Linked bibliography for the SEP article "Privacy and Information Technology" by Jeroen van den Hoven, Martijn Blaauw, Wolter Pieters and Martijn Warnier
This is an automatically generated and experimental page
If everything goes well, this page should display the bibliography of the aforementioned article as it appears in the Stanford Encyclopedia of Philosophy, but with links added to PhilPapers records and Google Scholar for your convenience. Some bibliographies are not going to be represented correctly or fully up to date. In general, bibliographies of recent works are going to be much better linked than bibliographies of primary literature and older works. Entries with PhilPapers records have links on their titles. A green link indicates that the item is available online at least partially.
This experiment has been authorized by the editors of the Stanford Encyclopedia of Philosophy. The original article and bibliography can be found here.
- Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze,
M., Diffie, W., & Rivest, R. L., 2015, “Keys under doormats:
mandating insecurity by requiring government access to all data and
communications”, Journal of Cybersecurity, 1(1):
69–79. (Scholar)
- Abiri, R., Borhani, S., Kilmarx, J., Esterwood, C., Jiang, Y.,
& Zhao, X., 2020, “A usability study of low-cost wireless
brain-computer interface for cursor control using online linear
mode”, IEEE transactions on human-machine systems, 50(4):
287–297.
- Abowd, J. M., & Vilhuber, L., 2008, “How protective are
synthetic data?”, in J. Domingo-Ferrer & Y. Saygun (eds.),
Privacy in Statistical Databases (LNCS, volume 5262), Berlin,
Heidelberg: Springer, pp. 239–246f. (Scholar)
- Acar, A., Aksu, H., Uluagac, A. S., & Conti, M., 2018,
“A survey on homomorphic encryption schemes: Theory and
implementation”, ACM Computing Surveys (CSUR), 51(4):
79. (Scholar)
- Allen, A., 2011, Unpopular Privacy: What Must We Hide? Oxford: Oxford University Press. (Scholar)
- Anderson, R.J., 2008, Security Engineering: A guide to
building dependable distributed systems, Indianapolis, IN:
Wiley. (Scholar)
- Angelov, P. P., Soares, E. A., Jiang, R., Arnold, N. I., &
Atkinson, P. M., 2021, “Explainable artificial intelligence: an
analytical review”, Wiley Interdisciplinary Reviews: Data
Mining and Knowledge Discovery, 11(5): e1424. (Scholar)
- Baars, D., 2016, Towards Self-Sovereign Identity using
Blockchain Technology, Ph.D. Thesis, University of Twente. (Scholar)
- Back, A., U. Möller, & A. Stiglic, 2001, “Traffic
analysis attacks and trade-offs in anonymity providing systems”,
in Information Hiding, Berlin: Springer, pp.
245–257. (Scholar)
- Al Badawi, A., Veeravalli, B., Mun, C. F., & Aung, K. M. M.,
2018, “High-performance FV somewhat homomorphic encryption on
GPUs: An implementation using CUDA”, IACR Transactions on
Cryptographic Hardware and Embedded Systems, 2: 70–95. doi:
10.13154/tches.v2018.i2.70-95 (Scholar)
- Bellman, S., E.J. Johnson, & G.L. Lohse, 2001, “On site:
to opt-in or opt-out?: it depends on the question”,
Communications of the ACM, 44(2): 25–27. (Scholar)
- Benevenuto, F., T. Rodrigues, M. Cha, & V. Almeida, 2012,
“Characterizing user navigation and interactions in online
social networks”, Information Sciences, 195:
1–24. (Scholar)
- Blaauw. M.J., 2013, “The Epistemic Account of
Privacy”, Episteme, 10(2): 167–177. (Scholar)
- Boenink, M., T. Swierstra, & D. Stemerding, 2010, “Anticipating the interaction between technology and morality: a scenario study of experimenting with humans in bionanotechnology”, Studies in Ethics, Law, and Technology, 4(2): 1–38. doi:10.2202/1941-6008.1098 (Scholar)
- Brey, P., 2005, “Freedom and privacy in ambient intelligence”, Ethics and Information Technology, 7(3): 157–166. (Scholar)
- Brown, C. M. L., 2024, “Neurorights, Mental Privacy, and Mind Reading” Neuroethics, 17(2): 1–19. (Scholar)
- de Bruijn, H., Warnier, M., & Janssen, M., 2022. “The
perils and pitfalls of explainable AI: Strategies for explaining
algorithmic decision-making”, Government information
quarterly, 39(2): 101666. (Scholar)
- Bruynseels, K & M.J van den Hoven, 2015, “How to do
Things with personal Big Biodata”, in B. Roessler and D.
Mokrokinska (eds.), Social Dimensions of Privacy:
Interdisciplinary Perspectives, Cambridge: Cambridge University
Press, pp. 122–40. (Scholar)
- Cadwalladr, C., and Graham-Harrison, E., 2018, “The
Cambridge analytica files”, The Guardian, 21:
6–7. (Scholar)
- Cavoukian, A., 2009, Privacy by Design, Ottowa: Information and Privacy Commissioner of Ontario, Canada. [Cavoukian 2009 available online (PDF)]. (Scholar)
- –––, 2010, “Privacy by Design: The Definitive workshop”, Identity in the Information Society, 3(2): 121–126. (Scholar)
- Ceross, A., and A. Simpson, 2018, “Rethinking the
Proposition of Privacy Engineering”, in Proceedings of New
Security Paradigms Workshop (NSPW ’18, Windsor, UK), New
York: Association for Computing Machinery, 89–102.
doi:10.1145/3285002.3285006 (Scholar)
- Choi, H., Park, J., & Jung, Y., 2018, “The role of
privacy fatigue in online privacy behavior”, Computers in
Human Behavior, 81, 42–51. (Scholar)
- Clarke, R., 2009, “Privacy impact assessment: Its origins
and development”, Computer law & security review,
25(2): 123–135. (Scholar)
- Clarke, I., O. Sandberg, B. Wiley, & T. Hong, 2001,
“Freenet: A distributed anonymous information storage and
retrieval system”, in Designing Privacy Enhancing
Technologies, Berlin: Springer, pp. 46–66. (Scholar)
- Colesky, M., J.-H. Hoepman, and C. Hillen, 2016, “A critical
analysis of privacy design strategies”, IEEE Security and
Privacy Workshops (SPW), first online O4 August 2016,
doi:10.1109/SPW.2016.23
- Colonna, L., 2022, “Addressing the Responsibility Gap in
Data Protection by Design: Towards a More Future-oriented, Relational,
and Distributed Approach”, Tilburg Law Review,
27(1). (Scholar)
- Curzon, J., Kosa, T. A., Akalu, R., & El-Khatib, K., 2021,
“Privacy and artificial intelligence”, IEEE
Transactions on Artificial Intelligence, 2(2), 96–108.
(Scholar)
- Custers, B., et al., 2018, “Consent and privacy”, The Routledge Handbook of the Ethics of Consent, London: Routledge, pp. 247–258. (Scholar)
- Dahl, J. Y., & A.R. Sætnan, 2009, “It all happened
so slowly: On controlling function creep in forensic DNA
databases”, International journal of law, crime and
justice, 37(3): 83–103. (Scholar)
- Danezis, G., C. Diaz, & C. Troncoso, 2007, “Two-sided
statistical disclosure attack”, in Proceedings of the 7th
international conference on Privacy enhancing technologies,
Berlin: Springer, pp. 30–44. (Scholar)
- DeCew, Judith Wagner, 1997, Pursuit of Privacy: Law, Ethics, and the Rise of Technology, Ithaca, NY: Cornell University Press. (Scholar)
- Dechesne, F., M. Warnier, & J. van den Hoven, 2013, “Ethical requirements for reconfigurable sensor technology: a challenge for value sensitive design”, Ethics and Information Technology, 15(3): 173–181. (Scholar)
- Delaune, S., S. Kremer, & M. Ryan, 2006,
“Coercion-resistance and receipt-freeness in electronic
voting”, in the Proceedings of the 19th IEEE Computer
Security Foundations Workshop, IEEE Computer Society Press, pages
28–39.
[Delaune et al. 2006 available online] (Scholar)
- Dingledine, R., N. Mathewson, & P. Syverson, 2004, “Tor:
The second-generation onion router”, in Proceedings of the
13th conference on USENIX Security Symposium (Volume 13),
Berkeley, CA: USENIX Association, pp. 303–320
[Dingledine et al. 2004 available online (pdf)]
(Scholar)
- Došilović, F. K., Brčić, M., &
Hlupić, N., 2018, “Explainable artificial intelligence: A
survey” In 41st International convention on information and
communication technology, electronics and microelectronics
(MIPRO) pp. 0210–0215, IEEE. (Scholar)
- Douceur, J., 2002, “The Sybil attack”, in
Peer-to-peer Systems, Berlin: Springer, pp.
251–260. (Scholar)
- Drew, L., 2023, “Decoding the business of brain-computer
interfaces”, Nature Electronics, 6(2), 90–95.
(Scholar)
- Dwork, C., 2006, “Differential Privacy”, in M.
Bugliesi, B. Preneel, V. Sassone, and I. Wegener (eds.), Automata,
Languages and Programming, ICALP 2006 (Lecture Notes in Computer
Science: 4052), Springer, Berlin, Heidelberg. (Scholar)
- Ellison, N. B., 2007, “Social network sites: Definition,
history, and scholarship”, Journal of Computer-Mediated
Communication, 13(1): 210–230. (Scholar)
- Evans, N.S., R. Dingledine, & C. Grothoff, 2009, “A
practical congestion attack on Tor using long paths”, in
Proceedings of the 18th conference on USENIX security
symposium, Berkeley, CA: USENIX Association, pp. 33–50.
[Evans et al. 2009 available online] (Scholar)
- Falgoust, M., 2016, “Data Science and Designing for Privacy”, Techné: Research in Philosophy and Technology, 20 (1): 51–68. (Scholar)
- Floridi, L., 2008, “Artificial intelligence’s new
frontier: Artificial companions and the fourth revolution”,
Metaphilosophy, 39(4–5): 651–655. (Scholar)
- Friedewald, M. & O. Raabe, 2011, “Ubiquitous computing:
An overview of technology impacts”, Telematics and
Informatics, 28(2): 55–65. (Scholar)
- Friedman, B., P.H. Kahn, Jr, & A. Borning, 2006, “Value
sensitive design and information systems”, in Human-computer
interaction in management information systems: Foundations, P.
Zhang & D. Galletta (eds.), Armonk: M.E. Sharp, 4. (Scholar)
- Gentry, C., 2009, “Fully homomorphic encryption using ideal
lattices”, in Proceedings of the 41st annual ACM symposium
on Theory of computing, ACM, pp. 169–178. (Scholar)
- Gerber, N., P. Gerber, and M. Volkamer. “Explaining the
privacy paradox: A systematic review of literature investigating
privacy attitude and behavior”, Computers &
security 77 (2018): 226–261. (Scholar)
- Goyal, V., O. Pandey, A. Sahai, & B. Waters, 2006,
“Attribute-based encryption for fine-grained access control of
encrypted data”, in Proceedings of the 13th ACM conference
on Computer and communications security, ACM, pp.
89–98. (Scholar)
- Gürses, S., A. Kundnani, & J. Van Hoboken, 2016,
“Crypto and empire: the contradictions of counter-surveillance
advocacy”, Media, Culture & Society, 38(4):
576–590. (Scholar)
- Gutwirth, S. & P. De Hert, 2008, “Regulating profiling
in a democratic constitutional state”, in Hildebrandt and
Gutwirth 2008: 271–302. (Scholar)
- den Haak, B., 2012, “Integrating user customization and
authentication: the identity crisis”, Security &
Privacy, IEEE, 10(5): 82–85. (Scholar)
- Hassan, J., Shehzad, D., Habib, U., Aftab, M. U., Ahmad, M.,
Kuleev, R., & Mazzara, M., 2022, “The rise of cloud
computing: data protection, privacy, and open research challenges
– a systematic literature review (SLR)”, Computational
intelligence and neuroscience, 2022: 8303504.
doi:10.1155/2022/8303504 (Scholar)
- Heersmink, R., J. van den Hoven, N.J. van Eck, & J. van den
Berg, 2011. “Bibliometric mapping of computer and information
ethics”, Ethics and information technology, 13(3):
241–249. (Scholar)
- Hildebrandt, M., 2008, “Defining Profiling: A New Type of
Knowledge?” in Hildebrandt and Gutwirth 2008: 17–45. (Scholar)
- Hildebrandt, M. & S. Gutwirth (eds.), 2008, Profiling the
European Citizen: Cross-disciplinary Perspectives, Dordrecht:
Springer Netherlands. (Scholar)
- Hill, G., 2023 “The emerging artificial intelligence (AI)
and national uniform legislation”, Australian Law
Journal, 97(5), 303–306. (Scholar)
- Hoare, T., 2003, “The verifying compiler: A grand challenge
for computing research”, in Proceedings of the 12th
international conference on Compiler construction, Berlin:
Springer, pp. 262–272. (Scholar)
- Hoffmann, C. P., C. Lutz, and G. Ranzini., 2016, “Privacy
cynicism: A new approach to the privacy paradox”
Cyberpsychology: Journal of Psychosocial Research on
Cyberspace, 10(4). (Scholar)
- Hone, K. & J.H.P. Eloff, 2002, “Information security
policy – what do international information security standards
say?”, Computers & Security, 21(5):
402–409. (Scholar)
- van den Hoven, J., 1999, “Privacy and the Varieties of Informational Wrongdoing”, Australian Journal of Professional and Applied Ethics, 1(1): 30–44. (Scholar)
- –––, 2008, “Information technology, privacy, and the protection of personal data”, in Information technology and moral philosophy, J. Van Den Hoven and J. Weckert (eds.), Cambridge: Cambridge University Press, pp. 301–322. (Scholar)
- van den Hoven, J., G.J. Lokhorst, & I. Van de Poel, 2012, “Engineering and the problem of moral overload”, Science and engineering ethics, 18(1): 143–155. (Scholar)
- van den Hoven, J., Vermaas, P., & Van de Poel, I. (eds.),
2015, Handbook of Ethics, Values and Technological Design,
Dordrecht: Springer. (Scholar)
- Ienca, M., Fins, J. J., Jox, R. J., Jotterand, F., Voeneky, S., Andorno, R., Ball, T., Castelluccia, C., Chavarriaga, R., Chneiweiss, H., Ferretti, A., Friedrich, O., Hurst, S., Merkel, G., Molnar-Gabor, F., Rickli, J., Scheibner, J., Vayena, E., Yuste, R. & Kellmeyer, P., 2022, “Towards a governance framework for brain data” Neuroethics, 15(2): 20. (Scholar)
- Karame, G., and Capkun, S., 2018, “Blockchain Security and
Privacy”, IEEE Security Privacy, 16(4),
11–12. (Scholar)
- Ko, M.N., G.P. Cheek, M. Shehab, & R. Sandhu, 2010,
“Social-networks connect services”, Computer,
43(8): 37–43. (Scholar)
- Kokolakis, S., 2017, “Privacy attitudes and privacy
behaviour: A review of current research on the privacy paradox
phenomenon”, Computers & security, 64:
122–134. (Scholar)
- Krishnamurthy, B. & C.E. Wills, 2009. “On the leakage of
personally identifiable information via online social networks”,
in WOSN ’09: Proceedings of the 2nd ACM workshop on Online
Social Networks, New York: Association for Computing Machinery,
pp. 7–12. (Scholar)
- Lawner, K. J., 2002, “Post-September 11th International
Surveillance Activity – A Failure of Intelligence: The Echelon
Interception System & (and) the Fundamental Right to Privacy in
Europe”, Pace International Law Review, 14(2):
435–480. (Scholar)
- Leenes, R., and E. Kosta, 2015, “Taming the cookie monster
with dutch law-a tale of regulatory failure”, Computer Law
& Security Review 31(3): 317–335. (Scholar)
- LeFevre, K., D.J. DeWitt, & R. Ramakrishnan, 2005,
“Incognito: Efficient full-domain k-anonymity”, in
Proceedings of the 2005 ACM SIGMOD International Conference on
Management of Data, New York: Association of Computing Machinery,
pp. 49–60. (Scholar)
- Lessig, Lawrence, 1999, Code and Other Laws of
Cyberspace, New York: Basic Books. (Scholar)
- Liu, W., Zhang, Y., Yang, H., & Meng, Q., 2024, “A
survey on differential privacy for medical data analysis”.
Annals of Data Science, 11(2): 733–747.
- Loeckx, J., K. Sieber, & R.D. Stansifer, 1985, The
foundations of program verification, Chichester: John Wiley &
Sons. (Scholar)
- Matheson, David, 2007, “Unknowableness and Informational Privacy”, Journal of Philosophical Research, 32: 251–67. (Scholar)
- Mayer, J.R. & J.C. Mitchell, 2012, “Third-party web
tracking: Policy and technology”, in Security and Privacy
(SP) 2012 IEEE Symposium on, IEEE, pp. 413–427. (Scholar)
- Michener, J., 1999, “System insecurity in the Internet
age”, Software, IEEE, 16(4): 62–69. (Scholar)
- Motlagh, N. H., Bagaa, M., & Taleb, T., 2017, “UAV-based
IoT platform: A crowd surveillance use case”, IEEE
Communications Magazine, 55(2): 128–134. (Scholar)
- Nagenborg, M., 2009, “Designing spheres of informational justice”, Ethics and Information Technology, 11(3): 175–179. (Scholar)
- Narayanan, A., Bonneau, J., Felten, E., Miller, A., &
Goldfeder, S., 2016, Bitcoin and cryptocurrency technologies: a
comprehensive introduction, Princeton: Princeton University
Press. (Scholar)
- Negley, G., 1966, “Philosophical Views on the Value of
Privacy”, Law and Contemporary Problems, 31:
319–325. (Scholar)
- Nissenbaum, Helen, 2004, “Privacy as Contextual
Integrity”, Washington Law Review, 79:
101–139. (Scholar)
- OECD, 1980 [2013], The OECD Privacy Framework, 2013,
available in PDF;
revised and expanded from the original Guidelines on the
Protection of Privacy and Transborder Flows of Personal Data,
Organization for Economic Co-operation and Development,
[1980 version available online]
- van Ooijen, I., Segijn, C. M., & Opree, S. J., 2022,
“Privacy cynicism and its role in privacy
decision-making”, Communication Research, 51(2).
doi:10.1177/00936502211060984 (Scholar)
- Palmer, D.E., 2005, “Pop-ups, cookies, and spam: toward a deeper analysis of the ethical significance of internet marketing practices”, Journal of business ethics, 58(1–3): 271–280. (Scholar)
- Pettit, P., 2001, A theory of freedom: from the psychology to
the politics of agency, Oxford: Oxford University Press.
- Pieters, W., 2011, “Explanation and trust: what to tell the user in security and AI?”, Ethics and information technology, 13(1): 53–64. (Scholar)
- –––, 2013, “On thinging things and serving services: technological mediation and inseparable goods”, Ethics and information technology, 15(3): 195–208. (Scholar)
- –––, 2017, “Beyond individual-centric
privacy: Information technology in social systems” The
Information Society, 33(5): 271–281. (Scholar)
- Pieters, W. & A. van Cleeff, 2009, “The precautionary
principle in a world of digital dependencies”,
Computer, 42(6): 50–56. (Scholar)
- Van de Poel, I., 2013, “Translating values into design
requirements”, in D. P. Michelfelder, N. McCarthy, and D. E.
Goldberg (eds.), Philosophy and engineering: Reflections on
practice, principles and process, Dordrecht: Springer, pp.
253–266. (Scholar)
- –––, 2020, “Values and design” in D.
P. Michelfelder & N. Doorn (eds.), The Routledge Handbook of
the Philosophy of Engineering, London: Routledge, pp.
300–314. (Scholar)
- Raghunathan, T. E., 2021, “Synthetic data”, Annual
Review of Statistics and its Application, 8(1):
129–140. (Scholar)
- Regan, P. M., 2015, “Privacy and the common good:
revisited”, Social dimensions of privacy: Interdisciplinary
perspectives, Cambridge: Cambridge University Press, pp.
50–70. doi:10.1017/cbo9781107280557.004 (Scholar)
- Roberts, A., 2015, “A Republican Account of the Value of Privacy”, European Journal of Political Theory, 14(3): 320–344 (Scholar)
- Rössler, Beate (ed.), 2004, Privacies: Philosophical Evaluations, Stanford, CA: Stanford University Press. (Scholar)
- Rössler, Beate, 2005, The value of privacy, Cambridge: Polity Press. (Scholar)
- –––, 2001 [2005], The Value of Privacy,
Cambridge: Polity Press; original German version Der Wert des
Privaten, Frankfurt am Main: Suhrkamp Verlag, 2001. (Scholar)
- Rubel, Alan, 2011, “The Particularized Judgment Account of Privacy”, Res Publica, 17(3): 275–90. (Scholar)
- Ruiter, J. & M. Warnier, 2011, “Privacy Regulations for
Cloud Computing: Compliance and Implementation in Theory and
Practice”, in Computers, Privacy and Data Protection: an
Element of Choice, S. Gutwirth, Y. Poullet, P. De Hert, and R.
Leenes (eds.), Dordrecht: Springer Netherlands, pp.
361–376. (Scholar)
- Smith, P. T., 2020, “A neo-republican theory of just state
surveillance”, Moral Philosophy and Politics, 7(1):
49–71.
- Solove, D., 2006, “A Taxonomy of Privacy”,
University of Pennsylvania Law Review, 154:
477–564. (Scholar)
- Som, C., L.M. Hilty, & A.R. Köhler, 2009, “The precautionary principle as a framework for a sustainable information society”, Journal of business ethics, 85(3): 493–505. (Scholar)
- Song, D.X., D. Wagner, & A. Perrig, 2000, “Practical
techniques for searches on encrypted data”, in Proceedings
of the 2000 IEEE Symposium on Security and Privacy (S&P
2000), Berkeley, CA, pp. 44–55.
doi:10.1109/secpri.2000.848445. (Scholar)
- Sprenger, Polly, 1999, “Sun on Privacy: ‘Get Over
It’”, Wired, 26 January 1999.
[Sprenger 1999 available online] (Scholar)
- Sweeney, L., 2002, “K-anonymity: A model for protecting
privacy”, International Journal of Uncertainty, Fuzziness
and Knowledge-Based Systems, 10(05): 557–570.
- Tavani, H.T., 2004, “Genomic research and data-mining technology: Implications for personal privacy and informed consent”, Ethics and information technology, 6(1): 15–28. (Scholar)
- Taylor, L., L. Floridi, and B. Van der Sloot (eds.), 2017, Group privacy: New challenges of data technologies (Philosophical Studies Series: Vol. 126), Dordrecht: Springer. (Scholar)
- Thomson, Judith Jarvis, 1975, “The Right to Privacy”, Philosophy and Public Affairs, 4: 295–314. (Scholar)
- Turilli, M. & L. Floridi, 2009, “The ethics of information transparency”, Ethics and Information Technology, 11(2): 105–112. (Scholar)
- Timms, R. & Spurrett, D., 2023, “Hostile Scaffolding” Philosophical Papers, 52(1): 53–82. doi:10.1080/05568641.2023.2231652 (Scholar)
- Veluwenkamp, H., & van den Hoven, J., 2023, “Design for values and conceptual engineering”, Ethics and Information Technology, 25(1): 2. (Scholar)
- Waldman, A. E., 2020, “Cognitive biases, dark patterns, and
the ‘privacy paradox’”, Current opinion in
psychology, 31: 105–109. (Scholar)
- Wang, Y., Wang, J., and Chen, X., 2016, “Secure searchable
encryption: a survey”, Journal of Communications and
Information Networks, 1(4): 52–65. (Scholar)
- Warnier, M., Dechesne, F., and Brazier, F.M.T., 2015,
“Design for the Value of Privacy”, in J. van den Hoven, P.
Vermaas, I. van de Poel (eds.), Handbook of Ethics, Values, and
Technological Design, Dordrecht: Springer, 431–445. (Scholar)
- Warren, Samuel D. & Louis D. Brandeis, 1890, “The Right
to Privacy”, Harvard Law Review, 4(5): 193–220.
[Warren and Brandeis 1890 available online] (Scholar)
- Westin, Alan F., 1967, Privacy and Freedom, New York:
Atheneum. (Scholar)
- Yli-Huumo, J., Ko, D., Choi, S., Park, S., and Smolander, K.,
2016, “Where is current research on blockchain technology?
– a systematic review”, PloS One, 11(10):
e0163477. doi:10.1371/journal.pone.0163477 (Scholar)
- Zuboff, S., 2019, The age of surveillance capitalism: the
fight for the future at the new frontier of power, London:
Profile Books. (Scholar)