Switch to: References

Add citations

You must login to add citations.
  1. Surveillance, privacy and the ethics of vehicle safety communication technologies.M. Zimmer - 2005 - Ethics and Information Technology 7 (4):201-210.
    Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • “But the data is already public”: on the ethics of research in Facebook.Michael Zimmer - 2010 - Ethics and Information Technology 12 (4):313-325.
    In 2008, a group of researchers publicly released profile data collected from the Facebook accounts of an entire cohort of college students from a US university. While good-faith attempts were made to hide the identity of the institution and protect the privacy of the data subjects, the source of the data was quickly identified, placing the privacy of the students at risk. Using this incident as a case study, this paper articulates a set of ethical concerns that must be addressed (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   49 citations  
  • Research ethics in internet-enabled research: Human subjects issues and methodological myopia. [REVIEW]Joseph B. Walther - 2002 - Ethics and Information Technology 4 (3):205-216.
    As Internet resources are usedmore frequently for research on social andpsychological behavior, concerns grow aboutwhether characteristics of such research affecthuman subjects protections. Early efforts toaddress such concerns have done more toidentify potential problems than to evaluatethem or to seek solutions, leaving bodiescharged with human subjects oversight in aquagmire. This article critiques some of theseissues in light of the US Code of FederalRegulations' policies for the Protection ofHuman Subjects, and argues that some of theissues have no pertinence when examined in thecontext (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Privacy as life, liberty, property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.
    The cluster of concerns usually identified asmatters of privacy can be adequately accountedfor by unpacking our natural rights to life,liberty, and property. Privacy as derived fromfundamental natural rights to life, liberty,and property encompasses the advantages of thecontrol and restricted access theories withouttheir attendant difficulties.
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  • Legal conventionalism in the U.s. Constitutional law of privacy*: Mark Tushnet.Mark Tushnet - 2000 - Social Philosophy and Policy 17 (2):141-164.
    Drawing on themes important in moral and political philosophy, much of the scholarship on the constitutional law of privacy in the United States distinguishes between privacy understood as a person's control over information and privacy understood as a person's ability to make autonomous decisions. For example, Katz v. United States established the framework for analyzing whether police activity constituted a “search” subject to the Fourth Amendment's requirement that the police either obtain a warrant before conducting a search or otherwise act (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are not readily accessible, or (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • The teleological account of proportional surveillance.Frej Klem Thomsen - 2020 - Res Publica (3):1-29.
    This article analyses proportionality as a potential element of a theory of morally justified surveillance, and sets out a teleological account. It draws on conceptions in criminal justice ethics and just war theory, defines teleological proportionality in the context of surveillance, and sketches some of the central values likely to go into the consideration. It then explores some of the ways in which deontologists might want to modify the account and illustrates the difficulties of doing so. Having set out the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • The state of computer ethics as a philosophical field of inquiry: Some contemporary perspectives, future projections, and current resources. [REVIEW]Herman T. Tavani - 2001 - Ethics and Information Technology 3 (2):97-108.
    The present article focusesupon three aspects of computer ethics as aphilosophical field: contemporary perspectives,future projections, and current resources.Several topics are covered, including variouscomputer ethics methodologies, the `uniqueness'of computer ethics questions, and speculationsabout the impact of globalization and theinternet. Also examined is the suggestion thatcomputer ethics may `disappear' in the future.Finally, there is a brief description ofcomputer ethics resources, such as journals,textbooks, conferences and associations.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • The Struggle Between Liberties and Authorities in the Information Age.Mariarosaria Taddeo - 2015 - Science and Engineering Ethics 21 (5):1125-1138.
    The “struggle between liberties and authorities”, as described by Mill, refers to the tension between individual rights and the rules restricting them that are imposed by public authorities exerting their power over civil society. In this paper I argue that contemporary information societies are experiencing a new form of such a struggle, which now involves liberties and authorities in the cyber-sphere and, more specifically, refers to the tension between cyber-security measures and individual liberties. Ethicists, political philosophers and political scientists have (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  • visibility Before Privacy: A Theological Ethics of Surveillance as Social Sorting.Eric Stoddart - 2014 - Studies in Christian Ethics 27 (1):33-49.
    This article offers a theological ethics of surveillance in its form as social sorting. The skill of visibility is deployed as an analytical device to critique the saliency of privacy rights-talk, given the focus of surveillance having shifted from a panoptic gaze to actionable intelligence. The claim is made that an ideology of normativity and the political categories of ‘evil’ and ‘risky’ persons can be addressed by the notions of relational knowledge, the resurrection of the non-person and the power of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity of citizens (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
  • Granny and the robots: ethical issues in robot care for the elderly.Amanda Sharkey & Noel Sharkey - 2012 - Ethics and Information Technology 14 (1):27-40.
    The growing proportion of elderly people in society, together with recent advances in robotics, makes the use of robots in elder care increasingly likely. We outline developments in the areas of robot applications for assisting the elderly and their carers, for monitoring their health and safety, and for providing them with companionship. Despite the possible benefits, we raise and discuss six main ethical concerns associated with: (1) the potential reduction in the amount of human contact; (2) an increase in the (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   110 citations  
  • Piercing the veil: Ethical issues in ethnographic research.Brian Schrag - 2008 - Science and Engineering Ethics 15 (2):135-160.
    It is not unusual for researchers in ethnography (and sometimes Institutional Review Boards) to assume that research of “public” behavior is morally unproblematic. I examine an historical case of ethnographic research and the sustained moral outrage to the research expressed by the subjects of that research. I suggest that the moral outrage was legitimate and articulate some of the ethical issues underlying that outrage. I argue that morally problematic Ethnographic research of public behavior can derive from research practice that includes (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Contextual integrity’s decision heuristic and the tracking by social network sites.Rath Kanha Sar & Yeslam Al-Saggaf - 2014 - Ethics and Information Technology 16 (1):15-26.
    The findings of our experiments showed that social network sites such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Information ethics in the context of smart devices.Brian Roux & Michael Falgoust - 2013 - Ethics and Information Technology 15 (3):183-194.
    In this paper, we employ Extended Cognition as a background for a series of thought experiments about privacy and common used information technology devices. Laptops and smart phones are now widely used devices, but current privacy standards do not adequately address the relationship between the owners of these devices and the information stored on them. Law enforcement treats laptops and smart phones are potential sources of information about criminal activity, but this treatment ignores the use of smart devices as extensions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been sufficiently investigated. In (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.Fiachra O’Brolcháin, Tim Jacquemard, David Monaghan, Noel O’Connor, Peter Novitzky & Bert Gordijn - 2016 - Science and Engineering Ethics 22 (1):1-29.
    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities and social networks, hereafter VRSNs. We examine a scenario in which a significant segment of the world’s population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Legal Analysis of the ALA's Support of the Freedom to Read Protection Act.Roberta Munoz - 2004 - Journal of Information Ethics 13 (2):58-77.
  • Privacy, public health, and controlling medical information.Adam D. Moore - 2010 - HEC Forum 22 (3):225-240.
    This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy, turning then to consider cases which illustrate when and how privacy may be overridden by public health concerns.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  • Anonymity, Pseudonymity, and Deliberation: Why Not Everything Should Be Connected.Alfred Moore - 2018 - Journal of Political Philosophy 26 (2):169-192.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Why privacy is not enough privacy in the context of “ubiquitous computing” and “big data”.Tobias Matzner - 2014 - Journal of Information, Communication and Ethics in Society 12 (2):93-106.
    Purpose – Ubiquitous computing and “big data” have been widely recognized as requiring new concepts of privacy and new mechanisms to protect it. While improved concepts of privacy have been suggested, the paper aims to argue that people acting in full conformity to those privacy norms still can infringe the privacy of others in the context of ubiquitous computing and “big data”. Design/methodology/approach – New threats to privacy are described. Helen Nissenbaum's concept of “privacy as contextual integrity” is reviewed concerning (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms.Kirsten Martin - 2020 - Business Ethics Quarterly 30 (1):65-96.
    ABSTRACT:The oft-cited privacy paradox is the perceived disconnect between individuals’ stated privacy expectations, as captured in surveys, and consumer market behavior in going online: individuals purport to value privacy yet still disclose information to firms. The goal of this paper is to empirically examine the conceptualization of privacy postdisclosure assumed in the privacy paradox. Contrary to the privacy paradox, the results here suggest consumers retain strong privacy expectations even after disclosing information. Privacy violations are valued akin to security violations in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Inferences and the Right to Privacy.Jakob Mainz - forthcoming - Journal of Value Inquiry:1-19.
    In this paper, I defend what I call the ‘Inference Principle’. This principle holds that if an agent obtains some information legitimately, then the agent can make any inference she wants based on the information, without violating anyone’s right to privacy. This principle is interesting for at least three reasons. First, it constitutes a novel answer to the timely question of whether the widespread use of ‘data analytics’ to infer personal information about individuals is morally permissible. Second, it contradicts what (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • A practice–theoretical account of privacy.Wulf Loh - 2018 - Ethics and Information Technology 20 (4):233-247.
    This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy, it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Government Surveillance, Privacy, and Legitimacy.Peter Königs - 2022 - Philosophy and Technology 35 (1):1-22.
    The recent decades have seen established liberal democracies expand their surveillance capacities on a massive scale. This article explores what is problematic about government surveillance by democracies. It proceeds by distinguishing three potential sources of concern: the concern that governments diminish citizens’ privacy by collecting their data, the concern that they diminish their privacy by accessing their data, and the concern that the collected data may be used for objectionable purposes. Discussing the meaning and value of privacy, the article argues (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Some ethical reflections on cyberstalking.Frances S. Grodzinsky & Herman T. Tavani - 2002 - Acm Sigcas Computers and Society 32 (1):22-32.
    The present study examines a range of moral issues associated with recent cyberstalking cases. Particular attention is centered on the Amy Boyer/ Liam Youens case of cyberstalking, which raises a host of considerations that we believe have a significant impact for ethical behavior on the Internet. Among the questions we consider are those having to do with personal privacy and the use of certain kinds of Internet search facilities to stalk individuals in cyberspace. Also considered are questions having to do (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and emerging (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Online file sharing: resolving the tensions between privacy and property interests.Frances S. Grodzinsky & Herman T. Tavani - 2008 - Acm Sigcas Computers and Society 38 (4):28-39.
    This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Can You Hear Me Now? Audio and Visual Interactions That Change App Choices.Shakthidhar Reddy Gopavaram, Omkar Bhide & L. Jean Camp - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  • An Institutionalist Approach to AI Ethics: Justifying the Priority of Government Regulation over Self-Regulation.Thomas Ferretti - 2022 - Moral Philosophy and Politics 9 (2):239-265.
    This article explores the cooperation of government and the private sector to tackle the ethical dimension of artificial intelligence. The argument draws on the institutionalist approach in philosophy and business ethics defending a ‘division of moral labor’ between governments and the private sector. The goal and main contribution of this article is to explain how this approach can provide ethical guidelines to the AI industry and to highlight the limits of self-regulation. In what follows, I discuss three institutionalist claims. First, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Public anonymity and the connected world.Tony Doyle & Judy Veranas - 2014 - Ethics and Information Technology 16 (3):207-218.
    We defend public anonymity in the light of the threat posed by digital technology. Once people could reasonably assume that they were fairly anonymous when they left the house. They neither drove nor walked around with GPS devices; they paid their highway tolls in cash; they seldom bought on credit; and no cameras marked their strolls in the park or their walks down the street. Times have changed. We begin with a brief discussion of the concept of anonymity. We then (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Anita Allen: Unpopular privacy: what must we hide?: Oxford University Press, Oxford, New York, 2011, xv + 259 pp, ISBN: 978-0195141375. [REVIEW]Tony Doyle - 2013 - Ethics and Information Technology 15 (1):63-67.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy, Publicity, and the Right to Be Forgotten.Hannah Carnegy-Arbuthnott - 2023 - Journal of Political Philosophy 31 (4):494-516.
    Journal of Political Philosophy, EarlyView.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Ethical aspects of facial recognition systems in public places.Philip Brey - 2004 - Journal of Information, Communication and Ethics in Society 2 (2):97-109.
    This essay examines ethical aspects of the use of facial recognition technology for surveillance purposes in public and semipublic areas, focusing particularly on the balance between security and privacy and civil liberties. As a case study, the FaceIt facial recognition engine of Identix Corporation will be analyzed, as well as its use in “Smart” video surveillance systems in city centers and airports. The ethical analysis will be based on a careful analysis of current facial recognition technology, of its use in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Microsystems and Nanoscience for Biomedical Applications: A View to the Future.Christopher J. Backhouse, Karan V. I. S. Kaler, Timothy Caulfield, Michael D. Mehta & Linda M. Pilarski - 2004 - Bulletin of Science, Technology and Society 24 (1):40-45.
    At present there is an enormous discrepancy between our nanotechnological capabilities (particularly our nanobiotechnologies), our social wisdom, and consensus on how to apply them. To date, cost considerations have greatly constrained our application of nanotechnologies. However, novel advances in microsystem platform technologies are about to greatly diminish that economic constraint while developing new industries. Properly used in a solid legal and ethical framework, within an educated population, these advances will vastly enrich our quality of life without being intrusive. Improperly used, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.
    This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the decision forest data mining algorithm (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy as Informational Commodity.Jarek Gryz - 2013 - Proceedings of IACAP Conference.
    Many attempts to define privacy have been made since the publication of the seminal paper by Warren and Brandeis (Warren & Brandeis, 1890). Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, (...)
     
    Export citation  
     
    Bookmark  
  • Correspondents theory 1800/2000: philosophical reflections upon epistolary technics and praxis in the analogue and digital. [REVIEW]Anthony John Charles Ross - unknown
    When we talk about things like the 'lost art of letter-writing' or the 'digital communications revolution,' what do we mean? What do we lose and what do we gain as we move towards digital ways of being in the world? Critically engaging with many of the canonical writers in the philosophy of technology , and following what has been termed the 'empirical turn' in that discipline, this thesis answers such questions by means of a philosophical, comparative study of epistolary technics (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark