Switch to: Citations

Add references

You must login to add references.
  1. Uneasy Access: Privacy for Women in a Free Society.Judith Wagner DeCew & Anita L. Allen - 1992 - Philosophical Review 101 (3):709.
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  • Privacy and Social Freedom.Ferdinand David Schoeman - 1992 - Cambridge University Press.
    This book attacks the assumption found in moral philosophy that social control as such is an intellectually and morally destructive force. It replaces this view with a richer and deeper perspective on the nature of social character aimed at showing how social freedom cannot mean immunity from social pressure. The author demonstrates how our competence as rational and social agents depends on a constructive adaptation of social control mechanisms. Our facility at achieving our goals is enhanced, rather than undermined, by (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  • Privacy and Freedom.Alan F. Westin - 1970 - Science and Society 34 (3):360-363.
    Download  
     
    Export citation  
     
    Bookmark   205 citations  
  • Uneasy Access: Privacy for Women in a Free Society.Anita L. Allen - 1988 - Rowman & Littlefield Publishers.
    'Anita L. Allen breaks new ground...A stunning indictment of women's status in contemporary society, her book provides vital original scholarly research and insight.' |s-NEW DIRECTIONS FOR WOMEN.
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  • The right to privacy.Judith Jarvis Thomson - 1975 - Philosophy and Public Affairs 4 (4):295-314.
    Download  
     
    Export citation  
     
    Bookmark   132 citations  
  • Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
    I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides a (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Thomson on privacy.Thomas Scanlon - 1975 - Philosophy and Public Affairs 4 (4):315-322.
    Download  
     
    Export citation  
     
    Bookmark   51 citations  
  • Why privacy is important.James Rachels - 1975 - Philosophy and Public Affairs 4 (4):323-333.
    Download  
     
    Export citation  
     
    Bookmark   158 citations  
  • Using genetic information while protecting the privacy of the soul.James H. Moor - 1999 - Ethics and Information Technology 1 (4):257-263.
    Computing plays an important role in genetics (and vice versa).Theoretically, computing provides a conceptual model for thefunction and malfunction of our genetic machinery. Practically,contemporary computers and robots equipped with advancedalgorithms make the revelation of the complete human genomeimminent – computers are about to reveal our genetic soulsfor the first time. Ethically, computers help protect privacyby restricting access in sophisticated ways to genetic information.But the inexorable fact that computers will increasingly collect,analyze, and disseminate abundant amounts of genetic informationmade available through the (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • P2p networks and the verizon V. RIAA case: Implications for personal privacy and intellectual property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.
    In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share digital (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Secrets: On the Ethics of Concealment and Revelation.Sissela Bok - 1985 - Philosophy 60 (231):143-145.
    Download  
     
    Export citation  
     
    Bookmark   91 citations  
  • Privacy as life, liberty, property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.
    The cluster of concerns usually identified asmatters of privacy can be adequately accountedfor by unpacking our natural rights to life,liberty, and property. Privacy as derived fromfundamental natural rights to life, liberty,and property encompasses the advantages of thecontrol and restricted access theories withouttheir attendant difficulties.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Privacy, morality, and the law.W. A. Parent - 1983 - Philosophy and Public Affairs 12 (4):269-288.
    Download  
     
    Export citation  
     
    Bookmark   95 citations  
  • Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Download  
     
    Export citation  
     
    Bookmark   74 citations  
  • Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.
    Download  
     
    Export citation  
     
    Bookmark   51 citations  
  • KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Review of Sissela Bok: Secrets: on the ethics of concealment and revelation[REVIEW]Kim Lane Scheppele - 1984 - Ethics 94 (3):538-539.
    Download  
     
    Export citation  
     
    Bookmark   43 citations  
  • [Book review] in pursuit of privacy, law, ethics, and the rise of technology. [REVIEW]Judith Wagner DeCew - 1999 - Ethics 109 (2):437-439.
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • The Study of Behavior: Q-Technique and Its Methodology. William Stephenson. Chicago: University of Chicago Press, 1953. Pp. ix, 376 pp. $7.50. [REVIEW]Russell L. Ackoff - 1955 - Philosophy of Science 22 (1):67-67.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • [Book review] legislating privacy, technology, social values, and public policy. [REVIEW]Priscilla M. Regan - 1998 - Business Ethics Quarterly 8 (4):723-742.
    Download  
     
    Export citation  
     
    Bookmark   38 citations  
  • The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. [REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.
    The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues treated in (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • (1 other version)Review of Ferdinand David Schoeman: Privacy and Social Freedom[REVIEW]Barbara Baum Levenbook - 1995 - Ethics 105 (2):421-422.
    Download  
     
    Export citation  
     
    Bookmark   22 citations