231
Views
2
CrossRef citations to date
0
Altmetric
Miscellany

Integrating privacy studies into teacher education curricula

Pages 55-70 | Published online: 20 Dec 2006

References

  • Alderman , E. and Kennedy , C. 1998 . The Right of Privacy , New York : Vintage Books .
  • Anderson , J. 1996 . Ethics, Privacy, and Security in Higher Education Technology ERIC Accession number: ED405808
  • Association for Computing Machinery (ACM) . 1980 . Code of ethics, Communications of the ACM , 23 ( 7 ) : 425
  • Bacard , A. 1995 . The Computer Privacy Handbook: a practical guide to e-mail encryption, data protection, and PGP privacy software , Berkeley : Peachpit Press .
  • Berger , J. and Pratt , C. 1998 . Teaching business-communication ethics with controversial films . Journal of Business Ethics , 17 ( 16 ) : 1817 – 1835 .
  • Branscomb , A. 1994 . Who Owns Information? From Privacy to Public Access , New York : Basic Books .
  • Brin , D. 1998 . The Transparent Society Addison-WesleyReading
  • Cahill , D. 1997 . Net paradox: personalized experience plus anonymity . Inter@ctive Week , 4 ( 22 ) : 22
  • Case , S. 1998 . Ten commandments for building the medium . Vital Speeches of the Day , 64 ( 14 ) : 431 – 436 .
  • Castells , M. 1996 . The Rise of the Network Society , Cambridge : Blackwell .
  • Coleman , R. and Sim , J. 1998 . From the dockyards to the Disney store: surveillance, risk and security in Liverpool city centre . International Review of Law, Computers & Technology , 12 : 27 – 46 .
  • Crabbe , T. and Donmall , M. 1996 . The optimal size of attributor for use with the University of Manchester Drug Misuse Database . Addiction , 91 ( 10 ) : 1547 – 1551 .
  • Curry , M. 1996 . Data protection and intellectual property . Environment & Planning A , 28 ( 5 ) : 891 – 908 .
  • Curry , M. 1997 . The digital individual and the private realm . Annals of the Association of American Geographers , 87 ( 4 ) : 681 – 700 .
  • Dalton , G. 1998 . Personalizing online data raises privacy concerns . InformationWeek , 686 : 40 – 41 .
  • Daniel , C. 1997 . Not citizens but data subjects . New Statesman , 126 ( 4338 ) : 23 – 26 .
  • Dyer , C. 1997 . Courts may rule on privacy rights: Judge says new law unnecessary 1 The Guardian, 9 October
  • Etzioni , A. 1999 . The Limits of Privacy , New York : Basic Books .
  • Flaherty , D. 1993 . Protecting Privacy in Surveillance Societies: the Federal Republic of Germany, Sweden, France, Canada and the United States , Chapel Hill : University of North Carolina Press .
  • Gannon-Leary , P. 1997 . ‘E’ for exposed? E-Mail and privacy issues . Electronic Library , 15 : 221 – 226 .
  • Gelman , R. 1998 . Protecting Yourself Online , New York : Harper Collins .
  • Givens , B. 1997 . The Privacy Rights Handbook: how to take control of your personal information , New York : Avon .
  • Gordon , D. and Wolpe , H. 1998 . The other Africa . World Policy Journal , 15 : 49 – 60 .
  • Hagel , J. and Rayport , J. 1997 . The coming battle for customer information . Harvard Business Review , 75 : 53 – 61 .
  • Hosman , L. and Siltanen , S. 1995 . Relationship intimacy, need for privacy, and privacy restoration behaviors . Communication Quarterly , 43 : 64 – 75 .
  • Huebert , R. 1997 . Privacy: the early social history of a word . Sewanee Review , 105 : 21 – 39 .
  • Hurd , S. 1990 . Genetic testing: your genes and your job . Employee Responsibilities and Rights Journal , 3 ( 4 ) : 239 – 252 .
  • Johnston , C. 1998 . Call for ‘privacy’ studies . The Times Educational Supplement , : 13 12 June
  • Kohlberg , L. 1981 . The Meaning and Measurement of Moral Development. , Worcester : Clark University, Heinz Werner Institute .
  • Kutler , J. 1996 . Chip cards seen smart enough to resolve privacy issue . American Banker , 161 ( 94 ) : 15
  • Kyl , J. 1998 . Identity theft legislation supported . ABA Bank Compliance , 19 ( 7 ) : 2
  • Lasica , J. 1998 . The World Wide Web never forgets . American Journalism Review , 20 ( 5 ) : 68
  • Lyon , D. and Zureik , E. , eds. 1996 . Computers, Surveillance, and Privacy , Minneapolis : University of Minnesota Press .
  • MacLeod , A. 1997 . Gray areas riddle effort in Britain to enforce strict new privacy code . Christian Science Monitor , 89 ( 217 ) : 6
  • Marsh , A. 1997 . No place to hide . Forbes , 160 ( 6 ) : 226 – 232 .
  • Merton , R. 1957 . Social Theory and Social Structure , Glencoe : Free Press .
  • Moore , B. 1984 . Privacy: studies in social and cultural history , Armonk : Sharpe .
  • Myers , J. 1997 . Creating data protection legislation in the United States: an examination of current legislation . Case Western Reserve Journal of International Law , 29 ( 1 ) : 109 – 148 .
  • National Law Journal . 1997 . Europe mulls privacy laws . 20 ( 3 ) : A14
  • Nock , S. 1998 . Too much privacy? . Journal of Family Issues , 19 ( 1 ) : 101 – 119 .
  • Northern Ontario Business . 1998 . Standards for privacy . 18 ( 3 ) January : 23
  • O'Brien , G. 1997 . The death of privacy . Business West , 14 ( 6 ) : 4 – 8 .
  • Oravec , J. 1996 . Virtual Individuals, Virtual Groups: human dimensions of groupware and computer networking , New York : Cambridge University Press .
  • Oravec , J. 1998/1999 . Learning from Y2K . Ivey Business Quarterly , 63 ( 2 ) : 20 – 26 .
  • Oravec , J. 1999 . Working hard and playing hard: constructive uses of on-line recreation . Journal of General Management , 24 ( 3 ) : 77 – 88 .
  • Orwell , G. 1963 . New York : Harcourt, Brace & World . 1984
  • Posch , R. 1995 . The U.S. employee has greater privacy than anytime in history . Direct Marketing , 58 ( 8 ) : 62 – 63 .
  • Post , R. 1989 . The social foundations of privacy . California Law Review , 77 ( 5 ) : 957 – 1010 .
  • Quade , V. 1993 . Protecting the essence of being . Human Rights: journal of the section of individual rights & responsibilities , 20 : 14 – 20 .
  • Raab , C. and Bennett , C. 1998 . The distribution of privacy risks: who needs protection? . The Information Society , 14 ( 4 ) : 263 – 275 .
  • Riegel , E. 1998 . Endangering cyber commerce . Consumers' Research Magazine , 81 ( 7 ) : 34 – 36 .
  • Riis , P. and Nylenna , M. 1991 . Patients have a right to privacy and anonymity in medical publication . JAMA: Journal of the American Medical Association , 265 ( 20 ) : 2720
  • Rodger , W. 1998 . AmEx, EDS may face European privacy lawsuits . Inter@ctive Week , 5 ( 25 ) : 8
  • Romano , C. 1998 . Telemarketing grows up . Management Review , 87 ( 6 ) : 31 – 35 .
  • Rule , J. and Hunter , L. 1996 . Privacy wrongs . Washington Monthly , 28 ( 11 ) : 17 – 21 .
  • Smith , H. 1994 . Managing Privacy: information technology and corporate America , Chapel Hill : University of North Carolina Press .
  • Smith , H. and Milberg , S. 1996 . Information privacy: measuring individuals' concerns about organizational practices . MIS Quarterly , 20 : 167 – 197 .
  • Stolberg , S. 1998 . Health identifier for all Americans runs into hurdles . New York Times , 147 ( 51224 ) : A1
  • Swain , H. 1998 . Electronic CV for students . The Times Higher Education Supplement , 10 ( 1327 ) April : 2
  • 1997 . Privacy on the agenda . The Times Higher Education Supplement , : 4 7 March
  • Turkle , S. 1995 . Life on the Screen , New York : Random House .
  • van Manen , M. and Levering , B. 1996 . Childhood's Secrets: intimacy, privacy, and the self reconsidered , New York : Teachers College Press .
  • Wacks , R. 1993 . Personal Information: privacy and the law , Oxford : Clarendon Press .
  • Ware , W. 1982 . A Taxonomy for Privacy. Report on the National Symposium on Personal Privacy and Information Technology , New York : American Bar Association .
  • Warren , S. and Brandeis , L. 1890 . The right of privacy . Harvard Law Review , 4 : 193
  • Westin , A. and Baker , M. 1972 . Databanks in a Free Society , New York : Free Press .
  • Wheeler , D. 1998 . Global culture or culture clash . Communication Research , 25 : 359 – 377 .
  • Wilson , J. and Schrader , R. 1998 . Ultimate ID . Popular Mechanics , 175 ( 8 ) : 90 – 91 .
  • Wu , C. 1998 . Private eyes . Science News , 153 ( 14 ) : 216 – 217 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.