Results for 'Privacy'

981 found
Order:
  1. The nature and value of the.Moral Right To Privacy - 2002 - Public Affairs Quarterly 16 (4):329.
     
    Export citation  
     
    Bookmark  
  2.  91
    Blind-sided by privacy? Digital contact tracing, the Apple/Google API and big tech’s newfound role as global health policy makers.Tamar Sharon - 2020 - Ethics and Information Technology 23 (S1):45-57.
    Since the outbreak of COVID-19, governments have turned their attention to digital contact tracing. In many countries, public debate has focused on the risks this technology poses to privacy, with advocates and experts sounding alarm bells about surveillance and mission creep reminiscent of the post 9/11 era. Yet, when Apple and Google launched their contact tracing API in April 2020, some of the world’s leading privacy experts applauded this initiative for its privacy-preserving technical specifications. In an interesting (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  3. Chapter outline.A. Myth Versus Reality, D. Publicity not Privacy, E. Guilty Until Proven Innocent, J. Change & Rotation Mentality - forthcoming - Moral Management: Business Ethics.
    No categories
     
    Export citation  
     
    Bookmark  
  4. An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  5. Security and Privacy Protection in Developing Ethical AI: A Mixed-Methods Study from a Marketing Employee Perspective.Xuequn Wang, Xiaolin Lin & Bin Shao - forthcoming - Journal of Business Ethics:1-20.
    Despite chatbots’ increasing popularity, firms often fail to fully achieve their benefits because of their underutilization. We argue that ethical concerns dealing with chatbot-related privacy and security may prevent firms from developing a culture of embracing chatbot use and fully integrating chatbots into their workflows. Our research draws upon the stimulus-organism-response theory (SOR) and a study by Floridi et al. (Minds and Machines, 28:689–707, 2018 ) on the ethical artificial intelligence framework to investigate how chatbot affordances can foster employees’ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  36
    Trust and privacy in the context of user-generated health data.Brandon Williams, Eliot Storer, Charles Lotterman, Rachel Conrad Bracken, Svetlana Borodina & Kirsten Ostherr - 2017 - Big Data and Society 4 (1).
    This study identifies and explores evolving concepts of trust and privacy in the context of user-generated health data. We define “user-generated health data” as data captured through devices or software and used outside of traditional clinical settings for tracking personal health data. The investigators conducted qualitative research through semistructured interviews with researchers, health technology start-up companies, and members of the general public to inquire why and how they interact with and understand the value of user-generated health data. We found (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  7. Anti-doping, purported rights to privacy and WADA's whereabouts requirements: A legal analysis.Oskar MacGregor, Richard Griffith, Daniele Ruggiu & Mike McNamee - 2013 - Fair Play 1 (2):13-38.
    Recent discussions among lawyers, philosophers, policy researchers and athletes have focused on the potential threat to privacy posed by the World Anti-Doping Agency’s (WADA) whereabouts requirements. These requirements demand, among other things, that all elite athletes file their whereabouts information for the subsequent quarter on a quarterly basis and comprise data for one hour of each day when the athlete will be available and accessible for no advance notice testing at a specified location of their choosing. Failure to file (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  8. La tirannia della privacy.G. Agamben - unknown
     
    Export citation  
     
    Bookmark  
  9.  17
    Research, Digital Health Information and Promises of Privacy: Revisiting the Issue of Consent.Timothy Caulfield, Blake Murdoch & Ubaka Ogbogu - 2020 - Canadian Journal of Bioethics / Revue canadienne de bioéthique 3 (1):164-171.
    The obligation to maintain the privacy of patients and research participants is foundational to biomedical research. But there is growing concern about the challenges of keeping participant information private and confidential. A number of recent studies have highlighted how emerging computational strategies can be used to identify or reidentify individuals in health data repositories managed by public or private institutions. Some commentators have suggested the entire concept of privacy and anonymity is “dead”, and this raises legal and ethical (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  28
    Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma.H. M. Verhelst, A. W. Stannat & G. Mecacci - 2020 - Science and Engineering Ethics 26 (6):2975-2984.
    Rapid advancements in machine learning techniques allow mass surveillance to be applied on larger scales and utilize more and more personal data. These developments demand reconsideration of the privacy-security dilemma, which describes the tradeoffs between national security interests and individual privacy concerns. By investigating mass surveillance techniques that use bulk data collection and machine learning algorithms, we show why these methods are unlikely to pinpoint terrorists in order to prevent attacks. The diverse characteristics of terrorist attacks—especially when considering (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  23
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, gain insights from and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  12. Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Leenes R. Van Brakel R. Gutwirth S. De Hert P., Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13.  38
    Emerging Social Norms in the UK and Japan on Privacy and Revelation in SNS.Andrew A. Adams, Kiyoshi Murata, Yohko Orito & Pat Parslow - 2011 - International Review of Information Ethics 16:12.
    Semi-structured interviews with university students in the UK and Japan, undertaken in 2009 and 2010, are analysed with respect to the revealed attitudes to privacy, self-revelation and revelation by/of others on SNS.
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  11
    Electronic Data Bases and Privacy: Policy for the 1990s.Susan H. Gray - 1989 - Science, Technology and Human Values 14 (3):242-257.
    This article reviews the debate over electronic data bases and privacy, with an emphasis on the United States since the Privacy Act of 1974. Proposals that have value for the 1990s, both nationally and internationally, are synthesized. Some current controversies are discussed, including some of the reasons for the failure of previous privacy legislation. The way social values affect both statistical and intelligence systems is reviewed, and the debate over organizational necessity and computerization is examined. Some controversial (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  11
    Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones.Jennifer Parisi & Gordon A. Gow - 2008 - Bulletin of Science, Technology and Society 28 (1):60-68.
    In recent years there has been concern among law enforcement and national security organizations about the use of “anonymous” prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates oppose such regulatory measures, arguing that there is little practical value in attempting to register prepaid mobile devices, and the issue raises important questions about a citizen's entitlement to anonymity (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  9
    There Is No Ethical Automation: Stanislav Petrov’s Ordeal by Protocol.Technology Antón Barba-Kay A. Center on Privacy, Usab Institute for Practical Ethics Dc, Usaantón Barba-Kay is Distinguished Fellow at the Center on Privacy Ca, Hegel-Studien Nineteenth Century European Philosophy Have Appeared in the Journal of the History of Philosophy, Among Others He has Also Published Essays About Culture The Review of Metaphysics, Commonweal Technology for A. Broader Audience in the New Republic & Other Magazines A. Web of Our Own Making – His Book About What the Internet Is The Point - 2024 - Journal of Military Ethics 23 (3):277-288.
    While the story of Stanislav Petrov – the Soviet Lieutenant Colonel who likely saved the world from nuclear holocaust in 1983 – is often trotted out to advocate for the view that human beings ought to be kept “in the loop” of automated weapons’ responses, I argue that the episode in fact belies this reading. By attending more closely to the features of this event – to Petrov’s professional background, to his familiarity with the warning system, and to his decisions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  55
    Does Telepathy Threaten Mental Privacy?Stephen Braude - 2020 - Journal of Scientific Exploration 34 (2).
    A long-standing concern (or at least a belief) about ESP, held by both skeptics and believers in the paranormal, is that if telepathy really occurs, then it might pose a threat to mental privacy. And it’s easy enough to see what motivates that view. Presumably we like to think that we enjoy privileged access to our own mental states. But if others could come to know telepathically what we’re thinking or feeling, then (among other disquieting prospects) that would mean (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  4
    Mental Privacy, Cognitive Liberty, and Hog-tying.P. Crutchfield - 2024 - Journal of Bioethical Inquiry 21 (4):695-710.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  37
    The Burger Court and Claims of Privacy.Kent Greenawalt - 1976 - Hastings Center Report 6 (4):19.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  83
    How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone - 2009 - Artificial Intelligence and Law 17 (1):1-30.
    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why, and when such solutions have to be adopted is often unanswered because the answer comes only from a broader perspective, accounting for legal and organizational issues. Security engineers and legal (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  21. Privacy as Informational Commodity.Jarek Gryz - 2013 - Proceedings of IACAP Conference.
    Many attempts to define privacy have been made since the publication of the seminal paper by Warren and Brandeis (Warren & Brandeis, 1890). Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy became an urgent issue as legal and business problems regarding privacy started to (...)
     
    Export citation  
     
    Bookmark  
  22. Accountable privacy supporting services.Jan Camenisch, Thomas Groß & Thomas Scott Heydt-Benjamin - 2009 - Identity in the Information Society 2 (3):241-267.
    As privacy concerns among consumers rise, service providers increasingly want to provide services that support privacy enhancing technologies. At the same time, online service providers must be able to protect themselves against misbehaving users. For instance, users that do not pay their bill must be held accountable for their behavior. This tension between privacy and accountability is fundamental, however a tradeoff is not always required. In this article we propose the concept of a time capsule, that is, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  23. Building an ethical environment improves patient privacy and satisfaction in the crowded emergency department: a quasi-experimental study. [REVIEW]Yen-Ko Lin, Wei-Che Lee, Liang-Chi Kuo, Yuan-Chia Cheng, Chia-Ju Lin, Hsing-Lin Lin, Chao-Wen Chen & Tsung-Ying Lin - 2013 - BMC Medical Ethics 14 (1):8-.
    Background: To evaluate the effectiveness of a multifaceted intervention in improving emergency department (ED) patient privacy and satisfaction in the crowded ED setting. Methods: A pre- and post-intervention study was conducted. A multifaceted intervention was implemented in a university-affiliated hospital ED. The intervention developed strategies to improve ED patient privacy and satisfaction, including redesigning the ED environment, process management, access control, and staff education and training, and encouraging ethics consultation. The effectiveness of the intervention was evaluated using patient (...)
    Direct download (16 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  24.  28
    Surveillance, Privacy and the Making of the Modern Subject: Habeas what kind of Corpus?Charlotte Epstein - 2016 - Body and Society 22 (2):28-57.
    In this article I consider how our experiences of bodily privacy are changing in the contemporary surveillance society. I use biometric technologies as a lens for tracking the changing relationships between the body and privacy. Adopting a broader genealogical perspective, I retrace the role of the body in the constitution of the modern liberal political subject. I consider two different understandings of the subject, the Foucauldian political subject, and the Lacanian psychoanalytic subject. The psychoanalytic perspective serves to appraise (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  25.  19
    Privacy.William A. Edmundson - 2004 - In Martin P. Golding & William A. Edmundson, The Blackwell Guide to the Philosophy of Law and Legal Theory. Malden, MA: Wiley-Blackwell. pp. 271–283.
    This chapter contains section titled: Dimensions of Privacy Theories of Privacy Liberty and Decisional Privacy Justifying a Right to Informational Privacy Secrecy and Authority Note References.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  13
    Privacy.Fritz Allhoff, Patrick Lin & Daniel Moore - 2009 - In Fritz Allhoff, Patrick Lin & Daniel Moore, What is Nanotechnology and Why Does It Matter: From Science to Ethics. Wiley-Blackwell. pp. 185–214.
    This chapter contains sections titled: Historical and Legal Background Philosophical Foundations Radio Frequency Identity Chips Item‐Level Tagging Human Implants RFID‐Chipped Identification Is RFID a Threat to Privacy?
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  84
    Privacy, public health, and controlling medical information.Adam D. Moore - 2010 - HEC Forum 22 (3):225-240.
    This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy, turning then to consider cases which illustrate when and how privacy may be overridden by public health concerns.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  28.  7
    Privacy and identity in a networked society: refining privacy impact assessment.Stefan Strauss - 2019 - New York: Routledge, Taylor & Francis Group.
    Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  92
    Privacy preserving electronic petitions.Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss & Girma Nigusse - 2008 - Identity in the Information Society 1 (1):203-219.
    We present the design of a secure and privacy preserving e-petition system that we have implemented as a proof-of-concept demonstrator. We use the Belgian e-ID card as source of authentication, and then proceed to issue an anonymous credential that is used to sign petitions. Our system ensures that duplicate signatures are detectable, while preserving the anonymity of petition signers. We analyze the privacy and security requirements of our application, present an overview of its architecture, and discuss the applicability (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  77
    Privacy Is Power.Carissa Véliz - 2020 - London, UK: Penguin (Bantam Press).
    Selected by the Economist as one of the best books of 2020. -/- Privacy Is Power argues that people should protect their personal data because privacy is a kind of power. If we give too much of our data to corporations, the wealthy will rule. If we give too much personal data to governments, we risk sliding into authoritarianism. For democracy to be strong, the bulk of power needs to be with the citizenry, and whoever has the data (...)
    Direct download  
     
    Export citation  
     
    Bookmark   43 citations  
  31.  23
    Privacy concerns can stress you out: Investigating the reciprocal relationship between mobile social media privacy concerns and perceived stress.Jörg Matthes, Marina F. Thomas, Kathrin Karsay, Melanie Hirsch, Anna Koemets, Desirée Schmuck & Anja Stevic - 2022 - Communications 47 (3):327-349.
    Mobile social media have become a widespread means to participate in everyday social and professional life. These platforms encourage the disclosure and exchange of personal information, which comes with privacy risks. While past scholarship has listed various predictors and consequences of online privacy concerns, there has been to date no empirical investigation of a conceivable relationship with perceived stress. Using a longitudinal panel study, we examined the reciprocal relationship between mobile social media privacy concerns and perceived stress. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  47
    Beyond privacy vs. health: a justification analysis of the contact-tracing apps debate in the Netherlands.Lotje Elizabeth Siffels - 2020 - Ethics and Information Technology 23 (1):99-103.
    In the Netherlands, as in many other nations, the government has proposed the use of a contact-tracing app as a means of helping to contain the spread of the corona virus. The discussion about the use of such an app has mostly been framed in terms of a tradeoff between privacy and public health. This research statement presents an analysis of the Dutch public debate on Corona-apps by using the framework of Orders of Worth by Boltanski and Thévenot (1991). (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  76
    Unpopular Privacy: What Must We Hide?Anita Allen - 2011 - New York, US: Oup Usa.
    Can the government stick us with privacy we don't want? It can, it does, and according to this author, may need to do more of it. Privacy is a foundational good, she argues, a necessary tool in the liberty-lover's kit for a successful life. A nation committed to personal freedom must be prepared to mandate inalienable, liberty-promoting privacies for its people, whether they eagerly embrace them or not. The eight chapters of this book are reflections on public regulation (...)
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  34.  28
    Privacy and anti-surveillance advocacy: the role/challenge of issue salience.Smith Oduro-Marfo - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):422-437.
    Purpose The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse profiling and social sorting. There is a heightened need for dedicated advocacy and activism to consistently demand accountability and transparency from African states, governments and their allies regarding surveillance. The purpose of this paper is to understand the issue frames that accompany anti-surveillance and privacy advocacy in Ghana and the related implications. Design/methodology/approach (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2015 - In Beate Roessler & Dorota Mokrosinska, The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  71
    Privacy Rights Forfeiture.Mark Hanin - 2022 - Journal of Ethics and Social Philosophy 22 (2).
    Privacy rights can surely be waived. But can they also be forfeited? If so, why and under what conditions? This article takes up these questions by developing a novel theory of privacy rights forfeiture that draws inspiration from Judith Thomson’s canonical work on privacy. The paper identifies two species of forfeiture rooted in modes of negligent and reckless conduct and argues that both self-directed and other-regarding considerations play a role in grounding forfeiture. The paper also contributes to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  37. privacy, democracy and freedom of expression.Annabelle Lever - 2015 - In Beate Roessler & Dorota Mokrosinska, The Social Dimensions of Privacy. Cambridge University Press.
    this paper argues that people are entitled to keep some true facts about themselves to themselves, should they so wish, as a sign of respect for their moral and political status, and in order to protect themselves from being used as a public example in order to educate or to entertain other people. The “outing” - or non-consensual public disclosure - of people’s health records or status, or their sexual behaviour or orientation is usually unjustified, even when its consequences seem (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  38. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  39. Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  40.  91
    Privacy and the Standing to Hold Responsible.Linda Radzik - 2023 - Journal of Moral Philosophy 21 (3-4):333-354.
    In order to be held responsible, it is not enough that you’ve done something blameworthy, someone else must also have the standing to hold you responsible. But a number of critics have claimed that this concept of ‘standing’ doesn’t hold up to scrutiny and that we should excise it from our analyses of accountability practices. In this paper, I examine James Edwards’ (2019) attempt to define standing. I pose objections to some key features of Edwards’ account and defend an alternative. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41. Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   50 citations  
  42. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry:1-16.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  30
    Privacy in a Connected World.Emily York & Ahmad Salman - 2019 - Teaching Ethics 19 (2):171-193.
    In this paper, we present an approach to collaborative multi-disciplinary teaching as a method of integrating ethical reasoning into an applied science curriculum. Bringing together two faculty—one from computer engineering and one from science, technology, and society—to co-teach a two-semester upper-level sequence on holistic problem solving focused on “privacy in a connected world,” we model ethical reasoning as a habit of mind. We argue that this practice of modeling through multi-disciplinary teaching demonstrates for students that ethical reasoning is an (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  78
    Privacy and justification.Alexandra Couto - 2006 - Res Publica 12 (3):223-248.
    In this paper, I aim to demonstrate the importance of liberal engagement in public debate, in the face of Nagel’s claim that respect for privacy requires liberals to withdraw from their ‘control of the culture’. The paper starts by outlining a pluralist conception of privacy. I then proceed to examine whether there really is liberal cultural control, as Nagel affirms it, and whether such control truly involves a violation of privacy. Moreover, I argue that Nagel’s desire to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45. Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  46.  91
    Privacy and Positive Intellectual Freedom.Alan Rubel - 2014 - Journal of Social Philosophy 45 (3):390-407.
    Privacy is often linked to freedom. Protection against unreasonable searches and seizures is a hallmark of a free society, and pervasive state‐sponsored surveillance is generally considered to correlate closely with authoritarianism. One link between privacy and freedom is prominent in the library and information studies field and has recently been receiving attention in legal and philosophical scholarship. Specifically, scholars and professionals argue that privacy is an essential component of intellectual freedom. However, the nature of intellectual freedom and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  5
    Privacy.Paul Weiss - 1983 - Southern Illinois University Press.
    _Privacy _advances and refines Professor Weiss’s philosophic quest to isolate unmistakable evidences of that which is ultimately real and to trace those evidences to their original sources. The quest began with the publication of _Beyond All Appearances _, was expanded and refined into a more defensible formula­tion by _First Considerations _, and developed to provide a corre­sponding, precise, and systematic treatment of man, as apart from and to oppose and interplay with those final realities, in _You, I, and the Others (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  43
    Emergent Privacy.Ran Wolff - 2015 - Journal of Philosophy 112 (3):141-158.
    Defining privacy is a long-sought goal for philosophers and legal scholars alike. Current definitions lack mathematical rigor. They are therefore impracticable for domains such as economics and computer science in which privacy needs to be quantified and computed. This paper describes a game-theoretic framework in which privacy requires no definition per se. Rather, it is an emergent property of specific games, the strategy by which players maximize their reward. In this context, key activities related to privacy, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  31
    HIPPA, privacy and organizational change: a challenge for management.Bradley K. Jensen, Melinda Cline & Carl S. Guynes - 2007 - Acm Sigcas Computers and Society 37 (1):12-17.
    Organizational change surrounding the security of identifiable health information has become imperative. This is a significant challenge for managers who are held responsible for loss of privacy through faulty security procedures. Management cannot completely secure the organization and still provide employees and customers with the information and services they need. Organizations must decide how much and what type of security they need, how to assign priorities, and how to manage security as the organization evolves in a competitive environment.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  50.  97
    Genetic Privacy: A Challenge to Medico-Legal Norms.Graeme Laurie - 2002 - New York: Cambridge University Press.
    The phenomenon of the New Genetics raises complex social problems, particularly those of privacy. This book offers ethical and legal perspectives on the questions of a right to know and not to know genetic information from the standpoint of individuals, their relatives, employers, insurers and the state. Graeme Laurie provides a unique definition of privacy, including a concept of property rights in the person, and argues for stronger legal protection of privacy in the shadow of developments in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
1 — 50 / 981