Results for ' privacy paradox'

977 found
Order:
  1.  41
    Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms.Kirsten Martin - 2020 - Business Ethics Quarterly 30 (1):65-96.
    ABSTRACT:The oft-cited privacy paradox is the perceived disconnect between individuals’ stated privacy expectations, as captured in surveys, and consumer market behavior in going online: individuals purport to value privacy yet still disclose information to firms. The goal of this paper is to empirically examine the conceptualization of privacy postdisclosure assumed in the privacy paradox. Contrary to the privacy paradox, the results here suggest consumers retain strong privacy expectations even after disclosing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  2.  62
    The Privacy Paradox.Tara J. Radin - 2001 - Business and Professional Ethics Journal 20 (3-4):145-170.
  3.  60
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  47
    Exploring solutions to the privacy paradox in the context of e-assessment: informed consent revisited.Ekaterina Muravyeva, José Janssen, Marcus Specht & Bart Custers - 2020 - Ethics and Information Technology 22 (3):223-238.
    Personal data use is increasingly permeating our everyday life. Informed consent for personal data use is a central instrument for ensuring the protection of personal data. However, current informed consent practices often fail to actually inform data subjects about the use of personal data. This article presents the results of a requirements analysis for informed consent from both a legal and usability perspective, considering the application context of educational assessment. The requirements analysis is based on European Union law and a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  40
    Blurring the line between publicity and privacy on social media and the privacy paradox.L. V. Chesnokova - forthcoming - Philosophical Problems of IT and Cyberspace.
    The article examines the situation associated with the spread of social networks, which brought not only new communication opportunities, but also the risks of blurring the boundaries between privacy and publicity. People voluntarily share personal data in exchange for public acceptance. This information is recorded and studied by various government and commercial institutions. The danger to information privacy as a right to control access to personal information is aggravated by the peculiarities of online communication, which is characterized by (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  6
    There Is No Ethical Automation: Stanislav Petrov’s Ordeal by Protocol.Technology Antón Barba-Kay A. Center on Privacy, Usab Institute for Practical Ethics Dc, Usaantón Barba-Kay is Distinguished Fellow at the Center on Privacy Ca, Hegel-Studien Nineteenth Century European Philosophy Have Appeared in the Journal of the History of Philosophy, Among Others He has Also Published Essays About Culture The Review of Metaphysics, Commonweal Technology for A. Broader Audience in the New Republic & Other Magazines A. Web of Our Own Making – His Book About What the Internet Is The Point - 2024 - Journal of Military Ethics 23 (3):277-288.
    While the story of Stanislav Petrov – the Soviet Lieutenant Colonel who likely saved the world from nuclear holocaust in 1983 – is often trotted out to advocate for the view that human beings ought to be kept “in the loop” of automated weapons’ responses, I argue that the episode in fact belies this reading. By attending more closely to the features of this event – to Petrov’s professional background, to his familiarity with the warning system, and to his decisions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7. Privacy Rights and Public Information.Benedict Rumbold & James Wilson - 2018 - Journal of Political Philosophy 27 (1):3-25.
    This article concerns the nature and limits of individuals’ rights to privacy over information that they have made public. For some, even suggesting that an individual can have a right to privacy over such information may seem paradoxical. First, one has no right to privacy over information that was never private to begin with. Second, insofar as one makes once-private information public – whether intentionally or unintentionally – one waives one’s right to privacy to that information. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  8.  77
    Privacy perception and protection on Chinese social media: a case study of WeChat.Zhen Troy Chen & Ming Cheung - 2018 - Ethics and Information Technology 20 (4):279-289.
    In this study, the under-examined area of privacy perception and protection on Chinese social media is investigated. The prevalence of digital technology shapes the social, political and cultural aspects of the lives of urban young adults. The influential Chinese social media platform WeChat is taken as a case study, and the ease of connection, communication and transaction combined with issues of commercialisation and surveillance are discussed in the framework of the privacy paradox. Protective behaviour and tactics are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Paradox and Privacy.Edward H. Minar - 1994 - Philosophy and Phenomenological Research 54 (1):43-75.
  10.  19
    A paradoxical privacy: solitude and the inner voice in the writings of Denise Riley.Barbara Taylor - 2020 - Feminist Theory 21 (3):275-286.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data.Gordon Hull - 2015 - Ethics and Information Technology 17 (2):89-101.
    The “privacy paradox” refers to the discrepancy between the concern individuals express for their privacy and the apparently low value they actually assign to it when they readily trade personal information for low-value goods online. In this paper, I argue that the privacy paradox masks a more important paradox: the self-management model of privacy embedded in notice-and-consent pages on websites and other, analogous practices can be readily shown to underprotect privacy, even in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  12. Inner privacy of conscious experiences and quantum information.Danko D. Georgiev - 2020 - Biosystems 187:104051.
    The human mind is constituted by inner, subjective, private, first-person conscious experiences that cannot be measured with physical devices or observed from an external, objective, public, third-person perspective. The qualitative, phenomenal nature of conscious experiences also cannot be communicated to others in the form of a message composed of classical bits of information. Because in a classical world everything physical is observable and communicable, it is a daunting task to explain how an empirically unobservable, incommunicable consciousness could have any physical (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  13. Publicity, Privacy, and Religious Toleration in Hobbes's Leviathan.Arash Abizadeh - 2013 - Modern Intellectual History 10 (2):261-291.
    What motivated an absolutist Erastian who rejected religious freedom, defended uniform public worship, and deemed the public expression of disagreement a catalyst for war to endorse a movement known to history as the champion of toleration, no coercion in religion, and separation of church and state? At least three factors motivated Hobbes’s 1651 endorsement of Independency: the Erastianism of Cromwellian Independency, the influence of the politique tradition, and, paradoxically, the contribution of early-modern practices of toleration to maintaining the public sphere’s (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  14.  94
    The HIPAA paradox: The privacy rule that's not.Richard Sobel - 2007 - Hastings Center Report 37 (4):40-50.
    : HIPAA is often described as a privacy rule. It is not. In fact, HIPAA is a disclosure regulation, and it has effectively dismantled the longstanding moral and legal tradition of patient confidentiality. By permitting broad and easy dissemination of patients’ medical information, with no audit trails for most disclosures, it has undermined both medical ethics and the effectiveness of medical care.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  15.  44
    Privacy preserving or trapping?Xiao-yu Sun & Bin Ye - forthcoming - AI and Society:1-11.
    The development and application of artificial intelligence (AI) technology has raised many concerns about privacy violations in the public. Thus, privacy-preserving computation technologies (PPCTs) have been developed, and it is expected that these new privacy protection technologies can solve the current privacy problems. By not directly using raw data provided by users, PPCTs claim to protect privacy in a better way than their predecessors. They still have technical limitations, and considerable research has treated PPCTs as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  29
    Privacy in America: The frontier of duty and restraint.Jay Black - 1994 - Journal of Mass Media Ethics 9 (4):213 – 234.
    Topics at a Poynter Institute privacy conference in December 1992 ranged from the role and obligations of the journalist to the rights of victims. Journalists' responsibility to fulfill a dual role of truthtelling and minimizing harm to vulnerable people in society framed the discussion. The public' s curiosity and media obsessions with information about victims of sex crimes are the first topics to be explored. Bob Steele of the Poynter Institute sets the stage for the delicate balance. Helen Benedict, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  22
    Theorizing Privacy in a Liberal Democracy: Canadian Jurisprudence, Anti-Terrorism, and Social Memory After 9/11.Valerie Steeves - 2019 - Theoretical Inquiries in Law 20 (1):323-341.
    The creation of new search powers in the Canadian Anti-Terrorism Act post-9/11 to make citizens more transparent to state surveillance was less a new phenomenon than an extension of preexisting tendencies to make citizens transparent to the state, so the risks they pose can be efficiently managed. However, 9/11 brought about a shift in the ways in which the Supreme Court of Canada talked about terrorism; terrorism was no longer placed on a continuum of criminal activity but was elevated to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  7
    The challenge of regulating digital privacy.Bartek Chomanski - 2025 - Critical Review of International Social and Political Philosophy.
    This paper argues that if the critics of the currently dominant notice-and-consent model of governing digital data transactions are correct, then they should oppose political reforms of the model. The crux of the argument is as follows: the reasons the critics give for doubting the effectiveness of notice-and-consent in protecting user privacy (namely, ordinary users’ various cognitive deficiencies and the inherent inscrutability of the subject matter) are also reasons for doubting the effectiveness of protecting user privacy through democratic (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  2
    The challenge of regulating digital privacy.Bartlomiej Chomanski - forthcoming - Critical Review of International Social and Political Philosophy.
    This paper argues that if the critics of the currently dominant notice-and-consent model of governing digital data transactions are correct, then they should oppose political reforms of the model. The crux of the argument is as follows: the reasons the critics give for doubting the effectiveness of notice-and-consent in protecting user privacy (namely, ordinary users’ various cognitive deficiencies and the inherent inscrutability of the subject matter) are also reasons for doubting the effectiveness of protecting user privacy through democratic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Unknowableness and Informational Privacy.David Matheson - 2007 - Journal of Philosophical Research 32:251-267.
    Despite their differences, the three most prominent accounts of informational privacy on the contemporary scene—the Control Theory, the Limited Access Theory, and the Narrow Ignorance Theory—all hold that an individual’s informational privacy is at least partly a function of a kind of inability of others to know personal facts about her. This common commitment, I argue, renders the accounts vulnerable to compelling counterexamples. I articulate a new account of informational privacy—the Broad Ignorance Theory—that avoids the commitment by (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  21.  21
    The Threat of Privacy in Wittgenstein’s Investigations: Kripke vs. Cavell.Jônadas Techio - 2020 - Wittgenstein-Studien 11 (1):79-104.
    Most readers of the Investigations take skepticism as a target of Wittgenstein’s remarks, something to be refuted by means of a clear grasp of our criteria. Stanley Cavell was the first to challenge that consensual view by reminding us that our criteria are constantly open to skeptical repudiation, hence that privacy is a standing human possibility. In an apparently similar vein, Saul Kripke has argued that a skeptical paradox concerning rules and meaning is the central problem of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  25
    Predicting the Consequences of Perceived Data Privacy Risks on Consumer Behaviour: An Entropy-TOPSIS Approach.Gloria Amaka Olayemi & Sulaimon Olanrewaju Adebiyi - 2022 - Studia Humana 11 (2):25-48.
    Advancement in internet of things and proliferation in the use of smart devices have raised concerns about the data privacy of online users. This study predicts the consequences of perceived data privacy risks on consumer behaviours in Lagos State, Nigeria using the integrated Entropy-Technique for Order Preference by Similarity to Ideal Solution. We employed Entropy to assign weights to each criterion. Subsequently, responses were systematically ranked to arrive at an inference using TOPSIS. 84.8% agree that any perceived cyber (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23. Delegating and distributing morality: Can we inscribe privacy protection in a machine? [REVIEW]Alison Adam - 2005 - Ethics and Information Technology 7 (4):233-242.
    This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with tragic consequences. In some sense this can be regarded as a failure in the process of delegating morality (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  24.  18
    Размывание границы между публичностью и приватностью в социальных сетях и парадокс приватности.Л. В Чеснокова - 2022 - Философские Проблемы Информационных Технологий И Киберпространства 2:22-38.
    The article examines the situation associated with the spread of social networks, which brought not only new communication opportunities, but also the risks of blurring the boundaries between privacy and publicity. People voluntarily share personal data in exchange for public acceptance. This information is recorded and studied by various government and commercial institutions. The danger to information privacy as a right to control access to personal information is aggravated by the peculiarities of online communication, which is characterized by (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  42
    The Paradoxical Home and Body in Jennifer Johnston’s The Christmas Tree (1981).Jennifer A. Slivka - 2023 - Journal of Medical Humanities 44 (1):91-105.
    Jennifer Johnston’s fiction presents the conditions of Irish culture and society by exploring the separations between interior and exterior realms and past and present temporalities persisting within the insulating privacy of the familial home space. In _The Christmas Tree_ (1981), the home is both haven and prison for Johnston’s heroine. In this paper, I argue that the home—which assumes the form of the individual body and the familial home—is paradoxical. The protagonist leaves 1950s Ireland because of the country’s rigid (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  26. Paradox and discovery: Iris Murdoch, John Wisdom, and the practice of linguistic philosophy.Lesley Jamieson - 2023 - European Journal of Philosophy 31 (4):982-995.
    This article argues that Iris Murdoch, who was supervised by John Wisdom during her 1947–48 fellowship at Newnham College Cambridge, went on to practice philosophy in a recognizably Wisdomian manner in her earliest paper, “Thinking and Language” (1951). To do so, I first describe how Wisdom understood philosophical perplexity and paradox. One task that linguistic philosophers should take up is to investigate the concrete cases that give paradoxical philosophical statements their sense and to sift the truth they contain from (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27.  12
    Accounting for “the social” in contact tracing applications: The paradox between public health governance and mistrust of government's data use.Yao-Tai Li - 2021 - Big Data and Society 8 (2).
    This essay adopts three accounts of “the social” to get a clearer picture of why there is a barrier faced by the government when implementing contact tracing mobile applications. In Hong Kong's context, the paradox involves declining trust of the government's protection of data privacy and growing concern about data surveillance since the 2019 social unrest I argue that exploring the idea of sociality is valuable in that it re-reconfigures the datafication of pandemic control by revealing different sets (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  16
    Trading Social Visibility for Economic Amenability: Data-based Value Translation on a “Health and Fitness Platform”.Jörn Lamla, Barbara Büttner & Carsten Ochs - 2021 - Science, Technology, and Human Values 46 (3):480-506.
    Research on privacy practices in digital environments has oftentimes discovered a paradoxical relationship between users’ discursive appraisal of privacy and their actual practices: the “privacy paradox.” The emergence of this paradox prompts us to conduct ethnography of a health and fitness platform in order to flesh out the structural mechanisms generating this paradox. We provide an ethnographic analysis of surveillance capitalism in action that relates front-end practices empirically to the data economy’s back-end operations to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  55
    Biometric Technology and Ethics: Beyond Security Applications.Andrea North-Samardzic - 2020 - Journal of Business Ethics 167 (3):433-450.
    Biometric technology was once the purview of security, with face recognition and fingerprint scans used for identification and law enforcement. This is no longer the case; biometrics is increasingly used for commercial and civil applications. Due to the widespread diffusion of biometrics, it is important to address the ethical issues inherent to the development and deployment of the technology. This article explores the burgeoning research on biometrics for non-security purposes and the ethical implications for organizations. This will be achieved by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  30.  26
    Low on trust, high on use datafied media, trust and everyday life.Jannie Hartley-Møller & David Mathieu - 2021 - Big Data and Society 8 (2).
    This article explores yet another paradox – aside from the privacy paradox – related to the datafication of media: citizens trust least the media they use most It investigates the role that daily life plays in shaping the trust that citizens place in datafied media. The study reveals five sets of heuristics guiding the trust assessments of citizens: characteristics of media organisations, old media standards, context of use and purpose, experiences of datafication and understandings of datafication. The (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. Bad by Nature, An Axiological Theory of Pain.Olivier Massin - 2017 - In Jennifer Corns, The Routledge Handbook of Philosophy of Pain. New York: Routledge. pp. 321-333.
    This chapter defends an axiological theory of pain according to which pains are bodily episodes that are bad in some way. Section 1 introduces two standard assumptions about pain that the axiological theory constitutively rejects: (i) that pains are essentially tied to consciousness and (ii) that pains are not essentially tied to badness. Section 2 presents the axiological theory by contrast to these and provides a preliminary defense of it. Section 3 introduces the paradox of pain and argues that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  32. Involving the Virtual Subject.Bakardjieva Maria & Feenberg Andrew - 2000 - Ethics and Information Technology 2 (4):233-240.
    As users of computer networks have become more active in producing their own electronic records, in the form of transcripts of onlinediscussions, ethicists have attempted to interpret this new situation interms of earlier models of personal data protection. But thistransference results in unprecedented problems for researchers. Thispaper examines some of the central dichotomies and paradoxes in thedebate on research ethics online in the context of the concrete study ofa virtual community that we carried out. We argue that alienation, notprivacy, is (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  33.  91
    Cyberpsychology, Human Relationships, and Our Virtual Interiors.John A. Teske - 2002 - Zygon 37 (3):677-700.
    Recent research suggests an “Internet paradox”—that a communications technology might reduce social involvement and psychological well–being. In this article I examine some of the limitations of current Internet communication, including those of access, medium, presentation, and choice, that bear on the formation and maintenance of social relationships. I also explore issues central to human meaning in a technological culture—those of the history of the self, of individuality, and of human relationships—and suggest that social forces, technological and otherwise, have increasingly (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  34.  58
    Psychic ID: A blueprint for a modern national identity scheme.David G. W. Birch - 2008 - Identity in the Information Society 1 (1):189-201.
    The issue of identity cards is hotly debated in many countries, but it often seems to be an oddly backward-looking debate that presumes outdated “Orwellian” architectures. In the modern world, surely we should be debating the requirements for national identity management schemes, in which identity cards may or may not be a useful implementation, before we move on to architecture. If so, then, what should a U.K. national identity management scheme for the 21st century look like? Can we assemble a (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  35. (1 other version)Is the folk concept of pain polyeidic?Emma Borg, Richard Harrison, James Stazicker & Tim Salomons - 2019 - Mind and Language 35 (1):29-47.
    Philosophers often assume that folk hold pain to be a mental state – to be in pain is to have a certain kind of feeling – and they think this state exhibits the classic Cartesian characteristics of privacy, subjectivity, and incorrigibility. However folk also assign pains (non-brain-based) bodily locations: unlike most other mental states, pains are held to exist in arms, feet, etc. This has led some (e.g. Hill 2005) to talk of the ‘paradox of pain’, whereby the (...)
    No categories
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  36.  16
    Sensor-floors: Changing Work and Values in Care for Frail Older Persons.Agnete Meldgaard Hansen & Sidsel Lond Grosen - 2021 - Science, Technology, and Human Values 46 (2):254-274.
    Based on an ethnographic study in a Danish residential care center, this article shows how the interplay of a sensor-floor technology and currently influential values of person-centeredness, privacy, and security in care transforms care work and care interactions between residents and care workers. Based on an understanding of care as realized in a heterogeneous collective of human and nonhuman actors, this article illustrates how new modes of monitoring and interpreting residents’ care needs at a distance arise, and how a (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37. Abschied von Chalmers' Zombie. Das 'Prinzip Selbsterhaltung' als Basis von 'Sinn'.Dieter Wandschneider - 2018 - Zeitschrift für Philosophische Forschung 72 (2):246-262.
    My argument is that Chalmers’ Zombie fiction and his rigid-designator-argument going back on Kripke seems to come down to a petitio principii. Rather, at the core it appears to be more related to the essential ‘privacy’ of the phenomenal internal perspective. In return for Chalmers I argue that the ‘principle of self-preservation’ of living organisms necessarily implies subjectivity and the emergence of meaning. The comparison with a robot proves instructive. The mode of ‘mere physical’ being is transcended if, in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  38.  35
    The European Commission report on ethics of connected and automated vehicles and the future of ethics of transportation.Filippo Santoni de Sio - 2021 - Ethics and Information Technology 23 (4):713-726.
    The paper has two goals. The first is presenting the main results of the recent report Ethics of Connected and Automated Vehicles: recommendations on road safety, privacy, fairness, explainability and responsibility written by the Horizon 2020 European Commission Expert Group to advise on specific ethical issues raised by driverless mobility, of which the author of this paper has been member and rapporteur. The second is presenting some broader ethical and philosophical implications of these recommendations, and using these to contribute (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  39.  65
    Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40.  22
    Building an Opt-Out Model for Service-Level Consent in the Context of New Data Regulations.A. R. Howarth, C. S. Estcourt, R. E. Ashcroft & J. A. Cassell - 2022 - Public Health Ethics 15 (2):175-180.
    The General Data Protection Regulation (GDPR) was introduced in 2018 to harmonize data privacy and security laws across the European Union (EU). It applies to any organization collecting personal data in the EU. To date, service-level consent has been used as a proportionate approach for clinical trials, which implement low-risk, routine, service-wide interventions for which individual consent is considered inappropriate. In the context of public health research, GDPR now requires that individuals have the option to choose whether their data (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  55
    Hope for the best and prepare for the worst: Ethical concerns related to the introduction of healthcare artificial intelligence.Atsuchi Asai, Taketoshi Okita, Aya Enzo, Motoki Ohnishi & Seiji Bito - 2019 - Eubios Journal of Asian and International Bioethics 29 (2):64-70.
    Background: The introduction of healthcare AI to society as well as the clinical setting will improve individual health statuses and increase the possible medical choices. AI can be, however, regarded as a double-edged sword that might cause medically and socially undesirable situations. In this paper, we attempt to predict several negative situations that may be faced by healthcare professionals, patients and citizens in the healthcare setting, and our society as a whole. Discussion: We would argue that physicians abuse healthcare AI (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  9
    Supporting and Humiliating Dignity with Biometric Technologies: An Affordance Perspective.Jayson Killoran, Jasmin Manseau, Andrew Park & Jan Kietzmann - forthcoming - Journal of Business Ethics:1-18.
    Biometric technologies are at the forefront of organizational innovation, surveillance, and control. In many instances, the use of physiological and behavioral biometrics enhances individual and organizational performance. However, they also have the potential to hinder human wellbeing. In particular, recent generations of biometrics are capable of extracting deeper insights into human behavior, enabling organizational surveillance practices, but may also constrain individual rights and freedoms. While biometric technologies have been evidenced to infringe upon privacy and lead to discriminatory practices, little (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  32
    Sexuality behind bars in the female central penitentiary of Santiago, Chile: Unlocking the gendered binary.Francisca Alejandra Castro Madariaga, Belén Estefanía Gómez Garcés, Alicia Carrasco Parra & Jennifer Foster - 2017 - Nursing Inquiry 24 (1):e12183.
    We explore what it means to promote healthy sexuality for incarcerated women. We report upon the experiences of ten inmates in the Female Central Penitentiary of Santiago, Chile, regarding their sexuality within prison. We used a qualitative, descriptive research approach. Individual and semistructured interviews were conducted with women from different sections of the prison over a 2‐month period. Participants highlighted the site for conjugal visits, the Venusterio, as a place of privacy and sexual expression between couples from outside prison. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  48
    L'état d'exception : forme de gouvernement de l'Empire ?Jean Claude Paye - 2004 - Multitudes 2 (2):179-190.
    The war against terrorism enables the implementation of techniques of exception at all stages of judicial proceedings in criminal cases, front the initiation of a lawsuit to the verdict. It thus puts into question the constitutional mechanisms intended for the protection of privacy. The type of incrimination specific w the accusation of terrorism has created a specifically political crime, i.e., the intention to exert art inappropriate form of pressure on a government or an international organization. It serves as the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  40
    Designing effective nudges that satisfy ethical constraints: the case of environmentally responsible behaviour.Denis Hilton, Nicolas Treich, Gaetan Lazzara & Philippe Tendil - 2018 - Mind and Society 17 (1-2):27-38.
    We discuss what makes a “good” environmental nudge from the policy maker’s point of view. We first delineate what is paternalistic about environmental nudges. We then discuss the effectiveness of nudges, including their paradoxical effects on the targeted behaviour, as well as possible collateral effects on the decision-maker’s wellbeing. We also discuss why the libertarian and ethical aspect of nudges may render them more, and not less, attractive as policy instruments and decision aids. We conclude by discussing accuracy and (...) concerns of information-based nudges, and with some recommendations for the design of effective and ethical nudges. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  41
    Ethical issues in the use of electronic health records for pharmacy medicines sales.Richard Cooper - 2007 - Journal of Information, Communication and Ethics in Society 5 (1):7-19.
    – Pharmacy sales of over‐the‐counter medicines in the UK represent an economically significant and important mechanism by which customers self‐medicate. Sales are supervised in pharmacies, but this paper seeks to question whether patients' electronic health records – due to be introduced nationally – could be used, ethically, by pharmacists to ensure safe medicines sales., – Using theoretical arguments, three areas of ethical concern are identified and explored in relation to pharmacists' access to EHRs‐consequentialsim, analogies and confidentiality/privacy., – Consequentialist arguments (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  47.  68
    Law and social justice.Joseph Keim Campbell, Michael O'Rourke & David Shier (eds.) - 2005 - Cambridge, MA: MIT Press.
    These essays by leading scholars illustrate the complexity and range of philosophical issues raised by consideration of law and social justice. The contributors to Law and Social Justice examine such broad foundational issues as instrumentalist versus Kantian conceptions of rights as well as such specific problems as the admissibility or inadmissibility of evidence of causation in toxic tort cases. They consider a variety of subjects, including the implications of deliberative democracy for privacy rights, equality as a principle of distributive (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  14
    Why Russian Philosophy Is So Important and So Dangerous.Mikhail Epstein - 2023 - Common Knowledge 29 (3):405-409.
    The academic community in the West tends to be suspicious of Russian philosophy, often relegating it to another category, such as “ideology” or “social thought.” But what is philosophy? There is no simple universal definition, and many thinkers consider it impossible to formulate one. The most credible attempt is nominalistic: philosophy is the practice in which Plato and Aristotle were involved. As Alfred North Whitehead wrote, “The safest general characterization of the European philosophical tradition is that it consists of a (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  50
    Layered vulnerability and researchers’ responsibilities: learning from research involving Kenyan adolescents living with perinatal HIV infection.Vicki Marsh, Amina Abubakar, Maureen Kelley, Alun Davies, Rita Njeru, Gladys Sanga, Scholastica M. Zakayo, Anderson Charo, Sassy Molyneux & Mary Kimani - 2024 - BMC Medical Ethics 25 (1):1-20.
    BackgroundCarefully planned research is critical to developing policies and interventions that counter physical, psychological and social challenges faced by young people living with HIV/aids, without increasing burdens. Such studies, however, must navigate a ‘vulnerability paradox’, since including potentially vulnerable groups also risks unintentionally worsening their situation. Through embedded social science research, linked to a cohort study involving Adolescents Living with HIV/aids (ALH) in Kenya, we develop an account of researchers’ responsibilities towards young people, incorporating concepts of vulnerability, resilience, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  23
    (1 other version)L'identité comme stratégie relationnelle.Dominique Cardon - 2009 - Hermès: La Revue Cognition, communication, politique 53 (1):61.
    La réussite des plates-formes relationnelles du Web 2.0 doit beaucoup au fait que les personnes prennent des risques avec leur identité en rendant publiques des informations sur elles-mêmes. Aussi, est-il nécessaire de comprendre les ressorts sociaux, culturels et psychologiques de ce phénomène. Car l'exposition de soi ne signifie pas un renoncement au contrôle de son image. Elle témoigne, au contraire, d'une volonté que l'on pourrait presque dire stratégique de gérer et d'agir sur les autres en affichant et en masquant certains (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 977