Privacy Part 1: Corporate Data Gathering: Difference between revisions

From Technologies and Politics of Control
Jump to navigation Jump to search
No edit summary
Line 14: Line 14:


* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888 Daniel Solove, ''Understanding Privacy'' (Chapter 1)]
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888 Daniel Solove, ''Understanding Privacy'' (Chapter 1)]
; Privacy and technology


* [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, ''The Future of the Internet and How to Stop It'' (Chapter 9)]
* [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, ''The Future of the Internet and How to Stop It'' (Chapter 9)]


* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Hal Abelson, Ken Ledeen, and Harry Lewis, ''Blown to Bits'' (Chapter 2)] (focus on pages 36-42: “Why We Lost Our Privacy, Or Gave it All Away”)
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Hal Abelson, Ken Ledeen, and Harry Lewis, ''Blown to Bits'' (Chapter 2)] (read pages 36-42)
 
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, ''Code 2.0'' (Chapter 7)] (focus on "Privacy in Public: Data")
 
; Privacy and law
 
* [https://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States Wikipedia, Privacy Laws of the United States] and [https://en.wikipedia.org/wiki/Children%27s_Online_Privacy_Protection_Act Children's Online Privacy Protection Act]


* [http://www.zephoria.org/thoughts/archives/2011/11/01/parents-survey-coppa.html danah boyd, Why Parents Help Children Violate Facebook’s 13+ Rule]
* [http://www.zephoria.org/thoughts/archives/2011/11/01/parents-survey-coppa.html danah boyd, Why Parents Help Children Violate Facebook’s 13+ Rule]
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, ''Code 2.0'' (Chapter 7)] (read “Solutions” through “Rules to Enable Choice About Privacy”)


* [http://iheid.revues.org/321 Johannes Köppel, The International Dimension of the SWIFT Affair]
* [http://iheid.revues.org/321 Johannes Köppel, The International Dimension of the SWIFT Affair]

Revision as of 14:00, 16 November 2013

April 1

A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet governance. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online it way succumb to the interests of profitability, online behavior regulation, and cybersecurity.

Over the next two weeks we'll look at privacy, beginning with general concepts of privacy, how data is measured and gathered on the web, and some specific legal responses to privacy concerns. Next week we'll build on these concepts with an eye toward government surveillance and law enforcement.


Readings

Conceptualizing privacy
Privacy and technology
Privacy and law

Optional Readings


Videos Watched in Class

Links

Class Discussion

Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 15:12, 7 November 2013 (EST)