Switch to: References

Add citations

You must login to add citations.
  1. Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
    Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Ethical Framework for Hacking Operations.Ross W. Bellaby - 2021 - Ethical Theory and Moral Practice 24 (1):231-255.
    In recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • The Importance of Forgetting.Rima Basu - 2022 - Episteme 19 (4):471-490.
    Morality bears on what we should forget. Some aspects of our identity are meant to be forgotten and there is a distinctive harm that accompanies the permanence of some content about us, content that prompts a duty to forget. To make the case that forgetting is an integral part of our moral duties to others, the paper proceeds as follows. In §1, I make the case that forgetting is morally evaluable and I survey three kinds of forgetting: no-trace forgetting, archival (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • A tattoo is not a face. Ethical aspects of tattoo-based biometrics.Fabio Bacchini & Ludovica Lorusso - 2018 - Journal of Information, Communication and Ethics in Society 16 (2):110-122.
    PurposeThis study aims to explore the ethical and social issues of tattoo recognition technology and tattoo similarity detection technology, which are expected to be increasingly used by state and local police departments and law enforcement agencies.Design/methodology/approachThe paper investigates the new ethical concerns raised by tattoo-based biometrics on a comparative basis with face-recognition biometrics.FindingsTRT raises much more ethically sensitive issues than face recognition, because tattoos are meaningful biometric traits, and tattoo identification is tantamount to the identification of many more personal features (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • "A piece of yourself": Ethical issues in biometric identification. [REVIEW]Anton Alterman - 2003 - Ethics and Information Technology 5 (3):139-150.
    The proliferation of biometric identification technology raises difficult issues in the matter of security, privacy and identity. Though biometric "images" are not images per se, they are both unique representations of an individual in themsevles and a means of access to other identifying information. I compare biometric imaging with other kinds of identifying representations and find that there are issues specific to biometric ID's. Because they represent information that is written into the body they are directly related to one's sense (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  • Reconstructing the Right to Privacy.Mark Alfino & G. Randolph Mayes - 2003 - Social Theory & Practice 29 (1):1-18.
    The article undertakes to develop a theory of privacy considered as a fundamental moral right. The authors remind that the conception of the right to privacy is silent on the prospect of protecting informational privacy on consequentialist grounds. However, laws that prevent efficient marketing practices, speedy medical attention, equitable distribution of social resources, and criminal activity could all be justified by appeal to informational privacy as a fundamental right. Finally, the authors show that in the specter of terrorism, privacy can (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • Wronging Oneself.Daniel Muñoz & Nathaniel Baron-Schmitt - forthcoming - Journal of Philosophy.
  • The Ethics of Data Privacy.Jeroen Seynhaeve - 2022 - Dissertation, University of Stellenbosch
    All societies have to balance privacy claims with other moral concerns. However, while some concern for privacy appears to be a common feature of social life, the definition, extent and moral justifications for privacy differ widely. Are there better and worse ways of conceptualising, justifying, and managing privacy? These are the questions that lie in the background of this thesis. -/- My particular concern is with the ethical issues around privacy that are tied to the rise of new information and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy.Judith DeCew - 2008 - Stanford Encyclopedia of Philosophy.
  • Privacy as Informational Commodity.Jarek Gryz - 2013 - Proceedings of IACAP Conference.
    Many attempts to define privacy have been made since the publication of the seminal paper by Warren and Brandeis (Warren & Brandeis, 1890). Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, (...)
     
    Export citation  
     
    Bookmark  
  • Feminism, democracy and the right to privacy.Annabelle Lever - 2005 - Minerva - An Internet Journal of Philosophy 9 (1).
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of solitude, intimacy and confidentiality and shows that, so described, people have legitimate interests in privacy. These interests are both personal and political, and provide the grounds for two different justifications of privacy rights. Though both are based on democratic concerns for the freedom and equality of individuals, these two justifications for privacy (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  • A Tale of Two Doctrines: Moral Encroachment and Doxastic Wronging.Rima Basu - 2021 - In Jennifer Lackey (ed.), Applied Epistemology. Oxford University Press. pp. 99-118.
    In this paper, I argue that morality might bear on belief in at least two conceptually distinct ways. The first is that morality might bear on belief by bearing on questions of justification. The claim that it does is the doctrine of moral encroachment. The second, is that morality might bear on belief given the central role belief plays in mediating and thereby constituting our relationships with one another. The claim that it does is the doctrine of doxastic wronging. Though (...)
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Immunity from the illegitimate focused attention of others: an explanation of our thinking and talking about privacy.Jeffery L. Johnson - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia. pp. 49--70.
  • Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Cham, Switzerland: pp. 459-474.
    Experimental design is one aspect of a scientific method. A well-designed, properly conducted experiment aims to control variables in order to isolate and manipulate causal effects and thereby maximize internal validity, support causal inferences, and guarantee reliable results. Traditionally employed in the natural sciences, experimental design has become an important part of research in the social and behavioral sciences. Experimental methods are also endorsed as the most reliable guides to policy effectiveness. Through a discussion of some of the central concepts (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
  • Libertarianism and Climate Change.Olle Torpman - 2016 - Dissertation, Stockholm University
    In this dissertation, I investigate the implications of libertarian morality in relation to the problem of climate change. This problem is explicated in the first chapter, where preliminary clarifications are also made. In the second chapter, I briefly explain the characteristics of libertarianism relevant to the subsequent study, including the central non-aggression principle. In chapter three, I examine whether our individual emissions of greenhouse gases, which together give rise to climate change, meet this principle. I do this based on the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Children of a Lesser God? The Vividown Case and Privacy on the Internet.Gianluca Andresani & Natalina Stamile - 2019 - Revista da Faculdade de Direito UFPR 64 (2):141-169.
    In the wake of high profile and recent events of blatant privacy violations, which also raise issues of democratic accountability as well as, at least potentially, undermining the legitimacy of current local and international governance arrangements, a rethinking of the justification of the right to privacy is proposed. In this paper, the case of the violation of the privacy of a bullied autistic youngster and the consequent prosecution of 3 Google executives will be discussed first. We will then analyse the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy as an Asset.Jarek Gryz - 2017 - In Marcellus Mindel, Kelly Lyons & Joe Wigglesworth (eds.), Proceedings of the 27th CASCON Conference. Markham, Canada: IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a definition of informational privacy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark