Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-nr4z6 Total loading time: 0 Render date: 2024-05-28T21:47:27.628Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  19 July 2017

Adam Henschke
Affiliation:
Australian National University, Canberra
Get access
Type
Chapter
Information
Ethics in an Age of Surveillance
Personal Information and Virtual Identities
, pp. 271 - 294
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aaronovitch, David. 2009. “The Strange Case of the Surveillance Cameras.” The Times March 3. www.timesonline.co.uk/tol/comment/columnists/david_aaronovitch/article5834725.ece.Google Scholar
Abbott, Tony. 2015. Prime Minister: Joint Doorstop Interview. Office of the Prime Minister.Google Scholar
Acquisti, Alessandro, and Gross, Ralph. 2009. “Predicting Social Security Numbers from Public Data.” Proceedings of the National Academy of Sciences 106 (27):1097510980. doi: 10.1073/pnas.0904891106.Google Scholar
Adorno, Theodor W. 2001. Kant’s Critique of Pure Reason. Translated by Livingstone, Rodney. Edited by Tiedemann, Rolf. Stanford, California: Stanford University Press.Google Scholar
Ahmed, Ahmed Awad E., and Traore, Issa. 2008. “Employee Surveillance Based on Free Text Detection of Keystroke Dynamics.” In Handbook of Research on Social and Organizational Liabilities in Information Security edited by Gupta, Manish and Sharman, Raj. Hershey: Information Science Reference.Google Scholar
Ainslie, Donald C. 2002. “AIDS and Sex: Is Warning a Moral Obligation?Health Care Analysis 10 (1):4966.Google Scholar
Albrecht, Katherine, and Mcintyre, Liz. 2005. Spychips. Nashville: Nelson Current.Google Scholar
Aldrich, Richard. 2010. GCHQ: The Uncensored History of Britain’s Most Secret Intelligence Agency. New York: Harper Press.Google Scholar
Alexander, Larry. 2008. “Scalar Properties, Binary Judgments.” Journal of Applied Philosophy 25 (2):85104. doi: 10.1111/j.1468–5930.2008.00401.x.Google Scholar
Alexander, Lawrence. 2005. Is There a Right to Freedom of Expression. Cambridge: Cambridge University Press.Google Scholar
Alexandra, Andrew, and Miller, Seumas. 1996. “Needs, Moral Self-Consciousness, and Professional Roles.” Professional Ethics 5 (1&2):4361.Google Scholar
Alexandra, Andrew, and Miller, Seumas. 2009. Ethics in Practice: Moral Theory and the Professions. Sydney: UNSW Press.Google Scholar
Alia-Klein, Nelly, Goldstein, Rita Z., Kriplani, Aarti, Logan, Jean, Tomasi, Dardo, Williams, Benjamin, Telang, Frank, Shumay, Elena, Biegon, Anat, Craig, Ian W., Henn, Fritz, Wang, Gene-Jack, Volkow, Nora D., and Fowler, Joanna S.. 2008. “Brain Monoamine Oxidase a Activity Predicts Trait Aggression.” Journal of Neuroscience 28 (19):50995104. doi: 10.1523/jneurosci.0925-08.2008.Google Scholar
Allen, Anita L. 1988. Uneasy Access: Privacy for Women in a Free Society, New Feminist Perspectives. Totowa, NJ: Rowman & Littlefield.Google Scholar
Allhoff, Fritz. 2011. “What Are Applied Ethics.” Science and Engineering Ethics 17:119.Google Scholar
Allhoff, Fritz. 2012. Terrorism, Ticking Time-Bombs, and Torture. Chicago: The University of Chicago Press.Google Scholar
Alterman, Anton. 2003. “‘A Piece of Yourself’: Ethical Issues in Biometric Identification.” Ethics and Information Technology 5 (3):139.Google Scholar
Andrews, Lori. 2006. “Who Owns Your Body? A Patient’s Perspective on Washington University v. Catalona.” The Journal of Law, Medicine & Ethics 34 (2):398407. doi: 10.1111/j.1748–720X.2006.00046.x.Google Scholar
Andrews, Lori B. 2005. “Harnessing the Benefits of Biobanks.” The Journal of Law, Medicine & Ethics 33 (1):2230. doi: 10.1111/j.1748–720X.2005.tb00207.x.Google Scholar
Appiah, Kwame Anthony. 1994. “Identity, Authenticity, Survival: Multicultural Societies and Social Reproduction.” In Multiculturalism: Examining the Politics of Recognition, edited by Gutman, Amy, 149163. Princeton, NJ: Princeton University Press.Google Scholar
Arendt, Hannah. 1958. The Human Condition, Charles R. Walgreen Foundation Lectures. Chicago: University of Chicago Press.Google Scholar
Arthur, Charles. 2010. “New Facebook Privacy Settings Are ‘a Red Herring’, Say Activists.” The Guardian, 27 May.Google Scholar
Association, American Management. 17 November 2014. “The Latest on Workplace Monitoring and Surveillance.” American Management Association, accessed 04/02/2016. www.amanet.org/training/articles/the-latest-on-workplace-monitoring-and-surveillance.aspx.Google Scholar
Ausloos, Jef. 2012. “The ‘Right To Be Forgotten’ – Worth Remembering?Computer Law & Security Review 28 (2):143152. doi: http://dx.doi.org/10.1016/j.clsr.2012.01.006.Google Scholar
Australian Government. 2010. Healthcare Identifiers Act. Department of Health and Aging. Canberra: Australian Government. www.legislation.gov.au/Details/C2010C00440Google Scholar
Aydede, Murat. 2010. “The Language of Thought Hypothesis.” accessed 24/11/2010. http://plato.stanford.edu/archives/fall2010/entries/language-thought/.Google Scholar
Bach, Kent. 2006. “The Top Ten Misconceptions about Implicature.” In A Festschrift for Larry Horn, edited by Birner, B. and Ward, G.. Amsterdam: John Benjamins.Google Scholar
Baker, Peter, and Shane, Scott. 2010. “Suspect Was Tracked through Phone Numbers.” The New York Times, May 5.Google Scholar
Baker, Stephen. 2007. The Numerati. New York: Mariner Books.Google Scholar
Bambrough, Renford. 1968. “Universals and Family Resemblances.” In Wittgenstein: The Philosophical Investigations, edited by Pitcher, George, 186204. London: Macmillan.Google Scholar
Barnett, Tony, and Sorenson, Corinna. 2011. “Infectious Disease Surveillance in the United States and the United Kingdom: From Public Goods to the Challenges of New Technologies.” Journal of Health Politics, Policy and Law 36 (1):165185. doi: 10.1215/03616878–1191144.Google Scholar
Bartels, Andreas, and Zeki, Semir. 2004. “The Neural Correlates of Maternal and Romantic Love.” NeuroImage 21 (3):11551166.Google Scholar
Baumgartner, T., Heinrichs, M., Vonlanthen, A., Fischbacher, U., and Fehr, E.. 2008. “Oxytocin Shapes the Neural Circuitry of Trust and Trust Adaptation in Humans.” Neuron 58 (4):639650.Google Scholar
Baxter, Donald L. M. 1988. “Identity in the Loose and Popular Sense.” Mind XCVII (388):575582. doi: 10.1093/mind/XCVII.388.575.Google Scholar
Bayne, Tim, and Levy, Neil. 2005. “Amputees by Choice: Body Integrity Identity Disorder and the Ethics of Amputation.” Journal of Applied Philosophy 22 (1):7586.Google Scholar
Beauchamp, Tom L., and Childress, James F.. 2001a. “Appendix: Cases in Biomedical Ethics.” In Principles of Biomedical Ethics, 415431. Oxford: Oxford University Press.Google Scholar
Beauchamp, Tom L., and Childress, James F.. 2001b. Principles of Biomedical Ethics. Fifth edn. Oxford: Oxford University Press.Google Scholar
Beauchamp, Tom L., and Walters, LeRoy. 1994. “The Management of Medical Information.” In Contemporary Issues in Bioethics, edited by Beauchamp, Tom L. and Walters, LeRoy, 123130. Belmont: Wadsworth Publishing Company.Google Scholar
Beaver, Kevin M., DeLisi, Matt, Vaughn, Michael G., and Barnes, J. C.. 2010. “Monoamine Oxidase A Genotype Is Associated with Gang Membership and Weapon Use.” Comprehensive Psychiatry 51 (2):130134.Google Scholar
Bedau, Mark A. 1997. “Weak Emergence.” In Philosophical Perspectives: Mind, Causation, and World, edited by Tomberlin, James, 375399. Hoboken: Wiley-Blackwell.Google Scholar
Bell, D. M., Weisfuse, I. B., Hernandez-Avila, M., del Rio, C., Bustamante, X., and Rodier, G.. 2009. “Pandemic Influenza as a 21st Century Urban Public Health Crisis.” Emerging Infectious Diseases 15 (12):19631969.Google Scholar
Bellaby, Ross. 2014. The Ethics of Intelligence: London: Routledge.Google Scholar
Belluck, Pam. 2009. “Webcast Your Brain Surgery? Hospitals See Marketing Tool.” The New York Times, 24 May.Google Scholar
Bencivenga, Ermanno. 2000. Hegel’s Dialectical Logic. Oxford: Oxford University Press.Google Scholar
Beres, Damon. 2015. “These High-Tech Shirts and Pants Can Help Protect Kids with Autism.” The Huffington Post, 19 February 2015. www.huffingtonpost.com.au/entry/autism-gps-device_n_6705368.html?section=australia.Google Scholar
Bilton, Michael. 2003. Wicked beyond Belief: The Hunt for the Yorkshire Ripper. London: Harper Collins.Google Scholar
Blair, Irene V., Judd, Charles M., and Fallman, Jennifer L.. 2004. “The Automaticity of Race and Afrocentric Facial Features in Social Judgments.” Journal of Personality and Social Psychology 87 (6):763778.Google Scholar
Bok, Sissela. 1989. Secrets: On the Ethics of Concealment and Revelation. Toronto: Vintage Books.Google Scholar
Bolton, John. 2013. “Edward Snowden’s Leaks Are a Grave Threat to US National Security.” The Guardian, 18 June.Google Scholar
BonJour, Laurence. 1985. The Structure of Empirical Knowledge. Cambridge, MA: Harvard University Press.Google Scholar
Bowcott, Owen, and Norton-Taylor, Richard. 2016. “UK Spy Agencies Have Collected Bulk Personal Data Since 1990s, Files Show.” The Guardian, 21 April.Google Scholar
Bowling, Ben, and Phillips, Coretta. 2007. “Disproportionate and Discriminatory: Reviewing the Evidence on Police Stop and Search.” The Modern Law Review 70 (6):936961. doi: 10.1111/j.1468–2230.2007.00671.x.Google Scholar
Bowman, Sue. 2013. “Impact of Electronic Health Record Systems on Information Integrity: Quality and Safety Implications.” Perspectives in Health Information Management 10 (Fall).Google Scholar
Boyle, Matthew. 2009. “Two Kinds of Self-Knowledge.” Philosophy and Phenomenological Research 78 (1):133164. doi: 10.1111/j.1933-1592.2008.00235.x.Google Scholar
Branch, P., Daley, A., and Henschke, A.. 2015. “Expert Panel: Metadata Retention Report.” The Conversation, 27 February. https://theconversation.com/expert-panel-metadata-retention-report-38168.Google Scholar
Brennan, Samantha. 2006. “Moral Lumps.” Ethical Theory and Moral Practice 9 (3):249263.Google Scholar
Brennan, Samantha. 2009. “Feminist Ethics and Everyday Inequalities.” Hypatia 24 (1):141159.Google Scholar
Brennan, Samantha. 2013. “Rethinking the Moral Significance of Micro-Inequities: The Case of Women in Philosophy.” In Women in Philosophy: What Needs to Change, edited by Hutchison, Katrina and Jenkins, Fiona. Oxford: Oxford University Press.Google Scholar
Brey, Philip. 2005. “Artefacts as Social Agents.” In Inside the Politics of Technology: Agency and Normativity in the Co-Production of Technology and Society, edited by Harbers, Hans. Amsterdam: Amsterdam University Press.Google Scholar
Brockmole, James R., Hambrick, David Z., Windisch, David J., and Henderson, John M.. 2008. “The Role of Meaning in Contextual Cueing: Evidence from Chess Expertise.” The Quarterly Journal of Experimental Psychology 61 (12):18861896.Google Scholar
Brook, Andrew. 1998. “Unified Consciousness and the Self.” Journal of Consciousness Studies 5:583591.Google Scholar
Brunner, H. G., Nelen, M., Breakefield, X. O., Ropers, H. H., and van Oost, B. A.. 1993. “Abnormal Behavior Associated with a Point Mutation in the Structural Gene for Monoamine Oxidase A.” Science 262 (5133):578580.Google Scholar
Buchanan, Allen, Brock, Dan W., Daniels, Norman, and Wikler, Daniel. 2000. From Chance to Choice: Genetics & Justice. 1st edn. Cambridge: Cambridge University Press.Google Scholar
Butler, Joseph. 2008. “Of Personal Identity.” In Personal Identity, edited by Perry, John, 99106. Berkeley: University of California Press. Original edition, The Analogy of Religion.Google Scholar
Caldara, Roberto C. A., Rossion, Bruno, Bovet, Pierre, and Hauert, Claude-Alain. 2004. “Event-Related Potentials and Time Course of the ‘Other-Race’ Face Classification Advantage.” Neuroreport 15 (5):905910.Google Scholar
Caldwell, H. K., and Young, W. S. III. 2006. “Oxytocin and Vasopressin: Genetics and Behavioral Implications.” In Handbook of Neurochemistry and Molecular Neurobiology, edited by Abel, Latja and Lim, Ramon, 573607. Berlin: Springer.Google Scholar
Campbell, Mikey. 2015. “Apple Invents Ringstyle Wearable Device with Voice Control, Haptics, Cameras and More.” Apple Insider, 01 October.Google Scholar
Campbell, Tom. 2006. Rights: A Critical Introduction, Routledge Contemporary Political Philosophy. London: Routledge.Google Scholar
Carlato, Daniel. 2008. “Brain Scans as Mind Readers? Don’t Believe the Hype.” Wired Magazine, 19th May.Google Scholar
Cassia, Viola Macchi, Kuefner, Dana, Picozzi, Marta, and Vescovo, Elena. 2009. “Early Experience Predicts Later Plasticity for Face Processing: Evidence for the Reactivation of Dormant Effects.” Psychological Science 20 (6): 853859.Google Scholar
Chalmers, Alan Francis. 1999. What Is This Thing Called Science? 3rd edn. St Lucia: University of Queensland Press.Google Scholar
Chalmers, David. 2006. “Strong and Weak Emergence.” In The Re-Emergence of Emergence, edited by Clayton, Philip and Davies, Paul. Oxford: Oxford University Press.Google Scholar
Chalmers, David John. 1996. The Conscious Mind: In Search of a Fundamental Theory, Philosophy of Mind Series. New York: Oxford University Press.Google Scholar
Chambers, Duncan, Wilson, Paul, Thompson, Carl, and Harden, Melissa. 2012. “Social Network Analysis in Healthcare Settings: A Systematic Scoping Review.” PloS One 7 (8):e41911.Google Scholar
Charness, Neil, Tuffiash, Michael, Krampe, Ralf, Reingold, Eyal, and Vasyukova, Ekaterina. 2005. “The Role of Deliberate Practice in Chess Expertise.” Applied Cognitive Psychology 19 (2):151165. doi: 10.1002/acp.1106.Google Scholar
Cheshire Jnr, William P. 2008. “Doing Small Things Well: Translating Nanotechnology into Nanomedicine.” In Nanoscale: Issues and Perspectives for the Nano Century, edited by Cameron, Nigel M. de S. and Ellen Mitchell, M., 315336. Hoboken: John Wiley & Sons.Google Scholar
Churchland, Paul M. 1981. “Eliminative Materialism and the Propositional Attitudes.” The Journal of Philosophy 78 (2):6790.Google Scholar
Clark, Andy. 1997a. Being There: Putting Brain, Body and World Together Again. Cambridge: MIT Press.Google Scholar
Clark, Andy. 1997b. “The Dynamical Challenge.” Cognitive Science 21 (4):461481. doi: 10.1207/s15516709cog2104_3.Google Scholar
Clark, Andy. 2008. Supersizing the Mind: Embodiment, Action and Cognitive Extension. Oxford: Oxford University Press.Google Scholar
Clark, Andy, and Chalmers, David. 1998. “The Extended Mind.” Analysis 58 (1):719. doi: 10.1093/analys/58.1.7.Google Scholar
Clayton, Ellen Wright. 2005. “Informed Consent and Biobanks.” The Journal of Law, Medicine & Ethics 33 (1):1521.Google Scholar
Cocking, Dean, and Kennett, Jeanette. 1998. “Friendship and the Self.” Ethics 108 (3):502.Google Scholar
Cohen, Elliot D. 2010. Mass Surveillance and State Control. London: Palgrave Macmillan.Google Scholar
Coonan, Clifford. 2016. “Loan Sharks Demand Nude Photos as Collateral from Students.” The Irish Times, 15th June, 2016. www.irishtimes.com/news/offbeat/loan-sharks-demand-nude-photos-as-collateral-from-students-1.2685631.Google Scholar
Costantini, Marcello, and Haggard, Patrick. 2007. “The Rubber Hand Illusion: Sensitivity and Reference Frame for Body Ownership.” Consciousness and Cognition 16 (2):229240.Google Scholar
Council for International Organizations of Medical Sciences. 2005. Pharmacogenetics: Towards Improving Treatment with Medicines. Geneva: Council for International Organizations of Medical Sciences (CIOMS).Google Scholar
Crane, T. 2001. “Intentional Objects.” Ratio 14 (4):336349.Google Scholar
Crompton, Malcolm. 2011. “Personal Communication.” Canberra, 12 May.Google Scholar
Cudd, Anne. 2013. “Contractarianism.” In Stanford Encyclopedia Of Philosophy, edited by Edward N. Zalta.Google Scholar
D’Agostino, Fred, Gaus, Gerald, and Thrasher, John. 2014. “Contemporary Approaches to the Social Contract.” accessed 20/07/2016. http://plato.stanford.edu/archives/win2012/entries/contractarianism-contemporary/.Google Scholar
Daniels, Norman. 1979. “Wide Reflective Equilibrium and Theory Acceptance in Ethics.” The Journal of Philosophy 76 (5):256282.Google Scholar
Daniels, Norman. 1980. “Reflective Equilibrium and Archimedean Points.” Canadian Journal of Philosophy 10 (1):83103.Google Scholar
Daniels, Norman. 2008. Just Health: Meeting Health Needs Fairly. 1st edn. Cambridge: Cambridge University Press.Google Scholar
Darwall, Stephen L. 1977. “Two Kinds of Respect.” Ethics 88 (1):3649.Google Scholar
Dawkins, Richard. 2006. The God Delusion. London: Bantam Press.Google Scholar
de Haan, Willem. 2008. “Violence as an Essentially Contested Concept.” In Violence in Europe, edited by Body-Gendrot, S. and Spierenburg, P.. Dordrecht: Springer.Google Scholar
DeCew, Judith. 2006. “Privacy.” In Stanford Encyclopedia Of Philosophy, edited by Edward N. Zalta.Google Scholar
DeGrazia, David. 2005. Human Identity and Bioethics. Cambridge: Cambridge University Press.Google Scholar
Deikman, A. J. 1996. “I = Awareness.” Journal of Consciousness Studies 3 (4):350356.Google Scholar
Delgado, Mauricio R. 2008. “Fool Me Once, Shame on You; Fool Me Twice, Shame on Oxytocin.” Neuron 58 (4):470471.Google Scholar
Delmas, Candice. 2015. “The Ethics of Government Whistleblowing.” Social Theory and Practice 41 (1):77. doi: 10.5840/soctheorpract20154114.Google Scholar
DeMarco, Joseph P. 1994. A Coherence Theory in Ethics, Value Inquiry Book Series. Amsterdam: Rodopi.Google Scholar
DeMarco, Joseph P. 1997. “Coherence and Applied Ethics.” Journal of Applied Philosophy 14 (3):289300. doi: 10.1111/1468–5930.00064.Google Scholar
DeMarco, Joseph P., and Ford, Paul J.. 2006. “Balancing in Ethical Deliberation: Superior to Specification and Casuistry.” Journal of Medicine & Philosophy 31 (5):483497.Google Scholar
Deneubourg, J. L., and Goss, S.. 1989. “Collective Patterns and Decision-Making.” Ethology Ecology & Evolution 1 (4):295311. doi: 10.1080/08927014.1989.9525500.Google Scholar
Denman, Donald. 1997. “Property and the Environment.” In The Idea of Property in History and Modern Times, edited by Kolbert, Colin. London: Churchill Press.Google Scholar
Dennett, Daniel Clement. 1991. “The Reality of Selves.” In Consciousness Explained, xiii, 511 p. Boston: Little, Brown and Co.Google Scholar
Deutsch, Harry. 2009. “Relative Identity.” In The Stanford Encyclopedia of Philosophy, edited by Edward N. Zalta.Google Scholar
Devine, Patricia G. 1989. “Stereotypes and Prejudice: Their Automatic and Controlled Components.” Journal of Personality and Social Psychology 56 (1):518.Google Scholar
Devitt, Michael. 1990. “Meanings Just Aint in the Head.” In Meaning and Method: Essays in Honour of Hilary Putnam, edited by Boolos, George, 79104. Cambridge: Cambridge University Press.Google Scholar
Dewan, Shaila. 2015. “Judges Replacing Conjecture with Formula for Bail.” The New York Times, 26 June.Google Scholar
Dingle, Sarah. 2014. “Attorney-General George Brandis Struggles to Explain Government’s Metadata Proposal.” ABC News, August 7. www.abc.net.au/news/2014-08-07/brandis-explanation-adds-confusion-to-metadata-proposal/5654186.Google Scholar
Downing, Paul E., Jiang, Yuhong, Shuman, Miles, and Kanwisher, Nancy. 2001. “A Cortical Area Selective for Visual Processing of the Human Body.” Science 293 (5539):24702473. doi: 10.1126/science.1063414.Google Scholar
Drahos, Peter. 1996. “A Philosophy of Intellectual Property.” Thesis (PhD), Dartmouth: Australian National University, 1997.Google Scholar
Drahos, Peter, and Braithwaite, John. 2002. Information Feudalism: Who Owns the Knowledge Economy? London: Earthscan.Google Scholar
Dretske, Fred Irwin. 1981. Knowledge and the Flow of Information. Oxford: B. Blackwell.Google Scholar
Dworkin, Ronald. 1978. Taking Rights Seriously. Cambridge: Harvard University Press.Google Scholar
Eberhardt, Jennifer L., Goff, Phillip Atiba, Purdie, Valerie J., and Davies, Paul. 2004. “Seeing Black: Race, Crime, and Visual Processing.” Journal of Personality & Social Psychology 87 (6):876893.Google Scholar
Ebertz, Roger P. 1993. “Is Reflective Equilibrium a Coherentist Model?Canadian Journal of Philosophy 23 (2):193214.Google Scholar
Editorial. 2012. “The End of Privacy?” The New York Times, 14 July. www.nytimes.com/2012/07/15/opinion/sunday/the-end-of-privacy.html.Google Scholar
El Guindi, Fadwa. 1999. Veil: Modesty, Privacy and Resistance, Dress, Body, Culture. Oxford: Berg.Google Scholar
Ellis, Hadyn D., and Lewis, Michael B.. 2001. “Capgras Delusion: A Window on Face Recognition.” Trends in Cognitive Sciences 5 (4):149156.Google Scholar
Ellsberg, Daniel. 2013. “Edward Snowden: Saving Us from the United Stasi of America.” The Guardian, 10 June.Google Scholar
Elsabbagh, Mayada, Volein, Agnes, Csibra, Gergely, Holmboe, Karla, Garwood, Holly, Tucker, Leslie, Krljes, Sanya, Baron-Cohen, Simon, Bolton, Patrick, Charman, Tony, Baird, Gillian, and Johnson, Mark H.. 2009. “Neural Correlates of Eye Gaze Processing in the Infant Broader Autism Phenotype.” Biological Psychiatry 65 (1):3138.Google Scholar
Endomondo. 2011. “Terms and Conditions.” accessed 16 March 2012. www.endomondo.com/terms.Google Scholar
Endomondo.com. 2012. Endomondo Fact Sheet.Google Scholar
European Commission. 2010. A Comprehensive Approach on Personal Data Protection in the European Union. In COM 609, edited by European Commission.Google Scholar
European Data Protection Supervisor. 2001. Regulation (EC) No 45/2001.Google Scholar
Evans, Nicholas G. 2012. “Great Expectations.” Journal of Medical Ethics 39:209213.Google Scholar
Everett, Margaret. 2005. “The Social Life of Genes: Privacy, Property and the New Genetics.” In Information Ethics: Privacy, Property, and Power, edited by Moore, Adam D., 226250. Seattle: University of Washington Press.Google Scholar
Farrell, Henry. 2015. “Facebook Wasn’t Great at Respecting Privacy in the First Place. It’s Gotten Much Worse.” The Washington Post, August 18. Accessed 11/01/2016. www.washingtonpost.com/blogs/monkey-cage/wp/2015/08/18/facebook-wasnt-great-at-respecting-privacy-in-the-first-place-its-gotten-much-worse/.Google Scholar
Farrell, Paul. 2016a. “Lamb Chop Weight Enforcers Want Warrantless Access to Australians’ Metadata.” The Guardian, 19 January.Google Scholar
Farrell, Paul. 2016b. “Privacy Commissioner Challenges Ruling Journalist Can’t Access Own Phone Data.” The Guardian, 11 February.Google Scholar
Farroni, Teresa, Csibra, Gergely, Simion, Francesca, and Johnson, Mark H.. 2002. “Eye Contact Detection in Humans from Birth.” Proceedings of the National Academy of Sciences of the United States of America 99 (14):96029605. doi: 10.1073/pnas.152159999.Google Scholar
Faunce, Thomas A., and Lexchin, Joel. 2007. “‘Linkage’ Pharmaceutical Evergreening in Canada and Australia.” Australia New Zealand Health Policy 4 (8):111.Google Scholar
Feinberg, Joel. 1985. The Moral Limits of the Criminal Law. Vol. 3: Harm to Self. New York: Oxford University Press.Google Scholar
Feng, Lu, Liu, Jiangang, Wang, Zhe, Li, Jun, Li, Ling, Ge, Liezhong, Tian, Jie, and Lee, Kang. 2011. “The Other Face of the Other-Race Effect: An fMRI Investigation of the Other-Race Face Categorization Advantage.” Neuropsychologia 49 (13):37393749.Google Scholar
Fiala, Andrew. 2006. “A Critique of Exceptions: Torture, Terrorism, and the Lesser Evil.” International Journal of Applied Philosophy 20 (1):127142.Google Scholar
First, Michael. 2005. “Desire for Amputation of a Limb: Paraphilia, Psychosis, or a New Type of Identity Disorder.” Psychological Medicine 35:919928.Google Scholar
FitBit. 2015. “FitBit.” accessed 12/01/2016. www.fitbit.com/au/about.Google Scholar
Fitzgerald, Brian. 2003. “Theoretical Underpinning of Intellectual Property: ‘I Am a Pragmatist but Theory Is My Rhetoric’.” Canadian Journal of Law and Jurisprudence 16 (2):179190.Google Scholar
Fletcher, George C., and Ohlin, Jens David. 2008. Defending Humanity: When Force Is Justified and Why. Oxford University Press.Google Scholar
Flood, Alison. 2012. “Big e-Reader Is Watching You.” The Guardian (UK), 4 July. www.guardian.co.uk/books/2012/jul/04/big-ereader-is-watching-you.Google Scholar
Floridi, Luciano. 2002. “On the Intrinsic Value of Information Objects and the Infosphere.” Ethics and Information Technology 4 (4):287304.Google Scholar
Floridi, Luciano. 2004. “Information.” In The Blackwell Guide to the Philosophy of Computing and Information, edited by Floridi, Luciano. Oxford: Blackwell Publishing.Google Scholar
Floridi, Luciano. 2005a. “Is Semantic Information Meaningful Data?Philosophy and Phenomenological Research 70 (2):351370. doi: 10.1111/j.1933-1592.2005.tb00531.x.Google Scholar
Floridi, Luciano. 2005b. “The Ontological Interpretation of Informational Privacy.” Ethics And Information Technology 7:185200.Google Scholar
Floridi, Luciano. 2006. “Four Challenges for a Theory of Informational Privacy.” Ethics and Information Technology 8:109119.Google Scholar
Floridi, Luciano. 2008. “The Method of Levels of Abstraction.” Minds and Machines 18 (3):303329. doi: 10.1007/s11023-008–9113-7.Google Scholar
Floridi, Luciano. 2011a. The Philosophy of Information. Oxford: Oxford University Press.Google Scholar
Floridi, Luciano. 2011b. “Semantic Conceptions of Information.” In The Stanford Encyclopedia of Philosophy, edited by Edward N. Zalta.Google Scholar
Fodor, Jerry A. 1983. The Modularity of Mind: An Essay on Faculty Psychology. Cambridge, MA: MIT Press.Google Scholar
Frankfurt, Harry. 2006. Taking Ourselves Seriously and Getting It Right, edited by Satz, Debra. Stanford, California: Stanford University Press.Google Scholar
Frankfurt, Harry G. 1971. “Freedom of the Will and the Concept of a Person.” The Journal of Philosophy 68 (1):520.Google Scholar
Frankfurt, Harry G. 1988. The Importance of What We Care About: Philosophical Essays. Cambridge: Cambridge University Press.Google Scholar
Freudenheim, Milt. 2009. “And You Thought a Prescription Was Private.” New York Times, August 9.Google Scholar
Friedman, Batya, Kahn, Peter H., and Borning, Alan. 2002. Value Sensitive Design: Theory and Methods. In University of Washington Computer Science and Engineering Technical Report: University of Washington.Google Scholar
Friedman, Batya, and Nissenbaum, Helen, eds. 2007. “Bias in Computer Systems.” Edited by Weckert, John, Computer Ethics. Aldershot: Ashgate.Google Scholar
Friedman, Marilyn. 2000. “Autonomy, Social Disruption and Women.” In Relational Autonomy: Feminist Perspectives on Automony, Agency, and the Social Self, edited by Mackenzie, Catriona and Stoljar, Natalie, 3551. New York: Oxford University Press.Google Scholar
Friedman, Milton. 1970. “The Social Responsibility of Business Is to Increase Its Profits.” The New York Times Magazine, September 13.Google Scholar
Funder, Anna. 2002. Stasiland. Melbourne: Text Publishing.Google Scholar
Garrett, Laurie. 1996. The Coming Plague. London: Penguin Books.Google Scholar
Garrett, Laurie. 2001. Betrayal of Trust. New York: Hyperion books.Google Scholar
Garrett, Laurie. 2012. “Flu Season.” Foreign Policy, January 5.Google Scholar
Gelman, Andrew, Fagan, Jeffrey, and Kiss, Alex. 2007. “An Analysis of the New York City Police Department’s ‘Stop-and-Frisk’ Policy in the Context of Claims of Racial Bias.” Journal of the American Statistical Association 102 (479):813823. doi: 10.1198/016214506000001040.Google Scholar
Gert, Bernard. 2004. Common Morality: Deciding What to Do. Oxford: Oxford University Press.Google Scholar
Gert, Bernard, Culver, Charles, and Clouser, Danner. 2006. Bioethics: A Systematic Approach. Oxford: Oxford University Press.Google Scholar
Gettier, Edmund L. 1963. “Is Justified True Belief Knowledge?Analysis 23:121123.Google Scholar
Gillies, Peter. 2009. “Colour in Branding – Asserting a Monopoly in a Colour for Marketing Purposes – The Cadbury – Darrell Lea Litigation.” International Trade and Business Law Review 253 (12):253265.Google Scholar
Glover, Jonathan. 1986. “It Makes No Difference Whether or Not I Do It.” In Applied Ethics, edited by Singer, Peter A.. Oxford: Oxford University Press.Google Scholar
Glover, Jonathan. 1988. I: The Philosophy and Psychology of Personal Identity. London: Allen Lane/ Penguin.Google Scholar
Glover, Jonathan, ed. 1990. Utilitarianism and Its Critics. New York: Macmillan Pub. Co.Google Scholar
Glover, Jonathan. 2000. Humanity: A Moral History of the Twentieth Century. New Haven, CT: Yale University Press.Google Scholar
Goodin, Robert E. 1985. Protecting the Vulnerable: A Reanalysis of Our Social Responsibilities. Chicago: University of Chicago Press.Google Scholar
Gosling, Angela, and Eimer, Martin. 2011. “An Event-Related Brain Potential Study of Explicit Face Recognition.” Neuropsychologia 49 (9):27362745.Google Scholar
Greenberg, Andy. 2012. This Machine Kills Secrets: How Wikileaks, Cypherpunks and Hacktivists Aim to Free the World’s Information. New York: Penguin.Google Scholar
Greenwald, Glen. 2014. No Place to Hide: Edward Snowden, The NSA, and the U.S. Surveillance State. New York: Metropolitan Books.Google Scholar
Grice, H. P. 1957. “Meaning.” The Philosophical Review 66 (3):377388.Google Scholar
Griffin, James. 1986. Well-Being: Its Meaning, Measurement and Moral Importance. Oxford: Oxford University Press.Google Scholar
Griffin, James. 2008. On Human Rights. Oxford: Oxford University Press.Google Scholar
Griffiths, Paul E., and Stotz, Karola. 2006. “Genes in the Postgenomic Era.” Theoretical Medicine and Bioethics 27:499521.Google Scholar
Guerrero, Alexander A. 2007. “Don’t Know, Don’t Kill: Moral Ignorance, Culpability, and Caution.” Philosophical Studies 136:5997.Google Scholar
Gutman, Amy. 1994. “Introduction to Examining Multiculturalism and the Politics of Recognition.” In Examining Multiculturalism and the Politics of Recognition, edited by Gutman, Amy, 324. Princeton, NJ: Princeton University Press.Google Scholar
Guzik, Keith. 2009. “Discrimination by Design: Predictive Data Mining as Security Practice in the United States’ ‘War On Terrorism’.” Surveillance and Society 7 (1):117.Google Scholar
Habermas, Jurgen. 1994. “Struggles for Recognition in the Democratic Constitutional State.” In Multiculturalism: Examining the Politics of Recognition, edited by Gutman, Amy, 107148. Princeton, NJ: Princeton University Press.Google Scholar
Habermas, Jurgen. 1995. “Reconciliation through the Public Use of Reason: Remarks on John Rawls’s Political Liberalism.” The Journal of Philosophy 92 (3):109131.Google Scholar
Hackman, Rose. 2015. “Is the Online Surveillance of Black Teenagers the New Stop-and-Frisk?” The Guardian, 23 April.Google Scholar
Haidt, Jonathan. 2001. “The Emotional Dog and Its Rational Tail: A Social Intuitionist Approach to Moral Judgment.” Psychological Review 108 (4):814834.Google Scholar
Hanson, Norwood Russell. 1958. Patterns of Discovery: An Inquiry into the Conceptual Foundations of Science. London: Cambridge University Press.Google Scholar
Hardcastle, Valerie Gray, and Matthew Stewart, C.. 2005. “Localization in the Brain and other Illusions.” In Cognition and the Brain: The Philosophy and Neuroscience Movement, edited by Brook, Andrew and Akins, Kathleen, Cambridge; New York: Cambridge University Press.Google Scholar
Hardin, Garrett. 1968. “The Tragedy of the Commons.” Science 162 (3859):12431248. doi: 10.1126/science.162.3859.1243.Google Scholar
Harding, Luke. 2014. The Snowden Files: The Inside Story of the World’s Most Wanted Man. New York: Vintage Books.Google Scholar
Harmann, Gilbert. 1977. The Nature of Morality: An Introduction to Ethics. New York: Oxford University Press.Google Scholar
Haslanger, Sally. 2000. “Gender and Race: (What) Are They? (What) Do We Want Them to Be?Noüs 34 (1):3155.Google Scholar
Hauskeller, Christine. 2004. “Genes, Genomes and Identity. Projections on Matter.” New Genetics and Society 23 (3):285299.Google Scholar
Hearn, Louisa. 2010. “Google on Privacy: Change Your Name.” Sydney Morning Herald, August 17.Google Scholar
Hegel, Georg Wilhelm Friedrich. 1967. Philosophy of Right. Translated by Knox, T. M.. London: Oxford University Press.Google Scholar
Hegel, Georg Wilhelm Friedrich, and Inwood, M. J.. 2007. Hegel’s Philosophy of Mind. Translated by Wallace, William and Miller, Arnold V.. Oxford: Clarendon. Original edition, 1830.Google Scholar
Henschke, Adam. 2010. “Did You Just Say What I Think You Said? Talking about Genes, Identity and Information.” Identity in the Information Society 3 (3):435456.Google Scholar
Henschke, Adam. 2011. “Soft Biometrics the Next Step for Security Surveillance, According to Aussie Researchers.” The Australian, 06/09/2011. www.theaustralian.com.au/higher-education/soft-biometrics-the-next-step-for-security-surveillance-according-to-aussie-researchers/story-e6frgcjx-1226130769980.Google Scholar
Henschke, Adam. 2012. “Making Sense of Animal Disenhancement.” NanoEthics 6 (1):5564. doi: 10.1007/s11569-012-0140-8.Google Scholar
Henschke, Adam. 2014. “Metadata and Privacy: Surveillance State or Business as Usual?” The Conversation, 12 November. https://theconversation.com/metadata-and-privacy-surveillance-state-or-business-as-usual-33949.Google Scholar
Henschke, Adam. 2015a. “AshelyMadison.Com: Fifty Shades of Grey Hat Hacking.” Ethics.org, January 20. www.ethics.org.au/on-ethics/blog/july-2015-(1)/ashleymadison-com-fifty-shades-of-grey-hat-hacking.Google Scholar
Henschke, Adam. 2015b. “Ashley Madison: An Affair May Be Morally Wrong, But Can We Justify Vigilante Punishment Based on Sexual Morality?” The Age, 20th August. www.theage.com.au/comment/ashley-madison-an-affair-may-be-morally-wrong-but-can-we-justify-vigilante-punishment-based-on-sexual-morality-20150820-gj3pzv.html.Google Scholar
Henschke, Adam. 2015c. “Benign and Powerful: The Contradictory Language of Metadata Retention.” The Conversation, March 2nd. https://theconversation.com/benign-and-powerful-the-contradictory-language-of-metadata-retention-38225.Google Scholar
Henschke, Adam. 2015d. “Opportunity Costs: Scarcity and Complex Medical Machines.” In Machine Medical Ethics, edited by van Rysewyk, Simon Peter and Pontier, Matthias, 131150. Dordrecht: Springer.Google Scholar
Henschke, Adam. 2015e. “We Should Care about Metadata and What Governments Do with It.” The Courier Mail, 20 February. www.couriermail.com.au/news/opinion/we-should-care-about-metadata-and-what-governments-do-with-it/story-fnihsr9v-1227225953591.Google Scholar
Henschke, Adam. 2017. “The Internet of Things and Dual Layers of Ethical Concern.” In Robot Ethics, edited by Lin, Patrick, Abney, Keith and Jenkins, Ryan. Oxford: Oxford University Press.Google Scholar
Henschke, Adam, and Evans, Nicholas G.. 2012. “Winning Well by Fighting Well: Probability of Success and the Relations between War’s Ends and Warfighters’ Roles.” International Journal of Applied Philosophy 26 (2):149. doi: 10.5840/ijap201226212.Google Scholar
Hesketh, Ian. 2009. Of Apes and Ancestors: Evolution, Christianity and the Oxford Debate. Toronto: University of Toronto Press.Google Scholar
Hettinger, Edwin C. 1989. “Justifying Intellectual Property.” Philosophy and Public Affairs 18 (1):3152.Google Scholar
Heyman, Steven. 1991The First Duty of Government: Protection, Liberty and the Fourteenth Amendment.” Duke Law Journal 41:507571.Google Scholar
Hill, Kashmir. 2012. “How Target Figured Out a Teen Girl Was Pregnant Before Her Father Did.” Forbes, February 16. Accessed 11/01/2016. www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/.Google Scholar
Hobbes, Thomas. 1968. Leviathan, edited by Machperson, C. B.. Middlesex: Pelican Classics. Original edition, 1651.Google Scholar
Hochstein, Shaul, and Ahissar, Merav. 2002. “View from the Top: Hierarchies and Reverse Hierarchies in the Visual System.” Neuron 36 (5):791804.Google Scholar
Honoré, Anthony (Tony) M. 1961. “Ownership.” In Oxford Essays in Jurisprudence: A Collaborative Work, edited by Guest, Anthony Gordon. London: Oxford University Press.Google Scholar
Hook, C. Christopher. 2008. “Nanotechnology and the Future of Medicine.” In Nanoscale: Issues and Perspectives for the Nano Century, edited by Cameron, Nigel M. de S. and Ellen Mitchell, M., 337357. Hoboken: Wiley & Sons.Google Scholar
Househ, Mouwafa. 2013. “The Use of Social Media in Healthcare: Organizational, Clinical, and Patient Perspectives.” In Enabling Health and Healthcare through ICT: Available, Tailored, and Closer, edited by Courtney, Karen L., Shabetsari, Omid and Kuo, Alex. IOS Press.Google Scholar
Hughes, Justin. 1988. “The Philosophy of Intellectual Property.” Georgetown Law Journal 77:287366.Google Scholar
Hume, David. 1985. A Treatise of Human Nature, edited by Mossner, Ernest C.. London: Penguin. Original edition, 1739. Reprint, 1985.Google Scholar
Hunt, Elle. 2016. “Instagram Star Essena O’Neill: ‘The Way It All Turned So Negative Just Numbed Me’.” The Guardian, 05 January.Google Scholar
Hurka, Thomas. 2005. “Proportionality in the Morality of War.” Philosophy and Public Affairs 33 (1):3466.Google Scholar
Hursthouse, Rosalind. 1999. On Virtue Ethics. Oxford: Oxford University Press.Google Scholar
Inness, Julie C. 1992. Privacy, Intimacy, and Isolation. New York: Oxford University Press.Google Scholar
Jackson, Frank. 1991. “What Mary Didn’t Know.” In The Nature of Mind, edited by Rosenthal, David M.. New York: Oxford University Press. Original edition, The Journal of Philosophy, LXXXIII, 5 (May 1986):291295.Google Scholar
Jackson, Frank. 2003. “Mind and Illusion.” In Minds and Persons, edited by O’Hear, Anthony, 251272. Cambridge: Cambridge University Press.Google Scholar
Jackson, Frank, and Pettit, Philip. 2004. “In Defence of Folk Psychology.” In Mind, Morality and Explanation, edited by Jackson, Frank, Pettit, Philip and Smith, Michael, 1335. Oxford: Oxford University Press.Google Scholar
Johnson, Bobbie. 2010. “Privacy No Longer a Social Norm, Says Facebook Founder.” Guardian UK, January 11.Google Scholar
Johnston, Josephine, and Wasunna, Angela A.. 2007. “Patents, Biomedical Research, and Treatments: Examining Concerns, Canvassing Solutions.” The Hastings Center Report 31 (1):S2S36.Google Scholar
Jones, Peter. 2006. “Toleration, Recognition and Identity.” Journal of Political Philosophy 14 (2):123143. doi:10.1111/j.1467–9760.2006.00246.x.Google Scholar
Jonsen, Albert R., and Toulmin, Stephen Edelston. 1988. The Abuse of Casuistry: A History of Moral Reasoning. Berkeley: University of California Press.Google Scholar
Joyce, Richard. 2006. The Evolution of Morality. Cambridge: MIT Press.Google Scholar
Kagan, Shelly. 1989. The Limits of Morality. Oxford: Oxford University Press.Google Scholar
Kagan, Shelly. 1998a. Normative Ethics, Dimensions of Philosophy. Boulder: Westview Press.Google Scholar
Kagan, Shelly. 1998b. “Rethinking Intrinsic Value.” The Journal of Ethics 2:277297.Google Scholar
Kant, Immanuel. 1934. Critique of Pure Reason. Translated by Meiklejohn, J. M. D.. London: Dent.Google Scholar
Kanwisher, Nancy. 2000. “Domain Specificity in Face Perception.” Nature Neuroscience 3 (8):759763.Google Scholar
Kasperbauer, T. J. 2015. “Psychological Constraints on Egalitarianism: The Challenge of Just World Beliefs.” Res Publica 21 (3):217234. doi: 10.1007/s11158-015–9284-z.Google Scholar
Kavka, Gregory S. 1983. Hobbes’s War of All against All.” Ethics 93 (2):291310.Google Scholar
Kennett, Jeanette, and Fine, Cordelia. 2009. “Will the Real Moral Judgment Please Stand Up?Ethical Theory and Moral Practice 12 (1):7796. doi: 10.1007/s10677-008–9136-4.Google Scholar
Khaleeli, Homa, and Monday 8 August 2016 18.12 BST. 2016. “The Perils of ‘Flying While Muslim’.” The Guardian UK, 8th August.Google Scholar
Kharpal, Arjun. 2016. “Apple Vs FBI: All You Need to Know.” CNBC, 29 March 2016. Accessed 20 August 2016. www.cnbc.com/2016/03/29/apple-vs-fbi-all-you-need-to-know.html.Google Scholar
Khatchadourian, Haig. 1968. “Common Names and ‘Family Resemblances’.” In Wittgenstein: The Philosophical Investigations, edited by Pitcher, George, 205230. Macmillan.Google Scholar
Kilcullen, David. 2016. Blood Year: The Unvravelling of Western Counterterrorism: Oxford University Press.Google Scholar
Kim, Jaegwon. 1999. “Making Sense of Emergence.” Philosophical Studies 95:336.Google Scholar
Kim, Jaegwon. 2006. “Emergence: Core Ideas and Issues.” Synthese 151 (3):547559. doi: 10.1007/s11229-006-9025-0.Google Scholar
Kirsh, David, and Maglio, Paul. 1994. “On Distinguishing Epistemic from Pragmatic Action.” Cognitive Science 18 (4):513549.Google Scholar
Kitcher, Philip. 2007. “Does ‘Race’ Have a Future?Philosophy & Public Affairs 35 (4):293317.Google Scholar
Kitcher, Philip. 2011. “Militant Modern Atheism.” Journal of Applied Philosophy 28 (1). doi: 10.1111/j.1468–5320.2010.00500.x.Google Scholar
Kizza, Joseph Migga, and Ssanyu, Jackline. 2005. “Workplace Surveillance.” In Electronic Monitoring in the Workplace: Controversies and Solutions, edited by Weckert, John, 118. Hershey: Idea Group Publishing.Google Scholar
Klein, Peter. 2011. Skepticism. In Stanford Encyclopedia of Philosophy, edited by Edward N. Zalta.Google Scholar
Koepsell, David. 2009. Who Owns You? The Corporate Gold Rush to Patent Your Genes. West Sussex: Wiley-Blackwell.Google Scholar
Kolers, Avery. 2003. “Cloning and Genetic Parenthood.” Cambridge Quarterly of Healthcare Ethics 12 (04):401410. doi: 10.1017/S0963180103124097.Google Scholar
Kolers, Avery, and Bayne, Tim. 2001. “‘Are You My Mommy?’ On the Genetic Basis of Parenthood.” Journal of Applied Philosophy 18 (3):273285. doi: 10.1111/1468–5930.00194.Google Scholar
Kornell, Nate. 2009. “Metacognition in Humans and Animals.” Current Directions in Psychological Science 18 (1):1115. doi: 10.1111/j.1467–8721.2009.01597.x.Google Scholar
Korsgaard, Christine M. 1996. The Sources of Normativity. New York: Cambridge University Press.Google Scholar
Korsgaard, Christine M. 2009. Self-Constitution: Agency, Identity, and Integrity. Oxford: Oxford University Press.Google Scholar
Krigolson, Olav E., Pierce, Lara J., Holroyd, Clay B., and Tanaka, James W.. 2008. “Learning to Become an Expert: Reinforcement Learning and the Acquisition of Perceptual Expertise.” Journal of Cognitive Neuroscience 21 (9):18331840. doi: 10.1162/jocn.2009.21128.Google Scholar
Kroes, Peter. 2009. “Technical Artifacts, Engineering Practice, and Emergence.” In Functions In Biological and Artificial Worlds: Comparative Philosophical Perspectives, edited by Krohs, Ulrich and Kroes, Peter. Cambridge: MIT Press.Google Scholar
Kveraga, Kestutis, Ghuman, Avniel S., and Bar, Moshe. 2007. “Top-Down Predictions in the Cognitive Brain.” Brain and Cognition 65 (2):145168.Google Scholar
Kwek, Glenda. 2011. “Armageddon Super Virus Recipe: Keep Secret or Publish?” Sydney Morning Herald, December 6.Google Scholar
Kymlicka, Will. 1995. Multicultural Citizenship: A Liberal Theory of Minority Rights. Oxford: Clarendon Press.Google Scholar
Kymlicka, Will. 2002. Contemporary Political Philosophy. 2nd edn. Oxford: Oxford University Press.Google Scholar
Lauwereyns, Jan. 2010. The Anatomy of Bias: How Neural Circuits Weigh the Options. New York: Cambridge.Google Scholar
Le Grand, Richard, Cooper, Philip A., Mondloch, Catherine J., Lewis, Terri L., Sagiv, Noam, de Gelder, Beatrice, and Maurer, Daphne. 2006. “What Aspects of Face Processing Are Impaired in Developmental Prosopagnosia?Brain and Cognition 61 (2):139158.Google Scholar
Lemos, Jakob de. 2007. Visual Detection and Emotional Response Detection and Display System, edited by U.S. Patent and Trademark Office USPTO. United States.Google Scholar
Lerner, Melvin. 1980. The Belief in a Just World: A Fundamental Delusion: Plenum Press.Google Scholar
Lester, Genevieve. 2016. When Should State Secrets Stay Secret? Cambridge: Cambridge University Press.Google Scholar
Lever, Annabelle. 2001. “Ethics and the Patenting of Human Genes.” Journal of Philosophy, Science and Law 1 (1).Google Scholar
Levin, Sam. 2016. “A Beauty Contest Was Judged by AI and the Robots Didn’t Like Dark Skin.” Guardian, 8th September.Google Scholar
Levy, Neil. 2002. Moral Relativism: A Short Introduction. Oxford: Oneworld PublicationsGoogle Scholar
Levy, Neil. 2007. Neuroethics: Challenges for the 21st Century. Cambridge: Cambridge University Press.Google Scholar
Lewis, Michael, and Brooks-Gunn, Jeanne. 1979. Social Cognition and the Acquisition of Self. New York: Plenum Press.Google Scholar
Ley, Susan. 2015. Patients to Get New myHealth Record: $485m ‘Rescue’ Package to Reboot Labor’s e-health Failures. Minister For Health.Google Scholar
Locke, John. 1975. An Essay Concerning Human Understanding, edited by Nidditch, Peter. H., Locke, John, 1632–1704. Works. 1975. Oxford: Clarendon Press.Google Scholar
Locke, John, and Laslett, Peter. 1963. Two Treatises of Government. Revised edn. New York: Mentor. Original edition, 1698.Google Scholar
Lockton, Vance, and Rosenberg, Richard S.. 2005. “RFID: The Next Serious Threat to Privacy.” Ethics and Information Technology 7 (4):221.Google Scholar
Lohr, Steve. 2014. “Unblinking Eyes Track Employees: Workplace Surveillance Sees Good and Bad.” New York Times, 21 June 2014, Technology. Accessed 04/02/2016. www.nytimes.com/2014/06/22/technology/workplace-surveillance-sees-good-and-bad.html.Google Scholar
Lotan, Gilad, Graeff, Erhardt, Ananny, Mike, Gaffney, Devin, and Pearce, Ian. 2011. “The Revolutions Were Tweeted: Information Flows During the 2011 Tunisian and Egyptian Revolutions.” International Journal of Communication 5 (31):13751405.Google Scholar
Louie, Janice K., Acosta, Meileen, Winter, Kathleen, Jean, Cynthia, Gavali, Shilpa, Schechter, Robert, Vugia, Duc, Harriman, Kathleen, Matyas, Bela, Glaser, Carol A., Samuel, Michael C., Rosenberg, Jon, Talarico, John, and Hatch, Douglas. 2009. “Factors Associated with Death or Hospitalization Due to Pandemic 2009 Influenza A(H1N1) Infection in California.” JAMA: The Journal of the American Medical Association 302 (17):18961902. doi: 10.1001/jama.2009.1583.Google Scholar
Lyon, David. 1994. The Electronic Eye: The Rise of Surveillance Society. Minneapolis: University of Minnesota Press.Google Scholar
Lyon, David. 2009. “Surveillance, Power, and Everyday Life.” In The Oxford Handbook of Information and Communication Technologies, edited by Avgerou, Chrisanthi, Mansell, Robin, Quah, Danny and Silverstone, Roger. Oxford University Press.Google Scholar
Maas, Peter, and Rajagopalan, Megha. 2012. “That’s No Phone: That’s My Tracker.” The New York Times, 13 July. www.nytimes.com/2012/07/15/sunday-review/thats-not-my-phone-its-my-tracker.html?_r=0.Google Scholar
Macbeth, Steven W. Fernandez, Roland L., Meyers, Brian R., Tan, Desney S., Robertson, George G., Oliver, Nuria M., Murillo, Oscar E., and Czerwinski, Mary P.. 2006. Monitoring Group Activities, edited by USPTO. United States: Microsoft Corporation.Google Scholar
MacIntyre, Alasdair C. 2008. After Virtue: A Study in Moral Theory. 3rd edn. Notre Dame: University of Notre Dame Press.Google Scholar
Mack, Arien. 2003. “Inattentional Blindness: Looking without Seeing.” Current Directions in Psychological Science 12 (5):180184. doi: 10.1111/1467–8721.01256.Google Scholar
Mackenzie, Catriona. 2000. “Imagining Oneself Otherwise.” In Relational Autonomy: Feminist Perspectives on Autonomy, Agency, and the Social Self, edited by Mackenzie, Catriona and Stoljar, Natalie, 124150. New York: Oxford University Press.Google Scholar
Mackenzie, Catriona, and Stoljar, Natalie. 2000. “Introduction.” In Relational Autonomy: Feminist Perspectives on Autonomy, Agency, and the Social Self, edited by Mackenzie, Catriona and Stoljar, Natalie, xi, 314 p. New York: Oxford University Press.Google Scholar
Mackie, David. 1999. “Personal Identity and Dead People.” Philosophical Studies 95 (3):219242.Google Scholar
MacKinnon, Catharine A. 1987. Feminism Unmodified: Discourses on Life and Law. Cambridge: Harvard University Press.Google Scholar
Malloy, Paul, Correia, Stephen, Stebbins, Glenn, and Laidlaw, David H.. 2007. “Neuroimaging of White Matter in Aging and Dementia.” The Clinical Neuropsychologist 21 (1):73109.Google Scholar
Manson, Neil C., and O’Neill, Onora. 2007. Rethinking Informed Consent in Bioethics. Cambridge, UK; New York: Cambridge University Press.Google Scholar
Marks, Jonathan H. 2006. “9/11 + 3/11 + 7/7 = ? What Counts in Counterterrorism?Columbia Human Rights Law Review 37 (3):101161.Google Scholar
May, Larry. 1996. The Socially Responsive Self: Social Theory and Professional Ethics. Chicago: University of Chicago Press.Google Scholar
May, Larry. 2010. “Complicity and the Rwandan Genocide.” Res Publica 16:135152. doi: 10.1007/s11158-010-9112-4.Google Scholar
McDougall, Bonnie S., and Hansson, Anders. 2002. Chinese Concepts of Privacy, Sinica Leidensia. Leiden, Netherlands; Boston: Brill.Google Scholar
McNamara, Lawrence. 2009. “Counter-Terrorism Laws and the Media: National Security and the Control of Information.” Security Challenges 5 (3):95115.Google Scholar
McNeal, Gregory S. 2014a. “Facebook Manipulated User News Feeds to Create Emotional Responses.” Forbes, 28 June. Accessed 11/01/2016. www.forbes.com/sites/gregorymcneal/2014/06/28/facebook-manipulated-user-news-feeds-to-create-emotional-contagion/.Google Scholar
McNeal, Gregory S. 2014b. “Controversy Over Facebook Emotional Manipulation Study Grows as Timeline Becomes More Clear.” Forbes, June 30. Accessed 11/01/2016. www.forbes.com/sites/gregorymcneal/2014/06/30/controversy-over-facebook-emotional-manipulation-study-grows-as-timeline-becomes-more-clear/.Google Scholar
Meltzoff, A. N., and Moore, M. K.. 1997. “Explaining Facial Imitation: A Theoretical Model.” Early Development and Parenting 6 (3–4):179192. doi: 10.1002/(sici)1099-0917(199709/12)6:3/4<179::aid-edp157>3.0.co;2-r.Google Scholar
Merges, R. P., and Reynolds, G. H.. 2000. “The Proper Scope of the Copyright and Patent Power.” Harvard Journal on Legislation 37:4568.Google Scholar
Mill, John Stuart. 1971. “On Liberty.” In Utilitarianism, on Liberty, Essay on Bentham, edited by Warnock, Mary. London: The Fontana Library.Google Scholar
Mill, John Stuart. 1987. Utilitarianism.” In Moral Philosophy – Selected Readings, edited by Sher, George. Fort Worth: Harcourt Brace College Publishers.Google Scholar
Miller, Joel. 2010a. “Stop and Search in England: A Reformed Tactic or Business as Usual?British Journal of Criminology 50 (5):954974. doi: 10.1093/bjc/azq021.Google Scholar
Miller, Seumas. 2010b. The Moral Foundations of Social Institutions: A Philosophical Study. Cambridge: Cambridge University Press.Google Scholar
Miller, Seumas, and Gordon, Ian A.. 2014. Investigative Ethics: Ethics for Police Detectives and Criminal Investigators. Malden: Blackwell Publishing.Google Scholar
Miller, Seumas, and Selgelid, Michael J.. 2006. “Ethical and Philosophical Considerations of the Dual-Use Dilemma in the Biological Sciences.” Science and Engineering Ethics 13 (4):523580.Google Scholar
Mishkin, Mortimer, Ungerleider, Leslie G., and Macko, Kathleen A.. 1983. “Object Vision and Spatial Vision: Two Cortical Pathways.” Trends in Neurosciences 6:414417.Google Scholar
Mitchell, Sandra. 2004. “Why Integrative Pluralism?Emergence: Complexity & Organization 6 (1):8191.Google Scholar
Modood, T. 1998. “Anti-Essentialism, Multiculturalism and the ‘Recognition’ of Religious Groups.” Journal of Political Philosophy 6 (4):378399. doi: 10.1111/1467–9760.00060.Google Scholar
Mokrosinska, Dorota. 2014. “Privacy and the Integrity of Liberal Politics: The Case of Governmental Internet Searches.” Journal of Social Philosophy 45 (3):369389. doi: 10.1111/josp.12068.Google Scholar
Moor, James H. 2001. “The Future of Computer Ethics: You Ain’t Seen Nothin’ Yet!Ethics and Information Technology 3 (2):8991. doi: 10.1023/a:1011881522593.Google Scholar
Moor, James H. 2005. “Why We Need Better Ethics for Emerging Technologies.” Ethics and Information Technology 7 (3):111119.Google Scholar
Moore, Barrington. 1984. Privacy: Studies in Social and Cultural History. Armonk, NY: M.E. Sharpe; Distributed by Pantheon Books.Google Scholar
Moorhead, S. Anne, Hazlett, Diane E., Harrison, Laura, Carroll, Jennifer K., Irwin, Anthea, and Hoving, Ciska. 2013. “A New Dimension of Health Care: Systematic Review of the Uses, Benefits, and Limitations of Social Media for Health Communication.” Journal of Medical Internet Research 15 (4). doi: 10.2196/jmir.1933.Google Scholar
Moran, Richard. 2001. Authority and Estrangement. Princeton: Princeton University Press.Google Scholar
Moreno, Alvaro, and Etxeberria, Arantza. 2005. “Agency in Natural and Artificial Systems.” Artificial Life 11 (1–2):161175. doi: 10.1162/1064546053278919.Google Scholar
Moreno, Alvaro, Umerez, Jon, and Ibañez, Jesus. 1997. “Cognition and Life: The Autonomy of Cognition.” Brain and Cognition 34 (1):107129.Google Scholar
Morgan, Lynn M. 2013. “The Potentiality Principle from Aristotle to Abortion.” Current Anthropology 54 (S7):S15S25. doi: 10.1086/670804.Google Scholar
Morozov, Evgeny. 2013. To Save Everything Click Here: Technology, Solutionism and the Urge to Fix Problems That Don’t Exist. London: Penguin.Google Scholar
Morris, Steven. 2012. “Shopping Centre Tracking System Condemned by Civil Rights Campaigners.” The Guardian UK, 04 January 2012. www.guardian.co.uk/business/2012/jan/04/shopping-centre-tracking-system-condemned/print.Google Scholar
Mueller, John, and Stewart, Mark. 2011. Terror, Security, and Money: Balancing the Risks, Benefits and Costs of Homeland Security. Oxford: Oxford University Press.Google Scholar
Mueller, John, and Stewart, Mark. 2016. Chasing Ghosts: The Policing of Terrorism. Oxford: Oxford University Press.Google Scholar
Mulgan, Tim. 2001. The Demands of Consequentialism. Oxford: Clarendon Press.Google Scholar
Muller, Sabine. 2009. “Body Integrity Identity Disorder (BIID) – Is the Amputation of Healthy Limbs Ethically Justified?The American Journal of Bioethics 9 (1):3643.Google Scholar
Murray, Sandra L. Holmes, John G., and Griffin, Dale W.. 1996. “The Benefits of Positive Illusions: Idealization and the Construction of Satisfaction in Close Relationships.” Journal of Personality and Social Psychology 70 (1):7998.Google Scholar
Nagel, Thomas. 1975. “Review: Libertarianism without Foundations.” The Yale Law Journal 85 (1):136149.Google Scholar
National Institute of Standards and Technology. 2009. “NIST Test Proves ‘The Eyes Have It’ For ID Verification.” accessed 06/11/2009. www.nist.gov/public_affairs/techbeat/tb2009_1103.htm#id.Google Scholar
National Science Foundation, and Department Of Commerce. 2003. Converging Technologies for Improving Human Performance: Nanotechnology, Biotechnology, Information Technology, and Cognitive Sciences, edited by Mihail C. Roco and William Sims Bainbridge: National Science Foundation and Department of Commerce,.Google Scholar
Neale, Stephen. 1992. “Paul Grice and the Philosophy of Language.” Linguistics and Philosophy 15 (5):509559.Google Scholar
Neisser, Ulric. 1979. “The Control of Information Pickup in Selective Looking.” In Perception and Its Development: A Tribute to Eleanor J. Gibson, edited by Prick, A. D., 201219. Hillsdale, NJ: Lawrence Erlbaum.Google Scholar
Netzer, Christian, and Biller-Andorno, Nikola. 2004. “Pharmacogenetic Testing, Informed Consent and the Problem of Secondary Information.” Bioethics 18 (4):344360. doi:10.1111/j.1467–8519.2004.00401.x.Google Scholar
Nissenbaum, Helen. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, California: Stanford Law Books.Google Scholar
Norman, Donald A. 2002. The Design of Everyday Things. New York: Basic Books.Google Scholar
Norris, Clive, and McCahill, Michael. 2006. “CCTV: Beyond Penal Modernism?The British Journal of Criminology 46 (1):97.Google Scholar
North, Douglass Cecil, and Thomas, Robert Paul. 1973. The Rise of the Western World: A New Economic History. Cambridge: University Press.Google Scholar
Nozick, Robert. 1974. Anarchy, State, and Utopia. Oxford: Blackwell Publishing.Google Scholar
O’Connor, Timothy, and Wong, Hong Yu. 2009. “Emergent Properties.” In The Stanford Encyclopedia of Philosophy, edited by Edward N. Zalta.Google Scholar
Oakley, Justin, and Cocking, Dean. 2001a. Virtue Ethics and Professional Roles. Cambridge: Cambridge University Press.Google Scholar
Oakley, Justin, and Cocking, Dean. 2001b. “A Virtue Ethics Approach to Professional Roles.” In Virtue Ethics and Professional Roles, 7494. Cambridge: Cambridge University Press.Google Scholar
Okin, Susan Moller, Cohen, Joshua, Howard, Matthew, and Nussbaum, Martha Craven. 1999. Is Multiculturalism Bad for Women? Princeton, NJ: Princeton University Press.Google Scholar
Olson, Eric T. 2010. “Personal Identity.” In The Stanford Encyclopedia of Philosophy, edited by Edward N. Zalta.Google Scholar
Omand, David. 2010. Securing the State. Oxford: Oxford University Press.Google Scholar
Oshitani, Hitoshi, Kamigaki, Taro, and Suzuki, Akira. 2008. “Major Issues and Challenges of Influenza Pandemic Preparedness in Developing Countries.” Emerging Infectious Diseases 14 (6):875880. doi: 10.3201/eid1406.070839.Google Scholar
Ossorio, Pilar N. 2006. “About Face: Forensic Genetic Testing for Race and Visible Traits.” The Journal of Law, Medicine & Ethics 34 (2):277292. doi:10.1111/j.1748–720X.2006.00033.x.Google Scholar
Ossorio, Pilar N., and Duster, Troy. 2005. “Race and Genetics: Controversies in Biomedical, Behavioral, and Forensic Sciences.” American Psychologist 60 (1):115128. doi: 10.1037/0003–066X.60.1.115.Google Scholar
Oxford Dictionaries Online. In Oxford Dictionaries Online: Oxford.Google Scholar
Parent, W. A. 1983. “Privacy, Morality, and the Law.” Philosophy and Public Affairs 12 (4):269288.Google Scholar
Parfit, Derek. 1971a. “On ‘The Importance of Self-Identity’.” The Journal of Philosophy 68 (20):683690.Google Scholar
Parfit, Derek. 1971b. “Personal Identity.” The Philosophical Review 80 (1):327.Google Scholar
Parfit, Derek. 1987. Reasons and Persons. Reprinted with corrections, 1987. edn. Oxford: Clarendon Press.Google Scholar
Parliamentary Joint Committee on Intelligence and Surveillance. 2015. Advisory Report on the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014. Canberra: The Parliament of the Commonwealth of Australia.Google Scholar
Parrish, Julia K., Viscido, Steven V., and Grunbaum, Daniel. 2002. “Self-Organized Fish Schools: An Examination of Emergent Properties.” The Biological Bulletin 202 (3):296305.Google Scholar
Partridge, Emma. 2016. “$150,000 Facebook Post That Destroyed a Former Deputy Principal’s Life.” The Age, 8th August.Google Scholar
Patten, Alan. 1999. Hegel’s Idea of Freedom, Oxford Philosophical Monographs. Oxford; New York: Oxford University Press.Google Scholar
Payne, B. Keith. 2001. “Prejudice and Perception: The Role of Automatic and Controlled Processes in Misperceiving a Weapon.” Journal of Personality and Social Psychology 81 (2):181192. doi: 10.1037/0022–3514.81.2.181.Google Scholar
Payne, B. Keith. 2005. “Conceptualizing Control in Social Cognition: How Executive Functioning Modulates the Expression of Automatic Stereotyping.” Journal of Personality and Social Psychology 89 (4):488503. doi: 10.1037/0022–3514.89.4.488.Google Scholar
Payne, B. Keith, Cheng, Clara Michelle, Govorun, Olesya, and Stewart, Brandon D.. 2005. “An Inkblot for Attitudes: Affect Misattribution as Implicit Measurement.” Journal of Personality and Social Psychology 89 (3):277293. doi: 10.1037/0022–3514.89.3.277.Google Scholar
Peacock, A., Xian, Ke, and Wilkerson, M.. 2004. “Typing Patterns: A Key to User Identification.” Security & Privacy, IEEE 2 (5):4047.Google Scholar
Pearl, Mike. 2015. “Activists Say the LAPD’s New Body Camera Program Is Full of Problems.” Vice, 30 April.Google Scholar
Pelczar, Michael. 2000. “Wittgensteinian Semantics.” Nous 34 (4):483516.Google Scholar
Perrett, Roy W. 2000. “Taking Life and the Argument from Potentiality.” Midwest Studies in Philosophy 24 (1):186197. doi: 10.1111/1475–4975.00029.Google Scholar
Perry, John. 1978. A Dialogue on Personal Identity and Immortality. Indianapolis: Hackett Publishing Company.Google Scholar
Perry, John, ed. 2008a. Personal Identity. 2 edn. Berkeley: University of California Press.Google Scholar
Perry, John. 2008b. “The Problem of Personal Identity.” In Personal Identity, edited by Perry, John, 330. Berkeley: University of California Press.Google Scholar
Pettit, Philip. 1988. “The Consequentialist Can Recognise Rights.” The Philosophical Quarterly 38 (150):4255.Google Scholar
Pinkard, Terry P. 1988. Hegel’s Dialectic: The Explanation of Possibility. Philadelphia: Temple University Press.Google Scholar
Pitcher, George, ed. 1968. Wittgenstein: The Philosophical Investigations: Macmillan.Google Scholar
Plassmann, Hilke, O’Doherty, John, Shiv, Baba, and Rangel, Antonio. 2008. “Marketing Actions Can Modulate Neural Representations of Experienced Pleasantness.” Proceedings of the National Academy of Sciences 105 (3):10501054. doi: 10.1073/pnas.0706929105.Google Scholar
Pogge, Thomas. 2005a. “Human Rights and Global Health: A Research Program.” Metaphilosophy 36 (1/2):182209.Google Scholar
Pogge, Thomas. 2005b. “World Poverty and Human Rights.” Ethics and International Affairs 19 (1):17.Google Scholar
Pogge, Thomas. 2008. World Poverty and Human Rights. 2nd edn. Cambridge: Polity Press.Google Scholar
Pollard, Ruth. 2009. “Elite College Students Proud of ‘Pro-Rape’ Facebook Page.” Sydney Morning Herald, November 9. www.smh.com.au/technology/elite-college-students-proud-of-prorape-facebook-page-20091108-i3js.html#moreRelatedCoverage.Google Scholar
Poon, Kai-Tak, and Chen, Zhansheng. 2014. “When Justice Surrenders: The Effect of Just-World Beliefs on Aggression Following Ostracism.” Journal of Experimental Social Psychology 52:101112. doi: http://dx.doi.org/10.1016/j.jesp.2014.01.006.Google Scholar
Posner, Richard A. 2005. “Intellectual Property: The Law and Economics Approach.” The Journal of Economic Perspectives 19 (2):5773.Google Scholar
Pritchard, Duncan. 2004. “Epistemic Luck.” Journal of Philosophical Research 29:193222.Google Scholar
Putnam, Hilary. 1973. “Meaning and Reference.” The Journal of Philosophy 70 (19):699711.Google Scholar
Putnam, Hillary. 1975. “The Meaning of ‘Meaning’.” In Minnesota Studies in the Philosophy of Science: Volume VII Language, Mind, and Knowledge, edited by Gunderson, Keith. Minneapolis: University of Minnesota.Google Scholar
Rachels, James. 1975. “Why Privacy Is Important.” Philosophy and Public Affairs 4 (4):323333.Google Scholar
Radin, Margaret Jane. 1981. “Property and Personhood.” Stanford Law Review 34 (5):9571016.Google Scholar
Ramli, David. 2011. “Peeping TomTom Sells Your Every Move.” The Australian Financial Review, May 6. www.afr.com/p/business/technology/peeping_tomtom_sells_your_every_JdzlTffqhtoLHSPRGIvq0J.Google Scholar
Rauschecker, Josef P., and Scott, Sophie K.. 2009. “Maps and Streams in the Auditory Cortex: Nonhuman Primates Illuminate Human Speech Processing.” Nature Neuroscience 12 (6):718724.Google Scholar
Rawls, John. 1951. “Outline of a Decision Procedure for Ethics.” The Philosophical Review 60 (2):177197.Google Scholar
Rawls, John. 1971. A Theory of Justice. Original edn. Cambridge: Harvard University Press.Google Scholar
Rawls, John. 1985. “Justice as Fairness: Political Not Metaphysical.” Philosophy and Public Affairs 14 (3):223251.Google Scholar
Rawls, John. 1999a. “The Idea of an Overlapping Consensus.” In Collected Papers/John Rawls, edited by Freeman, Samuel, 421448. Cambridge: Harvard University Press.Google Scholar
Rawls, John. 1999b. The Law of Peoples: With, the Idea of Public Reason Revisited. Cambridge, MA: Harvard University Press.Google Scholar
Rawls, John. 2001. Justice as Fairness: A Restatement, edited by Kelly, Erin. Cambridge: The Belknap Press of Harvard University Press.Google Scholar
Rees, Christopher, and Heywood, Debbie. 2014. “The ‘Right to Be forgotten’ or the ‘Principle That Has Been Remembered’.” Computer Law & Security Review 30 (5):574578. doi: http://dx.doi.org/10.1016/j.clsr.2014.07.002.Google Scholar
Regan, T. 2004. The Case for Animal Rights. 3rd edn: Berkeley: University of California Press.Google Scholar
Reichlin, Massimo. 1997. “The Argument from Potential: A Reappraisal.” Bioethics 11 (1):123. doi: 10.1111/1467–8519.00041.Google Scholar
Reiman, Jeffrey H. 1976. “Privacy, Intimacy, and Personhood.” Philosophy and Public Affairs 6 (1):2644.Google Scholar
Review Group on Intelligence and Communications Technologies. 2013. Liberty and Security in a Changing World. White House.Google Scholar
Reyburn, Hugh Adam. 1921. The Ethical Theory of Hegel: A Study of the Philosophy of Right. Oxford: Clarendon.Google Scholar
Ricketson, Sam, and Richardson, Megan. 1998. Intellectual Property: Cases Materials and Commentary. 2nd edn. Sydney: Butterworths.Google Scholar
Rix, Mark. 2011. “Counter-Terrorism and Information: The NSI Act, Fair Trials, and Open, Accountable Government.” Continuum 25 (2):285297. doi: http://dx.doi.org/10.1080/10304312.2011.554059.Google Scholar
Robb, David, and Heil, John. 2009. “Mental Causation.” In The Stanford Encyclopedia of Philosophy, edited by Edward N. Zalta.Google Scholar
Roff, Heather M. 2013. “Killing in War: Responsibility, Liability, and Lethal Autonomous Robots.” In Routledge Handbook of Ethics and War: Just War in the 21st Century, edited by Allhoff, Fritz, Evans, Nicholas G. and Henschke, Adam. London: Routledge.Google Scholar
Rorty, Amélie, and Wong, David. 1990. “Aspects of Identity and Agency.” In Identity, Character, and Morality: Essays in Moral Psychology, edited by Flanagan, Owen J. and Rorty, Amélie, vii, 487 p. Cambridge, MA: MIT Press.Google Scholar
Rosen, Michael. 1982. Hegel’s Dialectic and Its Criticism. Cambridge [Cambridgeshire]; New York: Cambridge University Press.Google Scholar
Ross, W. D. 1930. The Right and the Good. Oxford: The Clarendon Press.Google Scholar
Roxon, Nicola. 2010. Healthcare Identifiers: Passed by Parliament edited by Health and Aging. Canberra.Google Scholar
Royal United Services Institute. 2016. “Lone-Actor Terrorism.” In Countering Lone-Actor Terrorism Series. London: Royal United Services Institute.Google Scholar
Russell, Bertrand. 1912. The Problems of Philosophy. London: Oxford University Press.Google Scholar
Safi, Michael. 2016. “The Takeover: How Police Ended Up Running a Paedophile Site.” The Guardian, 13th July. Accessed 13 July. www.theguardian.com/society/2016/jul/13/shining-a-light-on-the-dark-web-how-the-police-ended-up-running-a-paedophile-site.Google Scholar
Salter, Michael, and Crofts, Thomas. 2015. “Responding to Revenge Porn: Challenges to Online Legal Impunity.” In New Views on Pornography: Sexuality, Politics, and the Law, edited by Comella Lynn and Shira Tarrant Praeger.Google Scholar
Scanlon, Thomas. 1975. “Thomson on Privacy.” Philosophy and Public Affairs 4 (4):315322.Google Scholar
Scanlon, Thomas. 1976. “Nozick on Rights, Liberty, and Property.” Philosophy and Public Affairs 6 (1):325.Google Scholar
Scanlon, Thomas Michael. 2000. What We Owe Each Other. Cambridge: Harvard University Press.Google Scholar
Scheffler, Samuel. 1993. The Rejection of Consequentialism: Revised Edition. 3rd edn. Oxford: Oxford University Press.Google Scholar
Scherer, Michael. 2012. “Inside the Secret World of the Data Crunchers Who Helped Obama Win.” Time, 7 November. http://swampland.time.com/2012/11/07/inside-the-secret-world-of-quants-and-data-crunchers-who-helped-obama-win/.Google Scholar
Scott, Charity. 2008. “Belief in a Just World: A Case Study in Public Health Ethics.” Hastings Center Report 38 (1):16.Google Scholar
Searle, John R. 1997. The Mystery of Consciousness. 1st edn. New York: New York Review of Books.Google Scholar
Searle, John R. 2008. “The Self as a Problem in Philosophy and Neurobiology.” In Philosophy in a New Century: Selected Essays, viii, 201 p. Cambridge; New York: Cambridge University Press.Google Scholar
Selgelid, Michael J. 2005. “Module Four: Standards of Care and Clinical Trials.” Developing World Bioethics 5 (1):5572.Google Scholar
Selgelid, Michael J. and Enemark, Christian. 2008. “Infectious Diseases, Secuirty and Ethics: The Case of HIV/AIDS.” Bioethics 22 (9):457465.Google Scholar
Selgelid, Michael J. and Sepers, Eline M.. 2006. “Patents, Profits, and the Price of Pills: Implications for Access and Availability.” In The Power of Pills, edited by Cohen, Jillian C., Illingworth, Patricia and Schuklenk, Udo. London: Pluto Press.Google Scholar
Selgelid, Michael J. 2009. “A Moderate Pluralist Approach to Public Health Policy and Ethics.” Public Health Ethics 2 (2):195205. doi: 10.1093/phe/php018.Google Scholar
Shamma, Shihab. 2008. “On the Emergence and Awareness of Auditory Objects.” PLoS Biol 6 (6):e155.Google Scholar
Shannon, Claude Elwood, and Weaver, Warren. 1949. The Mathematical Theory of Communication. Urbana: University of Illinois Press.Google Scholar
Sharpley, Christopher Francis, and Bitsika, Vicki. 2010. “The Diverse Neurogeography of Emotional Experience: Form Follows Function.” Behavioural Brain Research 215 (1):16.Google Scholar
Shoemaker, Sydney Sharpless. 1963. Self-Knowledge and Self-Identity, Contemporary Philosophy. Ithaca, New York: Cornell University Press.Google Scholar
Sieber, Joan E. 1998. “The Psychology of Whistleblowing.” Science and Engineering Ethics 4 (1):723. doi: 10.1007/s11948-998-0002-5.Google Scholar
Siegler, Mark. 1994. “Confidentiality in Medicine – A Decrepit Concept.” In Contemporary Issues in Bioethics, edited by Beauchamp, Tom L. and Walters, LeRoy, 179131. Belmont: Wadsworth Publishing Company.Google Scholar
Simeone, Nick. 2014. Clapper: Snowden Caused ‘Massive, Historic’ Security Damage. U.S. Department of Defense.Google Scholar
Simons, Daniel. J., and Chabris, Christopher. F.. 1999. “Gorillas in Our Midst: Sustained Inattentional Blindness for Dynamic Events.” Perception 28 (9):10591074.Google Scholar
Singer, Peter W., and Friedman, Allan. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford: Oxford University Press.Google Scholar
Skene, Loane, and Milkwood, Scott. 1997. ““Informed Consent” to Medical Procedures: The Current Law in Australia, Doctor’s Knowledge of the Law, and Their Practices in Informing Patients.” In Health Care Law and Ethics, edited by Shotton, Leila, 6992. Katoomba: Social Science Press.Google Scholar
Skuse, David. 2006. “Genetic Influences on the Neural Basis of Social Cognition.” Philosophical Transactions of the Royal Society B: Biological Sciences 361 (1476):21292141. doi: 10.1098/rstb.2006.1935.Google Scholar
Smedley, Audrey, and Smedley, Brian. 2005. “Race as Biology Is Fiction, Racism as a Social Problem Is Real: Anthropological and Historical Perspectives on the Social Construction of Race.” American Psychologist 60 (1):1626.Google Scholar
Smith, Gavin. 2015. Opening the Black Box: The Work of Watching: London: Routledge.Google Scholar
Smith, Michael. 1987. “The Humean Theory of Motivation.” Mind 96 (381):3661.Google Scholar
Smith, Michael. 1994. The Moral Problem. Malden: Blackwell Publishing.Google Scholar
Solove, Daniel. 2004. The Digital Person: Technology and Privacy in the Information Age. New York: New York University Press.Google Scholar
Solove, Daniel. 2008. Understanding Privacy. Harvard: Harvard University Press.Google Scholar
Sorensen, Roy 2009. “Vagueness.” In The Stanford Encyclopedia of Philosophy, edited by Edward N. Zalta.Google Scholar
Sosa, Ernest, Kim, Jaegwon, and McGrath, Matthew. 2000. Epistemology: An Anthology, Blackwell Philosophy Anthologies. Malden, MA: Blackwell Publishers.Google Scholar
Spacks, Patricia Ann Meyer. 2003. Privacy: Concealing the Eighteenth-Century Self. Chicago: University of Chicago Press.Google Scholar
Sparrow, Robert. 2007. “Revolutionary and Familiar, Inevitable and Precarious: Rhetorical Contradictions in Enthusiasm for Nanotechnology.” NanoEthics 1 (1):5768. doi: 10.1007/s11569-007-0008-5.Google Scholar
Sporns, Olaf, Honey, Christopher J., and Kotter, Rolf. 2007. “Identification and Classification of Hubs in Brain Networks.” PloS One 2 (10):e1049.Google Scholar
Stempel, Jonathan. 2015. “NSA’s Phone Spying Program Ruled Illegal by Appeals Court.” Reuters, 7th May 2016. Accessed 20th September 2016. www.reuters.com/article/us-usa-security-nsa-idUSKBN0NS1IN20150507.Google Scholar
Sterba, James. 2005. The Triumph of Practice over Theory in Ethics. Oxford: Oxford University Press.Google Scholar
Sterelny, Kim. 1990. The Representational Theory of Mind: An Introduction. Oxford: Blackwell.Google Scholar
Sterelny, Kim. 2003. Thought in a Hostile World: The Evolution of Human Cognition, Hoboken: Blackwell Publishing.Google Scholar
Steup, Matthias. 2009. “The Analysis of Knowledge.” In Stanford Encyclopedia of Philosophy, edited by Edward N. Zalta.Google Scholar
Stevens, Jacqueline. 2003. “Racial Meanings and Scientific Methods: Changing Policies for NIH-Sponsored Publications Reporting Human Variation.” Journal of Health Politics Policy and Law 28 (6):10331088. doi: 10.1215/03616878-28-6-1033.Google Scholar
Straub, Jurgen. 2002. “Personal and Collective Identity: A Conceptual Analysis.” In Identities: Time, Difference, and Boundaries, edited by Friese, Heidrun and Assmann, Aleida, 5676. New York: Berghahn Books.Google Scholar
Strawser, Bradley Jay. 2010. “Moral Predators: The Duty to Employ Uninhabited Aerial Vehicles.” Journal of Military Ethics 9 (4):342368. doi: 10.1080/15027570.2010.536403.Google Scholar
Stroebe, Katherine, Postmes, Tom, Tauber, Susanne, and Melissa, John. 2015. “Belief in a Just What? Demystifying Just World Beliefs by Distinguishing Sources of Justice.” PloS One (March 2015). doi: 10.1371/journal.pone.0120145.Google Scholar
Stross, Randall. 2010. “When History Is Compiled 140 Characters at a Time.” New York Times, May 1.Google Scholar
Surendran, Sankar, Matalon, Kimberlee M., Tyring, Stephen K., and Matalon, Reuben. 2003. “Molecular Basis of Canavan’s Disease: From Human to Mouse.” Journal of Child Neurology 18 (9):604610. doi: 10.1177/08830738030180090601.Google Scholar
Surendran, Sankar, Michals-Matalon, Kimberlee, Quast, Michael J., Tyring, Stephen K., Wei, Jingna, Ezell, Ed L., and Matalon, Reuben. 2003. “Canavan Disease: A Monogenic Trait with Complex Genomic Interaction.” Molecular Genetics and Metabolism 80 (1–2):7480.Google Scholar
Sutton, Robbie M., and Winnard, Elizabeth J.. 2007. “Looking Ahead through Lenses of Justice: The Relevance of Just-World Beliefs to Intentions and Confidence in the Future.” British Journal of Social Psychology 46 (3):649666. doi: 10.1348/014466606X166220.Google Scholar
Swami, Viren, and Furnham, Adrian. 2008. “Is Love Really So Blind?The Psychologist 21 (2):108111.Google Scholar
Syal, Rajeev. 2013. “Abandoned NHS IT System Has Cost £10bn So Far.” The Guardian, 18 September.Google Scholar
Tang, Paul C., and Lee, Thomas H.. 2009. “Your Doctor’s Office or the Internet? Two Paths to Personal Health Records.” New England Journal of Medicine 360 (13):12761278. doi: 10.1056/NEJMp0810264.Google Scholar
Taylor, Charles. 1975. Hegel. Cambridge: Cambridge University Press.Google Scholar
Taylor, Charles. 1978. Hegel and Modern Society. Cambridge: Cambridge University Press.Google Scholar
Taylor, Charles. 1989. The Sources of the Self: The Making of Modern Identity. New York: Cambridge University Press.Google Scholar
Taylor, Charles. 1994a. “Multiculturalism and ‘The Politics of Recognition’: An Essay.” In Examining Multiculturalism and the Politics of Recognition, edited by Gutman, Amy, xi, 112 p. Princeton, NJ: Princeton University Press.Google Scholar
Taylor, Charles. 1994b. “The Politics of Recognition.” In Multiculturalism, edited by Gutman, Amy, xi, 112 p. Princeton, NJ: Princeton University Press.Google Scholar
Tegart, Greg W. J. 2010. Smart Technology for Healthy Longevity. Melbourne: Australian Academy of Technological Sciences and Engingeering.Google Scholar
The Human Rights Council. 2011. Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression. Geneva: The Human Rights Council.Google Scholar
The World Bank. 2015. Internet Users (Per 100 People). The World Bank.Google Scholar
Theodoridou, Angeliki, Rowe, Angela C., Penton-Voak, Ian S., and Rogers, Peter J.. 2009. “Oxytocin and Social Perception: Oxytocin Increases Perceived Facial Trustworthiness and Attractiveness.” Hormones and Behavior 56 (1):128132.Google Scholar
Thielman, Sam. 2016. “Facebook Fires Trending Team, and Algorithm without Humans Goes Crazy.” The Guardian, 29th August.Google Scholar
Thomson, Judith Jarvis. 1975. “The Right to Privacy.” Philosophy and Public Affairs 4 (4):295314.Google Scholar
Traynor, Ian, and Lewis, Paul. 2013. “Merkel Compared NSA to Stasi in Heated Encounter with Obama.” The Guardian, December 17. www.theguardian.com/world/2013/dec/17/merkel-compares-nsa-stasi-obama.Google Scholar
U.K. Government. 2006. The National DNA Database, edited by Parliamentary Office of Science and Technology. London: U.K. Parliament.Google Scholar
U.K. Government. 2012. Open Data White Paper: Unleashing the Potential, edited by Minister of State for Cabinet Office and Paymaster General. Whitehall: Controller of Her Majesty’s Stationary Office.Google Scholar
Uniacke, Suzanne. 1996. Permissible Killing: The Self-Defense Justification of Homicide. Cambridge: Cambridge University Press.Google Scholar
United States District Court. 2003. Greenberg v. Miami Children’s Hospital Research Insititute, Inc.: United States District Court, S.D. Florida, Miami Division.Google Scholar
United States District Court. 2006. Washington University v William J. Catalona et al., edited by Eastern District of Missouri.Google Scholar
US Government. 1792. Fourth Amendment to the US Constitution.Google Scholar
van den Hoven, Jeroen. 1999. “Privacy and the Varieties of Informational Wrongdoing.” Australian Journal of Professional and Applied Ethics 1:3043.Google Scholar
van den Hoven, Jeroen. 2007a. “ICT and Value Sensitive Design.” In The Information Society: Innovation, Legitimacy, Ethics and Democracy in Honor of Professor Jacques Berleur s.j., edited by Goujon, Philippe, Lavelle, Sylvian, Duquenoy, Penny, Kimppa, Kai and Laurent, Veronique, 6772. Boston: Springer.Google Scholar
van den Hoven, Jeroen. 2007b. “Privacy and the Varieties of Informational Wrongdoing.” In Computer Ethics, edited by Weckert, John, 317330. Aldershot: Ashgate Publishing.Google Scholar
van den Hoven, Jeroen. 2008. “Information Technology, Privacy and the Protection of Personal Data.” In Information Technology and Moral Philosophy, edited by van den Hoven, Jeroen and Weckert, John, 301321. Cambridge: Cambridge University Press.Google Scholar
van den Hoven, Jeroen, and Manders-Huits, Noemi. 2006. “Identity Management and Moral Identification.” Algemeen Nederlands Tijdschrift Voor Wijsbegeerte 98 (2):111127.Google Scholar
van den Hoven, Jeroen, and Rooksby, Emma. 2008. “Distributive Justice and the Value of Information: A (Broadly) Rawlsian Approach.” In Information Technology and Moral Philosophy, edited by van den Hoven, Jeroen and Weckert, John, 376396. Cambridge: Cambridge University Press.Google Scholar
van den Hoven, Jeroen, and Weckert, John, eds. 2008. Information Technology and Moral Philosophy. Cambridge: Cambridge University Press.Google Scholar
van der Ploeg, Irma 1999. “The Illegal Body: ‘Eurodac’ and the Politics of Biometric Identification.” Ethics and Information Technology 1 (4):295.Google Scholar
van Duijn, Marc, Keijzer, Fred, and Franken, Daan. 2006. “Principles of Minimal Cognition: Casting Cognition as Sensorimotor Coordination.” Adaptive Behavior 14 (2):157170. doi: 10.1177/105971230601400207.Google Scholar
Vandekerckhove, Wim. 2006. Whistleblowing and Organizational Social Responsibility: A Global Assessment: Ashgate.Google Scholar
Vandekerckhove, Wim, and Lewis, David. 2012. “The Content of Whistleblowing Procedures: A Critical Review of Recent Official Guidelines.” Journal of Business Ethics 108 (2):253264. doi: 10.1007/s10551-011-1089-1.Google Scholar
Veltkamp, Martijn, Aarts, Henk, and Custers, Ruud. 2008. “Perception in the Service of Goal Pursuit: Motivation to Attain Goals Enhances the Perceived Size of Goal-Instrumental Objects.” Social Cognition 26 (6):720736.Google Scholar
Vizer, Lisa M., Zhou, Lina, and Sears, Andrew. 2009. “Automated Stress Detection Using Keystroke and Linguistic Features: An Exploratory Study.” International Journal of Human-Computer Studies 67 (10):870886.Google Scholar
Waddington, P. A. J., Stenson, Kevin, and Don, David. 2004. “In Proportion: Race, and Police Stop and Search.” British Journal of Criminology 44 (6):889914. doi: 10.1093/bjc/azh042.Google Scholar
Waldron, Jeremy. 1988. The Right to Private Property. Oxford: Clarendon Paperbacks.Google Scholar
Waldron, Jeremy. 2006. “Safety and Security.” Nebraska Law Review 85 (3):454507.Google Scholar
Waldron, Jeremy. 2009. “2009 Oliver Wendel Holmes Lectures: Dignity and Defamation the Visibility of Hate.” Harvard Law Review 123:15962096.Google Scholar
Walsh, Patrick F., and Miller, Seumas. 2015. “Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden.” Intelligence and National Security. 1–24. doi: 10.1080/02684527.2014.998436.Google Scholar
Walzer, Michael. 1983. Spheres of Justice: A Defense of Pluralism and Equality. New York: Basic Books.Google Scholar
Wang, Y, Ho, OKW, Huang, GQ, and Li, D. 2008. “Study on Vehicle Management in Logistics Based on RFID, GPS and GIS.” International Journal of Internet Manufacturing and Services 1 (3):294304.Google Scholar
Wansink, Brian. 2006. Mindless Eating: Why Eat More Than We Think. New York: Bantam Books.Google Scholar
Want, R. 2006. “An Introduction to RFID Technology.” IEEE Pervasive Computing 5 (1):2533.Google Scholar
Warren, Samuel D., and Brandeis, Louis D.. 1890. “The Right to Privacy.” Harvard Law Review 4 (5):193220.Google Scholar
Weckert, John. 1986. “Putnam, Reference and Essentialism.” Dialogue: Canadian Philosophical Review/Revue Canadienne De Philosophie 25 (03):509521. doi: 10.1017/S0012217300020916.Google Scholar
Weckert, John, and Henschke, Adam. 2009. “Computer Ethics and Applied Contexts.” In The Cambridge Handbook of Information and Computer Ethics, edited by Luciano, Floridi. Cambridge: Cambridge University Press.Google Scholar
Wensley, D. and King, M.. 2008. “Scientific Responsibility for the Dissemination and Interpretation of Genetic Research: Lessons from the “Warrior Gene” Controversy.” Journal of Medical Ethics 34 (6):507509. doi: 10.1136/jme.2006.019596.Google Scholar
West, Caroline. 2012. “Words That Silence? Freedom of Expression and Racist Hate Speech.” In Speech and Harm: Controversies over Free Speech, edited by Maitra, Ishani and McGowan, Mary Kate. Oxford: Oxford University Press.Google Scholar
Westin, Alan F. 1967. Privacy and Freedom. London: Bodley Head.Google Scholar
Wheeland, Matthew. 2016. “Four Ways Technology Will Change How We Commute in the Future.” The Guardian, 17th August.Google Scholar
Whitmore, Andrew, Agarwal, Anurag, and Da Xu, Li. 2015. “The Internet of Things – A Survey of Topics and Trends.” Information Systems Frontiers 17 (2):261274.Google Scholar
Williams, Bernard. 1970. “The Self and the Future.” The Philosophical Review 79 (2):161180.Google Scholar
Williams, Bernard. 1981a. Moral Luck. Cambridge: Cambridge University Press.Google Scholar
Williams, Bernard. 1981b. “Persons, Character and Morality.” In Moral Luck: Philosophical Papers 1973–1980. Cambridge: Cambridge University Press.Google Scholar
Williams, Bernard Arthur Owen. 1973. “A Critique of Utilitarianism.” In Utilitarianism: For and Against. Cambridge: Cambridge University Press.Google Scholar
Williams, Michael. 1991. Unnatural Doubts: Epistemological Realism and the Basis of Scepticism. Oxford: Blackwell.Google Scholar
Wittenbrink, Bernd, Judd, Charles M., and Park, Bernadette. 1997. “Evidence for Racial Prejudice at the Implicit Level and Its Relationship with Questionnaire Measures.” Journal of Personality & Social Psychology 72 (2):262274.Google Scholar
Wittgenstein, Ludwig. 1958. Philosophical Investigations. Translated by Anscombe, G. E. M.. 2nd edn. Oxford: Blackwell.Google Scholar
Wittgenstein, Ludwig, Hacker, Peter M. S., and Schulte, Joachim. 2009. Philosophical Investigations. Translated by Anscombe, G. E. M., Hacker, P. M. S. and Schulte, Joachim. Rev. 4th edn. Malden, MA: Wiley-Blackwell.Google Scholar
Wolf, Susan. 1994. “Comment on Multiculturalism and the Politics of Recognition.” In Examining Multiculturalism and the Politics of Recognition, edited by Gutman, Amy, 7585. Princeton, NJ: Princeton University Press.Google Scholar
World Medical Association. 1964. Ethical Principles for Medical Research Involving Human Subjects, edited by World Medical Association. Helsinki: World Medical Association.Google Scholar
Wortley, Scot, and Owusu-Bempah, Akwasi. 2011. “The Usual Suspects: Police Stop and Search Practices in Canada.” Policing and Society 21 (4):395407. doi: 10.1080/10439463.2011.610198.Google Scholar
Young, Garry. 2008. “Capgras Delusion: An Interactionist Model.” Consciousness and Cognition 17 (3):863876.Google Scholar
Zins, Chaim. 2007. “Conceptual Approaches for Defining Data, Information, and Knowledge.” Journal of the American Society for Information Science and Technology 58 (4):479493.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Adam Henschke, Australian National University, Canberra
  • Book: Ethics in an Age of Surveillance
  • Online publication: 19 July 2017
  • Chapter DOI: https://doi.org/10.1017/9781316417249.012
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Adam Henschke, Australian National University, Canberra
  • Book: Ethics in an Age of Surveillance
  • Online publication: 19 July 2017
  • Chapter DOI: https://doi.org/10.1017/9781316417249.012
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Adam Henschke, Australian National University, Canberra
  • Book: Ethics in an Age of Surveillance
  • Online publication: 19 July 2017
  • Chapter DOI: https://doi.org/10.1017/9781316417249.012
Available formats
×