Page 470 - Kaleidoscope Academic Conference Proceedings 2024
P. 470
2024 ITU Kaleidoscope Academic Conference
[5] W. L. Prosser, “Privacy,” California Law Review, vol.48, [27] "Number of IOT Connected Devices Worldwide 2019-2023
no.3, pp. 383-423, 1960. With Forecasts to 2030," 24/04/24; www-statista-com.eu1.p
roxy.openathens.net/statistics/1183457/iot-connected-device
[6] R. Gavison, “Privacy and the Limits of Law,” The Yale Law s-worldwide/.
Journal, vol.89, no.3, pp. 421-471, 1980.
[28] M. Osman. "Wild and Interesting Facebook Statistics and
[7] L. Menges, “Three Control Views on Privacy,” Social Facts," 14/04/24; https://kinsta.com/blog/facebook-statistics/
Theory and Practice, vol.48, no.4, pp. 691-711, 2022.
[29] "Number of mobile internet users worldwide from 2020 to
[8] J. Thomson, “The Right to Privacy,” Philosophy & Public
Affairs, vol.4, no.4, pp. 295-314, 1975. 2029," 24/04/24; www-statista-com.eu1.proxy.openathens.
net/forecasts/1146312/mobile-internet-users-in-the-world.
[9] K. O’Hara, The seven veils of privacy: How our debates [30] N. Buchanan. "What You Need To Know Ahead of Meta's
about privacy conceal its nature, Manchester University
Press, 2023. Earnings Report," 24/04/24; www.investopedia.com/me
taq1-fy-2024-earnings-preview-8630822#:~:text=Analysts
[10] D. J. Solove, Understanding Privacy, Harvard University %20project%20Meta's%20revenue,estimates%20compiled
Press, Massachusetts & London, 2008. %20by%20Visible%20Alpha.
[11] W. Hartzog, “What is Privacy? That's the Wrong Question,” [31] Internet of Things: market data & analysis, Statista, 2023.
The University of Chicago Law Review, vol.88, no.7, pp.
1677-1688, November 2021. [32] C. McClain, et.al., How Americans View Data Privacy, Pew
Research Center, 2023.
[12] "European Convention on Human Rights," 08/04/24; www. [33] J. Arbanas, et.al., "Data Privacy and Security Worries are on
echr.coe.int/documents/d/echr/convention_ENG.
the Rise, While Trust is Down," 24/04/24; www2.deloitte.co
[13] UNESCO Guideline for the Governance of Digital m/xe/en/insights/industry/telecommunications/connectivity-
Platforms, UNESCO, 2023. mobile-trends-survey/2023/data-privacy-and-security.html.
[14] S. Warren, L. Brandeis, “The Right to Privacy,” Harvard [34] "Identity," 20/03, 2024; https://dictionary.apa.org/identity.
Law Review, vol.4, no.5, pp. 193-220, 1890.
[35] Human Rights Watch. "India: Technology Use Shouldn't
[15] "Universal Declaration of Human Rights," 08/04/24; www. Undermine Free, Fair Elections," 04/05/24;
un.org/en/about-us/universal-declaration-of-human-rights. www.hrw.org/news/2024 /04 /08/india-technology-use-
shouldnt-undermine-free-fair-elect ions.
[16] "Human Rights Act 1998, Article 8," 13/04/24; www.equali
tyhumanrights.com/human-rights/human-rights-act/article- [36] E. B. Hall, (Tallentyre, S.G). "The Friends of Voltaire,"
8-respect-your-private-and-family-life. 05/05/24; www.gutenberg.org/cache/epub/56618/pg56618-
images.html.
[17] H. Laceulle, "Narrative identity and moral agency," Aging
and Self-Realization: Cultural Narratives about Later Life, [37] L. Boissoneault. "A Brief History of Book Burning, From
Transcript Verlag, pp. 127-158, 2018. the Printing Press to Internet," 05/05/24; www.smithsonian
mag.com/history/brief-history-book-burning-printing-press-
[18] "Convention on the Rights of the Child," 15/04/24; www. internet-archives-180964697/.
ohchr.org/en/instruments-mechanisms/instruments/conve
ntion-rights-child. [38] R. Cahal, et.al., “Cyber Stalking: Technological Form of
Sexual Harassment,” International Journal on Emerging
[19] C. Sullivan, "Digital Identity: Consequential Individual
Rights," Digital Identity: An Emergent Legal Concept, Technologies, vol.10, no.4, pp. 367-373, 2019.
University of Adelaide Press, pp. 71-106, 2011. [39] F. Sammut, M. Bezzina, J. Scerri, “Under Attack in the
Cyber Battlefield: A Scoping Review of Journalists’
[20] K.-L. Alfrey, et.al., “The Role of Identity in Human
Behavior Research: A Systematic Scoping Review,” Experiences of Cyberharassment,” Journalism Practice, pp.
Identity, vol.23, no.3, pp. 208-223, 2023. 1-29, 2023.
[40] A. Murray, K. Dennie, J. Combs, “The promise of a
[21] H. Asenbaum, “Anonymity and Democracy: Absence as
Presence in the Public Sphere,” The American Political decentralized internet: What is Web3 and how can firms
Science Review, vol.112, no.3, pp. 459-472, 2018. prepare?,” Business horizons, vol.66, no.2, pp. 191-202,
2023.
[22] S. Cucko, et.al., “Towards the Classification of Self-
Sovereign Identity Properties,” IEEE access, vol.10, pp. [41] P. P. Ray, “Web3: A comprehensive review on background,
88306-88329, 2022. technologies, applications, zero-trust architectures,
challenges and future directions,” Internet of Things and
[23] C. Prince, et.al., “Are We Living in Surveillance Societies Cyber-Physical Systems, vol.3, pp. 213-248, 2023.
and Is Privacy an Illusion? An Empirical Study on Privacy
Literacy and Privacy Concerns,” IEEE Transactions on [42] E. Jardine, A. M. Lindner, G. Owenson, “The potential
harms of the Tor anonymity network clusters
Engineering Management, vol.70, no.10, pp. 3553-3570,
2023. disproportionately in free countries,” Proceedings of the
National Academy of Sciences - PNAS, vol.117, no.50, pp.
[24] A. E. Marwick, "A Cultural History of Web 2.0," Status 31716-31721, 2020.
Update: Celebrity, Publicity, and Branding in the Social
Media Age, Yale University Press, pp. 21-72, 2013. [43] A. Hern. "How one man stopped a potentially massive cyber
-attack, by accident," 05/05/23; www.theguardian.com/glob
[25] L. Grossman. "You Yes, You Are TIME's Person of the al/2024/apr/02/techscape-linux-cyber-attack.
Year," 09/04/24; https://content.time.com/time/magazi
ne/article/0,9171,1570810,00.html
[26] P. Borsook, "Cyberselfish," Mother Jones, 1996.
– 426 –