Results for 'privacy protection'

1000+ found
Order:
  1.  17
    Privacy Protections in and across Contexts: Why We Need More Than Contextual Integrity.Sara Goering, Asad Beck, Natalie Dorfman, Sofia Schwarzwalder & Nicolai Wohns - 2024 - American Journal of Bioethics Neuroscience 15 (2):149-151.
    Do we need a right to mental privacy? In an era of increasing sophistication in recording, interpreting, and directly intervening on our neural activity – not to mention efforts at combining neural...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  14
    Data privacy protection in scientific publications: process implementation at a pharmaceutical company.Friedrich Maritsch, Ingeborg Cil, Colin McKinnon, Jesse Potash, Nicole Baumgartner, Valérie Philippon & Borislava G. Pavlova - 2022 - BMC Medical Ethics 23 (1):1-10.
    Background Sharing anonymized/de-identified clinical trial data and publishing research outcomes in scientific journals, or presenting them at conferences, is key to data-driven scientific exchange. However, when data from scientific publications are linked to other publicly available personal information, the risk of reidentification of trial participants increases, raising privacy concerns. Therefore, we defined a set of criteria allowing us to determine and minimize the risk of data reidentification. We also implemented a review process at Takeda for clinical publications prior to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3. Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  4.  43
    Patient privacy protection among university nursing students: A cross-sectional study.Dorothy N. S. Chan, Kai-Chow Choi, Miranda H. Y. To, Summer K. N. Ha & Gigi C. C. Ling - 2022 - Nursing Ethics 29 (5):1280-1292.
    Background Protecting a person’s right to privacy and confidentiality is important in healthcare services. As future health professionals, nursing students should bear the same responsibility as qualified health professionals in protecting patient privacy. Objectives To investigate nursing students’ practices of patient privacy protection and to identify factors associated with their practices. Research design A cross-sectional study design was adopted. A two-part survey was used to collect two types of data on nursing students: (1) personal characteristics, including (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  16
    Balancing Privacy Protections with Efficient Research: Institutional Review Boards and the Use of Certificates of Confidentiality.Peter M. Currie - 2005 - IRB: Ethics & Human Research 27 (5):7.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  6.  14
    Queer Privacy Protection: Challenges and the Fight within Libraries.Darra Hofman & Michele A. L. Villagran - 2023 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 36 (5):2157-2178.
    The COVID-19 pandemic has forced libraries to shift their service-delivery model online, infiltrating countless interactions–from storytime to reference questions to social groups–into digital mediation, typically by third-party platforms outside the library’s control, generating mineable, persistent digital traces. One community particularly vulnerable to the impacts of surveillance is the queer community, where an outing, at least in the United States, imposes a potential loss of housing and employment and may subject the outed person to violence. Libraries–particularly public and school libraries–have once (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7. Privacy Protection Law, 30 Years On.Andre Vitalis - 2009 - Hermès: La Revue Cognition, communication, politique 53 (1):137 - +.
  8.  5
    Users’ Payment Intention considering Privacy Protection in Cloud Storage: An Evolutionary Game-Theoretic Approach.Jianguo Zheng & Jinming Chen - 2021 - Complexity 2021:1-15.
    To solve the current privacy leakage problems of cloud storage services, research on users’ payment intention for cloud storage services with privacy protection is extremely important for improving the sustainable development of cloud storage services. An evolutionary game model between cloud storage users and providers that considers privacy is constructed. Then, the model’s evolutionary stability strategies via solving the replication dynamic equations are analyzed. Finally, simulation experiments are carried out for verifying and demonstrating the influence of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  14
    Extended Mind Over Matter: Privacy Protection Is the Sine Qua Non.Cohen Marcus Lionel Brown - 2023 - American Journal of Bioethics Neuroscience 14 (2):97-99.
    Palermos’s (2023) concept of “mental data” is appreciated as advancing fresh considerations in urgent discourse on mental privacy. However, it is suggested that the proposal for an ontologically di...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  9
    Posture Pictures, Permission, and Privacy Protection.Gretchen S. Dieck - 1981 - IRB: Ethics & Human Research 3 (10):6.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  20
    Interagency data exchange, privacy protection and governance architecture for Information sharing across domains.William J. Buchanan, Lu Fan, Omair Uthmani & Burkhard Schafer - forthcoming - Artificial Intelligence and Law.
  12.  16
    Intellectual Freedom versus Privacy Protection.Diana Woodward - 1991 - Social Philosophy Today 5:433-444.
  13.  4
    Intellectual Freedom versus Privacy Protection.Diana Woodward - 1991 - Social Philosophy Today 5:433-444.
  14.  7
    Law and Privacy Protection.Nathan Hershey - 1981 - IRB: Ethics & Human Research 3 (6):10.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  16
    Big Data in the workplace: Privacy Due Diligence as a human rights-based approach to employee privacy protection.Jeremias Adams-Prassl, Isabelle Wildhaber & Isabel Ebert - 2021 - Big Data and Society 8 (1).
    Data-driven technologies have come to pervade almost every aspect of business life, extending to employee monitoring and algorithmic management. How can employee privacy be protected in the age of datafication? This article surveys the potential and shortcomings of a number of legal and technical solutions to show the advantages of human rights-based approaches in addressing corporate responsibility to respect privacy and strengthen human agency. Based on this notion, we develop a process-oriented model of Privacy Due Diligence to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  47
    Bringing older people’s perspectives on consumer socially assistive robots into debates about the future of privacy protection and AI governance.Andrea Slane & Isabel Pedersen - forthcoming - AI and Society:1-20.
    A growing number of consumer technology companies are aiming to convince older people that humanoid robots make helpful tools to support aging-in-place. As hybrid devices, socially assistive robots (SARs) are situated between health monitoring tools, familiar digital assistants, security aids, and more advanced AI-powered devices. Consequently, they implicate older people’s privacy in complex ways. Such devices are marketed to perform functions common to smart speakers (e.g., Amazon Echo) and smart home platforms (e.g., Google Home), while other functions are more (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  76
    Built-in privacy—no panacea, but a necessary condition for effective privacy protection.Alexander Dix - 2010 - Identity in the Information Society 3 (2):257-265.
    Built-in privacy has for too long been neglected by regulators. They have concentrated on reacting to violations of rules. Even imposing severe fines will however not address the basic issue that preventative privacy protection is much more meaningful. The paper discusses this in the context of the International Working Group on Data Protection in Telecommunications (“Berlin Group”) which has published numerous recommendations on privacy-compliant design of technical innovations. Social network services, road pricing schemes, and the (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  12
    Privacy at risk? Understanding the perceived privacy protection of health code apps in China.Wenhong Chen, An Hu & Gejun Huang - 2022 - Big Data and Society 9 (2).
    As a key constituent of China's approach to fighting COVID-19, Health Code apps (HCAs) not only serve the pandemic control imperatives but also exercise the agency of digital surveillance. As such, HCAs pave a new avenue for ongoing discussions on contact tracing solutions and privacy amid the global pandemic. This article attends to the perceived privacy protection among HCA users via the lens of the contextual integrity theory. Drawing on an online survey of adult HCA users in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  9
    KPDR : An Effective Method of Privacy Protection.Zihao Shen, Wei Zhen, Pengfei Li, Hui Wang, Kun Liu & Peiqian Liu - 2021 - Complexity 2021:1-10.
    To solve the problem of user privacy disclosure caused by attacks on anonymous areas in spatial generalization privacy protection methods, a K and P Dirichlet Retrieval method based on k-anonymity mechanism is proposed. First, the Dirichlet graph model is introduced, the same kind of information points is analyzed by using the characteristics of Dirichlet graph, and the anonymous set of users is generated and sent to LBS server. Second, the relationship matrix is generated, and the proximity relationship (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  8
    Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.Colin J. Bennett - 1991 - Science, Technology and Human Values 16 (1):51-69.
    Public policies designed to regulate the use of information technology to protect personal data have been based on different theoretical assumptions in different states, depending on whether the problem is defined in technological, civil libertarian, or bureaucratic terms. However, the rapid development, dispersal, and decentralization of information technology have facilitated a range of new surveillance practices that have in turn rendered the approaches of the 1960s and 1970s obsolete. The networking of the postindustrial state will require a reconceptualization of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Delegating and distributing morality: Can we inscribe privacy protection in a machine? [REVIEW]Alison Adam - 2005 - Ethics and Information Technology 7 (4):233-242.
    This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with tragic consequences. In some sense this can be regarded as a failure in the process of (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  22.  28
    The ethics of inattention: revitalising civil inattention as a privacy-protecting mechanism in public spaces.Tamar Sharon & Bert-Jaap Koops - 2021 - Ethics and Information Technology 23 (3):331-343.
    Societies evolve practices that reflect social norms of appropriateness in social interaction, for example when and to what extent one should respect the boundaries of another person’s private sphere. One such practice is what the sociologist Erving Goffman called civil inattention—the social norm of showing a proper amount of indifference to others—which functions as an almost unnoticed yet highly potent privacy-preserving mechanism. These practices can be disrupted by technologies that afford new forms of intrusions. In this paper, we show (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  50
    Nurses’ and patients’ perceptions of privacy protection behaviours and information provision.Kyunghee Kim, Yonghee Han & Ji-su Kim - 2017 - Nursing Ethics 24 (5):598-611.
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  24.  3
    Confidentiality Certificates: A Measure of Privacy Protection.Natalie Reatig - 1979 - IRB: Ethics & Human Research 1 (3):1.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  24
    Private parts: A global analysis of privacy protection schemes and a proposed innovation for their comparative evaluation. [REVIEW]Laura B. Pincus & Roger Johns - 1997 - Journal of Business Ethics 16 (12-13):1237-1260.
    Given recent technological advances, we now are able to invade personal privacy as never before. The challenge in the business community is to make the most of the opportunities presented by the growth in communication technology while, at the same time, protecting what remains of individual privacy. The conflict between technological advances and privacy concerns is not new, but it has grown exponentially in recent years, and the development of a data protection scheme in the European (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26. Anonymisation and pseudonymisation as means of privacy protection (Sixth International Workshop, Stockholm).Claudio Tamburrini - 2011 - In Katharina Beier, Nils Hoppe, Christian Lenk & Silvia Schnorrer (eds.), The ethical and legal regulation of human tissue and biobank research in Europe: proceedings of the Tiss.EU project. Universit atsverlag G ottingen.
     
    Export citation  
     
    Bookmark  
  27. Anonymisation and pseudonymisation as means of privacy protection (Second International Workshop, Budapest).Petra B. ard & Judit S. Andor - 2011 - In Katharina Beier, Nils Hoppe, Christian Lenk & Silvia Schnorrer (eds.), The ethical and legal regulation of human tissue and biobank research in Europe: proceedings of the Tiss.EU project. Universit atsverlag G ottingen.
     
    Export citation  
     
    Bookmark  
  28.  60
    Protecting privacy to protect mental health: the new ethical imperative.Elias Aboujaoude - 2019 - Journal of Medical Ethics 45 (9):604-607.
    Confidentiality is a central bioethical principle governing the provider–patient relationship. Dating back to Hippocrates, new laws have interpreted it for the age of precision medicine and electronic medical records. This is where the discussion of privacy and technology often ends in the scientific health literature when Internet-related technologies have made privacy a much more complex challenge with broad psychological and clinical implications. Beyond the recognised moral duty to protect patients’ health information, clinicians should now advocate a basic right (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  30
    Privacy as Protection of the Incomputable Self: From Agnostic to Agonistic Machine Learning.Mireille Hildebrandt - 2019 - Theoretical Inquiries in Law 20 (1):83-121.
    This Article takes the perspective of law and philosophy, integrating insights from computer science. First, I will argue that in the era of big data analytics we need an understanding of privacy that is capable of protecting what is uncountable, incalculable or incomputable about individual persons. To instigate this new dimension of the right to privacy, I expand previous work on the relational nature of privacy, and the productive indeterminacy of human identity it implies, into an ecological (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  30.  34
    Genetic Privacy and Confidentiality: Why They Are So Hard to Protect.Mark A. Rothstein - 1998 - Journal of Law, Medicine and Ethics 26 (3):198-204.
    Genetic privacy and confidentiality have both intrinsic and consequential value. Although general agreement exists about the need to protect privacy and confidentiality in the abstract, most of the concern has focused on preventing the harmful uses of this sensitive information. I hope to demonstrate in this article that the reason why genetic privacy and confidentiality are so difficult to protect is that any effort to protect them inevitably implicates broader and extremely contentious issues, such as the right (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  31.  13
    Genetic Privacy and Confidentiality: Why They are So Hard to Protect.Mark A. Rothstein - 1998 - Journal of Law, Medicine and Ethics 26 (3):198-204.
    Genetic privacy and confidentiality have both intrinsic and consequential value. Although general agreement exists about the need to protect privacy and confidentiality in the abstract, most of the concern has focused on preventing the harmful uses of this sensitive information. I hope to demonstrate in this article that the reason why genetic privacy and confidentiality are so difficult to protect is that any effort to protect them inevitably implicates broader and extremely contentious issues, such as the right (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  32.  28
    Privacy and artificial intelligence: challenges for protecting health information in a new era.Blake Murdoch - 2021 - BMC Medical Ethics 22 (1):1-5.
    BackgroundAdvances in healthcare artificial intelligence (AI) are occurring rapidly and there is a growing discussion about managing its development. Many AI technologies end up owned and controlled by private entities. The nature of the implementation of AI could mean such corporations, clinics and public bodies will have a greater than typical role in obtaining, utilizing and protecting patient health information. This raises privacy issues relating to implementation and data security. Main bodyThe first set of concerns includes access, use and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  33.  55
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Protecting privacy in public? Surveillance technologies and the value of public places.Jason W. Patton - 2000 - Ethics and Information Technology 2 (3):181-187.
    While maintaining the importance of privacy for critical evaluations of surveillance technologies, I suggest that privacy also constrains the debate by framing analyses in terms of the individual. Public space provides a site for considering what is at stake with surveillance technologies besides privacy. After describing two accounts of privacy and one of public space, I argue that surveillance technologies simultaneously add an ambiguityand a specificity to public places that are detrimental to the social, cultural, and (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  35.  24
    Protecting health privacy even when privacy is lost.T. J. Kasperbauer - 2020 - Journal of Medical Ethics 46 (11):768-772.
    The standard approach to protecting privacy in healthcare aims to control access to personal information. We cannot regain control of information after it has been shared, so we must restrict access from the start. This ‘control’ conception of privacy conflicts with data-intensive initiatives like precision medicine and learning health systems, as they require patients to give up significant control of their information. Without adequate alternatives to the control-based approach, such data-intensive programmes appear to require a loss of (...). This paper argues that the control view of privacy is shortsighted and overlooks important ways to protect health information even when widely shared. To prepare for a world where we no longer control our data, we must pursue three alternative strategies: obfuscate health data, penalise the misuse of health data and improve transparency around who shares our data and for what purposes. Prioritising these strategies is necessary when health data are widely shared both within and outside of the health system. (shrink)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  7
    Protecting the genetic self from biometric threats: autonomy, identity, and genetic privacy.Christina Akrivopoulou (ed.) - 2015 - Hershey PA: Information Science Reference.
    This book considers all aspects of privacy and security relating to an individual's DNA, with a concentration on fundamental human rights as well as specific cases and examples, in addressing greater security and privacy in the modern world.
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  73
    Privacy rights and protection: Foreign values in modern thai context. [REVIEW]Krisana Kitiyadisai - 2005 - Ethics and Information Technology 7 (1):17-26.
    The concept of privacy as a basic human right which has to be protected by law is a recently adopted concept in Thailand, as the protection of human rights was only legally recognized by the National Human Rights Act in 1999. Moreover, along with other drafted legislation on computer crime, the law on privacy protection has not yet been enacted. The political reform and the influences of globalization have speeded up the process of westernization of the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  38.  41
    Protecting Privacy in an Information Age: The Problem of Privacy in Public.Helen Nissenbaum - 1998 - Law and Philosophy 17 (5-6):559-596.
    Direct download  
     
    Export citation  
     
    Bookmark   39 citations  
  39.  64
    Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges.Corey M. Angst - 2009 - Journal of Business Ethics 90 (S2):169 - 178.
    When information is transformed from what has traditionally been a paper-based format into digitized elements with meaning associated to them, new and intriguing discussions begin surrounding proper and improper uses of this codified and easily transmittable information. As these discussions continue, some health care providers, insurers, laboratories, pharmacies, and other healthcare stakeholders are creating and retroactively digitizing our medical information with the unambiguous endorsement of the federal government.Some argue that these enormous databases of medical information offer improved access to timely (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  40.  18
    Digital Privacy and Data Protection: From Ethical Principles to Action.Ravi Gupta - 2023 - American Journal of Bioethics 23 (11):24-26.
    The spread of digital technology to all parts of our lives has led to meaningful benefits, ranging from the conveniences offered by ride-sharing apps to prediction of mental health crises and track...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  11
    Protecting Privacy and Confidentiality in Environmental Health Research.David B. Resnik - 2010 - Ethics in Biology, Engineering and Medicine 1 (4):285-291.
  42.  13
    Protecting Privacy While Optimizing the Use of (Health)Data: The Importance of Measures and Safeguards.Julie-Anne R. Smit, Menno Mostert & Johannes J. M. van Delden - 2022 - American Journal of Bioethics 22 (7):79-81.
    The possibilities for collecting, storing, and processing of data have increased significantly over the last decades. It has been argued that an increasing demand for health data will de...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  63
    Privacy perception and protection on Chinese social media: a case study of WeChat.Zhen Troy Chen & Ming Cheung - 2018 - Ethics and Information Technology 20 (4):279-289.
    In this study, the under-examined area of privacy perception and protection on Chinese social media is investigated. The prevalence of digital technology shapes the social, political and cultural aspects of the lives of urban young adults. The influential Chinese social media platform WeChat is taken as a case study, and the ease of connection, communication and transaction combined with issues of commercialisation and surveillance are discussed in the framework of the privacy paradox. Protective behaviour and tactics are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  24
    How to protect privacy in a datafied society? A presentation of multiple legal and conceptual approaches.Oskar J. Gstrein & Anne Beaulieu - 2022 - Philosophy and Technology 35 (1):1-38.
    The United Nations confirmed that privacy remains a human right in the digital age, but our daily digital experiences and seemingly ever-increasing amounts of data suggest that privacy is a mundane, distributed and technologically mediated concept. This article explores privacy by mapping out different legal and conceptual approaches to privacy protection in the context of datafication. It provides an essential starting point to explore the entwinement of technological, ethical and regulatory dynamics. It clarifies why each (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  45.  18
    Protecting privacy interests in brain images : the limits of consent.Sarah J. L. Edwards - 2012 - In Sarah Richmond, Geraint Rees & Sarah J. L. Edwards (eds.), I know what you're thinking: brain imaging and mental privacy. Oxford: Oxford University Press.
  46.  13
    Protecting Health Privacy through Reasonable Inferences.Brent Mittelstadt - 2022 - American Journal of Bioethics 22 (7):65-68.
    In the digital age individuals face key choices about whether and how to share intimate details of their lives, “images of the body, biological data in general and diagnostic information” (Pyrrho,...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  13
    Protection of information and the right to privacy - a new equilibrium?Luciano Floridi (ed.) - 2014 - Cham: Springer.
    This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security, and the right to informational privacy. Given the complexity of the topics addressed, the book shows how old legal and ethical frameworks may need to be not only updated, but also supplemented and complemented by new conceptual solutions. Neither a conservative attitude (“more of the same”) nor a revolutionary zeal (“never seen before”) is likely to lead (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  16
    Online privacy: Explaining the nature and special features of the right to seek protection.Varvara Z. Mitliaga - 2004 - Journal of Information, Communication and Ethics in Society 2 (3):159-167.
    This article attempts to explain and analyse the nature and characteristic features of a person’s privacy in the on‐line environment in order to assess how these features shape the need for protection. Since the internet has invaded our everyday lives, individual privacy is exposed in different ways in cyberspace. It is important to note that the Internet lacks the traditional characteristics of a ‘physical’ space, but the interests and inherent values protected by privacy remain the same (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  49. Privacy in Public: A Democratic Defense.Titus Stahl - 2020 - Moral Philosophy and Politics 7 (1):73-96.
    Traditional arguments for privacy in public suggest that intentionally public activities, such as political speech, do not deserve privacy protection. In this article, I develop a new argument for the view that surveillance of intentionally public activities should be limited to protect the specific good that this context provides, namely democratic legitimacy. Combining insights from Helen Nissenbaum’s contextualism and Jürgen Habermas’s theory of the public sphere, I argue that strategic surveillance of the public sphere can undermine the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  50.  9
    Protecting privacy in mandatory reporting of infectious diseases during the COVID-19 pandemic: perspectives from a developing country.Gürkan Sert, Ertunç Mega & Ayşegül Karaca Dedeoğlu - 2022 - Journal of Medical Ethics 48 (12):1015-1019.
    Mandatory reporting of infectious diseases (MRID) is an essential practice to prevent disease outbreaks. Disease notification is a mandatory procedure for most infectious diseases, even during non-pandemic periods in healthcare. The main rationale behind MRID is the protection of public health. The information and data provided by infectious disease reports are used for many purposes, such as preventing the spread and potential negative impact of infectious diseases, assessing the national and global situation regarding reported diseases, conducting scientific research and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000