Results for 'Technologies vis-a-vis privacy'

994 found
Order:
  1. Technology and Privacy.Edmund Byrne - 1991 - In Byrne Edmund, The Technology of Discovery and the Discovery of Technology. Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Transforming Human Resource Management: The Impact of Artificial Intelligence on Recruitment and Beyond.Hazem A. S. Alrakhawi, Randa Elqassas, Mohammed M. Elsobeihi, Basel Habil, Basem S. Abunasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (8):1-5.
    Abstract: The integration of Artificial Intelligence (AI) into Human Resource Management (HRM) is fundamentally transforming how organizations approach recruitment, performance management, and employee engagement. This paper explores the multifaceted impact of AI on HR practices, highlighting its role in enhancing efficiency, reducing bias, and driving strategic decision-making. Through an in-depth analysis of AI-driven recruitment tools, performance management systems, and personalized employee engagement strategies, this study examines both the opportunities and challenges associated with AI in HRM. Ethical considerations, including data (...), algorithmic bias, and the potential displacement of human jobs, are critically discussed to provide a balanced perspective on the adoption of AI technologies in the HR domain. By presenting case studies of organizations successfully leveraging AI, this paper offers insights into the future trajectory of HRM in an increasingly AI-driven world. Ultimately, the findings underscore the need for HR professionals to adapt and innovate in response to the growing influence of AI, ensuring a harmonious balance between technological advancement and the human element in the workplace. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  3. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  4. Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
    Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. ‘We may still not be ready for newer healthcare technologies’: An ethical perspective of privacy concerns.David Appiah & Duut Jamal-Deen Majeed - manuscript
    As healthcare technologies rapidly progress, a paramount concern arises: are individuals adequately prepared for the current challenges accompanying these advancements? Despite regulatory measures in place, the persistent issue of privacy demands heightened attention and prioritization. This essay aims to consistently underscore the significance of privacy in the evolving landscape of healthcare technologies, fostering a future where the advantages of these innovations are managed with responsibility. We present an ethical analysis addressing privacy apprehensions in emerging healthcare (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Brain Privacy and the Case of Cannibal Cop.Mark Tunick - 2017 - Res Publica 23 (2):179-196.
    In light of technology that may reveal the content of a person’s innermost thoughts, I address the question of whether there is a right to ‘brain privacy’—a right not to have one’s inner thoughts revealed to others–even if exposing these thoughts might be beneficial to society. I draw on a conception of privacy as the ability to control who has access to information about oneself and to an account that connects one’s interest in privacy to one’s interests (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  8. Towards a Unified List of Ethical Principles for Emerging Technologies. An Analysis of Four European Reports on Molecular Biotechnology and Artificial Intelligence,.Elisa Orrù & Joachim Boldt - 2022 - Sustainable Futures 4:1-14.
    Artificial intelligence (AI) and molecular biotechnologies (MB) are among the most promising, but also ethically hotly debated emerging technologies. In both fields, several ethics reports, which invoke lists of ethics principles, have been put forward. These reports and the principles lists are technology specific. This article aims to contribute to the ongoing debate on ethics of emerging technologies by comparatively analysing four European ethics reports from the two technology fields. Adopting a qualitative and in-depth approach, the article highlights (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Artificial Intelligence in Agriculture: Enhancing Productivity and Sustainability.Mohammed A. Hamed, Mohammed F. El-Habib, Raed Z. Sababa, Mones M. Al-Hanjor, Basem S. Abunasser & Samy S. Abu-Naser - 2024 - International Journal of Engineering and Information Systems (IJEAIS) 8 (8):1-8.
    Abstract: Artificial Intelligence (AI) is revolutionizing the agricultural sector by enhancing productivity and sustainability. This paper explores the transformative impact of AI technologies on agriculture, focusing on their applications in precision farming, predictive analytics, and automation. AI-driven tools enable more efficient management of crops and resources, leading to improved yields and reduced environmental impact. The paper examines key AI technologies, including machine learning algorithms for crop monitoring, robotics for automated planting and harvesting, and data analytics for optimizing resource (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  10. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce, (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. A Framework for Analyzing and Comparing Privacy States.Alan Rubel & Ryan Biava - 2014 - JASIST: The Journal of the American Society for Information Science and Technology 65 (12):2422-2431.
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. On human dignity as a foundation for the right to privacy.Luciano Floridi - 2016 - Philosophy and Technology 29 (4):307-312.
    In 2016, the European Parliament approved the General Data Protection Regulation (GDPR) whose core aim is the safeguarding of information privacy, and, by corollary, human dignity. Drawing on the field of philosophical anthropology, this paper analyses various interpretations of human dignity and human exceptionalism. It concludes that privacy is essential for humans to flourish and enable individuals to build a sense of self and the world.
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  13. The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   60 citations  
  14. Is Mental Privacy a Component of Personal Identity?Abel Wajnerman Paz - 2021 - Frontiers in Human Neuroscience 15:773441.
    One of the most prominent ethical concerns regarding emerging neurotechnologies is mental privacy. This is the idea that we should have control over access to our neural data and to the information about our mental processes and states that can be obtained by analyzing it. A key issue is whether this information needs more stringent protection than other kinds of personal information. I will articulate and support the view, underlying recent regulatory frameworks, that mental privacy requires a special (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  15.  41
    Saferoads: Road Safety Violation Reporting System.A. Sana - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (9):1-13.
    The Road Safety Violation Reporting System is an innovative approach to improve road safety by enabling community members to report traffic rule violations. India faces over 150,000 traffic fatalities each year due to non-compliance with laws like wearing seat belts, helmets, and avoiding mobile phone use while driving. Our platform allows citizens to report violations using photographic evidence, which includes location and timestamp data. The system automates fine generation while maintaining the anonymity of the reporters, encouraging public participation in traffic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz, Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  17. Real Virtuality: A Code of Ethical Conduct. Recommendations for Good Scientific Practice and the Consumers of VR-Technology.Michael Madary & Thomas Metzinger - 2016 - Frontiers in Robotics and AI 3:1-23.
    The goal of this article is to present a first list of ethical concerns that may arise from research and personal use of virtual reality (VR) and related technology, and to offer concrete recommendations for minimizing those risks. Many of the recommendations call for focused research initiatives. In the first part of the article, we discuss the relevant evidence from psychology that motivates our concerns. In Section “Plasticity in the Human Mind,” we cover some of the main results suggesting that (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  18. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  19. Privacy in Public Places: Do GPS and Video Surveillance Provide Plain Views?Mark Tunick - 2009 - Social Theory and Practice 35 (4):597-622.
    New technologies of surveillance such as Global Positioning Systems (GPS) are increasingly used as convenient substitutes for conventional means of observation. Recent court decisions hold that the government may, without a warrant, use a GPS to track a vehicle’s movements in public places without violating the 4th Amendment, as the vehicle is in plain view and no reasonable expectation of privacy is violated. This emerging consensus of opinions fails to distinguish the unreasonable expectation that we not be seen (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. AI and Ethics in Surveillance: Balancing Security and Privacy in a Digital World.Msbah J. Mosa, Alaa M. Barhoom, Mohammed I. Alhabbash, Fadi E. S. Harara, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (10):8-15.
    Abstract: In an era of rapid technological advancements, artificial intelligence (AI) has transformed surveillance systems, enhancing security capabilities across the globe. However, the deployment of AI-driven surveillance raises significant ethical concerns, particularly in balancing the need for security with the protection of individual privacy. This paper explores the ethical challenges posed by AI surveillance, focusing on issues such as data privacy, consent, algorithmic bias, and the potential for mass surveillance. Through a critical analysis of the tension between security (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  21. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Between Thanatos and Eros: Erich Fromm and the psychoanalysis of social networking technology use.Jean du Toit - 2019 - South African Journal of Philosophy 38 (2):136-148.
    Social networking technologies have become a ubiquitous framework for social interaction, serving to organise much of the individual’s social life. Such technological structuring affects not merely the individual’s psyche (as a psychotechnics), it also affects broader aspects of society (as a socio-technics). While social networking technologies may serve to transform society in positive ways, such technologies also have the potential to significantly encroach upon and (re) construct individual and cultural meaning in ways that must be investigated. Erich (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  24. Privacy as an Asset.Jarek Gryz - 2017 - In Mindel Marcellus, Lyons Kelly & Wigglesworth Joe, Proceedings of the 27th CASCON Conference. IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of (...)
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  26. Privacy.Edmund Byrne - 1997 - In Byrne Edmund, Encyclopedia of Applied Ethics. Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Engaging Engineering Teams Through Moral Imagination: A Bottom-Up Approach for Responsible Innovation and Ethical Culture Change in Technology Companies.Benjamin Lange, Geoff Keeling, Amanda McCroskery, Ben Zevenbergen, Sandra Blascovich, Kyle Pedersen, Alison Lentz & Blaise Aguera Y. Arcas - 2023 - AI and Ethics 1:1-16.
    We propose a ‘Moral Imagination’ methodology to facilitate a culture of responsible innovation for engineering and product teams in technology companies. Our approach has been operationalized over the past two years at Google, where we have conducted over 50 workshops with teams from across the organization. We argue that our approach is a crucial complement to existing formal and informal initiatives for fostering a culture of ethical awareness, deliberation, and decision-making in technology design such as company principles, ethics and (...) review procedures, and compliance controls. We characterize some distinctive benefits of our methodology for the technology sector in particular. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Ethics for Records and Information Management.Norman A. Mooradian - 2018 - Chicago, IL, USA: American Library Association.
    The scope and reach of information, driven by the explosive growth of information technologies and content types, has expanded dramatically over the past 30 years. The consequences of these changes to records and information management (RIM) professionals are profound, necessitating not only specialized knowledge but added responsibilities. RIM professionals require a professional ethics to guide them in their daily practice and to form a basis for developing and implementing organizational policies, and Mooradian’s new book provides a rigorous outline of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Ethical Concerns in Computational Linguistic Field National Defense: A Philosophical Investigation of Language and Security.Mhd Halkis Malkis4 - 2024 - Linguistic and Philosophical Investigations 23 (1):386–396.
    This research examines ethical issues in computational linguistics that can be applied to national defense by analyzing philosophical and security language. The increasing use of language contexts, such as intelligence and communication data analysis, raises ethical and philosophical challenges related to privacy, control, and accuracy. This research aims to identify and analyze ethical issues, especially in the use of computational linguistics in defense applications, as well as their implications for the protection of individual rights and privacy. This method (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  31. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore, Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Navigating the Ethical Landscape of Artificial Intelligence: Challenges and Solutions.Alaa N. Akkila, Mohammed A. Alkahlout, Suheir H. ALmurshid, Alaa Soliman Abu Mettleq, Basem S. Abunasser & Samy S. Abu-Naser - 2024 - International Journal of Engineering and Information Systems (IJEAIS) 8 (8):68-73.
    Abstract: As artificial intelligence (AI) technologies become increasingly integrated into various sectors, ethical considerations surrounding their development and deployment have become paramount. This paper explores the multifaceted ethical landscape of AI, focusing on key challenges such as bias, transparency, privacy, and accountability. It examines how these issues manifest in AI systems and their impact on society. The paper also evaluates current approaches and solutions aimed at mitigating these ethical concerns, including regulatory frameworks, ethical guidelines, and best practices for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. AI in Mental Health: Innovations, Applications, and Ethical Considerations.Hosni Qasim El-Mashharawi, Izzeddin A. Alshawwa, Fatima M. Salman, Mohammed Naji Al-Qumboz, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 7 (10):53-58.
    Abstract: The integration of artificial intelligence (AI) into mental health care has the potential to revolutionize the field by enhancing diagnostic accuracy, personalizing treatment, and improving access to care. This paper explores the advancements in AI technologies applied to mental health, including machine learning algorithms for diagnosis, natural language processing for therapeutic applications, and predictive analytics for personalized care. It also examines the ethical and practical challenges associated with these technologies, such as privacy concerns, algorithmic bias, and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Wearable Technologies for Healthy Ageing: Prospects, Challenges, and Ethical Considerations.Stefano Canali, Agara Ferretti, Viola Schiaffonati & Alessandro Blasimme - 2024 - Journal of Frailty and Aging 2024:1-8.
    Digital technologies hold promise to modernize healthcare. Such opportunity should be leveraged also to address the needs of rapidly ageing populations. Against this backdrop, this paper examines the use of wearable devices for promoting healthy ageing. Previous work has assessed the prospects of digital technologies for health promotion and disease prevention in older adults. However, to our knowledge, ours is one of the first attempts to specifically address the use of wearables for healthy ageing, and to offer ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Mapping ethical issues in the use of smart home health technologies to care for older persons: a systematic review.Nadine Andrea Felber, Yi Jiao Tian, Félix Pageau, Bernice Simone Elger & Tenzin Wangmo - 2023 - BMC Medical Ethics 24 (1):1-13.
    Background The worldwide increase in older persons demands technological solutions to combat the shortage of caregiving and to enable aging in place. Smart home health technologies (SHHTs) are promoted and implemented as a possible solution from an economic and practical perspective. However, ethical considerations are equally important and need to be investigated. Methods We conducted a systematic review according to the PRISMA guidelines to investigate if and how ethical questions are discussed in the field of SHHTs in caregiving for (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  37. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Privacy Implications of AI-Enabled Predictive Analytics in Clinical Diagnostics, and How to Mitigate Them.Dessislava Fessenko - forthcoming - Bioethica Forum.
    AI-enabled predictive analytics is widely deployed in clinical care settings for healthcare monitoring, diagnostics and risk management. The technology may offer valuable insights into individual and population health patterns, trends and outcomes. Predictive analytics may, however, also tangibly affect individual patient privacy and the right thereto. On the one hand, predictive analytics may undermine a patient’s state of privacy by constructing or modifying their health identity independent of the patient themselves. On the other hand, the use of predictive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Machine Learning-Enhanced Secure Cloud Storage with Attribute-Based Data Access.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):418-429.
    Cloud computing has transformed data management and storage by providing unmatched scalability, flexibility, and cost-effectiveness. However, rising cloud storage use has raised data security and privacy issues. As sensitive data being outsourced to third-party cloud providers, security is crucial. Traditional encryption methods secure data but make data recovery difficult. Specifically, efficiently searching encrypted data without compromising security is difficult.
    Download  
     
    Export citation  
     
    Bookmark  
  40. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  41.  23
    Digital Privacy in P&C Claims Processing: Balancing Innovation with Regulatory Requirements.Ravi Teja Madhala Sateesh Reddy Adavelli - 2021 - International Journal of Science and Research 10 (3):2042-2053.
    This paper examines the challenges and lessons learned for Property and Casualty (P&C) insurers as they look to balance technological innovation against regulatory compliance, specifically regarding privacy laws. These technologies have been adopted rapidly, from Artificial Intelligence (AI), blockchain, and the Internet of Things (IoT), to transform how claims are processed, resulting in efficiencies, improved fraud detection and increased customer-centeredness. While these advancements have brought much to the table, they hold great fear regarding the data privacy, security, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. What to Do When Privacy Is Gone.James Brusseau - 2019 - In D. E. Wittkower, Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Old Dominion. pp. 1 - 8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  44. What to Do When Privacy Is Gone.James Brusseau - 2019 - In D. E. Wittkower, Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Old Dominion. pp. 2-8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Design for Embedding the Value of Privacy in Personal Information Management Systems.Haleh Asgarinia - 2024 - Journal of Ethics and Emerging Technologies 33 (1):1-19.
    Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around the design of privacy-friendly systems that comply with legal requirements, there has been relatively limited philosophical discourse on incorporating the value of privacy into these systems. Exploring the connection between (...) and personal autonomy illuminates the instrumental value of privacy and highlights the importance of intentionally embedding the value of privacy into these systems. To translate the value of privacy into concrete design requirements, this study constructs a values hierarchy consisting of values, norms, and design requirements. After analyzing the relationships between privacy and autonomy and identifying norms, the design requirements translated from the norms associated with the components of personal autonomy are specified at the lowest layer. These requirements include a design to prevent unauthorized access and dark patterns and to provide effective and efficient notices and choices. The findings contribute to expanding the requirements for designing the aspect of privacy as a legal requirement to incorporate the value of privacy into systems. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Privacy, Liberty, Property, and the Genetic Modification of Humans.Adam D. Moore - 2005 - Journal of Philosophical Research 30 (9999):81-94.
    Can one’s genetic profile be owned? How about techniques to improve genetic profi les? A brave new world of genetic enhancement is upon us and we’d better be ready to answer such questions. Adam Moore is ready. He thinks the answers to these questions are resoundingly “yes.” He defends this on the ground of individual liberty in the face of potential government control of such technology. He argues that genetic property is to be assimilated to rights of privacy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. The ethics of the extended mind: Mental privacy, manipulation and agency.Robert William Clowes, Paul R. Smart & Richard Heersmink - 2024 - In Jan-Hendrik Heinrichs, Birgit Beck & Orsolya Friedrich, Neuro-ProsthEthics: Ethical Implications of Applied Situated Cognition. Berlin, Germany: J. B. Metzler. pp. 13–35.
    According to proponents of the extended mind, bio-external resources, such as a notebook or a smartphone, are candidate parts of the cognitive and mental machinery that realises cognitive states and processes. The present chapter discusses three areas of ethical concern associated with the extended mind, namely mental privacy, mental manipulation, and agency. We also examine the ethics of the extended mind from the standpoint of three general normative frameworks, namely, consequentialism, deontology, and virtue ethics.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Parents, Privacy, and Facebook: Legal and Social Responses to the Problem of Over-Sharing.Renée Nicole Souris - 2018 - In Mark Navin & Ann Cudd, Core Concepts and Contemporary Issues in Privacy. Cham: Springer Verlag. pp. 175-188.
    This paper examines whether American parents legally violate their children’s privacy rights when they share embarrassing images of their children on social media without their children’s consent. My inquiry is motivated by recent reports that French authorities have warned French parents that they could face fines and imprisonment for such conduct, if their children sue them once their children turn 18. Where French privacy law is grounded in respect for dignity, thereby explaining the French concerns for parental “over-sharing,” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Inhuman and the Automaton: Exploitation and the Exploited in the Era of Late Capitalism.Katerina Kolozova - 2017 - In Rocco Gangle & Julius Greve, Superpositions: Laruelle and the Humanities. New York: Rowman & Littlefield International.
    (A chapter in a book edited by Rocco Gangle and Julius Greve, titled Superpositions: Laruelle and the Humanities) The human-in-human is nonhuman or “inhuman” (Haraway), monstrous along with the animal, the machine and the darkness of the out-there insofar as it remains a radical hybridity or one that is philosophically unmediated. The real precedes signification and occupies the position of mere materiality (either physicality or machinic materiality) unilaterally situated vis-à-vis a signifying agency. This dual unilaterality is placed within a dyadic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Privacy, Autonomy, and the Dissolution of Markets.Kiel Brennan-Marquez & Daniel Susser - 2022 - Knight First Amendment Institute.
    Throughout the 20th century, market capitalism was defended on parallel grounds. First, it promotes freedom by enabling individuals to exploit their own property and labor-power; second, it facilitates an efficient allocation and use of resources. Recently, however, both defenses have begun to unravel—as capitalism has moved into its “platform” phase. Today, the pursuit of allocative efficiency, bolstered by pervasive data surveillance, often undermines individual freedom rather than promoting it. And more fundamentally, the very idea that markets are necessary to achieve (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 994