Results for 'privacy in public'

1000+ found
Order:
  1. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  2. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Privacy in Public Places: Do GPS and Video Surveillance Provide Plain Views?Mark Tunick - 2009 - Social Theory and Practice 35 (4):597-622.
    New technologies of surveillance such as Global Positioning Systems (GPS) are increasingly used as convenient substitutes for conventional means of observation. Recent court decisions hold that the government may, without a warrant, use a GPS to track a vehicle’s movements in public places without violating the 4th Amendment, as the vehicle is in plain view and no reasonable expectation of privacy is violated. This emerging consensus of opinions fails to distinguish the unreasonable expectation that we not be seen (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  5. Privacy in the face of new technologies of surveillance.Mark Tunick - 2000 - Public Affairs Quarterly 14 (3):259-277.
    This article addresses the question of whether an expectation of privacy is reasonable in the face of new technologies of surveillance, by developing a principle that best fits our intuitions. A "no sense enhancement" principle which would rule out searches using technologically sophisticated devices is rejected. The paper instead argues for the "mischance principle," which proscribes uses of technology that reveal what could not plausibly be discovered accidentally without the technology, subject to the proviso that searches that serve a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  6. Reclaiming Care and Privacy in the Age of Social Media.Hugh Desmond - 2022 - Royal Institute of Philosophy Supplement 92:45-66.
    Social media has invaded our private, professional, and public lives. While corporations continue to portray social media as a celebration of self-expression and freedom, public opinion, by contrast, seems to have decidedly turned against social media. Yet we continue to use it just the same. What is social media, and how should we live with it? Is it the promise of a happier and more interconnected humanity, or a vehicle for toxic self-promotion? In this essay I examine the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Publicity, Privacy, and Religious Toleration in Hobbes's Leviathan.Arash Abizadeh - 2013 - Modern Intellectual History 10 (2):261-291.
    What motivated an absolutist Erastian who rejected religious freedom, defended uniform public worship, and deemed the public expression of disagreement a catalyst for war to endorse a movement known to history as the champion of toleration, no coercion in religion, and separation of church and state? At least three factors motivated Hobbes’s 1651 endorsement of Independency: the Erastianism of Cromwellian Independency, the influence of the politique tradition, and, paradoxically, the contribution of early-modern practices of toleration to maintaining the (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  8. Medical Privacy and Big Data: A Further Reason in Favour of Public Universal Healthcare Coverage.Carissa Véliz - 2019 - In Philosophical Foundations of Medical Law. pp. 306-318.
    Most people are completely oblivious to the danger that their medical data undergoes as soon as it goes out into the burgeoning world of big data. Medical data is financially valuable, and your sensitive data may be shared or sold by doctors, hospitals, clinical laboratories, and pharmacies—without your knowledge or consent. Medical data can also be found in your browsing history, the smartphone applications you use, data from wearables, your shopping list, and more. At best, data about your health might (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Justifying Public Health Surveillance: Basic Interests, Unreasonable Exercise, and Privacy.Alan Rubel - 2012 - Kennedy Institute of Ethics Journal 22 (1):1-33.
    Surveillance plays a crucial role in public health, and for obvious reasons conflicts with individual privacy. This paper argues that the predominant approach to the conflict is problematic, and then offers an alternative. It outlines a Basic Interests Approach to public health measures, and the Unreasonable Exercise Argument, which sets forth conditions under which individuals may justifiably exercise individual privacy claims that conflict with public health goals. The view articulated is compatible with a broad range (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. In the Privacy of Our Streets.Carissa Véliz - 2018 - In Bryce Newell, Tjerk Timan & Bert-Jaap Koops (eds.), Surveillance, Privacy and Public Space. pp. 16-32.
    If one lives in a city and wants to be by oneself or have a private conversation with someone else, there are two ways to set about it: either one finds a place of solitude, such as one’s bedroom, or one finds a place crowded enough, public enough, that attention to each person dilutes so much so as to resemble a deserted refuge. Often, one can get more privacy in public places than in the most private of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
    Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  14. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  15. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2014 - In Beaete Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Privacy.Edmund Byrne - 1998 - In Encyclopedia of Applied Ethics. San Diego: Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  19. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  20. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur (eds.), The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. First, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Does privacy undermine community.Mark Tunick - 2001 - Journal of Value Inquiry 35 (4):517-534.
    Does privacy--the condition of being invisible to public scrutiny--in so emphasizing individual rights, undermine community? One objection to privacy is that it is a license to engage in antisocial activity that undermines social norms. Another objection is that privacy encourages isolation and anonymity, also undermining community. Drawing on the political theory of Hegel, I argue that privacy can promote community. Some invasions of privacy can undermine a sort of autonomy essential for maintaining a community. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  22. privacy, democracy and freedom of expression.Annabelle Lever - 2015 - In Beate Rossler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. cambridge University Press.
    this paper argues that people are entitled to keep some true facts about themselves to themselves, should they so wish, as a sign of respect for their moral and political status, and in order to protect themselves from being used as a public example in order to educate or to entertain other people. The “outing” - or non-consensual public disclosure - of people’s health records or status, or their sexual behaviour or orientation is usually unjustified, even when its (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  23. Is Pain “All in your Mind”? Examining the General Public’s Views of Pain.Tim V. Salomons, Richard Harrison, Nat Hansen, James Stazicker, Astrid Grith Sorensen, Paula Thomas & Emma Borg - 2022 - Review of Philosophy and Psychology 13 (3):683-698.
    By definition, pain is a sensory and emotional experience that is felt in a particular part of the body. The precise relationship between somatic events at the site where pain is experienced, and central processing giving rise to the mental experience of pain remains the subject of debate, but there is little disagreement in scholarly circles that both aspects of pain are critical to its experience. Recent experimental work, however, suggests a public view that is at odds with this (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  24. Inner privacy of conscious experiences and quantum information.Danko D. Georgiev - 2020 - Biosystems 187:104051.
    The human mind is constituted by inner, subjective, private, first-person conscious experiences that cannot be measured with physical devices or observed from an external, objective, public, third-person perspective. The qualitative, phenomenal nature of conscious experiences also cannot be communicated to others in the form of a message composed of classical bits of information. Because in a classical world everything physical is observable and communicable, it is a daunting task to explain how an empirically unobservable, incommunicable consciousness could have any (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  25. Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove. [REVIEW]Alan Rubel - 2009 - Review of Policy Research 26:633-634.
    Review of Searching Eyes: Privacy, the State, and Disease Surveillance in America – By Amy L. Fairchild, Ronald Bayer, and James Colgrove.
    Download  
     
    Export citation  
     
    Bookmark  
  26. Beate Rossler, ed., Privacies: Philosophical Evaluations Reviewed by.Annabelle Lever - 2005 - Philosophy in Review 25 (1):67-69.
    Download  
     
    Export citation  
     
    Bookmark  
  27. Publicity, externalism and inner states.Barry C. Smith - 2006 - In Tomáš Marvan (ed.), What Determines Content?: The Internalism/Externalism Dispute. Cambridge Scholars Press.
    The critic Cyril Connolly once pointed out that diarists don’t make novelists. He went on to describe the problem for the would-be writer. “Writing for oneself: no public. Writing for others: no privacy” (Cyril Connolly, Journal). This paper addresses Connolly's worry about the public ad private: how can we reconcile the inner and conscious dimension of speech with its outer and public dimension? For if what people mean by their words involves, or consists in, what they (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Anonymity and Democracy: Absence as Presence in the Public Sphere.Hans Asenbaum - 2018 - American Political Science Review 112 (3):459–472.
    Although anonymity is a central feature of liberal democracies—not only in the secret ballot, but also in campaign funding, publishing political texts, masked protests, and graffiti—it has so far not been conceptually grounded in democratic theory. Rather, it is treated as a self-explanatory concept related to privacy. To overcome this omission, this article develops a complex understanding of anonymity in the context of democratic theory. Drawing upon the diverse literature on anonymity in political participation, it explains anonymity as a (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  29. PHIL*4230 Photocopy Packet Privacy (edited by V. I. Burke).Victoria I. Burke - 2014 - Guelph, Canada: University of Guelph.
    This out-of-print collection in the area of the history, politics, ethics, and theory of privacy includes selections from Peter Gay, Alan Westin, Walter Benjamin, Catharine MacKinnon, Seyla Benhabib, Anita Allen, Ann Jennings, Charles Taylor, Richard Sennett, Mark Wicclair, Martha Nussbaum, and Robert Nozick.
    Download  
     
    Export citation  
     
    Bookmark  
  30. Engaging the Public in Ethical Reasoning About Big Data.Justin Anthony Knapp - 2016 - In Soren Adam Matei & Jeff Collman (eds.), Ethical Reasoning in Big Data: An Exploratory Analysis. Springer. pp. 43-52.
    The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  32. Libraries, Electronic Resources, and Privacy: The Case for Positive Intellectual Freedom.Alan Rubel - 2014 - Library Quarterly 84 (2):183-208.
    Public and research libraries have long provided resources in electronic formats, and the tension between providing electronic resources and patron privacy is widely recognized. But assessing trade-offs between privacy and access to electronic resources remains difficult. One reason is a conceptual problem regarding intellectual freedom. Traditionally, the LIS literature has plausibly understood privacy as a facet of intellectual freedom. However, while certain types of electronic resource use may diminish patron privacy, thereby diminishing intellectual freedom, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The human genome as public: Justifications and implications.Michelle J. Bayefsky - 2016 - Bioethics 31 (3):209-219.
    Since the human genome was decoded, great emphasis has been placed on the unique, personal nature of the genome, along with the benefits that personalized medicine can bring to individuals and the importance of safeguarding genetic privacy. As a result, an equally important aspect of the human genome – its common nature – has been underappreciated and underrepresented in the ethics literature and policy dialogue surrounding genetics and genomics. This article will argue that, just as the personal nature of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. To Be a Face in the Crowd: Surveillance, Facial Recognition, and a Right to Obscurity.Shawn Kaplan - 2023 - In L. Samuelsson, C. Cocq, S. Gelfgren & J. Enbom (eds.), Everyday Life in the Culture of Surveillance. NORDICOM. pp. 45-66.
    This article examines how facial recognition technology reshapes the philosophical debate over the ethics of video surveillance. When video surveillance is augmented with facial recognition, the data collected is no longer anonymous, and the data can be aggregated to produce detailed psychological profiles. I argue that – as this non-anonymous data of people’s mundane activities is collected – unjust risks of harm are imposed upon individuals. In addition, this technology can be used to catalogue all who publicly participate in political, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Can Social Media Be Seen as a New Public Sphere in the Context of Hannah Arendt's Public Sphere Theory?Metehan Karakurt & Aykut Aykutalp - 2020 - Londra, Birleşik Krallık: IJOPEC Publication Limited.
    With the 21st century, we are witnessing the mass spread of the communication technologies and social media revolution. Interactive networks built on a global scale have led to the formation of a virtual world of reality that is connecting the whole world. With the global spread of communication networks, the question of whether social media points to a new public sphere has been raised. Social media applications such as Facebook, Twitter and Instagram are nowadays seen as a place where (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Inferences and the Right to Privacy.Jakob Mainz - forthcoming - Journal of Value Inquiry:1-19.
    In this paper, I defend what I call the ‘Inference Principle’. This principle holds that if an agent obtains some information legitimately, then the agent can make any inference she wants based on the information, without violating anyone’s right to privacy. This principle is interesting for at least three reasons. First, it constitutes a novel answer to the timely question of whether the widespread use of ‘data analytics’ to infer personal information about individuals is morally permissible. Second, it contradicts (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Behavioural public policies and charitable giving.Luc Bovens - 2018 - Behavioural Public Policy 2 (2):168-173.
    Some of the challenges in Sanders et al. (this issue) can be aptly illustrated by means of charity nudges, that is, nudges designed to increase charitable donations. These nudges raise many ethical questions. First, Oxfam’s triptychs with suggested donations are designed to increase giving. If successful, do our actions match ex ante or ex post preferences? Does this make a difference to the autonomy of the donor? Second, the Behavioural Insights Team conducted experiments using social networks to nudge people to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Online information of vaccines: information quality, not only privacy, is an ethical responsibility of search engines.Pietro Ghezzi, Peter Bannister, Gonzalo Casino, Alessia Catalani, Michel Goldman, Jessica Morley, Marie Neunez, Andreu Prados-Bo, Pierre Robert Smeeters, Mariarosaria Taddeo, Tania Vanzolini & Luciano Floridi - 2021 - Frontiers in Medicine 7.
    The fact that Internet companies may record our personal data and track our online behavior for commercial or political purpose has emphasized aspects related to online privacy. This has also led to the development of search engines that promise no tracking and privacy. Search engines also have a major role in spreading low-quality health information such as that of anti-vaccine websites. This study investigates the relationship between search engines’ approach to privacy and the scientific quality of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  39. From public data to private information: The case of the supermarket.Vincent C. Müller - 2009 - In Bottis Maria (ed.), Proceedings of the 8th International Conference Computer Ethics: Philosophical Enquiry. Nomiki Bibliothiki. pp. 500-507.
    The background to this paper is that in our world of massively increasing personal digital data any control over the data about me seems illusionary – informational privacy seems a lost cause. On the other hand, the production of this digital data seems a necessary component of our present life in the industrialized world. A framework for a resolution of this apparent dilemma is provided if by the distinction between (meaningless) data and (meaningful) information. I argue that computational data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  41. THE DEVELOPMENT OF MORALITY IN HUMAN LIFE: AN OVERVIEW.Desh Raj Sirswal - 2014 - Milestone Education Review 5 (01):25-35.
    Presently philosophers, social theorists, educationists and legal scholars are busy with issues of contemporary importance such as affirmative actions, animal’s rights, capital punishment, cloning, euthanasia, immigration, pornography, privacy in civil society, values in nature, human rights, cultural values and world hunger etc. Since ancient time ethics is one of the most important part of philosophical speculations and human development. The development of morality comes under three stages viz. intrinsic morality, customary morality and reflective morality. Intrinsic morality has traditionally been (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Risk based passenger screening in aviation security: implications and variants of a new paradigm.Sebastian Weydner-Volkmann - 2017 - In Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking surveillance and control : beyond the "security versus privacy" debate. Baden-Baden: Nomos. pp. 49-83.
    In “Risk Based Passenger Screening in Aviation Security: Implications and Variants of a New Paradigm”, Sebastian Weydner-Volkmann describes the current paradigm shift from ‘traditional’ forms of screening to ‘risk based passenger screening’ (RBS) in aviation security. This paradigm shift is put in the context of the wider historical development of risk management approaches. Through a discussion of Michel Foucault, Herfried Münkler and Ulrich Beck, Weydner-Volkmann analyses the shortcomings of such approaches in public security policies, which become especially evident in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Access to Personal Information for Public Health Research: Transparency Should Always Be Mandatory.Louise Ringuette, Jean-Christophe Bélisle-Pipon, Victoria Doudenkova & Bryn Williams-Jones - 2018 - Canadian Journal of Bioethics/Revue canadienne de bioéthique 1 (2):94-98.
    In Québec, the Act Respecting Access to Documents Held by Public Bodies and the Protection of Personal Information provides an exception to transparency to most public institutions where public health research is conducted by allowing them to not disclose their uses of personal data. This exceptionalism is ethically problematic due to important concerns and we argue that all those who conduct research should be transparent and accountable for the work they do in the public interest.
    Download  
     
    Export citation  
     
    Bookmark  
  44. Ethical Considerations for Digitally Targeted Public Health Interventions.Daniel Susser - 2020 - American Journal of Public Health 110 (S3).
    Public health scholars and public health officials increasingly worry about health-related misinformation online, and they are searching for ways to mitigate it. Some have suggested that the tools of digital influence are themselves a possible answer: we can use targeted, automated digital messaging to counter health-related misinformation and promote accurate information. In this commentary, I raise a number of ethical questions prompted by such proposals—and familiar from the ethics of influence and ethics of AI—highlighting hidden costs of targeted (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the audience for this symposium (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  47. The promise and perils of AI in medicine.Robert Sparrow & Joshua James Hatherley - 2019 - International Journal of Chinese and Comparative Philosophy of Medicine 17 (2):79-109.
    What does Artificial Intelligence (AI) have to contribute to health care? And what should we be looking out for if we are worried about its risks? In this paper we offer a survey, and initial evaluation, of hopes and fears about the applications of artificial intelligence in medicine. AI clearly has enormous potential as a research tool, in genomics and public health especially, as well as a diagnostic aid. It’s also highly likely to impact on the organisational and business (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. Discovering Dimensions of Administrative Corruption in Education Sector.Abdul Rahim Chandio - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (6):27-32.
    Abstract- Administrative corruption has a long history in Pakistan which affected each public institution since its inception. Good governance in Pakistan never took a sigh due to Bribery in public sector and versatile Miraculous of Corruption in Public Administration. Administrative corruption possesses a multidimensional and complex phenomenon that has been created by numerous factors to affect at a wide range and each segment of society to be exhibited in a diversity of roles and traits. This study is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. New Frontiers in the Philosophy of Intellectual Property.Annabelle Lever - 2012 - Cambridge University Press.
    The new frontiers in the philosophy of intellectual property lie squarely in territories belonging to moral and political philosophy, as well as legal philosophy and philosophy of economics – or so this collection suggests. Those who wish to understand the nature and justification of intellectual property may now find themselves immersed in philosophical debates on the structure and relative merits of consequentialist and deontological moral theories, or disputes about the nature and value of privacy, or the relationship between national (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  50. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000