Computers, Privacy and Data Protection: Invisibilities & Infrastructures

Springer (2017)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 89,408

External links

  • This entry has no external links. Add one.
Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Privacy and Protection of Marginalized Social Groups.Stephen Kabera Karanja - 2009 - Studies in Ethics, Law, and Technology 2 (3).
Inaccuracy as a privacy-enhancing tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
Privacy by Design.Peter Schaar - 2010 - Identity in the Information Society 3 (2):267-274.
Data Science and Designing for Privacy.Michael Falgoust - 2016 - Techné: Research in Philosophy and Technology 20 (1):51-68.
The Priority of Privacy for Medical Information.Judith Wagner DeCew - 2000 - Social Philosophy and Policy 17 (2):213.
Aproximación al Derecho de la Informática.Antonio-Enrique Perez Luño - 1987 - Theoria: Revista de Teoría, Historia y Fundamentos de la Ciencia 3 (1-2):529-551.
Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.

Analytics

Added to PP
2017-07-31

Downloads
0

6 months
0

Historical graph of downloads

Sorry, there are not enough data points to plot this chart.
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references