Results for 'Privacy as intrusion'

1000+ found
Order:
  1.  10
    Privacy as a Social Concept.Salvör Nordal - unknown
    In this thesis I critically examine the traditional account of privacy as a negative right of non-interference and offer instead an alternative framework based on obligations and trust. Privacy is most often described as a value best protected as a right, more accurately as a negative right of non-intrusion. This means that privacy is associated with the private sphere: the individual should be left to decide when he wants to be alone and what he wants to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2. An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
    This paper offers a general theory of privacy, a theory that takes privacy to consist in being free from certain kinds of intrusions. On this understanding, privacy interests are distinct and distinguishable from those in solitude, anonymity, and property, for example, or from the fact that others possess, with neither consent nor permission, personal information about oneself. Privacy intrusions have both epistemic and psychological components, and can range in value from relatively trivial considerations to those of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  22
    Recognising a privacy-invasion tort: the conceptual unity of informational and intrusion claims.Paul Wragg - 2019 - Cambridge Law Journal 78 (2):409-437.
    This article presents the novel view that ‘inclusion into seclusion’ and ‘public disclosure of embarrassing facts’ (‘misuse of private information’ (“MOPI”) in the UK), which both the academic commentary and US case law treat as two separate legal actions, occupy the same conceptual space. This claim has important practical ramifications. No further development of the law is required to realise an actionable intrusion tort as part of the UK’s MOPI tort. The argument is defended in doctrinal and theoretical terms, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  34
    Intrusion into Patient Privacy: a moral concern in the home care of persons with chronic mental illness.A. Magnusson & K. Lutzen - 1999 - Nursing Ethics 6 (5):399-410.
    The aim of this study was to identify and analyse ethical decision making in the home care of persons with long-term mental illness. A focus was placed on how health care workers interpret and deal with the principle of autonomy in actual situations. Three focus groups involving mental health nurses who were experienced in the home care of persons with chronic mental illness were conducted in order to stimulate an interactive dialogue on this topic. A constant comparative analysis of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  5. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6. Privacy at work – ethical criteria.Anders J. Persson & Sven Ove Hansson - 2003 - Journal of Business Ethics 42 (1):59 - 70.
    New technologies and practices, such as drug testing, genetic testing, and electronic surveillance infringe upon the privacy of workers on workplaces. We argue that employees have a prima facie right to privacy, but this right can be overridden by competing moral principles that follow, explicitly or implicitly, from the contract of employment. We propose a set of criteria for when intrusions into an employee''s privacy are justified. Three types of justification are specified, namely those that refer to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  7. Violations of privacy and law : The case of Stalking.John Guelke & Tom Sorell - 2016 - Law, Ethics and Philosophy 4:32-60.
    This paper seeks to identify the distinctive moral wrong of stalking and argues that this wrong is serious enough to criminalize. We draw on psychological literature about stalking, distinguishing types of stalkers, their pathologies, and victims. The victimology is the basis for claims about what is wrong with stalking. Close attention to the experiences of victims often reveals an obsessive preoccupation with the stalker and what he will do next. The kind of harm this does is best understood in relation (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  8. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen (ed.), Philosophy and Public Policy. Lanham MD: Rowman and Littlefield. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the lack (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  40
    Privacy in the Family.Bryce Clayton Newell, Cheryl A. Metoyer & Adam Moore - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 104-121.
    While the balance between individual privacy and government monitoring or corporate surveillance has been a frequent topic across numerous disciplines, the issue of privacy within the family has been largely ignored in recent privacy debates. Yet privacy intrusions between parents and children or between adult partners or spouses can be just as profound as those found in the more “public spheres” of life. Popular access to increasingly sophisticated forms of electronic surveillance technologies has altered the dynamics (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  10.  16
    Privacy in America: The frontier of duty and restraint.Jay Black - 1994 - Journal of Mass Media Ethics 9 (4):213 – 234.
    Topics at a Poynter Institute privacy conference in December 1992 ranged from the role and obligations of the journalist to the rights of victims. Journalists' responsibility to fulfill a dual role of truthtelling and minimizing harm to vulnerable people in society framed the discussion. The public' s curiosity and media obsessions with information about victims of sex crimes are the first topics to be explored. Bob Steele of the Poynter Institute sets the stage for the delicate balance. Helen Benedict, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  12.  28
    The ethics of inattention: revitalising civil inattention as a privacy-protecting mechanism in public spaces.Tamar Sharon & Bert-Jaap Koops - 2021 - Ethics and Information Technology 23 (3):331-343.
    Societies evolve practices that reflect social norms of appropriateness in social interaction, for example when and to what extent one should respect the boundaries of another person’s private sphere. One such practice is what the sociologist Erving Goffman called civil inattention—the social norm of showing a proper amount of indifference to others—which functions as an almost unnoticed yet highly potent privacy-preserving mechanism. These practices can be disrupted by technologies that afford new forms of intrusions. In this paper, we show (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  13
    Privacy and anti-surveillance advocacy: the role/challenge of issue salience.Smith Oduro-Marfo - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):422-437.
    Purpose The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse profiling and social sorting. There is a heightened need for dedicated advocacy and activism to consistently demand accountability and transparency from African states, governments and their allies regarding surveillance. The purpose of this paper is to understand the issue frames that accompany anti-surveillance and privacy advocacy in Ghana and the related implications. Design/methodology/approach (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made such surveillance relatively (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  15.  42
    Inclusiveness, Effectiveness and Intrusiveness: Issues in the Developing Uses of DNA Profiling in Support of Criminal Investigations.Robin Williams & Paul Johnson - 2005 - Journal of Law, Medicine and Ethics 33 (3):545-558.
    The rapid implementation and continuing expansion of forensic DNA databases around the world has been supported by claims about their effectiveness in criminal investigations and challenged by assertions of the resulting intrusiveness into individual privacy. These two competing perspectives provide the basis for ongoing considerations about the categories of persons who should be subject to non-consensual DNA sampling and profile retention as well as the uses to which such profiles should be put. This paper uses the example of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  16.  15
    Privacy[REVIEW]Edward Pols - 1984 - Review of Metaphysics 37 (4):875-878.
    The privacy defined and discussed in this book is not the privacy we are said to have a right to as over against the intrusions of our neighbor or the state or some other corporate body. Weiss, as it happens, is also concerned with our rights and in fact devotes the last chapter to them; but he takes the privacy of the book's title to be the source of all human rights, including the right to privacy (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  6
    Privacy in the Age of Neuroscience: Reimagining Law, State and Market.David Grant - 2021 - Cambridge University Press.
    Neuroscience has begun to intrude deeply into what it means to be human, an intrusion that offers profound benefits but will demolish our present understanding of privacy. In Privacy in the Age of Neuroscience, David Grant argues that we need to reconceptualize privacy in a manner that will allow us to reap the rewards of neuroscience while still protecting our privacy and, ultimately, our humanity. Grant delves into our relationship with technology, the latest in what (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  35
    An Architecture for Privacy in a Networked Health Information Environment.Carol Diamond, Melissa Goldstein, David Lansky & Stefaan Verhulst - 2008 - Cambridge Quarterly of Healthcare Ethics 17 (4):429-440.
    As we move toward the creation of a networked health information environment, the potential of privacy intrusions increases, with potentially devastating impact on quality and access to healthcare. This paper describes the risks we face and proposes a framework to minimize those risks. In particular, it proposes nine principles to protect privacy in an information age.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  19.  69
    Privacy and personal identity.Wade L. Robison - 1997 - Ethics and Behavior 7 (3):195 – 205.
    What marks the traditional privacy torts of disclosure, intrusion, false light, and appropriation is that they require an invasion, an intrinsic harm caused by someone doing something to us without our consent. But we are now voluntarily giving up information about ourselves--to our physicians, for instance--that is being gathered into databases that are brought and sold and that can be appropriated by those who wish to assume our identities. The way in which our privacy is put at (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  21.  32
    Trust and privacy in the future internet—a research perspective.Dirk Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  38
    Defending the “private” in constitutional privacy.Judith W. Decew - 1987 - Journal of Value Inquiry 21 (3):171-184.
    Suppose we agree to reject the view that privacy has narrow scope and consequently is irrelevant to the constitutional privacy cases. We then have (at least) these two options: (1) We might further emphasize and draw out similarities between tort and constitutional privacy claims in order to develop a notion of privacy fundamental to informational and Fourth Amendment privacy concerns as well as the constitutional cases. We can cite examples indicating this is a promising position. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23. Judaism, Business and Privacy.Elliot N. Dorff - 1997 - Business Ethics Quarterly 7 (2):31-44.
    This article first describes some of the chief contrasts between Judaism and American secularism in their underlying convictions about the business environment and the expectations which all involved in business can have of each other—namely, duties vs. rights,communitarianism vs. individualism, and ties to God and to the environment based on our inherent status as God’s creatures rather than on our pragmatic choice. Conservative Judaism’s methodology for plumbing the Jewish tradition for guidance is described and contrasted to those of Orthodox and (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  24.  38
    Does Telepathy Threaten Mental Privacy?Stephen Braude - 2020 - Journal of Scientific Exploration 34 (2).
    A long-standing concern (or at least a belief) about ESP, held by both skeptics and believers in the paranormal, is that if telepathy really occurs, then it might pose a threat to mental privacy. And it’s easy enough to see what motivates that view. Presumably we like to think that we enjoy privileged access to our own mental states. But if others could come to know telepathically what we’re thinking or feeling, then (among other disquieting prospects) that would mean (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  25
    Caller ID – whose privacy is it, anyway?Kenneth G. Ferguson - 2001 - Journal of Business Ethics 29 (3):227 - 237.
    Caller ID or CND (Calling Number Display) is an internationally-available telecommunication service first introduced into the United States about ten years ago. Caller ID utilizes a new form of technology which enables telephone subscribers to identify the numbers (and/or names) of callers before picking up their telephones. This service has been widely assailed as an invasion of the caller''s right to anonymity, a right which allegedly subsists as an important component of the caller''s right to privacy. However, if (...) is defined from the perspective of the British philosopher John Stuart Mill, it can be argued that, even though anonymity is in fact an implication of genuine privacy, placing an unsolicited telephone call does not constitute a private act. Indeed, many callers who routinely block their numbers from Caller ID display units (such as telemarketers and telecharities) falsely assert a right to place anonymous calls in order to expedite their own intrusion into the privacy of others. This conclusion will be strengthened by contrasting anonymous telephone calls with the much more legitimate appeals to anonymity made by Usenet bulletin boards in cyberspace. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26. Pragmatic Reflections in Privacy. "It's none of their business".Arnulf Zweig - 2001 - Jahrbuch für Recht Und Ethik 9.
    Vorschläge für staatliche DNA-Datenbanken und die kürzlichen Enthüllungen und öffentlichen Präsentationen des Sexuallebens des amerikanischen Präsidenten geben den Anlaß für diese Reflexionen über die Bedeutung des Rechts auf Privatheit. Dabei werden die Ambiguität des Ausdrucks "Privatheit" und eines möglichen Rechts auf Privatheit erörtert, sowie die Spannung zwischen dem Wert eines gesellschaftlichen Gutes wie der Durchsetzung des Rechts einerseits und dem Wert des Schutzes des einzelnen vor Einbrüchen in die intimen Details seines Lebens andererseits. Hierzu werden insbesondere die Ansichten von Thomas (...)
    No categories
     
    Export citation  
     
    Bookmark  
  27.  8
    A roadmap towards improving managed security services from a privacy perspective.Nils Ulltveit-Moe - 2014 - Ethics and Information Technology 16 (3):227-240.
    This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28. When Worlds Collide: Health Surveillance, Privacy, and Public Policy.Ronald Bayer & Amy Fairchild - 2010 - Social Research: An International Quarterly 77 (3):905-928.
    Surveillance serves as the eyes of public health. It has provided the foundation for planning, intervention, and disease prevention and has been critical for epidemiology research into patterns of morbidity and mortality for a wide variety of disease and conditions. Registries have been essential for tracking individuals and their conditions over time. Surveillance has also served to trigger the imposition of public health control measures, such as contact tracing, mandatory treatment, and quarantine. The threat of such intervention and long-term monitoring (...)
     
    Export citation  
     
    Bookmark  
  29. When Worlds Collide: Health Surveillance, Privacy, and Public Policy.Ronald Bayer & Amy Fairchild - 2010 - Social Research: An International Quarterly 77 (2):905-928.
    Surveillance serves as the eyes of public health. It has provided the foundation for planning, intervention, and disease prevention and has been critical for epidemiology research into patterns of morbidity and mortality for a wide variety of disease and conditions. Registries have been essential for tracking individuals and their conditions over time. Surveillance has also served to trigger the imposition of public health control measures, such as contact tracing, mandatory treatment, and quarantine. The threat of such intervention and long-term monitoring (...)
    No categories
     
    Export citation  
     
    Bookmark  
  30. Not the doctor’s business: Privacy, personal responsibility and data rights in medical settings.Carissa Véliz - 2020 - Bioethics 34 (7):712-718.
    This paper argues that assessing personal responsibility in healthcare settings for the allocation of medical resources would be too privacy-invasive to be morally justifiable. In addition to being an inappropriate and moralizing intrusion into the private lives of patients, it would put patients’ sensitive data at risk, making data subjects vulnerable to a variety of privacy-related harms. Even though we allow privacy-invasive investigations to take place in legal trials, the justice and healthcare systems are not analogous. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  58
    A cognitive access definition of privacy.Madison Powers - 1996 - Law and Philosophy 15 (4):369 - 386.
    Many of the contemporary disagreements regarding privacy are conceptual in nature. They concern the meaning or definition of privacy and the analytic basis of distinguishing privacy rights from other kinds of rights recognized within moral, political, or legal theories. The two main alternatives within this debate include reductionist views, which seek a narrow account of the kinds of invasions or intrusions distinctly involving privacy losses, and anti-reductionist theories, which treat a much broader array of interferences with (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  32.  11
    The Islamic and Western Cultures and Values of Privacy.Sattam Eid Almutairi - 2019 - Muslim World Journal of Human Rights 16 (1):51-80.
    The paper provides valuable accounts of the general concepts underlying privacy law in both cultures, and great detail about the impact of criminal procedure and evidence rules on privacy in reality rather than legal theory. It is, in this sense, a “realist” approach to privacy, particularly but not exclusively in relation to sexual activity. The distinction which the article draws between the frameworks within which privacy is conceived broadly, self-determination and limited government in the USA, protection (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. What Is Protected By The Right To Privacy?Geoffrey Marshall - 1995 - Jahrbuch für Recht Und Ethik 3.
    Arguments about constitutional and personal rights often invoke the concept of privacy. In the United States it has been said that the constitution "embodies a promise that a certain private sphere of individual liberty will be kept largely beyond the reach of government". A number of formulae has been invoked in an attempt to define the sphere of constitutional privacy. They include: Fundamental rights of interests; personal decisions and issues; important questions intimately affecting private lives; and decisions affecting (...)
    No categories
     
    Export citation  
     
    Bookmark  
  34.  89
    Privacy as life, liberty, property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.
    The cluster of concerns usually identified asmatters of privacy can be adequately accountedfor by unpacking our natural rights to life,liberty, and property. Privacy as derived fromfundamental natural rights to life, liberty,and property encompasses the advantages of thecontrol and restricted access theories withouttheir attendant difficulties.
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  35.  14
    Online privacy as a corporate social responsibility: an empirical study.Irene Pollach - 2011 - Business Ethics: A European Review 20 (1):88-102.
    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two. Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. The findings indicate that only a small (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  36.  71
    Privacy as a value and as a right.Judith Andre - 1986 - Journal of Value Inquiry 20 (4):309-317.
    Knowledge of others, then, has value; so does immunity from being known. The ability to extend one's knowledge has value; so does the ability to limit other's knowledge of oneself. I have claimed that no interest can count as a right unless it clearly outweighs opposing interests whose presence is logically entailed. I see no way to establish that my interest in not being known, simply as such, outweighs your desire to know about me. I acknowledge the intuitive attractiveness of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  37.  30
    Privacy as Protection of the Incomputable Self: From Agnostic to Agonistic Machine Learning.Mireille Hildebrandt - 2019 - Theoretical Inquiries in Law 20 (1):83-121.
    This Article takes the perspective of law and philosophy, integrating insights from computer science. First, I will argue that in the era of big data analytics we need an understanding of privacy that is capable of protecting what is uncountable, incalculable or incomputable about individual persons. To instigate this new dimension of the right to privacy, I expand previous work on the relational nature of privacy, and the productive indeterminacy of human identity it implies, into an ecological (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  38.  93
    Online privacy as a corporate social responsibility: an empirical study.Irene Pollach - 2011 - Business Ethics, the Environment and Responsibility 20 (1):88-102.
    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two. Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. The findings indicate that only a small (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  39. Privacy as an Asset.Jarek Gryz - 2017 - In Marcellus Mindel, Kelly Lyons & Joe Wigglesworth (eds.), Proceedings of the 27th CASCON Conference. Markham, Canada: IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  83
    X—Privacy as a Human Right.Beate Roessler - 2017 - Proceedings of the Aristotelian Society 117 (2):187-206.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  41. Privacy as Informational Commodity.Jarek Gryz - 2013 - Proceedings of IACAP Conference.
    Many attempts to define privacy have been made since the publication of the seminal paper by Warren and Brandeis (Warren & Brandeis, 1890). Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy became an urgent issue as legal and business problems regarding privacy started to (...)
     
    Export citation  
     
    Bookmark  
  42.  28
    Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Shaheen Borna & Dheeraj Sharma - 2011 - Business and Society Review 116 (3):331-353.
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  19
    Privacy as an Ethical Value.Georgy Ishmaev - 2018 - Proceedings of the XXIII World Congress of Philosophy 12:161-165.
    Ethics of privacy is not a new but rather well developed topic especially in such areas as medical ethics and genome research. However it is safe to say that this problem is far less explored in moral philosophy. Namely there is a lack of consensus on Meta ethical status of privacy as moral value. This essay suggests some clarifications on the notion of privacy in the ethics of ICT and considers possible approaches to research on privacy (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44. Privacy as property.Lawrence Lessig - 2002 - Social Research: An International Quarterly 69 (1):247-269.
     
    Export citation  
     
    Bookmark   6 citations  
  45. A Defense of Privacy as Control.Leonhard Menges - 2021 - The Journal of Ethics 25 (3):385-402.
    Even though the idea that privacy is some kind of control is often presented as the standard view on privacy, there are powerful objections against it. The aim of this paper is to defend the control account of privacy against some particularly pressing challenges by proposing a new way to understand the relevant kind of control. The main thesis is that privacy should be analyzed in terms of source control, a notion that is adopted from discussions (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  46. Privacy as a supra-regime value : the ethical argument for a new evolution of regime values to better protect financial privacy in local governments.Mike Potter - 2020 - In Nicole M. Elias & Amanda M. Olejarski (eds.), Ethics for contemporary bureaucrats: navigating constitutional crossroads. New York, NY: Routledge.
    No categories
     
    Export citation  
     
    Bookmark  
  47.  54
    Privacy as a Matter of Taste and Right.Alexander Rosenberg - 2000 - Social Philosophy and Policy 17 (2):68.
    Privacy is something we all want. We seek privacy to prevent others from securing information about us that is immediately embarrassing, and so causes us pain but not material loss. We also value privacy for strategic reasons in order to prevent others from imposing material and perhaps psychic costs upon us. I use the expression “securing information” so that it covers everything from the immediate sensory data that a voyeur acquires to the financial data a rival may (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  86
    A Dilemma for Privacy as Control.Björn Lundgren - 2020 - The Journal of Ethics 24 (2):165-175.
    Although popular, control accounts of privacy suffer from various counterexamples. In this article, it is argued that two such counterexamples—while individually resolvable—can be combined to yield a dilemma for control accounts of privacy. Furthermore, it is argued that it is implausible that control accounts of privacy can defend against this dilemma. Thus, it is concluded that we ought not define privacy in terms of control. Lastly, it is argued that since the concept of privacy is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  49.  12
    Privacy as a profile of authentic consciousness.Constance T. Fischer - forthcoming - Humanitas.
    Direct download  
     
    Export citation  
     
    Bookmark  
  50. The Conceptual Coherence of Privacy As Developed in Law.Judith DeCew - 2018 - In Mark Navin & Ann Cudd (eds.), Core Concepts and Contemporary Issues in Privacy. Springer Verlag.
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000