7J. F. Johnson. Immunity from the Illegitimate Focused Attention of Others : An Explanation of our Thinking and Talking about Privacy. In A. Vedder, editor, Ethics and the Internet,Intersentia, Antwerpen Groningen Oxford ,2001:49 - 70
8D. Johnson. Do IT Professionals Need a Code of Ethics.Business World, 1999,8 : 16 - 21
9Herman T. Tavani. KDD,data mining,and the challenge for normative privacy. Ethics and Information Technology, 1999,1:265-273
10R. O. Mason, etc. Ethics of information Management. Thousand Oaks,California:Sage publications,Inc. 1995