Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-x24gv Total loading time: 0 Render date: 2024-04-30T19:24:44.728Z Has data issue: false hasContentIssue false

32 - Privacy after the Agile Turn

from Part V - New Approaches to Improve the Status Quo

Published online by Cambridge University Press:  18 April 2018

Evan Selinger
Affiliation:
Rochester Institute of Technology, New York
Jules Polonetsky
Affiliation:
Future of Privacy Forum
Omer Tene
Affiliation:
International Association of Privacy Professionals
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Agre, Philip E.Surveillance and capture: Two models of privacy.” The Information Society, vol. 10, no. 2 (1994): 101127.CrossRefGoogle Scholar
Altaweel, Ibrahim, Good, Nathan, and Hoofnagle, Chris Jay. “Web privacy census.” Technology Science ( 2015 ). Available at http://techscience.org/a/2015121502/.Google Scholar
Anthonysamy, Pauline, and Rashid, Awais. “Software engineering for privacy in-the-large.” In Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, vol. 2, pp. 947948. Florence: IEEE, 2015.Google Scholar
Article 29 Working Party. (2010a). “Opinion 1/2010 on the concepts of ‘controller’ and ‘processor,’” Brussels, 2010. Available at http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp169_en.pdf.Google Scholar
Article 29 Working Party. (2010b). “Opinion 2/2010 on online behavioural advertising,” Brussels, 2010. Available at http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp171_en.pdf.Google Scholar
Article 29 Working Party. “Opinion 05/2012 on cloud computing,” Brussels, (2012). Available at http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2012/wp196_en.pdf.Google Scholar
Baldwin, Carliss Y.Modularity and organizations.” In International Encyclopedia of the Social & Behavioral Sciences. Orlando, FL: Elsevier, 2nd ed. (2015): 718723.Google Scholar
Baldwin, Carliss Y., and Clark, K. B.. “Managing in an age of modularity.” Harvard Business Review vol. 75, no. 5 (1997): 8493.Google Scholar
Bamberger, Kenneth A., and Mulligan, Deirdre K.. Privacy on the Ground Driving Corporate Behavior in the United States and Europe. Cambridge, MA: MIT Press, 2015.CrossRefGoogle Scholar
Barocas, Solon. “Big data are made by (and not just a resource for) social science and policy-making” (Abstract), Internet, Politics, Policy 2012 Conference, Oxford University (2012). Available at http://ipp.oii.ox.ac.uk/2012/programme-2012/track-c-data-methods/panel-1c-what-is-big-data/solon-barocas-big-data-are-made-by-and.Google Scholar
Beck, K., Beedle, M., Van Bennekum, A., Cockburn, A., Cunningham, W., Fowler, M., … & Kern, J. Manifesto for Agile Software Development (2001).Google Scholar
Black, Benjamin. “EC2 origins.” Jan. 25, 2009. Available at http://blog.b3k.us/2009/01/25/ec2-origins.html.Google Scholar
Blanchette, Jean-François. “Introduction: Computing’s infrastructural moment.” In Yoo, Christopher S. and Blanchette, Jean-François (eds.), Regulating the Cloud: Policy for Computing Infrastructure. Cambridge, MA: MIT Press (2015): 121.Google Scholar
Bolton, Doug. “Facebook ‘Like’ button may be against the law, German court rules.” The Independent, Mar. 10, 2016. Available at http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-like-button-illegal-data-protection-germany-court-a6923026.html.Google Scholar
Bonneau, Joseph, Felten, Edward W., Mittal, Prateek, and Narayanan, Arvind. “Privacy concerns of implicit secondary factors for web authentication.” In SOUPS Workshop on “Who are you?! Adventures in Authentication (WAY).” Menlo Park, CA, July 9, 2014.Google Scholar
Brown, Emma. “UC-Berkeley students sue Google, alleging their emails were illegally scanned.” The Washington Post, Feb. 1, 2016. Available at https://www.washingtonpost.com/news/grade-point/wp/2016/02/01/uc-berkeley-students-sue-google-alleging-their-emails-were-illegally-scanned/.Google Scholar
Carlson, Lucas. “4 ways Docker fundamentally changes application development.” InfoWorld, Sept. 18, 2014. Available at http://www.infoworld.com/article/2607128/application-development/4-ways-docker-fundamentally-changes-application-development.html.Google Scholar
Cohen, Julie E.What privacy is for.” Harvard Law Review, vol. 126, no. 7 (2012): 1904.Google Scholar
Cate, Fred H., and Mayer-Schönberger, Viktor. “Notice and consent in a world of Big Data.” International Data Privacy Law, vol. 3, no. 2 (2013): 6773.CrossRefGoogle Scholar
Clark, David D., Wroclawski, John, Sollins, Karen R., and Braden, Robert. “Tussle in cyberspace: Defining tomorrow’s internet.” In ACM SIGCOMM Computer Communication Review, vol. 32, no. 4 (2002): 347356.CrossRefGoogle Scholar
Cloud Native Computing Foundation (2016). Available at https://cncf.io/.Google Scholar
Dörbecker, Regine, and Böhmann, Tilo. “The concept and effects of service modularity: A literature review.” In System Sciences (HICSS), 2013 46th Hawaii International Conference on System Sciences, pp. 13571366. Wailea, Maui, HI: IEEE, 2013.Google Scholar
Douglass, Bruce P. Agile Systems Engineering. Waldman, MA: Morgan Kaufmann, 2015.Google Scholar
Englehardt, Steven, and Narayanan, Arvind (2016). “Online tracking: A 1-million-site measurement and analysis.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS’16), pp. 1388–1401.CrossRefGoogle Scholar
Erickson, Seth, and Kelty, Christopher M.. “The durability of software.” In Kaldrack, Irina and Leeker, Martina (eds.), There Is No Software, There Are Just Services. Lüneburg, Germany: Meson Press (2015): 3956.Google Scholar
Estler, Hans-Christian, Nordio, Martin, Furia, Carlo A., Meyer, Bertrand and Schneider, Johannes. “Agile vs. structured distributed software development: A case study.” Empirical Software Engineering, vol. 19, no. 5 (2014): 11971224.CrossRefGoogle Scholar
Exposito, Ernesto, and Diop, Code. Smart SOA Platforms in Cloud Computing Architectures. Hoboken, NJ: John Wiley & Sons, 2014.Google Scholar
Fay, Joe. “Assembly of tech giants convene to define future of computing.” The Register, Dec. 18, 2015. Available at http://www.theregister.co.uk/2015/12/18/cloud_native_computer_cloud_native/.Google Scholar
Fitz, Timothy. “Continuous deployment at IMVU: Doing the impossible fifty times a day.” Blog Post, February 10, 2009. Available at https://www.timothyfitz.com.Google Scholar
Fox, Armando, and Patterson, David. Engineering Software as a Service: An Agile Approach Using Cloud Computing, Strawberry Canyon LLC, 2nd ed., 2013.Google Scholar
Fuchs, Christian. “Class and exploitation on the internet.” In Trebor, Scholz (ed.), Digital Labor: The Internet as Playground and Factory. New York and London: Routledge (2013): 211224.Google Scholar
Google. “Updating our privacy policies and terms of service.” Official Blog. Jan. 24, 2012. Available at https://googleblog.blogspot.com/2012/01/updating-our-privacy-policies-and-terms.html.Google Scholar
Google. “Ten things we know to be true.” (2016). Available at https://www.google.com/about/company/philosophy/.Google Scholar
Gürses, Seda, and del Alamo, Jose M.. “Privacy engineering: Shaping an emerging field of research and practice.” IEEE Security & Privacy, vol. 14, no. 2 (2016): 4046.CrossRefGoogle Scholar
Helmond, Anne. “The platformization of the web: Making web data platform ready.” Social Media+ Society, vol. 1, no. 2, 2015: 111.Google Scholar
Hook, Leslie. “Cloud computing titans battle for AI supremacy,” Financial Times, Dec. 5, 2016. Available at https://www.ft.com/content/bca4876c-b7c9-11e6-961e-a1acd97f622d.Google Scholar
Humble, Jez, and Farley, David. Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation (Adobe Reader). London: Pearson Education, 2010.Google Scholar
iOvation. “iOvation launches passwordless security for consumer-facing websites.” Feb. 29, 2016. Available at https://www.iovation.com/news/press-releases/iovation-launches-passwordless-security-for-consumer-facing-websites.Google Scholar
Jamieson, Jack. “Many (to platform) to many: Web 2.0 application infrastructures.” First Monday, vol. 21, no. 6 (2016). doi:10.5210/fm.v21i6.6792.Google Scholar
Kaldrack, Irina, and Leeker, Martina. “Introduction.” In Kaldrack, Irina and Leeker, Martina (eds.), There Is No Software, There Are Just Services. Lüneburg, Germany: Meson Press (2015): 920.Google Scholar
Kant, Tanya. “FCJ-180 ‘Spotify has added an event to your past’:(Re) writing the self through Facebook’s autoposting apps.” The Fibreculture Journal, vol. 2015, no. 25, 2015: Apps and Affect (2015).Google Scholar
Knorr, Eric. “2016: The year we see the real cloud leaders emerge,” InfoWorld, Jan. 4, 2016. Available at http://www.infoworld.com/article/3018046/cloud-computing/2016-the-year-we-see-the-real-cloud-leaders-emerge.html.Google Scholar
Fowler, Martin, and Lewis, James. “Microservices a definition of this new architectural term” (2014). Available at http://martinfowler.com/articles/microservices.html.Google Scholar
Mahoney, Michael S.Finding a history for software engineering.” IEEE Annals of the History of Computing, vol. 26, no. 1 (2004): 819.CrossRefGoogle Scholar
Metz, Cade. Google open sources its secret weapon in cloud computing. WIRED, Oct. 10, 2014. Available at https://www.wired.com/2014/06/google-kubernetes/Google Scholar
Neubert, Christoph. “‘The tail on the hardware dog’: Historical articulations of computing machinery, software, and services.” In Kaldrack, Irina and Leeker, Martina (eds.), There Is No Software, There Are Just Services. Lüneburg, Germany: Meson Press (2015).Google Scholar
Newcomer, Eric, and Lomow, Greg. Understanding SOA with Web services. Upper Saddle River, NJ: Addison-Wesley, 2005.Google Scholar
Nissenbaum, Helen. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, 2009.Google Scholar
Nissenbaum, Helen. “Must privacy give way to use regulation?” Lecture at the Watson Institute, Brown University, March 15, 2016. Available at http://watson.brown.edu/events/2016/helen-nissenbaum-must-privacy-give-way-use-regulation.CrossRefGoogle Scholar
O’Reilly, Tim. “What is web 2.0: Design patterns and business models for the next generation of software” (2005). Retrieved March 2006. Available at http://www.oreilly.com/pub/a/web2/archive/what-is-web-20.html.Google Scholar
Palen, Leysia, and Dourish, Paul. “Unpacking privacy for a networked world.” In Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 129136. Ft. Lauderdale, FL: ACM, 2003.Google Scholar
Parson, D. “Agile software development methodology, an ontological analysis.” Massey University, Aukland (2011). Available at http://www.davidparsons.ac.nz/papers/agile%20ontology.pdf.Google Scholar
Pearson, Siani. “Taking account of privacy when designing cloud computing services.” In Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 4452. Washington, DC: IEEE Computer Society, 2009.CrossRefGoogle Scholar
Pringle, Tom, Baer, T. and Brown, G.. “Data-as-a-service: The next step in the as-a-service journey.” In Oracle Open World Conference, San Francisco, 2014.Google Scholar
Rodden, Kerry, Fu, Xin, Aula, Anne, and Spiro, Ian. “Eye-mouse coordination patterns on web search results pages.” In: Czerwinski, Mary, Lund, Arnie and Tan, Desney. CHI’08 Extended Abstracts on Human Factors in Computing Systems. Florence, Italy: ACM (2008): 29973002.CrossRefGoogle Scholar
Roy, Jacques. The Power of Now: Real-Time Analytics and IBM Infosphere Streams. New York: McGraw Hill Education, 2015.Google Scholar
Rouvroy, Antoinette, and Poullet, Yves. “The right to informational self-determination and the value of self-development: Reassessing the importance of privacy for democracy.” In: Gutwirth, S., Poullet, Y., De Hert, P., de Terwangne, C., Nouwt, S. (eds.), Reinventing Data Protection? Dordrecht: Springer (2009): 4576.CrossRefGoogle Scholar
Schechner, Sam, and Efrati, Amir. “EU privacy watchdogs blast Google’s data protection.” The Wall Street Journal, Updated Oct. 16, 2012. https://www.wsj.com/articles/SB10000872396390443675404578060501067902658Google Scholar
Scholz, Trebor, ed. Digital Labor: The Internet as Playground and Factory. New York and London: Routledge, 2012.CrossRefGoogle Scholar
Sculley, D., Phillips, Todd, Ebner, Dietmar, Chaudhary, Vinay and Young, Michael. “Machine learning: The high-interest credit card of technical debt.” NIPS 2014 Workshop on Software Engineering for Machine Learning. Saturday December 13, 2014. Montreal, QC, Canada. (2014).Google Scholar
Shilton, Katie, and Greene, Daniel. “Because privacy: Defining and legitimating privacy in ios development.” IConference 2016 Proceedings, Philadelphia, PA (2016).Google Scholar
Simon, Herbert A.The architecture of complexity.” Proceedings of the American Philosophical Society, vol. 106, no. 6 (1962): 467482.Google Scholar
Stutz, David. “The failure of shrinkwrap software” (2003). Available at http://www.synthesist.net/writing/failureofshrinkwrap.html.Google Scholar
Turow, Joseph. The Daily You: How the New Advertising Industry Is Defining Your Identity and Your Worth. New Haven: Yale University Press, 2012.Google Scholar
Van Hoboken, Joris. “From collection to use in privacy regulation? A forward looking comparison of European and U.S. frameworks for personal data processing.” In Van der Sloot, Bart, Broeders, Dennis and Schrijvers, Erik (eds.), Exploring the Boundaries of Big Data. Amsterdam: Amsterdam University Press (2016): 231259.Google Scholar
Van Hoboken, Joris, and Rubinstein, Ira. “Privacy and security in the cloud: Some realism about technical solutions to transnational surveillance in the post-Snowden era.” Maine Law Review, vol. 66, no. 2 (2013): 488.Google Scholar
Van Schewick, Barbara. Internet Architecture and Innovation. Cambridge, MA: MIT Press (2012).Google Scholar
Weinman, Joe. “Cloud strategy and economics.” In Yoo, Christopher S. and Blanchette, Jean-François (eds.), Regulating the Cloud: Policy for Computing Infrastructure. Cambridge, MA: MIT Press (2015): 2160.Google Scholar
Wiedemann, Christin. The Science of Testing, Christin’s Blog on Testing. Available at: https://christintesting.wordpress.com/2013/04/07/the-science-of-testing/Google Scholar
Xu, Lai, and Brinkkemper, Sjaak. “Concepts of product software: Paving the road for urgently needed research.” In the First International Workshop on Philosophical Foundations of Information Systems Engineering (PHISE’05). Porto, Portugal: FEUP Press (2005): 523528.Google Scholar
Yegge, Steve. “Stevey’s Google platforms rant.” (2011). Available at https://gist.github.com/chitchcock/1281611.Google Scholar
Yoo, Christopher S.Modularity theory and internet regulation.” University of Illinois Law Review, vol. 2016 (2016): 162.Google Scholar
Yoo, Christopher S., and Blanchette, Jean-François (eds.) Regulating the Cloud: Policy for Computing Infrastructure. Cambridge, MA: MIT Press, 2015.Google Scholar
Ziewitz, Malte. “Governing algorithms myth, mess, and methods.” Science, Technology & Human Values, vol. 41, no. 1 (2016): 316.Google Scholar
Zittrain, Jonathan. The Future of the Internet And How to Stop It. New Haven and London: Yale University Press, 2008.Google Scholar
Zuboff, S. Big other: Surveillance capitalism and the prospects of an information civilization. Journal of Information Technology, vol. 30, no. 1 (2015): 7589.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×