References

Nick Doty

UC Berkeley, School of Information

December 18, 2020

Also available as: pdf

Status of This Document

This is the list of cited references of a published dissertation: Enacting Privacy in Internet Standards. While each standalone chapter or subchapter has the references at the end, this document contains all the references from the complete dissertation.

References

“A Brief History of the Internet Advisory / Activities / Architecture Board.” n.d. Internet Architecture Board. Accessed September 8, 2018. https://www.iab.org/about/history/.
Abbate, Janet. 2000. Inventing the Internet. MIT Press.
Alpert, Jesse, and Nisan Hajaj. 2008. “We Knew the Web Was Big...” Official Google Blog (blog). July 25, 2008. https://googleblog.blogspot.com/2008/07/we-knew-web-was-big.html.
Alvestrand, Harald T. 2004. “A Mission Statement for the IETF.” RFC 3935. Request for Comments. RFC Editor. https://rfc-editor.org/rfc/rfc3935.txt.
Anton, James J., and Dennis A. Yao. 1995–1996. “Standard-Setting Consortia, Antitrust, and High-Technology Industries.” Antitrust Law Journal 64: 247. https://heinonline.org/HOL/Page?handle=hein.journals/antil64&id=257&div=&collection=.
Arendt, Hannah. 1958. The Human Condition. University of Chicago Press.
Arkko, Jari, Brian Trammell, Mark Nottingham, Christian Huitema, Martin Thomson, Jeff Tantsura, and Niels ten Oever. 2019. “Considerations on Internet Consolidation and the Internet Architecture.” Internet-draft draft-arkko-iab-internet-consolidation-02. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-arkko-iab-internet-consolidation-02.
Bahajji, Zineb Ait, and Gary Illyes. 2014. “HTTPS as a Ranking Signal.” Google Search Central Blog (blog). August 7, 2014. https://developers.google.com/search/blog/2014/08/https-as-ranking-signal.
Bamberger, Kenneth A. 2006. “Regulation as Delegation: Private Firms, Decisionmaking, and Accountability in the Administrative State.” Duke LJ 56: 377.
Bamberger, Kenneth A., and Deirdre K. Mulligan. 2010. “Privacy on the Books and on the Ground.” Stan. L. Rev. 63: 247.
———. 2015. Privacy on the Ground: Driving Corporate Behavior in the United States and Europe. MIT Press.
Benkler, Yochai. 2002. “Coase’s Penguin, or, Linux and ‘The Nature of the Firm’.” The Yale Law Journal 112 (3): 369–446. https://doi.org/10.2307/1562247.
Bennett, Colin J. 2010. The Privacy Advocates: Resisting the Spread of Surveillance. MIT Press.
Benthall, Sebastian. 2015. “Testing Generative Models of Online Collaboration with BigBang.” In Proceedings of the 14th Python in Science Conference. https://conference.scipy.org/proceedings/scipy2015/pdfs/sebastian{_}benthall.pdf.
Benthall, Sebastian, Seda Gürses, and Helen Nissenbaum. 2017. “Contextual Integrity Through the Lens of Computer Science.” Foundations and Trends in Privacy and Security 2 (1).
Berners-Lee, Tim. 1992. “The World Wide Web Project.” November 3, 1992. http://info.cern.ch/hypertext/WWW/TheProject.html.
———. 2004. “How It All Started.” 2004. https://www.w3.org/2004/Talks/w3c10-HowItAllStarted/.
Bork, Robert H. 1978. The Antitrust Paradox. Basic books New York.
boyd, danah. 2008. “Taken Out of Context: American Teen Sociality in Networked Publics.” SSRN Scholarly Paper ID 1344756. Rochester, NY: Social Science Research Network. https://doi.org/10.2139/ssrn.1344756.
Boyle, James. 2000. “A Nondelegation Doctrine for the Digital Age.” Duke LJ 50: 5.
Braden, R. 1989. “Requirements for Internet Hosts - Communication Layers.” RFC 1122. Request for Comments. RFC Editor. https://tools.ietf.org/html/rfc1122.
Bradner, Scott. 1997. “Key Words for Use in RFCs to Indicate Requirement Levels.” RFC 2119. Request for Comments. RFC Editor. https://tools.ietf.org/html/rfc2119.
Braman, Sandra. 2012. “Privacy by design: Networked computing, 1969–1979.” New Media & Society 14 (5): 798–814. https://doi.org/10.1177/1461444811426741.
Bray, Tim. 2012. “On the Deadness of OAuth 2.” Ongoing (blog). July 28, 2012. https://www.tbray.org/ongoing/When/201x/2012/07/28/Oauth2-dead.
Brooks, Sean, Michael Garcia, Naomi Lefkovitz, Suzanne Lightman, and Ellen Nadeau. 2017. “An Introduction to Privacy Engineering and Risk Management in Federal Systems.” NIST Internal or Interagency Report (NISTIR) 8062. National Institute of Standards and Technology. https://doi.org/https://doi.org/10.6028/NIST.IR.8062.
Bruant, David. 2013. “The W3c Is a Restaurant.” Long-Term Laziness (blog). October 8, 2013. https://longtermlaziness.wordpress.com/2013/10/08/the-w3c-is-a-restaurant/.
Burrell, Jenna. 2009. “The Field Site as a Network: A Strategy for Locating Ethnographic Research.” Field Methods 21 (2): 181–99. https://doi.org/10.1177/1525822X08329699.
Cargill, Carl F. 1989. Information Technology Standardization: Theory, Process, and Organizations. Newton, MA, USA: Digital Press.
Caro, Robert A. 1975. The power broker: Robert Moses and the fall of New York. New York: Vintage Books. http://www.amazon.com/The-Power-Broker-Robert-Moses/dp/0394720245.
Carruthers, Bruce G, and Terence C Halliday. 2006. “Negotiating Globalization: Global Scripts and Intermediation in the Construction of Asian Insolvency Regimes.” Law & Social Inquiry 31 (3): 521–84. https://doi.org/10.1111/j.1747-4469.2006.00022.x.
Cerf, Vinton, and Robert Kahn. 1974. “A Protocol for Packet Network Intercommunication.” IEEE Transactions on Communications 22 (5): 637–48.
Chung, C., A. Kasyanov, J. Livingood, N. Mody, and B. Van. 2011. “Comcast’s Web Notification System Design.” RFC6108. RFC Editor. https://doi.org/10.17487/rfc6108.
Clark, D D, and D R Wilson. 1987. “A Comparison of Commercial and Military Computer Security Policies.” IEEE Symposium on Security and Privacy 0: 184–94. https://doi.org/10.1109/SP.1987.10001.
Clark, David D., John Wroclawski, Karen R. Sollins, and Robert Braden. 2002. “Tussle in Cyberspace: Defining Tomorrow’s Internet.” In Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, 347–56. SIGCOMM ’02. New York, NY, USA: ACM. https://doi.org/10.1145/633025.633059.
Cohen, Julie E. 2012. “What Privacy Is For.” Harv. L. Rev. 126: 1904.
Coleman, E. Gabriella. 2012. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton University Press. http://www.amazon.com/dp/0691144613.
“Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework.” 2010. National Telecommunications and Information Administration, Internet Policy Task Force. https://www.ntia.doc.gov/report/2010/commercial-data-privacy-and-innovation-internet-economy-dynamic-policy-framework.
“Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy.” 2012. White House. http://www.whitehouse.gov/the-press-office/2012/02/23/fact-sheet-plan-protect-privacy-internet-age-adopting-consumer-privacy-b.
Contreras, Jorge L. 2017. “Technical Standards, Standards-Setting Organizations and Intellectual Property: A Survey of the Literature (With an Emphasis on Empirical Approaches).” SSRN Scholarly Paper ID 2900540. Rochester, NY: Social Science Research Network. https://papers.ssrn.com/abstract=2900540.
Crocker, Stephen D. 2009. “How the Internet Got Its Rules.” The New York Times, April 6, 2009, sec. Opinion. https://www.nytimes.com/2009/04/07/opinion/07crocker.html.
Danezis, George, and Seda Gürses. 2010. “A Critical Review of 10 Years of Privacy Technology.” Proceedings of Surveillance Cultures: A Global Surveillance Society. http://www.researchgate.net/publication/228538295_A_critical_review_of_10_years_of_Privacy_Technology/.
Davies, Charlotte Aull. 2012. Reflexive Ethnography: A Guide to Researching Selves and Others. Routledge.
Davis, Michael. 1991. “Thinking Like an Engineer: The Place of a Code of Ethics in the Practice of a Profession.” Philosophy & Public Affairs, 150–67.
DeNardis, Laura. 2009. Protocol Politics: The Globalization of Internet Governance. MIT Press.
———. 2014. The Global War for Internet Governance. Yale University Press.
Department of Health, Education and Welfare. 1973. “Records, Computers and the Rights of Citizens.” https://epic.org/privacy/hew1973report/.
DePillis, Lydia. 2013. “There’s a War in Cyberspace over Icons Vs. Text.” The New Republic, January 17, 2013. https://newrepublic.com/article/111970/app-terms-service-icons-or-text.
Dessart, George. n.d. “Encyclopedia of Television - Standards and Practices.” The Museum of Broadcast Communications. Accessed August 30, 2018. http://www.museum.tv/eotv/standardsand.htm.
DiMaggio, P J, and W W Powell. 1983. “The Iron Cage Revisited: Institutional Isomorphism and Collective Rationality in Organizational Fields.” American Sociological Review 48 (2): 147–60.
DiMaggio, Paul. 1982. “The Structure of Organizational Fields: An Analytical Approach and Policy Implications.” In SUNY-Albany Conference on Organizational Theory and Public Policy.
Dixon, Pam. 2007. “The Network Advertising Initiative: Failing at Consumer Protection and at Self-Regulation.” World Privacy Forum. http://www.worldprivacyforum.org/wp-content/uploads/2007/11/WPF_NAI_report_Nov2_2007fs.pdf.
“‘Do Not Track’ Web System Stuck In Limbo.” 2012. All Things Considered. https://www.npr.org/2012/06/25/155727768/.
Doty, Nick. 2010. “Geolocation, Privacy and the Web.” UC Berkeley TRUST seminar, September. https://npdoty.name/slides/location-privacy-web2.pdf.
———. 2013. “Because You Can Is Reason Enough to Do Something.” Bcc (blog). August 17, 2013. http://bcc.npdoty.name/because-you-can-is-reason-enough-to-do-something.
———. 2015a. “Reviewing for Privacy in Internet and Web Standard-Setting.” In Security and Privacy Workshops (SPW), 2015 IEEE, 185–92. IEEE. https://npdoty.name/privacy-reviews/iwpe/.
———. 2015b. “Interesting Questions I Heard from Students in Class: Standard-Setting and ‘Punting’ Decisions.” Known.npdoty.name (blog). February 24, 2015. http://known.npdoty.name/2015/interesting-questions-i-heard-from-students-in-class-standard-setting-and.
———. 2018. “Standard-Setting Process and Internet Privacy.” presented at the Protocol to the People? Protocol governance and power – from Bitcoin to the Border Gateway Protocol, Turing Institute, London, UK, March 16. https://www.turing.ac.uk/events/protocol-people-protocol-governance-power-bitcoin-border-gateway-protocol/.
———. 2019. “Mitigating Browser Fingerprinting in Web Specifications.” Interest Group Note. Privacy Interest Group (PING). World Wide Web Consortium. https://www.w3.org/TR/2019/NOTE-fingerprinting-guidance-20190328/.
Doty, Nick, and Mohit Gupta. 2013. “Privacy Design Patterns and Anti-Patterns: Patterns Misapplied and Unintended Consequences.” In A Turn for the Worse: Trustbusters for User Interfaces Workshop. http://cups.cs.cmu.edu/soups/2013/trustbusters.html.
Doty, Nick, and Deirdre K. Mulligan. 2013. “Internet Multistakeholder Processes and Techno-Policy Standards: Initial Reflections on Privacy at the World Wide Web Consortium.” Journal on Telecommunications and High Technology Law 11. http://www.jthtl.org/content/articles/V11I1/JTHTLv11i1_MulliganDoty.PDF.
Doty, Nick, Deirdre K Mulligan, and Erik Wilde. 2010. “Privacy Issues of the W3c Geolocation API.” arXiv:1003.1775, March. http://arxiv.org/abs/1003.1775.
Doty, Nick, and Galen Panger. 2015. “Introducing Citizen Technologist, the Blog.” CTSP Blog (blog). September 9, 2015. https://ctsp.berkeley.edu/introducing-citizen-technologist-the-blog/.
Doty, Nick, Heather West, Justin Brookman, Sean Harvey, and Erica Newland. 2019. “Tracking Compliance and Scope.” Working Group Note. Tracking Protection Working Group. World Wide Web Consortium. https://www.w3.org/TR/tracking-compliance/.
Dukes, E. Franklin. 2004. “What We Know about Environmental Conflict Resolution: An Analysis Based on Research.” Conflict Resolution Quarterly 22 (1-2): 191–220. https://doi.org/10.1002/crq.98.
Eaves, David, Ed Felten, Tara McGuinness, Deirdre K. Mulligan, and Jeremy Weinstein. 2020. “Defining Public Interest Technology.” New America (blog). January 22, 2020. http://newamerica.org/pit/blog/defining-public-interest-technology/.
Ebbert, John. 2013. “IAB Vs Mozilla: Randall Rothenberg Takes The Gloves Off.” AdExchanger, July 1, 2013. https://www.adexchanger.com/online-advertising/iab-mozilla/.
Edelman, Gilad. 2020. “‘Do Not Track’ Is Back, and This Time It Might Work.” Wired, October 7, 2020. https://www.wired.com/story/global-privacy-control-launches-do-not-track-is-back/.
Einstein, Albert, and Bertrand Russell. 1955. “The Russell-Einstein Manifesto.” Proceedings of the First Pugwash Conference on Science and World Affairs. https://pugwash.org/1955/07/09/statement-manifesto/.
Emerson, Kirk, Tina Nabatchi, and Stephen Balogh. 2011. “An Integrative Framework for Collaborative Governance.” Journal of Public Administration Research and Theory, May. https://doi.org/10.1093/jopart/mur011.
Emerson, Kirk, Patricia J Orr, Dale L Keyes, and Katherine M Mcknight. 2009. “Environmental conflict resolution: Evaluating performance outcomes and contributing factors.” Conflict Resolution Quarterly 27 (1): 27–64. https://doi.org/10.1002/crq.247.
fantasai, and Florian Rivoal. 2020. “W3c Process Document.” World Wide Web Consortium. https://www.w3.org/2020/Process-20200915/.
“FAQ — WHATWG.” n.d. Web Hypertext Application Technology Working Group (WHATWG). Accessed August 23, 2018. https://whatwg.org/faq.
Farrell, S, and H Tschofenig. 2014. “Pervasive Monitoring Is an Attack.” RFC 7258. RFC Editor. http://tools.ietf.org/html/rfc7258.
Federal Trade Commission. 1998. “Privacy Online: A Report to Congress.” https://www.ftc.gov/reports/privacy-online-report-congress.
Federal Trade Commission, Bureau of Consumer Protection. 1983. “Standards and Certification: Final Staff Report.” Washington, D.C. https://catalog.hathitrust.org/Record/001535861.
Feng, Patrick. 2006. “Shaping Technical Standards: Where Are the Users?” In Shaping Science and Technology Policy: The Next Generation of Research, edited by David H. Guston and Daniel Sarewitz.
Fisher, Roger, William L. Ury, and Bruce Patton. 2011. Getting to Yes: Negotiating Agreement Without Giving in. Penguin.
Flanagan, M., D. Howe, and H. Nissenbaum. 2008. “Embodying Values in Technology: Theory and Practice.” Information Technology and Moral Philosophy, 322–53.
Ford, Paul. 2014. “The Group That Rules the Web.” The New Yorker, November 20, 2014. https://www.newyorker.com/tech/elements/group-rules-web.
Freedman, Tom, Jessica Roeder, Alexander Hart, Kyle Doran, and Kaye Sklar. 2016. “A Pivotal Moment: Developing a New Generation of Technologists for the Public Interest.” Freedman Consulting. http://tfreedmanconsulting.com/reports/a-pivotal-moment-developing-a-new-generation-of-technologists-for-the-public-interest/.
Freeman, Jody. 1997. “Collaborative Governance in the Administrative State.” UCLA L. Rev. 45: 1.
Freeman, Linton C. 1978. “Centrality in Social Networks Conceptual Clarification.” Social Networks 1 (3): 215–39.
Froomkin, A. Michael. 2000. “Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution.” Duke LJ 50: 17.
———. 2003. “Habermas@Discourse. Net: Toward a Critical Theory of Cyberspace.” Harvard Law Review 116 (3): 749–873. https://doi.org/10.2307/1342583.
Funk, William. 1987–1988. “When Smoke Gets in Your Eyes: Regulatory Negotiation and the Public Interest - EPA’s Woodstove Standards.” Environmental Law 18: 55–98.
Gallie, W. B. 1956. “Essentially Contested Concepts.” Proceedings of the Aristotelian Society, New Series, 56 (January): 167–98. http://www.jstor.org/stable/4544562.
Geiger, RS, and David Ribes. 2011. “Trace Ethnography: Following Coordination Through Documentary Practices.” In System Sciences (HICSS), 2011 44th …, 0:1–10. Los Alamitos, CA, USA: IEEE Computer Society. https://doi.org/10.1109/HICSS.2011.455.
Gillies, James, and R Cailliau. 2000. How the Web was born: the story of the World Wide Web. Oxford: Oxford University Press.
Ginsberg, Allen. 1955. Howl. https://www.poetryfoundation.org/poems/49303/howl.
Glaser, Barney G. 1978. Theoretical Sensitivity: Advances in the Methodology of Grounded Theory. Sociology Press.
Guston, David H. 2001. “Boundary Organizations in Environmental Policy and Science: An Introduction.” Science, Technology, & Human Values 26 (4): 399–408. http://www.jstor.org/stable/690161.
Gürses, S., and J. M. del Alamo. 2016. “Privacy Engineering: Shaping an Emerging Field of Research and Practice.” IEEE Security Privacy 14 (2): 40–46. https://doi.org/10.1109/MSP.2016.37.
Haberman, Brian, Joseph Lorenzo Hall, and Jason Livingood. 2020. “Structure of the IETF Administrative Support Activity, Version 2.0.” RFC 8711. Request for Comments. RFC Editor. https://rfc-editor.org/rfc/rfc8711.txt.
Hansen, Marit, John Morris, Alissa Cooper, Rhys Smith, Hannes Tschofenig, Jon Peterson, and Bernard Aboba. 2013. “Privacy Considerations for Internet Protocols.” RFC 6973. Request for Comments. RFC Editor. https://tools.ietf.org/html/rfc6973.
Harter, Philip J. 1982–1983. “Negotiating Regulations: A Cure for Malaise.” Georgetown Law Journal 71: 1. https://heinonline.org/HOL/Page?handle=hein.journals/glj71&id=17&div=&collection=.
Hennink, Monique M, Bonnie N Kaiser, and Vincent C Marconi. 2017. “Code Saturation Versus Meaning Saturation: How Many Interviews Are Enough?” Qualitative Health Research 27 (4): 591–608.
Hine, Christine. 2000. Virtual Ethnography. SAGE.
“History of the Internet.” n.d. APNIC. Accessed August 10, 2018. https://www.apnic.net/about-apnic/organization/history-of-apnic/history-of-the-internet/.
Hoofnagle, Chris Jay. 2016. Federal Trade Commission Privacy Law and Policy. Cambridge University Press.
“Interview with Jon Postel.” 1996. January 29, 1996. http://oceanpark.com/papers/postel.html.
“ISO 1806:2002 - Fishing Nets -- Determination of Mesh Breaking Force of Netting.” 2002. December 2002. https://www.iso.org/standard/28360.html.
“ISO/IEC 27001 Information Security Management.” 2013. Information Security Management Systems. http://www.iso.org/cms/render/live/en/sites/isoorg/home/standards/popular-standards/isoiec-27001-information-securit.html.
Jacobs, Ians. 2009. “Frequently Asked Questions (FAQ) about ISOC and W3c.” World Wide Web Consortium. December 2009. https://www.w3.org/2009/11/isoc-w3c-faq.
Jaffe, Jeff. 2018. “Diversity at W3c; Launch of TPAC Diversity Scholarship | W3c Blog.” W3c Blog (blog). June 20, 2018. https://www.w3.org/blog/2018/06/diversity-at-w3c-launch-of-tpac-diversity-scholarship/.
Kelty, Christopher M. 2008. Two Bits: The Cultural Significance of Free Software. Duke University Press. https://twobits.net/.
Kesteren, Anne van. 2017. “Further Working Mode Changes.” The WHATWG Blog (blog). December 11, 2017. https://blog.whatwg.org/working-mode-changes.
Knobel, Cory, and Geoffrey C. Bowker. 2011. “Values in Design.” Commun. ACM 54 (7): 26–28. https://doi.org/10.1145/1965724.1965735.
Koopman, Colin, and Deirdre K Mulligan. 2013. “Theorizing Privacy’s Contestability: A Multi-Dimensional Analytic of Privacy.”
Kosack, Stephen, and Archon Fung. 2014. “Does Transparency Improve Governance?” Annual Review of Political Science 17: 65–87.
Kostova, Blagovesta, Seda Gürses, and Carmela Troncoso. 2020. “Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign.” arXiv:2007.08613 [Cs], July. http://arxiv.org/abs/2007.08613.
Kumaraguru, Ponnurangam, and Lorrie Faith Cranor. 2005. “Privacy Indexes: A Survey of Westin’s Studies.”
Latour, Bruno. 1987. Science in Action : How to Follow Scientists and Engineers Through Society. Harvard University Press. http://www.amazon.com/dp/0674792904.
———. 2007. Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford University Press, USA.
Leiner, Barry M., Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, and Stephen Wolff. 2009. “A Brief History of the Internet.” SIGCOMM Comput. Commun. Rev. 39 (5): 22–31. https://doi.org/10.1145/1629607.1629613.
Lemley, Mark A. 1995–1996. “Antitrust and the Internet Standardization Problem.” Connecticut Law Review 28: 1041–94. https://heinonline.org/HOL/P?h=hein.journals/conlr28&i=1051.
Leon, Pedro, Blase Ur, Richard Shay, Yang Wang, Rebecca Balebako, and Lorrie Cranor. 2012. “Why Johnny Can’T Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 589–98. CHI ’12. New York, NY, USA: ACM. https://doi.org/10.1145/2207676.2207759.
Lessig, Lawrence. 1999. Code and Other Laws of Cyberspace. Basic Books. http://books.google.com/books?id=0l1qLyT88XEC.
Lind, Edgar Allan, and Tom R. Tyler. 1988. The Social Psychology of Procedural Justice. Springer.
Lipner, S. 2004. “The Trustworthy Computing Security Development Lifecycle.” In 20th Annual Computer Security Applications Conference, 2–13. https://doi.org/10.1109/CSAC.2004.41.
Lofland, John, Lyn H. Lofland, David Snow, and Leon Anderson. 2006. Analyzing Social Settings. 4th ed. Wadsworth.
Luegenbiehl, Heinz C., and Bill Puka. 1983. “Codes of Ethics and the Moral Education of Engineers [with Commentary].” Business & Professional Ethics Journal 2 (4): 41–66.
Lynch, Michael. 2000. “Against Reflexivity as an Academic Virtue and Source of Privileged Knowledge.” Theory, Culture & Society 17 (3): 26–54. https://doi.org/10.1177/02632760022051202.
Lynch, William T., and Ronald Kline. 2000. “Engineering Practice and Engineering Ethics.” Science, Technology, & Human Values 25 (2): 195–225.
Maathuis, I., and W. A. Smit. 2003. “The Battle Between Standards: TCP/IP Vs OSI Victory Through Path Dependency or by Quality?” In ESSDERC 2003. Proceedings of the 33rd European Solid-State Device Research - ESSDERC ’03 (IEEE Cat. No. 03ex704), 161–76. https://doi.org/10.1109/SIIT.2003.1251205.
MacManus, Richard. 2003. “The Read/Write Web.” ReadWrite (blog). April 20, 2003. https://readwrite.com/2003/04/19/the_readwrite_w/.
Manjoo, Farhad. 2013. “The Dumb Argument That 3-D Printers Will Make Gun Control Futile.” Slate Magazine. May 8, 2013. https://slate.com/technology/2013/05/3-d-printed-gun-yes-it-will-be-possible-to-make-weapons-with-3-d-printers-no-that-doesnt-make-gun-control-futile.html.
Marcus, GE. 1983. Elites: Ethnographic Issues. Albuquerque: SAR Press. http://www.amazon.com/Elites-Ethnographic-American-Research-Advanced/dp/193469133X.
Massey, Doreen B. 1994. Space, Place, and Gender. U of Minnesota Press.
Mathew, Ashwin. 2014. “Where in the World Is the Internet? Locating Political Power in Internet Infrastructure.” https://www.ischool.berkeley.edu/research/publications/2014/where-world-internet-locating-political-power-internet-infrastructure.
Mathew, Ashwin, and Coye Cheshire. 2010. “The New Cartographers: Trust and Social Order Within the Internet Infrastructure.” SSRN Scholarly Paper ID 1988216. Rochester, NY: Social Science Research Network. https://papers.ssrn.com/abstract=1988216.
Matias, J. Nathan. 2014. “How to Ethically and Responsibly Identify Gender in Large Datasets.” MediaShift. November 21, 2014. http://mediashift.org/2014/11/how-to-ethically-and-responsibly-identify-gender-in-large-datasets/.
“Mechanism Not Policy.” 2005, July. http://c2.com/cgi/wiki?MechanismNotPolicy.
“Memorandum of Understanding Between W3c and WHATWG.” 2019. May 28, 2019. https://www.w3.org/2019/04/WHATWG-W3C-MOU.html.
Molla, Rani, and Renee Lightner. 2016. “Diversity in Tech Companies.” Wall Street Journal. April 10, 2016. http://graphics.wsj.com/diversity-in-tech-companies/.
Moon, Sangwhan, Travis Leithead, Arron Eicholz, Steve Faulkner, and Alex Danilo. 2017. “HTML 5.2.” W3C Recommendation. World Wide Web Consortium. https://www.w3.org/TR/2017/REC-html52-20171214/.
Morozov, Evgeny. 2013. To Save Everything, Click Here: The Folly of Technological Solutionism. Public Affairs.
Mulligan, Deirdre K., and Nick Doty. 2016. “Design Wars: The FBI, Apple and Hundreds of Millions of Phones.” Citizen Technologist: The CTSP Blog (blog). March 3, 2016. https://ctsp.berkeley.edu/design-wars-fbi-apple/.
Mulligan, Deirdre K., Colin Koopman, and Nick Doty. 2016. “Privacy Is an Essentially Contested Concept: A Multi-Dimensional Analytic for Mapping Privacy.” Phil. Trans. R. Soc. A 374 (2083): 20160118. https://doi.org/10.1098/rsta.2016.0118.
Mulligan, Deirdre K, and Helen Nissenbaum. 2020. “Handoffs.” In Progress.
Nader, Laura. 1972. “Up the Anthropologist: Perspectives Gained from Studying Up.”
Nissenbaum, Helen. 1998. “Values in the Design of Computer Systems.” Computers and Society 28 (1): 38–39. http://www.nyu.edu/projects/nissenbaum/papers/society.pdf.
———. 2004. “Privacy as Contextual Integrity.” Washington Law Review 79 (1): 101–39. http://heinonlinebackup.com/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/washlr79&section=16.
NIST. 2014. “NIST Privacy Engineering Objectives and Risk Model Discussion Draft.” April. http://csrc.nist.gov/projects/privacy{_}engineering/nist_privacy_engr_objectives_risk_model_discussion_draft.pdf.
———. 2015. “Privacy Risk Management for Federal Information Systems.” http://csrc.nist.gov/publications/drafts/nistir-8062/nistir_8062_draft.pdf.
O'Mahony, Siobhán, and Beth A. Bechky. 2008. “Boundary Organizations: Enabling Collaboration Among Unexpected Allies.” Administrative Science Quarterly 53 (3): 422–59. https://doi.org/10.2189/asqu.53.3.422.
O'Neill, Mike. 2018. “Do Not Track and the GDPR.” W3c Blog (blog). June 11, 2018. https://www.w3.org/blog/2018/06/do-not-track-and-the-gdpr/.
“Obligation.” 2018. Order of The Engineer. 2018. http://www.order-of-the-engineer.org/?page_id=6.
Oever, Niels ten, and Davide Beraldo. 2018. “Routes to Rights: Internet Architecture and Values in Times of Ossification and Commercialization.” XRDS: Crossroads, The ACM Magazine for Students 24 (4): 28–31. https://doi.org/10.1145/3220561.
Okumura, Kaori, Yoshiaki Shiraishi, and Akira Iwata. 2013. “Survey on Sense of Security for Registering Privacy Information to Return Refugee Supporting System.” In Symposium on Usable Privacy and Security (SOUPS). https://cups.cs.cmu.edu/soups/2013/trustbusters2013/Sense_of_Security_Refugee_Supporting_System_Okumura.pdf.
Organization for Economic Cooperation and Development. 1980. “Guidelines on the Protection of Privacy and Transborder Flow of Personal Data.” http://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm.
Ortega y Gasset, José, and John William Miller. 1962. History as a System and Other Essays Toward a Philosophy of History. Translated by Helene Weyl. New Ed edition. New York: W. W. Norton & Company.
Ostrom, Elinor. 2015. Governing the Commons. Cambridge university press.
Overell, Paul, and Dave Crocker. 2008. “Augmented BNF for Syntax Specifications: ABNF.” STD 68. Network Working Group. https://tools.ietf.org/html/rfc5234.
Polletta, Francesca. 2004. Freedom Is an Endless Meeting: Democracy in American Social Movements. University of Chicago Press. http://books.google.com/books?id=snugO8KeC2EC.
Postel, Jon. 1981a. “Internet Protocol.” 791. Request for Comments. RFC Editor. https://rfc-editor.org/rfc/rfc791.txt.
———. 1981b. “Transmission Control Protocol.” 793. Request for Comments. RFC Editor. https://rfc-editor.org/rfc/rfc793.txt.
Quine, W. V. 1951. “Two Dogmas of Empiricism.” The Philosophical Review 60 (1): 20–43. https://doi.org/10.2307/2181906.
Rockefeller, John D. 2013. A Status Update on the Development of Voluntary Do-Not-Track Standards. https://www.commerce.senate.gov/public/index.cfm/2013/4/a-status-update-on-the-development-of-voluntary-do-not-track-standards.
Sandelowski, M. 1986. “The problem of rigor in qualitative research.” Advances in nursing science 8 (3): 27–37. http://www.ncbi.nlm.nih.gov/pubmed/3083765.
Savage, Charlie. 2013. “U.S. Weighs Wide Overhaul of Wiretap Laws.” The New York Times, May 8, 2013, sec. U.S. https://www.nytimes.com/2013/05/08/us/politics/obama-may-back-fbi-plan-to-wiretap-web-users.html.
Saxenian, AnnaLee. 1996. Regional Advantage. Harvard University Press.
Schechter, Emily. 2016. Moving Towards a More Secure Web. https://security.googleblog.com/2016/09/moving-towards-more-secure-web.html.
Sebenius, James K. 1983/ed. “Negotiation Arithmetic: Adding and Subtracting Issues and Parties.” International Organization 37 (2): 281–316. https://doi.org/10.1017/S002081830003438X.
“‘Self-Regulation and Privacy Online,’ FTC Report to Congress.” 1999. Federal Trade Commission. July 13, 1999. https://www.ftc.gov/news-events/press-releases/1999/07/self-regulation-and-privacy-online-ftc-report-congress.
“Self-Review Questionnaire: Security and Privacy.” 2020. W3c Technical Architecture Group. World Wide Web Consortium. https://w3ctag.github.io/security-questionnaire/.
Sennett, Richard. 2008. The Craftsman. London: Allen Lane.
Siegman, Tzviya, An Qui Li, and Ada Rose Cannon. 2020. “Positive Work Environment at W3c: Code of Ethics and Professional Conduct.” World Wide Web Consortium. https://www.w3.org/Consortium/cepc/cepc-20200716/.
Simcoe, Timothy. 2014. “Governing the Anticommons: Institutional Design for Standard-Setting Organizations.” Innovation Policy and the Economy 14 (January): 99–128. https://doi.org/10.1086/674022.
Snyder, Pete. 2019. “Privacy Anti-Patterns in Standards.” W3c Blog (blog). June 12, 2019. https://www.w3.org/blog/2019/06/privacy-anti-patterns-in-standards/.
Solove, DJ. 2006. “A Taxonomy of Privacy.” University of Pennsylvania Law Review, no. 477: 477–560. http://www.jstor.org/stable/10.2307/40041279.
Star, Susan Leigh, and James R. Griesemer. 1989. “Institutional Ecology, `Translations’ and Boundary Objects: Amateurs and Professionals in Berkeley’s Museum of Vertebrate Zoology, 1907-39.” Social Studies of Science 19 (3): 387–420. https://doi.org/10.1177/030631289019003001.
Stark, Luke, and Anna Lauren Hoffmann. 2019. “Data Is the New What? Popular Metaphors & Professional Ethics in Emerging Data Culture.” Journal of Cultural Analytics. https://doi.org/10.22148/16.036.
Strauss, Anselm, and Juliet Corbin. 1990. Basics of Qualitative Research. Sage publications.
Sunshine, Joshua, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor. 2009. “Crying Wolf: An Empirical Study of SSL Warning Effectiveness.” In USENIX Security Symposium, 399–416.
Sunstein, Cass R. 2014. “From Technocrat to Democrat.” Harvard Law Review 128 (1): 488–97.
Teece, David J, and Edward F Sherry. 2002. “Standards Setting and Antitrust.” Minn. L. Rev. 87: 1913.
“The Art of Consensus: A Guidebook for W3c Group Chairs, Team Contact and Participants.” n.d. World Wide Web Consortium. Accessed August 25, 2018. https://w3c.github.io/Guide/.
“The ‘Do Not Track’ Setting Doesn’t Stop You from Being Tracked.” 2019. DuckDuckGo Blog (blog). February 5, 2019. https://spreadprivacy.com/do-not-track/.
“The Tao of IETF: A Novice’s Guide to the Internet Engineering Task Force.” 2018. IETF. November 8, 2018. https://www.ietf.org/about/participate/tao/.
Thomson, Martin. 2014. “A Statement.” Internet-Draft draft-thomson-perpass-statement-01. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-thomson-perpass-statement-01.
Tufekci, Zeynep. 2016. “The Real Bias Built In at Facebook.” The New York Times, May 19, 2016, sec. Opinion. https://www.nytimes.com/2016/05/19/opinion/the-real-bias-built-in-at-facebook.html.
Tyler, Tom, and David Markell. 2010. “The Public Regulation of Land-Use Decisions: Criteria for Evaluating Alternative Procedures.” Journal of Empirical Legal Studies 7 (3): 538–73.
Vance, Ashlee. 2011. “This Tech Bubble Is Different.” Bloomberg Businessweek, April 14, 2011. https://www.bloomberg.com/news/articles/2011-04-14/this-tech-bubble-is-different.
Wallace, David Foster. 2005. “This Is Water.”
Warren, Samuel D., and Louis D. Brandeis. 1890. “The Right to Privacy.” Harvard Law Review, 193–220.
Watt, Diane. 2007. “On Becoming a Qualitative Researcher: The Value of Reflexivity.” Qualitative Report 12 (1): 82–101.
Waz, Joe, and Phil Weiser. 2012. “Internet Governance: The Role of Multistakeholder Organizations.” http://www.silicon-flatirons.org/documents/publications/report/InternetGovernanceRoleofMSHOrgs.pdf.
“We’re ISO: We Develop and Publish International Standards.” n.d. International Organization for Standardization. Accessed August 30, 2018. https://www.iso.org/standards.html.
“Web IDL.” 2018. https://heycam.github.io/webidl/.
Werle, R., and E. J. Iversen. 2006. “Promoting Legitimacy in Technical Standardization.” Science, Technology & Innovation Studies 2 (1): 19–39. http://www.sti-studies.de/articles/2006-01/werle.htm.
Westin, A. 2001. “Privacy on & Off the Internet: What Consumers Want.” Technical report, Tech. Report for Privacy & American Business. Hackensack, NJ: Privacy & American Business.
Westin, A.F. 1967. Privacy and Freedom. New York: Atheneum.
Winner, Langdon. 1980. “Do Artifacts Have Politics?” Daedalus 109 (1): 121–36. http://www.jstor.org/stable/20024652.
Wong, Richmond Y., and Deirdre K. Mulligan. 2019. “Bringing Design to the Privacy Table: Broadening ‘Design’ in ‘Privacy by Design’ Through the Lens of HCI.” In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1–17.