PETs for the Internet |
Privacy-enhancing Technologies for the Internet (local cached copy) Ian Goldberg, David Wagner, Eric Brewer, IEEE COMPCON 1997 |
Privacy-enhancing technologies for the Internet, II: Five years later (local cached copy) Ian Goldberg, PET 2002 |
Privacy-enhancing technologies for the Internet III: Ten years later (local cached copy) Ian Goldberg, "Digital Privacy: Theory, Technologies and Practices", Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, editors, 2007 |
Theories of Surveillance |
Panopticism (local cached copy) Michel Foucault, In: Discipline and Punish: The Birth of the Prison. New York: Vintage. 195–228. 1977 |
The Surveillant Assemblage (local cached copy) Kevin Haggerty, Richard Ericson, British Journal of Sociology (51): 605–622. 2000 |
Why Privacy |
'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (local cached copy) Daniel J. Solove, San Diego Law Review, Vol. 44, 2007 |
Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration (local cached copy) Maggie Oates, Yama Ahmadullah, Abigail Marsh, Chelse Swoopes, Shikun Zhang, Rebecca Balebako, Lorrie Cranor, Proceedings on Privacy Enhancing Technologies 2018.4 |
Big Other: Surveillance Capitalism and the Prospects of an Information Civilization (local cached copy) Shoshanna Zuboff, Journal of Information Technology (30): 75–89. 2015 |
Investigating sources of PII used in Facebook's targeted advertising (local cached copy) Giridhari Venkatadri, Elena Lucherini, Piotr Sapiezynski, Alan Mislove, Proceedings on Privacy Enhancing Technologies 2019.1 |
I never signed up for this! Privacy implications of email tracking (local cached copy) Steven Englehardt, Jeffrey Han, Arvind Narayanan, Proceedings on Privacy Enhancing Technologies 2018.1 |
In Defence of Privacy: The Concept and the Regime (local cached copy) Colin Bennett, Surveillance & Society. 8. 485–496. 2011 |
Eyes and Ears Everywhere: Everyday Surveillance |
The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking (local cached copy) Janus Varmarken, Hieu Le, Anastasia Shuba, Athina Markopoulou, Zubair Shafiq, Proceedings on Privacy Enhancing Technologies 2020.2 |
Toward a political economy of nudge: smart city variations (local cached copy) Oscar H. Gandy Jr., Selena Nemorin, Information, Communication & Society, 22:14, 2112–2126. 2018 |
Privacy Attitudes of Smart Speaker Users (local cached copy) Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, David Wagner, Proceedings on Privacy Enhancing Technologies 2019.4 |
Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness (local cached copy) Jean-François Blanchette, Deborah G. Johnson, The Information Society, 18:1, 33–45. 2011 |
The Public Domain: Social Surveillance in Everyday Life (local cached copy) Alice Marwick, Surveillance & Society 9(4), 378–400. 2012 |
Bystanders' Privacy: The Perspectives of Nannies on Smart Home Surveillance (local cached copy) Julia Bernd, Ruba Abu-Salma, Alisa Frik, 10th USENIX Workshop on Free and Open Communications on the Internet, 2020 |
Surveillance, Censorship, and the State |
An Analysis of the Current State of the Consumer Credit Reporting System in China (local cached copy) Mo Chen, Jens Grossklags, Proceedings on Privacy Enhancing Technologies 2020.4 |
Surveillance in China's Xinjiang Region: Ethnic Sorting, Coercion, and Inducement (local cached copy) James Leibold, Journal of Contemporary China 29, Issue 121, 46–60. 2019 |
We Chat, They Watch: How International Users Unwittingly Build up WeChat's Chinese Censorship Apparatus (Parts 3 and 4 only) (local cached copy) Jeffrey Knockel, Christopher Parsons, Lotus Ruan, Ruohan Xiong, Jedidiah Crandall, and Ron Deibert, Citizen Lab Research Report No. 127, University of Toronto. 2020 |
An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message (local cached copy) Ruohan Xiong, Jeffrey Knockel, 9th USENIX Workshop on Free and Open Communications on the Internet, 2019 |
Internet Censorship in Thailand: User Practices and Potential Threats (local cached copy) Genevieve Gebhart, Tadayoshi Kohno, European Symposium on Security and Privacy 2017 |
Lawful Illegality: What Snowden Has taught Us about the Legal Infrastructure of the Surveillance State (local cached copy) Lisa M. Austin, In: Law, Privacy and Surveillance in Canada in the Post-Snowden Era. University of Ottawa Press. 2015 |
Defences and Resistance to Surveillance |
Voter preferences, voter manipulation, voter analytics: policy options for less surveillance and more autonomy (local cached copy) Jacquelyn Burkell, Priscilla M. Regan, Internet Policy Review. 8 (4), 1–24. 2019 |
Untraceable electronic mail, return addresses, and digital pseudonyms (local cached copy) David Chaum, Communications of the ACM, 1981 |
A Tack in the Shoe: Neutralizing and Resisting the New Surveillance (local cached copy) Gary Marx, Journal of Social Issues, 59: 369–390. 2003 |
Tor: The Second-Generation Onion Router (local cached copy) Roger Dingledine, Nick Mathewson, Paul Syverson, USENIX Security 2004 |
DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams (local cached copy) Diogo Barradas, Nuno Santos, Luís Rodrigues, Proceedings on Privacy Enhancing Technologies 2017.4 |
Vernacular resistance to data collection and analysis: A political theory of obfuscation (local cached copy) Finn Brunton, Helen Nissenbaum, First Monday 16(5). 2011 |
The Loopix Anonymity System (local cached copy) Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, George Danezis, USENIX Security 2017 |
Self-Discipline or Resistance? Muslim American Men and Women's Responses to Their HyperSurveillance Saher Selod, In: Forever Suspect: Racialized Surveillance of Muslim Americans in the War on Terror |
Adoption and Non-adoption of Privacy Enhancing Technologies |
Not the Normal Trans Story: Negotiating Trans Narratives While Crowdfunding at the Margins (local cached copy) Niki Frtiz, Amy Gonzales, International Journal of Communication 12(2018), 1189–1208 |
Why Doesn't Jane Protect Her Privacy? (local cached copy) Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos, Privacy Enhancing Technologies Symposium 2014 |
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym (local cached copy) David Harborth, Sebastian Pape, Kai Rannenberg, Proceedings on Privacy Enhancing Technologies 2020.2 |
Privacy: Why do youth share so publicly? (local cached copy) danah boyd, In: It's Complicated. New Haven: Yale University Press. pp 54–76. |
Emotional and Practical Considerations towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology (local cached copy) Moses Namara, Daricia Wilkinson, Kelly Caine, Bart Knijnenburg, Proceedings on Privacy Enhancing Technologies 2020.1 |
The Allegheny Algorithm Virginia Eubanks, In Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor, 127–173. New York, NY: St. Martin's Press. |