Skip to Main Content
HOME
Link to Library Homepage

Privacy

Resources related to the concept of privacy from a multidisciplinary perspective.

Computer Science

Hansen, M., Jensen, M., & Rost, M. (2015, May). Protection goals for privacy engineering. In Security and Privacy Workshops (SPW), 2015 IEEE (pp. 159-166). Paper retrieved from https://www.computer.org/csdl/proceedings/spw/2015/9933/00/9933a159.pdf  Presentation retrieved from https://www.ieee-security.org/TC/SPW2015/IWPE/2.pdf

Privacy Management Reference Model and Methodology (PMRM) Version 1.0. Edited by Michele Drgon, Gail Magnuson, and John Sabo. 17 May 2016. OASIS Committee Specification 02. http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html. Latest version: http://docs.oasis-open.org/pmrm/PMRM/v1.0/PMRM-v1.0.html.

Education

HEISC Working Group. (2017). The Higher Education Chief Privacy Officer Primer, Part 2 A Roadmap for Chief Privacy Officers in Higher Education. Retrieved from https://www.cupahr.org/wp-content/uploads/events/Webinars/files/on-demand/11.29.18%20EDUCAUSE%20CPO%20Primer%20Part%202.pdf

Center for Democracy and Technology. (2019). Chief Privacy Officers: Who are they and why education leaders need them. Retrieved from https://cdt.org/files/2019/01/Student-Privacy-Chief-Privacy-Officer-Issue-Brief.pdf

US Department of Education. Family Educational Rights and Privacy Act. Retrieved from https://studentprivacy.ed.gov/?src=fpco

General

Fornaciari, F. (2018). What is privacy anyway? A longitudinal study of media frames of privacy. Journal of Intellectual Freedom and Privacy, 3(1), 8-20. doi:http://dx.doi.org/10.5860/jifp.v3i1.6414 http://www.ezproxy.dsu.edu:2048/login?url=https://search.proquest.com/docview/2099873116?accountid=27073

Neill, E. (2001). Rites of Privacy and the Privacy Trade : On the Limits of Protection for the Sacred Self. Montreal: MQUP. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=404863&site=ehost-live&scope=site

Solove, D. Conceptualizing Privacy. (2002). California Law Review, 90(4), 1088. https://doi.org/10.2307/3481326 http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=7111919&site=ehost-live&scope=site

Governmental/State Standards - United States

Office of Privacy and Data Protection https://privacy.wa.gov/
From state of Washington. Provides guides and checklists related to privacy.

Grumbling, E., National Academies of Sciences, E. and M. (U. S. ., & United States. (2016). Privacy Research and Best Practices : Summary of a Workshop for the Intelligence Community. Washington, DC: National Academies Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1204373&site=ehost-live&scope=site

"An Introduction to Privacy Engineering and Risk Management in Federal Systems" NISTIR 8062 Available at https://doi.org/10.6028/NIST.IR.8062 (PDF below)

CalOPPA: California Online Privacy Protection Act. (2003). https://termsfeed.com/blog/caloppa/

Harris, Kamala. (2014). Making your privacy practices public. Retrieved from https://oag.ca.gov/sites/all/files/agweb/pdfs/cybersecurity/making_your_privacy_practices_public.pdf

Governmental - International

DLA Piper Global Data Protection Laws. https://www.dlapiperdataprotection.com/

Organization for Economic Co-operation and Development (OECD). (2013). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Retrieved from http://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm

Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. (1995). PDF Retrieved from https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:1995:281:FULL&from=BG HTML Retrieved from https://www.cdt.org/files/privacy/eudirective/EU_Directive_.html#HD_NM_6

EU General Data Protection Regulation. (2019). GDPR Privacy Policy. Retrieved from https://termsfeed.com/blog/gdpr-privacy-policy/

PIPEDA: Personal Information Protection and Electronic Documents Act. Summary retrieved from https://termsfeed.com/blog/pipeda/

Full Act retrieved from https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/

Australia Privacy Act of 1988. Summary retrieved from https://termsfeed.com/blog/australia-privacy-act-1988/ Law retrieved from https://www.oaic.gov.au/privacy-law/privacy-act/

Health / Medicine

US Department of Health and Human Services. HIPAA Privacy Rule. https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/introduction/index.html

US Department of Health and Human Services. Summary of the HIPAA Privacy Rule. https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html

Fairchild, A. L., Wolfe, D., Colgrove, J. K., & Bayer, R. (2007). Searching Eyes : Privacy, the State, and Disease Surveillance in America. Berkeley: University of California Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=212113&site=ehost-live&scope=site

Historic/Cultural views of Privacy

McDougall, B. S., & Hansson, A. (2002). Chinese Concepts of Privacy. Leiden [Netherlands]: Brill. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=105570&site=ehost-live&scope=site

Ando, C., & R, ơpke, J©œrg. (2015). Public and Private in Ancient Mediterranean Law and Religion. Berlin/Boston: De Gruyter. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=984233&site=ehost-live&scope=site

Orlin, L. C. (2008). Locating Privacy in Tudor London. Oxford: OUP Oxford. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=223877&site=ehost-live&scope=site

 

Human Subject Research / IRB

Office of Research. University of California Irving. Privacy and Confidentiality. Retrieved from https://www.research.uci.edu/compliance/human-research-protections/researchers/privacy-and-confidentiality.html#privacy

US Department of Health and Human Services. Institutional Review Boards and the HIPAA Privacy Rule. Retrieved from https://privacyruleandresearch.nih.gov/irbandprivacyrule.asp

CITI Program. https://about.citiprogram.org/en/homepage/

Journalism

APA's Principles of Journalism - While they do not mention privacy specifically, these principles guide journalists. http://americanpressassociation.com/principles-of-journalism/?fbclid=IwAR2H_l9SBKAJv13BCR-LEp7SeeZJuJ4OTd_p-s-RHNyVWx50rFyIHn6oQO4

Privacy for Journalists - This OER from Media Helping Media provides a discussion of privacy in journalism. http://www.mediahelpingmedia.org/training-resources/editorial-ethics/247-privacy-what-it-means-for-journalism?fbclid=IwAR2i2yEpZNBQWAUVhcru8nteoVmLQaYIkeoKA9ux3muxY0i7rnXJpirCv1s

Law Enforcement

Federal Bureau of Investigation. (n.d.) Privacy Policy. Retrieved from https://www.fbi.gov/privacy_policy

Gregory, A., & Independent Institute, O. C. . (2016). American Surveillance : Intelligence, Privacy, and the Fourth Amendment. Madison, Wisconsin: University of Wisconsin Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1296424&site=ehost-live&scope=site

Beckley, A. (2004). The Future of Privacy in Law Enforcement. FBI Law Enforcement Bulletin, 73(9), 16–23. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=14960925&site=ehost-live&scope=site

Waldo, J., Lin, H., & Millett, L. I. (2007). Engaging privacy and information technology in a digital age. Washington, D.C: National Academies Press. Chapter 9. Retreived from https://www.nap.edu/read/11896/chapter/11

Legal

Rengel, A. (2013). Privacy in the 21st Century. Leiden: Brill | Nijhoff. http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=658380&site=ehost-live&scope=site

Regan, P. M. (1995). Legislating Privacy : Technology, Social Values, and Public Policy. Chapel Hill: The University of North Carolina Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1592&site=ehost-live&scope=site

Solove, D. J. (2005). A taxonomy of privacy. U. Pa. L. Rev., 154, 477. Retrieved from https://www.law.upenn.edu/journals/lawreview/articles/volume154/issue3/Solove154U.Pa.L.Rev.477(2006).pdf

Posner, Richard A. (1978). An Economic Theory of Privacy. Regulation 2(3), 19–26. Retrieved from https://object.cato.org/sites/cato.org/files/serials/files/regulation/1978/5/v2n3-4.pdf

Glancy, D.J. (1979). The invention of the right to privacy. Arizona Law Review 21(1), 1-39. Retrieved from http://law.scu.edu/wp-content/uploads/Privacy.pdf

Librarianship

Library Bill of Rights. http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/privacy

Chmara, T. (2009). Privacy and Confidentiality Issues : A Guide for Libraries and Their Lawyers. Chicago: ALA Editions. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=267781&site=ehost-live&scope=site

Magi, T. J. (2011). Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature. Library Quarterly, 81(2), 187–209. Retrieved from https://scholarworks.uvm.edu/cgi/viewcontent.cgi?referer=https://scholar.google.com/&httpsredir=1&article=1004&context=libfacpub

Math

Matthews, J. and Harel, O. (2011). Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy. Statistics Surveys 5: 1-29. Retrieved from https://projecteuclid.org/download/pdfview_1/euclid.ssu/1296828958

Philosophy

Scoglio, S. (1998). Transforming Privacy : A Transpersonal Philosophy of Rights. Westport, Conn: Greenwood Publishing Group. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=182271&site=ehost-live&scope=site

Elliott, D., & Soifer, E. (2017). Divine omniscience, privacy, and the state. International Journal for Philosophy of Religion, 82(3), 251–271. https://doi.org/10.1007/s11153-017-9612-7 http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=125950775&site=ehost-live&scope=site

Richardson, J. (2011). The Changing Meaning of Privacy, Identity and Contemporary Feminist Philosophy. Minds & Machines, 21(4), 517–532. https://doi.org/10.1007/s11023-011-9257-8 http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=66579488&site=ehost-live&scope=site

Schoeman, F. D. (2001). privacy. In L. C. Becker, & C. B. Becker (Eds.), Encyclopedia of ethics (2nd ed.). London, UK: Routledge. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=https://search.credoreference.com/content/entry/routethics/privacy/0?institutionId=1716

Meijers, A. (2015). philosophy of technology. In R. Audi (Ed.), The Cambridge dictionary of philosophy (3rd ed.). Cambridge, UK: Cambridge University Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=https://search.credoreference.com/content/entry/cupdphil/philosophy_of_technology/0?institutionId=1716

Hinman, L. M. (2018). Basic principles, concepts, and ideas in the philosophy of technology. In A. F. Beavers (Ed.), Macmillan Interdisciplinary handbooks: Philosophy: Technology. New York City, New York: Macmillan US. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=https://search.credoreference.com/content/entry/macuspt/basic_principles_concepts_and_ideas_in_the_philosophy_of_technology/0?institutionId=1716

Privacy. (2018). Stanford Encyclopedia of Philosophy. Retrieved from https://plato.stanford.edu/entries/privacy/

Sociology

Tunick, M. (2013). Privacy and Punishment. Social Theory & Practice, 39(4), 643–668. https://doi.org/10.5840/soctheorpract201339436 http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90518801&site=ehost-live&scope=site

Privacy. (2006). In B. S. Turner (Ed.), Cambridge dictionary of sociology. Cambridge, UK: Cambridge University Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=https://search.credoreference.com/content/entry/cupsoc/privacy/0?institutionId=1716

Psychology

Werner, C. M., Brown, B. B., & Altman, I. (2004). Privacy. In C. D. Spielberger (Ed.), Encyclopedia of applied psychology. Oxford, UK: Elsevier Science & Technology. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=https://search.credoreference.com/content/entry/estappliedpsyc/privacy/0?institutionId=1716

Seminal Works and Top Researchers

Brandeis, L., & Warren, S. (1890). The right to privacy. Harvard law review, 4(5), 193-220. https://www.cs.cornell.edu/~shmat/courses/cs5436/warren-brandeis.pdf

Calo, R. (2016). Privacy and Markets: A Love Story. Notre Dame Law Review, 91(2). https://pdfs.semanticscholar.org/7c79/3f6d06e42680413e1a5b883026be04a32c57.pdf

Cavoukian, A. (2009). Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada. https://www.ryerson.ca/pbdce/certification/seven-foundational-principles-of-privacy-by-design/

 Hann, I. H., Hui, K. L., Lee, S. Y. T., & Png, I. P. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13-42. Retrieved from https://www.computer.org/csdl/proceedings/hicss/2007/2755/00/27550210b.pdf

Nissenbaum, H. (2011). Contextual Approach to Privacy Online. Dædalus, 140(4), 32-48. https://www.amacad.org/publication/contextual-approach-privacy-online

Posner, Richard A. 1978. The Right of Privacy. Georgia Law Review 12:393-422. Retrieved from https://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1021&context=lectures_pre_arch_lectures_sibley

Prosser, William L.. Privacy, 48 Calif. L. Rev. 383 (1960). https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=3157&context=californialawreview

Rachels, J. (1975). Why privacy is important. Philos Public Aff, 4(4), 323–333. Retrieved from http://public.callutheran.edu/~chenxi/Phil315_062.pdf

Solove, D. (2002). Conceptualizing Privacy. California Law Review, 90(4), 1088. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=7111919&site=ehost-live&scope=site. doi:10.2307/3481326

Stigler, George J. 1980. An Introduction to Privacy in Economics and Politics. Journal of Legal Studies 9:623-44. Retrieved from https://www.journals.uchicago.edu/doi/pdfplus/10.1086/467657

Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557-570. https://epic.org/privacy/reidentification/Sweeney_Article.pdf

Westin, A. (2003). Social and Political Dimensions of Privacy. Journal of social issues, 59(2), 431-453. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.455.4866&rep=rep1&type=pdf