skip to main content
research-article

Revisiting Moor's Towards a Theory of Privacy in the Information Age

Published:01 June 2010Publication History
Skip Abstract Section

Abstract

Back in 1988, when my department chair encouraged me to pursue my interest in developing a course on the social and ethical impact of computing, I was thrilled at the prospect but had no idea how difficult it would be to find resources to support my teaching. I did some pre-Web digging and found two organizations that delivered on their promises to provide me with valuable sources of material: ACM SIGCAS (ACM's Special Interest Group for Computers and Society, and the publisher of this newsletter) and CPSR (Computer Professionals for Social Responsibility). I quickly joined each group, subscribed to each one's publications, and the rest, as they say, is history. Over the past twenty years, I have enjoyed a rich and rewarding career in the area of computer ethics and its pedagogy, and have benefited professionally and personally through my affiliation with a vibrant interdisciplinary community of computer ethics scholars. I am happy to report that Computers and Society continues to provide my students with thought-provoking material, and is now part of a large and growing body of literature.

References

  1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y., Hippocratic Databases, Proceedings of the 28th VLDB Conference, Hong Kong, China, 2002, http://www.almaden.ibm.com/cs/projects/iis/hdb/Publications/papers/vldb02_hippocratic.pdf, visited 4/09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Appel, Privacy for Database Design, http://csmaster.sxu.edu/privacy, 2008, visited 6/10.Google ScholarGoogle Scholar
  3. Johnson, Computer Ethics, Prentice Hall, 1985, 1994.Google ScholarGoogle Scholar
  4. Martin, From Awareness to Responsible Action (part 2): Developing a Curriculum with Progressive Integration of Ethics and Social Impact, SIGCSE Bulletin, Vol. 31, No. 4, December 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Martin & Weltz, From Awareness to Action: Integrating Ethics and Social Responsibility into the Computer Science Curriculum, Computers and Society, Vol. 29, No. 2, June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Moor, Towards a Theory of Privacy in the Information Age, Computers and Society, Vol. 27, No. 3, September 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Rachels, Why is Privacy Important?, Philosophy and Public Affairs, Summer 1975.Google ScholarGoogle Scholar
  8. Tavani, Cyberethics Biliography 2001: A Select List of Recent Works, Computers and Society, Vol. 31, No. 2, June 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Tavani, SIGCAS at 30: Computer Ethics Textbooks: A Thirty-year Retrospective, Computers and Society, Vol. 29, No. 3, September 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Revisiting Moor's Towards a Theory of Privacy in the Information Age
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCAS Computers and Society
      ACM SIGCAS Computers and Society  Volume 40, Issue 2
      June 2010
      26 pages
      ISSN:0095-2737
      DOI:10.1145/1839994
      Issue’s Table of Contents

      Copyright © 2010 Author

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 June 2010

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader