Results for 'informational privacy'

994 found
Order:
  1. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  2. Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  3. Information Privacy for Technology Users With Intellectual and Developmental Disabilities: Why Does It Matter?Maxine Perrin, Rawad Mcheimech, Johanna Lake, Yves Lachapelle, Jeffrey W. Jutai, Amélie Gauthier-Beaupré, Crislee Dignard, Virginie Cobigo & Hajer Chalghoumi - 2019 - Ethics and Behavior 29 (3):201-217.
    This article aims to explore the attitudes and behaviors of persons with intellectual and developmental disabilities (IDD) related to their information privacy when using information technology (IT). Six persons with IDD were recruited to participate to a series of 3 semistructured focus groups. Data were analyzed following a hybrid thematic analysis approach. Only 2 participants reported using IT every day. However, they all perceived IT use benefits, such as an increased autonomy. Participants demonstrated awareness of privacy concerns, but (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4. The moral value of informational privacy in cyberspace.Diane P. Michelfelder - 2001 - Ethics and Information Technology 3 (2):129-135.
    Solutions to the problem ofprotecting informational privacy in cyberspacetend to fall into one of three categories:technological solutions, self-regulatorysolutions, and legislative solutions. In thispaper, I suggest that the legal protection ofthe right to online privacy within the USshould be strengthened. Traditionally, inidentifying where support can be found in theUS Constitution for a right to informationalprivacy, the point of focus has been on theFourth Amendment; protection in this contextfinds its moral basis in personal liberty,personal dignity, self-esteem, and othervalues. On (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  5. Information, Privacy, and False Light.Pierre Le Morvan - 2018 - In Mark Navin & Ann Cudd (eds.), Core Concepts and Contemporary Issues in Privacy. Cham: Springer Verlag.
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  6. Informational privacy.Richard A. Spinello - 2010 - In George G. Brenkert & Tom L. Beauchamp (eds.), The Oxford handbook of business ethics. New York: Oxford University Press.
     
    Export citation  
     
    Bookmark   3 citations  
  7.  28
    Credibility and trust of information privacy at the workplace in Slovakia. The use of intuition.Frithiof Svenson, Eva Ballová Mikušková & Markus A. Launer - 2023 - Journal of Information, Communication and Ethics in Society 21 (3):302-321.
    Purpose Employees may feel overwhelmed with information privacy choices and have difficulties understanding what they are committing to in the digital workplace. This paper aims to analyze the role of different thinking styles for effort reduction, such as the use of intuition, when employees make decisions about the credibility and trustworthiness of workplace information privacy issues in Slovakia. While the General Data Protection Regulation sets precise requirements for valid consent, organizations are classified as data controllers and are subject (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  40
    Consumerism and information privacy: How Upton Sinclair can again save us from ourselves.Benjamin R. Sachs - unknown
    This Note will address the salience of a simple analogy: will privacy law be for the information age what consumer protection law was for the industrial age? At the height of industrialization, the United States market for consumer products faced instability caused by a lack of consumer competence, lack of disclosure about product defects, and advancements in technology that exacerbated the market's flaws. As this Note will show, these same causes of market failure are stirring in today's economy as (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  9. The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
    The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   58 citations  
  10. Unknowableness and Informational Privacy.David Matheson - 2007 - Journal of Philosophical Research 32:251-267.
    Despite their differences, the three most prominent accounts of informational privacy on the contemporary scene—the Control Theory, the Limited Access Theory, and the Narrow Ignorance Theory—all hold that an individual’s informational privacy is at least partly a function of a kind of inability of others to know personal facts about her. This common commitment, I argue, renders the accounts vulnerable to compelling counterexamples. I articulate a new account of informational privacy—the Broad Ignorance Theory—that avoids (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  11.  19
    Information privacy, the right to receive information and (mobile) ICTs.Litska Strikwerda - 2010 - Etikk I Praksis - Nordic Journal of Applied Ethics 2 (2):27-40.
    The first part of this paper is about the notion of privacy and its grounding in law. It discusses the tension between the right to privacy and the right to receive information. The second part of this paper explores how ICTs challenge and complicate privacy claims and satisfy the right to receive information.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  74
    Health Information Privacy and Public Health.James G. Hodge - 2003 - Journal of Law, Medicine and Ethics 31 (4):663-671.
    Protecting the privacy of individually-identifiable health data and promoting the public’s health often seem at odds. Privacy advocates consistently seek to limit the acquisition, use, and disclosure of identifiable health information in governmental and private sector settings. Their concerns relate to misuses or wrongful disclosures of sensitive health data that can lead to discrimination and stigmatization against individuals. Public health practitioners, on the other hand, seek regular, ongoing access to and use of identifiable health information to accomplish important (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  13.  73
    Informational privacy and moral values.Michael Scanlan - 2001 - Ethics and Information Technology 3 (1):3-12.
    A case from 1996 in Oregon in which citizens' legally publicmotor vehicle information was disseminated on a World Wide Website is considered. The case evoked widespread moral outrageamong Oregonians and led to changes in the Oregon records laws.The application of either consequentialist ornon-consequentialist moral theories to this and otherinformational privacy cases is found to be inadequate.Adjudication of conflicting desires is offered as the appropriateanalytical model for moral disputes. The notion of adjudicationoffered here diverges from traditional moral theories in itsindeterminate (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  14.  51
    Genetic Information, Privacy and Insolvency.Edward J. Janger - 2005 - Journal of Law, Medicine and Ethics 33 (1):79-88.
    Biobanks hold out the prospect of significant public and private benefit, as genetic information contained in tissue samples is mined for information. However, the storing of human tissue samples and genetic information for research and/or therapeutic purposes raises a number of serious privacy and autonomy concerns. These concerns are compounded when one considers the possibility that a biobank or its owner might go bankrupt. Insolvency impairs the ability of enforcement regimes, and liability-based regimes in particular, to enforce legal norms. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  15.  1
    Patient’s informational privacy in prehospital emergency care: Paramedics’ perspective.Eini Marianne Koskimies, Jaana Koskenniemi & Helena Leino-Kilpi - 2020 - Nursing Ethics 27 (1):53-66.
    Background: As a fundamental human right in healthcare, informational privacy creates the foundation for patient’s safety and the quality of care. However, its realization can be a challenge in prehospital emergency care, considering the nature of the work. Objectives: To describe patient’s informational privacy, its realization, and the factors related to the realization in prehospital emergency care from the perspective of paramedics. Research design: A descriptive questionnaire study was conducted. The data were analyzed with inductive content (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. Epistemological dimensions of informational privacy.Klemens Kappel - 2013 - Episteme 10 (2):179-192.
    It seems obvious that informational privacy has an epistemological component; privacy or lack of privacy concerns certain kinds of epistemic relations between a cogniser and sensitive pieces of information. One striking feature of the fairly substantial philosophical literature on informational privacy is that the nature of this epistemological component of privacy is only sparsely discussed. The main aim of this paper is to shed some light on the epistemological component of informational (...). (shrink)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  17. Informational privacy and its ontological interpretation.Luciano Floridi - 2006 - Acm Sigcas Computers and Society 36 (3):1.
    The article provides an outline of the ontological interpretation of informational privacy based on information ethics. It is part of a larger project of research, in which I have developed the foundations of ideas presented here and their consequences. As an outline, it is meant to be self-sufficient and to provide enough information to enable the reader to assess how the approach fares with respect to other alternatives. However, those interested in a more detailed analysis, and especially in (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  61
    Information privacy and performance appraisal: An examination of employee perceptions and reactions. [REVIEW]Kevin W. Mossholder, William F. Giles & Mark A. Wesolowski - 1991 - Journal of Business Ethics 10 (2):151 - 156.
    Role-failure acts (Waters and Bird, 1989) have been described as a form of morally questionable activity involving a failure to perform the managerial role. The present study examined employee perceptions and reactions with regard to one form of role-failure act, failure to maintain adequate privacy of performance appraisal information. The study assessed employees' attitudes toward various performance appraisal facets as an invasion of privacy and determined the relationships between these privacy-related attitudes and employees' satisfaction with components of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  19.  14
    The Impact of Health Information Privacy Concerns on Engagement and Payment Behaviors in Online Health Communities.Banggang Wu, Peng Luo, Mengqiao Li & Xiao Hu - 2022 - Frontiers in Psychology 13.
    Online health communities have enjoyed increasing popularity in recent years, especially in the context of the COVID-19 pandemic. However, several concerns have been raised regarding the privacy of users’ personal information in OHCs. Considering that OHCs are a type of data-sharing or data-driven platform, it is crucial to determine whether users’ health information privacy concerns influence their behaviors in OHCs. Thus, by conducting a survey, this study explores the impact of users’ health information privacy concerns on their (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  12
    Health Information Privacy: A Disappearing Concept.Marcia J. Weiss - 2000 - Bulletin of Science, Technology and Society 20 (2):115-122.
    Rapid advances and exponential growth in computer and telecommunications technology have taken individual records and papers revealing the most intimate details of one’s life, habits, and genetic predisposition from the private sector into the public arena in derogation of privacy considerations. Although computerized medical information offers a means of streamlining and improving the health care delivery system through speed and enormous storage capacity, it also presents new challenges as it affects the right of privacy and expectation of confidentiality, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  94
    Autonomy and informational privacy, or gossip: The central meaning of the first amendment.C. Edwin Baker - 2004 - Social Philosophy and Policy 21 (2):215-268.
    My thesis is simple. The right of informational privacy, the great modern achievement often attributed to the classic Samuel Warren and Louis Brandeis article, “The Right to Privacy” , asserts an individual's right not to have private personal information circulated. Warren and Brandeis claimed that individual dignity in a modern society requires that people be able to keep their private lives to themselves and proposed that the common law should be understood to protect this dignity by making (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22. The Japanese sense of information privacy.Andrew A. Adams, Kiyoshi Murata & Yohko Orito - 2009 - AI and Society 24 (4):327-341.
    We analyse the contention that privacy is an alien concept within Japanese society, put forward in various presentations of Japanese cultural norms at least as far back as Benedict in The chrysanthemum and the sword: patterns of Japanese culture. Houghton Mifflin, Boston, 1946. In this paper we distinguish between information privacy and physical privacy. As we show, there is good evidence for social norms of limits on the sharing and use of personal information (i.e. information privacy) (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  23.  59
    The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy.Meng-Hsiang Hsu & Feng-Yang Kuo - 2003 - Journal of Business Ethics 42 (4):305 - 320.
    In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  24. Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  25. When sexual and information privacy converge : the case of digital dick pics.Martha McCaughey & Jill Cermele - 2023 - In Mary L. Edwards & S. Orestis Palermos (eds.), Feminist philosophy and emerging technologies. New York, NY: Routledge.
     
    Export citation  
     
    Bookmark  
  26.  11
    Information, Privacy, and Just War Theory.Jack McDonald - 2020 - Ethics and International Affairs 34 (3):379-400.
    Are the sources of a combatant's knowledge in war morally relevant? This article argues that privacy is relevant to just war theory in that it draws attention to privacy harms associated with the conduct of war. Since we cannot assume that information is made available to combatants in a morally neutral manner, we must therefore interrogate the relationship between privacy harms and the acts that they enable in war. Here, I argue that there is ample evidence that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. Social pathologies of informational privacy.Wulf Loh - 2022 - Journal of Social Philosophy (3):541-561.
    Following the recent practice turn in privacy research, informational privacy is increasingly analyzed with regard to the “appropriate flow of information” within a given practice, which preserves the “contextual integrity” of that practice (Nissenbaum, 2010, p. 149; 2015). Such a practice-theoretical take on privacy emphasizes the normative structure of practices as well as its structural injustices and power asymmetries, rather than focusing on the intentions and moral considerations of individual or institutional actors. Since privacy norms (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  28. Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate (...) privacy from other kinds of privacy, including psychological privacy; and (ii) distinguish between descriptive and normative aspects of informational privacy in a way that differentiates a (mere) loss of privacy from a violation of privacy. I argue that Floridi’s privacy theory, in its present form, does not explicitly address either challenge. However, I also argue that his ontological theory provides us with a novel way of analyzing the impact that digital technologies have had for informational privacy. I conclude by suggesting that Floridi’s privacy framework can be interpreted as containing the elements of a “personality theory of privacy,” which would be useful to examine in a separate study. (shrink)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  29.  22
    A Process-based Approach to Informational Privacy and the Case of Big Medical Data.Michael Birnhack - 2019 - Theoretical Inquiries in Law 20 (1):257-290.
    Data protection law has a linear logic, in that it purports to trace the lifecycle of personal data from creation to collection, processing, transfer, and ultimately its demise, and to regulate each step so as to promote the data subject’s control thereof. Big data defies this linear logic, in that it decontextualizes data from its original environment and conducts an algorithmic nonlinear mix, match, and mine analysis. Applying data protection law to the processing of big data does not work well, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  30.  39
    Rethinking the concept of the right to information privacy: a Japanese perspective.Kiyoshi Murata & Yohko Orito - 2008 - Journal of Information, Communication and Ethics in Society 6 (3):233-245.
    PurposeThe purpose of this paper is to reconsider the concept of the right to information privacy and to propose, from a Japanese perspective, a revised conception of this right that is suitable for the modern information society.Design/methodology/approachFirst, the concept of privacy and personal information protection in the information society is briefly explained. After that, confused situations in Japan caused by the enforcement of Act on the Protection of Personal Information are described followed by the analysis of the Japanese (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  98
    Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145-160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  32.  39
    Separation, risk, and the necessity of privacy to well-being: A comment on Adam Moore's toward informational privacy rights.Kenneth Einar Himma - manuscript
    Moore attempts to show that privacy, conceived as "control over access to oneself and to information about oneself" is "necessary" for human well-being. Moore grounds his argument in an analysis of the need for physical separation, which Moore suggests is universal among animal species. Moore notes, "One basic finding of animal studies is that virtually all animals seek periods of individual seclusion or small-group intimacy." Citing several studies involving rats and other animals, Moore points out that a lack of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  41
    An ethical duty to protect one's own information privacy?Anita L. Allen - 2013 - Alabama Law Review 64 (4):845-866.
    People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  34.  54
    Challenging Themes in American Health Information Privacy and the Public’s Health: Historical and Modern Assessments.James G. Hodge & Kieran G. Gostin - 2004 - Journal of Law, Medicine and Ethics 32 (4):670-679.
    Protecting the privacy of individually-identifiable health data is a dominant health policy objective in the new millennium. Technological, economic, and health-related reasons substantiate the development of a national electronic health information infrastructure. Through this emerging infrastructure, billions of pieces of health data of varying sensitivities are exchanged annually to provide health care services and service transactions, conduct health research, and promote the public’s health. These multi-purpose, rapid exchanges of electronic health data, far removed from the typical disclosure of health (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  11
    Research in the Biotech Age: Can Informational Privacy Compete?Wilhelm Peekhaus - 2008 - Bulletin of Science, Technology and Society 28 (1):48-59.
    This article examines the privacy of personal medical information in the health research context. Arguing that biomedical research in Canada has been caught up in the government's broader neoliberal policy agenda that has positioned biotechnology as a strategic driver of economic growth, the author discusses the tension between informational privacy and the need for medical information for research purposes. Consideration is given to the debate about whether privacy for medical information serves or hinders the “public good” (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  29
    Others’ information and my privacy: an ethical discussion.Yuanye Ma - 2023 - Journal of Information, Communication and Ethics in Society 21 (3):259-270.
    Purpose Privacy has been understood as about one’s own information, information that is not one’s own is not typically considered with regards to an individual’s privacy. This paper aims to draw attention to this issue for conceptualizing privacy when one’s privacy is breached by others’ information. Design/methodology/approach To illustrate the issue that others' information can breach one's own privacy, this paper uses real-world applications of forensic genealogy and recommender systems to motivate the discussion. Findings In (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  80
    Privacy, public health, and controlling medical information.Adam D. Moore - 2010 - HEC Forum 22 (3):225-240.
    This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy, turning then to consider cases which illustrate when and how privacy may be overridden by public health concerns.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  38. Privacy as Informational Commodity.Jarek Gryz - 2013 - Proceedings of IACAP Conference.
    Many attempts to define privacy have been made since the publication of the seminal paper by Warren and Brandeis (Warren & Brandeis, 1890). Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy became an urgent issue as legal and business problems regarding privacy started to (...)
     
    Export citation  
     
    Bookmark  
  39. Information, Security, Privacy, and Anonymity : Definitional and Conceptual Issues.Björn Lundgren - 2018 - Dissertation, Kth Royal Institute of Technology
    This doctoral thesis consists of five research papers that address four tangential topics, all of which are relevant for the challenges we are facing in our socio-technical society: information, security, privacy, and anonymity. All topics are approached by similar methods, i.e. with a concern about conceptual and definitional issues. In Paper I—concerning the concept of information and a semantic conception thereof—it is argued that the veridicality thesis is false. In Paper II—concerning information security—it is argued that the current leading (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  82
    Privacy and the Computer: Why We Need Privacy in the Information Society.Lucas D. Introna - 1997 - Metaphilosophy 28 (3):259-275.
    For more than thirty years an extensive and significant philosophical debate about the notion of privacy has been going on. Therefore it seems puzzling that most current authors on information technology and privacy assume that all individuals intuitively know why privacy is important. This assumption allows privacy to be seen as a liberal “nice to have” value: something that can easily be discarded in the face of other really important matters like national security, the doing of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  41. Self-exposure and exposure of the self: Informational privacy and the presentation of identity. [REVIEW]David W. Shoemaker - 2010 - Ethics and Information Technology 12 (1):3-15.
  42. Privacy Rights and Public Information.Benedict Rumbold & James Wilson - 2018 - Journal of Political Philosophy 27 (1):3-25.
    This article concerns the nature and limits of individuals’ rights to privacy over information that they have made public. For some, even suggesting that an individual can have a right to privacy over such information may seem paradoxical. First, one has no right to privacy over information that was never private to begin with. Second, insofar as one makes once-private information public – whether intentionally or unintentionally – one waives one’s right to privacy to that information. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  43.  76
    Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges.Corey M. Angst - 2009 - Journal of Business Ethics 90 (S2):169 - 178.
    When information is transformed from what has traditionally been a paper-based format into digitized elements with meaning associated to them, new and intriguing discussions begin surrounding proper and improper uses of this codified and easily transmittable information. As these discussions continue, some health care providers, insurers, laboratories, pharmacies, and other healthcare stakeholders are creating and retroactively digitizing our medical information with the unambiguous endorsement of the federal government.Some argue that these enormous databases of medical information offer improved access to timely (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  44. Student Privacy in Learning Analytics: An Information Ethics Perspective.Alan Rubel & Kyle M. L. Jones - 2016 - The Information Society 32 (2):143-159.
    In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics “uses analytic techniques to help target instructional, curricular, and support resources” to examine student learning behaviors and change students’ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  45. I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
  46.  48
    Privacy and Confidentiality Practices for Research with Health Information in Canada.Janet Hagey - 1997 - Journal of Law, Medicine and Ethics 25 (2-3):130-138.
    Health information by its nature is personal and sensitive. At the same time, significant public value has resulted from research with health records about determinants of health and effective provision of health services. In Canada, certain legislation and processes have been established to balance the individual's right to privacy and the public good associated with analysis of health information.My purpose is to describe privacy and confidentiality practices in Canada with respect to access to health data for research purposes. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  93
    Privacy, the Internet of Things and State Surveillance: Handling Personal Information within an Inhuman System.Adam Henschke - 2020 - Moral Philosophy and Politics 7 (1):123-149.
    The Internet of Things (IoT) is, in part, an information handling system that can remove humans from the information handling process. The particular problem explored is how we are to understand privacy when considering informational systems that handle personal information in ways that impact people’s lives when there is no human operator in direct contact with that personal information. I argue that these new technologies need to take concepts like privacy into account, but also, that we ought (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  87
    Health Information: Reconciling Personal Privacy with the Public Good of Human Health. [REVIEW]Lawrence O. Gostin - 2001 - Health Care Analysis 9 (3):321-335.
    The success of the health care system depends on the accuracy, correctness and trustworthiness of the information, and the privacy rights of individuals to control the disclosure of personal information. A national policy on health informational privacy should be guided by ethical principles that respect individual autonomy while recognizing the important collective interests in the use of health information. At present there are no adequate laws or constitutional principles to help guide a rational privacy policy. The (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  49.  29
    Information Relevance Model of Customized Privacy for IoT.Wei Zhou & Selwyn Piramuthu - 2015 - Journal of Business Ethics 131 (1):19-30.
    Motivated by advances in mass customization in business practice, explosion in the number of internet of things devices, and the lack of published research on privacy differentiation and customization, we propose a contextual information relevance model of privacy. We acknowledge the existence of individual differences with respect to unique security and privacy protection needs. We observe and argue that it is unfair and socially inefficient to treat privacy in a uniform manner whereby a large proportion of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  50. Information technology and privacy: conceptual muddles or privacy vacuums? [REVIEW]Kirsten Martin - 2012 - Ethics and Information Technology 14 (4):267-284.
    Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 994