Privacy protection, control of information, and privacy-enhancing technologies

Acm Sigcas Computers and Society 31 (1):6-11 (2001)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 90,221

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Analytics

Added to PP
2013-11-01

Downloads
193 (#94,185)

6 months
25 (#96,535)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

James H. Moor
Dartmouth College

References found in this work

Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
Privacy and Freedom.Alan F. Westin - 1970 - Science and Society 34 (3):360-363.
Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.
Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.

View all 12 references / Add more references