Results for 'online privacy policies'

999 found
Order:
  1. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  2. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur (eds.), The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. First, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  5. Online consent: how much do we need to know?Bartek Chomanski & Lode Lauwaert - forthcoming - AI and Society.
    This paper argues, against the prevailing view, that consent to privacy policies that regular internet users usually give is largely unproblematic from the moral point of view. To substantiate this claim, we rely on the idea of the right not to know (RNTK), as developed by bioethicists. Defenders of the RNTK in bioethical literature on informed consent claim that patients generally have the right to refuse medically relevant information. In this article we extend the application of the RNTK (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Behavioural public policies and charitable giving.Luc Bovens - 2018 - Behavioural Public Policy 2 (2):168-173.
    Some of the challenges in Sanders et al. (this issue) can be aptly illustrated by means of charity nudges, that is, nudges designed to increase charitable donations. These nudges raise many ethical questions. First, Oxfam’s triptychs with suggested donations are designed to increase giving. If successful, do our actions match ex ante or ex post preferences? Does this make a difference to the autonomy of the donor? Second, the Behavioural Insights Team conducted experiments using social networks to nudge people to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Online information of vaccines: information quality, not only privacy, is an ethical responsibility of search engines.Pietro Ghezzi, Peter Bannister, Gonzalo Casino, Alessia Catalani, Michel Goldman, Jessica Morley, Marie Neunez, Andreu Prados-Bo, Pierre Robert Smeeters, Mariarosaria Taddeo, Tania Vanzolini & Luciano Floridi - 2021 - Frontiers in Medicine 7.
    The fact that Internet companies may record our personal data and track our online behavior for commercial or political purpose has emphasized aspects related to online privacy. This has also led to the development of search engines that promise no tracking and privacy. Search engines also have a major role in spreading low-quality health information such as that of anti-vaccine websites. This study investigates the relationship between search engines’ approach to privacy and the scientific quality (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  10. Online Manipulation: Hidden Influences in a Digital World.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Georgetown Law Technology Review 4:1-45.
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  11. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  12. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  13. Bodily Privacy, Toilets, and Sex Discrimination: The Problem of "Manhood" in a Women's Prison.Jami L. Anderson - 2009 - In Olga Gershenson Barbara Penner (ed.), Ladies and Gents. pp. 90.
    Unjustifiable assumptions about sex and gender roles, the untamable potency of maleness, and gynophobic notions about women's bodies inform and influence a broad range of policy-making institutions in this society. In December 2004, the U.S. Court of Appeals for the Sixth Circuit continued this ignoble cultural pastime when they decided Everson v. Michigan Department of Corrections. In this decision, the Everson Court accepted the Michigan Department of Correction's claim that “the very manhood” of male prison guards both threatens the safety (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Free online services: enabling, disenfranchising, disempowering.Luciano Floridi - 2015 - Philosophy and Technology 28 (2):163-166.
    Free online services have become an essential part of onlife experience in the digital society. And yet, such digital gifts can be argued to represent a modern-day Trojan horse. This paper advances the theory that, far from being “free”, the digital gift economy disempowers and disenfranchises users, eroding privacy and promoting inequality. It concludes that what is needed to improve the situation is better taxation and stricter regulation of the advertising industry.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  15. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. The Internet and Privacy.Carissa Veliz - 2019 - In David Edmonds (ed.), Ethics and the Contemporary World. New York: Routledge. pp. 149-159.
    In this chapter I give a brief explanation of what privacy is, argue that protecting privacy is important because violations of the right to privacy can harm us individually and collectively, and offer some advice as to how to protect our privacy online.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Privacy, Autonomy, and the Dissolution of Markets.Kiel Brennan-Marquez & Daniel Susser - 2022 - Knight First Amendment Institute.
    Throughout the 20th century, market capitalism was defended on parallel grounds. First, it promotes freedom by enabling individuals to exploit their own property and labor-power; second, it facilitates an efficient allocation and use of resources. Recently, however, both defenses have begun to unravel—as capitalism has moved into its “platform” phase. Today, the pursuit of allocative efficiency, bolstered by pervasive data surveillance, often undermines individual freedom rather than promoting it. And more fundamentally, the very idea that markets are necessary to achieve (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. AI, Biometric Analysis, and Emerging Cheating Detection Systems: The Engineering of Academic Integrity?Jo Ann Oravec - 2022 - Education Policy Analysis Archives 175 (30):1-18.
    Abstract: Cheating behaviors have been construed as a continuing and somewhat vexing issue for academic institutions as they increasingly conduct educational processes online and impose metrics on instructional evaluation. Research, development, and implementation initiatives on cheating detection have gained new dimensions in the advent of artificial intelligence (AI) applications; they have also engendered special challenges in terms of their social, ethical, and cultural implications. An assortment of commercial cheating–detection systems have been injected into educational contexts with little input on (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19. Online Masquerade: Redesigning the Internet for Free Speech Through the Use of Pseudonyms.Carissa Véliz - 2018 - Journal of Applied Philosophy 36 (4):643-658.
    Anonymity promotes free speech by protecting the identity of people who might otherwise face negative consequences for expressing their ideas. Wrongdoers, however, often abuse this invisibility cloak. Defenders of anonymity online emphasise its value in advancing public debate and safeguarding political dissension. Critics emphasise the need for identifiability in order to achieve accountability for wrongdoers such as trolls. The problematic tension between anonymity and identifiability online lies in the desirability of having low costs (no repercussions) for desirable speech (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  20. Parents, Privacy, and Facebook: Legal and Social Responses to the Problem of Over-Sharing.Renée Nicole Souris - 2018 - In Mark Navin & Ann Cudd (eds.), Core Concepts and Contemporary Issues in Privacy. Cham: Springer Verlag. pp. 175-188.
    This paper examines whether American parents legally violate their children’s privacy rights when they share embarrassing images of their children on social media without their children’s consent. My inquiry is motivated by recent reports that French authorities have warned French parents that they could face fines and imprisonment for such conduct, if their children sue them once their children turn 18. Where French privacy law is grounded in respect for dignity, thereby explaining the French concerns for parental “over-sharing,” (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. A Framework for Analyzing and Comparing Privacy States.Alan Rubel & Ryan Biava - 2014 - JASIST: The Journal of the American Society for Information Science and Technology 65 (12):2422-2431.
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Design for Embedding the Value of Privacy in Personal Information Management Systems.Haleh Asgarinia - 2024 - Journal of Ethics and Emerging Technologies 33 (1):1-19.
    Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around the design of privacy-friendly systems that comply with legal requirements, there has been relatively limited philosophical discourse on incorporating the value of privacy into these systems. Exploring the connection between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Transparent Media and the Development of Digital Habits.Daniel Susser - 2017 - In Van den Eede Yoni, Irwin Stacy O'Neal & Wellner Galit (eds.), Postphenomenology and Media: Essays on Human-Media-World Relations. Lexington Books. pp. 27-44.
    Our lives are guided by habits. Most of the activities we engage in throughout the day are initiated and carried out not by rational thought and deliberation, but through an ingrained set of dispositions or patterns of action—what Aristotle calls a hexis. We develop these dispositions over time, by acting and gauging how the world responds. I tilt the steering wheel too far and the car’s lurch teaches me how much force is needed to steady it. I come too close (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Autonomy and Online Manipulation.Michael Klenk & Jeff Hancock - 2019 - Internet Policy Review 1:1-11.
    More and more researchers argue that online technologies manipulate human users and, therefore, undermine their autonomy. We call this the MAL view on online technology because it argues from Manipulation to Autonomy-Loss. MAL enjoys public visibility and will shape the academic discussion to come. This view of online technology, however, fails conceptually. MAL presupposes that manipulation equals autonomy loss, and that autonomy is the absence of manipulation. That is mistaken. In short, an individual can be manipulated while (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  25. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Anti-doping, purported rights to privacy and WADA's whereabouts requirements: A legal analysis.Oskar MacGregor, Richard Griffith, Daniele Ruggiu & Mike McNamee - 2013 - Fair Play 1 (2):13-38.
    Recent discussions among lawyers, philosophers, policy researchers and athletes have focused on the potential threat to privacy posed by the World Anti-Doping Agency’s (WADA) whereabouts requirements. These requirements demand, among other things, that all elite athletes file their whereabouts information for the subsequent quarter on a quarterly basis and comprise data for one hour of each day when the athlete will be available and accessible for no advance notice testing at a specified location of their choosing. Failure to file (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  27. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’t.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  28. The Acceptability of Online Learning Action Cell Session Practice to Tagumpay National High School Teachers.Ann Michelle S. Medina, Mari Cris O. Lim & Aldren E. Camposagrado - 2023 - Universal Journal of Educational Research 2 (2):99-109.
    This quantitative study explores the acceptability of Online Learning Action Cell (LAC) practice as a school-based professional development strategy for Tagumpay National High School (TNHS) teachers. The research was motivated by the Department of Education (DepEd) Order No. 35 s. 2016 which prompts public schools to comply with the implementation of LAC sessions because it has a positive impact on teachers’ beliefs and practices resulting in education reforms for learners’ benefit. However, in compliance with DepEd’s policy on maximizing Time-On-Task (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The debate on the moral responsibilities of online service providers.Mariarosaria Taddeo & Luciano Floridi - 2016 - Science and Engineering Ethics 22 (6):1575-1603.
    Online service providers —such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract, we first analyse the moral (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  30. Epistemic Paternalism Online.Clinton Castro, Adam Pham & Alan Rubel - 2020 - In Guy Axtell & Amiel Bernal (eds.), Epistemic Paternalism: Conceptions, Justifications and Implications. Lanham, Md: Rowman & Littlefield International. pp. 29-44.
    New media (highly interactive digital technology for creating, sharing, and consuming information) affords users a great deal of control over their informational diets. As a result, many users of new media unwittingly encapsulate themselves in epistemic bubbles (epistemic structures, such as highly personalized news feeds, that leave relevant sources of information out (Nguyen forthcoming)). Epistemically paternalistic alterations to new media technologies could be made to pop at least some epistemic bubbles. We examine one such alteration that Facebook has made in (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  31. Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  32. Poverty Alleviation Policies of Selected Churches in Anambra State, Nigeria.Emmanuel Orok Duke - 2020 - GNOSI: An Interdisciplinary Journal of Human Theory and Praxis 3 (1):40-52.
    Poverty is a social problem. Its alleviation has been one of the major issues that occupy a significant place in the scale of preference of developmental policies of several nations, international organizations, church and other interested stakeholders. Thus, the thrust of this work centers on poverty alleviation strategies of selected Churches in Anambra State: namely how this institution participates in some economic activities, skill acquisition programmes, and empowerment programmes, among others in view of controlling the scourge of poverty. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. New Zealand children’s experiences of online risks and their perceptions of harm Evidence from Ngā taiohi matihiko o Aotearoa – New Zealand Kids Online.Edgar Pacheco & Neil Melhuish - 2020 - Netsafe.
    While children’s experiences of online risks and harm is a growing area of research in New Zealand, public discussion on the matter has largely been informed by mainstream media’s fixation on the dangers of technology. At best, debate on risks online has relied on overseas evidence. However, insights reflecting the New Zealand context and based on representative data are still needed to guide policy discussion, create awareness, and inform the implementation of prevention and support programmes for children. This (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  34. Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove. [REVIEW]Alan Rubel - 2009 - Review of Policy Research 26:633-634.
    Review of Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove.
    Download  
     
    Export citation  
     
    Bookmark  
  35. A Thought of Legal Research with Examples and Demonstrations.Kiyoung Kim - 2015 - SSRN.
    The policy makers or lawyers may face the need of legal research for reasons. The congressmen may plan to make new laws to address the challenges of their constituent or to the interest of nation. The lawyers may need to serve their clients who like to know the legal issues involved, the strategies to deal with their loss and recovery, and prospect for winning the case if the dispute has gotten worse. The lawyers may practice in a solo business or (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Public Policy and Governance: Some Thoughts on Its Elements.Kiyoung Kim - 2015 - SSRN.
    As the word demos denotes, the democracy is generally considered as the rule or governance based on the general base of people in which monarchy or oligarchy form is excluded. We have a classical view about the four forms of government, which was proposed by Platonic concepts. Most idealistic form of government, in his prongs, could be found in Crete and Sparta, which was nevertheless not a democratic form. His accolade of these two nations, which, of course, would be a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Land Policy, Women, and Children: Evidence from Vietnam.Huong T. T. Hoang, Khoi D. Nguyen, Trang T. Le, Hang Khanh, Kien Le & My Nguyen - 2012 - Bản Chưa Hoàn Chỉnh.
    Nhiều nаm hơn nữ đượс đăng ký tên trên GCNQSDĐ. Phụ nữ sở hữu ít mảnh đất hơn nаm giới. Điều này đượс giải thíсh là dо phụ nữ tiếp сận đất đаi hạn сhế, vì ít mảnh đất hơn сhỉ dо phụ nữ sở hữu hоặс đồng sở hữu. Một số yếu tố giải thíсh sự kháс biệt. Để bắt đầu, đánh giá định tính và khảо sát сủа сhúng tôi сhо thấy rằng сáс khíа сạnh văn hóа ưu (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. Moral hazards and solar radiation management: Evidence from a large-scale online experiment.Philipp Schoenegger & Kian Mintz-Woo - 2024 - Journal of Environmental Psychology 95:102288.
    Solar radiation management (SRM) may help to reduce the negative outcomes of climate change by minimising or reversing global warming. However, many express the worry that SRM may pose a moral hazard, i.e., that information about SRM may lead to a reduction in climate change mitigation efforts. In this paper, we report a large-scale preregistered, money-incentivised, online experiment with a representative US sample (N = 2284). We compare actual behaviour (donations to climate change charities and clicks on climate change (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Foreign Policy as Spiritual Warfare: A Conversation With Aleksandr Dugin.Edward Stawiarski - 2022 - Chronicle Magazine.
    This article for Chronicles Magazine deals with Aleksandr Dugin's religious, philosophical, and political outlook and how the Ukrainian war can be analysed in these terms.
    Download  
     
    Export citation  
     
    Bookmark  
  40. Health Policy and Outcomes.Hang K. Nguyen, Trang T. Le, My Nguyen & Kien Le - 2011 - Working Paper.
    Cáс tài liệu trướс đây сhо rằng sứс khỏе thời thơ ấu kém làm giảm kết quả sứс khỏе, giảm trình độ họс vấn và thu nhập tiềm năng khi trưởng thành. Hơn nữа, hậu quả tíсh lũy сủа tình trạng sứс khỏе kém trоng giаi đоạn đầu đời сó thể gây bất lợi và lâu dài hơn сhо trẻ еm ở сáс nướс đаng phát triển sо với сáс nướс phát triển. Dо đó, phát hiện сủа сhúng tôi nhấn (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Religion, Reproduction and Public Policy.Edgar Dahl - 2010 - Reproductive Biomedicine Online 21:834-837.
    Many people look to religion to help resolve the serious moral and legal issues associated with assisted reproductive technologies. Doing so presupposes that religion is the cornerstone of ethics, but this assumption is not well founded. While various faiths are entitled to articulate their views on matters of human reproduction, the contradictions involved in doing so make it unwise to rely on religion in the formulation of law and policy. These contradictions – such as the indeterminacy about what revealed truths (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  42. Gaming Google: Some Ethical Issues Involving Online Reputation Management.Jo Ann Oravec - 2013 - Journal of Business Ethics Education 10:61-81.
    Using the search engine Google to locate information linked to individuals and organizations has become part of everyday functioning. This article addresses whether the “gaming” of Internet applications in attempts to modify reputations raises substantial ethical concerns. It analyzes emerging approaches for manipulation of how personally-identifiable information is accessed online as well as critically-important international differences in information handling. It investigates privacy issues involving the data mining of personally-identifiable information with search engines and social media platforms. Notions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Digital Rights and Freedoms: A Framework for Surveying Users and Analyzing Policies.Todd Davies - 2014 - In Luca Maria Aiello & Daniel McFarland (eds.), Social Informatics: Proceedings of the 6th International Conference (SocInfo 2014). Springer Lecture Notes in Computer Science Vol. 8851. pp. 428-443.
    Interest has been revived in the creation of a "bill of rights" for Internet users. This paper analyzes users' rights into ten broad principles, as a basis for assessing what users regard as important and for comparing different multi-issue Internet policy proposals. Stability of the principles is demonstrated in an experimental survey, which also shows that freedoms of users to participate in the design and coding of platforms appear to be viewed as inessential relative to other rights. An analysis of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Ghosting Inside the Machine: Student Cheating, Online Education and the Omertà of Institutional Liars.Shane J. Ralston - 2021 - In Alison MacKenzie, Jennifer Rose & Ibrar Bhatt (eds.), The Epistemology of Deceit in the Postdigital Era: Dupery by Design. Springer. pp. 251-264.
    'Ghosting' or the unethical practice of having someone other than the student registered in the course take the student's exams, complete their assignments and write their essays has become a common method of cheating in today's online higher education learning environment. Internet-based teaching technology and deceit go hand-in-hand because the technology establishes a set of perverse incentives for students to cheat and institutions to either tolerate or encourage this highly unethical form of behavior. For students, cheating becomes an increasingly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. What students want? Exploring the role of the institution in supporting successful learning journeys in online distance education.Dawn Mannay & Ceri Wilcock - 2015 - Widening Participation and Lifelong Learning 17 (1): 49-63..
    There have been numerous initiatives to increase access to higher education for those residing in marginalised locales in Wales. However, entrance in itself does not guarantee success and it is important for educators and policy makers to explore issues of retention. Classed and relational positionings often conflict with non-traditional students' education trajectories and sometimes contribute to their withdrawal from academia. In response to this challenge the current paper focuses on the accounts of non-traditional students in Communities First[1] areas who took (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Assessing the Wellbeing Impacts of the COVID-19 Pandemic and Three Policy Types: Suppression, Control, and Uncontrolled Spread.Matthew D. Adler, Richard Bradley, Maddalena Ferranna, Marc Fleurbaey, James Hammitt & Alex Voorhoeve - 2020 - Thinktank 20 Policy Briefs for the G20 Meeting in Saudi Arabia 2020.
    The COVID-19 crisis has forced a difficult trade-off between limiting the health impacts of the virus and maintaining economic activity. Welfare economics offers tools to conceptualize this trade-off so that policy-makers and the public can see clearly what is at stake. We review four such tools: the Value of Statistical Life (VSL); the Value of Statistical Life Years (VSLYs); Quality-Adjusted Life-Years (QALYs); and social welfare analysis, and argue that the latter are superior. We also discuss how to choose policies (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Reflection of the mathematical dimension of gambling in iGaming online content: A qualitative analysis - Fourth technical report.Catalin Barboianu - 2024 - Philscience.
    In light of the observations and research design presented in the previous reports, the current technical report is focused on the relationship between the quality and specificity of the content of the gambling sites and the site’s SEO and marketing policy. This relationship is dependent upon the category of the gambling site and the difference in content quality, and the degree to which the mathematical dimension of gambling is reflected in this content is explained by this dependence.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Open Source Production of Encyclopedias: Editorial Policies at the Intersection of Organizational and Epistemological Trust.Paul B. de Laat - 2012 - Social Epistemology 26 (1):71-103.
    The ideas behind open source software are currently applied to the production of encyclopedias. A sample of six English text-based, neutral-point-of-view, online encyclopedias of the kind are identified: h2g2, Wikipedia, Scholarpedia, Encyclopedia of Earth, Citizendium and Knol. How do these projects deal with the problem of trusting their participants to behave as competent and loyal encyclopedists? Editorial policies for soliciting and processing content are shown to range from high discretion to low discretion; that is, from granting unlimited trust (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  49. The concept of state economic policy of regulation of human resources international movement of Ukraine in the context of global intellectualization.Sergii Sardak & А. О. Samoilenko S. Е. Sardak - 2016 - International Scientific Conference Economy and Society: Modern Foundation for Human Development: Conference Proceedings, Part 2, October 31, 2016.
    The problem of the concept of Ukraine’s state economic policy of regulation of human resources international movement in the context of global intellectualization remains topical throughout the existence of Ukraine as an independent state. It should be noted that the favorable geopolitical position of Ukraine provides potential opportunities for the development of both regions and the state as a whole, creates conditions that are associated with the involvement in international migration, tourism and transit and professional processes. Their number increases in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Position paper on ethical, legal and social challenges linked to audio- and video-based AAL solutions.Alin Ake-Kob, Slavisa Aleksic, Zoltán Alexin, Aurelija Blaževičiene, Anto Čartolovni, Liane Colonna, Carina Dantas, Anton Fedosov, Eduard Fosch-Villaronga, Francisco Florez-Revuelta, Zhicheng He, Aleksandar Jevremović, Andrzej Klimczuk, Maksymilian Kuźmicz, Lambros Lambrinos, Christoph Lutz, Anamaria Malešević, Renata Mekovec, Cristina Miguel, Tamar Mujirishvili, Zada Pajalic, Rodrigo Perez Vega, Barbara Pierscionek, Siddharth Ravi, Pika Sarf, Agusti Solanas & Aurelia Tamo-Larrieux - 2022 - Https://Goodbrother.Eu/.
    In this position paper, we have used Alan Cooper’s persona technique to illustrate the utility of audio- and video-based AAL technologies. Therefore, two primary examples of potential audio- and video-based AAL users, Anna and Irakli, serve as reference points for describing salient ethical, legal and social challenges related to use of AAL. These challenges are presented on three levels: individual, societal, and regulatory. For each challenge, a set of policy recommendations is suggested.
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 999