Abstract
The positive qualities of the Internet--anonymity, openness, and reproducibility have added a new ethical dimension to the privacy debate. This paper describes a new and significant way in which privacy is violated. A type of personal information, called ‘virtual information’ is described and the effectiveness of techniques to protect this type of information is examined. This examination includes a discussion of technical approaches and professional standards as ways to address this violation of ‘virtual information.’
Similar content being viewed by others
References
Ann Well Branscomb. Who Owns Information? Basic Books, 1994.
Fah-Chung Cheong. Internet Agents: Spiders, Wanders, Brokers, and Bots. New Riders, 1996.
Department of Commerce. Elements of Effective Self Regulation for the Protection of Privacy and Questions Related to Online Privac. www.ntia.doc.gov/ntiahome/privacy/6_5_98fedreg.htm
Stacey L. Edgar. Morality and Machines. Jones and Bartlett, 1997.
Guidelines for the Protection of Privacy and Transborder Flows of Personal Data. www.oecd.org/dsti/sti/it/secur/prod/PRIVen.HTML
Deborah Johnson. Computer Ethics. Prentice Hall, 1995.
Deborah Johnson. Ethics Online. Communications of the ACM, 40(1): 60-65, 1997.
Carl S. Kaplan. Big Brother as a Workplace Robot. New York Times, July 24, 1997.
Robert Emmet Long, editor. Rights to Privacy. Wh Wilson, New York, 1997.
P3P Guiding Principles. W3C Note 01-may-1998, www.w3.org/TR/198/NOTE-P310-Principles.
Simon Rogerson. Ethical Aspect of Information Technology IBE, booklet, p. 24, 1998.
Richard Spinello. The End of Privacy. In Long, editor, 1997.
Dennie Van Tassel. The Compleat Computer. SRA Associates, Chicago, 1976.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Gotterbarn, D. Privacy lost: The Net, autonomous agents, and ‘virtual information’. Ethics and Information Technology 1, 147–154 (1999). https://doi.org/10.1023/A:1010011512024
Issue Date:
DOI: https://doi.org/10.1023/A:1010011512024