Journal
Computers and Composition
Published
2021-09-01
DOI
10.1016/j.compcom.2021.102652
CompPile
Search in CompPile ↗
Open Access
Closed
Topics
Export

Citation Context

Cited by in this index (1)

  1. Computers and Composition

References (41) · 5 in this index

  1. Computers and Composition
  2. ACLU. (2020). It's time for a privacy update! Accessed May 29, 2021. https://www.aclu.org/issues/privacy-tech…
  3. Brown, A. (2020, May 28), What is section 230—And why does Trump want to change it? Forbes. Retrieved May 29,…
  4. Privacy perceptions and norms in youth and adults
    Clinical Practice in Pediatric Psychology  
  5. Obfuscation: A user’s guide for privacy and protest
Show all 41 →
  1. Computers and Composition
  2. Risk perception: Theories, strategies, and next steps
  3. Understanding third-person perception about Internet privacy risks
    New Media & Society
  4. Our core values
  5. CMS. (n.d.), GDPR Enforcement Tracker. CMS. Retrieved May 29, 2021, https://www.enforcementtracker.com/
  6. Privacy, risk perception, and expert online behavior: An exploratory study of household e…
    Journal of Organizational and End Using Computing  
  7. Special Eurobarometer 487a: The General Data Protection Regulation
  8. Can I live? College students’ perceptions of risks, security, and privacy in online spaces
    Cyber security
  9. Privacy’s blueprint: The battle to control the design of new technologies
  10. Hayden, M. (2019, December 10), Encryption backdoors won't stop crime but will hurt U.S. tech. Bloomberg. Ret…
  11. Hill, K. (2020, January 18). The secretive company that might end privacy as we know it. New York Times. Retr…
  12. Successful failure: What Foucault can teach us about privacy self-management in a world o…
    Ethics and Information Technology  
  13. Computers and Composition
  14. 2019 Internet crime report
  15. Cybersecurity and privacy law in a nutshell
  16. Computers and Composition
  17. Pricing privacy—The right to know the value of your personal data
    Computer Law & Security Review  
  18. Computers and Composition
  19. As justice department pressures Apple, investigators say iPhone easier to crack
    Wall Street Journal
  20. Self-tracking
  21. A contextual approach to privacy online
    Daedalus  
  22. Popper, N. (2019, September 5). Hackers hit twitter C.E.O. Jack Dorsey in a “SIM swap.” You're at risk. New Y…
  23. What's Section 230? The social media law that's clogging up the stimulus talks
    CNET
  24. Coming to terms: Critical approaches to ubiquitous digital surveillance
    Kairos: A Journal of Rhetoric, Technology, and Pedagogy
  25. Critical digital literacies and online surveillance
    Privacy matters: Conversations about surveillance within and beyond the classroom
  26. New California law giving consumers control over their data sets off a scramble
    Fortune
  27. Rosenberg, J.M. (2019, December 18). California consumer privacy law can affect businesses across the U.S. Th…
  28. The value of protecting privacy
    Business Horizons  
  29. Social media users’ legal consciousness about privacy
    Social Media + Society  
  30. Data and Goliath: The hidden battles to collect your data and control your world
  31. Nothing to hide: The false tradeoff between privacy and security
  32. The pursuit of privacy in a world where information control is failing
    Harvard Journal of Law and Public Policy
  33. Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes a…
    New Media and Society  
  34. Security and privacy in online social networking: Risk perceptions and precautionary behavior
    Computers in Human Behavior  
  35. Role of privacy legislations and online business brand image in consumer perceptions of o…
    Journal of Theoretical and Applied Electronic Commerce Research
  36. The age of surveillance capitalism: The fight for a human future at the new frontier of power