Towards a theory of privacy in the information age

Acm Sigcas Computers and Society 27 (3):27-32 (1997)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 93,069

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Revisiting Moor's Towards a Theory of Privacy in the Information Age.Florence Appel - 2010 - Acm Sigcas Computers and Society 40 (2):31-34.
Jim Moor: making a difference 2003.John Sullins - 2009 - Acm Sigcas Computers and Society 39 (2):20-21.
Privacy online.Herman T. Tavani - 1999 - Acm Sigcas Computers and Society 29 (4):11-19.
The erosion of privacy.Marie A. Wright & John S. Kakalik - 1997 - Acm Sigcas Computers and Society 27 (4):22-25.
Electronic surveillance and personal privacy: an historical perspective.Jan Yestingsmeier - 1984 - Acm Sigcas Computers and Society 13 (4, 1-3):10-13.
Biometric cards: privacy invaders vs. a safer America.Amanda Woodcock - 2005 - Acm Sigcas Computers and Society 35 (1):3-3.

Analytics

Added to PP
2013-11-01

Downloads
234 (#90,032)

6 months
29 (#110,291)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

James H. Moor
Dartmouth College

Citations of this work

The ethics of information transparency.Matteo Turilli & Luciano Floridi - 2009 - Ethics and Information Technology 11 (2):105-112.
The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
A framework for the ethical impact assessment of information technology.David Wright - 2011 - Ethics and Information Technology 13 (3):199-226.

View all 68 citations / Add more citations

References found in this work

No references found.

Add more references