Wk 5 Assignment-DHA
docx
keyboard_arrow_up
School
Capella University *
*We aren’t endorsed by this school
Course
DHAV8925
Subject
Philosophy
Date
Jan 9, 2024
Type
docx
Pages
11
Uploaded by lherard81
1
Identifying Theory
Identifying a Theory
Lesley-Ann Herard
Capella University
DHA V-8925-Doctoral Project Development- Topic Idea
Dr. Kerrie Roberson
November,2023
2
Identifying Theory
Abstract
A theory is a systematic and well-supported interpretive or theoretical structure that
improves understanding and analysis of phenomena. Science, philosophy, and the social sciences
use this phrase to describe a collection of underlying principles, conceptions, or statements that
explain an inevitable feature of the tangible world(Role of theory in research and its importance,
2022). Approaches help explain the ethical implications of data practices in ethics and data
protection. They also aid ethical and regulatory growth. Data privacy ethics can be examined
using ethical frameworks. This approach works in many contexts. Multiple ethical theories
simplify understanding and address the complexity of ethical decision-making in the
continuously developing world of technology. Data privacy ethics may require a complex
approach considering multiple views and ideals. Moral ideas also influence these discussions.
Burkhardt, G., Boy, F., Doneddu, D., & Hajli, N. (2023). Privacy Behaviour: A Model for
Online Informed Consent: JBE.
Journal of Business Ethics,
186
(1), 237-255.
https://doi.org/10.1007/s10551-022-05202-1
The moral philosophy of utilitarianism prioritizes outcomes to determine morality. The
theory addresses data privacy ethics well. A clear ethical foundation for decision-making is
utilitarianism. This helps academics and policymakers choose the best approach to maximize
well-being and social benefit. In complex ethical dilemmas, this can be helpful. This article
applies the selected theory to tracking cookies. It explains web users' activities in the context of
subject interactions, notably informed consent. This article shows that contractually, which
emphasizes human autonomy and informed permission, is an appropriate framework for
analyzing personal data-sharing agreements (Burkhardt et al., 2022). Research should improve
3
Identifying Theory
an overarching behavioral framework for electronic informed authorization that integrates
privacy-related aspects across domains.. This study fills that gap.
Piasecki, J., & Cheah, P. Y. (2022). Ownership of individual-level health data, data
sharing, and data governance.
BMC Medical Ethics,
23
, 1-9.
https://doi.org/10.1186/s12910-022-
00848-y
Deontology and ownership status affect how health data is used. This study analyzes the
limits of the two individual-level health data ownership models. Justice, autonomy, risk
reduction, economic, technological, and philosophical factors are examined. According to
Piasecki and Cheah (2022), private or public ownership alone cannot solve data use issues
efficiently, reasonably, and ethically. Qualitative research participants often share sensitive
information. Researchers are ethically required to protect participant confidentiality. As shown in
this study, deontology supports participant confidentiality. The gap shows that privacy protection
is a core value, but the digital environment may need help to define it. Deontological rules for
emerging privacy issues can be difficult to apply due to rapid technological advancement and
complex data ecosystems. This research illuminates how data privacy affects ethics.
Loi, M., Hauser, C., & Christen, M. (2022). Highway to (Digital) Surveillance: When Are
Clients Coerced to Share Their Data with Insurers?: JBE.
Journal of Business Ethics,
175
(1), 7-
19.
https://doi.org/10.1007/s10551-020-04668-1
Right-based ethics addresses ethical behavior needed to protect individual rights. This
essay investigates how insurance companies entrap people by requesting their digital data. This
statement uses the concept to demonstrate how rights are protected. As technology advances, a
rights-based framework is needed to assess its effects on individual rights. Data gathering and
analysis technology should be ethically designed and implemented to avoid rights violations.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Identifying Theory
This article discusses sovereignty and ethical data handling, precisely the moral objection to
insurance firms pressuring people to give private data. This activity may erode human liberty,
raise vulnerability to hazards, and hinder the ability to live a self-governing, honest, and
unfettered life, making it morally wrong. Analyzing the coercer's will in threat contexts is
difficult (Loi et al., 2022). Qualitative researchers must protect participants' identities, especially
when sharing study outcomes.
Ruotsalainen, P., & Blobel, B. (2023). Future pHealth Ecosystem-Holistic View on
Privacy and Trust.
Journal of Personalized Medicine,
13
(7), 1048.
https://doi.org/10.3390/jpm13071048
Virtue ethics emphasizes morality and character development. In the P health ecosystem,
virtue theory can impact healthcare and public health ethics, principles, and conduct. This aligns
with my research on ethics and data privacy. It examines how healthcare workers cultivate
virtues in their interactions with patients and the community, fostering confidence and
trustworthy treatment. Virtue theory provides an ethical foundation for qualitative public health
research. It shows how researchers can promote respect and honesty. According to Ruotsalainen
and Blobel (2023), these characteristics help create a research culture that prioritizes ethics,
respects individual rights, and fosters an engaging and trusted public health community. Virtue
cultivation in public health education and professional development needs to be improved. Virtue
training and its practical use in public health programs deserve further attention.
Mühlhoff, R. Predictive privacy: Towards an applied ethics of data analytics.
Ethics Inf
Technol
23
, 675–690 (2021).
https://doi.org/10.1007/s10676-021-09606-x
5
Identifying Theory
In the domains of analysis of data and artificial intelligence, individuals and organizations
must be honest about data collection and processing. This means conducting these things
honestly and without manipulation or distortion. Virtue theory supports such integrity. Data
analytics and methods based on data in healthcare computing technology are examined in this
article. This article discusses using data to address the topic. Predictive analytics to predict
sensitive personal information or discriminate against people based on irrelevant data presents
ethical and data protection problems. The present study introduces "predictive privacy" as an
ethical norm to protect individuals and collectives from discriminatory treatment resulting from
machine learning and Big Data analytics (Mühlhoff, 2021). In this theory, qualitative
investigations show how researchers use data analytics while maintaining data accuracy,
preventing fraud, and concluding authenticity. Applying this precaution will protect research
integrity. Finally, the framework of theory may have inadequacies. Data analytics organizations
and practitioners may benefit from ethical training emphasizing morality and technical skills. A
comprehensive strategy may connect data analytics' needs and virtue theory's ethics.
Ohlhausen, M. K., & Rossen, B. (2022). Privacy and Competition: Discord or Harmony?
The Antitrust Bulletin, 67(4), 552-561. https://doi-
org.library.capella.edu/10.1177/0003603X221126140
The social contract provides a framework for understanding privacy and competition in
society. Framing conversations around shared commitments to balance individual freedoms with
communal aims may be helpful. This essay matches my study topic and theoretical framework.
This article discusses the current debate over consumer privacy and data use regulation in
competition law. The changing nature of customer confidentiality and the growing demand for
regulation are fascinating. This talk will examine recent proposals to use competition law to
6
Identifying Theory
address data collection and aggregation issues (Ohlhausen & Rossen, 2022). This article
examines Congress's ethical, data privacy, and competition legislative proposals. Social contract
theory helps qualitative researchers understand data privacy ethics in conformity with privacy
and competition laws. Social contract theory may have gaps when legislation conflicts with
individual autonomy, collective accountability, and society's welfare. To close the gap, legislative
frameworks must be updated to meet evolving demands and expectations.
Steinhoff, L., & Martin, K. D. (2023). Putting Data Privacy Regulation into Action: The
Differential Capabilities of Service Frontline Interfaces. Journal of Service Research, 26(3), 330-
350.
https://doi-org.library.capella.edu/10.1177/10946705221141925
Organizations can improve ethics by incorporating virtue theory into data privacy
regulatory services' culture, policy, and operations. This method promotes morality, ethics, and
human well-being beyond legal compliance. In qualitative research, data protection standards
may need to be revised, forcing researchers to traverse ethical difficulties in ambiguous settings.
This includes protecting participant rights and critically examining privacy-compromising
actions. My research interest is the relationship between data privacy and ethics rules and their
compliance with large-scale data privacy requirements. This investigation shows the gap
between scientific understanding and corporate practice. Therefore, this often adds to frontline
workers' already heavy responsibilities. This study conceptually analyzes three service frontline
interface setups with different technology integration degrees. The goal is to fill the gap in
services research on data privacy legislation's impact and administration at the frontline. The
following study will explain how six worldwide data privacy standards apply to service frontline
interfaces (Steinhoff & Martin, 2023).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
Identifying Theory
Smith, H., Ives, J., Kennedy, M.-R., & Manzini, A. (2023, July).
Ethics of
Trust/worthiness in Autonomous Systems: A scoping review.
DL. https://dl-acm-
org.library.capella.edu/doi/pdf/10.1145/3597512.3600207
Smith et al. (2023) state that data privacy practices validate trustworthiness. Virtue theory
practitioners emphasize stakeholder trust. Validation techniques that are honest, transparent, and
ethical will achieve this. This means valuing the people who contribute to the study, especially in
qualitative research, where researchers often contact closely with participants. Virtuous conduct
protects participants and promotes equity. Virtue ethics promotes humility, which affects
validation. Virtue ethics researchers appreciate the subjectivity of qualitative research and are
humble about interpretations. Researchers who fail to disclose their biases and address them may
create a gap, lowering the trustworthiness of their findings.
Kwak, C., Lee, J., & Lee, H. (2022). Could You Ever Forget Me? Why People Want to be
Forgotten Online: JBE.
Journal of Business Ethics,
179
(1), 25-42.
https://doi.org/10.1007/s10551-021-04747-x
In data privacy, being forgotten means the ethical obligation to anonymize or delete
personal data after the study. Scholars can use virtue theory to promote responsibility. This
approach emphasizes the significance of actively taking steps to ensure civility and efficiency,
lowering the risk of bad outcomes. Virtue ethics, the study of moral virtues, includes virtue
theory. This study uses personal experiences to analyze online forgetfulness motivations. The
issues of keeping private digital records are also examined. Qualitative content analysis was
utilized to analyze Korean Internet users' open-ended questionnaires. This study examines why
people want to erase themselves online. This study may help us understand how countries handle
ethics and data privacy. The growing the existence of a disparity among science and morality has
8
Identifying Theory
the potential to give rise to novel societal and ethical dilemmas.
The potential eradication or
mitigation of digital illicit activity, online bullying, and internet stalking is contingent upon the
ability of legislation to effectively adapt to advancements in technology. To effectively tackle the
matter pertaining to socioeconomic delay and minimize its negative consequences on anonymity,
it is imperative to implement appropriate measures., it is imperative to adapt existing
methodologies and develop novel solutions that are grounded in societal agreement. (Kwak et al.,
2022).
Rothstein, M. A. (2021). Big Data, Surveillance Capitalism, and Precision Medicine:
Challenges for Privacy.
The Journal of Law, Medicine & Ethics,
49
(4), 666-676.
https://doi.org/10.1017/jme.2021.91
Social contract theory often aligns with democratic ideals, where communities make
decisions, and individuals shape societal norms. Ethics and data privacy apply to extensive data
surveillance, and social contract theory is relevant. Democratic principles must guide data
privacy rules and practices in this arena. This involves considering people's values and interests
when making decisions. According to this essay, Big Data technologies and inventive
commercial practices have contributed to surveillance capitalism. Surveillance capitalism is
expected to provide data and profit from precision medicine discoveries (Rothstein, 2021).
Responsibility differs when data is concentrated in a few prominent companies. Alternative
approaches that spread data ownership and give individuals more control over their data must be
considered. Social contract theory holds that violations of the social contract entail responsibility
and consequences. Extensive data ownership and control by large corporations raises issues.
Conclusion
9
Identifying Theory
In conclusion, a theory provides a systematic and well-supported framework for
understanding and analyzing numerous events. The theory provides underlying concepts or
claims that explain specific parts of the tangible world in physics, philosophy, and the social
sciences. Theories describe the ethical consequences of data practices and help establish ethical
and regulatory frameworks. Ethical frameworks help assess data collection, processing, and use
of morality. Deontology, virtue theory, social contract theory, and utilitarianism help explain data
privacy's complicated ethical terrain. Technology changes constantly, requiring a complex and
adaptable ethical approach. Ethical theories minimize this complexity by addressing multiple
ethical dimensions. Given the varied opinions and goals in data privacy ethics discussions,
multiple ethical theories provide a more holistic understanding.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
10
Identifying Theory
References
Burkhardt, G., Boy, F., Doneddu, D., & Hajli, N. (2023). Privacy Behaviour: A Model for Online
Informed Consent: JBE.
Journal of Business Ethics,
186
(1), 237-255.
https://doi.org/10.1007/s10551-022-05202-1
Kwak, C., Lee, J., & Lee, H. (2022). Could You Ever Forget Me? Why People Want to be
Forgotten Online: JBE.
Journal of Business Ethics,
179
(1), 25-42.
https://doi.org/10.1007/s10551-021-04747-x
Loi, M., Hauser, C., & Christen, M. (2022). Highway to (Digital) Surveillance: When Are
Clients Coerced to Share Their Data with Insurers?: JBE.
Journal of Business
Ethics,
175
(1), 7-19.
https://doi.org/10.1007/s10551-020-04668-1
Mühlhoff, R. Predictive privacy: Towards an applied ethics of data analytics.
Ethics Inf
Technol
23
, 675–690 (2021).
https://doi.org/10.1007/s10676-021-09606
Ohlhausen, M. K., & Rossen, B. (2022). Privacy and Competition: Discord or Harmony? The
Antitrust Bulletin, 67(4), 552-561. https://doi-
org.library.capella.edu/10.1177/0003603X221126140
Piasecki, J., & Cheah, P. Y. (2022). Ownership of individual-level health data, data sharing, and
data governance.
BMC Medical Ethics,
23
, 1-9.
https://doi.org/10.1186/s12910-022-
00848-y
11
Identifying Theory
Role of theory in research and its importance
. Role of theory in research and its importance.
(2022, June). http://journal.iujharkhand.edu.in/june-2022/6-Role-of-Theory-In-
Research.html#:~:text=Theory%20provides%20explanation%2C%20understanding
%20and,among%20attributes%2C%20variables%20or%20data.
Rothstein, M. A. (2021). Big Data, Surveillance Capitalism, and Precision Medicine: Challenges
for Privacy.
The Journal of Law, Medicine & Ethics,
49
(4), 666-676.
https://doi.org/10.1017/jme.2021.91
Ruotsalainen, P., & Blobel, B. (2023). Future pHealth Ecosystem-Holistic View on Privacy and
Trust.
Journal of Personalized Medicine,
13
(7), 1048.
https://doi.org/10.3390/jpm13071048
Smith, H., Ives, J., Kennedy, M.-R., & Manzini, A. (2023, July).
Ethics of Trust/worthiness in
Autonomous Systems: A scoping review.
DL. https://dl-acm-
org.library.capella.edu/doi/pdf/10.1145/3597512.3600207
Steinhoff, L., & Martin, K. D. (2023). Putting Data Privacy Regulation into Action: The
Differential Capabilities of Service Frontline Interfaces. Journal of Service Research,
26(3), 330-350. https://doi-org.library.capella.edu/10.1177/10946705221141925