dc.creator | Bennett, Colin J. | en |
dc.date.accessioned | 2016-01-08T19:38:10Z | en |
dc.date.available | 2016-01-08T19:38:10Z | en |
dc.date.created | 1991-12 | en |
dc.date.issued | 1991-12 | en |
dc.identifier | doi:10.1177/016224399101600103 | en |
dc.identifier.bibliographicCitation | SCIENCE, TECHNOLOGY, & HUMAN VALUES 16(1): 51-69, Winter 1991 | en |
dc.identifier.uri | http://worldcatlibraries.org/registry/gateway?version=1.0&url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&atitle=Computers,+Personal+Data,+and+Theories+of+Technology:+Comparative+Approaches+to+Privacy+Protection+in+the+1990's&title=SCIENCE,+TECHNOLOGY,+&+HUMAN+VALUES+&volume=16&issue=1&spage=1991&date=1991-12&au=Bennett,+Colin+J. | en |
dc.identifier.uri | http://dx.doi.org/10.1177/016224399101600103 | en |
dc.identifier.uri | http://hdl.handle.net/10822/851094 | en |
dc.format | Article | en |
dc.language | en | en |
dc.source | eweb:111793 | en |
dc.subject | Computers | en |
dc.subject | Privacy | en |
dc.subject | Technology | en |
dc.subject.classification | Confidentiality | en |
dc.subject.classification | Business Ethics | en |
dc.subject.classification | Government Ethics | en |
dc.title | Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990's | en |
dc.provenance | Citation prepared by the Library and Information Services group of the Kennedy Institute of Ethics, Georgetown University for the ETHXWeb database. | en |
dc.provenance | Citation migrated from OpenText LiveLink Discovery Server database named EWEB hosted by the Bioethics Research Library to the DSpace collection EthxWeb hosted by DigitalGeorgetown. | en |