Linked bibliography for the SEP article "Privacy and Information Technology" by Jeroen van den Hoven, Martijn Blaauw, Wolter Pieters and Martijn Warnier

This is an automatically generated and experimental page

If everything goes well, this page should display the bibliography of the aforementioned article as it appears in the Stanford Encyclopedia of Philosophy, but with links added to PhilPapers records and Google Scholar for your convenience. Some bibliographies are not going to be represented correctly or fully up to date. In general, bibliographies of recent works are going to be much better linked than bibliographies of primary literature and older works. Entries with PhilPapers records have links on their titles. A green link indicates that the item is available online at least partially.

This experiment has been authorized by the editors of the Stanford Encyclopedia of Philosophy. The original article and bibliography can be found here.

  • Allen, A., 2011, Unpopular Privacy: What Must We Hide? Oxford: Oxford University Press. (Scholar)
  • Anderson, R.J., 2008, Security Engineering: A guide to building dependable distributed systems, Indianapolis, IN: Wiley. (Scholar)
  • Back, A., U. Möller, & A. Stiglic, 2001, “Traffic analysis attacks and trade-offs in anonymity providing systems”, in Information Hiding, Berlin: Springer, pp. 245–257. (Scholar)
  • Bellman, S., E.J. Johnson, & G.L. Lohse, 2001, “On site: to opt-in or opt-out?: it depends on the question”, Communications of the ACM, 44(2): 25–27. (Scholar)
  • Benevenuto, F., T. Rodrigues, M. Cha, & V. Almeida, 2012, “Characterizing user navigation and interactions in online social networks”, Information Sciences, 195: 1–24. (Scholar)
  • Blaauw. M.J., 2013, “The Epistemic Account of Privacy”, Episteme, 10(2): 167–177. (Scholar)
  • Boenink, M., T. Swierstra, & D. Stemerding, 2010, “Anticipating the interaction between technology and morality: a scenario study of experimenting with humans in bionanotechnology”, Studies in Ethics, Law, and Technology, 4(2): 1–38. doi:10.2202/1941-6008.1098 (Scholar)
  • Brey, P., 2005, “Freedom and privacy in ambient intelligence”, Ethics and Information Technology, 7(3): 157–166. (Scholar)
  • Broenink, G., J.H. Hoepman, C.V.T. Hof, R. Van Kranenburg, D. Smits, & T. Wisman, 2010, “The privacy coach: Supporting customer privacy in the internet of things”, arXiv preprint 1001.4459 [available online]. (Scholar)
  • Cavoukian, A., 2009, Privacy by Design, Ottowa: Information and Privacy Commissioner of Ontario, Canada. [Cavoukian 2009 available online (PDF)]. (Scholar)
  • –––, 2010, “Privacy by Design: The Definitive workshop”, Identity in the Information Society, 3(2): 121–126. (Scholar)
  • Clarke, R., 2009, “Privacy impact assessment: Its origins and development”, Computer law & security review, 25(2): 123–135. (Scholar)
  • Clarke, I., O. Sandberg, B. Wiley, & T. Hong, 2001, “Freenet: A distributed anonymous information storage and retrieval system”, in Designing Privacy Enhancing Technologies, Berlin: Springer, pp. 46–66. (Scholar)
  • Dahl, J. Y., & A.R. Sætnan, 2009, “It all happened so slowly: On controlling function creep in forensic DNA databases”, International journal of law, crime and justice, 37(3): 83–103. (Scholar)
  • Danezis, G., C. Diaz, & C. Troncoso, 2007, “Two-sided statistical disclosure attack”, in Proceedings of the 7th international conference on Privacy enhancing technologies, Berlin: Springer, pp. 30–44. (Scholar)
  • DeCew, Judith Wagner, 1997, Pursuit of Privacy: Law, Ethics, and the Rise of Technology, Ithaca, NY: Cornell University Press. (Scholar)
  • Dechesne, F., M. Warnier, & J. van den Hoven, 2013, “Ethical requirements for reconfigurable sensor technology: a challenge for value sensitive design”, Ethics and Information Technology, 15(3): 173–181. (Scholar)
  • Delaune, S., S. Kremer, & M. Ryan, 2006, “Coercion-resistance and receipt-freeness in electronic voting”, in the Proceedings of the 19th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, pages 28–39. [Delaune et al. 2006 available online] (Scholar)
  • Dingledine, R., N. Mathewson, & P. Syverson, 2004, “Tor: The second-generation onion router”, in Proceedings of the 13th conference on USENIX Security Symposium (Volume 13), Berkeley, CA: USENIX Association, pp. 303–320 [Dingledine et al. 2004 available online (pdf)] (Scholar)
  • Douceur, J., 2002, “The Sybil attack”, in Peer-to-peer Systems, Berlin: Springer, pp. 251–260. (Scholar)
  • Ellison, N. B., 2007, “Social network sites: Definition, history, and scholarship”, Journal of Computer-Mediated Communication, 13(1): 210–230. (Scholar)
  • Evans, N.S., R. Dingledine, & C. Grothoff, 2009, “A practical congestion attack on Tor using long paths”, in Proceedings of the 18th conference on USENIX security symposium, Berkeley, CA: USENIX Association, pp. 33–50. [Evans et al. 2009 available online] (Scholar)
  • Floridi, L., 2008, “Artificial intelligence's new frontier: Artificial companions and the fourth revolution”, Metaphilosophy, 39(4–5): 651–655. (Scholar)
  • Friedewald, M. & O. Raabe, 2011, “Ubiquitous computing: An overview of technology impacts”, Telematics and Informatics, 28(2): 55–65. (Scholar)
  • Friedman, B., P.H. Kahn, Jr, & A. Borning, 2006, “Value sensitive design and information systems”, in Human-computer interaction in management information systems: Foundations, P. Zhang & D. Galletta (eds.), Armonk: M.E. Sharp, 4. (Scholar)
  • Gentry, C., 2009, “Fully homomorphic encryption using ideal lattices”, in Proceedings of the 41st annual ACM symposium on Theory of computing, ACM, pp. 169–178. (Scholar)
  • Goyal, V., O. Pandey, A. Sahai, & B. Waters, 2006, “Attribute-based encryption for fine-grained access control of encrypted data”, in Proceedings of the 13th ACM conference on Computer and communications security, ACM, pp. 89–98. (Scholar)
  • Gutwirth, S. & P. De Hert, 2008, “Regulating profiling in a democratic constitutional state”, in Hildebrandt and Gutwirth 2008: 271–302. (Scholar)
  • den Haak, B., 2012, “Integrating user customization and authentication: the identity crisis”, Security & Privacy, IEEE, 10(5): 82–85. (Scholar)
  • Heersmink, R., J. van den Hoven, N.J. van Eck, & J. van den Berg, 2011. “Bibliometric mapping of computer and information ethics”, Ethics and information technology, 13(3): 241–249. (Scholar)
  • Hildebrandt, M., 2008, “Defining Profiling: A New Type of Knowledge?” in Hildebrandt and Gutwirth 2008: 17–45. (Scholar)
  • Hildebrandt, M. & S. Gutwirth (eds.), 2008, Profiling the European Citizen: Cross-disciplinary Perspectives, Dordrecht: Springer Netherlands. (Scholar)
  • Hoare, T., 2003, “The verifying compiler: A grand challenge for computing research”, in Proceedings of the 12th international conference on Compiler construction, Berlin: Springer, pp. 262–272. (Scholar)
  • Hone, K. & J.H.P. Eloff, 2002, “Information security policy—what do international information security standards say?”, Computers & Security, 21(5): 402–409. (Scholar)
  • van den Hoven, J., 1999, “Privacy and the Varieties of Informational Wrongdoing”, Australian Journal of Professional and Applied Ethics, 1(1): 30–44. (Scholar)
  • –––, 2008, “Information technology, privacy, and the protection of personal data”, in Information technology and moral philosophy, J. Van Den Hoven and J. Weckert (eds.), Cambridge: Cambridge University Press, pp. 301–322. (Scholar)
  • van den Hoven, J., G.J. Lokhorst, & I. Van de Poel, 2012, “Engineering and the problem of moral overload”, Science and engineering ethics, 18(1): 143–155. (Scholar)
  • Ko, M.N., G.P. Cheek, M. Shehab, & R. Sandhu, 2010, “Social-networks connect services”, Computer, 43(8): 37–43. (Scholar)
  • Krishnamurthy, B. & C.E. Wills, 2009. “On the leakage of personally identifiable information via online social networks”, in Proceedings of the 2nd ACM workshop on Online social networks, ACM, pp. 7–12. (Scholar)
  • LeFevre, K., D.J. DeWitt, & R. Ramakrishnan, 2005, “Incognito: Efficient full-domain k-anonymity”, in Proceedings of the 2005 ACM SIGMOD international conference on Management of data, ACM, pp. 49–60. (Scholar)
  • Loeckx, J., K. Sieber, & R.D. Stansifer, 1985, The foundations of program verification, Chichester: John Wiley & Sons. (Scholar)
  • Matheson, David, 2007, “Unknowableness and Informational Privacy”, Journal of Philosophical Research, 32: 251–67. (Scholar)
  • Mayer, J.R. & J.C. Mitchell, 2012, “Third-party web tracking: Policy and technology”, in Security and Privacy (SP) 2012 IEEE Symposium on, IEEE, pp. 413–427. (Scholar)
  • Michener, J., 1999, “System insecurity in the Internet age”, Software, IEEE, 16(4): 62–69. (Scholar)
  • Nissenbaum, Helen, 2004, “Privacy as Contextual Integrity”, Washington Law Review, 79: 101–139. (Scholar)
  • OECD, 1980, Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, OECD. [OECD 1980 available online] (Scholar)
  • Palmer, D.E., 2005, “Pop-ups, cookies, and spam: toward a deeper analysis of the ethical significance of internet marketing practices”, Journal of business ethics, 58(1–3): 271–280. (Scholar)
  • Pieters, W., 2011, “Explanation and trust: what to tell the user in security and AI?”, Ethics and information technology, 13(1): 53–64. (Scholar)
  • –––, 2013, “On thinging things and serving services: technological mediation and inseparable goods”, Ethics and information technology, 15(3): 195–208. (Scholar)
  • Pieters, W. & A. van Cleeff, 2009, “The precautionary principle in a world of digital dependencies”, Computer, 42(6): 50–56. (Scholar)
  • Rössler, Beate (ed.), 2004, Privacies: Philosophical Evaluations, Stanford, CA: Stanford University Press. (Scholar)
  • Rubel, Alan, 2011, “The Particularized Judgment Account of Privacy”, Res Publica, 17(3): 275–90. (Scholar)
  • Ruiter, J. & M. Warnier, 2011, “Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice”, in Computers, Privacy and Data Protection: an Element of Choice, S. Gutwirth, Y. Poullet, P. De Hert, and R. Leenes (eds.), Dordrecht: Springer Netherlands, pp. 361–376. (Scholar)
  • Solove, D., 2006, “A Taxonomy of Privacy”, University of Pennsylvania Law Review, 154: 477–564. (Scholar)
  • Som, C., L.M. Hilty, & A.R. Köhler, 2009, “The precautionary principle as a framework for a sustainable information society”, Journal of business ethics, 85(3): 493–505. (Scholar)
  • Song, D.X., D. Wagner, & A. Perrig, 2000, “Practical techniques for searches on encrypted data”, in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on, IEEE, pp. 44–55. (Scholar)
  • Sweeney, L., 2002, “K-anonymity: A model for protecting privacy”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05): 557–570.
  • Tavani, H.T., 2004, “Genomic research and data-mining technology: Implications for personal privacy and informed consent”, Ethics and information technology, 6(1): 15–28. (Scholar)
  • Thomson, Judith Jarvis, 1975, “The Right to Privacy”, Philosophy and Public Affairs, 4: 295–314. (Scholar)
  • Turilli, M. & L. Floridi, 2009, “The ethics of information transparency”, Ethics and Information Technology, 11(2): 105–112. (Scholar)
  • Warren, Samuel D. & Louis D. Brandeis, 1890, “The Right to Privacy”, Harvard Law Review, 4(5): 193–220. [Warren and Brandeis 1890 available online] (Scholar)
  • Westin, Alan F., 1967, Privacy and Freedom, New York: Atheneum. (Scholar)

Generated Mon Feb 19 03:45:38 2018