Abstract: Previous articleNext article No AccessDiscussionIntimacy and PrivacyRobert S. GersteinRobert S. Gerstein Search for more articles by this author PDFPDF PLUS Add to favoritesDownload CitationTrack CitationsPermissionsReprints Share onFacebookTwitterLinkedInRedditEmail SectionsMoreDetailsFiguresReferencesCited by Ethics Volume 89, Number 1Oct., 1978 Article DOIhttps://doi.org/10.1086/292105 Views: 38Total views on this site Citations: 56Citations are reported from Crossref Copyright 1978 The University of ChicagoPDF download Crossref reports the following articles citing this article:Tesary Lin Valuing Intrinsic and Instrumental Preferences for Privacy, Marketing Science 41, no.44 (Jul 2022): 663–681.https://doi.org/10.1287/mksc.2022.1368Björn Fasterling Privacy as Vulnerability Protection: Optimizing Trade-Offs with Opportunities to Gain Knowledge, (Mar 2022): 29–58.https://doi.org/10.1108/S0193-589520220000030004Ahmad Ghandour, Mathew Parackal, Kenneth R Deans Relationship Development Process in eCommerce Websites, (Dec 2021): 1–9.https://doi.org/10.1109/ACIT53391.2021.9677208Leonhard Menges A Defense of Privacy as Control, The Journal of Ethics 25, no.33 (Oct 2020): 385–402.https://doi.org/10.1007/s10892-020-09351-1Leonhard Menges Did the NSA and GCHQ Diminish Our Privacy? What the Control Account Should Say, Moral Philosophy and Politics 7, no.11 (Jun 2020): 29–48.https://doi.org/10.1515/mopp-2019-0063Kirk Lougheed The Privacy Argument for Personal Anti-Theism, (Aug 2020): 55–110.https://doi.org/10.1007/978-3-030-54820-9_3Adam D. Moore Privacy, (Jun 2019): 1–13.https://doi.org/10.1002/9781444367072.wbiee364.pub2Katy Wells The Right to Housing, Political Studies 67, no.22 (May 2018): 406–421.https://doi.org/10.1177/0032321718769009Federico Ferretti, Daniela Vandone Personal Debt in Europe, 37 (Apr 2019).https://doi.org/10.1017/9781108615358Earl Spurgin , Res Publica 25, no.11 ( 2019): 1.https://doi.org/10.1007/s11158-017-9378-xEric Santanen The value of protecting privacy, Business Horizons 62, no.11 (Jan 2019): 5–14.https://doi.org/10.1016/j.bushor.2018.04.004Kirsty Hughes , The Cambridge Law Journal 78, no.11 ( 2019): 70.https://doi.org/10.1017/S000819731900028XTesary Lin Valuing Intrinsic and Instrumental Preferences for Privacy, SSRN Electronic Journal (Jan 2019).https://doi.org/10.2139/ssrn.3406412Marc Langheinrich, Florian Schaub Privacy in Mobile and Pervasive Computing, Synthesis Lectures on Mobile and Pervasive Computing 10, no.11 (Dec 2018): 1–139.https://doi.org/10.2200/S00882ED1V01Y201810MPC013Judith Wagner DeCew The Conceptual Coherence of Privacy As Developed in Law, (Apr 2018): 17–30.https://doi.org/10.1007/978-3-319-74639-5_2Chris Berg Privacy and Speech, (Sep 2018): 167–179.https://doi.org/10.1007/978-3-319-96583-3_10Cristian Pérez-Muñoz What is Wrong with Testing Welfare Recipients for Drug Use?, Political Studies 65, no.44 (Jun 2017): 912–929.https://doi.org/10.1177/0032321717692166Ethan S. Bernstein Making Transparency Transparent: The Evolution of Observation in Management Theory, Academy of Management Annals 11, no.11 (Jan 2017): 217–266.https://doi.org/10.5465/annals.2014.0076Mattia Gustarini, Marcello Paolo Scipioni, Marios Fanourakis, Katarzyna Wac Differences in smartphone usage: Validating, evaluating, and predicting mobile user intimacy, Pervasive and Mobile Computing 33 (Dec 2016): 50–72.https://doi.org/10.1016/j.pmcj.2016.06.003Yotam Shmargad, Jameson K.M. Watts When Online Visibility Deters Social Interaction: The Case of Digital Gifts, Journal of Interactive Marketing 36 (Nov 2016): 1–14.https://doi.org/10.1016/j.intmar.2016.01.004Mattia Gustarini, Katarzyna Wac, Anind K. Dey Anonymous smartphone data collection: factors influencing the users’ acceptance in mobile crowd sensing, Personal and Ubiquitous Computing 20, no.11 (Dec 2015): 65–82.https://doi.org/10.1007/s00779-015-0898-0Yotam Shmargad, Jameson K. M. Watts When Online Visibility Deters Social Interaction: The Case of Digital Gifts, SSRN Electronic Journal (Jan 2016).https://doi.org/10.2139/ssrn.2726412Earl Spurgin An Emotional-Freedom Defense of Schadenfreude, Ethical Theory and Moral Practice 18, no.44 (Nov 2014): 767–784.https://doi.org/10.1007/s10677-014-9550-8Sehee Han, Jinyoung Min, Heeseok Lee Antecedents of social presence and gratification of social connection needs in SNS: A study of Twitter users and their mobile and non-mobile usage, International Journal of Information Management 35, no.44 (Aug 2015): 459–471.https://doi.org/10.1016/j.ijinfomgt.2015.04.004Kay Mathiesen Human rights as a topic and guide for LIS research and practice, Journal of the Association for Information Science and Technology 66, no.77 (Feb 2015): 1305–1322.https://doi.org/10.1002/asi.23293Judith Wagner DeCew The feminist critique of privacy: past arguments and new social understandings, (Jun 2015): 85–103.https://doi.org/10.1017/CBO9781107280557.006Asimina Vasalou, Adam Joinson, David Houghton Privacy as a fuzzy concept: A new conceptualization of privacy for practitioners, Journal of the Association for Information Science and Technology 66, no.55 (Jun 2014): 918–929.https://doi.org/10.1002/asi.23220Jameson K.M. Watts, Yotam Shmargad Social Visibility and the Gifting of Digital Goods, (Jan 2015): 49–58.https://doi.org/10.1145/2817946.2817966Jameson K. M. Watts, Yotam Shmargad Social Visibility and Gifting of Digital Goods, SSRN Electronic Journal (Jan 2015).https://doi.org/10.2139/ssrn.2679671Mordechai Gordon Friendship, Intimacy and Humor, Educational Philosophy and Theory 46, no.22 (Oct 2012): 162–174.https://doi.org/10.1080/00131857.2012.721732Kay Mathiesen Human Rights for the Digital Age, Journal of Mass Media Ethics 29, no.11 (Jan 2014): 2–18.https://doi.org/10.1080/08900523.2014.863124Mordechai Gordon Friendship, Intimacy, and Humor, (Aug 2013): 57–69.https://doi.org/10.1007/978-3-319-00834-9_5Mattia Gustarini, Katarzyna Wac Smartphone Interactions Change for Different Intimacy Contexts, (Jan 2014): 72–89.https://doi.org/10.1007/978-3-319-05452-0_6Federico Ferretti Competition, the Consumer Interest, and Data Protection, (Jul 2014): 93–122.https://doi.org/10.1007/978-3-319-08906-5_5Mark Rowan, Josh Dehlinger Observed Gender Differences in Privacy Concerns and Behaviors of Mobile Device End Users, Procedia Computer Science 37 (Jan 2014): 340–347.https://doi.org/10.1016/j.procs.2014.08.050Matthew B. Kugler Affinities in Privacy Attitudes: A Psychological Approach to Unifying Informational and Decisional Privacy, SSRN Electronic Journal (Jan 2014).https://doi.org/10.2139/ssrn.2469562Beate Roessler, Dorota Mokrosinska Privacy and social interaction, Philosophy & Social Criticism 39, no.88 (Oct 2013): 771–791.https://doi.org/10.1177/0191453713494968Adam D. Moore Privacy, (Feb 2013).https://doi.org/10.1002/9781444367072.wbiee364Talia Mae Bettcher Full‐Frontal Morality: The Naked Truth about Gender, Hypatia 27, no.22 (Mar 2020): 319–337.https://doi.org/10.1111/j.1527-2001.2011.01184.xThomas Allmer A critical contribution to theoretical foundations of privacy studies, Journal of Information, Communication and Ethics in Society 9, no.22 (May 2011): 83–101.https://doi.org/10.1108/14779961111148613Periambal L. Coopamootoo, Debi Ashenden Designing Usable Online Privacy Mechanisms: What Can We Learn from Real World Behaviour?, (Jan 2011): 311–324.https://doi.org/10.1007/978-3-642-20769-3_25Periambal L. Coopamootoo, Debi Ashenden A Systematic Evaluation of the Communicability of Online Privacy Mechanisms with Respect to Communication Privacy Management, (Jan 2011): 384–393.https://doi.org/10.1007/978-3-642-21708-1_44Anton Vedder Privacy 3.0, (Apr 2011): 17–28.https://doi.org/10.1007/978-90-6704-731-9_2 References, (Dec 2009): 261–281.https://doi.org/10.1002/9781444317992.refsElin Palm Privacy Expectations at Work—What is Reasonable and Why?, Ethical Theory and Moral Practice 12, no.22 (Oct 2008): 201–215.https://doi.org/10.1007/s10677-008-9129-3Michael Carl Tschantz, Jeannette M. Wing Formal Methods for Privacy, (Jan 2009): 1–15.https://doi.org/10.1007/978-3-642-05089-3_1 Bibliography, (Feb 2010): 225–237.https://doi.org/10.4324/9780203895603.bmatt1William A. Edmundson Privacy, (Feb 2008): 271–283.https://doi.org/10.1002/9780470690116.ch19Rhys Smith, Jianhua Shao Privacy and e-commerce: a consumer-centric perspective, Electronic Commerce Research 7, no.22 (Mar 2007): 89–116.https://doi.org/10.1007/s10660-007-9002-9Chiung‐wen (Julia) Hsu Privacy concerns, privacy practices and web site categories, Online Information Review 30, no.55 (Sep 2006): 569–586.https://doi.org/10.1108/14684520610706433William A. Edmundson Privacy, SSRN Electronic Journal (Jan 2003).https://doi.org/10.2139/ssrn.479681J. Patrick Dobel Judging the Private Lives of Public Officials, Administration & Society 30, no.22 (Jul 2016): 115–142.https://doi.org/10.1177/0095399798302001FRED A. MAEL, MARY CONNERLEY, RAY A. MORATH NONE OF YOUR BUSINESS: PARAMETERS OF BIODATA INVASIVENESS, Personnel Psychology 49, no.33 (Sep 1996): 613–650.https://doi.org/10.1111/j.1744-6570.1996.tb01587.xFerdinand D. Schoeman Bibliographical essay / privacy and criminal justice policies, Criminal Justice Ethics 2, no.22 (Sep 2010): 71–82.https://doi.org/10.1080/0731129X.1983.9991733William J. Winslade Confidentiality of medical records: An overview of concepts and legal policies, Journal of Legal Medicine 3, no.44 (Jul 2009): 497–533.https://doi.org/10.1080/01947648209513364Elin Palm, Misse Wester Privacy and Public Access in the Light of E-Government, (): 206–225.https://doi.org/10.4018/978-1-61692-245-0.ch010
Publication Year: 1978
Publication Date: 1978-10-01
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 142
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot