Hostname: page-component-78c5997874-4rdpn Total loading time: 0 Render date: 2024-11-04T19:11:14.845Z Has data issue: false hasContentIssue false

Privacy Rights in the Information Economy

Published online by Cambridge University Press:  23 January 2015

Abstract

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Review Articles
Copyright
Copyright © Society for Business Ethics 1998

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Becker, Lawrence (1977). Property Rights: Philosophic Foundations. London: Routledge & Kegan Paul.Google Scholar
Brandeis, Louis and Warren, Samuel (1890). “The Right to Privacy.” Harvard Law Review vol. 4, pp. 193220.Google Scholar
Branscomb, Ann Wells (1994). Who Owns Information? From Privacy to Public Access. New York: Harper Collins.Google Scholar
Culnan, Mary and Regan, Priscilla (1995). “Privacy Issues and the Creation of Campaign Mailing Lists.” The Information Society, vol. 11 (1), pp. 85100.Google Scholar
Finnis, John (1980). Natural Law and Natural Rights. New York: Oxford University Press.Google Scholar
Gandy, Oscar (1993). The Panoptic Sort. Boulder, Col.: Westview Press.Google Scholar
Gavison, Ruth (1984). “Privacy and the Limits of the Law.” The Yale Law Journal, vol. 89, pp. 421471.CrossRefGoogle Scholar
Gleick, James (1996). “Big Brother is Us.” The New York Times Magazine, Sept. 29, pp. 130132.Google Scholar
Grotius, Hugo (1853). De Jure Belli et Pacis. 3 volumes. Cambridge: Cambridge University Press.Google Scholar
Hohfeld, W. N. (1919). Fundamental Legal Conceptions. New Haven: Yale University Press.Google Scholar
Honore, A. M. (1961). “Ownership.” In Oxford Essays in Jurisprudence, Guest, A. G. (ed.). New York: Oxford University Press, pp. 107147.Google Scholar
Laudon, Kenneth (1996). “Markets and Privacy.” In Computerization and Controversy, Kling, Rob (ed.). San Diego: Academic Press Inc, pp. 697726.Google Scholar
Louis Harris & Associates, Inc. (1993). Harris-Equifax Consumer Privacy Survey. Atlanta: Equifax, Inc.Google Scholar
Miller, Arthur (1969). “Personal Privacy in the Computer Age: The Challenge of New Technology in an Information-Oriented Society.” Michigan Law Review vol. 67, pp. 12031236.Google Scholar
Moor, James (1989). “How to Invade and Protect Privacy with Computers.” In The Information Web: Ethical and Social Implications of Computer Networking, Carol, Gould (ed.). Boulder, Col.: Westview Press, pp. 5786.Google Scholar
Reeve, Andrew (1986). Property. Atlantic Highlands, N. J.: Humanities Press International.Google Scholar
Samuelson, Pamela (1991). “Is Information Property?” Communications of the ACM, vol. 34 (3), pp. 1518.Google Scholar
Thompson, Judith (1975). “The Right to Privacy.” Philosophy and Public Affairs, vol. 4 (4), pp. 295314.Google Scholar
Ware, Willis (1993). “The New Faces of Privacy.” The Information Society, vol. 9 (3), pp. 195211.CrossRefGoogle Scholar
Westin, Alan (1967). Privacy and Freedom. New York: Atheneum.Google Scholar