CS 858 / SOC 701: Surveillance and Privacy — Fall 2020

Suggested Reading List

PETs for the Internet
Privacy-enhancing Technologies for the Internet (local cached copy)
Ian Goldberg, David Wagner, Eric Brewer, IEEE COMPCON 1997
Privacy-enhancing technologies for the Internet, II: Five years later (local cached copy)
Ian Goldberg, PET 2002
Privacy-enhancing technologies for the Internet III: Ten years later (local cached copy)
Ian Goldberg, "Digital Privacy: Theory, Technologies and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, 2007
Theories of Surveillance
Panopticism (local cached copy)
Michel Foucault, In: Discipline and Punish: The Birth of the Prison. New York: Vintage. 195–228. 1977
The Surveillant Assemblage (local cached copy)
Kevin Haggerty, Richard Ericson, British Journal of Sociology (51): 605–622. 2000
Why Privacy
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (local cached copy)
Daniel J. Solove, San Diego Law Review, Vol. 44, 2007
Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration (local cached copy)
Maggie Oates, Yama Ahmadullah, Abigail Marsh, Chelse Swoopes, Shikun Zhang, Rebecca Balebako, Lorrie Cranor, Proceedings on Privacy Enhancing Technologies 2018.4
Big Other: Surveillance Capitalism and the Prospects of an Information Civilization (local cached copy)
Shoshanna Zuboff, Journal of Information Technology (30): 75–89. 2015
Investigating sources of PII used in Facebook's targeted advertising (local cached copy)
Giridhari Venkatadri, Elena Lucherini, Piotr Sapiezynski, Alan Mislove, Proceedings on Privacy Enhancing Technologies 2019.1
I never signed up for this! Privacy implications of email tracking (local cached copy)
Steven Englehardt, Jeffrey Han, Arvind Narayanan, Proceedings on Privacy Enhancing Technologies 2018.1
In Defence of Privacy: The Concept and the Regime (local cached copy)
Colin Bennett, Surveillance & Society. 8. 485–496. 2011
Eyes and Ears Everywhere: Everyday Surveillance
The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking (local cached copy)
Janus Varmarken, Hieu Le, Anastasia Shuba, Athina Markopoulou, Zubair Shafiq, Proceedings on Privacy Enhancing Technologies 2020.2
Toward a political economy of nudge: smart city variations (local cached copy)
Oscar H. Gandy Jr., Selena Nemorin, Information, Communication & Society, 22:14, 2112–2126. 2018
Privacy Attitudes of Smart Speaker Users (local cached copy)
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, David Wagner, Proceedings on Privacy Enhancing Technologies 2019.4
Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness (local cached copy)
Jean-François Blanchette, Deborah G. Johnson, The Information Society, 18:1, 33–45. 2011
The Public Domain: Social Surveillance in Everyday Life (local cached copy)
Alice Marwick, Surveillance & Society 9(4), 378–400. 2012
Bystanders' Privacy: The Perspectives of Nannies on Smart Home Surveillance (local cached copy)
Julia Bernd, Ruba Abu-Salma, Alisa Frik, 10th USENIX Workshop on Free and Open Communications on the Internet, 2020
Surveillance, Censorship, and the State
An Analysis of the Current State of the Consumer Credit Reporting System in China (local cached copy)
Mo Chen, Jens Grossklags, Proceedings on Privacy Enhancing Technologies 2020.4
Surveillance in China's Xinjiang Region: Ethnic Sorting, Coercion, and Inducement (local cached copy)
James Leibold, Journal of Contemporary China 29, Issue 121, 46–60. 2019
We Chat, They Watch: How International Users Unwittingly Build up WeChat's Chinese Censorship Apparatus (Parts 3 and 4 only) (local cached copy)
Jeffrey Knockel, Christopher Parsons, Lotus Ruan, Ruohan Xiong, Jedidiah Crandall, and Ron Deibert, Citizen Lab Research Report No. 127, University of Toronto. 2020
An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message (local cached copy)
Ruohan Xiong, Jeffrey Knockel, 9th USENIX Workshop on Free and Open Communications on the Internet, 2019
Internet Censorship in Thailand: User Practices and Potential Threats (local cached copy)
Genevieve Gebhart, Tadayoshi Kohno, European Symposium on Security and Privacy 2017
Lawful Illegality: What Snowden Has taught Us about the Legal Infrastructure of the Surveillance State (local cached copy)
Lisa M. Austin, In: Law, Privacy and Surveillance in Canada in the Post-Snowden Era. University of Ottawa Press. 2015
Defences and Resistance to Surveillance
Voter preferences, voter manipulation, voter analytics: policy options for less surveillance and more autonomy (local cached copy)
Jacquelyn Burkell, Priscilla M. Regan, Internet Policy Review. 8 (4), 1–24. 2019
Untraceable electronic mail, return addresses, and digital pseudonyms (local cached copy)
David Chaum, Communications of the ACM, 1981
A Tack in the Shoe: Neutralizing and Resisting the New Surveillance (local cached copy)
Gary Marx, Journal of Social Issues, 59: 369–390. 2003
Tor: The Second-Generation Onion Router (local cached copy)
Roger Dingledine, Nick Mathewson, Paul Syverson, USENIX Security 2004
DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams (local cached copy)
Diogo Barradas, Nuno Santos, Luís Rodrigues, Proceedings on Privacy Enhancing Technologies 2017.4
Vernacular resistance to data collection and analysis: A political theory of obfuscation (local cached copy)
Finn Brunton, Helen Nissenbaum, First Monday 16(5). 2011
The Loopix Anonymity System (local cached copy)
Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis, USENIX Security 2017
Self-Discipline or Resistance? Muslim American Men and Women's Responses to Their HyperSurveillance
Saher Selod, In: Forever Suspect: Racialized Surveillance of Muslim Americans in the War on Terror
Adoption and Non-adoption of Privacy Enhancing Technologies
Not the Normal Trans Story: Negotiating Trans Narratives While Crowdfunding at the Margins (local cached copy)
Niki Frtiz, Amy Gonzales, International Journal of Communication 12(2018), 1189–1208
Why Doesn't Jane Protect Her Privacy? (local cached copy)
Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos, Privacy Enhancing Technologies Symposium 2014
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym (local cached copy)
David Harborth, Sebastian Pape, Kai Rannenberg, Proceedings on Privacy Enhancing Technologies 2020.2
Privacy: Why do youth share so publicly? (local cached copy)
danah boyd, In: It's Complicated. New Haven: Yale University Press. pp 54–76.
Emotional and Practical Considerations towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology (local cached copy)
Moses Namara, Daricia Wilkinson, Kelly Caine, Bart Knijnenburg, Proceedings on Privacy Enhancing Technologies 2020.1
The Allegheny Algorithm
Virginia Eubanks, In Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor, 127–173. New York, NY: St. Martin's Press.