SEARCH

SEARCH BY CITATION

References

  • Abraham, T. (1991). Collection policy or documentation strategy: Theory and practice. American Archivist, 54(Winter), 4452.
  • Ackerman, M.S., & Cranor, L.F. (1999). Privacy critics: UI components to safeguard users’ privacy. In Proceedings of the Human Factors in Computing Systems CHI'99 (pp. 258259). New York: ACM Press.
  • Acquisti, A., & Grossklags, J. (2008). What can behavioral economics teach us about privacy? In A. Acquisti , S. De Capitani di Vimercati , S. Gritzalis & C. Lambrinoudakis (Eds.), Digital privacy: Theory, technologies, and practices (pp. 363377). New York: Auerbach Publications.
  • Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data (pp. 439450). New York: ACM Press.
  • Albrechtslund, A. (2008). Online social networking as participatory surveillance. First Monday, 13(3). Available at: http://firstmonday.org/article/view/2142/1949
  • Allen, A.L. (2003). Why privacy isn't everything: Feminist reflections on personal accountability. Lanham, MD: Rowman & Littlefield Publishers.
  • Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 6684.
  • Anthony, D., Kotz, D., & Henderson, T. (2007). Privacy in location-aware computing environments. Pervasive Computing, 6(4), 6472.
  • Bannon, L. (2006). Forgetting as a feature, not a bug: The duality of memory and implications for ubiquitous computing. CoDesign, 2(1), 315.
  • Bell, G., & Gemmell, J. (2007). A digital life. Scientific American, 296(3), 5865.
  • Bellotti, V. (1998). Design for privacy in multimedia computing and communications environments. In P.E. Agre & M. Rotenberg (Eds.), Technology and privacy: The new landscape (pp. 6398). Cambridge, MA: MIT Press.
  • Benitez, K., & Malin, B. (2010). Evaluating re-identification risks with respect to the HIPAA privacy rule. Journal of the American Medical Informatics Association, 17(2), 169177.
  • Bertot, J.C. (2003). The multiple dimensions of the digital divide: More than the technology “haves” and “have nots.” Government Information Quarterly, 20(2), 185191.
  • Blanchette, J.-F., & Johnson, D.G. (2002). Data retention and the panoptic society: The social benefits of forgetfulness. The Information Society, 18, 3345.
  • Boast, R., Bravo, M., & Srinivasan, R. (2007). Return to Babel: Emergent diversity, digital resources, and local knowledge. The Information Society, 23(5), 395403.
  • Boles, F. (1991). Archival appraisal. New York: Neal-Schuman Publishers.
  • Borgman, C.L. (2007). Scholarship in the digital age: Information, infrastructure, and the internet. Cambridge, MA: MIT Press.
  • Borgman, C.L., Wallis, J.C., Mayernik, M.S., & Pepe, A. (2007). Drowning in data: Digital library architecture to support scientific use of embedded sensor networks. In Proceedings of the 7th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL ‘07) (pp. 269–277). New York: ACM Press.
  • Boudreau, J. (2011, July 7). Pondering effects of the data deluge. The Los Angeles Times. Retrieved from http://www.latimes.com/business/la-fi-big-data-20110707,0,7170770.story
  • Bowker, G.C., & Star, S.L. (2000). Sorting things out: Classification and its consequences. Cambridge, MA: MIT Press.
  • boyd, d., & Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8). Retrieved from http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3086/2589
  • Buchanan, T., Paine, C., Joinson, A.N., & Reips, U.-D. (2007). Development of measures of online privacy concern and protection for use on the internet. Journal of the American Society for Information Science and Technology, 58(2), 157165.
  • Burke, J., Estrin, D., Hansen, M., Parker, A., Ramanathan, N., Reddy, S., Srivastava, M.B. (2006). Participatory sensing. In Proceedings of the International Workshop on World-Sensor-Web (WSW′2006), ACM, Boulder, CO. Available at: http://escholarship.org/uc/item/19h777qd
  • Byrne, E., & Alexander, P.M. (2006). Questions of ethics: Participatory information systems research in community settings. In Proceedings of the 2006 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries (SAICSIT '06) (pp. 117126). Somerset West, South Africa: South African Institute for Computer Scientists and Information Technologists.
  • Camp, L.J., & Connelly, K. (2008). Beyond consent: Privacy in ubiquitous computing (Ubicomp). In A. Acquisti , S. De Capitani di Vimercati , S. Gritzalis , & C. Lambrinoudakis (Eds.), Digital privacy: Theory, technologies, and practices (pp. 327343). New York and London: Auerbach Publications.
  • Campbell, A.T., Eisenman, S.B., Lane, N.D., Miluzzo, E., & Peterson, R.A. (2006). People-centric urban sensing. Proceedings of the 2nd Annual International Workshop on Wireless Internet (WICON ′06), Article 18. New York: ACM Press. doi:10.1145/1234161.1234179
  • Capurro, R. (2005). Privacy. An intercultural perspective. Ethics and Information Technology, 7, 3747.
  • Cargo, M., & Mercer, S.L. (2008). The value and challenges of participatory research: Strengthening its practice. Annual Review of Public Health, 29, 325350.
  • Castells, M. (1999). Flows, networks, and identities: A critical theory of the informational society. In M. Castells , R. Flecha , P. Freire , H.A. Giroux , D. Macedo , & P. Willis . Critical education in the new information age (pp. 3764). Lanham, MD: Rowman & Littlefield.
  • Center for Democracy & Technology. (2011). Best practices for mobile applications developers. Washington, DC: Center for Democracy & Technology. Retrieved from http://www.cdt.org/blogs/2112best-practices-mobile-applications-developers
  • Christin, D., Reinhardt, A., Kanhere, S.S., & Hollick, M. (2011). A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software, 84(11), 19281946.
  • Cohen, D., Fraistat, N., Kirschenbaum, M., & Scheinfeldt, T. (2009). Tools for data-driven scholarship: Past, present, future. Ellicott City, MD: Maryland Institute for Technology and the Humanities. Retrieved from http://mith.umd.edu/tools/?page_id=60
  • Cohen, J.E. (2008). Privacy, visibility, transparency, and exposure. University of Chicago Law Review, 75(1), 181201.
  • Cook, T. (1991). The archival appraisal of records containing personal information: A RAMP study with guidelines. Paris: General Information Programme, United Nations Educational, Scientific and Cultural Organization.
  • Cooke, B., & Kothari, U. (2001). Participation: The new tyranny? London: Zed Books.
  • Corburn, J. (2003). Bringing local knowledge into environmental decision making: Improving urban planning for communities at risk. Journal of Planning Education and Research, 22, 120133.
  • Cuff, D., Hansen, M., & Kang, J. (2008). Urban sensing: Out of the woods. Communications of the ACM, 51(3), 2433.
  • Curry, M.R., Phillips, D.J., & Regan, P.M. (2004). Emergency response systems and the creeping legibility of people and places. The Information Society, 20, 357369.
  • Dembosky, A. (2011, June 10). Invasion of the body hackers. FT Magazine. Retrieved from http://www.ft.com/cms/s/2/3ccb11a0-923b-11e0-9e00-00144feab49a.html#axzz1RxISmSku
  • Donner, J., Verclas, K., & Toyama, K. (2008). Reflections on MobileActive 2008 and the M4D Landscape. MobileActive.org and Microsoft Research India. Retrieved from http://mobileactive.org/files/DVT_M4D_choices_final.pdf
  • Elwood, S. (2006). Critical issues in participatory GIS: Deconstructions, reconstructions, and new research directions. Transactions in GIS, 10(5), 693708.
  • Estrin, D. (2010). Participatory sensing: Applications and architecture [Internet predictions]. Internet Computing, IEEE, 14(1), 1242.
  • Estrin, D., & Sim, I. (2010). Open mHealth architecture: An engine for health care innovation. Science, 330(6005), 759760.
  • Fienberg, S.E. (2006). Privacy and confidentiality in an e-commerce world: Data mining, data warehousing, matching and disclosure limitation. Statistical Science, 21(2), 143154.
  • Fish, A., Murillo, L.F.R., Nguyen, L., Panofsky, A., & Kelty, C.M. (2011). Birds of the Internet—towards a field guide to the organization and governance of participation. Journal of Cultural Economy, 4(2), 157187.
  • Foucault, M. (1979). Discipline and punish: The birth of the prison. (A. Sheridan, Trans.). New York: Vintage Books.
  • Friedman, B. (Ed.). (1997). Human values and the design of computer technology. Cambridge, UK: Cambridge University Press.
  • Friedman, B., & Nissenbaum, H. (1997). Bias in computer systems. In B. Friedman (Ed.), Human values and the design of computer technology (pp. 2140). Cambridge, UK: Cambridge University Press.
  • Frikken, K.B., & Atallah, M.J. (2004). Privacy preserving route planning. In Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (pp. 815). New York: ACM. Retrieved from http://portal.acm.org/citation.cfm?id=1029182
  • Froehlich, J., Chen, M.Y., Consolvo, S., Harrison, B., & Landay, J.A. (2007). MyExperience: A system for in situ tracing and capturing of user feedback on mobile phones. In Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, MobiSys ‘07 (pp. 5770). New York: ACM. Retrieved from http://doi.acm.org/10.1145/1247660.1247670
  • Galloway, P. (2004). Preservation of digital objects. Annual Review of Information Science and Technology, 38, 549590.
  • Ganti, R.K., Pham, N., Tsai, Y.-E., & Abdelzaher, T.F. (2008). PoolView: Stream privacy for grassroots participatory sensing. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (pp. 281294). New York: ACM Press. Retrieved from http://portal.acm.org/citation.cfm?id=1460412.1460440
  • Gentry, E. (2010, October 13). Will butter make you smarter? Introducing butter mind … and coconut mind. Quantified Self. Weblog. Retrieved from http://quantifiedself.com/2010/10/will-butter-make-you-smarter-i/
  • Gillespie, T.L. (2010). The politics of “platforms .” New Media & Society, 12(3). doi:10.1177/1461444809342738
  • Gray, J., Liu, D.T., Nieto-Santisteban, M., Szalay, A., DeWitt, D. J., & Heber, G. (2005, December). Scientific data management in the coming decade. ACM SIGMOD Record, 34(4), 3441.
  • Hayes, G.R., Abowd, G., Davis, J., Blount, M., Ebling, M., & Mynatt, E. (2008). Opportunities for pervasive computing in chronic cancer care. Pervasive Computing. Lecture Notes in Computer Science, 5013, 262279.
  • Hayes, G.R., Poole, E.S., Iachello, G., Patel, S.N., Grimes, A., Abowd, G., & Truong, K.N. (2007). Physical, social and experiential knowledge in pervasive computing environments. IEEE Pervasive Computing, 6(4), 5663.
  • Hey, T., & Trefethen, A.E. (2005). Cyberinfrastructure for e-science. Science, 308(5723), 817821.
  • Hill, K. (2011, February 25). Adventures in self-surveillance: Fitbit, tracking my movement and sleep. Forbes. Retrieved from http://blogs.forbes.com/kashmirhill/2011/02/25/adventures-in-self-surveillance-fitbit-tracking-my-movement-and-sleep/
  • Horowitz, C.R., Robinson, M., & Seifer, S. (2009). Community-based participatory research from the margin to the mainstream: Are researchers prepared? Circulation, 119, 26332642.
  • Huey, L., Walby, K., & Doyle, A. (2006). Cop watching in the downtown Eastside. In T. Monahan (Ed.), Surveillance and security: Technological politics and power in everyday life (pp. 149165). New York and London: Routledge.
  • Iachello, G., & Hong, J. (2007). End-user privacy in human-computer interaction. Foundations and Trends in Human-Computer Interaction, 1(1), 1137.
  • Iachello, G., Smith, I., Consolvo, S., Chen, M., & Abowd, G. (2005). Developing privacy guidelines for social location disclosure applications and services. In Proceedings of the 2005 Symposium on Usable Privacy and Security (pp. 6576). New York: ACM Press. Retrieved from http://portal.acm.org/citation.cfm?id=1073001.1073008
  • Institute for Applied Autonomy. (2006). Defensive surveillance: Lessons from the Republican National Convention. In T. Monahan (Ed.), Surveillance and security: Technological politics and power in everyday life (pp. 167174). New York and London: Routledge.
  • John, L.K., Acquisti, A., & Loewenstein, G. (2009). The best of strangers: Context dependent willingness to divulge personal information (working paper). Pittsburgh: Carnegie Mellon University. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1430482
  • Kang, J. (1998). Privacy in cyberspace transactions. Stanford Law Review, 50, 11931294.
  • Kang, J., Shilton, K., Burke, J., Estrin, D., & Hansen, M. (2012). Self-surveillance privacy. Iowa Law Review, 97(March).
  • Ketelaar, E. (2002). Archival temples, archival prisons: Modes of power and protection. Archival Science, 2, 221238.
  • Kim, Y., Schmid, T., Charbiwala, Z.M., & Srivastava, M.B. (2009). ViridiScope: Design and implementation of a fine grained power monitoring system for homes. In Proceedings of the 11th International Conference on Ubiquitous Computing (pp. 245254). New York: ACM Press. Retrieved from http://portal.acm.org/citation.cfm?id=1620545.1620582
  • Kinkade, S., & Verclas, K. (2008). Wireless technology for social change: Trends in mobile use by NGOs. Washington, DC and Berkshire, UK: The UN Foundation, Vodafone Group Foundation Partnership.
  • Kreiss, D., Finn, M., & Turner, F. (2011). The limits of peer production: Some reminders from Max Weber for the network society. New Media & Society, 13(2), 243259.
  • Lam, M. (2009, April 14). Building a social networking future without Big Brother. Presented at the POMI 2020 Workshop, Palo Alto, CA. Retrieved from http://suif.stanford.edu/%7Elam/lam-pomi-ws09.pdf
  • Lange, P.G. (2007). Publicly private and privately public: Social networking on YouTube. Journal of Computer-Mediated Communication, 13(1), n.d.
  • Lee, C.A., & Tibbo, H.R. (2007). Digital curation and trusted repositories: Steps toward success. Journal of Digital Information, 8(2). Retrieved from http://journals.tdl.org/jodi/article/viewArticle/229/183
  • Lenhart, A., & Madden, M. (2007). Teens, privacy and SNS. Washington, DC: Pew Internet & American Life Project.
  • Lievrouw, L.A., & Farb, S.E. (2003). Information and social equity. Annual Review of Information Science and Technology (ARIST), 37, (pp. 499540).
  • Lyon, D. (2001). Surveillance society (1st ed.). Buckingham, UK and Philadelphia: Open University Press.
  • Madden, M., Fox, S., Smith, A., & Vitak, J. (2007). Digital footprints: Online identity management and search in the age of transparency. Washington, DC: Pew Internet & American Life Project.
  • Malin, B., & Sweeney, L. (2004). How (not) to protect genoic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems. Journal of Biomedial Informatics, 37(3), 179192.
  • Marx, G.T. (2002). What's new about the “new surveillance”? Classifying for change and continuity. Surveillance & Society, 1(1), 929.
  • Mayer-Schoenberger, V. (2007). Useful void: The art of forgetting in the age of ubiquitous computing (Working Paper No. RWP07-022). Cambridge, MA: Harvard University.
  • McKemmish, S., Gilliland-Swetland, A., & Ketelaar, E. (2005). “Communities of memory”: Pluralising archival research and education agendas. Archives & Manuscripts, 33(1), 146174.
  • Monahan, T. (2006a). Counter-surveillance as political intervention? Social Semiotics, 16(4), 515534.
  • Monahan, T. (Ed.). (2006b). Surveillance and security: Technological politics and power in everyday life. New York and London: Routledge.
  • Monash University School of Information Management and Systems. (2006, June 16). Trust and Technology Project: Building archival systems for indigenous oral memory. Retrieved from http://www.sims.monash.edu.au/research/eirg/trust
  • Mun, M., Reddy, S., Shilton, K., Yau, N., Boda, P., Burke, J. … Boda, P. (2009). PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. In Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services. (pp. 5568). New York: ACM Press.
  • Narayanan, A., & Shmatikov, V. (2008). Robust de-anonymization of large sparse datasets. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP ’08) (pp. 111–125). Washington, DC: IEEE Computer Society.
  • Nguyen, D.H., & Mynatt, E. (2002). Privacy mirrors: Understanding and shaping socio-technical ubiquitous computing systems (GVU Technical Report;GIT-GVU-02-16). Georgia Institute of Technology. Available at: http://hdl.handle.net/1853/3268
  • Nieusma, D. (2004). Alternative design scholarship: Working toward appropriate design. Design Issues, 20(3), 1324.
  • Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119158.
  • Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford Law Books.
  • Office for Protection of Research Subjects. (2007, March 30). UCLA investigator's manual for the protection of human subjects. Retrieved from http://www.oprs.ucla.edu/human/manual/TOC
  • Office of the Secretary of the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. (1979). The Belmont report: Ethical principles and guidelines for the protection of human subjects of research. Washington, DC: Department of Health, Education, and Welfare.
  • Ohm, P. (2009). Broken promises of privacy: Responding to the surprising failure of anonymization (Working Paper No. Research Paper No. 09-12). Boulder, CO: University of Colorado Law School. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006
  • Palen, L., & Dourish, P. (2003). Unpacking “privacy” for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’03) (pp. 129136). New York: ACM Press.
  • Perry, J., Macken, E., Scott, N., & McKinley, J.L. (1997). Disability, inability and cyberspace. In B. Friedman (Ed.), Human values and the design of computer technology (pp. 6589). Cambridge, UK: Cambridge University Press.
  • Phillips, D.J. (2002). Negotiation the digital closet: Online pseudonyms and the politics of sexual identity. Information, Communication & Society, 5(3).
  • Phillips, D.J. (2005). From privacy to visibility: Context, identity, and power in ubiquitous computing environments. Social Text, 23(2), 95108.
  • Raento, M., & Oulasvirta, A. (2008). Designing for privacy and self-presentation in social awareness. Personal and Ubiquitous Computing, 12, 527542.
  • Rule, J.B. (2004). Toward strong privacy. University of Toronto Law Journal, 54(2), 183225.
  • Shapiro, S. (1998). Places and spaces: The historical interaction of technology, home, and privacy. The Information Society, 14(4), 275.
  • Sheehan, K.B. (2002). Toward a typology of Internet users and online privacy concerns. The Information Society, 18(1), 2132.
  • Shilton, K. (2010). Participatory sensing: Building empowering surveillance. Surveillance & Society, 8(2), 131150.
  • Shilton, K., & Srinivasan, R. (2007). Participatory appraisal and arrangement for multicultural archival collections. Archivaria, 63, 87101.
  • Spiekermann, S., & Cranor, L.F. (2009). Engineering privacy. IEEE Transactions on Software Engineering, 35(1), 6782.
  • Srinivasan, R. (2004). Knowledge architectures for cultural narratives. Journal of Knowledge Management, 8(4), 6574.
  • Srinivasan, R. (2007). Ethnomethodological architectures: Information systems driven by cultural and community visions. Journal of the American Society for Information Science and Technology, 58(5), 723733.
  • Srinivasan, R., & Shilton, K. (2006). The South Asian web: An emerging community information system in the South Asian diaspora. In Proceedings of the Ninth Conference on Participatory Design: Expanding Boundaries in Design (vol. 1, pp. 125133). New York: ACM Press.
  • Suchman, L. (1997). Do categories have politics? The language/action perspective reconsidered. In B. Friedman (Ed.), Human values and the design of computer technology (pp. 91105). Cambridge, UK: Cambridge University Press.
  • Swarthout, A.M. (1967). Eavesdropping as violating right of privacy. American Law Reports (ALR3rd), 11, 1296.
  • Vaz, P., & Bruno, F. (2003). Types of self-surveillance: From abnormality to individuals “at risk.” Surveillance & Society, 1(3), 272291.
  • Waldo, J., Lin, H.S., & Millett, L.I. (2007). Engaging privacy and information technology in a digital age. Washington, DC: The National Academies Press.
  • Westin, A.F. (1970). Privacy and freedom. New York: Atheneum.
  • Wolf, G. (2010, April 26). The data-driven life. New York Times. Retrieved from http://www.nytimes.com/2010/05/02/magazine/02self-measurement-t.html?hp=&pagewanted=print
  • Yao, M.Z., Rice, R.E., & Wallis, K. (2007). Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology, 58(5), 710722.