- Bennett, C.J. {1992} Regulating Privacy. Ithaca, NY: Cornell University Press.Google Scholar
- Bennett, C.J., and R. Grant, eds. {1999} Visions of Privacy: Policy Choices for the Digital Age. Toronto: University of Toronto Press Incorporated. Google ScholarDigital Library
- Burkert, H. {1997} "Privacy-Enhancing Technologies: Typology, Critique, Vision." In Technology and Privacy: The New Landscape, edited by P.E. Agre and M. Rotenberg. Cambridge, MA: MIT Press. Google ScholarDigital Library
- Cranor, L. F. {1999} "Internet Privacy." Communications of the ACM, 42 (2): 29-31. Google ScholarDigital Library
- Culver, C., J. Moor, W. Duerfeldt, M. Kapp, and M. Sullivan. {1994} "Privacy." Professional Ethics, 3 (3 & 4):3-25.Google ScholarCross Ref
- Elgesem, D. {1996} "Privacy, Respect for Persons, and Risk." In Philosophical Perspectives on Computer-Mediated Communication, edited by C. Ess. New York: State University of New York Press.Google Scholar
- Elgesem, D. {1999} "The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data." Ethics and Information Technology, 1 (4):283-293. Google ScholarDigital Library
- Fried, C. {1984} "Privacy." In Philosophical Dimensions of Privacy, edited by F. D. Schoeman. New York: Cambridge University Press.Google Scholar
- Miller, A. R. {1971} The Assault on Privacy: Computers, Data Banks, and Dossiers. Ann Arbor: University of Michigan Press.Google Scholar
- Moor, J. H. {1989} "How to Invade and Protect Privacy with Computers." In The Information Web, edited by C. C. Gould. Boulder: Westview Press.Google Scholar
- Moor, J. H. {1990} "Ethics of Privacy Protection." Library Trends, 39 (1 & 2):69-82.Google Scholar
- Moor, J. H. {1997} "Towards a Theory of Privacy in the Information Age." Computers and Society, 27 (3):27-32. Google ScholarDigital Library
- Moor, J. H. {1999a} "Just Consequentialism and Computing." Ethics and Information Technology, 1 (1):65-69. Google ScholarDigital Library
- Moor, J. H. {1999b} "Using Genetic Information While Protecting the Privacy of the Soul." Ethics and Information Technology, 1 (4):257-263. Google ScholarDigital Library
- Moore, B. {1984} Privacy: Studies in Social and Cultural History. Armonk, New York: M. E. Sharpe, Inc.Google Scholar
- Tavani, H. T. {1999a} "Informational Privacy, Data Mining and the Internet," Ethics and Information Technology, 1 (2):137-145. Google ScholarDigital Library
- Tavani, H. T. {1999b} "KDD, Data Mining, and the Challenge for Normative Privacy." Ethics and Information Technology, 1 (4):265-273. Google ScholarDigital Library
- Tavani, H. T. {1999c} "Privacy Online." Computers and Society, 29 (4): 11-19. Google ScholarDigital Library
- Tavani, H. T. {2000a} "Privacy and Security." Chap. 4 in Internet Ethics, edited by D. Langford. New York: St. Martin's Press.Google Scholar
- Tavani, H. T. {2000b} "Privacy and the Internet." In Privacy and the Constitution, edited by M. Placencia. Hamden, CT: Garland Publishing, Inc.Google Scholar
- Tavani, H. T. {2000c} "Privacy-Enhancing Technologies as a Panacea for Online Privacy Concerns: Some Ethical Considerations," Journal of Information Ethics, 9 (2).Google Scholar
- Westin, A. R. {1967} Privacy and Freedom. New York: Atheneum.Google Scholar
Index Terms
- Privacy protection, control of information, and privacy-enhancing technologies
Recommendations
How Privacy Concerns, Trust and Risk Beliefs, and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies: The Case of Tor
Due to an increasing collection of personal data by internet companies and several data breaches, research related to privacy gained importance in the last years in the information systems domain. Privacy concerns can strongly influence users' decision ...
Privacy-enhancing technologies: approaches and development
In this paper, we discuss privacy threats on the Internet and possible solutions to this problem. Examples of privacy threats in the communication networks are identity disclosure, linking data traffic with identity, location disclosure in connection ...
Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system
In today's digital world, privacy issues have received widespread public attention. Current research on information privacy protection focuses on release control and subject identity obscurity. Little work has been done, however, to prevent a piece of ...
Comments