Results for 'personal data protection'

987 found
Order:
  1.  15
    Personal Data Protection as an Element of the Ethical Evaluation of Scientific Research Involving Humans.Mariusz Jagielski - 2023 - Diametros 19 (76):1-14.
    The aim of the article is to explain the relationship between the ethical evaluation of scientific research involving personal data and the assessment of compliance with data protection law. The article presents the mutual relationship between the protection of personal data and scientific activity from a dogmatic perspective, the legal regulation of the processing of personal data in scientific research, and the so-called research exceptions that apply when data are processed (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  22
    Personal Data Protection in Health and Social Services.John Street - 1991 - Journal of Medical Ethics 17 (1):53-54.
  3.  12
    Reflections on Turkish Personal Data Protection Law and Genetic Data in Focus Group Discussions.Özlem Özkan, Melike Şahinol, Arsev Umur Aydinoglu & Yesim Aydin Son - 2022 - NanoEthics 16 (3):297-312.
    Since the 1970s and more rigorously since the 1990s, many countries have regulated data protection and privacy laws in order to ensure the safety and privacy of personal data. First, a comparison is made of different acts regarding genetic information that are in force in the EU, the USA, and China. In Turkey, changes were adopted only recently following intense debates. This study aims to explore the experts’ opinions on the regulations of the health information systems, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  12
    Comparison of Heads of Research Ethics Committees with Data Protection Officers on Personal Data Protection in Research: A Mixed-Methods Study with Structured Interviews.Karlo Ložnjak, Anamaria Malešević, Marin Čargo, Anamarija Mladinić, Zvonimir Koporc & Livia Puljak - forthcoming - Journal of Academic Ethics:1-22.
    Personal data protection is an ethical issue. In this study we analyzed how research ethics committees (RECs) and data protection officers (DPOs) handle personal data protection issues in research protocols. We conducted a mixed-methods study. We included heads (or delegated representatives) of RECs and DPOs from universities and public research institutes in Croatia. The participants provided information about data protection issues in research and their mutual collaboration on those issues through (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  89
    Comparative legal study on privacy and personal data protection for robots equipped with artificial intelligence: looking at functional and technological aspects.Kaori Ishii - 2019 - AI and Society 34 (3):509-533.
    This paper undertakes a comparative legal study to analyze the challenges of privacy and personal data protection posed by Artificial Intelligence embedded in Robots, and to offer policy suggestions. After identifying the benefits from various AI usages and the risks posed by AI-related technologies, I then analyze legal frameworks and relevant discussions in the EU, USA, Canada, and Japan, and further consider the efforts of Privacy by Design originating in Ontario, Canada. While various AI usages provide great (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  6.  29
    COVID-19, Personal Data Protection and Privacy in India.Mohamad Ayub Dar & Shahnawaz Ahmad Wani - 2022 - Asian Bioethics Review 15 (2):125-140.
    The corona pandemic altered many traditional and historical norms of society and law. COVID-19 created a humanitarian crisis in some parts of globe, while pandemic privacy and civil liberties were under threat all over world. To combat the deadly virus, individual liberty and equality were compromised. This paper focuses on how India’s health problem has compromised people’s right to privacy. It will highlight how strict executive policies led to the creation of a massive surveillance system in the name of combating (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  14
    El reto de la ordenación del derecho fundamental a la protección de datos de carácter personal en un universo digital = A regulatory challenge to the fundamental right of the personal data protection in a digital universe.María del Pilar Zapatero Martín - 2018 - UNIVERSITAS Revista de Filosofía Derecho y Política 29:32-69.
    RESUMEN: En la era de las tecnologías digitales, el Derecho se enfrenta al objetivo de afrontar la protección de los datos personales en un universo global donde las fronteras se diluyen y el principio de territorialidad ha dejado de tener aplicación. Este trabajo pretende plantear el reto que supone, para el ordenamiento jurídico español, la adaptación a la nueva regulación europea en esta materia.ABSTRACT: At the digital´s technologies age, Law faces with the aim to address the personal data (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  11
    Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.Colin J. Bennett - 1991 - Science, Technology and Human Values 16 (1):51-69.
    Public policies designed to regulate the use of information technology to protect personal data have been based on different theoretical assumptions in different states, depending on whether the problem is defined in technological, civil libertarian, or bureaucratic terms. However, the rapid development, dispersal, and decentralization of information technology have facilitated a range of new surveillance practices that have in turn rendered the approaches of the 1960s and 1970s obsolete. The networking of the postindustrial state will require a reconceptualization (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  22
    Controversies between regulations of research ethics and protection of personal data: informed consent at a cross-road.Eugenijus Gefenas, J. Lekstutiene, V. Lukaseviciene, M. Hartlev, M. Mourby & K. Ó Cathaoir - 2021 - Medicine, Health Care and Philosophy 25 (1):23-30.
    This paper explores some key discrepancies between two sets of normative requirements applicable to the research use of personal data and human biological materials: the data protection regime which follows the application of the European Union General Data Protection Regulation, and the Declaration of Helsinki, CIOMS guidelines and other research ethics regulations. One source of this controversy is that the GDPR requires consent to process personal data to be clear, concise, specific and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  10.  63
    Confidentiality: The Protection of Personal Data in Epidemiological and Clinical Research Trials.Charles R. McCarthy & Joan P. Porter - 1991 - Journal of Law, Medicine and Ethics 19 (3-4):238-241.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  11.  27
    Confidentiality: The Protection of Personal Data in Epidemiological and Clinical Research Trials.Charles R. McCarthy & Joan P. Porter - 1991 - Journal of Law, Medicine and Ethics 19 (3-4):238-241.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  72
    Free speech on social media: How to protect our freedoms from social media that are funded by trade in our personal data.Richard Sorabji - 2020 - Social Philosophy and Policy 37 (2):209-236.
    I have argued elsewhere that in past history, freedom of speech, whether granted to few or many, was granted as bestowing some important benefit. John Stuart Mill, for example, in On Liberty, saw it as enabling us to learn from each other through discussion. By the test of benefit, I here argue that social media that are funded through trade in our personal data with advertisers, including propagandists, cannot claim to be supporting free speech. We lose our freedoms, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Information technology, privacy, and the protection of personal data.Jeroen Van Den Hoven - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press.
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  14.  22
    Personal data are political. A feminist view on privacy and big data.Sara Suárez-Gonzalo - 2019 - Recerca.Revista de Pensament I Anàlisi 24 (2):173-192.
    The second-wave feminist critique of privacy defies the liberal opposition between the public-political and the private-personal. Feminist thinkers such as Hanisch, Young or Fraser note that, according to this liberal conception, public institutions often keep asymmetric power relations between private agents away from political discussion and action. The resulting subordination of some agents to others tends, therefore, to be naturalised and redefined as a «personal problem». Drawing on these contributions, this article reviews the social and political implications of (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15. HIV-positive status and preservation of privacy: a recent decision from the Italian Data Protection Authority on the procedure of gathering personal patient data in the dental office.Adelaide Conti, Paola Delbon, Laura Laffranchi, Corrado Paganelli & Francesco De Ferrari - 2012 - Journal of Medical Ethics 38 (6):386-388.
    The processing of sensitive information in the health field is subject to rigorous standards that guarantee the protection of information confidentiality. Recently, the Italian Data Protection Authority (Garante per la Protezione dei Dati Personali) stated their formal opinion on a standard procedure in dental offices involving the submission of a questionnaire that includes the patient's health status. HIV infection status is included on the form. The Authority has stated that all health data collection must be in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  16.  23
    Assessing data protection and governance in health information systems: a novel methodology of Privacy and Ethics Impact and Performance Assessment.Concetta Tania Di Iorio, Fabrizio Carinci, Jillian Oderkirk, David Smith, Manuela Siano, Dorotea Alessandra de Marco, Simon de Lusignan, Paivi Hamalainen & Massimo Massi Benedetti - 2021 - Journal of Medical Ethics 47 (12):e23-e23.
    BackgroundData processing of health research databases often requires a Data Protection Impact Assessment to evaluate the severity of the risk and the appropriateness of measures taken to comply with the European Union General Data Protection Regulation. We aimed to define and apply a comprehensive method for the evaluation of privacy, data governance and ethics among research networks involved in the EU Project Bridge Health.MethodsComputerised survey among associated partners of main EU Consortia, using a targeted instrument (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  17.  3
    Data protection for networked and robotic toys - a legal perspective.Rocco Panetta & Federico Sartore - 2018 - International Review of Information Ethics 27.
    This paper is aimed to understand the state of the art and the resulting consequences of the legal framework in Europe, with regard to the protection of children's data. Especially when they interact with networked and robotic toys, like in 'My friend Cayla' case. In order to evaluate the practical implications of the use of IoT devices by children or teenager users, the first part of the paper presents an analysis of the international guiding principles of the (...) of minors, a category which enjoys a higher level of protection of their fundamental rights, due to their condition of lack of physical and psychological maturity. Secondly, the focus is moved upon the protection of personal data of children. Only after confronting previous data protection legal instruments and having compared them with the novelties set forth in General Data Protection Regulation, it is reasonable to assume that new provisions such as "privacy by design" principle, adequacy of security measures and codes of conduct, can support data controllers in ensuring compliance in the field of IoT toys. In conclusion, the paper supports a view of Data Protection Authorities as a relevant player in enhancing these renovated tools in order to achieve the protection of children's rights, as to ensure their substantial protection against the threats of the interconnected world. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  33
    Beware of the Virtual Doll: ISPs and the Protection of Personal Data of Minors. [REVIEW]Daniel Nagel - 2011 - Philosophy and Technology 24 (4):411-418.
    Once upon a time, they managed to bring Neverland into the bedrooms; they were seen as the heroes of a new era. However, as heroes always tend to walk a fine line between good and evil, it does not come as a surprise that a decade later the perception has dramatically changed; the fairy tale turned into a nightmare. Are Internet Service Providers (ISPs) no more than data-guzzling monsters that need to be tamed? In November, the European Commission published (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  29
    Whose Commons? Data Protection as a Legal Limit of Open Science.Mark Phillips & Bartha M. Knoppers - 2019 - Journal of Law, Medicine and Ethics 47 (1):106-111.
    Open science has recently gained traction as establishment institutions have come on-side and thrown their weight behind the movement and initiatives aimed at creation of information commons. At the same time, the movement's traditional insistence on unrestricted dissemination and reuse of all information of scientific value has been challenged by the movement to strengthen protection of personal data. This article assesses tensions between open science and data protection, with a focus on the GDPR.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  20.  34
    Open consent, biobanking and data protection law: can open consent be ‘informed’ under the forthcoming data protection regulation?Michael Friedewald & Dara Hallinan - 2015 - Life Sciences, Society and Policy 11 (1):1-36.
    This article focuses on whether a certain form of consent used by biobanks – open consent – is compatible with the Proposed Data Protection Regulation. In an open consent procedure, the biobank requests consent once from the data subject for all future research uses of genetic material and data. However, as biobanks process personal data, they must comply with data protection law. Data protection law is currently undergoing reform. The Proposed (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  21.  59
    The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data[REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.
    The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  22.  10
    Recent Case-law of the Court of Justice of the European Union Regarding the Fundamental Rights to Respect for Private and Family Life and to Protection of Personal Data.Dalia Misiūnaitė-Kamarauskienė - 2015 - Jurisprudencija: Mokslo darbu žurnalas 21 (4):1233.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Challenging algorithmic profiling: The limits of data protection and anti-discrimination in responding to emergent discrimination.Tobias Matzner & Monique Mann - 2019 - Big Data and Society 6 (2).
    The potential for biases being built into algorithms has been known for some time, yet literature has only recently demonstrated the ways algorithmic profiling can result in social sorting and harm marginalised groups. We contend that with increased algorithmic complexity, biases will become more sophisticated and difficult to identify, control for, or contest. Our argument has four steps: first, we show how harnessing algorithms means that data gathered at a particular place and time relating to specific persons, can be (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  24.  22
    Ethical Responsibilities for Companies That Process Personal Data.Matthew S. McCoy, Anita L. Allen, Katharina Kopp, Michelle M. Mello, D. J. Patil, Pilar Ossorio, Steven Joffe & Ezekiel J. Emanuel - 2023 - American Journal of Bioethics 23 (11):11-23.
    It has become increasingly difficult for individuals to exercise meaningful control over the personal data they disclose to companies or to understand and track the ways in which that data is exchanged and used. These developments have led to an emerging consensus that existing privacy and data protection laws offer individuals insufficient protections against harms stemming from current data practices. However, an effective and ethically justified way forward remains elusive. To inform policy in this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  25.  8
    Virtuality and Capabilities in a World of Ambient Intelligence: New Challenges to Privacy and Data Protection.Luiz Costa - 2016 - Cham: Imprint: Springer.
    This book is about power and freedoms in our technological world and has two main objectives. The first is to demonstrate that a theoretical exploration of the algorithmic governmentality hypothesis combined with the capability approach is useful for a better understanding of power and freedoms in Ambient Intelligence, a world where information and communication technologies are invisible, interconnected, context aware, personalized, adaptive to humans and act autonomously. The second is to argue that these theories are useful for a better comprehension (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  60
    The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework.Jozef Andraško, Matúš Mesarčík & Ondrej Hamuľák - forthcoming - AI and Society:1-14.
    The presented paper focuses on the analysis of strategic documents at the level of the European Union concerning the regulation of artificial intelligence as one of the so-called disruptive technologies. In the first part of the article, we outline the basic terminology. Subsequently, we focus on the summarizing and systemizing of the key documents adopted at the EU level in terms of artificial intelligence regulation. The focus of the paper is devoted to issues of personal data protection (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  27.  17
    Allegations of misuse of African DNA in the UK: Will data protection legislation in South Africa be sufficient to prevent a recurrence?Keymanthri Moodley & Anita Kleinsmidt - 2021 - Developing World Bioethics 21 (3):125-130.
    Concerns have been raised around the alleged commercialisation of South African genetic material by various research institutes nationally and abroad. We consider whether the Protection of Personal Information Act in South Africa will conflict with or complement existing protections in health law and research ethics. The Act is not applicable to de‐identified samples that cannot be re‐identified but we question whether genetic samples can ever be truly de‐identified. The research participants in this matter provided consent for use of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  17
    Legislative and Ethical Peculiarities of Human Genetic Data Protection.Danielius Serapinas - 2013 - Jurisprudencija: Mokslo darbu žurnalas 20 (1):165-179.
    Genetics is a biomedical science that investigates heredity, variability, occurrence of genetic diseases and their prevention. Genetic science has many fields of science, which deal with different genetic processes, methods, aspects and fields of application. The genetic research in Europe related to the individual as the main subject of the research is exposed to a wide range of ethical and legal issues. From the developments in genetic science other sciences have evolved, thanks to which the modern world is able to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  22
    Health research and systems’ governance are at risk: should the right to data protection override health?C. T. Di Iorio, F. Carinci & J. Oderkirk - 2014 - Journal of Medical Ethics 40 (7):488-492.
    The European Union Data Protection Regulation will have profound implications for public health, health services research and statistics in Europe. The EU Commission's Proposal was a breakthrough in balancing privacy rights and rights to health and healthcare. The European Parliament, however, has proposed extensive amendments. This paper reviews the amendments proposed by the European Parliament Committee on Civil Liberties, Justice and Home Affairs and their implications for health research and statistics. The amendments eliminate most innovations brought by the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  30.  18
    The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano, Gian Piero Fici, Ugo Pagallo, Stefano Primatesta & Fulvia Quagliotti - 2019 - Minds and Machines 29 (4):579-601.
    Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  22
    The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano, Gian Piero Fici, Ugo Pagallo, Stefano Primatesta & Fulvia Quagliotti - 2019 - Minds and Machines 29 (4):579-601.
    Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  29
    The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano, Gian Piero Fici, Ugo Pagallo, Stefano Primatesta & Fulvia Quagliotti - 2019 - Minds and Machines 29 (4):579-601.
    Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  16
    International Health Research after Schrems v. Data Protection Commissioner.Mark A. Rothstein - 2015 - Hastings Center Report 46 (2):5-6.
    On October 6, 2015, in Schrems v. Data Protection Commissioner, the European Court of Justice, the European Union's highest court, held that the fifteen-year-old Safe Harbor Framework Agreement with the United States was invalid. Under the agreement, about forty-five hundred American companies each year self-certified to the U.S. Department of Commerce that they were in compliance with the essential privacy protections of the European Union, and therefore it was permissible for entities in the European Union to send (...) data to these American companies. According to the court, because some American companies were making the personal data of E.U. citizens available to U.S. government agencies, such as the National Security Agency, the fundamental privacy interests of E.U. citizens were not being protected. As a result of this court decision there has been considerable speculation about what, if any, effect the case has on international collaboration in health research, in particular, the sharing of personal data by E.U. researchers with their U.S. colleagues. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  54
    Grappling with “Data Power”: Normative Nudges from Data Protection and Privacy.Orla Lynskey - 2019 - Theoretical Inquiries in Law 20 (1):189-220.
    The power exercised by technology companies is attracting the attention of policymakers, regulatory bodies and the general public. This power can be categorized in several ways, ranging from the “soft power” of technology companies to influence public policy agendas to the “market power” they may wield to exclude equally efficient competitors from the marketplace. This Article is concerned with the “data power” exercised by technology companies occupying strategic positions in the digital ecosystem. This data power is a multifaceted (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  15
    Digital identity: Contemporary challenges for data protection, privacy and non-discrimination rights.Ana Beduschi - 2019 - Big Data and Society 6 (2).
    The World Bank estimates that over one billion people currently lack official identity documents. To tackle this crucial issue, the United Nations included the aim to provide legal identity for all by 2030 among the Sustainable Development Goals. Technology can be a powerful tool to reach this target. In the digital age, new technologies increasingly mediate identity verification and identification of individuals. Currently, State-led and public–private initiatives use technology to provide official identification, to control and secure external borders, and to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  34
    Social networks and web 2.0: are users also bound by data protection regulations? [REVIEW]Brendan Van Alsenoy, Joris Ballet, Aleksandra Kuczerawy & Jos Dumortier - 2009 - Identity in the Information Society 2 (1):65-79.
    Directive 95/46/EC and implementing legislation define the respective obligations and liabilities of the different actors that may be involved in a personal data processing operation. There are certain exceptions to the scope of these regulations, among which processing which is carried out by natural persons in the course of activities that may be considered ‘purely personal’. The purpose of this article is to investigate the liability of users of social network sites under data protection and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  37.  18
    Can dynamic consent facilitate the protection of biomedical big data in biobanking in Malaysia?Mohammad Firdaus Abdul Aziz & Aimi Nadia Mohd Yusof - 2019 - Asian Bioethics Review 11 (2):209-222.
    As with many other countries, Malaysia is also developing and promoting biomedical research to increase the understanding of human diseases and possible interventions. To facilitate this development, there is a significant growth of biobanks in the country to ensure continuous collection of biological samples for future research, which contain extremely important personal information and health data of the participants involved. Given the vast amount of samples and data accumulated by biobanks, they can be considered as reservoirs of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  38.  45
    Trusting third-party storage providers for holding personal information. A context-based approach to protect identity-related data in untrusted domains.Giulio Galiero & Gabriele Giammatteo - 2009 - Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, are two (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  39.  32
    Rationales and Approaches to Protecting Brain Data: a Scoping Review.Anita S. Jwa & Nicole Martinez-Martin - 2023 - Neuroethics 17 (1):1-15.
    Advances in neurotechnologies, artificial intelligence (AI) and Big Data analytics are allowing interpretation of patterns from brain data to identify and even predict and manipulate mental states. Furthermore, there are avenues through which brain data can move into the consumer sphere, be reidentified and brokered. In response to these developments, there have been a number of approaches proposed to strengthen protections of brain data. To better understand the landscape of brain data protection discussions, we (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  40
    Certificates of Confidentiality: Protecting Human Subject Research Data in Law and Practice.Leslie E. Wolf, Mayank J. Patel, Brett A. Williams Tarver, Jeffrey L. Austin, Lauren A. Dame & Laura M. Beskow - 2015 - Journal of Law, Medicine and Ethics 43 (3):594-609.
    Answering important public health questions often requires collection of sensitive information about individuals. For example, our understanding of how HIV is transmitted and how to prevent it only came about with people's willingness to share information about their sexual and drug-using behaviors. Given the scientific need for sensitive, personal information, researchers have a corresponding ethical and legal obligation to maintain the confidentiality of data they collect and typically promise in consent forms to restrict access to it and not (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  41. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  42. Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  43. ICTs, data and vulnerable people: a guide for citizens.Alexandra Castańeda, Andreas Matheus, Andrzej Klimczuk, Anna BertiSuman, Annelies Duerinckx, Christoforos Pavlakis, Corelia Baibarac-Duignan, Elisabetta Broglio, Federico Caruso, Gefion Thuermer, Helen Feord, Janice Asine, Jaume Piera, Karen Soacha, Katerina Zourou, Katherin Wagenknecht, Katrin Vohland, Linda Freyburg, Marcel Leppée, Marta CamaraOliveira, Mieke Sterken & Tim Woods - 2021 - Bilbao: Upv-Ehu.
    ICTs, personal data, digital rights, the GDPR, data privacy, online security… these terms, and the concepts behind them, are increasingly common in our lives. Some of us may be familiar with them, but others are less aware of the growing role of ICTs and data in our lives - and the potential risks this creates. These risks are even more pronounced for vulnerable groups in society. People can be vulnerable in different, often overlapping, ways, which place (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  49
    Is Your Neural Data Part of Your Mind? Exploring the Conceptual Basis of Mental Privacy.Abel Wajnerman Paz - 2022 - Minds and Machines 32 (2):395-415.
    It has been argued that neural data are an especially sensitive kind of personal information that could be used to undermine the control we should have over access to our mental states, and therefore need a stronger legal protection than other kinds of personal data. The Morningside Group, a global consortium of interdisciplinary experts advocating for the ethical use of neurotechnology, suggests achieving this by treating legally ND as a body organ. Although the proposal is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  45.  5
    Secondary research use of personal medical data: patient attitudes towards data donation.Michael Krawczak, Matthias Laudes, Bimba Franziska Hoyer, Christoph Borzikowsky & Gesine Richter - 2021 - BMC Medical Ethics 22 (1):1-10.
    BackgroundThe SARS-CoV-2 pandemic has highlighted once more the great need for comprehensive access to, and uncomplicated use of, pre-existing patient data for medical research. Enabling secondary research-use of patient-data is a prerequisite for the efficient and sustainable promotion of translation and personalisation in medicine, and for the advancement of public-health. However, balancing the legitimate interests of scientists in broad and unrestricted data-access and the demand for individual autonomy, privacy and social justice is a great challenge for patient-based (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  61
    Protecting privacy to protect mental health: the new ethical imperative.Elias Aboujaoude - 2019 - Journal of Medical Ethics 45 (9):604-607.
    Confidentiality is a central bioethical principle governing the provider–patient relationship. Dating back to Hippocrates, new laws have interpreted it for the age of precision medicine and electronic medical records. This is where the discussion of privacy and technology often ends in the scientific health literature when Internet-related technologies have made privacy a much more complex challenge with broad psychological and clinical implications. Beyond the recognised moral duty to protect patients’ health information, clinicians should now advocate a basic right to privacy (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47. Data subject rights as a research methodology: A systematic literature review.Adamu Adamu Habu & Tristan Henderson - 2023 - Journal of Responsible Technology 16 (C):100070.
    Data subject rights provide data controllers with obligations that can help with transparency, giving data subjects some control over their personal data. To date, a growing number of researchers have used these data subject rights as a methodology for data collection in research studies. No one, however, has gathered and analysed different academic research studies that use data subject rights as a methodology for data collection. To this end, we conducted a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  10
    Reflections on the lived experience of working with limited personal protective equipment during the COVID‐19 crisis.Kechi Iheduru-Anderson - 2021 - Nursing Inquiry 28 (1):e12382.
    Coronavirus disease 2019 (COVID‐19) has placed significant strain on United States’ health care and health care providers. While most Americans were sheltering in place, nurses headed to work. Many lacked adequate personal protective equipment (PPE), increasing the risk of becoming infected or infecting others. Some health care organizations were not transparent with their nurses; many nurses were gagged from speaking up about the conditions in their workplaces. This study used a descriptive phenomenological design to describe the lived experience of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  49.  5
    Just Because We Can Doesn’t Mean We Should: On Knowing and Protecting Data Produced by the Jewish Consumptives’ Relief Society.Jack Maness & Kim Pham - 2022 - Humanist Studies and the Digital Age 7 (1).
    A recent project at the University of Denver Libraries used handwritten text recognition (HTR) software to create transcriptions of records from the Jewish Consumptives’ Relief Society (JCRS), a tuberculosis sanatorium located in Denver, Colorado from 1904 to 1954. Among a great many other potential uses, these type- and hand-written records give insight into the human experience of disease and epidemic, its treatment, its effect on cultures, and of Jewish immigration to and early life in the American West. Our intent is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  50.  16
    Research on the Human Rights and Cultural Protection of Environmentally Displaced Persons under Rising Sea Levels.Rui Xie, Wen-Bo Li, Meng-Chun Lin & Jia-Ming di LuZhu - 2021 - Complexity 2021:1-11.
    In recent years, due to factors such as rising sea levels, several island nations such as Maldives, Tuvalu, Kiribati, and the Marshall Islands are in danger of disappearing completely. When the land of an island country disappeared, the human rights protection of Environmentally Displaced Persons in the migration process and the possible loss of their unique culture, language, and lifestyle have aroused great concern. We call such Environmentally Displaced Persons as EDPs. This study selects the EDPs’ data of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 987