Results for 'personal information'

1000+ found
Order:
  1.  15
    Nonnatural Personal Information. Accounting for Misleading and Non-misleading Personal Information.Sille Obelitz Søe - 2021 - Philosophy and Technology 34 (4):1243-1262.
    Personal information is key to informational privacy and the algorithmically generated profiles of individuals. However, the concept of personal information and its nature is rarely discussed. The concept of personal information thus seems to be based on an idea of information as objective and truthful—as natural information—that is depicted as digital footprints in the online and digital realm. I argue that the concept of personal information should exit the realm of (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  2.  8
    Technology, Personal Information, and Identity.Muriel Leuenberger - 2024 - Techné: Research in Philosophy and Technology 28 (1):22-48.
    Novel and emerging technologies can provide users with new kinds and unprecedented amounts of information about themselves, such as autobiographical information, neurodata, health information, or characteristics inferred from online behavior. Technology providing extensive personal information (PI technology) can impact who we take ourselves to be, how we constitute ourselves, and indeed who we are. This paper analyzes how the external, quantified perspective on us offered by PI technology affects identity based on a narrative identity theory. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Personal Information as Symmetry Breaker in Disagreements.Diego E. Machuca - 2022 - Philosophy 97 (1):51-70.
    When involved in a disagreement, a common reaction is to tell oneself that, given that the information about one’s own epistemic standing is clearly superior in both amount and quality to the information about one’s opponent’s epistemic standing, one is justified in one’s confidence that one’s view is correct. In line with this natural reaction to disagreement, some contributors to the debate on its epistemic significance have claimed that one can stick to one’s guns by relying in part (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  4.  12
    Technology, Personal Information, and Identity.Muriel Leuenberger - 2024 - Techné Research in Philosophy and Technology 28 (1):22-48.
    Novel and emerging technologies can provide users with new kinds and unprecedented amounts of information about themselves, such as autobiographical information, neurodata, health information, or characteristics inferred from online behavior. Technology that provides extensive personal information (PI technology) can impact who we understand ourselves to be, how we constitute ourselves, and indeed who we are. This paper analyzes how PI technology’s external, quantified perspective on us affects identity based on a narrative identity theory. Disclosing the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  12
    Personal information as communicative acts.Jens-Erik Mai - 2016 - Ethics and Information Technology 18 (1):51-57.
    The paper extends previous accounts of informational privacy as a contextual notion. Where previous accounts have focused on interpretations of the privacy context itself as being contextual and open for negotiation and interpretation, this paper extends those analyses and shows that personal information itself is in fact best understood as contextual and situational—and as such open for interpretation. The paper reviews the notion of information as it has been applied in informational privacy and philosophy of information, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  40
    Holding personal information in a disease-specific register: the perspectives of people with multiple sclerosis and professionals on consent and access.W. Baird, R. Jackson, H. Ford, N. Evangelou, M. Busby, P. Bull & J. Zajicek - 2009 - Journal of Medical Ethics 35 (2):92-96.
    Objective: To determine the views of people with multiple sclerosis (MS) and professionals in relation to confidentiality, consent and access to data within a proposed MS register in the UK. Design: Qualitative study using focus groups (10) and interviews (13). Setting: England and Northern Ireland. Participants: 68 people with MS, neurologists, MS nurses, health services management professionals, researchers, representatives from pharmaceutical companies and social care professionals. Results: People with MS expressed open and altruistic views towards the use of their (...) information to facilitate service provision and research, placing trust in responsible guardianship and legitimate use of their information. Participant’s proposed that people with MS should be able to select their individual level of involvement in a register using levels of consent. It was agreed that access to the register should be governed by a guardianship committee composed of a range of stakeholders. People with MS did not wish their details to be used by marketing agencies and did not consider this a legitimate use of their data. Whilst participants were positive of the role a register could play in promoting research, participants felt that access to data by pharmaceutical industries should be administered by the guardianship committee. People with MS are concerned should their employers be able to access their personal information. Professionals were more cautious than people with MS in their approach to the use of patient personal data within a register. Conclusions: Whilst all stakeholders were positive of the benefits of an MS register, development of such a resource must incorporate robust data security and guardianship measures in order to ensure that, whilst opportunities are maximised, risks to the privacy of individuals and legal challenges to professionals are avoided. (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Are Markets in Personal Information Morally Impermissible?Jakob Mainz - 2021 - Journal of Information Ethics 31 (2).
    In this paper, I shall discuss what I call the Argument From Exploitation. This argument has as its conclusion that for-profit markets in personal information are morally impermissible. The main premise given for this conclusion is that markets in personal information involve exploitation of vulnerable people, and appertaining inequalities. I try to show that at least one of the premises of this argument is false. I then entertain an objection to my argument that holds that adding (...)
     
    Export citation  
     
    Bookmark   1 citation  
  8. Access to Personal Information for Public Health Research: Transparency Should Always Be Mandatory.Louise Ringuette, Jean-Christophe Bélisle-Pipon, Victoria Doudenkova & Bryn Williams-Jones - 2018 - Canadian Journal of Bioethics/Revue canadienne de bioéthique 1 (2):94-98.
    In Québec, the Act Respecting Access to Documents Held by Public Bodies and the Protection of Personal Information provides an exception to transparency to most public institutions where public health research is conducted by allowing them to not disclose their uses of personal data. This exceptionalism is ethically problematic due to important concerns and we argue that all those who conduct research should be transparent and accountable for the work they do in the public interest.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  9.  78
    Internet privacy, technology, and personal information.Marjorie S. Price - 2020 - Ethics and Information Technology 22 (2):163-173.
    Computer programs are used to obtain and store information about the online activities of users of the web. Many people are concerned about this practice because they believe that it can violate users' rights to privacy or result in violations of them. This belief is based on the assumption that the information obtained and stored with the use of the programs includes personal information. My main aim in this paper is to argue that this assumption is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  48
    Consent for use of personal information for health research: Do people with potentially stigmatizing health conditions and the general public differ in their opinions?Donald J. Willison, Valerie Steeves, Cathy Charles, Lisa Schwartz, Jennifer Ranford, Gina Agarwal, Ji Cheng & Lehana Thabane - 2009 - BMC Medical Ethics 10 (1):10-.
    BackgroundStigma refers to a distinguishing personal trait that is perceived as or actually is physically, socially, or psychologically disadvantageous. Little is known about the opinion of those who have more or less stigmatizing health conditions regarding the need for consent for use of their personal information for health research.MethodsWe surveyed the opinions of people 18 years and older with seven health conditions. Participants were drawn from: physicians' offices and clinics in southern Ontario; and from a cross-Canada marketing (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  11.  21
    Socio‐cultural analysis of personal information leakage in Japan.Yohko Orito & Kiyoshi Murata - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):161-171.
    PurposeThe purpose of this paper is to analyse incidents of personal information leakage in Japan based on Japanese socio‐cultural characteristics of information privacy and to consider how best to develop an effective personal information protection policy that conforms to Japanese situations as well as to the global requirement of personal information protection.Design/methodology/approachAfter describing recent incidents of personal information leakage in Japan, the paper examines the defects of the Act on Protection of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  12. The Role of Second-Person Information in the Development of Social Understanding.Chris Moore & John Barresi - 2017 - Frontiers in Psychology 8.
  13.  45
    Respect for persons, informed consent andthe assessment of infectious disease risks in xenotransplantation.Jeffrey H. Barker & Lauren Polcrack - 2001 - Medicine, Health Care and Philosophy 4 (1):53-70.
    Given the increasing need for solid organ and tissue transplants and the decreasing supply of suitable allographic organs and tissue to meet this need, it is understandable that the hope for successful xenotransplantation has resurfaced in recent years. The biomedical obstacles to xenotransplantation encountered in previous attempts could be mitigated or overcome by developments in immunosuppression and especially by genetic manipulation of organ source animals. In this essay we consider the history of xenotransplantation, discuss the biomedical obstacles to success, explore (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  14. Search engines, personal information and the problem of privacy in public.Herman T. Tavani - 2005 - International Review of Information Ethics 3:39-45.
    The purpose of this paper is to show how certain uses of search-engine technology raise concerns for personal privacy. In particular, we examine some privacy implications involving the use of search engines to acquire information about persons. We consider both a hypothetical scenario and an actual case in which one or more search engines are used to find information about an individual. In analyzing these two cases, we note that both illustrate an existing problem that has been (...)
     
    Export citation  
     
    Bookmark   2 citations  
  15.  12
    Dealing with misuse of personal information online – Coping measures of children in the EU Kids Online III project.Monica Barbovschi - 2014 - Communications 39 (3):305-326.
    Children’s unpleasant experiences with misuse of their personal information online is among the rapidly increasing online ‘risks’. Among these, four were chosen for this study: dealing with their own hacked accounts, dealing with others’ fake accounts, dealing with fake accounts impersonating them and sending rude messages on their behalf with the intent of damaging their reputation, and dealing with receiving rude messages from hacked accounts of friends were reported as most bothersome in EU Kids Online III. These four (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  14
    Effect of Affective Personality Information on Face Processing: Evidence from ERPs.Qiu L. Luo, Han L. Wang, Milena Dzhelyova, Ping Huang & Lei Mo - 2016 - Frontiers in Psychology 7.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  69
    Privacy, the Internet of Things and State Surveillance: Handling Personal Information within an Inhuman System.Adam Henschke - 2020 - Moral Philosophy and Politics 7 (1):123-149.
    The Internet of Things (IoT) is, in part, an information handling system that can remove humans from the information handling process. The particular problem explored is how we are to understand privacy when considering informational systems that handle personal information in ways that impact people’s lives when there is no human operator in direct contact with that personal information. I argue that these new technologies need to take concepts like privacy into account, but also, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  44
    The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy.Meng-Hsiang Hsu & Feng-Yang Kuo - 2003 - Journal of Business Ethics 42 (4):305 - 320.
    In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  19.  43
    Alternatives to project-specific consent for access to personal information for health research: Insights from a public dialogue.Donald J. Willison, Marilyn Swinton, Lisa Schwartz, Julia Abelson, Cathy Charles, David Northrup, Ji Cheng & Lehana Thabane - 2008 - BMC Medical Ethics 9 (1):18-.
    BackgroundThe role of consent for research use of health information is contentious. Most discussion has focused on when project-specific consent may be waived but, recently, a broader range of consent options has been entertained, including broad opt-in for multiple studies with restrictions and notification with opt-out. We sought to elicit public values in this matter and to work toward an agreement about a common approach to consent for use of personal information for health research through deliberative public (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  20.  22
    To Disclose or Not to Disclose: The Ironic Effects of the Disclosure of Personal Information About Ethnically Distinct Newcomers to a Team.Bret Crane, Melissa Thomas-Hunt & Selin Kesebir - 2019 - Journal of Business Ethics 158 (4):909-921.
    Recently, scholars have argued that disclosure of personal information is an effective mechanism for building high-quality relationships. However, personal information can focus attention on differences in demographically diverse teams. In an experiment using 37 undergraduate teams, we examine how sharing personal information by ethnically similar and ethnically distinct newcomers to a team affects team perceptions, performance, and behavior. Our findings indicate that the disclosure of personal information by ethnically distinct newcomers improves team (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  21.  21
    Paradox of choice and sharing personal information.Takeshi Ebina & Keita Kinjo - 2023 - AI and Society 38 (1):121-132.
    The purpose of this study is to investigate the relationship between a firm’s strategy and consumers’ decisions in the presence of the paradox of choice and sharing personal information. The paradox of choice implies that having too many choices does not necessarily ensure happiness and sometimes having less is more. A new model is constructed introducing a factor of information sharing into the model of a previous study that embedded the paradox of choice only (Kinjo and Ebina (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  96
    Obtaining subjects' consent to publish identifying personal information: current practices and identifying potential issues.Akiko Yoshida, Yuri Dowa, Hiromi Murakami & Shinji Kosugi - 2013 - BMC Medical Ethics 14 (1):47.
    In studies publishing identifying personal information, obtaining consent is regarded as necessary, as it is impossible to ensure complete anonymity. However, current journal practices around specific points to consider when obtaining consent, the contents of consent forms and how consent forms are managed have not yet been fully examined. This study was conducted to identify potential issues surrounding consent to publish identifying personal information.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  26
    What is the ‘personal’ in ‘personal information’?Sille Obelitz Søe, Rikke Frank Jørgensen & Jens-Erik Mai - 2021 - Ethics and Information Technology 23 (4):625-633.
    Contemporary privacy theories and European discussions about data protection employ the notion of ‘personal information’ to designate their areas of concern. The notion of personal information is demarcated from non-personal information—or just information—indicating that we are dealing with a specific kind of information. However, within privacy scholarship the notion of personal information appears undertheorized, rendering the concept somewhat unclear. We argue that in an age of datafication, protection of personal (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  12
    Ethics in an Age of Surveillance: Personal Information and Virtual Identities.Adam Henschke - 2017 - Cambridge University Press.
    People increasingly live online, sharing publicly what might have once seemed private, but at the same time are enraged by extremes of government surveillance and the corresponding invasion into our private lives. In this enlightening work, Adam Henschke re-examines privacy and property in the age of surveillance in order to understand not only the importance of these social conventions, but also their moral relevance. By analyzing identity and information, and presenting a case for a relation between the two, he (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  25.  24
    Limiting Factors Impacting on Voluntary First Person Informed Consent in the Philippines.Fatima Alvarez Castillo - 2002 - Developing World Bioethics 2 (1):21-27.
    How well can institutional guidelines help ensure the dignity, rights, safety and well being of research participants in an underdeveloped country? In this paper I describe the limits of informed consent as an instrument for the protection of participants in the context of the Philippines. I bring to this paper my experiences as an advocate of rights, a member of an ethics review board, a researcher on the ethics of research and as an observer of the dynamics of clinical practice (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  36
    Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse.Paul Benjamin Lowry, Clay Posey, Tom L. Roberts & Rebecca J. Bennett - 2014 - Journal of Business Ethics 121 (3):385-401.
    Computer abuse by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  27.  19
    Limiting Factors Impacting on Voluntary First Person Informed Consent in the Philippines.Fatima Alvarez Castillo - 2002 - Developing World Bioethics 2 (1):21-27.
    How well can institutional guidelines help ensure the dignity, rights, safety and well being of research participants in an underdeveloped country? In this paper I describe the limits of informed consent as an instrument for the protection of participants in the context of the Philippines. I bring to this paper my experiences as an advocate of rights, a member of an ethics review board, a researcher on the ethics of research and as an observer of the dynamics of clinical practice (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  28.  72
    Computer ethics: The role of personal, informal, and formal codes. [REVIEW]Margaret Anne Pierce & John W. Henry - 1996 - Journal of Business Ethics 15 (4):425 - 437.
    Ethical decisions related to computer technology and computer use are subject to three primary influences: (1) the individual's own personal code (2) any informal code of ethical behavior that exists in the work place, and (3) exposure to formal codes of ethics. The relative importance of these codes, as well as factors influencing these codes, was explored in a nationwide survey of information system (IS) professionals. The implications of the findings are important to educators and employers in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  29.  71
    On the inference of personal authorship: Enhancing experienced agency by priming effect information☆.Henk Aarts, Ruud Custers & Daniel M. Wegner - 2005 - Consciousness and Cognition 14 (3):439-458.
    Three experiments examined whether the mere priming of potential action effects enhances people’s feeling of causing these effects when they occur. In a computer task, participants and the computer independently moved a rapidly moving square on a display. Participants had to press a key, thereby stopping the movement. However, the participant or the computer could have caused the square to stop on the observed position, and accordingly, the stopped position of the square could be conceived of as the potential effect (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   69 citations  
  30.  43
    Trusting third-party storage providers for holding personal information. A context-based approach to protect identity-related data in untrusted domains.Giulio Galiero & Gabriele Giammatteo - 2009 - Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, are two examples (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  31.  6
    When Careproviders Should Give Advice, Disclose Personal Information, and Reveal Their Feelings.Edmund G. Howe - 2003 - Journal of Clinical Ethics 14 (1-2):3-17.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32.  23
    Developing registries of volunteers: key principles to manage issues regarding personal information protection.E. Levesque, D. Leclerc, J. Puymirat & B. M. Knoppers - 2010 - Journal of Medical Ethics 36 (11):712-714.
    Much biomedical research cannot be performed without recruiting human subjects. Increasingly, volunteer registries are being developed to assist researchers with this challenging task. Yet, volunteer registries raise confidentiality issues. Having recently developed a registry of volunteers, the authors searched for normative guidance on how to implement the principle of confidentiality. The authors found that the protection of confidentiality in registries are based on the 10 key elements which are elaborated in detail in the Canadian Standards Association Model Code. This paper (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  33.  14
    Mining the Data: Exploring Rural Patients’ Attitudes about the Use of Their Personal Information in Research.Jennifer B. McCormick, Margaret Hopkins, Erik B. Lehman & Michael J. Green - 2022 - AJOB Empirical Bioethics 13 (2):89-106.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  10
    Issues Around the Protection or Revelation of Personal Information.Daniel Hillyard & Mark Gauen - 2007 - Knowledge, Technology & Policy 20 (2):121-124.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35. The informational nature of personal identity.Luciano Floridi - 2011 - Minds and Machines 21 (4):549-566.
    In this paper, I present an informational approach to the nature of personal identity. In “Plato and the problem of the chariot”, I use Plato’s famous metaphor of the chariot to introduce a specific problem regarding the nature of the self as an informational multiagent system: what keeps the self together as a whole and coherent unity? In “Egology and its two branches” and “Egology as synchronic individualisation”, I outline two branches of the theory of the self: one concerning (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   34 citations  
  36.  17
    Estimation of career potential based on age, sex, and personality information.Juliet Popper Shaffer - 1978 - Bulletin of the Psychonomic Society 11 (2):120-122.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37.  72
    Informed Consent in Direct-to-Consumer Personal Genome Testing: The Outline of A Model between Specific and Generic Consent.Eline M. Bunnik, A. Cecile J. W. Janssens & Maartje H. N. Schermer - 2013 - Bioethics 27 (3):343-351.
    Broad genome-wide testing is increasingly finding its way to the public through the online direct-to-consumer marketing of so-called personal genome tests. Personal genome tests estimate genetic susceptibilities to multiple diseases and other phenotypic traits simultaneously. Providers commonly make use of Terms of Service agreements rather than informed consent procedures. However, to protect consumers from the potential physical, psychological and social harms associated with personal genome testing and to promote autonomous decision-making with regard to the testing offer, we (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  38. Persons, perspectives, and full information accounts of the good.Connie S. Rosati - 1995 - Ethics 105 (2):296-325.
  39.  32
    From Information Search to the Loss of Personality: The Phenomenon of Dataism.D. L. Kobelieva & N. M. Nikolaienko - 2021 - Anthropological Measurements of Philosophical Research 20:100-112.
    Purpose. The research is devoted to the analysis of the urgent problem of the information society: the overload of a person with information and, as a result, the impossibility of adequate formation and development of the personality; as well as the problem of "digitization" of human existence and the formation of a new reality of dataism. Theoretical basis. A lot of modern scientific works are devoted to the analysis of the information society, its problems and features. The (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  87
    Personal autonomy and informed consent.Lars Øystein Ursin - 2009 - Medicine, Health Care and Philosophy 12 (1):17-24.
    Two ways of understanding the notion of autonomy are outlined and discussed in this article, in order to clarify how and if informed consent requirements in biotechnological research are to be justified by the promotion of personal autonomy: A proceduralist conception linking autonomy with authenticity, and a substantivist conception linking autonomy with control. The importance of distinguishing autonomy from liberty is emphasised, which opens for a possible conflict between respecting the freedom and the autonomy of research participants. It is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  41.  79
    Informed consent for research in Borderline Personality Disorder.Rachel E. Dew - 2007 - BMC Medical Ethics 8 (1):1-4.
    Background Previous research on informed consent for research in psychiatric patients has centered on disorders that affect comprehension and appreciation of risks. Little has been written about consent to research in those subjects with Borderline Personality Disorder, a prevalent and disabling condition. Discussion Despite apparently intact cognition and comprehension of risks, a borderline subject may deliberately choose self-harm in order to fulfill abnormal psychological needs, or due to suicidality. Alternatively, such a subject may refuse enrollment due to transference or the (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  24
    Personality, motivation, and performance: A theory of the relationship between individual differences and information processing.Michael S. Humphreys & William Revelle - 1984 - Psychological Review 91 (2):153-184.
  43.  11
    Informed Consent in Direct-to-Consumer Personal Genome Testing: The Outline of A Model between Specific and Generic Consent.Eline M. Bunnik, A. Cecile J. W. Janssens & Maartje H. N. Schermer - 2012 - Bioethics 28 (7):343-351.
    Broad genome‐wide testing is increasingly finding its way to the public through the online direct‐to‐consumer marketing of so‐called personal genome tests. Personal genome tests estimate genetic susceptibilities to multiple diseases and other phenotypic traits simultaneously. Providers commonly make use of Terms of Service agreements rather than informed consent procedures. However, to protect consumers from the potential physical, psychological and social harms associated with personal genome testing and to promote autonomous decision‐making with regard to the testing offer, we (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  44.  12
    Rescuing Informed Consent: How the new “Key Information” and “Reasonable Person” Provisions in the Revised U.S. Common Rule open the door to long Overdue Informed Consent Disclosure Improvements and why we need to walk Through that door.Mark Yarborough - 2020 - Science and Engineering Ethics 26 (3):1423-1443.
    There is substantial published evidence showing that countless people enroll each year in ethically deficient clinical trials. Many of the trials are problematic because the quality of the science used to justify their launch may not be sufficiently vetted while many other trials may lack requisite social value. This poses the question: why do people volunteer for them? The answer resides in large part in the fact that informed consent practices have historically masked, rather than disclosed, the information that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  25
    The person of the voice: narrative identities in informed consent.Brendan McCormack - 2002 - Nursing Philosophy 3 (2):114-119.
    This paper explores the dominant rational approach to informed consent and challenges the appropriateness of this approach to ethical decision‐making with people with dementia. In dementia care a dominant assumption exists that people are not autonomous because of their inability to make decisions and exercise freedom of choice. The rational understanding of autonomy being the capacity to exercise freedom of choice means that health and social care professionals feel justified in making decisions on behalf of the person with dementia. If (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  46. First Person Accounts of Yoga Meditation Yield Clues to the Nature of Information in Experience. Shetkar, Alex Hankey & H. R. Nagendra - 2017 - Cosmos and History 13 (1):240-252.
    Since the millennium, first person accounts of experience have been accepted as philosophically valid, potentially useful sources of information about the nature of mind and self. Several Vedic sciences rely on such first person accounts to discuss experience and consciousness. This paper shows that their insights define the information structure of experience in agreement with a scientific theory of mind fulfilling all presently known philosophical and scientific conditions. Experience has two separate components, its information content, and a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  16
    Personalized and long-term electronic informed consent in clinical research: stakeholder views.Isabelle Huys, David Geerts, Pascal Borry & Evelien De Sutter - 2021 - BMC Medical Ethics 22 (1):1-12.
    BackgroundThe landscape of clinical research has evolved over the past decade. With technological advances, the practice of using electronic informed consent (eIC) has emerged. However, a number of challenges hinder the successful and widespread deployment of eIC in clinical research. Therefore, we aimed to investigate the views of various stakeholders on the potential advantages and challenges of eIC.MethodsSemi-structured interviews were conducted with 39 participants from 5 stakeholder groups from across 11 European countries. The stakeholder groups included physicians, patient organization representatives, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Information technology, privacy, and the protection of personal data.Jeroen Van Den Hoven - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press.
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  49.  27
    Persons with Intellectual and Developmental Disabilities and Information Technologies. Some Ethical Observations—A Comment on Chalgoumi et al.Fiachra O’Brolcháin & Bert Gordijn - 2019 - Ethics and Behavior 29 (3):218-222.
    This comment on Chalgoumi et al.’s article “Information Privacy for Technology Users with Intellectual and Developmental Disabilities: Why Does It Matter?” focuses on the concept of autonomy in order to expand the scope of the ethical discussion. First we explore the conceptual and practical relations between privacy and autonomy. Following this, we address the issue of underfunding of information technology for persons with intellectual and developmental disabilities in terms of distributive justice and provide some potential policy solutions.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  75
    Neurological information processing and free persons.Rosemary Agonito - 1975 - Southern Journal of Philosophy 13 (1):3-11.
1 — 50 / 1000