Results for 'Privacy. '

982 found
Order:
  1. The nature and value of the.Moral Right To Privacy - 2002 - Public Affairs Quarterly 16 (4):329.
     
    Export citation  
     
    Bookmark  
  2. Why the NSA didn’t diminish your privacy but might have violated your right to privacy.Lauritz Munch - forthcoming - Analysis.
    According to a popular view, privacy is a function of people not knowing or rationally believing some fact about you. But intuitively it seems possible for a perpetrator to violate your right to privacy without learning any facts about you. For example, it seems plausible to say that the US National Security Agency’s PRISM program violated, or could have violated, the privacy rights of the people whose information was collected, despite the fact that the NSA, for the most part, merely (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  75
    The value of privacy for people with dementia.Eike Buhr & Mark Schweda - 2022 - Ethik in der Medizin 34 (4):591-607.
    Definition of the problemThe concept of privacy has been astonishingly absent in the discussion about dementia care. In general, questions of privacy receive a lot of attention in nursing ethics; however, when it comes to dementia care, hardly any systematic ethical debate on the topic can be found. It almost seems as though people with dementia had lost any comprehensible interest in privacy and no longer had any private sphere that needed to be considered or protected. However, this not only (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  30
    Security and Privacy Protection in Developing Ethical AI: A Mixed-Methods Study from a Marketing Employee Perspective.Xuequn Wang, Xiaolin Lin & Bin Shao - forthcoming - Journal of Business Ethics:1-20.
    Despite chatbots’ increasing popularity, firms often fail to fully achieve their benefits because of their underutilization. We argue that ethical concerns dealing with chatbot-related privacy and security may prevent firms from developing a culture of embracing chatbot use and fully integrating chatbots into their workflows. Our research draws upon the stimulus-organism-response theory (SOR) and a study by Floridi et al. (Minds and Machines, 28:689–707, 2018 ) on the ethical artificial intelligence framework to investigate how chatbot affordances can foster employees’ positive (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  39
    Innovation under pressure: Implications for data privacy during the Covid-19 pandemic.Gil Scheitlin, Rehana Harasgama, Eduard Fosch Villaronga, Aurelia Tamò-Larrieux, Christoph Lutz & Gemma Newlands - 2020 - Big Data and Society 7 (2).
    The global Covid-19 pandemic has resulted in social and economic disruption unprecedented in the modern era. Many countries have introduced severe measures to contain the virus, including travel restrictions, public event bans, non-essential business closures and remote work policies. While digital technologies help governments and organizations to enforce protection measures, such as contact tracing, their rushed deployment and adoption also raises profound concerns about surveillance, privacy and data protection. This article presents two critical cases on digital surveillance technologies implemented during (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  6. Are publicly available (personal) data “up for grabs”? Three privacy arguments.Elisa Orrù - 2024 - In Paul De Hert, Hideyuki Matsumi, Dara Hallinan, Diana Dimitrova & Eleni Kosta (eds.), Data Protection and Privacy, Volume 16: Ideas That Drive Our Digital World. London: Hart. pp. 105-123.
    The re-use of publicly available (personal) data for originally unanticipated purposes has become common practice. Without such secondary uses, the development of many AI systems like large language models (LLMs) and ChatGPT would not even have been possible. This chapter addresses the ethical implications of such secondary processing, with a particular focus on data protection and privacy issues. Legal and ethical evaluations of secondary processing of publicly available personal data diverge considerably both among scholars and the general public. While some (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7. Opinion Paper: Pluralism about the Value of Privacy.William Bülow - 2011 - International Review of Information Ethics 16:85-88.
    This paper responds to two counterexamples to the view that privacy is valuable because of its connection to personal autonomy. It is argued that these counterexamples fail to establish that personal autonomy is not relevant for the value of privacy, but only the cautious claim that respect for personal autonomy alone is not the only reason for which privacy ought to be respected. Based on the response to the counterexamples a distinction between value-monistic and value-pluralistic accounts about the value of (...)
     
    Export citation  
     
    Bookmark  
  8.  37
    Nanotechnology, Sensors, and Rights to Privacy.Alan Rubel - 2010 - Public Affairs Quarterly 24 (2):131-153.
    A suite of technological advances based on nanotechnology has received substantial attention for its potential to affect privacy. Reports of the National Nanotechnology Initiative have recognized that the societal implications of nanotechnology will include better surveillance and information-gathering technologies. A variety of academic and popular publications have explained the potential effects of nanotechnology on privacy.The ways in which nanotechnology might affect privacy are varied. It may make current information technology better, make old information-gathering techniques more reliable, or expand information-gathering (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  54
    God and Privacy.F. Michael McLain - 1992 - Faith and Philosophy 9 (3):369-386.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  10.  42
    The ethics of inattention: revitalising civil inattention as a privacy-protecting mechanism in public spaces.Tamar Sharon & Bert-Jaap Koops - 2021 - Ethics and Information Technology 23 (3):331-343.
    Societies evolve practices that reflect social norms of appropriateness in social interaction, for example when and to what extent one should respect the boundaries of another person’s private sphere. One such practice is what the sociologist Erving Goffman called civil inattention—the social norm of showing a proper amount of indifference to others—which functions as an almost unnoticed yet highly potent privacy-preserving mechanism. These practices can be disrupted by technologies that afford new forms of intrusions. In this paper, we show how (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Chapter outline.A. Myth Versus Reality, D. Publicity not Privacy, E. Guilty Until Proven Innocent, J. Change & Rotation Mentality - forthcoming - Moral Management: Business Ethics.
    No categories
     
    Export citation  
     
    Bookmark  
  12. “Cyber-Security, Privacy and the Covid-19 Attenuation?”.Vincent Samar - 2021 - Notre Dame Journal of Legislation 47:1-38.
    Large-scale data brokers collect massive amounts of highly personal consumer information to be sold to whoever will pay their price, even at the expense of sacrificing individual privacy and autonomy in the process. In this Article, I will show how a proper understanding and justification for a right to privacy, in context to both protecting private acts and safeguarding information and states of affairs for the performance of such acts, provides a necessary background framework for imposing legal restrictions on such (...)
    No categories
     
    Export citation  
     
    Bookmark  
  13.  19
    Investigative genetic genealogy: can collective privacy and solidarity help?Gabrielle Samuel - 2021 - Journal of Medical Ethics 47 (12):796-797.
    In their article, de Groot et al respond to a call to bring investigative genetic genealogy i to the bioethical debate.1 They explore the extent to which the ethical approach used in the medical clinical genetics context can be helpful for conceptualising the ethical issues associated with IGG. They conclude that such an individual-based model, which revolves around notions of consent and privacy, has significant limitations in the IGG context. The authors call for a broader balancing of the benefits and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  32
    Wittgenstein and Cartesian Privacy.Robert C. Solomon - 1972 - Philosophy Today 16 (3):163-179.
    Robert Solomon's essay makes interesting reading against the background of the current efforts to find common ground between continental philosophersand the British and American philosophers. His article begins with a central point in analytic-linguistic philosophy. Soon it becomes a confrontation withphenomenology and eventually a confrontation of issues within phenomenology.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  7
    The Data Privacy Law of Brexit: Theories of Preference Change.Paul M. Schwartz - 2021 - Theoretical Inquiries in Law 22 (2):111-152.
    Upon Brexit, the United Kingdom chose to follow the path of EU data protection and remain tied to the requirements of the General Data Protection Regulation (GDPR). It even enacted the GDPR into its domestic law. This Article evaluates five models relating to preference change, demonstrating how they identify different dimensions of Brexit while providing a rich explanation of why a legal system may or may not reject an established transnational legal order. While market forces and a “Brussels Effect” played (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  92
    Slave to Facebook? How Technology is Changing the Balance Between Right to Privacy and Right to Know.Deborah L. Kidder & William P. Smith - 2011 - Proceedings of the International Association for Business and Society 22:52-61.
    Have social media sites like Facebook become such a significant part of our social fabric that people face negative consequences for not joining and sharing? What role does a right to privacy play in circumstances where self-disclosure is the norm? We surveyed students about teammate preferences for team members based on information availability and Facebook membership. Students report a strong preference for teammates for whom there is information and Facebook participation.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  14
    Competing Ethical Interests Regarding Privacy and Accountability in Psychotherapy.Shaun N. Halovic - 2019 - Journal of Bioethical Inquiry 16 (3):469-471.
    “Jane” is a mother of two, who was referred for psychotherapy. However, Jane had misgivings about engaging in the offered psychotherapy because of threats made by her domestically violent partner. The therapy sessions are audio recorded for the purpose of professional supervision and clinician reflective practices. Jane’s partner had threatened to subpoena the therapy recordings to legally separate Jane from her children. This article focuses on how three different parts of Jane’s multidisciplinary care exhibit different competing ethical priorities. Psychotherapeutic clinicians (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  4
    There Is No Ethical Automation: Stanislav Petrov’s Ordeal by Protocol.Technology Antón Barba-Kay A. Center on Privacy, Usab Institute for Practical Ethics Dc, Usaantón Barba-Kay is Distinguished Fellow at the Center on Privacy Ca, Hegel-Studien Nineteenth Century European Philosophy Have Appeared in the Journal of the History of Philosophy, Among Others He has Also Published Essays About Culture The Review of Metaphysics, Commonweal Technology for A. Broader Audience in the New Republic & Other Magazines A. Web of Our Own Making – His Book About What the Internet Is The Point - 2024 - Journal of Military Ethics 23 (3):277-288.
    While the story of Stanislav Petrov – the Soviet Lieutenant Colonel who likely saved the world from nuclear holocaust in 1983 – is often trotted out to advocate for the view that human beings ought to be kept “in the loop” of automated weapons’ responses, I argue that the episode in fact belies this reading. By attending more closely to the features of this event – to Petrov’s professional background, to his familiarity with the warning system, and to his decisions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  70
    Open Sourcing Normative Assumptions on Privacy and Other Moral Values in Blockchain Applications.Georgy Ishmaev - 2019 - Dissertation, Delft University of Technology
    The moral significance of blockchain technologies is a highly debated and polarised topic, ranging from accusations that cryptocurrencies are tools serving only nefarious purposes such as cybercrime and money laundering, to the assessment of blockchain technology as an enabler for revolutionary positive social transformations of all kinds. Such technological determinism, however, hardly provides insights of sufficient depth on the moral significance of blockchain technology. This thesis argues rather, that very much like the cryptographic tools before them, blockchains develop in a (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  58
    Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Towards a new privacy : informed consent as an encumbrance to group interests?Mark Taylor & David Townend - 2022 - In G. T. Laurie, E. S. Dove & Niamh Nic Shuibhne (eds.), Law and legacy in medical jurisprudence: essays in honour of Graeme Laurie. New York, NY: Cambridge University Press.
     
    Export citation  
     
    Bookmark  
  22.  39
    Rethinking the concept of the right to information privacy: a Japanese perspective.Kiyoshi Murata & Yohko Orito - 2008 - Journal of Information, Communication and Ethics in Society 6 (3):233-245.
    PurposeThe purpose of this paper is to reconsider the concept of the right to information privacy and to propose, from a Japanese perspective, a revised conception of this right that is suitable for the modern information society.Design/methodology/approachFirst, the concept of privacy and personal information protection in the information society is briefly explained. After that, confused situations in Japan caused by the enforcement of Act on the Protection of Personal Information are described followed by the analysis of the Japanese socio‐cultural circumstances (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  24
    Recent Amendments to the Australian Privacy Act.Minna Paltiel - 2023 - Journal of Bioethical Inquiry 20 (2):161-167.
    The recently passed Privacy Legislation Amendment (Enforcement and Other Measures) Act 2022 (Cth) introduced important changes to the Australian Privacy Act 1988 (Cth) which increase penalties for serious and repeated interferences with privacy and strengthen the investigative and enforcement powers of the Information Commissioner. The amendments were made subsequent to a number of high profile data breaches and represent the first set of changes to the Privacy Act following the review of the Act commenced by the Attorney-General in October 2020. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24. Legal conventionalism in the U.s. Constitutional law of privacy*: Mark Tushnet.Mark Tushnet - 2000 - Social Philosophy and Policy 17 (2):141-164.
    Drawing on themes important in moral and political philosophy, much of the scholarship on the constitutional law of privacy in the United States distinguishes between privacy understood as a person's control over information and privacy understood as a person's ability to make autonomous decisions. For example, Katz v. United States established the framework for analyzing whether police activity constituted a “search” subject to the Fourth Amendment's requirement that the police either obtain a warrant before conducting a search or otherwise act (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  25.  34
    The dark side of GAFAM: Monopolization of data and loss of privacy.Carlos Saura García - 2022 - Veritas: Revista de Filosofía y Teología 52:9–27.
    Resumen: El rápido avance de la digitalización y la hiperconectividad de las sociedades modernas en los últimos años ha dado lugar a la dataficación de la vida de las personas y a la revolución del big data. Estos dos fenómenos presentan un gran potencial que puede originar múltiples beneficios en multitud de aspectos de la vida de los ciudadanos, pero también hay que tener en cuenta las implicaciones y los peligros de estos. Este artículo se centra en los peligros provocados (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  37
    Blurring the line between publicity and privacy on social media and the privacy paradox.L. V. Chesnokova - forthcoming - Philosophical Problems of IT and Cyberspace.
    The article examines the situation associated with the spread of social networks, which brought not only new communication opportunities, but also the risks of blurring the boundaries between privacy and publicity. People voluntarily share personal data in exchange for public acceptance. This information is recorded and studied by various government and commercial institutions. The danger to information privacy as a right to control access to personal information is aggravated by the peculiarities of online communication, which is characterized by “context collapse”: (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  19
    Whose Mental Data? Privacy Inequities and Extended Minds.C. Dalrymple-Fraser - 2023 - American Journal of Bioethics Neuroscience 14 (2):104-106.
    People crossing the border into the United States or Canada may find their electronic devices subject to search. Border agents can require travelers to unlock their devices, and then browse through...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  17
    Interpretation of the Right to Privacy from the Perspective of the Use of New Technologies.Justyna E. Kulikowska-Kulesza - 2020 - Studies in Logic, Grammar and Rhetoric 65 (1):93-102.
    Today’s reality, largely based on the development of technology, carries with it many dangers for various spheres of our lives. One of the areas most at risk is our privacyand thus our right to privacy. It is one of the fundamental human rights, but unfortunately today it is exposed to many violations. This article is an attempt to interpret the right to privacy, and it shows selected threats to this right from the perspective of the development of new technologies.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  16
    Ethical aspects in eHealth – design of a privacy-friendly system.Milica Milutinovic & Bart De Decker - 2016 - Journal of Information, Communication and Ethics in Society 14 (1):49-69.
    Purpose– The medical advances and historical fluctuations in the demographics are contributing to the rise of the average age. These changes are increasing the pressure to organize adequate care to a growing number of individuals. As a way to provide efficient and cost-effective care, eHealth systems are gaining importance. However, this trend is creating new ethical concerns. Major issues are privacy and patients’ control over their data. To deploy these systems on a large scale, they need to offer strict privacy (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  51
    The limits of privacy, Amitai Etzioni, new York, basic books, 1999.Dag Elgesem - 2000 - Ethics and Information Technology 2 (3):189-191.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31. The Classical Liberal Case for Privacy in a World of Surveillance and Technological Change.Chris Berg - 2018 - Cham, Switzerland: Palgrave Macmillan.
    How should a free society protect privacy? Dramatic changes in national security law and surveillance, as well as technological changes from social media to smart cities mean that our ideas about privacy and its protection are being challenged like never before. In this interdisciplinary book, Chris Berg explores what classical liberal approaches to privacy can bring to current debates about surveillance, encryption and new financial technologies. Ultimately, he argues that the principles of classical liberalism the rule of law, individual rights, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  47
    “It's not like they're selling your data to dangerous people”: Internet privacy, teens, and (non-)controversial public issues.Margaret S. Crocco, Avner Segall, Anne-Lise Halvorsen, Alexandra Stamm & Rebecca Jacobsen - 2020 - Journal of Social Studies Research 44 (1):21-33.
    This study examines high school students’ responses to a public policy discussion on the topic of Internet privacy. Specifically, students discussed the question of whether search engines and social media sites should be permitted to monitor, track, and share users’ personal data or whether such practices violate personal privacy. We observed discussions of the topic in four high school classrooms in 2015–2016, prior to the presidential election in 2016. We first explain why the topic failed to work as a controversial (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  25
    Predicting the Consequences of Perceived Data Privacy Risks on Consumer Behaviour: An Entropy-TOPSIS Approach.Gloria Amaka Olayemi & Sulaimon Olanrewaju Adebiyi - 2022 - Studia Humana 11 (2):25-48.
    Advancement in internet of things and proliferation in the use of smart devices have raised concerns about the data privacy of online users. This study predicts the consequences of perceived data privacy risks on consumer behaviours in Lagos State, Nigeria using the integrated Entropy-Technique for Order Preference by Similarity to Ideal Solution. We employed Entropy to assign weights to each criterion. Subsequently, responses were systematically ranked to arrive at an inference using TOPSIS. 84.8% agree that any perceived cyber security threat (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34.  15
    KPDR : An Effective Method of Privacy Protection.Zihao Shen, Wei Zhen, Pengfei Li, Hui Wang, Kun Liu & Peiqian Liu - 2021 - Complexity 2021:1-10.
    To solve the problem of user privacy disclosure caused by attacks on anonymous areas in spatial generalization privacy protection methods, a K and P Dirichlet Retrieval method based on k-anonymity mechanism is proposed. First, the Dirichlet graph model is introduced, the same kind of information points is analyzed by using the characteristics of Dirichlet graph, and the anonymous set of users is generated and sent to LBS server. Second, the relationship matrix is generated, and the proximity relationship between the user (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  9
    Fixing Broken Doors: Strategies for Drafting Privacy Policies Young People Can Understand.Valerie Steeves, Jacquelyn Burkell & Anca Micheti - 2010 - Bulletin of Science, Technology and Society 30 (2):130-143.
    The goal of this project is to identify guidelines for privacy policies that children and teens can accurately interpret with relative ease. A three-pronged strategy was used to achieve this goal. First, an analysis of the relevant literature on reading was undertaken to identify the document features that affect comprehension. Second, focus groups were conducted to examine their experience and practices in the interpretation of privacy policies found on sites that have been identified as favorite kids’ sites. Based on the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  26
    Justifying Gain-Based Remedies for Invasions of Privacy.Normann Witzleb - 2009 - Oxford Journal of Legal Studies 29 (2):325-363.
    In Campbell v MGN Ltd [2004] UKHL 22, [2004] 2 AC 457 the House of Lords approved of protecting privacy interests through incrementally developing the existing action for breach of confidence. Lord Hoffmann suggested that this modified cause of action, instead of being based upon the duty of good faith, focuses upon the protection of human autonomy and dignity. This article explores how this change in underlying values affects the availability of gain-based remedies, where breach of confidence is relied upon (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  37.  11
    Research in the Biotech Age: Can Informational Privacy Compete?Wilhelm Peekhaus - 2008 - Bulletin of Science, Technology and Society 28 (1):48-59.
    This article examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government's broader neoliberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational privacy and the need for medical information for research purposes. Consideration is given to the debate about whether privacy for medical information serves or hinders the “public good” in respect of medical (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  4
    Effect of digital storytelling-case studies patient privacy: A randomized controlled study.Gulcan Eyuboglu & Zehra Gocmen Baykara - 2025 - Nursing Ethics 32 (1):170-185.
    Background It is essential to develop future nurses’ privacy consciousness and attitudes toward patient privacy to recognise threats to patient privacy and take the necessary precautions. Objectives To determine the effect of digital storytelling and case studies teaching methods on nursing students’ privacy consciousness and attitudes toward patient privacy. Research design Pretest-posttest, factorial group randomised controlled study. Participants and research context Eligible 113 nursing students were randomised to the intervention I ( n = 38), intervention II ( n = 38), (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  24
    Book review: Modern Privacy: Shifting Boundaries, New Forms. [REVIEW]Mark Scillio - 2014 - Thesis Eleven 124 (1):135-139.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40.  55
    The privacy of the psychical.Amihud Gilead - 2011 - Amsterdam: Rodopi.
    This book argues that the irreducible singularity of each person as a psychical subject implies the privacy of the psychical and that of experience, and yet the private accessibility of each person to his or her mind is compatible with interpersonal communication and understanding. The book treats these major issues against the background of the author's original metaphysics--panenmentalism."--Publisher's website.
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  41.  11
    Privacy, due process and the computational turn.Mireille Hildebrandt & Katja de Vries (eds.) - 2013 - Abingdon, Oxon, [England] ; New York: Routledge.
    Privacy, Due process and the Computational Turn: The Philosophy of Law Meets the Philosophy of Technology engages with the rapidly developing computational aspects of our world including data mining, behavioural advertising, iGovernment, profiling for intelligence, customer relationship management, smart search engines, personalized news feeds, and so on in order to consider their implications for the assumptions on which our legal framework has been built. The contributions to this volume focus on the issue of privacy, which is often equated with data (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  42. Privacy and social interaction.Beate Roessler & Dorota Mokrosinska - 2013 - Philosophy and Social Criticism 39 (8):771-791.
    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an argument demonstrating that privacy is an integral element of the dynamics of all social relationships. This latter claim is developed in terms of the social role theory and substantiated by an analysis of the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  43. Privacy Rights and Democracy: A Contradiction in Terms?Annabelle Lever - 2006 - Contemporary Political Theory 5 (2):142-162.
    This article argues that people have legitimate interests in privacy that deserve legal protection on democratic principles. It describes the right to privacy as a bundle of rights of personal choice, association and expression and shows that, so described, people have legitimate political interests in privacy. These interests reflect the ways that privacy rights can supplement the protection for people's freedom and equality provided by rights of political choice, association and expression, and can help to make sure that these are, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  44.  86
    Privacy and Positive Intellectual Freedom.Alan Rubel - 2014 - Journal of Social Philosophy 45 (3):390-407.
    Privacy is often linked to freedom. Protection against unreasonable searches and seizures is a hallmark of a free society, and pervasive state‐sponsored surveillance is generally considered to correlate closely with authoritarianism. One link between privacy and freedom is prominent in the library and information studies field and has recently been receiving attention in legal and philosophical scholarship. Specifically, scholars and professionals argue that privacy is an essential component of intellectual freedom. However, the nature of intellectual freedom and its link to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  45.  70
    Privacy and Health Practices in the Digital Age.Monique Pyrrho, Leonardo Cambraia & Viviane Ferreira de Vasconcelos - 2022 - American Journal of Bioethics 22 (7):50-59.
    Increasing privacy concerns are arising from expanding use of aggregated personal information in health practices. Conversely, in light of the promising benefits of data driven healthcare, privacy...
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  46.  52
    Patients’ Privacy of the Person and Human Rights.Jay Woogara - 2005 - Nursing Ethics 12 (3):273-287.
    The UK Government published various circulars to indicate the importance of respecting the privacy and dignity of NHS patients following the implementation of the Human Rights Act, 1998. This research used an ethnographic method to determine the extent to which health professionals had in fact upheld the philosophy of these documents. Fieldwork using nonparticipant observation, and unstructured and semistructured interviews with patients and staff, took place over six months in three acute care wards in a large district NHS trust hospital. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  47.  60
    Privacy and Confidentiality Issues in Primary Care: views of advanced practice nurses and their patients.Terry Deshefy-Longhi, Jane Karpe Dixon, Douglas Olsen & Margaret Grey - 2004 - Nursing Ethics 11 (4):378-393.
    Various aspects of the concepts of privacy and confidentiality are discussed in relation to health care information in primary health care settings. In addition, findings are presented from patient and nurse practitioner focus groups held to elicit concerns that these two groups have in relation to privacy and confidentiality in their respective primary care settings. The focus groups were held prior to the implementation of the Health Insurance Portability and Accessibility Act in the USA. Implications for advanced practice registered nurses (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  48.  61
    Layering privacy on operating systems, social networks, and other platforms by design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
    Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (3) the evolution of the PeCAN (Personal Context Agent Networking) architecture to a platform for pervasively providing multiple contexts for user privacy preferences and online informational privacy services, and (4) use (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49.  36
    Privacy, Security and Accountability: Ethics, Law and Policy.Adam D. Moore (ed.) - 2015 - New York: Rowman & Littlefield International.
    This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these important individual and social values.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  50.  41
    Patients' privacy and satisfaction in the emergency department: a descriptive analytical study.Nahid Dehghan Nayeri & Mohammad Aghajani - 2010 - Nursing Ethics 17 (2):167-177.
    Respecting privacy and patients’ satisfaction are amongst the main indicators of quality of care and one of the basic goals of health services. This study, carried out in 2007, aimed to investigate the extent to which patient privacy is observed and its correlation with patient satisfaction in three emergency departments of Tehran University of Medical Science, Iran. Questionnaire data were collected from a convenience sample of 360 patients admitted to emergency departments and analysed using SPSS software. The results indicated that, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
1 — 50 / 982