-
2
-
-
0041922051
-
Privacy: Autonomy and Selective Disclosure
-
edited by J. Roland Pennock and John W. Chapman, New York: Atherton Press
-
Beardsley, Elizabeth. 1971. "Privacy: Autonomy and Selective Disclosure." In Nomos XIII: Privacy, edited by J. Roland Pennock and John W. Chapman, 56-70. New York: Atherton Press
-
(1971)
Nomos XIII: Privacy
, pp. 56-70
-
-
Beardsley, E.1
-
4
-
-
0039456088
-
Internet Privacy Concerns Confirm the Case for Intervention
-
February
-
Clarke, Roger. 1999. "Internet Privacy Concerns Confirm the Case for Intervention." Communications of the Association for Computing Machinery 42, no. 2 (February): 60-67
-
(1999)
Communications of the Association for Computing Machinery
, vol.42
, Issue.2
, pp. 60-67
-
-
Clarke, R.1
-
7
-
-
61049507573
-
-
DeMay v. Roberts. 1881. 46 U.S. 160ff.
-
DeMay v. Roberts. 1881. 46 U.S. 160ff
-
-
-
-
8
-
-
61049260350
-
-
Eisenstadt v. Baird. 1972. 405 U.S. 438ff.
-
Eisenstadt v. Baird. 1972. 405 U.S. 438ff
-
-
-
-
9
-
-
61049562232
-
The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data
-
Elgesem, Dag. 1999. "The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data." Ethics and Information Technology 1, no. 4:283-89
-
(1999)
Ethics and Information Technology
, vol.1
, Issue.4
, pp. 283-289
-
-
Elgesem, D.1
-
10
-
-
7744226711
-
Privacy: A Rational Context
-
edited by M. David Ermann, Mary B. Williams, and Claudio Guitierrez, New York: Oxford University Press
-
Fried, Charles. 1990. "Privacy: A Rational Context." In Computers, Ethics, and Society, edited by M. David Ermann, Mary B. Williams, and Claudio Guitierrez, 50-63. New York: Oxford University Press
-
(1990)
Computers, Ethics, and Society
, pp. 50-63
-
-
Fried, C.1
-
11
-
-
61049377013
-
Data Mining and Privacy
-
2d edition, edited by Richard A. Spinello and Herman T. Tavani, Sudbury, Mass, Jones and Bartlett
-
Fulda, Joseph S. 2004. "Data Mining and Privacy." In Readings in CyberEthics, 2d edition, edited by Richard A. Spinello and Herman T. Tavani, 413-17. Sudbury, Mass.: Jones and Bartlett
-
(2004)
Readings in CyberEthics
, pp. 413-417
-
-
Fulda, J.S.1
-
12
-
-
84923486508
-
Privacy and the Limits of the Law
-
Gavison, Ruth. 1980. "Privacy and the Limits of the Law." Yale Law Journal 89:421-71
-
(1980)
Yale Law Journal
, vol.89
, pp. 421-471
-
-
Gavison, R.1
-
13
-
-
33744485801
-
P2P Networks and the Verizon v. RIAA Case: Implications for Personal Privacy and Intellectual Property
-
Grodzinsky, Frances S., and Herman T. Tavani. 2005. "P2P Networks and the Verizon v. RIAA Case: Implications for Personal Privacy and Intellectual Property." Ethics and Information Technology 7, no. 4: 243-50
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.4
, pp. 243-250
-
-
Grodzinsky, F.S.1
Tavani, H.T.2
-
14
-
-
79954300170
-
-
Griswold v. Connecticut. 1965. 381 U.S. 479ff
-
Griswold v. Connecticut. 1965. 381 U.S. 479ff
-
-
-
-
15
-
-
0039085043
-
Public Image
-
edited by Deborah G. Johnson and Helen Nissenbaum, Englewood Cliffs, N.J, Prentice Hall
-
Hunter, Larry. 1995. "Public Image." In Computers, Ethics, and Social Values, edited by Deborah G. Johnson and Helen Nissenbaum, 293-99. Englewood Cliffs, N.J.: Prentice Hall
-
(1995)
Computers, Ethics, and Social Values
, pp. 293-299
-
-
Hunter, L.1
-
16
-
-
79954250670
-
Computers and Privacy
-
3d edition, Upper Saddle River, N.J.: Prentice Hall
-
Johnson, Deborah. G. 2001. "Computers and Privacy." In Computer Ethics, 3d edition, 81-102. Upper Saddle River, N.J.: Prentice Hall
-
(2001)
Computer Ethics
, pp. 81-102
-
-
Johnson, D.G.1
-
17
-
-
61049516690
-
Privacy and Databases
-
edited by Deborah G. Johnson and Helen Nissenbaum, Englewood Cliffs, N.J, Prentice Hall
-
Johnson, Deborah G., and Helen Nissenbaum. 1995. "Privacy and Databases." In Computers, Ethics, and Social Values, edited by Deborah G. Johnson and Helen Nissenbaum, 262-68. Englewood Cliffs, N.J.: Prentice Hall
-
(1995)
Computers, Ethics, and Social Values
, pp. 262-268
-
-
Johnson, D.G.1
Nissenbaum, H.2
-
18
-
-
0038763194
-
-
Cambridge: Harvard University Press
-
Miller, Arthur. 1971. The Assault on Privacy. Cambridge: Harvard University Press
-
(1971)
The Assault on Privacy
-
-
Miller, A.1
-
19
-
-
0042422943
-
The Ethics of Privacy Protection
-
Summer/Fall
-
Moor, James H. 1990. "The Ethics of Privacy Protection." Library Trends 39, nos. 1 and 2 (Summer/Fall): 69-82
-
(1990)
Library Trends
, vol.39
, Issue.1-2
, pp. 69-82
-
-
Moor, J.H.1
-
20
-
-
0042923706
-
Towards a Theory of Privacy in the Information Age
-
September
-
-. 1997. "Towards a Theory of Privacy in the Information Age." Computers and Society 27, no. 3 (September): 27-32
-
(1997)
Computers and Society
, vol.27
, Issue.3
, pp. 27-32
-
-
Moor, J.H.1
-
21
-
-
0038148809
-
Using Genetic Information while Protecting the Privacy of the Soul
-
-. 1999. "Using Genetic Information While Protecting the Privacy of the Soul." Ethics and Information Technology 1, no. 4:257-63
-
(1999)
Ethics and Information Technology
, vol.1
, Issue.4
, pp. 257-263
-
-
Moor, J.H.1
-
22
-
-
84900252298
-
Toward an Approach to Privacy in Public: Challenges of Information Technology
-
2d edition, edited by Richard A. Spinello and Herman T. Tavani, Sudbury, Mass, Jones and Bartlett
-
-. 2004. "Toward an Approach to Privacy in Public: Challenges of Information Technology." In Readings in Cyber Ethics, 2d edition, edited by Richard A. Spinello and Herman T. Tavani, 450-61. Sudbury, Mass.: Jones and Bartlett
-
(2004)
Readings in Cyber Ethics
, pp. 450-461
-
-
Moor, J.H.1
-
23
-
-
0032282474
-
Protecting Privacy in an Information Age
-
Nissenbaum, Helen. 1998. "Protecting Privacy in an Information Age." Law and Philosophy 17:559-96
-
(1998)
Law and Philosophy
, vol.17
, pp. 559-596
-
-
Nissenbaum, H.1
-
24
-
-
61049569251
-
-
Olmstead v. U.S. 1928. 277 U.S. 438ff.
-
Olmstead v. U.S. 1928. 277 U.S. 438ff
-
-
-
-
25
-
-
0000333978
-
Privacy, Morality and the Law
-
Parent. W. A. 1983. "Privacy, Morality and the Law." Philosophy and Public Affairs 12, no. 4:269-88
-
(1983)
Philosophy and Public Affairs
, vol.12
, Issue.4
, pp. 269-288
-
-
Parent, W.A.1
-
26
-
-
0038086632
-
An Economic Theory of Privacy
-
May-June
-
Posner, Richard A. 1978. "An Economic Theory of Privacy." Regulations (May-June): 19-26
-
(1978)
Regulations
, pp. 19-26
-
-
Posner, R.A.1
-
27
-
-
84876010344
-
Why Privacy Is Important
-
Rachels, James. 1975. "Why Privacy Is Important." Philosophy and Public Affairs 4, no. 4:323-33
-
(1975)
Philosophy and Public Affairs
, vol.4
, Issue.4
, pp. 323-333
-
-
Rachels, J.1
-
31
-
-
0011064668
-
KDD, Data Mining, and the Challenge for Normative Privacy
-
Tavani, Herman T. 1999. "KDD, Data Mining, and the Challenge for Normative Privacy." Ethics and Information Technology 1, no. 4: 265-73
-
(1999)
Ethics and Information Technology
, vol.1
, Issue.4
, pp. 265-273
-
-
Tavani, H.T.1
-
32
-
-
0002363511
-
Privacy and Security
-
edited by Duncan Langford, London: Macmillan
-
-. 2000. "Privacy and Security." In Internet Ethics, edited by Duncan Langford, 65-95. London: Macmillan
-
(2000)
Internet Ethics
, pp. 65-95
-
-
Tavani, H.T.1
-
34
-
-
61049157324
-
Environmental Genomics, Data Mining, and Informed Consent
-
edited by Herman T. Tavani, Sudbury, Mass, Jones and Bartlett
-
-. 2006. "Environmental Genomics, Data Mining, and Informed Consent." In Ethics, Computing, and Genomics, edited by Herman T. Tavani, 167-85. Sudbury, Mass.: Jones and Bartlett
-
(2006)
Ethics, Computing, and Genomics
, pp. 167-185
-
-
Tavani, H.T.1
-
35
-
-
2542469289
-
Privacy Protection, Control of Information, and Privacy-Enhancing Technologies
-
Tavani, Herman T., and James H. Moor. 2001. "Privacy Protection, Control of Information, and Privacy-Enhancing Technologies." Computers and Society 31, no. 1:6-11
-
(2001)
Computers and Society
, vol.31
, Issue.1
, pp. 6-11
-
-
Tavani, H.T.1
Moor, J.H.2
-
36
-
-
33644504071
-
Privacy, Secrecy, and Security
-
Thompson, Paul B. 2001. "Privacy, Secrecy, and Security." Ethics and Information Technology 3, no. 1:13-19
-
(2001)
Ethics and Information Technology
, vol.3
, Issue.1
, pp. 13-19
-
-
Thompson, P.B.1
-
37
-
-
77954262653
-
The Right to Privacy
-
Thomson, Judith Jarvis. 1975. "The Right to Privacy." Philosophy and Public Affairs 12, no. 4:295-315
-
(1975)
Philosophy and Public Affairs
, vol.12
, Issue.4
, pp. 295-315
-
-
Thomson, J.J.1
-
38
-
-
61049329066
-
KDD, Privacy, Individuality, and Fairness
-
2d edition, edited by Richard A. Spinello and Herman T. Tavani, Sudbury, Mass, Jones and Bartlett
-
Vedder, Anton H. 2004. "KDD, Privacy, Individuality, and Fairness." In Readings in CyberEthics, 2d edition, edited by Richard A. Spinello and Herman T. Tavani, 404-12. Sudbury, Mass.: Jones and Bartlett
-
(2004)
Readings in CyberEthics
, pp. 404-412
-
-
Vedder, A.H.1
-
39
-
-
33744457379
-
Privacy as Life, Liberty, Property
-
Volkman, Richard. 2003. "Privacy as Life, Liberty, Property." Ethics and Information Technology 5, no. 4:199-210
-
(2003)
Ethics and Information Technology
, vol.5
, Issue.4
, pp. 199-210
-
-
Volkman, R.1
-
40
-
-
0000320829
-
The Right to Privacy
-
Warren, Samuel, and Louis Brandeis. 1890. "The Right to Privacy." Harvard Law Review 14, no. 5:193-220
-
(1890)
Harvard Law Review
, vol.14
, Issue.5
, pp. 193-220
-
-
Warren, S.1
Brandeis, L.2
-
41
-
-
0009225308
-
The Uses of Privacy in the Good Life
-
edited by J. Roland Pennock and John W. Chapman, New York: Atherton Press
-
Weinstein, Michael A. 1971. "The Uses of Privacy in the Good Life." In Nomos XIII: Privacy, edited by J. Roland Pennock and John W. Chapman, 88-104. New York: Atherton Press
-
(1971)
Nomos XIII: Privacy
, pp. 88-104
-
-
Weinstein, M.A.1
-
43
-
-
61049512967
-
-
Whelan v. Roe. 1977. 429 U.S. 589ff.
-
Whelan v. Roe. 1977. 429 U.S. 589ff
-
-
-
|