Switch to: References

Citations of:

The Value of Privacy

Polity (2004)

Add citations

You must login to add citations.
  1. The ethics of algorithms: key problems and solutions.Andreas Tsamados, Nikita Aggarwal, Josh Cowls, Jessica Morley, Huw Roberts, Mariarosaria Taddeo & Luciano Floridi - 2021 - AI and Society.
    Research on the ethics of algorithms has grown substantially over the past decade. Alongside the exponential development and application of machine learning algorithms, new ethical problems and solutions relating to their ubiquitous use in society have been proposed. This article builds on a review of the ethics of algorithms published in 2016, 2016). The goals are to contribute to the debate on the identification and analysis of the ethical implications of algorithms, to provide an updated analysis of epistemic and normative (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   42 citations  
  • The ethics of algorithms: key problems and solutions.Andreas Tsamados, Nikita Aggarwal, Josh Cowls, Jessica Morley, Huw Roberts, Mariarosaria Taddeo & Luciano Floridi - 2022 - AI and Society 37 (1):215-230.
    Research on the ethics of algorithms has grown substantially over the past decade. Alongside the exponential development and application of machine learning algorithms, new ethical problems and solutions relating to their ubiquitous use in society have been proposed. This article builds on a review of the ethics of algorithms published in 2016, 2016). The goals are to contribute to the debate on the identification and analysis of the ethical implications of algorithms, to provide an updated analysis of epistemic and normative (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   44 citations  
  • Understanding the care.data conundrum: New information flows for economic growth.Stephen Timmons & Paraskevas Vezyridis - 2017 - Big Data and Society 4 (1).
    The analysis of data from electronic health records aspires to facilitate healthcare efficiencies and biomedical innovation. There are also ethical, legal and social implications from the handling of sensitive patient information. The paper explores the concerns, expectations and implications of the National Health Service England care.data programme: a national data sharing initiative of linked electronic health records for healthcare and other research purposes. Using Nissenbaum’s contextual integrity of privacy framework through a critical Science and Technology Studies lens, it examines the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  • What is the ‘personal’ in ‘personal information’?Sille Obelitz Søe, Rikke Frank Jørgensen & Jens-Erik Mai - 2021 - Ethics and Information Technology 23 (4):625-633.
    Contemporary privacy theories and European discussions about data protection employ the notion of ‘personal information’ to designate their areas of concern. The notion of personal information is demarcated from non-personal information—or just information—indicating that we are dealing with a specific kind of information. However, within privacy scholarship the notion of personal information appears undertheorized, rendering the concept somewhat unclear. We argue that in an age of datafication, protection of personal information and privacy is crucial, making the understanding of what is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Visual Culture and the Fight for Visibility.Markus Schroer - 2014 - Journal for the Theory of Social Behaviour 44 (2):206-228.
    The article explores the relationship between visual culture and the fight for visibility and attention in contemporary society. It draws on a concept of visual culture which not only sees the rising significance of the visual and the proliferation of images as its defining traits, but also the fact that, today, people are—to a much higher degree—both consumers as well as producers of images. Based on this definition, it is argued that in visually oriented communication and media societies, the anthropologically (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Out of Proportion? On Surveillance and the Proportionality Requirement.Kira Vrist Rønn & Kasper Lippert-Rasmussen - 2020 - Ethical Theory and Moral Practice 23 (1):181-199.
    In this article, we critically scrutinize the principle of proportionality when used in the context of security and government surveillance. We argue that McMahan’s distinction from just warfare between narrow proportionality and wide proportionality can generally apply to the context of surveillance. We argue that narrow proportionality applies more or less directly to cases in which the surveilled is liable and that the wide proportionality principle applies to cases characterized by ‘collateral intrusion’. We argue, however, that a more demanding criterion (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Spinoza, Feminism and Privacy: Exploring an Immanent Ethics of Privacy.Janice Richardson - 2014 - Feminist Legal Studies 22 (3):225-241.
    In this article I explore the usefulness of Spinoza’s ethics for feminism by considering ways in which it allows feminists to rethink privacy. I draw upon some of Spinoza’s central ideas to address the following question: when should information be classed as private and when should it be communicated? This is a question that is considered by the common law courts. Attempts to find a moral underpinning for such a tortious action against invasions of privacy have tended to draw upon (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Introduction: Contemporary feminist philosophy in German.Gertrude Postl - 2005 - Hypatia 20 (2):102-118.
    Using the notion of a transfiguration of sexed bodies, this text deals with the stratifications of the gender-specific imaginary. Starting from the figurative—thus creative—force of the psyche-soma, its interaction with the configurations of a collective body will be developed from the perspectives of social philosophy and philosophy of history. At the center of my discussion is the interdependence between the individual psyche-soma, the socialized individual, and a collective bodily imaginary, on the one hand, and the strata of a gender imaginary (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  • Securing privacy at work: The importance of contextualized consent. [REVIEW]Elin Palm - 2009 - Ethics and Information Technology 11 (4):233-241.
    The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important to consider (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been sufficiently investigated. In (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • När vården flyttar hem till dig – den mobila vårdens etik.Elin Palm - 2010 - Etikk I Praksis - Nordic Journal of Applied Ethics 2 (2):71-92.
    Västvärldens åldrande befolkning anses ofta ställa krav på nya former av vård och omsorg. Olika typer av informations- och kommunikationstekniskt baserat vårdstöd framhålls ofta som en lösning. Tekniken medger en rad olika fördelar, exempelvis tätare tillsyn, kontinuerliga mätningar av vitala funktioner, med möjlighet att kontinuerligt ställa diagnos, och snabb respons på larm, men de tekniska lösningarna får också etiska implikationer. I den här artikeln beskrivs och exemplifieras IKT-baserad vård och omsorg och teknikens påverkan på centrala värden som personlig integritet, autonomi, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • The Web-Rhetoric of Companies Offering Home-Based Personal Health Monitoring.Anders Nordgren - 2012 - Health Care Analysis 20 (2):103-118.
    In this paper I investigate the web-rhetoric of companies offering home-based personal health monitoring to patients and elderly people. Two main rhetorical methods are found, namely a reference to practical benefits and a use of prestige words like “quality of life” and “independence”. I interpret the practical benefits in terms of instrumental values and the prestige words in terms of final values. I also reconstruct the arguments on the websites in terms of six different types of argument. Finally, I articulate (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  • Privacy by Design in Personal Health Monitoring.Anders Nordgren - 2015 - Health Care Analysis 23 (2):148-164.
    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, speech, and values: what we have no business knowing.Adam D. Moore - 2016 - Ethics and Information Technology 18 (1):41-49.
    In the United States the ascendancy of speech protection is due to an expansive and unjustified view of the value or primacy of free expression and access to information. This is perhaps understandable, given that privacy has been understood as a mere interest, whereas speech rights have been seen as more fundamental. I have argued elsewhere that the “mere interest” view of privacy is false. Privacy, properly defined, is a necessary condition for human well-being or flourishing. The opening section of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy, Neuroscience, and Neuro-Surveillance.Adam D. Moore - 2017 - Res Publica 23 (2):159-177.
    The beliefs, feelings, and thoughts that make up our streams of consciousness would seem to be inherently private. Nevertheless, modern neuroscience is offering to open up the sanctity of this domain to outside viewing. A common retort often voiced to this worry is something like, ‘Privacy is difficult to define and has no inherent moral value. What’s so great about privacy?’ In this article I will argue against these sentiments. A definition of privacy is offered along with an account of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, Interests, and Inalienable Rights.Adam D. Moore - 2018 - Moral Philosophy and Politics 5 (2):327-355.
    Some rights are so important for human autonomy and well-being that many scholars insist they should not be waived, traded, or abandoned. Privacy is a recent addition to this list. At the other end of the spectrum is the belief that privacy is a mere unimportant interest or preference. This paper defends a middle path between viewing privacy as an inalienable, non-waivable, non-transferrable right and the view of privacy as a mere subjective interest. First, an account of privacy is offered (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say.Leonhard Menges - 2020 - Moral Philosophy and Politics 7 (1):29-48.
    A standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • A Defense of Privacy as Control.Leonhard Menges - 2021 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions about moral responsibility.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  • eID policy in a turbulent environment: is there a need for a new regulatory framework? [REVIEW]Wainer Lusoli, Ioannis Maghiros & Margherita Bacigalupo - 2008 - Identity in the Information Society 1 (1):173-187.
    There is increasing interest in the EU about the central place of eIdentity (eID) in people’s lives. eID is increasingly seen as a bridge between the commercial viability of models based on large-scale provision of e-services and users’ need for privacy and security in online transactions. This paper examines technological, social and legal developments in the field of eID and asks whether there is the need for a new regulatory framework that both preserves users’ identity and enables the provision of (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • A Dilemma for Privacy as Control.Björn Lundgren - 2020 - The Journal of Ethics 24 (2):165-175.
    Although popular, control accounts of privacy suffer from various counterexamples. In this article, it is argued that two such counterexamples—while individually resolvable—can be combined to yield a dilemma for control accounts of privacy. Furthermore, it is argued that it is implausible that control accounts of privacy can defend against this dilemma. Thus, it is concluded that we ought not define privacy in terms of control. Lastly, it is argued that since the concept of privacy is the object of the right (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Brain Privacy, Intimacy, and Authenticity: Why a Complete Lack of the Former Might Undermine Neither of the Latter!Kasper Lippert-Rasmussen - 2017 - Res Publica 23 (2):227-244.
    In recent years, neuroscience has been making dramatic progress. The discipline holds great promise but also raises a number of important ethical concerns. Among these is the concern that, some day in the distant future, we will have brain scanners capable of reading our minds, thus making our inner thoughts transparent to others. There are at least two reasons why we might regret our resulting loss of privacy. One is, so the argument goes, that this would undermine our ability to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • The Portable Home: The Domestication of Public Space.Krishan Kumar & Ekaterina Makarova - 2008 - Sociological Theory 26 (4):324-343.
    Much commentary indicates that, starting from the 19th century, the home has become the privileged site of private life. In doing so it has established an increasingly rigid separation between the private and public spheres. This article does not disagree with this basic conviction. But we argue that, in more recent times, there has been a further development, in that the private life of the home has been carried into the public sphere--what we call "the domestication of public space." This (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Nudging as a Threat to Privacy.Andreas Kapsner & Barbara Sandfuchs - 2015 - Review of Philosophy and Psychology 6 (3):455-468.
    Nudges can pose serious threats to citizens’ privacy. The essay discusses several examples of nudges that must appear problematic to anyone valuing privacy. The paper also re-draws a well established connection between privacy and autonomy and argues that insofar as nudges incur too great a loss of privacy, they are incompatible with the libertarianism that libertarian paternalism is committed to by virtue of its very name.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • ‘I make the rules on my Wall’: Privacy and identity management practices on Facebook.Mariza Georgalou - 2016 - Discourse and Communication 10 (1):40-64.
    Much significant work on the topic of privacy and identity on social network sites stems from the realms of media, information and cultural studies, and sociology eschewing language-based disciplines almost entirely. To redress the balance, this article draws on discourse-centred online ethnography, an approach which blends online ethnography with discourse analysis, to explore how self-presentation on Facebook is regulated by means of privacy. To this end, I analyse a dataset of statuses, comments, links, photographs and interviews from five Greek users. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  • Privacy and the public/private dichotomy.Simon Dawes - 2011 - Thesis Eleven 107 (1):115-124.
    This essay reviews Helen Nissenbaum’s Privacy in Context (2010), focusing in particular on her dismissal of the public/private dichotomy. Taking issue with the problem she constructs of ‘privacy in public’, her unitary reading of the dichotomy and ‘socializing’ of the value of privacy, or what she calls ‘contextual integrity’, and her treatment of technology in the abstract, the essay then goes on to argue that the framework she proposes is incapable of addressing the contemporary incursion of market logic into every (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The seven troubles with norm-compliant robots.Tom N. Coggins & Steffen Steinert - 2023 - Ethics and Information Technology 25 (2):1-15.
    Many researchers from robotics, machine ethics, and adjacent fields seem to assume that norms represent good behavior that social robots should learn to benefit their users and society. We would like to complicate this view and present seven key troubles with norm-compliant robots: (1) norm biases, (2) paternalism (3) tyrannies of the majority, (4) pluralistic ignorance, (5) paths of least resistance, (6) outdated norms, and (7) technologically-induced norm change. Because discussions of why norm-compliant robots can be problematic are noticeably absent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Privacy revisited? Old ideals, new realities, and their impact on biobank regimes.Arndt Bialobrzeski, Jens Ried & Peter Dabrock - 2011 - Poiesis and Praxis 8 (1):9-24.
    Biobanks, collecting human specimen, medical records, and lifestyle-related data, face the challenge of having contradictory missions: on the one hand serving the collective welfare through easy access for medical research, on the other hand adhering to restrictive privacy expectations of people in order to maintain their willingness to participate in such research. In this article, ethical frameworks stressing the societal value of low-privacy expectations in order to secure biomedical research are discussed. It will turn out that neither utilitarian nor communitarian (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Moral Landscape of Monetary Design.Andrew M. Bailey, Bradley Rettler & Craig Warmke - 2021 - Philosophy Compass 16 (11):1-15.
    In this article, we identify three key design dimensions along which cryptocurrencies differ -- privacy, censorship-resistance, and consensus procedure. Each raises important normative issues. Our discussion uncovers new ways to approach the question of whether Bitcoin or other cryptocurrencies should be used as money, and new avenues for developing a positive answer to that question. A guiding theme is that progress here requires a mixed approach that integrates philosophical tools with the purely technical results of disciplines like computer science and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
  • Pluralism about the Value of Privacy.William Bülow - 2011 - International Review of Information Ethics 16:12.
    Direct download  
     
    Export citation  
     
    Bookmark