Toward a Sociology of Privacy
暂无分享,去创建一个
Denise L. Anthony | Christine Horne | Celeste Campos-Castillo | D. Anthony | Christine Horne | Celeste Campos-Castillo
[1] Tiffany D. Joseph. “My Life was Filled with Constant Anxiety”: Anti-Immigrant Discrimination, Undocumented Status, and Their Mental Health Implications for Brazilian Immigrants , 2011 .
[2] Andrew D. Selbst,et al. Big Data's Disparate Impact , 2016 .
[3] Ritchie P. Lowry. Toward a Sociology of Secrecy and Security Systems , 1972 .
[4] D. Merten,et al. ENCULTURATION INTO SECRECY AMONG JUNIOR HIGH SCHOOL GIRLS , 1999 .
[5] Charles T. Hill,et al. Self-Disclosure in Dating Couples: Sex Roles and the Ethic of Openness* , 1980 .
[6] Joel Podolny,et al. Status: Insights from Organizational Sociology , 2012 .
[7] R. F. Murphy,et al. Social Distance and the Veil1 , 1964 .
[8] Steven Hitlin,et al. Copresence Revisiting a Building Block for Social Interaction Theories , 2013 .
[9] Danah Boyd,et al. Facebook privacy settings: Who cares? , 2010, First Monday.
[10] Daniel E. Miller,et al. Openings Revisited: The Foundations of Social Interaction , 1995 .
[11] D. Pager. The Mark of a Criminal Record1 , 2003, American Journal of Sociology.
[12] Whose Privacy? What Harm? , 1982 .
[13] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[14] G. Sewell,et al. `Someone to Watch Over Me': Surveillance, Discipline and the Just-in-Time Labour Process , 1992 .
[15] K. Ball. Workplace surveillance: an overview , 2010 .
[16] B. Schwartz. The Social Psychology of Privacy , 1968, American Journal of Sociology.
[17] Brandon C. Welsh,et al. Public Area CCTV and Crime Prevention: An Updated Systematic Review and Meta‐Analysis , 2009 .
[18] R. D. Schwartz. Social Factors in the Development of Legal Control: A Case Study of Two Israeli Settlements , 1954 .
[19] Latanya Sweeney,et al. Discrimination in online ad delivery , 2013, CACM.
[20] Nicole B. Ellison,et al. Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment , 2006, J. Comput. Mediat. Commun..
[21] Heiko Rauhut,et al. Nuffield Centre for Experimental Social Sciences Discussion Paper Series Lifting the Veil of Ignorance: an Experiment on the Contagiousness of Norm Violations Lifting the Veil of Ignorance: an Experiment on the Contagiousness of Norm Violations , 2022 .
[22] S. Raudenbush,et al. Neighborhoods and violent crime: a multilevel study of collective efficacy. , 1997, Science.
[23] Paul Attewell,et al. Big brother and the sweatshop: computer surveillance in the automated office , 1987 .
[24] C. Uggen,et al. Legal Ambiguity in Managerial Assessments of Criminal Records , 2015, Law & Social Inquiry.
[25] Matthew T. Mccarthy. The big data divide and its consequences , 2016 .
[26] Rourke L O'Brien. Ineligible to Save? Asset Limits and the Saving Behavior of Welfare Recipients , 2008 .
[27] Patrick A. Denice,et al. The Power of Transparency , 2015 .
[28] A. Danna,et al. All That Glitters is Not Gold: Digging Beneath the Surface of Data Mining , 2002 .
[29] H. Varian. Price Discrimination and Social Welfare , 1985 .
[30] Laurel Richardson,et al. Secrecy and Status: The Social Construction of Forbidden Relationships , 1988 .
[31] J. Kitts. Egocentric bias or information management? Selective disclosure and the social roots of norm misperception , 2003 .
[32] Jenny L. Davis,et al. Context collapse: theorizing context collusions and collisions , 2014 .
[33] Colin J. Bennett,et al. Transparent Lives: Surveillance in Canada , 2014 .
[34] PRIVATE PROTEST? , 2012 .
[35] G. Sewell. The discipline of teams: The control of team-based industrial work through electronic and peer surveillance. , 1998 .
[36] A. Kendon,et al. The Experimental Analysis of Social Performance1 , 1967 .
[37] S. Margulis. Conceptions of Privacy: Current Status and Next Steps , 1977 .
[38] Danah Boyd,et al. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience , 2011, New Media Soc..
[39] R. Ericson,et al. The surveillant assemblage. , 2000, The British journal of sociology.
[40] Charlene E. Miall. Authenticity and the disclosure of the information preserve: The case of adoptive parenthood , 1989 .
[41] M. Lamont,et al. The Study of Boundaries in the Social Sciences , 2002 .
[42] E. Shils,et al. Privacy: Its Constitution and Vicissitudes , 1966 .
[43] Glenn Woroch,et al. The demographics of the do-not-call list [security of data] , 2005, IEEE Security & Privacy.
[44] David R. Gibson. Enduring Illusions , 2014 .
[45] Luke Stark,et al. The emotional context of information privacy , 2016, Inf. Soc..
[46] Linda Steg,et al. The Spreading of Disorder , 2008, Science.
[47] Judith Donath,et al. Public Displays of Connection , 2004 .
[48] A. Westin. Social and Political Dimensions of Privacy , 2003 .
[49] P. Cozby. Self-disclosure, reciprocity and liking. , 1972, Sociometry.
[50] Denise L. Anthony,et al. The double-edged sword of electronic health records: implications for patient disclosure , 2015, J. Am. Medical Informatics Assoc..
[51] Stefan Hirschauer. On doing being a stranger: The practical constitution of civil inattention , 2005 .
[52] Ben Jann,et al. Reputation Formation and the Evolution of Cooperation in Anonymous Online Markets , 2014 .
[53] S. Margulis. Privacy as a Social Issue and Behavioral Concept , 2003 .
[54] Jenny L. Davis. Triangulating the Self: Identity Processes in a Connected Era , 2014 .
[55] Robb Willer,et al. Gossip and Ostracism Promote Cooperation in Groups , 2014, Psychological science.
[56] C. Ridgeway,et al. Framed by Gender , 2011 .
[57] Timothy Stablein,et al. Big Brother in the Information Age: Concerns about Government Information Gathering over Time , 2015, IEEE Security & Privacy.
[58] T. Parsons. The Professions and Social Structure , 1939 .
[59] Richard Williams,et al. The Changing Face of Inequality in Home Mortgage Lending , 2005 .
[60] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[61] A. P. Bates,et al. Privacy—A Useful Concept? , 1964 .
[62] Gary T. Marx,et al. A Tack in the Shoe: Neutralizing and Resisting the New Surveillance , 2003 .
[63] Sarah Brayne. Surveillance and System Avoidance , 2014 .
[64] Keith N. Hampton. Persistent and Pervasive Community , 2016 .
[65] Denise D. Bielby,et al. WHERE DID YOU HEAR THAT , 1995 .
[66] Katherine C. Kellogg,et al. Beyond Occupational Differences , 2014 .
[67] Jessica Vitak. The Impact of Context Collapse and Privacy on Social Network Site Disclosures , 2012 .
[68] D. Boyd,et al. CRITICAL QUESTIONS FOR BIG DATA , 2012 .
[69] Anselm L. Strauss,et al. Awareness Contexts and Social Interaction , 1964 .
[70] R. Coser. Insulation from Observability and Types of Social Conformity , 1961 .
[71] Barbara Laslett,et al. Privacy and Secrecy: A Conceptual Comparison , 1977 .
[72] Eszter Hargittai,et al. Digital Inequality , 2008, Commun. Res..
[73] M. P. Johnson,et al. Couple involvement and network structure: A test of the dyadic withdrawal hypothesis. , 1982 .
[74] Jen Schradie,et al. THE TREND OF CLASS, RACE, AND ETHNICITY IN SOCIAL MEDIA INEQUALITY , 2012 .
[75] M. Hallinan,et al. Sex differences in children's friendships. , 1978, American sociological review.
[76] J. Stiglitz,et al. Bargains and Ripoffs: A Model of Monopolistically Competitive Price Dispersion , 1977 .
[77] D. Anthony,et al. Negotiating stigma in health care: disclosure and the role of electronic health records , 2015 .
[78] Mary Beth Rosson,et al. journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .
[79] Benjamin J. Goold,et al. The Banality of Security The Curious Case of Surveillance Cameras , 2013 .
[80] Nadera Shalhoub-Kevorkian. E-RESISTANCE AND TECHNOLOGICAL IN/SECURITY IN EVERYDAY LIFE , 2011 .
[81] Christine Horne,et al. Privacy, technology, and norms: the case of Smart Meters. , 2015, Social science research.
[82] Gary T. Marx,et al. What’s new about the “new surveillance”?: Classifying for change and continuity , 2004 .
[83] Lisa E. Bernstein. Opting out of the Legal System: Extralegal Contractual Relations in the Diamond Industry , 1992, The Journal of Legal Studies.
[84] R. Wilsnack. Information Control , 1980 .
[85] Karen E. C. Levy,et al. The Contexts of Control: Information, Power, and Truck-Driving Work , 2015, Inf. Soc..
[86] Tristan Henderson,et al. Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.
[87] Ebony L. Ruhland,et al. THE EDGE OF STIGMA: AN EXPERIMENTAL AUDIT OF THE EFFECTS OF LOW‐LEVEL CRIMINAL RECORDS ON EMPLOYMENT , 2009 .
[88] J. Balswick,et al. Self-disclosure to same- and opposite-sex parents: an empirical test of insights from role theory. , 1977, Sociometry.
[89] Young-Kyu Kim,et al. Why Pseudonyms? Deception as Identity Preservation Among Jazz Record Companies, 1920–1929 , 2009, Organ. Sci..