共查询到20条相似文献,搜索用时 31 毫秒
1.
Rachel Batchelor Ania Bobrowicz Robin Mackenzie Alisoun Milne 《Ethics and Information Technology》2012,14(2):99-108
Successful technologies’ ubiquity changes uses, users and ethicolegal responsibilities and duties of care. We focus on dementia
to review critically ethicolegal implications of increasing use of social networking sites (SNS) by those with compromised
decision-making capacity, assessing concerned parties’ responsibilities. Although SNS contracts assume ongoing decision-making
capacity, many users’ may be compromised or declining. Resulting ethicolegal issues include capacity to give informed consent
to contracts, protection of online privacy including sharing and controlling data, data leaks between different digital platforms,
and management of digital identities and footprints. SNS uses in healthcare raise additional issues. Online materials acting
as archives of ‘the self’ bolster present and future identities for users with compromised capacity. E-health involves actual
and potential intersection of data gathered for the purpose of delivering health technological support with data used for
social networking purposes. Ethicolegal guidance is limited on the implications of SNS usage in contexts where users have
impaired/reduced capacity to understand and/or consent to sharing personal data about their health, medication or location.
Vulnerable adults and family/carers face uncertainty in regard to consent, data protection, online identity and legal liabilities.
Ethicolegal responsibilities and duties of care of technology providers, healthcare professionals, regulatory bodies and policymakers
need clarification. 相似文献
2.
Norman Mooradian 《Ethics and Information Technology》2009,11(3):163-174
James Rachels’ seminal paper “Why Privacy Is Important” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy
is important in relation to mundane personal information and situations. According to the theory, privacy is important because
it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating
and maintaining diverse personal relationships. Without this control, it is implied, the diversity of relationships would
diminish; relationships would “flatten out”, we might say. The aspect of the paper that addresses information flows (what
I refer to as his information privacy theory) has been of particular interest to computer information privacy theorists. Despite
its continued importance to computer privacy theorists, however, the information privacy theory appears to be contradicted
by recent developments in computing. In particular, since the publication of Rachels’ paper we have seen an extensive amount
of personal information collected. Further, recent developments in computing falling under the heading of social computing
have brought about a new wave of personal information creation and collection. This paper will reassess and resituate Rachels’
information privacy theory in light of these developments. I will argue that the increasing collection of personal data will
not flatten relationships as the information privacy theory predicts because such data lack contextual factors important to
Rachels’ general theory. The paper will conclude by pointing to some areas where Rachels’ general theory and where his information
privacy theory will continue to be relevant. 相似文献
3.
The paper outlines a new interpretation of informational privacy and of its moral value. The main theses defended are: (a)
informational privacy is a function of the ontological friction in the infosphere, that is, of the forces that oppose the
information flow within the space of information; (b) digital ICTs (information and communication technologies) affect the
ontological friction by changing the nature of the infosphere (re-ontologization); (c) digital ICTs can therefore both decrease
and protect informational privacy but, most importantly, they can also alter its nature and hence our understanding and appreciation
of it; (d) a change in our ontological perspective, brought about by digital ICTs, suggests considering each person as being
constituted by his or her information and hence regarding a breach of one’s informational privacy as a form of aggression
towards one’s personal identity. 相似文献
4.
Michael Nagenborg 《Ethics and Information Technology》2009,11(3):175-179
J. van den Hoven suggested to analyse privacy from the perspective of informational justice, whereby he referred to the concept
of distributive justice presented by M. Walzer in “Spheres of Justice”. In “privacy as contextual integrity” Helen Nissenbaum did also point to Walzer’s approach of complex equality as well to
van den Hoven’s concept. In this article I will analyse the challenges of applying Walzer’s concept to issues of informational
privacy. I will also discuss the possibilities of framing privacy from the point of the “art of separation” by looking at
the intersection of information infrastructures and institutions. 相似文献
5.
Radio Frequency Identification, or RFID, is a technology which has been receiving considerable attention as of late. It is
a fairly simple technology involving radio wave communication between a microchip and an electronic reader, in which an identification
number stored on the chip is transmitted and processed; it can frequently be found in inventory tracking and access control
systems. In this paper, we examine the current uses of RFID, as well as identifying potential future uses of the technology,
including item-level tagging, human implants and RFID-chipped passports, while discussing the impacts that each of these uses
could potentially have on personal privacy. Possible guidelines for RFID’s use, including Fair Information Principles and
the RFID Bill of Rights are then presented, as well as technological solutions to personal privacy problems, such as tag killing
and blocker tags, as well as simple aluminum foil shields for passports. It is then claimed, though, that guidelines and technological
solutions will be ineffective for privacy protection, and that legislation will be necessary to guard against the threats
posed by the RFID. Finally, we present what we believe to be the most important legislative points that must be addressed.
Vance Lockton has recently completed the M.Sc. program at the University of British Columbia, majoring in Computer Science.
Richard S. Rosenberg is a professor emeritus in the Department of Computer Science at the University of British Columbia;
the third edition of his book, “The Social Impact of Computers”, was published by Elsevier Academic Press in 2004. 相似文献
6.
This paper deals with intercultural aspects of privacy, particularly with regard to differences between Japanese and Western
conceptions. It starts with a reconstruction of the genealogy of Western subjectivity and human dignity as the basic assumptions
underlying Western views on privacy. An analysis of the Western concept of informational privacy is presented. The Japanese
topic of ‘‘denial of self” (Musi) as well as the concepts of Seken, Shakai and Ikai (as analyzed by the authors of the companion piece on privacy in Japan) give rise to intercultural comparisons. The paper
addresses the question of privacy in cyberspace and mass media. Finally the question of freedom of speech is related to the
Japanese concepts of Ohyake and Watakusi. 相似文献
7.
Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine? 总被引:1,自引:1,他引:1
This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans
can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced
through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with
tragic consequences. In some sense this can be regarded as a failure in the process of delegating morality to a computer database.
In the UK, the issues that these cases raise have resulted in legislation designed to protect children which allows for the
creation of a huge database for children. Paradoxically, we have the situation where we failed to use digital data in enforcing
the law to protect children, yet we may now rely heavily on digital technologies to care for children. I draw on the work
of Floridi, Sanders, Collins, Kusch, Latour and Akrich, a spectrum of work stretching from philosophy to sociology of technology
and the “seamless web” or “actor–network” approach to studies of technology. Intentionality is considered, but not deemed
necessary for meaningful moral behaviour. Floridi’s and Sanders’ concept of “distributed morality” accords with the network
of agency characterized by actor–network approaches. The paper concludes that enfranchizing non-humans, in the shape of computer
databases of personal data, as moral agents is not necessarily problematic but a balance of delegation of morality must be
made between human and non-human actors. 相似文献
8.
Jens-Erik Mai 《Ethics and Information Technology》2016,18(1):51-57
The paper extends previous accounts of informational privacy as a contextual notion. Where previous accounts have focused on interpretations of the privacy context itself as being contextual and open for negotiation and interpretation, this paper extends those analyses and shows that personal information itself is in fact best understood as contextual and situational—and as such open for interpretation. The paper reviews the notion of information as it has been applied in informational privacy and philosophy of information, and suggests that personal information ought to be regarded as communicative acts. The paper suggests a reconceptualization of informational privacy from having its focus on controlling, limiting, and restricting access to material carriers of information to a focus on a regulation of the use, analysis, and interpretation of personal information. 相似文献
9.
Corporate dynamic transparency: the new ICT-driven ethics? 总被引:1,自引:1,他引:0
The term “corporate transparency” is frequently used in scholarly discussions of business ethics and corporate social responsibility
(CSR); however, it remains a volatile and imprecise term, often defined incompletely as “information disclosure” accomplished
through standardized reporting. Based on the results of empirical studies of organizational behaviors, this paper identifies
a new set of managerial practices based on the use of information and communication technologies (ICT) and particularly Internet-based
tools. These practices are resulting in what can be termed “dynamic transparency.” ICT allows for an informational environment
characterized by two-way exchange between corporations and their stakeholders, which fosters a more collaborative marketplace.
It is proposed that such dynamic information sharing, conducted by means of ICT, drives organizations to display greater openness
and accountability, and more transparent operations, which benefit both the corporations and their constituents. One of the
most important outcomes that will accrue to consumers and other individuals is the “right to know,” especially about corporate
strategies and activities that might directly affect their quality of life. This paper demonstrates that dynamic transparency
is more desirable and more effective than the more common “static transparency” where firms’ information disclosure is one-way,
usually in response to government regulation. We present three ethical arguments to justify the implementation by business
firms of dynamic transparency and demonstrate that their doing so is related to CSR and to augment and complement stakeholder
engagement and dialogue. The paper concludes with a summary of the possible limits to and the problems involved in the implementation
of dynamic transparency for corporations, and suggests some strategies to counter them. 相似文献
10.
Diane P. Michelfelder 《Ethics and Information Technology》2001,3(2):129-135
Solutions to the problem ofprotecting informational privacy in cyberspacetend to fall into one of three categories:technological solutions, self-regulatorysolutions, and legislative solutions. In thispaper, I suggest that the legal protection ofthe right to online privacy within the USshould be strengthened. Traditionally, inidentifying where support can be found in theUS Constitution for a right to informationalprivacy, the point of focus has been on theFourth Amendment; protection in this contextfinds its moral basis in personal liberty,personal dignity, self-esteem, and othervalues. On the other hand, the constitutionalright to privacy first established by Griswoldv. Connecticut finds its moral basis largelyin a single value, the value of autonomy ofdecision-making. I propose that an expandedconstitutional right to informational privacy,responsive to the escalating threats posed toonline privacy by developments in informationaltechnology, would be more likely to find asolid moral basis in the value of autonomyassociated with the constitutional right toprivacy found in Griswold than in the varietyof values forming the moral basis for the rightto privacy backed by the Fourth Amendment. 相似文献
11.
Charles D. Raab 《The Information Society》1998,14(4):263-274
It is commonly accepted that the use of personal information in business and government puts individual privacy at risk. However, little is known about these risks-for instance, whether and how they can be measured, and how they vary across social groups and the sectors in which personal data are used. Unless we can gain a purchase on such issues, our knowledge of the societal effects of information technology and systems will remain deficient, and the ability to make and implement better policies for privacy protection, and perhaps for a more equitable distribution of risk and protection, will remain impaired. The article explores this topic, examining conventional paradigms in data protection, including the one-dimensional view of the 'data subject,' that inhibit better conceptualizations and practices. It looks at some comparative survey evidence that casts light on the question of the distribution of privacy risks and concerns. It examines theoretical issues in the literature on risk, raising questions about the objectivity and perception of the risk of privacy invasion. 相似文献
12.
This article reviews the qualitative changes that big data technology introduced to society, particularly changes that affect how individuals control the access, use and retention of their personal data. In particular interest is whether the practice of privacy self-management in this new context could still ensure the informed consent of individuals to the privacy terms of big data companies. It is concluded that that accepting big data companies’ privacy policies falls short of the disclosure and understanding requirements for informed consent. The article argues that the practice of privacy self-management could remain viable if the review, understanding and acceptance of privacy agreements is streamlined, standardized and automated. Technology should be employed to counter the privacy problems created by big data technology. The creation of the privacy exchange authorities (PEA) is proposed as a solution to the failures of privacy self-management. The PEA are intermediaries that empower individuals to define their own privacy terms and express informed consent in their dealings with data companies. They will create the technological infrastructure for individuals to select their own privacy terms from a list of standard choices, potentially only once. The PEA will further mediate the delivery and authentication of the individual users’ privacy terms to data companies. A logical proof of concept is offered, illustrating the potential steps involved in the creation of the PEA. 相似文献
13.
[研究目的]从隐私风险防控的角度,调查荷兰政府开放数据的隐私保护实践,为我国政府开放数据和隐私保护提供参考。[研究方法]利用文献调研和案例分析的研究方法,以荷兰为例,获取一手资料阐述荷兰政府开放数据中隐私风险防控的经验,对政府开放数据中个人隐私保护政策法规、隐私风险应对的数据处理规范与机构进行分析和概括。[研究结论]荷兰开放政府数据的隐私风险控制的优势在于,注重数据存储安全、关注数据聚合、个人数据保护制度比较灵活、强化国际合作;劣势在于,隐私保护政策缺乏更新、政府数据收费政策模糊、没有任命国家首席数据官、内政和王国关系部承担的决策和咨询责任非常少。在此基础上,提出优化个人信息保护的政策法规,确定个人数据处理原则,完善个人数据处理机构。 相似文献
14.
Russell Blackford 《Ethics and Information Technology》2012,14(1):41-51
We commonly identify something seriously defective in a human life that is lived in ignorance of important but unpalatable
truths. At the same time, some degree of misapprehension of reality may be necessary for individual health and success. Morally
speaking, it is unclear just how insistent we should be about seeking the truth. Robert Sparrow has considered such issues
in discussing the manufacture and marketing of robot ‘pets’, such as Sony’s doglike ‘AIBO’ toy and whatever more advanced
devices may supersede it. Though it is not his only concern, Sparrow particularly criticizes such robot pets for their illusory
appearance of being living things. He fears that some individuals will subconsciously buy into the illusion, and come to sentimentalize
interactions that fail to constitute genuine relationships. In replying to Sparrow, I emphasize that this would be continuous
with much of the minor sentimentality that we already indulge in from day to day. Although a disposition to seek the truth
is morally virtuous, the virtue concerned must allow for at least some categories of exceptions. Despite Sparrow’s concerns
about robot pets (and robotics more generally), we should be lenient about familiar, relatively benign, kinds of self-indulgence
in forming beliefs about reality. Sentimentality about robot pets seems to fall within these categories. Such limited self-indulgence
can co-exist with ordinary honesty and commitment to truth. 相似文献
15.
网络空间个人数据的权利保护 总被引:3,自引:0,他引:3
个人数据是指一切标识个人情况的数据资料。个人数据权利是个人隐私权在网络空间的重要表现,数据主体享有个人隐私不被侵犯和寻求法律保护的权利。网络空间个人数据隐私权的侵犯表现为非法收集、使用、泄露或者运用个人数据扰乱他人生活的安宁等,我国应加强个人数据权利的保护立法。 相似文献
16.
Gordon Hull Heather Richter Lipford Celine Latulipe 《Ethics and Information Technology》2011,13(4):289-302
Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant
privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective
enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular
social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps
are at the root of many of the sites’ privacy issues. Applications, which nearly invisibly shares not just a users’, but a
user’s friends’ information with third parties, clearly violates standard norms of information flow. News Feed is a more complex
case, because it involves not just questions of privacy, but also of program interface and of the meaning of “friendship”
online. In both cases, many of the privacy issues on Facebook are primarily design issues, which could be ameliorated by an
interface that made the flows of information more transparent to users. 相似文献
17.
Noëmi Manders-Huits 《Ethics and Information Technology》2010,12(1):1-2
Over the past decade Identity Management has become a central theme in information technology, policy, and administration
in the public and private sectors. In these contexts the term ‘Identity Management’ is used primarily to refer to ways and
methods of dealing with registration and authorization issues regarding persons in organizational and service-oriented domains.
Especially due to the growing range of choices and options for, and the enhanced autonomy and rights of, employees, citizens,
and customers, there is a growing demand for systems that enable the regulation of rights, duties, responsibilities, entitlements
and access of innumerable people simultaneously. ‘Identity Management’ or ‘Identity Management Systems’ have become important
headings under which such systems are designed and implemented. But there is another meaning of the term ‘identity management’,
which is clearly related and which has gained currency. This second construal refers to the need to manage our moral identities
and our identity related information. This paper explores the relation between the management of our (moral) identities and
‘Identity Management’ as conceptualized in IT discourse. 相似文献
18.
This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology.
As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses
across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’
privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some
of its most prevalent uses, a definition of privacy is derived in the context of information systems. To illustrate current
attempts at controlling the undesirable side effects of RFID, Lessig’s cyberspace framework is presented. It is found that
each of Lessig’s components is inadequate at preventing individual privacy violations in RFID. The main focus within this
framework is on the norms of society. The social norm mechanism that addresses privacy issues in cyberspace is the Fair Information
Practices Principles (FIPP). After an analysis of these principles, it is posited that the FIPP only deal with procedural
justice issues related to data collection and omit distributive and interactional justice reasoning related to the actual
beneficial and detrimental outcomes to the individuals whose data is being obtained. Thus, RFID is presented in the context
of the tension between the many benefits that are provided by the technology in social exchanges, and the risk it carries
of the loss of privacy. The new, expanded framework recognizes both sides of the issue with the ultimate goal of providing
a greater understanding of how privacy issues can be addressed with RFID technology. 相似文献
19.
重大疫情防控中的个人信息保护研究——基于隐私保护设计理论 总被引:1,自引:0,他引:1
[目的/意义] 新冠疫情防控期间个人移动轨迹、关系图谱、电子健康码等个人信息在精准定位疫情传播、防止疫情扩散和推进复工复产等方面发挥了重要的作用,但由于缺乏一定的信息采集保护机制和共享安全规则面临着个人信息滥用和泄露的风险,突发公共卫生事件下如何平衡信息利用和个人信息保护意义重大。[方法/过程] 本文从疫情防控背景下个人信息保护涉及的个人信息主体、个人信息收集和处理者、数据治理监管者三方出发,构建面向隐私保护设计的个人信息全生命周期保护框架,通过对个人信息采集、存储组织、分享利用和处置归档等过程的有效控制,建立个人信息合法合规使用的良性生态。[结果/结论] 疫情防控背景下个人信息保护涉及多元利益主体,需要重视对个人隐私信息的收集和利用,兼顾经济、社会发展和个人隐私保护需求,更好地实现个人信息的社会价值。面向隐私保护设计的个人信息全生命周期保护框架的提出对于进一步规范疫情防控背景下个人信息采集、存储组织、分享利用和合理处置具有一定的指导性意义。未来还需要在实践中进行探索和完善个人信息安全治理体系,构建应急预防和社会救济为一体的保护体系,设置独立的个人隐私保护监管机构,完善国家应急管理情报体系建设。 相似文献