Reasonable expectations of privacy

Ethics and Information Technology 3 (2):123-128 (2001)
  Copy   BIBTEX

Abstract

Use of the concept of `areasonable person and his or her expectations'is widely found in legal reasoning. This legalconstruct is employed in the present article toexamine privacy questions associated withcontemporary information technology, especiallythe internet. In particular, reasonableexpectations of privacy while browsing theworld-wide-web and while sending and receivinge-mail are analyzed.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,349

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Securing privacy at work: The importance of contextualized consent. [REVIEW]Elin Palm - 2009 - Ethics and Information Technology 11 (4):233-241.
E-mail, terrorism, and the right to privacy.Stephen Coleman - 2006 - Ethics and Information Technology 8 (1):17-27.
Is there a right to privacy?Steven Davis - 2009 - Pacific Philosophical Quarterly 90 (4):450-475.
Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
Online privacy as a corporate social responsibility: an empirical study.Irene Pollach - 2011 - Business Ethics, the Environment and Responsibility 20 (1):88-102.

Analytics

Added to PP
2009-01-28

Downloads
84 (#196,609)

6 months
7 (#411,886)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

The Liberal Value of Privacy.Boudewijn de Bruin - 2010 - Law and Philosophy 29 (5):505-534.
Going dark: anonymising technology in cyberspace.Ross W. Bellaby - 2018 - Ethics and Information Technology 20 (3):189-204.
Spyware – the ethics of Covert software.Mathias Klang - 2004 - Ethics and Information Technology 6 (3):193-202.

View all 12 citations / Add more citations

References found in this work

Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.

Add more references