- Uneasy Access: Privacy for Women in a Free Society.Judith Wagner DeCew & Anita L. Allen - 1992 - Philosophical Review 101 (3):709.details
|
|
Privacy and Social Freedom.Ferdinand David Schoeman - 1992 - Cambridge University Press.details
|
|
Privacy and Freedom.Alan F. Westin - 1970 - Science and Society 34 (3):360-363.details
|
|
Uneasy Access: Privacy for Women in a Free Society.Anita L. Allen - 1988 - Rowman & Littlefield Publishers.details
|
|
The right to privacy.Judith Jarvis Thomson - 1975 - Philosophy and Public Affairs 4 (4):295-314.details
|
|
Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.details
|
|
Thomson on privacy.Thomas Scanlon - 1975 - Philosophy and Public Affairs 4 (4):315-322.details
|
|
Why privacy is important.James Rachels - 1975 - Philosophy and Public Affairs 4 (4):323-333.details
|
|
Using genetic information while protecting the privacy of the soul.James H. Moor - 1999 - Ethics and Information Technology 1 (4):257-263.details
|
|
P2p networks and the verizon V. RIAA case: Implications for personal privacy and intellectual property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.details
|
|
Secrets: On the Ethics of Concealment and Revelation.Sissela Bok - 1985 - Philosophy 60 (231):143-145.details
|
|
Privacy as life, liberty, property.Richard Volkman - 2003 - Ethics and Information Technology 5 (4):199-210.details
|
|
Privacy, morality, and the law.W. A. Parent - 1983 - Philosophy and Public Affairs 12 (4):269-288.details
|
|
Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.details
|
|
Protecting privacy in an information age: The problem of privacy in public. [REVIEW]Helen Nissenbaum - 1998 - Law and Philosophy 17 (s 5-6):559-596.details
|
|
KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.details
|
|
Review of Sissela Bok: Secrets: on the ethics of concealment and revelation. [REVIEW]Kim Lane Scheppele - 1984 - Ethics 94 (3):538-539.details
|
|
[Book review] in pursuit of privacy, law, ethics, and the rise of technology. [REVIEW]Judith Wagner DeCew - 1999 - Ethics 109 (2):437-439.details
|
|
Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.details
|
|
The Study of Behavior: Q-Technique and Its Methodology. William Stephenson. Chicago: University of Chicago Press, 1953. Pp. ix, 376 pp. $7.50. [REVIEW]Russell L. Ackoff - 1955 - Philosophy of Science 22 (1):67-67.details
|
|
[Book review] legislating privacy, technology, social values, and public policy. [REVIEW]Priscilla M. Regan - 1998 - Business Ethics Quarterly 8 (4):723-742.details
|
|
The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. [REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.details
|
|
(1 other version)Review of Ferdinand David Schoeman: Privacy and Social Freedom. [REVIEW]Barbara Baum Levenbook - 1995 - Ethics 105 (2):421-422.details
|
|