Results for 'value of privacy'

959 found
Order:
  1. Design for Embedding the Value of Privacy in Personal Information Management Systems.Haleh Asgarinia - 2024 - Journal of Ethics and Emerging Technologies 33 (1):1-19.
    Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around the design of privacy-friendly systems that comply with legal requirements, there has been relatively limited philosophical discourse on incorporating the value of privacy into these systems. Exploring the connection between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Privacy and the Common Good: G. H. Mead and the Social Value of Privacy.Yuval Goldfus - manuscript
    This article explores the social value of privacy and the intricate relationship between personal autonomy and societal cohesion within the realm of privacy. It contrasts George Herbert Mead’s two models of social organization—hostility and integration—in terms of their impact on the interplay between individuals and society. The model of hostility envisions individuals and society engaged in a zero-sum game, resulting in diminished individuality and an atomistic view of autonomy. In contrast, the model of integration recognizes the interdependence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Privacy and the USA patriot act: Rights, the value of rights, and autonomy.Alan Rubel - 2007 - Law and Philosophy 26 (2):119-159.
    Civil liberty and privacy advocates have criticized the USA PATRIOT Act (Act) on numerous grounds since it was passed in the wake of the World Trade Center attacks in 2001. Two of the primary targets of those criticisms are the Act’s sneak-and-peek search provision, which allows law enforcement agents to conduct searches without informing the search’s subjects, and the business records provision, which allows agents to secretly subpoena a variety of information – most notoriously, library borrowing records. Without attending (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  4. The Particularized Judgment Account of Privacy.Alan Rubel - 2011 - Res Publica 17 (3):275-290.
    Questions of privacy have become particularly salient in recent years due, in part, to information-gathering initiatives precipitated by the 2001 World Trade Center attacks, increasing power of surveillance and computing technologies, and massive data collection about individuals for commercial purposes. While privacy is not new to the philosophical and legal literature, there is much to say about the nature and value of privacy. My focus here is on the nature of informational privacy. I argue that (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  5. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7. The Epistemic Account of Privacy.Martijn Blaauw - 2013 - Episteme 10 (2):167-177.
    Privacy is valued by many. But what it means to have privacy remains less than clear. In this paper, I argue that the notion of privacy should be understood in epistemic terms. What it means to have (some degree of) privacy is that other persons do not stand in significant epistemic relations to those truths one wishes to keep private.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  8.  56
    Privacy: scepticism, normative approaches and legal protection. A review of the theoretical debate and a discussion of recent developments in the EU.Elisa Orrù - 2022 - Dpce Online 52 (2):779–800.
    Digitalisation has lent the right to privacy increasing philosophical and legal relevance. However, privacy’s epistemic status and associated normative values are constantly subject to radical criticisms. This article investigates the validity, in theory and practice, of three radical critiques of privacy. A review of the philosophical and interdisciplinary discourse on privacy during the last half century is followed by analyses of recent legal developments within the EU. Privacy emerges as a highly differentiated and powerful tool (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Theatre of Privacy: Vision, Self, and Narrative in Nabokov's Russian Language Novels.Gregory Khasin - 1999 - Dissertation, The University of Chicago
    This dissertation is an attempt to find a single framework for understanding two seemingly conflicting aspects of Nabokov's Russian novels---the metaphysical and the existential. The metaphysical aspect is analyzed according to Leibniz's "Monadology," with its key concepts of the monad, pre-established harmony, the optimization of the universe, and sufficient reason. The existential aspect is examined according to Sartre's theory of the gaze from "Being and Nothingness"; its main notions are being-for-another, radical individuation and intersubjective struggle. Concern with the level of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. (1 other version)Must privacy and sexual equality conflict? A philosophical examination of some legal evidence.Annabelle Lever - 2001 - Social Research: An International Quarterly 67 (4):1137-1171.
    Are rights to privacy consistent with sexual equality? In a brief, but influential, article Catherine MacKinnon trenchantly laid out feminist criticisms of the right to privacy. In “Privacy v. Equality: Beyond Roe v. Wade” she linked familiar objections to the right to privacy and connected them to the fate of abortion rights in the U.S.A. (MacKinnon, 1983, 93-102). For many feminists, the Supreme Court’s decision in Roe v. Wade (1973) had suggested that, notwithstanding a dubious past, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Privacy, Autonomy, and Personalised targeting: Rethinking How Personal Data is Used.Karina Vold & Jessica Whittlestone - 2020 - In Carissa Veliz (ed.), Report on Data, Privacy, and the Individual in the Digital Age.
    Technological advances are bringing new light to privacy issues and changing the reasons for why privacy is important. These advances have changed not only the kind of personal data that is available to be collected, but also how that personal data can be used by those who have access to it. We are particularly concerned with how information about personal attributes inferred from collected data (such as online behaviour), can be used to tailor messages and services to specific (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  13.  83
    Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In P. Leenes R. Van Brakel R. Gutwirth S. De Hert (ed.), Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  81
    Privacy and Democracy.Paul Voice - 2016 - South African Journal of Philosophy 35 (3):1-9.
    The meaning of privacy has been frequently disputed in the philosophical and -/- legal literature since Warren and Brandeis first argued for it as a distinct and -/- important personal and social value. Nevertheless, while the meaning of privacy -/- is held to be vague, there is general agreement that Warren and Brandeis were -/- correct in their assessment of its value. Theorists of democracy, on the other hand, -/- have been ambivalent towards the realm of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. privacy and democracy: what the secret ballot reveals.Annabelle Lever - 2015 - Law, Culture and the Humanities 11 (2).
    : Does the rejection of pure proceduralism show that we should adopt Brettschneider’s value theory of democracy? The answer, this paper suggests, is ‘no’. There are a potentially infinite number of incompatible ways to understand democracy, of which the value theory is, at best, only one. The paper illustrates and substantiates its claims by looking at what the secret ballot shows us about the importance of privacy and democracy. Drawing on the reasons to reject Mill’s arguments for (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  18. A Framework for Analyzing and Comparing Privacy States.Alan Rubel & Ryan Biava - 2014 - JASIST: The Journal of the American Society for Information Science and Technology 65 (12):2422-2431.
    This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection. This framework provides a method to describe precisely aspects of privacy and context and a flexible vocabulary and notation for such descriptions and comparisons. Moreover, it links philosophical and conceptual work on privacy to social science and policy work and accommodates different conceptions of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  64
    Privacy and Machine Learning- Based Artificial Intelligence: Philosophical, Legal, and Technical Investigations.Haleh Asgarinia - 2024 - Dissertation, Department of Philisophy, University of Twente
    This dissertation consists of five chapters, each written as independent research papers that are unified by an overarching concern regarding information privacy and machine learning-based artificial intelligence (AI). This dissertation addresses the issues concerning privacy and AI by responding to the following three main research questions (RQs): RQ1. ‘How does an AI system affect privacy?’; RQ2. ‘How effectively does the General Data Protection Regulation (GDPR) assess and address privacy issues concerning both individuals and groups?’; and RQ3. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Privacy, Ethics, and Institutional Research.Alan Rubel - 2019 - New Directions in Institutional Research 2019 (183):5-16.
    Despite widespread agreement that privacy in the context of education is important, it can be difficult to pin down precisely why and to what extent it is important, and it is challenging to determine how privacy is related to other important values. But that task is crucial. Absent a clear sense of what privacy is, it will be difficult to understand the scope of privacy protections in codes of ethics. Moreover, privacy will inevitably conflict with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  22. Neuroscience v. privacy? : a democratic perspective.Annabelle Lever - 2012 - In Sarah Richmond, Geraint Rees & Sarah J. L. Edwards (eds.), I know what you're thinking: brain imaging and mental privacy. Oxford: Oxford University Press. pp. 205.
    Recent developments in neuroscience create new opportunities for understanding the human brain. The power to do good, however, is also the power to harm, so scientific advances inevitably foster as many dystopian fears as utopian hopes. For instance, neuroscience lends itself to the fear that people will be forced to reveal thoughts and feelings which they would not have chosen to reveal, and of which they may be unaware. It also lends itself to the worry that people will be encouraged (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Imaginative Value Sensitive Design: Using Moral Imagination Theory to Inform Responsible Technology Design.Steven Umbrello - 2020 - Science and Engineering Ethics 26 (2):575-595.
    Safe-by-Design (SBD) frameworks for the development of emerging technologies have become an ever more popular means by which scholars argue that transformative emerging technologies can safely incorporate human values. One such popular SBD methodology is called Value Sensitive Design (VSD). A central tenet of this design methodology is to investigate stakeholder values and design those values into technologies during early stage research and development (R&D). To accomplish this, the VSD framework mandates that designers consult the philosophical and ethical literature (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  24. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  25. Does privacy undermine community.Mark Tunick - 2001 - Journal of Value Inquiry 35 (4):517-534.
    Does privacy--the condition of being invisible to public scrutiny--in so emphasizing individual rights, undermine community? One objection to privacy is that it is a license to engage in antisocial activity that undermines social norms. Another objection is that privacy encourages isolation and anonymity, also undermining community. Drawing on the political theory of Hegel, I argue that privacy can promote community. Some invasions of privacy can undermine a sort of autonomy essential for maintaining a community. I (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  26. Notice After Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’t.Daniel Susser - 2019 - Journal of Information Policy 9:37-62.
    The dominant legal and regulatory approach to protecting information privacy is a form of mandated disclosure commonly known as “notice-and-consent.” Many have criticized this approach, arguing that privacy decisions are too complicated, and privacy disclosures too convoluted, for individuals to make meaningful consent decisions about privacy choices—decisions that often require us to waive important rights. While I agree with these criticisms, I argue that they only meaningfully call into question the “consent” part of notice-and-consent, and that (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  27. Ethics of Driving Automation. Artificial Agency and Human Values.Fabio Fossa - 2023 - Cham: Springer.
    This book offers a systematic and thorough philosophical analysis of the ways in which driving automation crosses path with ethical values. Upon introducing the different forms of driving automation and examining their relation to human autonomy, it provides readers with in-depth reflections on safety, privacy, moral judgment, control, responsibility, sustainability, and other ethical issues. Driving is undoubtedly a moral activity as a human act. Transferring it to artificial agents such as connected and automated vehicles necessarily raises many philosophical questions. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  28. Adopting trust as an ex post approach to privacy.Haleh Asgarinia - 2024 - AI and Ethics 3 (4).
    This research explores how a person with whom information has been shared and, importantly, an artificial intelligence (AI) system used to deduce information from the shared data contribute to making the disclosure context private. The study posits that private contexts are constituted by the interactions of individuals in the social context of intersubjectivity based on trust. Hence, to make the context private, the person who is the trustee (i.e., with whom information has been shared) must fulfil trust norms. According to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Imaginative Value Sensitive Design: How Moral Imagination Exceeds Moral Law Theories in Informing Responsible Innovation.Steven Umbrello - 2018 - Dissertation, University of Edinburgh
    Safe-by-Design (SBD) frameworks for the development of emerging technologies have become an ever more popular means by which scholars argue that transformative emerging technologies can safely incorporate human values. One such popular SBD methodology is called Value Sensitive Design (VSD). A central tenet of this design methodology is to investigate stakeholder values and design those values into technologies during early stage research and development (R&D). To accomplish this, the VSD framework mandates that designers consult the philosophical and ethical literature (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Conflicting Aims and Values in the Application of Smart Sensors in Geriatric Rehabilitation: Ethical Analysis.Christopher Predel, Cristian Timmermann, Frank Ursin, Marcin Orzechowski, Timo Ropinski & Florian Steger - 2022 - JMIR mHealth and uHealth 10 (6):e32910.
    Background: Smart sensors have been developed as diagnostic tools for rehabilitation to cover an increasing number of geriatric patients. They promise to enable an objective assessment of complex movement patterns. -/- Objective: This research aimed to identify and analyze the conflicting ethical values associated with smart sensors in geriatric rehabilitation and provide ethical guidance on the best use of smart sensors to all stakeholders, including technology developers, health professionals, patients, and health authorities. -/- Methods: On the basis of a systematic (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Justifying Public Health Surveillance: Basic Interests, Unreasonable Exercise, and Privacy.Alan Rubel - 2012 - Kennedy Institute of Ethics Journal 22 (1):1-33.
    Surveillance plays a crucial role in public health, and for obvious reasons conflicts with individual privacy. This paper argues that the predominant approach to the conflict is problematic, and then offers an alternative. It outlines a Basic Interests Approach to public health measures, and the Unreasonable Exercise Argument, which sets forth conditions under which individuals may justifiably exercise individual privacy claims that conflict with public health goals. The view articulated is compatible with a broad range conceptions of the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Pandemic surveillance: ethics at the intersection of information, research, and health.Daniel Susser - 2022 - In Margaret Hu (ed.), Pandemic Surveillance: Privacy, Security, and Data Ethics. Cheltenham, UK: Edward Elgar. pp. 187-196.
    This chapter provides a high-level overview of key ethical issues raised by the use of surveillance technologies, such as digital contact tracing, disease surveillance, and vaccine passports, to combat the COVID-19 pandemic. To some extent, these issues are entirely familiar. I argue that they raise old questions in new form and with new urgency, at the intersection of information ethics, research ethics, and public health. Whenever we deal with data-driven technologies, we have to ask how they fare in relation to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  73
    Decisional Value Scores.Gabriella Waters, William Mapp & Phillip Honenberger - 2024 - AI and Ethics 2024.
    Research in ethical AI has made strides in quantitative expression of ethical values such as fairness, transparency, and privacy. Here we contribute to this effort by proposing a new family of metrics called “decisional value scores” (DVS). DVSs are scores assigned to a system based on whether the decisions it makes meet or fail to meet a particular standard (either individually, in total, or as a ratio or average over decisions made). Advantages of DVS include greater discrimination capacity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. New Frontiers in the Philosophy of Intellectual Property.Annabelle Lever - 2012 - Cambridge University Press.
    The new frontiers in the philosophy of intellectual property lie squarely in territories belonging to moral and political philosophy, as well as legal philosophy and philosophy of economics – or so this collection suggests. Those who wish to understand the nature and justification of intellectual property may now find themselves immersed in philosophical debates on the structure and relative merits of consequentialist and deontological moral theories, or disputes about the nature and value of privacy, or the relationship between (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  36. Trust in technology: interlocking trust concepts for privacy respecting video surveillance.Sebastian Weydner-Volkmann & Linus Feiten - 2021 - Journal of Information, Communication and Ethics in Society 19 (4):506-520.
    Purpose The purpose of this paper is to defend the notion of “trust in technology” against the philosophical view that this concept is misled and unsuitable for ethical evaluation. In contrast, it is shown that “trustworthy technology” addresses a critical societal need in the digital age as it is inclusive of IT-security risks not only from a technical but also from a public layperson perspective. Design/methodology/approach From an interdisciplinary perspective between philosophy andIT-security, the authors discuss a potential instantiation of a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  37. Legal Archetypes and Metadata Collection.Alan Rubel - 2017 - Wisconsin International Law Review 34 (4):823-853.
    In discussions of state surveillance, the values of privacy and security are often set against one another, and people often ask whether privacy is more important than national security.2 I will argue that in one sense privacy is more important than national security. Just what more important means is its own question, though, so I will be more precise. I will argue that national security rationales cannot by themselves justify some kinds of encroachments on individual privacy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. (1 other version)Navigating conflicts of justice in the use of race and ethnicity in precision medicine.G. Owen Schaefer, Tai E. Shyong & Shirley Hsiao-Li Sun - 2020 - Bioethics 34 (8):849-856.
    Given the sordid history of injustices linking genetics to race and ethnicity, considerations of justice are central to ensuring the responsible development of precision medicine programmes around the world. While considerations of justice may be in tension with other areas of concern, such as scientific value or privacy, there are also tensions between different aspects of justice. This paper focuses on three particular aspects of justice relevant to this precision medicine: social justice, distributive justice and human rights. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Quantum Technologies in Industry 4.0: Navigating the Ethical Frontier with Value-Sensitive Design.Steven Umbrello - 2024 - Procedia Computer Science 232:1654-1662.
    With the emergence of quantum technologies such as quantum computing, quantum communications, and quantum sensing, new potential has emerged for smart manufacturing and Industry 4.0. These technologies, however, present ethical concerns that must be addressed in order to ensure they are developed and used responsibly. This article outlines some of the ethical challenges that quantum technologies may raise for Industry 4.0 and presents the value sensitive design methodology as a strategy for ethics-by-design of quantum computing in Industry 4.0. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. The Threat of Algocracy: Reality, Resistance and Accommodation.John Danaher - 2016 - Philosophy and Technology 29 (3):245-268.
    One of the most noticeable trends in recent years has been the increasing reliance of public decision-making processes on algorithms, i.e. computer-programmed step-by-step instructions for taking a given set of inputs and producing an output. The question raised by this article is whether the rise of such algorithmic governance creates problems for the moral or political legitimacy of our public decision-making processes. Ignoring common concerns with data protection and privacy, it is argued that algorithmic governance does pose a significant (...)
    Download  
     
    Export citation  
     
    Bookmark   57 citations  
  41. Inferences and the Right to Privacy.Jakob Mainz - 2024 - Journal of Value Inquiry 58 (4):563-581.
    In this paper, I defend what I call the ‘Inference Principle’. This principle holds that if an agent obtains some information legitimately, then the agent can make any inference she wants based on the information, without violating anyone’s right to privacy. This principle is interesting for at least three reasons. First, it constitutes a novel answer to the timely question of whether the widespread use of ‘data analytics’ to infer personal information about individuals is morally permissible. Second, it contradicts (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  42. The Temptation of Data-enabled Surveillance: Are Universities the Next Cautionary Tale?Alan Rubel & Kyle M. L. Jones - 2020 - Communications of the Acm 4 (63):22-24.
    There is increasing concern about “surveillance capitalism,” whereby for-profit companies generate value from data, while individuals are unable to resist (Zuboff 2019). Non-profits using data-enabled surveillance receive less attention. Higher education institutions (HEIs) have embraced data analytics, but the wide latitude that private, profit-oriented enterprises have to collect data is inappropriate. HEIs have a fiduciary relationship to students, not a narrowly transactional one (see Jones et al, forthcoming). They are responsible for facets of student life beyond education. In addition (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Bad by Nature, An Axiological Theory of Pain.Olivier Massin - 2017 - In Jennifer Corns (ed.), The Routledge Handbook of Philosophy of Pain. New York: Routledge. pp. 321-333.
    This chapter defends an axiological theory of pain according to which pains are bodily episodes that are bad in some way. Section 1 introduces two standard assumptions about pain that the axiological theory constitutively rejects: (i) that pains are essentially tied to consciousness and (ii) that pains are not essentially tied to badness. Section 2 presents the axiological theory by contrast to these and provides a preliminary defense of it. Section 3 introduces the paradox of pain and argues that since (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  44. THE DEVELOPMENT OF MORALITY IN HUMAN LIFE: AN OVERVIEW.Desh Raj Sirswal - 2014 - Milestone Education Review 5 (01):25-35.
    Presently philosophers, social theorists, educationists and legal scholars are busy with issues of contemporary importance such as affirmative actions, animal’s rights, capital punishment, cloning, euthanasia, immigration, pornography, privacy in civil society, values in nature, human rights, cultural values and world hunger etc. Since ancient time ethics is one of the most important part of philosophical speculations and human development. The development of morality comes under three stages viz. intrinsic morality, customary morality and reflective morality. Intrinsic morality has traditionally been (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. A Different Type of Individualism in Zhuangzi.Keqian Xu - 2011 - Dao: A Journal of Comparative Philosophy 10 (4):445-462.
    Although being widely considered as only a Western tradition, individualism is not absent in traditional Chinese philosophy and culture. In some of the classic Chinese philosophic works such as Zhuangzi, we can clearly identify some elements which can be appropriately attributed to “individualism”, such as the awareness of individual “self” as an independent and unique existence, advocating individual freedom and liberty, emphasizing on the value and dignity of individual life, favoring individuals’ autonomy and privacy, pursuing unconstrained development in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Ethics of Artificial Intelligence.Stefan Buijsman, Michael Klenk & Jeroen van den Hoven - forthcoming - In Nathalie Smuha (ed.), Cambridge Handbook on the Law, Ethics and Policy of AI. Cambridge University Press.
    Artificial Intelligence (AI) is increasingly adopted in society, creating numerous opportunities but at the same time posing ethical challenges. Many of these are familiar, such as issues of fairness, responsibility and privacy, but are presented in a new and challenging guise due to our limited ability to steer and predict the outputs of AI systems. This chapter first introduces these ethical challenges, stressing that overviews of values are a good starting point but frequently fail to suffice due to the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Decision Time: Normative Dimensions of Algorithmic Speed.Daniel Susser - forthcoming - ACM Conference on Fairness, Accountability, and Transparency (FAccT '22).
    Existing discussions about automated decision-making focus primarily on its inputs and outputs, raising questions about data collection and privacy on one hand and accuracy and fairness on the other. Less attention has been devoted to critically examining the temporality of decision-making processes—the speed at which automated decisions are reached. In this paper, I identify four dimensions of algorithmic speed that merit closer analysis. Duration (how much time it takes to reach a judgment), timing (when automated systems intervene in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Measuring Automated Influence: Between Empirical Evidence and Ethical Values.Daniel Susser & Vincent Grimaldi - forthcoming - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society.
    Automated influence, delivered by digital targeting technologies such as targeted advertising, digital nudges, and recommender systems, has attracted significant interest from both empirical researchers, on one hand, and critical scholars and policymakers on the other. In this paper, we argue for closer integration of these efforts. Critical scholars and policymakers, who focus primarily on the social, ethical, and political effects of these technologies, need empirical evidence to substantiate and motivate their concerns. However, existing empirical research investigating the effectiveness of these (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. (1 other version)Will Hominoids or Androids Destroy the Earth? —A Review of How to Create a Mind by Ray Kurzweil (2012).Michael Starks - 2016 - In Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Las Vegas, USA: Reality Press. pp. 675.
    Some years ago I reached the point where I can usually tell from the title of a book, or at least from the chapter titles, what kinds of philosophical mistakes will be made and how frequently. In the case of nominally scientific works these may be largely restricted to certain chapters which wax philosophical or try to draw general conclusions about the meaning or long term significance of the work. Normally however the scientific matters of fact are generously interlarded with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Operationalizing the Ethics of Connected and Automated Vehicles. An Engineering Perspective.Fabio Fossa - 2022 - International Journal of Technoethics 13 (1):1-20.
    In response to the many social impacts of automated mobility, in September 2020 the European Commission published Ethics of Connected and Automated Vehicles, a report in which recommendations on road safety, privacy, fairness, explainability, and responsibility are drawn from a set of eight overarching principles. This paper presents the results of an interdisciplinary research where philosophers and engineers joined efforts to operationalize the guidelines advanced in the report. To this aim, we endorse a function-based working approach to support the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 959