This category needs an editor. We encourage you to help if you are qualified.
Volunteer, or read more about what this involves.
Related
Siblings

Contents
3 found
Order:
  1. Limiting Access to Certain Anonymous Information: From the Group Right to Privacy to the Principle of Protecting the Vulnerable.Haleh Asgarinia - 2024 - Journal of Value Inquiry 58 (1):1-27.
    An issue about the privacy of the clustered groups designed by algorithms arises when attempts are made to access certain pieces of information about those groups that would likely be used to harm them. Therefore, limitations must be imposed regarding accessing such information about clustered groups. In the discourse on group privacy, it is argued that the right to privacy of such groups should be recognised to respect group privacy, protecting clustered groups against discrimination. According to this viewpoint, this right (...)
    Remove from this list   Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  2. Free Internet Access as a Human Right.Merten Reglitz - 2024 - Cambridge: Cambridge University Press.
    "Merten Reglitz makes a case for a new human right to free Internet access, arguing it is crucial for protecting and advancing fundamental moral interests. He examines the risks the Internet poses to our most important rights if it is not safeguarded by public institutions"--.
    Remove from this list   Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to govern data-driven systems. In (...)
    Remove from this list   Direct download  
     
    Export citation  
     
    Bookmark