Bibliography

Live monitoring helps engine manufacturers track performance. The Telegraph Online, Nov. 2010. URL https://www.telegraph.co.uk/travel/travelnews/8111075/Live-monitoring-helps-engine-manufacturers-track-performance.html. 63

20 Minuten. Cumulus: Migros musste daten der polizei geben. 20 Minuten, Aug. 2004. URL http://www.20min.ch/news/kreuz_und_quer/story/29046904. 2

G. D. Abowd. What next, ubicomp?: celebrating an intellectual disappearing act. In ACM Conference on Ubiquitous Computing (UbiComp ’12), page 31, New York, USA, 2012. ACM. ISBN 9781450312240. DOI: 10.1145/2370216.2370222. 58

G. D. Abowd and E. D. Mynatt. Charting past, present, and future research in ubiquitous computing. ACM Transactions on Computer-Human Interaction (TOCHI), 7(1):29–58, 2000. DOI: 10.1145/344949.344988. 45, 51, 52, 53

M. Ackerman and T. Darrell. Privacy in context. Human-Computer Interaction, 16(2-4):167–176, 2001. DOI: 10.1207/s15327051hci16234_03. 81

M. S. Ackermann and S. D. Mainwaring. Privacy issues and human-computer interaction. In L. F. Cranor and S. Garfinkel, editors, Security and Usability, chapter 19, pages 381–400. O’Reilly, 2005. ISBN 0-596-00827-9. 62, 76

A. Acquisti and C. M. Fong. An experiment in hiring discrimination via online social networks. resreport, SSRN, 2014. URL http://ssrn.com/abstract=2031979. DOI: 10.2139/ssrn.2031979. 67

A. Acquisti and J. Grossklags. Privacy and rationality in individual decision making. IEEE Security & Privacy, 3(1):26–33, Jan. 2005. ISSN 1540-7993. DOI: 10.1109/msp.2005.22. 73

A. Acquisti, R. Gross, and F. Stutzman. Face recognition and privacy in the age of augmented reality. Journal of Privacy and Confidentiality, 6(2):1, 2014. URL http://repository.cmu.edu/jpc/vol6/iss2/1/. DOI: 10.29012/jpc.v6i2.638. 66

A. Acquisti, L. Brandimarte, and G. Loewenstein. Privacy and human behavior in the age of information. Science, 347(6221):509–514, Jan. 2015. ISSN 0036-8075, 1095-9203. DOI: 10.1126/science.aaa1465. 3, 71, 73, 78, 80

A. Acquisti, I. Adjerid, R. Balebako, L. Brandimarte, L. F. Cranor, S. Komanduri, P. G. Leon, N. Sadeh, F. Schaub, M. Sleeper, Y. Wang, and S. Wilson. Nudges for privacy and security: understanding and assisting users’ choices online. ACM Computing Surveys, 50(3):1–41, Aug. 2017. ISSN 03600300. DOI: 10.1145/3054926. 71, 73, 74, 76, 80

F. Adib, Z. Kabelac, and D. Katabi. Multi-person localization via RF body reflections. In Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15), pages 279–292, 2015. ISBN 9781931971096. 64

Y. Agarwal and M. Hall. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys ’13, pages 97–110, New York, NY, USA, 2013. ACM. ISBN 978-1-4503-1672-9. DOI: 10.1145/2462456.2464460. 77

I. Altman. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks/Cole Publishing company, Monterey, California, 1975. 39, 79

R. Anderson. Security Engineering. Wiley, 2nd edition, 2008. ISBN 978-0-470-06852-6. URL http://www.cl.cam.ac.uk/~rja14/book.html. 58

APEC. Apec privacy framework. Asia-Pacific Economic Cooperation, 2017. URL https://www.apec.org/Publications/2017/08/APEC-Privacy-Framework-(2015). 21

Apple. iPhone XS A12 Bionic. https://www.apple.com/iphone-xs/a12-bionic/, 2018. 46

H. Arendt. The Human Condition. University of Chicago Press, Chicago, 1958. DOI: 10.2307/40097657. 34

Article 29 Data Protection Working Party. Advice paper on essential elements of a definition and a provision on profiling within the eu general data protection regulation. http://ec.europa.eu/justice/data-protection/article-29/documentation/other-document/files/2013/20130513_advice-paper-on-profiling_en.pdf, May 2013. 65

P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter. Enterprise privacy authorization language (EPAL 1.2). W3C member submission, W3C, 2003. 72

L. Atzori, A. Iera, and G. Morabito. The Internet of Things: a survey. Computer Networks, 54 (15):2787–2805, 2010. DOI: 10.1016/j.comnet.2010.05.010. 49

E. Baard. Buying trouble – your grocery list could spark a terror probe. The Village Voice, July 2002. URL http://www.villagevoice.com/issues/0230/baard.php. 30

M. Backes and D. Markus. Enterprise privacy policies and languages. In Digital Privacy: Theory, Technologies, and Practices, chapter 7, pages 135–153. Auerbach Publications, 2008. DOI: 10.1201/9781420052183.ch7. 72

M. M. Baig and H. Gholamhosseini. Smart health monitoring systems: an overview of design and modeling. Journal of Medical Systems, 37(2):9898, Apr. 2013. ISSN 0148-5598. DOI: 10.1007/s10916-012-9898-z. 50

T. M. Banks. GDPR matchup: Canada’s personal information protection and electronic documents act. IAPP Privacy Tracker, May 2, 2017, 2017. URL https://iapp.org/news/a/matchup-canadas-pipeda-and-the-gdpr/. 21

J. Bardram and A. Friday. Ubiquitous computing systems. In J. Krumm, editor, Ubiquitous Computing Fundamentals, chapter 2, pages 37–94. CRC Press, 2009. DOI: 10.1201/9781420093612.ch2. 52

J. P. Barlow. A declaration of the independence of cyberspace. EFF Website. https://www.eff.org/cyberspace-independence 11

D. Barrett. One surveillance camera for every 11 people in Britain, says CCTV survey. The Telegraph, 2013. http://www.telegraph.co.uk/technology/10172298/One-surveillance-camera-for-every-11-people-in-Britain-says-CCTV-survey.html. 21

R. F. Baumeister and M. R. Leary. The need to belong: desire for interpersonal attachments as a fundamental human motivation. Psychological bulletin, 117(3):497, 1995. DOI: 10.1037/0033-2909.117.3.497. 34

R. Beckwith. Designing for ubiquity: the perception of privacy. IEEE Pervasive Computing, 2 (2):40–46, Apr. 2003. ISSN 1536-1268. DOI: 10.1109/mprv.2003.1203752. 49

K. Benitez and B. Malin. Evaluating re-identification risks with respect to the HIPAA privacy rule. Journal of the American Medical Informatics Association : JAMIA, 17(2):169–77, Jan. 2010. ISSN 1527-974X. DOI: 10.1136/jamia.2009.000026. 41

J. Bentham. Panopticon. In M. Bozovic, editor, The Panopticon Writings (1995). Verso, London, 1787. 40

B. Berendt, O. Günther, and S. Spiekermann. Privacy in e-commerce: stated preferences vs. actual behavior. Communications of the ACM, 48(4):101–106, Apr. 2005. ISSN 00010782. DOI: 10.1145/1053291.1053295. 22

H. Berghel. Identity theft, social security numbers, and the Web. Communications of the ACM, 43(2):17–21, Feb. 2000. ISSN 00010782. DOI: 10.1145/328236.328114. 66

K. Bernsmed, I. A. Tøndel, and A. A. Nyre. Design and implementation of a CBR-based privacy agent. In Seventh International Conference on Availability, Reliability and Security (ARES ’12), pages 317–326. IEEE, Aug. 2012. ISBN 978-1-4673-2244-7. DOI: 10.1109/ares.2012.60. 80

J. Bhatia, T. D. Breaux, J. R. Reidenberg, and T. B. Norton. A theory of vagueness and privacy risk perception. In 2016 IEEE 24th International Requirements Engineering Conference (RE), pages 26–35, Sept. 2016. DOI: 10.1109/re.2016.20. 75

M. Billinghurst and T. Starner. Wearable devices: new ways to manage information. Computer, 32(1):57–64, Jan. 1999. ISSN 0018-9162. 00272. DOI: 10.1109/2.738305. 46

I. Bilogrevic, K. Huguenin, B. Agir, M. Jadliwala, and J.-P. Hubaux. Adaptive information-sharing for privacy-aware mobile social networks. In ACM international joint conference on Pervasive and ubiquitous computing (UbiComp 13), page 657, New York, USA, 2013. ACM. ISBN 9781450317702. DOI: 10.1145/2493432.2493510. 77

A. Bogle. Who owns music, video, e-books after you die? Slate.com, Aug. 2014. URL https://www.slate.com/blogs/future_tense/2014/08/22/digital_assets_and_death_who_owns_music_video_e_books_after_you_die.html?via=gdpr-consent. 60

J. Bohn, V. Coroama, M. Langheinrich, F. Mattern, and M. Rohs. Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. In W. Weber, J. M. Rabaey, and E. Aarts, editors, Ambient Intelligence, volume 10, chapter 1, pages 5–29. Springer, 2005. DOI: 10.1007/3-540-27139-2_2. 62

D. Brin. The Transparent Society. Perseus Books, Reading MA, 1998. 30

H. P. Brougham. Historical Sketches of Statesmen Who Flourished in the Time of George III, volume 1. Lea & Blanchard, Philadephia, PA, USA, 1839. As quoted in Platt [1989]. 8, 31

A. Buchenscheit, B. Könings, A. Neubert, F. Schaub, M. Schneider, and F. Kargl. Privacy implications of presence sharing in mobile messaging applications. In MUM 2014, pages 20–29. ACM Press, 2014. ISBN 9781450333047. DOI: 10.1145/2677972.2677980. 67

H. Burkert. Privacy - data protection – a German/European perspective. In C. Engel and K. H. Keller, editors, Governance of Global Networks in the Light of Differing Local Values, Law and Economics of International Telecommunications 43, pages 43–69. Nomos, Baden-Baden, 2000. URL http://www.coll.mpg.de/sites/www/files/text/burkert.pdf. 43

L. A. Bygrave. Data Privacy Law - An International Perspective. Oxford University Press, Jan. 2014. ISBN 9780199675555. DOI: 10.1093/acprof:oso/9780199675555.001.0001. 43

R. Caceres and A. Friday. Ubicomp systems at 20: progress, opportunities, and challenges. IEEE Pervasive Computing, 11(1):14–21, Jan. 2012. ISSN 1536-1268. DOI: 10.1109/mprv.2011.85. 52

R. Carroll and S. Prickett, editors. The Bible. Oxford University Press, Oxford, UK, 2008. ISBN 978-0199535941. DOI: 10.1093/oseo/instance.00016818. 8, 9

J. Cas. Privacy in pervasive computing environments - a contradiction in terms? IEEE Technology and Society Magazine, 24(1):24–33, Jan. 2005. ISSN 0278-0097. DOI: 10.1109/mtas.2005.1407744. 62

F. H. Cate. The Limits of Notice and Choice. IEEE Security & Privacy, 8(2):59–62, 2010. ISSN 1540-7993. DOI: 10.1109/msp.2010.84. 73, 75, 76

F. H. Cate. Privacy in the Information Age. The Brookings Institution, Washington, D.C., USA, online edition, 1997. URL brookings.nap.edu/books/0815713169/html. 15, 37, 121

F. H. Cate. The failure of fair information practice principles. In J. K. Winn, editor, Consumer Protection in the Age of the ‘Information Economy’, chapter 13, pages 341–378. Routledge, 2006. URL https://ssrn.com/abstract=1156972. 14

A. Cavoukian. Privacy by Design … Take the Challenge. Information and Privacy Commissioner of Ontario, Canada, 2009. URL http://privacybydesign.ca. 87

R. N. Charette. Michigan’s MiDAS unemployment system: algorithm alchemy created lead, not gold - IEEE spectrum. IEEE Spectrum, 18(3):6, 2018. URL https://spectrum.ieee.org/riskfactor/computing/software/michigans-midas-unemployment-system-algorithm-alchemy-that-created-lead-not-gold. 67, 83

D. Chen, S. P. Fraiberger, R. Moakler, and F. Provost. Enhancing transparency and control when drawing data-driven inferences about individuals. Big Data, 5(3):197–212, 2016. DOI: 10.1089/big.2017.0074. 84

S. Chitkara, N. Gothoskar, S. Harish, J. I. Hong, and Y. Agarwal. Does this app really need my location?: context-aware privacy management for smartphones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1(3):42:1–42:22, Sept. 2017. ISSN 2474-9567. DOI: 10.1145/3132029. 81

G. Chittaranjan, J. Blom, and D. Gatica-Perez. Who’s who with Big-Five: analyzing and classifying personality traits with smartphones. In 2011 15th Annual International Symposium on Wearable Computers, pages 29–36. IEEE, jun 2011. ISBN 978-1-4577-0774-2. DOI: 10.1109/iswc.2011.29. 66

R. Clarke. Beyond the OECD guidelines: privacy protection for the 21st century. http://www.rogerclarke.com/DV/PP21C.html, Jan. 2000. 11, 14

R. Clarke. What’s ‘privacy’? http://www.rogerclarke.com/DV/Privacy.html, Aug. 2006. DOI: 10.1163/9789004192195_004. 13, 14, 26, 43

R. Clarke. Privacy impact assessment: its origins and development. Computer Law & Security Review, 25(2):123–135, Jan. 2009. ISSN 0267-3649. DOI: 10.1016/j.clsr.2009.02.002. 88

P. Cochrane. Head to head. Sovereign Magazine, pages 56–57, 2000. URL http://www.cochrane.org.uk/opinion/papers/prof.htm. 24

J. E. Cohen. Examined lives: Informational privacy and the subject as object. Stanford Law Review, 52:1373–1437, May 2000. URL http://www.law.georgetown.edu/faculty/jec/examined.pdf. As cited in Solove and Rotenberg [2003]. DOI: 10.2307/1229517. 28

G. Cohn, S. Gupta, J. Froehlich, E. Larson, and S. N. Patel. GasSense: appliance-level, singlepoint sensing of gas activity in the home. In P. Floréen, A. Krüger, and M. Spasojevic, editors, Pervasive Computing. Pervasive 2010., pages 265–282, Berlin, Heidelberg, 2010. Springer. DOI: 10.1007/978-3-642-12654-3_16. 64

A. Compton. British tourists detained, deported for tweeting “destroy America”, Jan. 2012. URL http://www.huffingtonpost.com/2012/01/30/british-tourists-deported-for-tweeting_n_1242073.html. 23

J. Cornwell, I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, L. Bauer, L. F. Cranor, J. Hong, B. McLaren, M. Reiter, and N. Sadeh. User-controllable security and privacy for pervasive computing. In Eighth IEEE Workshop on Mobile Computing Systems and Applications (HotMobile ’07), pages 14–19. IEEE, Mar. 2007. ISBN 0-7695-3001-X. DOI: 10.1109/wm-csa.2007.4389552. 77

Council of Europe. Convention for the protection of human rights and fundamental freedoms. CETS 005, Nov. 1950. URL conventions.coe.int/Treaty/en/Treaties/Html/005.htm. 10

Council of Europe. Resolution (73) 22 on the protection of the privacy of individuals vis-à-vis electronic data banks in the private sector, 1973. URL http://www.coe.int/T/E/Legal_affairs/Legal_co-operation/Data_protection/Documents/International_legal_instruments/Resolution%20(73)%2022.asp. 18

Council of Europe. Resolution (74) 29 on the protection of the privacy of individuals vis-à-vis electronic data banks in the public sector, 1974. URL http://www.coe.int/T/E/Legal_affairs/Legal_co-operation/Data_protection/Documents/International_legal_instruments/Resolution%20(74)%2029.asp. 18

Council of Europe. Convention for the protection of individuals with regard to automatic processing of personal data. CETS 108, Jan. 1981. URL conventions.coe.int/Treaty/en/Treaties/Html/108.htm. 18, 20

Council of Europe. Convention 108+ – Modernised convention for the protection of individuals with regard to automatic processing of personal data. CETS 108+, June 2018. URL http://rm.coe.int/convention-108-convention-for-the-protection-of-individuals-with-regar/16808b36f1. 20

L. F. Cranor. Necessary but not sufficient: standardized mechanisms for privacy notice and choice. Journal of Telecommunications and High Technology Law, 10(2), 2012. URL http://jthtl.org/content/articles/V10I2/JTHTLv10i2_Cranor.PDF. 72, 76

J. Cranshaw, J. Mugan, and N. Sadeh. User-controllable learning of location privacy policies with gaussian mixture models. In 25th AAAI Conference on Artifical Intelligence. AAAI, 2011. URL https://www.aaai.org/ocs/index.php/AAAI/AAAI11/paper/viewPaper/3785. 77

K. Crawford and J. Schultz. Big data and due process: toward a framework to redress predictive privacy harms. Boston College Law Review, 55(93), Oct. 2014. URL https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2325784http://lawdigitalcommons.bc.edu/bclr/vol55/iss1/4/. 84

M.-F. Cuéllar. Cyberdelegation and the administrative state. Stanford public law working paper, Stanford University, Oct. 2016. DOI: 10.1017/9781316671641.006. 85

G. Danezis, J. Domingo-Ferrer, M. Hansen, J.-H. Hoepman, D. L. Metayer, R. Tirtea, and S. Schiffner. Privacy and data protection by design - from policy to engineering. Technical Report December, ENISA - European Union Agency for Network and Information Security, 2015. DOI: 10.2824/38623. 87, 88

A. Das, M. Degeling, D. Smullen, and N. Sadeh. Personalized privacy assistants for the Internet of Things. IEEE Pervasive Computing, 2018. DOI: 10.1109/mprv.2018.03367733. 77, 80, 81

T. Das, P. Mohan, V. N. Padmanabhan, R. Ramjee, and A. Sharma. PRISM: platform for remote sensing using smartphones. In Proceedings of the 8th international conference on Mobile systems, applications, and services - MobiSys ’10, page 63, New York, USA, 2010. ACM Press. ISBN 9781605589855. DOI: 10.1145/1814433.1814442. 53

N. Davies, M. Langheinrich, S. Clinch, I. Elhart, A. Friday, T. Kubitza, and B. Surajbali. Personalisation and privacy in future pervasive display networks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’14, pages 2357–2366, New York, USA, 2014. ACM. ISBN 978-1-4503-2473-1. 00000. DOI: 10.1145/2556288.2557287. 80

P. De Hert and V. Papakonstantinou. The proposed data protection Regulation replacing Directive 95/46/EC: a sound system for the protection of individuals. Computer Law & Security Review, 28(2):130–142, Apr. 2012. ISSN 0267-3649. DOI: 10.1016/j.clsr.2012.01.011. 19

P. De Hert and V. Papakonstantinou. The new general data protection regulation: still a sound system for the protection of individuals? Computer Law & Security Review, 32(2):179–194, Apr. 2016. ISSN 0267-3649. DOI: 10.1016/j.clsr.2016.02.006. 19, 43

P. De Hert, S. Gutwirth, A. Moscibroda, D. Wright, and G. González Fuster. Legal safeguards for privacy and data protection in ambient intelligence. Personal and Ubiquitous Computing, 13(6):435–444, Oct. 2009. ISSN 1617-4909. DOI: 10.1007/s00779-008-0211-6. 62

Der Spiegel, 2004. Innere sicherheit: Totes pferd. Der Spiegel, (11):48, Mar. 2004. URL http://www.spiegel.de/spiegel/inhalt/0,1518,ausg-1395,00.html. 26

N. Dhingra, Z. Gorn, A. Kener, and J. Dana. The default pull: an experimental demonstration of subtle default effects on preferences. Judgment and Decision Making, 7(1):69–76, 2012. ISSN 1930-2975. 71

N. Diakopoulos. Accountability in algorithmic decision making. Communications of the ACM, 59(2):56–62, Jan. 2016. ISSN 00010782. DOI: 10.1145/2844110. 83

A. S. Douglas. The U.K. privacy white paper 1975. In Proceedings of the June 7-10, 1976, National Computer Conference and Exposition, AFIPS ’76, pages 33–38, New York, USA, 1976. ACM. DOI: 10.1145/1499799.1499806. 58

P. Dourish. What we talk about when we talk about context. Personal and Ubiquitous Computing, 8(1):19–30, Feb. 2004. ISSN 1617-4909. DOI: 10.1007/s00779-003-0253-8. 52

B. Dumas, D. Lalanne, and S. Oviatt. Multimodal interfaces: a survey of principles, models and frameworks. Human Machine Interaction, pages 3–26, 2009. DOI: 10.1007/978-3-642-00437-7_1. 51

M. R. Ebling and M. Baker. Pervasive tabs, pads, and boards: are we there yet? IEEE Pervasive Computing, 11(1):42–51, Jan. 2012. ISSN 1536-1268. DOI: 10.1109/mprv.2011.80. 47

A. Etzioni. The Limits of Privacy. Basic Books, New York, USA, 1999. DOI: 10.2307/2654355. 28

European Commission. Communication from the Commission to the European Parliament and the Council: Exchanging and protecting personal data in a globalised world. Press Release, Jan. 2017. URL http://ec.europa.eu/newsroom/document.cfm?doc_id=41157. 20

European Parliament. Charter of fundamental rights of the European Union. Official Journal of the European Communities, 55(C 326):391–407, Oct. 2000. ISSN 1977-091X. DOI: 10.1515/9783110971965. 10

European Parliament and Council. Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities, 38(L 281):31–50, Nov. 1995. URL https://eur-lex.europa.eu/eli/dir/1995/46/oj. 18, 72, 85

European Parliament and Council. Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications). Official Journal of the European Communities, 45 (L 201):37–47, July 2002. ISSN 0378-6978. URL https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32002L0058. 26

European Parliament and Council. Regulation (EU) 2016/679 of the European parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC (general data protection regulation). Official Journal of the European Communities, 59(L 119):1–88, May 2016. ISSN 1977-0677. URL https://eur-lex.europa.eu/eli/reg/2016/679/oj. 13, 43, 71, 72, 76, 81, 84, 85, 87, 89

Facebook, Inc. Did you know that… 4.75 billion pieces of content are shared daily?, 2013. URL https://www.facebook.com/FacebookSingapore/posts/563468333703369. 22

Facebook, Inc. Quarterly earning, 2018. URL https://investor.fb.com/financials/?section=quarterlyearnings. 22

Federal Trade Commission. Privacy online: A report to congress. Staff report, Federal Trade Commission, Federal Trade Commission, Washington, DC, June 1998. URL https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-report-congress/priv-23a.pdf. 73

Federal Trade Commission. Protecting consumer privacy in an era of rapid change. Staff report, Federal Trade Commission, Federal Trade Commission, Washington, DC, Mar. 2012. URL https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf. 76

Federal Trade Commission. Internet of Things: Privacy and security in a connected world. Staff report, Federal Trade Commission, Federal Trade Commission, Washington, DC, Jan. 2015. URL http://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf. 64, 76

A. Ferscha. 20 years past Weiser - what next? IEEE Pervasive Computing, 11(1):52–61, 2012. ISSN 1536-1268. DOI: 10.1109/mprv.2011.78. 45, 53, 54

D. H. Flaherty. Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States. University of North Carolina Press, Chapel Hill, NC, USA, 1989. 10

E. Fleisch, F. Mattern, and S. Billinger. Betriebswirtschaftliche applikationen des ubiquitous computing - beispiele, bausteine und nutzenpotentiale. In H. Sauerburger, editor, Ubiquitous Computing, number 229 in HMD – Praxis der Wirtschaftsinformatik, pages 5–15. dpunkt.verlag, Feb. 2003. ISBN 3-89864-200-3. DOI: 10.1007/978-3-642-55550-3_6. 63

J. Flinn. Cyber Foraging: Bridging Mobile and Cloud Computing. Synthesis Lectures on Mobile and Pervasive Computing, 7(2):1–103, Sept. 2012. ISSN 1933-9011. DOI: 10.2200/s00447ed1v01y201209mpc010. 47

M. Friedewald, O. D. Costa, Y. Punie, P. Alahuhta, and S. Heinonen. Perspectives of ambient intelligence in the home environment. Telematics and Informatics, 22(3):221–238, Aug. 2005. ISSN 07365853. DOI: 10.1016/j.tele.2004.11.001. 50

J. E. Froehlich, E. Larson, T. Campbell, C. Haggerty, J. Fogarty, and S. N. Patel. HydroSense: infrastructure-mediated single-point sensing of whole-home water activity. In H.-W. Gellersen, S. Consolvo, and S. Helal, editors, Proceedings of the 11th international conference on Ubiquitous computing - Ubicomp ’09, page 235, New York, USA, 2009. ACM Press. ISBN 9781605584317. DOI: 10.1145/1620545.1620581. 64

P. Fule and J. F. Roddick. Detecting privacy and ethical sensitivity in data mining results, 2004. URL https://dl.acm.org/citation.cfm?id=979942. 85

R. Ganti, F. Ye, and H. Lei. Mobile crowdsensing: current state and future challenges. IEEE Communications Magazine, 49(11):32–39, Nov. 2011. ISSN 0163-6804. DOI: 10.1109/mcom.2011.6069707. 53

R. Gavison. Privacy and the limits of the law. Yale Law Journal, 89:421–471, 1980. DOI: 10.2307/795891. 104

R. Gavison. Privacy and the limits of the law. In F. D. Schoeman, editor, Philosophical Dimensions of Privacy: An Anthology, pages 346–402. Cambridge University Press, Cambridge, UK, 1984. Originally published in Gavison [1980] and reprinted as Gavison [1995]. DOI: 10.1017/cbo9780511625138.017. 36

R. Gavison. Privacy and the limits of the law. In D. G. Johnson and H. Nissenbaum, Eds., Computers, Ethics, and Social Values, pages 332–351, Prentice Hall, Inc., 1995. DOI: 10.1017/cbo9780511625138.017. 104

R. S. Gerstein. Intimacy and privacy. Ethics, 89(1):76–81, Oct. 1978. URL http://www.jstor.org/stable/2380133. DOI: 10.1086/292105. 34

J. Ginsberg, M. H. Mohebbi, R. S. Patel, L. Brammer, M. S. Smolinski, and L. Brilliant. Detecting influenza epidemics using search engine query data. Nature, 457(7232):1012–1014, 2009. DOI: 10.1038/nature07634. 62

I. Glass. This American life: right to remain silent, 2010. URL https://www.thisamericanlife.org/414/transcript. 23

P. Golle and K. Partridge. On the anonymity of home/work location pairs. In H. Tokuda, M. Beigl, A. Friday, A. J. B. Brush, and Y. Tobe, editors, 7th International Conference on Pervasive Computing (Pervasive ’09), pages 390–397. Springer, 2009. ISBN 978-3-642-01515-1. DOI: 10.1007/978-3-642-01516-8_26. 41

Google. Google now. Website, 2014. URL https://www.google.com/landing/now/. 48, 61

Google. Material design guidelines: Permissions. Website, Sept. 2017. URL https://material.io/design/platform-guidance/android-permissions.html. 74, 75

K. Gormley. 100 years of privacy. Wisconsin Law Review, pages 1335–1442, 1992. ISSN 09547762. URL http://heinonlinebackup.com/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/wlr1992&section=57. 15, 43

G. Greenleaf. Asian Data Privacy Laws. Oxford University Press, oct 2014. ISBN 9780199679669. DOI: 10.1093/acprof:oso/9780199679669.001.0001. 43

G. Greenleaf. Global data privacy laws 2017:120 national data privacy laws, including Indonesia and Turkey. Privacy Laws & Business International Report, 2017(145):10–13, Jan. 2017. URL https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2993035. 20, 24, 43

G. Greenleaf. Convention 108+ and the data protection framework of the EU (speaking notes for conference presentation at ’Convention 108+ tomorrow’s common ground for protection’). June 2018. URL https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3202606. 20

U. Greveler, B. Justus, and D. Loehr. Multimedia content identification through smart meter power usage profiles. In Computers, Privacy and Data Protection, 2012. 61, 64

M. Gruteser and B. Hoh. On the anonymity of periodic location samples. In Second international conference on Security in Pervasive Computing (SPC ’05). Springer, 2005. DOI: 10.1007/978-3-540-32004-3_19. 41

Guardian. The card up their sleeve. The Guardian, July 19, 2003. URL http://www.guardian.co.uk/weekend/story/0,3605,999866,00.html. 30

S. Gupta, M. S. Reynolds, and S. N. Patel. ElectriSense: single-point sensing using emi for electrical event detection and classification in the home. In K. N. Truong, P. A. Nixon, J. E. Bardram, and M. Langheinrich, editors, Proceedings of the 12th ACM international conference on Ubiquitous computing - Ubicomp ’10, pages 139–148, New York, USA, 2010. ACM Press. ISBN 9781605588438. DOI: 10.1145/1864349.1864375. 64

S. Gürses and J. M. del Alamo. Privacy engineering: shaping an emerging field of research and practice. IEEE Security & Privacy, 14(2):40–46, Mar. 2016. ISSN 1540-7993. DOI: 10.1109/msp.2016.37. 87

S. Gürses, C. Troncoso, and C. Diaz. Engineering privacy by design reloaded. Amsterdam Privacy Conference 2015 (APC15), (610613):1–21, 2015. ISSN 1095-9203. 86

R. Hartley-Parkinson. ’I’m going to destroy America and dig up Marilyn Monroe’: British pair arrested in U.S. on terror charges over Twitter jokes, jan 2012. URL http://www.dailymail.co.uk/news/article-2093796/Emily-Bunting-Leigh-Van-Bryan-UK-tourists-arrested-destroy-America-Twitter-jokes.html. 23

K. Hawkey and K. M. Inkpen. Keeping up appearances: understanding the dimensions of incidental information privacy. In SIGCHI conference on Human Factors in computing systems (CHI ’06), page 821, New York, USA, 2006. ACM. ISBN 1595933727. DOI: 10.1145/1124772.1124893. 41

A. Hern. Samsung rejects concern over ‘orwellian’ privacy policy. The Guardian, Feb. 9 2015. URL http://www.theguardian.com/technology/2015/feb/09/samsung-rejects-concern-over-orwellian-privacy-policy. 3

A. Hern. Technology: most GDPR emails unnecessary and some illegal, say experts, May 2018. URL https://www.theguardian.com/technology/2018/may/21/gdpr-emails-mostly-unnecessary-and-in-some-cases-illegal-say-experts. 20

HEW Advisory Committee. Records, computers and the rights of citizens – report of the secretary’s advisory committee on automated personal data systems, records, computers and the rights of citizens. Technical report, U.S. Department of Health, Education, and Welfare (HEW), 1973. URL http://aspe.hhs.gov/datacncl/1973privacy/tocprefacemembers.htmhttps://epic.org/privacy/hew1973report/. 11, 72, 73

M. Hildebrandt. Profiling and the identity of the European citizen. In Profiling the European Citizen, pages 303–343. Springer Netherlands, Dordrecht, 2008. DOI: 10.1007/978-1-4020-6914-7_15. 83

K. Hill. Officemax blames data broker for ‘daughter killed in car crash’. Forbes Online, Jan. 2014. URL https://www.forbes.com/sites/kashmirhill/2014/01/22/officemax-blames-data-broker-for-daughter-killed-in-car-crash-letter/{#}50f16b0f76cf. 66

J.-H. Hoepman. Privacy design strategies. arXiv preprint arXiv:1210.6621, 9:12, 2012. DOI: 10.1007/978-3-642-55415-5_38. 87

M. N. Husen and S. Lee. Indoor human localization with orientation using WiFi fingerprinting. In Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication - ICUIMC ’14, pages 1–6, New York, USA, 2014. ACM Press. ISBN 9781450326445. DOI: 10.1145/2557977.2557980. 64

IBM Corp. IBM builds a smarter planet. https://www.ibm.com/smarterplanet/us/en/, 2008. 50

IBM Global Services. IBM multi-national privacy survey. Consumer Report 938568, Harris Interactive, New York, USA, Oct. 1999. URL http://web.asc.upenn.edu/usr/ogandy/ibm_privacy_survey_oct991.pdf. 22

ICO. Privacy impact assessment handbook. Technical report, Information Commissioner’s Office (ICO), Wilmslow, Cheshire, 2007. URL http://ico.org.uk/for_organisations/data_protection/topic_guides/privacy_impact_assessment. 88

ICO. Guide to the General Data Protection Regulation (GDPR). Technical report, Information Commissioner’s Office (ICO), Wilmslow, Cheshire, Sept. 2018. URL http://www.ico.org.uk/media/for-organisations/documents/1595/pia-code-of-practice.pdf. 88

IFTTT. IFTTT Website, Nov. 2014. URL https://ifttt.com/. 47

International Data Corporation (IDC). New IDC survey finds widespread privacy concerns among U.S. consumers (IDC US42238617), Jan. 2017. URL https://www.idc.com/getdoc.jsp?containerId=prUS42253017. [Online; posted 24-January-2017]. 22

Internetlivestats.com. Google search statistics, 2018. URL http://www.internetlivestats.com/google-search-statistics/. 22

H. Ishii and B. Ullmer. Tangible bits: towards seamless interfaces between people, bits and atoms. In SIGCHI conference on Human factors in computing systems (CHI ’97), pages 234–241, New York, USA, 1997. ACM. ISBN 0897918029. DOI: 10.1145/258549.258715. 51

J. James. Data never sleeps 5.0, 2017. URL https://www.domo.com/learn/data-never-sleeps-5. 22

E. J. Janger and P. M. Schwartz. The gramm-leach-bliley act, information privacy, and the limits of default rules. Minnesota Law Review, 1230(89):1219, 2002. ISSN 1556-5068. DOI: 10.2139/ssrn.319144. 71

C. Jernigan and B. F. T. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10), 2009. URL http://firstmonday.org/article/view/2611/2302. DOI: 10.5210/fm.v14i10.2611. 67, 84

B. Jones, R. Sodhi, M. Murdock, R. Mehra, H. Benko, A. Wilson, E. Ofek, B. MacIntyre, N. Raghuvanshi, and L. Shapira. RoomAlive: magical experiences enabled by scalable, adaptive projector-camera units. In Proceedings of the 27th Annual ACM Symposium on User Interface Software and Technology, UIST ’14, pages 637–644, New York, USA, 2014. ACM. ISBN 978-1-4503-3069-5. DOI: 10.1145/2642918.2647383. 52

R. Jones. Consumer rights: why the GDPR email deluge, and can i ignore it?, May 2018. URL https://www.theguardian.com/money/2018/may/12/why-the-gdpr-email-deluge-and-can-i-ignore-it. 20

W. Jones. Building safer cars. IEEE Spectrum, 39(1):82–85, 2002. ISSN 00189235. DOI: 10.1109/6.975028. 50

S. Joyee De and D. Le Métayer. Privacy Risk Analysis, volume 81 of Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool, 2016. ISBN 9781627059879. DOI: 10.2200/S00724ED1V01Y201607SPT017. 25

F. Kargl. Inter-Vehicular Communication. Habilitation thesis, Ulm University, Ulm, Dec. 2008. 53

D. Katz. Top 10 fitness APIs: Apple health, Fitbit and Nike, 2015. URL https://www.programmableweb.com/news/top-10-fitness-apis-apple-health-fitbit-and-nike/analysis/2015/04/17. 63

R. Kazman, M. Klein, M. Barbacci, T. Longstaff, H. Lipson, and J. Carriere. The architecture tradeoff analysis method. Technical report, Software Engineering Institute (SEI), Pittsburgh, PA, USA, 1998. URL http://ieeexplore.ieee.org/abstract/document/706657/. DOI: 10.21236/ada350761. 89

P. G. Kelley, P. Hankes Drielsma, N. Sadeh, and L. F. Cranor. User-controllable learning of security and privacy policies. In 1st ACM workshop on AISec (AISec ’08), page 11, New York, USA, 2008. ACM. ISBN 9781605582917. DOI: 10.1145/1456377.1456380. 76, 77

W. Knight. The dark secret at the heart of AI. MIT Technology Review, 17(5):54, 2017. URL https://www.technologyreview.com/s/604087/the-dark-secret-at-the-heart-of-ai/. 84

B. P. Knijnenburg and A. Kobsa. Helping users with information disclosure decisions: potential for adaptation. In International conference on Intelligent user interfaces (IUI ’13), page 407, New York, USA, 2013. ACM. ISBN 9781450319652. DOI: 10.1145/2449396.2449448. 76, 77, 80

J. Koesters. Smart shelves will help stock supermarkets of the future, 2018. URL http://www.digitalistmag.com/iot/2018/02/28/smart-shelves-will-help-stock-supermarkets-of-future-05922036. 63

B. Könings and F. Schaub. Territorial privacy in ubiquitous computing. In Eighth International Conference on Wireless On-Demand Network Systems and Services (WONS ’11), pages 104–108, Bardoneccia, Jan. 2011. IEEE. ISBN 978-1-61284-189-2. DOI: 10.1109/wons.2011.5720177. 81

B. Könings, C. Bachmaier, F. Schaub, and M. Weber. Device names in the wild: investigating privacy risks of zero configuration networking. In Workshop on Privacy and Security for Moving Objects (PriSMO), IEEE 14th International Conference on Mobile Data Management (MDM ’13), pages 51–56. IEEE, June 2013. ISBN 978-0-7695-4973-6. DOI: 10.1109/mdm.2013.65. 67

B. Könings, S. Thoma, F. Schaub, and M. Weber. PriPref broadcaster: enabling users to broadcast privacy preferences in their physical proximity. In MUM ’14 Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, pages 133–142. ACM Press, 2014. ISBN 9781450333047. DOI: 10.1145/2677972.2677978. 80

B. Könings, F. Schaub, and M. Weber. Privacy and Trust in Ambient Intelligent Environments, pages 133–164. Springer International Publishing, Cham, 2016. ISBN 978-3-319-23452-6. DOI: 10.1007/978-3-319-23452-6_4. 80

B.-J. Koops. The (in)flexibility of techno-regulation and the case of purpose-binding. Legisprudence, 5(2):171–194, Oct. 2011. ISSN 1752-1467. DOI: 10.5235/175214611797885701. 72

I. Kottasová. These companies are getting killed by GDPR, May 2018. URL https://money.cnn.com/2018/05/11/technology/gdpr-tech-companies-losers/index.html. 20

KPMG. Companies that fail to see privacy as a business priority risk crossing the “creepy line”, Nov. 2016. URL https://home.kpmg.com/sg/en/home/media/press-releases/2016/11/companies-that-fail-to-see-privacy-as-a-business-priority-risk-crossing-the-creepy-line.html. [Online; posted 6-November-2016]. 22

I. Kroener and D. Wright. A strategy for operationalizing privacy by design. Information Society, 30(5), 2014. ISSN 10876537. DOI: 10.1080/01972243.2014.944730. 88, 89

P. Kumaraguru and L. F. Cranor. Privacy indexes : a survey of westin’s studies. Technical Report CMU-ISRI-5-138, Carnegie Mellon University, Institute for Software Research, 2005. URL http://repository.cmu.edu/isr/856/. 22

O. Kwon. A pervasive P3P-based negotiation mechanism for privacy-aware pervasive ecommerce. Decision Support Systems, 50(1):213–221, Dec. 2010. ISSN 01679236. DOI: 10.1016/j.dss.2010.08.002. 80

S. Lahlou, M. Langheinrich, and C. Röcker. Privacy and trust issues with invisible computers. Communications of the ACM, 48(3):59–60, Mar. 2005. ISSN 00010782. DOI: 10.1145/1047671.1047705. 4

S. Landau. Making Sense from Snowden: what’s significant in the NSA surveillance revelations. IEEE Security & Privacy, 11(4):54–63, July 2013. ISSN 1540-7993. DOI: 10.1109/msp.2013.90. 60, 79

S. Landau. Highlights from Making Sense of Snowden, Part II: what’s significant in the NSA revelations. IEEE Security & Privacy, 12(1):62–64, Jan. 2014. ISSN 1540-7993. DOI: 10.1109/msp.2013.161. 60, 79

N. D. Lane, Y. Chon, L. Zhou, Y. Zhang, F. Li, D. Kim, G. Ding, F. Zhao, and H. Cha. Piggyback CrowdSensing (PCS): energy efficient crowdsourcing of mobile sensor data by exploiting smartphone app opportunities. SenSys ’13 Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, New York, USA. ACM. DOI: 10.1145/2517351.2517372. 53

M. Langheinrich. A privacy awareness system for ubiquitous computing environments. In 4th International Conference on Ubiquitous Computing (UbiComp ’02), pages 237–245. Springer, 2002a. ISBN 9783540442677. DOI: 10.1007/3-540-45809-3_19. 80, 81

M. Langheinrich. Privacy invasions in ubiquitous computing. UbiComp ’02 Workshop on Socially-Informed Design of Privacy-Enhancing Solutions, Sept. 2002b. URL http://www.inf.usi.ch/faculty/langheinrich/articles/papers/langhein2002-ucpws.pdf. DOI: 10.1201/9781420093612.ch3. 62

M. Langheinrich. Privacy in ubiquitous computing. In J. Krumm, editor, Ubiqutious Computing Fundamentals, chapter 3, pages 95–160. CRC Press, 2009. DOI: 10.1201/9781420093612. 52, 57, 58, 62

S. Laughlin. Ces 2017: The year of voice. J. Walter Thompson Intelligence, 2017. URL https://www.jwtintelligence.com/2017/01/ces-2017-year-voice/. 3

C. Laurant, editor. Privacy and Human Rights 2003. EPIC and Privacy International, London, UK, 2003. ISBN 1-893044-18-1. URL http://www.privacyinternational.org/survey/phr2003/. 8, 32

S. Lederer, J. I. Hong, A. K. Dey, and J. A. Landay. Five pitfalls in the design of privacy. In L. F. Cranor and S. Garfinkel, editors, Security and Usability, chapter 21, pages 421–446. O’Reilly, 2005. ISBN 0-596-00827-9. 62

T. B. Lee. Facebook’s Cambridge Analytica scandal, explained. Ars Technica Website, Mar. 2018. URL https://arstechnica.com/tech-policy/2018/03/facebooks-cambridge-analytica-scandal-explained/. 29

Y.-D. Lee and W.-Y. Chung. Wireless sensor network based wearable smart shirt for ubiquitous health and activity monitoring. Sensors and Actuators B: Chemical, 140(2):390–395, July 2009. ISSN 0925-4005. DOI: 10.1016/j.snb.2009.04.040. 50

J. T. Lehikoinen, J. Lehikoinen, and P. Huuskonen. Understanding privacy regulation in ubicomp interactions. Personal and Ubiquitous Computing, 12(8):543–553, Mar. 2008. ISSN 1617-4909. DOI: 10.1007/s00779-007-0163-2. 79

L. Lessig. Code and Other Laws of Cyberspace. Basic Books, New York, USA, 1999. DOI: 10.1016/s0740-624x(00)00068-x. 25, 29, 30, 31, 43

G. K. Levinger and H. L. Raush. Close Relationships: Perspectives on the Meaning of Intimacy. University of Massachusetts Press, 1977. DOI: 10.2307/351497. 34

J. Leyden. FBI apology for Madrid bomb fingerprint fiasco. The Register, May 26, 2004. URL http://www.theregister.co.uk/2004/05/26/fbi_madrid_blunder/. 30

Y. Li, F. Chen, T. J.-J. Li, Y. Guo, G. Huang, M. Fredrikson, Y. Agarwal, and J. I. Hong. PrivacyStreams: enabling transparency in personal data processing for mobile apps. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1(3):76:1–76:26, Sept. 2017. ISSN 2474-9567. DOI: 10.1145/3130941. 81

J. Lin, S. Amini, J. I. Hong, N. Sadeh, J. Lindqvist, and J. Zhang. Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In ACM Conference on Ubiquitous Computing (Ubicomp ’12). ACM, 2012. DOI: 10.1145/2370216.2370290. 77

J. Lin, B. Liu, N. Sadeh, and J. I. Hong. Modeling users’ mobile app privacy preferences: restoring usability in a sea of permission settings. In 10th Symposium On Usable Privacy and Security (SOUPS 2014), pages 199–212, Menlo Park, CA, 2014. USENIX Association. ISBN 978-1-931971-13-3. URL https://www.usenix.org/conference/soups2014/proceedings/presentation/lin. 77, 80

A. R. Lingley, M. Ali, Y. Liao, R. Mirjalili, M. Klonner, M. Sopanen, S. Suihkonen, T. Shen, B. P. Otis, H. Lipsanen, and B. A. Parviz. A single-pixel wireless contact lens display. Journal of Micromechanics and Microengineering, 21(12):125014, Dec. 2011. ISSN 0960-1317. DOI: 10.1088/0960-1317/21/12/125014. 50

B. Liu, M. S. Andersen, F. Schaub, H. Almuhimedi, S. A. Zhang, N. Sadeh, Y. Agarwal, and A. Acquisti. Follow my recommendations: a personalized privacy assistant for mobile app permissions. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pages 27–41, Denver, CO, 2016. USENIX Association. ISBN 978-1-931971-31-7. URL https://www.usenix.org/conference/soups2016/technical-sessions/presentation/liu. 76, 77, 80

S. Lobo. Datenschutzgrundverordnung (DSGVO): Wer macht mir die geileren vorschriften? Der Spiegel Online, May 2018. URL http://www.spiegel.de/netzwelt/web/datenschutzgrundverordnung-dsgvo-wer-macht-mir-die-geileren-vorschriften-a-1206979.html. 20

C. R. Long and J. R. Averill. Solitude: An exploration of benefits of being alone. Journal for the Theory of Social Behaviour, 33(1):21–44, 2003. DOI: 10.1111/1468-5914.00204. 34

E. Luger and T. Rodden. Terms of agreement: rethinking consent for pervasive computing. Interacting with Computers, 25(3):229–241, Feb. 2013a. ISSN 0953-5438. DOI: 10.1093/iwc/iws017. 76

E. Luger and T. Rodden. An informed view on consent for ubicomp. In ACM international joint conference on Pervasive and ubiquitous computing (UbiComp ’13), page 529, New York, USA, 2013b. ACM. ISBN 9781450317702. DOI: 10.1145/2493432.2493446. 76

P. Lukowicz, S. Pentland, and A. Ferscha. From context awareness to socially aware computing. IEEE Pervasive Computing, 11(1):32–41, 2012. ISSN 1536-1268. DOI: 10.1109/mprv.2011.82. 53, 54

D. Lyon. Terrorism and surveillance: security, freedom, and justice after September 11 2001. Privacy Lecture Series, November 12, 2001. URL privacy.openflows.org/pdf/lyon_paper.pdf. 29

D. Lyon, editor. Surveillance as social sorting: privacy, risk and automated discrimination. Routledge, 2002. DOI: 10.4324/9780203994887. 29

M. Madden. Public Perceptions of Privacy and Security in the Post-Snowden Era, 2014. URL http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/. 76, 79

B. Malin and L. Sweeney. How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. Journal of biomedical informatics, 37(3):179–92, June 2004. ISSN 1532-0464. DOI: 10.1016/j.jbi.2004.04.005. 41

E. Malmi and I. Weber. You are what apps you use: demographic prediction based on user’s apps. In Tenth International AAAI Conference on Web and Social Media, 2016. 76

E. Mandel. How the Napa earthquake affected bay area sleepers. The Jawbone Blog, Aug. 2014. URL https://jawbone.com/blog/napa-earthquake-effect-on-sleep/. 62

S. Mann. Wearable computing. In The Encyclopedia of Human-Computer Interaction, chapter 22. Interaction Design Foundation, 2nd ed. edition, 2013. http://www.interaction-design.org/books/hci.html. 46

S. Mann, J. Nolan, and B. Wellman. Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society, 1(3):331–355, July 2003. URL http://www.surveillance-and-society.org/journalv1i3.htm. DOI: 10.24908/ss.v1i3.3344. 30

A. Marthews and C. E. Tucker. Government surveillance and internet search behavior. Draft, SSRN, 2017. DOI: 10.2139/ssrn.2412564. 79

G. T. Marx. Murky conceptual waters: The public and the private. Ethics and Information Technology, 3(3):157–169, 2001. URL web.mit.edu/gtmarx/www/murkypublicandprivate.html. 37, 62

G. T. Marx. Some information age techno-fallacies. Journal of Contingencies and Crisis Management, 11(1):25–31, Mar. 2003. ISSN 0966-0879. DOI: 10.1111/1468-5973.1101005. 85

D. Mattioli. On Orbitz, Mac users steered to pricier hotels. Wall Street Jounral, http://www.wsj.com/articles/SB10001424052702304458604577488822667325882, August 2012. 67

V. Mayer-Schönberger. Generational development of data protection in Europe. In P. E. Agre and M. Rotenberg, editors, Technology and Privacy: The New Landscape, chapter 8, pages 219–242. The MIT Press, Cambridge, MA, USA, 1998. 18, 27

A. McClurg. A thousand words are worth a picture: a privacy tort response to consumer data profiling. Nw. UL Rev., 98:63–1787, June 2003. ISSN 00293571. URL http://scholar.google.com/scholar?hl=en{&}btnG=Search{&}q=intitle:A+Thousand+Words+Are+Worth+a+Picture:+A+Privacy+Tort+Response+to+Consumer+Data+Profiling{#}0. 84, 85

A. M. McDonald and L. F. Cranor. The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society, 4(3):540–565, 2008. https://kb.osu.edu/bitstream/handle/1811/72839/ISJLP_V4N3_543.pdf 70, 73

R. McGarvey. Is your rental car company spying on you and your driving? Here’s how they do it. TheStreet.com, mar 2015. URL https://www.thestreet.com/story/13089306/1/is-your-rental-car-company-spying-on-you-and-your-driving-heres-how-they-do-it.html. 60

C. R. McKenzie, M. J. Liersch, and S. R. Finkelstein. Recommendations implicit in policy defaults. Psychological Science, 17(5):414–420, 2006. DOI: 10.1037/e640112011-058. 74

R. Meyer. Facebook and the Cambridge analytica scandal, in 3 paragraphs. The Atlantic, Mar. 2018. URL https://www.theatlantic.com/technology/archive/2018/03/the-cambridge-analytica-scandal-in-three-paragraphs/556046/. 29

Microsoft. Cortana. http://www.microsoft.com/en-us/mobile/campaign-cortana/, 2014. 48

G. R. Milne and M. J. Culnan. Strategies for reducing online privacy risks: why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3):15–29, Jan. 2004. ISSN 1094-9968. DOI: 10.1002/dir.20009. 70

S. Moncrieff, S. Venkatesh, and G. West. Dynamic privacy assessment in a smart house environment using multimodal sensing. ACM Transactions on Multimedia Computing, Communications, and Applications, 5(2), 2008. DOI: 10.1145/1413862.1413863. 50

Mozilla Foundation. Using geolocation, 2018. URL https://developer.mozilla.org/en-US/docs/Web/API/Geolocation/Using_geolocation. 63

E. Musk. A most peculiar test drive. Tesla blog, http://www.teslamotors.com/blog/most-peculiar-test-drive, 2013. 61

National Archives. America’s founding documents. National Archives. URL https://www.archives.gov/founding-docs. 15

National Police Library – College of Computing. The effects of cctv on crime. Technical report, College of Policing, UK, 2013. URL http://library.college.police.uk/docs/what-works/What-works-briefing-effects-of-CCTV-2013.pdf. 21

S. Nisenbaum. Ways of being alone in the world. The American Behavioral Scientist, 27(6):785, 1984. DOI: 10.1177/000276484027006009. 34

H. Nissenbaum. Protecting privacy in an information age: the problem of privacy in public. Law and Philosophy, 17(5):559–596, 1998. DOI: 10.2307/3505189. 38

H. Nissenbaum. Privacy as contextual integrity. Washington Law Review, 79(1):119–159, 2004. URL http://ssrn.com/abstract=534622. 38, 72

H. Nissenbaum. Privacy in Context - Technology, Policy, and the Integrity of Social Life. Stanford University Press, 2009. ISBN 978-0804752367. DOI: 10.1080/15536548.2011.10855919. 35, 38, 39, 78, 79, 87

H. Nissenbaum. A contextual approach to privacy online. Daedalus, 140(4):32–48, Oct. 2011. ISSN 0011-5266. DOI: 10.1162/daed_a_00113. 78

P. A. Norberg, D. R. Horne, and D. A. Horne. The privacy paradox: personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1):100–126, 2007. DOI: 10.1111/j.1745-6606.2006.00070.x. 22, 80

R. Nord, M. Barbacci, P. Clements, and R. Kazman. Integrating the architecture tradeoff analysis method (ATAM) with the cost benefit analysis method (CBAM). Technical report, Software Engineering Institute (SEI), Pittsburgh, PA, USA, 2003. URL http://repository.cmu.edu/sei/537/. DOI: 10.21236/ada421615. 89

N. Notario, A. Crespo, Y.-S. Martin, J. M. D. Alamo, D. L. Metayer, T. Antignac, A. Kung, I. Kroener, and D. Wright. PRIPARE: integrating privacy best practices into a privacy engineering methodology. In 2015 IEEE Security and Privacy Workshops, pages 151–158. IEEE, May 2015. ISBN 978-1-4799-9933-0. DOI: 10.1109/spw.2015.22. 89, 90

Nusca. How voice recognition will change the world. SmartPlanet Online, Nov. 2011. URL https://www.zdnet.com/article/how-voice-recognition-will-change-the-world/. 47

OECD. OECD guidelines on the protection of privacy and transborder flows of personal data. The Organisation for Economic Co-operation and Development, Sept. 1980. URL http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm. 12, 85

OECD. The OECD privacy framework. The Organisation for Economic Co-operation and Development, 2013. URL http://www.oecd.org/internet/ieconomy/privacy-guidelines.htm. 12, 72, 81

M. C. Oetzel and S. Spiekermann. A systematic methodology for privacy impact assessments: a design science approach. European Journal of Information Systems, 23(2):126–150, Mar. 2014. ISSN 0960-085X. DOI: 10.1057/ejis.2013.18. 89

C. Palahniuk. Fight Club. W.W. Norton, New York, USA, 1996. ISBN 978-0393039764. 23

L. Palen and P. Dourish. Unpacking “privacy” for a networked world. In Conference on Human factors in computing systems (CHI ’03), pages 129–136, New York, USA, 2003. ACM. ISBN 1581136307. DOI: 10.1145/642611.642635. 79

S. Parakilas. We can’t trust facebook to regulate itself. The New York Times, 2017. URL https://www.nytimes.com/2017/11/19/opinion/facebook-regulation-incentive.html. 22

R. Parasuraman, T. Sheridan, and C. Wickens. A model for types and levels of human interaction with automation. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 30(3):286–297, May 2000. ISSN 10834427. DOI: 10.1109/3468.844354. 77, 81

B. Parducci, H. Lockhart, and E. Rissanen. eXtensible access control markup language (XACML) version 3.0. Committee Specification, OASIS, 2010. URL http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf. DOI: 10.17487/rfc7061. 72

S. N. Patel, J. A. Kientz, G. R. Hayes, S. Bhat, and G. D. Abowd. Farther than you may think: an empirical investigation of the proximity of users to their mobile phones. In UbiComp 2006: Ubiquitous Computing, pages 123–140, 2006. DOI: 10.1007/11853565_8. 47

S. N. Patel, T. Robertson, J. A. Kientz, M. S. Reynolds, and G. D. Abowd. At the flick of a switch: detecting and classifying unique electrical events on the residential power line. In J. Krumm, G. D. Abowd, A. Seneviratne, and T. Strang, editors, UbiComp 2007: Ubiquitous Computing, pages 271–288, 2007. Springer Berlin Heidelberg. DOI: 10.1007/978-3-540-74853-3_16. 64

S. N. Patel, M. S. Reynolds, and G. D. Abowd. Detecting human movement by differential air pressure sensing in HVAC system ductwork: an exploration in infrastructure mediated sensing. In J. Indulska, D. Patterson, T. Rodden, and M. Ott, editors, Pervasive Computing. Pervasive 2008, pages 1–18, 2008. Springer. DOI: 10.1007/978-3-540-79576-6_1. 64

P. Pelegris, K. Banitsas, T. Orbach, and K. Marias. A novel method to detect heart beat rate using a mobile phone. In Engineering in Medicine and Biology Society (EMBC), 2010 Annual International Conference of the IEEE, pages 5488–5491, Aug. 2010. DOI: 10.1109/iembs.2010.5626580. 47

J. W. Penney. Chilling effects: Online surveillance and wikipedia use. Berkeley Technology Law Journal, 31(1):117, 2016. URL https://ssrn.com/abstract=2769645. 79

Pew Research Center. An analysis of android app permissions. http://www.pewinternet.org/2015/11/10/an-analysis-of-android-app-permissions/, 2015. 76

B. Pfleging, S. Schneegass, and A. Schmidt. Multimodal interaction in the car. In A. L. Kun, L. Boyle, B. Reimer, A. Riener, J. Healey, W. Zhang, B. Pfleging, and M. Kurz, editors, Proceedings of the 4th International Conference on Automotive User Interfaces and Interactive Vehicular Applications - AutomotiveUI ’12, pages 155–162, New York, USA, 2012. ACM Press.

ISBN 9781450317511. DOI: 10.1145/2390256.2390282. 50

R. W. Picard. Affective computing: challenges. International Journal of Human-Computer Studies, 59(1-2):55–64, July 2003. ISSN 10715819. DOI: 10.1016/s1071-5819(03)00052-1. 53

J. P. Pickett, editor. The American Heritage College Dictionary. Houghton Mifflin Co, 4th edition, Apr. 2002. 25

S. Platt, Ed. Respectfully Quoted: A Dictionary of Quotations Requested from the Congressional Research Service. Library of Congress, Washington, DC, 1989. http://www.bartleby.com/73/ 98

B. Popper. Google announces over 2 billion monthly active devices on Android. The Verge Website (verge.com), may 2017. URL https://www.theverge.com/2017/5/17/15654454/android-reaches-2-billion-monthly-active-users. 22

R. C. Post. Three concepts of privacy. Georgetown Law Journal, 89:2087, 2001. URL http://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1184&context=fss_papers. DOI: 10.1016/j.clsr.2015.05.010. 7

President’s Concil of Advisors on Science and Technology. Big data and privacy: a technological perspective. Report to the President, Executive Office of the President, May 2014. URL https://obamawhitehouse.archives.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf 76

Privacy Rights Clearinghouse. A review of the fair information principles: the foundation of privacy public policy, Feb. 2004. URL http://www.privacyrights.org/ar/fairinfo.htm. 11

Privacy Rights Clearinghouse. California medical privacy fact sheet C4: your prescriptions and your privacy. https://www.privacyrights.org/fs/fsC4/CA-medical-prescription-privacy, July 2012. 66

W. Prosser. Privacy. California Law Journal, 48:383–423, 1960. As cited in Solove and Rotenberg [2003]. DOI: 10.2307/3478805. 17

A. Rao, F. Schaub, and N. Sadeh. What do they know about me? Contents and concerns of online behavioral profiles. In PASSAT ’14: Sixth ASE International Conference on Privacy, Security, Risk and Trust, 2014. 66, 67

R. Rehmann. Der weg aus der hooligan-datenbank. Tages-Anzeiger, Nov. 2014. URL http://www.tagesanzeiger.ch/schweiz/standard/Der-Weg-aus-der-HooliganDatenbank/story/21957458. 2

J. R. Reidenberg, T. Breaux, L. F. Cranor, B. French, A. Grannis, J. T. Graves, F. Liu, A. M. McDonald, T. B. Norton, R. Ramanath, N. C. Russell, N. Sadeh, and F. Schaub. Disagreeable privacy policies: mismatches between meaning and users’ understanding. Berkeley Technology Law Journal, 30, 2015. URL http://papers.ssrn.com/abstract=2418297. DOI: 10.2139/ssrn.2418297. 75

J. R. Reidenberg, J. Bhatia, T. D. Breaux, and T. B. Norton. Ambiguity in privacy policies and the impact of regulation. The Journal of Legal Studies, 45(S2):S163–S190, 2016. URL https://doi.org/10.1086/688669. 75

H. T. Reis, P. Shaver, et al. Intimacy as an interpersonal process. Handbook of personal relationships, 24(3):367–389, 1988. 34

M. Reissenberger. 50 jahre bundesverfassungsgericht: Volkszählung. DeutschlandRadio Schwerpunktthema, January 4, 2004. URL http://www.dradio.de/homepage/schwerpunkt-verfassungsgericht-010904.html. 27

C. Roda. Human attention in digital environments. Cambridge University Press, 2011. ISBN 9780521765657. URL http://www.cambridge.org/ch/academic/subjects/psychology/cognition/human-attention-digital-environments?format=HB{&}isbn=9780521765657. DOI: 10.1017/cbo9780511974519. 51

F. Roesner, D. Molnar, A. Moshchuk, T. Kohno, and H. J. Wang. World-driven access control for continuous sensing. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS ’14, pages 1169–1181, New York, USA, 2014. ACM. ISBN 978-1-4503-2957-6. DOI: 10.1145/2660267.2660319. 80

N. A. Romero, P. Markopoulos, and S. Greenberg. Grounding privacy in mediated communication. Computer Supported Cooperative Work (CSCW), 22(1):1–32, 2013. ISSN 0925-9724. DOI: 10.1007/s10606-012-9177-z. 79

J. Rosen. A watchful state. The New York Times Magazine, Oct. 2001. http://www.nytimes.com/2001/10/07/magazine/a-watchful-state.html. 21

I. S. Rubinstein. Big data: The end of privacy or a new beginning? International Data Privacy law, 3(2):74–87, 1 May 2013. DOI: 10.1093/idpl/ips036. 85

S. Ruggieri, D. Pedreschi, and F. Turini. Integrating induction and deduction for finding evidence of discrimination. Artificial Intelligence and Law, 18(1):1–43, Mar. 2010. ISSN 0924-8463. DOI: 10.1007/s10506-010-9089-5. 85

B. Rössler. Der Wert des Privaten. Suhrkamp Verlag, Frankfurt/Main, Germany, 2001. 34

N. Sadeh, J. Hong, L. F. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao. Understanding and capturing people’s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 13(6):401–412, Aug. 2009. ISSN 1617-4909. DOI: 10.1007/s00779-008-0214-3. 77, 80

F. Sadri. Ambient intelligence: a survey. ACM Computing Surveys, 43(4):1–66, Oct. 2011. ISSN 03600300. DOI: 10.1145/1978802.1978815. 50

R. Saleh, D. Jutla, and P. Bodorik. Management of users’ privacy preferences in context. In International Conference on Information Reuse and Integration, pages 91–97. IEEE, Aug. 2007. ISBN 1-4244-1499-7. DOI: 10.1109/iri.2007.4296603. 80

P. Samuelson. Privacy as intellectual property? Stanford Law Review, 52:1125–1173, 2000. URL http://www.sims.berkeley.edu/~pam/papers/privasip_draft.pdf. DOI: 10.2307/1229511. 25

M. Satyanarayanan. Fundamental challenges in mobile computing. In Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing, pages 1–7. ACM, 1996. URL http://dl.acm.org/citation.cfm?id=248053. 00813. DOI: 10.1145/248052.248053. 45, 46, 47

M. Satyanarayanan. Pervasive computing: vision and challenges. IEEE Personal Communications, 8(4):10–17, 2001. ISSN 10709916. DOI: 10.1109/98.943998. 51, 52

F. Schaub. Dynamic Privacy Adaptation in Ubiquitous Computing. Doctoral dissertation, University of Ulm, Ulm, Germany, 2014. 76, 77

F. Schaub. Context-adaptive privacy mechanisms. In A. Gkoulalas-Divanis and C. Bettini, editors, Handbook of Mobile Data Privacy, chapter 13, pages 337–372. Springer, Dec. 2018. ISBN 978-3-319-98160-4. DOI: 10.1007/978-3-319-98161-1_13. 79

F. Schaub, R. Deyhle, and M. Weber. Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In 11th International Conference on Mobile and Ubiquitous Multimedia (MUM ’12), page 1, New York, USA, 2012. ACM. ISBN 9781450318150. DOI: 10.1145/2406367.2406384. 41

F. Schaub, B. Könings, P. Lang, B. Wiedersheim, C. Winkler, and M. Weber. PriCal: context-adaptive privacy in ambient calendar displays. In UbiComp ’14 Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pages 499–510. ACM Press, 2014. ISBN 9781450329682. DOI: 10.1145/2632048.2632087. 77, 80

F. Schaub, B. Könings, and M. Weber. Context-adaptive privacy: leveraging context awareness to support privacy decision making. IEEE Pervasive Computing, 14(1):34–43, 2015. DOI: 10.1109/mprv.2015.5. 74, 76, 77, 79, 81

F. Schaub, R. Balebako, and L. F. Cranor. Designing effective privacy notices and controls. IEEE Internet Computing, 21(3):70–77, May–June 2017. ISSN 1089-7801. DOI: 10.1109/mic.2017.265102930. 70, 74, 75, 76

B. W. Schermer. The limits of privacy in automated profiling and data mining. Computer Law & Security Review, 27(1):45–52, Feb. 2011. ISSN 0267-3649. DOI: 10.1016/j.clsr.2010.11.009. 83, 85

B. Schilit, N. Adams, and R. Want. Context-aware computing applications. In Workshop on Mobile Computing Systems and Applications, pages 85–90. IEEE, 1994. ISBN 0-8186-6345-6. DOI: 10.1109/mcsa.1994.512740. 48

J. Schiller. Mobile communications. Pearson Education, 2003. 46

A. Schmidt. Implicit human computer interaction through context. Personal Technologies, 4 (2-3):191–199, June 2000. ISSN 0949-2054. DOI: 10.1007/bf01324126. 52

A. Schmidt. Context-aware computing: context-awareness, context-aware user interfaces, and implicit interaction. In M. Soegaard and R. F. Dam, editors, Encyclopedia of Human-Computer Interaction, chapter 14, pages 1–28. The Interaction-Design.org Foundation, Aarhus, Denmark, 2012. URL http://www.interaction-design.org/encyclopedia/context-aware_computing.html. 48

A. Schmidt, M. Beigl, and H.-W. Gellersen. There is more to context than location. Computers & Graphics, 23(6):893–901, Dec. 1999. ISSN 00978493. DOI: 10.1016/s0097-8493(99)00120-x. 48

A. Schmidt, B. Pfleging, F. Alt, A. Sahami, and G. Fitzpatrick. Interacting with 21st-century computers. IEEE Pervasive Computing, 11(1):22–31, Jan. 2012. ISSN 1536-1268. DOI: 10.1109/mprv.2011.81. 45

B. Schneier. Security risks of frequent-shopper cards. Schneier on Security, Feb. 18 2005. URL https://www.schneier.com/blog/archives/2005/02/security_risks.html. 1

V. Schouberechts. The Post Book – History of the European post in 50 exclusive documents. Lanoo Publishers, jun 2016. 32

B. Schwartz. The social psychology of privacy. American Journal of Sociology, 73(6):741–752, May 1968. ISSN 0002-9602. DOI: 10.1086/224567. 39

P. M. Schwartz. Property, privacy, and personal data. Harvard Law Review, 117(7):2055–2128, 2004. URL http://ssrn.com/abstract=721642. DOI: 10.2307/4093335. 66

C. Scully, J. Lee, J. Meyer, A. Gorbach, D. Granquist-Fraser, Y. Mendelson, and K. Chon. Physiological parameter monitoring from optical recordings with a mobile phone. Biomedical Engineering, IEEE Transactions on, 59(2):303–306, Feb. 2012. ISSN 0018-9294. DOI: 10.1109/tbme.2011.2163157. 47

C. Seife. 23andMe is terrifying; but not for the reasons the FDA thinks. Scientific American, Sept. 2013. https://www.scientificamerican.com/article/23andme-is-terrifying-but-not-for-the-reasons-the-fda-thinks/. 33

P. Sieghart. Privacy and Computers. Latimer, London, 1976. 58

G. Silberg and R. Wallace. Self-driving cars: the next revolution. Technical report, KPMG LLP and the Center for Automotive Research (CAR), 2012. URL https://home.kpmg.com/be/en/home/insights/2012/08/self-driving-cars-the-next-revolution.html. 50

S. Silverstein. What price loyalty? Los Angeles Times, Feb. 1999. URL http://articles.latimes.com/1999/feb/07/business/fi-5738/. DOI: 10.1093/jiplp/jpp199. 1

A. Simmel. Privacy. In International Encyclopedia of the Social Sciences, page 480. MacMillan, 1968. As cited in Cate [1997]. 36

H.A. Simon. Models of bounded rationality: Empirically grounded economic reason, MIT press, 1982. 73

H. J. Smith, T. Dinev, and H. Xu. Information privacy research: an interdisciplinary review. MIS Quarterly, 35(4):989–1015, 2011. DOI: 10.2307/41409970. 73

D. J. Solove. Privacy self-management and the consent dilemma. Harvard Law Review, 126: 1880–1903, 2013. URL http://ssrn.com/abstract=2171018. 22, 36, 65, 70, 76

D.J. Solove. A taxonomy for privacy. University of Pennsylvania Law Review, 154(3):477–560, 2006. URL http://ssrn.com/abstract=667622. DOI: 10.2307/40041279. 40, 43

D. J. Solove. Understanding Privacy. Harvard University Press, 2008. ISBN 978-0674027725. 39, 40, 42, 43, 65

D. J. Solove and W. Hartzog. The FTC and the new common law of privacy. Columbia Law Review, 114(583), 2014. URL https://ssrn.com/abstract=2312913. DOI: 10.2139/ssrn.2312913. 17

D. J. Solove and M. Rotenberg. Information Privacy Law. Aspen Publishers, New York, USA, 1st edition, 2003. 10, 13, 14, 15, 28, 100, 117

D. J. Solove and P. M. Schwartz. An overview of privacy law. In Privacy Law Fundamentals, chapter 2. IAPP, 2015. URL https://ssrn.com/abstract=2669879. 15

D. J. Solove and P. M. Schwartz. Information Privacy Law. Wolters Kluwer, 6th edition, 2018. ISBN 978-1454892755. 43

S. Spiekermann and L. F. Cranor. Engineering privacy. IEEE Transactions on Software Engineering, 35(1):67–82, Jan. 2009. ISSN 0098-5589. DOI: 10.1109/tse.2008.88. 86

S. Spiekermann, J. Grossklags, and B. Berendt. E-privacy in 2nd generation e-commerce: privacy preferences versus actual behavior. In Proceedings of the 3rd ACM conference on Electronic Commerce, pages 38–47. ACM, 2001. DOI: 10.1145/501158.501163. 22

P. Sprenger. Sun on privacy: ‘Get over it.’ Wired News, Jan. 1999. URL https://www.wired.com/1999/01/sun-on-privacy-get-over-it/. 24

M. Staples, K. Daniel, M. Cima, and R. Langer. Application of micro- and nano-electromechanical devices to drug delivery. Pharmaceutical Research, 23(5):847–863, 2006. ISSN 0724-8741. DOI: 10.1007/s11095-006-9906-4. 50

T. Starner. Project Glass: An extension of the self. IEEE Pervasive Computing, 12(2):14–16, Apr. 2013. ISSN 1536-1268. DOI: 10.1109/mprv.2013.35. 50

Statista. Number of apps available in leading app stores as of 3rd quarter 2018. http://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores/, October 2018. 48

B. Stone. Amazon erases Orwell books from Kindle devices, July 2009. URL https://www.nytimes.com/2009/07/18/technology/companies/18amazon.html. 60

W. J. Stuntz. The substantive origins of criminal procedure. The Yale Law Journal, 105(2):393, Nov. 1995. ISSN 00440094. DOI: 10.2307/797125. 25

L. Sweeney. k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5):557–570, 2002. ISSN 0218-4885. DOI: 10.1142/s0218488502001648. 41

P. Swire and K. Ahmad. Foundations of Information Privacy and Data Protection: A Survey of Global Concepts, Laws and Practices. The International Association of Privacy Professionals (IAPP), 2012. ISBN 978-0-9795901-7-7. 20

O. Tene and J. Polonetsky. Privacy in the age of big data - a time for big decisions. Stanford Law Review Online, 64(63), 2012. URL https://www.stanfordlawreview.org/online/privacy-paradox-privacy-and-big-data/. 85

O. Tene and J. Polonetsky. Big data for all: Privacy and user control in the age of analytics. Northwestern Journal of Technology and Intellectual Property, 11(5):239, sep 2013. URL https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2149364. 85

Th. Sc. Community. Pervasive Adaptation: The Next Generation Pervasive Computing Research Agenda. Institute for Pervasive Computing, Johannes Kepler University Linz, Linz, 2011. ISBN 9783200022706. URL http://perada.eu/essence. 54

The Economist. When smart becomes spooky. The Economist Online, Nov. 2014. URL https://www.economist.com/news/2014/11/13/when-smart-becomes-spooky. 61

The Economist. The signal and the noise. Technical report, London, UK, Mar. 2016. URL https://www.economist.com/sites/default/files/20160326_tech_politics.pdf. 29

The State of New York. Article 240 - NY penal law, 2018a. URL http://ypdcrime.com/penal.law/article240.htm. 23

The State of New York. Article 490 - NY penal law, 2018b. URL http://ypdcrime.com/penal.law/article490.htm. 23

E. Toch. Super-Ego: a framework for privacy-sensitive bounded context-awareness. In 5th ACM International Workshop on Context-Awareness for Self-Managing Systems (CASE-MANS ’11), pages 24–32, New York, USA, 2011. ACM. ISBN 9781450308779. DOI: 10.1145/2036146.2036151. 77

E. Toch. Crowdsourcing privacy preferences in context-aware applications. Personal and Ubiquitous Computing, 18(1):129–141, Jan. 2014. ISSN 1617-4917. DOI: 10.1007/s00779-012-0632-0. 77

L. Tsai, P. Wijesekera, J. Reardon, I. Reyes, S. Egelman, D. Wagner, N. Good, and J.-W. Chen. Turtle Guard: helping Android users apply contextual privacy preferences. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pages 145–162, Santa Clara, CA, 2017. USENIX Association. ISBN 978-1-931971-39-3. URL https://www.usenix.org/conference/soups2017/technical-sessions/presentation/tsai. 77, 81

J. Turow, M. Hennessy, and N. Draper. The tradeoff fallacy: How marketers are misrepresenting american consumers and opening them up to exploitation. Technical report, Annenberg School for Communication, University of Pennsylvania, 2015. DOI: 10.2139/ssrn.2820060. 76

C. Ulbrich. Can spam? Or new can of worms? Wired News, Dec. 2003. URL https://www.wired.com/2003/12/can-spam-or-new-can-of-worms/. 26

United Nations. Universal declaration of human rights. Adopted and proclaimed by General Assembly resolution 217 A (III) of December 10, 1948. URL http://www.un.org/Overview/rights.html. 10

United States Government. E-government act of 2002. Public Law 107-347, Dec. 2002. URL https://www.gpo.gov/fdsys/pkg/PLAW-107publ347/content-detail.html. 89

B. Ur, J. Jung, and S. Schechter. Intruders versus intrusiveness: teens’ and parents’ perspectives on home-entryway surveillance. In UbiComp 2014, pages 129–139. ACM Press, 2014. ISBN 9781450329682. DOI: 10.1145/2632048.2632107. 61

A. Valdez. Everything you need to know about Facebook and Cambridge analytica. Wired, March 23, 2018, 2018. URL https://www.wired.com/story/wired-facebook-cambridge-analytica-coverage/. 79

W. G. Voss. European Union data privacy law reform: general data protection regulation, privacy shield, and the right to delisting. Business Lawyer, 72(1):221–233, Jan. 2017. URL https://ssrn.com/abstract=2894571. 43

J. Waldo, H. S. Lin, and L. I. Millett. Engaging privacy and information technology in a digital age. Technical report, National Research Council, 2007. URL http://www.nap.edu/openbook.php?record_id=11896. DOI: 10.29012/jpc.v2i1.580. 62

Y. Wang and M. Kosinski. Deep neural networks are more accurate than humans at detecting sexual orientation from facial images. Journal of Personality and Social Psychology, 114(2):246–257, 2018. DOI: 10.31234/osf.io/hv28a. 84

R. Want. Introduction to ubiquitous computing. In J. Krumm, editor, Ubiquitous Computing Fundamentals, chapter 1. CRC Press, Boca Raton, FL, 2010. DOI: 10.1201/9781420093612.ch1. 45, 49

S. D. Warren and L. D. Brandeis. The right to privacy. Harvard Law Review, 4(5):193–220, Dec. 1890. ISSN 0017811X. DOI: 10.2307/1321160. 8, 9, 33

Washington State Legislature. Electronic communication devices, chapter 19.300 RCW, 2009. URL http://app.leg.wa.gov/RCW/default.aspx?cite=19.300. 16

M. Weiser. The computer for the 21st century. Scientific American, 265(3):94–104, Jan. 1991. ISSN 1536-1268. DOI: 10.1038/scientificamerican0991-94. 47, 49, 50, 51, 52, 57, 58

M. Weiser. Some computer science issues in ubiquitous computing. Communications of the ACM, 36(7):75–84, 1993. DOI: 10.1145/159544.159617. 47, 49

M. Weiser and J. Brown. The coming age of calm technology. In P. J. Denning and R. M. Metcalfe, editors, Beyond Calculation: The Next Fifty Years of Computing, volume 8. Springer, 1997. DOI: 10.1007/978-1-4612-0685-9_6. 47, 51, 53

M. A. Weiss and K. Archick. U.S. - EU Data privacy: from Safe Harbor to Privacy Shield. Technical report, Congressional Research Service, Washington, D.C., USA, May 2016. URL https://epic.org/crs/R44257.pdf. 19

R. Wenning, M. Schunter, L. F. Cranor, B. Dobbs, S. Egelman, G. Hogben, J. Humphrey, M. Langheinrich, M. Marchiori, M. Presler-Marshall, J. Reagle, and D. A. Stampley. The platform for privacy preferences 1.1 (P3P1.1) specification. W3C working group note, W3C, 2006. URL http://www.w3.org/TR/P3P11/. 72, 80

A. F. Westin. Privacy and Freedom. Atheneum, New York, 1967. DOI: 10.2307/1339271. 11, 26, 32, 33, 34, 35, 36, 37, 43, 73

P. Wijesekera, A. Baokar, L. Tsai, J. Reardon, S. Egelman, D. Wagner, and K. Beznosov. The feasibility of dynamically granted permissions: aligning mobile privacy with user preferences. In 2017 IEEE Symposium on Security and Privacy (SP), pages 1077–1093, May 2017. DOI: 10.1109/sp.2017.51. 80, 81

P. Wijesekera, J. Reardon, I. Reyes, L. Tsai, J.-W. Chen, N. Good, D. Wagner, K. Beznosov, and S. Egelman. Contextualizing privacy decisions for better prediction (and protection). In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI ’18, pages 268:1–268:13, New York, USA, 2018. ACM. ISBN 978-1-4503-5620-6. DOI: 10.1145/3173574.3173842. 77

Wikipedia. Jeremy Bentham (Aug. 21, 2004, 17:37 UTC). In Wikipedia: The Free Encyclopedia. Wikimedia Foundation, 2004. URL en.wikipedia.org/wiki/Jeremy_Bentham. 14

L. E. Willis. Why not privacy by default. Berkeley Technology Law Journal, 29(1), 2014. URL http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=2019{&}context=btlj. DOI: 10.2139/ssrn.2349766. 71

Wired News. Due process vanishes in thin air. Wired News, April 8, 2003. URL http://www.wired.com/news/print/0,1294,58386,00.html. 30

D. Wright. Should privacy impact assessments be mandatory? Communications of the ACM, 54 (8):121–131, Aug. 2011. ISSN 00010782. DOI: 10.1145/1978542.1978568. 88

D. Wright. Making privacy impact assessment more effective. The Information Society, 29(5):307–315, 2013. URL https://doi.org/10.1080/01972243.2013.825687. DOI: 10.1080/01972243.2013.825687. 88

D. Wright and P. De Hert, editors. Privacy Impact Assessment. Springer Netherlands, Dordrecht, 2012. ISBN 978-94-007-5402-7. DOI: 10.1007/978-94-007-2543-0. 39

G. Yee. A privacy-preserving ubicomp architecture. In International Conference on Privacy, Security and Trust (PST ’06), New York, USA, 2006. ACM. ISBN 1595936041. DOI:10.1145/1501434.1501467. 80

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.254.118