Results for 'Invasion of privacy'

1000+ found
Order:
  1. Invasions of privacy (Guest editor's preface).Michael Clark - 1995 - Law Computers and AI 4 (3):1-3.
     
    Export citation  
     
    Bookmark  
  2. Invasions of privacy: Violations of boundaries.G. Kateb, J. Rosen & F. Schauer - 2001 - Social Research: An International Quarterly 68 (1):203-235.
     
    Export citation  
     
    Bookmark  
  3.  15
    Justifying Gain-Based Remedies for Invasions of Privacy.Normann Witzleb - 2009 - Oxford Journal of Legal Studies 29 (2):325-363.
    In Campbell v MGN Ltd [2004] UKHL 22, [2004] 2 AC 457 the House of Lords approved of protecting privacy interests through incrementally developing the existing action for breach of confidence. Lord Hoffmann suggested that this modified cause of action, instead of being based upon the duty of good faith, focuses upon the protection of human autonomy and dignity. This article explores how this change in underlying values affects the availability of gain-based remedies, where breach of confidence is relied (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  4. The last invasion of human privacy and its psychological consequences on survivors: A critique of the practice of embalming.George B. Palermo & Edward J. Gumz - 1994 - Theoretical Medicine and Bioethics 15 (4).
    In spite of the fact that it is required only occasionally for sanitary reasons and not legally mandatory, the practice of embalming is widespread in contemporary American society. This study explores the historical, cultural and psychological factors which gave rise to the practice of embalming and why the practice continues. Two case studies are presented in which delayed grief reactions were present; linkages with embalming are described. It is suggested that the frightening finitude of the self and a fear of (...)
     
    Export citation  
     
    Bookmark  
  5. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  6.  58
    A cognitive access definition of privacy.Madison Powers - 1996 - Law and Philosophy 15 (4):369 - 386.
    Many of the contemporary disagreements regarding privacy are conceptual in nature. They concern the meaning or definition of privacy and the analytic basis of distinguishing privacy rights from other kinds of rights recognized within moral, political, or legal theories. The two main alternatives within this debate include reductionist views, which seek a narrow account of the kinds of invasions or intrusions distinctly involving privacy losses, and anti-reductionist theories, which treat a much broader array of interferences with (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  7. The invasion of the private sphere in Iran.Mehrangiz Kar - 2003 - Social Research: An International Quarterly 70 (3):829-836.
    The Iranian government is a theocracy—the only one in the world today. The clergy control all three branches of government. The supreme leader or velayat-e-faqu’ih is also a cleric. In such a political system all legislation and policy making are conducted in accordance with the leaders’ interpretation of Islamic law or Shari’a. In this paper I will examine the extent to which these laws and policies allow the government to intrude into the private sphere of life and intervene in the (...)
     
    Export citation  
     
    Bookmark  
  8. The Liberal Value of Privacy.Boudewijn de Bruin - 2010 - Law and Philosophy 29 (5):505-534.
    This paper presents an argument for the value of privacy that is based on a purely negative concept of freedom only. I show that privacy invasions may decrease a person’s negative freedom as well as a person’s knowledge about the negative freedom she possesses. I argue that not only invasions that lead to actual interference, but also invasions that lead to potential interference (many cases of identity theft) constitute actual harm to the invadee’s liberty interests, and I critically (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  9.  16
    The Liberal Value of Privacy.Boudewijn Bruin - 2010 - Law and Philosophy 29 (5):505-534.
    This paper presents an argument for the value of privacy that is based on a purely negative concept of freedom only. I show that privacy invasions may decrease a person’s negative freedom as well as a person’s knowledge about the negative freedom she possesses. I argue that not only invasions that lead to actual interference, but also invasions that lead to potential interference (many cases of identity theft) constitute actual harm to the invadee’s liberty interests, and I critically (...)
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  10.  32
    Spinoza, Feminism and Privacy: Exploring an Immanent Ethics of Privacy.Janice Richardson - 2014 - Feminist Legal Studies 22 (3):225-241.
    In this article I explore the usefulness of Spinoza’s ethics for feminism by considering ways in which it allows feminists to rethink privacy. I draw upon some of Spinoza’s central ideas to address the following question: when should information be classed as private and when should it be communicated? This is a question that is considered by the common law courts. Attempts to find a moral underpinning for such a tortious action against invasions of privacy have tended to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. The nature and value of the.Moral Right To Privacy - 2002 - Public Affairs Quarterly 16 (4):329.
     
    Export citation  
     
    Bookmark  
  12. Privacy Invasion by the News Media: Three Ethical Models.Candace Cummins Gauthier - 2002 - Journal of Mass Media Ethics 17 (1):20-34.
    In this article I provide an overview of philosophical conceptions of privacy and suggest 3 models to assist with the ethical analysis of privacy invasion by the news media. The models are framed by respect for persons, the comparison of harms and benefits, and the transfer of power. After describing the models, I demonstrate how they can be applied to news reporting that invades the privacy of public figures.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  47
    Young people online and the social value of privacy.Valerie Steeves & Priscilla Regan - 2014 - Journal of Information, Communication and Ethics in Society 12 (4):298-313.
    Purpose– The purpose of this paper is to develop a conceptual framework to contextualize young people’s lived experiences of privacy and invasion online. Social negotiations in the construction of privacy boundaries are theorized to be dependent on individual preferences, abilities and context-dependent social meanings.Design/methodology/approach– Empirical findings of three related Ottawa-based studies dealing with young people’s online privacy are used to examine the benefits of online publicity, what online privacy means to young people and the social (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  14.  27
    Recognising a privacy-invasion tort: the conceptual unity of informational and intrusion claims.Paul Wragg - 2019 - Cambridge Law Journal 78 (2):409-437.
    This article presents the novel view that ‘inclusion into seclusion’ and ‘public disclosure of embarrassing facts’ (‘misuse of private information’ (“MOPI”) in the UK), which both the academic commentary and US case law treat as two separate legal actions, occupy the same conceptual space. This claim has important practical ramifications. No further development of the law is required to realise an actionable intrusion tort as part of the UK’s MOPI tort. The argument is defended in doctrinal and theoretical terms, and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  57
    Perceived Access to Self-relevant Information Mediates Judgments of Privacy Violations in Neuromonitoring and Other Monitoring Technologies.D. A. Baker, N. J. Schweitzer & Evan F. Risko - 2013 - Neuroethics 7 (1):43-50.
    Advances in technology are bringing greater insight into the mind, raising a host of privacy concerns. However, the basic psychological mechanisms underlying the perception of privacy violations are poorly understood. Here, we explore the relation between the perception of privacy violations and access to information related to one’s “self.” In two studies using demographically diverse samples, we find that privacy violations resulting from various monitoring technologies are mediated by the extent to which the monitoring is thought (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  16.  27
    Invasive Neurotechnology: A Study of the Concept of Invasiveness in Neuroethics.Benjamin Collins & Eran Klein - 2023 - Neuroethics 16 (1):1-12.
    Invasive neurotechnologies are a frequent subject of discussion in neuroethics. Technologies, like deep brain stimulation and implantable brain-computer interfaces, are thought to hold significant promise for human health and well-being, but they also raise important ethical questions about autonomy, safety, stigma, privacy, and agency, among others. The terms ‘invasive’ and ‘invasiveness’ are commonly applied to these and other neurotechnologies, yet the concept of invasiveness itself is rarely defined or delimited. Some have suggested that invasiveness may have multiple meanings – (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  11
    Privacy rights in the age of Street View.Ben Lopez - 2010 - Acm Sigcas Computers and Society 40 (4):62-69.
    Recently, Street View has come under public scrutiny due to its apparent disregard for personal privacy. Indeed, individuals should have the right to censor personal information -- prior to its public disclosure - and Street View-like services do seem to call this fundamental right into question. As the issue stands, Street View technology provides a useful service that allows for quick and easy access to most places within the vicinity of a main public road. In response to the public (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18.  55
    Liberal and communitarian defenses of workplace privacy.Rita C. Manning - 1997 - Journal of Business Ethics 16 (8):817-823.
    In this paper, I survey liberal and communitarian defenses of privacy, paying particular attention to defenses of privacy in the workplace. I argue that liberalism cannot explain all our of intuitions about the wrongness of workplace invasions of privacy. Communitarianism, on the other hand, is able to account for these intuitions.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  19.  50
    The Impact of Individual Ethics on Reactions to Potentially Invasive HR Practices.G. Stoney Alder, Marshall Schminke & Terry W. Noel - 2007 - Journal of Business Ethics 75 (2):201-214.
    In recent years, the practices of work organizations have raised increasing concerns regarding individual privacy at work. It is clear that people expect and value privacy in their personal lives. However, the extent to which privacy perceptions influence individuals’ work attitudes is less clear. Research has explored the extent to which employee perceptions of privacy derive from characteristics of the programs themselves. However, there is a paucity of research that examines how the characteristics of the individual (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  20.  39
    Information privacy and performance appraisal: An examination of employee perceptions and reactions. [REVIEW]Kevin W. Mossholder, William F. Giles & Mark A. Wesolowski - 1991 - Journal of Business Ethics 10 (2):151 - 156.
    Role-failure acts (Waters and Bird, 1989) have been described as a form of morally questionable activity involving a failure to perform the managerial role. The present study examined employee perceptions and reactions with regard to one form of role-failure act, failure to maintain adequate privacy of performance appraisal information. The study assessed employees' attitudes toward various performance appraisal facets as an invasion of privacy and determined the relationships between these privacy-related attitudes and employees' satisfaction with components (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  21.  54
    Privacy as a Matter of Taste and Right.Alexander Rosenberg - 2000 - Social Philosophy and Policy 17 (2):68.
    Privacy is something we all want. We seek privacy to prevent others from securing information about us that is immediately embarrassing, and so causes us pain but not material loss. We also value privacy for strategic reasons in order to prevent others from imposing material and perhaps psychic costs upon us. I use the expression “securing information” so that it covers everything from the immediate sensory data that a voyeur acquires to the financial data a rival may (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22. Does privacy undermine community.Mark Tunick - 2001 - Journal of Value Inquiry 35 (4):517-534.
    Does privacy--the condition of being invisible to public scrutiny--in so emphasizing individual rights, undermine community? One objection to privacy is that it is a license to engage in antisocial activity that undermines social norms. Another objection is that privacy encourages isolation and anonymity, also undermining community. Drawing on the political theory of Hegel, I argue that privacy can promote community. Some invasions of privacy can undermine a sort of autonomy essential for maintaining a community. I (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  23. Electronic monitoring and privacy issues in business-marketing: The ethics of the doubleclick experience. [REVIEW]Darren Charters - 2002 - Journal of Business Ethics 35 (4):243 - 254.
    The paper examines the ethics of electronic monitoring for advertising purposes and the implications for Internet user privacy using as a backdrop DoubleClick Incs recent controversy over matching previously anonymous user profiles with personally identifiable information. It explores various ethical theories that are applicable to understand privacy issues in electronic monitoring. It is argued that, despite the fact that electronic monitoring always constitutes an invasion of privacy, it can still be ethically justified on both Utilitarian and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  24.  80
    Treating Inmates as Moral Agents: A Defense of the Right to Privacy in Prison.William Bülow - 2014 - Criminal Justice Ethics 33 (1):1-20.
    This paper addresses the question of prison inmates' right to privacy from an ethical perspective. I argue that the right to privacy is important because of its connection to moral agency and that the protection of privacy is warranted by different established philosophical theories about the justification of legal punishment. I discuss the practical implications of this argument by addressing two potential problems. First, how much privacy should be allowed during imprisonment in order to meet the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  59
    Respecting privacy in an information society: A journalist's dilemma.L. Paul Husselbee - 1994 - Journal of Mass Media Ethics 9 (3):145 – 156.
    Private information about individuals contained in computerized data bases is readily available to journalists, who have a moral obligation to inform the masses as a means of redistributing power in society. The journalist's duty to inform, however, conflicts with the duty to respect the privacy of individuals. Because legislation is largely ineffective in protecting individual privacy, the journalist's moral responsibility assumes additional weight. However, the journalist should not allow the claim of privacy to keep him or her (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  26.  47
    Privacy, Informed Consent, and Participant Observation.Julie Zahle - 2017 - Perspectives on Science 25 (4):465-487.
    In the literature on social research, adherence to the principle of informed consent is sometimes recommended on the ground that the privacy of those being studied is hereby protected. The principle has it that before becoming part of a study, a competent individual must receive information about its purpose, use, etc., and on this basis freely agree to participate. Joan Sieber motivates the employment of informed consent as a way to safeguard research participants' privacy as follows: "A research (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27.  59
    Privacy and autonomy: From Warren and brandeis to Roe and Cruzan.Thomas Halper - 1996 - Journal of Medicine and Philosophy 21 (2):121-135.
    Warren and Brandeis ' tort against invasion of privacy had chiefly a social goal: to enlist the courts to reinforce the norm of civility. Years later in Griswold v. Connecticut, the Supreme Court announced a constitutional right of privacy that was personal in focus. Here and in subsequent rulings on abortion and the " right to die," it became apparent that Warren and Brandeis ' Victorian " right to be let alone" had metamorphosed into a right to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  32
    Privacy and the public interest.Elizabeth Burns Coleman & Caron Eastgate Dann - 2016 - Empedocles: European Journal for the Philosophy of Communication 7 (1):57-70.
    Privacy laws are fundamental to protecting individual freedom and autonomy against the tyranny of the majority, and the social orthodoxy imposed through gossip. While it is widely recognized within academic debate that there are limits to freedom of expression, there is little debate about the limits to the right of privacy. We argue that the public interest is a limit to the right of privacy, mediating between the rights of expression and freedom and the flow of information. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  29.  64
    Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges.Corey M. Angst - 2009 - Journal of Business Ethics 90 (S2):169 - 178.
    When information is transformed from what has traditionally been a paper-based format into digitized elements with meaning associated to them, new and intriguing discussions begin surrounding proper and improper uses of this codified and easily transmittable information. As these discussions continue, some health care providers, insurers, laboratories, pharmacies, and other healthcare stakeholders are creating and retroactively digitizing our medical information with the unambiguous endorsement of the federal government.Some argue that these enormous databases of medical information offer improved access to timely (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  30.  45
    Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective.Weiyin Hong, Frank K. Y. Chan & James Y. L. Thong - 2019 - Journal of Business Ethics 168 (3):539-564.
    This paper investigates the drivers and inhibitors of Internet privacy concern. Applying the Multidimensional Development Theory to the online environment, we identify the important factors under four dimensions—i.e., environmental, individual, information management, and interaction management. We tested our model using data from an online survey of 2417 individuals in Hong Kong. The results show that the factors under all four dimensions are significant in the formation of Internet privacy concern. Specifically, familiarity with government legislation, Internet knowledge, benefit of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31. Government Surveillance and Why Defining Privacy Matters in a Post‐Snowden World.Kevin Macnish - 2016 - Journal of Applied Philosophy (2).
    There is a long-running debate as to whether privacy is a matter of control or access. This has become more important following revelations made by Edward Snowden in 2013 regarding the collection of vast swathes of data from the Internet by signals intelligence agencies such as NSA and GCHQ. The nature of this collection is such that if the control account is correct then there has been a significant invasion of people's privacy. If, though, the access account (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  32.  13
    HIV‐Infected Physicians and the Practice of Seriously Invasive Procedures.Lawrence Gostin - 1989 - Hastings Center Report 19 (1):32-39.
    The practice of HIV‐infected physicians who perform seriously invasive procedures calls for professional guidance to protect patient safety and the privacy of infected physicians.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  33.  69
    Privacy and personal identity.Wade L. Robison - 1997 - Ethics and Behavior 7 (3):195 – 205.
    What marks the traditional privacy torts of disclosure, intrusion, false light, and appropriation is that they require an invasion, an intrinsic harm caused by someone doing something to us without our consent. But we are now voluntarily giving up information about ourselves--to our physicians, for instance--that is being gathered into databases that are brought and sold and that can be appropriated by those who wish to assume our identities. The way in which our privacy is put at (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the analysis will (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  49
    SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. [REVIEW]Ann Cavoukian, Jules Polonetsky & Christopher Wolf - 2010 - Identity in the Information Society 3 (2):275-294.
    The 2003 blackout in the northern and eastern U.S. and Canada which caused a $6 billion loss in economic revenue is one of many indicators that the current electrical grid is outdated. Not only must the grid become more reliable, it must also become more efficient, reduce its impact on the environment, incorporate alternative energy sources, allow for more consumer choices, and ensure cyber security. In effect, it must become smart. Significant investments in the billions of dollars are being made (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  25
    Caller ID – whose privacy is it, anyway?Kenneth G. Ferguson - 2001 - Journal of Business Ethics 29 (3):227 - 237.
    Caller ID or CND (Calling Number Display) is an internationally-available telecommunication service first introduced into the United States about ten years ago. Caller ID utilizes a new form of technology which enables telephone subscribers to identify the numbers (and/or names) of callers before picking up their telephones. This service has been widely assailed as an invasion of the caller''s right to anonymity, a right which allegedly subsists as an important component of the caller''s right to privacy. However, if (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Owning Genetic information and Gene enhancement techniques: Why privacy and property rights may undermine social control of the human genome.Adam D. Moore - 2000 - Bioethics 14 (2):97–119.
    In this article I argue that the proper subjects of intangible property claims include medical records, genetic profiles, and gene enhancement techniques. Coupled with a right to privacy these intangible property rights allow individuals a zone of control that will, in most cases, justifiably exclude governmental or societal invasions into private domains. I argue that the threshold for overriding privacy rights and intangible property rights is higher, in relation to genetic enhancement techniques and sensitive personal information, than is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  38.  20
    Natural Law, Slavery, and the Right to Privacy Tort.Anita Allen - unknown
    In 1905 the Supreme Court of Georgia became the first state high court to recognize a freestanding “right to privacy” tort in the common law. The landmark case was Pavesich v. New England Life Insurance Co. Must it be a cause for deep jurisprudential concern that the common law right to privacy in wide currency today originated in Pavesich’s explicit judicial interpretation of the requirements of natural law? Must it be an additional worry that the court which originated (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  21
    Owning Genetic Information and Gene Enhancement Techniques: Why Privacy and Property Rights May Undermine Social Control of the Human Genome.Adam D. Moore - 2002 - Bioethics 14 (2):97-119.
    In this article I argue that the proper subjects of intangible property claims include medical records, genetic profiles, and gene enhancement techniques. Coupled with a right to privacy these intangible property rights allow individuals a zone of control that will, in most cases, justifiably exclude governmental or societal invasions into private domains. I argue that the threshold for overriding privacy rights and intangible property rights is higher, in relation to genetic enhancement techniques and sensitive personal information, than is (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  40. Not the doctor’s business: Privacy, personal responsibility and data rights in medical settings.Carissa Véliz - 2020 - Bioethics 34 (7):712-718.
    This paper argues that assessing personal responsibility in healthcare settings for the allocation of medical resources would be too privacy-invasive to be morally justifiable. In addition to being an inappropriate and moralizing intrusion into the private lives of patients, it would put patients’ sensitive data at risk, making data subjects vulnerable to a variety of privacy-related harms. Even though we allow privacy-invasive investigations to take place in legal trials, the justice and healthcare systems are not analogous. The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Newsgathering and Privacy: Expanding Ethics Codes to Reflect Change in the Digital Media Age.Ginny Whitehouse - 2010 - Journal of Mass Media Ethics 25 (4):310-327.
    Media ethics codes concerning privacy must be updated considering the ease with which information now can be gathered from social networks and disseminated widely. Existing codes allow for deception and privacy invasion in cases of overriding public need when no alternate means are available but do not adequately define what constitutes need or alternate means, or weigh in the harm such acts do to the public trust and the profession. Building on the ethics theories of Sissela Bok (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  42.  95
    Nsa Management Directive #424: Secrecy and Privacy in the Aftermath of Edward Snowden.George R. Lucas - 2014 - Ethics and International Affairs 28 (1):29-38.
    Whatever else one might say concerning the legality, morality, and prudence of his actions, Edward Snowden, the former U.S. National Security Agency contractor, is right about the notion of publicity and informed consent, which together constitute the hallmark of democratic public policy. In order to be morally justifiable, any strategy or policy involving the body politic must be one to which it would voluntarily assent when fully informed about it. This, in essence, was Snowden's argument for leaking, in June 2013, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  43.  18
    Ethics of Virtual Assistants.Juan Ignacio del Valle, Joan Llorca Albareda & Jon Rueda - 2023 - In Francisco Lara & Jan Deckers (eds.), Ethics of Artificial Intelligence. Cham: Springer Nature Switzerland. pp. 87-107.
    Among the many applications of artificial intelligence (AI), virtual assistants are one of the tools most likely to grow in the future. The development of these systems may play an increasingly important role in many facets of our lives. Therefore, given their potential importance and present and future weight, it is worthwhile to analyze what kind of challenges they entail. In this chapter, we will provide an overview of the ethical aspects of artificial virtual assistants. First, we provide a conceptual (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  93
    Consent and the Right to Privacy.Kevin Mills - 2022 - Journal of Applied Philosophy 39 (4):721-735.
    There is currently intense debate about the significance of user consent to data practices. Consent is often taken to legitimate virtually any data practice, no matter how invasive. Many scholars argue, however, that user consent is typically so defective as to be ‘meaningless’ and that user privacy should thus be protected by substantive legislation that does not rely (or does not rely heavily) on consent. I argue that both views rest on serious mistakes about the validity conditions for consent. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  45.  38
    Defending the “private” in constitutional privacy.Judith W. Decew - 1987 - Journal of Value Inquiry 21 (3):171-184.
    Suppose we agree to reject the view that privacy has narrow scope and consequently is irrelevant to the constitutional privacy cases. We then have (at least) these two options: (1) We might further emphasize and draw out similarities between tort and constitutional privacy claims in order to develop a notion of privacy fundamental to informational and Fourth Amendment privacy concerns as well as the constitutional cases. We can cite examples indicating this is a promising position. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  53
    Piercing the veil: Ethical issues in ethnographic research.Brian Schrag - 2008 - Science and Engineering Ethics 15 (2):135-160.
    It is not unusual for researchers in ethnography (and sometimes Institutional Review Boards) to assume that research of “public” behavior is morally unproblematic. I examine an historical case of ethnographic research and the sustained moral outrage to the research expressed by the subjects of that research. I suggest that the moral outrage was legitimate and articulate some of the ethical issues underlying that outrage. I argue that morally problematic Ethnographic research of public behavior can derive from research practice that includes (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  93
    Psychosocial and Ethical Aspects in Non-Invasive EEG-Based BCI Research—A Survey Among BCI Users and BCI Professionals.Gerd Grübler, Abdul Al-Khodairy, Robert Leeb, Iolanda Pisotta, Angela Riccio, Martin Rohm & Elisabeth Hildt - 2013 - Neuroethics 7 (1):29-41.
    In this paper, the results of a pilot interview study with 19 subjects participating in an EEG-based non-invasive brain–computer interface (BCI) research study on stroke rehabilitation and assistive technology and of a survey among 17 BCI professionals are presented and discussed in the light of ethical, legal, and social issues in research with human subjects. Most of the users were content with study participation and felt well informed. Negative aspects reported include the long and cumbersome preparation procedure, discomfort with the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  48.  38
    Rights and Duties of HIV Infected Health Care Professionals.Lawrence O. Gostin - 2002 - Health Care Analysis 10 (1):67-85.
    In 1991, the CDC recommended that health care workers (HCWs) infectedwith HIV or HBV (HbeAg positive) should be reviewed by an expert paneland should inform patients of their serologic status before engaging inexposure-prone procedures. The CDC, in light of the existing scientificuncertainty about the risk of transmission, issued cautiousrecommendations. However, considerable evidence has emerged since 1991suggesting that we should reform national policy. The data demonstratesthat risks of transmission of infection in the health care setting areexceedingly low. Current policy, moreover, does (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  49. The Gesta Guillelmi of William of Poitiers.William of Poitiers - 1998 - Oxford University Press UK.
    William of Poitiers began his career as a knight before studying in the schools of Poitiers and entering the Church. He became a chaplain in the household of William the Conqueror, and was able to give a first-hand account of the events of 1066-7. The Gesta Guillelmi, his unfinished biography of the king, is particularly important for its detailed description of William's campaigns in Normandy, the careful preparations he made for the invasion of England, the battle of Hastings and (...)
    No categories
     
    Export citation  
     
    Bookmark  
  50.  21
    Ethics of Imprisonment : Essays in Criminal Justice Ethics.William Bülow - 2014 - Dissertation, Royal Institute of Technology, Stockholm
    This licentiate thesis consists of three essays which all concern the ethics of imprisonment and what constitutes an ethically defensible treatment of criminal offenders. Paper 1 defends the claim that prisoners have a right to privacy. I argue that the right to privacy is important because of its connection to moral agency. For that reasons is the protection of inmates’ right to privacy also warranted by different established philosophical theories about the justification of legal punishment. I discuss (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000