2012
DOI: 10.29173/irie217
|View full text |Cite
|
Sign up to set email alerts
|

Secrets About Secrecy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…In addition, when data are not subpoenaed or stolen by cyber-criminals outside of the company, they can be leaked in the most fanciful ways, which go from mislaying a physical device containing sensitive information, to the dishonest action of a single employee from inside the company. Finally, the example of WikiLeaks, a Web site that publishes secret information, news leaks, and classified media from anonymous news sources and whistleblowers, shows that privacy violations may even be justified by referring to values like transparency, although the ethical evaluation of WikiLeaks is ambivalent [32].…”
Section: The Ever New Faces Of Privacy Vulnerabilitymentioning
confidence: 99%
“…In addition, when data are not subpoenaed or stolen by cyber-criminals outside of the company, they can be leaked in the most fanciful ways, which go from mislaying a physical device containing sensitive information, to the dishonest action of a single employee from inside the company. Finally, the example of WikiLeaks, a Web site that publishes secret information, news leaks, and classified media from anonymous news sources and whistleblowers, shows that privacy violations may even be justified by referring to values like transparency, although the ethical evaluation of WikiLeaks is ambivalent [32].…”
Section: The Ever New Faces Of Privacy Vulnerabilitymentioning
confidence: 99%