Skip to main content

THE “RIGHT TO BE LET ALONE” AND PRIVATE INFORMATION

  • Conference paper
Enterprise Information Systems VII

Abstract

The definition of privacy given by Warren and Brandeis as the “right to be let alone” is described as the most comprehensive of rights and the right most valued by civilized men.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Anita Allen-Castellitto. 1999, Coercing Privacy, 40 Wm. & Mary Law. Review 723.

    Google Scholar 

  • Berlin, Isaiah. 1969, Four Essays on Liberty, Oxford University Press, Oxford, at 121-122.

    Google Scholar 

  • Brandeis, Louis. 1928, in a dissenting opinion concerning the constitutionality of telephone wiretapping - Olmstead v. United States, 277 U.S. 438, 478.

    Google Scholar 

  • DeCew, J. 2002, Privacy, Section entitled “Privacy and Technology”, in the Stanford Encyclopaedia of Philosophy, May 14. http://plato.stanford.edu/entries/privacy/.

    Google Scholar 

  • Etzioni, A. 1999, The Limits of Privacy, Basic Books, New York.

    Google Scholar 

  • Floridi, di Luciano. 1998, Information Ethics: On the Philosophical Foundation of Computer Ethics, ETHICOMP98 The Fourth International Conference on Ethical Issues of Information Technology, http://www.wolfson.ox.ac.uk/~floridi/ie.html

    Google Scholar 

  • Fried, C. F. 1970, An Anatomy of Values, Harvard University Press, Cambridge.

    Google Scholar 

  • Fule, Peter and John Roddick 2004, Detecting Privacy and Ethical Sensitivity in Data Mining Results, Twenty-Seventh Australasian Computer Science Conference (ACSC2004), Dunedin, New Zealand. http://crpit.com/confpapers/CRPITV26Fule.pdf

    Google Scholar 

  • Gerety, Tom. 1977, Redefining Privacy, Harvard Civil Rights—Civil Liberties Law Review 12, no. 2: 236.

    Google Scholar 

  • Gleick, J. 1996. Behind Closed Doors; Big Brother Is Us, New York Times, September 29: 130.

    Google Scholar 

  • Godkin, E. L. 1980, The Rights of the Citizen, IV—To His Own Reputation, Scribner's Magazine, July-Dec.

    Google Scholar 

  • Johnson, Jeffery L. 2003, LEGAL PRIVACY AND THE ATTENTION OF OTHERS (Date of access). http://www.eou.edu/~jjohnson/pnwpsajudpol.htm

    Google Scholar 

  • McIntyre v. Ohio 1995, 115 S. Ct. 1511, http://caselaw.lp.findlaw.com/cgibin/getcase.pl?court=us&vol=000&invol=u10296.

    Google Scholar 

  • Mill, John Stuart 1978, On Liberty, Hackett Pub. Press, Indianapolis.

    Google Scholar 

  • Nockleby, John T. 2002, Privacy: Circa 2002. http://cyber.law.harvard.edu/privacy/PrivacyCirca200 2.htm#_ftn1

    Google Scholar 

  • O'Brien, David M. 1979, Privacy, Law, and Public Policy, New York: Praeger.

    Google Scholar 

  • Palme, Joseph. 1998, Critical Review of the Swedish Data Act. http://dsv.su.se/jpalme/society/data-act-analysis.html

    Google Scholar 

  • Prosser, William L. 1984, Privacy [A Legal Analysis], in Philosophical Dimensions of Privacy, Ferdinand David Schoeman (ed.).

    Google Scholar 

  • Parker, Richard B. 1974, A Definition of Privacy, 27 Rutgers Law Review.

    Google Scholar 

  • Ruiz, B. R. 1997, Privacy in Telecommunications, Kluwer Law International, The Hague/London/Boston.

    Google Scholar 

  • Schoeman, Ferdinand 1984, Privacy: Philosophical Dimensions of the Literature, in Philosophical Dimensions of Privacy, Ferdinand David Schoeman, (ed.).

    Google Scholar 

  • Smith, Robert Ellis. 2000, PRIVACY AND CURIOSITY FROM PLYMOUTH ROCK TO THE INTERNET, PRIVACY JOURNAL, Excerpt in: http://members.aol.com/RAHfan147/PrivacyBookExe rpt.html

    Google Scholar 

  • Solove, Daniel J. 2002, Conceptualizing Privacy, California Law Review, Vol. 90.

    Google Scholar 

  • Thomson, J. 1975, The Right to Privacy, Philosophy and Public Affairs 4: 295-314

    Google Scholar 

  • Warren, Samuel D. and Louis D. Brandeis 1890, The Right to Privacy, Harvard Law Rev., Vol. IV, No. 5. http://www.lawrence.edu/fac/boardmaw/Privacy_bran d_warr2.html.

    Google Scholar 

  • Westin, A. 1967, Privacy and Freedom, Athenaeum, New York (1967).

    Google Scholar 

  • Williams, Rev. Elisha, 1744, “A Seasonable Plea ”, at http://www.lexrex.com/enlightened/AmericanIdeal/yar dstick/pr3_quotes.html

    Google Scholar 

  • Union Pacific Railway Co. v. Botsford, 1891, 141 US 250, 11 S Ct 1000, 35 L Ed 734.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer

About this paper

Cite this paper

Al-Fedaghi, S.S. (2007). THE “RIGHT TO BE LET ALONE” AND PRIVATE INFORMATION. In: Chen, CS., Filipe, J., Seruca, I., Cordeiro, J. (eds) Enterprise Information Systems VII. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-5347-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-5347-4_18

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-5323-8

  • Online ISBN: 978-1-4020-5347-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics