Results for 'Privacy by design'

979 found
Order:
  1.  72
    Privacy by Design in Personal Health Monitoring.Anders Nordgren - 2015 - Health Care Analysis 23 (2):148-164.
    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by (...) and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D. [REVIEW]Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):247-251.
    In November, 2009, a prominent group of privacy professionals, business leaders, information technology specialists, and academics gathered in Madrid to discuss how the next set of threats to privacy could best be addressed.The event, Privacy by Design: The Definitive Workshop, was co-hosted by my office and that of the Israeli Law, Information and Technology Authority. It marked the latest step in a journey that I began in the 1990’s, when I first focused on enlisting the support (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  3. Privacy by Design.Peter Schaar - 2010 - Identity in the Information Society 3 (2):267-274.
    In view of rapid and dramatic technological change, it is important to take the special requirements of privacy protection into account early on, because new technological systems often contain hidden dangers which are very difficult to overcome after the basic design has been worked out. So it makes all the more sense to identify and examine possible data protection problems when designing new technology and to incorporate privacy protection into the overall design, instead of having to (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  4. Privacy by Design: essential for organizational accountability and strong business practices. [REVIEW]Ann Cavoukian, Scott Taylor & Martin E. Abrams - 2010 - Identity in the Information Society 3 (2):405-413.
    An accountability-based privacy governance model is one where organizations are charged with societal objectives, such as using personal information in a manner that maintains individual autonomy and which protects individuals from social, financial and physical harms, while leaving the actual mechanisms for achieving those objectives to the organization. This paper discusses the essential elements of accountability identified by the Galway Accountability Project, with scholarship from the Centre for Information Policy Leadership at Hunton & Williams LLP. Conceptual _Privacy by Design_ (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  5.  68
    Extending the value chain to incorporate privacy by design principles.Julie Smith David & Marilyn Prosch - 2010 - Identity in the Information Society 3 (2):295-318.
    Morgan et al. examine the notion of corporate citizenship and suggest that for it to be effective companies need to minimize harm and maximize benefits through its activities and, in so doing, take account of and be responsive to a full range of stakeholders. Specifically, they call for a “next generation” approach to corporate citizenship that embeds structures, systems, processes and policies into and across the company’s value chain. We take this notion of corporate citizenship and apply it to (...) by Design concepts in a value chain model. Privacy by Design is comprised of Seven Foundational Principles, and as we develop the Privacy by Design Value Chain, those principles are incorporated. First, we examine the primary activities in the value chain and consider each of these seven principles, and then we extend the analysis to the support activities. Finally, we consider privacy implications and the challenges to be faced in supply chain and federated environments. Designing privacy into the value chain model is a practical, business view of organizational and privacy issues. This puts privacy where it belongs in an organization—everywhere personal information exists. We conclude that further research is needed to consider the internal stakeholders’ communications among the various departments within an organization with the goal of better communications and shared values, and we believe the value chain approach helps to further this research agenda. Also, federated environments necessitate that organizations can “trust” their third parties providers. Research and case studies are needed regarding how these organizations can create value and competitive advantages by voluntarily providing their customers with privacy practice compliance reports. For the most part, the future is bright for the protection of personal information because solutions, not problems are being proposed, researched, developed and implemented. (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  6.  89
    Remote home health care technologies: how to ensure privacy? Build it in: Privacy by Design.Ann Cavoukian, Angus Fisher, Scott Killen & David A. Hoffman - 2010 - Identity in the Information Society 3 (2):363-378.
    Current advances in connectivity, sensor technology, computing power and the development of complex algorithms for processing health-related data are paving the way for the delivery of innovative long-term health care services in the future. Such technological developments will, in particular, assist the elderly and infirm to live independently, at home, for much longer periods. The home is, in fact, becoming a locus for health care innovation that may in the future compete with the hospital. However, along with these advances come (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  7.  39
    Ciência da informação e privacy by design.Jonas Ferrigolo Melo, Moisés Rockembach & Armando Manuel Barreiros Malheiro da Silva - 2023 - Logeion Filosofia da Informação 9 (2):124-143.
    Este artigo apresenta o mapeamento das possibilidades de pesquisa no âmbito da Ciência da Informação (CI) que tratam sobre o conceito de Privacy by Design (PbD). Se busca responder como a CI e os usos da teoria do PbD podem influenciar no alcance de maior privacidade aos usuários de sistemas de informação desde a concepção de produtos científicos até a pesquisa aplicada. Para responder esta pergunta, foram analisados 202 artigos, que balizaram a composição do mapa de possibilidades de (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
    An introductory message from Peter Hustinx, European Data Protection Supervisor, delivered at Privacy by Design: The Definitive Workshop. This presentation looks back at the origins of Privacy by Design, notably the publication of the first report on “Privacy Enhancing Technologies” by a joint team of the Information and Privacy Commissioner of Ontario, Canada and the Dutch Data Protection Authority in 1995. It looks ahead and adresses the question of how the promises of these concepts (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  9. Minimium Harm by Design. Reworking Privacy by Design to Mitigate the Risks of Surveillance.Elisa Orrù - 2017 - In Leenes R. Van Brakel R. Gutwirth S. De Hert P. (ed.), Computers, Privacy and Data Protection: Invisibilities & Infrastructures. Springer. pp. 107-137.
    Particular applications of Privacy by Design (PbD) have proven to be valuable tools to protect privacy in many technological applications. However, PbD is not as promising when applied to technologies used for surveillance. After specifying how surveillance and privacy are understood in this paper, I will highlight the shortcomings of PbD when applied to surveillance, using a web-scanning system for counter-terrorism purposes as an example. I then suggest reworking PbD into a different approach: the Minimum Harm (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  25
    Role-Playing Computer Ethics: Designing and Evaluating the Privacy by Design (PbD) Simulation.Katie Shilton, Donal Heidenblad, Adam Porter, Susan Winter & Mary Kendig - 2020 - Science and Engineering Ethics 26 (6):2911-2926.
    There is growing consensus that teaching computer ethics is important, but there is little consensus on how to do so. One unmet challenge is increasing the capacity of computing students to make decisions about the ethical challenges embedded in their technical work. This paper reports on the design, testing, and evaluation of an educational simulation to meet this challenge. The privacy by design simulation enables more relevant and effective computer ethics education by letting students experience and make (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  5
    Towards a principled approach for engineering privacy by design.M. Alshammari & A. Simpson - 2017 - In .
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  28
    Privacy-centered design for social robots.Tanja Heuer, Ina Schiering & Reinhard Gerndt - 2019 - Interaction Studies. Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies / Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies 20 (3):509-529.
    Social robots as companions play an increasingly important role in our everyday life. However, reaching the full potential of social robots and the interaction between humans and robots requires permanent collection and processing of personal data of users, e.g. video and audio data for image and speech recognition. In order to foster user acceptance, trust and to address legal requirements as the General Data Protection Regulation of the EU, privacy needs to be integrated in the design process of (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  13.  19
    Medical research, Big Data and the need for privacy by design.Jean Popma & Bart Jacobs - 2019 - Big Data and Society 6 (1).
    Medical research data is sensitive personal data that needs to be protected from unauthorized access and unintentional disclosure. In a research setting, sharing of data within the scientific community is necessary in order to make progress and maximize scientific benefits derived from valuable and costly data. At the same time, convincingly protecting the privacy of people participating in medical research is a prerequisite for maintaining trust and willingness to share. In this commentary, we will address this issue and the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  73
    A pragmatic approach to privacy risk optimization: privacy by design for business practices. [REVIEW]Terry McQuay & Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):379-396.
    This paper introduces Nymity’s Privacy Risk Optimization Process (PROP), a process that enables the implementation of privacy into operational policies and procedures, which embodies in Privacy by Design for business practices. The PROP is based on the International Organization for Standardization (ISO) concept that risk can be positive and negative; and further defines Risk Optimization as a process whereby organizations strive to maximize positive risks and mitigate negative ones. The PROP uses these concepts to implement (...) into operational policies and procedures. This paper was produced by Nymity and the Office of the Information and Privacy Commissioner of Ontario, Canada. It was presented by Terry McQuay, President of Nymity, at Privacy by Design: The Definitive Workshop, in Madrid, Spain, on November 2nd, 2009. The workshop was hosted by Dr. Ann Cavoukian, Information and Privacy Commissioner of Ontario, Canada, and Yoram Hacohen, Head of the Israeli Law, Information and Technology Authority. (shrink)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  15.  23
    Research ethics by design: A collaborative research design proposal.Donald S. Borrett, Heather Sampson & Ann Cavoukian - 2017 - Research Ethics 13 (2):84-91.
    Privacy by Design, a globally accepted framework for personal data management and privacy protection, advances the view that privacy cannot be assured solely by compliance with regulatory frameworks but must become an organisation’s default mode of operation. We are proposing a similar template for the research ethics review process. The Research Ethics by Design framework involves research ethics committees engaging researchers during the design phase of the proposal so that ethical considerations may be directly (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  61
    Layering privacy on operating systems, social networks, and other platforms by design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
    Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (3) the evolution of the PeCAN (Personal Context Agent Networking) architecture to a platform for pervasively providing multiple contexts for user privacy preferences and online informational (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  36
    Privacy by default” and active “informed consent” by layers.Amaya Noain-Sánchez - 2016 - Journal of Information, Communication and Ethics in Society 14 (2):124-138.
    Purpose The purpose of this paper is to lay out an approach to addressing the problem of privacy protection in the global digital environment based on the importance that information has to improve users’ informational self-determination. Following this reasoning, this paper focuses on the suitable way to provide user with the correct amount of information they may need to maintain a desirable grade of autonomy as far as their privacy protection is concerned and decide whether or not to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  53
    Towards Transparency by Design for Artificial Intelligence.Heike Felzmann, Eduard Fosch-Villaronga, Christoph Lutz & Aurelia Tamò-Larrieux - 2020 - Science and Engineering Ethics 26 (6):3333-3361.
    In this article, we develop the concept of Transparency by Design that serves as practical guidance in helping promote the beneficial functions of transparency while mitigating its challenges in automated-decision making environments. With the rise of artificial intelligence and the ability of AI systems to make automated and self-learned decisions, a call for transparency of how such systems reach decisions has echoed within academic and policy circles. The term transparency, however, relates to multiple concepts, fulfills many functions, and holds (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  19.  2
    Sovereignty by design and human values in agriculture data spaces.Rosa María Gil, Mark Ryan & Roberto García - forthcoming - Agriculture and Human Values:1-26.
    Because of the importance of data-sharing for the economy, improved products and services, and to benefit society, the European Union has proposed developing a Common European Data Space (CEDS). The goal is to create a single European data market through 14 domain-specific data spaces (e.g., agriculture, or the Common European Agricultural Data Space (CEADS)). One of the central tenets of the CEDS is to ensure that those who share data can maintain control over who has access to, use of, and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  16
    Ethical aspects in eHealth – design of a privacy-friendly system.Milica Milutinovic & Bart De Decker - 2016 - Journal of Information, Communication and Ethics in Society 14 (1):49-69.
    Purpose– The medical advances and historical fluctuations in the demographics are contributing to the rise of the average age. These changes are increasing the pressure to organize adequate care to a growing number of individuals. As a way to provide efficient and cost-effective care, eHealth systems are gaining importance. However, this trend is creating new ethical concerns. Major issues are privacy and patients’ control over their data. To deploy these systems on a large scale, they need to offer strict (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  10
    The “silence of the chips” concept: towards an ethics(-by-design) for IoT.Caroline Rizza & Laura Draetta - 2014 - International Review of Information Ethics 22:23-31.
    In this position paper, we would like to promote the alternative approach positioned between the two extreme positions consisting in refusing any innovation or in adopting technology without questioning it. This approach proposes a reflexive and responsible innovation based on a compromise between industrial and economic potentialities and a common respect of our human rights and values. We argue that the “silence of the chips right” is timely, relevant and sustainable to face ethical challenges raised by IoT such as protecting (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  15
    Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network.James Stewart & Ben Collier - 2022 - Science, Technology, and Human Values 47 (5):910-936.
    This paper explores, through empirical research, how values, engineering practices, and technological design decisions shape one another in the development of privacy technologies. We propose the concept of “privacy worlds” to explore the values and design practices of the engineers of one of the world’s most notable privacy technologies: the Tor network. By following Tor’s design and development we show a privacy world emerging—one centered on a construction of privacy understood through the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  72
    Data Science and Designing for Privacy.Michael Falgoust - 2016 - Techné: Research in Philosophy and Technology 20 (1):51-68.
    Unprecedented advances in the ability to store, analyze, and retrieve data is the hallmark of the information age. Along with enhanced capability to identify meaningful patterns in large data sets, contemporary data science renders many classical models of privacy protection ineffective. Addressing these issues through privacy-sensitive design is insufficient because advanced data science is mutually exclusive with preserving privacy. The special privacy problem posed by data analysis has so far escaped even leading accounts of informational (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  62
    SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. [REVIEW]Ann Cavoukian, Jules Polonetsky & Christopher Wolf - 2010 - Identity in the Information Society 3 (2):275-294.
    The 2003 blackout in the northern and eastern U.S. and Canada which caused a $6 billion loss in economic revenue is one of many indicators that the current electrical grid is outdated. Not only must the grid become more reliable, it must also become more efficient, reduce its impact on the environment, incorporate alternative energy sources, allow for more consumer choices, and ensure cyber security. In effect, it must become smart. Significant investments in the billions of dollars are being made (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25. Comparative legal study on privacy and personal data protection for robots equipped with artificial intelligence: looking at functional and technological aspects.Kaori Ishii - 2019 - AI and Society 34 (3):509-533.
    This paper undertakes a comparative legal study to analyze the challenges of privacy and personal data protection posed by Artificial Intelligence embedded in Robots, and to offer policy suggestions. After identifying the benefits from various AI usages and the risks posed by AI-related technologies, I then analyze legal frameworks and relevant discussions in the EU, USA, Canada, and Japan, and further consider the efforts of Privacy by Design originating in Ontario, Canada. While various AI usages provide great (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26. The design of the internet’s architecture by the Internet Engineering Task Force (IETF) and human rights.Corinne Cath & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (2):449–468.
    The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet’s architecture. The technical decisions made by Internet Standard Developing Organisations that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically mediated public sphere, including which rights (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  38
    Trust and privacy in the future internet—a research perspective.Dirk Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  46
    Semantic Web Regulatory Models: Why Ethics Matter.Pompeu Casanovas - 2015 - Philosophy and Technology 28 (1):33-55.
    The notion of validity fulfils a crucial role in legal theory. In the emerging Web 3.0, Semantic Web languages, legal ontologies, and normative multi-agent systems are designed to cover new regulatory needs. Conceptual models for complex regulatory systems shape the characteristic features of rules, norms, and principles in different ways. This article outlines one of such multilayered governance models, designed for the CAPER platform, and offers a definition of Semantic Web Regulatory Models . It distinguishes between normative-SWRM and institutional-SWRM. It (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  30.  89
    Surveillance, privacy and the ethics of vehicle safety communication technologies.M. Zimmer - 2005 - Ethics and Information Technology 7 (4):201-210.
    Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  31.  87
    The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano, Gian Piero Fici, Ugo Pagallo, Stefano Primatesta & Fulvia Quagliotti - 2019 - Minds and Machines 29 (4):579-601.
    Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  32.  25
    Ethical Design and Use of Robotic Care of the Elderly.Carolyn Johnston - 2022 - Journal of Bioethical Inquiry 19 (1):11-14.
    The Australian Royal Commission into Aged Care Quality and Safety acknowledged understaffing and substandard care in residential aged care and home care services, and recommendations were made that that the Australian Government should promote assistive technology within aged care. Robotic care assistants can provide care and companionship for the elderly—both in their own homes and within health and aged care institutions. Although more research is required into their use, studies indicate benefits, including enabling the elderly to live independently at home, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Imaginative Value Sensitive Design: Using Moral Imagination Theory to Inform Responsible Technology Design.Steven Umbrello - 2020 - Science and Engineering Ethics 26 (2):575-595.
    Safe-by-Design (SBD) frameworks for the development of emerging technologies have become an ever more popular means by which scholars argue that transformative emerging technologies can safely incorporate human values. One such popular SBD methodology is called Value Sensitive Design (VSD). A central tenet of this design methodology is to investigate stakeholder values and design those values into technologies during early stage research and development (R&D). To accomplish this, the VSD framework mandates that designers consult the philosophical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  34. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  35. Imaginative Value Sensitive Design: How Moral Imagination Exceeds Moral Law Theories in Informing Responsible Innovation.Steven Umbrello - 2018 - Dissertation, University of Edinburgh
    Safe-by-Design (SBD) frameworks for the development of emerging technologies have become an ever more popular means by which scholars argue that transformative emerging technologies can safely incorporate human values. One such popular SBD methodology is called Value Sensitive Design (VSD). A central tenet of this design methodology is to investigate stakeholder values and design those values into technologies during early stage research and development (R&D). To accomplish this, the VSD framework mandates that designers consult the philosophical (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  62
    Togetherness and respect: ethical concerns of privacy in Global Web Societies.Gordana Dodig-Crnkovic & Virginia Horniak - 2006 - AI and Society 20 (3):372-383.
    Today’s computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated internet-based attacks are almost impossible to prevent. At the same time, information and communication technology, ICT offers the technical possibility of embedded privacy protection. Making technology legitimate by design is a part of the intentional design for democracy. This means incorporating options for socially acceptable behaviour in technical systems, and making the basic principles of privacy protection, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37.  86
    Cracking down on autonomy: three challenges to design in IT Law. [REVIEW]U. Pagallo - 2012 - Ethics and Information Technology 14 (4):319-328.
    The paper examines how technology challenges conventional borders of national legal systems, as shown by cases that scholars address as a part of their everyday work in the fields of information technology (IT)-Law, i.e., computer crimes, data protection, digital copyright, and so forth. Information on the internet has in fact a ubiquitous nature that transcends political borders and questions the notion of the law as made of commands enforced through physical sanctions. Whereas many of today’s impasses on jurisdiction, international conflicts (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  38.  95
    Built-in privacy—no panacea, but a necessary condition for effective privacy protection.Alexander Dix - 2010 - Identity in the Information Society 3 (2):257-265.
    Built-in privacy has for too long been neglected by regulators. They have concentrated on reacting to violations of rules. Even imposing severe fines will however not address the basic issue that preventative privacy protection is much more meaningful. The paper discusses this in the context of the International Working Group on Data Protection in Telecommunications (“Berlin Group”) which has published numerous recommendations on privacy-compliant design of technical innovations. Social network services, road pricing schemes, and the distribution (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  30
    Privacy in new media in Israel.Yuval Karniel & Amit Lavie-Dinur - 2012 - Journal of Information, Communication and Ethics in Society 10 (4):288-304.
    PurposeThe purpose of the paper is to draw a new map confronting the issue of privacy in the new media age in general, and in the State of Israel in particular.Design/methodology/approachThe paper presents an in‐depth review based on professional literature covering the topics of privacy, new media, social networks, and Israel. The paper considers all citizens of Israel, the vast majority, however, of which are Jewish.FindingsThe study has found that even though Israeli social network users may be (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  39
    Privacy as Protection of the Incomputable Self: From Agnostic to Agonistic Machine Learning.Mireille Hildebrandt - 2019 - Theoretical Inquiries in Law 20 (1):83-121.
    This Article takes the perspective of law and philosophy, integrating insights from computer science. First, I will argue that in the era of big data analytics we need an understanding of privacy that is capable of protecting what is uncountable, incalculable or incomputable about individual persons. To instigate this new dimension of the right to privacy, I expand previous work on the relational nature of privacy, and the productive indeterminacy of human identity it implies, into an ecological (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  41.  56
    Property, privacy and personhood in a world of ambient intelligence.Niels Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  42.  2
    Patient privacy investigation in the emergency departments in teaching hospitals.Mohammad Enayati Rangbar Ghorbanabadi, Samaneh Mirzaei, Mehdi Bagherabadi & Khadijeh Nasiriani - forthcoming - Nursing Ethics.
    Background Patient privacy is important as one of the most principle components of quality healthcare and safe care. In teaching hospital emergency rooms, it is a challenge for staff to respect for privacy. Research aim Recognizing the importance of this issue, this study aims to assess the privacy status of patients in emergency departments. Research design This study employs a cross-sectional design. Participants and research context This study was conducted in patients of the four emergency (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  4
    Factors related to privacy of Somali refugees in health care.Niina Eklöf, Maija Hupli & Helena Leino-Kilpi - 2020 - Nursing Ethics 27 (2):514-526.
    Background: Privacy is one of the key principles in health care and requires understanding of the cultural aspects of patients’ privacy. In Western cultures privacy is focused on the individual, however, in some non-Western cultures, privacy is linked to the collectivism of the community or religion. Objectives: The objective of this study is to describe the factors related to the realisation of privacy of Somali refugees in health care by describing the factors related to the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  27
    Users or Students? Privacy in University MOOCS.Meg Leta Jones & Lucas Regner - 2016 - Science and Engineering Ethics 22 (5):1473-1496.
    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  46. Property, privacy and personhood in a world of ambient intelligence.Niels van Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
    Profiling technologies are the facilitating force behind the vision of Ambient Intelligence in which everyday devices are connected and embedded with all kinds of smart characteristics enabling them to take decisions in order to serve our preferences without us being aware of it. These technological practices have considerable impact on the process by which our personhood takes shape and pose threats like discrimination and normalisation. The legal response to these developments should move away from a focus on entitlements to personal (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  28
    Human-driven design of micro- and nanotechnology based future sensor systems.Veikko Ikonen, Eija Kaasinen, Päivi Heikkilä & Marketta Niemelä - 2015 - Journal of Information, Communication and Ethics in Society 13 (2):110-129.
    Purpose – This paper aims to present an overview of the various ethical, societal and critical issues that micro- and nanotechnology-based small, energy self-sufficient sensor systems raise in different selected application fields. An ethical approach on the development of these technologies was taken in a very large international, multitechnological European project. The authors approach and methodology are presented in the paper and, based on this review, the authors propose general principles for this kind of work. Design/methodology/approach – The authors’ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48. Privacy and Machine Learning- Based Artificial Intelligence: Philosophical, Legal, and Technical Investigations.Haleh Asgarinia - 2024 - Dissertation, Department of Philisophy, University of Twente
    This dissertation consists of five chapters, each written as independent research papers that are unified by an overarching concern regarding information privacy and machine learning-based artificial intelligence (AI). This dissertation addresses the issues concerning privacy and AI by responding to the following three main research questions (RQs): RQ1. ‘How does an AI system affect privacy?’; RQ2. ‘How effectively does the General Data Protection Regulation (GDPR) assess and address privacy issues concerning both individuals and groups?’; and RQ3. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. Group privacy: a defence and an interpretation.Luciano Floridi - 2016 - In Bart van der Sloot, Luciano Floridi & Linnet Taylor (eds.), Group privacy. Springer Verlag.
    In this chapter I identify three problems affecting the plausibility of group privacy and argue in favour of their resolution. The first problem concerns the nature of the groups in question. I shall argue that groups are neither discovered nor invented, but designed by the level of abstraction (LoA) at which a specific analysis of a social system is developed. Their design is therefore justified insofar as the purpose, guiding the choice of the LoA, is justified. This should (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  50.  56
    Exploring How Personality Affects Privacy Control Behavior on Social Networking Sites.Yuhui Li, Zhaoxing Huang, Yenchun Jim Wu & Zhiqiang Wang - 2019 - Frontiers in Psychology 10:468452.
    Few studies have examined the relationship between personality traits and social networking sites (SNSs) with a dominant concentration on the personality alterations under SNSs influence. The relationship between personality and privacy control was less focused and discussed. In order to figure out the internal mechanism of such link among youth SNSs users, the Theory of Planned Behavior (TPB) was extended by including Five-Factor Model of Personality to explore how personality traits interact with privacy control behavior on SNSs. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
1 — 50 / 979