Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-42gr6 Total loading time: 0 Render date: 2024-04-25T03:48:03.729Z Has data issue: false hasContentIssue false

3 - Privacy and the common good: revisited

from Part I - The social dimensions of privacy

Published online by Cambridge University Press:  05 July 2015

Beate Roessler
Affiliation:
Universiteit van Amsterdam
Dorota Mokrosinska
Affiliation:
Universiteit Leiden
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Social Dimensions of Privacy
Interdisciplinary Perspectives
, pp. 50 - 70
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Altman, I. 1975. The Environment and Social Behavior. Monterey: Brooks/Cole.Google Scholar
Bailey, J., Steeves, V., Burkell, J. and Regan, P. 2013. “From ‘bicycle face’ to Facebook: Negotiating with gender stereotypes on social networking sites,” Journal of Communication Inquiry 37(2): 91112.CrossRefGoogle Scholar
Barocas, S. and Nissenbaum, H. 2014. “Big Data’s End Run around Anonymity and Consent,” in Lane, J., Stodden, V., Bender, S. and Nissenbaum, H. (eds.), Privacy, Big Data, and the Public Good. New York: Cambridge University Press, pp. 4475.CrossRefGoogle Scholar
Bijker, W. and Law, J. (eds.) 1992. Shaping Technology. Cambridge, MA: MIT Press.Google Scholar
boyd, d. and Marwick, A. 2011. Social Privacy in Networked Publics: Teens Attitudes, Practices and Strategies. SSRN, online: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1925128.Google Scholar
Calore, M. 2006. “Privacy Fears Shock Facebook,” Wired News (September 6). Accessed from: www.wired.com/news/culture/1,71739-0.html.Google Scholar
Coase, R. 1974. “The lighthouse in economics,” Journal of Law and Economics” 17(2): 357–76.Google Scholar
Cohen, J. 2000. “Examined lives: informational privacy and the subject as object,” Stanford Law Review 52(5): 1373–438.CrossRefGoogle Scholar
Cohen, J. 2012. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven: Yale University Press.Google Scholar
Dewey, J. 1927. The Public and its Problems. Chicago: Swallow Press.Google Scholar
Drake, B. 2013. “A Year After Newtown, Little Change in Public Opinion on Guns,” Pew Research Center (December 12). Accessed from: www.pewresearch.org/fact-tank/2013/12/12/a-year-after-newtown-little-change-in-public-opinion-on-guns/.Google Scholar
Friedrich, C. J. 1971. “Secrecy versus Privacy,” in Pennock, J. R. and Chapman, J. W. (eds.), Privacy, Nomos Series 13, Yearbook of the American Society for Political and Legal Philosophy. New York: Atherton Press, pp. 105–20.Google Scholar
Goffman, E. 1959. The Presentation of Self in Everyday Life. Garden City: Doubleday.Google Scholar
Greenwood, D., Stopczynski, A., Sweatt, B., Hardjono, T., and Pentland, A. 2014. “The New Deal on Data: A Framework for Institutional Controls,” in Lane, J., Stodden, V., Bender, S. and Nissenbaum, H. (eds.), Privacy, Big Data, and the Public Good. New York: Cambridge University Press, pp. 192210.CrossRefGoogle Scholar
Hardin, G. 1968. “The tragedy of the commons,” Science 162: 1243–8.CrossRefGoogle ScholarPubMed
Hirsch, D. D. 2014. “The glass house effect: Big data, the new oil, and the power of analogy,” Maine Law Review 66: 373–96.Google Scholar
Hixson, R. F. 1987. Privacy in a Public Society: Human Rights in Conflict. New York: Oxford University Press.Google Scholar
Johnson, D. G., Regan, P. M. and Wayland, K. 2011. “Campaign disclosure, privacy and transparency,” William and Mary Bill of Rights Journal 19(4): 959–82.Google Scholar
Johnson, D. G. and Regan, P. M. (eds.) 2014. Transparency and Surveillance as Sociotechnical Accountability: A House of Mirrors. New York: Routledge.CrossRefGoogle Scholar
Kirkpatrick, D. 2010. The Facebook Effect. New York: Simon & Schuster.Google Scholar
Koonin, S. E. and Holland, M. J. 2014. “The Value of Big Data for Urban Science,” in Lane, J., Stodden, V., Bender, S. and Nissenbaum, H. (eds.), Privacy, Big Data, and the Public Good. New York: Cambridge University Press, pp. 13752.CrossRefGoogle Scholar
Latour, B. 1992. “Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts,” in Bijker, W. and Law, J. (eds.), Shaping Technology/Building Society: Studies in Sociotechnical Change. Cambridge, MA: MIT Press, pp. 225–58.Google Scholar
Lessig, L. 1999. Code and Other Laws of Cyberspace. New York: Basic Books.Google Scholar
Livingstone, S. 2005. “Mediating the public/private boundary at home: Children’s use of the internet for privacy and participation,” Journal of Media Practice 6(1): 4151.CrossRefGoogle Scholar
Livingstone, S. 2008. “Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression,” New Media and Society 10(3): 393411.CrossRefGoogle Scholar
Marwick, A. and boyd, d. 2015. “Theorizing Networked Privacy,” New Media and Society, 10th Anniversary of Facebook special issue (forthcoming).Google Scholar
McCarthy, C. 2009. “Facebook Beacon Has Poked its Last” The Social (September 18). Accessed from: http://news.cnet.com/the-social/?keyword=Beacon.Google Scholar
Merton, R. 1957. Social Theory and Social Structure. Glencoe: Free Press.Google Scholar
Nissenbaum, H. 1997. “Toward an approach to privacy in public: The challenges of information technology,” Ethics and Behavior 7(3): 207–19.CrossRefGoogle Scholar
Nissenbaum, H. 2010. Privacy in Context: Technology, Policy and the Integrity of Social Life. Stanford University Press.Google Scholar
Ohm, P. 2014. “Changing the Rules: General Principles for Data Use and Analysis,” in Lane, J., Stodden, V., Bender, S. and Nissenbaum, H. (eds.), Privacy, Big Data, and the Public Good. New York: Cambridge University Press, pp. 96111.CrossRefGoogle Scholar
Ostrom, E. 1990. Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge University Press.CrossRefGoogle Scholar
Pennock, J. R. and Chapman, J. W. (eds.) 1971. Privacy, Nomos Series 13, Yearbook of the American Society for Political and Legal Philosophy. New York: Atherton Press.Google Scholar
Perez, S. 2010. “The 3 Facebook Settings Every User Should Check Now.” New York Times. January 20. Accessed from: www.readwriteweb.com/archives/the_3_facebook_settings_every_user_should_check_now.php.Google Scholar
Post, R. 1989. “The social foundations of privacy: Community and self in the common law tort,” California Law Review 77(5): 9571010.CrossRefGoogle Scholar
Rachels, J. 1975. “Why privacy is important,” Philosophy and Public Affairs 4: 32333.Google Scholar
Regan, P. M. 1995. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina Press.Google Scholar
Regan, P. M. 2002. “Privacy as a common good,” Information, Communication and Society 5(3): 382405.CrossRefGoogle Scholar
Regan, P. M. and Monahan, T. 2014. “Fusion center accountability and intergovernmental information sharing,” Publius: The Journal of Federalism (Summer/Annual Review) 44(3): 475–98.CrossRefGoogle Scholar
Regan, P. M. and Steeves, V. 2010. “Kids R Us: Online social networking and the potential for empowerment,” Surveillance and Society 8(2): 151–65.CrossRefGoogle Scholar
Roessler, B. 2005. The Value of Privacy. Cambridge: Polity Press.Google Scholar
Rotenberg, M. 2010. Testimony for Hearing on Online Privacy, Social Networking and Crime Victimization, before the Subcommittee on Crime, Terrorism and Homeland Security of the House Committee on the Judiciary. July 28.Google Scholar
Scanlon, T. 1975. “Thomson on privacy,” Philosophy and Public Affairs 4: 315–22.Google Scholar
Schoeman, F. 1984. “Privacy and Intimate Information,” in Schoeman, F. (ed.), Philosophical Dimensions of Privacy. Cambridge University Press, pp. 403–18.CrossRefGoogle Scholar
Schoeman, F. 1992. Privacy and Social Freedom. Cambridge University Press.CrossRefGoogle Scholar
Simitis, S. 1987. “Reviewing privacy in an information society,” University of Pennsylvania Law Review 135: 707–46.CrossRefGoogle Scholar
Simmel, A. 1971. “Privacy Is Not an Isolated Freedom,” in Pennock, J. R. and Chapman, J. W. (eds.), Privacy, Nomos Series 13, Yearbook of the American Society for Political and Legal Philosophy. New York: Atherton Press, pp. 7187.Google Scholar
Solove, D. 2002. “Access and aggregation: Public records, privacy and the Constitution,” Minnesota Law Review 86: 1137.Google Scholar
Solove, D. 2008. Understanding Privacy. Cambridge, MA: Harvard University Press.Google Scholar
Sprenger, P. 1999. “Sun on Privacy: ‘Get Over It’,” Wired (January 26). Accessed at: http://archive.wired.com/politics/law/news/1999/01/17538.Google Scholar
Steeves, V. 2009. “Reclaiming the Social Value of Privacy,” in Kerr, I., Steeves, V. and Lucock, C. (eds.), Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. New York: Oxford University Press, pp. 191208.Google Scholar
Thomson, J. J. 1975. “The right to privacy,” Philosophy and Public Affairs 4: 295314.Google Scholar
Warren, S. D. and Brandeis, L. D. 1890. “The right to privacy,” Harvard Law Review, 4(5): 193220.CrossRefGoogle Scholar
Westin, A. 1967. Privacy and Freedom. New York: Atheneum.Google Scholar
Westlake, E. J. 2008. “Friend me if you Facebook: Generation Y and performative surveillance,” TDR: The Drama Review 52(4): 2140.CrossRefGoogle Scholar
Winner, L. 1986. “Do Artifacts Have Politics?” in Winner, L. (ed.), The Whale and the Reactor: A Search for Limits in an Age of High Technology. University of Chicago Press, pp. 1939.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×