Results for 'education privacy'

964 found
Order:
  1. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  2. (1 other version)Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Privacy, Ethics, and Institutional Research.Alan Rubel - 2019 - New Directions in Institutional Research 2019 (183):5-16.
    Despite widespread agreement that privacy in the context of education is important, it can be difficult to pin down precisely why and to what extent it is important, and it is challenging to determine how privacy is related to other important values. But that task is crucial. Absent a clear sense of what privacy is, it will be difficult to understand the scope of privacy protections in codes of ethics. Moreover, privacy will inevitably conflict (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Views on Privacy. A Survey.Siân Brooke & Carissa Véliz - 2020 - In Siân Brooke & Carissa Véliz (eds.), Data, Privacy, and the Individual.
    The purpose of this survey was to gather individual’s attitudes and feelings towards privacy and the selling of data. A total (N) of 1,107 people responded to the survey. -/- Across continents, age, gender, and levels of education, people overwhelmingly think privacy is important. An impressive 82% of respondents deem privacy extremely or very important, and only 1% deem privacy unimportant. Similarly, 88% of participants either agree or strongly agree with the statement that ‘violations to (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. A matter of trust: : Higher education institutions as information fiduciaries in an age of educational data mining and learning analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student success (however defined). (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the audience for this symposium (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  72
    Artificial Intelligence in Higher Education in South Africa: Some Ethical Considerations (14th edition).Tanya de Villiers-Botha - forthcoming - Kagisano.
    There are calls from various sectors, including the popular press, industry, and academia, to incorporate artificial intelligence (AI)-based technologies in general, and large language models (LLMs) (such as ChatGPT and Gemini) in particular, into various spheres of the South African higher education sector. Nonetheless, the implementation of such technologies is not without ethical risks, notably those related to bias, unfairness, privacy violations, misinformation, lack of transparency, and threats to autonomy. This paper gives an overview of the more pertinent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Revolutionizing Education with ChatGPT: Enhancing Learning Through Conversational AI.Prapasiri Klayklung, Piyawatjana Chocksathaporn, Pongsakorn Limna, Tanpat Kraiwanit & Kris Jangjarat - 2023 - Universal Journal of Educational Research 2 (3):217-225.
    The development of conversational artificial intelligence (AI) has brought about new opportunities for improving the learning experience in education. ChatGPT, a large language model trained on a vast corpus of text, has the potential to revolutionize education by enhancing learning through personalized and interactive conversations. This paper explores the benefits of integrating ChatGPT in education in Thailand. The research strategy employed in this study was qualitative, utilizing in-depth interviews with eight key informants who were selected using purposive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Discovering Dimensions of Administrative Corruption in Education Sector.Abdul Rahim Chandio - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (6):27-32.
    Abstract- Administrative corruption has a long history in Pakistan which affected each public institution since its inception. Good governance in Pakistan never took a sigh due to Bribery in public sector and versatile Miraculous of Corruption in Public Administration. Administrative corruption possesses a multidimensional and complex phenomenon that has been created by numerous factors to affect at a wide range and each segment of society to be exhibited in a diversity of roles and traits. This study is considering significance of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. The Temptation of Data-enabled Surveillance: Are Universities the Next Cautionary Tale?Alan Rubel & Kyle M. L. Jones - 2020 - Communications of the Acm 4 (63):22-24.
    There is increasing concern about “surveillance capitalism,” whereby for-profit companies generate value from data, while individuals are unable to resist (Zuboff 2019). Non-profits using data-enabled surveillance receive less attention. Higher education institutions (HEIs) have embraced data analytics, but the wide latitude that private, profit-oriented enterprises have to collect data is inappropriate. HEIs have a fiduciary relationship to students, not a narrowly transactional one (see Jones et al, forthcoming). They are responsible for facets of student life beyond education. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Sex By Deception.Berit Brogaard - 2022 - In Manuel Vargas & John Doris (eds.), The Oxford Handbook of Moral Psychology. Oxford, U.K.: Oxford University Press. pp. 683-711.
    In this paper I will use sex by deception as a case study for highlighting some of the most tricky concepts around sexuality and moral psychology, including rape, consensual sex, sexual rights, sexual autonomy, sexual individuality, and disrespectful sex. I begin with a discussion of morally wrong sex as rooted in the breach of five sexual liberty rights that are derived from our fundamental human liberty rights: sexual self-possession, sexual autonomy, sexual individuality, sexual dignity and sexual privacy. I then (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. (1 other version)AI, Biometric Analysis, and Emerging Cheating Detection Systems: The Engineering of Academic Integrity?Jo Ann Oravec - 2022 - Education Policy Analysis Archives 175 (30):1-18.
    Abstract: Cheating behaviors have been construed as a continuing and somewhat vexing issue for academic institutions as they increasingly conduct educational processes online and impose metrics on instructional evaluation. Research, development, and implementation initiatives on cheating detection have gained new dimensions in the advent of artificial intelligence (AI) applications; they have also engendered special challenges in terms of their social, ethical, and cultural implications. An assortment of commercial cheating–detection systems have been injected into educational contexts with little input on the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Conflicting Aims and Values in the Application of Smart Sensors in Geriatric Rehabilitation: Ethical Analysis.Christopher Predel, Cristian Timmermann, Frank Ursin, Marcin Orzechowski, Timo Ropinski & Florian Steger - 2022 - JMIR mHealth and uHealth 10 (6):e32910.
    Background: Smart sensors have been developed as diagnostic tools for rehabilitation to cover an increasing number of geriatric patients. They promise to enable an objective assessment of complex movement patterns. -/- Objective: This research aimed to identify and analyze the conflicting ethical values associated with smart sensors in geriatric rehabilitation and provide ethical guidance on the best use of smart sensors to all stakeholders, including technology developers, health professionals, patients, and health authorities. -/- Methods: On the basis of a systematic (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Trauma Drama: The Trouble with Competitive Victimhood.Robert S. Taylor - 2022 - Theory and Research in Education 20 (3):259-271.
    Writing a college-application essay has become a rite of passage for high-school seniors in the U.S., one whose importance has expanded over time due to an increasingly competitive admissions process. Various commentators have noted the disturbing evolution of these essays over the years, with an ever-greater emphasis placed on obstacles overcome and traumas survived. How have we gotten to the point where college-application essays are all too frequently competitive-victimhood displays? Colleges have an understandable interest in the disadvantages their applicants may (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Sphere transgressions: reflecting on the risks of big tech expansionism.Marthe Stevens, Steven R. Kraaijeveld & Tamar Sharon - forthcoming - Information, Communication and Society.
    The rapid expansion of Big Tech companies into various societal domains (e.g., health, education, and agriculture) over the past decade has led to increasing concerns among governments, regulators, scholars, and civil society. While existing theoretical frameworks—often revolving around privacy and data protection, or market and platform power—have shed light on important aspects of Big Tech expansionism, there are other risks that these frameworks cannot fully capture. In response, this editorial proposes an alternative theoretical framework based on the notion (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. THE DEVELOPMENT OF MORALITY IN HUMAN LIFE: AN OVERVIEW.Desh Raj Sirswal - 2014 - Milestone Education Review 5 (01):25-35.
    Presently philosophers, social theorists, educationists and legal scholars are busy with issues of contemporary importance such as affirmative actions, animal’s rights, capital punishment, cloning, euthanasia, immigration, pornography, privacy in civil society, values in nature, human rights, cultural values and world hunger etc. Since ancient time ethics is one of the most important part of philosophical speculations and human development. The development of morality comes under three stages viz. intrinsic morality, customary morality and reflective morality. Intrinsic morality has traditionally been (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more computer ethics (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. (1 other version)Gaming Google: Some Ethical Issues Involving Online Reputation Management.Jo Ann Oravec - 2013 - Journal of Business Ethics Education 10:61-81.
    Using the search engine Google to locate information linked to individuals and organizations has become part of everyday functioning. This article addresses whether the “gaming” of Internet applications in attempts to modify reputations raises substantial ethical concerns. It analyzes emerging approaches for manipulation of how personally-identifiable information is accessed online as well as critically-important international differences in information handling. It investigates privacy issues involving the data mining of personally-identifiable information with search engines and social media platforms. Notions of “gaming” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry:1-16.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  22. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  23. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  24. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards ( Anderson (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Bodily Privacy, Toilets, and Sex Discrimination: The Problem of "Manhood" in a Women's Prison.Jami Anderson - 2009 - In Olga Gershenson Barbara Penner (ed.), Ladies and Gents: Public Toilets and Gender. Temple University Press. pp. 90.
    Unjustifiable assumptions about sex and gender roles, the untamable potency of maleness, and gynophobic notions about women's bodies inform and influence a broad range of policy-making institutions in this society. In December 2004, the U.S. Court of Appeals for the Sixth Circuit continued this ignoble cultural pastime when they decided Everson v. Michigan Department of Corrections. In this decision, the Everson Court accepted the Michigan Department of Correction's claim that “the very manhood” of male prison guards both threatens the safety (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27. Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In Philosophical Foundations of Medical Law. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At best, data about your health might (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  29. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  30. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  31. Does privacy undermine community.Mark Tunick - 2001 - Journal of Value Inquiry 35 (4):517-534.
    Does privacy--the condition of being invisible to public scrutiny--in so emphasizing individual rights, undermine community? One objection to privacy is that it is a license to engage in antisocial activity that undermines social norms. Another objection is that privacy encourages isolation and anonymity, also undermining community. Drawing on the political theory of Hegel, I argue that privacy can promote community. Some invasions of privacy can undermine a sort of autonomy essential for maintaining a community. I (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  32. (1 other version)Must privacy and sexual equality conflict? A philosophical examination of some legal evidence.Annabelle Lever - 2001 - Social Research: An International Quarterly 67 (4):1137-1171.
    Are rights to privacy consistent with sexual equality? In a brief, but influential, article Catherine MacKinnon trenchantly laid out feminist criticisms of the right to privacy. In “Privacy v. Equality: Beyond Roe v. Wade” she linked familiar objections to the right to privacy and connected them to the fate of abortion rights in the U.S.A. (MacKinnon, 1983, 93-102). For many feminists, the Supreme Court’s decision in Roe v. Wade (1973) had suggested that, notwithstanding a dubious past, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Group privacy: a defence and an interpretation.Luciano Floridi - 2016 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  34. Privacy: Restrictions and Decisions.Annabelle Lever - 2013 - In Steven Scalet and Christopher Griffin (ed.), APA Newsletter on Philosophy and Law. pp. 1-6.
    This article forms part of a tribute to Anita L. Allen by the APA newletter on Philosophy and Law. It celebrates Allen's work, but also explains why her conception of privacy is philosophically inadequate. It then uses basic democratic principles and the example of the secret ballot to suggest how we might develop a more philosophically persuasive version of Allen's ideas.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Brain Privacy and the Case of Cannibal Cop.Mark Tunick - 2017 - Res Publica 23 (2):179-196.
    In light of technology that may reveal the content of a person’s innermost thoughts, I address the question of whether there is a right to ‘brain privacy’—a right not to have one’s inner thoughts revealed to others–even if exposing these thoughts might be beneficial to society. I draw on a conception of privacy as the ability to control who has access to information about oneself and to an account that connects one’s interest in privacy to one’s interests (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  36. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  37. The Privacy Dependency Thesis and Self-Defense.Lauritz Aastrup Munch & Jakob Thrane Mainz - forthcoming - AI and Society:1-11.
    If I decide to disclose information about myself, this act can undermine other people’s ability to effectively conceal information about themselves. One case in point involves genetic information: if I share ‘my’ genetic information with others, I thereby also reveal genetic information about my biological relatives. Such dependencies are well-known in the privacy literature and are often referred to as ‘privacy dependencies’. Some take the existence of privacy dependencies to generate a moral duty to sometimes avoid sharing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Inner privacy of conscious experiences and quantum information.Danko D. Georgiev - 2020 - Biosystems 187:104051.
    The human mind is constituted by inner, subjective, private, first-person conscious experiences that cannot be measured with physical devices or observed from an external, objective, public, third-person perspective. The qualitative, phenomenal nature of conscious experiences also cannot be communicated to others in the form of a message composed of classical bits of information. Because in a classical world everything physical is observable and communicable, it is a daunting task to explain how an empirically unobservable, incommunicable consciousness could have any physical (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  39. Privacy During the Pandemic and Beyond.Carissa Vèliz - 2020 - The Philosophers' Magazine 90:107-113.
    This paper is an overview about the state of privacy and power shifts during the pandemic, and the privacy challenges ahead.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  42. Privacy in Public Places: Do GPS and Video Surveillance Provide Plain Views?Mark Tunick - 2009 - Social Theory and Practice 35 (4):597-622.
    New technologies of surveillance such as Global Positioning Systems (GPS) are increasingly used as convenient substitutes for conventional means of observation. Recent court decisions hold that the government may, without a warrant, use a GPS to track a vehicle’s movements in public places without violating the 4th Amendment, as the vehicle is in plain view and no reasonable expectation of privacy is violated. This emerging consensus of opinions fails to distinguish the unreasonable expectation that we not be seen in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Privacy as an Asset.Jarek Gryz - 2017 - In Mindel Marcellus, Lyons Kelly & Wigglesworth Joe (eds.), Proceedings of the 27th CASCON Conference. IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Epistemic Account of Privacy.Martijn Blaauw - 2013 - Episteme 10 (2):167-177.
    Privacy is valued by many. But what it means to have privacy remains less than clear. In this paper, I argue that the notion of privacy should be understood in epistemic terms. What it means to have (some degree of) privacy is that other persons do not stand in significant epistemic relations to those truths one wishes to keep private.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  45. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Privacy.Edmund Byrne - 1997 - In Byrne Edmund (ed.), Encyclopedia of Applied Ethics. Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Role Modeling is Beneficial in Moral Character Education: A Commentary on Carr (2023).Nafsika Athanassoulis & Hyemin Han - 2023 - Philosophical Inquiry in Education 30 (3):240-243.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. A Defense of Privacy as Control.Leonhard Menges - 2021 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  49. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  50.  71
    Privacy and Assurance: On the Right to Be Forgotten.Scott Casleton - 2024 - Political Philosophy 1 (1):212-235.
    The right to be forgotten enables individuals to remove certain links from search results that appear when their names are entered as search terms. Formulated as a distinct application of the general right to privacy, the right to be forgotten has proven highly controversial, for two reasons. First, it is difficult to see how the specific right to be forgotten can apply to the withdrawal of public information, since the general right to privacy typically covers the disclosure of (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 964