Advertisement

Informatik-Spektrum

, Volume 41, Issue 5, pp 328–347 | Cite as

,,You Have Zero Privacy Anyway – Get Over It“

Von ,,Personal Privacy Management“ zu ,,Network Publicy Governance“
  • Andréa Belliger
  • David J. Krieger
HAUPTBEITRAG ,,YOU HAVE ZERO PRIVACY ANYWAY v GET OVER IT“

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Balkin JM (2004) Digital speech and democratic culture: A theory of freedom of expression for the information society. N Y Univ Law Rev 79(1). Available at SSRN: https:// papers.ssrn.com/sol3/papers.cfm?abstract_id=470842Google Scholar
  2. 2.
    Balkin JM (2008) The future of free expression in a digital age. Pepperdine Law Rev 36:101–118Google Scholar
  3. 3.
    Balkin JM (2016) Cultural democracy and the first amendment. Northwestern Univ Law Rev 109. Available at SSRN: https://ssrn.com/abstract=2676027Google Scholar
  4. 4.
    Barnes SB (2006) A privacy paradox: social networking in the United States. First Monday 11(9). http://firstmonday.org/article/view/1394/1312_2Google Scholar
  5. 5.
    Belliger A, Krieger DJ (2016) Organizing Networks. An Actor-Network Theory of Organizations. transcript, BielefeldCrossRefGoogle Scholar
  6. 6.
    Belliger A, Krieger DJ (2018) Network Publicy Governance. On Privacy and the Informational Self. transcript, BielefeldCrossRefGoogle Scholar
  7. 7.
    Benz A, Dose N (Hrsg) (2010) Governance – Regieren in komplexen Regelsystemen. Eine Einführung. 2. Aufl. VS Verlag, WiesbadenGoogle Scholar
  8. 8.
    Brandimarte L, Acuisti A, Lowenstein G (2012) Misplaced confidences: Privacy and the control paradox. Soc Psychol Personal Sci 4(3):340–347CrossRefGoogle Scholar
  9. 9.
    Castells M (2017) Der Aufstieg der Netzwerkgesellschaft. Das Informationszeitalter – Wirtschaft, Gesellschaft, Kultur. Bd 1. 2. Aufl. Springer VS, WiesbadenCrossRefGoogle Scholar
  10. 10.
    Chhotray V, Stoker G (2009) Governance theory and practice. A cross-disciplinary approach. Palgrave Macmillan, BasingstokeCrossRefGoogle Scholar
  11. 11.
    Christl W (2017) Corporate Surveillance in Everyday Life. How Companies Collect, Combine, Analyze, Trade, and Use Personal Data on Billions. Cracked Labs, ViennaGoogle Scholar
  12. 12.
    Elster J (Hrsg) (2018) Secrecy and Publicitiy in Votes and Debates. Cambridge University Press, CambridgeGoogle Scholar
  13. 13.
    Floridi L (2014) The Fourth Revolution: How the Infosphere Is Reshaping Human Reality. Oxford University Press, New YorkGoogle Scholar
  14. 14.
    Gerber P, Volkamer M, Gerber N (2017) Das Privacy-Paradoxon – Ein Erklärungsversuch und Handlungsempfehlungen. In: DDV Deutscher Dialogmarketing Verband e. V. (Hrsg) Dialogmarketing Perspektiven 2016/2017. Springer Gabler, WiesbadenGoogle Scholar
  15. 15.
    Gillespie T (2018) Custodians of the Internet Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. Yale University Press, New Haven, LondonGoogle Scholar
  16. 16.
    Habermas J (1997) Theorie des kommunikativen Handelns. 2 Bde. Suhrkamp, Frankfurt a. M.Google Scholar
  17. 17.
    Jenkins H et al (2005) Confronting the challenges of participatory culture: media education for the 21st century, http://www.newmedialiteracies.org/wp-content/uploads/pdfs/NMLWhitePaper.pdfGoogle Scholar
  18. 18.
    Krieger DJ, Belliger A (2014) Interpreting networks: hermeneutics, actor-network theory, and new media. transcript, BielefeldCrossRefGoogle Scholar
  19. 19.
    Latour B (2017) Kampf um Gaia. Acht Vorträge über das neue Klimaregime. Suhrkamp, Frankfurt a. M.Google Scholar
  20. 20.
    Macleod AM (2018) Privacy: concept, value, right? In: Cudd AE, Navin MC (eds) Core Concepts and Contemporary Issues in Privacy. Springer, Heidelberg, pp 31–45CrossRefGoogle Scholar
  21. 21.
    Mann S (2016) Surveillance (oversight), sousveillance (undersight), and metaveillance (seeing sight itself). In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. http://www.cvfoundation.org//openaccess/content_cvpr_2016_workshops/w29/papers/Mann_Surveillance_Oversight_Sousveillance_CVPR_2016_paper.pdfGoogle Scholar
  22. 22.
    Nissenbaum H (2004) Privacy as contextual integrity. Washington Law Rev 79:101–139Google Scholar
  23. 23.
    Norberg PA, Horne DR, Horne DA (2007) The privacy paradox: personal information disclosure intentions versus behaviors. J Consum Aff 41(1):100–126CrossRefGoogle Scholar
  24. 24.
    Ostrom E (1990) Governing the Commons: The Evolution of Institutions For Collective Action. Cambridge University Press, CambridgeCrossRefGoogle Scholar
  25. 25.
    Posner RA (1978) An economic theory of Privatheit. Regulation 2:19–26Google Scholar
  26. 26.
    Shirky C (2008) Here Comes Everybody. How Change Happens When People Come Together. Penguin Press, New YorkGoogle Scholar
  27. 27.
    Taler R, Sunstein C (2008) Nudging – Wie man kluge Entscheidungen anstößt. 5. Aufl. Econ, BerlinGoogle Scholar
  28. 28.
    Thouvenin F (2017) Wem gehören meine Daten? Zu Sinn und Nutzen einer Erweiterung des Eigentumsbegriffs. In: Zinder FG, Schmid H, Pichonnaz P (Hrsg) SJZ 113/2017 21–32Google Scholar
  29. 29.
    Waldo J, Lin HS, Millett L (eds) (2007) Engaging privacy and information technology in a digital age. National research council. Committee on privacy in the information age. National Academy of Sciences, Washington DCGoogle Scholar
  30. 30.
    Wilson DS, Ostram E, Cox ME (2013) Generalizing the core design principles for the efficacy of groups. J Econ Behav Org 90:21–32CrossRefGoogle Scholar
  31. 31.
    Weinberger D (2012) Too Big to Know. Rethinking Knowledge Now That the Fact’s Aren’t the Facts, Experts Are Everywhere and the Smartest Person in the Room Is the Room. Basic Books, New YorkGoogle Scholar
  32. 32.
    Westin A (1967) Privacy and Freedom. Athenaeum, New YorkGoogle Scholar

Copyright information

© Springer-Verlag GmbH Deutschland, ein Teil von Springer Nature 2018

Authors and Affiliations

  1. 1.LuzernSchweiz

Personalised recommendations