Switch to: Citations

Add references

You must login to add references.
  1. Surveillance, privacy and the ethics of vehicle safety communication technologies.M. Zimmer - 2005 - Ethics and Information Technology 7 (4):201-210.
    Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy as life, liberty, property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.
    The cluster of concerns usually identified asmatters of privacy can be adequately accountedfor by unpacking our natural rights to life,liberty, and property. Privacy as derived fromfundamental natural rights to life, liberty,and property encompasses the advantages of thecontrol and restricted access theories withouttheir attendant difficulties.
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  • The Impact of the Internet on Our Moral Lives. [REVIEW]Amy E. White - 2005 - Journal of Value Inquiry 39 (3-4):537-539.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   38 citations  
  • The uniqueness debate in computer ethics: What exactly is at issue, and why does it matter? [REVIEW]Herman T. Tavani - 2002 - Ethics and Information Technology 4 (1):37-54.
    The purpose of this essay is to determinewhat exactly is meant by the claimcomputer ethics is unique, a position thatwill henceforth be referred to as the CEIUthesis. A brief sketch of the CEIU debate is provided,and an empirical case involving a recentincident of cyberstalking is briefly consideredin order to illustrate some controversialpoints of contention in that debate. To gain aclearer understanding of what exactly isasserted in the various claims about theuniqueness of computer ethics, and to avoidmany of the confusions currently (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  • KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Review of Ferdinand David Schoeman: Privacy and Social Freedom[REVIEW]Barbara Baum Levenbook - 1995 - Ethics 105 (2):421-422.
    Direct download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Artificial evil and the foundation of computer ethics.J. W. Sanders & Luciano Floridi - 2001 - Ethics and Information Technology 3 (1):55-66.
    Moral reasoning traditionally distinguishes two types of evil:moral and natural. The standard view is that ME is the product of human agency and so includes phenomena such as war, torture and psychological cruelty; that NE is the product of nonhuman agency, and so includes natural disasters such as earthquakes, floods, disease and famine; and finally, that more complex cases are appropriately analysed as a combination of ME and NE. Recently, as a result of developments in autonomousagents in cyberspace, a new (...)
    Direct download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Toward an approach to privacy in public: Challenges of information technology.Helen Nissenbaum - 1997 - Ethics and Behavior 7 (3):207 – 219.
    This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  • Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   47 citations  
  • Using genetic information while protecting the privacy of the soul.James H. Moor - 1999 - Ethics and Information Technology 1 (4):257-263.
    Computing plays an important role in genetics (and vice versa).Theoretically, computing provides a conceptual model for thefunction and malfunction of our genetic machinery. Practically,contemporary computers and robots equipped with advancedalgorithms make the revelation of the complete human genomeimminent – computers are about to reveal our genetic soulsfor the first time. Ethically, computers help protect privacyby restricting access in sophisticated ways to genetic information.But the inexorable fact that computers will increasingly collect,analyze, and disseminate abundant amounts of genetic informationmade available through the (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   71 citations  
  • Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of our lives or shrinking it to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   42 citations  
  • There’s something about Mary: The moral value of things qua information objects. [REVIEW]Kenneth Einar Himma - 2004 - Ethics and Information Technology 6 (3):145-159.
    . Luciano Floridi argues that every existing entity is deserving of at least minimal moral respect in virtue of having intrinsic value qua information object. In this essay, I attempt a comprehensive assessment of this important view as well as the arguments Floridi offers in support of it. I conclude both that the arguments are insufficient and that the thesis itself is substantively implausible from the standpoint of ordinary intuitions.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  • The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   57 citations  
  • On the intrinsic value of information objects and the infosphere.Luciano Floridi - 2002 - Ethics and Information Technology 4 (4):287–304.
    What is the most general common set of attributes that characterises something as intrinsically valuable and hence as subject to some moral respect, and without which something would rightly be considered intrinsically worthless or even positively unworthy and therefore rightly to be disrespected in itself? This paper develops and supports the thesis that the minimal condition of possibility of an entity's least intrinsic value is to be identified with its ontological status as an information object. All entities, even when interpreted (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   69 citations  
  • On the morality of artificial agents.Luciano Floridi & J. W. Sanders - 2004 - Minds and Machines 14 (3):349-379.
    Artificial agents (AAs), particularly but not only those in Cyberspace, extend the class of entities that can be involved in moral situations. For they can be conceived of as moral patients (as entities that can be acted upon for good or evil) and also as moral agents (as entities that can perform actions, again for good or evil). In this paper, we clarify the concept of agent and go on to separate the concerns of morality and responsibility of agents (most (...)
    Direct download (17 more)  
     
    Export citation  
     
    Bookmark   288 citations  
  • Mapping the foundationalist debate in computer ethics.Luciano Floridi & J. W. Sanders - 2002 - Ethics and Information Technology 4 (1):1-9.
    The paper provides a critical review of the debate on the foundations of Computer Ethics (CE). Starting from a discussion of Moor’s classic interpretation of the need for CE caused by a policy and conceptual vacuum, five positions in the literature are identified and discussed: the “no resolution approach”, according to which CE can have no foundation; the professional approach, according to which CE is solely a professional ethics; the radical approach, according to which CE deals with absolutely unique issues, (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   27 citations  
  • Informational privacy and its ontological interpretation.Luciano Floridi - 2006 - Acm Sigcas Computers and Society 36 (3):1.
    The article provides an outline of the ontological interpretation of informational privacy based on information ethics. It is part of a larger project of research, in which I have developed the foundations of ideas presented here and their consequences. As an outline, it is meant to be self-sufficient and to provide enough information to enable the reader to assess how the approach fares with respect to other alternatives. However, those interested in a more detailed analysis, and especially in the reasons (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
    The essential difficulty about Computer Ethics' (CE) philosophical status is a methodological problem: standard ethical theories cannot easily be adapted to deal with CE-problems, which appear to strain their conceptual resources, and CE requires a conceptual foundation as an ethical theory. Information Ethics (IE), the philosophical foundational counterpart of CE, can be seen as a particular case of environmental ethics or ethics of the infosphere. What is good for an information entity and the infosphere in general? This is the ethical (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   113 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  • Mapping the foundationalist debate in computer ethics.Luciano Floridi & J. W. Sanders - 2002 - Ethics and Information Technology 4 (1):1–9.
    The paper provides a critical review of thedebate on the foundations of Computer Ethics(CE). Starting from a discussion of Moor'sclassic interpretation of the need for CEcaused by a policy and conceptual vacuum, fivepositions in the literature are identified anddiscussed: the ``no resolution approach'',according to which CE can have no foundation;the professional approach, according to whichCE is solely a professional ethics; the radicalapproach, according to which CE deals withabsolutely unique issues, in need of a uniqueapproach; the conservative approach, accordingto which CE (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  • Artificial Evil and the Foundation of Computer Ethics.Luciano Floridi & J. W. Sanders - 2001 - Springer Netherlands. Edited by Luciano Floridi & J. W. Sanders.
    Moral reasoning traditionally distinguishes two types of evil:moral (ME) and natural (NE). The standard view is that ME is the product of human agency and so includes phenomena such as war,torture and psychological cruelty; that NE is the product of nonhuman agency, and so includes natural disasters such as earthquakes, floods, disease and famine; and finally, that more complex cases are appropriately analysed as a combination of ME and NE. Recently, as a result of developments in autonomous agents in cyberspace, (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   29 citations  
  • Uneasy Access: Privacy for Women in a Free Society.Anita L. Allen - 1988 - Rowman & Littlefield Publishers.
    'Anita L. Allen breaks new ground...A stunning indictment of women's status in contemporary society, her book provides vital original scholarly research and insight.' |s-NEW DIRECTIONS FOR WOMEN.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   46 citations  
  • Privacy and Social Freedom.Ferdinand David Schoeman - 1992 - Cambridge University Press.
    This book attacks the assumption found in moral philosophy that social control as such is an intellectually and morally destructive force. It replaces this view with a richer and deeper perspective on the nature of social character aimed at showing how social freedom cannot mean immunity from social pressure. The author demonstrates how our competence as rational and social agents depends on a constructive adaptation of social control mechanisms. Our facility at achieving our goals is enhanced, rather than undermined, by (...)
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  • The handbook of information and computer ethics.K. E. Himma & H. T. Tavani (eds.) - 2008 - Wiley.
  • Privacy, intimacy, and personhood.Jeffrey Reiman - 1976 - Philosophy and Public Affairs 6 (1):26-44.
  • [Book review] in pursuit of privacy, law, ethics, and the rise of technology. [REVIEW]Judith Wagner DeCew - 1999 - Ethics 109 (2):437-439.
    Direct download  
     
    Export citation  
     
    Bookmark   52 citations  
  • The right to privacy.Judith Jarvis Thomson - 1975 - Philosophy and Public Affairs 4 (4):295-314.
  • Why privacy is important.James Rachels - 1975 - Philosophy and Public Affairs 4 (4):323-333.
  • Privacy and Freedom.Alan F. Westin - 1970 - Science and Society 34 (3):360-363.
     
    Export citation  
     
    Bookmark   200 citations  
  • [Book review] legislating privacy, technology, social values, and public policy. [REVIEW]Priscilla M. Regan - 1998 - Business Ethics Quarterly 8 (4):723-742.
    Direct download  
     
    Export citation  
     
    Bookmark   38 citations  
  • Thomson on privacy.Thomas Scanlon - 1975 - Philosophy and Public Affairs 4 (4):315-322.
  • Privacy, morality, and the law.W. A. Parent - 1983 - Philosophy and Public Affairs 12 (4):269-288.
  • Misplacing privacy.Mark Alfino - 2001 - Journal of Information Ethics 10 (2):5-8.
     
    Export citation  
     
    Bookmark   4 citations