Privacy and Information Technology
暂无分享,去创建一个
[1] J. Li,et al. Academic Freedom and University Autonomy: A Higher Education Policy Perspective , 2013 .
[2] H. Nissenbaum. A Contextual Approach to Privacy Online , 2011, Daedalus.
[3] Paula T. Kaufman,et al. The USA PATRIOT Act. , 2002 .
[4] P. Howard. Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up , 2015 .
[5] R. Mason. Four ethical issues of the information age , 1986 .
[6] Paul Ohm. Privacy, Big Data, and the Public Good: Changing the Rules: General Principles for Data Use and Analysis , 2014 .
[7] Bruce Schneier,et al. The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance , 1997 .
[8] Daniel J. Solove,et al. The FTC and the New Common Law of Privacy , 2013 .
[9] Latanya Sweeney,et al. Matching Known Patients to Health Records in Washington State Data , 2013, ArXiv.
[10] Alessandro Acquisti,et al. Face Recognition and Privacy in the Age of Augmented Reality , 2014, J. Priv. Confidentiality.
[11] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[12] Daniel J. Solove. Access and Aggregation: Privacy, Public Records, and the Constitution , 2001 .
[13] Logan Kugler. Online privacy , 2015, Commun. ACM.
[14] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[15] Katie Shilton,et al. Platform privacies: Governance, collaboration, and the different meanings of “privacy” in iOS and Android development , 2018, New Media Soc..
[16] Katie Shilton,et al. Four billion little brothers? , 2009, Commun. ACM.
[17] Francine Berman,et al. Social and ethical behavior in the internet of things , 2017, Commun. ACM.
[18] Julie E. Cohen. Examined Lives: Informational Privacy and the Subject as Object , 2000 .
[19] Stacey L. Bowers. Privacy and Library Records. , 2006 .
[20] Yang Wang,et al. "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.
[21] Sean A. Munson,et al. Sunlight or sunburn: A survey of attitudes toward online availability of US public records , 2012, Inf. Polity.
[22] Nick Doty,et al. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[23] David Ardia,et al. Privacy and Court Records: An Empirical Study , 2015 .
[24] Scott R. Peppet. Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security & Consent , 2014 .
[25] Colin J. Bennett. The Privacy Advocates: Resisting the Spread of Surveillance , 2008 .
[26] Katherine J. Strandburg,et al. Monitoring, Datafication and Consent: Legal Approaches to Privacy in the Big Data Context , 2014 .
[27] Hal Berghel. Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege , 2014, Computer.
[28] Charles Frankel. Code of Professional Responsibility , 1976 .
[29] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[30] Mark Yannie,et al. Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet , 2005 .
[31] Robert Gellman,et al. Fair Information Practices: A Basic History - Version 2.20 , 2017 .
[32] Yang Wang,et al. Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising , 2012, CHI.
[33] Win Treese. Once collected, data isn't private , 2005, NTWK.
[34] Keith Kirkpatrick,et al. It's not the algorithm, it's the data , 2017, Commun. ACM.
[35] John C. Mitchell,et al. Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.
[36] Patricia Gonçalves da Conceição Rossini. Pax Technica: How The Internet of Things May Set Us Free or Lock Us Up , 2017 .
[37] Ira S. Rubinstein,et al. Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents , 2012 .
[38] A. Acquisti. Privacy, Big Data, and the Public Good: The Economics and Behavioral Economics of Privacy , 2014 .
[39] Julie E. Cohen. A Right to Read Anonymously: A Closer Look at , 1997 .
[40] Lorrie Faith Cranor,et al. Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding , 2014 .
[41] James Bamford,et al. Body of secrets : anatomy of the ultra-secret National Security Agency : from the Cold War through the dawn of a new century , 2001 .
[42] M. Wendy Hennequin,et al. The Future of the Internet and How to Stop It , 2011 .
[43] Colin Combe,et al. Privacy, Big Data, and the Public Good: Frameworks for Engagement , 2015 .
[44] D. Pinto. Secrets and Lies: Digital Security in a Networked World , 2003 .
[45] A. Washington. Government information policy in the era of big data , 2014 .
[46] Lorrie Faith Cranor,et al. Necessary But Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice , 2012, J. Telecommun. High Technol. Law.
[47] Steven E. Koonin,et al. The Value of Big Data for Urban Science , 2014 .
[48] Peter G. Neumann,et al. The future of the internet of things , 2017, Commun. ACM.
[49] John Wilbanks. Privacy, Big Data, and the Public Good: Portable Approaches to Informed Consent and Open Data , 2014 .
[50] Lorrie Faith Cranor,et al. Privacy as part of the app decision-making process , 2013, CHI.
[51] Janice Y. Tsai. The impact of salient privacy information on decision-making , 2009 .
[52] Deirdre K. Mulligan,et al. Privacy on the Books and on the Ground , 2011 .
[53] Colin J. Bennett,et al. The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .
[54] Cynthia Dwork,et al. Privacy, Big Data, and the Public Good: Differential Privacy: A Cryptographic Approach to Private Data Analysis , 2014 .
[55] Jerry Kang. Information Privacy in Cyberspace Transactions , 1998 .
[56] Peter Honeyman,et al. A brief chronology of medical device security , 2016, Commun. ACM.
[57] Shannon M. Oltmann,et al. Big Data's Impact on Privacy for Librarians and Information Professionals , 2017 .
[58] Jerome P. Reiter,et al. Using Statistics to Protect Privacy , 2014 .
[59] Helen Nissenbaum,et al. Big Data’s End Run around Anonymity and Consent , 2014, Book of Anonymity.
[60] Dave Yates,et al. The use of cookies in Federal agency web sites: Privacy and recordkeeping issues , 2010, Gov. Inf. Q..
[61] Daniel J. Solove,et al. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .
[62] Robert Ellis Smith,et al. Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet , 2000 .
[63] Philip E. Agre,et al. Surveillance and Capture: Two Models of Privacy , 1994, Inf. Soc..
[64] Clifford A. Lynch. The rise of reading analytics and the emerging calculus of reader privacy in the digital world , 2017, First Monday.
[65] Carl E. Landwehr,et al. Privacy research directions , 2016, Commun. ACM.
[66] Y. de Montjoye,et al. Unique in the shopping mall: On the reidentifiability of credit card metadata , 2015, Science.
[67] D. Mulligan,et al. Privacy on the Ground , 2015 .
[68] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[69] Eran Halperin,et al. Identifying Personal Genomes by Surname Inference , 2013, Science.
[70] Carl Landwehr. Privacy, Big Data, and the Public Good: Engineered Controls for Dealing with Big Data , 2014 .
[71] T. Hardjono,et al. Privacy, Big Data, and the Public Good: The New Deal on Data: A Framework for Institutional Controls , 2014 .
[72] P. Agre,et al. Technology and privacy: The new landscape , 1998 .
[73] Hal Hodson,et al. Google DeepMind and healthcare in an age of algorithms , 2017, Health and Technology.
[74] Ben Kei Daniel,et al. Big Data in Higher Education: The Big Picture , 2017 .
[75] Frauke Kreuter,et al. Extracting information from big data: Issues of measurement, inference and linkage , 2014 .
[76] A. Allen,et al. Privacy law and society , 2007 .
[77] M. Calo. The Boundaries of Privacy Harm , 2010 .
[78] Julia Angwin,et al. Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance , 2014 .
[79] Valentín,et al. Chapter 2. , 1998, Annals of the ICRP.
[80] Victoria Stodden. Privacy, Big Data, and the Public Good: Enabling Reproducibility in Big Data Research: Balancing Confidentiality and Scientific Transparency , 2014 .
[81] Harold C. Relyea,et al. Homeland security and information sharing: Federal policy considerations , 2004, Gov. Inf. Q..
[82] Katie Shilton,et al. Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development , 2017, Journal of Business Ethics.
[83] R. Gellman. Public records—access, privacy, and public policy: A discussion paper , 1995 .