Talk:Cross-device tracking

Untitled edit

Annotated Bibliography:

Arp, Daniel, Erwin Quiring, Christian Wressnegger, and Konrad Rieck. n.d. “Bat in the Mobile:A Study on Ultrasonic Device Tracking.” Computer Science Report No. 2016-02 Technische Universität Braunschweig Institute of System Security 1–32. Retrieved (https://www.sec.cs.tu-bs.de/pubs/2016-batmobile.pdf). Arp, Daniel, Erwin Quiring, Christian Wressnegger, and Konrad Rieck. 2017. “Privacy Threats through Ultrasonic Side Channels on Mobile Devices.” 2017 IEEE European Symposium on Security and Privacy (EuroS&P). Retrieved (https://ieeexplore.ieee.org/document/7961950). Brookman, Justin, Phoebe Rouge, Aaron Alva, and Christina Yeung. 2017. “Cross-Device Tracking: Measurement and Disclosures.” Proceedings on Privacy Enhancing Technologies 2017(2):133–48. Retrieved (https://content.sciendo.com/view/journals/popets/2017/2/article-p133.xml). Campbell, John Edward and Matt Carlson. 2002. “Panopticon.com: Online Surveillance and the Commodification of Privacy.” Journal of Broadcasting & Electronic Media 46(4):586–606. Retrieved (https://doi.org/10.1207/s15506878jobem4604_6). Farzan, Rosta and Peter Brusilovsky. 2019. “Following Others through an Information Maze: The Impact of Social Navigation on Information Seeking Behavior.” International Journal of Human-Computer Studies 124:81–92. Retrieved (https://www.sciencedirect.com/science/article/pii/S1071581918306438). Gill, Stephen. 1995. “The Global Panopticon? The Neoliberal State, Economic Life, and Democratic Surveillance.” Alternatives: Global, Local, Political 20(1):1–49. Retrieved (https://www.jstor.org/stable/40644823?seq=1#metadata_info_tab_contents). Gross, Shad, Jeffrey Bardzell, Shaowen Bardzell, and Michael Stallings. 2017. “Persuasive Anxiety: Designing and Deploying Material and Formal Explorations of Personal Tracking Devices.” Human–Computer Interaction 32(5-6):297–334. Retrieved (https://www.tandfonline.com/doi/full/10.1080/07370024.2017.1287570). Hoofnagle, Chris Jay. 2017. “FTC Regulation of Cybersecurity and Surveillance.” The Cambridge Handbook of Surveillance Law 708–26. Retrieved (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3010205). Huckvale, Kit, José Tomás Prieto, Myra Tilney, Pierre-Jean Benghozi, and Josip Car. 2015. “Unaddressed Privacy Risks in Accredited Health and Wellness Apps: a Cross-Sectional Systematic Assessment.” BMC Medicine 13(1). Retrieved (https://bmcmedicine.biomedcentral.com/articles/10.1186/s12916-015-0444-y). Koskela, Hille. 2002. “Webcams, TV Shows and Mobile Phones: Empowering Exhibitionism.” Surveillance & Society 2(2/3). Retrieved (https://pdfs.semanticscholar.org/26c5/dac2a02d67852f9c01f358739eff62fcbe69.pdf). Lyall, Ben and Brady Robards. 2017. “Tool, Toy and Tutor: Subjective Experiences of Digital Self-Tracking.” Journal of Sociology 54(1):108–24. Retrieved (https://journals.sagepub.com/doi/abs/10.1177/1440783317722854). Malgieri, Gianclaudio and Bart Custers. 2018. “Pricing Privacy – the Right to Know the Value of Your Personal Data.” Computer Law & Security Review 34(2):289–303. Retrieved (https://www.sciencedirect.com/science/article/pii/S0267364917302819). Mann, Steve, Jason Nolan, and Barry Wellman. 2002. “Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments.” Surveillance & Society 1(3):331–55. Retrieved (https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3344/3306). Molz, Jennie Germann. 2006. “‘Watch Us Wander’: Mobile Surveillance and the Surveillance of Mobility.” Environment and Planning A: Economy and Space 38(2):377–93. Retrieved (https://journals.sagepub.com/doi/10.1068/a37275). Nissenbaum, Helen. 2015. “A Contextual Approach to Privacy Online.” Daedalus 140(4):32–48. Retrieved (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2567042). Razaghpanah, Abbas et al. 2018. “Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem.” Proceedings 2018 Network and Distributed System Security Symposium. Retrieved (https://haystack.mobi/papers/ndss18_ats.pdf). Sipior, Janice C., Burke T. Ward, and Ruben A. Mendoza. 2011. “Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons.” Journal of Internet Commerce 10(1):1–16. Retrieved (https://www.tandfonline.com/doi/abs/10.1080/15332861.2011.558454). West, Sarah Myers. 2017. “Data Capitalism: Redefining the Logics of Surveillance and Privacy.” Business & Society 58(1):20–41. Retrieved (https://journals.sagepub.com/doi/10.1177/0007650317718185). Zimmeck, Sebastian, Jie S. Li, Hyungtae Kim, Stephen M. Bellovin, and Tony Jebara. 2017. “A Privacy Analysis of Cross-Device Tracking.” USENIX Security Symposium. Retrieved (http://www.cs.columbia.edu/~jebara/papers/Cross_Device_Tracking_2017.pdf). Zuboff, Shoshana. 2015. “Big Other: Surveillance Capitalism and the Prospects of an Information Civilization.” Journal of Information Technology 30(1):75–89. Retrieved (https://journals.sagepub.com/doi/10.1057/jit.2015.5). — Preceding unsigned comment added by Privacy4353 (talkcontribs) 10:30, 8 March 2019 (UTC)Reply

Wiki Education Foundation-supported course assignment edit

  This article was the subject of a Wiki Education Foundation-supported course assignment, between 15 February 2019 and 3 May 2019. Further details are available on the course page. Student editor(s): Privacy4353. Peer reviewers: Tm670.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 16:38, 18 January 2022 (UTC)Reply