Switch to: References

Add citations

You must login to add citations.
  1. A critical contribution to theoretical foundations of privacy studies.Thomas Allmer - 2011 - Journal of Information, Communication and Ethics in Society 9 (2):83-101.
    PurposeAlthough there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if there is a gap in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy concerns in integrating big data in “e-Oman”.Stuti Saxena - 2017 - Journal of Information, Communication and Ethics in Society 15 (4):385-396.
    Purpose Whereas integration of big data in “e-Oman” – the e-government face of Oman – is a significant prospect, this paper aims to underscore the challenges of privacy concerns in effecting such integration. Design/methodology/approach Providing a brief description about the concepts of e-government and big data, the paper follows a discussion on “e-Oman”. While drawing a framework for integration of big data in “e-Oman”, the paper throws light on the privacy concerns in effecting such an integration following a qualitative approach. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • The counter‐control revolution: “silent control” of individuals through dataveillance systems.Yohko Orito - 2011 - Journal of Information, Communication and Ethics in Society 9 (1):5-19.
    PurposeThe purpose of this paper is to examine the social impacts of “silent control” of individuals by means of the architecture of dataveillance systems. It addresses the question whether individuals, in reality, can actually determine autonomously the kinds of information that they can acquire and convey in today's dataveillance environments. The paper argues that there is a risk of a “counter‐control revolution” that may threaten to reverse the “control revolution” described by Shapiro.Design/methodology/approachUsing relevant business cases, this paper describes the nature (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Rethinking the concept of the right to information privacy: a Japanese perspective.Kiyoshi Murata & Yohko Orito - 2008 - Journal of Information, Communication and Ethics in Society 6 (3):233-245.
    PurposeThe purpose of this paper is to reconsider the concept of the right to information privacy and to propose, from a Japanese perspective, a revised conception of this right that is suitable for the modern information society.Design/methodology/approachFirst, the concept of privacy and personal information protection in the information society is briefly explained. After that, confused situations in Japan caused by the enforcement of Act on the Protection of Personal Information are described followed by the analysis of the Japanese socio‐cultural circumstances (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Online diaries: Reflections on trust, privacy, and exhibitionism. [REVIEW]Paul B. de Laat - 2008 - Ethics and Information Technology 10 (1):57-69.
    Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Online diaries: Reflections on trust, privacy, and exhibitionism.Paul Laat - 2008 - Ethics and Information Technology 10 (1):57-69.
    Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Workplace surveillance, privacy and distributive justice.Lucas D. Introna - 2000 - Acm Sigcas Computers and Society 30 (4):33-39.
    Modern technologies are providing unprecedented opportunities for surveillance. In the workplace surveillance technology is being built into the very infrastructure of work. Can the employee legitimately resist this increasingly pervasive net of surveillance? The employers argue that workplace surveillance is essential for security, safety, and productivity in increasingly competitive markets. They argue that they have a right to ensure that they 'get what they pay for', furthermore, that the workplace is a place of 'work' which by its very definition excludes (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy in the information age: Stakeholders, interests and values. [REVIEW]Lucas Introna & Athanasia Pouloudi - 1999 - Journal of Business Ethics 22 (1):27 - 38.
    Privacy is a relational and relative concept that has been defined in a variety of ways. In this paper we offer a systematic discussion of potentially different notions of privacy. We conclude that privacy as the freedom or immunity from the judgement of others is an extremely useful concept to develop ways in which to understand privacy claims and associated risks. To this end, we develop a framework of principles that explores the interrelations of interests and values for various stakeholders (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Towards an alternative concept of privacy.Christian Fuchs - 2011 - Journal of Information, Communication and Ethics in Society 9 (4):220-237.
    PurposeThere are a lot of discussions about privacy in relation to contemporary communication systems (such as Facebook and other “social media” platforms), but discussions about privacy on the internet in most cases misses a profound understanding of the notion of privacy and where this notion is coming from. The purpose of this paper is to challenge the liberal notion of privacy and explore foundations of an alternative privacy conception.Design/methodology/approachA typology of privacy definitions is elaborated based on Giddens' theory of structuration. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  • Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice. [REVIEW]Leigh A. Clark & Sherry J. Roberts - 2010 - Journal of Business Ethics 95 (4):507 - 525.
    The Internet has drastically changed how people interact, communicate, conduct business, seek jobs, find partners, and shop. Millions of people are using social networking sites to connect with others, and employers are using these sites as a source of background information on jobapplicants.Employers report making decisions not to hire people based on the information posted on social networking sites. Few employers have policies in place to govern when and how these online character checks should be used and how to ensure (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice.Leigh A. Clark & Sherry J. Roberts - 2010 - Journal of Business Ethics 95 (4):507-525.
    The Internet has drastically changed how people interact, communicate, conduct business, seek jobs, find partners, and shop. Millions of people are using social networking sites to connect with others, and employers are using these sites as a source of background information on job applicants. Employers report making decisions not to hire people based on the information posted on social networking sites. Few employers have policies in place to govern when and how these online character checks should be used and how (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • Locating a space for ethics to appear in decision-making: Privacy as an exemplar. [REVIEW]William Bonner - 2007 - Journal of Business Ethics 70 (3):221 - 234.
    Using concepts from Ulrich Beck’s Risk Society, this paper argues that as expertise proliferates questions of ethics in decision-making fall through gaps between domains of expertise. As a consequence, unethical outcomes are unattached to actions taken with no one accountable or responsible for these outcomes. Using Actor-Network Theory (ANT), a case study is presented showing how the sale of students’ personal information by the Calgary Board of Education (CBE) escaped questions of ethics. The sale of student information was the product (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Locating a Space for Ethics to Appear in Decision-making: Privacy as an Exemplar.William Bonner - 2007 - Journal of Business Ethics 70 (3):221-234.
    Using concepts from Ulrich Beck's Risk Society, this paper argues that as expertise proliferates questions of ethics in decision-making fall through gaps between domains of expertise. As a consequence, unethical outcomes are unattached to actions taken with no one accountable or responsible for these outcomes. Using Actor-Network Theory, a case study is presented showing how the sale of students' personal information by the Calgary Board of Education escaped questions of ethics. The sale of student information was the product of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy self-management and the issue of privacy externalities: of thwarted expectations, and harmful exploitation.Simeon de Brouwer - 2020 - Internet Policy Review 9 (4).
    This article argues that the self-management of one’s privacy is impossible due to privacy externalities. Privacy externalities are the negative by-product of the services offered by some data controllers, whereby the price to ‘pay’ for a service includes not just the provision of the user’s own personal data, but also that of others. This term, related to similar concepts from the literature on privacy such as ‘networked privacy’ or ‘data pollution’, is used here to bring to light the incentives and (...)
    Direct download  
     
    Export citation  
     
    Bookmark