Assuming Identities: Media, Security and Personal Privacy

In Robin Wang & Timothy Shanahan (eds.), Reason and Insight. pp. 421-430 (2003)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive

External links

  • This entry has no external links. Add one.
Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
Democracy and Security.Annabelle Lever - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International.
Privacy: A Very Short Introduction.Raymond Wacks - 2010 - Oxford University Press.
Security and Privacy: Why Privacy Matters. [REVIEW]Stephanie J. Bird - 2013 - Science and Engineering Ethics 19 (3):669-671.
A dynamic logic for privacy compliance.Guillaume Aucher, Guido Boella & Leendert Torre - 2011 - Artificial Intelligence and Law 19 (2-3):187-231.
Privacy and personal identity.Wade L. Robison - 1997 - Ethics and Behavior 7 (3):195 – 205.
Privacy Rights: Moral and Legal Foundations.Adam D. Moore - 2010 - Pennsylvania State University Press.
Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.

Analytics

Added to PP
2016-09-16

Downloads
227 (#88,164)

6 months
55 (#83,809)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Steve DeCaroli
Goucher College

Citations of this work

No citations found.

Add more citations

References found in this work

The Right to Privacy.Lloyd L. Weinreb - 2000 - Social Philosophy and Policy 17 (2):25.
Genetics and Insurance: Accessing and Using Private Information.A. M. Capron - 2000 - Social Philosophy and Policy 17 (2):235-275.

Add more references