Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-hfldf Total loading time: 0 Render date: 2024-05-01T15:59:47.016Z Has data issue: false hasContentIssue false

Part I - The social dimensions of privacy

Published online by Cambridge University Press:  05 July 2015

Beate Roessler
Affiliation:
Universiteit van Amsterdam
Dorota Mokrosinska
Affiliation:
Universiteit Leiden
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Social Dimensions of Privacy
Interdisciplinary Perspectives
, pp. 9 - 82
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

References

Eggers, D. 2013. The Circle. New York: Knopf.Google Scholar
Park, W. 2008. “Republic of Korea,” in Rule and Greenleaf (eds.), pp. 207–29.Google Scholar
Rule, J. B. and Greenleaf, G. (eds.) 2008. Global Privacy Protection: The First Generation. Cheltenham: Edward Elgar.CrossRefGoogle Scholar
Szekely, I. 2008. “Hungary,” in Rule and Greenleaf (eds.), pp. 174–206.Google Scholar

References

Allen, A. 2007. Privacy, Law and Society. St. Paul: Thomson/West.Google Scholar
Alpert, S. 2003. “Protecting medical privacy challenges in the age of genetic information.” Journal of Social Issues 59: 301–11.CrossRefGoogle Scholar
Browne, S. 2012. “‘Everybody’s got a little light under the sun’: Black luminosity and the visual culture of surveillance.” Cultural Studies 26: 542–64.CrossRefGoogle Scholar
Dandeker, C. 1990. Surveillance, Power, and Modernity: Bureaucracy and Discipline from 1700 to the Present Day. Cambridge: Polity Press.Google Scholar
DeCew, J. Wagner 1997. In Pursuit of Privacy: Law, Ethics, and the Rise Of Technology. Ithaca, NY: Cornell University Press.CrossRefGoogle Scholar
Foucault, M. 1977. Discipline and Punish: The Birth of the Prison. New York: Vintage.Google Scholar
Goffman, E. 1971. Relations in Public. Micro Studies of the Public Order. New York: Basic Books.Google Scholar
Haggerty, K. and Samatas, M. 2010. Surveillance and Democracy. London: Routledge.CrossRefGoogle Scholar
Kelvin, P. 1973. “A social-psychological examination of privacy.” British Journal of Clinical Psychology 12: 248–61.Google Scholar
Lianos, M. 2003. “Social Control After Foucault.” Surveillance & Society 1: 412–30.Google Scholar
Lyon, D. 2001 . Surveillance and Society: Monitoring Everyday Life. Buckingham and Philadelphia: Open University Press.Google Scholar
Mann, S., Nolan, J. and Barry Wellman, B. 2003. “Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments.” Surveillance & Society 1: 331–55.Google Scholar
Manning, P. K. 2008. “A View of Surveillance,” in Leman-Langlois, S. (ed.) Technocrime: Technology, Crime, and Social Control. Cullompton: Willan Publishing, pp. 209–42.Google Scholar
Monahan, T. 2010. Surveillance in the Time of Insecurity. New Brunswick: Rutgers University Press.Google Scholar
Marx, G. T. 1988. Undercover: Police Surveillance in America. Berkeley: University of California Press.CrossRefGoogle Scholar
Marx, G. T. 2001. “Murky conceptual waters: the public and the private.” Ethics and Informational Technology 3: 157–69.Google Scholar
Marx, G. T. 2011. “Turtles, Firewalls, Scarlet Letters, and Vacuum Cleaners: Rules about Personal Information,” in Aspray, W. and Doty, P. (eds.) Privacy in America: Interdisciplinary Perspectives. Lanham: Scarecrow Press, pp. 27194.Google Scholar
Marx, G. T. 2015. Windows into the Soul: Surveillance and Society in an Age of High Technology. University of Chicago Press (forthcoming).Google Scholar
Newman, O. 1972. Defensible Space. New York: MacMillan.Google Scholar
Nissenbaum, H. 1998. “Protecting privacy in an information age: the problem of privacy in public.” Law and Philosophy 17: 559–96.Google Scholar
Nissenbaum, H. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Palo Alto: Stanford University Press.Google Scholar
Rule, J. B., McAdam, D., Stearns, L. and Uglow, D. 1983. “Documentary identification and mass surveillance in the United States.” Social Problems 31: 222–34.CrossRefGoogle Scholar
Sartre, J.-P. 1993. Being and Nothingness. New York: Washington Square Press.Google Scholar
Westin, A. 1967. Privacy and Freedom. New York: Columbia University Press.Google Scholar
Wittgenstein, L. 1958. Philosophical Investigations (trans. G. E. M. Anscombe), Oxford: Basil Blackwell.Google Scholar

References

Altman, I. 1975. The Environment and Social Behavior. Monterey: Brooks/Cole.Google Scholar
Bailey, J., Steeves, V., Burkell, J. and Regan, P. 2013. “From ‘bicycle face’ to Facebook: Negotiating with gender stereotypes on social networking sites,” Journal of Communication Inquiry 37(2): 91112.CrossRefGoogle Scholar
Barocas, S. and Nissenbaum, H. 2014. “Big Data’s End Run around Anonymity and Consent,” in Lane, J., Stodden, V., Bender, S. and Nissenbaum, H. (eds.), Privacy, Big Data, and the Public Good. New York: Cambridge University Press, pp. 4475.CrossRefGoogle Scholar
Bijker, W. and Law, J. (eds.) 1992. Shaping Technology. Cambridge, MA: MIT Press.Google Scholar
boyd, d. and Marwick, A. 2011. Social Privacy in Networked Publics: Teens Attitudes, Practices and Strategies. SSRN, online: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1925128.Google Scholar
Calore, M. 2006. “Privacy Fears Shock Facebook,” Wired News (September 6). Accessed from: www.wired.com/news/culture/1,71739-0.html.Google Scholar
Coase, R. 1974. “The lighthouse in economics,” Journal of Law and Economics” 17(2): 357–76.Google Scholar
Cohen, J. 2000. “Examined lives: informational privacy and the subject as object,” Stanford Law Review 52(5): 1373–438.CrossRefGoogle Scholar
Cohen, J. 2012. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven: Yale University Press.Google Scholar
Dewey, J. 1927. The Public and its Problems. Chicago: Swallow Press.Google Scholar
Drake, B. 2013. “A Year After Newtown, Little Change in Public Opinion on Guns,” Pew Research Center (December 12). Accessed from: www.pewresearch.org/fact-tank/2013/12/12/a-year-after-newtown-little-change-in-public-opinion-on-guns/.Google Scholar
Friedrich, C. J. 1971. “Secrecy versus Privacy,” in Pennock, J. R. and Chapman, J. W. (eds.), Privacy, Nomos Series 13, Yearbook of the American Society for Political and Legal Philosophy. New York: Atherton Press, pp. 105–20.Google Scholar
Goffman, E. 1959. The Presentation of Self in Everyday Life. Garden City: Doubleday.Google Scholar
Greenwood, D., Stopczynski, A., Sweatt, B., Hardjono, T., and Pentland, A. 2014. “The New Deal on Data: A Framework for Institutional Controls,” in Lane, J., Stodden, V., Bender, S. and Nissenbaum, H. (eds.), Privacy, Big Data, and the Public Good. New York: Cambridge University Press, pp. 192210.CrossRefGoogle Scholar
Hardin, G. 1968. “The tragedy of the commons,” Science 162: 1243–8.CrossRefGoogle ScholarPubMed
Hirsch, D. D. 2014. “The glass house effect: Big data, the new oil, and the power of analogy,” Maine Law Review 66: 373–96.Google Scholar
Hixson, R. F. 1987. Privacy in a Public Society: Human Rights in Conflict. New York: Oxford University Press.Google Scholar
Johnson, D. G., Regan, P. M. and Wayland, K. 2011. “Campaign disclosure, privacy and transparency,” William and Mary Bill of Rights Journal 19(4): 959–82.Google Scholar
Johnson, D. G. and Regan, P. M. (eds.) 2014. Transparency and Surveillance as Sociotechnical Accountability: A House of Mirrors. New York: Routledge.CrossRefGoogle Scholar
Kirkpatrick, D. 2010. The Facebook Effect. New York: Simon & Schuster.Google Scholar
Koonin, S. E. and Holland, M. J. 2014. “The Value of Big Data for Urban Science,” in Lane, J., Stodden, V., Bender, S. and Nissenbaum, H. (eds.), Privacy, Big Data, and the Public Good. New York: Cambridge University Press, pp. 13752.CrossRefGoogle Scholar
Latour, B. 1992. “Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts,” in Bijker, W. and Law, J. (eds.), Shaping Technology/Building Society: Studies in Sociotechnical Change. Cambridge, MA: MIT Press, pp. 225–58.Google Scholar
Lessig, L. 1999. Code and Other Laws of Cyberspace. New York: Basic Books.Google Scholar
Livingstone, S. 2005. “Mediating the public/private boundary at home: Children’s use of the internet for privacy and participation,” Journal of Media Practice 6(1): 4151.CrossRefGoogle Scholar
Livingstone, S. 2008. “Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression,” New Media and Society 10(3): 393411.CrossRefGoogle Scholar
Marwick, A. and boyd, d. 2015. “Theorizing Networked Privacy,” New Media and Society, 10th Anniversary of Facebook special issue (forthcoming).Google Scholar
McCarthy, C. 2009. “Facebook Beacon Has Poked its Last” The Social (September 18). Accessed from: http://news.cnet.com/the-social/?keyword=Beacon.Google Scholar
Merton, R. 1957. Social Theory and Social Structure. Glencoe: Free Press.Google Scholar
Nissenbaum, H. 1997. “Toward an approach to privacy in public: The challenges of information technology,” Ethics and Behavior 7(3): 207–19.CrossRefGoogle Scholar
Nissenbaum, H. 2010. Privacy in Context: Technology, Policy and the Integrity of Social Life. Stanford University Press.Google Scholar
Ohm, P. 2014. “Changing the Rules: General Principles for Data Use and Analysis,” in Lane, J., Stodden, V., Bender, S. and Nissenbaum, H. (eds.), Privacy, Big Data, and the Public Good. New York: Cambridge University Press, pp. 96111.CrossRefGoogle Scholar
Ostrom, E. 1990. Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge University Press.CrossRefGoogle Scholar
Pennock, J. R. and Chapman, J. W. (eds.) 1971. Privacy, Nomos Series 13, Yearbook of the American Society for Political and Legal Philosophy. New York: Atherton Press.Google Scholar
Perez, S. 2010. “The 3 Facebook Settings Every User Should Check Now.” New York Times. January 20. Accessed from: www.readwriteweb.com/archives/the_3_facebook_settings_every_user_should_check_now.php.Google Scholar
Post, R. 1989. “The social foundations of privacy: Community and self in the common law tort,” California Law Review 77(5): 9571010.CrossRefGoogle Scholar
Rachels, J. 1975. “Why privacy is important,” Philosophy and Public Affairs 4: 32333.Google Scholar
Regan, P. M. 1995. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina Press.Google Scholar
Regan, P. M. 2002. “Privacy as a common good,” Information, Communication and Society 5(3): 382405.CrossRefGoogle Scholar
Regan, P. M. and Monahan, T. 2014. “Fusion center accountability and intergovernmental information sharing,” Publius: The Journal of Federalism (Summer/Annual Review) 44(3): 475–98.CrossRefGoogle Scholar
Regan, P. M. and Steeves, V. 2010. “Kids R Us: Online social networking and the potential for empowerment,” Surveillance and Society 8(2): 151–65.CrossRefGoogle Scholar
Roessler, B. 2005. The Value of Privacy. Cambridge: Polity Press.Google Scholar
Rotenberg, M. 2010. Testimony for Hearing on Online Privacy, Social Networking and Crime Victimization, before the Subcommittee on Crime, Terrorism and Homeland Security of the House Committee on the Judiciary. July 28.Google Scholar
Scanlon, T. 1975. “Thomson on privacy,” Philosophy and Public Affairs 4: 315–22.Google Scholar
Schoeman, F. 1984. “Privacy and Intimate Information,” in Schoeman, F. (ed.), Philosophical Dimensions of Privacy. Cambridge University Press, pp. 403–18.CrossRefGoogle Scholar
Schoeman, F. 1992. Privacy and Social Freedom. Cambridge University Press.CrossRefGoogle Scholar
Simitis, S. 1987. “Reviewing privacy in an information society,” University of Pennsylvania Law Review 135: 707–46.CrossRefGoogle Scholar
Simmel, A. 1971. “Privacy Is Not an Isolated Freedom,” in Pennock, J. R. and Chapman, J. W. (eds.), Privacy, Nomos Series 13, Yearbook of the American Society for Political and Legal Philosophy. New York: Atherton Press, pp. 7187.Google Scholar
Solove, D. 2002. “Access and aggregation: Public records, privacy and the Constitution,” Minnesota Law Review 86: 1137.Google Scholar
Solove, D. 2008. Understanding Privacy. Cambridge, MA: Harvard University Press.Google Scholar
Sprenger, P. 1999. “Sun on Privacy: ‘Get Over It’,” Wired (January 26). Accessed at: http://archive.wired.com/politics/law/news/1999/01/17538.Google Scholar
Steeves, V. 2009. “Reclaiming the Social Value of Privacy,” in Kerr, I., Steeves, V. and Lucock, C. (eds.), Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. New York: Oxford University Press, pp. 191208.Google Scholar
Thomson, J. J. 1975. “The right to privacy,” Philosophy and Public Affairs 4: 295314.Google Scholar
Warren, S. D. and Brandeis, L. D. 1890. “The right to privacy,” Harvard Law Review, 4(5): 193220.CrossRefGoogle Scholar
Westin, A. 1967. Privacy and Freedom. New York: Atheneum.Google Scholar
Westlake, E. J. 2008. “Friend me if you Facebook: Generation Y and performative surveillance,” TDR: The Drama Review 52(4): 2140.CrossRefGoogle Scholar
Winner, L. 1986. “Do Artifacts Have Politics?” in Winner, L. (ed.), The Whale and the Reactor: A Search for Limits in an Age of High Technology. University of Chicago Press, pp. 1939.Google Scholar

References

Dewey, J. 1978 (1908). “Ethics,” in Boydston, J. A. (ed.) The Middle Works of John Dewey. Carbondale: Southern Illinois University Press, pp. 3150.Google Scholar
Dewey, J. 1991 (1936). “Liberalism and Civil Liberties,” in Boydston, J. A. (ed.) The Later Works of John Dewey. Carbondale: Southern Illinois University Press, pp. 372–75.Google Scholar
Emerson, T. I. 1970. The System of Freedom of Expression. New York: Random House.Google Scholar
Etzioni, A. 1999. The Limits of Privacy. New York: Basic Books.Google Scholar
Flaherty, D. H. 1972. Privacy in Colonial New England. Charlottesville: University Press of Virginia.Google Scholar
Fried, Ch. 1968. “Privacy. A moral analysis,” Yale Law Journal 77: 475–93.Google Scholar
Gavison, R. 1980. “Privacy and the limits of law,” Yale Law Journal 89: 421–71.CrossRefGoogle Scholar
Goldhill, S. 2004. Love, Sex, and Tragedy: How the Ancient World Shapes Our Lives. University of Chicago Press.Google Scholar
Inness, J. 1992. Privacy, Intimacy and Isolation. Oxford University Press.Google Scholar
Miller, A. 1971. The Assault on Privacy: Computers, Data Banks, and Dossiers. Ann Arbor: University of Michigan Press.Google Scholar
O’Harrow, R. 2005. No Place to Hide, New York: Free Press.Google Scholar
Posner, R. 1981. The Economics of Justice. Cambridge, MA: Harvard University Press.Google Scholar
Post, R. C. 1989. “The social foundations of privacy: Community and self in the common law. Tort,” 77 California Law Review: 9571010.CrossRefGoogle Scholar
Regan, P. M. 1995. Legislating Privacy. Chapel Hill: University of North Carolina Press.Google Scholar
Rosen, J. 2004. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age. New York: Random House.Google Scholar
Rybczynski, W. 1986. Home: A Short History of an Idea. New York: Penguin Books.Google Scholar
Simitis, S. 1987. “Reviewing privacy in an information society,” 135 University of Pennsylvania Law Review: 707–46.CrossRefGoogle Scholar
Solove, D. J. 2004. The Digital Person: Technology and Privacy in the Information Age. New York University Press.Google Scholar
Solove, D. J. 2007. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet. New Haven: Yale University Press.Google Scholar
Solove, D. J. 2008. Understanding Privacy. Cambridge, MA: Harvard University Press.Google Scholar
Tomás Gómez-Arostegui, H. 2005. “Defining private life under the European Convention on Human Rights by referring to reasonable expectations,” California Western International Law Journal 35: 153202.Google Scholar
Westin, A. 1967. Privacy and Freedom. New York: Atheneum.Google Scholar
Wittgenstein, L. 1958. Philosophical Investigations (trans. G. E. M. Anscombe). Oxford: Basil Blackwell.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×