Linked bibliography for the SEP article "Privacy and Information Technology" by Jeroen van den Hoven, Martijn Blaauw, Wolter Pieters and Martijn Warnier

This is an automatically generated and experimental page

If everything goes well, this page should display the bibliography of the aforementioned article as it appears in the Stanford Encyclopedia of Philosophy, but with links added to PhilPapers records and Google Scholar for your convenience. Some bibliographies are not going to be represented correctly or fully up to date. In general, bibliographies of recent works are going to be much better linked than bibliographies of primary literature and older works. Entries with PhilPapers records have links on their titles. A green link indicates that the item is available online at least partially.

This experiment has been authorized by the editors of the Stanford Encyclopedia of Philosophy. The original article and bibliography can be found here.

  • Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., & Rivest, R. L., 2015, “Keys under doormats: mandating insecurity by requiring government access to all data and communications”, Journal of Cybersecurity, 1(1): 69–79. (Scholar)
  • Acar, A., Aksu, H., Uluagac, A. S., & Conti, M., 2018, “A survey on homomorphic encryption schemes: Theory and implementation”, ACM Computing Surveys (CSUR), 51(4): 79. (Scholar)
  • Allen, A., 2011, Unpopular Privacy: What Must We Hide? Oxford: Oxford University Press. (Scholar)
  • Anderson, R.J., 2008, Security Engineering: A guide to building dependable distributed systems, Indianapolis, IN: Wiley. (Scholar)
  • Baars, D., 2016, Towards Self-Sovereign Identity using Blockchain Technology, Ph.D. Thesis, University of Twente. (Scholar)
  • Back, A., U. Möller, & A. Stiglic, 2001, “Traffic analysis attacks and trade-offs in anonymity providing systems”, in Information Hiding, Berlin: Springer, pp. 245–257. (Scholar)
  • Al Badawi, A., Veeravalli, B., Mun, C. F., & Aung, K. M. M., 2018, “High-performance FV somewhat homomorphic encryption on GPUs: An implementation using CUDA”, IACR Transactions on Cryptographic Hardware and Embedded Systems, 2: 70–95. doi: 10.13154/tches.v2018.i2.70-95 (Scholar)
  • Bellman, S., E.J. Johnson, & G.L. Lohse, 2001, “On site: to opt-in or opt-out?: it depends on the question”, Communications of the ACM, 44(2): 25–27. (Scholar)
  • Benevenuto, F., T. Rodrigues, M. Cha, & V. Almeida, 2012, “Characterizing user navigation and interactions in online social networks”, Information Sciences, 195: 1–24. (Scholar)
  • Blaauw. M.J., 2013, “The Epistemic Account of Privacy”, Episteme, 10(2): 167–177. (Scholar)
  • Boenink, M., T. Swierstra, & D. Stemerding, 2010, “Anticipating the interaction between technology and morality: a scenario study of experimenting with humans in bionanotechnology”, Studies in Ethics, Law, and Technology, 4(2): 1–38. doi:10.2202/1941-6008.1098 (Scholar)
  • Brey, P., 2005, “Freedom and privacy in ambient intelligence”, Ethics and Information Technology, 7(3): 157–166. (Scholar)
  • Broenink, G., J.H. Hoepman, C.V.T. Hof, R. Van Kranenburg, D. Smits, & T. Wisman, 2010, “The privacy coach: Supporting customer privacy in the internet of things”, arXiv preprint 1001.4459 [available online]. (Scholar)
  • Bruynseels, K & M.J van den Hoven, 2015, “How to do Things with personal Big Biodata”, in B. Roessler and D. Mokrokinska (eds.), Social Dimensions of Privacy: Interdisciplinary Perspectives, Cambridge: Cambridge University Press, pp. 122–40. (Scholar)
  • Cadwalladr, C., and Graham-Harrison, E., 2018, “The Cambridge analytica files”, The Guardian, 21: 6–7. (Scholar)
  • Cavoukian, A., 2009, Privacy by Design, Ottowa: Information and Privacy Commissioner of Ontario, Canada. [Cavoukian 2009 available online (PDF)]. (Scholar)
  • –––, 2010, “Privacy by Design: The Definitive workshop”, Identity in the Information Society, 3(2): 121–126. (Scholar)
  • Ceross, A., and A. Simpson, 2018, “Rethinking the Proposition of Privacy Engineering”, in Proceedings of New Security Paradigms Workshop (NSPW ’18, Windsor, UK), New York: Association for Computing Machinery, 89–102. doi:10.1145/3285002.3285006 (Scholar)
  • Clarke, R., 2009, “Privacy impact assessment: Its origins and development”, Computer law & security review, 25(2): 123–135. (Scholar)
  • Clarke, I., O. Sandberg, B. Wiley, & T. Hong, 2001, “Freenet: A distributed anonymous information storage and retrieval system”, in Designing Privacy Enhancing Technologies, Berlin: Springer, pp. 46–66. (Scholar)
  • Colesky, M., J.-H. Hoepman, and C. Hillen, 2016, “A critical analysis of privacy design strategies”, IEEE Security and Privacy Workshops (SPW), first online O4 August 2016, doi:10.1109/SPW.2016.23
  • Custers, B., et al., 2018, “Consent and privacy”, The Routledge Handbook of the Ethics of Consent, London: Routledge, pp. 247–258. (Scholar)
  • Dahl, J. Y., & A.R. Sætnan, 2009, “It all happened so slowly: On controlling function creep in forensic DNA databases”, International journal of law, crime and justice, 37(3): 83–103. (Scholar)
  • Danezis, G., C. Diaz, & C. Troncoso, 2007, “Two-sided statistical disclosure attack”, in Proceedings of the 7th international conference on Privacy enhancing technologies, Berlin: Springer, pp. 30–44. (Scholar)
  • DeCew, Judith Wagner, 1997, Pursuit of Privacy: Law, Ethics, and the Rise of Technology, Ithaca, NY: Cornell University Press. (Scholar)
  • Dechesne, F., M. Warnier, & J. van den Hoven, 2013, “Ethical requirements for reconfigurable sensor technology: a challenge for value sensitive design”, Ethics and Information Technology, 15(3): 173–181. (Scholar)
  • Delaune, S., S. Kremer, & M. Ryan, 2006, “Coercion-resistance and receipt-freeness in electronic voting”, in the Proceedings of the 19th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, pages 28–39. [Delaune et al. 2006 available online] (Scholar)
  • Dingledine, R., N. Mathewson, & P. Syverson, 2004, “Tor: The second-generation onion router”, in Proceedings of the 13th conference on USENIX Security Symposium (Volume 13), Berkeley, CA: USENIX Association, pp. 303–320 [Dingledine et al. 2004 available online (pdf)] (Scholar)
  • Douceur, J., 2002, “The Sybil attack”, in Peer-to-peer Systems, Berlin: Springer, pp. 251–260. (Scholar)
  • Ellison, N. B., 2007, “Social network sites: Definition, history, and scholarship”, Journal of Computer-Mediated Communication, 13(1): 210–230. (Scholar)
  • Evans, N.S., R. Dingledine, & C. Grothoff, 2009, “A practical congestion attack on Tor using long paths”, in Proceedings of the 18th conference on USENIX security symposium, Berkeley, CA: USENIX Association, pp. 33–50. [Evans et al. 2009 available online] (Scholar)
  • Falgoust, M., 2016, “Data Science and Designing for Privacy”, Techné: Research in Philosophy and Technology, 20 (1): 51–68. (Scholar)
  • Floridi, L., 2008, “Artificial intelligence’s new frontier: Artificial companions and the fourth revolution”, Metaphilosophy, 39(4–5): 651–655. (Scholar)
  • Friedewald, M. & O. Raabe, 2011, “Ubiquitous computing: An overview of technology impacts”, Telematics and Informatics, 28(2): 55–65. (Scholar)
  • Friedman, B., P.H. Kahn, Jr, & A. Borning, 2006, “Value sensitive design and information systems”, in Human-computer interaction in management information systems: Foundations, P. Zhang & D. Galletta (eds.), Armonk: M.E. Sharp, 4. (Scholar)
  • Gentry, C., 2009, “Fully homomorphic encryption using ideal lattices”, in Proceedings of the 41st annual ACM symposium on Theory of computing, ACM, pp. 169–178. (Scholar)
  • Goyal, V., O. Pandey, A. Sahai, & B. Waters, 2006, “Attribute-based encryption for fine-grained access control of encrypted data”, in Proceedings of the 13th ACM conference on Computer and communications security, ACM, pp. 89–98. (Scholar)
  • Gürses, S., A. Kundnani, & J. Van Hoboken, 2016, “Crypto and empire: the contradictions of counter-surveillance advocacy”, Media, Culture & Society, 38(4): 576–590. (Scholar)
  • Gutwirth, S. & P. De Hert, 2008, “Regulating profiling in a democratic constitutional state”, in Hildebrandt and Gutwirth 2008: 271–302. (Scholar)
  • den Haak, B., 2012, “Integrating user customization and authentication: the identity crisis”, Security & Privacy, IEEE, 10(5): 82–85. (Scholar)
  • Heersmink, R., J. van den Hoven, N.J. van Eck, & J. van den Berg, 2011. “Bibliometric mapping of computer and information ethics”, Ethics and information technology, 13(3): 241–249. (Scholar)
  • Hildebrandt, M., 2008, “Defining Profiling: A New Type of Knowledge?” in Hildebrandt and Gutwirth 2008: 17–45. (Scholar)
  • Hildebrandt, M. & S. Gutwirth (eds.), 2008, Profiling the European Citizen: Cross-disciplinary Perspectives, Dordrecht: Springer Netherlands. (Scholar)
  • Hoare, T., 2003, “The verifying compiler: A grand challenge for computing research”, in Proceedings of the 12th international conference on Compiler construction, Berlin: Springer, pp. 262–272. (Scholar)
  • Hone, K. & J.H.P. Eloff, 2002, “Information security policy – what do international information security standards say?”, Computers & Security, 21(5): 402–409. (Scholar)
  • van den Hoven, J., 1999, “Privacy and the Varieties of Informational Wrongdoing”, Australian Journal of Professional and Applied Ethics, 1(1): 30–44. (Scholar)
  • –––, 2008, “Information technology, privacy, and the protection of personal data”, in Information technology and moral philosophy, J. Van Den Hoven and J. Weckert (eds.), Cambridge: Cambridge University Press, pp. 301–322. (Scholar)
  • van den Hoven, J., G.J. Lokhorst, & I. Van de Poel, 2012, “Engineering and the problem of moral overload”, Science and engineering ethics, 18(1): 143–155. (Scholar)
  • van den Hoven, J., Vermaas, P., & Van de Poel, I. (eds.), 2015, Handbook of Ethics, Values and Technological Design, Dordrecht: Springer. (Scholar)
  • Karame, G., and Capkun, S., 2018, “Blockchain Security and Privacy”, IEEE Security Privacy, 16(4), 11–12. (Scholar)
  • Ko, M.N., G.P. Cheek, M. Shehab, & R. Sandhu, 2010, “Social-networks connect services”, Computer, 43(8): 37–43. (Scholar)
  • Krishnamurthy, B. & C.E. Wills, 2009. “On the leakage of personally identifiable information via online social networks”, in Proceedings of the 2nd ACM workshop on Online social networks, ACM, pp. 7–12. (Scholar)
  • Lawner, K. J., 2002, “Post-September 11th International Surveillance Activity – A Failure of Intelligence: The Echelon Interception System & (and) the Fundamental Right to Privacy in Europe”, Pace International Law Review, 14(2): 435–480. (Scholar)
  • Leenes, R., and E. Kosta, 2015, “Taming the cookie monster with dutch law-a tale of regulatory failure”, Computer Law & Security Review 31(3): 317–335. (Scholar)
  • LeFevre, K., D.J. DeWitt, & R. Ramakrishnan, 2005, “Incognito: Efficient full-domain k-anonymity”, in Proceedings of the 2005 ACM SIGMOD international conference on Management of data, ACM, pp. 49–60. (Scholar)
  • Lessig, Lawrence, 1999, Code and Other Laws of Cyberspace, New York: Basic Books. (Scholar)
  • Loeckx, J., K. Sieber, & R.D. Stansifer, 1985, The foundations of program verification, Chichester: John Wiley & Sons. (Scholar)
  • Matheson, David, 2007, “Unknowableness and Informational Privacy”, Journal of Philosophical Research, 32: 251–67. (Scholar)
  • Mayer, J.R. & J.C. Mitchell, 2012, “Third-party web tracking: Policy and technology”, in Security and Privacy (SP) 2012 IEEE Symposium on, IEEE, pp. 413–427. (Scholar)
  • Michener, J., 1999, “System insecurity in the Internet age”, Software, IEEE, 16(4): 62–69. (Scholar)
  • Motlagh, N. H., Bagaa, M., & Taleb, T., 2017, “UAV-based IoT platform: A crowd surveillance use case”, IEEE Communications Magazine, 55(2): 128–134. (Scholar)
  • Nissenbaum, Helen, 2004, “Privacy as Contextual Integrity”, Washington Law Review, 79: 101–139. (Scholar)
  • Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S., 2016, Bitcoin and cryptocurrency technologies: a comprehensive introduction, Princeton: Princeton University Press. (Scholar)
  • Negley, G., 1966, “Philosophical Views on the Value of Privacy”, Law and Contemporary Problems, 31: 319–325. (Scholar)
  • OECD, 1980 [2013], The OECD Privacy Framework, 2013, available in PDF; revised and expanded from the original Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Organization for Economic Co-operation and Development, [1980 version available online]
  • Palmer, D.E., 2005, “Pop-ups, cookies, and spam: toward a deeper analysis of the ethical significance of internet marketing practices”, Journal of business ethics, 58(1–3): 271–280. (Scholar)
  • Pieters, W., 2011, “Explanation and trust: what to tell the user in security and AI?”, Ethics and information technology, 13(1): 53–64. (Scholar)
  • –––, 2013, “On thinging things and serving services: technological mediation and inseparable goods”, Ethics and information technology, 15(3): 195–208. (Scholar)
  • –––, 2017, “Beyond individual-centric privacy: Information technology in social systems” The Information Society, 33(5): 271–281. (Scholar)
  • Pieters, W. & A. van Cleeff, 2009, “The precautionary principle in a world of digital dependencies”, Computer, 42(6): 50–56. (Scholar)
  • Rössler, Beate (ed.), 2004, Privacies: Philosophical Evaluations, Stanford, CA: Stanford University Press. (Scholar)
  • Rössler, Beate, 2005, The value of privacy, Cambridge: Polity Press. (Scholar)
  • –––, 2001 [2005], The Value of Privacy, Cambridge: Polity Press; original German version Der Wert des Privaten, Frankfurt am Main: Suhrkamp Verlag, 2001. (Scholar)
  • Rubel, Alan, 2011, “The Particularized Judgment Account of Privacy”, Res Publica, 17(3): 275–90. (Scholar)
  • Ruiter, J. & M. Warnier, 2011, “Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice”, in Computers, Privacy and Data Protection: an Element of Choice, S. Gutwirth, Y. Poullet, P. De Hert, and R. Leenes (eds.), Dordrecht: Springer Netherlands, pp. 361–376. (Scholar)
  • Solove, D., 2006, “A Taxonomy of Privacy”, University of Pennsylvania Law Review, 154: 477–564. (Scholar)
  • Som, C., L.M. Hilty, & A.R. Köhler, 2009, “The precautionary principle as a framework for a sustainable information society”, Journal of business ethics, 85(3): 493–505. (Scholar)
  • Song, D.X., D. Wagner, & A. Perrig, 2000, “Practical techniques for searches on encrypted data”, in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on, IEEE, pp. 44–55. (Scholar)
  • Sprenger, Polly, 1999, “Sun on Privacy: ‘Get Over It’”, Wired. [Sprenger 1999 available online] (Scholar)
  • Sweeney, L., 2002, “K-anonymity: A model for protecting privacy”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05): 557–570.
  • Tavani, H.T., 2004, “Genomic research and data-mining technology: Implications for personal privacy and informed consent”, Ethics and information technology, 6(1): 15–28. (Scholar)
  • Taylor, L., L. Floridi, and B. Van der Sloot (eds.), 2017, Group privacy: New challenges of data technologies (Philosophical Studies Series: Vol. 126), Dordrecht: Springer. (Scholar)
  • Thomson, Judith Jarvis, 1975, “The Right to Privacy”, Philosophy and Public Affairs, 4: 295–314. (Scholar)
  • Turilli, M. & L. Floridi, 2009, “The ethics of information transparency”, Ethics and Information Technology, 11(2): 105–112. (Scholar)
  • Wang, Y., Wang, J., and Chen, X., 2016, “Secure searchable encryption: a survey”, Journal of Communications and Information Networks, 1(4): 52–65. (Scholar)
  • Warnier, M., Dechesne, F., and Brazier, F.M.T., 2015, “Design for the Value of Privacy”, in J. van den Hoven, P. Vermaas, I. van de Poel (eds.), Handbook of Ethics, Values, and Technological Design, Dordrecht: Springer, 431–445. (Scholar)
  • Warren, Samuel D. & Louis D. Brandeis, 1890, “The Right to Privacy”, Harvard Law Review, 4(5): 193–220. [Warren and Brandeis 1890 available online] (Scholar)
  • Westin, Alan F., 1967, Privacy and Freedom, New York: Atheneum. (Scholar)
  • Yli-Huumo, J., Ko, D., Choi, S., Park, S., and Smolander, K., 2016, “Where is current research on blockchain technology? – a systematic review”, PloS One, 11(10): e0163477. doi:10.1371/journal.pone.0163477 (Scholar)
  • Zuboff, S., 2019, The age of surveillance capitalism: the fight for the future at the new frontier of power, London: Profile Books. (Scholar)

Generated Fri Aug 7 06:39:19 2020