Results for 'online privacy policies'

981 found
Order:
  1.  45
    Do online privacy policies and seals affect corporate trustworthiness and reputation?Yohko Orito, Kiyoshi Murata & Yasunori Fukuta - 2013 - International Review of Information Ethics 19:52-65.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   40 citations  
  3.  3
    Strategic Indeterminacy and Online Privacy Policies: (Un)informed Consent and the General Data Protection Regulation.Daniel Green - 2025 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 38 (2):701-729.
    Article 12 of the General Data Protection Regulation (GDPR) requires data controllers to provide data subjects with any information relating to data processing operations “in a concise, transparent, intelligible and easily accessible form, using clear and plain language.” Linguistic inclusivity of privacy policies is no longer a matter of style, but has been a binding legal requirement under the new data protection framework. Article 5 GDPR sets forth the requirements of lawfulness, fairness and transparency and prohibits any data (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  83
    A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent.Irene Pollach - 2005 - Journal of Business Ethics 62 (3):221-235.
    The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  5.  28
    Do managerial ethics and legal education influence online privacy policies in Greater China?David C. Li - 2018 - Asian Journal of Business Ethics 7 (2):117-136.
    This study evaluated the online privacy policies of business-to-consumer e-commerce firms in five industries of mainland China, Taiwan, and Hong Kong. Based on the neo-institutional theory, we also tested whether the four institutional factors, top management’s legal education, managerial ethics, rule of law in information privacy protection and peer practices, had any effects on e-information and e-communication content. Results from a content analysis of 229 websites found that the privacy policy contents that complied with generally (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  6.  22
    Let’s agree to differ: varying interpretations of online privacy policies.Steve McRobb - 2006 - Journal of Information, Communication and Ethics in Society 4 (4):215-228.
    During the period of growth of e‐commerce, e‐business and online life in general, trust has been identified by a number of authors as a key factor, the absence of which can act as a powerful disincentive to an individual’s engagement in a transaction. This has encouraged a great deal of research into the various facets of trust in an online environment, both theoretical and empirical. One of the many recommendations for business practice that have emerged from this research (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7.  35
    Facilitating online privacy on eCommerce websites: an Australian experience.Alicia Ladson & Bardo Fraunholz - 2005 - Journal of Information, Communication and Ethics in Society 3 (2):59-68.
    As traditional organizations using their websites for eCommerce transactions are increasing at an exponential rate, privacy concerns of users are also on the rise. To gain an insight into these concerns, existing policies and legislation, we conducted the research reported in this paper, in 2003. To augment the literature synthesis, a multiple case study analysis was conducted, based on six large organisations in Australia. Our research findings suggested that in the Australian context, an online privacy policy (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  8.  26
    Online privacy behavior among youth in the Global South.Jan Michael Alexandre Cortez Bernadas & Cheryll Ruth Soriano - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):17-30.
    Purpose The purpose of this paper is two-fold. First, it explores the extent to which diversity of connectivity or the connection through multiple internet access points may facilitate online privacy behavior. Second, it explains the diversity of connectivity-online privacy behavior link in terms of information literacy. Design/methodology/approach Situated in the context of urban poor youth in the Philippines, this paper used a quantitative approach, specifically an interview-administered survey technique. Respondents were from three cities in Metro Manila. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  34
    Theory and policy in online privacy.Sameer Hinduja - 2004 - Knowledge, Technology & Policy 17 (1):38-58.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  16
    Closing the Barn Door: The Effect of Parental Supervision on Canadian Children's Online Privacy.Cheryl Webster & Valerie Steeves - 2008 - Bulletin of Science, Technology and Society 28 (1):4-19.
    Empirical data from a large sample of Canadian youth aged 13 to 17 years suggest that, although the current privacy policy framework is having a positive effect on the extent to which young people are complying with the types of behavior promoted by adults as privacy protective, its primary focus on parental supervision is inadequate to fully protect children's online privacy. Respondents with high levels of either social interaction or identity play are more likely than those (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  28
    Correction to: Which Privacy Policy Works, Privacy Assurance or Personalization Declaration? An Investigation of Privacy Policies and Privacy Concerns.Fue Zeng, Qing Ye, Zhilin Yang, Jing Li & Yiping Amy Song - 2020 - Journal of Business Ethics 176 (4):799-799.
    The initial online publication contained a typesetting mistake in the author information. The original article has been corrected.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  12. From Procedural Rights to Political Economy: New Horizons for Regulating Online Privacy.Daniel Susser - 2023 - In Sabine Trepte & Philipp K. Masur, The Routledge Handbook of Privacy and Social Media. Routledge. pp. 281-290.
    The 2010s were a golden age of information privacy research, but its policy accomplishments tell a mixed story. Despite significant progress on the development of privacy theory and compelling demonstrations of the need for privacy in practice, real achievements in privacy law and policy have been, at best, uneven. In this chapter, I outline three broad shifts in the way scholars (and, to some degree, advocates and policy makers) are approaching privacy and social media. First, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  63
    Young people online and the social value of privacy.Valerie Steeves & Priscilla Regan - 2014 - Journal of Information, Communication and Ethics in Society 12 (4):298-313.
    Purpose– The purpose of this paper is to develop a conceptual framework to contextualize young people’s lived experiences of privacy and invasion online. Social negotiations in the construction of privacy boundaries are theorized to be dependent on individual preferences, abilities and context-dependent social meanings.Design/methodology/approach– Empirical findings of three related Ottawa-based studies dealing with young people’s online privacy are used to examine the benefits of online publicity, what online privacy means to young people (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  14.  31
    Users or Students? Privacy in University MOOCS.Meg Leta Jones & Lucas Regner - 2016 - Science and Engineering Ethics 22 (5):1473-1496.
    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15. Privacy Rights On The Internet: Self-Regulation Or Government Regulation?Norman E. Bowie & Karim Jamal - 2006 - Business Ethics Quarterly 16 (3):323-342.
    Consumer surveys indicate that concerns about privacy are a principal factor discouraging consumers from shopping online. The keypublic policy issue regarding privacy is whether the US should follow its current self-regulation course, or whether a European style formal legal regulation approach should be adopted in the US.We conclude that the use of assurance seals has worked reasonably well and websites should be free to decide whether they have aprivacy seal or not. Given the narrow scope and the (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  16.  97
    Privacy and Social Networking Technology.Richard A. Spinello - 2011 - International Review of Information Ethics 16:12.
    This paper reviews Facebook's controversial privacy policies as a basis for considering how social network sites can better protect the personal information of their users. We argue that Facebook's architecture leaves its users too exposed, especially to online surveillance. This architecture must be modified and Facebook must be more proactive in safeguarding the rights of their customers as it seeks to find the proper balance between user privacy and its commercial interests.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  18. Online consent: how much do we need to know?Bartek Chomanski & Lode Lauwaert - forthcoming - AI and Society.
    This paper argues, against the prevailing view, that consent to privacy policies that regular internet users usually give is largely unproblematic from the moral point of view. To substantiate this claim, we rely on the idea of the right not to know (RNTK), as developed by bioethicists. Defenders of the RNTK in bioethical literature on informed consent claim that patients generally have the right to refuse medically relevant information. In this article we extend the application of the RNTK (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  20
    Privacy at risk? Understanding the perceived privacy protection of health code apps in China.Wenhong Chen, An Hu & Gejun Huang - 2022 - Big Data and Society 9 (2).
    As a key constituent of China's approach to fighting COVID-19, Health Code apps (HCAs) not only serve the pandemic control imperatives but also exercise the agency of digital surveillance. As such, HCAs pave a new avenue for ongoing discussions on contact tracing solutions and privacy amid the global pandemic. This article attends to the perceived privacy protection among HCA users via the lens of the contextual integrity theory. Drawing on an online survey of adult HCA users in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  28
    Automated informed consent.Adam Andreotta & Bjorn Lundgren - 2024 - Big Data and Society 11 (4).
    Online privacy policies or terms and conditions ideally provide users with information about how their personal data are being used. The reality is that very few users read them: they are long, often hard to understand, and ubiquitous. The average internet user cannot realistically read and understand all aspects that apply to them and thus give informed consent to the companies who use their personal data. In this article, we provide a basic overview of a solution to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  25
    Online consent: how much do we need to know?Bartlomiej Chomanski & Lode Lauwaert - 2024 - AI and Society 39 (6):2879-2889.
    This paper argues, against the prevailing view, that consent to privacy policies that regular internet users usually give is largely unproblematic from the moral point of view. To substantiate this claim, we rely on the idea of the right not to know (RNTK), as developed by bioethicists. Defenders of the RNTK in bioethical literature on informed consent claim that patients generally have the right to refuse medically relevant information. In this article we extend the application of the RNTK (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Brain Data in Context: Are New Rights the Way to Mental and Brain Privacy?Daniel Susser & Laura Y. Cabrera - 2023 - American Journal of Bioethics Neuroscience 15 (2):122-133.
    The potential to collect brain data more directly, with higher resolution, and in greater amounts has heightened worries about mental and brain privacy. In order to manage the risks to individuals posed by these privacy challenges, some have suggested codifying new privacy rights, including a right to “mental privacy.” In this paper, we consider these arguments and conclude that while neurotechnologies do raise significant privacy concerns, such concerns are—at least for now—no different from those raised (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  23. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  41
    eID policy in a turbulent environment: is there a need for a new regulatory framework? [REVIEW]Wainer Lusoli, Ioannis Maghiros & Margherita Bacigalupo - 2008 - Identity in the Information Society 1 (1):173-187.
    There is increasing interest in the EU about the central place of eIdentity (eID) in people’s lives. eID is increasingly seen as a bridge between the commercial viability of models based on large-scale provision of e-services and users’ need for privacy and security in online transactions. This paper examines technological, social and legal developments in the field of eID and asks whether there is the need for a new regulatory framework that both preserves users’ identity and enables the (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  38
    The omics of our lives: practices and policies of direct-to-consumer epigenetic and microbiomic testing companies.Terese Knoppers, Elisabeth Beauchamp, Ken Dewar, Sarah Kimmins, Guillaume Bourque, Yann Joly & Charles Dupras - 2021 - New Genetics and Society 40 (4):541-569.
    While much attention has gone towards ethical, legal, and social implications of direct-to-consumer genetic testing over the past decades, the rise of new forms of consumer omics has largely escaped scrutiny. In this paper, we analyze the product descriptions, promotional messages, terms of service, and privacy policies of five epigenetic and seven microbiomic testing companies. The advent of such tests online represents a significant shift in consumer omics, from a focus on inherited molecules with genetic tests, to (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  32
    Disclosure to genetic relatives without consent – Australian genetic professionals’ awareness of the health privacy law.Jane Fleming, Ainsley J. Newson, Kate Dunlop, Kristine Barlow-Stewart & Natalia Meggiolaro - 2020 - BMC Medical Ethics 21 (1):1-10.
    Background: When a genetic mutation is identified in a family member, internationally, it is usually the proband’s or another responsible family member’s role to disclose the information to at-risk relatives. However, both active and passive non-disclosure in families occurs: choosing not to communicate the information or failing to communicate the information despite intention to do so, respectively. The ethical obligations to prevent harm to at-risk relatives and promote the duty of care by genetic health professionals is in conflict with (...) laws and professional regulations that prohibits disclosure of information to a third party without the consent of the proband. In New South Wales, Australia, amendments to Privacy legislation permits such disclosure to living genetic relatives with the process defined under guidelines although there is no legal duty to warn. This study assessed NSW GHP’s awareness and experience of the legislation and guidelines. Methods: An online survey collected demographics; theoretical knowledge; clinical scenarios to assess application knowledge; attitudes; confidence; experience with active non-disclosure. A link to correct answers was provided after completion. Knowledge scores above the median for non-parametric data or above the mean for parametric data were classified as ‘good’ or ‘poor’. Chi square tests assessed associations between confidence and knowledge scores. Results: While many of the 37 participants reported reading the guidelines, there was limited awareness of their scope and clinical application; that there is no legal duty to warn; and that the threat does not need to be imminent to warrant disclosure. No association between confidence and ‘good’ theoretical or applied clinical knowledge was identified. Uncertainty of their professional responsibility was identified and in the several case examples of active non-disclosure that were reported this uncertainty reflected the need for further understanding of the guidelines in regard to the processes required before disclosure was initiated. Conclusions: There is a need for further education and training about the guidelines associated with the legislation that would be relevant to support disclosure. The findings may inform future strategies to support introduction of policy changes in other jurisdictions where similar regulatory regimes are introduced. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27.  98
    Public sector engagement with online identity management.D. Barnard-Wills & D. Ashenden - 2010 - Identity in the Information Society 3 (3):657-674.
    The individual management of online identity, as part of a wider politics of personal information, privacy, and dataveillance, is an area where public policy is developing and where the public sector attempts to intervene. This paper attempts to understand the strategies and methods through which the UK government and public sector is engaging in online identity management. The analysis is framed by the analytics of government (Dean 2010 ) and governmentality (Miller and Rose 2008 ). This approach (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  28.  71
    The introduction of online authentication as part of the new electronic national identity card in Germany.Torsten Noack & Herbert Kubicek - 2010 - Identity in the Information Society 3 (1):87-110.
    This chapter provides an analysis of the long process of introducing an electronic identity for online authentication in Germany. This process is described as a multi-facet innovation, involving actors from different policy fields shifting over time. The eID process started in the late ‘90s in the context of eGovernment and eCommerce with the legislation on e-signatures, which were supposed to allow for online authentication of citizens. When after 5 years it was recognized that this was not the case, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  29.  55
    The ethical and policy implications of e-health and telemedicine: an ageing-focused review.Oonagh Thompson, Giorgos Koumanakos & Karim Hadjri - 2012 - Clinical Ethics 7 (4):147-156.
    E-health and telemedicine programmes and systems offer much potential for supporting the health and wellbeing of older people, and are set to be promoted within the changing health-care landscape. This evolving model of technology-centred health care raises a number of ethical and regulatory issues, such as privacy, data protection, online professional practice, consent, accessibility and risk of confinement. Through this review we sought to analyse the European debate on the ethical and policy implications of e-health and telemedicine by (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30. Behavioural public policies and charitable giving.Luc Bovens - 2018 - Behavioural Public Policy 2 (2):168-173.
    Some of the challenges in Sanders et al. (this issue) can be aptly illustrated by means of charity nudges, that is, nudges designed to increase charitable donations. These nudges raise many ethical questions. First, Oxfam’s triptychs with suggested donations are designed to increase giving. If successful, do our actions match ex ante or ex post preferences? Does this make a difference to the autonomy of the donor? Second, the Behavioural Insights Team conducted experiments using social networks to nudge people to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  29
    Public attitudes towards genomic data sharing: results from a provincial online survey in Canada.Proton Rahman, Daryl Pullman, Charlene Simmonds, Georgia Darmonkov & Holly Etchegary - 2023 - BMC Medical Ethics 24 (1):1-10.
    BackgroundWhile genomic data sharing can facilitate important health research and discovery benefits, these must be balanced against potential privacy risks and harms to individuals. Understanding public attitudes and perspectives on data sharing is important given these potential risks and to inform genomic research and policy that aligns with public preferences and needs.MethodsA cross sectional online survey measured attitudes towards genomic data sharing among members of the general public in an Eastern Canadian province.ResultsResults showed a moderate comfort level with (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  28
    Which Privacy Policy Works, Privacy Assurance or Personalization Declaration? An Investigation of Privacy Policies and Privacy Concerns.Fue Zeng, Qing Ye, Zhilin Yang, Jing Li & Yiping Amy Song - 2020 - Journal of Business Ethics 176 (4):781-798.
    This study focuses on two specific privacy policies, namely privacy assurance and personalization declaration. Specifically, we investigate how these distinct privacy policies affect customers’ privacy concerns and subsequent purchase responses. We have developed a conceptual model that addresses the independent effects of privacy assurance and personalization declaration, as well as the mechanism of these effects. Our model is grounded in motivation theory and supported by a field experiment and a controlled experiment. Our study (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  70
    Ethical Implications of User Perceptions of Wearable Devices.L. H. Segura Anaya, Abeer Alsadoon, N. Costadopoulos & P. W. C. Prasad - 2018 - Science and Engineering Ethics 24 (1):1-28.
    Health Wearable Devices enhance the quality of life, promote positive lifestyle changes and save time and money in medical appointments. However, Wearable Devices store large amounts of personal information that is accessed by third parties without user consent. This creates ethical issues regarding privacy, security and informed consent. This paper aims to demonstrate users’ ethical perceptions of the use of Wearable Devices in the health sector. The impact of ethics is determined by an online survey which was conducted (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  34.  28
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of 26.7% (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35. (1 other version)Online privacy as a corporate social responsibility: an empirical study.Irene Pollach - 2011 - Business Ethics, the Environment and Responsibility 20 (1):88-102.
    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two. Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. The findings indicate that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  36.  11
    Cyber law and ethics: regulation of the connected world.Mark Grabowski - 2021 - New York: Taylor & Francis. Edited by Eric P. Robinson.
    A primer on legal issues relating to cyberspace, this textbook introduces business, policy and ethical considerations raised by our use of information technology. With a focus on the most significant issues impacting internet users and businesses in the United States of America, the book provides coverage of key topics such as social media, online privacy, artificial intelligence, and cybercrime as well as emerging themes such as doxing, ransomware, revenge porn, data-mining, e-sports and fake news. The authors, experienced in (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  19
    Surveillance following Snowden: a major challenge in Spain.Andrew A. Adams, Mario Arias-Oliva, Ana María Lara Palma & Kiyoshi Murata - 2017 - Journal of Information, Communication and Ethics in Society 15 (3):265-282.
    Purpose This study aims to analyse the impacts of Edward Snowden’s revelations in Spain focusing on issues of privacy and state surveillance. This research takes into consideration the Spanish context from a multidimensional perspective: social, cultural, legal and political. Design/methodology/approach The paper reviews the Spanish privacy and state surveillance situation. Responses to a questionnaire were collected from 207 university students studying at Universitat Rovira i Virgili or Burgos University. The quantitative responses to the survey were statistically analysed as (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  15
    Rethinking informed consent in the big data age.Adam J. Andreotta - 2024 - New York, NY: Routledge.
    In the "big data age", providing informed consent online has never been more challenging. Countless companies collect and share our personal data through devices, apps, and websites, fuelling a growing data economy and the emergence of surveillance capitalism. Few of us have the time to read the associated privacy policies and terms and conditions, and thus are often unaware of how our personal data are being used. This is a problem, as in the last few years, large (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  27
    Online privacy: Explaining the nature and special features of the right to seek protection.Varvara Z. Mitliaga - 2004 - Journal of Information, Communication and Ethics in Society 2 (3):159-167.
    This article attempts to explain and analyse the nature and characteristic features of a person’s privacy in the on‐line environment in order to assess how these features shape the need for protection. Since the internet has invaded our everyday lives, individual privacy is exposed in different ways in cyberspace. It is important to note that the Internet lacks the traditional characteristics of a ‘physical’ space, but the interests and inherent values protected by privacy remain the same in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  8
    Electronic Data Bases and Privacy: Policy for the 1990s.Susan H. Gray - 1989 - Science, Technology and Human Values 14 (3):242-257.
    This article reviews the debate over electronic data bases and privacy, with an emphasis on the United States since the Privacy Act of 1974. Proposals that have value for the 1990s, both nationally and internationally, are synthesized. Some current controversies are discussed, including some of the reasons for the failure of previous privacy legislation. The way social values affect both statistical and intelligence systems is reviewed, and the debate over organizational necessity and computerization is examined. Some controversial (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  41. Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?Amandeep Dhir, Torbjørn Torsheim, Ståle Pallesen & Cecilie S. Andreassen - 2017 - Frontiers in Psychology 8.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  42. Technology, autonomy, and manipulation.Daniel Susser, Beate Roessler & Helen Nissenbaum - 2019 - Internet Policy Review 8 (2).
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence (...)
    Direct download  
     
    Export citation  
     
    Bookmark   39 citations  
  43.  37
    Youth and online privacy: a cross-border study in the Basque Country.Eneko Bidegain, Amaia Arroyo Sagasta, Koldo Diaz Bizkarguenaga, Aitor Zuberogoitia, Eneko Antón & Ixiar Rozas - 2022 - Journal of Information, Communication and Ethics in Society 20 (1):54-71.
    Purpose This study aims to explore the main concerns and attitudes Basque adolescents have regarding online privacy. It analyzes their motivations for sharing private information and the kind of information they share. Likewise, it examines whether they consider the potential consequences of revealing certain information online and analyzes if there are any differences between the motivations and attitudes of young people from Gipuzkoa and Labourd. Design/methodology/approach For this study, three methods were combined to collect the data in (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns.Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107-123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers' (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  45.  33
    Power to the Users.Tomer Shadmy - 2023 - Law and Ethics of Human Rights 17 (2):167-204.
    Major online platforms deploy an array of policies and data-driven legislative and enforcement mechanisms, transforming economic, social, and technological powers into political might. While platforms use private law to legitimate the exercise of this form of power, the novel political relations and tools have a tremendous public impact, both on individuals’ and communities’ political freedom and on the public sphere. Digital rights literature that tends to focus on particular rights, such as privacy or freedom of expression, deals (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  52
    Human Flesh Search Engine and Online Privacy.Yang Zhang & Hong Gao - 2016 - Science and Engineering Ethics 22 (2):601-604.
    Human flesh search engine can be a double-edged sword, bringing convenience on the one hand and leading to infringement of personal privacy on the other hand. This paper discusses the ethical problems brought about by the human flesh search engine, as well as possible solutions.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Theoretical conceptualization of online privacy-related decision making – Introducing the tripartite self-disclosure decision model.Sina Ostendorf & Matthias Brand - 2022 - Frontiers in Psychology 13.
    Self-disclosures on online social networks have received increased attention in the last two decades. Researchers from different disciplines investigated manifold influencing variables, and studies applied different theories to explain why many users share very sensitive and personal information despite potential risks and negative consequences, whereas others do not. Oftentimes, it is argued that self-disclosure decisions result from a kind of rational “calculus” of risks and benefits. However, such an assumption of rationality can and has been criticized. Nevertheless, fundamental cognitive (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  21
    DoubleClick and Consumer Online Privacy: An E‐Commerce Lesson Learned.Thomas A. Hemphill - 2000 - Business and Society Review 105 (3):361-372.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  39
    The Complexity Underlying JetBlue's Privacy Policy Violations.Annie I. Antón, Qingfeng He & David L. Baumer - forthcoming - Complexity.
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  68
    A software platform to analyse the ethical issues of electronic patient privacy policy: the S3P example.M. A. Mizani & N. Baykal - 2007 - Journal of Medical Ethics 33 (12):695-698.
    Paper-based privacy policies fail to resolve the new changes posed by electronic healthcare. Protecting patient privacy through electronic systems has become a serious concern and is the subject of several recent studies. The shift towards an electronic privacy policy introduces new ethical challenges that cannot be solved merely by technical measures. Structured Patient Privacy Policy (S3P) is a software tool assuming an automated electronic privacy policy in an electronic healthcare setting. It is designed to (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 981