Results for ' Informational privacy'

1000+ found
Order:
  1. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  2. Information Privacy for Technology Users With Intellectual and Developmental Disabilities: Why Does It Matter?Maxine Perrin, Rawad Mcheimech, Johanna Lake, Yves Lachapelle, Jeffrey W. Jutai, Amélie Gauthier-Beaupré, Crislee Dignard, Virginie Cobigo & Hajer Chalghoumi - 2019 - Ethics and Behavior 29 (3):201-217.
    This article aims to explore the attitudes and behaviors of persons with intellectual and developmental disabilities related to their information privacy when using information technology. Six persons with IDD were recruited to participate to a series of 3 semistructured focus groups. Data were analyzed following a hybrid thematic analysis approach. Only 2 participants reported using IT every day. However, they all perceived IT use benefits, such as an increased autonomy. Participants demonstrated awareness of privacy concerns, but not in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  29
    Information Privacy for Technology Users With Intellectual and Developmental Disabilities: Why Does It Matter?Maxine Perrin, Rawad Mcheimech, Johanna Lake, Yves Lachapelle, Jeffrey W. Jutai, Amélie Gauthier-Beaupré, Crislee Dignard, Virginie Cobigo & Hajer Chalghoumi - 2019 - Ethics and Behavior 29 (3):201-217.
    This article aims to explore the attitudes and behaviors of persons with intellectual and developmental disabilities (IDD) related to their information privacy when using information technology (IT). Six persons with IDD were recruited to participate to a series of 3 semistructured focus groups. Data were analyzed following a hybrid thematic analysis approach. Only 2 participants reported using IT every day. However, they all perceived IT use benefits, such as an increased autonomy. Participants demonstrated awareness of privacy concerns, but (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  5. The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   57 citations  
  6.  50
    Informational privacy and moral values.Michael Scanlan - 2001 - Ethics and Information Technology 3 (1):3-12.
    A case from 1996 in Oregon in which citizens' legally publicmotor vehicle information was disseminated on a World Wide Website is considered. The case evoked widespread moral outrageamong Oregonians and led to changes in the Oregon records laws.The application of either consequentialist ornon-consequentialist moral theories to this and otherinformational privacy cases is found to be inadequate.Adjudication of conflicting desires is offered as the appropriateanalytical model for moral disputes. The notion of adjudicationoffered here diverges from traditional moral theories in itsindeterminate (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  7.  5
    Information, Privacy, and Just War Theory.Jack McDonald - 2020 - Ethics and International Affairs 34 (3):379-400.
    Are the sources of a combatant's knowledge in war morally relevant? This article argues that privacy is relevant to just war theory in that it draws attention to privacy harms associated with the conduct of war. Since we cannot assume that information is made available to combatants in a morally neutral manner, we must therefore interrogate the relationship between privacy harms and the acts that they enable in war. Here, I argue that there is ample evidence that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  15
    Genetic Information, Privacy and Insolvency.Edward J. Janger - 2005 - Journal of Law, Medicine and Ethics 33 (1):79-88.
    Biobanks hold out the prospect of significant public and private benefit, as genetic information contained in tissue samples is mined for information. However, the storing of human tissue samples and genetic information for research and/or therapeutic purposes raises a number of serious privacy and autonomy concerns. These concerns are compounded when one considers the possibility that a biobank or its owner might go bankrupt. Insolvency impairs the ability of enforcement regimes, and liability-based regimes in particular, to enforce legal norms. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  9.  20
    Genetic Information, Privacy and Insolvency.Edward J. Janger - 2005 - Journal of Law, Medicine and Ethics 33 (1):79-88.
    Biobanks hold out the prospect of significant public and private benefit, as genetic information contained in tissue samples is mined for information. However, the storing of human tissue samples and genetic information for research and/or therapeutic purposes raises a number of serious privacy and autonomy concerns. These concerns are compounded when one considers the possibility that a biobank or its owner might go bankrupt. Insolvency impairs the ability of enforcement regimes, and liability-based regimes in particular, to enforce legal norms. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  10.  20
    Health Information Privacy and Public Health.James G. Hodge - 2003 - Journal of Law, Medicine and Ethics 31 (4):663-671.
    Protecting the privacy of individually-identifiable health data and promoting the public’s health often seem at odds. Privacy advocates consistently seek to limit the acquisition, use, and disclosure of identifiable health information in governmental and private sector settings. Their concerns relate to misuses or wrongful disclosures of sensitive health data that can lead to discrimination and stigmatization against individuals. Public health practitioners, on the other hand, seek regular, ongoing access to and use of identifiable health information to accomplish important (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  11.  17
    Health Information Privacy and Public Health.James G. Hodge - 2003 - Journal of Law, Medicine and Ethics 31 (4):663-671.
    Protecting the privacy of individually-identifiable health data and promoting the public’s health often seem at odds. Privacy advocates consistently seek to limit the acquisition, use, and disclosure of identifiable health information in governmental and private sector settings. Their concerns relate to misuses or wrongful disclosures of sensitive health data that can lead to discrimination and stigmatization against individuals. Public health practitioners, on the other hand, seek regular, ongoing access to and use of identifiable health information to accomplish important (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  12. Informational privacy and its ontological interpretation.Luciano Floridi - 2006 - Acm Sigcas Computers and Society 36 (3):1.
    The article provides an outline of the ontological interpretation of informational privacy based on information ethics. It is part of a larger project of research, in which I have developed the foundations of ideas presented here and their consequences. As an outline, it is meant to be self-sufficient and to provide enough information to enable the reader to assess how the approach fares with respect to other alternatives. However, those interested in a more detailed analysis, and especially in (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  4
    Health Information Privacy: A Disappearing Concept.Marcia J. Weiss - 2000 - Bulletin of Science, Technology and Society 20 (2):115-122.
    Rapid advances and exponential growth in computer and telecommunications technology have taken individual records and papers revealing the most intimate details of one’s life, habits, and genetic predisposition from the private sector into the public arena in derogation of privacy considerations. Although computerized medical information offers a means of streamlining and improving the health care delivery system through speed and enormous storage capacity, it also presents new challenges as it affects the right of privacy and expectation of confidentiality, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  11
    Information privacy, the right to receive information and (mobile) ICTs.Litska Strikwerda - 2010 - Etikk I Praksis - Nordic Journal of Applied Ethics 2 (2):27-40.
    The first part of this paper is about the notion of privacy and its grounding in law. It discusses the tension between the right to privacy and the right to receive information. The second part of this paper explores how ICTs challenge and complicate privacy claims and satisfy the right to receive information.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15. Informational privacy.Richard A. Spinello - 2010 - In George G. Brenkert & Tom L. Beauchamp (eds.), The Oxford Handbook of Business Ethics. Oxford University Press.
     
    Export citation  
     
    Bookmark   2 citations  
  16. Information, Privacy, and False Light.Pierre Le Morvan - 2018 - In Mark Navin & Ann Cudd (eds.), Core Concepts and Contemporary Issues in Privacy. Springer Verlag.
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  17.  89
    The moral value of informational privacy in cyberspace.Diane P. Michelfelder - 2001 - Ethics and Information Technology 3 (2):129-135.
    Solutions to the problem ofprotecting informational privacy in cyberspacetend to fall into one of three categories:technological solutions, self-regulatorysolutions, and legislative solutions. In thispaper, I suggest that the legal protection ofthe right to online privacy within the USshould be strengthened. Traditionally, inidentifying where support can be found in theUS Constitution for a right to informationalprivacy, the point of focus has been on theFourth Amendment; protection in this contextfinds its moral basis in personal liberty,personal dignity, self-esteem, and othervalues. On (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  18.  15
    Credibility and trust of information privacy at the workplace in Slovakia. The use of intuition.Frithiof Svenson, Eva Ballová Mikušková & Markus A. Launer - 2023 - Journal of Information, Communication and Ethics in Society 21 (3):302-321.
    Purpose Employees may feel overwhelmed with information privacy choices and have difficulties understanding what they are committing to in the digital workplace. This paper aims to analyze the role of different thinking styles for effort reduction, such as the use of intuition, when employees make decisions about the credibility and trustworthiness of workplace information privacy issues in Slovakia. While the General Data Protection Regulation sets precise requirements for valid consent, organizations are classified as data controllers and are subject (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  89
    Epistemological dimensions of informational privacy.Klemens Kappel - 2013 - Episteme 10 (2):179-192.
    It seems obvious that informational privacy has an epistemological component; privacy or lack of privacy concerns certain kinds of epistemic relations between a cogniser and sensitive pieces of information. One striking feature of the fairly substantial philosophical literature on informational privacy is that the nature of this epistemological component of privacy is only sparsely discussed. The main aim of this paper is to shed some light on the epistemological component of informational (...). (shrink)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  20. The Japanese sense of information privacy.Andrew A. Adams, Kiyoshi Murata & Yohko Orito - 2009 - AI and Society 24 (4):327-341.
    We analyse the contention that privacy is an alien concept within Japanese society, put forward in various presentations of Japanese cultural norms at least as far back as Benedict in The chrysanthemum and the sword: patterns of Japanese culture. Houghton Mifflin, Boston, 1946. In this paper we distinguish between information privacy and physical privacy. As we show, there is good evidence for social norms of limits on the sharing and use of personal information (i.e. information privacy) (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  21. Unknowableness and Informational Privacy.David Matheson - 2007 - Journal of Philosophical Research 32:251-267.
    Despite their differences, the three most prominent accounts of informational privacy on the contemporary scene—the Control Theory, the Limited Access Theory, and the Narrow Ignorance Theory—all hold that an individual’s informational privacy is at least partly a function of a kind of inability of others to know personal facts about her. This common commitment, I argue, renders the accounts vulnerable to compelling counterexamples. I articulate a new account of informational privacy—the Broad Ignorance Theory—that avoids (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  22.  22
    Unknowableness and Informational Privacy.David Matheson - 2007 - Journal of Philosophical Research 32:251-267.
    Despite their differences, the three most prominent accounts of informational privacy on the contemporary scene—the Control Theory, the Limited Access Theory, and the Narrow Ignorance Theory—all hold that an individual’s informational privacy is at least partly a function of a kind of inability of others to know personal facts about her. This common commitment, I argue, renders the accounts vulnerable to compelling counterexamples. I articulate a new account of informational privacy—the Broad Ignorance Theory—that avoids (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  23.  39
    Information privacy and performance appraisal: An examination of employee perceptions and reactions. [REVIEW]Kevin W. Mossholder, William F. Giles & Mark A. Wesolowski - 1991 - Journal of Business Ethics 10 (2):151 - 156.
    Role-failure acts (Waters and Bird, 1989) have been described as a form of morally questionable activity involving a failure to perform the managerial role. The present study examined employee perceptions and reactions with regard to one form of role-failure act, failure to maintain adequate privacy of performance appraisal information. The study assessed employees' attitudes toward various performance appraisal facets as an invasion of privacy and determined the relationships between these privacy-related attitudes and employees' satisfaction with components of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  24. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   38 citations  
  25. Social pathologies of informational privacy.Wulf Loh - 2022 - Journal of Social Philosophy.
    Following the recent practice turn in privacy research, informational privacy is increasingly analyzed with regard to the “appropriate flow of information” within a given practice, which preserves the “contextual integrity” of that practice (Nissenbaum, 2010, p. 149; 2015). Such a practice-theoretical take on privacy emphasizes the normative structure of practices as well as its structural injustices and power asymmetries, rather than focusing on the intentions and moral considerations of individual or institutional actors. Since privacy norms (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  26.  69
    Autonomy and informational privacy, or gossip: The central meaning of the first amendment.C. Edwin Baker - 2004 - Social Philosophy and Policy 21 (2):215-268.
    My thesis is simple. The right of informational privacy, the great modern achievement often attributed to the classic Samuel Warren and Louis Brandeis article, “The Right to Privacy” , asserts an individual's right not to have private personal information circulated. Warren and Brandeis claimed that individual dignity in a modern society requires that people be able to keep their private lives to themselves and proposed that the common law should be understood to protect this dignity by making (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  7
    The Impact of Health Information Privacy Concerns on Engagement and Payment Behaviors in Online Health Communities.Banggang Wu, Peng Luo, Mengqiao Li & Xiao Hu - 2022 - Frontiers in Psychology 13.
    Online health communities have enjoyed increasing popularity in recent years, especially in the context of the COVID-19 pandemic. However, several concerns have been raised regarding the privacy of users’ personal information in OHCs. Considering that OHCs are a type of data-sharing or data-driven platform, it is crucial to determine whether users’ health information privacy concerns influence their behaviors in OHCs. Thus, by conducting a survey, this study explores the impact of users’ health information privacy concerns on their (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  34
    Consumerism and information privacy: How Upton Sinclair can again save us from ourselves.Benjamin R. Sachs - unknown
    This Note will address the salience of a simple analogy: will privacy law be for the information age what consumer protection law was for the industrial age? At the height of industrialization, the United States market for consumer products faced instability caused by a lack of consumer competence, lack of disclosure about product defects, and advancements in technology that exacerbated the market's flaws. As this Note will show, these same causes of market failure are stirring in today's economy as (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  53
    Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145 - 160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  30.  43
    The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy.Meng-Hsiang Hsu & Feng-Yang Kuo - 2003 - Journal of Business Ethics 42 (4):305 - 320.
    In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  31.  16
    A Process-based Approach to Informational Privacy and the Case of Big Medical Data.Michael Birnhack - 2019 - Theoretical Inquiries in Law 20 (1):257-290.
    Data protection law has a linear logic, in that it purports to trace the lifecycle of personal data from creation to collection, processing, transfer, and ultimately its demise, and to regulate each step so as to promote the data subject’s control thereof. Big data defies this linear logic, in that it decontextualizes data from its original environment and conducts an algorithmic nonlinear mix, match, and mine analysis. Applying data protection law to the processing of big data does not work well, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  32.  23
    An ethical duty to protect one's own information privacy?Anita L. Allen - 2013 - Alabama Law Review 64 (4):845-866.
    People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate (...) privacy from other kinds of privacy, including psychological privacy; and (ii) distinguish between descriptive and normative aspects of informational privacy in a way that differentiates a (mere) loss of privacy from a violation of privacy. I argue that Floridi’s privacy theory, in its present form, does not explicitly address either challenge. However, I also argue that his ontological theory provides us with a novel way of analyzing the impact that digital technologies have had for informational privacy. I conclude by suggesting that Floridi’s privacy framework can be interpreted as containing the elements of a “personality theory of privacy,” which would be useful to examine in a separate study. (shrink)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  34.  13
    Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145-160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  35.  3
    Research in the Biotech Age: Can Informational Privacy Compete?Wilhelm Peekhaus - 2008 - Bulletin of Science, Technology and Society 28 (1):48-59.
    This article examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government's broader neoliberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational privacy and the need for medical information for research purposes. Consideration is given to the debate about whether privacy for medical information serves or hinders the “public good” (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  29
    Rethinking the concept of the right to information privacy: a Japanese perspective.Kiyoshi Murata & Yohko Orito - 2008 - Journal of Information, Communication and Ethics in Society 6 (3):233-245.
    PurposeThe purpose of this paper is to reconsider the concept of the right to information privacy and to propose, from a Japanese perspective, a revised conception of this right that is suitable for the modern information society.Design/methodology/approachFirst, the concept of privacy and personal information protection in the information society is briefly explained. After that, confused situations in Japan caused by the enforcement of Act on the Protection of Personal Information are described followed by the analysis of the Japanese (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  17
    Challenging Themes in American Health Information Privacy and the Public’s Health: Historical and Modern Assessments.James G. Hodge & Kieran G. Gostin - 2004 - Journal of Law, Medicine and Ethics 32 (4):670-679.
    Protecting the privacy of individually-identifiable health data is a dominant health policy objective in the new millennium. Technological, economic, and health-related reasons substantiate the development of a national electronic health information infrastructure. Through this emerging infrastructure, billions of pieces of health data of varying sensitivities are exchanged annually to provide health care services and service transactions, conduct health research, and promote the public’s health. These multi-purpose, rapid exchanges of electronic health data, far removed from the typical disclosure of health (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  18
    Challenging Themes in American Health Information Privacy and the Public’s Health: Historical and Modern Assessments.James G. Hodge & Kieran G. Gostin - 2004 - Journal of Law, Medicine and Ethics 32 (4):670-679.
    Protecting the privacy of individually-identifiable health data is a dominant health policy objective in the new millennium. Technological, economic, and health-related reasons substantiate the development of a national electronic health information infrastructure. Through this emerging infrastructure, billions of pieces of health data of varying sensitivities are exchanged annually to provide health care services and service transactions, conduct health research, and promote the public’s health. These multi-purpose, rapid exchanges of electronic health data, far removed from the typical disclosure of health (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  34
    Separation, risk, and the necessity of privacy to well-being: A comment on Adam Moore's toward informational privacy rights.Kenneth Einar Himma - manuscript
    Moore attempts to show that privacy, conceived as "control over access to oneself and to information about oneself" is "necessary" for human well-being. Moore grounds his argument in an analysis of the need for physical separation, which Moore suggests is universal among animal species. Moore notes, "One basic finding of animal studies is that virtually all animals seek periods of individual seclusion or small-group intimacy." Citing several studies involving rats and other animals, Moore points out that a lack of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40. Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
  41. I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
  42. Privacy Rights and Public Information.Benedict Rumbold & James Wilson - 2018 - Journal of Political Philosophy 27 (1):3-25.
    This article concerns the nature and limits of individuals’ rights to privacy over information that they have made public. For some, even suggesting that an individual can have a right to privacy over such information may seem paradoxical. First, one has no right to privacy over information that was never private to begin with. Second, insofar as one makes once-private information public – whether intentionally or unintentionally – one waives one’s right to privacy to that information. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  43. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  44. Inner privacy of conscious experiences and quantum information.Danko D. Georgiev - 2020 - Biosystems 187:104051.
    The human mind is constituted by inner, subjective, private, first-person conscious experiences that cannot be measured with physical devices or observed from an external, objective, public, third-person perspective. The qualitative, phenomenal nature of conscious experiences also cannot be communicated to others in the form of a message composed of classical bits of information. Because in a classical world everything physical is observable and communicable, it is a daunting task to explain how an empirically unobservable, incommunicable consciousness could have any physical (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  45.  21
    Others’ information and my privacy: an ethical discussion.Yuanye Ma - 2023 - Journal of Information, Communication and Ethics in Society 21 (3):259-270.
    Purpose Privacy has been understood as about one’s own information, information that is not one’s own is not typically considered with regards to an individual’s privacy. This paper aims to draw attention to this issue for conceptualizing privacy when one’s privacy is breached by others’ information. Design/methodology/approach To illustrate the issue that others' information can breach one's own privacy, this paper uses real-world applications of forensic genealogy and recommender systems to motivate the discussion. Findings In (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46. Online information of vaccines: information quality, not only privacy, is an ethical responsibility of search engines.Pietro Ghezzi, Peter Bannister, Gonzalo Casino, Alessia Catalani, Michel Goldman, Jessica Morley, Marie Neunez, Andreu Prados-Bo, Pierre Robert Smeeters, Mariarosaria Taddeo, Tania Vanzolini & Luciano Floridi - 2021 - Frontiers in Medicine 7.
    The fact that Internet companies may record our personal data and track our online behavior for commercial or political purpose has emphasized aspects related to online privacy. This has also led to the development of search engines that promise no tracking and privacy. Search engines also have a major role in spreading low-quality health information such as that of anti-vaccine websites. This study investigates the relationship between search engines’ approach to privacy and the scientific quality of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  68
    Privacy, public health, and controlling medical information.Adam D. Moore - 2010 - HEC Forum 22 (3):225-240.
    This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy, turning then to consider cases which illustrate when and how privacy may be overridden by public health concerns.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  48.  24
    Privacy and artificial intelligence: challenges for protecting health information in a new era.Blake Murdoch - 2021 - BMC Medical Ethics 22 (1):1-5.
    BackgroundAdvances in healthcare artificial intelligence (AI) are occurring rapidly and there is a growing discussion about managing its development. Many AI technologies end up owned and controlled by private entities. The nature of the implementation of AI could mean such corporations, clinics and public bodies will have a greater than typical role in obtaining, utilizing and protecting patient health information. This raises privacy issues relating to implementation and data security. Main bodyThe first set of concerns includes access, use and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  68
    Privacy, the Internet of Things and State Surveillance: Handling Personal Information within an Inhuman System.Adam Henschke - 2020 - Moral Philosophy and Politics 7 (1):123-149.
    The Internet of Things (IoT) is, in part, an information handling system that can remove humans from the information handling process. The particular problem explored is how we are to understand privacy when considering informational systems that handle personal information in ways that impact people’s lives when there is no human operator in direct contact with that personal information. I argue that these new technologies need to take concepts like privacy into account, but also, that we ought (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  22
    Information Relevance Model of Customized Privacy for IoT.Wei Zhou & Selwyn Piramuthu - 2015 - Journal of Business Ethics 131 (1):19-30.
    Motivated by advances in mass customization in business practice, explosion in the number of internet of things devices, and the lack of published research on privacy differentiation and customization, we propose a contextual information relevance model of privacy. We acknowledge the existence of individual differences with respect to unique security and privacy protection needs. We observe and argue that it is unfair and socially inefficient to treat privacy in a uniform manner whereby a large proportion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 1000