-
1
-
-
71649091450
-
Recasting privacy torts in a spaceless world
-
Retrieved from
-
Abril, P. S. (2007). Recasting privacy torts in a spaceless world. Harvard Journal of Law and Technology, 21(1), 1-47. Retrieved from http://jolt.law.harvard.edu/articles/pdf/v21/21HarvJLTech001.pdf
-
(2007)
Harvard Journal of Law and Technology
, vol.21
, Issue.1
, pp. 1-47
-
-
Abril, P.S.1
-
2
-
-
33749386628
-
A privacy paradox: Social networking in the United States
-
Retrieved from
-
Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9). Retrieved from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/1394/1312%23note4 doi: 10.5210/fm.v11i9.1394
-
(2006)
First Monday
, vol.11
, Issue.9
-
-
Barnes, S.B.1
-
3
-
-
37249018138
-
Why youth {black heart suit} social network sites: The role of networked publics in teenage social life
-
In: Buckingham D., editors Cambridge, MA, Cambridge, MA,: MIT Press
-
boyd, d. (2007). Why youth {black heart suit} social network sites: The role of networked publics in teenage social life. In D. Buckingham (Ed.), Youth, identity, and digital media (pp. 119-142). Cambridge, MA: MIT Press.
-
(2007)
Youth, identity, and digital media
, pp. 119-142
-
-
Boyd, D.1
-
4
-
-
84876380912
-
A heuristics approach to understanding privacy-protecting behaviors in digital social environments
-
In: Kerr I., Steeves V., Lucock C., editors New York, NY, New York, NY,: Oxford University Press
-
Carey, R., & Burkell, J. (2009). A heuristics approach to understanding privacy-protecting behaviors in digital social environments. In I. Kerr, V. Steeves, & C. Lucock (Eds.), Lessons from the identity trail (pp. 65-82). New York, NY: Oxford University Press.
-
(2009)
Lessons from the identity trail
, pp. 65-82
-
-
Carey, R.1
Burkell, J.2
-
5
-
-
84859048208
-
Rethinking public privacy in the Internet era: A study of virtual persecution by the Internet crowd
-
Retrieved from
-
Cheung, A. S. Y. (2009). Rethinking public privacy in the Internet era: A study of virtual persecution by the Internet crowd. Journal of Media Law, 2, 191-217. Retrieved from http://ssrn.com/abstract=1683422
-
(2009)
Journal of Media Law
, vol.2
, pp. 191-217
-
-
Cheung, A.S.Y.1
-
6
-
-
72649104980
-
From privacy to liberty: The fourth amendment after Lawrence
-
Crocker, T. P. (2009). From privacy to liberty: The fourth amendment after Lawrence. UCLA Law Review, 1, 1-69.
-
(2009)
UCLA Law Review
, vol.1
, pp. 1-69
-
-
Crocker, T.P.1
-
7
-
-
70450206356
-
Facebook and online privacy: Attitudes, behaviors, and unintended consequences
-
Debatin, B., Lovejoy, J., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15, 83-108. doi: 10.1111/j.1083-6101.2009.01494.x
-
(2009)
Journal of Computer-Mediated Communication
, vol.15
, pp. 83-108
-
-
Debatin, B.1
Lovejoy, J.2
Horn, A.K.3
Hughes, B.N.4
-
9
-
-
77953552698
-
Privacy, free speech, and 'blurry-edged' social networks
-
Retrieved from
-
Gelman, L. A. (2009). Privacy, free speech, and 'blurry-edged' social networks. Boston College Law Review, 50, 1315-1344. Retrieved from http://ssrn.com/abstract=1520111
-
(2009)
Boston College Law Review
, vol.50
, pp. 1315-1344
-
-
Gelman, L.A.1
-
10
-
-
84903785188
-
-
Connected things, privacy and public space: Approach to a taxonomy. Paper prepared for Insights on Privacy Speaker Series, Office of the Privacy Commissioner of Canada, Ottawa, Ontario. Retrieved December 7, 2013, from
-
Greenfield, A. (2011, April 20). Connected things, privacy and public space: Approach to a taxonomy. Paper prepared for Insights on Privacy Speaker Series, Office of the Privacy Commissioner of Canada, Ottawa, Ontario. Retrieved December 7, 2013, from http://www.priv.gc.ca/information/research-recherche/2011/greenfield_201104_e.asp
-
(2011)
-
-
Greenfield, A.1
-
11
-
-
68949182898
-
Saving Facebook
-
Retrieved from
-
Grimmelmann, J. (2009). Saving Facebook. Iowa Law Review, 94, 1139-1206. Retrieved from http://ssrn.com/abstract=1262822
-
(2009)
Iowa Law Review
, vol.94
, pp. 1139-1206
-
-
Grimmelmann, J.1
-
15
-
-
77952532093
-
Applying the fourth amendment to the Internet: A general approach
-
Retrieved from
-
Kerr, O. S. (2010). Applying the fourth amendment to the Internet: A general approach. Stanford Law Review, 62, 1004-1049. Retrieved from http://ssrn.com/abstract=1348322
-
(2010)
Stanford Law Review
, vol.62
, pp. 1004-1049
-
-
Kerr, O.S.1
-
16
-
-
37249066763
-
Publicly private and privately public: Social networking and YouTube
-
Retrieved from
-
Lange, P. (2007). Publicly private and privately public: Social networking and YouTube. Journal of Computer-Mediated Communication, 13(1). Retrieved from http://jcmc.indiana.edu/vol13/issue1/lange.html doi: 10.1111/j.1083-6101.2007.00400.x
-
(2007)
Journal of Computer-Mediated Communication
, vol.13
, Issue.1
-
-
Lange, P.1
-
17
-
-
79960584939
-
Mobile snapshots and public-private boundaries
-
Lee, D. H. (2009). Mobile snapshots and public-private boundaries. Knowledge, Technology and Policy, 22(3), 161-171. doi: 10.1007/s12130-009-9081-0
-
(2009)
Knowledge, Technology and Policy
, vol.22
, Issue.3
, pp. 161-171
-
-
Lee, D.H.1
-
18
-
-
70449672581
-
Friending': London-based undergraduates' experience of Facebook
-
Lewis, J., & West, A. (2009). 'Friending': London-based undergraduates' experience of Facebook. New Media and Society, 11(7), 1209-1229. doi: 10.1177/1461444809342058
-
(2009)
New Media and Society
, vol.11
, Issue.7
, pp. 1209-1229
-
-
Lewis, J.1
West, A.2
-
19
-
-
61249418949
-
Privacy in public places
-
Moreham, N. A. (2006). Privacy in public places. Cambridge Law Journal, 65(3), 606-635. doi: 10.1017/S0008197306007240
-
(2006)
Cambridge Law Journal
, vol.65
, Issue.3
, pp. 606-635
-
-
Moreham, N.A.1
-
21
-
-
0032282474
-
Protecting privacy in and information age: The problem of privacy in public
-
Retrieved from
-
Nissenbaum, H. F. (1998). Protecting privacy in and information age: The problem of privacy in public. Law and Philosophy, 17, 559-596. Retrieved from http://www.nyu.edu/projects/nissenbaum/papers/privacy.pdf
-
(1998)
Law and Philosophy
, vol.17
, pp. 559-596
-
-
Nissenbaum, H.F.1
-
22
-
-
84903795840
-
-
Park v. Mullin, BCSC 1813
-
Park v. Mullin, BCSC 1813 (2005).
-
(2005)
-
-
-
23
-
-
77949342965
-
Trends in online social networking: Adolescent use of Myspace over time
-
Patchin, J. W., & Hinduja, S. (2010). Trends in online social networking: Adolescent use of Myspace over time. New Media and Society, 12(2), 197-216. doi: 10.1177/1461444809341857
-
(2010)
New Media and Society
, vol.12
, Issue.2
, pp. 197-216
-
-
Patchin, J.W.1
Hinduja, S.2
-
25
-
-
84903759377
-
-
R. v. Plant, 3 S.C.R. 281
-
R. v. Plant, 3 S.C.R. 281 (1993).
-
(1993)
-
-
-
26
-
-
84903776236
-
-
R. v. Tessling, 3 S.C.R. 432
-
R. v. Tessling, 3 S.C.R. 432 (2004).
-
(2004)
-
-
-
27
-
-
84903754142
-
-
The tone of life on social networking sites. Pew Research Center's Internet and American Life Project. Retrieved from
-
Rainie, L., Lenhart, A., & Smith, A. (2012). The tone of life on social networking sites. Pew Research Center's Internet and American Life Project. Retrieved from http://pewinternet.org/Reports/2012/Social-networking-climate.aspx
-
(2012)
-
-
Rainie, L.1
Lenhart, A.2
Smith, A.3
-
28
-
-
34250001672
-
What anyone can know: The privacy risks of social networking sites
-
Rosenblum, D. (2007). What anyone can know: The privacy risks of social networking sites. Security and Privacy, 5(30), 40-49. doi: 10.1109/MSP.2007.75
-
(2007)
Security and Privacy
, vol.5
, Issue.30
, pp. 40-49
-
-
Rosenblum, D.1
-
30
-
-
84903765499
-
-
Sparks v. Dubé
-
Sparks v. Dubé, NBQB 40 (2011).
-
(2011)
NBQB 40
-
-
-
32
-
-
76649096745
-
Public dialogs in social networks: What is their purpose?
-
Thelwall, M., & Wilkinson, D. (2010). Public dialogs in social networks: What is their purpose? Journal of the American Society for Information Science and Technology, 61(2), 392-404. doi:10.1002/asi.21241
-
(2010)
Journal of the American Society for Information Science and Technology
, vol.61
, Issue.2
, pp. 392-404
-
-
Thelwall, M.1
Wilkinson, D.2
-
33
-
-
84903762930
-
-
March 21, Guardian.co.uk. Retrieved from
-
Tsjeng, Z. (2010, March 21). Facebook: Why we can't live without it. Guardian.co.uk. Retrieved from http://www.guardian.co.uk/technology/2010/mar/21/facebook-cant-live-without-it
-
(2010)
Facebook: Why we can't live without it
-
-
Tsjeng, Z.1
-
34
-
-
84903764578
-
What makes information 'public'?
-
Retrieved from
-
Tverdek, E. (2008). What makes information 'public'? Public Affairs Quarterly, 22(1), 63-77. Retrieved from http://www.jstor.org/stable/40441479
-
(2008)
Public Affairs Quarterly
, vol.22
, Issue.1
, pp. 63-77
-
-
Tverdek, E.1
-
35
-
-
84903776587
-
-
May 14, Facebook remains top social network, Google+, YouTube battle for second. ZDNet.com. Retrieved from
-
Vaughan-Nichols, S. (2013, May 14). Facebook remains top social network, Google+, YouTube battle for second. ZDNet.com. Retrieved from http://www.zdnet.com/facebook-remains-top-social-network-google-youtube-battle-for-second-7000015303/
-
(2013)
-
-
Vaughan-Nichols, S.1
-
36
-
-
21344455275
-
Bloggers' expectations of privacy and accountability: An initial survey
-
Article 12. Retrieved from
-
Viégas, F. B. (2005). Bloggers' expectations of privacy and accountability: An initial survey. Journal of Computer-Mediated communication, 10(3), Article 12. Retrieved from http://jcmc.indiana.edu/vol10/issue3/viegas.html
-
(2005)
Journal of Computer-Mediated communication
, vol.10
, Issue.3
-
-
Viégas, F.B.1
|