Results for ' Privacy'

1000+ found
Order:
  1. The nature and value of the.Moral Right To Privacy - 2002 - Public Affairs Quarterly 16 (4):329.
     
    Export citation  
     
    Bookmark  
  2.  26
    Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development.Katie Shilton & Daniel Greene - 2019 - Journal of Business Ethics 155 (1):131-146.
    Privacy is a critical challenge for corporate social responsibility in the mobile device ecosystem. Mobile application firms can collect granular and largely unregulated data about their consumers, and must make ethical decisions about how and whether to collect, store, and share these data. This paper conducts a discourse analysis of mobile application developer forums to discover when and how privacy conversations, as a representative of larger ethical debates, arise during development. It finds that online forums can be useful (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3. Uneasy Access: Privacy for Women in a Free Society.Anita L. Allen - 1988 - Rowman & Littlefield Publishers.
    'Anita L. Allen breaks new ground...A stunning indictment of women's status in contemporary society, her book provides vital original scholarly research and insight.' |s-NEW DIRECTIONS FOR WOMEN.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   49 citations  
  4.  13
    The erosion of privacy.Marie A. Wright & John S. Kakalik - 1997 - Acm Sigcas Computers and Society 27 (4):22-25.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  10
    Nonstandard Observers and the Nature of Privacy.Eldon Soifer & David Elliott - 2014 - Social Theory and Practice 40 (2):185-206.
    Observation by nonstandard observers has different implications for privacy than observation by ordinary human beings. This seemingly trivial point yields important insights about privacy. Searching for the characteristic that explains this difference reveals that privacy is importantly related to our interest in how others see us, and the derivative interest in controlling the information upon which others’ perceptions are based. This also casts light on the important relationships between privacy, autonomy, and the development of public personae.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  6. Chapter outline.A. Myth Versus Reality, D. Publicity not Privacy, E. Guilty Until Proven Innocent, J. Change & Rotation Mentality - forthcoming - Moral Management: Business Ethics.
    No categories
     
    Export citation  
     
    Bookmark  
  7. Morality and Privacy.Peter Singer - 2007 - Free Inquiry 27:17-17.
  8.  9
    On Cartesian Privacy.R. C. Solomon - 1974 - Southern Journal of Philosophy 12 (4):527-536.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  9.  16
    PC-SyncBB: A privacy preserving collusion secure DCOP algorithm.Tamir Tassa, Tal Grinshpoun & Avishay Yanai - 2021 - Artificial Intelligence 297 (C):103501.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  8
    Biobanks as a Central Part of the Finnish Growth and Genomic Strategies: How to Balance Privacy in an Innovation Ecosystem?Sirpa Soini - 2016 - Journal of Law, Medicine and Ethics 44 (1):24-34.
    Finland has aimed to make itself an international leader in genomic research and related business and, in working towards that goal, has enacted biobank legislation. The Biobank Act requires biobanks to gain approval, be supervised, and register at the national level. Numerous other laws may also apply in any given research setting, such as the Personal Data Act, the Medical Research Act, and the Act on Medical Use of Human Organs and Tissues. In terms of privacy protection, anonymization is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Living with Your Biographical Subject: Special Problems of Distance, Privacy and Trust in the Biography of G. Ledyard Stebbins Jr.Vassiliki Betty Smocovitis - 1999 - Journal of the History of Biology 32 (3):421 - 438.
    This paper explores the special problems encountered by the biographer of a living scientific subject. In particular, it explores the complex of problems that emerges from the intense interpersonal dynamic involving issues of distance, privacy and trust. It also explores methodological problems having to do with oral history interviews and other supporting documentation. It draws on the personal experience of the author and the biographical subject of G. Ledyard Stebbins Jr., the botanist, geneticist and evolutionist. It also offers prescriptives (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  12.  6
    Cop to Cop: Negotiating Privacy and Security in the Examining Room.Sondra S. Crosby & George J. Annas - 2020 - Journal of Law, Medicine and Ethics 48 (1):169-171.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  36
    Agreement and privacy.R. M. Dancy - 1969 - Journal of Philosophy 66 (18):561-580.
  14.  15
    A Hegelian Basis for Privacy as an Economic Right.Marco De Boni & Martyn Prigmore - 2004 - Contemporary Political Theory 3 (2):168-187.
  15.  6
    Fixing Broken Doors: Strategies for Drafting Privacy Policies Young People Can Understand.Valerie Steeves, Jacquelyn Burkell & Anca Micheti - 2010 - Bulletin of Science, Technology and Society 30 (2):130-143.
    The goal of this project is to identify guidelines for privacy policies that children and teens can accurately interpret with relative ease. A three-pronged strategy was used to achieve this goal. First, an analysis of the relevant literature on reading was undertaken to identify the document features that affect comprehension. Second, focus groups were conducted to examine their experience and practices in the interpretation of privacy policies found on sites that have been identified as favorite kids’ sites. Based (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  16. Baby marrow: ethicists and privacy.A. Zucker - 1992 - Journal of Medical Ethics 18 (3):125-141.
    A family had a child in large part to use its marrow in the hopes of saving the life of an older child afflicted with leukaemia. Public response from medical ethicists was negative. This paper argues that what the family did was not clearly wrong and that the ethicists should not have made public pronouncements calling the morals of the family into question.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  17.  19
    Biometric cards: privacy invaders vs. a safer America.Amanda Woodcock - 2005 - Acm Sigcas Computers and Society 35 (1):3-3.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  18.  28
    Listening and privacy management in mobile phone conversations: cross-cultural comparison of Finnish, German, Korean and United States students.Debra Worthington, Margaret Fitch-Hauser, Tuula-Riitta Välikoski, Margarete Imhof & Sei-Hill Kim - 2011 - Empedocles: European Journal for the Philosophy of Communication 3 (1):43-60.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  19.  10
    Electronic surveillance and personal privacy: an historical perspective.Jan Yestingsmeier - 1984 - Acm Sigcas Computers and Society 13 (4, 1-3):10-13.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  20. From subjectivity to privacy and back again.G. M. Tamas - 2002 - Social Research: An International Quarterly 69 (1):201-221.
     
    Export citation  
     
    Bookmark  
  21. Online Data Privacy and the Justification of the Market.Jennifer Baker - 2016 - In Luciano Floridi & Mariarosaria Taddeo (eds.), The responsibilities of online service providers. Cham: Springer.
     
    Export citation  
     
    Bookmark  
  22.  6
    Hypocricy and Privacy.Eldon Soifer & BĂŠla Szabados - 2002 - Journal of Philosophical Research 27:601-618.
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  29
    On cartesian privacy.R. C. Solomon - 1974 - Southern Journal of Philosophy 12 (4):527-536.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  24.  24
    Wittgenstein and Cartesian Privacy.Robert C. Solomon - 1972 - Philosophy Today 16 (3):163-179.
    Robert Solomon's essay makes interesting reading against the background of the current efforts to find common ground between continental philosophersand the British and American philosophers. His article begins with a central point in analytic-linguistic philosophy. Soon it becomes a confrontation withphenomenology and eventually a confrontation of issues within phenomenology.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25. How Much Privacy Does Business Need?R. Stevenson - 2001 - Business and Society Review 47.
     
    Export citation  
     
    Bookmark  
  26.  27
    Religion, Experience and Privacy.Stewart R. Sutherland - 1984 - Religious Studies 20 (1):121 - 132.
  27.  8
    The right to privacy vs. uniformitarianism.Tibor R. Machan - 1992 - Journal of Social Philosophy 23 (2):75-84.
  28. The right to privacy.Colleen Angel - 2000 - Journal of Information Ethics 9 (2):11-25.
     
    Export citation  
     
    Bookmark  
  29. The value of privacy.David Archard - unknown
  30. Case study concerning privacy in the care of patients with HIV.Atsushi Asai & Kenji Miki - 2013 - Eubios Journal of Asian and International Bioethics 23 (1):13-16.
     
    Export citation  
     
    Bookmark  
  31.  47
    Explaining the privacy of afterimages and pains.Edward Averill - 1978 - Philosophy and Phenomenological Research 38 (March):299-314.
  32. Coherence and Inconsistency in Privacy Laws.Eric Barbry - 2009 - Hermès: La Revue Cognition, communication, politique 53 (1):145 - +.
     
    Export citation  
     
    Bookmark  
  33. Wittgenstein, rules and origin - privacy.D. F. Ackermann - 1983 - Journal of the Indian Council of Philosophical Research 1:63-69.
  34. Prisions and Privacy.M. Margaret Falls - 1989 - Social Philosophy Today 2:312-323.
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  11
    The Nature of Privacy.Roland Garrett - 1974 - Philosophy Today 18 (4):263-284.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. Autonomy, Paternalism, and Privacy: Some Remarks on Anita Allen.B. Roessler - 2013 - APA Newsletter Philosophy and Law 13:13-17.
  37.  29
    COVID-19, Personal Data Protection and Privacy in India.Mohamad Ayub Dar & Shahnawaz Ahmad Wani - 2022 - Asian Bioethics Review 15 (2):125-140.
    The corona pandemic altered many traditional and historical norms of society and law. COVID-19 created a humanitarian crisis in some parts of globe, while pandemic privacy and civil liberties were under threat all over world. To combat the deadly virus, individual liberty and equality were compromised. This paper focuses on how India’s health problem has compromised people’s right to privacy. It will highlight how strict executive policies led to the creation of a massive surveillance system in the name (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  2
    The Notion of Logical Privacy: Has Its Incoherence Been Demonstrated?David Pole - 1968 - Critica 2 (5):71-88.
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  2
    The Data Privacy Law of Brexit: Theories of Preference Change.Paul M. Schwartz - 2021 - Theoretical Inquiries in Law 22 (2):111-152.
    Upon Brexit, the United Kingdom chose to follow the path of EU data protection and remain tied to the requirements of the General Data Protection Regulation (GDPR). It even enacted the GDPR into its domestic law. This Article evaluates five models relating to preference change, demonstrating how they identify different dimensions of Brexit while providing a rich explanation of why a legal system may or may not reject an established transnational legal order. While market forces and a “Brussels Effect” played (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  10
    Secure and user privacy-preserving searching in peer-to-peer networks.J. Sen - 2013 - Logic Journal of the IGPL 21 (4):603-629.
  41.  6
    Quality, Costs, Privacy and Electronic Medical Data.David W. Bates - 1997 - Journal of Law, Medicine and Ethics 25 (2-3):111-112.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  13
    Surveillance and privacy.Ronald Bayer & Amy L. Fairchild - forthcoming - Public Health Ethics: Theory, Policy, and Practice.
    Direct download  
     
    Export citation  
     
    Bookmark  
  43. A Dworkinian right to privacy in New Zealand.Mark Bennett & Petra Butler - 2018 - In Salman Khurshid, Lokendra Malik & Veronica Rodriguez-Blanco (eds.), Dignity in the legal and political philosophy of Ronald Dworkin. New Delhi, India: Oxford University Press.
     
    Export citation  
     
    Bookmark  
  44.  39
    Defending the “private” in constitutional privacy.Judith W. Decew - 1987 - Journal of Value Inquiry 21 (3):171-184.
    Suppose we agree to reject the view that privacy has narrow scope and consequently is irrelevant to the constitutional privacy cases. We then have (at least) these two options: (1) We might further emphasize and draw out similarities between tort and constitutional privacy claims in order to develop a notion of privacy fundamental to informational and Fourth Amendment privacy concerns as well as the constitutional cases. We can cite examples indicating this is a promising position. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45. La tirannia della privacy.G. Agamben - unknown
     
    Export citation  
     
    Bookmark  
  46. Commercial Speech Bruises Health Privacy in the Supreme Court.Anita L. Allen - 2011 - Hastings Center Report 41 (6):8-9.
    Heath services come with the promise of confidentiality.1 The ethical mandate to safeguard the confidentiality of personal health information aligns with legal mandates to do the same. Numerous state and federal laws demand one form of health data confidentiality or another, best illustrated by the Health Insurance Portability and Accountability Act.2 In early 2011, the Department of Health and Human Services decided to take a tougher stand against HIPAA violators, utilizing powers created by the Health Information Technology for Economic and (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  47.  30
    The Use of Data Mining by Private Health Insurance Companies and Customers’ Privacy.Yeslam Al-Saggaf - 2015 - Cambridge Quarterly of Healthcare Ethics 24 (3):281-292.
    :This article examines privacy threats arising from the use of data mining by private Australian health insurance companies. Qualitative interviews were conducted with key experts, and Australian governmental and nongovernmental websites relevant to private health insurance were searched. Using Rationale, a critical thinking tool, the themes and considerations elicited through this empirical approach were developed into an argument about the use of data mining by private health insurance companies. The argument is followed by an ethical analysis guided by classical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  48
    Review of Moore: Privacy[REVIEW]Louisa Bertch Green - 1986 - Ethics 96 (3):646-647.
  49. "265." Medical Records: Enhancing Privacy, Preserving the Common Good," The Hastings Center Report, March-April 1999, pp. 14-23". [REVIEW]Unauthorized Use - forthcoming - Hastings Center Report.
     
    Export citation  
     
    Bookmark  
  50.  43
    Anita Allen: Unpopular privacy: what must we hide?: Oxford University Press, Oxford, New York, 2011, xv + 259 pp, ISBN: 978-0195141375. [REVIEW]Tony Doyle - 2013 - Ethics and Information Technology 15 (1):63-67.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000