Open Access

Three Models of Privacy: New Perspectives on Informational Privacy

   | Jul 07, 2020

Cite

Agre, Philip E. (1994). Surveillance and Capture: Two Models of Privacy. The Information Society, 10(2): 101–127. AgrePhilip E. 1994 Surveillance and Capture: Two Models of Privacy The Information Society 10 2 101 127 10.1080/01972243.1994.9960162 Search in Google Scholar

Mai, Jens-Erik. (2016a). Big Data Privacy: The Datafication of Personal Information. The Information Society, 32(3): 192–199. MaiJens-Erik 2016a Big Data Privacy: The Datafication of Personal Information The Information Society 32 3 192 199 10.1080/01972243.2016.1153010 Search in Google Scholar

Mai, Jens-Erik. (2016b). Personal Information as Communicative Acts. Ethics and Information Technology, 18 (1): 51–57. MaiJens-Erik 2016b Personal Information as Communicative Acts Ethics and Information Technology 18 1 51 57 10.1007/s10676-016-9390-4 Search in Google Scholar

Schermer, Bart Willem; Custers, Bart, & van der Hof, Simone. (2014). The Crisis of Consent: How Stronger Legal Protection May Lead to Weaker Consent in Data Protection. Ethics and Information Technology, 16(2): 171–182. SchermerBart Willem CustersBart van der HofSimone 2014 The Crisis of Consent: How Stronger Legal Protection May Lead to Weaker Consent in Data Protection Ethics and Information Technology 16 2 171 182 Search in Google Scholar

Solove, Daniel J. (2013). Privacy Self-Management and the Consent Dilemma. Harvard Law Review, 126: 1880–1903. SoloveDaniel J. 2013 Privacy Self-Management and the Consent Dilemma Harvard Law Review 126 1880 1903 Search in Google Scholar

Solove, Daniel J. (2008). Understanding Privacy. Cambridge, MA: Harvard University Press. SoloveDaniel J. 2008 Understanding Privacy Cambridge, MA Harvard University Press Search in Google Scholar

Tavani, Herman T. (2008). Informational Privacy: Concepts, Theories, and Controversies, pp. 131–164 in Himma, Kenneth E. & Tavani, Herman T. (eds.) The Handbook of Information and Computer Ethics. Hoboken, NJ: Wiley. TavaniHerman T. 2008 Informational Privacy: Concepts, Theories, and Controversies 131 164 in HimmaKenneth E. TavaniHerman T. (eds.) The Handbook of Information and Computer Ethics Hoboken, NJ Wiley 10.1002/9780470281819.ch6 Search in Google Scholar

Winner, Langdon. (1986). The Whale and the Reactor: A Search for Limits in an Age of High Technology. Chicago: University of Chicago Press. WinnerLangdon 1986 The Whale and the Reactor: A Search for Limits in an Age of High Technology Chicago University of Chicago Press Search in Google Scholar

eISSN:
2001-5119
Language:
English
Publication timeframe:
2 times per year
Journal Subjects:
Social Sciences, Communication Science, Mass Communication, Public and Political Communication