Abducing personal data, destroying privacy

In Mireille Hildebrandt & Katja de Vries (eds.), Privacy, due process and the computational turn. Abingdon, Oxon, [England] ; New York: Routledge. pp. 67 (2013)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,261

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Inaccuracy as a privacy-enhancing tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
The importance of privacy revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
A Universal Approach to Guarantee Data Privacy.Thomas Studer - 2013 - Logica Universalis 7 (2):195-209.
Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.

Analytics

Added to PP
2014-01-30

Downloads
13 (#1,041,239)

6 months
1 (#1,478,781)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

References found in this work

No references found.

Add more references