skip to main content
article

Privacy protection, control of information, and privacy-enhancing technologies

Published:01 March 2001Publication History
First page image

References

  1. Bennett, C.J. {1992} Regulating Privacy. Ithaca, NY: Cornell University Press.Google ScholarGoogle Scholar
  2. Bennett, C.J., and R. Grant, eds. {1999} Visions of Privacy: Policy Choices for the Digital Age. Toronto: University of Toronto Press Incorporated. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Burkert, H. {1997} "Privacy-Enhancing Technologies: Typology, Critique, Vision." In Technology and Privacy: The New Landscape, edited by P.E. Agre and M. Rotenberg. Cambridge, MA: MIT Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cranor, L. F. {1999} "Internet Privacy." Communications of the ACM, 42 (2): 29-31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Culver, C., J. Moor, W. Duerfeldt, M. Kapp, and M. Sullivan. {1994} "Privacy." Professional Ethics, 3 (3 & 4):3-25.Google ScholarGoogle ScholarCross RefCross Ref
  6. Elgesem, D. {1996} "Privacy, Respect for Persons, and Risk." In Philosophical Perspectives on Computer-Mediated Communication, edited by C. Ess. New York: State University of New York Press.Google ScholarGoogle Scholar
  7. Elgesem, D. {1999} "The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data." Ethics and Information Technology, 1 (4):283-293. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Fried, C. {1984} "Privacy." In Philosophical Dimensions of Privacy, edited by F. D. Schoeman. New York: Cambridge University Press.Google ScholarGoogle Scholar
  9. Miller, A. R. {1971} The Assault on Privacy: Computers, Data Banks, and Dossiers. Ann Arbor: University of Michigan Press.Google ScholarGoogle Scholar
  10. Moor, J. H. {1989} "How to Invade and Protect Privacy with Computers." In The Information Web, edited by C. C. Gould. Boulder: Westview Press.Google ScholarGoogle Scholar
  11. Moor, J. H. {1990} "Ethics of Privacy Protection." Library Trends, 39 (1 & 2):69-82.Google ScholarGoogle Scholar
  12. Moor, J. H. {1997} "Towards a Theory of Privacy in the Information Age." Computers and Society, 27 (3):27-32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Moor, J. H. {1999a} "Just Consequentialism and Computing." Ethics and Information Technology, 1 (1):65-69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Moor, J. H. {1999b} "Using Genetic Information While Protecting the Privacy of the Soul." Ethics and Information Technology, 1 (4):257-263. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Moore, B. {1984} Privacy: Studies in Social and Cultural History. Armonk, New York: M. E. Sharpe, Inc.Google ScholarGoogle Scholar
  16. Tavani, H. T. {1999a} "Informational Privacy, Data Mining and the Internet," Ethics and Information Technology, 1 (2):137-145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Tavani, H. T. {1999b} "KDD, Data Mining, and the Challenge for Normative Privacy." Ethics and Information Technology, 1 (4):265-273. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Tavani, H. T. {1999c} "Privacy Online." Computers and Society, 29 (4): 11-19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Tavani, H. T. {2000a} "Privacy and Security." Chap. 4 in Internet Ethics, edited by D. Langford. New York: St. Martin's Press.Google ScholarGoogle Scholar
  20. Tavani, H. T. {2000b} "Privacy and the Internet." In Privacy and the Constitution, edited by M. Placencia. Hamden, CT: Garland Publishing, Inc.Google ScholarGoogle Scholar
  21. Tavani, H. T. {2000c} "Privacy-Enhancing Technologies as a Panacea for Online Privacy Concerns: Some Ethical Considerations," Journal of Information Ethics, 9 (2).Google ScholarGoogle Scholar
  22. Westin, A. R. {1967} Privacy and Freedom. New York: Atheneum.Google ScholarGoogle Scholar

Index Terms

  1. Privacy protection, control of information, and privacy-enhancing technologies
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCAS Computers and Society
        ACM SIGCAS Computers and Society  Volume 31, Issue 1
        March 2001
        25 pages
        ISSN:0095-2737
        DOI:10.1145/572277
        Issue’s Table of Contents

        Copyright © 2001 Authors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 March 2001

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader