Show
79 citations
related to Privacy
Show
79 citations
related to Privacy as a subject or category
Description Term used during the period 2002-present
Article
Dan Bouk
(2017)
The History and Political Economy of Personal Data over the Last Two Centuries in Three Acts.
Osiris: A Research Journal Devoted to the History of Science and Its Cultural Influences
(pp. 85-106).
(/p/isis/citation/CBB789951727/)
Book
Kevin Macnish
(2017)
The Ethics of Surveillance: An Introduction.
(/p/isis/citation/CBB701547234/)
Article
Astrid Mager
(April 2017)
Search engine imaginary: Visions and values in the co-production of search technology and Europe.
Social Studies of Science
(pp. 240-262).
(/p/isis/citation/CBB569340330/)
Article
Meg Lata Jones
(April 2017)
The right to a human in the loop: Political constructions of computer automation and personhood.
Social Studies of Science
(pp. 216-239).
(/p/isis/citation/CBB116228495/)
Article
Catherine Heeney
(January 2017)
An “Ethical Moment” in Data Sharing.
Science, Technology, and Human Values
(pp. 3-28).
(/p/isis/citation/CBB939267013/)
Book
John Cheney-Lippold
(2017)
We are data : Algorithms and the making of our digital selves.
(/p/isis/citation/CBB593815757/)
Book
Andreas-Holger Maehle
(2016)
Contesting Medical Confidentiality: Origins of the Debate in the United States, Britain, and Germany.
(/p/isis/citation/CBB329661888/)
Book
Susan C. Lawrence
(2016)
Privacy and the Past: Research, Law, Archives, Ethics.
(/p/isis/citation/CBB650168542/)
Article
Pedro Sanches
(2016)
Seeing mobility: how software engineers produce unequal representations.
Engineering Studies
(pp. 27-47).
(/p/isis/citation/CBB192738548/)
Book
Francesca Musiani; Derrick L. Cogburn; Laura DeNardis; et al.
(2016)
The Turn to Infrastructure in Internet Governance.
(/p/isis/citation/CBB771724730/)
Review
Russell, Andrew
(2016)
Review of unknown publication.
IEEE Annals of the History of Computing.
(/p/isis/citation/CBB100069195/)
Article
Tal Zarsky
(January 2016)
The Trouble with Algorithmic Decisions: An Analytic Road Map to Examine Efficiency and Fairness in Automated and Opaque Decision Making.
Science, Technology, and Human Values
(pp. 118-132).
(/p/isis/citation/CBB775587512/)
Book
Dawn Nafus
(2016)
Quantified: Biosensing technologies in everyday life.
(/p/isis/citation/CBB995244986/)
Article
Roesner, Franziska
(Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering.
The Bridge: Journal of the National Academy of Engineering.
(/p/isis/citation/CBB605988846/)
Article
Wouter M. P. Steijn; Anton Vedder
(July 2015)
Privacy under Construction: A Developmental Perspective on Privacy Perception.
Science, Technology, and Human Values
(pp. 615-637).
(/p/isis/citation/CBB590761705/)
Article
Tziporah Stern; David Salb
(2015)
Examining Online Social Network Use and Its Effect on the Use of Privacy Settings and Profile Disclosure.
Bulletin of Science, Technology & Society
(pp. 25-34).
(/p/isis/citation/CBB947931495/)
Thesis
Heidi Katherine Knoblauch
(2015)
Patients' Posture: Medical Photography, Collecting, and Privacy, 1862-1962.
(/p/isis/citation/CBB213874584/)
Article
Thomas Jepsen
(2014)
Reversing the whispering galley of Dionysius: A short history of electronic surveillance in the U.S..
Technology's Stories.
(/p/isis/citation/CBB443893857/)
Article
Gansky, Paul
(2014)
Privacy's Waste Products: Touch, Contagion and Public Telephone Design.
Journal of Design History
(p. 132).
(/p/isis/citation/CBB001201114/)
Article
Weiner, Amir; Rahi-Tamm, Aigi
(2013)
Getting to Know You: The Soviet Surveillance System, 1939--57.
Kritika: Explorations in Russian and Eurasian History
(p. 5).
(/p/isis/citation/CBB001200564/)
Be the first to comment!