Results for ' Privacy in literature'

1000+ found
Order:
  1. Privacy in literature and film: Introduction.Farhad Kazemi - 2003 - Social Research: An International Quarterly 70 (3):933-934.
     
    Export citation  
     
    Bookmark  
  2.  18
    Privacy in new media in Israel.Yuval Karniel & Amit Lavie-Dinur - 2012 - Journal of Information, Communication and Ethics in Society 10 (4):288-304.
    PurposeThe purpose of the paper is to draw a new map confronting the issue of privacy in the new media age in general, and in the State of Israel in particular.Design/methodology/approachThe paper presents an in‐depth review based on professional literature covering the topics of privacy, new media, social networks, and Israel. The paper considers all citizens of Israel, the vast majority, however, of which are Jewish.FindingsThe study has found that even though Israeli social network users may be (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  35
    Privacy in Public Places.Jeffrey Rosen - 2000 - Cardozo Studies in Law and Literature 12 (1):167-191.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Forensic Brain-Reading and Mental Privacy in European Human Rights Law: Foundations and Challenges.Sjors Ligthart, Thomas Douglas, Christoph Bublitz, Tijs Kooijmans & Gerben Meynen - 2020 - Neuroethics (2):1-13.
    A central question in the current neurolegal and neuroethical literature is how brain-reading technologies could contribute to criminal justice. Some of these technologies have already been deployed within different criminal justice systems in Europe, including Slovenia, Italy, England and Wales, and the Netherlands, typically to determine guilt, legal responsibility, or recidivism risk. In this regard, the question arises whether brain-reading could permissibly be used against the person's will. To provide adequate legal protection from such non-consensual brain-reading in the European (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  5.  8
    The Victorians and the Visual Imagination.Kate Flint & Reader in Victorian and Modern English Literature and Fellow Kate Flint - 2000 - Cambridge University Press.
    Richly illustrated study drawing on art, literature and science to explore Victorian attitudes towards sight.
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  6.  20
    Forensic Brain-Reading and Mental Privacy in European Human Rights Law: Foundations and Challenges.Sjors Ligthart, Thomas Douglas, Christoph Bublitz, Tijs Kooijmans & Gerben Meynen - 2020 - Neuroethics 14 (2):191-203.
    A central question in the current neurolegal and neuroethical literature is how brain-reading technologies could contribute to criminal justice. Some of these technologies have already been deployed within different criminal justice systems in Europe, including Slovenia, Italy, England and Wales, and the Netherlands, typically to determine guilt, legal responsibility, or recidivism risk. In this regard, the question arises whether brain-reading could permissibly be used against the person's will. To provide adequate legal protection from such non-consensual brain-reading in the European (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  7. Autonomy and privacy in Wittgenstein and Beckett.Gary Oct 15- Kemp - 2003 - Philosophy and Literature 27 (1):164-187.
  8.  70
    Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  9.  28
    Revisiting Moor's Towards a Theory of Privacy in the Information Age.Florence Appel - 2010 - Acm Sigcas Computers and Society 40 (2):31-34.
    Back in 1988, when my department chair encouraged me to pursue my interest in developing a course on the social and ethical impact of computing, I was thrilled at the prospect but had no idea how difficult it would be to find resources to support my teaching. I did some pre-Web digging and found two organizations that delivered on their promises to provide me with valuable sources of material: ACM SIGCAS and CPSR. I quickly joined each group, subscribed to each (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  10.  10
    Beyond Privacy: Benefits and Burdens of E-Health Technologies in Primary Care.Julie Aultman & Erin Dean - 2014 - Journal of Clinical Ethics 25 (1):50-64.
    In this mixed methods study we identify and assess ethical and pragmatic issues and dilemmas surrounding e-health technologies in the context of primary care, including what is already in the literature. We describe how primary healthcare professionals can access reliable and accurate data, improve the quality of care for patients, and lower costs while following institutional guidelines to protect patients. Using qualitative and quantitative methodologies we identify several underlying ethical and pragmatic burdens and benefits of e-health technologies. The 41 (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  16
    Online privacy behavior among youth in the Global South.Jan Michael Alexandre Cortez Bernadas & Cheryll Ruth Soriano - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):17-30.
    Purpose The purpose of this paper is two-fold. First, it explores the extent to which diversity of connectivity or the connection through multiple internet access points may facilitate online privacy behavior. Second, it explains the diversity of connectivity-online privacy behavior link in terms of information literacy. Design/methodology/approach Situated in the context of urban poor youth in the Philippines, this paper used a quantitative approach, specifically an interview-administered survey technique. Respondents were from three cities in Metro Manila. To test (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  16
    Digital Whoness: Identity, Privacy and Freedom in the Cyberworld.Rafael Capurro, Michael Eldred & Daniel Nagel - 2013 - De Gruyter.
    The first aim is to provide well-articulated concepts by thinking through elementary phenomena of today s world, focusing on privacy and the digital, to clarify who we are in the cyberworld hence a phenomenology of digital whoness. The second aim is to engage critically, hermeneutically with older and current literature on privacy, including in today s emerging cyberworld. Phenomenological results include concepts of i) self-identity through interplay with the world, ii) personal privacy in contradistinction to the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  13.  19
    Lost in translation? Conceptions of privacy and independence in the technical development of AI-based AAL.Kris Vera Hartmann, Nadia Primc & Giovanni Rubeis - 2023 - Medicine, Health Care and Philosophy 26 (1):99-110.
    AAL encompasses smart home technologies that are installed in the personal living environment in order to support older, disabled, as well as chronically ill people with the goal of delaying or reducing their need for nursing care in a care facility. Artificial intelligence (AI) is seen as an important tool for assisting the target group in their daily lives. A literature search and qualitative content analysis of 255 articles from computer science and engineering was conducted to explore the usage (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. Four Facets of Privacy and Intellectual Freedom in Licensing Contracts for Electronic Journals.Alan Rubel & Mei Zhang - 2015 - College and Research Libraries 4 (76):427-449.
    This is a study of the treatment of library patron privacy in licenses for electronic journals in academic libraries. We begin by distinguishing four facets of privacy and intellectual freedom based on the LIS and philosophical literature. Next, we perform a content analysis of 42 license agreements for electronic journals, focusing on terms for enforcing authorized use and collection and sharing of user data. We compare our findings to model licenses, to recommendations proposed in a recent treatise (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15. Basic resources in bioethics: 1996-1999.National Reference Center for Bioethics Literature - 2000 - Kennedy Institute of Ethics Journal 10 (1):81-102.
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  19
    Naming the Principles in Democritus: An Epistemological Problem.Literature Enrico PiergiacomiCorresponding authorDepartement of - forthcoming - Apeiron.
    Objective Apeiron was founded in 1966 and has developed into one of the oldest and most distinguished journals dedicated to the study of ancient philosophy, ancient science, and, in particular, of problems that concern both fields. Apeiron is committed to publishing high-quality research papers in these areas of ancient Greco-Roman intellectual history; it also welcomes submission of articles dealing with the reception of ancient philosophical and scientific ideas in the later western tradition. The journal appears quarterly. Articles are peer-reviewed on (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  66
    Privacy and lack of knowledge.Don Fallis - 2013 - Episteme 10 (2):153-166.
    Two sorts of connections between privacy and knowledge (or lack thereof) have been suggested in the philosophical literature. First, Alvin Goldman has suggested that protecting privacy typically leads to less knowledge being acquired. Second, several other philosophers (e.g. Parent, Matheson, Blaauw and Peels) have claimed that lack of knowledge is definitive of having privacy. In other words, someone not knowing something is necessary and sufficient for someone else having privacy about that thing. Or equivalently, someone (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  18.  75
    Privacy and the judgment of others.Jeffery L. Johnson - 1989 - Journal of Value Inquiry 23 (2):157-168.
    This article defends a new model of personal privacy. Privacy should be understood as demarcating culturally defined aspects of an individual's life in which he or she is granted immunity from the judgment of others. Such an analysis is preferable to either of the two favorite models of privacy in the current literature. The judgment of others model preserves all of the insights of the liberty and information models of privacy, But avoids the obvious problems (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  19.  31
    Privacy Rights Forfeiture.Mark Hanin - 2022 - Journal of Ethics and Social Philosophy 22 (2).
    Privacy rights can surely be waived. But can they also be forfeited? If so, why and under what conditions? This article takes up these questions by developing a novel theory of privacy rights forfeiture that draws inspiration from Judith Thomson’s canonical work on privacy. The paper identifies two species of forfeiture rooted in modes of negligent and reckless conduct and argues that both self-directed and other-regarding considerations play a role in grounding forfeiture. The paper also contributes to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  20.  18
    Credibility and trust of information privacy at the workplace in Slovakia. The use of intuition.Frithiof Svenson, Eva Ballová Mikušková & Markus A. Launer - 2023 - Journal of Information, Communication and Ethics in Society 21 (3):302-321.
    Purpose Employees may feel overwhelmed with information privacy choices and have difficulties understanding what they are committing to in the digital workplace. This paper aims to analyze the role of different thinking styles for effort reduction, such as the use of intuition, when employees make decisions about the credibility and trustworthiness of workplace information privacy issues in Slovakia. While the General Data Protection Regulation sets precise requirements for valid consent, organizations are classified as data controllers and are subject (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  21
    Self-censorship in social networking sites (SNSs) – privacy concerns, privacy awareness, perceived vulnerability and information management.Mark Warner & Victoria Wang - 2019 - Journal of Information, Communication and Ethics in Society 17 (4):375-394.
    PurposeThis paper aims to investigate behavioural changes related to self-censorship (SC) in social networking sites (SNSs) as new methods of online surveillance are introduced. In particular, it examines the relationships between SC and four related factors: privacy concerns (PC), privacy awareness (PA), perceived vulnerability (PV) and information management (IM).Design/methodology/approachA national wide survey was conducted in the UK (N= 519). The data were analysed to present both descriptive and inferential statistical findings.FindingsThe level of online SC increases as the level (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22.  49
    Bioethics Resources on the Web.National Reference Center for Bioethics Literature - 2000 - Kennedy Institute of Ethics Journal 10 (2):175-188.
    In lieu of an abstract, here is a brief excerpt of the content:Kennedy Institute of Ethics Journal 10.2 (2000) 175-188 [Access article in PDF] Scope Note 38 Bioethics Resources on the Web * Once described as an "enormous used book store with volumes stacked on shelves and tables and overflowing onto the floor" (Pool, Robert. 1994. Turning an Info-Glut into a Library. Science 266 (7 October): 20-22, p. 20), Internet resources now receive numerous levels of organization, from basic directory listings (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  33
    Privacy and occupational health services.A. Heikkinen - 2006 - Journal of Medical Ethics 32 (9):522-525.
    Privacy is a key ethical principle in occupational health services. Its importance is emphasised in several laws, in ethical codes of conduct as well as in the literature, yet there is only very limited empirical research on privacy in the occupational health context. Conceptual questions on privacy in the occupational health context are discussed. The baseline assumption is that, in this context, privacy cannot be approached and examined only from the employee’s vantage point but the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  25.  17
    A bibliometric analysis of privacy and ethics in IEEE Security and Privacy.Jonathan Tse, Dawn E. Schrader, Dipayan Ghosh, Tony Liao & David Lundie - 2015 - Ethics and Information Technology 17 (2):153-163.
    The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  24
    Ethical issues in the use of in-depth interviews: literature review and discussion.Peter Allmark, Jonathan Boote, Eleni Chambers, Amanda Clarke, Ann McDonnell, Andrew Thompson & Angela Mary Tod - 2009 - Research Ethics 5 (2):48-54.
    This paper reports a literature review on the topic of ethical issues in in-depth interviews. The review returned three types of article: general discussion, issues in particular studies, and studies of interview-based research ethics. Whilst many of the issues discussed in these articles are generic to research ethics, such as confidentiality, they often had particular manifestations in this type of research. For example, privacy was a significant problem as interviews sometimes probe unexpected areas. For similar reasons, it is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  27.  8
    Ethical aspects in eHealth – design of a privacy-friendly system.Milica Milutinovic & Bart De Decker - 2016 - Journal of Information, Communication and Ethics in Society 14 (1):49-69.
    Purpose– The medical advances and historical fluctuations in the demographics are contributing to the rise of the average age. These changes are increasing the pressure to organize adequate care to a growing number of individuals. As a way to provide efficient and cost-effective care, eHealth systems are gaining importance. However, this trend is creating new ethical concerns. Major issues are privacy and patients’ control over their data. To deploy these systems on a large scale, they need to offer strict (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  7
    British Political Thought in History, Literature, and Theory 1500-1800.David Armitage (ed.) - 2006 - Cambridge University Press.
    The history of British political thought has been one of the most fertile fields of Anglo-American historical writing in the last half-century. David Armitage brings together an interdisciplinary and international team of authors to consider the impact of this scholarship on the study of early modern British history, English literature, and political theory. Leading historians survey the impact of the history of political thought on the 'new' histories of Britain and Ireland; eminent literary scholars offer novel critical methods attentive (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29. Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   42 citations  
  30. The Privacy Dependency Thesis and Self-Defense.Lauritz Aastrup Munch & Jakob Thrane Mainz - forthcoming - AI and Society:1-11.
    If I decide to disclose information about myself, this act can undermine other people’s ability to effectively conceal information about themselves. One case in point involves genetic information: if I share ‘my’ genetic information with others, I thereby also reveal genetic information about my biological relatives. Such dependencies are well-known in the privacy literature and are often referred to as ‘privacy dependencies’. Some take the existence of privacy dependencies to generate a moral duty to sometimes avoid (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  31.  57
    Protecting privacy to protect mental health: the new ethical imperative.Elias Aboujaoude - 2019 - Journal of Medical Ethics 45 (9):604-607.
    Confidentiality is a central bioethical principle governing the provider–patient relationship. Dating back to Hippocrates, new laws have interpreted it for the age of precision medicine and electronic medical records. This is where the discussion of privacy and technology often ends in the scientific health literature when Internet-related technologies have made privacy a much more complex challenge with broad psychological and clinical implications. Beyond the recognised moral duty to protect patients’ health information, clinicians should now advocate a basic (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  90
    A Democratic Conception of Privacy.Annabelle Lever - 2013 - Authorhouse, UK.
    Carol Pateman has said that the public/private distinction is what feminism is all about. I tend to be sceptical about categorical pronouncements of this sort, but this book is a work of feminist political philosophy and the public/private distinction is what it is all about. It is motivated by the belief that we lack a philosophical conception of privacy suitable for a democracy; that feminism has exposed this lack; and that by combining feminist analysis with recent developments in political (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  33.  12
    Mystery in its Passions: Literary Explorations: Literary Explorations.Anna-Teresa Tymieniecka, International Society for Phenomenology and Literature & World Institute for Advanced Phenomenological Research and Learning - 2004 - Springer Verlag.
    Through mystery, literature reveals to us the Great Unknown. While we are absorbed by the matters at hand with the present enactment of our life, groping for clues to handle them, it is through literature that we discover the hidden strings underlying their networks. Hence our fascination with literature. But there is more. The creative act of the human being, its proper focus, holds the key to the Sezam of life: to the great metaphysical/ontopoietic questions which (...) may disclose. First, it leads us to the sublimal grounds of transformation in the human soul, source of the specifically human significance of life (Analecta Husserliana, Volume III, XIX, XXIII, XXVII) Second, it leads us to the unveiling of the hidden workings of life in the twilight of knowing in a dialectic between The Visible and the Invisible, (Volume LXXV, 2002, Analecta Husserliana) down to the ontopoietic truth. (Volume LXXVI, 2002, Analecta Husserliana) This prying into the unknown which provokes the human being as he or she attempts to conquer, step by step, a space of existence, finds its culmination in the phenomenon of mystery as the subject of the present collection. Its formulation brings us to the greatest question of all: the enigmatic solidarity -in-distinctiveness of human cognition and existence. Papers are written by: Tony E. Afejuku, Gary Backhaus, Paul G. Beidler, Matthew J. Duffy, Raffaela Giovagnoli, Jennifer Anna Gosetti-Ferencei, Matti Itkonen, Lawrence Kimmel, Catherine Malloy, Vladimir L. Marchenkov, Nancy Mardas, Howard Pearce, Bernadette Prochaska, Victor Gerald Rivas, M.J. Sahlani, Dennis Skocz, Jadwiga S. Smith, Mara Stafecka, Max Statkiewicz, Mariola Sulkowska, Anna-Teresa Tymieniecka, Leon U. Weinman, Tim Weiss. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34.  35
    Privacy and Democracy.Paul Voice - 2016 - South African Journal of Philosophy 35 (3):1-9.
    The meaning of privacy has been frequently disputed in the philosophical and -/- legal literature since Warren and Brandeis first argued for it as a distinct and -/- important personal and social value. Nevertheless, while the meaning of privacy -/- is held to be vague, there is general agreement that Warren and Brandeis were -/- correct in their assessment of its value. Theorists of democracy, on the other hand, -/- have been ambivalent towards the realm of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  14
    Online privacy as a corporate social responsibility: an empirical study.Irene Pollach - 2011 - Business Ethics: A European Review 20 (1):88-102.
    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two. Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. The findings indicate that only (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  36.  27
    Privacy and Social Freedom.Ferdinand David Schoeman - 1992 - Cambridge University Press.
    This book attacks the assumption found in moral philosophy that social control as such is an intellectually and morally destructive force. It replaces this view with a richer and deeper perspective on the nature of social character aimed at showing how social freedom cannot mean immunity from social pressure. The author demonstrates how our competence as rational and social agents depends on a constructive adaptation of social control mechanisms. Our facility at achieving our goals is enhanced, rather than undermined, by (...)
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  37. Philosophical Dimensions of Privacy: An Anthology.Ferdinand David Schoeman (ed.) - 1984 - New York: Cambridge University Press.
    The aim of compiling the various essays presented here is to make readily accessible many of the most significant and influential discussions of privacy to be found in the literature. In addition to being representative of the diversity of attitudes toward privacy, this collection has a coherence that results from the authors' focus on the same issues and theories. The main issue addressed in this book is the moral significance of privacy. Some social science and legal (...)
  38.  93
    Online privacy as a corporate social responsibility: an empirical study.Irene Pollach - 2011 - Business Ethics, the Environment and Responsibility 20 (1):88-102.
    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two. Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. The findings indicate that only (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39.  47
    Privacy, Informed Consent, and Participant Observation.Julie Zahle - 2017 - Perspectives on Science 25 (4):465-487.
    In the literature on social research, adherence to the principle of informed consent is sometimes recommended on the ground that the privacy of those being studied is hereby protected. The principle has it that before becoming part of a study, a competent individual must receive information about its purpose, use, etc., and on this basis freely agree to participate. Joan Sieber motivates the employment of informed consent as a way to safeguard research participants' privacy as follows: "A (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  6
    Culture, Genre, and Literary Vocation: Selected Essays on American Literature.J. Leland Miller Professor of American History Literature and Eloquence Michael Davitt Bell & Michael Davitt Bell - 2001 - University of Chicago Press.
    In Culture, Genre, and Literary Vocation, Michael Davitt Bell charts the important and often overlooked connection between literary culture and authors' careers. Bell's influential essays on nineteenth-century American writers—originally written for such landmark projects as The Columbia Literary History of the United States and The Cambridge History of American Literature—are gathered here with a major new essay on Richard Wright. Throughout, Bell revisits issues of genre with an eye toward the unexpected details of authors' lives, and invites us to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  53
    Technology and ethical dilemmas in a medical setting: Privacy, professional autonomy, life and death. [REVIEW]Gloria Lankshear & David Mason - 2001 - Ethics and Information Technology 3 (3):223-233.
    A growing literature addresses the ethical implications of electronic surveillance at work, frequently assigning ethical priority to values such as the right to privacy. This paper suggests that, in practice, the issues are sociologically more complex than some accounts suggest. This is because many workplace electronic technologies not designed or deployed for surveillance purposes nevertheless embody surveillance capacity. This capacity may not be immediately obvious to participants or lend itself to simple deployment. Moreover, because of their primary functions, (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  39
    Shared Privacy and Public Intimacy: The Hybrid Spaces of Augmented Reality Art.Horea Avram - 2016 - Cultura 13 (2):173-182.
    Can we speak about a specific real-virtual spatiality in the contexts offered by the post-desktop technological philosophy and practice? Does Augmented Reality have the potential to produce a different type of space in which private and public converge up to the point of their cross identification? More exactly, to create, what media theoretician Jenny Edbauer Rice names a “zone of public intimacy”? The goal of this essay is to explore the possible answers to these questions. At the core of my (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  13
    Sex and Gender in Medieval and Renaissance Texts: The Latin Tradition.Barbara K. Gold, Barbara H. Gold, Carolina Distinguished Professor of Classics and Comparative Literature Paul Allen Miller, Paul Allen Miller & Charles Platter - 1997 - SUNY Press.
    Examines interrelated topics in Medieval and Renaissance Latin literature: the status of women as writers, the status of women as rhetorical figures, and the status of women in society from the fifth to the early seventeenth century.
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  20
    A critical contribution to theoretical foundations of privacy studies.Thomas Allmer - 2011 - Journal of Information, Communication and Ethics in Society 9 (2):83-101.
    PurposeAlthough there is much public talk about privacy, it seems that there is no definite answer; rather, ambiguous concepts of what privacy is and what indeed privacy in peril is. The overall aim of this paper is to clarify how privacy is defined in the academic literature, what the different concepts of privacy have in common, what distinguish them from one another, and what advantages and disadvantages such definitions have in order to clarify if (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  45.  1
    Natural Privacy.John Perry - 2023 - Washington University Review of Philosophy 3:83-92.
    Over the last century and a half, appeals to “privacy” have become common in American law. The result is a rather chaotic mix of concepts, which philosophers might be able to help bring into some kind of order. But I want to discuss one kind of privacy that isn’t discussed much in the law literature, what I call “natural privacy.” I strongly suspect that unlike cricket or checkers or bridge with respect to our concept of game (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46. The Moral Significance of Privacy Dependencies.Lauritz Aastrup Munch & Jakob Thrane Mainz - 2023 - Philosophy and Technology 36 (4):1-19.
    Often, when we share information about ourselves, we contribute to people learning personal things about others. This may happen because what we share about ourselves can be used to infer personal information about others. Such dependencies have become known as privacy dependencies in the literature. It is sometimes claimed that the scope of the right to privacy should be expanded in light of such dependencies. For example, some have argued that inferring information about others can violate their (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  47.  13
    Do managerial ethics and legal education influence online privacy policies in Greater China?David C. Li - 2018 - Asian Journal of Business Ethics 7 (2):117-136.
    This study evaluated the online privacy policies of business-to-consumer e-commerce firms in five industries of mainland China, Taiwan, and Hong Kong. Based on the neo-institutional theory, we also tested whether the four institutional factors, top management’s legal education, managerial ethics, rule of law in information privacy protection and peer practices, had any effects on e-information and e-communication content. Results from a content analysis of 229 websites found that the privacy policy contents that complied with generally accepted (...) standards were lesser in mainland China firms than those of Taiwan and Hong Kong firms. There were also significant differences in the amount of contents among the five industries. The results of regression analyses showed the importance of all four factors on e-information content. They also showed the importance of coercive, mimetic, and normative isomorphisms on e-information content. The validation of normative isomorphism highlighted the importance of managerial ethics and legal education. Our findings supplemented extant literature which identified economic motive as the main factor in influencing privacy practice disclosures. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49. “Cyber-Security, Privacy and the Covid-19 Attenuation?”.Vincent Samar - 2021 - Notre Dame Journal of Legislation 47:1-38.
    Large-scale data brokers collect massive amounts of highly personal consumer information to be sold to whoever will pay their price, even at the expense of sacrificing individual privacy and autonomy in the process. In this Article, I will show how a proper understanding and justification for a right to privacy, in context to both protecting private acts and safeguarding information and states of affairs for the performance of such acts, provides a necessary background framework for imposing legal restrictions (...)
    No categories
     
    Export citation  
     
    Bookmark  
  50.  9
    Is privacy a problem during bedside handovers? A practice-oriented discussion paper.Simon Malfait, Ann Van Hecke, Wim Van Biesen & Kristof Eeckloo - 2019 - Nursing Ethics 26 (7-8):2288-2297.
    Bedside handover is the delivery of the nurse-to-nurse handover at the patient’s bedside. Although increasingly used in nursing, nurses report many barriers for delivering the bedside handover. Among these barriers is the possibility of breaching the patient’s privacy. By referring to this concept, nurses add a legal and ethical dimension to the delivery of the bedside handover, making implementation of the method difficult or even impossible. In this discussion article, the concept of privacy during handovers is being discussed (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000