• Sabah S. Al-Fedaghi


The definition of privacy given by Warren and Brandeis as the “right to be let alone” is described as the most comprehensive of rights and the right most valued by civilized men.


Private Information Active Privacy Informational Privacy Passive Agent Identifiable Individual 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Anita Allen-Castellitto. 1999, Coercing Privacy, 40 Wm. & Mary Law. Review 723.Google Scholar
  2. Berlin, Isaiah. 1969, Four Essays on Liberty, Oxford University Press, Oxford, at 121-122.Google Scholar
  3. Brandeis, Louis. 1928, in a dissenting opinion concerning the constitutionality of telephone wiretapping - Olmstead v. United States, 277 U.S. 438, 478.Google Scholar
  4. DeCew, J. 2002, Privacy, Section entitled “Privacy and Technology”, in the Stanford Encyclopaedia of Philosophy, May 14. Scholar
  5. Etzioni, A. 1999, The Limits of Privacy, Basic Books, New York.Google Scholar
  6. Floridi, di Luciano. 1998, Information Ethics: On the Philosophical Foundation of Computer Ethics, ETHICOMP98 The Fourth International Conference on Ethical Issues of Information Technology, Scholar
  7. Fried, C. F. 1970, An Anatomy of Values, Harvard University Press, Cambridge.Google Scholar
  8. Fule, Peter and John Roddick 2004, Detecting Privacy and Ethical Sensitivity in Data Mining Results, Twenty-Seventh Australasian Computer Science Conference (ACSC2004), Dunedin, New Zealand. Scholar
  9. Gerety, Tom. 1977, Redefining Privacy, Harvard Civil Rights—Civil Liberties Law Review 12, no. 2: 236.Google Scholar
  10. Gleick, J. 1996. Behind Closed Doors; Big Brother Is Us, New York Times, September 29: 130.Google Scholar
  11. Godkin, E. L. 1980, The Rights of the Citizen, IV—To His Own Reputation, Scribner's Magazine, July-Dec.Google Scholar
  12. Johnson, Jeffery L. 2003, LEGAL PRIVACY AND THE ATTENTION OF OTHERS (Date of access). Scholar
  13. McIntyre v. Ohio 1995, 115 S. Ct. 1511, Scholar
  14. Mill, John Stuart 1978, On Liberty, Hackett Pub. Press, Indianapolis.Google Scholar
  15. Nockleby, John T. 2002, Privacy: Circa 2002. 2.htm#_ftn1Google Scholar
  16. O'Brien, David M. 1979, Privacy, Law, and Public Policy, New York: Praeger.Google Scholar
  17. Palme, Joseph. 1998, Critical Review of the Swedish Data Act. Scholar
  18. Prosser, William L. 1984, Privacy [A Legal Analysis], in Philosophical Dimensions of Privacy, Ferdinand David Schoeman (ed.).Google Scholar
  19. Parker, Richard B. 1974, A Definition of Privacy, 27 Rutgers Law Review.Google Scholar
  20. Ruiz, B. R. 1997, Privacy in Telecommunications, Kluwer Law International, The Hague/London/Boston.Google Scholar
  21. Schoeman, Ferdinand 1984, Privacy: Philosophical Dimensions of the Literature, in Philosophical Dimensions of Privacy, Ferdinand David Schoeman, (ed.).Google Scholar
  22. Smith, Robert Ellis. 2000, PRIVACY AND CURIOSITY FROM PLYMOUTH ROCK TO THE INTERNET, PRIVACY JOURNAL, Excerpt in: rpt.htmlGoogle Scholar
  23. Solove, Daniel J. 2002, Conceptualizing Privacy, California Law Review, Vol. 90.Google Scholar
  24. Thomson, J. 1975, The Right to Privacy, Philosophy and Public Affairs 4: 295-314Google Scholar
  25. Warren, Samuel D. and Louis D. Brandeis 1890, The Right to Privacy, Harvard Law Rev., Vol. IV, No. 5. d_warr2.html.Google Scholar
  26. Westin, A. 1967, Privacy and Freedom, Athenaeum, New York (1967).Google Scholar
  27. Williams, Rev. Elisha, 1744, “A Seasonable Plea ”, at dstick/pr3_quotes.htmlGoogle Scholar
  28. Union Pacific Railway Co. v. Botsford, 1891, 141 US 250, 11 S Ct 1000, 35 L Ed 734.Google Scholar

Copyright information

© Springer 2007

Authors and Affiliations

  • Sabah S. Al-Fedaghi
    • 1
  1. 1.Computer Engineering DepartmentKuwait UniversityKuwait

Personalised recommendations