David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Metaphilosophy 38 (1):1–22 (2007)
|Keywords||RALC theory of privacy privacy in public online privacy policies informational privacy seclusion theory of privacy nonintrusion theory of privacy control theory of privacy|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
Anita L. Allen (1988). Uneasy Access: Privacy for Women in a Free Society. Rowman & Littlefield Publishers.
Judith Wagner DeCew (1999). [Book Review] in Pursuit of Privacy, Law, Ethics, and the Rise of Technology. [REVIEW] Ethics 109 (2):437-439.
Dag Elgesem (1999). The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data. [REVIEW] Ethics and Information Technology 1 (4):283-293.
Frances S. Grodzinsky & Herman T. Tavani (2005). P2p Networks and the Verizon V. RIAA Case: Implications for Personal Privacy and Intellectual Property. [REVIEW] Ethics and Information Technology 7 (4):243-250.
James H. Moor (1999). Using Genetic Information While Protecting the Privacy of the Soul. Ethics and Information Technology 1 (4):257-263.
Citations of this work BETA
David W. Shoemaker (2010). Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity. [REVIEW] Ethics and Information Technology 12 (1):3-15.
Elin Palm (2009). Securing Privacy at Work: The Importance of Contextualized Consent. [REVIEW] Ethics and Information Technology 11 (4):233-241.
Janice Richardson (2011). The Changing Meaning of Privacy, Identity and Contemporary Feminist Philosophy. Minds and Machines 21 (4):517-532.
Ugo Pagallo (2011). ISPs & Rowdy Web Sites Before the Law: Should We Change Today's Safe Harbour Clauses? Philosophy and Technology 24 (4):419-436.
U. Pagallo (2012). Cracking Down on Autonomy: Three Challenges to Design in IT Law. [REVIEW] Ethics and Information Technology 14 (4):319-328.
Similar books and articles
Richard Arneson (2000). Egalitarian Justice Versus the Right to Privacy? Social Philosophy and Policy 17 (02):91-.
Herman T. Tavani (1999). Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1 (2):137-145.
Elin Palm (2009). Privacy Expectations at Work—What is Reasonable and Why? Ethical Theory and Moral Practice 12 (2):201 - 215.
Steven Davis (2009). Is There a Right to Privacy? Pacific Philosophical Quarterly 90 (4):450-475.
Norman E. Bowie & Karim Jamal (2006). Privacy Rights on the Internet: Self-Regulation or Government Regulation? Business Ethics Quarterly 16 (3):323-342.
Luciano Floridi (2006). Four Challenges for a Theory of Informational Privacy. Ethics and Information Technology 8 (3):109-119.
Laurence Ashworth & Clinton Free (2006). Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers' Online Privacy Concerns. [REVIEW] Journal of Business Ethics 67 (2):107 - 123.
Ferdinand David Schoeman (ed.) (1984). Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press.
Irene Pollach (2011). Online Privacy as a Corporate Social Responsibility: An Empirical Study. Business Ethics 20 (1):88-102.
Herman T. Tavani (1999). KDD, Data Mining, and the Challenge for Normative Privacy. Ethics and Information Technology 1 (4):265-273.
Added to index2009-01-28
Total downloads145 ( #9,394 of 1,700,226 )
Recent downloads (6 months)18 ( #39,449 of 1,700,226 )
How can I increase my downloads?