MVV1368K Privacy and Personal Data
Privacy protection online I – Surveillance (Kasl)
PRESENTATION
OBLIGATORY READINGS
These readings are the prerequisite for the understanding of the concept of surveillance and its historical development.
These readings provide additional insight into the challenges related to the conflict of surveillance and privacy.
These readings provide broader context and up-to-date examples of situations, where privacy is being challenged by surveillance.
OBLIGATORY READINGS
These readings are the prerequisite for the understanding of the concept of surveillance and its historical development.
- CLARKE, Roger. Introduction to Dataveillance and Information Privacy, and Definitions of Terms, 1997. Available at: http://www.rogerclarke.com/DV/Intro.html
- MARX, Gary T. What’s new about the “new surveillance”?: Classifying for change and continuity, Knowledge, Technology & Policy. 2004, Vol. 17, No. 1, pp. 18–37. Available (through university computers) at: https://link.springer.com/article/10.1007%2FBF02687074
These readings provide additional insight into the challenges related to the conflict of surveillance and privacy.
- STUART, Avelie; Mark Levine. Beyond ‘nothing to hide’: When identity is key to privacy threat under surveillance. European Journal of Social Psychology. 2017, Vol. 47, 694-707. Available (through university computers) at: https://onlinelibrary.wiley.com/doi/abs/10.1002/ejsp.2270
- MILAJ, Jonida. Privacy, surveillance, and the proportionality principle: The need for a method of assessing privacy implications of technologies used for surveillance, International Review of Law, Computers & Technology, 2016, Vol. 30, No. 3, pp. 115-130. Available (through university computers) at: https://www.tandfonline.com/doi/abs/10.1080/13600869.2015.1076993
- POSNER, Richard A. Privacy, Surveillance, and Law, The University of Chicago Law Review. 2008, Vol. 75, No. 1, pp. 245-260. Available (through university computers) at: https://www.jstor.org/stable/20141907?seq=1#page_scan_tab_contents
- PENNEY, J. W. Chilling Effects: Online Surveillance and Wikipedia Use. Berkeley Technology Law Journal. 2016, Vol. 31, No. 1. Available (through university computers) at: https://heinonline.org/HOL/LandingPage?handle=hein.journals/berktech31&div=6&id=&page=
- ZUBOFF, Shoshana. Big other: surveillance capitalism and the prospects of an information civilization. Journal of Information Technology. 2015, Vol. 30, No. 1, pp. 75-89. Available (through university computers) at: https://link.springer.com/article/10.1057/jit.2015.5
These readings provide broader context and up-to-date examples of situations, where privacy is being challenged by surveillance.
- BUNIN, G. ‘We’re a people destroyed’: why Uighur Muslims across China are living in fear. The Guardian. 7. 8. 2018. Available at: https://www.theguardian.com/news/2018/aug/07/why-uighur-muslims-across-china-are-living-in-fear
- SCHNEIER, Bruce. It's Not Just Facebook. Thousands of Companies are Spying on You. CNN. 2018. Available at: https://www.schneier.com/essays/archives/2018/03/its_not_just_faceboo.html
- SCHNEIER, Bruce. Security vs. Surveillance. Don't Panic: Making Progress on the 'Going Dark' Debate. 2016. Available at: https://www.schneier.com/essays/archives/2016/02/security_vs_surveill.html
- SCHNEIER, Bruce. The Era Of Automatic Facial Recognition And Surveillance Is Here. Forbes. 2015. Available at: https://www.schneier.com/essays/archives/2015/09/sep_29_2015_0930_am_.html
- CLARKE, Roger. Risks Inherent in the Digital Surveillance Economy: A Research Agenda. 2017. Available at: http://www.rogerclarke.com/EC/DSE.html
- CLARKE, Roger. Data Retention as Mass Surveillance: The Need for an Evaluative Framework. International Data Privacy Law, 2015, Vol. 5, No. 2, pp. 121-132. Also available at: http://www.rogerclarke.com/DV/DRPS.html .
- CLARKE, Roger; Marcus WIGAN. You Are Where You've Been The Privacy Implications of Location and Tracking Technologies. Journal of Location Based Services, 2011, Vol. 5, No. 3-4, pp. 138-155. Also available at: http://www.rogerclarke.com/DV/YAWYB-CWP.html
- CLARKE, Roger. From Dataveillance to Ueberveillance. 2013. Available at: http://www.rogerclarke.com/DV/DV13.html
- SOLOVE, Daniel J.; Paul. M. SCHWARTZ. Privacy, Law Enforcement and National Security. 2014, Wolters Kluwer Law & Business, 978-1454861539, 233 p.
- SCHNEIER, Bruce. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. 2016, W. W. Norton & Company, 978-0393352177, 448 p.