-
1
-
-
33845439392
-
An ontology-based approach for managing and maintaining privacy in information systems
-
Berlin-Heidelberg: Springer
-
Abou-Tair, D. el Diehn I., and Stefan Berlik. 2006. An ontology-based approach for managing and maintaining privacy in information systems. Lectures notes in computer science, 4275: 983-994 (Berlin-Heidelberg: Springer).
-
(2006)
Lectures Notes in Computer Science
, vol.4275
, pp. 983-994
-
-
Abou-Tair, D.1
El Diehn, I.2
Berlik, S.3
-
2
-
-
0040269133
-
Introduction
-
eds. Philip E. Agre and Mark Rotenberg, Cambridge: The MIT Press
-
Agre, Philip E. 1997. Introduction. In Technology and privacy: The new landscape, eds. Philip E. Agre and Mark Rotenberg, 1-28. Cambridge: The MIT Press.
-
(1997)
Technology and Privacy: The New Landscape
, pp. 1-28
-
-
Agre, P.E.1
-
3
-
-
51749107030
-
Recaptcha: Human-based character recognition via web security measures
-
von Ahn, Luis, Maurer, Benjamin, McMillen, Colin, Abraham, David, and Manuel Blum. 2008. reCAPTCHA: Human-based character recognition via web security measures. Science 321 (5895): 1465-1468.
-
(2008)
Science
, Issue.5895
, pp. 1465-1468
-
-
Von Ahn1
Luis, M.2
Benjamin, M.3
Colin, A.4
-
4
-
-
84873390780
-
Designing for human values in an urban simulation system: Value sensitive design and participatory design
-
Toronto: ACM Press, Accessed 23 Dec 2010
-
Borning, Alan, Friedman, Batya, and Peter H. Kahn. 2004. Designing for human values in an urban simulation system: Value sensitive design and participatory design. Proceedings of eighth biennial participatory design conference, 64-67. Toronto: ACM Press. http://www.urbansim.org/pub/Research/ResearchPapers/vsd-and-participatory-design-2004.pdf. Accessed 23 Dec 2010
-
(2004)
Proceedings of Eighth Biennial Participatory Design Conference
, pp. 64-67
-
-
Borning, A.1
Friedman, B.2
Kahn, P.H.3
-
5
-
-
79960239806
-
-
Amsterdam: IOS Press
-
Breuker, Joost, Casanovas, Pompeu, Klein, Michel C.A., and Enrico Francesconi (eds.). 2009. Law, ontologies and the semantic web. Amsterdam: IOS Press.
-
(2009)
Law, Ontologies and the Semantic Web
-
-
Breuker, J.1
Casanovas, P.2
Klein, M.C.3
Francesconi, E.4
-
6
-
-
84929899694
-
Code, control, and choice: Why east is east and west is west
-
Brownsword, Roger. 2005. Code, control, and choice: Why east is east and west is west. Legal Studies 25 (1): 1-21.
-
(2005)
Legal Studies
, vol.25
, Issue.1
, pp. 1-21
-
-
Brownsword, R.1
-
7
-
-
84856457743
-
Ai approaches to the complexity of legal systems
-
Berlin: Springer
-
Casanovas, Pompeu, Pagallo, Ugo, Sartor, Giovanni, and Gianmaria Ajani (eds.). 2010. AI approaches to the complexity of legal systems. Complex systems, the semantic web, ontologies, argumentation, and dialogue. Berlin: Springer.
-
(2010)
Complex Systems, the Semantic Web, Ontologies, Argumentation, and Dialogue
-
-
Casanovas, P.1
Pagallo, U.2
Giovanni, S.3
Ajani, G.4
-
8
-
-
84949445790
-
The neurona ontology: A data protection compliance ontology
-
CA., USA. 22-24 March
-
Casellas, Nuria, Torralba, Sergi, Nieto, Juan-Emilio, Meroiio, Albert, Roig, Antoni, Reyes, Mario, and Pompeu Casanovas. 2010. The Neurona ontology: A data protection compliance ontology. Paper presented at the intelligent privacy management symposium, Stanford University, CA., USA. 22-24 March 2010.
-
(2010)
Paper Presented at the Intelligent Privacy Management Symposium, Stanford University
, pp. 2010
-
-
Casellas, N.1
Torralba, S.2
Nieto, J.-E.3
Meroiio, A.4
Roig, A.5
Reyes, M.6
Casanovas, P.7
-
10
-
-
84856489990
-
Privacy by design: The definitive workshop
-
Cavoukian, Ann. 2010.Privacy by design: The definitive workshop. Identity in the Information Society 3 (2): 247-251.
-
(2010)
Identity in the Information Society
, vol.3
, Issue.2
, pp. 247-251
-
-
Cavoukian, A.1
-
11
-
-
33646914062
-
Future technologies, dystopic futures and the precautionary principle
-
Clarke, Steve. 2005. Future technologies, dystopic futures and the precautionary principle. Ethics and Information Technology 7 (4): 121-126.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.4
, pp. 121-126
-
-
Clarke, S.1
-
12
-
-
52049110745
-
P3p deployment on websites
-
Cranor, Lorrie F., Egelman, Serge, Sheng, Steve, McDonald, Aleecia M., and Abdur Chowdhury. 2008. P3P deployment on websites.Electronic Commerce Research and Applications 7 (3): 274-293.
-
(2008)
Electronic Commerce Research and Applications
, vol.7
, Issue.3
, pp. 274-293
-
-
Cranor, L.F.1
Egelman, S.2
Sheng, S.3
Mc Donald, A.M.4
Chowdhury, A.5
-
13
-
-
84928413409
-
Embodying values in technology: Theory and practice
-
eds. Jeroen van den Hoven and John Weckert, New York: Cambridge University Press
-
Flanagan, Mary, Howe, Daniel C., and Helen Nissenbaum. 2008.Embodying values in technology: Theory and practice. In Information technology and moral philosophy, eds. Jeroen van den Hoven and John Weckert, 322-353. New York: Cambridge University Press.
-
(2008)
Information Technology and Moral Philosophy
, pp. 322-353
-
-
Flanagan, M.1
Howe, D.C.2
Nissenbaum, H.3
-
14
-
-
56549095361
-
Information ethics, its nature and scope
-
Floridi, Luciano. 2005. Information ethics, its nature and scope. Computers and Society 36 (3): 21-36.
-
(2005)
Computers and Society
, vol.36
, Issue.3
, pp. 21-36
-
-
Floridi, L.1
-
15
-
-
33750992195
-
Four challenges for a theory of informational privacy
-
Floridi, Luciano. 2006. Four challenges for a theory of informational privacy. Ethics and Information Technology 8 (3): 109-119.
-
(2006)
Ethics and Information Technology
, vol.8
, Issue.3
, pp. 109-119
-
-
Floridi, L.1
-
16
-
-
2342647845
-
Value-sensitive design
-
Friedman, Batya. 1986. Value-sensitive design. Interactions 3 (6): 17-23.
-
(1986)
Interactions
, vol.3
, Issue.6
, pp. 17-23
-
-
Friedman, B.1
-
18
-
-
20444478398
-
Human values, ethics, and design
-
eds. Julie A. Jacko and Andrew Sear, Mahwah: Lawrence Erlbaum Associates
-
Friedman, Batya, and Peter H. Kahn Jr. 2003. Human values, ethics, and design. In: The human- computer interaction handbook, eds. Julie A. Jacko and Andrew Sear, 1177-1201. Mahwah: Lawrence Erlbaum Associates.
-
(2003)
The Human- Computer Interaction Handbook
, pp. 1177-1201
-
-
Friedman, B.1
Kahn, P.H.2
-
19
-
-
85139651074
-
Value sensitive design and information systems
-
eds. Ping Zhang and Dennis Galletta, New York: Armonk
-
Friedman, Batya, Kahn, Peter H. Jr., andAlanBorning. 2006.Value sensitive design and information systems. In Human-computer interaction in management information systems: Foundations, eds. Ping Zhang and Dennis Galletta, 348-372. New York: Armonk.
-
(2006)
Human-Computer Interaction in Management Information Systems: Foundations
, pp. 348-372
-
-
Friedman, B.1
Kahn, P.H.2
-
21
-
-
84856442435
-
The social impact of p2p systems
-
eds. Xuemin Shen, Heather Yu, John Buford and Mursalin Akon, Heidelberg: Springer
-
Glorioso, Andrea, Pagallo, Ugo, and Giancarlo Ruffo. 2010.The social impact of P2P systems. In Handbook of peer-to-peer networking, eds. Xuemin Shen, Heather Yu, John Buford and Mursalin Akon, 47-70. Heidelberg: Springer.
-
(2010)
Handbook of Peer-To-Peer Networking
, pp. 47-70
-
-
Glorioso, A.1
Pagallo, U.2
Ruffo, G.3
-
22
-
-
84949469832
-
Online file sharing: Resolving the tensions between privacy and property interest
-
eds. Terry W. Bynum, Maria Calzarossa, Ivo De Lotto and Simon Rogerson, Mantova: Tipografia Commerciale
-
Grodzinsky, Frances S. and Herman T. Tavani. 2008. Online file sharing: Resolving the tensions between privacy and property interest. In Proceedings of ETHICOMP2008 “Living, Working and Learning Beyond Technology”, eds. Terry W. Bynum, Maria Calzarossa, Ivo De Lotto and Simon Rogerson, 373-383.Mantova: Tipografia Commerciale.
-
(2008)
Proceedings of ETHICOMP2008 “Living, Working and Learning beyond Technology”
, pp. 373-383
-
-
Grodzinsky, F.S.1
Tavani, H.T.2
-
23
-
-
84856457741
-
Opinion of the european data protection supervisor on the communication from the commission to the european parliament and the council on the follow-up of the work program for better implementation of the data protection directive
-
C
-
Hustinx, Peter. 2007. Opinion of the European data protection supervisor on the communication from the commission to the European parliament and the council on the follow-up of the work program for better implementation of the data protection directive. Official Journal of the European Union 27 Oct. 2007, C 255: 1-12.
-
(2007)
Official Journal of the European Union
, vol.255
, pp. 1-12
-
-
Hustinx, P.1
-
24
-
-
37249029813
-
-
Accessed 20 April 2009
-
Jobs, Steve. 2007. Thoughts on music. http://www.apple.com/hotnews/thoughtsonmusic/. Accessed 20 April 2009.
-
(2007)
Thoughts on Music
-
-
Jobs, S.1
-
27
-
-
33344479307
-
Pecan: An architecture for user privacy and profiles in electronic commerce contexts on the semantic web
-
Jutla, Dawn N., Bodorik, Peter, and Yanjun Zhan. 2006.PeCAN: An architecture for user privacy and profiles in electronic commerce contexts on the semantic web. Information Systems 31 (4-5): 295-320.
-
(2006)
Information Systems
, vol.31
, Issue.5
, pp. 295
-
-
Jutla, D.N.1
Bodorik, P.2
Zhan, Y.3
-
28
-
-
84856450512
-
Layering privacy on operating systems, social networks, and other platforms by design
-
Jutla, Dawn N. 2010. Layering privacy on operating systems, social networks, and other platforms by design. Identity in the Information Society 3 (2): 319-341.
-
(2010)
Identity in the Information Society
, vol.3
, Issue.2
, pp. 319-341
-
-
Jutla, D.N.1
-
30
-
-
0042306308
-
Architecture as crime control
-
Katyal, Neal. 2002. Architecture as crime control. Yale Law Journal 111 (5): 1039-1139.
-
(2002)
Yale Law Journal
, vol.111
, Issue.5
, pp. 1039-1139
-
-
Katyal, N.1
-
31
-
-
0742311431
-
Digital architecture as crime control
-
Katyal, Neal. 2003.Digital architecture as crime control. Yale Law Journal 112 (6): 101-129.
-
(2003)
Yale Law Journal
, vol.112
, Issue.6
, pp. 101-129
-
-
Katyal, N.1
-
32
-
-
33645654600
-
Building privacy into the semantic web: Ontology needed now
-
Honolulu, Hawaii, Accessed on 23 Dec 2011
-
Kim, Anya, Hoffman, Lance J., and C. Dianne Martin. 2002. Building privacy into the semantic web: Ontology needed now. Semantic web workshop 2002. Honolulu, Hawaii. http://semanticweb2002.aifb.uni-karlsruhe.de/proceedings/Position/kim2.pdf. Accessed on 23 Dec 2011.
-
(2002)
Semantic Web Workshop 2002
-
-
Kim, A.1
Hoffman, L.J.2
Dianne Martin, C.3
-
33
-
-
33847045636
-
Setting software defaults: Perspectives from law, computer science and behavioural economics
-
Kesan, Jay P. and Rajiv C. Shah. 2006. Setting software defaults: Perspectives from law, computer science and behavioural economics. Notre Dame Law Review 82:583-634.
-
(2006)
Notre Dame Law Review
, vol.82
, pp. 583-634
-
-
Kesan, J.P.1
Shah, R.C.2
-
37
-
-
34548525381
-
Dimitra and iakovos venieris
-
Lioudakis, Georgios, Koutsoloukasa, Eleftherios, Tselikasa, Nikolaos, Kapellakia, Sofia, Prezer- akosa, Georg, Kaklamani, Dimitra and Iakovos Venieris. 2007. A middleware architecture for privacy protection. The International Journal of Computer and Telecommunications Networking 51 (16): 4679-4696.
-
(2007)
The International Journal of Computer and Telecommunications Networking
, vol.51
, Issue.16
, pp. 4679-4696
-
-
Lioudakis, G.1
Koutsoloukasa, E.2
Tselikasa, N.3
Kapellakia, S.4
Akosa, P.5
Georg, K.6
-
38
-
-
33747230391
-
Computational models of ethical reasoning: Challenges, initial steps, and future directions
-
McLaren, Bruce. 2006. Computational models of ethical reasoning: Challenges, initial steps, and future directions. IEEE intelligent systems 2006 (July/August): 29-37.
-
(2006)
IEEE Intelligent Systems
, vol.2006
, pp. 29-37
-
-
Mc Laren, B.1
-
39
-
-
84949448272
-
To be anonymous or not to be, that is the privacy question: Interview to jeffrey rosen
-
Accessed 15 Oct 2010
-
Mills, Elinor. 2008. To be anonymous or not to be, that is the privacy question: interview to jeffrey rosen. News blog. http://news.cnet.com/8301-10784_3-9889255-7.html. Accessed 15 Oct 2010.
-
(2008)
News Blog
-
-
Mills, E.1
-
40
-
-
0347032661
-
Ethics into design
-
eds. Richard Buchanan and Victor Margolin, Chicago: University of Chicago Press
-
Mitcham, Carl. 1995. Ethics into design. In Discovering design, eds. Richard Buchanan and Victor Margolin, 173-179. Chicago: University of Chicago Press.
-
(1995)
Discovering Design
, pp. 173-179
-
-
Mitcham, C.1
-
41
-
-
33845447288
-
A legal ontology to support privacy preservation in location-based services
-
Berlin-Heidelberg: Springer
-
Mitre, Hugo, Gonzalez-Tablas, Ana Isabel, Ramos, Benjamin, and Arturo Ribagorda. 2006. A legal ontology to support privacy preservation in location-based services. Lectures notes in computer science, 4278: 1755-1764 (Berlin-Heidelberg: Springer).
-
(2006)
Lectures notes in computer scienc
, vol.4278
, pp. 1755-1764
-
-
Mitre, H.1
Gonzalez-Tablas, A.I.2
Ramos, B.3
Ribagorda, A.4
-
42
-
-
33747228513
-
The nature, importance, and difficulty of machine ethics
-
Moor, James. 2006. The nature, importance, and difficulty of machine ethics. IEEE intelligent systems 21(4): 18-21.
-
(2006)
IEEE Intelligent Systems
, vol.21
, Issue.4
, pp. 18-21
-
-
Moor, J.1
-
43
-
-
0032282474
-
Protecting privacy in an information age: The problem of privacy in public
-
Nissenbaum, Helen. 1998.Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy 17 (5-6): 559-596.
-
(1998)
Law and Philosophy
, vol.17
, Issue.6
, pp. 559-596
-
-
Nissenbaum, H.1
-
44
-
-
1842538795
-
Privacy as contextual integrity
-
Nissenbaum, Helen. 2004. Privacy as contextual integrity.Washington Law Review 79 (1): 119-158.
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 119
-
-
Nissenbaum, H.1
-
45
-
-
78649533283
-
Small world-paradigm and empirical research in legal ontologies: A topological approach
-
eds. Gianmaria Ajani, Ginevra Peruginelli, Giovanni Sartor and Daniela Tiscornia, Florence: European Press Academic
-
Pagallo, Ugo. 2007.Small world-paradigm and empirical research in legal ontologies: A topological approach. In The multilanguage complexity of European law: Methodologies in comparison, eds. Gianmaria Ajani, Ginevra Peruginelli, Giovanni Sartor and Daniela Tiscornia, 195-210. Florence: European Press Academic.
-
(2007)
The Multilanguage Complexity of European Law: Methodologies in Comparison
, pp. 195-210
-
-
Pagallo, U.1
-
48
-
-
84870661332
-
Designing data protection safeguards ethically
-
Pagallo, Ugo. 2011a. Designing data protection safeguards ethically. Information 2 (2): 247-265.
-
(2011)
Information
, vol.2
, Issue.2
, pp. 247-265
-
-
Pagallo, U.1
-
50
-
-
84877701103
-
The future of rule of law: The challenges and prospects for the field
-
Peerenboom, Randy. 2009.The future of rule of law: The challenges and prospects for the field. Hague Journal on the Rule of Law 1 (1): 5-14.
-
(2009)
Hague Journal on the Rule of Law
, vol.1
, Issue.1
, pp. 5-14
-
-
Peerenboom, R.1
-
51
-
-
27844494517
-
Against cyberspace
-
Against
-
Post, David G. 2002. Against “Against Cyberspace”.Berkeley Technology Law Journal 17 (4): 1365-1383.
-
(2002)
Berkeley Technology Law Journal
, vol.17
, Issue.4
, pp. 1365-1383
-
-
Post, D.G.1
-
53
-
-
70349754413
-
A large-scale empirical study on p3p privacy policies: Stated actions vs. Legal obligations
-
Reay, Ian, Dick, Scott, and James Miller. 2009. A large-scale empirical study on P3P privacy policies: Stated actions vs. legal obligations.ACM transactions on the web 3(2): 1-34.
-
(2009)
ACM Transactions on the Web
, vol.3
, Issue.2
, pp. 1
-
-
Reay, I.1
Dick, S.2
Miller, J.3
-
54
-
-
84946109953
-
The retention of electronic communication traffic data
-
Rodota, Stefano. 2006.The retention of electronic communication traffic data. Revista d’Internet, dret ipoltiica 3:53-60.
-
(2006)
Revista d’Internet, Dret Ipoltiica
, vol.3
, pp. 53-60
-
-
Rodota, S.1
-
57
-
-
28844490457
-
The future of intellectual property
-
Spinello, Richard A. 2003.The future of intellectual property. Ethics and Information Technology 5 (1): 1-16.
-
(2003)
Ethics and Information Technology
, vol.5
, Issue.1
, pp. 1-16
-
-
Spinello, R.A.1
-
58
-
-
84983967502
-
A formal theory of rule of law
-
Summers, Robert S. 1993.A formal theory of rule of law. Ratio Iuris 6 (2): 127-142.
-
(1993)
Ratio Iuris
, vol.6
, Issue.2
, pp. 127-142
-
-
Summers, R.S.1
-
59
-
-
52149113254
-
Philosophical theories of privacy: Implications for an adequate online privacy policy
-
Tavani, Herman T. 2007. Philosophical theories of privacy: Implications for an adequate online privacy policy.Metaphilosophy 38 (1): 1-22.
-
(2007)
Metaphilosophy
, vol.38
, Issue.1
, pp. 1
-
-
Tavani, H.T.1
-
60
-
-
33744457379
-
Privacy as life, liberty, property
-
Volkman, Richard. 2003. Privacy as life, liberty, property.Ethics and Information Technology 5 (4): 199-210.
-
(2003)
Ethics and Information Technology
, vol.5
, Issue.4
, pp. 199-210
-
-
Volkman, R.1
-
61
-
-
80052636717
-
Using the precautionary principle in nanotechnology policy making
-
Weckert, John and James Moor. 2004. Using the precautionary principle in nanotechnology policy making.Asia Pacific Nanotechnology Forum News Journal 3 (4): 12-14.
-
(2004)
Asia Pacific Nanotechnology Forum News Journal
, vol.3
, Issue.4
, pp. 12-14
-
-
Weckert, J.1
Moor, J.2
-
62
-
-
0030138375
-
Ethics as design: Doing justice to moral problems
-
Whitbeck, Caroline. 1996. Ethics as design: Doing justice to moral problems. Hastings Center Report 26 (3): 9-16.
-
(1996)
Hastings Center Report
, vol.26
, Issue.3
, pp. 9-16
-
-
Whitbeck, C.1
-
63
-
-
84870684462
-
-
02356/09/EN-W
-
Working Party (WP) Article 29 D-95/46/EC. 2009. The future of privacy. 02356/09/EN-WP 168.
-
(2009)
The Future of Privacy
, pp. 168
-
-
-
64
-
-
85190444478
-
Towards an understanding of regulation by design
-
eds. Roger Brownsword and Karen Yeung, London: Hart Publishing
-
Yeung, Karen. 2007. Towards an understanding of regulation by design. In Regulating technologies: Legal futures, regulatory frames and technological fixes, eds. Roger Brownsword and Karen Yeung, 79-108. London: Hart Publishing.
-
(2007)
Regulating Technologies: Legal Futures, Regulatory Frames and Technological Fixes
, pp. 79-108
-
-
Yeung, K.1
|