Linked bibliography for the SEP article "Privacy and Information Technology" by Jeroen van den Hoven, Martijn Blaauw, Wolter Pieters and Martijn Warnier
This is an automatically generated and experimental page
If everything goes well, this page should display the bibliography of the aforementioned article as it appears in the Stanford Encyclopedia of Philosophy, but with links added to PhilPapers records and Google Scholar for your convenience. Some bibliographies are not going to be represented correctly or fully up to date. In general, bibliographies of recent works are going to be much better linked than bibliographies of primary literature and older works. Entries with PhilPapers records have links on their titles. A green link indicates that the item is available online at least partially.
This experiment has been authorized by the editors of the Stanford Encyclopedia of Philosophy. The original article and bibliography can be found here.
- Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze,
M., Diffie, W., & Rivest, R. L., 2015, “Keys under doormats:
mandating insecurity by requiring government access to all data and
communications”, Journal of Cybersecurity, 1(1):
69–79. (Scholar)
- Acar, A., Aksu, H., Uluagac, A. S., & Conti, M., 2018,
“A survey on homomorphic encryption schemes: Theory and
implementation”, ACM Computing Surveys (CSUR), 51(4):
79. (Scholar)
- Allen, A., 2011, Unpopular Privacy: What Must We Hide? Oxford: Oxford University Press. (Scholar)
- Anderson, R.J., 2008, Security Engineering: A guide to
building dependable distributed systems, Indianapolis, IN:
Wiley. (Scholar)
- Baars, D., 2016, Towards Self-Sovereign Identity using
Blockchain Technology, Ph.D. Thesis, University of Twente. (Scholar)
- Back, A., U. Möller, & A. Stiglic, 2001, “Traffic
analysis attacks and trade-offs in anonymity providing systems”,
in Information Hiding, Berlin: Springer, pp.
245–257. (Scholar)
- Al Badawi, A., Veeravalli, B., Mun, C. F., & Aung, K. M. M.,
2018, “High-performance FV somewhat homomorphic encryption on
GPUs: An implementation using CUDA”, IACR Transactions on
Cryptographic Hardware and Embedded Systems, 2: 70–95. doi:
10.13154/tches.v2018.i2.70-95 (Scholar)
- Bellman, S., E.J. Johnson, & G.L. Lohse, 2001, “On site:
to opt-in or opt-out?: it depends on the question”,
Communications of the ACM, 44(2): 25–27. (Scholar)
- Benevenuto, F., T. Rodrigues, M. Cha, & V. Almeida, 2012,
“Characterizing user navigation and interactions in online
social networks”, Information Sciences, 195:
1–24. (Scholar)
- Blaauw. M.J., 2013, “The Epistemic Account of
Privacy”, Episteme, 10(2): 167–177. (Scholar)
- Boenink, M., T. Swierstra, & D. Stemerding, 2010, “Anticipating the interaction between technology and morality: a scenario study of experimenting with humans in bionanotechnology”, Studies in Ethics, Law, and Technology, 4(2): 1–38. doi:10.2202/1941-6008.1098 (Scholar)
- Brey, P., 2005, “Freedom and privacy in ambient intelligence”, Ethics and Information Technology, 7(3): 157–166. (Scholar)
- Broenink, G., J.H. Hoepman, C.V.T. Hof, R. Van Kranenburg, D.
Smits, & T. Wisman, 2010, “The privacy coach: Supporting
customer privacy in the internet of things”, arXiv
preprint 1001.4459
[available online].
(Scholar)
- Bruynseels, K & M.J van den Hoven, 2015, “How to do
Things with personal Big Biodata”, in B. Roessler and D.
Mokrokinska (eds.), Social Dimensions of Privacy:
Interdisciplinary Perspectives, Cambridge: Cambridge University
Press, pp. 122–40. (Scholar)
- Cadwalladr, C., and Graham-Harrison, E., 2018, “The
Cambridge analytica files”, The Guardian, 21: 6–7. (Scholar)
- Cavoukian, A., 2009, Privacy by Design, Ottowa: Information and Privacy Commissioner of Ontario, Canada. [Cavoukian 2009 available online (PDF)]. (Scholar)
- –––, 2010, “Privacy by Design: The
Definitive workshop”, Identity in the Information
Society, 3(2): 121–126. (Scholar)
- Ceross, A., and A. Simpson, 2018, “Rethinking the
Proposition of Privacy Engineering”, in Proceedings of New
Security Paradigms Workshop (NSPW ’18, Windsor, UK), New York:
Association for Computing Machinery, 89–102.
doi:10.1145/3285002.3285006 (Scholar)
- Clarke, R., 2009, “Privacy impact assessment: Its origins
and development”, Computer law & security review,
25(2): 123–135. (Scholar)
- Clarke, I., O. Sandberg, B. Wiley, & T. Hong, 2001,
“Freenet: A distributed anonymous information storage and
retrieval system”, in Designing Privacy Enhancing
Technologies, Berlin: Springer, pp. 46–66. (Scholar)
- Colesky, M., J.-H. Hoepman, and C. Hillen, 2016, “A critical
analysis of privacy design strategies”, IEEE Security and
Privacy Workshops (SPW), first online O4 August 2016,
doi:10.1109/SPW.2016.23
- Custers, B., et al., 2018, “Consent and privacy”, The Routledge Handbook of the Ethics of Consent, London: Routledge, pp. 247–258. (Scholar)
- Dahl, J. Y., & A.R. Sætnan, 2009, “It all happened
so slowly: On controlling function creep in forensic DNA
databases”, International journal of law, crime and
justice, 37(3): 83–103. (Scholar)
- Danezis, G., C. Diaz, & C. Troncoso, 2007, “Two-sided
statistical disclosure attack”, in Proceedings of the 7th
international conference on Privacy enhancing technologies,
Berlin: Springer, pp. 30–44. (Scholar)
- DeCew, Judith Wagner, 1997, Pursuit of Privacy: Law, Ethics, and the Rise of Technology, Ithaca, NY: Cornell University Press. (Scholar)
- Dechesne, F., M. Warnier, & J. van den Hoven, 2013, “Ethical requirements for reconfigurable sensor technology: a challenge for value sensitive design”, Ethics and Information Technology, 15(3): 173–181. (Scholar)
- Delaune, S., S. Kremer, & M. Ryan, 2006,
“Coercion-resistance and receipt-freeness in electronic
voting”, in the Proceedings of the 19th IEEE Computer
Security Foundations Workshop, IEEE Computer Society Press, pages
28–39.
[Delaune et al. 2006 available online] (Scholar)
- Dingledine, R., N. Mathewson, & P. Syverson, 2004, “Tor:
The second-generation onion router”, in Proceedings of the
13th conference on USENIX Security Symposium (Volume 13),
Berkeley, CA: USENIX Association, pp. 303–320
[Dingledine et al. 2004 available online (pdf)]
(Scholar)
- Douceur, J., 2002, “The Sybil attack”, in
Peer-to-peer Systems, Berlin: Springer, pp.
251–260. (Scholar)
- Ellison, N. B., 2007, “Social network sites: Definition,
history, and scholarship”, Journal of Computer-Mediated
Communication, 13(1): 210–230. (Scholar)
- Evans, N.S., R. Dingledine, & C. Grothoff, 2009, “A
practical congestion attack on Tor using long paths”, in
Proceedings of the 18th conference on USENIX security
symposium, Berkeley, CA: USENIX Association, pp. 33–50.
[Evans et al. 2009 available online] (Scholar)
- Falgoust, M., 2016, “Data Science and Designing for Privacy”, Techné: Research in Philosophy and Technology, 20 (1): 51–68. (Scholar)
- Floridi, L., 2008, “Artificial intelligence’s new frontier: Artificial companions and the fourth revolution”, Metaphilosophy, 39(4–5): 651–655. (Scholar)
- Friedewald, M. & O. Raabe, 2011, “Ubiquitous computing:
An overview of technology impacts”, Telematics and
Informatics, 28(2): 55–65. (Scholar)
- Friedman, B., P.H. Kahn, Jr, & A. Borning, 2006, “Value
sensitive design and information systems”, in Human-computer
interaction in management information systems: Foundations, P.
Zhang & D. Galletta (eds.), Armonk: M.E. Sharp, 4. (Scholar)
- Gentry, C., 2009, “Fully homomorphic encryption using ideal
lattices”, in Proceedings of the 41st annual ACM symposium
on Theory of computing, ACM, pp. 169–178. (Scholar)
- Goyal, V., O. Pandey, A. Sahai, & B. Waters, 2006,
“Attribute-based encryption for fine-grained access control of
encrypted data”, in Proceedings of the 13th ACM conference
on Computer and communications security, ACM, pp.
89–98. (Scholar)
- Gürses, S., A. Kundnani, & J. Van Hoboken, 2016, “Crypto and empire: the contradictions of counter-surveillance advocacy”, Media, Culture & Society, 38(4): 576–590. (Scholar)
- Gutwirth, S. & P. De Hert, 2008, “Regulating profiling
in a democratic constitutional state”, in Hildebrandt and
Gutwirth 2008: 271–302. (Scholar)
- den Haak, B., 2012, “Integrating user customization and
authentication: the identity crisis”, Security &
Privacy, IEEE, 10(5): 82–85. (Scholar)
- Heersmink, R., J. van den Hoven, N.J. van Eck, & J. van den
Berg, 2011. “Bibliometric mapping of computer and information
ethics”, Ethics and information technology, 13(3):
241–249. (Scholar)
- Hildebrandt, M., 2008, “Defining Profiling: A New Type of
Knowledge?” in Hildebrandt and Gutwirth 2008: 17–45. (Scholar)
- Hildebrandt, M. & S. Gutwirth (eds.), 2008, Profiling the
European Citizen: Cross-disciplinary Perspectives, Dordrecht:
Springer Netherlands. (Scholar)
- Hoare, T., 2003, “The verifying compiler: A grand challenge
for computing research”, in Proceedings of the 12th
international conference on Compiler construction, Berlin:
Springer, pp. 262–272. (Scholar)
- Hone, K. & J.H.P. Eloff, 2002, “Information security
policy – what do international information security standards
say?”, Computers & Security, 21(5):
402–409. (Scholar)
- van den Hoven, J., 1999, “Privacy and the Varieties of Informational Wrongdoing”, Australian Journal of Professional and Applied Ethics, 1(1): 30–44. (Scholar)
- –––, 2008, “Information technology, privacy, and the protection of personal data”, in Information technology and moral philosophy, J. Van Den Hoven and J. Weckert (eds.), Cambridge: Cambridge University Press, pp. 301–322. (Scholar)
- van den Hoven, J., G.J. Lokhorst, & I. Van de Poel, 2012, “Engineering and the problem of moral overload”, Science and engineering ethics, 18(1): 143–155. (Scholar)
- van den Hoven, J., Vermaas, P., & Van de Poel, I. (eds.),
2015, Handbook of Ethics, Values and Technological Design,
Dordrecht: Springer. (Scholar)
- Karame, G., and Capkun, S., 2018, “Blockchain Security and
Privacy”, IEEE Security Privacy, 16(4), 11–12. (Scholar)
- Ko, M.N., G.P. Cheek, M. Shehab, & R. Sandhu, 2010,
“Social-networks connect services”, Computer,
43(8): 37–43. (Scholar)
- Krishnamurthy, B. & C.E. Wills, 2009. “On the leakage of
personally identifiable information via online social networks”,
in Proceedings of the 2nd ACM workshop on Online social
networks, ACM, pp. 7–12. (Scholar)
- Lawner, K. J., 2002, “Post-September 11th International
Surveillance Activity – A Failure of Intelligence: The Echelon
Interception System & (and) the Fundamental Right to Privacy in
Europe”, Pace International Law Review, 14(2):
435–480. (Scholar)
- Leenes, R., and E. Kosta, 2015, “Taming the cookie monster
with dutch law-a tale of regulatory failure”, Computer Law
& Security Review 31(3): 317–335. (Scholar)
- LeFevre, K., D.J. DeWitt, & R. Ramakrishnan, 2005,
“Incognito: Efficient full-domain k-anonymity”, in
Proceedings of the 2005 ACM SIGMOD international conference on
Management of data, ACM, pp. 49–60. (Scholar)
- Lessig, Lawrence, 1999, Code and Other Laws of Cyberspace, New York:
Basic Books. (Scholar)
- Loeckx, J., K. Sieber, & R.D. Stansifer, 1985, The
foundations of program verification, Chichester: John Wiley &
Sons. (Scholar)
- Matheson, David, 2007, “Unknowableness and Informational Privacy”, Journal of Philosophical Research, 32: 251–67. (Scholar)
- Mayer, J.R. & J.C. Mitchell, 2012, “Third-party web
tracking: Policy and technology”, in Security and Privacy
(SP) 2012 IEEE Symposium on, IEEE, pp. 413–427. (Scholar)
- Michener, J., 1999, “System insecurity in the Internet
age”, Software, IEEE, 16(4): 62–69. (Scholar)
- Motlagh, N. H., Bagaa, M., & Taleb, T., 2017, “UAV-based
IoT platform: A crowd surveillance use case”, IEEE
Communications Magazine, 55(2): 128–134. (Scholar)
- Nissenbaum, Helen, 2004, “Privacy as Contextual
Integrity”, Washington Law Review, 79:
101–139. (Scholar)
- Narayanan, A., Bonneau, J., Felten, E., Miller, A., &
Goldfeder, S., 2016, Bitcoin and cryptocurrency technologies: a
comprehensive introduction, Princeton: Princeton University
Press. (Scholar)
- Negley, G., 1966, “Philosophical Views on the Value of
Privacy”, Law and Contemporary Problems, 31:
319–325. (Scholar)
- OECD, 1980 [2013], The OECD Privacy Framework, 2013,
available in PDF;
revised and expanded from the original Guidelines on the
Protection of Privacy and Transborder Flows of Personal Data,
Organization for Economic Co-operation and Development,
[1980 version available online]
- Palmer, D.E., 2005, “Pop-ups, cookies, and spam: toward a deeper analysis of the ethical significance of internet marketing practices”, Journal of business ethics, 58(1–3): 271–280. (Scholar)
- Pieters, W., 2011, “Explanation and trust: what to tell the user in security and AI?”, Ethics and information technology, 13(1): 53–64. (Scholar)
- –––, 2013, “On thinging things and serving services: technological mediation and inseparable goods”, Ethics and information technology, 15(3): 195–208. (Scholar)
- –––, 2017, “Beyond individual-centric
privacy: Information technology in social systems” The
Information Society, 33(5): 271–281. (Scholar)
- Pieters, W. & A. van Cleeff, 2009, “The precautionary
principle in a world of digital dependencies”,
Computer, 42(6): 50–56. (Scholar)
- Rössler, Beate (ed.), 2004, Privacies: Philosophical Evaluations, Stanford, CA: Stanford University Press. (Scholar)
- Rössler, Beate, 2005, The value of privacy, Cambridge: Polity Press. (Scholar)
- –––, 2001 [2005], The Value of Privacy, Cambridge: Polity Press; original German version Der Wert des Privaten, Frankfurt am Main: Suhrkamp Verlag, 2001. (Scholar)
- Rubel, Alan, 2011, “The Particularized Judgment Account of Privacy”, Res Publica, 17(3): 275–90. (Scholar)
- Ruiter, J. & M. Warnier, 2011, “Privacy Regulations for
Cloud Computing: Compliance and Implementation in Theory and
Practice”, in Computers, Privacy and Data Protection: an
Element of Choice, S. Gutwirth, Y. Poullet, P. De Hert, and R.
Leenes (eds.), Dordrecht: Springer Netherlands, pp.
361–376. (Scholar)
- Solove, D., 2006, “A Taxonomy of Privacy”,
University of Pennsylvania Law Review, 154:
477–564. (Scholar)
- Som, C., L.M. Hilty, & A.R. Köhler, 2009, “The precautionary principle as a framework for a sustainable information society”, Journal of business ethics, 85(3): 493–505. (Scholar)
- Song, D.X., D. Wagner, & A. Perrig, 2000, “Practical
techniques for searches on encrypted data”, in Security and
Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on,
IEEE, pp. 44–55. (Scholar)
- Sprenger, Polly, 1999, “Sun on Privacy: ‘Get Over
It’”, Wired.
[Sprenger 1999 available online] (Scholar)
- Sweeney, L., 2002, “K-anonymity: A model for protecting
privacy”, International Journal of Uncertainty, Fuzziness
and Knowledge-Based Systems, 10(05): 557–570.
- Tavani, H.T., 2004, “Genomic research and data-mining technology: Implications for personal privacy and informed consent”, Ethics and information technology, 6(1): 15–28. (Scholar)
- Taylor, L., L. Floridi, and B. Van der Sloot (eds.), 2017, Group privacy: New challenges of data technologies (Philosophical Studies Series: Vol. 126), Dordrecht: Springer. (Scholar)
- Thomson, Judith Jarvis, 1975, “The Right to Privacy”, Philosophy and Public Affairs, 4: 295–314. (Scholar)
- Turilli, M. & L. Floridi, 2009, “The ethics of information transparency”, Ethics and Information Technology, 11(2): 105–112. (Scholar)
- Wang, Y., Wang, J., and Chen, X., 2016, “Secure searchable
encryption: a survey”, Journal of Communications and
Information Networks, 1(4): 52–65. (Scholar)
- Warnier, M., Dechesne, F., and Brazier, F.M.T., 2015,
“Design for the Value of Privacy”, in J. van den Hoven, P.
Vermaas, I. van de Poel (eds.), Handbook of Ethics, Values, and
Technological Design, Dordrecht: Springer, 431–445. (Scholar)
- Warren, Samuel D. & Louis D. Brandeis, 1890, “The Right
to Privacy”, Harvard Law Review, 4(5): 193–220.
[Warren and Brandeis 1890 available online] (Scholar)
- Westin, Alan F., 1967, Privacy and Freedom, New York: Atheneum. (Scholar)
- Yli-Huumo, J., Ko, D., Choi, S., Park, S., and Smolander, K.,
2016, “Where is current research on blockchain technology?
– a systematic review”, PloS One, 11(10):
e0163477. doi:10.1371/journal.pone.0163477 (Scholar)
- Zuboff, S., 2019, The age of surveillance capitalism: the
fight for the future at the new frontier of power, London:
Profile Books. (Scholar)