참고문헌
- Adar, Eytan, Lukose, Rajan, Sengupta, Caesar, Tyler, Josh, and Good, Nathaniel. 2003. "Shock: aggregating information while preserving privacy." lnformation Systems Frontiers, 5: 15-28 https://doi.org/10.1023/A:1022033619551
- Albert, Judith. 1999. "Is knowledge management really the future for information professionals." In Knowledge Management for the Infonnation Professional, edited by T. Kanti Srikantaiah and Michael E.D.Koenig, 63-76. Medford, New Jersey: Information Today, Inc
- Ariss, S. S. 2001. "Computer monitoring: benefits and pitfalls facing management." Information & Management, 39: 553-558 https://doi.org/10.1016/S0378-7206(01)00121-5
- Cohen, Alan. 2001. "Worker watcher." Fortune, 143(13): 70-78
- Fried, C. 1970. An anatomy of values. Cambridge: Harvard University Press
- Gavison, R 1980. "Privacy and the limits of law." Yale Law Journal, 89: 421-471 https://doi.org/10.2307/795891
- Gupta, Babita, Iyer, Lakshmi S. and Aronson, Jay E. 2000. "Knowledge management: practices and challenges." Industrial Management & Data Systems, 100(1): 17-21 https://doi.org/10.1108/02635570010273018
- Hartman, Laura P. 2001. "Technology and ethics: Privacy in the workplace." Business and Society Review, 106: 1-27 https://doi.org/10.1111/0045-3609.00099
- Karasik, Eve H. 1990. "A normative analysis of disclosure, privacy, ad computers: The state cases." Computer/Law Journal, 10: 603-634
- Linowes, David F. and Spencer, Ray C. 1996. "Privacy in workplace in perspective." Human Resource Management Review, 6(3): 165-181 https://doi.org/10.1016/S1053-4822(96)90011-X
- McAdam, Rodney and McCreedy, Sandra. 1999. "A critical review of knowledge management models." The Learning Organization, 6(3): 91-100 https://doi.org/10.1108/09696479910270416
- Organization for Economic Cooperation and Development. 2002. GECD guidelines on the protection of privacy and trans border flows of personal data. Paris: DECD
-
Prosser, W. 1955. Handbook of the law of torts.
$2^{nd}$ ed. St. Paul: West Pub. Co - Prusak, L. 2001. "Where did knowledge management come from?" IBM System Journal, 40(4): 1002-1007 https://doi.org/10.1147/sj.404.01002
- Rachels, J. 1975. "Why privacy is important." Philosophy and Public Affairs, 4: 323-33
- Schirmer, A L. 2003. "Privacy and knowledge management: challenges in the design of the Lotus Discovery Server." IBM Systems Journal, 42(3): 519-531 https://doi.org/10.1147/sj.423.0519
-
Scott, W. Richard 2001. Institutions and organizations.
$2^{nd}$ ed. Thousand Oaks, Calif.: Sage Publication - Sipior, Janice and Ward, Burke T. 1999. "Recommendations for managing employee e-mail." Journal of Computer Information Systems, Winter 1998-1999: 34-39
-
Stanford Encyclopedia of Philosophy. 2002. Privacy. [Online]. [cited 23 November 2004]; available from
- Stanton, Jeffrey M. and Lin, Lilly F. 2003. "Effects on workplace monitoring policies on potential employment discrimination and organizational attractiveness for African Americans in the technical professions." Journal of Black Psychology, 29(3): 257-274 https://doi.org/10.1177/0095798403254210
- Warren, S. and Brandeis, L. 1890. "The right to privacy." Harvard Law Review, 4: 193-220 cited in Stanford Encyclopedia of Philosophy. 2000 https://doi.org/10.2307/1321160
- Weisband, Suzanne P. and Reinig, Bruce A. 1995. "Managing user perceptions of email privacy." Communications of the ACM, 38(12): 40-47 https://doi.org/10.1145/219663.219678
- Westin A. 1967. Privacy and freedom New York: Atheneum. Cited in Stanford Encyclopedia of Philosophy 2002