Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-94fs2 Total loading time: 0 Render date: 2024-11-05T05:02:18.020Z Has data issue: false hasContentIssue false

11 - Privacy, surveillance, and the democratic potential of the social Web

from Part II - Privacy: practical controversies

Published online by Cambridge University Press:  05 July 2015

Beate Roessler
Affiliation:
Universiteit van Amsterdam
Dorota Mokrosinska
Affiliation:
Universiteit Leiden
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Social Dimensions of Privacy
Interdisciplinary Perspectives
, pp. 202 - 222
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abelson, H., Ledeen, K. and Lewis, H. R. 2008. Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion. Boston: Addison-Wesley Professional.Google Scholar
ACLU (American Civil Liberties Union) 2013. “Supreme Court Dismisses ACLU’s Challenge to NSA Warrantless Wiretapping Law.” Accessed February 26, 2013 from www.aclu.org/national-security/supreme-court-dismisses-aclus-challenge-nsa-warrantless-wiretapping-law.Google Scholar
Allen, A. 1988. Uneasy Access: Privacy for Women in a Free Society. Totowa: Rowman and Littlefield.Google Scholar
Arendt, H. 1958. The Human Condition. Chicago University Press.Google Scholar
Austin, L. M. 2012. “Getting past privacy? Surveillance, the Charter and the rule of law,” Canadian Journal of Law and Society 27(3): 381–98.CrossRefGoogle Scholar
Bennett, C. J. 1992. Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Ithaca, NY: Cornell University Press.CrossRefGoogle Scholar
Bennett, C. J. and Raab, C. D. 2006. The Governance of Privacy: Policy Instruments in Global Perspective. Cambridge, MA: MIT Press.Google Scholar
Bennett, C. J.Parsons, C. and Molnar, A. 2014a. “Real and substantial connections: enforcing Canadian privacy laws against American social networking companies,” Journal of Law, Information & Science 23(1): 124.Google Scholar
Bennett, C. J., Parsons, C., and Molnar, A. 2014b. “Forgetting, Non-Forgetting and Quasi-Forgetting in Social Networking: Canadian Policy and Corporate Practice,” in Gutwirth, S., Leenes, R., and De Hert, P. (eds.) Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges. New York: Springer, pp. 4160.CrossRefGoogle Scholar
Berners-Lee, T., Fischetti, M. and Michael, L. 2000. Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by Its Inventor. New York: Harper Business.Google Scholar
boyd, d. 2011. “Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications,” in Papacharissi, Z. (ed.) A Networked Self: Identity, Community, and Culture on Social Network Sites. New York: Routledge, pp. 39–58.Google Scholar
Cronin, C. and DeGreiff, P. (eds.) 1998. The Inclusion of the Other: Studies in Political Theory. Cambridge, MA: MIT Press.Google Scholar
Danezis, G. and Clayton, R. 2007. “Introducing Traffic Analysis,” in Acquisti, A., Gritzalis, S., Lambrinoudakis, C., and Vimercati, S. di (eds.) Digital Privacy: Theory, Technologies, and Practices. New York: Auerbach, pp. 95–116.Google Scholar
DeCew, J. Wagner 1997. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Ithaca, NY: Cornell University Press.CrossRefGoogle Scholar
Diffie, W. and Landau, S. 2007. Privacy on the Line: The Politics of Wiretapping and Encryption. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Electronic Frontier Foundation, 2013. “First Unitarian Church of Los Angeles v. NSA.” Accessed from www.eff.org/cases/first-unitarian-church-los-angeles-v-nsa.Google Scholar
Etzioni, A. 1999. The Limits of Privacy. New York: Basic Books.Google Scholar
European Union Article 29 Working Party 2009. Opinion 5/2009 on Online Social Networking. 01189/09/enwp163. Adopted on 12 June.Google Scholar
Feiler, L. 2010. “The legality of data retention directive in light of the fundamental rights to privacy and data protection,” European Journal of Law and Technology 1(3). Accessed from http://ejlt.org/article/view/29/75.Google Scholar
Fuchs, C. 2010. Internet and Society: Social Theory in the Information Age. New York: Routledge.Google Scholar
Gallagher, S. 2013. “Googlers say ‘f*** you’ to NSA, company encrypts internal network,” Ars Technica, 6 November. Accessed from http://arstechnica.com/information-technology/2013/11/googlers-say-f-you-to-nsa-company-encrypts-internal-network/.Google Scholar
Habermas, J. 1996. Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Habermas, J. 1998a. “A Genealogical Analysis of the Cognitive Content of Morality,” in Cronin, C. and DeGreiff, P. (eds.) The Inclusion of the Other: Studies in Political Theory. Cambridge, MA: MIT Press, pp. 3–46.Google Scholar
Habermas, J. 1998b. “Three Normative Models of Democracy,” in Cronin, C. and DeGreiff, P. (eds.), The Inclusion of the Other: Studies in Political TheoryCambridge, MA: The MIT Press, pp. 239–52.Google Scholar
Haggerty, K. and Ericson, R. (eds.) 2006. The New Politics of Surveillance and Visibility. University of Toronto Press.Google Scholar
Hindman, M. 2009. The Myth of Digital Democracy. Princeton University Press.CrossRefGoogle Scholar
Kaye, B. K. 2011. “Between Barack and a Net Place: Motivations for Using Social Network Sites and Blogs for Political Information,” in Papacharissi, Z. (ed.) A Networked Self: Identity, Community, and Culture on Social Network Sites. New York: Routledge, pp. 208–31.Google Scholar
Kerr, I., Binnie, M. and Aoki, C. 2008. “Tessling on my brain: the future of lie detection and brain privacy in the criminal justice system,” Canadian Journal of Criminology and Criminal Justice 50(3): 367–87.CrossRefGoogle Scholar
Kies, R. 2010. Promises and Limits of Web-deliberation. New York: Palgrave Macmillan.CrossRefGoogle Scholar
Kravets, D. 2010. “Judge Tosses NSA Spy Cases,” Wired Online, January 2010. Accessed from www.wired.com/threatlevel/2010/01/nsa-spy-cases-tossed/.Google Scholar
MacKinnon, R. 2012. Consent of the Networked: The Worldwide Struggle for Internet Freedom. New York: Basic Books.Google Scholar
Mayer-Schönberger, V. and Cukier, K. 2013. Big Data: A Revolution that Will Transform how We Live, Work, and Think. New York: Houghton-Mifflin-Harcourt.Google Scholar
Mergel, I. 2012. Social Media in the Public Sector: A Guide to Participation, Collaboration and Transparency in the Networked World. San Francisco: Jon Wiley & Sons, Inc.Google Scholar
Mill, J. S. 1859. Three Essays. Oxford University Press.Google Scholar
Millar, J. 2009. “Core Privacy: A Problem for Predictive Data Mining,” in Kerr, I., Lucock, C. and Steeves, V. (eds.) Lessons from the Identity Trail. Oxford University Press, pp. 103–20.Google Scholar
Nippert-Eng, C. E. 2010. Islands of Privacy. University of Chicago Press.CrossRefGoogle Scholar
Nissenbaum, H. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.CrossRefGoogle Scholar
Opsahl, K. 2013. “Why Metadata Matters,” Electronic Frontier Foundation (EFF), June 7. Accessed from www.eff.org/deeplinks/2013/06/why-metadata-matters.Google Scholar
Regan, P. M. 1995. Legislating Privacy: Technology, Social Values and Public Policy. Chapel Hill: University of North Carolina Press.Google Scholar
Saveri, A., Rheingold, H. and Vian, K. 2005. “Technologies of Cooperation,” Institute for the Future. Accessed from www.rheingold.com/cooperation/Technology_of_cooperation.pdf.Google Scholar
Schoeman, F. D. 1992. Privacy and Social Freedom. Cambridge University Press.CrossRefGoogle Scholar
Schwartz, P. M. 1999. “Privacy and democracy in cyberspace,” Vanderbilt Law Review 52: 1610–702.Google Scholar
Solove, D. J. 2008. Understanding Privacy. Cambridge, MA: Harvard University Press.Google Scholar
Stalder, F. 2002. “Privacy is not the antidote to surveillance,” Surveillance and Society 1(1): 120–4.Google Scholar
Steeves, V. 2009. “Reclaiming the Social Value of Privacy,” in Kerr, I., Lucock, C. and Steeves, V. (eds.) Lessons from the Identity Trail. Oxford University Press, pp. 191–208.Google Scholar
Strandburg, K. J. 2007. “Surveillance of Emergent Associations: Freedom of Association in a Network Society,” in Acquisti, A., Gritzalis, S., Lambrinoudakis, C. and Vimercati, S. di (eds.) Digital Privacy: Theory, Technologies, and Practices. New York: Auerbach, pp. 435–58.Google Scholar
Taddicken, M. 2012. “Privacy, Surveillance, and Self-Disclosure in the Social Web: Exploring the User’s Perspective via Focus Groups,” in Fuchs, C., Boersma, K., Albrechtslund, A. and Sandoval, M. (eds.) Internet and Surveillance: The Challenges of Web 2.0 and Social Media. New York: Routledge, pp. 255–72.Google Scholar
Turkle, S. 2012. Alone Together: Why We Expect More from Technology and Less from Each Other. New York: Basic Books.Google Scholar
Warren, S. and Brandeis, L. 1890The right to privacy,” Harvard Law Review 4(5): 193220.CrossRefGoogle Scholar
Westin, A. F. 1967. Privacy and Freedom. New York: Atheneum.Google Scholar
Young, I. M. 2001. “Activist challenges to deliberative democracy,” Political Theory 29(5): 670–90.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×