Privacy Part 1: Corporate Data Gathering: Difference between revisions
No edit summary |
No edit summary |
||
Line 19: | Line 19: | ||
; Conceptualizing privacy | ; Conceptualizing privacy | ||
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888 Daniel Solove, ''Understanding Privacy'' (Chapter 1)] | * [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888 Daniel Solove, ''Understanding Privacy'' (Chapter 1)] (skim) | ||
; Privacy and | ; Privacy and data | ||
* [http://www.wired.com/science/discoveries/magazine/16-07/pb_theory Chris Anderson, The End of Theory] | |||
* [http://www. | |||
* [ | * [http://www.foreignaffairs.com/articles/139104/kenneth-neil-cukier-and-viktor-mayer-schoenberger/the-rise-of-big-data Viktor Mayer-Shoenberger, The Rise of Big Data] | ||
* [http://www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213 Bruce Schneier, Why Anonymous Data Sometimes Isn't] | * [http://www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213 Bruce Schneier, Why Anonymous Data Sometimes Isn't] | ||
Line 39: | Line 37: | ||
:* [http://aboutmyinfo.org/ About My Info] | :* [http://aboutmyinfo.org/ About My Info] | ||
; | ; Corporate data practices | ||
* [http://blogs.wsj.com/digits/2012/12/07/how-dataium-watches-you/ Jeremy Singer-Vine, How Dataium Watches You] | |||
* [http://www.interactually.com/linkedin-creepiest-social-network/ David Veldt, LinkedIn: The Creepiest Social Network] | |||
* [http://online.wsj.com/news/articles/SB10001424127887323777204578189391813881534 Jennifer Valentino-Devires, Jeremy Singer-Vine, Ashkan Soltani, Websites Vary Prices, Deals Based on Users' Information] (if this appears behind a paywal, [http://blogs.wsj.com/wtk/ play around with the WSJ's interactive graphics]) | |||
* [ | == Optional Readings == | ||
* [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, ''The Future of the Internet and How to Stop It'' (Chapter 9)] | |||
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Hal Abelson, Ken Ledeen, and Harry Lewis, ''Blown to Bits'' (Chapter 2)] (read pages 36-42) | |||
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, ''Code 2.0'' (Chapter 7)] (focus on "Privacy in Public: Data") | |||
* [http://www.zephoria.org/thoughts/archives/2011/11/01/parents-survey-coppa.html danah boyd, Why Parents Help Children Violate Facebook’s 13+ Rule] | * [http://www.zephoria.org/thoughts/archives/2011/11/01/parents-survey-coppa.html danah boyd, Why Parents Help Children Violate Facebook’s 13+ Rule] | ||
* [https://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States Wikipedia, Privacy Laws of the United States] | |||
* [http://www.access-controlled.net/wp-content/PDFs/chapter-3.pdf Hal Roberts and John Palfrey, The EU Data Retention Directive in an Era of Internet Surveillance] | * [http://www.access-controlled.net/wp-content/PDFs/chapter-3.pdf Hal Roberts and John Palfrey, The EU Data Retention Directive in an Era of Internet Surveillance] |
Revision as of 13:44, 23 March 2014
April 1
A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet governance. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online, our interests may fall to the interests of profitability, online behavior regulation, and cybersecurity.
Over the next two weeks we'll look at privacy, beginning with general concepts of privacy, how data is measured and gathered on the web, and some specific legal responses to privacy concerns. Next week we'll build on these concepts with an eye toward government surveillance and law enforcement.
Our own David O'Brien will be leading the class discussion this week.
Assignments
The deadline for Assignment 3 moved from March 25th to today, April 1st. Please upload your assignment prior to class today.
Readings
- Conceptualizing privacy
- Privacy and data
- Play around with some of the websites by Latanya Sweeney
- Corporate data practices
- Jennifer Valentino-Devires, Jeremy Singer-Vine, Ashkan Soltani, Websites Vary Prices, Deals Based on Users' Information (if this appears behind a paywal, play around with the WSJ's interactive graphics)
Optional Readings
- Hal Abelson, Ken Ledeen, and Harry Lewis, Blown to Bits (Chapter 2) (read pages 36-42)
- Lawrence Lessig, Code 2.0 (Chapter 7) (focus on "Privacy in Public: Data")