-
1
-
-
33744492586
-
Chips in our children: can we inscribe privacy protection in a machine
-
Adam, A. (2005). Chips in our children: can we inscribe privacy protection in a machine. Ethics and Information Technology, 7(4), 233-242.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.4
, pp. 233-242
-
-
Adam, A.1
-
3
-
-
0009301899
-
Uneasy Access: Privacy for Women in a Free Society
-
Rowman and Littlefield, Totowa, NJ
-
Allen, A. (1988). Uneasy Access: Privacy for Women in a Free Society. Rowman and Littlefield, Totowa, NJ
-
(1988)
-
-
Allen, A.1
-
4
-
-
33744820968
-
Why Privacy Isn't Everything: Feminist Reflections on Personal Accountability
-
Rowman and Littlefield, Lanham, MD
-
Allen, A. (2003). Why Privacy Isn't Everything: Feminist Reflections on Personal Accountability. Rowman and Littlefield, Lanham, MD
-
(2003)
-
-
Allen, A.1
-
5
-
-
84889425600
-
Privacy of medical records: IT implications of HIPAA
-
In: Tavani, H.T. (Ed.), Jones and Bartlett, Sudbury, MA
-
Baumer, D., Earp, J.B., and Payton, F.C. (2006). Privacy of medical records: IT implications of HIPAA. In: Tavani, H.T. (Ed.), Ethics, Computing, and Genomics. Jones and Bartlett, Sudbury, MA, pp. 137-152.
-
(2006)
Ethics, Computing, and Genomics
, pp. 137-152
-
-
Baumer, D.1
Earp, J.B.2
Payton, F.C.3
-
6
-
-
1842743666
-
Privacy, freedom and respect for persons
-
In: Pennock, J.R. and Chapman, J. W. (Eds.), Atherton Press, New York, Nomos XIII: Privacy
-
Benn, S. I. (1971). Privacy, freedom and respect for persons. In: Pennock, J.R. and Chapman, J. W. (Eds.), Nomos XIII: Privacy. Atherton Press, New York.
-
(1971)
-
-
Benn, S.I.1
-
7
-
-
0003674114
-
Secrets: On the Ethics of Concealment and Revelation
-
Pantheon Books, New York
-
Bok, S. (1983). Secrets: On the Ethics of Concealment and Revelation. Pantheon Books, New York
-
(1983)
-
-
Bok, S.1
-
8
-
-
33947409335
-
Boyd v. United States
-
Boyd v. United States (1886). 116 U.S. 186.
-
(1886)
116 U.S. 186
-
-
-
9
-
-
60049083115
-
Olmstead v. United States
-
(277 U.S. 438). Dissenting opinion.
-
Brandeis, L.D. (1928). Olmstead v. United States. (277 U.S. 438). Dissenting opinion.
-
(1928)
-
-
Brandeis, L.D.1
-
10
-
-
85041145859
-
Who Owns Information? From Privacy to Public Access
-
Harper Collins, New York.
-
Branscomb, A. (1994). Who Owns Information? From Privacy to Public Access. Harper Collins, New York.
-
(1994)
-
-
Branscomb, A.1
-
11
-
-
72649084972
-
Eisenstadt v. Baird
-
(405 U.S. 438). Majority opinion.
-
Brennan, W. (1972). Eisenstadt v. Baird. (405 U.S. 438). Majority opinion.
-
(1972)
-
-
Brennan, W.1
-
12
-
-
0007146663
-
The Rise of the Computer State
-
Random House, New York.
-
Burnham, D. (1983). The Rise of the Computer State. Random House, New York.
-
(1983)
-
-
Burnham, D.1
-
13
-
-
0039456088
-
Internet privacy concerns confirm the case for intervention
-
Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 60-67
-
-
Clarke, R.1
-
14
-
-
0039727710
-
A Treatise on the Law of Torts
-
Callaghan, Chicago
-
Cooley, T. (1880). A Treatise on the Law of Torts. Callaghan, Chicago
-
(1880)
-
-
Cooley, T.1
-
15
-
-
84889490193
-
Epidemiological data mining
-
In: Tavani, H.T. (Ed.), Jones and Bartlett, Sudbury, MA
-
Custers, B. (2006). Epidemiological data mining. In: Tavani, H.T. (Ed.), Ethics, Computing, and Genomics. Jones and Bartlett, Sudbury, MA, pp. 153-165.
-
(2006)
Ethics, Computing, and Genomics
, pp. 153-165
-
-
Custers, B.1
-
16
-
-
0003615959
-
In Pursuit of Privacy: Law, Ethics, and the Rise of Technology
-
Cornell University Press, Ithaca, NY
-
DeCew, J.W. (1997). In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Cornell University Press, Ithaca, NY
-
(1997)
-
-
DeCew, J.W.1
-
17
-
-
84889283524
-
Privacy and policy for genetic research
-
In: Tavani, H.T. (Ed.), Jones and Bartlett, Sudbury, MA
-
DeCew, J.W. (2006). Privacy and policy for genetic research. In: Tavani, H.T. (Ed.), Ethics, Computing, and Genomics. Jones and Bartlett, Sudbury, MA, pp. 121-136.
-
(2006)
Ethics, Computing, and Genomics
, pp. 121-136
-
-
DeCew, J.W.1
-
18
-
-
79953850587
-
DeMay v. Roberts
-
46 U.S. 160
-
DeMay v. Roberts (1881). 46 U.S. 160.
-
(1881)
-
-
-
19
-
-
33947682096
-
Griswold v. Connecticut
-
(381 U.S. 479). Majority opinion.
-
Douglas, W.O. (1965). Griswold v. Connecticut. (381 U.S. 479). Majority opinion.
-
(1965)
-
-
Douglas, W.O.1
-
20
-
-
72649084972
-
Eisenstadt v. Baird
-
405 U.S. 438
-
Eisenstadt v. Baird (1972). 405 U.S. 438.
-
(1972)
-
-
-
21
-
-
84889301421
-
The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data
-
In: Spinello, R.A. and Tavani, H.T. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
-
Elgesem, D. (2004). The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. In: Spinello, R.A. and Tavani, H.T. (Eds.), Readings in Cyber Ethics. 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 418-435.
-
(2004)
Readings in Cyber Ethics
, pp. 418-435
-
-
Elgesem, D.1
-
22
-
-
77955842849
-
The Limits of Privacy
-
Basic Books, New York
-
Etzioni, A. (1999). The Limits of Privacy. Basic Books, New York
-
(1999)
-
-
Etzioni, A.1
-
23
-
-
0003768069
-
Protecting Privacy in Surveillance Societies
-
University of North Carolina Press, Chapel Hill, NC
-
Flaherty, D.H. (1989). Protecting Privacy in Surveillance Societies. University of North Carolina Press, Chapel Hill, NC
-
(1989)
-
-
Flaherty, D.H.1
-
24
-
-
0011101139
-
Information ethics: on the philosophical foundations of computer ethics
-
Floridi, L. (1999). Information ethics: on the philosophical foundations of computer ethics. Ethics and Information Technology, 1(1), 37-56.
-
(1999)
Ethics and Information Technology
, vol.1
, Issue.1
, pp. 37-56
-
-
Floridi, L.1
-
25
-
-
33744479964
-
The ontological interpretation of informational privacy
-
Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 1(1), 185-200.
-
(2005)
Ethics and Information Technology
, vol.1
, Issue.1
, pp. 185-200
-
-
Floridi, L.1
-
26
-
-
33750992195
-
Four challenges for a theory of informational privacy
-
Floridi, L. (2006). Four challenges for a theory of informational privacy. Ethics and Information Technology, 8(3), 109-119.
-
(2006)
Ethics and Information Technology
, vol.8
, Issue.3
, pp. 109-119
-
-
Floridi, L.1
-
27
-
-
33947424124
-
Privacy: one concept or many
-
In: Pennock, J. R. and Chapman, J.W. (Eds.), Atherton Press, New York
-
Freund, P.A. (1971). Privacy: one concept or many. In: Pennock, J. R. and Chapman, J.W. (Eds.), Nomos XIII: Privacy. Atherton Press, New York, pp. 182-198.
-
(1971)
Nomos XIII: Privacy
, pp. 182-198
-
-
Freund, P.A.1
-
28
-
-
7744226711
-
Privacy
-
In: Ermann, M.D., Williams, M.B., and Gutierrez, C. (Eds.), Oxford University Press, New York.
-
Fried, C. (1990). Privacy. In: Ermann, M.D., Williams, M.B., and Gutierrez, C. (Eds.), Computers, Ethics, and Society. Oxford University Press, New York. pp. 51-67.
-
(1990)
Computers, Ethics, and Society
, pp. 51-67
-
-
Fried, C.1
-
29
-
-
61049377013
-
Data mining and privacy
-
In: Spinello, R.A. and Tavani, H.T. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
-
Fulda, J.S. (2004). Data mining and privacy. In: Spinello, R.A. and Tavani, H.T. (Eds.), Readings in Cyber Ethics, 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 471-475.
-
(2004)
Readings in Cyber Ethics
, pp. 471-475
-
-
Fulda, J.S.1
-
30
-
-
84923486508
-
Privacy and the limits of the law
-
Gavison, R. (1980). Privacy and the limits of the law. Yale Law Journal, 89, 421-471.
-
(1980)
Yale Law Journal
, vol.89
, pp. 421-471
-
-
Gavison, R.1
-
31
-
-
33947682096
-
Griswold v. Connecticut
-
381 U.S. 479
-
Griswold v. Connecticut (1965). 381 U.S. 479.
-
(1965)
-
-
-
32
-
-
33744485801
-
P2P networks and the Verizon v. RIAA case: implications for personal privacy and intellectual property
-
Grodzinsky, F.S. and Tavani, H.T. (2005). P2P networks and the Verizon v. RIAA case: implications for personal privacy and intellectual property. Ethics and Information Technology 7(4), 243-250.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.4
, pp. 243-250
-
-
Grodzinsky, F.S.1
Tavani, H.T.2
-
33
-
-
79960277437
-
Privacy and autonomy
-
Henkin, L. (1974). Privacy and autonomy. Columbia Law Review, 77, 1410-1425.
-
(1974)
Columbia Law Review
, vol.77
, pp. 1410-1425
-
-
Henkin, L.1
-
35
-
-
80053391686
-
The Right to Privacy
-
Central Books, New York
-
Hofstadter, S.H. and Horowitz, G. (1964). The Right to Privacy. Central Books, New York
-
(1964)
-
-
Hofstadter, S.H.1
Horowitz, G.2
-
36
-
-
0039085043
-
Public image
-
In: Johnson, D.G. and Nissenbaum, H. (Eds.), Prentice Hall, Englewood Cliffs, NJ
-
Hunter, L. (1995). Public image. In: Johnson, D.G. and Nissenbaum, H. (Eds.), Computers, Ethics and Social Values. Prentice Hall, Englewood Cliffs, NJ, pp. 293-299.
-
(1995)
Computers, Ethics and Social Values
, pp. 293-299
-
-
Hunter, L.1
-
37
-
-
0004344388
-
Privacy, Intimacy, and Isolation
-
Oxford University Press, New York
-
Inness, J. (1992). Privacy, Intimacy, and Isolation. Oxford University Press, New York
-
(1992)
-
-
Inness, J.1
-
38
-
-
84869132493
-
Workplace surveillance, privacy, and distributive justice
-
In: Spinello, R.A. and Tavani, H.T. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
-
Introna, L. (2004). Workplace surveillance, privacy, and distributive justice. In: Spinello, R.A. and Tavani, H.T. (Eds.), Readings in Cyber Ethics, 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 476-487.
-
(2004)
Readings in Cyber Ethics
, pp. 476-487
-
-
Introna, L.1
-
39
-
-
0004197846
-
Computer Ethics
-
2nd edition. Prentice Hall, Upper Saddle River, NJ.
-
Johnson, D.G. (1994). Computer Ethics., 2nd edition. Prentice Hall, Upper Saddle River, NJ.
-
(1994)
-
-
Johnson, D.G.1
-
40
-
-
61049516690
-
Privacy and databases
-
Prentice Hall, Englewood Cliffs, NJ
-
Johnson, D.G. and Nissenbaum, H. (1995). Privacy and databases. Computers, Ethics and Social Values. Prentice Hall, Englewood Cliffs, NJ, pp. 262-268.
-
(1995)
Computers, Ethics and Social Values
, pp. 262-268
-
-
Johnson, D.G.1
Nissenbaum, H.2
-
41
-
-
0012378788
-
Katz v. United States
-
389 U.S. 347
-
Katz v. United States (1967). 389 U.S. 347.
-
(1967)
-
-
-
42
-
-
33947382579
-
Privacy
-
In: Himma, K.E. (Ed.), Special issue of Library Hi Tech
-
Kemp, R. and Moore, A.D. (2007). Privacy. In: Himma, K.E. (Ed.), Information Ethics. Special issue of Library Hi Tech, 25(1), 58-78.
-
(2007)
Information Ethics
, vol.25
, Issue.1
, pp. 58-78
-
-
Kemp, R.1
Moore, A.D.2
-
44
-
-
84936072510
-
Toward a Feminist Theory of the State
-
Harvard University Press, Cambridge, MA
-
MacKinnon, C. (1989). Toward a Feminist Theory of the State. Harvard University Press, Cambridge, MA
-
(1989)
-
-
MacKinnon, C.1
-
45
-
-
56549092929
-
Privacy and the right to privacy
-
In: Purtill, R.L. (Ed.), Wadsworth, Belmont, CA
-
McCloskey, H.J. (1985). Privacy and the right to privacy. In: Purtill, R.L. (Ed.), Moral Dilemmas: Readings in Ethics and Social Philosophy. Wadsworth, Belmont, CA, pp. 342-357.
-
(1985)
Moral Dilemmas: Readings in Ethics and Social Philosophy
, pp. 342-357
-
-
McCloskey, H.J.1
-
46
-
-
0038763194
-
The Assault on Privacy
-
Harvard University Press, Cambridge, MA
-
Miller, A.R. (1971). The Assault on Privacy. Harvard University Press, Cambridge, MA
-
(1971)
-
-
Miller, A.R.1
-
47
-
-
0042422943
-
The ethics of privacy protection
-
Moor, J.H. (1990). The ethics of privacy protection. Library Trends, 39(1-2), 69-82.
-
(1990)
Library Trends
, vol.39
, Issue.1-2
, pp. 69-82
-
-
Moor, J.H.1
-
48
-
-
0042923706
-
Towards a theory of privacy in the information age
-
Moor, J.H. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27-32.
-
(1997)
Computers and Society
, vol.27
, Issue.3
, pp. 27-32
-
-
Moor, J.H.1
-
49
-
-
33645779473
-
Just consequentialism and computing
-
Moor, J.H. (1999). Just consequentialism and computing. Ethics and Information Technology, 1(1), 65-69.
-
(1999)
Ethics and Information Technology
, vol.1
, Issue.1
, pp. 65-69
-
-
Moor, J.H.1
-
50
-
-
34147168462
-
Reason, relativity, and responsibility in computer ethics
-
In: Spinello, R.A. and Tavani, H.T. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
-
Moor, J.H. (2004). Reason, relativity, and responsibility in computer ethics. In: Spinello, R.A. and Tavani, H.T. (Eds.), Readings in Cyber Ethics, 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 40-54.
-
(2004)
Readings in Cyber Ethics
, pp. 40-54
-
-
Moor, J.H.1
-
51
-
-
84889313001
-
Using genetic information while protecting the privacy of the soul
-
In: Tavani, H.T. (Ed.), Jones and Bartlett, Sudbury, MA
-
Moor, J.H. (2006). Using genetic information while protecting the privacy of the soul. In: Tavani, H.T. (Ed.), Ethics, Computing, and Genomics, Jones and Bartlett, Sudbury, MA, pp. 109-119.
-
(2006)
Ethics, Computing, and Genomics
, pp. 109-119
-
-
Moor, J.H.1
-
53
-
-
77956922691
-
Towards informational privacy rights
-
in press.
-
Moore, A.D. (2008). Towards informational privacy rights. San Diego Law Review, in press.
-
(2008)
San Diego Law Review
-
-
Moore, A.D.1
-
54
-
-
84865710966
-
Privacy: Studies in Social and Cultural History
-
M.E. Sharpe, Inc., Armonk, NY.
-
Moore, B. (1984). Privacy: Studies in Social and Cultural History., M.E. Sharpe, Inc., Armonk, NY.
-
(1984)
-
-
Moore, B.1
-
55
-
-
18544372804
-
Toward an approach to privacy in public: challenges of information technology
-
Nissenbaum, H. (1997). Toward an approach to privacy in public: challenges of information technology. Ethics and Behavior, 7(3), 207-219.
-
(1997)
Ethics and Behavior
, vol.7
, Issue.3
, pp. 207-219
-
-
Nissenbaum, H.1
-
56
-
-
0032282474
-
Protecting privacy in an information age
-
Nissenbaum, H. (1998). Protecting privacy in an information age. Law and Philosophy, 17, 559-596.
-
(1998)
Law and Philosophy
, vol.17
, pp. 559-596
-
-
Nissenbaum, H.1
-
57
-
-
1842538795
-
Privacy as contextual integrity
-
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119-157.
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 119-157
-
-
Nissenbaum, H.1
-
58
-
-
60049083115
-
Olmstead v. United States
-
277 U.S. 438
-
Olmstead v. United States (1928). 277 U.S. 438.
-
(1928)
-
-
-
59
-
-
0004148001
-
Autonomy and Trust in Bioethics
-
Cambridge University Press, Cambridge, UK
-
O'Neill, O. (2002). Autonomy and Trust in Bioethics. Cambridge University Press, Cambridge, UK
-
(2002)
-
-
O'Neill, O.1
-
60
-
-
0000333978
-
Privacy, morality and the law
-
a
-
Parent, W.A. (1983a). Privacy, morality and the law. Philosophy and Public Affairs, 12(4), 269-288.
-
(1983)
Philosophy and Public Affairs
, vol.12
, Issue.4
, pp. 269-288
-
-
Parent, W.A.1
-
61
-
-
34250145251
-
A new definition of privacy for the law
-
b
-
Parent, W.A. (1983b). A new definition of privacy for the law. Law and Philosophy, 2, 305-338.
-
(1983)
Law and Philosophy
, vol.2
, pp. 305-338
-
-
Parent, W.A.1
-
62
-
-
0038086632
-
An economic theory of privacy
-
May-June
-
Posner, R.A. (1978). An economic theory of privacy. Regulations, May-June, 19-26.
-
(1978)
Regulations
, pp. 19-26
-
-
Posner, R.A.1
-
63
-
-
84876010344
-
Why privacy is important
-
Rachels, J. (1975). Why privacy is important. Philosophy and Public Affairs, 4(4), 323-333.
-
(1975)
Philosophy and Public Affairs
, vol.4
, Issue.4
, pp. 323-333
-
-
Rachels, J.1
-
64
-
-
81255157789
-
Legislating Privacy: Technology, Social Values, and Public Policy
-
University of North Carolina Press, Chapel Hill, NC
-
Regan, P.M. (1995). Legislating Privacy: Technology, Social Values, and Public Policy. University of North Carolina Press, Chapel Hill, NC
-
(1995)
-
-
Regan, P.M.1
-
65
-
-
77955497017
-
Privacy, intimacy, and personhood
-
Reiman, J.H. (1976). Privacy, intimacy, and personhood. Philosophy and Public Affairs, 6(1), 26-44.
-
(1976)
Philosophy and Public Affairs
, vol.6
, Issue.1
, pp. 26-44
-
-
Reiman, J.H.1
-
66
-
-
0011298491
-
Roe v. Wade
-
410 U.S. 153
-
Roe v. Wade (1973). 410 U.S. 153.
-
(1973)
-
-
-
67
-
-
0003530541
-
The Unwanted Gaze: The Destruction of Privacy in America
-
Random House, New York
-
Rosen, J. (2000). The Unwanted Gaze: The Destruction of Privacy in America. Random House, New York
-
(2000)
-
-
Rosen, J.1
-
68
-
-
35348850436
-
Ethics and Values in the Information Age
-
(Eds)., Wadsworth, Belmont, CA
-
Rudinow, J. and Graybosch, A. (Eds). (2002). Ethics and Values in the Information Age. Wadsworth, Belmont, CA
-
(2002)
-
-
Rudinow, J.1
Graybosch, A.2
-
70
-
-
0004251279
-
Privacy and Social Freedom
-
Cambridge University Press, Cambridge, MA
-
Schoeman, F. (1992). Privacy and Social Freedom. Cambridge University Press, Cambridge, MA
-
(1992)
-
-
Schoeman, F.1
-
71
-
-
0036045758
-
Conceptualizing privacy
-
Solove, D. (2002). Conceptualizing privacy. California Law Review, 90, 1087-1155.
-
(2002)
California Law Review
, vol.90
, pp. 1087-1155
-
-
Solove, D.1
-
72
-
-
0031552048
-
The end of privacy
-
Reprinted in: Long, R.E. (Ed.), Rights to Privacy. H. W. Wilson Co., New York, pp. 25-32.
-
Spinello, R.A. (1997). The end of privacy. America, 176, 9-13. Reprinted in: Long, R.E. (Ed.), Rights to Privacy. H. W. Wilson Co., New York, pp. 25-32.
-
(1997)
America
, vol.176
, pp. 9-13
-
-
Spinello, R.A.1
-
73
-
-
84889352524
-
Electronic mail and panoptic power in the workplace
-
In: Rudinow, J. and Graybosch, A. (Eds.), Wadsworth, Belmont, CA
-
Spinello, R.A. (2002). Electronic mail and panoptic power in the workplace. In: Rudinow, J. and Graybosch, A. (Eds.), Ethics and Values in the Information Age. Wadsworth, Belmont, CA, pp. 303-311.
-
(2002)
Ethics and Values in the Information Age
, pp. 303-311
-
-
Spinello, R.A.1
-
74
-
-
84889459446
-
Property rights in genetic information
-
In: Tavani, H.T. (Ed.), Jones and Bartlett, Sudbury, MA
-
Spinello, R.A. (2006). Property rights in genetic information. In: Tavani, H.T. (Ed.), Ethics, Computing, and Genomics. Jones and Bartlett, Sudbury, MA, pp. 213-233.
-
(2006)
Ethics, Computing, and Genomics
, pp. 213-233
-
-
Spinello, R.A.1
-
75
-
-
0002363509
-
Informational privacy, data mining, and the internet
-
Tavani, H.T. (1999). Informational privacy, data mining, and the internet. Ethics and Information Technology, 1(2), 137-145.
-
(1999)
Ethics and Information Technology
, vol.1
, Issue.2
, pp. 137-145
-
-
Tavani, H.T.1
-
76
-
-
0002363511
-
Privacy and security
-
In: Langford, D. (Ed.), Macmillan, London
-
Tavani, H.T. (2000). Privacy and security. In: Langford, D. (Ed.), Internet Ethics. Macmillan, London, pp. 65-95.
-
(2000)
Internet Ethics
, pp. 65-95
-
-
Tavani, H.T.1
-
77
-
-
1142278268
-
Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology
-
a, a, 2nd edition. (2007) John Wiley & Sons, Hoboken, NJ.
-
Tavani, H.T. (2004a, 2007a). Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. 2nd edition. (2007) John Wiley & Sons, Hoboken, NJ.
-
(2004)
-
-
Tavani, H.T.1
-
78
-
-
33748995094
-
Genomic research and data mining technology: implications for personal privacy and informed consent
-
b
-
Tavani, H.T. (2004b). Genomic research and data mining technology: implications for personal privacy and informed consent. Ethics and Information Technology, 6(1), 15-28.
-
(2004)
Ethics and Information Technology
, vol.6
, Issue.1
, pp. 15-28
-
-
Tavani, H.T.1
-
79
-
-
52149113254
-
Philosophical theories of privacy: implications for an adequate online privacy policy
-
b
-
Tavani, H.T. (2007b). Philosophical theories of privacy: implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1-22.
-
(2007)
Metaphilosophy
, vol.38
, Issue.1
, pp. 1-22
-
-
Tavani, H.T.1
-
80
-
-
84889317261
-
Floridi's ontological theory of informational privacy: some implications and challenges
-
c, In: Hinman L. et al. (Eds.), Centre for Telematics and Information Technology, Enschede, The Netherlands, Reprinted in Ethics and Information Technology, 10, in press.
-
Tavani, H.T. (2007c). Floridi's ontological theory of informational privacy: some implications and challenges. In: Hinman L. et al. (Eds.), Proceedings of the Seventh International Conference on Computer Ethics: Philosophical Enquiry (CEPE 2007). Centre for Telematics and Information Technology, Enschede, The Netherlands, pp. 385-396. Reprinted in Ethics and Information Technology, 10, in press.
-
(2007)
Proceedings of the Seventh International Conference on Computer Ethics: Philosophical Enquiry (CEPE 2007)
, pp. 385-396
-
-
Tavani, H.T.1
-
81
-
-
2542469289
-
Privacy protection, control of information, and privacy-enhancing technologies
-
Tavani, H.T. and Moor, J.H. (2001). Privacy protection, control of information, and privacy-enhancing technologies. Computers and Society, 31(1), 6-11.
-
(2001)
Computers and Society
, vol.31
, Issue.1
, pp. 6-11
-
-
Tavani, H.T.1
Moor, J.H.2
-
83
-
-
84889425835
-
Privacy and the varieties of informational wrongdoing
-
In: Spinello, R.A. and Tavani, H. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
-
Van den Hoven, J. (2004). Privacy and the varieties of informational wrongdoing. In: Spinello, R.A. and Tavani, H. (Eds.), Readings in Cyber Ethics, 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 488-500.
-
(2004)
Readings in Cyber Ethics
, pp. 488-500
-
-
Van Den Hoven, J.1
-
84
-
-
84892198179
-
Privacy
-
In: Mitcham, C. (Ed.), MacMillan, New York
-
Van den Hoven, J. (2005). Privacy. In: Mitcham, C. (Ed.), Encyclopedia of Science, Technology, and Ethics, MacMillan, New York, pp. 1490-1492.
-
(2005)
Encyclopedia of Science, Technology, and Ethics
, pp. 1490-1492
-
-
Van Den Hoven, J.1
-
85
-
-
61049329066
-
KDD, privacy, individuality, and fairness
-
In: Spinello, R.A. and Tavani, H.T. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
-
Vedder, A.H. (2004). KDD, privacy, individuality, and fairness. In: Spinello, R.A. and Tavani, H.T. (Eds.), Readings in Cyber Ethics, 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 462-470.
-
(2004)
Readings in Cyber Ethics
, pp. 462-470
-
-
Vedder, A.H.1
-
86
-
-
33744457379
-
Privacy as life, liberty, property
-
Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5(4), 199-210.
-
(2003)
Ethics and Information Technology
, vol.5
, Issue.4
, pp. 199-210
-
-
Volkman, R.1
-
87
-
-
0032010369
-
Consumer privacy concerns about internet marketing
-
Wang, H.M., Lee, K.O., and Wang C. (1998). Consumer privacy concerns about internet marketing. Communications of the ACM, 41(3), 63-70.
-
(1998)
Communications of the ACM
, vol.41
, Issue.3
, pp. 63-70
-
-
Wang, H.M.1
Lee, K.O.2
Wang, C.3
-
88
-
-
0000320829
-
The right to privacy
-
Warren, S. and Brandeis, L. (1890). The right to privacy. Harvard Law Review, 14(5), 193-220.
-
(1890)
Harvard Law Review
, vol.14
, Issue.5
, pp. 193-220
-
-
Warren, S.1
Brandeis, L.2
-
89
-
-
0004073139
-
Privacy and Freedom
-
Atheneum Press, New York
-
Westin, A.F. (1967). Privacy and Freedom. Atheneum Press, New York
-
(1967)
-
-
Westin, A.F.1
-
90
-
-
84889490766
-
-
Whalen v. Roe, 429 U.S. 589
-
Whalen v. Roe (1977). 429 U.S. 589.
-
(1977)
-
-
-
91
-
-
33744458438
-
Surveillance, privacy and the ethics of vehicle safety communications
-
Zimmer, M. (2005). Surveillance, privacy and the ethics of vehicle safety communications. Ethics and Information Technology, 7(4), 201-210.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.4
, pp. 201-210
-
-
Zimmer, M.1
|