School of Information and Library Science
University of North Carolina at Chapel Hill

INLS 584, Information Ethics
Fall 2011

Privacy

General Discussions of Privacy and Surveillance

Allmer, T. (2011). A critical contribution to theoretical foundations of privacy studies. Journal of Information, Communication & Ethics in Society, 9(2), 83-101. [Available from instructor.]

Ball, K. (2009). Exposure: Exploring the subject of surveillance. Information, Communication & Society, 12(5), 639-657. [UNC libraries]

Birch, D.G.W. (ed.) (2007). Digital Identity Management: Perspectives on the Technological, Business and Social Implications. Aldershot, England: Gower. [Davis Library - HD30.38 .D54 2007]

Braman, S. (2012). Privacy by design: Networked computing, 1969-1979. New Media & Society, 14(5), 798-814. [UNC libraries]

Buchanan, E.A., & Henderson, K.A. (2009). Privacy. In Case Studies in Library and Information Science Ethics. Jefferson, NC: McFarland, 46-52. [SILS - Z682.35 .P75 B83 2009]

Cady, G. H., & McGregor, P. (2002). Protect Your Digital Privacy: Survival Skills for the Information Age. Indianapolis: Que. [SILS - QA76.9 .A25 C335 2002]

Chmara, T. (2009). Privacy and Confidentiality Issues: A Guide for Libraries and Their Lawyers. Chicago: American Library Association. [SILS - KF4315 .C47 2009]

Clement, A. (2011). Toward identity rights beyond privacy. In Aspray, W., & Doty, P. (eds.), Privacy in America: Interdisciplinary Perspectives. Lanham: Scarecrow Press, 85-111. [Davis - KF1262 .A75 P754 2011]

De Saulles, M., & Horner, D.S. (2011). The portable panopticon: Morality and mobile technologies. Journal of Information, Communication, & Ethics in Society, 9(3), 206-216. [Available from instructor]

Diffie, W., & Landau, S. (2009). Communications surveillance: Privacy and security at risk. Communications of the ACM, 52(11), 42-47. [UNC libraries]

Dinev, T., Xu, H., Smith, J.H., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295-316. [UNC libraries]

DuvalGuillaume. (2012, Sep. 24). Amazing mind reader reveals his 'gift'. http://www.youtube.com/watch?v=F7pYHN9iC9I&feature=youtu.be.

Foucault, M. (2004). Panopticism. In Kaplan, D. M. (ed.), Readings in the Philosophy of Technology. Lanham: Rowman & Littlefield, 359-372. [SILS - T14 .R39 2004]

Garfinkel, S. (2000, Feb. 28). What they do know can hurt you. The Nation. Availabe at http://www.thenation.com/doc.mhtml?i=20000228&s=garfinkel.

Grossman, J. (2013). The Web won't be safe or secure until we break it. communications of the ACM, 56(1), 68-72. [UNC libraries]

Harper, J. (2011). Privacy-invasive technologies and their origins. In Aspray, W., & Doty, P. (eds.), Privacy in America: Interdisciplinary Perspectives. Lanham: Scarecrow Press, 113-135. [Davis - KF1262 .A75 P754 2011]

Hoback, C. (2013). Terms and Conditions May Apply [videorecording]. Roco Films Educational. [UNC Media Resources Center - 65-DVD16179, in-library use only]

Hough, M.G. (2009). Keeping it to ourselves: Technology, privacy, and the loss of reserve. Technology in Society, 31(4), 406-413. [UNC libraries]

Iachello, G., & Hong, J. (2007). End-user privacy in human-computer interaction. Foundations and Trends in Human-Computer Interaction, 1(1), 1-137. [UNC libraries]

Introna, L. D. (1997). Privacy and the computer: Why we need privacy in the information society. Metaphilosophy, 28(3), 259-275. [UNC libraries]

Johnson, D. G., & Miller, K. W. (2001). The ties that bind: Connections, Comet cursors, and consent. Computers & Society, 31(1), 12-16. [ACM Digital Library]

Kemp, R., & Moore, A.D. (2007). Privacy. Library Hi Tech, 25(1), 58-78. [UNC libraries]

Kietzmann, J., & Angell, I. (2010). Panopticon revisited. Communications of the ACM Virtual Extension, 53(6), 135-138. [UNC libraries]

Kobsa, A. (2007). Privacy-enhanced personalization. Communications of the ACM, 50(8), 24-33. [ACM Digital Library]

Marx, G. (2011). Turtles, firewalls, scarlet letters, and vacuum cleaners: Rules about personal information. In Aspray, W., & Doty, P. (eds.), Privacy in America: Interdisciplinary Perspectives. Lanham: Scarecrow Press, 271-293. [Davis - KF1262 .A75 P754 2011]

McArthur, R. L. (2001). Reasonable expectations of privacy. Ethics and Information Technology, 3(2), 123-128. [UNC libraries]

McCullagh, K. (2008). Blogging: Self presentation and privacy. Information & Communications Technology Law, 17(1), 3-23. [UNC libraries]

McMillen, D. (2004). Privacy, confidentiality, and data sharing: Issues and distinctions [discussion]. Government Information Quarterly, 21(3), 359-382. [UNC libraries]

Moore, A.D. (ed.) (2005). Information Ethics: Privacy, Property, and Power. Seattle: University of Washington Press, 113-122. [Davis - JC585 .I59 2005]

Narayanan, A., & Shmatikov, V. (2010). Myths and fallacies of "personally identifiable information". Communications of the ACM, 53(6), 24-26. [UNC libraries]

Nissenbaum, H. (2008). Privacy in context [audio]. http://www.ischool.berkeley.edu/newsandevents/events/dls20080402.

Paine, C., Reips, U.-D., Stieger, S., Joinson, A., & Buchanan, T. (2007). Internet users' perceptions of 'privacy concerns' and 'privacy actions'. International Journal of Human-Computer Studies, 65(6), 526-536. [UNC libraries]

Privacy. (2006). Stanford Encyclopedia of Philosophy. http://plato.stanford.edu/entries/privacy/.

Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323-333. [UNC libraries] Reprinted in Ermann, M. D., Williams, M. B., & Shauf, M. S. (Eds.). (1997). Computers, Ethics, and Society. 2nd ed. New York: Oxford University Press, 69-76. [Davis - QA76.9 .C66 C6575 1997]; Dejoie, R., Fowler, G., & Paradice, D. (Eds.). (1991). Ethical Issues in Information Systems. Boston: Boyd & Fraser, 110-117. [SILS - QA76.9 .M65 E83 1991]; Johnson, D. G., & Snapper, J. W. (1985). Ethical Issues in the Use of Computers. Belmont, CA: Wadsworth, 194-200. [Davis - QA76.9 .M65 E84 1985]

Rauhofer, J. (2008). Privacy is dead, get over it! Information privacy and the dream of a risk-free society. Information & Communications Technology Law, 17(3), 185-197. [UNC libraries]

Rose, J. (2000). Why privacy matters. The Wilson Quarterly, 24(4), 32-38. [UNC libraries]

Sheehan, K. B. (2002). Toward a typology of internet users and online privacy concerns. The Information Society, 18(1), 21-32. [UNC libraries]

Solove, D.J. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477-564. [Particularly important is the outline of the taxonomy, pages 479-491.) [UNC libraries]

Solove, D.J. (2007). "I've got nothing to hide" and other misunderstandings of privacy. San Diego Law Review, 44(4), 745-772. [UNC libraries, via HeinOnline]

Spiekermann, S. (2012). The challenges of privacy by design [Viewpoint]. Communications of the ACM, 55(7), 38-40. [UNC libraries]

Swidey, N. (2003, Feb. 2). A nation of voyeurs: How the internet search engine Google is changing what we can find out about one another -- and raising questions about whether we should. Boston Globe Magazine, 10-15. [Online via UNC libraries: Part 1, Part 2]

Tavani, H.T. (2008). Informational privacy: Concepts, theories, and controversies. In Himma, K.E., & Tavani, H.T. (eds.), The Handbook of Information and Computer Ethics. Wiley, 131-164. [UNC libraries]

Tavani, H.T. (2000). Privacy and security. In Langford, D. (ed.), Internet Ethics. New York: St. Martin's Press, 65-95. [SILS - TK5105.875 .I57 I547 2000]

Tavani, H. T., & Moor, J. H. (2001). Privacy protection, control of information, and privacy-enhancing technologies. Computers & Society, 31(1), 6-11. [ACM Digital Library]

van den Hoven, J. (2008). Information technology, privacy, and the protection of personal data. In van den Hoven, J., & Weckert, J. (eds.), Information Technology and Moral Philosophy. Cambridge: Cambridge University Press, 301-321. [Davis Library - T58.5 .I53745 2008]

Viseu, A., Clement, A., & Aspinall, J. (2004). Situating privacy online: Complex perceptions and everyday practices. Information, Communication & Society, 7(1), 92-114. [copy available from instructor]

Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5(4), 199-210. [UNC libraries]

Weitzner, D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., & Sussman, G.J. (2008). Information accountability. Communications of the ACM, 51(6), 82-88. [ACM Digital Library]

Yao, M.Z., Rice, R.E., & Wallis, K. (2007). Predicting user concerns about online privacy. Journal of the American Society for Information Science & Technology, 58(5), 710-722. [UNC libraries]

Legal and Policy Discussions

Antón, A.I., Bertino, E., Li, N., & Yu, T. (2007). A roadmap for comprehensive online privacy policy management. Communications of the ACM, 50(7), 109-116. [ACM Digital Library]

Bellman, S., Johnson, E., Kobrin, S., & Lohse, G. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313-324. [UNC libraries]

Chan, Y., Culnan, M., Greenaway, K., Laden, G., Levin, T., & Smith, H. J. (2005). Information privacy: Management, marketplace, and legal challenges. Communications of the AIS, 16, 270-298. [UNC libraries]

Davies, S. G. (1997). Re-engineering the right to privacy: How privacy has been transformed from a right to a commodity. In Agre, P. E., & Rotenberg, M. (Eds.), Technology and Privacy: The New Landscape. Cambridge, MA: MIT Press, 143-165. [Davis, UL - QA76.9 .A25 T43 1997]

Kumpu, V. (2012). Privacy and the emergence of the "ubiquitous computing society": The struggle over the meaning of "privacy" in the case of the Apple location tracking scandal. Technology in Society, 34(4), 303-310. [UNC libraries]

Martin, S., & Rabina, D. (2009). National security, individual privacy and public access to government-held information: The need for changing perspectives in a global environment. Information & Communications Technology Law, 18(1), 13-18. [UNC libraries]

McRobb, S., & Rogerson, S. (2004). Are they really listening?: An investigation into published online privacy policies at the beginning of the third millennium. Information Technology & People, 17(4), 442-461. [UNC libraries]

Norian, P. (2003). The struggle to keep personal data personal: Attempts to reform online privacy and how Congress should respond. Catholic University Law Review, 52(3), 803-836. [UNC libraries]

Raab, C.D. (2005). The future of privacy protection. In Mansell, R., & Collins, B.S. (eds.), Trust and Crime in Information Societies. Cheltenham, UK: Edward Elgar, 282-318. [Davis - HN400 .I56 T78 2005]

Smith, M. S. (2001). RS20035: Internet privacy--protecting personal information: overview and pending legislation. Congressional Research Service, redistributed as a service of the National Library for the Environment. http://www.ncseonline.org/nle/crsreports/science/st-43.cfm?&CFID=4521062&CFTOKEN=76839475.

Strickland, L. S. (2002). New information-related laws and the impact on civil liberties. Information and the war against terrorism, part III. Bulletin of the American Society for Information Science and Technology, 28(3), 23-27. [UNC libraries]

Use of Data Mining and Data Analytics as Surveillance Tools

Acquisti, A. (2013, June). Why privacy matters. TED Talk. http://www.ted.com/talks/alessandro_acquisti_why_privacy_matters.html.

Auerbach, D. (2013). You are what you click: On microtargeting. The Nation, 296(9), 27-28, 30, 32-34. http://www.thenation.com/article/172887/you-are-what-you-click-microtargeting.

Bowes, A., Dawson, A., & Bell, D. (2012). Ethical implications of lifestyle monitoring data in ageing research. Information, Communication & Society, 15(1), 5-22. [UNC libraries]

Brey, P. (2003). Ethical aspects of facial recognition systems in public places. In Spinello, R. A. (ed.), Readings in CyberEthics. 2nd ed. Sudbury, MA: Jones and Bartlett, 585-600. [SILS - TK5105.5 .R3722 2004]

Brunk, B. (2001). Exoinformation and information design. Bulletin of ASIST, 27(6), 11-13. [UNC libraries]

Dunham, G.S. (2002). Carnivore, the FBI's e-mail surveillance system: Devouring criminals, not privacy. Federal Communication Law Journal, 54, 544-566. [UNC Law Library current periodicals]

Freeman, M. (2005). Counterterrorism and privacy: The changing landscape of surveillance and civil liberties. In Freeman, L.A., & Peace, A.G. (eds.), Information Ethics: Privacy and Intellectual Property. Hershey, PA: Information Science Publishing, 163-179. [Law Library - T58.5 .I5248 2005]

Healy, Kieran. (2013, June 9). Using metadata to find Paul Revere. Blog posting. http://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/.

Landau, S. (2008). Internet eavesdropping: A brave new world of wiretapping. Scientific American, 299(3), 56-63. http://www.sciam.com/article.cfm?id=internet-eavesdropping.

Shilton, K. (2009). Four billion little brothers? Privacy, mobile phones, and ubiquitous data collection. Communications of the ACM, 52(11), 48-53. [UNC libraries]

van Wel, L., & Royakkers, L. (2004). Ethical issues in web data mining. Ethics and Information Technology, 6(2), 129-140. [UNC libraries]

Wicker, S.B. (2011). Cellular telephony and the question of privacy. Communications of the ACM, 54(7), 88-98. [UNC libraries]

Wicker, S.B. (2012). The loss of location privacy in the cellular age. Communications of the ACM, 55(8), 60-68. [UNC libraries]

Self-Disclosure in Social Networking Sites on the Web

Albrechtslund, A. (2012). Socializing the city: Location sharing and online social networking. In Fuchs, C., Boersma, K., Albrechtslund, A., & Sandoval, M. (eds.), Internet and Surveillance: The Challenges of Web 2.0 and Social Media. London: Routledge, 187-197. [SILS Library - HM851 .I5696 2012]

Barnes, S.B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9). http://www.firstmonday.org/issues/issue11_9/barnes/index.html.

Bateman, P.J., Pike, J.C., & Butler, B.S. (2011). To disclose or not: Publicness in social networking sites. Information Technology & People, 24(1), 78-100. [UNC libraries]

boyd, d. (2012). The politics of "real names". Communications of the ACM, 55(8), 29-31. [UNC libraries]

Debatin, B., Lovejoy, J.P., Horn, A.-K., & Hughes, B.N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83-108. [UNC libraries]

DeSouza, Z., & Dick, G.N. (2009). Disclosure of information by children in social networking -- Not just a case of "you show me yours and I'll show you mine". International Journal of Information Management, 29(4), 255-261. [UNC libraries

Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. Proceedings of the Americas Conference on Infrmation Systems (AMCIS), n.p. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.148.9388&rep=rep1&type=pdf.

Enriquez, J. (2013). Your online life, permanent as a tattoo. TED Talks. http://www.ted.com/talks/juan_enriquez_how_to_think_about_digital_tattoos.html.

Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153-160. [UNC libraries]

Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Proceedings of the 2005 ACM workshop on Privacy in the Electronic Society, 71-80. [UNC libraries]

Hinduja, S., & Patchin, J.W. (2008). Personal information of adolescents on the internet: A qualitative content analysis of MySpace. Journal of Adolescence, 31(1), 125-146. [UNC libraries]

Hugl, U. (2011). Reviewing person's value of privacy of online social networking. Internet Research, 21(4), 384-407. [UNC libraries]

Jang, C.-Y., & Stefanone, M.A. (2011). Non-directed self-disclosure in the blogosphere: Exploring the persistence of interpersonal communication norms. Information, Communication & Society, 14(7), 1039-1059. [UNC libraries]

Jiang, Z. (J.), Heng, C.S., & Choi, B.C.F. (2013). Privacy concerns and privacy-protective behavior in synchronous online social interactions. Information Systems Research, 24(3), 579-595. [UNC libraries]

Joinson, A.N., & Paine, C.B. (2007). Self-disclosure, privacy and the internet. In Joinson, A.N., McKenna, K.Y.A., Postmes, T., & Reips, U.-D. (eds.), The Oxford Handbook of Internet Pscyhology. Oxford University Press, 237-252. [Davis Library - HM1017 .O94 2007]

Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25, 109-125. [Available from instructor or via interlibrary loan]

Krishnamurthy, B., & Wills, C.E. (2009). On the leakage of personally identifiable information via online social networks. Proceedings of the 2nd ACM Workshop on ONline Social Networks, 7-12. [UNC Libraries]

Lenhart, A., & Madden, M. (2007, April 18). Teens, privacy, & online social networks: How teens manage their online identities and personal information in the age of MySpace. Washington, DC: Pew Internet & American Life Project. http://www.pewtrusts.org/uploadedFiles/wwwpewtrustsorg/Reports/Society_and_the_Internet/PIP_Teens_Privacy_SNS_Report_Final.pdf.

Rawassizadeh, R. (2012). Toward sharing life-log information with society. Behaviour & Information Technology, 31(11), 1057-1067. [UNC libraries]

Raynes-Goldie, K. (2010). Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday, 15(1). http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2775/2432.

Rosenblum, D. (2007). What anyone can know: The privacy risks of social networking sites. IEEE Security & Privacy, 5(3), 40-49. [UNC libraries]

Stutzman, F. (2006) An evaluation of identity-sharing behavior in social network communities. Proceedings of the 2006 iDMAa and IMS Code Conference, Oxford, Ohio. http://fredstutzman.com/pubs/stutzman_pub4.pdf.

Stutzman, F., Capra, R., & Thompson, J. (2011). Factors mediating disclosure in social network sites. Computers in Human Behavior, 27, 590-598. [UNC libraries]

Stutzman, F., & Kramer-Duffield, J. (2010). Friends only: Examining a privacy-enhancing behavior in Facebook. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, 1553-1562. [UNC libraries]

Stutzman, F. & Hartzog, W. (2012). Boundary regulation in social media. Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW '12), 769-778. [UNC libraries]

Taddiken, M. (2012). Privacy, surveillance, and self-disclosure in the social Web: Exploring the user's perspective via focus groups. In Fuchs, C., Boersma, K., Albrechtslund, A., & Sandoval, M. (eds.), Internet and Surveillance: The Challenges of Web 2.0 and Social Media. London: Routledge, 255-272. [SILS Library - HM851 .I5696 2012]

Trottier, D., & Lyon, D. (2012). Key features of social media surveillance. In Fuchs, C., Boersma, K., Albrechtslund, A., & Sandoval, M. (eds.), Internet and Surveillance: The Challenges of Web 2.0 and Social Media. London: Routledge, 89-105. [SILS Library - HM851 .I5696 2012]

Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20-36. [UNC libraries]

Weiss, S. (2009). Privacy threat model for data portability in social network applications. International Journal of Information Management, 29(4), 249-254. [UNC libraries]

Yar, M. (2012). E-crime 2.0: The criminological landscape of new social media. Information & Communications Technology Law, 21(3), 207-219. [UNC libraries]

Young, A.L., & Quan-Haase, A. (2013). Privacy protection strategies on Facebook: The internet privacy paradox revisited. Information, Communication & Society,16(4), 479-500. [UNC libraries]

Zimmer, M. (2010). "But the data is already public": On the ethics of research in Facebook. Ethics & Information Technology, 12(4), 313-325. [UNC libraries]

Anonymity as an Ethical Issue

Bodle, R. (2013). The ethics of online anonymity or Zuckerberg vs. "Moot". ACM SIGCAS Computers and Society - Selected Papers from The Ninth International Conference on Computer Ethics: Philosophical Enquiry, 43(1), 22-35. [UNC libraries]

Chen, H.-G., Chen, C.C., Lo, L., & Yang, S.C. (2008). Online privacy control via anonymity and pseudonym: Cross-cultural implications. Behaviour & Information Technology, 27(3), 229-242. [UNC libraries]

Chesney, T., & Su, D.K.S. (2010). The impact of anonymity on weblog credibility. International Journal of Human-Computer Studies, 68(10), 710-718. [UNC libraries]

Macgillivray, A. (2012). The business of free speech. Index on Censorship, 41(4), 92-93. [UNC libraries]

Nissenbaum, H. (1999). The meaning of anonymity in an information age. The Information Society, 15, 141-144. [UNC libraries]

Solove, D.J. (2007). Free speech, anonymity, and accountability. In The Future of Reputation: Gossip, Rumor, and Privacy on the Internet. New Haven, CT: Yale University Press. [SILS, Davis - K3264.C65 S65 2007; also available from UNC libraries as an e-book]

Wallace, K.A. (2008). Online anonymity. In Himma, K.E., & Tavani, H.T. (eds.), The Handbook of Information and Computer Ethics. Wiley, 165-189. [UNC libraries]

Zajácz, R. (2013). WikiLeaks and the problem of anonymity: A network control perspective. Media, Culture & Society, 35(4), 489-505. [UNC libraries]

Government Surveillance

King, E. (2012). Trade secrets. Index on Censorship, 41(4), 81-86. [UNC libraries]

Lim, S.S., Cho, H., & Sanchez, M.R. (2009). Online privacy, government surveillance, and national ID cards. Communications of the ACM Virtual Extension, 52(12), 116-120. [UNC libraries]

Lips, A.M.B. (2013). Reconstructing, attributing and fixating citizen identities in digital-era government. Media, Culture & Society, 35(1), 61-70. [UNC libraries]

MacKinnon, R. (2012). Manifesto: Rights online. Index on Censorship, 41, 114-115. [UNC libraries]

McCarthy, L., & Yates, D. (2010). The use of cookies in Federal agency web sites: Privacy and recordkeeping issues. Government Information Quarterly, 27(3), 231-237. [UNC libraries]

Morozov, E. (2011). Taming cyberspace. Index on Censorship, 40(1), 50-55. [UNC libraries]

Petley, J. (2013). Panic stations: Surveillance in the UK. Index on Censorship, 42(1), 70-74. [UNC libraries]

Pikowsky, R.A. (2002). An overview of the law of electronic surveillance post September 11, 2001. Law Library Journal, 94, 601-620. [UNC libraries, http://www.aallnet.org/main-menu/Publications/llj/LLJ-Archives/Vol-94/pub_llj_v94n04/2002-37.pdf]

Roberts, H., & Palfrey, J. (2010). The EU data retention directive in an era of internet surveillance. In Diebert, R., et al. (eds.), Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace. Cambridge, MA: MIT Press, 35-53. [Davis - HM851 .A254 2010]

Simmons, J.L. (2009). Buying you: The government's use of fourth-parties to launder data about "the people". Columbia Business Law Review, 2009(3), 950-1013. [UNC libraries, via HeinOnline]

Spitze, M. (2012, June). Your phone company is watching. TED talk. http://www.ted.com/talks/malte_spitz_your_phone_company_is_watching.html.

Wu, Y., Lau, T., Atkin, D.J., & Lin, C.A. (2011). A comparative study of online privacy regulations in the U.S. and China. Telecommunications Policy, 35(7), 603-616. [UNC libraries]

Surveillance during E-Commerce

Andrejevic, M. (2012). Exploitation in the data mine. In Fuchs, C., Boersma, K., Albrechtslund, A., & Sandoval, M. (eds.), Internet and Surveillance: The Challenges of Web 2.0 and Social Media. London: Routledge, 71-88. [Davis, SILS - HM851 .I5696 2012]

Berendt, B., Günther, O., & Spiekermann, S. (2005). Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM, 48(4), 101-106. [ACM Digital Library]

Bernal, P. (2011). Web spies. Index on Censorship, 40(2), 108-114. [UNC libraries]

Cecere, G., & Rochelandet, F. (2013). Privacy intrusiveness and web audiences: Empirical evidence. Telecommunications Policy, 37(10), 1004-1014. [UNC libraries]

Fuchs, C. (2012). Critique of the political economy of Web 2.0 surveillance. In Fuchs, C., Boersma, K., Albrechtslund, A., & Sandoval, M. (eds.), Internet and Surveillance: The Challenges of Web 2.0 and Social Media. New York: Routledge, 31-70. [Davis, SILS - HM851 .I5696 2012]

Goldfarb, A., & Tucker, C.E. (2011). Online advertising, behavioral targeting, and privacy. Communications of the ACM, 54(5), 25-27. [UNC libraries]

Hjorth, L. (2013). Relocating the mobile: A case study of locative media in Seoul, South Korea. Convergence: The International Journal of Research into New Media Technologies, 19(2), 237-249. [UNC libraries]

Hoofnagle, C.J. (2009). Beyond Google and evil: How policy makers, journalists and consumers should talk differently about Google and privacy. First Monday, 14(4). http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2326/2156.

Hui, K.-L., Teo, H.H., & Lee, S.-Y.T. (2007). The value of privacy assurance: An exploratory field experiment. MIS Quarterly, 31(1), 19-33. [UNC libraries]

Kerr, I.R. (2003). Internet user dependence and the duty of loyalty. In Rockenbach, B., & Mendina, T. (eds.), Ethics and Electronic Information: A Festschrift for Stephen Almagno. Jefferson, NC: McFarland, 166-176. [SILS - Z665 .E83 2003]

Krishnamurthy, B., & Wills, C.E. (2009). Privacy diffusion on the web: A longitudinal perspective. Proceedings of the 18th International Conference on the World Wide Web, 541-550. [UNC libraries]

Lee, B.S., & Synn, W. (2003). Clashes between businesses and consumers over unsolicited commercial e-mails. In Rockenbach, B., & Mendina, T. (eds.), Ethics and Electronic Information: A Festschrift for Stephen Almagno. Jefferson, NC: McFarland, 177-195. [SILS - Z665 .E83 2003]

Mohamed, N. (2012). The Do Not Track Me Online laws: Creating a ceiling when the sky's the limit and we are halfway to heaven. Information & Communications Technology Law, 21(2), 147-154. [UNC libraries]

Norberg, P.A., Horne, D.R., & Horne, D.A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100-126. [UNC libraries]

Park, Y.J. (2013). Digital literacy and privacy behavior online. Communication Research, 40(2), 215-236. [UNC libraries]

Peslak, A. R. (2005). Internet privacy policies: A review and survey of the Fortune 50. Information Resources Management Journal, 18(1), 29-41. [UNC libraries]

Pollach, I. (2007). What's wrong with online privacy policies? Communications of the ACM, 50(9), 103-108. [ACM Digital Library]

Sandoval, M. (2012). A critical empirical case study of consumer survillance on Web 2.0. In Fuchs, C., Boersma, K., Albrechtslund, A., & Sandoval, M. (eds.), Internet and Surveillance: The Challenges of Web 2.0 and Social Media. London: Routledge, 147-169. [Davis, SILS - HM851 .I5696 2012]

Schwaig, K.S., Kane, G.C., & Storey, V.C. (2006). Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures? Information & Management, 43(7), 805-820. [UNC libraries]

Son, J.-Y., & Kim, S.S. (2008). Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503-529. [UNC libraries]

Wilson, C. (2005). Internet privacy for sale: A viable option when legislation, litigation, and business self-regulation are ineffective in curbing the abuses of online consumers' privacy. Journal of Information Ethics, 14(1), 29-43. [UNC libraries]

Zimmer, J.C., Arsal, R.E., Al-Marzouq, M., & Grover, V. (2010). Investigating online information disclosure: Effects of information relevance, trust and risk. Information & Management, 47(2), 115-123. [UNC libraries]

Privacy of Library and IR System Records

Bowers, S.L. (2006). Privacy and library records. Journal of Academic Librarianship, 32(4), 377-383. [UNC libraries]

Burkell, J., & Carey, R. (2011). Personal information and the public library: Compliance with fair information practice principles. Canadian Journal of Information and Library Science, 35(1), 1-16. [UNC libraries]

Doty, P. (2011). Privacy, reading, and trying out identity: The Digital Millennium Copyright Act and technological determinism. In Aspray, W., & Doty, P. (eds.), Privacy in America: Interdisciplinary Perspectives. Lanham: Scarecrow Press, 211-245. [Davis - KF1262 .A75 P754 2011]

Johns, S., & Lawson, K. (2005). University undergraduate students and library-related privacy issues. Library & Information Science Research, 27(4), 485-495. [UNC libraries]

Jones, B.M. (2009). Privacy and confidentiality. In Protecting Intellectual Freedom in Your Academic Library: Scenarios from the Front Lines. Chicago: American Library Association, 151-192. [SILS reserves - Z675 .U5 J72 2009]

Kazmer, M.M., Burnett, G., & Dickey, M.H. (2007). Identity in customer service chat interaction: Implications for virtual reference. Library & Information Science Research, 29(1), 5-29. [UNC libraries]

Lamdan, S.S. (2013). Why library cards offer more privacy rights than proof of citizenship: Librarian ethics and Freedom of Information Act requestor policies. Government Information Quarterly, 30(2), 131-140. [UNC libraries]

Magi, T.J. (2007). The gap between theory and practice: A study of the prevalence and strength of patron confidentiality policies in public and academic libraries. Library & Information Science Research, 29(4), 455-470. [UNC libraries]

Neuhaus, P. (2003). Privacy and confidentiality in digital reference. Reference & User Services Quarterly, 43(1), 26-36. [UNC libraries]

Nicholson, S., & Smith, C.A. (2007). Using lessons from health care to protect the privacy of library users: Guidelines for the de-identification of library data based on HIPAA. Journal of the American Society for Information Science & Technology, 58(8), 1198-1206. [UNC libraries]

Poritz, J.A. (2007). Who searches the searchers? Community privacy in the age of monolithic search engines. The Information Society, 23(5), 383-389. [UNC libraries]

Sturges, P., & Iliffe, U. (2003). Preserving a secret garden for the mind: The ethics of user privacy in the digital library. In Rockenbach, B., & Mendina, T. (eds.), Ethics and Electronic Information: A Festschrift for Stephen Almagno. Jefferson, NC: McFarland, 74-81. [SILS - Z665 .E83 2003]

Tan, X.S.B., & Zhai, C. (2007). Privacy protection in personalized search. SIGIR Forum, 41(1), 4-17. [ACM Digital Library]

Privacy of Health/Medical Records

Clarke, S. (2003). Paternalism and access to medical records. Journal of Information Ethics, 12(1), 80-91. [UNC libraries]

Deshmukh, P., & Croasdell, D. (2005). Privacy and security in health care networks. In Freeman, L.A., & Peace, A.G. (eds.), Information Ethics: Privacy and Intellectual Property. Hershey, PA: Information Science Publishing, 53-67. [Law Library - T58.5 .I5248 2005]

Lwin, M. (2010). Privacy issues with DNA databases and retention of individuals' DNA information by law enforcement agencies: The holding of the European Court of Human Rights case S and Marper v. United Kingdom shoudl be adapted to American Fourth Amendment jurisprudence. Information & Communications Technology Law, 19(2), 189-222. [UNC libraries]

Rindfleisch, T. C. (1997). Privacy, information technology, and health care. Communications of the ACM, 40(8), 92-100. [ACM Digital Library]

Tavani, H. T. (2004). Genomic research and data-mining technology: Implications for personal privacy and informed consent. Ethics and Information Technology, 6(1), 15-28. [UNC libraries]

Yakel, E. (2001). The social construction of accountability: Radiologists and their record-keeping practices. The Information Society, 17(4), 233-245. [UNC libraries]

Radio Frequency Identification (RFID)

Angell, I., & Kietzmann, J. (2006). RFID and the end of cash? Communications of the ACM, 49(12), 90-96. [ACM Digital Library]

Cochran, P.I., Tatikonda, M.V., & Magid, J.M. (2007). Radio frequency identification and the ethics of privacy. Organizational Dynamics, 36(2), 217-229. [UNC libraries]

McGinity, M. (2004). RFID: Is this game of tag fair play? [Staying Connected]. Communications of the ACM, 47(1), 15-18. [ACM Digital Library]

Ramos, A., Scott, W., Scott, W., Lloyd, D, O'Leary, K., & Waldo, J. (2009). A threat analysis of RFID passports. Communications of the ACM, 52(12), 38-42. [UNC libraries]

Additional References

Adams, A., & Sasse, M. A. (2001). Privacy in multimedia communications: protecting users, not just data. In Blandford, A., Vanderdonckt, J., & Gray, P. (eds.), People and Computers XV - Interaction without Frontiers: Joint Proceedings of HCI 2001 and IHM 2001. London: Springer, 49-64. [SILS - QA76.9 .H85 P46 2001]

Angel, C. (2000). The right to privacy. Journal of Information Ethics, 9(2), 11-25. [SILS]

Bellovin, S. M. (2004). Spamming, phishing, authentication, and privacy [Inside risks]. Communications of the ACM, 47(12), 144. [ACM Digital Library]

Bennett, C. J. (2001). Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the World Wide Web. Ethics and Information Technology, 3(3), 195-208. [UNC libraries]

Berghel, H. (2000). Identity theft, social security numbers, and the Web [Digital village]. Communications of the ACM, 43(2), 17-21. [ACM Digital Library]

Boncella, R. J. (2001). Internet privacy - at home and at work. Communications of the AIS, 7(14). [Online journal]

Boyle, M., & Greenberg, S. (2005). The language of privacy: Learning from video media space analysis and design. ACM Transactions on Computer-Human Interaction, 12(2), 328-370. (Section 3, Perspectives on privacy, p339-347.) [ACM Digital Library]

Buchanan, T., Paine, C., Joinson, A.N., & Reips, U.-D. (2007). Development of measures of online privacy concern and protection for use on the internet. Journal of the American Society for Information Science & Technology, 58(2), 157-165. [UNC libraries]

Cady, G. H., & McGregor, P. (2002). Protect Your Digital Privacy: Survival Skills for the Information Age. Indianapolis: Que. [SILS - QA76.9 .A25 C335 2002]

Caftori, N. (2004). The control of privacy after nine-eleven. In Mendina, T., & Britz, J. J. (eds.), Information Ethics in the Electronic Age: Current Issues in Africa and the World. Jefferson, NC: McFarland, 131-138. [SILS - Z665 .I5795 2004]

Clement, A., Stalder, F., Johnson, J., & Guerra, R. (2001, Nov. 27). National identification schemes (NIDS) and the fight against terrorism: frequently asked questions. Washington, DC: Computer Professionals for Social Responsibility. http://www.cpsr.org/program/natlID/natlIDfaq.html.

Cohen, J. E. (2003). DRM and privacy. Communications of the ACM, 46(4), 46-49. [ACM Digital Library]

Di Pietro, R., & Mancini, L. V. (2003). Security and privacy issues of handheld and wearable wireless devices. Communications of the ACM, 43(9), 74-79. [ACM Digital Library]

Fleischer, P. (2011). Private lives. Index on Censorship, 40(2), 78-89. [UNC libraries]

Floridi, L. (2006). Informational privacy and its ontological interpretation. ACM SIGCAS Computers & Society, 36(3), 37-40. [ACM Digital Library]

Geissler, R.C. (2012). Private eyes watching you: Google Street View and the right to an inviolate personality. Hastings Law Journal, 63, 897-925. [UNC libraries via HeinOnline]

Gelbord, B., & Roelofsen, G. (2002). Viewpoint: New surveillance techniques raise privacy concerns. Communications of the ACM, 45(11), 23-24. [ACM Digital Library]

Greengard, S. (2012). Advertising gets personal. Communications of the ACM, 55(8), 18-20. [UNC libraries]

Hale, B. (2005). Identity crisis: Face recognition technology and freedom of the will. Ethics, Place & Environment, 8(2), 141-158. [UNC libraries]

Johns, S., & Lawson, K. (2005). University undergraduate students and library-related privacy issues. Library & Information Science Research, 27(4), 485-495. [UNC libraries]

Jonsson, K. (2006). The embedded panopticon: Visibility issues of remote diagnostic surveillance. Scandinavian Journal of Information Systems, 18(2), 7-28. [Online]

Klang, M. (2004). Spyware: The ethics of covert software. Ethics and Information Technology, 6(3), 193-202. [UNC libraries]

Li, J. H.-S. (2000). The death of privacy: the lively debate in the Washington Post (1974-1988). Journal of Information Ethics, 9(1), 63-88. [SILS]

Lyon, D. (2001). Facing the future: seeking ethics for everyday surveillance. Ethics and Information Technology, 3(3), 171-180. [UNC libraries]

Meeks, B. N. (2001). Electronic frontier: blanking on rebellion: where the future is "nabster." Communications of the ACM, 44(11), 17-20. [ACM Digital Library]

Miyazaki, A. D., & Fernandez, A. (2000). Internet privacy and security: An examination of online retailer disclosures. Journal of Public Policy & Marketing, 19(1), 54-61. [UNC libraries]

Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs, 35(1), 27-44. [UNC libraries]

Munro, N. (2002). From Washington: The ever-expanding network of local and federal databases. Communications of the ACM, 45(7), 17-19. [ACM Digital Library]

Norberg, P. A., & Dholakia, R. R. (2004). Customization, information provision and choice: What are we willing to give up for personal service? Telematics and Informatics, 21, 143-155. [Copy available from instructor]

O'Hara, K., & Shadbolt, N. (2010). Privacy on the data Web. Communications of the ACM, 53(3), 39-41. [UNC libraries]

Orito, Y. (2011). The counter-control revolution: "Silent control" of individuals through dataveillance systems. Journal of Information, Communication & Ethics in Society, 9(1), 5-19. [UNC libraries]

Pottie, G. J. (2004). Privacy in the global e-village [viewpoint]. Communications of the ACM, 47(2), 21-24. [ACM Digital Library]

Rensel, A. D., Abbas, J. M., & Rao, H. R. (2006). Private transactions in public places: An exploration of the impact of the computer environment on public transactional Web site use. Journal of the Association for Information Systems, 7(1), 19-51. [Online via UNC libraries]

Ryan, M.D. (2011). Cloud computing privacy concerns on our doorstep. Communications of the ACM, 54(1), 36-38. [UNC libraries]

Schoeman, F. (1984). Philosophical Dimensions of Privacy: An Anthology. Cambridge: Cambridge University Press. [Davis - JC596 .P47 1984]

Schwartz, E. I. (2003). Spam wars. Technology Review, 106(6), 32-39. [UNC libraries]

Seaman, S. (2004). Confidentiality of library records: Law, ethics, and practice. In Mendina, T., & Britz, J. J. (eds.), Information Ethics in the Electronic Age: Current Issues in Africa and the World. Jefferson, NC: McFarland, 123-128. [SILS - Z665 .I5795 2004]

Shannon, M. M. (2006). Private lives [Staying connected]. Communications of the ACM, 49(5), 23-26. [ACM Digital Library]

Shapira, B., Elovici, Y., Meshiach, A., & Kuflik, T. (2005). PRAW -- A PRivAcy model for the Web. Journal of the American Society for Information Science & Technology, 56(2), 159-172. [UNC libraries]

Sheehan, K. B. (2004). How public opinion polls define and circumscribe online privacy. First Monday, 9(7). http://www.firstmonday.org/issues/issue9_7/sheehan/index.html.

Squicciarini, A.C., Xu, H., & Zhang, X.L. (2011). CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science & Technology, 62(3), 521-534. [UNC libraries]

Stafford, T. F. & Urbaczewski, A. (2004). Spyware: The ghost in the machine. Communications of the AIS, 14(15), 291-306. [Online journal]

Strickland, L. S. (2005). Domestic security surveillance and civil liberties. Annual Review of Information Science & Technology, 39, 433-513. [SILS - Reference Z699.A1 A65]

Van Slyke, C., Shim, J.T. Johnson, R., & Jiang, J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415-444.

Volokh, E. (2000). Personalization and privacy. Communications of the ACM, 43(8), 84-88. [ACM Digital Library]

Warren, S. D., & Brandeis, L. D. (1890, December 15). The right to privacy. Harvard Law Review, 4(5), 193-220. [UNC libraries] Reprinted in Johnson, D. G., & Snapper, J. W. (Eds.). (1985). Ethical Issues in the Use of Computers. Belmont, CA: Wadsworth, 172-183. [Davis - QA76.9 .M65 E84 1985; personal copy])

Weber, K. (2006). The next step: Privacy invasions by biometrics and ICT implants. Ubiquity, 7(45), 1-18. [ACM Digital Library]

Weiss, M. J. (2004). Beware! Uncle Sam has your DNA: Legal fallout from its use and misuse in the U.S. Ethics and Information Technology, 6(1), 55-63. [UNC libraries]

Scenarios of Ethical Decisions

ALA Intellectual Freedom Committee advises librarians on FBI "Library Awareness" Program. (1987). Newsletter on Intellectual Freedom, 36, 241-243. [SILS]

Benedict, K. (2003). Case twenty-four: Equal access and equal treatment of users. In Benedict, K., Ethics and the Archival Profession: Introduction and Case Studies. Chicago: Society of American Archivists, 56-57. [SILS - CD971 .B46 2003]

Buchanan, E.A., & Henderson, K.A. (2009). Cases #3.1-3.25. In Case Studies in Library and Information Science Ethics. Jefferson, NC: McFarland, 52-69. [SILS - Z682.35 .P75 B83 2009]

Case, D. O. (1998). The ethics of caller identification services. Journal of Information Ethics, 7(1), 24-35. [SILS]

DeCew, J. W. (1997). Drug testing: a case study in balancing privacy and public safety. In In Pursuit of Privacy. Ithaca: Cornell University Press, 125-144. [Davis, Law - KF1262 .D43 1997]

Ericson, T. (2003). Case twenty-nine: Privacy. In Benedict, K., Ethics and the Archival Profession: Introduction and Case Studies. Chicago: Society of American Archivists, 62-63. [SILS - CD971 .B46 2003]

In the news: FBI asks librarians to eye foreigners; IFC (ALA's Intellectual Freedom Committee) responds. (1987). American Libraries, 18(10), 812+. [UNC libraries]

FBI Library Awareness Program. (1989, February). SpeciaList, 12(2), 4-5,7. [SILS]

Harnsberger, R. S. (1989, Winter). FBI counterintelligence visits to libraries: summary of events to date. Texas Library Journal, 65, 129-131. [SILS Library Newsletter File]

Information and library organizations speak out against FBI Library Awareness Program. (1988, August/September). Bulletin of the American Society for Information Science, 14, 4. [SILS]

Kallmann, E. A. & Grillo, J. P. (1993). Something for everyone [micromarketing]. In Ethical Decision Making and Information Technology: An Introduction with Cases. 2nd ed. New York: McGraw-Hill, 63-68.[SILS - T58.5 .K34 1993]

Kallmann, E. A. & Grillo, J. P. (1993). Messages from all over: who controls the content of e-mail and BBS? In Ethical Decision Making and Information Technology: An Introduction with Cases. 2nd ed. New York: McGraw-Hill, 71-72. [SILS - T58.5 .K34 1993]

Kallmann, E. A. & Grillo, J. P. (1993). Test data: confidential or dummy data? In Ethical Decision Making and Information Technology: An Introduction with Cases. 2nd ed. New York: McGraw-Hill, 93-94. [SILS - T58.5 .K34 1993]

Levy, S. (1997). Lotus Marketplace: how the good guys finally won. In Ermann, M. D., Williams, M. B., & Shauf, M. S. (Eds.), Computers, Ethics, and Society. 2nd ed. New York: Oxford University Press, 279-284. [Davis - QA76.9 .C66 C6575 1997]

Laudon, K. (1995). Information systems in a democracy [the FBI's national computerized criminal history system]. In Johnson, D. G. & Nissenbaum, H. (Eds.), Computers, Ethics, and Social Values. Englewood Cliffs, NJ: Prentice-Hall, 278-293. [Davis - QA76.9 .A25 C6665 1995]

Levy, S. (1995). Battle of the clipper chip. In Johnson, D. G. & Nissenbaum, H. (Eds.), Computers, Ethics, and Social Values. Englewood Cliffs, NJ: Prentice-Hall, 651-664. [Davis - QA76.9 .A25 C6665 1995]

Oz, E. (1994). Monitoring e-mail. In Ethics for the Information Age: Cases. Dubuque, IA: Business & Educational Technologies, 7-8. [SILS - T58.5 .O9 1994 c.2]

Oz, E. (1994). Invasion of privacy. In Ethics for the Information Age: Cases. Dubuque, IA: Business & Educational Technologies, 33-35. [SILS - T58.5 .O9 1994 c.2]

Preer, J. (2008). Robert Bork and video privacy (1987). In Library Ethics. Westport, CT: Libraries Unlimited, 198-200. [SILS - Z682.35 .P75 P74 2008]

Preer, J. (2008). John Does challenge the USA PATRIOT Act (2005). In Library Ethics. Westport, CT: Libraries Unlimited, 203-205. [SILS - Z682.35 .P75 P74 2008]

Scenario 1: Operator learns of possible death threat. (1994). In Denning, D. S., & Lin, H. S. Rights and Responsibilities of Participants in Networked Communities. Washington, DC: National Academy Press, 99-105. [Davis - TK5105.5 .R54 1994; online at http://books.nap.edu/books/0309050901/html/index.html]

Scenario 2: Provider sells user profiles to merchandisers. (1994). In Denning, D. S., & Lin, H. S. Rights and Responsibilities of Participants in Networked Communities. Washington, DC: National Academy Press, 105-111. [Davis - TK5105.5 .R54 1994; online at http://books.nap.edu/books/0309050901/html/index.html]

Schmidt, C. J. (1989). The FBI Library Awareness Program. In The ALA Yearbook of Library and Information Services, 14, 125. [SILS Reference - Z673.A5 A3]

Shields, G. R. (1991). The FBI creates an awareness of librarian ethics: an opinionated historical review. In Lancaster, W. F. (ed.), Ethics and the Librarian. University of Ill. at Urbana-Champaign, Graduate School of Lib. and Information Science, 19-30. [SILS - Z682.35.P75 E74 1991]

Spinello, R. A. (2000). AOL and on-line privacy. In Cyberethics: Morality and Law in Cyberspace. Sudbury, MA: Jones and Bartlett, 125-126. [SILS, Davis - TK5105.875 .I57 S68 2000]

Spinello, R. A. (1997). Case 3.3, E-mail policy at Johnson & Dresser. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 61-64. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 4.1, Micromarketing and customer information systems. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 75-79. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 4.2, The Lotus "Marketplace: Households" product controversy. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 79-84. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 4.3, Southern Midland Bank: a case for the Data Policy Committee. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 84-88. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 4.4, United Industries International, Inc. [employer access to personal employee information]. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 88-92. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 5.4, Physician's Computer Network and the mining of patient records. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 115-118. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 5.5, Government computer matching. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 118-122. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 9.4, Crypto wars [clipper chip]. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 254-259. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (2000). Using cookies at greatcareers.com (hypothetical). In Cyberethics: Morality and Law in Cyberspace. Sudbury, MA: Jones and Bartlett, 125. [SILS, Davis - TK5105.875 .I57 S68 2000]

Tavani, H.T. (2004). Case illustration I: Verizon and the recording industry. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 1-2. [SILS - TK5105.5 .T385 2004]

Tavani, H.T. (2004). Case illustration: The VeriChip personal identificatin system. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 138. [SILS - TK5105.5 .T385 2004]

Tavani, H.T. (2004). Case illustration: Merging information retrieved from DoubleClick's and Abacus' databases. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 141. [SILS - TK5105.5 .T385 2004]

Tavani, H.T. (2004). Case illustration: Biometric technology and data matching at Super Bowl XXXV. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 143-144. [SILS - TK5105.5 .T385 2004]

Tavani, H.T. (2004). Case illustration: Google search requests and the Bush administration. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 151. [SILS - TK5105.5 .T385 2004]

Tavani, H.T. (2004). Case illustration: Toysmart.com. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 160. [SILS - TK5105.5 .T385 2004]

Web Sites of Interest

Consumer privacy. (2005). Center for Democracy and Technology. http://www.cdt.org/privacy/.

CPT's Privacy Page. (n.d.) Consumer Project on Technology. http://www.cptech.org/privacy/.

Privacy & technology. (2005). American Civil Liberties Union. http://www.aclu.org/Privacy/PrivacyMain.cfm.

Privacy. (1999, May 12). Electronic Privacy Information Center. http://www.epic.org/privacy/.

Privacy International. (1999, June 29). http://www.privacyinternational.org/.

Privacy.org: the site for news, information and action. (2002, January 2). Electronic Privacy Information Center and Privacy International. http://www.privacy.org/.

Privacy Rights Clearinghouse. (1999, June 21). http://www.privacyrights.org/.


Return to INLS 584 Syllabus or INLS 584 Schedule


Creative Commons LicenseThe INLS 584 website, UNC-CH, Fall 2013, is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License. Address all comments and questions to Barbara M. Wildemuth at wildemuth@unc.edu.
This page was last modified on October 22,2013, by Barbara M. Wildemuth.