References
- Benjamin, R.. (ed.). (2019a). Captivating technology. Duke University Press.
- Benjamin, R. (2019b). Race after technology: Abolitionist tools for the new Jim Code. Polity.
- Boerman, S. C., Kruikemeier, S., & Zuiderveen Borgesius, F. J. (2021). Exploring motivations for online privacy protection behavior: Insights from panel data. Communication Research, 48(7), 953–977. https://doi.org/10.1177/0093650218800915
- Dibbo, S. V., Chung, D. L., & Mehnaz, S. (2022). Model inversion attack with least information and an in-depth analysis of its disparate vulnerability. In First IEEE Conference on Secure and Trustworthy Machine Learning. IEEE.
- Ekstrand, M. D., Joshaghani, R., & Mehrpouyan, H. (2018, January). Privacy for all: Ensuring fair and equitable privacy protections. In Conference on fairness, accountability and transparency (pp. 35–47). PMLR.
- Eubanks, V. (2018). Automating inequality: How high-tech tools profile, police, and punish the poor. St. Martin's Press.
- Hagendorff, T. (2020). The ethics of AI ethics: An evaluation of guidelines. Minds and Machines, 30(1), 99–120. https://doi.org/10.1007/s11023-020-09517-8
- Kennedy, H., Elgesem, D., & Miguel, C. (2017). On fairness: User perspectives on social media data mining. Convergence: The International Journal of Research Into New Media Technologies, 23(3), 270–288. https://doi.org/10.1177/1354856515592507
- Kennedy, H., & Moss, G. (2015). Known or knowing publics? Social media data mining and the question of public agency. Big Data & Society, 2(2), 2053951715611145. https://doi.org/10.1177/2053951715611145
- Kulynych, B., Yaghini, M., Cherubin, G., Veale, M., & Troncoso, C. (2022). Disparate vulnerability to membership inference attacks. De Gruyter Open: Proceedings on Privacy Enhancing Technologies.
- Leonelli, S., Lovell, R., Wheeler, B. W., Fleming, L., & Williams, H. (2021). From FAIR data to fair data use: Methodological data fairness in health-related social media research. Big Data & Society, 8(1), 205395172110103. https://doi.org/10.1177/20539517211010310
- Madden, M., Cortesi, S., Gasser, U., Lenhart, A., & Duggan, M. (2012). Parents, teens, and online privacy. Pew Internet & American Life project.
- Noble, S. U. (2018). Algorithms of oppression. New York University Press.
- Olmstead, K., & Smith, A. (2017). Americans and cybersecurity. Pew Research Center, 26, 311–27.
- Park, Y. J. (2013). Digital literacy and privacy behavior online. Communication Research, 40(2), 215–236. https://doi.org/10.1177/0093650211418338
- Perrin, A. (2015). Social media usage. Pew Research Center, 125, 52–68.
- Pujol, D., McKenna, R., Kuppam, S., Hay, M., Machanavajjhala, A., & Miklau, G. (2020, January). Fair decision making using privacy-protected data. In Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency (pp. 189–199). ACM. https://doi.org/10.1145/3351095.3372872
- Stutzman, F., Gross, R., & Acquisti, A. (2012). Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality, 4(2), 7–41.
- Tao, Y., & Leggon, C. (2021). African American women in engineering: Intersectionality as a pathway to social justice. In W. Pearson Jr., & V. Reddy (Eds.), Social justice and education in the 21st century (pp. 241–272). Springer.
- Thelwall, M., Bailey, C., Tobin, C., & Bradshaw, N. A. (2019). Gender differences in research areas, methods and topics: Can people and thing orientations explain the results? Journal of Informetrics, 13(1), 149–169. https://doi.org/10.1016/j.joi.2018.12.002
- Tifferet, S. (2019). Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior, 93(12), 1–12. https://doi.org/10.1016/j.chb.2018.11.046
- Tsay-Vogel, M., Shanahan, J., & Signorielli, N. (2018). Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users. New Media & Society, 20(1), 141–161. https://doi.org/10.1177/1461444816660731
- Turow, J., Hennessy, M., & Draper, N. (2018). Persistent misperceptions: Americans’ misplaced confidence in privacy policies, 2003–2015. Journal of Broadcasting & Electronic Media, 62(3), 461–478. https://doi.org/10.1080/08838151.2018.1451867
- Wang, Y., Niiya, M., Mark, G., Reich, S. M., & Warschauer, M. (2015, February). Coming of age (digitally): An ecological view of social media use among college students. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 571–582). ACM. https://doi.org/10.1145/2675133.2675271
- Zhong, D., Sun, H., Xu, J., Gong, N., & Wang, W. H. (2022, May). Understanding disparate effects of membership inference attacks and their countermeasures. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (pp. 959–974). ACM. doi:10.1145/3488932.3501279