Show simple item record

Circles of Privacy

dc.contributor.authorJagadish, H. V.
dc.date.accessioned2020-11-04T16:02:20Z
dc.date.availableWITHHELD_12_MONTHS
dc.date.available2020-11-04T16:02:20Z
dc.date.issued2020-10
dc.identifier.citationJagadish, H. V. (2020). "Circles of Privacy." Journal of Consumer Psychology 30(4): 774-779.
dc.identifier.issn1057-7408
dc.identifier.issn1532-7663
dc.identifier.urihttps://hdl.handle.net/2027.42/163476
dc.publisherSpringer
dc.publisherWiley Periodicals, Inc.
dc.subject.otherTechnology and the Web
dc.subject.otherEconomic psychology
dc.subject.otherOnline consumer behavior
dc.subject.otherPublic policy issues
dc.titleCircles of Privacy
dc.typeArticle
dc.rights.robotsIndexNoFollow
dc.subject.hlbsecondlevelPsychology
dc.subject.hlbtoplevelSocial Sciences
dc.description.peerreviewedPeer Reviewed
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/163476/2/jcpy1188_am.pdfen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/163476/1/jcpy1188.pdfen_US
dc.identifier.doi10.1002/jcpy.1188
dc.identifier.sourceJournal of Consumer Psychology
dc.identifier.citedreferenceJagadish, H. V. ( 2017 ). Data science ethics. Coursera online course (MOOC). Ann Arbor, MI: University of Michigan.
dc.identifier.citedreferenceAcquisti, A., Brandimarte, L., & Loewenstein, G. ( 2015 ). Privacy and human behavior in the age of information. Science, 347 ( 6221 ), 509 – 514. https://doi.org/10.1126/science.aaa1465
dc.identifier.citedreferenceAgin, W. E. ( 2010 ). Reconciling the FTC act with the consumer privacy Ombudsman’s role. American Bankruptcy Institute Journal, 29 ( 8 ), 38.
dc.identifier.citedreferenceCho, H., Ippolito, D., & Yu, Y. W. ( 2020 ). Contact tracing mobile apps for COVID‐19: Privacy considerations and related trade‐offs. arXiv preprint arXiv:2003.11511.
dc.identifier.citedreferenceDuhigg, C. ( 2012 ). How companies learn your secrets. New York Times, Feb. 16. Retrieved from source https://www.nytimes.com/2012/02/19/magazine/shopping‐habits.html.
dc.identifier.citedreferenceDwork, C. ( 2008, April). Differential privacy: A survey of results. In International conference on theory and applications of models of computation (pp. 1 – 19 ). Berlin, Heidelberg: Springer.
dc.identifier.citedreferenceGuerrini, C. J., Robinson, J. O., Petersen, D., & McGuire, A. L. ( 2018 ). Should police have access to genetic genealogy databases? Capturing the Golden State Killer and other criminals using a controversial new forensic technique. PLoS Biology, 16 ( 10 ), e2006906. https://doi.org/10.1371/journal.pbio.2006906
dc.identifier.citedreferenceJagadish, H. V. ( 2015a ). Big data and science: Myths and reality. Big Data Research, 2 ( 2 ), 49 – 52. https://doi.org/10.1016/j.bdr.2015.01.005
dc.identifier.citedreferenceJagadish, H. V. ( 2015b ). Moving past the “Wild West” era for Big Data. In Proceedings of the 2015 IEEE international conference on big data (Vol. 2 ). Washington, DC: IEEE Computer Society. https://doi.org/10.1109/BigData.2015.7363733
dc.identifier.citedreferenceJagadish, H. V. ( 2016a ). Data science ethics. EdX online course (MOOC). Ann Arbor, MI: University of Michigan.
dc.identifier.citedreferenceJagadish, H. V. ( 2016b ). The values challenge for Big Data. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 2016, 77 – 84.
dc.identifier.citedreferenceJagadish, H. V., Gehrke, J., Labrinidis, A., Papakonstantinou, Y., Patel, J. M., Ramakrishnan, R., & Shahabi, C. ( 2014 ). Big data and its technical challenges. Communications of the ACM, 57 ( 7 ), 86 – 94. https://doi.org/10.1145/2611567
dc.identifier.citedreferenceKerr, O. S. ( 2008 ). The case for the third‐party doctrine. Michigan Law Review, 107, 561.
dc.identifier.citedreferenceNissenbaum, H. ( 2009 ). Privacy in context: Technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press. ISBN‐10: 0804752370
dc.identifier.citedreferenceUnited States Supreme Court ( 2017 ). Carpenter v. United States. Washington, DC: United States Supreme Court. Retrieved from source https://www.oyez.org/cases/2017/16‐402.
dc.identifier.citedreferenceWaldman, A. E. ( 2018 ). Privacy as trust: Information privacy for an information age. Cambridge, UK: Cambridge University Press. ISBN‐10: 1316636941.
dc.identifier.citedreferenceWallach, D. S. ( 2001 ). Copy protection technology is doomed. Computer, 34 ( 10 ), 48 – 49. https://doi.org/10.1109/2.955098
dc.identifier.citedreferenceZuboff, S. ( 2019 ). The age of surveillance capitalism: The fight for a human future at the new frontier of power: Barack Obama’s books of 2019. London, UK: Profile Books. ISBN‐10: 1610395697.
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.