Bibliography

Bamberger, Kenneth A., and Deirdre K. Mulligan. “Privacy Decisionmaking in Administrative Agencies.” University of Chicago Law Review 75, no. 1 (2008): 75–107 (http://ssrn.com/abstract=1104728).

Barbaro, Michael, and Tom Zeller Jr. “A Face Is Exposed for AOL Searcher No. 4417749.” New York Times, August 9, 2006.

Barocas, Solon. “Data Mining and the Discourse on Discrimination.” In Proceedings of Data Ethics Workshop at ACM Conference on Knowledge Discovery and Data Mining, New York, 2014.

Beck, Ulrich. Risk Society: Towards a New Modernity. London: SAGE, 1999.

Berlin, Isaiah. The Crooked Timber of Humanity: Chapters in the History of Ideas. Princeton University Press, 2013.

Birnhack, Michael, and Yofi Tirosh. “Naked in Front of the Machine: Does Airport Scanning Violate Privacy?” Ohio State Law Journal 74, no. 6 (2013): 1263–1306 (http://ssrn.com/abstract=2234476).

Bok, Sissela. Lying: Moral Choice in Public and Private Life. New York: Vintage Books, 1999.

boyd, danah. It’s Complicated: The Social Lives of Networked Teens. New Haven: Yale University Press, 2014.

Brin, David. The Transparent Society. New York: Perseus Books, 1998.

Burkell, Jacquelyn, and Alexandre Fortier. “Privacy Policy Disclosures of Behavioural Tracking on Consumer Health Websites.” Proceedings of the American Society for Information Science and Technology 50, no. 1 (2014): 1–9 (doi:10.1002/meet.14505001087).

Ceccato, Mariano, Massimiliano Di Penta, Jasvir Nagra, Paolo Falcarin, Filippo Ricca, Marco Torchiano, and Paolo Tonella. “The Effectiveness of Source Code Obfuscation: An Experimental Asessment.” In Proceedings of 17th International Conference on Program Comprehension, 2009 (doi: 10.1109/ICPC.2009.5090041).

Chesterton, Gilbert Keith. “The Sign of the Broken Sword.” In The Innocence of Father Brown. London: Cassell, 1947.

Cho, Max. “Unsell Yourself—A Protest Model Against Facebook.” Yale Law & Technology blog May 10, 2011 (http://www.yalelawtech.org/control-privacy-technology/unsell-yourself-%E2%80%94-a-protest-model-against-facebook/).

Cohen, Fred. “The Use of Deception Techniques: Honeypots and Decoys.” In Handbook of Information Security, volume 3, ed. Hossein Bidgoli. Hoboken: Wiley, 2006.

Cohen, Julie E. “Examined Lives: Informational Privacy and the Subject as Object.” Stanford Law Review 52, May (2000): 1373–1437 (http://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=1819acontext=facpub).

Deseriis, Marco. “Lots of Money Because I Am Many: The Luther Blissett Project and the Multiple-Use Name Strategy.” Thamyris/Intersecting 21 (2011): 65–93.

Domscheit-Berg, Daniel. Inside WikiLeaks: My Time with Julian Assange at the World’s Most Dangerous Website. New York: Crown, 2011.

Dourish, Paul, Emily Troshynski, and Charlotte Lee. “Accountabilities of Presence: Reframing Location-Based Systems.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2008 (doi: 10.1145/1357054.1357133).

Dourish, Paul. “Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena.” Human-Computer Interaction 21, no. 3 (2006): 319– 342 (doi:10.1207/s15327051hci2103_2).

Dwork, Cynthia, and Aaron Roth. “The Algorithmic Foundations of Differential Privacy.” Foundations and Trends in Theoretical Computer Science 9, no. 3–4 (2014): 211–407 (doi: 10.1561/0400000042).

Dwork, Cynthia, Frank McSherry, Kobbi Nissim, and Adam Smith. “Calibrating Noise to Sensitivity in Private Data Analysis.” In Proceedings of the Third Conference on Theory of Cryptography, 2006 (doi: 10.1007/11681878_14).

Finkel, Meir. On Flexibility: Recovery from Technological and Doctrinal Surprise on the Battlefield. Stanford University Press, 2011.

Finnis, John. “Aquinas’ Moral, Political and Legal Philosophy.” In The Stanford Encyclopedia of Philosophy, ed. Edward N. Zalta (http://plato.stanford.edu/archives/sum2014/entries/aquinas-moral-political/).

Fiore-Silfvast, Brittany and Gina Neff. “Communication, Mediation, and the Expectations of Data: Data Valences across Health and Wellness Communities.” Under review at International Journal of Communication.

France, Anatole. The Red Lily. San Bernardino: Borgo, 2002.

Ganter, Viola, and Michael Strube. “Finding Hedges by Chasing Weasels: Hedge Detection Using Wikipedia Tags and Shallow Linguistic Features.” In Proceedings of the ACL-IJCNLP Conference Short Papers, 2009 (http://dl.acm.org/citation.cfm?id=1667636).

Garg, Sanjam, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. “Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits.” Presented at IEEE 54th Annual Symposium on Foundations of Computer Science, 2013 (doi: 10.1109/FOCS.2013.13).

Gavison, Ruth. “Privacy and the Limits of the Law.” In Philosophical Dimensions of Privacy: An Anthology, ed. Ferdinand David Schoeman. Cambridge University Press, 1984.

Giddens, Anthony. “Risk and Responsibility.” Modern Law Review 62, no. 1 (1999): 1–10 (doi:10.1111/1468-2230.00188).

Goldberger, Leo, ed. The Rescue of the Danish Jews: Moral Courage Under Stress. New York University Press, 1987.

Goldman, Francisco. The Art of Political Murder: Who Killed the Bishop? New York: Grove, 2007.

Green, Gion. “Rating Files, Safes, and Vaults.” In Handbook of Loss Prevention and Crime Prevention, ed. Lawrence Fennelly. Oxford: Elsevier, 2012.

Greenberg, Andy. This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information. New York: Dutton, 2012.

Greenwald, Glenn. No Place to Hide: Edward Snowden, the NSA and the U.S. Surveillance State. New York: Metropolitan Books, 2014.

Habinek, Thomas. The World of Roman Song: From Ritualized Speech to Social Order. Baltimore: Johns Hopkins University Press, 2005.

Heidegger, Martin. The Question Concerning Technology and Other Essays. New York: Garland, 1977.

Hellmuth, Phil Marvin Karlins, and Joe Navarro. Phil Hellmuth Presents Read ‘Em and Reap. New York: HarperCollins, 2006.

Holmes, David I., and Richard S. Forsyth. “The Federalist Revisited: New Directions in Authorship Attribution.” Literary and Linguistic Computing 10, no. 2 (1995): 111–127 (doi: 10.1093/llc/10.2.111).

Hoofnagle, Chris Jay, and Jan Whittington. “Free: Accounting for the Costs of the Internet’s Most Popular Price.” UCLA Law Review. University of California, Los Angeles. School of Law 61 (2014): 606–670 (http://ssrn.com/abstract=2235962).

Hoofnagle, Chris Jay, Ashkan Soltani, Nathaniel Good, and Dietrich J. Wambach. “Behavioral Advertising: The Offer You Can’t Refuse.” Harvard Law & Policy Review 6, August (2012): 273–296 (http://ssrn.com/abstract=2137601).

Howe, Daniel, and Helen Nissenbaum. “TrackMeNot: Resisting Surveillance in Web Search.” In Lessons From the Identity Trail: Anonymity, Privacy and Identity in a Networked Society, ed. Ian Kerr, Carole Luckock, and Valerie Steeves. Oxford University Press, 2009.

Izal, Mikel, Guillaume Urvoy-Keller, Ernst W. Biersack, Pascal Felber, Anwar Al Hamra, and Luis Garcés-Erice. “Dissecting BitTorrent: Five Months in a Torrent’s Lifetime.” In Passive and Active Network Measurement, ed. Chadi Barakat and Ian Pratt. Berlin: Springer, 2004..

Jenkin, Tim. “Talking to Vula.” Mayibuye, May–October 1995 (www.anc.org.za/show.php?id=4693).

Kafka, Ben. The Demon of Writing. Cambridge: MIT Press, 2012.

Kelly, Kevin. Out of Control: The New Biology of Machines, Social Systems and the Economic World. Indianapolis: Addison-Wesley, 1994.

Koopman, Colin. “Internetworked Publics: The Emerging Political Conditions of the Internet.” Paper presented at Ars Synthetica: The Anthropology of the Contemporary, Santa Cruz, 2009.

Koppel, Moshe, and Jonathan Schler. “Authorship Verification as a One-Class Classification Problem.” In Proceedings of the 21st International Conference on Machine Learning, 2004 (doi: 10.1145/1015330.1015448).

Lane, Julia, Victoria Stodden, Stefan Bender, and Helen Nissenbaum, eds. Privacy, Big Data, and the Public Good: Frameworks for Engagement. Cambridge University Press, 2014.

Lauer, Josh. “The Good Consumer: Credit Reporting and the Invention of Financial Identity in the United States, 1840–1940.” Enterprise and Society 11, no. 4 (2010): 686–694 (doi:10.1093/es/khq091).

Lauer, Josh. The Good Consumer: A History of Credit Surveillance and Financial Identity in America. New York: Columbia University Press, forthcoming.

Lund, Jens, with reply by István Deák. “The Legend of King Christian: An Exchange.” New York Review of Books 30, no. 5 (1990) (http://www.nybooks.com/articles/archives/1990/mar/29/the-legend-of-king-christian-an-exchange/).

Luo, Wanying, Qi Xie, and Urs Hengartner. “FaceCloak: An Architecture for User Privacy on Social Networking Sites.” In Proceedings of the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (https://cs.uwaterloo.ca/~uhengart/publications/passat09.pdf).

Mahon, James Edwin. “The Definition of Lying and Deception.” In The Stanford Encyclopedia of Philosophy, ed. Edward N. Zalta (http://plato.stanford.edu/archives/fall2008/entries/lying-definition/).

Marx, Gary T. “A Tack in the Shoe: Neutralizing and Resisting New Surveillance.” Journal of Social Issues 59, no. 2 (2003): 369–390 (doi:10.1111/1540-4560.00069).

Marx, Gary T. “Technology and Social Control: The Search for the Illusive Silver Bullet Continues.” In International Encyclopedia of the Social and Behavioral Sciences, second edition. Oxford: Elsevier, forthcoming.

Marx, Gary T. “The Public as Partner? Technology Can Make Us Auxiliaries as Well as Vigilantes.” IEEE Security and Privacy 11, no. 5 (2013): 56–61 (doi: http://DOI.ieeecomputersociety.org/10.1109/MSP.2013.126).

Marx, Gary T. Undercover: Police Surveillance in America. Oakland: University of California Press, 1989.

Maslinsky, Kirill, Sergey Koltcov, and Olessia Koltslova. “Changes in the Topical Structure of Russian-Language LiveJournal: The Impact of Elections 2011.” Research Paper WP BPR 14/SOC/2013, National Research University, Moscow, 2013.

Mateas, Michael, and Nick Monfort. “A Box, Darkly: Obfuscation, Weird Languages, and Code Aesthetics.” In Proceedings of the 6th Annual Digital Arts and Culture Conference, 2005 (http://elmcip.net/node/3634).

Mayer-Schönberger, Viktor, and Kennth Cukier. Big Data: A Revolution That Will Transform How We Live, Work and Think. New York: Houghton Mifflin Harcourt, 2013.

McDonald, Aleecia M., and Lorrie F. Cranor. “The Cost of Reading Privacy Policies.” I/S 4, no. 3 (2008): 540–565 (http://lorrie.cranor.org/pubs/readingPolicyCost-authorDraft.pdf).

Meyerowitz, Joseph, and Romit R. Choudhury. “Hiding Stars with Fireworks: Location Privacy through Camouflage.” In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking. 2009.

Moore, Alan, and David Lloyd. V for Vendetta. New York: Vertigo/DC Comics, 1982.

Narayanan, Arvid. “What Happened to the Crypto Dream? Part 2.” IEEE Security and Privacy 11, no. 3 (2013): 68–71 (doi: http://DOI.ieeecomputersociety.org/10.1109/MSP.2013.75),

Neff, Gina. “Why Big Data Won’t Cure Us.” Big Data 1, no. 3 (2013): 117–123 (doi:10. 1089/big.2013.0029).

Nippert-Eng, Christena E. Islands of Privacy. University of Chicago Press, 2010.

Nissenbaum, Helen. Privacy in Context: Technology, Policy and the Integrity of Social Life. Stanford University Press, 2009.

Orcutt, Mike. “Twitter Mischief Plagues Mexico’s Election.” MIT Technology Review, June 21, 2014 (http://www.technologyreview.com/news/428286/twitter-mischief-plagues-mexicos-election/).

Parkhomenko, Ekaterina, and Arch Tait. “Blog Talk.” Index on Censorship 37, February (2008): 174–178 (doi: 10.1080/03064220701882822).

Pettit, Philip. Republicanism: A Theory of Freedom and Government. Oxford University Press, 1997.

Rajendran, Jeyavijayan, Ozgur Sinanoglu, Michael Sam, and Ramesh Karri. “Security Analysis of Integrated Circuit Camouflaging.” Presented at ACM Conference on Computer and Communications Security, 2013 (doi:10.1145/2508859.2516656).

Rao, Josyula R., and Pankaj Rohatgi. “Can Pseudonymity Really Guarantee Privacy?” In Proceedings of the 9th USENIX Security Symposium, 2000 (https://www.usenix.org/legacy/events/sec2000/full_papers/rao/rao_html/index.html).

Rawls, John. A Theory of Justice. Cambridge: Harvard University Press, 1971.

Regan, Priscilla M. Legislating Privacy: Technology, Social Values and Public Policy. Chapel Hill: University of North Carolina Press, 1995.

Reiman, Jeffrey H. “Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future.” Santa Clara High Technology Journal 11, no. 1 (1995): 27–44 (http://digitalcommons.law.scu.edu/chtlj/vol11/iss1/5).

Ripstein. Arthur. Equality, Responsibility and the Law. Cambridge University Press, 1999.

Scott, James C. Domination and the Arts of Resistance: Hidden Transcripts. New Haven: Yale University Press, 1992.

Shell, Hanna Rose. Hide and Seek: Camouflage, Photography, and the Media of Reconnaissance. Cambridge: Zone Books, 2012.

Shostack, Adam. Threat Modeling: Designing for Security. Indianapolis: Wiley, 2014.

Solove, Daniel J. “A Taxonomy of Privacy.” University of Pennsylvania Law Review 154, no. 3 (2006): 477–560 (doi: 10.2307/40041279).

Solove, Daniel J. “Privacy Self-Management and the Consent Dilemma.” Harvard Law Review 126 (2013): 1880–1903. http://ssrn.com/abstract=2171018.

Solove, Daniel J. Understanding Privacy. Cambridge: Harvard University Press, 2010.

Solove, Daniel J., and Paul M. Schwartz. Privacy Law Fundamentals, second edition. Portsmouth: International Association of Privacy Professionals, 2013.

Strandburg, Katherine J. “Free Fall: The Online Market’s Consumer Preference Disconnect.” University of Chicago Legal Forum 95 (2013): 95–172. http://ssrn.com/abstract=2323961.

Strandburg, Katherine J. “Home, Home on the Web and Other Fourth Amendment Implications of Technosocial Change.” University of Maryland Law Review 70, April (2011): 614–680 (http://ssrn.com/abstract=1808071)>

Strandburg, Katherine J., and Daniela Stan Raicu. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation. New York: Springer, 2006.

Templeton, Brad. “The Evils of Cloud Computing: Data Portability and Single Sign On.” Presented at BIL Conference, 2009 (http://www.vimeo.com/3946928).

Toubiana, Vincent, and Helen Nissenbaum. “An Analysis of Google Logs Retention Policies.” Journal of Privacy and Confidentiality 3, no. 1 (2011): 3–26. http://repository.cmu.edu/jpc/vol3/iss1/2/.

Tseng, Ling, and I.-Min Tso. “A Risky Defense by a Spider Using Conspicuous Decoys Resembling Itself in Appearance.” Animal Behaviour 78, no. 2 (2009): 425–431 (doi: 10.1016/j.anbehav.2009.05.017).

Turow, Joseph. The Daily You: How the New Advertising Industry is Defining Your Identity and Your Worth. New Haven: Yale University Press, 2013.

Turow, Joseph, Chris Jay Hoofnagle, Dierdre K. Mulligan, Nathaniel Good, and Jens Grossklags. “The Federal Trade Commission and Consumer Privacy in the Coming Decade.” I/S 3, no. 3 (2007): 723–749 (http://ssrn.com/abstract=2365578).

van den Hoven, Jeroen, and Emma Rooksby. “Distributive Justice and the Value of Information: A (Broadly) Rawlsian Approach.” In Information Technology and Moral Philosophy, ed. John Wecker. Cambridge University Press, 2008.

Waldron, Jeremy. Torture, Terror and Trade-Offs: Philosophy for the White House. Oxford University Press, 2012.

Westin, Alan F. “Science, Privacy and Freedom: Issues and Proposals for the 1970’s. Part I—the Current Impact of Surveillance on Privacy.” Columbia Law Review 66, no. 6 (1966): 1003–1050 (http://www.jstor.org/stable/1120997).

Willis, Lauren E. “Why Not Privacy by Default?” Berkeley Technology Law Journal 29 (2014): 61–134 (http://ssrn.com/abstract=2349766).

Young, Adam, and Moti Yung. “Kleptography: Using Cryptography Against Cryptography.” In Advances in Cryptology—Eurocrypt ‘97, ed. Walter Fumy, 62–74. Berlin: Springer, 1997.

Zarsky, Tal. “Transparent Predictions.” University of Illinois Law Review 2013, no. 4: 1519–1520.