Results for 'privacy, equality, security, CCTV, Japser Ryberg'

978 found
Order:
  1. Mrs. Aremac and the camera: A response to Ryberg.Annabelle Lever - 2008 - Res Publica 14 (1):35-42.
    In a recent article in Respublica, Jesper Ryberg argues that CCTV can be compared to a little old lady gazing out onto the street below. This article takes issue with the claim that government surveillance can be justified in this manner. Governments have powers and responsibilities that little old ladies lack. Even if CCTV is effective at preventing crime, there may be less intrusive ways of doing so. People have a variety of legitimate interests in privacy, and protection for (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  2. (2 other versions)Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63 (4):99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  58
    On Privacy.Annabelle Lever - 2011 - Routledge.
    This book explores the Janus-faced features of privacy, and looks at their implications for the control of personal information, for sexual and reproductive freedom, and for democratic politics. It asks what, if anything, is wrong with asking women to get licenses in order to have children, given that pregnancy and childbirth can seriously damage your health. It considers whether employers should be able to monitor the friendships and financial affairs of employees, and whether we are entitled to know whenever someone (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  4. Privacy rights, crime prevention, CCTV, and the life of mrs aremac.Jesper Ryberg - 2007 - Res Publica 13 (2):127-143.
    Over the past decade the use of closed circuit television (CCTV) as a means of crime prevention has reached unprecedented levels. Though critics of this development do not speak with one voice and have pointed to a number of different problems in the use of CCTV, one argument has played a dominant role in the debate, namely, that CCTV constitutes an unacceptable violation of people’s right to privacy. The purpose of this paper is to examine this argument critically. It is (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  5. Privacy vs. security: Why privacy is not an absolute value or right.Kenneth Einar Himma - manuscript
    In this essay, I consider the relationship between the rights to privacy and security and argue that, in a sense to be made somewhat more precise below, that threats to the right to security outweighs comparable threats to privacy. My argument begins with an assessment of ordinary case judgments and an explanation of the important moral distinction between intrinsic value (i.e., value as an end) and instrumental value (i.e., value as a means), arguing that each approach assigns more moral value, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  6.  66
    The difference between lonely old ladies and CCTV cameras: A response to Ryberg.Benjamin Goold - 2008 - Res Publica 14 (1):43-47.
    This article considers the question of whether it is meaningful to speak of privacy rights in public spaces, and the possibility of such rights framing the basis for regulating or restricting the use of surveillance technologies such as closed circuit television (CCTV). In particular, it responds to a recent article by Jesper Ryberg that suggests that there is little difference between being watched by private individuals and CCTV cameras, and instead argues that state surveillance is qualitatively different from (and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  7.  15
    Health Information Privacy: A Disappearing Concept.Marcia J. Weiss - 2000 - Bulletin of Science, Technology and Society 20 (2):115-122.
    Rapid advances and exponential growth in computer and telecommunications technology have taken individual records and papers revealing the most intimate details of one’s life, habits, and genetic predisposition from the private sector into the public arena in derogation of privacy considerations. Although computerized medical information offers a means of streamlining and improving the health care delivery system through speed and enormous storage capacity, it also presents new challenges as it affects the right of privacy and expectation of confidentiality, creating serious (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  61
    Algorithms and values in justice and security.Paul Hayes, Ibo van de Poel & Marc Steen - 2020 - AI and Society 35 (3):533-555.
    This article presents a conceptual investigation into the value impacts and relations of algorithms in the domain of justice and security. As a conceptual investigation, it represents one step in a value sensitive design based methodology. Here, we explicate and analyse the expression of values of accuracy, privacy, fairness and equality, property and ownership, and accountability and transparency in this context. We find that values are sensitive to disvalue if algorithms are designed, implemented or deployed inappropriately or without sufficient consideration (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  9.  39
    The Double Helix: Applying an Ethic of Care to the Duty to Warn Genetic Relatives of Genetic Information.Meaghann Weaver - 2015 - Bioethics 30 (3):181-187.
    Genetic testing reveals information about a patient's health status and predictions about the patient's future wellness, while also potentially disclosing health information relevant to other family members. With the increasing availability and affordability of genetic testing and the integration of genetics into mainstream medicine, the importance of clarifying the scope of confidentiality and the rules regarding disclosure of genetic findings to genetic relatives is prime. The United Nations International Declaration on Human Genetic Data urges an appreciation for principles of equality, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  10.  27
    Technology, individual rights and the ethical evaluation of risk.Lanre-Abass Bolatito Asiata - 2010 - Journal of Information, Communication and Ethics in Society 8 (4):308-322.
    PurposeThe purpose of this paper is to examine the risk arising from technological devices, such as closed circuit television and nuclear power plants and the consequent effect on the rights to privacy and security of individuals.Design/methodology/approachThe paper presents critical and conceptual analyses of CCTV, nuclear power plants and the rights of individuals. It also analyses how communitarianism and liberal individualism would respond to right‐infringements and risk‐imposition. It draws on W.D. Ross's prima facie and actual duties to explain the pre‐eminence of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  11.  45
    The Internet of Humans (IoH): Human Rights and Co-Governance to Achieve Tech Justice in the City.Anna Berti Suman, Elena De Nictolis & Christian Iaione - 2019 - The Law and Ethics of Human Rights 13 (2):263-299.
    Internet of Things, Internet of Everything and Internet of People are concepts suggesting that objects, devices, and people will be increasingly interconnected through digital infrastructure that will generate a growing gathering of data. Parallel to this development is the celebration of the smart city and sharing city as urban policy visions that by relying heavily on new technologies bear the promise of efficient and thriving cities. Law and policy scholarship have either focused on questions related to privacy, discrimination, security, or (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  33
    Privacy and Security Issues with Mobile Health Research Applications.Stacey A. Tovino - 2020 - Journal of Law, Medicine and Ethics 48 (S1):154-158.
    This article examines the privacy and security issues associated with mobile application-mediated health research, concentrating in particular on research conducted or participated in by independent scientists, citizen scientists, and patient researchers. Building on other articles in this issue that examine state research laws and state data protection laws as possible sources of privacy and security protections for mobile research participants, this article focuses on the lack of application of federal standards to mobile application-mediated health research. As discussed in more detail (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  92
    Computer Ethics: A Global Perspective.Giannis Stamatellos - 2007 - Jones & Bartlett.
    The rapid advancement of information technology in modern societies affects the way we live, communicate, work, and entertain. Computers and computer networks formulate an information age in which traditional ethical questions are re-examined and new questions arise concerning moral standards for human behavior. Computer Ethics: A Global Perspective presents a clear and concise introduction to the ethical and social issues sparked by our ever-growing information society at the local and global level. Designed for use as a main text in undergraduate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  16
    Privacy and Security within Biobanking: The Role of Information Technology.Raymond Heatherly - 2016 - Journal of Law, Medicine and Ethics 44 (1):156-160.
    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  61
    This has got nothing to do with George.Andrew Oberg - 2014 - Think 13 (37):47-55.
    Security cameras have become a ubiquitous part of everyday life in most major cities, yet each new camera seems to come with cries of foul play by defenders of privacy rights. Our long history with these cameras and CCTV networks does not seem to have alleviated our concerns with being watched, and as we feel ourselves losing privacy in other areas the worry generated by security cameras has remained. Our feelings of disquiet, however, are unnecessary as they stem from an (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  89
    Neuroscience, Mind Reading and Mental Privacy.Jesper Ryberg - 2017 - Res Publica 23 (2):197-211.
    Many theorists have expressed the view that current or future applications of neurotechnology may prompt serious ethical problems in terms of privacy. This article concerns the question as to whether involuntary neurotechnological mind reading can plausibly be held to violate a person’s moral right to mental privacy. It is argued that it is difficult to specify what a violation of a right to mental privacy amounts to in a way that is consistent with the fact that we usually regard natural (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  17.  31
    Neuroethics and Brain Privacy: Setting the Stage.Jesper Ryberg - 2017 - Res Publica 23 (2):153-158.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  18.  61
    Moral rights and the problem of privacy in public: A reply to Lever and Goold.Jesper Ryberg - 2008 - Res Publica 14 (1):49-56.
  19. Ethical aspects of facial recognition systems in public places.Philip Brey - 2004 - Journal of Information, Communication and Ethics in Society 2 (2):97-109.
    This essay examines ethical aspects of the use of facial recognition technology for surveillance purposes in public and semipublic areas, focusing particularly on the balance between security and privacy and civil liberties. As a case study, the FaceIt facial recognition engine of Identix Corporation will be analyzed, as well as its use in “Smart” video surveillance systems in city centers and airports. The ethical analysis will be based on a careful analysis of current facial recognition technology, of its use in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  20.  18
    4. Privacy and Security Policy: The Historical Situation.Gregory J. Walters - 2001 - In Human Rights in an Information Age a Philosophical Analysis. University of Toronto Press. pp. 117-149.
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  14
    5. Privacy and Security: An Ethical Analysis.Gregory J. Walters - 2001 - In Human Rights in an Information Age a Philosophical Analysis. University of Toronto Press. pp. 150-186.
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  9
    Cop to Cop: Negotiating Privacy and Security in the Examining Room.Sondra S. Crosby & George J. Annas - 2020 - Journal of Law, Medicine and Ethics 48 (1):169-171.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  60
    Perspective: Privacy and Security for Electronic Health Records.Virginia A. Sharpe - 2005 - Hastings Center Report 35 (6):c3-c3.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  24. A Sense of Proportion: Some Thoughts on Equality, Security and Justice.Annabelle Lever - 2020 - Res Publica 26 (3):357-371.
    This article develops an intuitive idea of proportionality as a placeholder for a substantive conception of equality, and contrasts it with Ripstein’s ideas, as presented in an annual guest lecture to the Society of Applied Philosophy in 2016. It uses a discussion of racial profiling to illustrate the conceptual and normative differences between the two. The brief conclusion spells out my concern that talk of ‘proportionality’, though often helpful and, sometimes, necessary for moral reasoning, can end up concealing, rather than (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  59
    Surgical castration, coercion and ethics.Jesper Ryberg & Thomas S. Petersen - 2014 - Journal of Medical Ethics 40 (9):593-594.
    John McMillan's detailed ethical analysis concerning the use of surgical castration of sex offenders in the Czech Republic and Germany is mainly devoted to considerations of coercion.1 This is not surprising. When castration is offered as an option to offenders and, at the same time, constitutes the only means by which these offenders are likely to be released from prison, it is reasonable—and close to the heart of modern medical ethics—to consider whether the offer involves some kind of coercion. However, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  23
    "We Live on Hope…" Ethical Considerations of Humanitarian Use of Drones in Post-Disaster Nepal.Ning Wang - 2020 - IEEE Technology and Society Magazine 39 (3):76-85.
    The noticeable turn to technology in humanitarian action raises issues related to humanitarianism, sovereignty, as well as equality and access for at-risk populations in disaster zones or remote areas lacking sufficient healthcare services. On a technical level, practical challenges include heightened risks of data safety and security, and the potential malicious use of technology. On a societal level, humanitarian innovation may disrupt relations between different stakeholders, may widen inequality between those with access and those without, and may threaten privacy, disproportionately (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. Security and Privacy Protection in Developing Ethical AI: A Mixed-Methods Study from a Marketing Employee Perspective.Xuequn Wang, Xiaolin Lin & Bin Shao - forthcoming - Journal of Business Ethics:1-20.
    Despite chatbots’ increasing popularity, firms often fail to fully achieve their benefits because of their underutilization. We argue that ethical concerns dealing with chatbot-related privacy and security may prevent firms from developing a culture of embracing chatbot use and fully integrating chatbots into their workflows. Our research draws upon the stimulus-organism-response theory (SOR) and a study by Floridi et al. (Minds and Machines, 28:689–707, 2018 ) on the ethical artificial intelligence framework to investigate how chatbot affordances can foster employees’ positive (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  28. Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made such surveillance relatively unobtrusive. Video (...)
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  29. Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
    I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides a (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  30.  38
    Privacy, Security and Accountability: Ethics, Law and Policy.Adam D. Moore (ed.) - 2015 - New York: Rowman & Littlefield International.
    This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these important individual and social values.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  9
    The Emergence of State Data Privacy and Security Laws Affects Employers.Joseph J. Lazzarotti - unknown - Emergence: Complexity and Organization 1:1-2008.
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  15
    Ethical issues related to eHealth: An integrative review.Anu Jokinen, Minna Stolt & Riitta Suhonen - 2021 - Nursing Ethics 28 (2):253-271.
    Background: Identifying and safeguarding ethics in eHealth services from the service users’ perspective in social care and healthcare is important. The use of eHealth services should not prejudice the quality of services or the social interaction required in care. There is a lack of studies about the ethics of eHealth services from the service users’ perspective. Aim: The aim of this study is to identify and analyse ethical issues related to eHealth in social care and healthcare from the service users’ (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  33. (1 other version)Must privacy and sexual equality conflict? A philosophical examination of some legal evidence.Annabelle Lever - 2001 - Social Research: An International Quarterly 67 (4):1137-1171.
    Are rights to privacy consistent with sexual equality? In a brief, but influential, article Catherine MacKinnon trenchantly laid out feminist criticisms of the right to privacy. In “Privacy v. Equality: Beyond Roe v. Wade” she linked familiar objections to the right to privacy and connected them to the fate of abortion rights in the U.S.A. (MacKinnon, 1983, 93-102). For many feminists, the Supreme Court’s decision in Roe v. Wade (1973) had suggested that, notwithstanding a dubious past, legal rights to privacy (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  34.  72
    Privacy rights and public spaces: CCTV and the problem of the “unobservable observer”.Benjamin J. Goold - 2002 - Criminal Justice Ethics 21 (1):21-27.
    (2002). Privacy rights and public spaces: CCTV and the problem of the “unobservable observer”. Criminal Justice Ethics: Vol. 21, No. 1, pp. 21-27. doi: 10.1080/0731129X.2002.9992113.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35.  31
    Biometric Identification, Law and Ethics.Marcus Smith & S. R. M. Miller - unknown
    This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and DNA identification– as well the integration of biometric data with other forms of personal data, analyses key ethical concepts in play, including privacy, individual autonomy, collective responsibility, and joint ownership rights, and proposes (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  12
    Convergence of Diverse Expertise: A Multidisciplinary Training on the Ethics of Artificial Intelligence in Healthcare Technology and Research.Russell Franco D’Souza, Krishna Mohan Surapaneni, Sathyanarayanan P., Annamalai Regupathy, Mary Mathew, Vedprakash Mishra, Ani Grace Kalaimathi, Geethalakshmi Sekkizhar, Rajiv Tandon, Princy Louis Palatty & Vivek Mady - forthcoming - Journal of Academic Ethics:1-15.
    The integration of artificial intelligence (AI) into healthcare and research introduces sophisticated diagnostic and treatment capabilities but also raises significant ethical challenges from development to deployment and evaluation, requiring comprehensive ethical training and interdisciplinary collaboration to ensure the responsible use of AI technologies. The “CONNECT with AI”- Collaborative Opportunity to Navigate and Negotiate Ethical Challenges and Trials with Artificial Intelligence) workshop was a three-day event, engaging multi-institutional interdisciplinary and interprofessional participants (both industry professionals and academicians) from diverse fields such as (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37.  14
    Sentencing the Self-Convicted: The Ethics of Pleading Guilty.Julian V. Roberts & Jesper Ryberg (eds.) - 2023 - Bloomsbury.
    This book addresses the fundamental ethical and legal aspects, penal consequences, and social context arising from a citizen's acceptance of guilt. The focus is upon sentencing people who have pleaded guilty; in short, post-adjudication, rather than issues arising from discussions in the pretrial phase of the criminal process. The vast majority of defendants across all common law jurisdictions plead guilty and as a result receive a reduced sentence. Concessions by a defendant attract more lenient State punishment in all western legal (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  85
    Minding Rights: Mapping Ethical and Legal Foundations of ‘Neurorights’.Sjors Ligthart, Marcello Ienca, Gerben Meynen, Fruzsina Molnar-Gabor, Roberto Andorno, Christoph Bublitz, Paul Catley, Lisa Claydon, Thomas Douglas, Nita Farahany, Joseph J. Fins, Sara Goering, Pim Haselager, Fabrice Jotterand, Andrea Lavazza, Allan McCay, Abel Wajnerman Paz, Stephen Rainey, Jesper Ryberg & Philipp Kellmeyer - 2023 - Cambridge Quarterly of Healthcare Ethics 32 (4):461-481.
    The rise of neurotechnologies, especially in combination with artificial intelligence (AI)-based methods for brain data analytics, has given rise to concerns around the protection of mental privacy, mental integrity and cognitive liberty – often framed as “neurorights” in ethical, legal, and policy discussions. Several states are now looking at including neurorights into their constitutional legal frameworks, and international institutions and organizations, such as UNESCO and the Council of Europe, are taking an active interest in developing international policy and governance guidelines (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  39.  64
    Ontological security, existential anxiety and workplace privacy.William S. Brown - 2000 - Journal of Business Ethics 23 (1):61 - 65.
    The relationship of workers to management has traditionally been one of control. However, the introduction of increasingly sophisticated technology as a means of supervision in the modern workplace has dramatically altered the contours of this relationship, giving workers much less privacy and making workers much more visible than previously possible. The purpose of this paper is to examine the current state of technological control of workers and how it has altered the relationship of worker to organization, through the impact upon (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  6
    Considerations for trustworthy cross-border interoperability of digital identity systems in developing countries.Ayei Ibor, Mark Hooper, Carsten Maple, Jon Crowcroft & Gregory Epiphaniou - forthcoming - AI and Society:1-22.
    In developing nations, the implementation of Foundational Identity Systems (FIDS) has optimised service delivery and inclusive economic growth. Cross-border e-government will gain traction as developing countries increasingly look to identity federation and trustworthy interoperability through FIDS for the identification and authentication of identity holders. Despite this potential, the interoperability of FIDS in the African identity ecosystem has not been well-studied. Among the difficulties in this situation are the intricate internal political dynamics that have led to weak institutions, suggesting that FIDS (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  57
    Privacy and Equality in Diagnostic Genetic Testing.Tarja Nyrhinen, Marja Hietala, Pauli Puukka & Helena Leino-Kilpi - 2007 - Nursing Ethics 14 (3):295-308.
    This study aimed to determine the extent to which the principles of privacy and equality were observed during diagnostic genetic testing according to views held by patients or child patients' parents (n = 106) and by staff (n = 162) from three Finnish university hospitals. The data were collected through a structured questionnaire and analysed using the SAS 8.1 statistical software. In general, the two principles were observed relatively satisfactorily in clinical practice. According to patients/parents, equality in the post-analytic phase (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  42.  29
    Security, Equality, and the Clash of Ideas: Sweden's Evolving Anti-Trafficking Policy. [REVIEW]Gregg Bucken-Knapp, Johan Karlsson Schaffer & Karin Persson Strömbäck - 2012 - Human Rights Review 13 (2):167-185.
    Seeking to explain the emergence of anti-trafficking initiatives, scholars have explored two sets of ideas—national security and gender equality—thought to shape policy. In this study, we examine whether such ideational influence accounts for Sweden's evolving anti-trafficking policy over the past decade. As powerful domestic ideas about gender inequality informed the adoption of an abolitionist prostitution policy in the 1990s, one would expect similar ideas to influence domestic responses to the related issue of cross-border trafficking.However, our case study shows that the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  80
    Daniel J. Solove, Nothing to Hide: The False Tradeoff between Privacy and Security: New Haven and London: Yale University Press, 2011. ISBN 10:0300172311, $25.00, Hbk. [REVIEW]Tony Doyle - 2012 - Journal of Value Inquiry 46 (1):107-112.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  44.  36
    Researchers’ Ethical Concerns About Using Adaptive Deep Brain Stimulation for Enhancement.Kristin Kostick-Quenet, Lavina Kalwani, Barbara Koenig, Laura Torgerson, Clarissa Sanchez, Katrina Munoz, Rebecca L. Hsu, Demetrio Sierra-Mercado, Jill Oliver Robinson, Simon Outram, Stacey Pereira, Amy McGuire, Peter Zuk & Gabriel Lazaro-Munoz - 2022 - Frontiers in Human Neuroscience 16.
    The capacity of next-generation closed-loop or adaptive deep brain stimulation devices to read and write shows great potential to effectively manage movement, seizure, and psychiatric disorders, and also raises the possibility of using aDBS to electively modulate mood, cognition, and prosociality. What separates aDBS from most neurotechnologies currently used for enhancement is that aDBS remains an invasive, surgically-implanted technology with a risk-benefit ratio significantly different when applied to diseased versus non-diseased individuals. Despite a large discourse about the ethics of enhancement, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  80
    How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone - 2009 - Artificial Intelligence and Law 17 (1):1-30.
    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why, and when such solutions have to be adopted is often unanswered because the answer comes only from a broader perspective, accounting for legal and organizational issues. Security engineers and legal experts should analyze (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  46.  38
    Security, digital border technologies, and immigration admissions: Challenges of and to non-discrimination, liberty and equality.Natasha Saunders - forthcoming - European Journal of Political Theory.
    Normative debates on migration control, while characterised by profound disagreement, do appear to agree that the state has at least a prima facie right to prevent the entry of security threats. While concern is sometimes raised that this ‘security exception’ can be abused, there has been little focus by normative theorists on concrete practices of security, and how we can determine what a ‘principled’ use of the security exception would be. I argue that even if states have a right to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  91
    Securing privacy at work: The importance of contextualized consent. [REVIEW]Elin Palm - 2009 - Ethics and Information Technology 11 (4):233-241.
    The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important to consider (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  48.  60
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  92
    Privacy preserving electronic petitions.Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss & Girma Nigusse - 2008 - Identity in the Information Society 1 (1):203-219.
    We present the design of a secure and privacy preserving e-petition system that we have implemented as a proof-of-concept demonstrator. We use the Belgian e-ID card as source of authentication, and then proceed to issue an anonymous credential that is used to sign petitions. Our system ensures that duplicate signatures are detectable, while preserving the anonymity of petition signers. We analyze the privacy and security requirements of our application, present an overview of its architecture, and discuss the applicability of data (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  77
    Autonomous Vehicle Ethics: The Trolley Problem and Beyond.Ryan Jenkins, David Cerny & Tomas Hribek (eds.) - 2022 - New York: Oxford University Press.
    "A runaway trolley is speeding down a track" So begins what is perhaps the most fecund thought experiment of the past several decades since its invention by Philippa Foot. Since then, moral philosophers have applied the "trolley problem" as a thought experiment to study many different ethical conflicts - and chief among them is the programming of autonomous vehicles. Nowadays, however, very few philosophers accept that the trolley problem is a perfect analogy for driverless cars or that the situations autonomous (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 978