메뉴 건너뛰기




Volumn 38, Issue 1, 2007, Pages 1-22

Philosophical theories of privacy: Implications for an adequate online privacy policy

Author keywords

Control theory of privacy; Informational privacy; Nonintrusion theory of privacy; Online privacy policies; Privacy in public; RALC theory of privacy; Seclusion theory of privacy

Indexed keywords


EID: 52149113254     PISSN: 00261068     EISSN: None     Source Type: Journal    
DOI: 10.1111/j.1467-9973.2006.00474.x     Document Type: Article
Times cited : (160)

References (43)
  • 2
    • 0041922051 scopus 로고
    • Privacy: Autonomy and Selective Disclosure
    • edited by J. Roland Pennock and John W. Chapman, New York: Atherton Press
    • Beardsley, Elizabeth. 1971. "Privacy: Autonomy and Selective Disclosure." In Nomos XIII: Privacy, edited by J. Roland Pennock and John W. Chapman, 56-70. New York: Atherton Press
    • (1971) Nomos XIII: Privacy , pp. 56-70
    • Beardsley, E.1
  • 4
    • 0039456088 scopus 로고    scopus 로고
    • Internet Privacy Concerns Confirm the Case for Intervention
    • February
    • Clarke, Roger. 1999. "Internet Privacy Concerns Confirm the Case for Intervention." Communications of the Association for Computing Machinery 42, no. 2 (February): 60-67
    • (1999) Communications of the Association for Computing Machinery , vol.42 , Issue.2 , pp. 60-67
    • Clarke, R.1
  • 7
    • 61049507573 scopus 로고    scopus 로고
    • DeMay v. Roberts. 1881. 46 U.S. 160ff.
    • DeMay v. Roberts. 1881. 46 U.S. 160ff
  • 8
    • 61049260350 scopus 로고    scopus 로고
    • Eisenstadt v. Baird. 1972. 405 U.S. 438ff.
    • Eisenstadt v. Baird. 1972. 405 U.S. 438ff
  • 9
    • 61049562232 scopus 로고    scopus 로고
    • The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data
    • Elgesem, Dag. 1999. "The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data." Ethics and Information Technology 1, no. 4:283-89
    • (1999) Ethics and Information Technology , vol.1 , Issue.4 , pp. 283-289
    • Elgesem, D.1
  • 10
    • 7744226711 scopus 로고
    • Privacy: A Rational Context
    • edited by M. David Ermann, Mary B. Williams, and Claudio Guitierrez, New York: Oxford University Press
    • Fried, Charles. 1990. "Privacy: A Rational Context." In Computers, Ethics, and Society, edited by M. David Ermann, Mary B. Williams, and Claudio Guitierrez, 50-63. New York: Oxford University Press
    • (1990) Computers, Ethics, and Society , pp. 50-63
    • Fried, C.1
  • 11
    • 61049377013 scopus 로고    scopus 로고
    • Data Mining and Privacy
    • 2d edition, edited by Richard A. Spinello and Herman T. Tavani, Sudbury, Mass, Jones and Bartlett
    • Fulda, Joseph S. 2004. "Data Mining and Privacy." In Readings in CyberEthics, 2d edition, edited by Richard A. Spinello and Herman T. Tavani, 413-17. Sudbury, Mass.: Jones and Bartlett
    • (2004) Readings in CyberEthics , pp. 413-417
    • Fulda, J.S.1
  • 12
    • 84923486508 scopus 로고
    • Privacy and the Limits of the Law
    • Gavison, Ruth. 1980. "Privacy and the Limits of the Law." Yale Law Journal 89:421-71
    • (1980) Yale Law Journal , vol.89 , pp. 421-471
    • Gavison, R.1
  • 13
    • 33744485801 scopus 로고    scopus 로고
    • P2P Networks and the Verizon v. RIAA Case: Implications for Personal Privacy and Intellectual Property
    • Grodzinsky, Frances S., and Herman T. Tavani. 2005. "P2P Networks and the Verizon v. RIAA Case: Implications for Personal Privacy and Intellectual Property." Ethics and Information Technology 7, no. 4: 243-50
    • (2005) Ethics and Information Technology , vol.7 , Issue.4 , pp. 243-250
    • Grodzinsky, F.S.1    Tavani, H.T.2
  • 14
    • 79954300170 scopus 로고    scopus 로고
    • Griswold v. Connecticut. 1965. 381 U.S. 479ff
    • Griswold v. Connecticut. 1965. 381 U.S. 479ff
  • 15
    • 0039085043 scopus 로고
    • Public Image
    • edited by Deborah G. Johnson and Helen Nissenbaum, Englewood Cliffs, N.J, Prentice Hall
    • Hunter, Larry. 1995. "Public Image." In Computers, Ethics, and Social Values, edited by Deborah G. Johnson and Helen Nissenbaum, 293-99. Englewood Cliffs, N.J.: Prentice Hall
    • (1995) Computers, Ethics, and Social Values , pp. 293-299
    • Hunter, L.1
  • 16
    • 79954250670 scopus 로고    scopus 로고
    • Computers and Privacy
    • 3d edition, Upper Saddle River, N.J.: Prentice Hall
    • Johnson, Deborah. G. 2001. "Computers and Privacy." In Computer Ethics, 3d edition, 81-102. Upper Saddle River, N.J.: Prentice Hall
    • (2001) Computer Ethics , pp. 81-102
    • Johnson, D.G.1
  • 17
    • 61049516690 scopus 로고
    • Privacy and Databases
    • edited by Deborah G. Johnson and Helen Nissenbaum, Englewood Cliffs, N.J, Prentice Hall
    • Johnson, Deborah G., and Helen Nissenbaum. 1995. "Privacy and Databases." In Computers, Ethics, and Social Values, edited by Deborah G. Johnson and Helen Nissenbaum, 262-68. Englewood Cliffs, N.J.: Prentice Hall
    • (1995) Computers, Ethics, and Social Values , pp. 262-268
    • Johnson, D.G.1    Nissenbaum, H.2
  • 18
    • 0038763194 scopus 로고
    • Cambridge: Harvard University Press
    • Miller, Arthur. 1971. The Assault on Privacy. Cambridge: Harvard University Press
    • (1971) The Assault on Privacy
    • Miller, A.1
  • 19
    • 0042422943 scopus 로고
    • The Ethics of Privacy Protection
    • Summer/Fall
    • Moor, James H. 1990. "The Ethics of Privacy Protection." Library Trends 39, nos. 1 and 2 (Summer/Fall): 69-82
    • (1990) Library Trends , vol.39 , Issue.1-2 , pp. 69-82
    • Moor, J.H.1
  • 20
    • 0042923706 scopus 로고    scopus 로고
    • Towards a Theory of Privacy in the Information Age
    • September
    • -. 1997. "Towards a Theory of Privacy in the Information Age." Computers and Society 27, no. 3 (September): 27-32
    • (1997) Computers and Society , vol.27 , Issue.3 , pp. 27-32
    • Moor, J.H.1
  • 21
    • 0038148809 scopus 로고    scopus 로고
    • Using Genetic Information while Protecting the Privacy of the Soul
    • -. 1999. "Using Genetic Information While Protecting the Privacy of the Soul." Ethics and Information Technology 1, no. 4:257-63
    • (1999) Ethics and Information Technology , vol.1 , Issue.4 , pp. 257-263
    • Moor, J.H.1
  • 22
    • 84900252298 scopus 로고    scopus 로고
    • Toward an Approach to Privacy in Public: Challenges of Information Technology
    • 2d edition, edited by Richard A. Spinello and Herman T. Tavani, Sudbury, Mass, Jones and Bartlett
    • -. 2004. "Toward an Approach to Privacy in Public: Challenges of Information Technology." In Readings in Cyber Ethics, 2d edition, edited by Richard A. Spinello and Herman T. Tavani, 450-61. Sudbury, Mass.: Jones and Bartlett
    • (2004) Readings in Cyber Ethics , pp. 450-461
    • Moor, J.H.1
  • 23
    • 0032282474 scopus 로고    scopus 로고
    • Protecting Privacy in an Information Age
    • Nissenbaum, Helen. 1998. "Protecting Privacy in an Information Age." Law and Philosophy 17:559-96
    • (1998) Law and Philosophy , vol.17 , pp. 559-596
    • Nissenbaum, H.1
  • 24
    • 61049569251 scopus 로고    scopus 로고
    • Olmstead v. U.S. 1928. 277 U.S. 438ff.
    • Olmstead v. U.S. 1928. 277 U.S. 438ff
  • 25
    • 0000333978 scopus 로고
    • Privacy, Morality and the Law
    • Parent. W. A. 1983. "Privacy, Morality and the Law." Philosophy and Public Affairs 12, no. 4:269-88
    • (1983) Philosophy and Public Affairs , vol.12 , Issue.4 , pp. 269-288
    • Parent, W.A.1
  • 26
    • 0038086632 scopus 로고
    • An Economic Theory of Privacy
    • May-June
    • Posner, Richard A. 1978. "An Economic Theory of Privacy." Regulations (May-June): 19-26
    • (1978) Regulations , pp. 19-26
    • Posner, R.A.1
  • 27
    • 84876010344 scopus 로고
    • Why Privacy Is Important
    • Rachels, James. 1975. "Why Privacy Is Important." Philosophy and Public Affairs 4, no. 4:323-33
    • (1975) Philosophy and Public Affairs , vol.4 , Issue.4 , pp. 323-333
    • Rachels, J.1
  • 31
    • 0011064668 scopus 로고    scopus 로고
    • KDD, Data Mining, and the Challenge for Normative Privacy
    • Tavani, Herman T. 1999. "KDD, Data Mining, and the Challenge for Normative Privacy." Ethics and Information Technology 1, no. 4: 265-73
    • (1999) Ethics and Information Technology , vol.1 , Issue.4 , pp. 265-273
    • Tavani, H.T.1
  • 32
    • 0002363511 scopus 로고    scopus 로고
    • Privacy and Security
    • edited by Duncan Langford, London: Macmillan
    • -. 2000. "Privacy and Security." In Internet Ethics, edited by Duncan Langford, 65-95. London: Macmillan
    • (2000) Internet Ethics , pp. 65-95
    • Tavani, H.T.1
  • 34
    • 61049157324 scopus 로고    scopus 로고
    • Environmental Genomics, Data Mining, and Informed Consent
    • edited by Herman T. Tavani, Sudbury, Mass, Jones and Bartlett
    • -. 2006. "Environmental Genomics, Data Mining, and Informed Consent." In Ethics, Computing, and Genomics, edited by Herman T. Tavani, 167-85. Sudbury, Mass.: Jones and Bartlett
    • (2006) Ethics, Computing, and Genomics , pp. 167-185
    • Tavani, H.T.1
  • 35
    • 2542469289 scopus 로고    scopus 로고
    • Privacy Protection, Control of Information, and Privacy-Enhancing Technologies
    • Tavani, Herman T., and James H. Moor. 2001. "Privacy Protection, Control of Information, and Privacy-Enhancing Technologies." Computers and Society 31, no. 1:6-11
    • (2001) Computers and Society , vol.31 , Issue.1 , pp. 6-11
    • Tavani, H.T.1    Moor, J.H.2
  • 37
    • 77954262653 scopus 로고
    • The Right to Privacy
    • Thomson, Judith Jarvis. 1975. "The Right to Privacy." Philosophy and Public Affairs 12, no. 4:295-315
    • (1975) Philosophy and Public Affairs , vol.12 , Issue.4 , pp. 295-315
    • Thomson, J.J.1
  • 38
    • 61049329066 scopus 로고    scopus 로고
    • KDD, Privacy, Individuality, and Fairness
    • 2d edition, edited by Richard A. Spinello and Herman T. Tavani, Sudbury, Mass, Jones and Bartlett
    • Vedder, Anton H. 2004. "KDD, Privacy, Individuality, and Fairness." In Readings in CyberEthics, 2d edition, edited by Richard A. Spinello and Herman T. Tavani, 404-12. Sudbury, Mass.: Jones and Bartlett
    • (2004) Readings in CyberEthics , pp. 404-412
    • Vedder, A.H.1
  • 39
    • 33744457379 scopus 로고    scopus 로고
    • Privacy as Life, Liberty, Property
    • Volkman, Richard. 2003. "Privacy as Life, Liberty, Property." Ethics and Information Technology 5, no. 4:199-210
    • (2003) Ethics and Information Technology , vol.5 , Issue.4 , pp. 199-210
    • Volkman, R.1
  • 40
    • 0000320829 scopus 로고
    • The Right to Privacy
    • Warren, Samuel, and Louis Brandeis. 1890. "The Right to Privacy." Harvard Law Review 14, no. 5:193-220
    • (1890) Harvard Law Review , vol.14 , Issue.5 , pp. 193-220
    • Warren, S.1    Brandeis, L.2
  • 41
    • 0009225308 scopus 로고
    • The Uses of Privacy in the Good Life
    • edited by J. Roland Pennock and John W. Chapman, New York: Atherton Press
    • Weinstein, Michael A. 1971. "The Uses of Privacy in the Good Life." In Nomos XIII: Privacy, edited by J. Roland Pennock and John W. Chapman, 88-104. New York: Atherton Press
    • (1971) Nomos XIII: Privacy , pp. 88-104
    • Weinstein, M.A.1
  • 43
    • 61049512967 scopus 로고    scopus 로고
    • Whelan v. Roe. 1977. 429 U.S. 589ff.
    • Whelan v. Roe. 1977. 429 U.S. 589ff


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.