Hansen, M., Jensen, M., & Rost, M. (2015, May). Protection goals for privacy engineering. In Security and Privacy Workshops (SPW), 2015 IEEE (pp. 159-166). Paper retrieved from https://www.computer.org/csdl/proceedings/spw/2015/9933/00/9933a159.pdf Presentation retrieved from https://www.ieee-security.org/TC/SPW2015/IWPE/2.pdf
Privacy Management Reference Model and Methodology (PMRM) Version 1.0. Edited by Michele Drgon, Gail Magnuson, and John Sabo. 17 May 2016. OASIS Committee Specification 02. http://docs.oasis-open.org/pmrm/PMRM/v1.0/cs02/PMRM-v1.0-cs02.html. Latest version: http://docs.oasis-open.org/pmrm/PMRM/v1.0/PMRM-v1.0.html.
HEISC Working Group. (2017). The Higher Education Chief Privacy Officer Primer, Part 2 A Roadmap for Chief Privacy Officers in Higher Education. Retrieved from https://www.cupahr.org/wp-content/uploads/events/Webinars/files/on-demand/11.29.18%20EDUCAUSE%20CPO%20Primer%20Part%202.pdf
Center for Democracy and Technology. (2019). Chief Privacy Officers: Who are they and why education leaders need them. Retrieved from https://cdt.org/files/2019/01/Student-Privacy-Chief-Privacy-Officer-Issue-Brief.pdf
US Department of Education. Family Educational Rights and Privacy Act. Retrieved from https://studentprivacy.ed.gov/?src=fpco
Fornaciari, F. (2018). What is privacy anyway? A longitudinal study of media frames of privacy. Journal of Intellectual Freedom and Privacy, 3(1), 8-20. doi:http://dx.doi.org/10.5860/jifp.v3i1.6414 http://www.ezproxy.dsu.edu:2048/login?url=https://search.proquest.com/docview/2099873116?accountid=27073
Neill, E. (2001). Rites of Privacy and the Privacy Trade : On the Limits of Protection for the Sacred Self. Montreal: MQUP. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=404863&site=ehost-live&scope=site
Solove, D. Conceptualizing Privacy. (2002). California Law Review, 90(4), 1088. https://doi.org/10.2307/3481326 http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=7111919&site=ehost-live&scope=site
Office of Privacy and Data Protection https://privacy.wa.gov/
From state of Washington. Provides guides and checklists related to privacy.
Grumbling, E., National Academies of Sciences, E. and M. (U. S. ., & United States. (2016). Privacy Research and Best Practices : Summary of a Workshop for the Intelligence Community. Washington, DC: National Academies Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1204373&site=ehost-live&scope=site
"An Introduction to Privacy Engineering and Risk Management in Federal Systems" NISTIR 8062 Available at https://doi.org/10.6028/NIST.IR.8062 (PDF below)
CalOPPA: California Online Privacy Protection Act. (2003). https://termsfeed.com/blog/caloppa/
Harris, Kamala. (2014). Making your privacy practices public. Retrieved from https://oag.ca.gov/sites/all/files/agweb/pdfs/cybersecurity/making_your_privacy_practices_public.pdf
DLA Piper Global Data Protection Laws. https://www.dlapiperdataprotection.com/
Organization for Economic Co-operation and Development (OECD). (2013). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Retrieved from http://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. (1995). PDF Retrieved from https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:1995:281:FULL&from=BG HTML Retrieved from https://www.cdt.org/files/privacy/eudirective/EU_Directive_.html#HD_NM_6
EU General Data Protection Regulation. (2019). GDPR Privacy Policy. Retrieved from https://termsfeed.com/blog/gdpr-privacy-policy/
PIPEDA: Personal Information Protection and Electronic Documents Act. Summary retrieved from https://termsfeed.com/blog/pipeda/
Full Act retrieved from https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/
Australia Privacy Act of 1988. Summary retrieved from https://termsfeed.com/blog/australia-privacy-act-1988/ Law retrieved from https://www.oaic.gov.au/privacy-law/privacy-act/
US Department of Health and Human Services. HIPAA Privacy Rule. https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/introduction/index.html
US Department of Health and Human Services. Summary of the HIPAA Privacy Rule. https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html
Fairchild, A. L., Wolfe, D., Colgrove, J. K., & Bayer, R. (2007). Searching Eyes : Privacy, the State, and Disease Surveillance in America. Berkeley: University of California Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=212113&site=ehost-live&scope=site
McDougall, B. S., & Hansson, A. (2002). Chinese Concepts of Privacy. Leiden [Netherlands]: Brill. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=105570&site=ehost-live&scope=site
Ando, C., & R, ơpke, J©œrg. (2015). Public and Private in Ancient Mediterranean Law and Religion. Berlin/Boston: De Gruyter. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=984233&site=ehost-live&scope=site
Orlin, L. C. (2008). Locating Privacy in Tudor London. Oxford: OUP Oxford. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=223877&site=ehost-live&scope=site
Office of Research. University of California Irving. Privacy and Confidentiality. Retrieved from https://www.research.uci.edu/compliance/human-research-protections/researchers/privacy-and-confidentiality.html#privacy
US Department of Health and Human Services. Institutional Review Boards and the HIPAA Privacy Rule. Retrieved from https://privacyruleandresearch.nih.gov/irbandprivacyrule.asp
CITI Program. https://about.citiprogram.org/en/homepage/
APA's Principles of Journalism - While they do not mention privacy specifically, these principles guide journalists. http://americanpressassociation.com/principles-of-journalism/?fbclid=IwAR2H_l9SBKAJv13BCR-LEp7SeeZJuJ4OTd_p-s-RHNyVWx50rFyIHn6oQO4
Privacy for Journalists - This OER from Media Helping Media provides a discussion of privacy in journalism. http://www.mediahelpingmedia.org/training-resources/editorial-ethics/247-privacy-what-it-means-for-journalism?fbclid=IwAR2i2yEpZNBQWAUVhcru8nteoVmLQaYIkeoKA9ux3muxY0i7rnXJpirCv1s
Federal Bureau of Investigation. (n.d.) Privacy Policy. Retrieved from https://www.fbi.gov/privacy_policy
Gregory, A., & Independent Institute, O. C. . (2016). American Surveillance : Intelligence, Privacy, and the Fourth Amendment. Madison, Wisconsin: University of Wisconsin Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1296424&site=ehost-live&scope=site
Beckley, A. (2004). The Future of Privacy in Law Enforcement. FBI Law Enforcement Bulletin, 73(9), 16–23. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=14960925&site=ehost-live&scope=site
Waldo, J., Lin, H., & Millett, L. I. (2007). Engaging privacy and information technology in a digital age. Washington, D.C: National Academies Press. Chapter 9. Retreived from https://www.nap.edu/read/11896/chapter/11
Rengel, A. (2013). Privacy in the 21st Century. Leiden: Brill | Nijhoff. http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=658380&site=ehost-live&scope=site
Regan, P. M. (1995). Legislating Privacy : Technology, Social Values, and Public Policy. Chapel Hill: The University of North Carolina Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1592&site=ehost-live&scope=site
Solove, D. J. (2005). A taxonomy of privacy. U. Pa. L. Rev., 154, 477. Retrieved from https://www.law.upenn.edu/journals/lawreview/articles/volume154/issue3/Solove154U.Pa.L.Rev.477(2006).pdf
Posner, Richard A. (1978). An Economic Theory of Privacy. Regulation 2(3), 19–26. Retrieved from https://object.cato.org/sites/cato.org/files/serials/files/regulation/1978/5/v2n3-4.pdf
Glancy, D.J. (1979). The invention of the right to privacy. Arizona Law Review 21(1), 1-39. Retrieved from http://law.scu.edu/wp-content/uploads/Privacy.pdf
Library Bill of Rights. http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/privacy
Chmara, T. (2009). Privacy and Confidentiality Issues : A Guide for Libraries and Their Lawyers. Chicago: ALA Editions. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=267781&site=ehost-live&scope=site
Magi, T. J. (2011). Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature. Library Quarterly, 81(2), 187–209. Retrieved from https://scholarworks.uvm.edu/cgi/viewcontent.cgi?referer=https://scholar.google.com/&httpsredir=1&article=1004&context=libfacpub
Matthews, J. and Harel, O. (2011). Data confidentiality: A review of methods for statistical disclosure limitation and methods for assessing privacy. Statistics Surveys 5: 1-29. Retrieved from https://projecteuclid.org/download/pdfview_1/euclid.ssu/1296828958
Scoglio, S. (1998). Transforming Privacy : A Transpersonal Philosophy of Rights. Westport, Conn: Greenwood Publishing Group. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=182271&site=ehost-live&scope=site
Elliott, D., & Soifer, E. (2017). Divine omniscience, privacy, and the state. International Journal for Philosophy of Religion, 82(3), 251–271. https://doi.org/10.1007/s11153-017-9612-7 http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=125950775&site=ehost-live&scope=site
Richardson, J. (2011). The Changing Meaning of Privacy, Identity and Contemporary Feminist Philosophy. Minds & Machines, 21(4), 517–532. https://doi.org/10.1007/s11023-011-9257-8 http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=66579488&site=ehost-live&scope=site
Schoeman, F. D. (2001). privacy. In L. C. Becker, & C. B. Becker (Eds.), Encyclopedia of ethics (2nd ed.). London, UK: Routledge. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=https://search.credoreference.com/content/entry/routethics/privacy/0?institutionId=1716
Meijers, A. (2015). philosophy of technology. In R. Audi (Ed.), The Cambridge dictionary of philosophy (3rd ed.). Cambridge, UK: Cambridge University Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=https://search.credoreference.com/content/entry/cupdphil/philosophy_of_technology/0?institutionId=1716
Hinman, L. M. (2018). Basic principles, concepts, and ideas in the philosophy of technology. In A. F. Beavers (Ed.), Macmillan Interdisciplinary handbooks: Philosophy: Technology. New York City, New York: Macmillan US. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=https://search.credoreference.com/content/entry/macuspt/basic_principles_concepts_and_ideas_in_the_philosophy_of_technology/0?institutionId=1716
Privacy. (2018). Stanford Encyclopedia of Philosophy. Retrieved from https://plato.stanford.edu/entries/privacy/
Tunick, M. (2013). Privacy and Punishment. Social Theory & Practice, 39(4), 643–668. https://doi.org/10.5840/soctheorpract201339436 http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=90518801&site=ehost-live&scope=site
Privacy. (2006). In B. S. Turner (Ed.), Cambridge dictionary of sociology. Cambridge, UK: Cambridge University Press. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=https://search.credoreference.com/content/entry/cupsoc/privacy/0?institutionId=1716
Werner, C. M., Brown, B. B., & Altman, I. (2004). Privacy. In C. D. Spielberger (Ed.), Encyclopedia of applied psychology. Oxford, UK: Elsevier Science & Technology. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=https://search.credoreference.com/content/entry/estappliedpsyc/privacy/0?institutionId=1716
Brandeis, L., & Warren, S. (1890). The right to privacy. Harvard law review, 4(5), 193-220. https://www.cs.cornell.edu/~shmat/courses/cs5436/warren-brandeis.pdf
Calo, R. (2016). Privacy and Markets: A Love Story. Notre Dame Law Review, 91(2). https://pdfs.semanticscholar.org/7c79/3f6d06e42680413e1a5b883026be04a32c57.pdf
Cavoukian, A. (2009). Privacy by design: The 7 foundational principles. Information and Privacy Commissioner of Ontario, Canada. https://www.ryerson.ca/pbdce/certification/seven-foundational-principles-of-privacy-by-design/
Hann, I. H., Hui, K. L., Lee, S. Y. T., & Png, I. P. (2007). Overcoming online information privacy concerns: An information-processing theory approach. Journal of Management Information Systems, 24(2), 13-42. Retrieved from https://www.computer.org/csdl/proceedings/hicss/2007/2755/00/27550210b.pdf
Nissenbaum, H. (2011). Contextual Approach to Privacy Online. Dædalus, 140(4), 32-48. https://www.amacad.org/publication/contextual-approach-privacy-online
Posner, Richard A. 1978. The Right of Privacy. Georgia Law Review 12:393-422. Retrieved from https://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1021&context=lectures_pre_arch_lectures_sibley
Prosser, William L.. Privacy, 48 Calif. L. Rev. 383 (1960). https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=3157&context=californialawreview
Rachels, J. (1975). Why privacy is important. Philos Public Aff, 4(4), 323–333. Retrieved from http://public.callutheran.edu/~chenxi/Phil315_062.pdf
Solove, D. (2002). Conceptualizing Privacy. California Law Review, 90(4), 1088. Retrieved from http://www.ezproxy.dsu.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=7111919&site=ehost-live&scope=site. doi:10.2307/3481326
Stigler, George J. 1980. An Introduction to Privacy in Economics and Politics. Journal of Legal Studies 9:623-44. Retrieved from https://www.journals.uchicago.edu/doi/pdfplus/10.1086/467657
Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557-570. https://epic.org/privacy/reidentification/Sweeney_Article.pdf
Westin, A. (2003). Social and Political Dimensions of Privacy. Journal of social issues, 59(2), 431-453. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.455.4866&rep=rep1&type=pdf