuasive or inapplicable. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Beneficial Artificial Intelligence Coordination by means of a Value Sensitive Design Approach.Steven Umbrello - 2019 - Big Data and Cognitive Computing 3 (1):5.
    This paper argues that the Value Sensitive Design (VSD) methodology provides a principled approach to embedding common values in to AI systems both early and throughout the design process. To do so, it draws on an important case study: the evidence and final report of the UK Select Committee on Artificial Intelligence. This empirical investigation shows that the different and often disparate stakeholder groups that are implicated in AI design and use share some common values that can (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  29. PHIL*4230 Photocopy Packet Privacy (edited by V. I. Burke).Victoria I. Burke - 2014 - Guelph, Canada: University of Guelph.
    This out-of-print collection in the area of the history, politics, ethics, and theory of privacy includes selections from Peter Gay, Alan Westin, Walter Benjamin, Catharine MacKinnon, Seyla Benhabib, Anita Allen, Ann Jennings, Charles Taylor, Richard Sennett, Mark Wicclair, Martha Nussbaum, and Robert Nozick.
    Download  
     
    Export citation  
     
    Bookmark  
  30. Privacy Rights, and Why Negative Control is Not a Dead End: A Reply to Munch and Lundgren.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2021 - Res Publica 28 (2):391-400.
    Lauritz Munch and Björn Lundgren have recently replied to a paper published by us in this journal. In our original paper, we defended a novel version of the so-called ‘control theory’ of the moral right to privacy. We argued that control theorists should define ‘control’ as what we coined ‘Negative Control’. Munch and Lundgren have recently provided a range of interesting and challenging objections to our view. Independently of each other, they give almost identical counterexamples to our definition of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. Anita L. Allen, Why Privacy Isn't Everything: Feminist Reflections on Personal Accountability Reviewed by.Annabelle Lever - 2004 - Philosophy in Review 24 (1):1-3.
    Download  
     
    Export citation  
     
    Bookmark  
  32. Beate Rossler, ed., Privacies: Philosophical Evaluations Reviewed by.Annabelle Lever - 2005 - Philosophy in Review 25 (1):67-69.
    Download  
     
    Export citation  
     
    Bookmark  
  33. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  34. Privacy, Autonomy, and Personalised Targeting: rethinking how personal data is used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  35. Brain Privacy and the Case of Cannibal Cop.Mark Tunick - 2017 - Res Publica 23 (2):179-196.
    In light of technology that may reveal the content of a person’s innermost thoughts, I address the question of whether there is a right to ‘brain privacy’—a right not to have one’s inner thoughts revealed to others–even if exposing these thoughts might be beneficial to society. I draw on a conception of privacy as the ability to control who has access to information about oneself and to an account that connects one’s interest in privacy to one’s interests (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  36. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  37. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  38. Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove. [REVIEW]Alan Rubel - 2009 - Review of Policy Research 26:633-634.
    Review of Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove.
    Download  
     
    Export citation  
     
    Bookmark  
  39. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2014 - In Beaete Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Inner privacy of conscious experiences and quantum information.Danko D. Georgiev - 2020 - Biosystems 187:104051.
    The human mind is constituted by inner, subjective, private, first-person conscious experiences that cannot be measured with physical devices or observed from an external, objective, public, third-person perspective. The qualitative, phenomenal nature of conscious experiences also cannot be communicated to others in the form of a message composed of classical bits of information. Because in a classical world everything physical is observable and communicable, it is a daunting task to explain how an empirically unobservable, incommunicable consciousness could have any physical (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. privacy, democracy and freedom of expression.Annabelle Lever - 2015 - In Beate Rossler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. cambridge University Press.
    this paper argues that people are entitled to keep some true facts about themselves to themselves, should they so wish, as a sign of respect for their moral and political status, and in order to protect themselves from being used as a public example in order to educate or to entertain other people. The “outing” - or non-consensual public disclosure - of people’s health records or status, or their sexual behaviour or orientation is usually unjustified, even when its consequences seem (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  42. Tolerant paternalism: pro-ethical design as a resolution of the dilemma of toleration.Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1669-1688.
    Toleration is one of the fundamental principles that inform the design of a democratic and liberal society. Unfortunately, its adoption seems inconsistent with the adoption of paternalistically benevolent policies, which represent a valuable mechanism to improve individuals’ well-being. In this paper, I refer to this tension as the dilemma of toleration. The dilemma is not new. It arises when an agent A would like to be tolerant and respectful towards another agent B’s choices but, at the same time, A (...)
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  43. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  44. Parents, Privacy, and Facebook: Legal and Social Responses to the Problem of Over-Sharing.Renée Nicole Souris - 2018 - In Ann Cudd & Mark Christopher Navin (eds.), Core Concepts and Contemporary Issues in Privacy. Springer. pp. 175-188.
    This paper examines whether American parents legally violate their children’s privacy rights when they share embarrassing images of their children on social media without their children’s consent. My inquiry is motivated by recent reports that French authorities have warned French parents that they could face fines and imprisonment for such conduct, if their children sue them once their children turn 18. Where French privacy law is grounded in respect for dignity, thereby explaining the French concerns for parental “over-sharing,” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  46. Privacy.Edmund Byrne - 1998 - In Encyclopedia of Applied Ethics. San Diego: Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. The Epistemic Account of Privacy.Martijn Blaauw - 2013 - Episteme 10 (2):167-177.
    Privacy is valued by many. But what it means to have privacy remains less than clear. In this paper, I argue that the notion of privacy should be understood in epistemic terms. What it means to have (some degree of) privacy is that other persons do not stand in significant epistemic relations to those truths one wishes to keep private.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  48. Must privacy and sexual equality conflict? A philosophical examination of some legal evidence.Annabelle Lever - 2001 - Social Research: An International Quarterly 67 (4):1137-1171.
    Are rights to privacy consistent with sexual equality? In a brief, but influential, article Catherine MacKinnon trenchantly laid out feminist criticisms of the right to privacy. In “Privacy v. Equality: Beyond Roe v. Wade” she linked familiar objections to the right to privacy and connected them to the fate of abortion rights in the U.S.A. (MacKinnon, 1983, 93-102). For many feminists, the Supreme Court’s decision in Roe v. Wade (1973) had suggested that, notwithstanding a dubious past, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  49. Privacy, autonomy and direct-to-consumer genetic testing: a response to Vayena.Kyle van Oosterum - 2022 - Journal of Medical Ethics 48 (10):774-775.
    In Vayena’s article, ‘direct-to-consumer (DTC) genomics on the scales of autonomy’, she claims that there may be a strong autonomy-based argument for permitting DTC genomic services. In this response, I point out how the diminishment of one’s genetic privacy can cause a relevant autonomy-related harm which must be balanced against the autonomy-related gains DTC services provide. By drawing on conceptual connections between privacy and the Razian conception of autonomy, I show that DTC genetic testing may decrease the range (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards ( Anderson (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000