Some of the materials referenced while writing posts on Privacy and Security:

  • Agence France-Presse, 2018. Why thousands of people in this country got microchip implants - party [WWW Document]. South China Morning Post. URL https://www.scmp.com/news/world/europe/article/2145896/thousands-people-sweden-get-microchip-implants-new-way-life (accessed 4.28.19).
  • Anderson, T., 2019. Challenges and Opportunities for use of Social Media in Higher Education. J. Learn. Dev. - JL4D 6.
  • Bélanger, F., Crossler, R.E., 2011. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Q. 35, 1017–1041. https://doi.org/10.2307/41409971
  • Bhandari, S., Jaballah, W.B., Jain, V., Laxmi, V., Zemmari, A., Gaur, M.S., Mosbah, M., Conti, M., 2017. Android inter-app communication threats and detection techniques. Comput. Secur. 70, 392–421. https://doi.org/10.1016/j.cose.2017.07.002
  • Bort, J., 2019. Amazon’s warehouse-worker tracking system can automatically pick people to fire without a human supervisor’s involvement [WWW Document]. Bus. Insid. URL https://www.businessinsider.com/amazon-system-automatically-fires-warehouse-workers-time-off-task-2019-4 (accessed 4.28.19).
  • Brin, S., Page, L., 1998. The anatomy of a large-scale hypertextual Web search engine. Comput. Netw. ISDN Syst., Proceedings of the Seventh International World Wide Web Conference 30, 107–117. https://doi.org/10.1016/S0169-7552(98)00110-X
  • Cambria, E., 2016. Affective Computing and Sentiment Analysis. IEEE Intell. Syst. 31, 102–107. https://doi.org/10.1109/MIS.2016.31
  • Cavoukian, A., 2012. Privacy by Design [Leading Edge]. IEEE Technol. Soc. Mag. 31, 18–19. https://doi.org/10.1109/MTS.2012.2225459
  • Crawford, K., Schultz, J., 2014. Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms. Boston Coll. Law Rev. 93–128.
  • Dinev, T., 2014. Why would we care about privacy? Eur. J. Inf. Syst. 23, 97–102. https://doi.org/10.1057/ejis.2014.1
  • Eaton, B., Elaluf-Calderwood, S., Sorensen, C., Yoo, Y., 2015. Distributed tuning of boundary resources: the case of Apple’s iOS service system. MIS Q. Manag. Inf. Syst. 39, 217–243.
  • Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D., 2011. A Survey of Mobile Malware in the Wild, in: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM ’11. ACM, New York, NY, USA, pp. 3–14. https://doi.org/10.1145/2046614.2046618
  • Fuchs, C., 2012. The Political Economy of Privacy on Facebook. Telev. New Media 13, 139–159. https://doi.org/10.1177/1527476411415699
  • Goldstein, J., 2014. To Increase Productivity, UPS Monitors Drivers’ Every Move [WWW Document]. NPR.org. URL https://www.npr.org/sections/money/2014/04/17/303770907/to-increase-productivity-ups-monitors-drivers-every-move (accessed 4.28.19).
  • Harari, Y.N., 2018. 21 Lessons for the 21st Century. Random House Publishing Group.
  • Harari, Y.N., 2016. Homo Deus: A Brief History of Tomorrow. Harvill Secker.
  • Hatfield, E., Cacioppo, J.T., Rapson, R.L., 1993. Emotional Contagion. Curr. Dir. Psychol. Sci. 2, 96–100. https://doi.org/10.1111/1467-8721.ep10770953
  • Herman, E.S., Chomsky, N., 2010. Manufacturing Consent: The Political Economy of the Mass Media. Random House.
  • Jain, A.K., Shanbhag, D., 2012. Addressing Security and Privacy Risks in Mobile Applications. IT Prof. 14, 28–33. https://doi.org/10.1109/MITP.2012.72
  • Kramer, A.D.I., Guillory, J.E., Hancock, J.T., 2014. Experimental evidence of massive-scale emotional contagion through social networks. Proc. Natl. Acad. Sci. 111, 8788–8790. https://doi.org/10.1073/pnas.1320040111
  • Leahy, J., 2018. FT Surging support for Brazil’s Lula da Silva unnerves markets [WWW Document]. Financ. Times. URL https://www.ft.com/content/e20c2888-a67f-11e8-8ecf-a7ae1beff35b (accessed 4.28.19).
  • Leahy, J., Schipani, A., 2018. FT How social media exposed the fractures in Brazilian democracy [WWW Document]. Financ. Times. URL https://www.ft.com/content/8c08654a-c0b1-11e8-8d55-54197280d3f7 (accessed 4.28.19).
  • Lohtia, R., Donthu, N., Hershberger, E.K., 2003. The Impact of Content and Design Elements on Banner Advertising Click-through Rates. J. Advert. Res. 43, 410–418. https://doi.org/10.1017/S0021849903030459
  • Markus, M.L., 1983. Power, Politics, and MIS Implementation. Commun ACM 26, 430–444. https://doi.org/10.1145/358141.358148
  • McNamee, R., 2019. Zucked: Waking Up to the Facebook Catastrophe. Penguin Publishing Group.
  • Mills, E., Press, A., 2017. Tech company holds “chip party” to implant microchips in more than 40 workers. The Telegraph.
  • Nguyen, T.T., Hui, P.-M., Harper, F.M., Terveen, L., Konstan, J.A., 2014. Exploring the Filter Bubble: The Effect of Using Recommender Systems on Content Diversity, in: Proceedings of the 23rd International Conference on World Wide Web, WWW ’14. ACM, New York, NY, USA, pp. 677–686. https://doi.org/10.1145/2566486.2568012
  • Noble, S.U., 2018. Algorithms of Oppression: How Search Engines Reinforce Racism. NYU Press.
  • Orlikowski, W.J., 1991. Integrated information environment or matrix of control? The contradictory implications of information technology. Account. Manag. Inf. Technol. 1, 9–42. https://doi.org/10.1016/0959-8022(91)90011-3
  • Serra, R., Weyergraf-Serra, C., 1980. Richard Serra, Interviews, Etc., 1970-1980. Hudson River Museum.
  • Shimp, G., 2017. How Digital Transformation Is Rewriting Business Models [WWW Document]. URL https://www.digitalistmag.com/digital-economy/2017/04/19/digital-transformation-rewriting-business-models-05042457 (accessed 4.29.19).
  • Shoshana Zuboff, 2019. Democracy Now Interview with Shoshana Zuboff.
  • Silver, V., 2017. The German Far Right Finds Friends Through Facebook.
  • Sipior, JaniceC., Ward, BurkeT., Mendoza, RubenA., 2011. Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons. J. Internet Commer. 10, 1–16. https://doi.org/10.1080/15332861.2011.558454
  • Smith, H.J., Dinev, T., Xu, H., 2011. Information Privacy Research: An Interdisciplinary Review. MIS Q. 35, 980-A27.
  • Sørensen, C., 2011. Enterprise Mobility: Tiny Technology with Global Impact on Work [WWW Document]. URL https://www.dawsonera.com/readonline/9780230306202 (accessed 1.15.19).
  • Wright, R.T., Jensen, M.L., Thatcher, J.B., Dinger, M., Marett, K., 2014. Research Note—Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance. Inf. Syst. Res. 25, 385–400. https://doi.org/10.1287/isre.2014.0522
  • Wykes, T., 2019. Racing towards a digital paradise or a digital hell? J Ment Health 28, 1–3. https://doi.org/10.1080/09638237.2019.1581360
  • Zagal, J.P., Björk, S., Lewis, C., 2013. Dark Patterns in the Design of Games. Presented at the Foundations of Digital Games 2013.
  • Zuboff, S., 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. Profile Books.
  • Zuboff, S., 2015. Big other: Surveillance Capitalism and the Prospects of an Information Civilization. J. Inf. Technol. 30, 75–89. https://doi.org/10.1057/jit.2015.5