首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms, and management of digital identities and footprints. SNS uses in healthcare raise additional issues. Online materials acting as archives of ‘the self’ bolster present and future identities for users with compromised capacity. E-health involves actual and potential intersection of data gathered for the purpose of delivering health technological support with data used for social networking purposes. Ethicolegal guidance is limited on the implications of SNS usage in contexts where users have impaired/reduced capacity to understand and/or consent to sharing personal data about their health, medication or location. Vulnerable adults and family/carers face uncertainty in regard to consent, data protection, online identity and legal liabilities. Ethicolegal responsibilities and duties of care of technology providers, healthcare professionals, regulatory bodies and policymakers need clarification.  相似文献   

2.
James Rachels’ seminal paper “Why Privacy Is Important” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of relationships would diminish; relationships would “flatten out”, we might say. The aspect of the paper that addresses information flows (what I refer to as his information privacy theory) has been of particular interest to computer information privacy theorists. Despite its continued importance to computer privacy theorists, however, the information privacy theory appears to be contradicted by recent developments in computing. In particular, since the publication of Rachels’ paper we have seen an extensive amount of personal information collected. Further, recent developments in computing falling under the heading of social computing have brought about a new wave of personal information creation and collection. This paper will reassess and resituate Rachels’ information privacy theory in light of these developments. I will argue that the increasing collection of personal data will not flatten relationships as the information privacy theory predicts because such data lack contextual factors important to Rachels’ general theory. The paper will conclude by pointing to some areas where Rachels’ general theory and where his information privacy theory will continue to be relevant.  相似文献   

3.
The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a) informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease and protect informational privacy but, most importantly, they can also alter its nature and hence our understanding and appreciation of it; (d) a change in our ontological perspective, brought about by digital ICTs, suggests considering each person as being constituted by his or her information and hence regarding a breach of one’s informational privacy as a form of aggression towards one’s personal identity.  相似文献   

4.
J. van den Hoven suggested to analyse privacy from the perspective of informational justice, whereby he referred to the concept of distributive justice presented by M. Walzer in “Spheres of Justice”. In “privacy as contextual integrity” Helen Nissenbaum did also point to Walzer’s approach of complex equality as well to van den Hoven’s concept. In this article I will analyse the challenges of applying Walzer’s concept to issues of informational privacy. I will also discuss the possibilities of framing privacy from the point of the “art of separation” by looking at the intersection of information infrastructures and institutions.  相似文献   

5.
Radio Frequency Identification, or RFID, is a technology which has been receiving considerable attention as of late. It is a fairly simple technology involving radio wave communication between a microchip and an electronic reader, in which an identification number stored on the chip is transmitted and processed; it can frequently be found in inventory tracking and access control systems. In this paper, we examine the current uses of RFID, as well as identifying potential future uses of the technology, including item-level tagging, human implants and RFID-chipped passports, while discussing the impacts that each of these uses could potentially have on personal privacy. Possible guidelines for RFID’s use, including Fair Information Principles and the RFID Bill of Rights are then presented, as well as technological solutions to personal privacy problems, such as tag killing and blocker tags, as well as simple aluminum foil shields for passports. It is then claimed, though, that guidelines and technological solutions will be ineffective for privacy protection, and that legislation will be necessary to guard against the threats posed by the RFID. Finally, we present what we believe to be the most important legislative points that must be addressed. Vance Lockton has recently completed the M.Sc. program at the University of British Columbia, majoring in Computer Science. Richard S. Rosenberg is a professor emeritus in the Department of Computer Science at the University of British Columbia; the third edition of his book, “The Social Impact of Computers”, was published by Elsevier Academic Press in 2004.  相似文献   

6.
This paper deals with intercultural aspects of privacy, particularly with regard to differences between Japanese and Western conceptions. It starts with a reconstruction of the genealogy of Western subjectivity and human dignity as the basic assumptions underlying Western views on privacy. An analysis of the Western concept of informational privacy is presented. The Japanese topic of ‘‘denial of self” (Musi) as well as the concepts of Seken, Shakai and Ikai (as analyzed by the authors of the companion piece on privacy in Japan) give rise to intercultural comparisons. The paper addresses the question of privacy in cyberspace and mass media. Finally the question of freedom of speech is related to the Japanese concepts of Ohyake and Watakusi.  相似文献   

7.
This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with tragic consequences. In some sense this can be regarded as a failure in the process of delegating morality to a computer database. In the UK, the issues that these cases raise have resulted in legislation designed to protect children which allows for the creation of a huge database for children. Paradoxically, we have the situation where we failed to use digital data in enforcing the law to protect children, yet we may now rely heavily on digital technologies to care for children. I draw on the work of Floridi, Sanders, Collins, Kusch, Latour and Akrich, a spectrum of work stretching from philosophy to sociology of technology and the “seamless web” or “actor–network” approach to studies of technology. Intentionality is considered, but not deemed necessary for meaningful moral behaviour. Floridi’s and Sanders’ concept of “distributed morality” accords with the network of agency characterized by actor–network approaches. The paper concludes that enfranchizing non-humans, in the shape of computer databases of personal data, as moral agents is not necessarily problematic but a balance of delegation of morality must be made between human and non-human actors.  相似文献   

8.
The paper extends previous accounts of informational privacy as a contextual notion. Where previous accounts have focused on interpretations of the privacy context itself as being contextual and open for negotiation and interpretation, this paper extends those analyses and shows that personal information itself is in fact best understood as contextual and situational—and as such open for interpretation. The paper reviews the notion of information as it has been applied in informational privacy and philosophy of information, and suggests that personal information ought to be regarded as communicative acts. The paper suggests a reconceptualization of informational privacy from having its focus on controlling, limiting, and restricting access to material carriers of information to a focus on a regulation of the use, analysis, and interpretation of personal information.  相似文献   

9.
Corporate dynamic transparency: the new ICT-driven ethics?   总被引:1,自引:1,他引:0  
The term “corporate transparency” is frequently used in scholarly discussions of business ethics and corporate social responsibility (CSR); however, it remains a volatile and imprecise term, often defined incompletely as “information disclosure” accomplished through standardized reporting. Based on the results of empirical studies of organizational behaviors, this paper identifies a new set of managerial practices based on the use of information and communication technologies (ICT) and particularly Internet-based tools. These practices are resulting in what can be termed “dynamic transparency.” ICT allows for an informational environment characterized by two-way exchange between corporations and their stakeholders, which fosters a more collaborative marketplace. It is proposed that such dynamic information sharing, conducted by means of ICT, drives organizations to display greater openness and accountability, and more transparent operations, which benefit both the corporations and their constituents. One of the most important outcomes that will accrue to consumers and other individuals is the “right to know,” especially about corporate strategies and activities that might directly affect their quality of life. This paper demonstrates that dynamic transparency is more desirable and more effective than the more common “static transparency” where firms’ information disclosure is one-way, usually in response to government regulation. We present three ethical arguments to justify the implementation by business firms of dynamic transparency and demonstrate that their doing so is related to CSR and to augment and complement stakeholder engagement and dialogue. The paper concludes with a summary of the possible limits to and the problems involved in the implementation of dynamic transparency for corporations, and suggests some strategies to counter them.  相似文献   

10.
Solutions to the problem ofprotecting informational privacy in cyberspacetend to fall into one of three categories:technological solutions, self-regulatorysolutions, and legislative solutions. In thispaper, I suggest that the legal protection ofthe right to online privacy within the USshould be strengthened. Traditionally, inidentifying where support can be found in theUS Constitution for a right to informationalprivacy, the point of focus has been on theFourth Amendment; protection in this contextfinds its moral basis in personal liberty,personal dignity, self-esteem, and othervalues. On the other hand, the constitutionalright to privacy first established by Griswoldv. Connecticut finds its moral basis largelyin a single value, the value of autonomy ofdecision-making. I propose that an expandedconstitutional right to informational privacy,responsive to the escalating threats posed toonline privacy by developments in informationaltechnology, would be more likely to find asolid moral basis in the value of autonomyassociated with the constitutional right toprivacy found in Griswold than in the varietyof values forming the moral basis for the rightto privacy backed by the Fourth Amendment.  相似文献   

11.
It is commonly accepted that the use of personal information in business and government puts individual privacy at risk. However, little is known about these risks-for instance, whether and how they can be measured, and how they vary across social groups and the sectors in which personal data are used. Unless we can gain a purchase on such issues, our knowledge of the societal effects of information technology and systems will remain deficient, and the ability to make and implement better policies for privacy protection, and perhaps for a more equitable distribution of risk and protection, will remain impaired. The article explores this topic, examining conventional paradigms in data protection, including the one-dimensional view of the 'data subject,' that inhibit better conceptualizations and practices. It looks at some comparative survey evidence that casts light on the question of the distribution of privacy risks and concerns. It examines theoretical issues in the literature on risk, raising questions about the objectivity and perception of the risk of privacy invasion.  相似文献   

12.
This article reviews the qualitative changes that big data technology introduced to society, particularly changes that affect how individuals control the access, use and retention of their personal data. In particular interest is whether the practice of privacy self-management in this new context could still ensure the informed consent of individuals to the privacy terms of big data companies. It is concluded that that accepting big data companies’ privacy policies falls short of the disclosure and understanding requirements for informed consent. The article argues that the practice of privacy self-management could remain viable if the review, understanding and acceptance of privacy agreements is streamlined, standardized and automated. Technology should be employed to counter the privacy problems created by big data technology. The creation of the privacy exchange authorities (PEA) is proposed as a solution to the failures of privacy self-management. The PEA are intermediaries that empower individuals to define their own privacy terms and express informed consent in their dealings with data companies. They will create the technological infrastructure for individuals to select their own privacy terms from a list of standard choices, potentially only once. The PEA will further mediate the delivery and authentication of the individual users’ privacy terms to data companies. A logical proof of concept is offered, illustrating the potential steps involved in the creation of the PEA.  相似文献   

13.
陈美  梁乙凯 《情报杂志》2022,41(2):169-175,168
[研究目的]从隐私风险防控的角度,调查荷兰政府开放数据的隐私保护实践,为我国政府开放数据和隐私保护提供参考。[研究方法]利用文献调研和案例分析的研究方法,以荷兰为例,获取一手资料阐述荷兰政府开放数据中隐私风险防控的经验,对政府开放数据中个人隐私保护政策法规、隐私风险应对的数据处理规范与机构进行分析和概括。[研究结论]荷兰开放政府数据的隐私风险控制的优势在于,注重数据存储安全、关注数据聚合、个人数据保护制度比较灵活、强化国际合作;劣势在于,隐私保护政策缺乏更新、政府数据收费政策模糊、没有任命国家首席数据官、内政和王国关系部承担的决策和咨询责任非常少。在此基础上,提出优化个人信息保护的政策法规,确定个人数据处理原则,完善个人数据处理机构。  相似文献   

14.
We commonly identify something seriously defective in a human life that is lived in ignorance of important but unpalatable truths. At the same time, some degree of misapprehension of reality may be necessary for individual health and success. Morally speaking, it is unclear just how insistent we should be about seeking the truth. Robert Sparrow has considered such issues in discussing the manufacture and marketing of robot ‘pets’, such as Sony’s doglike ‘AIBO’ toy and whatever more advanced devices may supersede it. Though it is not his only concern, Sparrow particularly criticizes such robot pets for their illusory appearance of being living things. He fears that some individuals will subconsciously buy into the illusion, and come to sentimentalize interactions that fail to constitute genuine relationships. In replying to Sparrow, I emphasize that this would be continuous with much of the minor sentimentality that we already indulge in from day to day. Although a disposition to seek the truth is morally virtuous, the virtue concerned must allow for at least some categories of exceptions. Despite Sparrow’s concerns about robot pets (and robotics more generally), we should be lenient about familiar, relatively benign, kinds of self-indulgence in forming beliefs about reality. Sentimentality about robot pets seems to fall within these categories. Such limited self-indulgence can co-exist with ordinary honesty and commitment to truth.  相似文献   

15.
网络空间个人数据的权利保护   总被引:3,自引:0,他引:3  
个人数据是指一切标识个人情况的数据资料。个人数据权利是个人隐私权在网络空间的重要表现,数据主体享有个人隐私不被侵犯和寻求法律保护的权利。网络空间个人数据隐私权的侵犯表现为非法收集、使用、泄露或者运用个人数据扰乱他人生活的安宁等,我国应加强个人数据权利的保护立法。  相似文献   

16.
Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps are at the root of many of the sites’ privacy issues. Applications, which nearly invisibly shares not just a users’, but a user’s friends’ information with third parties, clearly violates standard norms of information flow. News Feed is a more complex case, because it involves not just questions of privacy, but also of program interface and of the meaning of “friendship” online. In both cases, many of the privacy issues on Facebook are primarily design issues, which could be ameliorated by an interface that made the flows of information more transparent to users.  相似文献   

17.
Editorial     
Over the past decade Identity Management has become a central theme in information technology, policy, and administration in the public and private sectors. In these contexts the term ‘Identity Management’ is used primarily to refer to ways and methods of dealing with registration and authorization issues regarding persons in organizational and service-oriented domains. Especially due to the growing range of choices and options for, and the enhanced autonomy and rights of, employees, citizens, and customers, there is a growing demand for systems that enable the regulation of rights, duties, responsibilities, entitlements and access of innumerable people simultaneously. ‘Identity Management’ or ‘Identity Management Systems’ have become important headings under which such systems are designed and implemented. But there is another meaning of the term ‘identity management’, which is clearly related and which has gained currency. This second construal refers to the need to manage our moral identities and our identity related information. This paper explores the relation between the management of our (moral) identities and ‘Identity Management’ as conceptualized in IT discourse.  相似文献   

18.
This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, a definition of privacy is derived in the context of information systems. To illustrate current attempts at controlling the undesirable side effects of RFID, Lessig’s cyberspace framework is presented. It is found that each of Lessig’s components is inadequate at preventing individual privacy violations in RFID. The main focus within this framework is on the norms of society. The social norm mechanism that addresses privacy issues in cyberspace is the Fair Information Practices Principles (FIPP). After an analysis of these principles, it is posited that the FIPP only deal with procedural justice issues related to data collection and omit distributive and interactional justice reasoning related to the actual beneficial and detrimental outcomes to the individuals whose data is being obtained. Thus, RFID is presented in the context of the tension between the many benefits that are provided by the technology in social exchanges, and the risk it carries of the loss of privacy. The new, expanded framework recognizes both sides of the issue with the ultimate goal of providing a greater understanding of how privacy issues can be addressed with RFID technology.  相似文献   

19.
占南 《现代情报》2021,41(1):101-110
[目的/意义] 新冠疫情防控期间个人移动轨迹、关系图谱、电子健康码等个人信息在精准定位疫情传播、防止疫情扩散和推进复工复产等方面发挥了重要的作用,但由于缺乏一定的信息采集保护机制和共享安全规则面临着个人信息滥用和泄露的风险,突发公共卫生事件下如何平衡信息利用和个人信息保护意义重大。[方法/过程] 本文从疫情防控背景下个人信息保护涉及的个人信息主体、个人信息收集和处理者、数据治理监管者三方出发,构建面向隐私保护设计的个人信息全生命周期保护框架,通过对个人信息采集、存储组织、分享利用和处置归档等过程的有效控制,建立个人信息合法合规使用的良性生态。[结果/结论] 疫情防控背景下个人信息保护涉及多元利益主体,需要重视对个人隐私信息的收集和利用,兼顾经济、社会发展和个人隐私保护需求,更好地实现个人信息的社会价值。面向隐私保护设计的个人信息全生命周期保护框架的提出对于进一步规范疫情防控背景下个人信息采集、存储组织、分享利用和合理处置具有一定的指导性意义。未来还需要在实践中进行探索和完善个人信息安全治理体系,构建应急预防和社会救济为一体的保护体系,设置独立的个人隐私保护监管机构,完善国家应急管理情报体系建设。  相似文献   

20.
Web2.0时代网络信息资源管理隐私权保护已严重影响用户对网站的安全度和信任度。网络信息资源管理中的隐私权侵权行为主要有:对网络用户个人信息使用不当,个人活动隐私的侵犯,个人网络痕迹隐私的侵犯以及个人网络空间隐私权的侵犯;网络信息资源管理中的隐私权保护对策主要有:完善网络隐私权保护的立法,加强网络信息产业的行业自律,提高网络用户的自我保护意识,最大限度地利用信息安全技术、成立网络隐私权保护的专门机构以及融入国际网络隐私权保护体系等。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号