Adopting trust as an ex post approach to privacy

被引:0
|
作者
Haleh Asgarinia [1 ]
机构
[1] University of Twente,Department of Philosophy
来源
AI and Ethics | 2025年 / 5卷 / 1期
关键词
AI accuracy; Competence; Social value of privacy; Trust norms; Trustworthiness;
D O I
10.1007/s43681-024-00421-w
中图分类号
学科分类号
摘要
This research explores how a person with whom information has been shared and, importantly, an artificial intelligence (AI) system used to deduce information from the shared data contribute to making the disclosure context private. The study posits that private contexts are constituted by the interactions of individuals in the social context of intersubjectivity based on trust. Hence, to make the context private, the person who is the trustee (i.e., with whom information has been shared) must fulfil trust norms. According to the commitment account of trustworthiness, a person is trustworthy only if they satisfy the norm of competence. It is argued that a person using an AI system to answer a question is competent only if they are ex post justified in believing what has been delivered by the AI system. A person’s belief is justified in the doxastic sense only if the AI system is accurate. This feature of AI’s performance affects a person’s competence and, as a result, trustworthiness. The effect of AI on trust as an essential component of making the context private, and thus on privacy, means an AI system also impacts privacy. Therefore, a private context is constituted when the individual with whom the information is shared fulfils the competence norm and the AI system used for analysing the information is sufficiently accurate to adhere to this norm. The result of this research emphasises the significance of the relationship between individuals involved in information-sharing and how an AI system used for analysing that information impacts the relationship regarding making the context private, as well as how it impacts privacy. The findings of this research have significant implications for improving or ameliorating privacy regulations in light of trust.
引用
收藏
页码:709 / 722
页数:13
相关论文
共 50 条
  • [1] What the Dickens: Post-mortem privacy and intergenerational trust
    Schafer, Burkhard
    Briggs, Jo
    Moncur, Wendy
    Nicol, Emma
    Azzopardi, Leif
    COMPUTER LAW & SECURITY REVIEW, 2023, 49
  • [2] Trust privacy
    Fostert, Frances H.
    CORNELL LAW REVIEW, 2008, 93 (03) : 555 - 619
  • [3] TrustCEP: Adopting a Trust-Based Approach for Distributed Complex Event Processing
    Dwarakanath, Rahul
    Koldehofe, Boris
    Bharadwaj, Yashas
    The An Binh Nguyen
    Eyers, David
    Steinmetz, Ralf
    2017 18TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (IEEE MDM 2017), 2017, : 30 - 39
  • [4] Achieving privacy in trust negotiations with an ontology-based approach
    Squicciarini, AC
    Bertino, E
    Ferrari, E
    Ray, I
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (01) : 13 - 30
  • [5] Security, Trust, and Privacy for the Internet of Vehicles: A Deep Learning Approach
    Muhammad, Ghulam
    Alhussein, Musaed
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (06) : 49 - 55
  • [6] A guide to selecting and adopting a privacy framework
    ISACA Journal, 2021, 2 : 15 - 20
  • [7] CAPACITY AND OPERATING VARIANCES - EX POST APPROACH
    RONEN, J
    JOURNAL OF ACCOUNTING RESEARCH, 1970, 8 (02) : 232 - 252
  • [8] Digital Trust and Adopting Generative AI
    Moyle, Ed
    ISACA Journal, 2023, 5 : 13 - 16
  • [9] Trust, ethics, and privacy
    Goldberg, I
    Hill, A
    Shostack, A
    BOSTON UNIVERSITY LAW REVIEW, 2001, 81 (02) : 407 - 422
  • [10] Trading privacy for trust
    Seigneur, JM
    Jensen, CD
    TRUST MANAGEMENT, PROCEEDING, 2004, 2995 : 93 - 107