Results for 'Workspace privacy'

1000+ found
Order:
  1.  43
    A comparison of privacy issues in collaborative workspaces and social networks.Martin Pekárek & Stefanie Pötzsch - 2009 - Identity in the Information Society 2 (1):81-93.
    With the advent of Web 2.0, numerous social software applications allow people to publish and share information on the Internet. Two of these types of applications – collaborative workspaces and social network sites – have a number of features in common, which are explored to provide a basis for comparative analysis. This basis is extended with a suitable definition of privacy, a sociological perspective and an applicable adversary model in order to facilitate an investigation of similarities and differences with (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2. Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been sufficiently (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  3.  75
    Securing privacy at work: The importance of contextualized consent. [REVIEW]Elin Palm - 2009 - Ethics and Information Technology 11 (4):233-241.
    The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  4. The nature and value of the.Moral Right To Privacy - 2002 - Public Affairs Quarterly 16 (4):329.
     
    Export citation  
     
    Bookmark  
  5. Chapter outline.A. Myth Versus Reality, D. Publicity not Privacy, E. Guilty Until Proven Innocent, J. Change & Rotation Mentality - forthcoming - Moral Management: Business Ethics.
    No categories
     
    Export citation  
     
    Bookmark  
  6.  57
    Social web and identity: a likely encounter. [REVIEW]Thierry Nabeth - 2009 - Identity in the Information Society 2 (1):1-5.
    The Web 2.0, with online social technologies such as social networking services, blogs, wikis, or microbloging, has brought the vision of the Internet as a social landscape in which people are engaged in a multitude of social activities. This editorial of the special issue ‘Social Web and Identity’ discusses the importance of identity in the context of the Social Web, introducing the different papers of this special issue and the different aspects associated to these online identities. The topics covered in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Global Workspace Theory and Animal Consciousness.Jonathan Birch - 2020 - Philosophical Topics 48 (1):21-37.
    Peter Carruthers has recently argued for a surprising conditional: if a global workspace theory of phenomenal consciousness is both correct and fully reductive, then there are no substantive facts to discover about phenomenal consciousness in nonhuman animals. I present two problems for this conditional. First, it rests on an odd double-standard about the ordinary concept of phenomenal consciousness: its intuitive non-gradability is taken to be unchallengeable by future scientific developments, whereas its intuitive determinacy is predicted to fall by the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  8.  56
    Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9. Privacy in Public and the contextual conditions of agency.Maria Brincker - 2017 - In Timan Tjerk, Koops Bert-Jaap & Newell Bryce (eds.), (forthcoming) in Privacy in Public Space: Conceptual and Regulatory Challenges. Edward Elgar.
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Global workspace theory: Consciousness explained?Josh McDermott - 1995 - Harvard Brain 2 (1).
    The subject of consciousness, long shunned by mainstream psychology and the scientific community, has over the last two decades become a legitimate topic of scientific research. One of the most thorough attempts to formulate a theory of consciousness has come from Bernard Baars, a psychologist working at the Wright Institute. Baars proposes that consciousness is the result of a Global Workspace in the brain that distributes information to the huge number of parallel unconscious processors that form the rest of (...)
     
    Export citation  
     
    Bookmark  
  11.  50
    Global workspace theory emerges unscathed.Murray Shanahan & Bernard Baars - 2007 - Behavioral and Brain Sciences 30 (5-6):524-525.
    Our aim in this reply is to defend Global Workspace theory (GWT) from the challenge of Block's article. We argue that Block's article relies on an outdated and imprecise concept of access, and perpetuates a common misunderstanding of GWT that conflates the global workspace with working memory. In the light of the relevant clarifications, Block's conclusion turns out to be unwarranted, and the basic tenets of GWT emerge unscathed.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  12.  45
    Workspace and sensorimotor theories: Complementary approaches to experience.Jan Degenaar & Fred Keijzer - 2009 - Journal of Consciousness Studies 16 (9):77-102.
    A serious difficulty for theories of consciousness is to go beyond mere correlation between physical processes and experience. Currently, neural workspace and sensorimotor contingency theories are two of the most promising approaches to make any headway here. This paper explores the relation between these two sets of theories. Workspace theories build on large-scale activity within the brain. Sensorimotor theories include external processes in their explanations, stressing the sensorimotor contingencies that arise from our interaction with the environment. Despite the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  13.  52
    The privacy of the psychical.Amihud Gilead - 2011 - Amsterdam: Rodopi.
    This book argues that the irreducible singularity of each person as a psychical subject implies the privacy of the psychical and that of experience, and yet the private accessibility of each person to his or her mind is compatible with interpersonal communication and understanding. The book treats these major issues against the background of the author's original metaphysics--panenmentalism."--Publisher's website.
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  14.  27
    Group Privacy: New Challenges of Data Technologies.Luciano Floridi, Linnet Taylor & Bart van der Sloot (eds.) - 2017 - Cham: Imprint: Springer.
    The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the different approaches and methods that can be used to address them. In doing so, it will help the reader to gain a better grasp of the ethical and legal conundrums posed by group profiling. The volume first maps the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   11 citations  
  15.  17
    Global workspace agents.Stan Franklin - 1997 - Journal of Consciousness Studies 4 (4):322-324.
    In the target article, Baars has offered both a theory of consciousness and a strategy for scientifically testing the theory. This commentary is intended as an addendum. I'd like to suggest implementing global workspace agents as both an additional strategy toward scientific testing, and as a means of fleshing out the theory.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  51
    Workspace theories are alive and well.Igor Aleksander - 2011 - International Journal of Machine Consciousness 3 (02):309-312.
  17.  26
    Privacy Is Power.Carissa Véliz - 2020 - London, UK: Penguin (Bantam Press).
    Selected by the Economist as one of the best books of 2020. -/- Privacy Is Power argues that people should protect their personal data because privacy is a kind of power. If we give too much of our data to corporations, the wealthy will rule. If we give too much personal data to governments, we risk sliding into authoritarianism. For democracy to be strong, the bulk of power needs to be with the citizenry, and whoever has the data (...)
    Direct download  
     
    Export citation  
     
    Bookmark   23 citations  
  18. Being in the workspace, from a neural point of view: comments on Peter Carruthers, 'On central cognition'.Wayne Wu - 2014 - Philosophical Studies 170 (1):163-174.
    In his rich and provocative paper, Peter Carruthers announces two related theses: (a) a positive thesis that “central cognition is sensory based, depending on the activation and deployment of sensory images of various sorts” (Carruthers 2013) and (b) a negative thesis that the “central mind does not contain any workspace within which goals, decisions, intentions, or non-sensory judgments can be active” (Carruthers 2013). These are striking claims suggesting that a natural view about cognition, namely that explicit theoretical reasoning involves (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  19.  46
    Privacy and Health Practices in the Digital Age.Monique Pyrrho, Leonardo Cambraia & Viviane Ferreira de Vasconcelos - 2022 - American Journal of Bioethics 22 (7):50-59.
    Increasing privacy concerns are arising from expanding use of aggregated personal information in health practices. Conversely, in light of the promising benefits of data driven healthcare, privacy...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  20.  12
    Privacy Protections in and across Contexts: Why We Need More Than Contextual Integrity.Sara Goering, Asad Beck, Natalie Dorfman, Sofia Schwarzwalder & Nicolai Wohns - 2024 - American Journal of Bioethics Neuroscience 15 (2):149-151.
    Do we need a right to mental privacy? In an era of increasing sophistication in recording, interpreting, and directly intervening on our neural activity – not to mention efforts at combining neural...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  42
    Global Workspace Dynamics: Cortical “Binding and Propagation” Enables Conscious Contents.Bernard J. Baars, Stan Franklin & Thomas Zoega Ramsoy - 2013 - Frontiers in Psychology 4.
  22. A global workspace model for phenomenal and access consciousness.Antonino Raffone & Martina Pantani - 2010 - Consciousness and Cognition 19 (2):580-596.
    Both the global workspace theory and Block’s distinction between phenomenal and access consciousness, are central in the current debates about consciousness and the neural correlates of consciousness. In this article, a unifying global workspace model for phenomenal and access consciousness is proposed. In the model, recurrent neural interactions take place in distinct yet interacting access and phenomenal brain loops. The effectiveness of feedback signaling onto sensory cortical maps is emphasized for the neural correlates of phenomenal consciousness. Two forms (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  23. Global workspace theory of consciousness: Toward a cognitive neuroscience of human experience?Bernard J. Baars - 2006 - In Steven Laureys (ed.), Boundaries of Consciousness. Elsevier.
  24.  51
    Global workspace theory, Shanahan, and Lida.Stan Franklin - 2011 - International Journal of Machine Consciousness 3 (02):327-337.
  25. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the capacity (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26.  65
    Unpopular Privacy: What Must We Hide?Anita Allen - 2011 - New York, US: Oup Usa.
    Can the government stick us with privacy we don't want? It can, it does, and according to this author, may need to do more of it. Privacy is a foundational good, she argues, a necessary tool in the liberty-lover's kit for a successful life. A nation committed to personal freedom must be prepared to mandate inalienable, liberty-promoting privacies for its people, whether they eagerly embrace them or not. The eight chapters of this book are reflections on public regulation (...)
    Direct download  
     
    Export citation  
     
    Bookmark   19 citations  
  27. Accountable privacy supporting services.Jan Camenisch, Thomas Groß & Thomas Scott Heydt-Benjamin - 2009 - Identity in the Information Society 2 (3):241-267.
    As privacy concerns among consumers rise, service providers increasingly want to provide services that support privacy enhancing technologies. At the same time, online service providers must be able to protect themselves against misbehaving users. For instance, users that do not pay their bill must be held accountable for their behavior. This tension between privacy and accountability is fundamental, however a tradeoff is not always required. In this article we propose the concept of a time capsule, that is, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  28. Privacy, Intimacy, and Isolation.Julie C. Inness - 1992 - New York, US: OUP Usa.
    From the Supreme Court to the bedroom, privacy is an intensely contested interest in our everyday lives and privacy law. Some people appeal to privacy to protect such critical areas as abortion, sexuality, and personal information. Yet, privacy skeptics argue that there is no such thing as a right to privacy. I argue that we cannot abandon the concept of privacy. If we wish to avoid extending this elusive concept to cover too much of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   42 citations  
  29. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  30.  16
    Workspace Disorder Does Not Influence Creativity and Executive Functions.Alberto Manzi, Yana Durmysheva, Shannon K. Pinegar, Andrew Rogers & Justine Ramos - 2019 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31. Global workspace or pandemonium?W. Teed Rockwell - 1997 - Journal of Consciousness Studies 4 (4):334-337.
  32.  31
    Global workspace or pandemonium?Teed Rockwell - 1997 - Journal of Consciousness Studies 4 (4):334-337.
    Surprisingly, Dennett and Baars have no real quarrel with each other, despite the fact that Dennett wants to escape from the Theatre of Consciousness and Baars is happy to stay there. Both believe that consciousness has structures that can be analysed, and is not just ‘the mysterious glow that no one but me can see’ described by Chalmers and Searle. Both acknowledge that their theories of consciousness are only metaphors, and there is no conflict in saying that Consciousness is both (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. Mental Privacy, Cognitive Liberty, and Hog-tying.Parker Crutchfield - forthcoming - Journal of Bioethical Inquiry.
    As the science and technology of the brain and mind develop, so do the ways in which brains and minds may be surveilled and manipulated. Some cognitive libertarians worry that these developments undermine cognitive liberty, or “freedom of thought.” I argue that protecting an individual’s cognitive liberty undermines others’ ability to use their own cognitive liberty. Given that the threatening devices and processes are not relevantly different from ordinary and frequent intrusions upon one’s brain and mind, strong protections of cognitive (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Group privacy: a defence and an interpretation.Luciano Floridi - 2017 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group Privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should remove (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   11 citations  
  35. Is Global Workspace a Cartesian Theater? How the Neuro-Astroglial Interaction Model Solves Conceptual Issues.Samuel Bellini-Leite & Alfredo Pereira - 2013 - Journal of Cognitive Science 14 (4):335-360.
    The Global Workspace Theory (GWT) proposed by Bernard Baars (1988) along with Daniel Dennett’s (1991) Multiple Drafts Model (MDM) of consciousness are renowned cognitive theories of consciousness bearing similarities and differences. Although Dennett displays sympathy for GWT, his own MDM does not seem to be fully compatible with it. This work discusses this compatibility, by asking if GWT suffers from Daniel Dennett’s criticism of what he calls a “Cartesian Theater”. We identified in Dennett 10 requirements for avoiding the Cartesian (...)
     
    Export citation  
     
    Bookmark  
  36.  2
    Privacy and identity in a networked society: refining privacy impact assessment.Stefan Strauss - 2019 - New York: Routledge, Taylor & Francis Group.
    Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  37. Privacy, Autonomy, and the Dissolution of Markets.Kiel Brennan-Marquez & Daniel Susser - 2022 - Knight First Amendment Institute.
    Throughout the 20th century, market capitalism was defended on parallel grounds. First, it promotes freedom by enabling individuals to exploit their own property and labor-power; second, it facilitates an efficient allocation and use of resources. Recently, however, both defenses have begun to unravel—as capitalism has moved into its “platform” phase. Today, the pursuit of allocative efficiency, bolstered by pervasive data surveillance, often undermines individual freedom rather than promoting it. And more fundamentally, the very idea that markets are necessary to achieve (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  42
    Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others. The basis of modern privacy laws and practices around the world, informational privacy has become a challenging concept to protect and promote in a world of ubiquitous and unlimited data sharing and storage among organizations. The paper advocates a “user-centric” approach to managing personal data online. However, user-centricity can be problematic when the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  31
    The Global Workspace Theory of Consciousness.Bernard J. Baars - 2017 - In Susan Schneider & Max Velmans (eds.), The Blackwell Companion to Consciousness. Chichester, UK: Wiley. pp. 227–242.
    Global Workspace Theory (GWT) can be compared to a theater of mind, in which conscious contents resemble a bright spot on the stage of immediate memory, selected by a spotlight of attention under executive guidance. Only the bright spot is conscious; the rest of the theater is dark and unconscious. GWT has been implemented in a number of explicit and testable global workspace models (GWM's). These specific GW models suggest that conscious experiences recruit widely distributed brain functions that (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  40. Informational privacy.Richard A. Spinello - 2009 - In George G. Brenkert & Tom L. Beauchamp (eds.), The Oxford handbook of business ethics. New York: Oxford University Press.
     
    Export citation  
     
    Bookmark   2 citations  
  41.  87
    Genetic Privacy: A Challenge to Medico-Legal Norms.Graeme Laurie - 2002 - New York: Cambridge University Press.
    The phenomenon of the New Genetics raises complex social problems, particularly those of privacy. This book offers ethical and legal perspectives on the questions of a right to know and not to know genetic information from the standpoint of individuals, their relatives, employers, insurers and the state. Graeme Laurie provides a unique definition of privacy, including a concept of property rights in the person, and argues for stronger legal protection of privacy in the shadow of developments in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   31 citations  
  42. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  43. Privacy and Punishment.Mark Tunick - 2013 - Social Theory and Practice 39 (4):643-668.
    Philosophers have focused on why privacy is of value to innocent people with nothing to hide. I argue that for people who do have something to hide, such as a past crime, or bad behavior in a public place, informational privacy can be important for avoiding undeserved or disproportionate non-legal punishment. Against the objection that one cannot expect privacy in public facts, I argue that I might have a legitimate privacy interest in public facts that are (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  44. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  81
    Privacy preserving electronic petitions.Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss & Girma Nigusse - 2008 - Identity in the Information Society 1 (1):203-219.
    We present the design of a secure and privacy preserving e-petition system that we have implemented as a proof-of-concept demonstrator. We use the Belgian e-ID card as source of authentication, and then proceed to issue an anonymous credential that is used to sign petitions. Our system ensures that duplicate signatures are detectable, while preserving the anonymity of petition signers. We analyze the privacy and security requirements of our application, present an overview of its architecture, and discuss the applicability (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  31
    Privacy Rights Forfeiture.Mark Hanin - 2022 - Journal of Ethics and Social Philosophy 22 (2).
    Privacy rights can surely be waived. But can they also be forfeited? If so, why and under what conditions? This article takes up these questions by developing a novel theory of privacy rights forfeiture that draws inspiration from Judith Thomson’s canonical work on privacy. The paper identifies two species of forfeiture rooted in modes of negligent and reckless conduct and argues that both self-directed and other-regarding considerations play a role in grounding forfeiture. The paper also contributes to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Privacy rights and ‘naked’ statistical evidence.Lauritz Aastrup Munch - 2021 - Philosophical Studies 178 (11):3777-3795.
    Do privacy rights restrict what is permissible to infer about others based on statistical evidence? This paper replies affirmatively by defending the following symmetry: there is not necessarily a morally relevant difference between directly appropriating people’s private information—say, by using an X-ray device on their private safes—and using predictive technologies to infer the same content, at least in cases where the evidence has a roughly similar probative value. This conclusion is of theoretical interest because a comprehensive justification of the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  48.  9
    Privacy and the Media.Kevin Macnish & Haleh Asgarinia - 2024 - In Carl Fox & Joe Saunders (eds.), Routledge Handbook of Philosophy and Media Ethics. Routledge.
    In this chapter, Macnish and Asgarinia introduce current thinking and debate around issues of privacy as these relate to the media. Starting with controversies over the definition of privacy, they consider what the content of privacy should be and why it is we consider privacy to be valuable. This latter includes the social implications of privacy and the only recently-recognised concept of group privacy, contrasting it with individual privacy, as well as legal implications (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  57
    Group privacy.Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.) - 2016 - Springer Verlag.
    The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the different approaches and methods that can be used to address them. In doing so, it will help the reader to gain a better grasp of the ethical and legal conundrums posed by group profiling. The volume first maps the (...)
    No categories
  50. Protecting privacy in public? Surveillance technologies and the value of public places.Jason W. Patton - 2000 - Ethics and Information Technology 2 (3):181-187.
    While maintaining the importance of privacy for critical evaluations of surveillance technologies, I suggest that privacy also constrains the debate by framing analyses in terms of the individual. Public space provides a site for considering what is at stake with surveillance technologies besides privacy. After describing two accounts of privacy and one of public space, I argue that surveillance technologies simultaneously add an ambiguityand a specificity to public places that are detrimental to the social, cultural, and (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 1000