In this Book

buy this book Buy This Book in Print
summary

We all know that Google stores huge amounts of information about everyone who uses its search tools, that Amazon can recommend new books to us based on our past purchases, and that the U.S. government engaged in many data-mining activities during the Bush administration to acquire information about us, including involving telecommunications companies in monitoring our phone calls (currently the subject of a bill in Congress). Control over access to our bodies and to special places, like our homes, has traditionally been the focus of concerns about privacy, but access to information about us is raising new challenges for those anxious to protect our privacy. In Privacy Rights, Adam Moore adds informational privacy to physical and spatial privacy as fundamental to developing a general theory of privacy that is well grounded morally and legally.

Table of Contents

restricted access Download Full Book
  1. Front Cover
  2. pp. -
  3. restricted access
    • Download PDF Download
  1. Title Page
  2. pp. -
  3. restricted access
    • Download PDF Download
  1. Copyright
  2. pp. -
  3. restricted access
    • Download PDF Download
  1. Contents
  2. pp. -
  3. restricted access
    • Download PDF Download
  1. Acknowledgments
  2. pp. ix-x
  3. restricted access
    • Download PDF Download
  1. 1. Introduction
  2. pp. 1-10
  3. restricted access
    • Download PDF Download
  1. 2. Defining Privacy
  2. pp. 11-32
  3. restricted access
    • Download PDF Download
  1. 3. The Value of Privacy
  2. pp. 33-56
  3. restricted access
    • Download PDF Download
  1. 4. Justifying Privacy Rights to Bodies and Locations
  2. pp. 57-80
  3. restricted access
    • Download PDF Download
  1. 5. Providing for Informational Privacy Rights
  2. pp. 81-98
  3. restricted access
    • Download PDF Download
  1. 6. Strengthening Legal Privacy Rights
  2. pp. 99-132
  3. restricted access
    • Download PDF Download
  1. 7. Privacy, Speech, and the Law
  2. pp. 133-152
  3. restricted access
    • Download PDF Download
  1. 8. Drug Testing and Privacy in the Workplace
  2. pp. 153-174
  3. restricted access
    • Download PDF Download
  1. 9. Evaluating Free Access Arguments: Privacy, Intellectual Property, and Hacking
  2. pp. 175-188
  3. restricted access
    • Download PDF Download
  1. 10. Privacy, Security, and Public Accountability
  2. pp. 189-215
  3. restricted access
    • Download PDF Download
  1. Select Bibliography
  2. pp. 216-224
  3. restricted access
    • Download PDF Download
  1. Further Readings
  2. pp. 225-233
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 234-237
  3. restricted access
    • Download PDF Download
  1. Back Cover
  2. pp. -
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.