Agre, Philip E. & Rotenberg, Marc 1998 Technology and privacy the new landscape
Bentham, Jeremy Jeremy Bentham (1748-1832) designed a prison as a means of keeping prisoners under control consisting of cells which were arranged radially in a circle and a central tower. The cells were backlit so that anyone in the tower could see anything that was going on in the cells, but the prisoners couldn’t see whether anyone was in the tower. The idea was that prisoners would assume that the guards were watching them, and they act accordingly. The panopticon provides an invisible and constant perception of power.     the panopticon which he described as “a new mode of obtaining power of mind over mind, in a quantity hitherto without example”; and indeed, the resulting chilling effect ~ The works of Jeremy Bentham vol. 10 (Memoirs Part I and Correspondence) 1843 ~ The Works of Jeremy Bentham, vol. 4 (Panopticon, Constitution, Colonies, Codification) [1843]
Cannataci, Joseph A. UN special rapporteur on privacy
Clark, Ian 2016 Digital privacy divide. There is both a SECURITY DIVIDE and an ONLINE PRIVACY DIVIDE. The security divide between those with digital knowledge and skills to protect themselves and those without. IT means that there is an additional barrier to digital engagement
Cohen, Julie 2013 “What privacy is for” IN Harvard Law Review
Finn, Wright, Friedewald 2013 “Seven types of privacy”. Identified seven different types of privacy that current decisionmakers need to consider in providing proactive protection to individuals in the face of new and emerging technologies. These include privacy of the person, privacy of behaviour and action, privacy of data and image, privacy of communication, privacy of thoughts and feelings, privacy of location and space, and privacy of association (including group privacy).
Floridi, Luciano    proposes a new interpretation of informational privacy and of its moral value. Argues that new or digital ICT’s, because they are interactive, can potentially increase privacy or change informational privacy inasmuch that they re-ontologize the very nature of the infosphere    ~ On human dignity as a foundation for the right to privacy 2016    ~ Informational privacy and its ontological interpretation 2006    ~   Google’s privacy ethics tour of Europe: a complex balancing act 2014    ~ Open data, data protection and group privacy 2014
Foucault, Michel 1977 Michel Foucault (1926-1984) used the panopticon as a metaphor for the impact of surveillance where you feel visible and exposed, and feel the power of the potential surveillance IN Discipline & Punish; the birth of the prison, 1975.     further develops Bentham’s panopticon, seeing it as a means of exerting order and control over human populations, often through unseen forces    ~ Discipline and punish 1977
Galic, Masa 2016 Bentham, Deleuze and beyond
Greene, Jennifer K. 2014 Before Snowden: privacy in an earlier digital age
Hartzog, Woodrow 2013
Lyon, Professor David
Magi, Trina 2007
Mai, Jens-Erik 2016 “Big data privacy: the dataification of personal information” Dataification. Where data is assumed based on patterns from big data, based on probability. Consent not required, because they are working on what they have deduced or guessed for themselves.   further develops Bentham’s panopticon, seeing it as a means of exerting order and control over human populations, often through unseen forces
Nissenbaum, Helen 2011    theory rooted in contextual integrity which looks at context-specific substantive norms that constrain what information websites can collect, with whom they can share it, and under was circumstances    ~ A contextual approach to privacy online 2011
Reiman, Jeffrey H. 1995 Driving to the panopticon: a philosophical exploration of the risks to privacy posed by the highway technology of the future
Richards, Neil 2015 Intellectual privacy: rethinking civil liberties in the digital age (Book)
Schneier, Bruce 2006 The eternal value of privacy
Sekulovski, Jordanco 2016 The panopticon factor: privacy and surveillance in the digital age
Solove, Daniel Conceptualizing privacy (California Law Review v90, p1088 2005); The fight to frame privacy. Nothing to hide: the false tradeoff between privacy and security
Spears, Janine L. 2014 I have nothing to hide, thus nothing to fear: defining a framework for examining the “nothing to hide” persona
Stark, Luke 2014 The emotional context of information privacy
Strahilevitz Lior Jacob 2005 A social networks theory of privacy
Warren & Brandeis 1890 define privacy as the right to be let alone, and to have a sanctum from the press, for example. They pointed to technology as a means for increasing the facility with which privacy is invaded; that technology makes it easier to collect information and broadcast it IN The right to privacy, Harvard Law Review December 15, 1890
Westin, Alan 1967    ~ Social and political dimensions of privacy 2003    ~ Privacy in the workplace: how well does American law reflect American values? 1996; “Privacy and freedom”