Switch to: References

Add citations

You must login to add citations.
  1. Information technology and moral values.John Sullins - forthcoming - Stanford Encyclopedia of Philosophy.
    A encyclopedia entry on the moral impacts that happen when information technologies are used to record, communicate and organize information. including the moral challenges of information technology, specific moral and cultural challenges such as online games, virtual worlds, malware, the technology transparency paradox, ethical issues in AI and robotics, and the acceleration of change in technologies. It concludes with a look at information technology as a model for moral change, moral systems and moral agents.
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  • The Politics of Becoming: Anonymity and Democracy in the Digital Age.Hans Asenbaum - 2023 - Oxford: Oxford University Press.
    When we participate in political debate or protests, we are judged by how we look, which clothes we wear, by our skin colour, gender and body language. This results in exclusions and limits our freedom of expression. The Politics of Becoming explores radical democratic acts of disidentification to counter this problem. Anonymity in masked protest, graffiti, and online de-bate interrupts our everyday identities. This allows us to live our multiple selves. In the digital age, anonymity becomes an inherent part of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous and purposive (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Philosophy, privacy, and pervasive computing.Diane P. Michelfelder - 2010 - AI and Society 25 (1):61-70.
    Philosophers and others concerned with the moral good of personal privacy most often see threats to privacy raised by the development of pervasive computing as primarily being threats to the loss of control over personal information. Two reasons in particular lend this approach plausibility. One reason is that the parallels between pervasive computing and ordinary networked computing, where everyday transactions over the Internet raise concerns about personal information privacy, appear stronger than their differences. Another reason is that the individual devices (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Surveillance, privacy and the ethics of vehicle safety communication technologies.M. Zimmer - 2005 - Ethics and Information Technology 7 (4):201-210.
    Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Ethical issues in web data mining.Lita van Wel & Lambèr Royakkers - 2004 - Ethics and Information Technology 6 (2):129-140.
    Web mining refers to the whole of data miningand related techniques that are used toautomatically discover and extract informationfrom web documents and services. When used in abusiness context and applied to some type ofpersonal data, it helps companies to builddetailed customer profiles, and gain marketingintelligence. Web mining does, however, pose athreat to some important ethical values likeprivacy and individuality. Web mining makes itdifficult for an individual to autonomouslycontrol the unveiling and dissemination of dataabout his/her private life. To study thesethreats, we (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity of citizens (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Indiscriminate mass surveillance and the public sphere.Titus Stahl - 2016 - Ethics and Information Technology 18 (1):33-39.
    Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  • Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
  • Piercing the veil: Ethical issues in ethnographic research.Brian Schrag - 2008 - Science and Engineering Ethics 15 (2):135-160.
    It is not unusual for researchers in ethnography (and sometimes Institutional Review Boards) to assume that research of “public” behavior is morally unproblematic. I examine an historical case of ethnographic research and the sustained moral outrage to the research expressed by the subjects of that research. I suggest that the moral outrage was legitimate and articulate some of the ethical issues underlying that outrage. I argue that morally problematic Ethnographic research of public behavior can derive from research practice that includes (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Contextual integrity’s decision heuristic and the tracking by social network sites.Rath Kanha Sar & Yeslam Al-Saggaf - 2014 - Ethics and Information Technology 16 (1):15-26.
    The findings of our experiments showed that social network sites such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   47 citations  
  • Legal Analysis of the ALA's Support of the Freedom to Read Protection Act.Roberta Munoz - 2004 - Journal of Information Ethics 13 (2):58-77.
  • Murky conceptual waters: The public and the private. [REVIEW]Gary T. Marx - 2001 - Ethics and Information Technology 3 (3):157-169.
    In discussions on the ethics of surveillanceand consequently surveillance policy, thepublic/private distinction is often implicitlyor explicitly invoked as a way to structure thediscussion and the arguments. In thesediscussions, the distinction public and private is often treated as a uni-dimensional,rigidly dichotomous and absolute, fixed anduniversal concept, whose meaning could bedetermined by the objective content of thebehavior. Nevertheless, if we take a closerlook at the distinction in diverse empiricalcontexts we find them to be more subtle,diffused and ambiguous than suggested. Thus,the paper argues (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Protesting without a face: Privacy in public demonstrations.Domingo A. Lovera-Parmo - 2023 - Constellations 30 (2):179-191.
  • The implications of digital rights management for privacy and freedom of expression.Ian Kerr & Jane Bailey - 2004 - Journal of Information, Communication and Ethics in Society 2 (2):85-95.
    This paper aims to examine some of the broader social consequences of enabling digital rights management. The authors suggest that the current, mainstream orientation of digital rights management systems could have the effect of shifting certain public powers into the invisible hands of private control. Focusing on two central features of digital rights management ‐ their surveillance function and their ability to unbundle copyrights into discrete and custom‐made products ‐ the authors conclude that a promulgation of the current use of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy in the cloud: applying Nissenbaum's theory of contextual integrity.F. S. Grodzinsky & H. T. Tavani - 2011 - Acm Sigcas Computers and Society 41 (1):38-47.
    The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy, to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and emerging (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Online file sharing: resolving the tensions between privacy and property interests.Frances S. Grodzinsky & Herman T. Tavani - 2008 - Acm Sigcas Computers and Society 38 (4):28-39.
    This essay expands upon an earlier work in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-à-vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Caller ID – whose privacy is it, anyway?Kenneth G. Ferguson - 2001 - Journal of Business Ethics 29 (3):227 - 237.
    Caller ID or CND (Calling Number Display) is an internationally-available telecommunication service first introduced into the United States about ten years ago. Caller ID utilizes a new form of technology which enables telephone subscribers to identify the numbers (and/or names) of callers before picking up their telephones. This service has been widely assailed as an invasion of the caller''s right to anonymity, a right which allegedly subsists as an important component of the caller''s right to privacy. However, if privacy is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Public anonymity and the connected world.Tony Doyle & Judy Veranas - 2014 - Ethics and Information Technology 16 (3):207-218.
    We defend public anonymity in the light of the threat posed by digital technology. Once people could reasonably assume that they were fairly anonymous when they left the house. They neither drove nor walked around with GPS devices; they paid their highway tolls in cash; they seldom bought on credit; and no cameras marked their strolls in the park or their walks down the street. Times have changed. We begin with a brief discussion of the concept of anonymity. We then (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Anita Allen: Unpopular privacy: what must we hide?: Oxford University Press, Oxford, New York, 2011, xv + 259 pp, ISBN: 978-0195141375. [REVIEW]Tony Doyle - 2013 - Ethics and Information Technology 15 (1):63-67.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  • Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.
    This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the decision forest data mining algorithm (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Search engines and ethics.Herman Tavani - forthcoming - Stanford Encyclopedia of Philosophy.