메뉴 건너뛰기




Volumn , Issue , 2009, Pages 131-164

Informational Privacy: Concepts, Theories, and Controversies

Author keywords

Informational privacy concepts, theories, and controversies; Informational privacy theories; Technology based controversies

Indexed keywords


EID: 84889497445     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/9780470281819.ch6     Document Type: Chapter
Times cited : (77)

References (91)
  • 1
    • 33744492586 scopus 로고    scopus 로고
    • Chips in our children: can we inscribe privacy protection in a machine
    • Adam, A. (2005). Chips in our children: can we inscribe privacy protection in a machine. Ethics and Information Technology, 7(4), 233-242.
    • (2005) Ethics and Information Technology , vol.7 , Issue.4 , pp. 233-242
    • Adam, A.1
  • 3
    • 0009301899 scopus 로고
    • Uneasy Access: Privacy for Women in a Free Society
    • Rowman and Littlefield, Totowa, NJ
    • Allen, A. (1988). Uneasy Access: Privacy for Women in a Free Society. Rowman and Littlefield, Totowa, NJ
    • (1988)
    • Allen, A.1
  • 4
    • 33744820968 scopus 로고    scopus 로고
    • Why Privacy Isn't Everything: Feminist Reflections on Personal Accountability
    • Rowman and Littlefield, Lanham, MD
    • Allen, A. (2003). Why Privacy Isn't Everything: Feminist Reflections on Personal Accountability. Rowman and Littlefield, Lanham, MD
    • (2003)
    • Allen, A.1
  • 5
    • 84889425600 scopus 로고    scopus 로고
    • Privacy of medical records: IT implications of HIPAA
    • In: Tavani, H.T. (Ed.), Jones and Bartlett, Sudbury, MA
    • Baumer, D., Earp, J.B., and Payton, F.C. (2006). Privacy of medical records: IT implications of HIPAA. In: Tavani, H.T. (Ed.), Ethics, Computing, and Genomics. Jones and Bartlett, Sudbury, MA, pp. 137-152.
    • (2006) Ethics, Computing, and Genomics , pp. 137-152
    • Baumer, D.1    Earp, J.B.2    Payton, F.C.3
  • 6
    • 1842743666 scopus 로고
    • Privacy, freedom and respect for persons
    • In: Pennock, J.R. and Chapman, J. W. (Eds.), Atherton Press, New York, Nomos XIII: Privacy
    • Benn, S. I. (1971). Privacy, freedom and respect for persons. In: Pennock, J.R. and Chapman, J. W. (Eds.), Nomos XIII: Privacy. Atherton Press, New York.
    • (1971)
    • Benn, S.I.1
  • 7
    • 0003674114 scopus 로고
    • Secrets: On the Ethics of Concealment and Revelation
    • Pantheon Books, New York
    • Bok, S. (1983). Secrets: On the Ethics of Concealment and Revelation. Pantheon Books, New York
    • (1983)
    • Bok, S.1
  • 8
    • 33947409335 scopus 로고
    • Boyd v. United States
    • Boyd v. United States (1886). 116 U.S. 186.
    • (1886) 116 U.S. 186
  • 9
    • 60049083115 scopus 로고
    • Olmstead v. United States
    • (277 U.S. 438). Dissenting opinion.
    • Brandeis, L.D. (1928). Olmstead v. United States. (277 U.S. 438). Dissenting opinion.
    • (1928)
    • Brandeis, L.D.1
  • 10
    • 85041145859 scopus 로고
    • Who Owns Information? From Privacy to Public Access
    • Harper Collins, New York.
    • Branscomb, A. (1994). Who Owns Information? From Privacy to Public Access. Harper Collins, New York.
    • (1994)
    • Branscomb, A.1
  • 11
    • 72649084972 scopus 로고
    • Eisenstadt v. Baird
    • (405 U.S. 438). Majority opinion.
    • Brennan, W. (1972). Eisenstadt v. Baird. (405 U.S. 438). Majority opinion.
    • (1972)
    • Brennan, W.1
  • 12
    • 0007146663 scopus 로고
    • The Rise of the Computer State
    • Random House, New York.
    • Burnham, D. (1983). The Rise of the Computer State. Random House, New York.
    • (1983)
    • Burnham, D.1
  • 13
    • 0039456088 scopus 로고    scopus 로고
    • Internet privacy concerns confirm the case for intervention
    • Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 60-67
    • Clarke, R.1
  • 14
    • 0039727710 scopus 로고
    • A Treatise on the Law of Torts
    • Callaghan, Chicago
    • Cooley, T. (1880). A Treatise on the Law of Torts. Callaghan, Chicago
    • (1880)
    • Cooley, T.1
  • 15
    • 84889490193 scopus 로고    scopus 로고
    • Epidemiological data mining
    • In: Tavani, H.T. (Ed.), Jones and Bartlett, Sudbury, MA
    • Custers, B. (2006). Epidemiological data mining. In: Tavani, H.T. (Ed.), Ethics, Computing, and Genomics. Jones and Bartlett, Sudbury, MA, pp. 153-165.
    • (2006) Ethics, Computing, and Genomics , pp. 153-165
    • Custers, B.1
  • 16
    • 0003615959 scopus 로고    scopus 로고
    • In Pursuit of Privacy: Law, Ethics, and the Rise of Technology
    • Cornell University Press, Ithaca, NY
    • DeCew, J.W. (1997). In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Cornell University Press, Ithaca, NY
    • (1997)
    • DeCew, J.W.1
  • 17
    • 84889283524 scopus 로고    scopus 로고
    • Privacy and policy for genetic research
    • In: Tavani, H.T. (Ed.), Jones and Bartlett, Sudbury, MA
    • DeCew, J.W. (2006). Privacy and policy for genetic research. In: Tavani, H.T. (Ed.), Ethics, Computing, and Genomics. Jones and Bartlett, Sudbury, MA, pp. 121-136.
    • (2006) Ethics, Computing, and Genomics , pp. 121-136
    • DeCew, J.W.1
  • 18
    • 79953850587 scopus 로고
    • DeMay v. Roberts
    • 46 U.S. 160
    • DeMay v. Roberts (1881). 46 U.S. 160.
    • (1881)
  • 19
    • 33947682096 scopus 로고
    • Griswold v. Connecticut
    • (381 U.S. 479). Majority opinion.
    • Douglas, W.O. (1965). Griswold v. Connecticut. (381 U.S. 479). Majority opinion.
    • (1965)
    • Douglas, W.O.1
  • 20
    • 72649084972 scopus 로고
    • Eisenstadt v. Baird
    • 405 U.S. 438
    • Eisenstadt v. Baird (1972). 405 U.S. 438.
    • (1972)
  • 21
    • 84889301421 scopus 로고    scopus 로고
    • The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data
    • In: Spinello, R.A. and Tavani, H.T. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
    • Elgesem, D. (2004). The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. In: Spinello, R.A. and Tavani, H.T. (Eds.), Readings in Cyber Ethics. 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 418-435.
    • (2004) Readings in Cyber Ethics , pp. 418-435
    • Elgesem, D.1
  • 22
    • 77955842849 scopus 로고    scopus 로고
    • The Limits of Privacy
    • Basic Books, New York
    • Etzioni, A. (1999). The Limits of Privacy. Basic Books, New York
    • (1999)
    • Etzioni, A.1
  • 23
    • 0003768069 scopus 로고
    • Protecting Privacy in Surveillance Societies
    • University of North Carolina Press, Chapel Hill, NC
    • Flaherty, D.H. (1989). Protecting Privacy in Surveillance Societies. University of North Carolina Press, Chapel Hill, NC
    • (1989)
    • Flaherty, D.H.1
  • 24
    • 0011101139 scopus 로고    scopus 로고
    • Information ethics: on the philosophical foundations of computer ethics
    • Floridi, L. (1999). Information ethics: on the philosophical foundations of computer ethics. Ethics and Information Technology, 1(1), 37-56.
    • (1999) Ethics and Information Technology , vol.1 , Issue.1 , pp. 37-56
    • Floridi, L.1
  • 25
    • 33744479964 scopus 로고    scopus 로고
    • The ontological interpretation of informational privacy
    • Floridi, L. (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 1(1), 185-200.
    • (2005) Ethics and Information Technology , vol.1 , Issue.1 , pp. 185-200
    • Floridi, L.1
  • 26
    • 33750992195 scopus 로고    scopus 로고
    • Four challenges for a theory of informational privacy
    • Floridi, L. (2006). Four challenges for a theory of informational privacy. Ethics and Information Technology, 8(3), 109-119.
    • (2006) Ethics and Information Technology , vol.8 , Issue.3 , pp. 109-119
    • Floridi, L.1
  • 27
    • 33947424124 scopus 로고
    • Privacy: one concept or many
    • In: Pennock, J. R. and Chapman, J.W. (Eds.), Atherton Press, New York
    • Freund, P.A. (1971). Privacy: one concept or many. In: Pennock, J. R. and Chapman, J.W. (Eds.), Nomos XIII: Privacy. Atherton Press, New York, pp. 182-198.
    • (1971) Nomos XIII: Privacy , pp. 182-198
    • Freund, P.A.1
  • 28
    • 7744226711 scopus 로고
    • Privacy
    • In: Ermann, M.D., Williams, M.B., and Gutierrez, C. (Eds.), Oxford University Press, New York.
    • Fried, C. (1990). Privacy. In: Ermann, M.D., Williams, M.B., and Gutierrez, C. (Eds.), Computers, Ethics, and Society. Oxford University Press, New York. pp. 51-67.
    • (1990) Computers, Ethics, and Society , pp. 51-67
    • Fried, C.1
  • 29
    • 61049377013 scopus 로고    scopus 로고
    • Data mining and privacy
    • In: Spinello, R.A. and Tavani, H.T. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
    • Fulda, J.S. (2004). Data mining and privacy. In: Spinello, R.A. and Tavani, H.T. (Eds.), Readings in Cyber Ethics, 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 471-475.
    • (2004) Readings in Cyber Ethics , pp. 471-475
    • Fulda, J.S.1
  • 30
    • 84923486508 scopus 로고
    • Privacy and the limits of the law
    • Gavison, R. (1980). Privacy and the limits of the law. Yale Law Journal, 89, 421-471.
    • (1980) Yale Law Journal , vol.89 , pp. 421-471
    • Gavison, R.1
  • 31
    • 33947682096 scopus 로고
    • Griswold v. Connecticut
    • 381 U.S. 479
    • Griswold v. Connecticut (1965). 381 U.S. 479.
    • (1965)
  • 32
    • 33744485801 scopus 로고    scopus 로고
    • P2P networks and the Verizon v. RIAA case: implications for personal privacy and intellectual property
    • Grodzinsky, F.S. and Tavani, H.T. (2005). P2P networks and the Verizon v. RIAA case: implications for personal privacy and intellectual property. Ethics and Information Technology 7(4), 243-250.
    • (2005) Ethics and Information Technology , vol.7 , Issue.4 , pp. 243-250
    • Grodzinsky, F.S.1    Tavani, H.T.2
  • 33
    • 79960277437 scopus 로고
    • Privacy and autonomy
    • Henkin, L. (1974). Privacy and autonomy. Columbia Law Review, 77, 1410-1425.
    • (1974) Columbia Law Review , vol.77 , pp. 1410-1425
    • Henkin, L.1
  • 35
    • 80053391686 scopus 로고
    • The Right to Privacy
    • Central Books, New York
    • Hofstadter, S.H. and Horowitz, G. (1964). The Right to Privacy. Central Books, New York
    • (1964)
    • Hofstadter, S.H.1    Horowitz, G.2
  • 36
    • 0039085043 scopus 로고
    • Public image
    • In: Johnson, D.G. and Nissenbaum, H. (Eds.), Prentice Hall, Englewood Cliffs, NJ
    • Hunter, L. (1995). Public image. In: Johnson, D.G. and Nissenbaum, H. (Eds.), Computers, Ethics and Social Values. Prentice Hall, Englewood Cliffs, NJ, pp. 293-299.
    • (1995) Computers, Ethics and Social Values , pp. 293-299
    • Hunter, L.1
  • 37
    • 0004344388 scopus 로고
    • Privacy, Intimacy, and Isolation
    • Oxford University Press, New York
    • Inness, J. (1992). Privacy, Intimacy, and Isolation. Oxford University Press, New York
    • (1992)
    • Inness, J.1
  • 38
    • 84869132493 scopus 로고    scopus 로고
    • Workplace surveillance, privacy, and distributive justice
    • In: Spinello, R.A. and Tavani, H.T. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
    • Introna, L. (2004). Workplace surveillance, privacy, and distributive justice. In: Spinello, R.A. and Tavani, H.T. (Eds.), Readings in Cyber Ethics, 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 476-487.
    • (2004) Readings in Cyber Ethics , pp. 476-487
    • Introna, L.1
  • 39
    • 0004197846 scopus 로고
    • Computer Ethics
    • 2nd edition. Prentice Hall, Upper Saddle River, NJ.
    • Johnson, D.G. (1994). Computer Ethics., 2nd edition. Prentice Hall, Upper Saddle River, NJ.
    • (1994)
    • Johnson, D.G.1
  • 41
    • 0012378788 scopus 로고
    • Katz v. United States
    • 389 U.S. 347
    • Katz v. United States (1967). 389 U.S. 347.
    • (1967)
  • 42
    • 33947382579 scopus 로고    scopus 로고
    • Privacy
    • In: Himma, K.E. (Ed.), Special issue of Library Hi Tech
    • Kemp, R. and Moore, A.D. (2007). Privacy. In: Himma, K.E. (Ed.), Information Ethics. Special issue of Library Hi Tech, 25(1), 58-78.
    • (2007) Information Ethics , vol.25 , Issue.1 , pp. 58-78
    • Kemp, R.1    Moore, A.D.2
  • 44
    • 84936072510 scopus 로고
    • Toward a Feminist Theory of the State
    • Harvard University Press, Cambridge, MA
    • MacKinnon, C. (1989). Toward a Feminist Theory of the State. Harvard University Press, Cambridge, MA
    • (1989)
    • MacKinnon, C.1
  • 45
    • 56549092929 scopus 로고
    • Privacy and the right to privacy
    • In: Purtill, R.L. (Ed.), Wadsworth, Belmont, CA
    • McCloskey, H.J. (1985). Privacy and the right to privacy. In: Purtill, R.L. (Ed.), Moral Dilemmas: Readings in Ethics and Social Philosophy. Wadsworth, Belmont, CA, pp. 342-357.
    • (1985) Moral Dilemmas: Readings in Ethics and Social Philosophy , pp. 342-357
    • McCloskey, H.J.1
  • 46
    • 0038763194 scopus 로고
    • The Assault on Privacy
    • Harvard University Press, Cambridge, MA
    • Miller, A.R. (1971). The Assault on Privacy. Harvard University Press, Cambridge, MA
    • (1971)
    • Miller, A.R.1
  • 47
    • 0042422943 scopus 로고
    • The ethics of privacy protection
    • Moor, J.H. (1990). The ethics of privacy protection. Library Trends, 39(1-2), 69-82.
    • (1990) Library Trends , vol.39 , Issue.1-2 , pp. 69-82
    • Moor, J.H.1
  • 48
    • 0042923706 scopus 로고    scopus 로고
    • Towards a theory of privacy in the information age
    • Moor, J.H. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27-32.
    • (1997) Computers and Society , vol.27 , Issue.3 , pp. 27-32
    • Moor, J.H.1
  • 49
    • 33645779473 scopus 로고    scopus 로고
    • Just consequentialism and computing
    • Moor, J.H. (1999). Just consequentialism and computing. Ethics and Information Technology, 1(1), 65-69.
    • (1999) Ethics and Information Technology , vol.1 , Issue.1 , pp. 65-69
    • Moor, J.H.1
  • 50
    • 34147168462 scopus 로고    scopus 로고
    • Reason, relativity, and responsibility in computer ethics
    • In: Spinello, R.A. and Tavani, H.T. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
    • Moor, J.H. (2004). Reason, relativity, and responsibility in computer ethics. In: Spinello, R.A. and Tavani, H.T. (Eds.), Readings in Cyber Ethics, 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 40-54.
    • (2004) Readings in Cyber Ethics , pp. 40-54
    • Moor, J.H.1
  • 51
    • 84889313001 scopus 로고    scopus 로고
    • Using genetic information while protecting the privacy of the soul
    • In: Tavani, H.T. (Ed.), Jones and Bartlett, Sudbury, MA
    • Moor, J.H. (2006). Using genetic information while protecting the privacy of the soul. In: Tavani, H.T. (Ed.), Ethics, Computing, and Genomics, Jones and Bartlett, Sudbury, MA, pp. 109-119.
    • (2006) Ethics, Computing, and Genomics , pp. 109-119
    • Moor, J.H.1
  • 53
    • 77956922691 scopus 로고    scopus 로고
    • Towards informational privacy rights
    • in press.
    • Moore, A.D. (2008). Towards informational privacy rights. San Diego Law Review, in press.
    • (2008) San Diego Law Review
    • Moore, A.D.1
  • 54
    • 84865710966 scopus 로고
    • Privacy: Studies in Social and Cultural History
    • M.E. Sharpe, Inc., Armonk, NY.
    • Moore, B. (1984). Privacy: Studies in Social and Cultural History., M.E. Sharpe, Inc., Armonk, NY.
    • (1984)
    • Moore, B.1
  • 55
    • 18544372804 scopus 로고    scopus 로고
    • Toward an approach to privacy in public: challenges of information technology
    • Nissenbaum, H. (1997). Toward an approach to privacy in public: challenges of information technology. Ethics and Behavior, 7(3), 207-219.
    • (1997) Ethics and Behavior , vol.7 , Issue.3 , pp. 207-219
    • Nissenbaum, H.1
  • 56
    • 0032282474 scopus 로고    scopus 로고
    • Protecting privacy in an information age
    • Nissenbaum, H. (1998). Protecting privacy in an information age. Law and Philosophy, 17, 559-596.
    • (1998) Law and Philosophy , vol.17 , pp. 559-596
    • Nissenbaum, H.1
  • 57
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119-157.
    • (2004) Washington Law Review , vol.79 , Issue.1 , pp. 119-157
    • Nissenbaum, H.1
  • 58
    • 60049083115 scopus 로고
    • Olmstead v. United States
    • 277 U.S. 438
    • Olmstead v. United States (1928). 277 U.S. 438.
    • (1928)
  • 59
    • 0004148001 scopus 로고    scopus 로고
    • Autonomy and Trust in Bioethics
    • Cambridge University Press, Cambridge, UK
    • O'Neill, O. (2002). Autonomy and Trust in Bioethics. Cambridge University Press, Cambridge, UK
    • (2002)
    • O'Neill, O.1
  • 60
    • 0000333978 scopus 로고
    • Privacy, morality and the law
    • a
    • Parent, W.A. (1983a). Privacy, morality and the law. Philosophy and Public Affairs, 12(4), 269-288.
    • (1983) Philosophy and Public Affairs , vol.12 , Issue.4 , pp. 269-288
    • Parent, W.A.1
  • 61
    • 34250145251 scopus 로고
    • A new definition of privacy for the law
    • b
    • Parent, W.A. (1983b). A new definition of privacy for the law. Law and Philosophy, 2, 305-338.
    • (1983) Law and Philosophy , vol.2 , pp. 305-338
    • Parent, W.A.1
  • 62
    • 0038086632 scopus 로고
    • An economic theory of privacy
    • May-June
    • Posner, R.A. (1978). An economic theory of privacy. Regulations, May-June, 19-26.
    • (1978) Regulations , pp. 19-26
    • Posner, R.A.1
  • 63
    • 84876010344 scopus 로고
    • Why privacy is important
    • Rachels, J. (1975). Why privacy is important. Philosophy and Public Affairs, 4(4), 323-333.
    • (1975) Philosophy and Public Affairs , vol.4 , Issue.4 , pp. 323-333
    • Rachels, J.1
  • 64
    • 81255157789 scopus 로고
    • Legislating Privacy: Technology, Social Values, and Public Policy
    • University of North Carolina Press, Chapel Hill, NC
    • Regan, P.M. (1995). Legislating Privacy: Technology, Social Values, and Public Policy. University of North Carolina Press, Chapel Hill, NC
    • (1995)
    • Regan, P.M.1
  • 65
    • 77955497017 scopus 로고
    • Privacy, intimacy, and personhood
    • Reiman, J.H. (1976). Privacy, intimacy, and personhood. Philosophy and Public Affairs, 6(1), 26-44.
    • (1976) Philosophy and Public Affairs , vol.6 , Issue.1 , pp. 26-44
    • Reiman, J.H.1
  • 66
    • 0011298491 scopus 로고
    • Roe v. Wade
    • 410 U.S. 153
    • Roe v. Wade (1973). 410 U.S. 153.
    • (1973)
  • 67
    • 0003530541 scopus 로고    scopus 로고
    • The Unwanted Gaze: The Destruction of Privacy in America
    • Random House, New York
    • Rosen, J. (2000). The Unwanted Gaze: The Destruction of Privacy in America. Random House, New York
    • (2000)
    • Rosen, J.1
  • 68
    • 35348850436 scopus 로고    scopus 로고
    • Ethics and Values in the Information Age
    • (Eds)., Wadsworth, Belmont, CA
    • Rudinow, J. and Graybosch, A. (Eds). (2002). Ethics and Values in the Information Age. Wadsworth, Belmont, CA
    • (2002)
    • Rudinow, J.1    Graybosch, A.2
  • 70
    • 0004251279 scopus 로고
    • Privacy and Social Freedom
    • Cambridge University Press, Cambridge, MA
    • Schoeman, F. (1992). Privacy and Social Freedom. Cambridge University Press, Cambridge, MA
    • (1992)
    • Schoeman, F.1
  • 71
    • 0036045758 scopus 로고    scopus 로고
    • Conceptualizing privacy
    • Solove, D. (2002). Conceptualizing privacy. California Law Review, 90, 1087-1155.
    • (2002) California Law Review , vol.90 , pp. 1087-1155
    • Solove, D.1
  • 72
    • 0031552048 scopus 로고    scopus 로고
    • The end of privacy
    • Reprinted in: Long, R.E. (Ed.), Rights to Privacy. H. W. Wilson Co., New York, pp. 25-32.
    • Spinello, R.A. (1997). The end of privacy. America, 176, 9-13. Reprinted in: Long, R.E. (Ed.), Rights to Privacy. H. W. Wilson Co., New York, pp. 25-32.
    • (1997) America , vol.176 , pp. 9-13
    • Spinello, R.A.1
  • 73
    • 84889352524 scopus 로고    scopus 로고
    • Electronic mail and panoptic power in the workplace
    • In: Rudinow, J. and Graybosch, A. (Eds.), Wadsworth, Belmont, CA
    • Spinello, R.A. (2002). Electronic mail and panoptic power in the workplace. In: Rudinow, J. and Graybosch, A. (Eds.), Ethics and Values in the Information Age. Wadsworth, Belmont, CA, pp. 303-311.
    • (2002) Ethics and Values in the Information Age , pp. 303-311
    • Spinello, R.A.1
  • 74
    • 84889459446 scopus 로고    scopus 로고
    • Property rights in genetic information
    • In: Tavani, H.T. (Ed.), Jones and Bartlett, Sudbury, MA
    • Spinello, R.A. (2006). Property rights in genetic information. In: Tavani, H.T. (Ed.), Ethics, Computing, and Genomics. Jones and Bartlett, Sudbury, MA, pp. 213-233.
    • (2006) Ethics, Computing, and Genomics , pp. 213-233
    • Spinello, R.A.1
  • 75
    • 0002363509 scopus 로고    scopus 로고
    • Informational privacy, data mining, and the internet
    • Tavani, H.T. (1999). Informational privacy, data mining, and the internet. Ethics and Information Technology, 1(2), 137-145.
    • (1999) Ethics and Information Technology , vol.1 , Issue.2 , pp. 137-145
    • Tavani, H.T.1
  • 76
    • 0002363511 scopus 로고    scopus 로고
    • Privacy and security
    • In: Langford, D. (Ed.), Macmillan, London
    • Tavani, H.T. (2000). Privacy and security. In: Langford, D. (Ed.), Internet Ethics. Macmillan, London, pp. 65-95.
    • (2000) Internet Ethics , pp. 65-95
    • Tavani, H.T.1
  • 77
    • 1142278268 scopus 로고    scopus 로고
    • Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology
    • a, a, 2nd edition. (2007) John Wiley & Sons, Hoboken, NJ.
    • Tavani, H.T. (2004a, 2007a). Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. 2nd edition. (2007) John Wiley & Sons, Hoboken, NJ.
    • (2004)
    • Tavani, H.T.1
  • 78
    • 33748995094 scopus 로고    scopus 로고
    • Genomic research and data mining technology: implications for personal privacy and informed consent
    • b
    • Tavani, H.T. (2004b). Genomic research and data mining technology: implications for personal privacy and informed consent. Ethics and Information Technology, 6(1), 15-28.
    • (2004) Ethics and Information Technology , vol.6 , Issue.1 , pp. 15-28
    • Tavani, H.T.1
  • 79
    • 52149113254 scopus 로고    scopus 로고
    • Philosophical theories of privacy: implications for an adequate online privacy policy
    • b
    • Tavani, H.T. (2007b). Philosophical theories of privacy: implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1-22.
    • (2007) Metaphilosophy , vol.38 , Issue.1 , pp. 1-22
    • Tavani, H.T.1
  • 80
    • 84889317261 scopus 로고    scopus 로고
    • Floridi's ontological theory of informational privacy: some implications and challenges
    • c, In: Hinman L. et al. (Eds.), Centre for Telematics and Information Technology, Enschede, The Netherlands, Reprinted in Ethics and Information Technology, 10, in press.
    • Tavani, H.T. (2007c). Floridi's ontological theory of informational privacy: some implications and challenges. In: Hinman L. et al. (Eds.), Proceedings of the Seventh International Conference on Computer Ethics: Philosophical Enquiry (CEPE 2007). Centre for Telematics and Information Technology, Enschede, The Netherlands, pp. 385-396. Reprinted in Ethics and Information Technology, 10, in press.
    • (2007) Proceedings of the Seventh International Conference on Computer Ethics: Philosophical Enquiry (CEPE 2007) , pp. 385-396
    • Tavani, H.T.1
  • 81
    • 2542469289 scopus 로고    scopus 로고
    • Privacy protection, control of information, and privacy-enhancing technologies
    • Tavani, H.T. and Moor, J.H. (2001). Privacy protection, control of information, and privacy-enhancing technologies. Computers and Society, 31(1), 6-11.
    • (2001) Computers and Society , vol.31 , Issue.1 , pp. 6-11
    • Tavani, H.T.1    Moor, J.H.2
  • 83
    • 84889425835 scopus 로고    scopus 로고
    • Privacy and the varieties of informational wrongdoing
    • In: Spinello, R.A. and Tavani, H. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
    • Van den Hoven, J. (2004). Privacy and the varieties of informational wrongdoing. In: Spinello, R.A. and Tavani, H. (Eds.), Readings in Cyber Ethics, 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 488-500.
    • (2004) Readings in Cyber Ethics , pp. 488-500
    • Van Den Hoven, J.1
  • 85
    • 61049329066 scopus 로고    scopus 로고
    • KDD, privacy, individuality, and fairness
    • In: Spinello, R.A. and Tavani, H.T. (Eds.), 2nd edition. Jones and Bartlett, Sudbury, MA
    • Vedder, A.H. (2004). KDD, privacy, individuality, and fairness. In: Spinello, R.A. and Tavani, H.T. (Eds.), Readings in Cyber Ethics, 2nd edition. Jones and Bartlett, Sudbury, MA, pp. 462-470.
    • (2004) Readings in Cyber Ethics , pp. 462-470
    • Vedder, A.H.1
  • 86
    • 33744457379 scopus 로고    scopus 로고
    • Privacy as life, liberty, property
    • Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5(4), 199-210.
    • (2003) Ethics and Information Technology , vol.5 , Issue.4 , pp. 199-210
    • Volkman, R.1
  • 87
    • 0032010369 scopus 로고    scopus 로고
    • Consumer privacy concerns about internet marketing
    • Wang, H.M., Lee, K.O., and Wang C. (1998). Consumer privacy concerns about internet marketing. Communications of the ACM, 41(3), 63-70.
    • (1998) Communications of the ACM , vol.41 , Issue.3 , pp. 63-70
    • Wang, H.M.1    Lee, K.O.2    Wang, C.3
  • 88
    • 0000320829 scopus 로고
    • The right to privacy
    • Warren, S. and Brandeis, L. (1890). The right to privacy. Harvard Law Review, 14(5), 193-220.
    • (1890) Harvard Law Review , vol.14 , Issue.5 , pp. 193-220
    • Warren, S.1    Brandeis, L.2
  • 89
    • 0004073139 scopus 로고
    • Privacy and Freedom
    • Atheneum Press, New York
    • Westin, A.F. (1967). Privacy and Freedom. Atheneum Press, New York
    • (1967)
    • Westin, A.F.1
  • 90
    • 84889490766 scopus 로고
    • Whalen v. Roe, 429 U.S. 589
    • Whalen v. Roe (1977). 429 U.S. 589.
    • (1977)
  • 91
    • 33744458438 scopus 로고    scopus 로고
    • Surveillance, privacy and the ethics of vehicle safety communications
    • Zimmer, M. (2005). Surveillance, privacy and the ethics of vehicle safety communications. Ethics and Information Technology, 7(4), 201-210.
    • (2005) Ethics and Information Technology , vol.7 , Issue.4 , pp. 201-210
    • Zimmer, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.