Acquisti, A. (2014) From the economics of privacy to the economics of big data. Privacy, big data, and the public good: Frameworks for engagement
Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security and Privacy, 3(1), 23–33.
Article
Google Scholar
Acquisti, A., John, L.K., & Loewenstein, G. (2013). What is privacy worth? The Journal of Legal Studies
42(2), 249–274. doi: 10.1086/671754
Allen, A. (2007). The virtuous spy: privacy as an ethical limit. Scholarship at Penn Law.
Azevedo, P. G., Mesquita, F. O., & Young, R. J. (2010). Fishing for gaps in science: A bibliographic analysis of Brazilian freshwater ichthyology from 1986 to 2005. Journal of Fish Biology, 76(9), 2177–2193.
Article
Google Scholar
Beel, J., & Gipp, B. (2010). Academic Search Engine Spam and Google Scholar’s Resilience Against it. Journal of electronic publishing.
Boyd, D., & Crawford, K. (2012). Critical questions for big data. Information, Communication and Society, 15(5), 662–679.
Article
Google Scholar
Cohen, J.E. (2013). What privacy is for. Harvard Law Review 126.
Diebold, F. X. (2003). Advances in economics and econometrics: Theory and applications, econometric society monographs. Eighth world congress. Cambridge: Cambridge University Press.
Google Scholar
Gauch, H, Jr. (1993). Prediction. Parsimony and Noise. American scientist, 81(5), 468–478.
MATH
Google Scholar
Ghosh, D.P., Schrader, D.E., Schulze, W.D., Wicker, S.B. (2012). Economic analysis of privacy-aware advanced metering infrastructure adoption. Innovative Smart Grid Technologies (ISGT), 2012 IEEE PES pp 1–4
Gurses, S., & Diaz, C. (2013). Two tales of privacy in online social networks. Security and Privacy, IEEE, 11(3), 29–37.
Article
Google Scholar
Gurses, S., Troncoso, C. & Diaz, C. (2011). Engineering privacy by design …Privacy
& Data Protection.
Hadnagy, C., & Wilson, P. (2010). Social engineering: The art of human hacking (1st ed.). Indianapolis: Wiley Publishing.
Google Scholar
Hugl, U. (2010). Approaching the value of Privacy: Review of theoretical privacy concepts and aspects of privacy management. AMCIS.
Hull, G., Lipford, H.R., Latulipe, C. (2011). Contextual gaps: privacy issues on Facebook. Ethics Inf Technol.
Jackson, K., & Trochim, W. (2002). Concept mapping as an alternative approach for the analysis of open-ended survey responses. Organizational Research Methods, 5(4), 307–336.
Article
Google Scholar
Knobel, C., & Bowker, G. C. (2011). Values in design. CACM.
Lessig, L. (2006). Code. Lawrence Lessig.
Lindsey, D. (1980). Production and citation measures in the sociology of science: The problem of multiple authorship. Social Studies of Science, 10(2), 145–162.
Article
Google Scholar
Martin, K. (2012). Information technology and privacy: Conceptual muddles or privacy vacuums? Ethics and Information Technology, 14(4), 267–284.
Article
Google Scholar
Pearson, K. (1900). X. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to.... The London
Pham, M. C., Klamma, R., & Jarke, M. (2011). Development of computer science disciplines: A social network analysis approach. Social Network Analysis and Mining, 1(4), 321–340.
Article
Google Scholar
Richards, N. M., & King, J. H. (2014). Big Data Ethics. Wake Forest Law Review.
Sar, R. K., & Al-Saggaf, Y. (2014). Contextual integrity’s decision heuristic and the tracking by social network sites. Ethics Information Technology, 16, 15–26.
Article
Google Scholar
Schrader, D., Ghosh, D.P., Schulze, W.D., & Wicker, S.B. (2013). Civilization and Its Privacy Discontents. In: Patterson H (ed) Privacy Law Scholars Conference, Berkeley, CA.
Shilton, K. (2010). Participatory sensing: Building empowering surveillance: EBSCOhost. Surveillance & Society, 8, 131–150.
Google Scholar
Solove, D. J. (2007). The future of reputation: Gossip, Rumor, and privacy on the internet. New Haven: Yale University Press.
Google Scholar
Stajano, F., & Wilson, P. (2009). Understanding scam victims: Seven principles for systems security. Technical Report UCAM-CL-TR-754, University of Cambridge.
Stark, L., & Tierney, M. (2013). Lockbox: Mobility, privacy and values in cloud storage. Ethics and Information Technology, 16(1), 1–13.
Article
Google Scholar
Torres-Salinas, D., Robinson-Garcia, N., Jiménez-Contreras, E., Herrera, F., & López-Cózar, E.D. (2013). On the use of Biplot analysis for multivariate bibliometric and scientific indicators. arXiv.1302.0608v1.
Toubiana, V., Narayanan, A., Boneh, D., & Nissenbaum, H. (2010). Adnostic: Privacy preserving targeted advertising. NDSS.
Toubiana, V., Subramanian, L., & Nissenbaum, H. (2011). TrackMeNot: Enhancing
the privacy of Web Search. arXiv 1109.4677v1
Turow, J. (2012). The daily you: How the new advertising industry is defining your identity and your worth. New Haven: Yale University Press.
Google Scholar
Weber, R. P. (1990). Basic content analysis (2nd ed.). Newbury Park, CA: SAGE Publications.
Google Scholar
Wicker, S. B., & Schrader, D. E. (2011). Privacy-aware design principles for information networks. Proceedings IEEE, 99(2), 330–350.
Article
Google Scholar