Circles of Privacy
dc.contributor.author | Jagadish, H. V. | |
dc.date.accessioned | 2020-11-04T16:02:20Z | |
dc.date.available | WITHHELD_12_MONTHS | |
dc.date.available | 2020-11-04T16:02:20Z | |
dc.date.issued | 2020-10 | |
dc.identifier.citation | Jagadish, H. V. (2020). "Circles of Privacy." Journal of Consumer Psychology 30(4): 774-779. | |
dc.identifier.issn | 1057-7408 | |
dc.identifier.issn | 1532-7663 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/163476 | |
dc.publisher | Springer | |
dc.publisher | Wiley Periodicals, Inc. | |
dc.subject.other | Technology and the Web | |
dc.subject.other | Economic psychology | |
dc.subject.other | Online consumer behavior | |
dc.subject.other | Public policy issues | |
dc.title | Circles of Privacy | |
dc.type | Article | |
dc.rights.robots | IndexNoFollow | |
dc.subject.hlbsecondlevel | Psychology | |
dc.subject.hlbtoplevel | Social Sciences | |
dc.description.peerreviewed | Peer Reviewed | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/163476/2/jcpy1188_am.pdf | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/163476/1/jcpy1188.pdf | en_US |
dc.identifier.doi | 10.1002/jcpy.1188 | |
dc.identifier.source | Journal of Consumer Psychology | |
dc.identifier.citedreference | Jagadish, H. V. ( 2017 ). Data science ethics. Coursera online course (MOOC). Ann Arbor, MI: University of Michigan. | |
dc.identifier.citedreference | Acquisti, A., Brandimarte, L., & Loewenstein, G. ( 2015 ). Privacy and human behavior in the age of information. Science, 347 ( 6221 ), 509 – 514. https://doi.org/10.1126/science.aaa1465 | |
dc.identifier.citedreference | Agin, W. E. ( 2010 ). Reconciling the FTC act with the consumer privacy Ombudsman’s role. American Bankruptcy Institute Journal, 29 ( 8 ), 38. | |
dc.identifier.citedreference | Cho, H., Ippolito, D., & Yu, Y. W. ( 2020 ). Contact tracing mobile apps for COVID‐19: Privacy considerations and related trade‐offs. arXiv preprint arXiv:2003.11511. | |
dc.identifier.citedreference | Duhigg, C. ( 2012 ). How companies learn your secrets. New York Times, Feb. 16. Retrieved from source https://www.nytimes.com/2012/02/19/magazine/shopping‐habits.html. | |
dc.identifier.citedreference | Dwork, C. ( 2008, April). Differential privacy: A survey of results. In International conference on theory and applications of models of computation (pp. 1 – 19 ). Berlin, Heidelberg: Springer. | |
dc.identifier.citedreference | Guerrini, C. J., Robinson, J. O., Petersen, D., & McGuire, A. L. ( 2018 ). Should police have access to genetic genealogy databases? Capturing the Golden State Killer and other criminals using a controversial new forensic technique. PLoS Biology, 16 ( 10 ), e2006906. https://doi.org/10.1371/journal.pbio.2006906 | |
dc.identifier.citedreference | Jagadish, H. V. ( 2015a ). Big data and science: Myths and reality. Big Data Research, 2 ( 2 ), 49 – 52. https://doi.org/10.1016/j.bdr.2015.01.005 | |
dc.identifier.citedreference | Jagadish, H. V. ( 2015b ). Moving past the “Wild West” era for Big Data. In Proceedings of the 2015 IEEE international conference on big data (Vol. 2 ). Washington, DC: IEEE Computer Society. https://doi.org/10.1109/BigData.2015.7363733 | |
dc.identifier.citedreference | Jagadish, H. V. ( 2016a ). Data science ethics. EdX online course (MOOC). Ann Arbor, MI: University of Michigan. | |
dc.identifier.citedreference | Jagadish, H. V. ( 2016b ). The values challenge for Big Data. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 2016, 77 – 84. | |
dc.identifier.citedreference | Jagadish, H. V., Gehrke, J., Labrinidis, A., Papakonstantinou, Y., Patel, J. M., Ramakrishnan, R., & Shahabi, C. ( 2014 ). Big data and its technical challenges. Communications of the ACM, 57 ( 7 ), 86 – 94. https://doi.org/10.1145/2611567 | |
dc.identifier.citedreference | Kerr, O. S. ( 2008 ). The case for the third‐party doctrine. Michigan Law Review, 107, 561. | |
dc.identifier.citedreference | Nissenbaum, H. ( 2009 ). Privacy in context: Technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press. ISBN‐10: 0804752370 | |
dc.identifier.citedreference | United States Supreme Court ( 2017 ). Carpenter v. United States. Washington, DC: United States Supreme Court. Retrieved from source https://www.oyez.org/cases/2017/16‐402. | |
dc.identifier.citedreference | Waldman, A. E. ( 2018 ). Privacy as trust: Information privacy for an information age. Cambridge, UK: Cambridge University Press. ISBN‐10: 1316636941. | |
dc.identifier.citedreference | Wallach, D. S. ( 2001 ). Copy protection technology is doomed. Computer, 34 ( 10 ), 48 – 49. https://doi.org/10.1109/2.955098 | |
dc.identifier.citedreference | Zuboff, S. ( 2019 ). The age of surveillance capitalism: The fight for a human future at the new frontier of power: Barack Obama’s books of 2019. London, UK: Profile Books. ISBN‐10: 1610395697. | |
dc.owningcollname | Interdisciplinary and Peer-Reviewed |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.