Show
84 citations
related to Privacy
Show
84 citations
related to Privacy as a subject or category
Description Term used during the period 2002-present
Book
Meg Leta Jones
(2024)
The Character of Consent: The History of Cookies and the Future of Technology Policy.
(/p/isis/citation/CBB023319337/)
Book
Aram Sinnreich; Jesse Gilbert
(2024)
The Secret Life of Data: Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance.
(/p/isis/citation/CBB152911408/)
Book
Ben Collier
(2024)
Tor: From the Dark Web to the Future of Privacy.
(/p/isis/citation/CBB896546489/)
Article
Valerie Moyer
(2023)
The Seeping Surveillance of Sex in Sports.
American Quarterly
(pp. 501-518).
(/p/isis/citation/CBB764212856/)
Article
Kjetil Rommetveit; Niels van Dijk
(2022)
Privacy engineering and the techno-regulatory imaginary.
Social Studies of Science
(pp. 853-877).
(/p/isis/citation/CBB677677741/)
Book
Ashley Sweetman
(2022)
Cyber and the City: Securing London’s Banks in the Computer Age.
(/p/isis/citation/CBB340774234/)
Book
Mary F. E. Ebeling
(2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance.
(/p/isis/citation/CBB663965321/)
Article
Sarah Myers West
(June 2022)
Cryptography as information control.
Social Studies of Science
(pp. 353-375).
(/p/isis/citation/CBB869396949/)
Book
Brian Hochman
(2022)
The Listeners: A History of Wiretapping in the United States.
(/p/isis/citation/CBB775086796/)
Article
Evan Selinger; Darrin Durant
(2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service.
Science as Culture
(pp. 92-106).
(/p/isis/citation/CBB181826170/)
Article
Ben Collier; James Stewart
(2022)
Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network.
Science, Technology, and Human Values
(pp. 910-936).
(/p/isis/citation/CBB749753638/)
Book
Josh Lauer; Kenneth Lipartito
(2021)
Surveillance Capitalism in America.
(/p/isis/citation/CBB401959068/)
Chapter
Meg Leta Jones
(2021)
Chapter 9. Surveillance Capitalism Online: Cookies, Notice and Choice, and Web Privacy.
In: Surveillance Capitalism in America.
(/p/isis/citation/CBB517617260/)
Book
Andrew J. Stewart
(2021)
A Vulnerable System: The History of Information Security in the Computer Age.
(/p/isis/citation/CBB758382142/)
Book
Duane C. Wilson
(2021)
Cybersecurity.
(/p/isis/citation/CBB201310866/)
Article
John R.H. Matchim
(2021)
Publishing and Paternalism in the Grenfell Mission: Wilfred Grenfell’s Accounts of a Boy Patient and Doctor-Patient Relations in Northern Newfoundland and Labrador, 1900–14.
Canadian Bulletin of Medical History/Bulletin Canadienne d'Histoire de la Medecine
(pp. 399-422).
(/p/isis/citation/CBB603855070/)
Article
Jennifer J. Connor
(2021)
Introduction—Case by Case: Private and Public Representations of Patients in the Grenfell Mission in Newfoundland and Labrador in the Early 20th Century.
Canadian Bulletin of Medical History/Bulletin Canadienne d'Histoire de la Medecine
(pp. 340-371).
(/p/isis/citation/CBB460031763/)
Article
Jennifer J. Connor
(2021)
Labrador Emergencies and St. Anthony Institutional Care: Medical Cases of Donald McI. Johnson for the Grenfell Association, 1928–29.
Canadian Bulletin of Medical History/Bulletin Canadienne d'Histoire de la Medecine
(pp. 372-398).
(/p/isis/citation/CBB738934711/)
Article
Karin Bijsterveld
(2021)
Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989.
Isis: International Review Devoted to the History of Science and Its Cultural Influences
(pp. 215-241).
(/p/isis/citation/CBB388750124/)
Book
Turow, Joseph
(2021)
The Voice Catchers: How Marketers Listen In to Exploit Your Feelings, Your Privacy, and Your Wallet.
(/p/isis/citation/CBB102529253/)
Be the first to comment!