Results for 'Technologies vis-a-vis privacy'

986 found
Order:
  1. Technology and Privacy.Edmund Byrne - 1991 - In Byrne Edmund (ed.), The Technology of Discovery and the Discovery of Technology. Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  4
    There Is No Ethical Automation: Stanislav Petrov’s Ordeal by Protocol.Technology Antón Barba-Kay A. Center on Privacy, Usab Institute for Practical Ethics Dc, Usaantón Barba-Kay is Distinguished Fellow at the Center on Privacy Ca, Hegel-Studien Nineteenth Century European Philosophy Have Appeared in the Journal of the History of Philosophy, Among Others He has Also Published Essays About Culture The Review of Metaphysics, Commonweal Technology for A. Broader Audience in the New Republic & Other Magazines A. Web of Our Own Making – His Book About What the Internet Is The Point - 2024 - Journal of Military Ethics 23 (3):277-288.
    While the story of Stanislav Petrov – the Soviet Lieutenant Colonel who likely saved the world from nuclear holocaust in 1983 – is often trotted out to advocate for the view that human beings ought to be kept “in the loop” of automated weapons’ responses, I argue that the episode in fact belies this reading. By attending more closely to the features of this event – to Petrov’s professional background, to his familiarity with the warning system, and to his decisions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  61
    Digital whiplash: The case of digital surveillance.Katherine Dormandy - 2019 - Human Affairs 30 (4):559-569.
    Digital technology is rapidly transforming human life. But our cognition is honed for an analog world. I call this the problem of digital whiplash: that the digital transformation of society, like a vehicle whose sudden acceleration injures its occupants, is too fast to be safe. I focus on the unprecedented phenomenon of digital surveillance, which I argue poses a long-term threat to human autonomy that our cognition is ill-suited to recognize or respond to. Human cognition is embodied and context-sensitive, and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  87
    Securing privacy at work: The importance of contextualized consent. [REVIEW]Elin Palm - 2009 - Ethics and Information Technology 11 (4):233-241.
    The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  5. KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  6.  7
    “Business as usual”? Safe-by-Design Vis-à-Vis Proclaimed Safety Cultures in Technology Development for the Bioeconomy.Amalia Kallergi & Lotte Asveld - 2024 - Science and Engineering Ethics 30 (6):1-17.
    Safe-by-Design (SbD) is a new concept that urges the developers of novel technologies to integrate safety early on in their design process. A SbD approach could—in theory—support the development of safer products and assist a responsible transition to the bioeconomy, via the deployment of safer bio-based and biotechnological alternatives. Despite its prominence in policy discourse, SbD is yet to gain traction in research and innovation practice. In this paper, we examine a frequently stated objection to the initiative of SbD, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  40
    “I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good.Zbigniew Kwecka, William Buchanan, Burkhard Schafer & Judith Rauhofer - 2014 - Artificial Intelligence and Law 22 (2):113-139.
    The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This idea finds its correspondence in our approach to privacy protection through obfuscation, where everybody in a group takes a small privacy risk to protect the anonymity of fellow group members. We show how these ideas can be computationally realised in an Investigative Data Acquisition Platform. IDAP is an efficient symmetric Private Information (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  8
    Tecnologías para internacionalizar el aprendizaje.Miguel Álvarez Gómez, González Romero & Víctor Manuel (eds.) - 2005 - Puerto Vallarta, Jalisco, México: Universidad de Guadalajara, Centro Universitario de la Costa.
  9.  99
    Recombinant identities: Biometrics and narrative bioethics.Btihaj Ajana - 2010 - Journal of Bioethical Inquiry 7 (2):237-258.
    In recent years, there has been a growing interest in finding stronger means of securitising identity against the various risks presented by the mobile globalised world. Biometric technology has featured quite prominently on the policy and security agenda of many countries. It is being promoted as the solution du jour for protecting and managing the uniqueness of identity in order to combat identity theft and fraud, crime and terrorism, illegal work and employment, and to efficiently govern various domains and services (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  10. Privacy-enhancing technologies as a panacea for online privacy concerns. Some ethical considerations.Herman Tavani - 2000 - Journal of Information Ethics 9 (2):26-36.
     
    Export citation  
     
    Bookmark   2 citations  
  11.  89
    Remote home health care technologies: how to ensure privacy? Build it in: Privacy by Design.Ann Cavoukian, Angus Fisher, Scott Killen & David A. Hoffman - 2010 - Identity in the Information Society 3 (2):363-378.
    Current advances in connectivity, sensor technology, computing power and the development of complex algorithms for processing health-related data are paving the way for the delivery of innovative long-term health care services in the future. Such technological developments will, in particular, assist the elderly and infirm to live independently, at home, for much longer periods. The home is, in fact, becoming a locus for health care innovation that may in the future compete with the hospital. However, along with these advances come (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  12.  15
    Proper Education of the Gifted and the Talented: A Panacea for Technological Advancement Vis-A-Vis Sustainable Development: Counsellors' Perspective.E. K. Ethothi, D. O. Effion & I. K. Bassey - 2007 - Sophia: An African Journal of Philosophy 9 (1).
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13. Vermaas A Nano technology and Privacy: On Continuous Surveillance outside the Pan—opticon [J/OL].[2007 一 O1 一 May].A. Jeroen van den Hoven & E. Pieter - 2007 - Journal of Medicine and Philosophy 32 (3):283-297.
     
    Export citation  
     
    Bookmark  
  14.  33
    In Defense of ‘Surveillance Capitalism’.Peter Königs - 2024 - Philosophy and Technology 37 (4):1-33.
    Critics of Big Tech often describe ‘surveillance capitalism’ in grim terms, blaming it for all kinds of political and social ills. This article counters this pessimistic narrative, offering a more favorable take on companies like Google, YouTube, and Twitter/X. It argues that the downsides of surveillance capitalism are overstated, while the benefits are largely overlooked. Specifically, the article examines six critical areas: i) targeted advertising, ii) the influence of surveillance capitalism on politics, iii) its impact on mental health, iv) its (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  97
    Privacy and Social Networking Technology.Richard A. Spinello - 2011 - International Review of Information Ethics 16:12.
    This paper reviews Facebook's controversial privacy policies as a basis for considering how social network sites can better protect the personal information of their users. We argue that Facebook's architecture leaves its users too exposed, especially to online surveillance. This architecture must be modified and Facebook must be more proactive in safeguarding the rights of their customers as it seeks to find the proper balance between user privacy and its commercial interests.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  43
    Ethics and multinational corporations vis-à-vis developing nations.James R. Simpson - 1982 - Journal of Business Ethics 1 (3):227-237.
    The ethical dilemma of large-scale multinational corporations is presented. The list of complaints and issues is summarized. A case is made for the concept of multinationals being inherently beneficial in today's world of high technology and dependence on international trade. The difficulty is extreme power wielded by some groups. It is concluded that a philosophical ideal is for control on size and power as well as international rules to prevent abuses of power. The concern is that today the worthiness of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  17. Ethical rooms for maneuver and their prospects vis-à-vis the current ethical food policies in europe.Michiel Korthals - 2008 - Journal of Agricultural and Environmental Ethics 21 (3):249-273.
    In this paper I want to show that consumer concerns can be implemented in food chains by organizing ethical discussions of conflicting values that include them as participators. First, it is argued that there are several types of consumer concerns about food and agriculture that are multi-interpretable and often contradict each other or are at least difficult to reconcile without considerable loss. Second, these consumer concerns are inherently dynamic because they respond to difficult and complex societal and technological situations and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  18. Privacy Rights in the Information EconomyLegislating Privacy: Technology, Social Values and Public Policy.Richard A. Spinello & Priscilla Regan - 1998 - Business Ethics Quarterly 8 (4):723.
  19.  25
    “Obligatory Technologies”: Explaining Why People Feel Compelled to Use Certain Technologies.Jennifer A. Chandler - 2012 - Bulletin of Science, Technology and Society 32 (4):255-264.
    The ideas of technological determinism and the autonomy of technology are long-standing and widespread. This article explores why the use of certain technologies is perceived to be obligatory, thus fueling the fatalism of technological determinism and undermining our sense of freedom vis-à-vis the use of technologies. Three main mechanisms that might explain “obligatory technologies” (technologies that must be adopted) are explored. First, competition between individuals or groups drives the adoption of technologies that enhance or extend (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  89
    (1 other version)Wittgenstein and spengler vis-à-vis Frazer.Aydan Turanli - 2005 - Philosophy and Social Criticism 31 (1):69-88.
    Perspicuous representation, Wittgenstein offers, is not another methodology, but it consists in seeing the connections. The Wittgensteinian perspicuous representation is therapeutic. The method he suggests for philosophy is the same method he suggests for social sciences. In both of these cases, he tries to get us to see the confusions we become entangled in when philosophizing and theorizing. In both of these disciplines he warns us not to advance explanatory, metaphysical theories. In this paper, I connect this concern with Wittgenstein’s (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  21. Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  22. Book Reviews : Reproductive Technology: Towards a Theology of Procreative Stewardship, by Brent Waters. Trowbridge, Wiltshire: Darton, Longman & Todd, 2001. vi + 148 pp. pb. 8.95. [REVIEW]Agneta Sutton - 2002 - Studies in Christian Ethics 15 (1):143-147.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  14
    Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.Colin J. Bennett - 1991 - Science, Technology and Human Values 16 (1):51-69.
    Public policies designed to regulate the use of information technology to protect personal data have been based on different theoretical assumptions in different states, depending on whether the problem is defined in technological, civil libertarian, or bureaucratic terms. However, the rapid development, dispersal, and decentralization of information technology have facilitated a range of new surveillance practices that have in turn rendered the approaches of the 1960s and 1970s obsolete. The networking of the postindustrial state will require a reconceptualization of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  24.  12
    Investigating the Ontology of AI vis-à-vis Technical Artefacts.Ashwin Jayanti - 2024 - In Sangeetha Menon, Saurabh Todariya & Tilak Agerwala (eds.), AI, Consciousness and The New Humanism: Fundamental Reflections on Minds and Machines. Springer Nature Singapore. pp. 319-330.
    Artificial intelligence is the new technological buzzword. Everything from camera apps on your mobile phone to medical diagnosis algorithms to expert systems are now claiming to be ‘AI’, and many more facets of our lives are being colonized by the application of AI/ML systems (henceforth, ‘AI’). But what does this entail to designers, users and to society at large? Most of the philosophical discourse in this context has focused on the analysis and clarification of the epistemological claims of intelligence within (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  14
    Epistemic Inquiry into in Vitro Fertilization (IVF) vis-à-vis Thomas Aquinas’ Natural Law Theory: Comparative Analysis.Raphael Olisa Maduabuchi, Vincent Azubuike Obidinnu & Innocent Anthony Uke - 2023 - Open Journal of Philosophy 13 (4):764-774.
    This work sought to carry out a comparative analysis of in vitro fertilization (IVF) vis-à-vis St. Thomas Aquinas’ Natural Law Theory. Both of them emanated from problem of infertility. IVF makes use of artificial insemination for fertilization which is quite contrary to the natural process of sexual reproduction. This work makes use of analytic method to analyse comparatively in vitro fertilization and St. Thomas Aquinas’ Natural Law Theory. Thus, this work conceives that IVF is one of the assisted reproductive (...) in the scientific exploration of genetic engineering and bio-technology which emanated to tackle the problem of genetic inheritance outside marriage. It contravenes the coital or natural reproduction which conforms to St. Thomas Aquinas’ second precept of natural law. Again, IVF is artificial as such it is pruned to many complications. There is no adequate information given by the medical practitioners or providers of this service on the health hazards or risks involve in IVF. In addition, in vitro fertilization makes provision for donor gamete and surrogate motherhood which may have many negative implications both for the couples, off-spring, gestation mother, and society at large. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  27
    A Modest Art: Securing Privacy in Technologically Mediated Homecare.Ike Kamphof - 2017 - Foundations of Science 22 (2):411-419.
    This article addresses the art of living in a technological culture as the active engagement with technomoral change. It argues that this engagement does not just take the form of overt deliberation. It shows in more modest ways as reflection-in-action, an experimental process in which new technology is fitted into existing practices. In this process challenged values are re-articulated in pragmatic solutions to the problem of working with new technology. This art of working with technology is also modest in the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  27.  77
    Ownership, Privacy and Monitoring in the Workplace: A Debate on Technology and Ethics.Karen D. Loch, Sue Conger & Effy Oz - 1998 - Journal of Business Ethics 17 (6):653-663.
    A panel held at the International Conference on Information Systems, December 5–7, 1993, addressed the importance and ethicality of several issues relating to ethics and information technology use. The substance of the debate and results of audience votes on the issues are presented in this paper as a means of initiating a broader debate on the issues, for it is with debate that we reach a group consensus on acceptable behavior and practice. With consensus, we can begin to develop codes (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  28.  66
    Perceived Access to Self-relevant Information Mediates Judgments of Privacy Violations in Neuromonitoring and Other Monitoring Technologies.D. A. Baker, N. J. Schweitzer & Evan F. Risko - 2013 - Neuroethics 7 (1):43-50.
    Advances in technology are bringing greater insight into the mind, raising a host of privacy concerns. However, the basic psychological mechanisms underlying the perception of privacy violations are poorly understood. Here, we explore the relation between the perception of privacy violations and access to information related to one’s “self.” In two studies using demographically diverse samples, we find that privacy violations resulting from various monitoring technologies are mediated by the extent to which the monitoring is (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  29. Privatization, information technology and privacy: reconsidering the social responsibilities of private organizations.A. H. Vedder - forthcoming - Business Ethics: Principles and Practice.
     
    Export citation  
     
    Bookmark   2 citations  
  30.  89
    Surveillance, privacy and the ethics of vehicle safety communication technologies.M. Zimmer - 2005 - Ethics and Information Technology 7 (4):201-210.
    Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  31.  47
    Privacy in the Family.Bryce Clayton Newell, Cheryl A. Metoyer & Adam Moore - 2015 - In Beate Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 104-121.
    While the balance between individual privacy and government monitoring or corporate surveillance has been a frequent topic across numerous disciplines, the issue of privacy within the family has been largely ignored in recent privacy debates. Yet privacy intrusions between parents and children or between adult partners or spouses can be just as profound as those found in the more “public spheres” of life. Popular access to increasingly sophisticated forms of electronic surveillance technologies has altered the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  32. Orwell versus Huxley: Economics, technology, privacy, and satire.Richard A. Posner - 2000 - Philosophy and Literature 24 (1):1-33.
    Orwell's novel Nineteen Eighty-Four and Huxley's novel Brave New World have often been thought prophetic commentaries on economic, political, and social matters. I argue, with particular reference to the supposed applicability of these novels to issues of technology and privacy, that the novels are best understood as literary works of art, rather than as social science or commentary, and that when so viewed Orwell's novel in particular reflects a dissatisfaction with everyday life and a nostalgia for Romantic values.
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33.  32
    Biobanks, Data Sharing, and the Drive for a Global Privacy Governance Framework.Edward S. Dove - 2015 - Journal of Law, Medicine and Ethics 43 (4):675-689.
    Spurred by a confluence of factors, most notably the decreasing cost of high-throughput technologies and advances in information technologies, a number of population research initiatives have emerged in recent years. These include large-scale, internationally collaborative genomic projects and biobanks, the latter of which can be defined as an organized collection of human biological material and associated data stored for one or more research purposes. Biobanks are a key emerging research infrastructure, and those established as prospective research resources comprising (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  34. Protecting privacy in public? Surveillance technologies and the value of public places.Jason W. Patton - 2000 - Ethics and Information Technology 2 (3):181-187.
    While maintaining the importance of privacy for critical evaluations of surveillance technologies, I suggest that privacy also constrains the debate by framing analyses in terms of the individual. Public space provides a site for considering what is at stake with surveillance technologies besides privacy. After describing two accounts of privacy and one of public space, I argue that surveillance technologies simultaneously add an ambiguityand a specificity to public places that are detrimental to the (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  35.  14
    John Smeaton and the vis viva controversy: Measuring waterwheel efficiency and the influence of industry on practical mechanics in Britain 1759–1808.Andrew M. A. Morris - 2018 - History of Science 56 (2):196-223.
    In this paper, I will examine John Smeaton’s contribution to the vis viva controversy in Britain, focusing on how the hybridization of science, technology, and industry helped to establish vis viva, or mechanic power, as a measure of motive force. Smeaton, embodying the ‘hybrid expert’ who combined theoretical knowledge and practical knowhow, demonstrated that the notion of vis viva possessed a greater explanatory power than momentum, because it could be used to explain the difference in efficiency between overshot and undershot (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  36
    Group Privacy: New Challenges of Data Technologies.Luciano Floridi, Linnet Taylor & Bart van der Sloot (eds.) - 2017 - Cham: Imprint: Springer.
    The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the different approaches and methods that can be used to address them. In doing so, it will help the reader to gain a better grasp of the ethical and legal conundrums posed by group profiling. The volume first maps (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   11 citations  
  37.  56
    HIPAA Privacy Rule 2.0.Mark A. Rothstein - 2013 - Journal of Law, Medicine and Ethics 41 (2):525-528.
    On January 25, 2013, theFederal Registerpublished the Department of Health and Human Services omnibus amendments to the Health Insurance Portability and Accountability Act Privacy, Security, Enforcement, and Breach Notification Rules. These modifications also include the final versions of the HIPAA regulation amendments mandated by the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act. Although the amended rules were effective on March 26, 2013, covered entities and their business associates have a compliance date (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38. Information Privacy for Technology Users With Intellectual and Developmental Disabilities: Why Does It Matter?Maxine Perrin, Rawad Mcheimech, Johanna Lake, Yves Lachapelle, Jeffrey W. Jutai, Amélie Gauthier-Beaupré, Crislee Dignard, Virginie Cobigo & Hajer Chalghoumi - 2019 - Ethics and Behavior 29 (3):201-217.
    This article aims to explore the attitudes and behaviors of persons with intellectual and developmental disabilities (IDD) related to their information privacy when using information technology (IT). Six persons with IDD were recruited to participate to a series of 3 semistructured focus groups. Data were analyzed following a hybrid thematic analysis approach. Only 2 participants reported using IT every day. However, they all perceived IT use benefits, such as an increased autonomy. Participants demonstrated awareness of privacy concerns, but (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  39.  8
    Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones.Jennifer Parisi & Gordon A. Gow - 2008 - Bulletin of Science, Technology and Society 28 (1):60-68.
    In recent years there has been concern among law enforcement and national security organizations about the use of “anonymous” prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates oppose such regulatory measures, arguing that there is little practical value in attempting to register prepaid mobile devices, and the issue raises important questions about a citizen's entitlement to anonymity (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  39
    Privacy and Health Information Technology.Deven McGraw - 2009 - Journal of Law, Medicine and Ethics 37 (s2):121-149.
    In discussions of health reform, the increased use of health information technology is a common element of nearly every serious proposal on the table. Health IT includes electronic health records kept by providers, personal health records offered by health insurance plans or owned by consumers, and electronic health information exchanges. Although health reform initiatives being discussed contain little detail regarding health IT, in general they promote health IT to facilitate the electronic sharing of health information to improve individual and population (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  31
    California Takes the Lead on Data Privacy Law.Mark A. Rothstein & Stacey A. Tovino - 2019 - Hastings Center Report 49 (5):4-5.
    In the early 1970s, Congress considered enacting comprehensive privacy legislation, but it was unable to do so. In 1974, it passed the Privacy Act, applicable only to information in the possession of the federal government. In the intervening years, other information privacy laws enacted by Congress, such as the Health Insurance Portability and Accountability Act, have been weak and sector specific. With the explosion of information technology and the growing concerns about an absence of effective federal (...) laws, the legal focus has shifted to the states. Signaling a new direction in state data privacy and consumer protection law, the California Consumer Privacy Act establishes important rights and protections for California residents with regard to the collection, use, disclosure, and sale of their personal information. The CCPA is certain to spur similar legislation and to affect national and international businesses that collect data from California's residents. Understanding the new law is important for all data‐driven industries, including health care. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  42.  5
    Privacy and identity in a networked society: refining privacy impact assessment.Stefan Strauss - 2019 - New York: Routledge, Taylor & Francis Group.
    Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  49
    Nano-Technology and Privacy: On Continuous Surveillance Outside the Panopticon.Jeroen Den Hovevann & Pieter E. Vermaas - 2007 - Journal of Medicine and Philosophy 32 (3):283-297.
    We argue that nano-technology in the form of invisible tags, sensors, and Radio Frequency Identity Chips (RFIDs) will give rise to privacy issues that are in two ways different from the traditional privacy issues of the last decades. One, they will not exclusively revolve around the idea of centralization of surveillance and concentration of power, as the metaphor of the Panopticon suggests, but will be about constant observation at decentralized levels. Two, privacy concerns may not exclusively be (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  44.  43
    Contextualizing farmers' attitudes towards genetically modified crops.Kazumi Kondoh & Raymond A. Jussaume - 2006 - Agriculture and Human Values 23 (3):341-352.
    Analyses of the role of technological development in agriculture are central to an understanding of social change in agri-food systems. The objective of this paper is to contribute to the formation of a broader perspective of how farmers are positioning themselves with respect to controversial agricultural technologies through an empirical analysis of Washington State farmers’ willingness or unwillingness to try Genetically Modified Organisms (GMOs) technology on their farms. The use of this type of biotechnology in farming has been criticized (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  64
    From the bench to the bedside in the big data age: ethics and practices of consent and privacy for clinical genomics and personalized medicine.Peter A. Chow-White, Maggie MacAulay, Anita Charters & Paulina Chow - 2015 - Ethics and Information Technology 17 (3):189-200.
    Scientists and clinicians are starting to translate genomic discoveries from research labs to the clinical setting. In the process, big data genomic technologies are both a risk to individual privacy and a benefit to personalized medicine. There is an opportunity to address the social and ethical demands of various stakeholders and shape the adoption of diagnostic genome technologies. We discuss ethical and practical issues associated with the networking of genomics by comparing how the European Union and North (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46. Property, privacy and personhood in a world of ambient intelligence.Niels van Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  6
    A value-centered approach to data privacy decisions.Sarah E. Carter - 2024 - Dissertation, National University of Ireland, Galway
    There are a host of data privacy decisions we must make every day – and it is exceedingly difficult, if not impossible, for us to make meaningful decisions about all of them. In this thesis, I define, conceptualize, interrogate, and design for value-centered privacy decision making – that is, decisions that are focused on who we are and what we value – as a means of respecting and promoting user autonomy. To achieve this, this work utilizes philosophical theory (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  27
    The experiences of people with dementia and intellectual disabilities with surveillance technologies in residential care.Alistair R. Niemeijer, Marja F. I. A. Depla, Brenda J. M. Frederiks & Cees M. P. M. Hertogh - 2015 - Nursing Ethics 22 (3):307-320.
    Background: Surveillance technology such as tag and tracking systems and video surveillance could increase the freedom of movement and consequently autonomy of clients in long-term residential care settings, but is also perceived as an intrusion on autonomy including privacy. Objective: To explore how clients in residential care experience surveillance technology in order to assess how surveillance technology might influence autonomy. Setting: Two long-term residential care facilities: a nursing home for people with dementia and a care facility for people with (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  25
    Privacy's place: The role of civility and community in a technological culture.William Vitek - 1997 - Ethics and Behavior 7 (3):265 – 270.
    It is often claimed that if technology becomes too intrusive it can be reigned in by better technologies and laws that restrict access. This article argues through a series of propositions and observations why these standard solutions will invariably fall short, and why civility--and the placed communities out of which civility arises--is our best hope against technological assaults on privacy. The article ends with a brief discussion of what sorts of personal and professional commitments a civil culture entails.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  34
    Wanting it all – public perceptions of the effectiveness, cost, and privacy of surveillance technology.Michelle Cayford, Wolter Pieters & P. H. A. J. M. van Gelder - 2019 - Journal of Information, Communication and Ethics in Society 18 (1):10-27.
    Purpose This study aims to explore how the public perceives the effectiveness of surveillance technology, and how people’s views on privacy and their views on effectiveness are related. Likewise, it looks at the relation between perceptions of effectiveness and opinions on the acceptable cost of surveillance technology. Design/methodology/approach For this study, surveys of Dutch students and their parents were conducted over three consecutive years. Findings A key finding of this paper is that the public does not engage in a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 986