REFERENCES
- Afroz, S., Islam, A. C., Stolerman, A., Greenstadt, R., & McCoy, D. (2014). Doppelgänger finder: Taking stylometry to the underground. Paper presented at the 2014 IEEE Symposium on Security and Privacy, San Jose, CA. doi:10.1109/SP.2014.21
- American Marketing Association. (2013). Statement of ethics: American Marketing Association. Retrieved from http://www.marketingpower.com/aboutama/pages/statementofethics.aspx
- Andrews, L. (2012). Facebook is using you. The New York Times. Retrieved from http://www.nytimes.com/2012/02/05/opinion/sunday/facebook-is-using-you.html?pagewanted=all&_r=0
- Business Marketing Association. (2013). BMA code of ethics: Business Marketing Association. Retrieved from http://www.marketing.org/i4a/pages/index.cfm?pageid=3286-.UV3EQr_8994
- Byford, K. S. (1998). Privacy in cyberspace: Constructing a model of privacy for the electronic communications environment. Rutgers Computer and Technology Law Journal, 24, 1–48.
- Chung, G., & Grimes, S. M. (2006). Data mining the kids: Surveillance and market research strategies in children's online games. Canadian Journal of Communication, 30(4), 527–548.
- Cooley, R., Mobasher, B., & Srivastava, J. (1997). Web mining: Information and pattern discovery on the World Wide Web. Proceedings from the Ninth IIEEE International Conference on Tools with Artificial Intelligence '97, Newport Beach, CA. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=632303&tag=1
- Council of Europe. (2014). Human rights for Internet users. Retrieved from http://www.coe.int/web/internet-users-rights/guide;jsessionid=7422E8871EF6692B7AEB0B8AFC29997E
- Craig, T. (2011). Privacy and big data. Sebastopol, CA: O'Reilly.
- Danna, A., & Gandy, O. H. (2002). All that glitters is not gold: Digging beneath the surface of data mining. Journal of Business Ethics, 40(4), 373–386. doi:10.1023/A:1020845814009
- Direct Marketing Association. (2011). Guidelines for ethical business practices. Retrieved from http://www.dmaresponsibility.org/Guidelines/.
- Frawley, W. J., Piatetsky-Shapiro, G., & Matheus, C. J. (1992). Knowledge discovery in databases: An overview. Artificial Intelligence Magazine, 13(3), 57–70.
- Federal Communications Commission. (2010). Sixth broadband deployment report. Washington, DC: Author. Retrieved from https://apps.fcc.gov/edocs_public/attachmatch/FCC-10-129A1_Rcd.pdf
- Green, D. (2013). eBay is now sharing its customer data with marketers. Business Insider. Retrieved from http://www.businessinsider.com/ebay-now-sharing-data-with-marketers-2013-4
- Herschel, R. T., & Andrews, P. H. (1997). Ethical implications of technological advances on business communication. Journal of Business Communication, 34(2), 160–170. doi:10.1177/002194369703400203
- Huxing, Z., Gang, W., Kingsum, C., Zhidong, Y., & Xuezhi, X. (2011). Detecting resource leaks through dynamical mining of resource usage patterns. Proceedings from Forty-First International IEEE/IFIP Conference on Dependable Systems and Networks 2011, Hong Kong, China. Retrieved from http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5958824 doi:10.1109/DSNW.2011.5958824
- IBM. (2013). Knowledge discovery and data mining. Retrieved from http://researcher.watson.ibm.com/researcher/view_pic.php?id=144
- International Telecommunication Union. (2013). The World in 2013: ICT facts and figures. Retrieved from http://www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2013-e.pdf
- Kang, R., Brown, S., & Kiesler, S. (2013). Why do people seek anonymity on the Internet?: Informing policy and design. Paper presented at the Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Retrieved from http://www.cs.cmu.edu/∼kiesler/publications/2013/why-people-seek-anonymity-internet-policy-design.pdf. doi:10.1145/2470654.2481368
- Kaye, K. (2013). Mastercard, AmEx quietly feed data to advertisers. Retrieved from http://adage.com/article/dataworks/mastercard-amex-feed-data-marketers/240800/?utm_source=update&utm_medium=newsletter&utm_campaign=adage&ttl=1366668133
- Lyon, D. (2002a). Everyday surveillance: Personal data and social classifications. Information, Communication & Society, 5(2), 242–257. doi:10.1080/13691180210130806
- Lyon, D. (2002b). Surveillance in cyberspace: The Internet, personal data and social control. Queen's Quarterly, 109(3), 345–356.
- Mathiesen, K. (2014). Human rights for the digital age. Journal of Mass Media Ethics, 29(1), 2–18. doi:10.1080/08900523.2014.863124
- McMillan, R. (2013). Apple finally reveals how long Siri keeps your data. Retrieved from http://www.wired.com/wiredenterprise/2013/04/siri-two-years/.
- Miyazaki, A. D., Stanaland, A. J. S., & Lwin, M. O. (2009). Self-regulatory safeguards and the online privacy of preteen children. Journal of Advertising, 38(4), 79–91. doi:10.2753/JOA0091-3367380406
- Nagel, T. (2002). Concealment and exposure: And other essays. Oxford, England: Oxford University Press.
- Ngai, E. W. T., Xiu, L., & Chau, D. C. K. (2009). Application of data mining techniques in customer relationship management: A literature review and classification. Expert Systems with Applications, 36(2), 2592–2602. doi:10.1016/j.eswa.2008.02.021
- Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press.
- Ohm, P. (2010). Broken promises of privacy: Responding to the suprising failure of anonymization. UCLA Law Review, 57, 1701–1777.
- Olson, D. L. (2008). Ethical aspects of web log data mining. International Journal of Information Technology Management, 7(2), 190–200. doi:10.1504/IJITM.2008.016605
- Payne, D., & Trumbach, C. C. (2009). Data mining: Proprietary rights, people and proposals. Business Ethics: A European Review, 18(3), 241–252. doi:10.1111/j.1467-8608.2009.01560.x
- Peace, A. G., Weber, J., Hartzel, K. S., & Nightingale, J. (2002). Ethical issues in ebusiness: A proposal for creating the ebusiness principles. Business and Society Review, 107(1), 41–60. doi:10.1111/0045-3609.00126
- Pfitzmann, A., & Köhntopp, M. (2001). Anonymity, unobservability, and pseudonymity: A proposal for terminology. In H. Federrath (Ed.), Designing privacy enhancing technologies (pp. 1–9). Berlin, Germany: Springer.
- Plaisance, P. L. (2009). Media ethics: Key principles for responsible practice. Los Angeles, CA: Sage.
- Rainie, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., & Dabbish, L. (2013). Anonymity, privacy, and security online. Pew Research Center. Retrieved from http://www.pewinternet.org/files/old-media/Files/Reports/2013/PIP_AnonymityOnline_090513.pdf
- Rawls, J. (1971). A theory of justice. Cambridge, MA: Belknap Press.
- Rawls, J. (1997). The idea of public reason revisited. The University of Chicago Law Review, 64(3), 765–807. doi:10.2307/1600311
- Rawls, J. (1999). A theory of justice (rev. ed.). Cambridge, MA: Belknap Press.
- Rawls, J. (2001). Justice as fairness: A restatement. Cambridge, MA: Harvard University Press.
- Schoeman, F. D. (1992). Privacy and social freedom. Cambridge, England: Cambridge University Press.
- Smith, M. R., & Marx, L. (1994). Does technology drive history? The dilemma of technological determinism. Cambridge, MA: MIT Press.
- Tobias, M. W. (2014). Here's how easy it is for Google Chrome to eavesdrop on your PC microphone. Forbes. Retrieved from http://www.forbes.com/sites/marcwebertobias/2014/01/26/heres-how-easy-it-is-for-google-chrome-to-eavesdrop-on-your-pc-microphone/.
- United Nations. (2011). Promotion and protection of all human rights, civil, political, economic, social and cultural rights, including the right to development: Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression. Retrieved from http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.pdf
- United Nations. (2014). What are human rights? Retrieved from http://www.ohchr.org/en/issues/pages/whatarehumanrights.aspx
- van Wel, L., & Royakkers, L. (2004). Ethical issues in web data mining. Ethics and Information Technology, 6, 129–140. doi:10.1023/B:ETIN.0000047476.05912.3d
- Woodward, C. (2003). Estonia, where being wired is a human right. The Christian Science Monitor. Retrieved from http://www.csmonitor.com/2003/0701/p07s01-woeu.html