Main Page - Course Overview - Current Readings - Labs - Projects INFO 300
|
Course Syllabus
(a pdf file) |
Readings by Topic
|
|
Warren, S. D., & Brandeis, L. D. (1985).
The right to privacy. In D.
G. Johnson and J. W. Snapper, (Eds.), Ethical Issues in the Use of Computers
(pp. 172-183).
Nissenbaum, H. (1998). Protecting privacy in
an information age: The problem with privacy in public.
Law and Philosophy, 17, 559-596.
Gotlieb, C. C. (1996). Privacy: A Concept Whose
Time Has Come and Gone. In
D. Lyon and E. Zureik (Eds.), Computers,
Surveillance, and Privacy (pp. 156-171).
Sheehan, K. B. (2002). Toward a typology of Internet
users and online privacy concerns. The Information
Society, 18, 21 – 32.
What Will Be, Chapter 4: Computer security schemes (pp. 98-107).
Friedman, B., Felten, E., & Millett, L. I. (2000).
Informed consent online: A conceptual model and design
principles. CSE Technical
Report 2000-12-2,
Becker, L. C. (1977). Property Rights: Philosophic Foundations.
Litman, J. (1999). Electronic commerce and
free speech. Ethics and Information Technology,
1, 3, 213-225.
Friedman, B., Kahn, P. H., Jr., and Borning, A. (2002). Value sensitive design:
Theory and methods. Unpublished
manuscript.