Wk 5 Assignment-DHA

docx

School

Capella University *

*We aren’t endorsed by this school

Course

DHAV8925

Subject

Philosophy

Date

Jan 9, 2024

Type

docx

Pages

11

Uploaded by lherard81

Report
1 Identifying Theory Identifying a Theory Lesley-Ann Herard Capella University DHA V-8925-Doctoral Project Development- Topic Idea Dr. Kerrie Roberson November,2023
2 Identifying Theory Abstract A theory is a systematic and well-supported interpretive or theoretical structure that improves understanding and analysis of phenomena. Science, philosophy, and the social sciences use this phrase to describe a collection of underlying principles, conceptions, or statements that explain an inevitable feature of the tangible world(Role of theory in research and its importance, 2022). Approaches help explain the ethical implications of data practices in ethics and data protection. They also aid ethical and regulatory growth. Data privacy ethics can be examined using ethical frameworks. This approach works in many contexts. Multiple ethical theories simplify understanding and address the complexity of ethical decision-making in the continuously developing world of technology. Data privacy ethics may require a complex approach considering multiple views and ideals. Moral ideas also influence these discussions. Burkhardt, G., Boy, F., Doneddu, D., & Hajli, N. (2023). Privacy Behaviour: A Model for Online Informed Consent: JBE. Journal of Business Ethics, 186 (1), 237-255. https://doi.org/10.1007/s10551-022-05202-1 The moral philosophy of utilitarianism prioritizes outcomes to determine morality. The theory addresses data privacy ethics well. A clear ethical foundation for decision-making is utilitarianism. This helps academics and policymakers choose the best approach to maximize well-being and social benefit. In complex ethical dilemmas, this can be helpful. This article applies the selected theory to tracking cookies. It explains web users' activities in the context of subject interactions, notably informed consent. This article shows that contractually, which emphasizes human autonomy and informed permission, is an appropriate framework for analyzing personal data-sharing agreements (Burkhardt et al., 2022). Research should improve
3 Identifying Theory an overarching behavioral framework for electronic informed authorization that integrates privacy-related aspects across domains.. This study fills that gap. Piasecki, J., & Cheah, P. Y. (2022). Ownership of individual-level health data, data sharing, and data governance. BMC Medical Ethics, 23 , 1-9. https://doi.org/10.1186/s12910-022- 00848-y Deontology and ownership status affect how health data is used. This study analyzes the limits of the two individual-level health data ownership models. Justice, autonomy, risk reduction, economic, technological, and philosophical factors are examined. According to Piasecki and Cheah (2022), private or public ownership alone cannot solve data use issues efficiently, reasonably, and ethically. Qualitative research participants often share sensitive information. Researchers are ethically required to protect participant confidentiality. As shown in this study, deontology supports participant confidentiality. The gap shows that privacy protection is a core value, but the digital environment may need help to define it. Deontological rules for emerging privacy issues can be difficult to apply due to rapid technological advancement and complex data ecosystems. This research illuminates how data privacy affects ethics. Loi, M., Hauser, C., & Christen, M. (2022). Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?: JBE. Journal of Business Ethics, 175 (1), 7- 19. https://doi.org/10.1007/s10551-020-04668-1 Right-based ethics addresses ethical behavior needed to protect individual rights. This essay investigates how insurance companies entrap people by requesting their digital data. This statement uses the concept to demonstrate how rights are protected. As technology advances, a rights-based framework is needed to assess its effects on individual rights. Data gathering and analysis technology should be ethically designed and implemented to avoid rights violations.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Identifying Theory This article discusses sovereignty and ethical data handling, precisely the moral objection to insurance firms pressuring people to give private data. This activity may erode human liberty, raise vulnerability to hazards, and hinder the ability to live a self-governing, honest, and unfettered life, making it morally wrong. Analyzing the coercer's will in threat contexts is difficult (Loi et al., 2022). Qualitative researchers must protect participants' identities, especially when sharing study outcomes. Ruotsalainen, P., & Blobel, B. (2023). Future pHealth Ecosystem-Holistic View on Privacy and Trust. Journal of Personalized Medicine, 13 (7), 1048. https://doi.org/10.3390/jpm13071048 Virtue ethics emphasizes morality and character development. In the P health ecosystem, virtue theory can impact healthcare and public health ethics, principles, and conduct. This aligns with my research on ethics and data privacy. It examines how healthcare workers cultivate virtues in their interactions with patients and the community, fostering confidence and trustworthy treatment. Virtue theory provides an ethical foundation for qualitative public health research. It shows how researchers can promote respect and honesty. According to Ruotsalainen and Blobel (2023), these characteristics help create a research culture that prioritizes ethics, respects individual rights, and fosters an engaging and trusted public health community. Virtue cultivation in public health education and professional development needs to be improved. Virtue training and its practical use in public health programs deserve further attention. Mühlhoff, R. Predictive privacy: Towards an applied ethics of data analytics. Ethics Inf Technol 23 , 675–690 (2021). https://doi.org/10.1007/s10676-021-09606-x
5 Identifying Theory In the domains of analysis of data and artificial intelligence, individuals and organizations must be honest about data collection and processing. This means conducting these things honestly and without manipulation or distortion. Virtue theory supports such integrity. Data analytics and methods based on data in healthcare computing technology are examined in this article. This article discusses using data to address the topic. Predictive analytics to predict sensitive personal information or discriminate against people based on irrelevant data presents ethical and data protection problems. The present study introduces "predictive privacy" as an ethical norm to protect individuals and collectives from discriminatory treatment resulting from machine learning and Big Data analytics (Mühlhoff, 2021). In this theory, qualitative investigations show how researchers use data analytics while maintaining data accuracy, preventing fraud, and concluding authenticity. Applying this precaution will protect research integrity. Finally, the framework of theory may have inadequacies. Data analytics organizations and practitioners may benefit from ethical training emphasizing morality and technical skills. A comprehensive strategy may connect data analytics' needs and virtue theory's ethics. Ohlhausen, M. K., & Rossen, B. (2022). Privacy and Competition: Discord or Harmony? The Antitrust Bulletin, 67(4), 552-561. https://doi- org.library.capella.edu/10.1177/0003603X221126140 The social contract provides a framework for understanding privacy and competition in society. Framing conversations around shared commitments to balance individual freedoms with communal aims may be helpful. This essay matches my study topic and theoretical framework. This article discusses the current debate over consumer privacy and data use regulation in competition law. The changing nature of customer confidentiality and the growing demand for regulation are fascinating. This talk will examine recent proposals to use competition law to
6 Identifying Theory address data collection and aggregation issues (Ohlhausen & Rossen, 2022). This article examines Congress's ethical, data privacy, and competition legislative proposals. Social contract theory helps qualitative researchers understand data privacy ethics in conformity with privacy and competition laws. Social contract theory may have gaps when legislation conflicts with individual autonomy, collective accountability, and society's welfare. To close the gap, legislative frameworks must be updated to meet evolving demands and expectations. Steinhoff, L., & Martin, K. D. (2023). Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces. Journal of Service Research, 26(3), 330- 350. https://doi-org.library.capella.edu/10.1177/10946705221141925 Organizations can improve ethics by incorporating virtue theory into data privacy regulatory services' culture, policy, and operations. This method promotes morality, ethics, and human well-being beyond legal compliance. In qualitative research, data protection standards may need to be revised, forcing researchers to traverse ethical difficulties in ambiguous settings. This includes protecting participant rights and critically examining privacy-compromising actions. My research interest is the relationship between data privacy and ethics rules and their compliance with large-scale data privacy requirements. This investigation shows the gap between scientific understanding and corporate practice. Therefore, this often adds to frontline workers' already heavy responsibilities. This study conceptually analyzes three service frontline interface setups with different technology integration degrees. The goal is to fill the gap in services research on data privacy legislation's impact and administration at the frontline. The following study will explain how six worldwide data privacy standards apply to service frontline interfaces (Steinhoff & Martin, 2023).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 Identifying Theory Smith, H., Ives, J., Kennedy, M.-R., & Manzini, A. (2023, July). Ethics of Trust/worthiness in Autonomous Systems: A scoping review. DL. https://dl-acm- org.library.capella.edu/doi/pdf/10.1145/3597512.3600207 Smith et al. (2023) state that data privacy practices validate trustworthiness. Virtue theory practitioners emphasize stakeholder trust. Validation techniques that are honest, transparent, and ethical will achieve this. This means valuing the people who contribute to the study, especially in qualitative research, where researchers often contact closely with participants. Virtuous conduct protects participants and promotes equity. Virtue ethics promotes humility, which affects validation. Virtue ethics researchers appreciate the subjectivity of qualitative research and are humble about interpretations. Researchers who fail to disclose their biases and address them may create a gap, lowering the trustworthiness of their findings. Kwak, C., Lee, J., & Lee, H. (2022). Could You Ever Forget Me? Why People Want to be Forgotten Online: JBE. Journal of Business Ethics, 179 (1), 25-42. https://doi.org/10.1007/s10551-021-04747-x In data privacy, being forgotten means the ethical obligation to anonymize or delete personal data after the study. Scholars can use virtue theory to promote responsibility. This approach emphasizes the significance of actively taking steps to ensure civility and efficiency, lowering the risk of bad outcomes. Virtue ethics, the study of moral virtues, includes virtue theory. This study uses personal experiences to analyze online forgetfulness motivations. The issues of keeping private digital records are also examined. Qualitative content analysis was utilized to analyze Korean Internet users' open-ended questionnaires. This study examines why people want to erase themselves online. This study may help us understand how countries handle ethics and data privacy. The growing the existence of a disparity among science and morality has
8 Identifying Theory the potential to give rise to novel societal and ethical dilemmas. The potential eradication or mitigation of digital illicit activity, online bullying, and internet stalking is contingent upon the ability of legislation to effectively adapt to advancements in technology. To effectively tackle the matter pertaining to socioeconomic delay and minimize its negative consequences on anonymity, it is imperative to implement appropriate measures., it is imperative to adapt existing methodologies and develop novel solutions that are grounded in societal agreement. (Kwak et al., 2022). Rothstein, M. A. (2021). Big Data, Surveillance Capitalism, and Precision Medicine: Challenges for Privacy. The Journal of Law, Medicine & Ethics, 49 (4), 666-676. https://doi.org/10.1017/jme.2021.91 Social contract theory often aligns with democratic ideals, where communities make decisions, and individuals shape societal norms. Ethics and data privacy apply to extensive data surveillance, and social contract theory is relevant. Democratic principles must guide data privacy rules and practices in this arena. This involves considering people's values and interests when making decisions. According to this essay, Big Data technologies and inventive commercial practices have contributed to surveillance capitalism. Surveillance capitalism is expected to provide data and profit from precision medicine discoveries (Rothstein, 2021). Responsibility differs when data is concentrated in a few prominent companies. Alternative approaches that spread data ownership and give individuals more control over their data must be considered. Social contract theory holds that violations of the social contract entail responsibility and consequences. Extensive data ownership and control by large corporations raises issues. Conclusion
9 Identifying Theory In conclusion, a theory provides a systematic and well-supported framework for understanding and analyzing numerous events. The theory provides underlying concepts or claims that explain specific parts of the tangible world in physics, philosophy, and the social sciences. Theories describe the ethical consequences of data practices and help establish ethical and regulatory frameworks. Ethical frameworks help assess data collection, processing, and use of morality. Deontology, virtue theory, social contract theory, and utilitarianism help explain data privacy's complicated ethical terrain. Technology changes constantly, requiring a complex and adaptable ethical approach. Ethical theories minimize this complexity by addressing multiple ethical dimensions. Given the varied opinions and goals in data privacy ethics discussions, multiple ethical theories provide a more holistic understanding.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10 Identifying Theory References Burkhardt, G., Boy, F., Doneddu, D., & Hajli, N. (2023). Privacy Behaviour: A Model for Online Informed Consent: JBE. Journal of Business Ethics, 186 (1), 237-255. https://doi.org/10.1007/s10551-022-05202-1 Kwak, C., Lee, J., & Lee, H. (2022). Could You Ever Forget Me? Why People Want to be Forgotten Online: JBE. Journal of Business Ethics, 179 (1), 25-42. https://doi.org/10.1007/s10551-021-04747-x Loi, M., Hauser, C., & Christen, M. (2022). Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?: JBE. Journal of Business Ethics, 175 (1), 7-19. https://doi.org/10.1007/s10551-020-04668-1 Mühlhoff, R. Predictive privacy: Towards an applied ethics of data analytics. Ethics Inf Technol 23 , 675–690 (2021). https://doi.org/10.1007/s10676-021-09606 Ohlhausen, M. K., & Rossen, B. (2022). Privacy and Competition: Discord or Harmony? The Antitrust Bulletin, 67(4), 552-561. https://doi- org.library.capella.edu/10.1177/0003603X221126140 Piasecki, J., & Cheah, P. Y. (2022). Ownership of individual-level health data, data sharing, and data governance. BMC Medical Ethics, 23 , 1-9. https://doi.org/10.1186/s12910-022- 00848-y
11 Identifying Theory Role of theory in research and its importance . Role of theory in research and its importance. (2022, June). http://journal.iujharkhand.edu.in/june-2022/6-Role-of-Theory-In- Research.html#:~:text=Theory%20provides%20explanation%2C%20understanding %20and,among%20attributes%2C%20variables%20or%20data. Rothstein, M. A. (2021). Big Data, Surveillance Capitalism, and Precision Medicine: Challenges for Privacy. The Journal of Law, Medicine & Ethics, 49 (4), 666-676. https://doi.org/10.1017/jme.2021.91 Ruotsalainen, P., & Blobel, B. (2023). Future pHealth Ecosystem-Holistic View on Privacy and Trust. Journal of Personalized Medicine, 13 (7), 1048. https://doi.org/10.3390/jpm13071048 Smith, H., Ives, J., Kennedy, M.-R., & Manzini, A. (2023, July). Ethics of Trust/worthiness in Autonomous Systems: A scoping review. DL. https://dl-acm- org.library.capella.edu/doi/pdf/10.1145/3597512.3600207 Steinhoff, L., & Martin, K. D. (2023). Putting Data Privacy Regulation into Action: The Differential Capabilities of Service Frontline Interfaces. Journal of Service Research, 26(3), 330-350. https://doi-org.library.capella.edu/10.1177/10946705221141925