Privacy

Privacy

Below are a selection of introductory texts on Privacy through Values in Design. If you are looking for a more comprehensive list, please visit the Library. If you are looking for other special collections, see VID Basics or Security.

 

Agre, P. E., & Harbs, C. A. (1994). “Social choice about privacy: Intelligent vehicle-highways systems in the United States.” Information Technology and People, 7(4), 63-90.

Boyd, D., Jensen, C., Lederer, S., and Nguyen, D.H. (2002). “Privacy in digital environments: Empowering users.” Workshop abstract in Extended Abstracts of the ACM Conference on Computer Supported Cooperative Work (CSCW 2002). New Orleans, Louisiana. (pdf)

Chang, D., Krupka, E. L., Adar, E., and Acquisti, A. (2016). “Engineering Information Disclosure: Norm Shaping Designs.” Proceedings of CHI 2016, San Jose, CA, May 2016. DOI: http://dx.doi.org/10.1145/2858036.2858346.

Cranor, L.F. (2002) Web Privacy with P3P O’Reilly and Associates, Cambridge.

Gandy, O. “Coming to Terms with the Panoptic Sort,” Computers, Surveillance, and Privacy. D. Lyon and E. Zureik, eds. Minneapolis: University of Minnesota Press, 1996, 132-155.

Kerr, I. and J. McGill, “Emanations, Snoop Dogs and Reasonable Expectations of Privacy,” Criminal Law Quarterly, 52(3), 2007, 392-432.

Narayanan, A. and V. Shmatikov, “Robust De-anonymization of Large Sparse Datasets” In Proc. of 29th IEEE Symposium on Security and Privacy, Oakland, CA, May 2008, pp. 111-125. IEEE Computer Society, 2008.

Nissenbaum, H. and D. Howe, “TrackMeNot: Resisting Surveillance in Web Search,” Lessons from the Identity Trail: Anonymity, Privacy, & Identity in a Networked Society. (Eds) I. Kerr, C. Lucock, & V. Steeves, Oxford: Oxford University Press, 2009, 417-436.

Nissenbaum. H. (2009) Privacy in Context. Stanford, CA: Stanford University Press.

Ohm, P. (2005) “The Fourth Amendment Right to Delete.” Harvard Law Review. Cambridge, MA: Gannett House, 119, 10-18.

Regan, P. (1995) “Chapter 8: Privacy and the Common Good: Implications for Public Policy.” Legislating Privacy. Chapel Hill: University of North Carolina Press, 212-243.

Van den Hoven, J. (2007) “Privacy and the Varieties of Informational Wrongdoing.” Computer Ethics. Ed. John Weckert. Hampshire, England: Ashgate Publishing Limited, 317-330.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s