Computers, Information Technology, the Internet, Ethics, Society and Human Values

Philip Pecorino, Ph.D.

Queensborough Community College,  CUNY

Chapter 6    Privacy



Demonstration of snooping by computer  The CDT Privacy Demonstration Page.

ACLU Surveillance Campaign  How bad can it get?  Almost there?

Towards a Theory of Privacy in the Information Age James H. Moor

Private Life in Cyberspace by John Perry Barlow 

"The Right to Privacy" (1890)  Samuel Warren and Louis Brandeis,
Technology and Ethics: Privacy in the Workplace A speech by Laura P. Hartman
Privacy Act of 1974, 5 U.S.C. 552a
Discussion on Openness - Foresight Institute
Floridians Mock Cop Cams

Surveillance, privacy, anonymity, identity, borders, secrecy  works by Gary T. Marx

Net Decency & Sexuality links on Backflip 

The Virtual Panopticon. Describes a virtual panopticon constructed in the Internet-standard Virtual Reality Mark-up Language (VRML) and contains some background information on Jeremy Bentham's original vision.

Escaping the Panopticon: Protecting Data Privacy in the Information Age. A student paper from Georgia State University College of Law.

Surveillance and the Electronic Panopticon. from the Massachusetts Institute of Technology.

Information Technology and Public Sector Corruption. Corruption is a major problem for many parts of the public sector. One dominant vision of corruption restraint - the panoptic vision - sees information technology (IT) as a key enabler of management control.

An Examination of Surveillance Technology and the Implications for Privacy and Related Issues. This paper takes a critical look at the often murky intersection of law, technology and information.

The role of information systems personnel in the provision for privacy and data protection in organisations and within information systems  by Richard Howley, Simon Rogerson, N Ben Fairweather, Lawrence Pratchett  Abstract - Full Paper  The ETHICOMP Journal Vol. 1 No. 1, published: 2004-02-02 


The Right to Privacy.  Ellen Alderman and Caroline Kennedy

Ben Franklin's Web Site:  Privacy and Curiosity from Plymouth Rock to the Internet, Smith, Robert Ellis,

"Little Brother Is Watching You," Miriam Schulman (Cyberethics, 155-161)
"The Demise of Privacy in a Private World," Gary Gumpert and Susan J. Drucker (Cyberethics, 171-187) "Privacy and the Computer," Lucas D. Introna (Cyberethics, 188-199)
Dept. of Justice v. Reporters Comm. for Freedom of the Press (Ethical Issues, 160-161) "The Erosion of Privacy," Marie A. Wright and John S. Kakalik (Cyberethics, 162-170)
Whalen v. Roe

Societies and Organizations\ covers the major legislation that is either in effect or stalled in committees. Some laws are more well-known while some are hidden like California's Social Media Act that protects employees or applicants from employers requiring them to divulge their social media information.

Along with digital privacy legislation there is information on internet safety laws in place to protect one of the most vulnerable demographics: children to help with understanding the scope and protections outlined within two of the most important internet safety laws, the Child Protection Act of 2012 and COPPA (Children's Online Privacy Protection Act of 1998). The resource explains at length, these and over a dozen more laws, and how they protect us on and offline.

Privacy International (PI) is a human rights group formed in 1990 as a watchdog on surveillance and privacy invasions by governments and corporations

F.A.C.T.Net Inc. (a non-profit Internet digest, news service, library, dialogue center, and archive dedicated to the promotion and defense of international free thought, free speech, and privacy rights)

Privacy Journal

News on privacy Wired - Privacy Matters

The Electronic Privacy Information Center

The Center for Democracy and Technology

The Information Commissioner of the United Kingdom

The Office of the Federal Privacy Commissioner, Australia

Privacy International

Privacy Foundation

Federal Communications Commision FCC

Federal Trade Commission FTC

Electronic Frontier Foundation 

Electronic Frontier Foundation 's Blue Ribbon Campaign

Center for Democracy and Technology CDT

Children's Access to the Web

Guide to Protecting Privacy of Children:'


Web Surfer's Caveat: These are class notes, intended to comment on readings and amplify class discussion. They should be read as such. They are not intended for publication or general distribution.                @copyright 2006 Philip A. Pecorino                       

Last updated 8-2006                                                              Return to Table of Contents