Page 470 - Kaleidoscope Academic Conference Proceedings 2024
P. 470

2024 ITU Kaleidoscope Academic Conference




           [5]  W. L. Prosser, “Privacy,” California Law Review, vol.48,   [27] "Number of IOT Connected Devices Worldwide 2019-2023
               no.3, pp. 383-423, 1960.                           With Forecasts to 2030," 24/04/24; www-statista-com.eu1.p
                                                                  roxy.openathens.net/statistics/1183457/iot-connected-device
           [6]  R. Gavison, “Privacy and the Limits of Law,” The Yale Law  s-worldwide/.
               Journal, vol.89, no.3, pp. 421-471, 1980.
                                                              [28] M. Osman. "Wild and Interesting Facebook Statistics and
           [7]  L. Menges, “Three Control Views on Privacy,” Social  Facts," 14/04/24; https://kinsta.com/blog/facebook-statistics/
               Theory and Practice, vol.48, no.4, pp. 691-711, 2022.
                                                              [29] "Number of mobile internet users worldwide from 2020 to
           [8]  J. Thomson, “The Right to Privacy,” Philosophy & Public
               Affairs, vol.4, no.4, pp. 295-314, 1975.           2029," 24/04/24; www-statista-com.eu1.proxy.openathens.
                                                                  net/forecasts/1146312/mobile-internet-users-in-the-world.
           [9]  K. O’Hara, The seven veils of privacy: How our debates  [30] N. Buchanan. "What You Need To Know Ahead of Meta's
               about privacy conceal its nature, Manchester University
               Press, 2023.                                       Earnings Report," 24/04/24; www.investopedia.com/me
                                                                  taq1-fy-2024-earnings-preview-8630822#:~:text=Analysts
           [10] D. J. Solove, Understanding Privacy, Harvard University  %20project%20Meta's%20revenue,estimates%20compiled
               Press, Massachusetts & London, 2008.               %20by%20Visible%20Alpha.
           [11] W. Hartzog, “What is Privacy? That's the Wrong Question,”   [31] Internet of Things: market data & analysis, Statista, 2023.
               The University of Chicago Law Review, vol.88, no.7, pp.
               1677-1688, November 2021.                      [32] C. McClain, et.al., How Americans View Data Privacy, Pew
                                                                  Research Center, 2023.
           [12] "European Convention on Human Rights," 08/04/24; www.  [33] J. Arbanas, et.al., "Data Privacy and Security Worries are on
               echr.coe.int/documents/d/echr/convention_ENG.
                                                                  the Rise, While Trust is Down," 24/04/24; www2.deloitte.co
           [13] UNESCO Guideline for the Governance of Digital    m/xe/en/insights/industry/telecommunications/connectivity-
               Platforms, UNESCO, 2023.                           mobile-trends-survey/2023/data-privacy-and-security.html.
           [14] S. Warren, L. Brandeis, “The Right to Privacy,” Harvard  [34] "Identity," 20/03, 2024; https://dictionary.apa.org/identity.
               Law Review, vol.4, no.5, pp. 193-220, 1890.
                                                              [35] Human Rights Watch. "India: Technology Use Shouldn't
           [15] "Universal Declaration of Human Rights," 08/04/24; www.  Undermine Free, Fair Elections," 04/05/24;
               un.org/en/about-us/universal-declaration-of-human-rights.  www.hrw.org/news/2024 /04 /08/india-technology-use-
                                                                  shouldnt-undermine-free-fair-elect ions.
           [16] "Human Rights Act 1998, Article 8," 13/04/24; www.equali
               tyhumanrights.com/human-rights/human-rights-act/article-  [36] E. B. Hall, (Tallentyre, S.G). "The Friends of Voltaire,"
               8-respect-your-private-and-family-life.            05/05/24; www.gutenberg.org/cache/epub/56618/pg56618-
                                                                  images.html.
           [17] H. Laceulle, "Narrative identity and moral agency," Aging
               and Self-Realization: Cultural Narratives about Later Life,  [37] L. Boissoneault. "A Brief History of Book Burning, From
               Transcript Verlag, pp. 127-158, 2018.              the Printing Press to Internet," 05/05/24; www.smithsonian
                                                                  mag.com/history/brief-history-book-burning-printing-press-
           [18] "Convention on the Rights of the Child," 15/04/24; www.  internet-archives-180964697/.
               ohchr.org/en/instruments-mechanisms/instruments/conve
               ntion-rights-child.                            [38] R. Cahal, et.al., “Cyber Stalking: Technological Form of
                                                                  Sexual Harassment,” International Journal on Emerging
           [19] C. Sullivan, "Digital Identity: Consequential Individual
               Rights," Digital Identity: An Emergent Legal Concept,  Technologies, vol.10, no.4, pp. 367-373, 2019.
               University of Adelaide Press, pp. 71-106, 2011.  [39] F. Sammut, M. Bezzina, J. Scerri, “Under Attack in the
                                                                  Cyber Battlefield: A Scoping Review of Journalists’
           [20] K.-L. Alfrey, et.al., “The Role of Identity in Human
               Behavior Research: A Systematic Scoping Review,”   Experiences of Cyberharassment,” Journalism Practice, pp.
               Identity, vol.23, no.3, pp. 208-223, 2023.         1-29, 2023.
                                                              [40] A. Murray, K. Dennie, J. Combs, “The promise of a
           [21] H. Asenbaum, “Anonymity and Democracy: Absence as
               Presence in the Public Sphere,” The American Political  decentralized internet: What is Web3 and how can firms
               Science Review, vol.112, no.3, pp. 459-472, 2018.  prepare?,” Business horizons, vol.66, no.2, pp. 191-202,
                                                                  2023.
           [22] S. Cucko, et.al., “Towards the Classification of Self-
               Sovereign Identity Properties,” IEEE access, vol.10, pp.  [41] P. P. Ray, “Web3: A comprehensive review on background,
               88306-88329, 2022.                                 technologies, applications, zero-trust architectures,
                                                                  challenges and future directions,” Internet of Things and
           [23] C. Prince, et.al., “Are We Living in Surveillance Societies  Cyber-Physical Systems, vol.3, pp. 213-248, 2023.
               and Is Privacy an Illusion? An Empirical Study on Privacy
               Literacy and Privacy Concerns,” IEEE Transactions on  [42] E. Jardine, A. M. Lindner, G. Owenson, “The potential
                                                                  harms of the Tor anonymity network clusters
               Engineering Management, vol.70, no.10, pp. 3553-3570,
               2023.                                              disproportionately in free countries,” Proceedings of the
                                                                  National Academy of Sciences - PNAS, vol.117, no.50, pp.
           [24] A. E. Marwick, "A Cultural History of Web 2.0," Status  31716-31721, 2020.
               Update: Celebrity, Publicity, and Branding in the Social
               Media Age, Yale University Press, pp. 21-72, 2013.  [43] A. Hern. "How one man stopped a potentially massive cyber
                                                                  -attack, by accident," 05/05/23; www.theguardian.com/glob
           [25] L. Grossman. "You Yes, You Are TIME's Person of the  al/2024/apr/02/techscape-linux-cyber-attack.
               Year," 09/04/24; https://content.time.com/time/magazi
               ne/article/0,9171,1570810,00.html
           [26] P. Borsook, "Cyberselfish," Mother Jones, 1996.





                                                          – 426 –
   465   466   467   468   469   470   471   472   473   474   475