no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Data Mining to Combat Terrorism and the Roots of Privacy Concerns
|
Birrer, Frans A. J. |
|
2006 |
7 |
4 |
p. 211-220 |
article |
2 |
Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine?
|
Adam, Alison |
|
2006 |
7 |
4 |
p. 233-242 |
article |
3 |
Editorial Introduction – Surveillance and Privacy
|
Brey, Philip |
|
2006 |
7 |
4 |
p. 183-184 |
article |
4 |
P2P Networks and the Verizon v. RIAA Case: Implications for Personal Privacy and Intellectual Property
|
Grodzinsky, Frances S. |
|
2006 |
7 |
4 |
p. 243-250 |
article |
5 |
Privacy, Deontic Epistemic Action Logic and Software Agents
|
Wiegel, V. |
|
2006 |
7 |
4 |
p. 251-264 |
article |
6 |
RFID: The Next Serious Threat to Privacy
|
Lockton, Vance |
|
2006 |
7 |
4 |
p. 221-231 |
article |
7 |
Surveillance, Privacy and the Ethics of Vehicle Safety Communication Technologies
|
Zimmer, M. |
|
2006 |
7 |
4 |
p. 201-210 |
article |
8 |
The Ontological Interpretation of Informational Privacy
|
Floridi, Luciano |
|
2006 |
7 |
4 |
p. 185-200 |
article |