Difference between revisions of "References"

From privacy
Jump to navigation Jump to search
 
(19 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Books ==
+
== Scientific books ==
  
 
(In reverse chronological order)
 
(In reverse chronological order)
  
J. Jarvis "Public Parts. How sharing in the digital age improves the way we work and live", Simon & Schuster, 2011.
 
: Jarvis argues the benefits of sharing personal information: a valuable resource that portrays the other side of the coin.
 
  
 
D. Solove "Understanding Privacy", Harvard University Press, 2010.
 
D. Solove "Understanding Privacy", Harvard University Press, 2010.
 
Bart de Koning "Alles onder controle", Uitgeverij Balans, 2008.
 
  
 
P. E. Agre and M. Rotenberg (eds.) "Technology and privacy: The new landscape", MIT Press, Cambridge, MA, 2001.
 
P. E. Agre and M. Rotenberg (eds.) "Technology and privacy: The new landscape", MIT Press, Cambridge, MA, 2001.
Line 14: Line 10:
 
A. Westin "Privacy and Freedom", Atheneum, New York, 1976.
 
A. Westin "Privacy and Freedom", Atheneum, New York, 1976.
  
I. Trojanov and J. Zeh "Aanslag op de vrijheid", De Geus, Breda, 2010. (Original German title "Angriff auf die Freiheit: Sicherheitswahn, Ueberwachungsstaat und der Abbau buergerliche Rechte").
+
== Fiction ==
  
Arnoud Engelfriet
+
Franz Kafka "The Trial", German version published by Verlag Die Schmiede, Berlin, 1925.
[http://www.iusmentis.com/boek/arnoud-engelfriet-de-wet-op-internet-editie-2010-ebook.pdf De wet op internet] 2010
 
  
== Overviews ==
+
F.M. Foster "The Machine Stops", in 'The Eternal Moment and Other Stories', Sidgwick & Jackson, London, 1928.
  
Jaap-Henk Hoepman, Marc v. Lieshout "Privacy: an overview", draft, February 2011.
+
Aldous Huxley "Brave New world", Chatto & Windus, 1932.
  
EDRi [http://www.edri.org/files/paper06_datap.pdf An introduction to Data Protection (01.2013)]
+
George Orwell "1984", Secker & Warburg, 1949.
  
== Legal/ Philosophical Papers ==
+
Dave Eggers "The Circle", Knopf, 2013.
  
 +
== Non fiction ==
  
[http://www.harvardlawreview.org/symposium/papers2012/cohen.pdf Julie Cohen, WHAT PRIVACY IS FOR]
+
Arnoud Engelfriet
 +
[http://www.iusmentis.com/boek/arnoud-engelfriet-de-wet-op-internet-editie-2010-ebook.pdf De wet op internet] 2010
  
C. Freid: Privacy. Yale Law Journal 77(3): 475-493 (1968). <br>
+
R. Deibert "Black Code: Inside the Battle for Cyberspace", Signal, 2013.
 +
: A detailed account of several successful 'hacking' attempts of governments and corporations to take control of the internet, that were never meant to become public...
  
H. Nissenbaum: "Towards an approach to privacy in public: The challenges of information technology", Ethics and Behaviour (7), 1997, pp. 207-219.
+
J. Jarvis "Public Parts. How sharing in the digital age improves the way we work and live", Simon & Schuster, 2011.
 +
: Jarvis argues the benefits of sharing personal information: a valuable resource that portrays the other side of the coin.
  
H. Nissenbaum, "Privacy as Contextual Integrity", Washington Law Review (79) 1, February 2004, pp. 119-158.  
+
Bart de Koning "Alles onder controle", Uitgeverij Balans, 2008.  
  
D. Solove: "I've got nothing to hide" and other misunderstandings of privacy, 44 San Diego Law Review 745 (2007). (See also [http://www.aclu.org/blog/technology-and-liberty-national-security/plenty-hide this ACLU blogpost]<br>
+
I. Trojanov and J. Zeh "Aanslag op de vrijheid", De Geus, Breda, 2010. (Original German title "Angriff auf die Freiheit: Sicherheitswahn, Ueberwachungsstaat und der Abbau buergerliche Rechte").
  
Warren and Brandeis: The Right to Privacy Harvard Law Review. IV(5), December 15, 1890. <br>
+
== Overviews ==
  
== Technical papers ==
+
EDRi [http://www.edri.org/files/paper06_datap.pdf An introduction to Data Protection (01.2013)]
  
=== Basic techniques ===
+
Jaap-Henk Hoepman, Marc v. Lieshout
 +
[http://www.cs.ru.nl/~jhh/publications/privacy.pdf Privacy], In E. R. Leukfeldt and W. P. Stol, editors, Cyber Safety: An Introduction, pages pp 75-87. Eleven International Publishing, The Hague, 2012.
  
David Chaum: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 4(2): 84-88 (1981).
+
== Opinion papers ==
  
David Chaum: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Commun. ACM 28(10): 1030-1044 (1985).<br>
+
[http://www.faz.net/aktuell/feuilleton/debatten/ueberwachung/information-consumerism-the-price-of-hypocrisy-12292374.html Information Consumerism: The Price of Hypocrisy] by Evgeny Morozov, 24-07-2013.
  
Ian Goldberg, David Wagner, and Eric Brewer: Privacy-enhancing Technologies for the Internet. Proc. 42nd IEEE Spring COMPCON (1997).<br>
+
== Legal/ Philosophical Papers ==
  
Ian Goldberg: Privacy-enhancing technologies for the Internet, II: Five years later. Proc. Privacy Enhancing Technologies workshop (PET 2002).<br>
 
  
=== Mixnets ===
+
[http://www.harvardlawreview.org/symposium/papers2012/cohen.pdf Julie Cohen, WHAT PRIVACY IS FOR], 2012
  
Golle, P., Jakobsson, M., Juels, A., and Syverson, P. F. Universal reencryption
+
D. Solove: "I've got nothing to hide" and other misunderstandings of privacy, 44 San Diego Law Review 745 (2007). (See also [http://www.aclu.org/blog/technology-and-liberty-national-security/plenty-hide this ACLU blogpost])
for mixnets. In RSA Conf. (San Fransisco, CA, USA, Feb. 23-27
 
2004), LNCS 2964, pp. 163-178.
 
  
=== RFID and Pervasive systems ===
+
H. Nissenbaum, "Privacy as Contextual Integrity", Washington Law Review (79) 1, February 2004, pp. 119-158.
  
Garfinkel, S. L., Juels, A., and Pappu, R. RFID privacy: An overview of
+
H. Nissenbaum: "Towards an approach to privacy in public: The challenges of information technology", Ethics and Behaviour (7), 1997, pp. 207-219.
problems and proposed solutions. IEEE Security & Privacy (May 2005), 34-43.
 
  
Juels, A. RFID security and privacy: A research survey. IEEE Journal on
+
C. Freid: Privacy. Yale Law Journal 77(3): 475-493 (1968). <br>
Selected Areas in Communications 24, 2 (2006), 381-394.
 
  
Sarma, S. E., Weis, S. A., and Engels, D. W. Rfid systems, security & privacy
+
Warren and Brandeis: The Right to Privacy Harvard Law Review. IV(5), December 15, 1890. <br>
implications (white paper). Tech. Rep. MIT-AUTOID-WH-014, Auto-ID Center,
 
MIT, Cambridge, MA, USA, 2002.
 
 
 
Gildas Avoine: A bibliography of RFID
 
  
  
=== Identity management and credential systems ===
 
 
Camenisch, Lysyanskaya: "An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation", EUROCRYPT 2001: 93-118
 
 
Stefan Brands: "Rethinking Public Key Infrastructures and Digital
 
Certificates; Building in Privacy", 1st ed. MIT Press, 2000. ISBN
 
0-262-02491-8.
 
 
=== Trust Management and Access Control ===
 
 
Ji-Won Byun, Ninghui Li. "[http://www.cs.purdue.edu/homes/ninghui/papers/pbac_vldbj.pdf Purpose based access control for privacy protection in relational database systems]". VLDB J. 17(4): 603-619 (2008).
 
 
[http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml OASIS eXtensible Access Control Markup Language (XACML) standard]
 
 
[http://www.w3.org/Submission/2003/SUBM-EPAL-20031110/ Enterprise Privacy Authorization Language] (IBM alternative to XACML submitted for standardization to the W3C in 2003)
 
  
 
== Dutch Policy Reports ==
 
== Dutch Policy Reports ==
Line 93: Line 69:
 
Gewoon Doen. Beschermen van veiligheid en persoonlijke levenssfeer. Rapport van de Adviescommissie Brouwer-Korf Veiligheid en persoonlijke levenssfeer, Januari 2009. (local copy)
 
Gewoon Doen. Beschermen van veiligheid en persoonlijke levenssfeer. Rapport van de Adviescommissie Brouwer-Korf Veiligheid en persoonlijke levenssfeer, Januari 2009. (local copy)
  
J. Koffijberg, S. Dekkers, G. Homburg, B. van den Berg[[http://www.cbpweb.nl/downloads_rapporten/rap_2009_niets_te_verbergen_en_toch_bang.pdf Niets te verbergen en toch bang]], Regioplan Beleidsonderzoek publicatienr. 1774, January 2009.
+
J. Koffijberg, S. Dekkers, G. Homburg, B. van den Berg [http://www.cbpweb.nl/downloads_rapporten/rap_2009_niets_te_verbergen_en_toch_bang.pdf Niets te verbergen en toch bang], Regioplan Beleidsonderzoek publicatienr. 1774, January 2009.
  
Data voor daadkracht, Rapport van de Adviescommissie Informatiestromen Veiligheid, April 2007. (local copy)
+
Data voor daadkracht, Rapport van de Adviescommissie Informatiestromen Veiligheid, April 2007.  
  
  
Line 101: Line 77:
  
 
Anton Vedder, Leo van der Wees, Bert-Jaap Koops, en Paul de Hert: Van privacyparadijs tot controlestaat? Misdaad- en terreurbestrijding in Nederland aan het begin van de 21ste eeuw. Studie 49, Rathenau Instituut, Den Haag, Februari 2007.
 
Anton Vedder, Leo van der Wees, Bert-Jaap Koops, en Paul de Hert: Van privacyparadijs tot controlestaat? Misdaad- en terreurbestrijding in Nederland aan het begin van de 21ste eeuw. Studie 49, Rathenau Instituut, Den Haag, Februari 2007.
 +
 +
== Other sources ==
 +
 +
The Privacy + Security Forum (Daniel Solove and Paul Schwartz) collected a nice annotated bibliography of interesting [http://www.privacyandsecurityforum.com/nonfiction-books/ Non-Fiction Privacy + Security Books].

Latest revision as of 10:57, 24 September 2018

Scientific books

(In reverse chronological order)


D. Solove "Understanding Privacy", Harvard University Press, 2010.

P. E. Agre and M. Rotenberg (eds.) "Technology and privacy: The new landscape", MIT Press, Cambridge, MA, 2001.

A. Westin "Privacy and Freedom", Atheneum, New York, 1976.

Fiction

Franz Kafka "The Trial", German version published by Verlag Die Schmiede, Berlin, 1925.

F.M. Foster "The Machine Stops", in 'The Eternal Moment and Other Stories', Sidgwick & Jackson, London, 1928.

Aldous Huxley "Brave New world", Chatto & Windus, 1932.

George Orwell "1984", Secker & Warburg, 1949.

Dave Eggers "The Circle", Knopf, 2013.

Non fiction

Arnoud Engelfriet De wet op internet 2010

R. Deibert "Black Code: Inside the Battle for Cyberspace", Signal, 2013.

A detailed account of several successful 'hacking' attempts of governments and corporations to take control of the internet, that were never meant to become public...

J. Jarvis "Public Parts. How sharing in the digital age improves the way we work and live", Simon & Schuster, 2011.

Jarvis argues the benefits of sharing personal information: a valuable resource that portrays the other side of the coin.

Bart de Koning "Alles onder controle", Uitgeverij Balans, 2008.

I. Trojanov and J. Zeh "Aanslag op de vrijheid", De Geus, Breda, 2010. (Original German title "Angriff auf die Freiheit: Sicherheitswahn, Ueberwachungsstaat und der Abbau buergerliche Rechte").

Overviews

EDRi An introduction to Data Protection (01.2013)

Jaap-Henk Hoepman, Marc v. Lieshout Privacy, In E. R. Leukfeldt and W. P. Stol, editors, Cyber Safety: An Introduction, pages pp 75-87. Eleven International Publishing, The Hague, 2012.

Opinion papers

Information Consumerism: The Price of Hypocrisy by Evgeny Morozov, 24-07-2013.

Legal/ Philosophical Papers

Julie Cohen, WHAT PRIVACY IS FOR, 2012

D. Solove: "I've got nothing to hide" and other misunderstandings of privacy, 44 San Diego Law Review 745 (2007). (See also this ACLU blogpost)

H. Nissenbaum, "Privacy as Contextual Integrity", Washington Law Review (79) 1, February 2004, pp. 119-158.

H. Nissenbaum: "Towards an approach to privacy in public: The challenges of information technology", Ethics and Behaviour (7), 1997, pp. 207-219.

C. Freid: Privacy. Yale Law Journal 77(3): 475-493 (1968).

Warren and Brandeis: The Right to Privacy Harvard Law Review. IV(5), December 15, 1890.


Dutch Policy Reports

Gewoon Doen. Beschermen van veiligheid en persoonlijke levenssfeer. Rapport van de Adviescommissie Brouwer-Korf Veiligheid en persoonlijke levenssfeer, Januari 2009. (local copy)

J. Koffijberg, S. Dekkers, G. Homburg, B. van den Berg Niets te verbergen en toch bang, Regioplan Beleidsonderzoek publicatienr. 1774, January 2009.

Data voor daadkracht, Rapport van de Adviescommissie Informatiestromen Veiligheid, April 2007.


G.W. van Blarkom, drs. J.J. Borking Beveiliging van persoonsgegevens. Achtergrondstudies en Verkenningen 23, Registratiekamer, Den Haag, april 2001.

Anton Vedder, Leo van der Wees, Bert-Jaap Koops, en Paul de Hert: Van privacyparadijs tot controlestaat? Misdaad- en terreurbestrijding in Nederland aan het begin van de 21ste eeuw. Studie 49, Rathenau Instituut, Den Haag, Februari 2007.

Other sources

The Privacy + Security Forum (Daniel Solove and Paul Schwartz) collected a nice annotated bibliography of interesting Non-Fiction Privacy + Security Books.