nsdi-presentation/citations.bib

103 lines
6.9 KiB
BibTeX

@article{felber_pulp:_2012,
title = {Pulp: An adaptive gossip-based dissemination protocol for multi-source message streams},
volume = {5},
pages = {74--91},
number = {1},
journaltitle = {Peer-to-Peer Networking and Applications},
author = {Felber, Pascal and Kermarrec, Anne-Marie and Leonini, Lorenzo and Riviere, Etienne and Voulgaris, Spyros},
date = {2012}
}
@misc{detat_conseil_nodate,
title = {Conseil d'{Etat}, 16 octobre 2019, {Plan} d'action de la {CNIL} en matière de publicité ciblée},
language = {fr},
urldate = {2021-02-17},
journal = {Conseil d'État},
}
@techreport{solove_ive_2007,
%address = {Rochester, NY},
type = {{SSRN} {Scholarly} {Paper}},
title = {'{I}'ve {Got} {Nothing} to {Hide}' and {Other} {Misunderstandings} of {Privacy}},
%url = {https://papers.ssrn.com/abstract=998565},
%abstract = {In this short essay, written for a symposium in the San Diego Law Review, Professor Daniel Solove examines the nothing to hide argument. When asked about government surveillance and data mining, many people respond by declaring: "I've got nothing to hide." According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private. The nothing to hide argument and its variants are quite prevalent, and thus are worth addressing. In this essay, Solove critiques the nothing to hide argument and exposes its faulty underpinnings.},
%language = {en},
%number = {ID 998565},
%urldate = {2020-08-05},
%institution = {Social Science Research Network},
author = {Solove, Daniel J.},
month = jul,
year = {2007},
%keywords = {privacy, surveillance, data mining, nothing to hide},
%file = {Snapshot:/home/quentin/Seafile/zotero/storage/ZZ8HHAEW/papers.html:text/html}
}
@book{gilliom_supervision_2013,
address = {Chicago},
title = {{SuperVision}: an introduction to the surveillance society},
shorttitle = {{SuperVision}},
publisher = {The University of Chicago Press},
author = {Gilliom, John and Monahan, Torin},
year = {2013},
keywords = {Electronic surveillance, Information technology, Privacy, Right of, Social aspects},
annote = {My cell, my self -- It's in the cards -- Lives online -- Surveillance in schools -- Watching you work -- Security at any cost?}
}
@article{rouvroy_algorithmic_2013,
title = {Algorithmic governmentality and prospects of emancipation},
%volume = {No 177},
%issn = {0751-7971},
%url = {https://www.cairn-int.info/article-E_RES_177_0163--algorithmic-governmentality-and-prospect.htm},
%abstract = {Algorithmic governmentality is characterized primarily by the following dual movement: a) abandoning all forms of 'scale', 'benchmark', or hierarchy, in favour of an immanent normativity evolving in real time, from which a 'dual statistics' of the world emerges and which seems to do away with the old hierarchies devised by normal or average people; and b) avoiding all confrontation with individuals, whose opportunities for subjectification have become increasingly scarce. This dual movement seems to be the fruit of contemporary statistics' focus on relations. We seek to assess the extent to which these two aspects of the 'algorithmic governmentality' thereby outlined, with its sole reliance on relations, could facilitate, first, processes of individuation through relations (Simondon) and, second, the emergence of new forms of life through the plane of immanence overtaking the plane of organization (Deleuze-Guattari). Through this comparison with the main contemporary philosophies of relations, it thus appears that thinking about the evolution and processes of individuation through relations necessarily pertains to the 'disparate' - a heterogeneity of orders of magnitude, a multiplicity of regimes of existence - which algorithmic governmentality precisely incessantly suppresses by enclosing (digitized) reality on itself. Algorithmic governmentality tends rather to foreclose such emancipation perspectives by centring individuation processes on the subjective monad.},
%language = {en},
%number = {1},
%urldate = {2021-02-18},
journal = {Reseaux},
author = {Rouvroy, Antoinette and Berns, Thomas and Libbrecht, Elizabeth},
month = oct,
year = {2013},
%note = {Publisher: La Découverte},
%pages = {163--196},
%file = {Full Text PDF:/home/quentin/Seafile/zotero/storage/KHG2YDAZ/Rouvroy et al. - 2013 - Algorithmic governmentality and prospects of emanc.pdf:application/pdf;Snapshot:/home/quentin/Seafile/zotero/storage/HWL2JSFH/article-E_RES_177_0163--algorithmic-governmentality-and-prospect.html:text/html}
}
@book{zuboff_age_2019,
%address = {New York},
%edition = {First edition},
title = {The age of surveillance capitalism: the fight for a human future at the new frontier of power},
%isbn = {978-1-61039-569-4},
shorttitle = {The age of surveillance capitalism},
%abstract = {"Shoshana Zuboff, named "the true prophet of the information age" by the Financial Times, has always been ahead of her time. Her seminal book In the Age of the Smart Machine foresaw the consequences of a then-unfolding era of computer technology. Now, three decades later she asks why the once-celebrated miracle of digital is turning into a nightmare. Zuboff tackles the social, political, business, personal, and technological meaning of "surveillance capitalism" as an unprecedented new market form. It is not simply about tracking us and selling ads, it is the business model for an ominous new marketplace that aims at nothing less than predicting and modifying our everyday behavior--where we go, what we do, what we say, how we feel, who we're with. The consequences of surveillance capitalism for us as individuals and as a society vividly come to life in The Age of Surveillance Capitalism's pathbreaking analysis of power. The threat has shifted from a totalitarian "big brother" state to a universal global architecture of automatic sensors and smart capabilities: A "big other" that imposes a fundamentally new form of power and unprecedented concentrations of knowledge in private companies--free from democratic oversight and control"--},
publisher = {PublicAffairs},
author = {Zuboff, Shoshana},
year = {2019},
keywords = {Information technology, Social aspects, Consumer behavior, Consumer profiling, Data processing}
}
@article{chaum1981untraceable,
title={Untraceable electronic mail, return addresses, and digital pseudonyms},
author={Chaum, David L.},
journal={Communications of the ACM},
year={1981},
}
@misc{noauthor_wetransfer_nodate,
title = {{WeTransfer} {Case} {Study}},
url = {https://aws.amazon.com/solutions/case-studies/wetransfer/},
language = {en-US},
urldate = {2020-06-04},
journal = {Amazon Web Services, Inc.},
}
@inproceedings{bauer_optimal_nodate,
title={On the optimal path length for Tor},
author={Bauer, Kevin and Juen, Joshua and Borisov, Nikita and Grunwald, Dirk and Sicker, Douglas and McCoy, Damon},
booktitle={HotPets in conjunction with PETS 2010},
}