References
- Akrich, M. 2000. The de-scription of technical objects, In Shaping technology/building society: Studies in socio-technical change, ed. W. Bijker and J. Law, 205–24. Cambridge, MA: MIT Press.
- Alfino, M., and G. R. Mayes. 2003. Reconstructing the right to privacy. Social Theory and Practice 29 (1):1–18.
- Angwin, J. 2010. The Web's new gold mine: Your secrets. Wall Street Journal, July 10. http://online.wsj.com/news/articles/SB10001424052748703940904575395073512989404 ( accessed May 3, 2015).
- Ayenson, M., D. Wambach, A. Soltani, N. Good, and C. Hoofnagle. 2011. Flash cookies and privacy II: Now with HTML5 and etag respawning. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1898390 ( accessed September 24, 2015).
- Beales, H. 2013. Protecting consumers from privacy problems: Privacy issues as ‘Unfair or deceptive acts or practices’. Paper presented at PPC: The Law & Economics of Privacy and Data Security, Washington, DC, June 18–20.
- Beales, H. J., and T. Muris. 2008. Choice or consequences: Protecting privacy in commercial information. University of Chicago Law Review 75 (1):109–135.
- Bedi, M. 2013. Facebook and interpersonal privacy: Why the third party doctrine should not apply. Boston College Law Review 54 (1):1–71.
- Benn, S. 1984. Privacy, freedom, and respect for persons. In Philosophical dimensions of privacy: An anthology, ed. F. Schoema, 223–44. Cambridge, UK: Cambridge University Press.
- Bennett, C. 2011. In defense of privacy: The concept and the regime. Surveillance & Society 8 (4):485–96.
- Bentham, J. 1791. Panopticon or the inspection house. Vol. 2. London, UK: T. Payne.
- Bijker, W. 1995. Of bicycles, Bakelites, and bulbs: Toward a theory of sociotechnical change. Cambridge, MA: MIT Press.
- Bloustein, E. 1964. Privacy as an aspect of human dignity: An answer to Dean Proseer. New York University Law Review 39:962–1007.
- Boyd, D., and K. Crawford. 2012. Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication, & Society 15 (5):662–79.
- Brunton, F., and H. Nissenbaum. 2011. Vernacular resistance to data collection and analysis: A political theory of obfuscation. First Monday 16 (5): online. http://firstmonday.org/article/view/3493/2955 ( accessed May 3, 2015).
- Buitelaar, J. 2014. Privacy and narrativity in the Internet era. The Information Society 30 (4):266–81.
- Calo, R. 2012. Against notice skepticism in privacy (and elsewhere). Notre Dame Law Review 87:1027–72.
- Calo, R. 2013. Consumer subject review boards: A thought experiment. Stanford Law Review 66:97.
- Cohen, J. 2008. Privacy, visibility, transparency, and exposure. University of Chicago Law Review 75 (1):181–201.
- Cranor, L. F., C. Hoke, P. G. Leon, and A. Au. 2014. Are they worth reading? An in-depth analysis of online advertising companies' privacy policies. Presented at 42nd Research Conference on Communication, Information and Internet Policy (TPRC 2014), March 31. https://www.andrew.cmu.edu/user/pgl/tprc2014.pdf.
- Donaldson, T., and T. Dunfee. 1994. Toward a unified conception of business ethics: Integrative social contracts theory. Academy of Management Review 19 (2):252–84.
- Duhigg, C., and D. Barboza. 2012. In China, human costs are built into an iPad. The New York Times, January 25. http://www.nytimes.com/2012/01/26/business/ieconomy-apples-ipad-and-the-human-costs-for-workers-in-china.html?pagewanted=all ( accessed September 24, 2014).
- Etzioni, A. 2012. The privacy merchants: What is to be done? University of Pennsylvania Journal of Constitutional Law 14 (4):929.
- Federal Trade Commission. 2012. Protecting consumer privacy in an era of rapid change: Recommendations for business and policymakers. March. https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf ( accessed May 3, 2015).
- Foucault, M. 1977. Discipline and punish: The birth of the prison. New York, NY: Vintage.
- Fried, C. 1970. An anatomy of values. Cambridge, MA: Harvard University Press.
- Google. 2014. Government requests to remove content. https://www.google.com/transparencyreport/removals/government/?hl=en (accessed November 21, 2015).
- Hartzog, W. 2012. Chain-link confidentiality. Georgia Law Review 46:657.
- Hartzog, W. and F. Stutzman. 2013. The case for online obscurity. California Law Review 101:1–35.
- Heeney, C. 2012. Breaching the contract? Privacy and the UK Census. The Information Society 28 (5):316–28.
- Hoffman, D. L., T. P. Novak, and M. A. Peralta. 1999. Information privacy in the marketspace: Implications for the commercial uses of anonymity on the web. The Information Society 15 (2):129–39.
- Hoofnagle, C., and N. Good. 2012. The Web privacy census, October. http://law.berkelet.edu/privacycensus.htm. ( accessed September 24, 2014).
- Horwitz, S., and S. Asokan. 2011. U.S. probes use of surveillance technology in Syria. The Washington Post, November 18. http://www.washingtonpost.com/world/national-security/us-probes-use-of-surveillance-technology-in-syria/2011/11/17/gIQAS1iEVN_story.html ( accessed September 24, 2014).
- Kerr, O. 2009. The case for the third-party doctrine. Michigan Law Review 107:951 ( accessed 9/24/2014).
- Kerr, O. 2012. The mosaic theory of the Fourth Amendment. Michigan Law Review 111 (3):311–54.
- Kravets, D. 2013a. Alleged drug dealer at center of Supreme Court GPS case wins mistrial. Wired, March 4. http://www.wired.com/2013/03/gps-drug-dealer-retrial/ ( accessed September 24, 2014).
- Kravets, D. 2013b. Google says the FBI is secretly spying on some of its customers. Wired, March 5. http://www.wired.com/2013/03/google-nsl-range ( accessed 9/24/2014).
- Laney, D. 2001. 3D data management: Controlling data volume, velocity, and variety. http://blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdf. (accessed September 24, 2014).
- Langenderfer, J., and D. Cook. 2004. Oh, what a tangled web we weave: The state of privacy protection in the information economy and recommendations for governance. Journal of Business Research 57 (7):734–47.
- Latour, L. 2000. Where are the missing masses? The sociology of a few mundane artifacts. In Shaping technology/building societies: Studies in socio-technical change, ed. W. Bijker and J. Law, 225–28. Cambridge, MA: MIT Press.
- Leon, P. G., L. F. Cranor, A. M. McDonald, and R. McGuire. 2010. Token attempt: The misrepresentation of website privacy policies through the misuse of p3p compact policy tokens. In Proceedings of the 9th annual ACM workshop on Privacy in the electronic society (pp. 93–104). New York, NY: ACM.
- Leon, P. G., J. Cranshaw, L. F. Cranor, J. Graves, M. Hastak, B. Ur, and G. Xu. 2012, October. What do online behavioral advertising privacy disclosures communicate to users?. In Proceedings of the 2012 ACM workshop on Privacy in the electronic society (pp. 19–30). New York, NY: ACM.
- Leon, P. G., R. Ashwini, S. Florian, M. Abigail, F. C. Lorrie, and S. Norman. 2014. Why people are (Un) willing to share information with online advertisers. Paper presented at Workshop on Privacy in the Electronic Society (WPES 2014), Scottsdale, AZ, November 3. http://www.contrib.andrew.cmu.edu/∼pgl/wpes2014oba.pdf (accessed May 3, 2015 ).
- Leon, P. G., U. Blase, W. Yang, S. Manya, B. Rebecca, S. Richard, B. Lujo, C. Mihai, and F. C. Lorrie. 2013. What matters to users? Factors that affect users' willingness to share information with online advertisers. In Proceedings of the ninth symposium on usable privacy and security (p. 7). New York, NY: ACM.
- Loftus, T. 2011a. Experts investigate carrier IQ fears. Wall Street Journal, December 2. http://blogs.wsj.com/digits/2011/12/02/experts-investigate-carrier-iq-fears (accessed September 24, 2014).
- Loftus, T. 2011b. FTC settles with online advertiser over flash cookie use. Wall Street Journal, November 8. http://blogs.wsj.com/digits/2011/11/08/ftc-settles-with-online-advertiser-over-flash-cookie-use/ (accessed September 24, 2014).
- Loftus, T. 2011c. Study: Usability issues plague tools that limit online behavioral advertising. Wall Street Journal, October 31. http://blogs.wsj.com/digits/2011/10/31/study-usability-issues-plague-tools-that-limit-online-behavioral-advertising/ (accessed September 24, 2014).
- Lohr, S. 2012. How big data became so big. The New York Times, August 11. http://www.nytimes.com/2012/08/12/business/how-big-data-became-so-big-unboxed.html?pagewanted = all&_r = 0 ( accessed September 24, 2014).
- Martin, K. E. 2012a. Diminished or just different? A factorial vignette study of privacy as a social contract. Journal of Business Ethics 111 (4):1–21.
- Martin, K. 2012b. Information technology and privacy: Conceptual muddles or privacy vacuums? Ethics and Information Technology 14 (4):267–84.
- Martin, K. 2013. Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy online. First Monday 18 (12): Online. http://firstmonday.org/ojs/index.php/fm/article/view/4838/3802 ( accessed May 3, 2015).
- Martin, K. 2015. Privacy notices as tabula rasa: An empirical investigation into how complying with a privacy notice is related to meeting privacy expectations online. Journal of Public Policy & Marketing 34 (2):210–27.
- Mattioli, D. 2012. How Orbitz targets its site's visitors. Wall Street Journal, June 25. http://blogs.wsj.com/digits/2012/06/25/how-orbitz-targets-its-sites-visitors ( accessed September 24, 2014).
- Mayer, J., and J. Mitchell. 2012. Third-party web tracking: Policy and technology. In Proceedings of the 2012 IEEE symposium of security and privacy, 413–27. Washington, DC: IEEE Computer Society.
- Mayer, J., and A. Narayanan. 2013. Privacy substitutes. Stanford Law Review Online 66:89. http://www.stanfordlawreview.org/online/privacy-and-big-data/privacy-substitutes ( accessed May 3, 2015).
- McDonald, A. M., and L. F. Cranor. 2008. The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society 4:543–97.
- McDonald, A., and L. F. Cranor. 2010. Beliefs and behaviors: Internet users' understanding of behavioral advertising. Presented at 38th research conference on communication, information and Internet policy (TPRC 2010), March 31. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.360.7039.
- McCole, P., E. Ramsey, and J. Williams. 2010. Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns. Journal of Business Research 63 (9–10):1018–24.
- Moore, E., and V. J. Rideout. 2007. The online marketing of food to children: Is it just fun and games? Journal of Public Policy and Marketing 26 (2):202–20.
- Morgan-Thomas, A., and C. Veloutsou. 2013. Beyond technology acceptance: Brand relationships and online brand experience. Journal of Business Research 66 (1):21–27.
- Nissenbaum, H. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press.
- Nissenbaum, H. 2011. A contextual approach to privacy online. Daedalus 140 (4):32–48.
- Ohm, P. 2009a. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review 57:1701.
- Ohm, P. 2009b. The rise and fall of invasive ISP surveillance. University of Illinois Law Review 1417–96.
- Ohm, P. 2015. Sensitive information. Southern California Law Review 88.
- Pariser, E. 2011. What the Internet knows about you. CNN, May 22. http://www.cnn.com/2011/OPINION/05/22/pariser.filter.bubble/ ( accessed September 24, 2014).
- Popescu, M., and L. Baruh. 2013. Captive but mobile: Privacy concerns and remedies for the mobile environment. The Information Society 29 (5):272–86.
- Popkin, H. 2010. Privacy is dead on Facebook. Get over it. NBC News, January 13. http://www.nbcnews.com/id/34825225/ns/technology_and_science-tech_and_gadgets/t/privacy-dead-facebook-get-over-it/#.U-DTKPldU5E (accessed September 24, 2014).
- Poritz, J. A. 2007. Who searches the searchers? Community privacy in the age of monolithic search engines. The Information Society 23 (5):383–89.
- Rachels, J. 1975. Why privacy is important. Philosophy and Public Affairs 4:323–33.
- Regan, P. 2011. Response to Bennett: Also in defense of privacy. Surveillance and Society 8 (4):497–99.
- Rosen, J. 2000. The unwanted gaze: The destruction of privacy in America. New York, NY: Random House.
- Rubenstein, I., and N. Good. 2012. Privacy by design: A counterfactual analysis of Google and Facebook privacy incidents (Public Law Research Paper No. 12-43). New York, NY: New York University School of Law.
- Schwartz, B. 1968. The social psychology of privacy. American Journal of Sociology 73 (6):741–852.
- Schwartz, P., and D. Solove. 2011. The PII problem: Privacy and a new concept of personally identifiable information. New York University Law Review 86:1814.
- Shilton, K., and K. E., Martin, Mobile Privacy Expectations in Context. 2013. Paper presented at TPRC 41: The 41st research conference on communication, information and Internet policy, Arlington, VA, September 27–29. http://dx.doi.org/10.2139/ssrn.2238707 (accessed September 20, 2015).
- Sloan, R., and R. Warner. 2014. Beyond notice and choice: Privacy, norms, and consent. Journal of High Technology Law 14 (2):370–412.
- Solove, D. 2013. Privacy self-management and the consent dilemma. Harvard Law Review 126:1880–903.
- Sprenger, P. 1999. Sun on privacy: ‘Get over it’. Wired, January 26. http://archive.wired.com/politics/law/news/1999/01/17538 (accessed September 24, 2014).
- Stalder, F. 2008. Bourgeois anarchism and authoritarian democracies. First Monday 13 (7): online. http://pear.accc.uic.edu/ojs/index.php/fm/article/viewArticle/2077 ( accessed May 3, 2015).
- Steel, E. 2010. A Web pioneer profiles users by name. Wall Street Journal Digits, October 25. http://online.wsj.com/news/articles/SB10001424052702304410504575560243259416072 ( accessed September 24, 2014).
- Steel, E. 2011a. MasterCard's talks with Madison Avenue. Wall Street Journal, October 24. http://blogs.wsj.com/digits/2011/10/24/mastercards-talks-with-madison-avenue ( September 24, 2014).
- Steel, E. 2011b. Visa's blueprint for targeted advertising. Wall Street Journal. October 24. http://blogs.wsj.com/digits/2011/10/24/visas-blueprint-for-targeted-advertising ( September 24, 2014).
- Strandburg, K. 2011. Home, home on the Web and other Fourth Amendment implications of technosocial change. Maryland Law Review 70:614–80.
- Tene, O., and J. Polonetsky. 2012. Privacy in the age of big data: A time for big decisions. Stanford Law Review 64:63–69.
- Tene, O., and J. Polonetsky. 2013. Big data for all: Privacy and user control in the age of analytics. Northwestern Journal of Technology and Intellectual Property 11 (5):240–73.
- Turow, J., J. King, C. J. Hoofnagle, A. Bleakley, and M. Hennessy. 2009. Americans reject tailored advertising and three activities that enable it. SSRN 1478214.
- Twitter. 2014. Information requests: Transparency report. https://transparency.twitter.com/information-requests/2014/jan-jun (accessed November 21, 2015).
- United States v. Jones. 2012. 615 F.3d 544 (D.C. Cir. 2010), aff'd sub nom. United States v. Jones, 132 S. Ct. 945. Sotomayor, J. concurring. http://www.supremecourt.gov/opinions/11pdf/10-1259.pdf ( accessed September 24, 2014).
- Ur, B., P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang. 2012, July. Smart, useful, scary, creepy: Perceptions of online behavioral advertising. In Proceedings of the eighth symposium on usable privacy and security, 4. New York, NY: ACM.
- U.S. Senate, Committee on Commerce, Science, and Transportation. 2013. A review of the data broker industry: Collection, use, and sale of consumer data for marketing purposes. http://www.commerce.senate.gov/public/?a = Files.Serve&File_id = 0d2b3542-6221-4888-a631-08f2f255b577.
- Wills, C. E., and M. Zeljkovic. 2011. A personalized approach to Web privacy: Awareness, attitudes and actions. Information Management & Computer Security 19 (1):53–73.
- Wright, D. 2013. Making privacy impact assessment more effective. The Information Society 29 (5):307–15.