Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-x24gv Total loading time: 0 Render date: 2024-05-01T14:52:07.428Z Has data issue: false hasContentIssue false

Part II - Privacy: practical controversies

Published online by Cambridge University Press:  05 July 2015

Beate Roessler
Affiliation:
Universiteit van Amsterdam
Dorota Mokrosinska
Affiliation:
Universiteit Leiden
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Social Dimensions of Privacy
Interdisciplinary Perspectives
, pp. 83 - 222
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

References

Allen, A. L. 1988. Uneasy Access: Privacy for Women in a Free Society. Totowa: Rowman & Littlefield.Google Scholar
DeCew, J. Wagner 2003. Why Privacy Isn’t Everything: Feminist Reflections on Personal Accountability. Totowa, NJ: Rowman & Littlefield.Google Scholar
Aristotle, . The Politics, trans. Benjamin Jowett, in The Basic Works of Aristotle. McKeon, Richard (ed.) 1941. New York: Random House, 1127–324.Google Scholar
Bloustein, E. J. 1964. “Privacy as an aspect of human dignity: An answer to Dean Prosser,” New York University Law Review 39: 9621007.Google Scholar
Bok, S. 1983. Secrets: On the Ethics of Concealment and Revelation. New York: Random House, Vintage Books.Google Scholar
Cohen, J. L. 1992. “Redescribing privacy: Identity, difference and the abortion controversy,” Columbia Journal of Gender and Law 3: 43117.Google Scholar
DeCew, J. Wagner 1997. In Pursuit of Privacy: Law, Ethics and the Rise of Technology. Ithaca, NY: Cornell University Press.CrossRefGoogle Scholar
DeCew, J. Wagner 2013. “Privacy,” Stanford Encyclopedia of Philosophy (Fall 2013 Edition), edited by Edward N. Zalta. Available at http://plato.stanford.edu/archives/fall2013/entries/privacy/.Google Scholar
Elshtain, J. B. 1995. Democracy on Trial. New York: Basic Books.Google Scholar
Fried, C. 1968. “Privacy,” Yale Law Journal 77: 475–93.CrossRefGoogle Scholar
Gavison, R. 1980. “Privacy and the limits of law,” Yale Law Journal 89: 421–71.CrossRefGoogle Scholar
Gavison, R. 1992. “Feminism and the public/private distinction,” Stanford Law Review 45: 146.CrossRefGoogle Scholar
Gerety, T. 1977. “Redefining privacy,” 12 Harvard Civil Rights–Civil Liberties Law Review 12: 233–96.Google Scholar
Gerstein, R. 1978. “Intimacy and privacy,” Ethics 89: 7681.CrossRefGoogle Scholar
Inness, J. 1992. Privacy, Intimacy and Isolation. Oxford University Press.Google Scholar
Kundera, M. 1995. Testaments Betrayed: An Essay in Nine Parts. New York: Harper Collins.Google Scholar
Locke, J. 1690. Second Treatise on Government, Reardon, Thomas P. (ed.) Reprinted: New York: Macmillan, Library of Liberal Arts.Google Scholar
MacKinnon, C. 1989. Toward a Feminist Theory of the State. Cambridge, MA: Harvard University Press.Google Scholar
Moore, A. D. 2010. Privacy Rights: Moral and Legal Foundations. Penn State University Press.Google Scholar
Nissenbaum, H. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.Google Scholar
Okin, S. M. 1989. Justice, Gender, and the Family. New York: Basic Books.Google Scholar
Olsen, F. E. 1983. “The Family and the market: A study of ideology and legal reform,” Harvard Law Review 96: 1497–578.CrossRefGoogle Scholar
Parent, W. 1983. “Privacy, morality and the law,” Philosophy & Public Affairs 12: 269–88.Google Scholar
Pateman, C. 1989. “Feminist Critiques of the Public/Private Dichotomy,” in Pateman, . , C.The Disorder of Women: Democracy, Feminism, and Political Theory. Stanford University Press.Google Scholar
Rachels, J. 1975. “Why privacy is important,” Philosophy & Public Affairs 4: 323–33.Google Scholar
Regan, P. 1995. Legislating Privacy. Chapel Hill: University of North Carolina Press.Google Scholar
Reiman, J. 2004. “Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Information Technology of the Future,” in Roessler, B. (ed.) Privacies: Philosophical Evaluations.Stanford University Press, pp. 194214.Google Scholar
Roessler, B. 2005. The Value of Privacy. Cambridge, MA: Polity Press.Google Scholar
Schoeman, F. (ed.) 1984. Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press.CrossRefGoogle Scholar
Schoeman, F. 1992. Privacy and Social Freedom. Cambridge University Press.CrossRefGoogle Scholar
Solove, D. J. 2008. Understanding Privacy. Cambridge, MA: Harvard University Press.Google Scholar
Solove, D. J. 2007. “‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy,” accessed at: http://tehlug.org/files/solove.pdf.Google Scholar

References

Allen, A. 2003. Why Privacy Isn’t Everything: Feminist Reflections on Personal Accountability. Lanham: Rowman & Littlefield.Google Scholar
Allen, A. 2008. “The virtuous spy: Privacy as an ethical limit,” The Monist 91: 322.CrossRefGoogle Scholar
Barnes, G. M., Farrell, M. P. and Banerjee, S. 1994. “Family influences on alcohol abuse and other problem behaviors among Black and White adolescents in a general population sample,” Journal of Research on Adolescence 4: 183201.CrossRefGoogle Scholar
Baum, A. and Koman, S. 1976. “Differential response to anticipated crowding: Psychological effects of social and spatial density,” Journal of Personality and Social Psychology 34: 526–36.CrossRefGoogle Scholar
Clauson-Kaas, J., Dzikus, A., Stephens, C., Hojlyng, N. and Aaby, P. 1996. “Urban health: Human settlement indicators of crowding,” Third World Planning Review 18: 349–63.CrossRefGoogle Scholar
Cox, V., Paulus, P. and McCain, G. 1984. “Prison crowding research: The relevance of prison housing standards and a general approach regarding crowding phenomena,” American Psychologist 39: 1148–60.CrossRefGoogle Scholar
Crouter, A. C. and Head, M. R. 2002. “Parental Monitoring and Knowledge of Children,” in Bornstein, M. H. (ed.) Handbook of Parenting, Vol. III: Being and Becoming a Parent. Mahwah: Lawrence Erlbaum, pp. 461–84.Google Scholar
Crouter, A. C., MacDermid, S. M., McHale, S. M. and Perry-Jenkins, M. 1990. “Parental monitoring and perceptions of children’s school performance and conduct in dual- and single-earner families,” Developmental Psychology 26: 649–57.CrossRefGoogle Scholar
Crouter, A. C., Bumpus, M. F., Davis, K. D. and McHale, S. M. 2006. “How do parents learn about adolescents’ experiences? Implications for parental knowledge and adolescent risky behavior,” Child Development 76: 869–82.Google Scholar
Czeskis, A., Dermendjieva, I., Yapit, H., Borning, A., Friedman, B., Gill, B. and Kohno, T. 2010. “Parenting from the pocket: Value tensions and technical directions for secure and private parent–teen mobile safety,” Proceedings of the Symposium on Usable Privacy and Security, 115.Google Scholar
Dishion, T. and McMahon, R. 1998. “Parental Monitoring and the Prevention of Problem Behavior: A Conceptual and Empirical Reformulation,” in Ashery, R. S., Robertson, E. B. and Kumpfer, K. L. (eds.) Drug Abuse Prevention through Family Interventions, NIDA Research Monograph 177, pp. 229–59.Google Scholar
Duarte, M. 2013. Unpublished interview with Marisa Elena Duarte, Ph.D., on file with authors.Google Scholar
Eaton, N., Kruger, R., Johnson, W., McGue, M. and Incono, W. 2009. “Parental monitoring, personality, and delinquency: Further support for a reconceptualization of monitoring,” Journal of Research in Personality 43: 4959.CrossRefGoogle ScholarPubMed
Edwards, J. N. and Booth, A. 1977. “Crowding and human sexual behavior,” Social Forces 55: 791808.CrossRefGoogle Scholar
Erikson, E. 1963. Childhood and Society. New York: Norton.Google Scholar
Farrington, D. and Nuttal, C. 1980. “Prison size, overcrowding, prison violence and recidivism,” Journal of Criminal Justice 8: 221–31.CrossRefGoogle Scholar
Fuller, T. D., Edwards, N. J., Vorakitphokatorn, S. and Sermsri, S. 1996. “Chronic stress and psychological well-being: Evidence from Thailand on household crowding,” Social Science Medicine 42: 265–80.CrossRefGoogle ScholarPubMed
Gavison, R. 1983. “Information Control: Availability and Control,” in Benn, S. I. and Gaus, G. F. (eds.) Public and Private in Social Life. London: St Martin’s Press, pp. 113–34.Google Scholar
Gross, H. 1971. “Privacy and Autonomy,” in Pennock, J. R., and Chapman, J. (eds.) Privacy: Nomos XIII. New York: Atherton Press, pp. 169–81.Google Scholar
Hare, A., Marston, E. and Allen, J. 2011. “Maternal acceptance and adolescents’ emotional communication: A longitudinal study,” Journal of Youth and Adolescence 40: 744–51.CrossRefGoogle ScholarPubMed
Kafka, R. and London, P. 1991. “Communication in relationships and adolescent substance use: The influence of parents and friends,” Adolescence 26: 587–98.Google ScholarPubMed
Kerr, M. and Stattin, H. 2000. “What parents know, how they know it, and several forms of adolescent adjustment: Further support for a reinterpretation of monitoring,” Journal of Developmental Psychology 36: 366–80.CrossRefGoogle ScholarPubMed
Kessler, J. 1966. Psychopathology of Childhood. Englewood Cliffs: Prentice-Hall.Google Scholar
Livingstone, S. and Bober, M. 2006. “Regulating the Internet at Home: Contrasting the Perspectives of Children and Parents,” in Buckingham, D., and Willett, R. (eds.) Digital Generations: Children, Young People, and New Media. Mahwah: Lawrence Erlbaum Associates, pp. 93113.Google Scholar
McCain, G., Cox, V. and Paulus, P. 1980. “The effect of prison crowding on inmate behavior,” Washington DC: US Department of Justice.Google Scholar
McCloskey, H. J. 1971. “The political ideal of privacy,” The Philosophical Quarterly 21: 301–14.CrossRefGoogle Scholar
McGinley, P. 1959. “A Lost Privilege,” Province of the Heart. New York: Viking Press.Google Scholar
Mathiesen, K. 2013. “The Internet, children, and privacy: The case against parental monitoring,” Ethics of Information Technology 15: 263–74.CrossRefGoogle Scholar
Megargee, E. I. 1977. “The association of population density reduced space and uncomfortable temperatures with misconduct in a prison community,” The American Journal of Community Psychology 5: 289–98.CrossRefGoogle Scholar
Mill, J. S. 1859. On Liberty. London: Longman, Roberts & Green.Google Scholar
Moore, A. D. 2003. “Privacy: Its meaning and value,” American Philosophical Quarterly 40: 215–27.Google Scholar
Moore, A. D. 2007. “Toward informational privacy rights,” San Diego Law Review 44: 809–45.Google Scholar
Moore, A. D. 2008. “Defining privacy,” Journal of Social Philosophy 39: 411–28.CrossRefGoogle Scholar
Moore, A. D. 2010. Privacy Rights: Moral and Legal Foundations. University Park, PA: Penn State University Press.Google Scholar
Morgan, G. 1972. “Mental and social health and population density,” Journal of Human Relations 20: 196204.Google Scholar
Mumford, L. 1961. The City in History. New York: Harcourt, Brace & World.Google Scholar
Murdock, G. 1955. “The Universals of Culture,” in Hoebel, E. A., Jennings, J. D., and Smith, E. R. (eds.) Readings in Anthropology. New York: McGraw-Hill.Google Scholar
Nussbaum, M. 2000. Woman and Human Development: The Capabilities Approach. Cambridge University Press.CrossRefGoogle Scholar
Parent, W. A. 1983. “Privacy, morality, and the law,” Philosophy and Public Affairs 12: 269–88.Google Scholar
Parker, R. 1974. “A definition of privacy,” Rutgers Law Review 27: 275–96.Google Scholar
Paulus, P., Cox, V. and McCain, G., 1978. “Death rates, psychiatric commitments, blood pressure and perceived crowding as a function of institutional crowding,” Environmental Psychology and Nonverbal Behavior 3: 107–16.CrossRefGoogle Scholar
Porporino, F. and Dudley, K. 1984. An Analysis of the Effects of Overcrowding in Canadian Penitentiaries. Ottawa: Research Division, Programs Branch, Solicitor General of Canada.Google Scholar
Rachels, J. 1975. “Why privacy is important,” Philosophy and Public Affairs 4: 323–33.Google Scholar
Roberts, J. and Gregor, T. 1971. “Privacy: A Cultural View,” in Pennock, J. R., and Chapman, J. (eds.) Privacy: Nomos XIII. New York: Atherton Press, pp. 199–225.Google Scholar
Ruback, B. and Carr, T. 1984. “Crowding in a woman’s prison,” Journal of Applied Social Psychology 14: 5768.CrossRefGoogle Scholar
Schwartz, B. 1968. “The social psychology of privacy,” American Journal of Sociology 73: 741–52.CrossRefGoogle ScholarPubMed
Spiro, H. 1971. “Privacy in Comparative Perspective,” in Pennock, J. R., and Chapman, J. (eds.) Privacy: Nomos XIII. New York: Atherton Press, pp. 121–48.Google Scholar
Spitz, R. 1964. “The derailment of dialogue,” Journal of the American Psychoanalytic Association 12: 752–75.Google ScholarPubMed
Stattin, H. and Kerr, M. 2000a. “Parental monitoring: A reinterpretation,” Child Development 71: 1072–85.CrossRefGoogle ScholarPubMed
Allen, A. 2000b. “What parents know, how they know it, and several forms of adolescent adjustment: further support for a reinterpretation of monitoring.” Journal of Developmental Psychology 36: 366–80.Google Scholar
Warren, S. and Brandeis, L. 1890. “The right to privacy,” The Harvard Law Review 4: 193220.CrossRefGoogle Scholar
Westin, A. 1967. Privacy and Freedom. New York: Atheneum.Google Scholar
Wilson, S. 2008. Research Is Ceremony: Indigenous Research Methods.Black Point: Fernwood Publishing.Google Scholar

References

Ashley, E. A., Butte, A. J., Wheeler, M. T., Chen, R., Klein, T. E., Dewey, F. E., Dudley, J. T., Ormond, K. E., Pavlovic, A., Morgan, A. A., Pushkarev, D., Neff, N. F., Hudgins, L., Gong, L., Hodges, L. M., Berlin, D. S., Thorn, C. F., Sangkuhl, K., Hebert, J. M., Woon, M., Sagreiya, H., Whaley, R., Knowles, J. W., Chou, M. F., Thakuria, J. V., Rosenbaum, A. M., Zaranek, A. W., Church, G. M., Greely, H. T., Quake, S. R. and Altman, R. B. 2010. “Clinical assessment incorporating a personal genome,” The Lancet 375 (9725): 1525–35.CrossRefGoogle ScholarPubMed
Ayday, E., De Cristofaro, E., Hubaux, J.-P. and Tsudik, G. 2013. “The chills and thrills of whole genome sequencing,” IEEE Computer Society Digital Library, eprint arXiv:1306.1264 http://doi.ieeecomputersociety.org/10.1109/MC.2013.333.Google Scholar
Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P. and Tsudik, G. 2011. “Countering GATTACA: Efficient and secure testing of fully-sequenced human genomes,” CCS 11 Proceedings of the 18th ACM conference on Computer and communications security, arXiv:1110.2478.Google Scholar
Barnes, B. and Dupré, J. 2008. Genomes and What to Make of Them. University of Chicago Press.CrossRefGoogle Scholar
Choudhury, S., Fishman, J. R., McGowan, M. L. and Juengst, E. T. 2014. “Big data, open science and the brain: lessons learned from genomics,” Frontiers in Human Neuroscience 8: 239.CrossRefGoogle ScholarPubMed
El Emam, K. 2011. “Methods for the de-identification of electronic health records for genomic research,” Genome Medicine 3: 25.CrossRefGoogle ScholarPubMed
ENCODE Project Consortium, 2012. “An integrated encyclopedia of DNA elements in the human genome,” Nature 489: 5774.CrossRefGoogle Scholar
Erlich, Y. and Narayanan, A. 2014. “Routes for breaching and protecting genetic privacy,” Nature Reviews Genetics 15(6): 409–21.Google ScholarPubMed
GIANT (Genetic Investigation of Anthropocentric Traits) Consortium 2010. “Hundreds of variants clustered in genomic loci and biological pathways affect human height,” Nature 467: 832–8.Google Scholar
Gottweis, H., Kaye, J., Bignami, F., Rial-Sebbag, E., Lattanzi, R. and Macek, M. Jr., 2012. “Biobanks for Europe, a challenge for governance,” European Commission (report from the expert group on dealing with ethical and regulatory challenges of international biobank research).Google Scholar
Green, M. J. and Botkin, J. R. 2003. “‘Genetic exceptionalism’ in medicine: clarifying the differences between genetic and nongenetic tests,” Annals of Internal Medicine 138 (7): 571–5.CrossRefGoogle Scholar
Green, R. M. and Thomas, A. M. 1998. “DNA: five distinguishing features for policy analysis,” Harvard Journal of Law & Technology 11(3): 571–91.Google ScholarPubMed
Gymrek, M., McGuire, A. L., Golan, D., Halperin, E. and Erlich, Y. 2013. “Identifying personal genomes by surname inference,” Science 339 (6117): 321–4.CrossRefGoogle ScholarPubMed
Homer, N., Szelinger, S., Redman, M., Duggan, D., Tembe, W., Muehling, J., Pearson, J. V., Stephan, D. A., Nelson, S. F. and Craig, D. W. 2008. “Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays,” PLoS Genetics 4(8): e1000167.CrossRefGoogle ScholarPubMed
Hottois, G. 1996. Symbool en techniek. Over de technowetenschappelijke mutatie in de westerse cultuur. Original: Philosophie et technosciences. 1995. Translated by Maarten van der Marel. Kampen: Kok Agora.Google Scholar
Ilkilic, I. 2009. “Coming to grips with genetic exceptionalism: roots and reach of an explanatory model,” Medicine Studies 1: 131–42.CrossRefGoogle Scholar
Knoppens, B. M. 2009. “Genomics and policymaking: from static models to complex systems?Human Genetics 125: 375–9.Google Scholar
Kupferschmidt, K. 2011. “Danish archipelago launches mass sequencing plan,” http://news.sciencemag.org/europe/2011/10/danish-archipelago-launches-mass-sequencing-plan.Google Scholar
Le Hellard, S. and Steen, V. M. 2014. “Genetic architecture of cognitive traits,” Scandinavian Journal of Psychology 55(3): 255–62.CrossRefGoogle ScholarPubMed
Lunshof, J. E., Chadwick, R., Vorhaus, D. B. and Church, G. M. 2008. “From genetic privacy to open consent,” Nature 9: 406–11.Google ScholarPubMed
Lunshof, J. E., Bobe, J., Aach, J., Angrist, M., Thakuria, J. V., Vorhaus, D. B., Hoehe, M. R. and Church, G. M. 2010. “Personal genomes in progress: from the Human Genome Project to the Personal Genome Project,” Dialogues in Clinical NeuroSciences 12(1): 4760.CrossRefGoogle Scholar
Malin, B. 2006. “Re-identification of familial database records,” AMIA Annual Symposium Proceedings: 524–8.Google ScholarPubMed
Malin, B., Loukides, G., Benitez, K. and Clayton, E. W., 2011. “Identifiability in biobanks: models, measures, and mitigation strategies,” Human Genetics 130(3): 383–92.CrossRefGoogle ScholarPubMed
Manders-Huits, N. 2010. “Practical versus moral identities in identity management,” Ethics and Information Technology 12: 4355.CrossRefGoogle Scholar
Manders-Huits, N. and van den Hoven, J. 2008. “Moral Identification in Identity Management Systems,” in Fischer-Hübner, S., Duquenoy, P., Zuccato, A., Martucci, L. (eds.) The Future of Identity in the Information Society, Boston: IFIP International Federation for Information Processing, Springer, Vol. 262: 7791.CrossRefGoogle Scholar
Padmanabhan, A. and Luna, B. 2013. “Developmental imaging genetics: linking dopamine function to adolescent behavior,” Brain and Cognition 89: 27–38. Available at www.sciencedirect.com/science/article/pii/S0278262613001462.Google ScholarPubMed
Personal Genome Project 2014. “PGP Consent Form,” www.personalgenomes.org/harvard/sign-up.Google Scholar
Roche, P. A. and Annas, G. J., 2001. “Protecting genetic privacy, Nature Review Genetics 2: 392–6.CrossRefGoogle ScholarPubMed
Sarata, A. K. 2008. “CRS Report for Congress. Genetic exceptionalism: genetic information and public policy,” Congressional Research Service, www.hsdl.org/?view&did=707472.Google Scholar
Sarwate, A. D., Plis, S. M., Turner, J. A., Arbabshirani, M. R. and Calhoun, V. D. 2014. “Sharing privacy-sensitive access to neuroimaging and genetics data: a review and preliminary validation,” Frontiers in Neuroinformatics 8: 35.CrossRefGoogle Scholar
Soini, S. 2012. “Genetic testing legislation in Western Europe – a fluctuating regulatory target,” Journal of Community Genetics 3(2): 143–53.CrossRefGoogle ScholarPubMed
Sweeney, L., Abu, A. and Winn, J. 2013. “Identifying participants in the personal genome project by name,” Harvard University Data Privacy Lab. arXiv:1304.7605: 1021–1.CrossRefGoogle Scholar
The Thousand Genomes Project Consortium. 2012. “An integrated map of genetic variation from 1,092 human genomes,” Nature 491: 5665.CrossRefGoogle Scholar
United Nations, 1998. Universal Declaration on the Human Genome and Human Rights, www.ohchr.org/EN/ProfessionalInterest/Pages/HumanGenomeAndHumanRights.aspx.Google Scholar
Van den Hoven, J. 2008. “Information Technology, Privacy, and the Protection of Personal Data”, in Van den Hoven, J. and Weckert, J. (eds.) Information Technology and Moral Philosophy, Cambridge Studies in Philosophy and Public Policy. Cambridge University Press, pp. 301–21.CrossRefGoogle Scholar
Velleman, D. 2001. “The genesis of shame,” Philosophy & Public Affairs 30(1): 2752.CrossRefGoogle Scholar
Wilkerson, T. E. 1995. Natural Kinds, Avebury: Ashgate Publishing.Google Scholar
Willour, V. L., Seifuddin, F., Mahon, P. B., Jancic, D., Pirooznia, M., Steele, J., Schweizer, B., Goes, F. S., Mondimore, F. M., Mackinnon, D. F., The Bipolar Genome Study (BiGS) Consortium, Perlis, R. H., Lee, P. H., Huang, J., Kelsoe, J. R., Shilling, P. D., Rietschel, M., Nöthen, M., Cichon, S., Gurling, H., Purcell, S., Smoller, J. W., Craddock, N., DePaulo, J. R. Jr., Schulze, T. G., McMahon, F. J., Zandi, P. P. and Potash, J. B. 2012. “A genome-wide association study of attempted suicide,” Molecular Psychiatry 17: 433–44.CrossRefGoogle ScholarPubMed

References

Allen, A. 1988. Uneasy Access: Privacy for Women in a Free Society. Lanham: Rowman and Littlefield.Google Scholar
boyd, d. 2014. It’s Complicated: The Social Lives of Networked Teens. New Haven: Yale University Press.Google Scholar
Celikates, R. and Pollmann, A. 2006. “Baustellen der Vernunft. 25 Jahre Theorie des kommunikativen Handelns. Zur Gegenwart eines Paradigmenwechsels,” WestEnd. Neue Zeitschrift fuer Sozialforschung 3(2): 97113.Google Scholar
Cohen, J. E. 2012. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven: Yale University Press.Google Scholar
Cohen, J. E. 2013. “What privacy is for, Harvard Law Review 126: 1904–33.Google Scholar
Cooke, M. and Juetten, T. (eds.) 2013. “The theory of communicative action after three decades,” Constellations 20(4): 516603.CrossRefGoogle Scholar
Craig, T. and Ludloff, M. E. 2011. Privacy and Big Data. Sebastopol: O’Reilly Media.Google Scholar
Dworkin, R. 1985. “What Justice Isn’t,” in Dworkin, R., A Matter of Principle, Cambridge, MA: Harvard University Press: pp. 214–20.Google Scholar
Ertman, M. M. and Williams, J. C. (eds.) 2005. Rethinking Commodification. Cases and Readings in Law and Culture. New York University Press.Google Scholar
Fuchs, C.et al. 2012. Internet and Surveillance: The Challenges of Web 2.0 and Social Media. London: Routledge.Google Scholar
Habermas, J. 1987. The Theory of Communicative Action, Volume 2: Lifeworld and System: A Critique of Functionalist Reason, translated by T. McCarthy. Cambridge: Polity Press.Google Scholar
Halpern, S. 2013. “Are we puppets in a wired world?” New York Review of Books, November 7.Google Scholar
Herzog, L. 2013. “Markets”, Stanford Encyclopedia of Philosophy (Fall 2013 Edition), edited by Edward N. Zalta. Available at http://plato.stanford.edu/archives/fall2013/entries/markets/.Google Scholar
Honneth, A. 2005. Reification. A New Look at an Old Idea. The Berkely Tanner Lectures, edited by Jay, M.. Oxford University Press.Google Scholar
Kennett, J. and Matthews, S. 2008. “What’s the buzz? Undercover marketing and the corruption of friendship”, Journal of Applied Philosophy 25( 1): 218.CrossRefGoogle Scholar
Lever, A. 2012. On Privacy. New York: Routledge.Google Scholar
Lukes, S. 2004. “Invasions of the Market”, in Dworkin, R. (ed.), From Liberal Values to Democratic Transition. Essays in Honour of Janos Kis. Budapest: Central University Press, pp. 5778.CrossRefGoogle Scholar
Lupton, D. 2013. ‘Understanding the human machine’, IEEE Technology and Society Magazine 32(4): 2530.CrossRefGoogle Scholar
Lupton, D. 2014. “Self-tracking Modes: Reflexive Self-Monitoring and Data Practices,” Paper for the Imminent Citizenships: Personhood and Identity Politics in the Informatic Age Workshop, 27 August 2014, ANU, Canberra.CrossRefGoogle Scholar
Marwick, A. E. 2013. Status Update. Celebrity, Publicity, and Branding in the Social Media Age. New Haven: Yale University Press.Google Scholar
Marwick, A. E. 2014. “How your data are being deeply mined”, New York Review of Books, January 9: 22.Google Scholar
Mayer-Schoenberger, V. and Cukier, K. 2013. Big Data. A Revolution that Will Transform how We Live, Work, and Think. London: John Murray.Google Scholar
Millar, J. 2009. Core Privacy: A Problem for Predictive Data Mining, in Steeves, V., Kerr, I. and Lucock, C. (eds.) Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. Oxford University Press: pp. 103–20.Google Scholar
Morozov, E. 2014. “Selling Your Bulk Online Data Really Means Selling Your Autonomy. Big tech’s war on the meaning of life,” New Republic, May 13.Google Scholar
Nissenbaum, H. 2010. Privacy in Context. Technology, Policy, and the Integrity of Social Life. Stanford University Press.Google Scholar
O’Callaghan, P. 2013. Refining Privacy in Tort Law, Heidelberg: Springer.CrossRefGoogle Scholar
OECD 2013. Exploring the economics of personal data: A survey of methodologies for measuring monetary value. Retrieved from: http://dx.doi.org/10.1787/5k486qtxldmq-en.CrossRefGoogle Scholar
Passig, K. 2012. Unsere Daten, Unser Leben. Internetkolumne, Merkur. Deutsche Zeitschrift fuer europaeisches Denken 756: 420–7.Google Scholar
Phillips, A. 2013. Our Bodies, Whose Property?Oxford University Press.Google Scholar
Phillips, L. 2014. A Market for Personal Data. Available at: http://hubofallthings.com/market-for-personal-data/. accessed October 17, 2014.Google Scholar
Radin, M. J. 1996. Contested Commodities. Cambridge, MA: Harvard University Press.Google Scholar
Radin, M. J. and Sunder, M. 2005. “Introduction: The Subject and Object of Commodification,” in Ertman, M. M., Williams, J. C. (eds.), Rethinking Commodification. New York University Press, pp. 8–33.Google Scholar
Richards, N. M. 2013. “The dangers of surveillance,” Harvard Law Review 126: 1934–65.Google Scholar
Roberts, A. 2015. “A republican account of the value of privacy,” European Journal of Political Theory. DOI: 10.1177/1474885114533262.CrossRefGoogle Scholar
Roessler, B. 2005. The Value of Privacy. Cambridge: Polity Press.Google Scholar
Sandel, M. 2012, What Money Can’t Buy. The Moral Limits of Markets. New York: Farrar, Straus and Giroux.Google Scholar
Satz, D. 2010. Why some Things Should not Be for Sale. The Moral Limits of Markets. Oxford University Press.CrossRefGoogle Scholar
Singer, P. 1973. “Altruism and commerce: a defense of Titmuss against Arrow,” Philosophy and Public Affairs 2(3) (Spring): 312–20.Google ScholarPubMed
Steeves, V. 2015. “Privacy, Sociality and the Failure of Regulation: Lessons Learned from Young Canadians’ Online Experiences”, in Roessler, B. and Mokrosinska, D. (eds.) Social Dimensions of Privacy: Interdisciplinary Perspectives. Cambridge University Press.Google Scholar
Tanner, A. 2014. What Stays in Vegas. New York: Public Affairs.Google Scholar
Till, C. 2014. “Exercise as labour: quantified self and the transformation of exercise into labour,” Societies 4: 446–62; doi:10.3390/soc4030446.CrossRefGoogle Scholar
Titmuss, R. 1971. The Gift Relationship: From Human Blood to Social Policy. New York: Random House.Google Scholar
Turow, J. 2011. The Daily You. New Haven: Yale University Press.Google Scholar
Turow, J. 2012. “How companies are ‘defining your worth’ online.” www.npr.org/2012/02/22/147189154/how-companies-are-defining-your-worth-online (accessed October 17, 2014).Google Scholar
Wacks, R. 1989. Personal Information. Privacy and the Law. Oxford: Clarendon Press.Google Scholar
Wacks, R. 2010. Privacy. A Very Short Introduction. Oxford University Press.CrossRefGoogle Scholar
Walzer, M. 1983. Spheres of Justice. A Defense of Pluralism and Equality. New York: Basic Books.Google Scholar
Zuiderveen Borgesius, F. 2014. Improving Privacy Protection in the Area of Behavioural Targeting. Ph.D. Thesis, Amsterdam.CrossRefGoogle Scholar
Zwick, D. and Dholakia, N. 2001. “Contrasting European and American approaches to privacy in electronic markets: property right versus civil right.” Electronic Markets 11: 116–20.Google Scholar

References

Allen, A. 1998. Uneasy Access: Privacy for Women in a Free Society. New Jersey: Rowman and Littlefield.Google Scholar
Anderson, D. A. 1999. ‘The Failure of American Privacy Law’, in Markesinis, B. (ed.) Protecting Privacy: The Clifford Chance Lectures Vol.4. Oxford University Press, pp. 139–67.Google Scholar
Barendt, E. 2007. Freedom of Speech. Oxford University Press.CrossRefGoogle Scholar
Benn, S. 1984. ‘Privacy, Freedom and Respect for Persons’, in Schoeman, F. D. (ed.) Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, pp. 223–44.Google Scholar
Brown, M. 2009. ‘PCC Chairman Warns of European Threat to Press Freedom’, 13 January. Accessed from www.theguardian.com/media/2009/jan/13/pcc-chairman-christopher-meyer-press-freedom.Google Scholar
Cohen, J. 1993. ‘Freedom of expression’, Philosophy and Public Affairs 22 (3): 207–63.Google Scholar
Cohen, J. 2009. Philosophy, Politics, Democracy: Selected Essays. Cambridge, MA: Harvard University Press.Google Scholar
Dacre, P. 2008. ‘The Threat to our Press’, Guardian, 10 November. Accessed from www.theguardian.com/media/2008/nov/10/paul-dacre-press-threats.Google Scholar
Davies, N. 2010. ‘Exclusive: Inquiry over Vanessa Perroncel phone-tapping allegations’. Accessed from www.theguardian.com/media/2010/apr/10/newspapers-phone-hacking-inquiry.Google Scholar
Finkin, M. W. 1996. ‘Employee privacy, American values and the law’, Chicago-Kent Law Review 72: 221–69.Google Scholar
Finkin, M. W. 1997. ‘Discharge and disgrace: a comment on the “urge to treat people as objects”’, Employee Rights and Employment Policy Journal 1(1): 123.Google Scholar
Greenslade, R. 2010. ‘Two Newspapers Apologise to Vanessa Perroncel For Breaching Her Privacy’, Guardian NewspaperMedia. Accessed from www.theguardian.com/media/greenslade/2010/oct/07/newsoftheworld-john-terry.Google Scholar
Lever, A. 2011. On Privacy. New York: Routledge.Google Scholar
Lever, A. 2014a. A Democratic Conception of Privacy. London: Authorhouse.Google Scholar
Lever, A. 2014b. ‘Book review. response to James B Rule’, Law, Culture and Humanities 10(1): 188–90.CrossRefGoogle Scholar
Lever, A. 2015. ‘Privacy and Democracy: What the Secret Ballot Reveals’, Law, Culture and Humanities 11(2).CrossRefGoogle Scholar
Mendus, S. 2008. “Private Faces in Public Places,” in Kramer, M. H., Grant, C., Colburn, B. and Hatzistavrou, A. (eds.) The Legacy of H.L.A. Hart: Legal, Political and Moral Philosophy. Oxford University Press, pp. 299314.CrossRefGoogle Scholar
Mill, J. S. 1869. On Liberty. London: Longman, Roberts and Green.Google Scholar
Mohr, R., 1992. Gay Ideas: Outing and Other Controversies. Boston, MA: Beacon Press.Google Scholar
Moore, A. D. 2010. Privacy Rights: Moral and Legal Foundations. Pennsylvania University Press.Google Scholar
Nagel, T. 2005. ‘The Central Question’, London Review of Books 27(3): 1213. Accessed from www.lrb.co.uk/v27/n03/thomas-nagel/the-central-questions.Google Scholar
Rozenberg, J. 2005. Privacy and the Press. Oxford University Press.CrossRefGoogle Scholar
Rusbridger, A. 2004. ‘The Fame Game’, Guardian, 27 March, Books. Accessed from www.theguardian.com/books/2004/mar/27/highereducation.news.Google Scholar
Ryan, J. 2005. ‘Letters’, London Review of Books 27(4). Accessed from www.lrb.co.uk/v27/n04/letters.Google Scholar
Shrage, L. 2012. ‘Does the government need to know your sex?’, The Journal of Political Philosophy 20(2): 225–47.CrossRefGoogle Scholar
Thompson, D. F. 1987. Political Ethics and Public Office. Cambridge, MA: Harvard University Press.Google Scholar
Warren, S. D. and Brandeis, L. D. 1890. ‘The right to privacy: (the implicit made explicit)’, Harvard law Review 4: 193220.CrossRefGoogle Scholar

References

Ackerman, B. 1989. “Why dialogue?Journal of Philosophy 86: 522.CrossRefGoogle Scholar
Brettschneider, C. 2007. Democratic Rights: The Substance of Self-Government. Princeton University Press.Google Scholar
Chambers, S. 2010. “Theories of political justification,” Philosophy Compass 5: 893903.CrossRefGoogle Scholar
Dobel, P. 1998. “Judging the private lives of public officials,” Administration and Society 30: 115–42.CrossRefGoogle Scholar
Fraser, N. 1992. “Sex, lies, and the public sphere: some reflections on the confirmation of Clarence Thomas,” Critical Inquiry 18: 595612.CrossRefGoogle Scholar
Garthoff, J. 2012. “The idea of an overlapping consensus revisited,” Journal of Value Inquiry 46: 183–96.CrossRefGoogle Scholar
Gaus, G. 1996. Justificatory Liberalism: An Essay on Epistemology and Political Theory. New York: Oxford University Press.CrossRefGoogle Scholar
Gaus, G. 2003. Contemporary Theories of Liberalism: Public Reason as a Post-Enlightenment Project. London: Sage.CrossRefGoogle Scholar
Hartley, Ch. and Watson, L. 2010. “Is feminist political liberalism possible?Journal of Ethics & Social Philosophy 5: 121.CrossRefGoogle Scholar
Keating, J. 2014. “The Problem with the Right to be Forgotten.” Accessed September 23, 2014 from www.slate.com/blogs/the_world_/2014/05/13/the_eu_s_misguided_push_for_a_right_to_be_forgotten_on_the_internet.html.Google Scholar
Kelly, K. and McPherson, L. 2001. “On tolerating the unreasonable,” Journal of Political Philosophy 9: 3855.CrossRefGoogle Scholar
Lafont, C. 2008. “Religious citizens & public reasons.” The Immanent Frame. Accessed September 5, 2014 from http://blogs.ssrc.org/tif/2008/02/08/religious-citizens-public-reasons/.Google Scholar
Lafont, C. 2009. “Religion and the public sphere,” Philosophy and Social Criticism 35: 127–50.CrossRefGoogle Scholar
Larmore, C. 1990. “Political liberalism,” Political Theory 18: 339–60.CrossRefGoogle Scholar
Larmore, C. 1999. “The Moral Basis of Political Liberalism,” Journal of Philosophy 96: 599625.Google Scholar
Larmore, C. 2003. “Public Reason,” in Freeman, S (ed.) The Cambridge Companion to Rawls. Cambridge University Press.Google Scholar
Lever, A. 2012. On Privacy. New York: Routledge.Google Scholar
Lever, A. 2015. “Privacy and democracy: what the secret ballot reveals,” Law, Culture and the Humanities (forthcoming).CrossRefGoogle Scholar
Lukes, S. 1978. “Power and Authority,” in Bottomore, T. B. and Nisbet, R. (eds.) A History of Sociological Analysis. London: Basic Books, pp. 633–76.Google Scholar
Macedo, S. 1991. Liberal Virtues: Citizenship, Virtue, and Community in Liberal Constitutionalism. Oxford: Clarendon Press.Google Scholar
MacKinnon, C. 1989. Toward a Feminist Theory of the State. Cambridge, MA: Harvard University Press.Google Scholar
Mendus, S. 2008. “Private Faces in Public Faces,” in Kramer, M. H., Grant, C. and Hatzistavrou, A. (eds.) The Legacy of H.L.A. Hart’s Legal, Political, and Moral Philosophy. Oxford University Press, pp. 299315.CrossRefGoogle Scholar
Merry, M. 2007. Culture, Identity and Islamic Schooling: A Philosophical Approach. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
Mokrosinska, D. 2014. “Privacy and the integrity of liberal politics: the case of governmental internet searches,” Journal of Social Philosophy 45: 369–89.CrossRefGoogle Scholar
Moore, A. 2000. “Employee monitoring and computer technology: evaluative surveillance v. privacy,” Business Ethics Quarterly 10: 697707.CrossRefGoogle Scholar
Nagel, T. 1998. “Concealment and exposure,” Philosophy & Public Affairs 27: 330.CrossRefGoogle Scholar
Pateman, C. 1989. “Feminist Critiques of the Public/Private Dichotomy,” in Pateman, C.The Disorder of Women: Democracy, Feminism, and Political Theory. Stanford University Press, pp. 118–40.Google Scholar
Quong, J. 2013. “Public Reason,” in Zalta, E. N. (ed.) The Stanford Encyclopedia of Philosophy. Accessed September 2014 from http://plato.stanford.edu/archives/sum2013/entries/public-reason.Google Scholar
Rawls, J. 1971. A Theory of Justice. Cambridge, MA: Harvard University Press.CrossRefGoogle Scholar
Rawls, J. 1996. Political Liberalism. Second revised edition (with a new introduction and the "Reply to Habermas"). New York: Columbia University Press.Google Scholar
Russon, M. 2014. “Google’s Right to be Forgotten: 70,000 Politicians, Criminals and Individuals want Offending Content Erased.” Accessed September 23, 2014 from www.ibtimes.co.uk/googles-right-be-forgotten-70000-politicians-criminals-individuals-want-offending-content-1456603.Google Scholar
Schauer, F. 2000. “Can public figures have private lives?Social Philosophy and Policy 17: 293309.CrossRefGoogle Scholar
Thompson, D. 1987. Political Ethics and Public Office. Cambridge, MA.: Harvard University Press.Google Scholar
Thompson, D. 2004. “Public reason and precluded reasons,” Fordham Law Review 73: 2073–88.Google Scholar
Thompson, D. 2005. Restoring Responsibility: Ethics in Government, Business, and Healthcare. Cambridge University Press.Google Scholar
Thompson, D. and Gutmann, A. 1996. Democracy and Disagreement. Cambridge, MA: Belknap Press.Google Scholar
Waldron, J. 1993. “Theoretical Foundations of Liberalism,” in Waldron, J.Liberal Rights: Collected Papers 1981–1991. Cambridge University Press, pp. 3562.Google Scholar
Wall, S. and Klosko, G. 2003. Perfectionism and Neutrality: Essays in Liberal Theory. Lanham: Rowman & Littlefield.Google Scholar

References

Abelson, H., Ledeen, K. and Lewis, H. R. 2008. Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion. Boston: Addison-Wesley Professional.Google Scholar
ACLU (American Civil Liberties Union) 2013. “Supreme Court Dismisses ACLU’s Challenge to NSA Warrantless Wiretapping Law.” Accessed February 26, 2013 from www.aclu.org/national-security/supreme-court-dismisses-aclus-challenge-nsa-warrantless-wiretapping-law.Google Scholar
Allen, A. 1988. Uneasy Access: Privacy for Women in a Free Society. Totowa: Rowman and Littlefield.Google Scholar
Arendt, H. 1958. The Human Condition. Chicago University Press.Google Scholar
Austin, L. M. 2012. “Getting past privacy? Surveillance, the Charter and the rule of law,” Canadian Journal of Law and Society 27(3): 381–98.CrossRefGoogle Scholar
Bennett, C. J. 1992. Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Ithaca, NY: Cornell University Press.CrossRefGoogle Scholar
Bennett, C. J. and Raab, C. D. 2006. The Governance of Privacy: Policy Instruments in Global Perspective. Cambridge, MA: MIT Press.Google Scholar
Bennett, C. J.Parsons, C. and Molnar, A. 2014a. “Real and substantial connections: enforcing Canadian privacy laws against American social networking companies,” Journal of Law, Information & Science 23(1): 124.Google Scholar
Bennett, C. J., Parsons, C., and Molnar, A. 2014b. “Forgetting, Non-Forgetting and Quasi-Forgetting in Social Networking: Canadian Policy and Corporate Practice,” in Gutwirth, S., Leenes, R., and De Hert, P. (eds.) Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges. New York: Springer, pp. 4160.CrossRefGoogle Scholar
Berners-Lee, T., Fischetti, M. and Michael, L. 2000. Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by Its Inventor. New York: Harper Business.Google Scholar
boyd, d. 2011. “Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications,” in Papacharissi, Z. (ed.) A Networked Self: Identity, Community, and Culture on Social Network Sites. New York: Routledge, pp. 39–58.Google Scholar
Cronin, C. and DeGreiff, P. (eds.) 1998. The Inclusion of the Other: Studies in Political Theory. Cambridge, MA: MIT Press.Google Scholar
Danezis, G. and Clayton, R. 2007. “Introducing Traffic Analysis,” in Acquisti, A., Gritzalis, S., Lambrinoudakis, C., and Vimercati, S. di (eds.) Digital Privacy: Theory, Technologies, and Practices. New York: Auerbach, pp. 95–116.Google Scholar
DeCew, J. Wagner 1997. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Ithaca, NY: Cornell University Press.CrossRefGoogle Scholar
Diffie, W. and Landau, S. 2007. Privacy on the Line: The Politics of Wiretapping and Encryption. Cambridge, MA: MIT Press.Google Scholar
Electronic Frontier Foundation, 2013. “First Unitarian Church of Los Angeles v. NSA.” Accessed from www.eff.org/cases/first-unitarian-church-los-angeles-v-nsa.Google Scholar
Etzioni, A. 1999. The Limits of Privacy. New York: Basic Books.Google Scholar
European Union Article 29 Working Party 2009. Opinion 5/2009 on Online Social Networking. 01189/09/enwp163. Adopted on 12 June.Google Scholar
Feiler, L. 2010. “The legality of data retention directive in light of the fundamental rights to privacy and data protection,” European Journal of Law and Technology 1(3). Accessed from http://ejlt.org/article/view/29/75.Google Scholar
Fuchs, C. 2010. Internet and Society: Social Theory in the Information Age. New York: Routledge.Google Scholar
Gallagher, S. 2013. “Googlers say ‘f*** you’ to NSA, company encrypts internal network,” Ars Technica, 6 November. Accessed from http://arstechnica.com/information-technology/2013/11/googlers-say-f-you-to-nsa-company-encrypts-internal-network/.Google Scholar
Habermas, J. 1996. Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Habermas, J. 1998a. “A Genealogical Analysis of the Cognitive Content of Morality,” in Cronin, C. and DeGreiff, P. (eds.) The Inclusion of the Other: Studies in Political Theory. Cambridge, MA: MIT Press, pp. 3–46.Google Scholar
Habermas, J. 1998b. “Three Normative Models of Democracy,” in Cronin, C. and DeGreiff, P. (eds.), The Inclusion of the Other: Studies in Political TheoryCambridge, MA: The MIT Press, pp. 239–52.Google Scholar
Haggerty, K. and Ericson, R. (eds.) 2006. The New Politics of Surveillance and Visibility. University of Toronto Press.Google Scholar
Hindman, M. 2009. The Myth of Digital Democracy. Princeton University Press.CrossRefGoogle Scholar
Kaye, B. K. 2011. “Between Barack and a Net Place: Motivations for Using Social Network Sites and Blogs for Political Information,” in Papacharissi, Z. (ed.) A Networked Self: Identity, Community, and Culture on Social Network Sites. New York: Routledge, pp. 208–31.Google Scholar
Kerr, I., Binnie, M. and Aoki, C. 2008. “Tessling on my brain: the future of lie detection and brain privacy in the criminal justice system,” Canadian Journal of Criminology and Criminal Justice 50(3): 367–87.Google Scholar
Kies, R. 2010. Promises and Limits of Web-deliberation. New York: Palgrave Macmillan.CrossRefGoogle Scholar
Kravets, D. 2010. “Judge Tosses NSA Spy Cases,” Wired Online, January 2010. Accessed from www.wired.com/threatlevel/2010/01/nsa-spy-cases-tossed/.Google Scholar
MacKinnon, R. 2012. Consent of the Networked: The Worldwide Struggle for Internet Freedom. New York: Basic Books.Google Scholar
Mayer-Schönberger, V. and Cukier, K. 2013. Big Data: A Revolution that Will Transform how We Live, Work, and Think. New York: Houghton-Mifflin-Harcourt.Google Scholar
Mergel, I. 2012. Social Media in the Public Sector: A Guide to Participation, Collaboration and Transparency in the Networked World. San Francisco: Jon Wiley & Sons, Inc.Google Scholar
Mill, J. S. 1859. Three Essays. Oxford University Press.Google Scholar
Millar, J. 2009. “Core Privacy: A Problem for Predictive Data Mining,” in Kerr, I., Lucock, C. and Steeves, V. (eds.) Lessons from the Identity Trail. Oxford University Press, pp. 103–20.Google Scholar
Nippert-Eng, C. E. 2010. Islands of Privacy. University of Chicago Press.CrossRefGoogle Scholar
Nissenbaum, H. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.CrossRefGoogle Scholar
Opsahl, K. 2013. “Why Metadata Matters,” Electronic Frontier Foundation (EFF), June 7. Accessed from www.eff.org/deeplinks/2013/06/why-metadata-matters.Google Scholar
Regan, P. M. 1995. Legislating Privacy: Technology, Social Values and Public Policy. Chapel Hill: University of North Carolina Press.Google Scholar
Saveri, A., Rheingold, H. and Vian, K. 2005. “Technologies of Cooperation,” Institute for the Future. Accessed from www.rheingold.com/cooperation/Technology_of_cooperation.pdf.Google Scholar
Schoeman, F. D. 1992. Privacy and Social Freedom. Cambridge University Press.CrossRefGoogle Scholar
Schwartz, P. M. 1999. “Privacy and democracy in cyberspace,” Vanderbilt Law Review 52: 1610–702.Google Scholar
Solove, D. J. 2008. Understanding Privacy. Cambridge, MA: Harvard University Press.Google Scholar
Stalder, F. 2002. “Privacy is not the antidote to surveillance,” Surveillance and Society 1(1): 120–4.Google Scholar
Steeves, V. 2009. “Reclaiming the Social Value of Privacy,” in Kerr, I., Lucock, C. and Steeves, V. (eds.) Lessons from the Identity Trail. Oxford University Press, pp. 191–208.Google Scholar
Strandburg, K. J. 2007. “Surveillance of Emergent Associations: Freedom of Association in a Network Society,” in Acquisti, A., Gritzalis, S., Lambrinoudakis, C. and Vimercati, S. di (eds.) Digital Privacy: Theory, Technologies, and Practices. New York: Auerbach, pp. 435–58.Google Scholar
Taddicken, M. 2012. “Privacy, Surveillance, and Self-Disclosure in the Social Web: Exploring the User’s Perspective via Focus Groups,” in Fuchs, C., Boersma, K., Albrechtslund, A. and Sandoval, M. (eds.) Internet and Surveillance: The Challenges of Web 2.0 and Social Media. New York: Routledge, pp. 255–72.Google Scholar
Turkle, S. 2012. Alone Together: Why We Expect More from Technology and Less from Each Other. New York: Basic Books.Google Scholar
Warren, S. and Brandeis, L. 1890The right to privacy,” Harvard Law Review 4(5): 193220.CrossRefGoogle Scholar
Westin, A. F. 1967. Privacy and Freedom. New York: Atheneum.Google Scholar
Young, I. M. 2001. “Activist challenges to deliberative democracy,” Political Theory 29(5): 670–90.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×