Privacy and Information Technology

[1]  J. Li,et al.  Academic Freedom and University Autonomy: A Higher Education Policy Perspective , 2013 .

[2]  H. Nissenbaum A Contextual Approach to Privacy Online , 2011, Daedalus.

[3]  Paula T. Kaufman,et al.  The USA PATRIOT Act. , 2002 .

[4]  P. Howard Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up , 2015 .

[5]  R. Mason Four ethical issues of the information age , 1986 .

[6]  Paul Ohm Privacy, Big Data, and the Public Good: Changing the Rules: General Principles for Data Use and Analysis , 2014 .

[7]  Bruce Schneier,et al.  The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance , 1997 .

[8]  Daniel J. Solove,et al.  The FTC and the New Common Law of Privacy , 2013 .

[9]  Latanya Sweeney,et al.  Matching Known Patients to Health Records in Washington State Data , 2013, ArXiv.

[10]  Alessandro Acquisti,et al.  Face Recognition and Privacy in the Age of Augmented Reality , 2014, J. Priv. Confidentiality.

[11]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[12]  Daniel J. Solove Access and Aggregation: Privacy, Public Records, and the Constitution , 2001 .

[13]  Logan Kugler Online privacy , 2015, Commun. ACM.

[14]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[15]  Katie Shilton,et al.  Platform privacies: Governance, collaboration, and the different meanings of “privacy” in iOS and Android development , 2018, New Media Soc..

[16]  Katie Shilton,et al.  Four billion little brothers? , 2009, Commun. ACM.

[17]  Francine Berman,et al.  Social and ethical behavior in the internet of things , 2017, Commun. ACM.

[18]  Julie E. Cohen Examined Lives: Informational Privacy and the Subject as Object , 2000 .

[19]  Stacey L. Bowers Privacy and Library Records. , 2006 .

[20]  Yang Wang,et al.  "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.

[21]  Sean A. Munson,et al.  Sunlight or sunburn: A survey of attitudes toward online availability of US public records , 2012, Inf. Polity.

[22]  Nick Doty,et al.  Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[23]  David Ardia,et al.  Privacy and Court Records: An Empirical Study , 2015 .

[24]  Scott R. Peppet Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security & Consent , 2014 .

[25]  Colin J. Bennett The Privacy Advocates: Resisting the Spread of Surveillance , 2008 .

[26]  Katherine J. Strandburg,et al.  Monitoring, Datafication and Consent: Legal Approaches to Privacy in the Big Data Context , 2014 .

[27]  Hal Berghel Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege , 2014, Computer.

[28]  Charles Frankel Code of Professional Responsibility , 1976 .

[29]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[30]  Mark Yannie,et al.  Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet , 2005 .

[31]  Robert Gellman,et al.  Fair Information Practices: A Basic History - Version 2.20 , 2017 .

[32]  Yang Wang,et al.  Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising , 2012, CHI.

[33]  Win Treese Once collected, data isn't private , 2005, NTWK.

[34]  Keith Kirkpatrick,et al.  It's not the algorithm, it's the data , 2017, Commun. ACM.

[35]  John C. Mitchell,et al.  Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.

[36]  Patricia Gonçalves da Conceição Rossini Pax Technica: How The Internet of Things May Set Us Free or Lock Us Up , 2017 .

[37]  Ira S. Rubinstein,et al.  Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents , 2012 .

[38]  A. Acquisti Privacy, Big Data, and the Public Good: The Economics and Behavioral Economics of Privacy , 2014 .

[39]  Julie E. Cohen A Right to Read Anonymously: A Closer Look at , 1997 .

[40]  Lorrie Faith Cranor,et al.  Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding , 2014 .

[41]  James Bamford,et al.  Body of secrets : anatomy of the ultra-secret National Security Agency : from the Cold War through the dawn of a new century , 2001 .

[42]  M. Wendy Hennequin,et al.  The Future of the Internet and How to Stop It , 2011 .

[43]  Colin Combe,et al.  Privacy, Big Data, and the Public Good: Frameworks for Engagement , 2015 .

[44]  D. Pinto Secrets and Lies: Digital Security in a Networked World , 2003 .

[45]  A. Washington Government information policy in the era of big data , 2014 .

[46]  Lorrie Faith Cranor,et al.  Necessary But Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice , 2012, J. Telecommun. High Technol. Law.

[47]  Steven E. Koonin,et al.  The Value of Big Data for Urban Science , 2014 .

[48]  Peter G. Neumann,et al.  The future of the internet of things , 2017, Commun. ACM.

[49]  John Wilbanks Privacy, Big Data, and the Public Good: Portable Approaches to Informed Consent and Open Data , 2014 .

[50]  Lorrie Faith Cranor,et al.  Privacy as part of the app decision-making process , 2013, CHI.

[51]  Janice Y. Tsai The impact of salient privacy information on decision-making , 2009 .

[52]  Deirdre K. Mulligan,et al.  Privacy on the Books and on the Ground , 2011 .

[53]  Colin J. Bennett,et al.  The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .

[54]  Cynthia Dwork,et al.  Privacy, Big Data, and the Public Good: Differential Privacy: A Cryptographic Approach to Private Data Analysis , 2014 .

[55]  Jerry Kang Information Privacy in Cyberspace Transactions , 1998 .

[56]  Peter Honeyman,et al.  A brief chronology of medical device security , 2016, Commun. ACM.

[57]  Shannon M. Oltmann,et al.  Big Data's Impact on Privacy for Librarians and Information Professionals , 2017 .

[58]  Jerome P. Reiter,et al.  Using Statistics to Protect Privacy , 2014 .

[59]  Helen Nissenbaum,et al.  Big Data’s End Run around Anonymity and Consent , 2014, Book of Anonymity.

[60]  Dave Yates,et al.  The use of cookies in Federal agency web sites: Privacy and recordkeeping issues , 2010, Gov. Inf. Q..

[61]  Daniel J. Solove,et al.  'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .

[62]  Robert Ellis Smith,et al.  Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet , 2000 .

[63]  Philip E. Agre,et al.  Surveillance and Capture: Two Models of Privacy , 1994, Inf. Soc..

[64]  Clifford A. Lynch The rise of reading analytics and the emerging calculus of reader privacy in the digital world , 2017, First Monday.

[65]  Carl E. Landwehr,et al.  Privacy research directions , 2016, Commun. ACM.

[66]  Y. de Montjoye,et al.  Unique in the shopping mall: On the reidentifiability of credit card metadata , 2015, Science.

[67]  D. Mulligan,et al.  Privacy on the Ground , 2015 .

[68]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[69]  Eran Halperin,et al.  Identifying Personal Genomes by Surname Inference , 2013, Science.

[70]  Carl Landwehr Privacy, Big Data, and the Public Good: Engineered Controls for Dealing with Big Data , 2014 .

[71]  T. Hardjono,et al.  Privacy, Big Data, and the Public Good: The New Deal on Data: A Framework for Institutional Controls , 2014 .

[72]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[73]  Hal Hodson,et al.  Google DeepMind and healthcare in an age of algorithms , 2017, Health and Technology.

[74]  Ben Kei Daniel,et al.  Big Data in Higher Education: The Big Picture , 2017 .

[75]  Frauke Kreuter,et al.  Extracting information from big data: Issues of measurement, inference and linkage , 2014 .

[76]  A. Allen,et al.  Privacy law and society , 2007 .

[77]  M. Calo The Boundaries of Privacy Harm , 2010 .

[78]  Julia Angwin,et al.  Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance , 2014 .

[79]  Valentín,et al.  Chapter 2. , 1998, Annals of the ICRP.

[80]  Victoria Stodden Privacy, Big Data, and the Public Good: Enabling Reproducibility in Big Data Research: Balancing Confidentiality and Scientific Transparency , 2014 .

[81]  Harold C. Relyea,et al.  Homeland security and information sharing: Federal policy considerations , 2004, Gov. Inf. Q..

[82]  Katie Shilton,et al.  Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development , 2017, Journal of Business Ethics.

[83]  R. Gellman Public records—access, privacy, and public policy: A discussion paper , 1995 .