{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:39:19Z","timestamp":1725485959533},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540698609"},{"type":"electronic","value":"9783540698616"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-69861-6_3","type":"book-chapter","created":{"date-parts":[[2007,6,11]],"date-time":"2007-06-11T12:17:51Z","timestamp":1181564271000},"page":"21-36","source":"Crossref","is-referenced-by-count":20,"title":["Ethical Aspects of Information Security and Privacy"],"prefix":"10.1007","author":[{"given":"Philip","family":"Brey","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"H. Tavani, Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, Wiley, 2004.","key":"3_CR1"},{"key":"3_CR2","volume-title":"Computer Ethics","author":"D. Johnson","year":"2000","unstructured":"D. Johnson, Computer Ethics, 3rd edn, Upper Sadle River: Prentice Hall, 2000","edition":"3rd edn"},{"key":"3_CR3","first-page":"443","volume-title":"Readings in Cyberethics","author":"R. Spinello","year":"2001","unstructured":"R. Spinello, H. Tavani, \u201cSecurity and Cyberspace\u201d, In: Readings in Cyberethics, 1st edn, ed by R. Spinello and H. Tavani, Jones and Bartlett, Sudbury MA, 2001 pp. 443\u2013450","edition":"1st edn"},{"key":"3_CR4","volume-title":"Intellectual Property in the Information Age: The Politics of Expanding Ownership Rights","author":"D. Halbert","year":"1999","unstructured":"D. Halbert, Intellectual Property in the Information Age: The Politics of Expanding Ownership Rights, Quorum, Westport CT, 1999"},{"key":"3_CR5","volume-title":"Proceedings of ETHICOMP95","author":"J. Hoven Van den","year":"1995","unstructured":"J. Van den Hoven, \u201cEqual Access and Social Justice: Information as a Primary Good\u201d in: Proceedings of ETHICOMP95, vol. 1, DeMontfort University, Leicester UK, 1995"},{"doi-asserted-by":"crossref","unstructured":"J. Bullock, et al, Introduction to Homeland Security, 1st edn, Butterworth-Heinemann, 2005","key":"3_CR6","DOI":"10.1016\/B978-0-12-415802-3.00001-4"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s10676-005-4582-3","volume":"7","author":"H. Nissenbaum","year":"2005","unstructured":"H. Nissenbaum, \u201cWhere Computer Security Meets National Security\u201d, Ethics and Information Technology 7, pp. 61\u201373, 2005","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"3_CR8","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1111\/j.0092-5853.2004.00054.x","volume":"48","author":"D. Davis","year":"2004","unstructured":"D. Davis, B. Silver, \u201cCivil liberties vs. security: Public opinion in the context of the terrorist attacks on America\u201d, American Journal of Political Science 48(1), pp. 28\u201346, 2004","journal-title":"American Journal of Political Science"},{"unstructured":"K. Himma, (ed.), Readings on Internet Security: Hacking, Counterhacking, and Other Moral Issues, Jones & Bartlett, forthcoming","key":"3_CR9"},{"key":"3_CR10","volume-title":"Hackers: Heroes of the Computer Revolution","author":"S. Levy","year":"1984","unstructured":"S. Levy, Hackers: Heroes of the Computer Revolution, Doubleday, Garden City NY, 1984"},{"key":"3_CR11","volume-title":"The Hacker Ethic: A Radical Approach to the Philosophy of Business","author":"P. Himanen","year":"2001","unstructured":"P. Himanen, The Hacker Ethic: A Radical Approach to the Philosophy of Business, Random House, New York, 2001"},{"unstructured":"S. McQuade, Understanding and Managing Cybercrime, Allyn & Bacon, 2005","key":"3_CR12"},{"issue":"2","key":"3_CR13","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/572230.572232","volume":"30","author":"D. Mainon","year":"2000","unstructured":"D. Mainon, A. Goodrum, \u201cTerrorism or Civil Disobedience: Toward a Hacktivist Ethic\u201d, Computers and Society, 30(2), pp. 14\u201319, 2000","journal-title":"Computers and Society"},{"unstructured":"D. Denning, \u201cActivism, Hacktivism, and Cyberterrorism: the Internet as a Tool for Influencing Foreign Policy\u201d, In Networks and Netwars: The Future of Terror, Crime, and Militancy, ed. J. Arquilla, D. Ronfeldt, Rand Corporation, 2002. Available at http:\/\/www.rand.org\/publications\/MR\/MR1382\/","key":"3_CR14"},{"key":"3_CR15","volume-title":"Information Warfare and Security","author":"D. Denning","year":"1999","unstructured":"D. Denning, Information Warfare and Security, Addison-Wesley, Reading MA, 1999"},{"key":"3_CR16","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/6483.001.0001","volume-title":"Strategic Warfare in Cyberspace","author":"G. Rattray","year":"2001","unstructured":"G. Rattray, Strategic Warfare in Cyberspace, MIT Press, Cambridge MA, 2001"},{"unstructured":"ISSA, \u201cISSA Code of Ethics\u201d, In Information Systems Security Association, Available at: http:\/\/www.issa.org\/codeofethics.html 2005","key":"3_CR17"},{"unstructured":"T. Bynum, S. Rogerson (eds.), Computer Ethics and Professional Responsibility: Introductory Text and Readings, Blackwell, 2003","key":"3_CR18"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S. Warren","year":"1890","unstructured":"S. Warren, L. Brandeis, The Right to Privacy, Harvard Law Review 4, pp. 193\u2013220, 1890","journal-title":"Harvard Law Review"},{"key":"3_CR20","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511625138","volume-title":"Philosophical Dimensions of Privacy: An Anthology","author":"F. Schoeman","year":"1984","unstructured":"F. Schoeman, \u201cIntroduction\u201d, In Philosophical Dimensions of Privacy: An Anthology, ed. F. Schoeman, Cambridge University Press, Cambridge UK, 1984"},{"key":"3_CR21","first-page":"97","volume-title":"The Ethics of Privacy in the Workplace","author":"P. Brey","year":"2005","unstructured":"P. Brey, \u201cThe Importance of Privacy in the Workplace\u201d, In The Ethics of Privacy in the Workplace, ed. S. O. Hansson, E. Palm, Peter Lang, Brussels, 2005 pp. 97\u2013118"},{"issue":"3","key":"3_CR22","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/270858.270866","volume":"27","author":"J. Moor","year":"1997","unstructured":"J. Moor, \u201cTowards a Theory of Privacy for the Information Age\u201d, Computers and Society 27(3), pp. 27\u201332, 1997","journal-title":"Computers and Society"},{"key":"3_CR23","volume-title":"Privacy and Freedom","author":"A. Westin","year":"1967","unstructured":"A. Westin, Privacy and Freedom, Atheneum, New York, 1967"},{"key":"3_CR24","volume-title":"Surveillance Society. Monitoring Everyday Life","author":"D. Lyon","year":"2001","unstructured":"D. Lyon, Surveillance Society. Monitoring Everyday Life, Open University Press, Buckingham UK, 2001"},{"issue":"5","key":"3_CR25","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1145\/42411.42413","volume":"31","author":"R. Clarke","year":"1988","unstructured":"R. Clarke, Information Technology and Dataveillance, Communications of the ACM 31(5), pp. 498\u2013512, 1988","journal-title":"Communications of the ACM"},{"volume-title":"The Ethics of Privacy in the Workplace","year":"2005","unstructured":"S. Hansson, E. Palm, (eds.), The Ethics of Privacy in the Workplace, Peter Lang, Brussels, 2005","key":"3_CR26"},{"issue":"4","key":"3_CR27","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1080\/01947640500364762","volume":"26","author":"M. Steward","year":"2005","unstructured":"M. Steward, \u201cElectronic Medical Records-Privacy, Confidentiality, Liability\u201d, Journal of Legal Medicine 26(4), pp. 491\u2013506, 2005","journal-title":"Journal of Legal Medicine"},{"key":"3_CR28","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511495342","volume-title":"Genetic Privacy: A Challenge to Medico-Legal Norms","author":"G._.T. Laurie","year":"2002","unstructured":"G._T. Laurie, Genetic Privacy: A Challenge to Medico-Legal Norms, Cambridge University Press, Cambridge UK, 2002"},{"issue":"3","key":"3_CR29","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1023\/A:1012235815384","volume":"3","author":"C. Bennett","year":"2001","unstructured":"C. Bennett, \u201cCookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web\u201d, Ethics and Information Technology 3(3), pp. 195\u2013208, 2001","journal-title":"Ethics and Information Technology"},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1023\/B:ETIN.0000047476.05912.3d","volume":"6","author":"L. Wel van","year":"2004","unstructured":"L. van Wel, L. Royakker, \u201cEthical Issues in Web Data Mining\u201d, Ethics and Information Technology 6, pp. 129\u2013140, 2004","journal-title":"Ethics and Information Technology"},{"key":"3_CR31","first-page":"559","volume":"17","author":"H. Nissenbaum","year":"1998","unstructured":"H. Nissenbaum, \u201cProtecting Privacy in an Information Age: The Problem of Privacy in Public\u201d Law and Philosophy 17: pp. 559\u2013596, 1998","journal-title":"Law and Philosophy"},{"key":"3_CR32","first-page":"585","volume-title":"Readings in Cyberethics","author":"P. Brey","year":"2004","unstructured":"P. Brey, \u201cEthical Aspects of Face Recognition Systems in Public Places\u201d, In Readings in Cyberethics, 2nd edn, ed. by R. Spinello, H. Tavani, Jones and Bartlett, Sudbury, MA, 2004, pp. 585\u2013600","edition":"2nd edn"},{"unstructured":"R. Clarke, \u201cBiometrics and Privacy\u201d, 2001, Available at: http:\/\/www.anu.edu.au\/people\/Roger.Clarke\/DV\/Biometrics.html","key":"3_CR33"},{"volume-title":"Ambient Intelligence","year":"2005","unstructured":"W. Weber, J. Rabaey, E. Aarts, (eds.): Ambient Intelligence, Springer, Berlin Heidelberg New York, 2005","key":"3_CR34"},{"key":"3_CR35","series-title":"Lecture Notes In Computer Science","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems","author":"M. Langheinrich","year":"2001","unstructured":"M. Langheinrich, \u201cPrivacy by Design-Principles of Privacy-Aware Ubiquitous Systems\u201d, In Lecture Notes In Computer Science; Vol. 2201 Archive, Springer, Berlin Heidelberg New York, 2001, pp. 273\u2013291"},{"key":"3_CR36","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10676-006-0005-3","volume":"7","author":"P. Brey","year":"2006","unstructured":"P. Brey, \u201cFreedom and Privacy in Ambient Intelligence, Ethics and Information Technology 7, pp. 157\u2013166, 2006","journal-title":"Ethics and Information Technology"},{"key":"3_CR37","first-page":"lxvi","volume-title":"Encyclopedia of Science, Technology and Society","author":"H. Nissenbaum","year":"2005","unstructured":"H. Nissenbaum, \u201cValues in Technical Design\u201d, In Encyclopedia of Science, Technology and Society, ed. by C. Mitcham, MacMillan, New York, 2005, lxvi\u2013lxx"},{"issue":"4","key":"3_CR38","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/572260.572264","volume":"30","author":"P. Brey","year":"2000","unstructured":"P. Brey, \u201cDisclosive Computer Ethics\u201d, Computers and Society 30(4), 10\u201316, 2000","journal-title":"Computers and Society"},{"key":"3_CR39","first-page":"769","volume-title":"Encyclopedia of Human-Computer Interaction","author":"B. Friedman","year":"2004","unstructured":"B. Friedman, \u201cValue Sensitive Design\u201d, Encyclopedia of Human-Computer Interaction, Great Barrington, MA: Berkshire, 2004, pp. 769\u2013774"}],"container-title":["Security, Privacy, and Trust in Modern Data Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69861-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T18:16:21Z","timestamp":1558203381000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69861-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540698609","9783540698616"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69861-6_3","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}