Privacy and the Media

Books

Andrew McStay

  • Citations
  • Add to My List
  • Text Size

  • Chapters
  • Front Matter
  • Back Matter
  • Subject Index
  • Copyright

    Praise for Privacy and the Media

    Privacy and the Media is a thoughtful survey of the privacy landscape. McStay reviews the intricate tensions and seeming contradictions to offer an accessible book for anyone curious about the contemporary debates in privacy.’

    danah boyd, founder of Data & Society

    ‘The only book that addresses the full spectrum of the innovation-privacy dynamic, ranging from advertising to intelligence to wearables. It is timely and necessary; essential reading.’

    Gus Hosein, Privacy International

    ‘McStay’s great achievement here is to confront many of the pertinent and complex questions about media and privacy in a style that is both authoritative and easy to read. He provides an excellent overview of the perennial debates and considers the implications on privacy of an increasingly data-driven media environment. His book will prove an excellent companion for all students of this fascinating and crucial topic.’

    Mireille Hildebrandt, Vrije Universiteit Brussel

    ‘This pleasingly accessible book tackles all the major questions that arise in a world whose lifeblood is our personal information: liberty, choice, transparency, control. McStay argues that privacy is “not about isolation, going off-grid or being a digital hermit”. Rather, it is about managing our online lives and controlling how much others know about us. This book persuades me more than ever that privacy is a branch of ethics; it is concerned with the age-old relationship between the self and the other. It will serve as a great introduction to informational privacy, not just for media studies students and privacy lawyers, but for any information rights professional needing a deeper understanding of the subject.’

    Iain Bourne, Information Commissioner’s Office

    ‘Clearly and accessibly written, this book is a great resource for anyone interested in the broad range of ways in which privacy and contemporary media are entangled and in the big picture of privacy-media relations today. It challenges us to take privacy seriously as a media – and mediation – issue. I will definitely be assigning it for my students.’

    Helen Kennedy, University of Sheffield
  • References

    Acquisti, A. and Grossklags, J. (2006) What Can Behavioral Economics Teach Us About Privacy? http://www.heinz.cmu.edu/~acquisti/papers/Acquisti-Grossklags-Chapter-Etrics.pdf, accessed 20 January 2016.
    Adobe (2015) Adobe Privacy Center/Analytics and on-site personalization services, www.adobe.com/privacy/analytics.html?f=2o7, accessed 16 May 2015.
    Albury, K. and Crawford, K. (2012) Sexting, consent and young people’s ethics: beyond Megan’s story, Continuum: Journal of Media & Cultural Studies, 26(3): 463473.
    Allen, A.L. (1988) Uneasy Access: Privacy for Women in Free Society. Totowa, NJ: Rowman & Littlefield.
    Allen, A.L. (2003) Why Privacy Isn’t Everything: Feminist Reflections on Personal Accountability. Lanham, MD: Rowman & Littlefield.
    Altman, I. (1975) The Environment and Social Behaviour: Privacy, Personal Space, Territory, Crowding. Monterey, CA: Brooks/Cole.
    Anderson, C. (2008) The end of theory: the data deluge makes the scientific method obsolete, Wired, http://archive.wired.com/science/discoveries/magazine/16-07/pb_theory, accessed 22 September 2014.
    Anderson, D. (2015) A Question of Trust: Report of the Investigatory Powers Review, https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2015/06/IPR-Report-Web-Accessible1.pdf, accessed 13 October 2015.
    Andrejevic, M. (2013) Infoglut: How Too Much Information is Changing the Way We Think and Know. New York: Routledge.
    Android Official Blog (2014) A sweet lollipop, with a Kevlar wrapping: new security features in Android 5.0, http://officialandroid.blogspot.co.uk/2014/10/a-sweet-lollipop-with-kevlar-wrapping.html, accessed 3 March 2015.
    Apple (2016) A message to our customers, www.apple.com/customer-letter/, accessed 3 June 2016.
    Aristotle (1995 [350 BC]) Politics. Oxford: Oxford University Press.
    Article 29 Working Party (2010) Opinion 2/2010 on online behavioural advertising, http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp171_en.pdf, accessed 3 March 2015.
    Article 29 Working Party (2014a) Opinion 06/2014 on the notion of legitimate interests of the data controller under Article 7 of Directive 95/46/EC, www.cnpd.public.lu/fr/publications/groupe-art29/wp217_en.pdf, accessed 3 March 2015.
    Article 29 Working Party (2014b) Opinion 05/2014 on Anonymisation Techniques, http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp216_en.pdf, accessed 12 November 2014.
    Bakir, V. (2010) Sousveillance, Media and Strategic Political Communication: Iraq, USA, UK. Continuum: New York.
    Bakir, V. (2015) ‘Veillant panoptic assemblage’: mutual watching and resistance to mass surveillance after Snowden, Media and Communication, 3(3): 1225.
    Bakir, V. (forthcoming) Sousveillance, in B. Arrigo (ed.) The Sage Encyclopedia of Surveillance, Security and Privacy. Thousand Oaks, CA: Sage.
    Bakir, V., Cable, V., Dencik, L., Hintz, A. and McStay, A. (2015) Public Feeling on Privacy, Security and Surveillance: A Report by DATA-PSST and DCSS, http://data-psst.bangor.ac.uk/policy.php.en, accessed 20 January 2016.
    Bakir, V. and McStay, A. (2016) Theorising transparency arrangements: assessing interdisciplinary academic and multi-stakeholder positions on transparency in the post-Snowden leak era, Ethical Space: Journal of Communication, 3(1): 2431.
    Ball, J. (2015) GCHQ captured emails of journalists from top international media, Guardian, www.theguardian.com/uk-news/2015/jan/19/gchq-intercepted-emails-journalists-ny-times-bbc-guardian-le-monde-reuters-nbc-washington-post, accessed 20 January 2015.
    Barocas, S. and Nissenbaum, H. (2014) Big data’s end run around anonymity and consent, in J. Lane, V. Stodden, S. Bender and H. Nissenbaum (eds) Privacy, Big Data, and the Public Good Frameworks for Engagement. Cambridge: Cambridge University Press.
    Beniger, J.R. (1986) The Control Revolution: Technological and Economic Origins of the Information Society. Cambridge, MA: Harvard University Press.
    Bennington, G. (2011) Kant’s open secret, Theory, Culture & Society, 28(7–8).
    Birchall, C. (2012) Introduction to ‘secrecy and transparency’: the politics of opacity and openness’, Theory, Culture & Society, 28(7–8): 725.
    Blair, T. (2010) A Journey. London: Random House.
    Bloustein, E.J. (1984 [1964]) Privacy as an aspect of human dignity: an answer to Dean Prosser, in F.D. Schoeman (ed.) Philosophical Dimensions of Privacy: An Anthology. Cambridge: Cambridge University Press. pp. 156202.
    Bond, E. (2011) The mobile phone = bike shed? Children, sex and mobile phones, New Media & Society, 13(4): 587604.
    Boyce, G. (1978) The Fourth Estate: the reappraisal of a concept, in G. Boyce, J. Curran and P. Wingate (eds) Newspaper History from the Seventeenth Century to the Present Day. London: Constable. pp. 1940.
    boyd, d. (2008) Taken Out of Context: American Teen Sociality in Networked Publics. PhD Dissertation, School of Information, University of California-Berkeley, Berkeley, CA.
    boyd, d. (2010) Social network sites as networked publics: affordances, dynamics, and implications, in Z. Papacharissi (ed.) Networked Self: Identity, Community, and Culture on Social Network Sites. London: Routledge. pp. 3958.
    boyd, d. and Crawford, K. (2012) Critical questions for big data, Information, Communication & Society, 15(5): 662679.
    Bruns, A. (2006) ‘Towards produsage: futures for user-led content production’, in F. Sudweeks, H. Hrachovec and C. Ess (eds) Proceedings: Cultural Attitudes towards Communication and Technology 2006, Perth: Murdoch University, http://produsage.org/files/12132812018_towards_produsage_0.pdf, accessed 9 September 2015.
    Callon, M. (2012 [1987]) Society in the making: the study of technology as a tool for sociological analysis, in W.E. Bijker; T.P. Hughes and T. Pinch (eds) The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology. Cambridge, MA: MIT. pp. 77104.
    Carlyle, T. (2007 [1840]) Sartor Resartus, and On Heroes, Hero-Worship, & the Heroic in History. London: J.M. Dent & Sons.
    Chadwick, P. and Mullaly, J. (1997) Privacy and the Media. Melbourne: Communications Law Centre.
    Clifford, D. (2014) EU data protection law and targeted advertising: consent and the Cookie Monster – tracking the crumbs of online user behaviour, JIPITEC, 5, www.jipitec.eu/issues/jipitec-5-3-2014/4095, accessed 12 September 2016.
    Clough, P. (2007) The Affective Turn: Theorizing the Social. Durham, NC: Duke University Press.
    Cohen, J.E. (2012) Configuring the networked self: law, code, and the play of everyday practice, www.juliecohen.com/page5.php, accessed 10 February 2016.
    Cohen, J.L. and Arato, A. (1992) Civil Society and Political Theory. Cambridge, MA: MIT.
    Council of Europe (2010 [1950]) European Convention on Human Rights, www.echr.coe.int/Documents/Convention_ENG.pdf, accessed 5 October 2015.
    Cranor, L.F., Hoke, C., Leon, P.G. and Au, A. (2014) Are They Worth Reading? An In-Depth Analysis of Online Advertising Companies’ Privacy Policies, http://ssrn.com/abstract=2418590, accessed 10 June 2016.
    Darwin, C. (2009 [1872]) The Expression of the Emotions in Man and Animals. London: Harper.
    DeCew, J.W. (1997) In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. New York: Cornell University Press.
    Dworkin, R. (2011 [1977]) Taking Rights Seriously. London: Bloomsbury.
    Ekman, P. and Friesen, W.V. (1971) Constants across cultures in the face and emotion, Journal of Personality and Social Psychology, 17(2): 124129.
    Ekman, P. and Friesen, W.V. (1978) Facial Action Coding System: A Technique for the Measurement of Facial Movement. Palo Alto, CA: Consulting Psychologists Press.
    Engelhardt, H.T. Jr. (2000) Privacy and limited democracy: the moral centrality of persons, Social Philosophy & Policy, 17(2): 120140.
    Flood, M. (2008) Men, sex and homosociality: how bonds between men shape their sexual relations with women, Men and Masculinities, 10(3): 339359.
    Ford, C.S. and Frank, F.A. (1951) Patterns of Sexual Behaviour. New York: Harper & Brothers.
    Fridlund, A.J. (1991) The sociality of solitary smiles: effects of an implicit audience, Journal of Personality and Social Psychology, 60: 229240.
    Fridlund, A.J. (1995) Human Facial Expression: An Evolutionary View. San Diego, CA: Academic Press Inc.
    Fried, C. (1984 [1968]) Privacy [a moral analysis], in F.D. Schoeman (ed.) Philosophical Dimensions of Privacy: An Anthology. Cambridge: Cambridge University Press. pp. 203222.
    Fuchs, C. (2012) The political economy of privacy on Facebook, http://fuchs.uti.at/wp-content/uploads/polec_FB.pdf, accessed 5 October 2015.
    Fuchs, C. (2016) Reading Marx in the Information Age: A Media and Communication Studies Perspective on Capital Volume 1. New York: Routledge.
    Gandy, O.H. (2009) Coming to Terms with Chance: Engaging Rational Discrimination and Cumulative Disadvantage. Burlington, VT: Ashgate.
    Gellman, B. and Poitras, L. (2013) U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program, Washington Post, www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html, accessed 20 October 2015.
    Giddens, A. (1990) The Consequences of Modernity. Cambridge: Polity Press.
    Gillespie, T. (2010) The politics of ‘platforms’, New Media & Society, 12(3): 347367.
    Goffman, E. (1990 [1959]) The Presentation of Self in Everyday Life. London: Penguin.
    Goodman, B. and Flaxman, S. (2016) EU regulations on algorithmic decision-making and a ‘right to explanation’, http://arxiv.org/pdf/1606.08813v1.pdf, accessed 11 July 2016.
    Gregg, M. and Seigworth, G.J. (eds) (2010) The Affect Theory Reader. Durham, NC and London: Duke University Press.
    Greenwald, G. (2014) No Place to Hide: Edward Snowden, the NSA and the U.S. Surveillance State. New York: Metropolitan Books.
    Grisso, A.D. and Weiss, D. (2005) What are gURLs talking about? Adolescent girls’ construction of sexual identity on gURL.com, in S. Mazzarella (ed.) Girl Wide Web: Girls, the Internet, and the Negotiation of Identity. New York: Peter Lang. pp. 3149.
    Grotius, H. (2001 [1625]) On the Law of War and Peace. Kitchener, ON: Batoche Books.
    Guardian (2014) GCHQ views data with no warrant, government admits, www.theguardian.com/uk-news/2014/oct/29/gchq-nsa-data-surveillance?CMP=EMCNEWEML6619I2, accessed 29 October 2014.
    Hall, E.T. (1969) The Hidden Dimension. New York: Anchor.
    Harding, P. (2012) Journalism in the public interest, in R.L. Keeble and J. Mai (eds) The Phone Hacking Scandal: Journalism on Trial. Bury St Edmunds: Abramis. pp. 309320.
    Hardy, J. (2014) Critical Political Economy of the Media. London: Routledge.
    Hasinoff, A.A. (2012) Sexting as media production: rethinking social media and sexuality, New Media & Society, 15(4): 449465.
    Hayashi, K. (2006) ‘The Public’ in Japan, Theory, Culture & Society, 23: 615.
    Hinton, G. (2016) Deep Learning, http://deeplearning.net/tag/geoffrey-hinton/, accessed 20 June 2016.
    Hobbes, T. (1985 [1651]) Leviathan. London: Penguin.
    Hobbes, T. (1998 [1668/1642]) Man and Citizen (De Homine and De Cive). Indianapolis: Hackett.
    Hoofnagle, C. (2013) How the fair credit reporting act regulates big data, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2432955, accessed 20 September 2015.
    Hosein, G. (2004) Privacy and or as Freedom, http://personal.lse.ac.uk/hosein/pubs/mit_chapter_gus.pdf, accessed 15 October 2016.
    House of Commons Science and Technology Committee (2016) The big data dilemma, www.publications.parliament.uk/pa/cm201516/cmselect/cmsctech/468/468.pdf, accessed 20 June 2016.
    IAB (2012) Consumers and Online Privacy 2012 – Bitesize Guide. Retrieved from www.iabuk.net/sites/default/files/Consumers%20and%20Online%20Privacy%202012%20-%20Bitesize%20Guide.pdf, accessed 20 September 2015.
    IAB (2015a) 15% of Britons online are blocking ads, www.iabuk.net/about/press/archive/15-of-britons-online-are-blocking-ads, accessed 20 September 2015.
    IAB (2015b) IAB believes in PRIVACY, www.iabuk.net/blog/the-iab-believes-in-privacy, accessed 20 September 2015.
    IAB (2016) Ad blocking software – consumer usage and attitudes Feb 16, www.iabuk.net/research/library/ad-blocking-software-consumer-usage-and-attitudes-feb-16, accessed 20 June 2016.
    Ilardi, V. (2007) Renaissance Vision from Spectacles to Telescopes. Philadelphia, PA: American Philosophical Society.
    Information Commissioner’s Office (2014) Anonymisation: Managing Data Protection Risk Code of Practice, http://ico.org.uk/~/media/documents/library/Data_Protection/Practical_application/anonymisation-codev2.pdf, accessed 23 October 2014.
    Inside BlackBerry (2015) The Encryption Debate: a Way Forward, http://blogs.blackberry.com/2015/12/the-encryption-debate-a-way-forward/, accessed 20 June 2016.
    International Institute of Communications (2012) Personal data management: the user’s perspective, www.iicom.org/open-access-resources/doc_details/226-personal-datamanagement-the-users-perspective, accessed 1 February 2016.
    ISC (2015) Privacy and security: a modern and transparent legal framework, House of Commons, http://isc.independent.gov.uk/, accessed 15 February 2016.
    Jenkins, H. (2006) Convergence Culture. New York: New York University.
    Kant, I. (1983 [1784]) ‘An Answer to the Question: What is Enlightenment?’ in Perpetual Peace and Other Essays. Indianapolis: Hackett. pp. 3348.
    Kant, I. (2004 [1764]) Observations on the Feeling of the Beautiful and Sublime. Berkeley, CA: University of California Press.
    Kaye, S. (2015) Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc, accessed 13 January 2016.
    Kegan, S. (1992) The structure of normative ethics, Philosophical Perspectives, Ethics, 6: 223242.
    Kitchin, R. (2014) Big Data, new epistemologies and paradigm shifts, Big Data & Society, 112.
    Koehler, J.O. (1999) Stasi: The Untold Story of the East German Secret Police. Boulder, CO: Westview.
    Kosta, E. (2013) Consent in European Data Protection Law. Leiden: Martinus Nijhoff Publishers.
    Kronos (2016) Productivity Resource Centre, www.kronos.co.uk/productivity-resource-centre.aspx, accessed 22 May 2016.
    Kücklich (2005) Precarious playbour: modders and the digital games industry, Fibreculture, 5(25), http://five.fibreculturejournal.org/fcj-025-precarious-playbour-modders-and-the-digital-games-industry/, accessed 15 October 2015.
    Lafkey, D. (2009) The safe harbor method of de-identification: an empirical test, ONC Presentation, 8 October, www.ehcca.com/presentations/HIPAAWest4/lafky_2.pdf, accessed 18 April 2014.
    Landes, J. (ed.) (1998) Feminism, the Public and the Private. New York: Oxford University Press.
    Laney, D. (2001) 3D Data Management: Controlling Data Volume, Velocity and Variety, http://blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf, accessed 15 April 2015.
    Latour, B. (1987) Science in Action. Cambridge, MA: Harvard University Press.
    Latour, B. (2005) Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford: Oxford University Press.
    Lieshout, M.v., Kool, L., Schoonhoven, B.v. and Jonge, M. de (2011) Privacy by design: alternative for existing practices in safeguarding privacy? Paper prepared for EuroCPR. pp. 129.
    Lippman J.R. and Campbell S.W. (2014) Damned if you do, damned if you don’t ... if you’re a girl: relational and normative contexts of adolescent sexting in the United States, Journal of Children and Media, 8(4): 371386.
    Livingstone, S. (2008) Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression, New Media & Society, 10(3): 393411.
    Lloyd, J. (2012) Exposed: the ‘swaggering arrogance’ of the popular press, in R.L. Keeble and J. Mair (eds) The Phone Hacking Scandal: Journalism on Trial. Bury St Edmunds: Abramis. pp. 13.
    Locke, J. (2005 [1689]) Two Treatises of Government and A Letter Concerning Toleration. Stilwell, KS: Digireads.com.
    Lupton, D. (2016) The Quantified Self. Cambridge: Polity.
    Lyon, D. (2001) Surveillance Society: Monitoring Everyday Life. Buckingham: Open University Press.
    Lyon, D. (2015) Surveillance After Snowden. Cambridge: Polity.
    MacKinnon, C. (1989) Toward a Feminist Theory of the State. Cambridge, MA: Harvard University Press.
    Madden, M. (2014) Public perceptions of privacy and security in the post-Snowden era, Pew Research Internet Project, www.pewinternet.org/files/2014/11/PI_PublicPerceptionsofPrivacy_111214.pdf, accessed 14 November 2014.
    Mann, S. (2004) Sousveillance: inverse surveillance in multimedia imaging. In International Multimedia Conference: Proceedings of the 12th Annual ACM International Conference on Multimedia, ACM Press, http://idtrail.org/content/view/135/42/, accessed 20 January 2016.
    Mann, S., Nolan, J. and Wellman, B. (2003) Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments, Surveillance & Society, 1(3): 331355.
    Marcuse, H. (1955 [1941]) Reason and Revolution: Hegel and the Rise of Social Theory. London: Routledge.
    Marthews, A. and Tucker, C. (2014) Government surveillance and internet search behavior, SSRN, http://dx.doi.org/10.2139/ssrn.2412564, accessed 8 November 2014.
    Marwick, A.E. 2010. Status update: celebrity, publicity and self-branding in web 2.0, www.tiara.org/blog/wp-content/uploads/2010/09/marwick_dissertation_statusupdate.pdf, accessed 22 May 2016.
    Marwick, A.E. (2012) The public domain: social surveillance in everyday life, Surveillance & Society, 9(4): 378393.
    Marwick, A.E. and boyd, d. (2014) Networked privacy: how teenagers negotiate context in social media, New Media & Society, 16(7): 10511067.
    Marx, G.T. (2002) What’s new about the ‘new surveillance’? Classifying for change and continuity, Surveillance & Society, 1(1): 929.
    Marx, K. and Engels, F. (2011 [1844]) Economic and Philosophic Manuscripts of 1844. Blacksburg, VA: Wilder.
    Matthews, G. (1992) The Rise of Public Woman: Women’s Power and Woman’s Place in the United States 1630–1970. New York: Oxford University Press.
    McAfee (2014) Study reveals majority of adults share intimate details via unsecured digital devices, www.mcafee.com/uk/about/news/2014/q1/20140204-01.aspx, accessed 4 February 2016.
    McStay, A. (2011) The Mood of Information: a Critique of Online Behavioural Advertising. New York: Continuum.
    McStay, A. (2012) I consent: an analysis of the cookie directive and its implications for UK behavioural advertising, New Media and Society, 15(4): 596611.
    McStay, A. (2013) Creativity and Advertising: Affect, Events and Process. London: Routledge.
    McStay, A. (2014) Privacy and Philosophy: New Media and Affective Protocol. New York: Peter Lang.
    McStay, A. (2016) Digital Advertising (
    second
    edition). London: Palgrave Macmillan.
    McStay, A. (2017) Empathic Media: The Surveillance of Emotional Life. London: Sage.
    Mill, J.S. (1962 [1859]) Utilitarianism, On Liberty, Essay on Bentham. London: Fontana Press.
    Mislove, A. Viswanath, B. Gummadi, K.P. and Druschel, P. (2010) You Are Who You Know: Inferring User Profiles in Online Social Networks, www.ccs.neu.edu/home/amislove/publications/Inferring-WSDM.pdf, accessed 26 January 2016.
    Moore, B. Jr. (1984) Privacy: Studies in Social and Cultural History. New York: M.E. Sharpe.
    National Crime Agency (2015) Sexting becoming the norm for teens, www.nationalcrimeagency.gov.uk/news/632-sexting-becoming-the-norm-for-teens, accessed 26 January 2016.
    Nissenbaum, H. (2004) Privacy as contextual integrity, Washington Law Review, 79(1): 119158.
    Nissenbaum, H. (2010) Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, CA: Stanford University Press.
    NSPCC (2015) Sexting: advice for parents, www.nspcc.org.uk/preventing-abuse/keeping-children-safe/sexting/, accessed 12 June 2015.
    Ofcom (2015a) Promoting Investment and Innovation in the Internet of Things: Summary of Responses and Next Steps, http://stakeholders.ofcom.org.uk/binaries/consultations/iot/statement/IoTStatement.pdf, accessed 2 February 2015.
    Ofcom (2015b) The Communications Market Report: International, http://stakeholders.ofcom.org.uk/market-data-research/market-data/communications-market-reports/cmr15/international/, accessed 2 February 2015.
    Ohm, P. (2009) Broken promises of privacy: responding to the surprising failure of anonymization, UCLA Law Review, 57: 17011777, http://uclalawreview.org/pdf/57-6-3.pdf, accessed 13 October 2014.
    Omand, D. (2010) Securing the State. London: Hurst & Company.
    Pasquale, F. (2015) The Black Box Society: The Secret Algorithms that Control Money and Information. Cambridge, MA: Harvard University Press.
    PEN America (2013) Chilling Effects: NSA Surveillance Drives U.S. Writers to Self-Censor, www.pen.org/sites/default/files/Chilling%20Effects_PEN%20American.pdf, accessed 12 November 2014.
    Pew Internet Center (2014a) Couples, the Internet, and Social Media, www.pewinternet.org/2014/02/11/couples-the-internet-and-social-media/, accessed 10 January 2016.
    Pew Internet Center (2014b) Public Perceptions of Privacy and Security in the Post-Snowden Era, www.pewinternet.org/2014/11/12/public-privacy-perceptions/, accessed 10 May 2015.
    Pew Internet Center (2015) Americans’ Privacy Strategies Post-Snowden, www.pewinternet.org/files/2015/03/PI_AmericansPrivacyStrategies_0316151.pdf, accessed 10 May 2015.
    Pew Research Center (2016) Privacy and Information Sharing, www.pewinternet.org/2016/01/14/privacy-and-information-sharing/, accessed 20 January 2015.
    Picard, R.W. (1995) Affective Computing. MIT Media Laboratory Perceptual Computing Section Technical Report No. 321, www.pervasive.jku.at/Teaching/_2009SS/SeminarausPervasiveComputing/Begleitmaterial/Related%20Work%20(Readings)/1995_Affective%20computing_Picard.pdf, accessed 15 January 2014.
    Picard, R.W. (1997) Affective Computing. Cambridge, MA: MIT.
    Plato (2004 [306 BC]) The Laws. London: Penguin.
    Podesta, J., Pritzker, P., Moniz, E.J., Holden, J. and Zients, J. (2014) Big data: seizing opportunities, preserving values, The White House, www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_5.1.14_final_print.pdf, accessed 13 November 2014.
    Posner, R.A. (1983) The Economics of Justice. Cambridge, MA: Harvard University Press.
    Powell, A. (2010) Configuring consent: emerging technologies, unauthorised sexual images and sexual assault, Australian and New Zealand Journal of Criminology, 43: 7690.
    PricewaterhouseCoopers (2014) PwC’s Global Data & Analytics Survey 2014: Big Decisions, www.pwc.com/gx/en/issues/data-and-analytics/big.../2014-survey.html, accessed 1 January 2015.
    Prosser, W.L. (1984 [1960]) ‘Privacy [A legal analysis]’, in F.D. Schoeman (ed.) Philosophical Dimensions of Privacy: An Anthology. Cambridge: Cambridge University Press. pp. 104155.
    Rawls, J. (1999 [1971]) A Theory of Justice. Cambridge, MA: Belknap Press of Harvard University Press.
    Raynes-Goldie, K. (2010) Aliases, creeping, and wall cleaning: understanding privacy in the age of Facebook, First Monday, 15(1), http://firstmonday.org/article/view/2775/2432, accessed 5 January 2016.
    Regulation of Investigatory Powers Bill standing committee: Clause 5, 2000-03-21, www.publications.parliament.uk/pa/cm199900/cmstand/f/st000321/am/00321s02.htm, accessed 29 October 2014.
    Richards, N. (2015) Intellectual Privacy: Rethinking Civil Liberties in the Digital Age. New York: Oxford University Press.
    Ringrose, J., Gill, R., Livingstone S. and Harvey, L. (2012) A Qualitative Study of Children, Young People and ‘Sexting’: A Report Prepared for the NSPCC. London: National Society for the Prevention of Cruelty to Children.
    Ringrose, J., Harvey, L., Gill, R. and Livingstone, S. (2013) Teen girls, sexual double standards and ‘sexting’: gendered value in digital image exchange, Feminist Theory, 14(3): 305323.
    Rorty, R. (1998) Truth and Progress: Philosophical Papers 3. Cambridge: Cambridge University Press.
    Rozenburg, J. (2004) Privacy and the Press. Oxford: Oxford University Press.
    Rusbridger, A. (2012) Hackgate reveals failure of normal checks and balances to hold power to account, in R.L. Keeble and J. Mair (eds) The Phone Hacking Scandal: Journalism on Trial. Bury St Edmunds: Abramis. pp. 129144.
    Rushe, D. (2015) SIM card database hack gave US and UK spies access to billions of cellphones, Guardian, www.theguardian.com/us-news/2015/feb/19/nsa-gchq-sim-card-billions-cellphones-hacking, accessed 20 February 2015.
    RUSI (2015) A Democratic Licence to Operate: Report of the Independent Surveillance Review, London: Royal United Services Institute for Defence and Security Studies, https://rusi.org/publication/whitehall-reports/democratic-licence-operate-report-independent-surveillance-review, accessed 15 February 2016.
    Salter, M. (2015) Privates in the online public: sex(ting) and reputation on social media, New Media & Society, 117.
    Scahill, J. and Begley, J. (2015) The great SIM heist: how spies stole the keys to the encryption castle, The Intercept, https://firstlook.org/theintercept/2015/02/19/great-sim-heist/, accessed 20 February 2015.
    Schauer, F. (1978) Fear, risk and the first amendment: unraveling the chilling effect, Boston University Law Review, 58/5: 685732.
    Schmidt, E. and Cohen, J. (2013) The New Digital Age: Reshaping the Future of People, Nations and Business. London: John Murray.
    Shirky, C. (2008) Here Comes Everybody: How Change Happens when People Come Together. New York: Penguin.
    Simcox, R. (2015) Surveillance after Snowden: Effective Espionage in an Age of Transparency. London: The Henry Jackson Society.
    Sledge, M. (2013) CIA’s Gus Hunt on big data: we ‘try to collect everything and hang on to it forever’, The Huffington Post, www.huffingtonpost.com/2013/03/20/cia-gus-hunt-big-data_n_2917842.html, accessed 7 July 2014.
    Smythe, D.W. (1977) ‘Communications: blindspot of Western Marxism’, Canadian Journal of Political and Social Theory, 1(3): 127.
    Stoycheff, E. (2016) Under surveillance: examining Facebook’s spiral of silence effects in the wake of NSA internet monitoring, Journalism & Mass Communication Quarterly, 116.
    Sweeney, L. (2002) Achieving k-Anonymity Privacy Protection Using Generalization and Suppression, dataprivacylab.org/dataprivacy/projects/kanonymity/kanonymity2.pdf, accessed 7 July 2014.
    Thiel-Stern, S. (2009) Femininity out of control on the internet: a critical analysis of media representations of gender, youth, and MySpace.com in international news discourses, Girlhood Studies: An Interdisciplinary Journal, 2: 2039.
    Thorp, E.O. (1969) Optimal gambling systems for favorable game. Review of the International Statistical Institute, 37(3): 273293.
    Timberg, C. (2014) Newest Androids will join iPhones in offering default encryption, blocking police, The Washington Post, www.washingtonpost.com/blogs/the-switch/wp/2014/09/18/newest-androids-will-join-iphones-in-offering-default-encryption-blocking-police/, accessed 3 March 2015.
    Tolman, D.L. (2002) Dilemmas of Desire: Teenage Girls Talk about Sexuality. Cambridge, MA; London: Harvard University Press.
    TRUSTe 2014 (2013) UK Consumer Data Privacy Study: Advertising Edition. Retrieved from www.truste.com/resources/privacy-research/uk-consumer-confidence-index-2014/
    Turkle, S. (2011) Alone Together: Why We Expect More from Technology and Less from Each Other. New York: Basic Books.
    Turner, J. (1997) The Institutional Order. New York: Longman.
    US Chamber of Commerce (2014) Re: Big Data and Consumer Privacy in the Internet Economy [Docket No. 140514424– 4424–01], www.ntia.doc.gov/files/ntia/us_chamber.pdf, accessed 17 August 2014.
    Venkataramanan, M. (2014) Madhumita Venkataramanan: my identity for sale, Wired, www.wired.co.uk/magazine/archive/2014/11/features/my-identity-for-sale, accessed 25 December 2014.
    Wack, R. (2010) Privacy: A Short Introduction. Oxford: Oxford University Press.
    Warnick, J. (2012) James Whittaker: how to change the way people think in four easy steps, http://news.microsoft.com/stories/people/james-whittaker.html, accessed 20 January 2015.
    Warren, S. and Brandeis, L. (1984 [1890]) The right to privacy [the implicit made explicit], in F.D. Schoeman (ed.) Philosophical Dimensions of Privacy: An Anthology. Cambridge: Cambridge University Press. pp. 75103.
    Warwick, K. (2012) Artificial Intelligence: The Basics. Abingdon: Routledge.
    Westin, A. (1984 [1967]) The origins of modern claims to privacy, in F.D. Schoeman (ed.) Philosophical Dimensions of Privacy: An Anthology. Cambridge: Cambridge University Press. pp. 5674.
    Young, A.L. and Quan-Haase, A. (2013) Privacy protection strategies on Facebook: the internet privacy paradox revisited, Information, Communication & Society, 16(4): 479500.

    • Loading...
Back to Top

Copy and paste the following HTML into your website