Results for 'data privacy'

988 found
Order:
  1. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  2. Why Data Privacy is Key To a Smart Energy Future.Carissa Véliz & Philipp Grunewald - 2018 - Nature Energy 3:702-704.
    The ability to collect fine-grained energy data from smart meters has benefits for utilities and consumers. However, a proactive approach to data privacy is necessary to maximize the potential of these data to support low-carbon energy systems, and innovative business models.
    Download  
     
    Export citation  
     
    Bookmark  
  3. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  5. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  6. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Open data, data protection, and group privacy.Luciano Floridi - 2014 - Philosophy and Technology 27 (1):1–3.
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  8. Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In Philosophical Foundations of Medical Law. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Scrutinizing Privacy in Multi-Omics Research: How to Provide Ethical Grounding for the Identification of Privacy-Relevant Data Properties.C. W. Safarlou, A. L. Bredenoord, R. Vermeulen & K. R. Jongsma - 2021 - American Journal of Bioethics 21 (12):73-75.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  11.  69
    The commercialization of patient data in Canada: ethics, privacy and policy.Sheryl Spithoff, Jessica Stockdale, Robyn Rowe, Brenda McPhail & Nav Persaud - 2022 - Canadian Medical Association Journal 194 (3).
    KEY POINTS In Canada, commercial data brokers collect deidentified patient data from pharmacies, private drug insurers, the federal government and medical clinics without patient consent. Although pharmaceutical companies are the data brokers’ primary customers, academics and nonprofit and public entities also use commercial data sets, given the absence of a coordinated public approach to collecting these data across Canada. Risks of commercialized patient data include loss of anonymity, surveillance and marketing, discrimination and violation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Views on Privacy. A Survey.Siân Brooke & Carissa Véliz - 2020 - In Siân Brooke & Carissa Véliz (eds.), Data, Privacy, and the Individual.
    The purpose of this survey was to gather individual’s attitudes and feelings towards privacy and the selling of data. A total (N) of 1,107 people responded to the survey. -/- Across continents, age, gender, and levels of education, people overwhelmingly think privacy is important. An impressive 82% of respondents deem privacy extremely or very important, and only 1% deem privacy unimportant. Similarly, 88% of participants either agree or strongly agree with the statement that ‘violations to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. Not the doctor’s business: Privacy, personal responsibility and data rights in medical settings.Carissa Véliz - 2020 - Bioethics 34 (7):712-718.
    This paper argues that assessing personal responsibility in healthcare settings for the allocation of medical resources would be too privacy-invasive to be morally justifiable. In addition to being an inappropriate and moralizing intrusion into the private lives of patients, it would put patients’ sensitive data at risk, making data subjects vulnerable to a variety of privacy-related harms. Even though we allow privacy-invasive investigations to take place in legal trials, the justice and healthcare systems are not (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. What to Do When Privacy Is Gone.James Brusseau - 2019 - In D. E. Wittkower (ed.), Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Old Dominion. pp. 2-8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  18.  23
    Digital privacy and the law: the challenge of regulatory capture.Bartek Chomanski & Lode Lauwaert - 2024 - AI and Society.
    Digital privacy scholars tend to bemoan ordinary people’s limited knowledge of and lukewarm interest in what happens to their digital data. This general lack of interest and knowledge is often taken as a consideration in favor of legislation aiming to force internet companies into adopting more responsible data practices. While we remain silent on whether any new laws are called for, in this paper we wish to underline a neglected consequence of people’s ignorance of and apathy for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Group privacy: a defence and an interpretation.Luciano Floridi - 2016 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  20. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  21. Big Data Analytics in Healthcare: Exploring the Role of Machine Learning in Predicting Patient Outcomes and Improving Healthcare Delivery.Federico Del Giorgio Solfa & Fernando Rogelio Simonato - 2023 - International Journal of Computations Information and Manufacturing (Ijcim) 3 (1):1-9.
    Healthcare professionals decide wisely about personalized medicine, treatment plans, and resource allocation by utilizing big data analytics and machine learning. To guarantee that algorithmic recommendations are impartial and fair, however, ethical issues relating to prejudice and data privacy must be taken into account. Big data analytics and machine learning have a great potential to disrupt healthcare, and as these technologies continue to evolve, new opportunities to reform healthcare and enhance patient outcomes may arise. In order to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Data and the Good?Daniel Susser - 2022 - Surveillance and Society 20 (3):297-301.
    Surveillance studies scholars and privacy scholars have each developed sophisticated, important critiques of the existing data-driven order. But too few scholars in either tradition have put forward alternative substantive conceptions of a good digital society. This, I argue, is a crucial omission. Unless we construct new “sociotechnical imaginaries,” new understandings of the goals and aspirations digital technologies should aim to achieve, the most surveillance studies and privacy scholars can hope to accomplish is a less unjust version of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. What to Do When Privacy Is Gone.James Brusseau - 2019 - In D. E. Wittkower (ed.), Computer Ethics - Philosophical Enquiry (CEPE) Proceedings. Old Dominion. pp. 1 - 8.
    Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction; it considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  26. ICTs, data and vulnerable people: a guide for citizens.Alexandra Castańeda, Andreas Matheus, Andrzej Klimczuk, Anna BertiSuman, Annelies Duerinckx, Christoforos Pavlakis, Corelia Baibarac-Duignan, Elisabetta Broglio, Federico Caruso, Gefion Thuermer, Helen Feord, Janice Asine, Jaume Piera, Karen Soacha, Katerina Zourou, Katherin Wagenknecht, Katrin Vohland, Linda Freyburg, Marcel Leppée, Marta CamaraOliveira, Mieke Sterken & Tim Woods - 2021 - Bilbao: Upv-Ehu.
    ICTs, personal data, digital rights, the GDPR, data privacy, online security… these terms, and the concepts behind them, are increasingly common in our lives. Some of us may be familiar with them, but others are less aware of the growing role of ICTs and data in our lives - and the potential risks this creates. These risks are even more pronounced for vulnerable groups in society. People can be vulnerable in different, often overlapping, ways, which place (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Anti-doping, purported rights to privacy and WADA's whereabouts requirements: A legal analysis.Oskar MacGregor, Richard Griffith, Daniele Ruggiu & Mike McNamee - 2013 - Fair Play 1 (2):13-38.
    Recent discussions among lawyers, philosophers, policy researchers and athletes have focused on the potential threat to privacy posed by the World Anti-Doping Agency’s (WADA) whereabouts requirements. These requirements demand, among other things, that all elite athletes file their whereabouts information for the subsequent quarter on a quarterly basis and comprise data for one hour of each day when the athlete will be available and accessible for no advance notice testing at a specified location of their choosing. Failure to (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  28. On human dignity as a foundation for the right to privacy.Luciano Floridi - 2016 - Philosophy and Technology 29 (4):307-312.
    In 2016, the European Parliament approved the General Data Protection Regulation (GDPR) whose core aim is the safeguarding of information privacy, and, by corollary, human dignity. Drawing on the field of philosophical anthropology, this paper analyses various interpretations of human dignity and human exceptionalism. It concludes that privacy is essential for humans to flourish and enable individuals to build a sense of self and the world.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  29. Is Mental Privacy a Component of Personal Identity?Abel Wajnerman Paz - 2021 - Frontiers in Human Neuroscience 15:773441.
    One of the most prominent ethical concerns regarding emerging neurotechnologies is mental privacy. This is the idea that we should have control over access to our neural data and to the information about our mental processes and states that can be obtained by analyzing it. A key issue is whether this information needs more stringent protection than other kinds of personal information. I will articulate and support the view, underlying recent regulatory frameworks, that mental privacy requires a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  30. I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark  
  31. Introduction to Data Ethics.James Brusseau - 2018 - In Introduction to Data Ethics. Boston, USA: Boston Academic Publishing / Flatworld Knowledge. pp. 349-376.
    An Introduction to data ethics, focusing on questions of privacy and personal identity in the economic world as it is defined by big data technologies, artificial intelligence, and algorithmic capitalism. -/- Originally published in The Business Ethics Workshop, 3rd Edition, by Boston Acacdemic Publishing / FlatWorld Knowledge.
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  33. Four Facets of Privacy and Intellectual Freedom in Licensing Contracts for Electronic Journals.Alan Rubel & Mei Zhang - 2015 - College and Research Libraries 4 (76):427-449.
    This is a study of the treatment of library patron privacy in licenses for electronic journals in academic libraries. We begin by distinguishing four facets of privacy and intellectual freedom based on the LIS and philosophical literature. Next, we perform a content analysis of 42 license agreements for electronic journals, focusing on terms for enforcing authorized use and collection and sharing of user data. We compare our findings to model licenses, to recommendations proposed in a recent treatise (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Privacy, Autonomy, and the Dissolution of Markets.Kiel Brennan-Marquez & Daniel Susser - 2022 - Knight First Amendment Institute.
    Throughout the 20th century, market capitalism was defended on parallel grounds. First, it promotes freedom by enabling individuals to exploit their own property and labor-power; second, it facilitates an efficient allocation and use of resources. Recently, however, both defenses have begun to unravel—as capitalism has moved into its “platform” phase. Today, the pursuit of allocative efficiency, bolstered by pervasive data surveillance, often undermines individual freedom rather than promoting it. And more fundamentally, the very idea that markets are necessary to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. The Temptation of Data-enabled Surveillance: Are Universities the Next Cautionary Tale?Alan Rubel & Kyle M. L. Jones - 2020 - Communications of the Acm 4 (63):22-24.
    There is increasing concern about “surveillance capitalism,” whereby for-profit companies generate value from data, while individuals are unable to resist (Zuboff 2019). Non-profits using data-enabled surveillance receive less attention. Higher education institutions (HEIs) have embraced data analytics, but the wide latitude that private, profit-oriented enterprises have to collect data is inappropriate. HEIs have a fiduciary relationship to students, not a narrowly transactional one (see Jones et al, forthcoming). They are responsible for facets of student life beyond (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Technology and Privacy.Edmund Byrne - 1991 - In Byrne Edmund (ed.), The Technology of Discovery and the Discovery of Technology. Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Big Data Analytics in Project Management: A Key to Success.Tareq Obaid & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (7):1-8.
    This review delves into the influence of big data analytics on project management effectiveness and project success rates. By examining applications, accomplishments, hindrances, and emerging developments in the context of big data analytics and project management, this review provides insights into its transformative potential. Results indicate that big data analytics fosters improved project performance, more robust risk management, and heightened adaptability. However, challenges related to data quality, privacy, and project manager training remain to be addressed. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. From public data to private information: The case of the supermarket.Vincent C. Müller - 2009 - In Bottis Maria (ed.), Proceedings of the 8th International Conference Computer Ethics: Philosophical Enquiry. Nomiki Bibliothiki. pp. 500-507.
    The background to this paper is that in our world of massively increasing personal digital data any control over the data about me seems illusionary – informational privacy seems a lost cause. On the other hand, the production of this digital data seems a necessary component of our present life in the industrialized world. A framework for a resolution of this apparent dilemma is provided if by the distinction between (meaningless) data and (meaningful) information. I (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Big Data Ethics.Nicolae Sfetcu - manuscript
    Big Data ethics involves adherence to the concepts of right and wrong behavior regarding data, especially personal data. Big Data ethics focuses on structured or unstructured data collectors and disseminators. Big Data ethics is supported, at EU level, by extensive documentation, which seeks to find concrete solutions to maximize the value of Big Data without sacrificing fundamental human rights. The European Data Protection Supervisor (EDPS) supports the right to privacy and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2).
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access account (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  43. The ethical imperatives of the COVID 19 pandemic: a review from data ethics.Gabriela Arriagada Bruneau, Vincent C. Müller & Mark S. Gilthorpe - 2020 - Veritas: Revista de Filosofía y Teología 46:13-35.
    In this review, we present some ethical imperatives observed in this pandemic from a data ethics perspective. Our exposition connects recurrent ethical problems in the discipline, such as, privacy, surveillance, transparency, accountability, and trust, to broader societal concerns about equality, discrimination, and justice. We acknowledge data ethics role as significant to develop technological, inclusive, and pluralist societies. - - - Resumen: En esta revisión, exponemos algunos de los imperativos éticos observados desde la ética de datos en esta (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Big Data as Tracking Technology and Problems of the Group and its Members.Haleh Asgarinia - 2023 - In Kevin Macnish & Adam Henschke (eds.), The Ethics of Surveillance in Times of Emergency. Oxford University Press. pp. 60-75.
    Digital data help data scientists and epidemiologists track and predict outbreaks of disease. Mobile phone GPS data, social media data, or other forms of information updates such as the progress of epidemics are used by epidemiologists to recognize disease spread among specific groups of people. Targeting groups as potential carriers of a disease, rather than addressing individuals as patients, risks causing harm to groups. While there are rules and obligations at the level of the individual, we (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Online information of vaccines: information quality, not only privacy, is an ethical responsibility of search engines.Pietro Ghezzi, Peter Bannister, Gonzalo Casino, Alessia Catalani, Michel Goldman, Jessica Morley, Marie Neunez, Andreu Prados-Bo, Pierre Robert Smeeters, Mariarosaria Taddeo, Tania Vanzolini & Luciano Floridi - 2021 - Frontiers in Medicine 7.
    The fact that Internet companies may record our personal data and track our online behavior for commercial or political purpose has emphasized aspects related to online privacy. This has also led to the development of search engines that promise no tracking and privacy. Search engines also have a major role in spreading low-quality health information such as that of anti-vaccine websites. This study investigates the relationship between search engines’ approach to privacy and the scientific quality of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  68
    “Giving something back”: a systematic review and ethical enquiry into public views on the use of patient data for research in the United Kingdom and the Republic of Ireland.Jessica Stockdale, Jackie Cassell & Elizabeth Ford - 2019 - Wellcome Open Research 3 (6).
    Background: Use of patients’ medical data for secondary purposes such as health research, audit, and service planning is well established in the UK. However, the governance environment, as well as public understanding about this work, have lagged behind. We aimed to systematically review the literature on UK and Irish public views of patient data used in research, critically analysing such views though an established biomedical ethics framework, to draw out potential strategies for future good practice guidance and inform (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Adopting trust as an ex post approach to privacy.Haleh Asgarinia - 2024 - AI and Ethics 3 (4).
    This research explores how a person with whom information has been shared and, importantly, an artificial intelligence (AI) system used to deduce information from the shared data contribute to making the disclosure context private. The study posits that private contexts are constituted by the interactions of individuals in the social context of intersubjectivity based on trust. Hence, to make the context private, the person who is the trustee (i.e., with whom information has been shared) must fulfil trust norms. According (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Generative AI in EU Law: Liability, Privacy, Intellectual Property, and Cybersecurity.Claudio Novelli, Federico Casolari, Philipp Hacker, Giorgio Spedicato & Luciano Floridi - manuscript
    The advent of Generative AI, particularly through Large Language Models (LLMs) like ChatGPT and its successors, marks a paradigm shift in the AI landscape. Advanced LLMs exhibit multimodality, handling diverse data formats, thereby broadening their application scope. However, the complexity and emergent autonomy of these models introduce challenges in predictability and legal compliance. This paper analyses the legal and regulatory implications of Generative AI and LLMs in the European Union context, focusing on liability, privacy, intellectual property, and cybersecurity. (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 988