Privacy: What Are We Actually Talking About? - A Multidisciplinary Approach

This paper presents a multidisciplinary approach to privacy. The sub- ject is examined from an ethical, social, and economic perspective reflecting the preliminary findings of the EU-funded research project PRESCIENT. The analy- sis will give a comprehensive illustration of the dimensions' unique and charac- teristic features. This will build the basis for identifying overlaps and developing synergetic effects, which should ideally contribute to a better understanding of privacy.

[1]  Alessandro Acquisti,et al.  Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting , 2004, Economics of Information Security.

[2]  Alessandro Acquisti,et al.  When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information , 2007, WEIS.

[3]  Peter P. Swire Efficient Confidentiality for Privacy, Security, and Confidential Business Information , 2003 .

[4]  Paula England,et al.  The Sexual Contract. , 1989 .

[5]  R. Posner The Economics of Privacy , 1981 .

[6]  K. Hui,et al.  Economics of Privacy , 2005 .

[7]  Donald J. Pierce,et al.  Democracy in America , 2018, Princeton Readings in Political Thought.

[8]  T. Graeff,et al.  Collecting and using personal data: consumers’ awareness and concerns , 2002 .

[9]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[10]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[11]  A. Barak Proportionality and Principled Balancing , 2010 .

[12]  James Grimmelmann,et al.  Privacy as Product Safety , 2010 .

[13]  Daniel J. Solove,et al.  'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .

[14]  D. W. Krumme,et al.  The analysis of space use patterns. , 1979, Journal of theoretical biology.

[15]  Barrington Moore,et al.  Privacy: Studies in Social and Cultural History. , 1986 .

[16]  Wes Sonnenreich,et al.  Return On Security Investment (ROSI) - A Practical Quantitative Modell , 2005, J. Res. Pract. Inf. Technol..

[17]  David Wright Profiling the European Citizen: Cross‐Disciplinary Perspectives , 2009 .

[18]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[19]  Manfred Kochen,et al.  On the economics of information , 1972, J. Am. Soc. Inf. Sci..

[20]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[21]  Daniel J. Solove Understanding Privacy (Chapter One) , 2008 .

[22]  George Stephanides,et al.  The economic approach of information security , 2005, Comput. Secur..

[23]  F. D. de Waal Putting the altruism back into altruism: the evolution of empathy. , 2008, Annual review of psychology.

[24]  J. Elshtain Public Man, Private Woman , 2020 .

[25]  G. Stigler The Economics of Information , 1961, Journal of Political Economy.

[26]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[27]  C. Haney Mental Health Issues in Long-Term Solitary and “Supermax” Confinement , 2003 .

[28]  Alessandro Acquisti,et al.  Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.

[29]  David S. Evans The Online Advertising Industry: Economics, Evolution, and Privacy , 2009 .

[30]  Michael Friedewald,et al.  Privacy, data protection and emerging sciences and technologies: towards a common framework , 2010 .

[31]  S. Presser,et al.  The “Feminist” Mystique , 2004 .

[32]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[33]  Thomas M. Lenard,et al.  In Defense of Data: Information and the Costs of Privacy , 2009 .

[34]  Parthasarathy Ranganathan,et al.  Energy Efficiency: The New Holy Grail of Data Management Systems Research , 2009, CIDR.

[35]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[36]  T. Hendershott Economics and Information Systems , 2006 .

[37]  Richard Volkman,et al.  Privacy as life, liberty, property , 2004, Ethics and Information Technology.

[38]  Kevin Aquilina,et al.  Public security versus privacy in technology law: A balancing act? , 2010, Comput. Law Secur. Rev..

[39]  Lewis A. Coser,et al.  Privacy: Studies in Social and Cultural History. , 1985 .