Results for 'privacy, equality, security, CCTV, Japser Ryberg'

998 found
Order:
  1. Mrs. Aremac and the camera: A response to Ryberg.Annabelle Lever - 2008 - Res Publica 14 (1):35-42.
    In a recent article in Respublica, Jesper Ryberg argues that CCTV can be compared to a little old lady gazing out onto the street below. This article takes issue with the claim that government surveillance can be justified in this manner. Governments have powers and responsibilities that little old ladies lack. Even if CCTV is effective at preventing crime, there may be less intrusive ways of doing so. People have a variety of legitimate interests in privacy, and protection for (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  2. Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63:99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like‐minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions ‐ including our (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Democracy and Security.Annabelle Lever - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International.
    This chapter is concerned with the role of democracy in preventing terrorism, identifying and apprehending terrorists, and in minimizing and alleviating the damage created by terrorism.1 Specifically, it considers the role of democracy as a resource, not simply a limitation, on counterterrorism.2 I am mainly concerned with the ways in which counterterrorism is similar to more familiar forms of public policy, such as the prevention of crime or the promotion of economic prosperity, and so nothing that I say turns on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Democracy and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63 (4):99-110.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. A Sense of Proportion: Some Thoughts on Equality, Security and Justice.Annabelle Lever - 2020 - Res Publica 26 (3):357-371.
    This article develops an intuitive idea of proportionality as a placeholder for a substantive conception of equality, and contrasts it with Ripstein’s ideas, as presented in an annual guest lecture to the Society of Applied Philosophy in 2016. It uses a discussion of racial profiling to illustrate the conceptual and normative differences between the two. The brief conclusion spells out my concern that talk of ‘proportionality’, though often helpful and, sometimes, necessary for moral reasoning, can end up concealing, rather than (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Must Privacy and Sexual Equality Conflict? A Philosophical Examination of Some Legal Evidence.Annabelle Lever - 2000 - Social Research: An International Quarterly 67:1137-1172.
    This paper examines MacKinnon’s claims about the relationship of rights to privacy and equality in light of the reasoning in Harris and Bowers. When we contrast the Majority and Minority decisions in these cases, it shows, we can distinguish interpretations of the right to privacy that are consistent with sexual equality from those that are not. This is not simply because the two differ in their consequences – though they do - but because the former, unlike the latter, rely on (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  8. Must privacy and sexual equality conflict? A philosophical examination of some legal evidence.Annabelle Lever - 2001 - Social Research: An International Quarterly 67 (4):1137-1171.
    Are rights to privacy consistent with sexual equality? In a brief, but influential, article Catherine MacKinnon trenchantly laid out feminist criticisms of the right to privacy. In “Privacy v. Equality: Beyond Roe v. Wade” she linked familiar objections to the right to privacy and connected them to the fate of abortion rights in the U.S.A. (MacKinnon, 1983, 93-102). For many feminists, the Supreme Court’s decision in Roe v. Wade (1973) had suggested that, notwithstanding a dubious past, legal rights to privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  9. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Assuming Identities: Media, Security and Personal Privacy.Steven DeCaroli - 2003 - In Robin Wang & Timothy Shanahan (eds.), Reason and Insight. pp. 421-430.
    Download  
     
    Export citation  
     
    Bookmark  
  11. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2014 - In Beaete Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 January]1 Effective (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Political Equality and Epistemic Constraints on Voting.Michele Giavazzi - 2024 - Philosophy and Public Affairs 52 (2):147-176.
    As part of recent epistemic challenges to democracy, some have endorsed the implementation of epistemic constraints on voting, institutional mechanisms that bar incompetent voters from participating in public decision-making procedures. This proposal is often considered incompatible with a commitment to political equality. In this paper, I aim to dispute the strength of this latter claim by offering a theoretical justification for epistemic constraints on voting that does not rest on antiegalitarian commitments. Call this the civic accountability justification for epistemic constraints (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for open voting, in (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  14. privacy, democracy and freedom of expression.Annabelle Lever - 2015 - In Beate Rossler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. cambridge University Press.
    this paper argues that people are entitled to keep some true facts about themselves to themselves, should they so wish, as a sign of respect for their moral and political status, and in order to protect themselves from being used as a public example in order to educate or to entertain other people. The “outing” - or non-consensual public disclosure - of people’s health records or status, or their sexual behaviour or orientation is usually unjustified, even when its consequences seem (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  15. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years have (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16. Neuroscience v. privacy? : a democratic perspective.Annabelle Lever - 2012 - In Sarah Richmond, Geraint Rees & Sarah J. L. Edwards (eds.), I know what you're thinking: brain imaging and mental privacy. Oxford: Oxford University Press. pp. 205.
    Recent developments in neuroscience create new opportunities for understanding the human brain. The power to do good, however, is also the power to harm, so scientific advances inevitably foster as many dystopian fears as utopian hopes. For instance, neuroscience lends itself to the fear that people will be forced to reveal thoughts and feelings which they would not have chosen to reveal, and of which they may be unaware. It also lends itself to the worry that people will be encouraged (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Privacy: Restrictions and Decisions.Annabelle Lever - 2013 - In Steven Scalet and Christopher Griffin (ed.), APA Newsletter on Philosophy and Law. pp. 1-6.
    This article forms part of a tribute to Anita L. Allen by the APA newletter on Philosophy and Law. It celebrates Allen's work, but also explains why her conception of privacy is philosophically inadequate. It then uses basic democratic principles and the example of the secret ballot to suggest how we might develop a more philosophically persuasive version of Allen's ideas.
    Download  
     
    Export citation  
     
    Bookmark  
  18. 'Privacy, Private Property and Collective Property'.Annabelle Lever - 2012 - The Good Society 21 (1):47-60.
    This article is part of a symposium on property-owning democracy. In A Theory of Justice John Rawls argued that people in a just society would have rights to some forms of personal property, whatever the best way to organise the economy. Without being explicit about it, he also seems to have believed that protection for at least some forms of privacy are included in the Basic Liberties, to which all are entitled. Thus, Rawls assumes that people are entitled to form (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards ( Anderson 2016 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as morally important—for example, when (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  22. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva 2005 (nov):1-31.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people’s freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  24. Will Hominoids or Androids Destroy the Earth? —A Review of How to Create a Mind by Ray Kurzweil (2012).Michael Starks - 2017 - In Suicidal Utopian Delusions in the 21st Century 4th ed (2019). Henderson, NV USA: Michael Starks. pp. 675.
    Some years ago I reached the point where I can usually tell from the title of a book, or at least from the chapter titles, what kinds of philosophical mistakes will be made and how frequently. In the case of nominally scientific works these may be largely restricted to certain chapters which wax philosophical or try to draw general conclusions about the meaning or long term significance of the work. Normally however the scientific matters of fact are generously interlarded with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Equal protection and same-sex marriage.Kory Schaff - 2006 - Journal of Social Philosophy 35 (1):133–147.
    This paper examines constitutional issues concerning same-sex marriage. Although same-sex relations concern broader ethical issues as well, I set these aside to concentrate primarily on legal questions of privacy rights and equal protection. While sexual orientation is neither a suspect classification like race, nor a quasi classification like gender, there are strong reasons why it should trigger heightened scrutiny of legislation using sexuality as a standard of classification. In what follows, I argue that equal-protection doctrine is better suited for including (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. democratic equality and freedom of religion.Annabelle Lever - 2016 - Philosophy and Public Issues - Filosofia E Questioni Pubbliche 6 (1):55-65.
    According to Corey Brettschneider, we can protect freedom of religion and promote equality, by distinguishing religious groups’ claims to freedom of expression and association from their claims to financial and verbal support from the state. I am very sympathetic to this position, which fits well with my own views of democratic rights and duties, and with the importance of recognizing the scope for political choice which democratic politics offers to governments and to citizens. This room for political choice, I believe, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Equality and Information.Carl Knight & Roger Knight - 2012 - Ethical Perspectives 19 (3):469-499.
    Traditional outcome-orientated egalitarian principles require access to information about the size of individual holdings. Recent egalitarian political theory has sought to accommodate considerations of responsibility. Such a move may seem problematic, in that a new informational burden is thereby introduced, with no apparent decrease in the existing burden. This article uses a simple model with simulated data to examine the extent to which outcome egalitarianism and responsibility-sensitive egalitarianism (‘luck egalitarianism’) can be accurately applied where information is incomplete or erroneous. It (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Equality, Liberty and the Limits of Person-centred Care’s Principle of Co-production.Gabriele Badano - 2019 - Public Health Ethics 12 (2):176-187.
    The idea that healthcare should become more person-centred is extremely influential. By using recent English policy developments as a case study, this article aims to critically analyse an important element of person-centred care, namely, the belief that to treat patients as persons is to think that care should be ‘co-produced’ by formal healthcare providers and patients together with unpaid carers and voluntary organizations. I draw on insights from political philosophy to highlight overlooked tensions between co-production and values like equality and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Anita L. Allen, Why Privacy Isn't Everything: Feminist Reflections on Personal Accountability Reviewed by.Annabelle Lever - 2004 - Philosophy in Review 24 (1):1-3.
    Download  
     
    Export citation  
     
    Bookmark  
  31. Beate Rossler, ed., Privacies: Philosophical Evaluations Reviewed by.Annabelle Lever - 2005 - Philosophy in Review 25 (1):67-69.
    Download  
     
    Export citation  
     
    Bookmark  
  32. Political Liberties and Social Equality.Inigo González-Ricoy & Jahel Queralt - 2018 - Law and Philosophy 37 (6):613-638.
    This paper examines the link between political liberties and social equality, and contends that the former are constitutive of, i.e. necessary to secure, the latter. Although this constitutive link is often assumed in the literature on political liberties, the reasons why it holds true remain largely unexplored. Three such reasons are examined here. First, political liberties are constitutive of social equality because they bestow political power on their holders, leaving disenfranchised individuals excluded from decisions that are particularly pervasive, coercively enforced, (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  33. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The availability of dimensions of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Survey of Enhancing Security of Cloud Using Fog Computing.Abhishek Singh Abhishek Singh - 2019 - International Journal for Research Trends and Innovation 4 (1).
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its portability and heterogeneity. So these issues (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Risk based passenger screening in aviation security: implications and variants of a new paradigm.Sebastian Weydner-Volkmann - 2017 - In Elisa Orrù, Maria-Gracia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking surveillance and control : beyond the "security versus privacy" debate. Baden-Baden: Nomos. pp. 49-83.
    In “Risk Based Passenger Screening in Aviation Security: Implications and Variants of a New Paradigm”, Sebastian Weydner-Volkmann describes the current paradigm shift from ‘traditional’ forms of screening to ‘risk based passenger screening’ (RBS) in aviation security. This paradigm shift is put in the context of the wider historical development of risk management approaches. Through a discussion of Michel Foucault, Herfried Münkler and Ulrich Beck, Weydner-Volkmann analyses the shortcomings of such approaches in public security policies, which become especially evident in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Torture Pornopticon: (In)security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant paradigm within (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is not restricted to, issues (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Casteism, Social Security and Violation of Human Rights.Desh Raj Sirswal - 2012 - In Manoj Kumar (ed.), Human Rights for All. Centre for Positive Philosophy and Interdisciplinary Studies (CPPIS), Pehowa (Kurukshetra). pp. 128-131.
    The consciousness of social security comes to a man when he feels that he is getting his basic rights. Human Rights are related to those rights which are related to man’s life, freedom, equality and self-esteem, are established by Indian constitution or universal declaration of human rights and implemented by Indian judiciary system. In other words, “Human rights are rights inherent to all human beings, whatever our nationality, place of residence, sex, national or ethnic origin, color, religion, language, or any (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Sven Ove Hansson and Elin Palm, eds., The Ethics of Workplace Privacy Reviewed by.Annabelle Lever - 2006 - Philosophy in Review 26 (5):348-350.
    Download  
     
    Export citation  
     
    Bookmark  
  42. Procedure-Based Substantive Equality: Pure Procedural Justice and Property-Owning Democracy.dai oba - 2020 - Archiv für Rechts- und Sozialphilosophie:107–121.
    This paper examines two ideas of John Rawls that are rarely discussed in conjunction: pure procedural justice (PPJ) and property-owning democracy. Applied to matters of distribu- tion, PPJ orders the establishment of fair procedures under which any private transaction can be considered just. It aims to secure equality without fixating on patterns of distribu- tion. How such an approach is constituted and how it applies to different stages of theori- sation are explored. Three components of PPJ and three guidelines for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and ethicality on data scientists, or data engineer (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
    Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of a (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. STC database for SQL Range Queries digital apps with Privacy Preserving.Chandran Sudhin - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):49-59.
    Businesses and people outsource database to realize helpful and low-cost applications and administrations. In arrange to supply adequate usefulness for SQL inquiries, numerous secure database plans have been proposed. In any case, such plans are helpless to protection leakage to cloud server. The most reason is that database is facilitated and handled in cloud server, which is past the control of information proprietors. For the numerical extend inquiry (“>”, “<”, etc.), those plans cannot give adequate protection security against viable challenges, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. The Pragmatic Pyramid: John Dewey on Gardening and Food Security.Shane J. Ralston - 2014 - Social Philosophy Today 30 (1):63-76.
    Despite the minimal attention paid by philosophers to gardening, the activity has a myriad of philosophical implications—aesthetic, ethical, political, and even edible. The same could be said of community food security and struggles for food justice. Two of gardening’s most significant practical benefits are that it generates communal solidarity and provides sustenance for the needy and undernourished during periods of crisis. In the twentieth century, large-scale community gardening in the U.S. and Canada coincided with relief projects during war-time and economic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  73
    Convergence of the source control and actual access accounts of privacy.Haleh Asgarinia - 2023 - AI and Ethics 3 (1).
    In this paper, it is argued that, when properly revised in the face of counter-examples, the source control and actual access views of privacy are extensionally equivalent but different in their underlying rationales. In this sense, the source control view and the actual access view, when properly modified to meet counter-examples, can be metaphorically compared to ‘climbing the same mountain but from different sides’ (as Parfit [1] has argued about normative theories). These two views can equally apply to the privacy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Justice after Catastrophe: Responsibility and Security.Makoto Usami - 2015 - Ritsumeikan Studies in Language and Culture 26 (4):215-230.
    The issue of justice after catastrophe is an enormous challenge to contemporary theories of distributive justice. In the past three decades, the controversy over distributive justice has centered on the ideal of equality. One of intensely debated issues concerns what is often called the “equality of what,” on which there are three primary views: welfarism, resourcism, and the capabilities approach. Another major point of dispute can be termed the “equality or another,” about which three positions debate: egalitarianism, prioritarianism, and sufficientarianism. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Book Review: A Response to James Rule.Annabelle Lever - 2014 - Journal of Law, Culture, and Humanities 10 (1).
    James Rule is puzzled by the ‘idiosyncratic’ approach that I take to the philosophical study of privacy. As evidence for this idiosyncracy, he cites my relative indifference to the distinction between consequentialist and deontological perspectives on privacy although these differences are proof of ‘intricate, yet enormously consequential intellectual tensions’. My choice of philosophical topics is ‘unsystematic’ and more a reflection of my own ‘intellectual hobby-horses’ than a ‘well-worked-out view of what students most need to know’. Finally, Rule concludes, because ‘the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 998