1. O. Abul, F. Bonchi, F. Giannotti, IEEE Trans. Knowledge Data Eng. 22, 1709 (2010)
2. A. Appiah, Stereotypes Shaping Identity California Law Rev. 88, 41 (2000)
3. Y. Benkler, H. Nissenbaum, J. Political Philosophy 4, 394 (2006)
4. S. Benn, A Theory of Freedom (Cambridge University Press, Cambridge, 1988)
5. I. Berlin, Four Essays on Liberty (Oxford University Press, Oxford, 1969)
6. d.[sic] boyd, K. Crawford, Symposium on the Dynamics of the Internet and Society, September 2011 (available at: http://ssrn.com/abstract=1926431) (2011)
7. S. Buckingham Shum, K. Aberer, A. Schmidt, S. Bishop, P. Lukowicz, S. Anderson, Y. Charalabidis, J. Domingue, S. de Freitas, I. Dunwell, B. Edmonds, F. Grey, M. Haklay, M. Jelasity, A. Karpistenko, J. Kohlhammer, J. Lewis, J. Pitt, R. Sumner, D. Helbing, Eur. Phys. J. Special Topics 214, 109 (2012)
8. M. Christen, J. Fischer, M. Huppenbauer, C. Tanner, C. van Schaik (eds.), Empirically Informed Ethics. Morality Between Facts and Norms (Springer, New York, in press)
9. T. Craig, M.E. Ludloff, Privacy and Big Data (O'Reilly, Sebastopol, 2011)
10. J.W. DeCew, In Pursuit of Privacy: Law, Ethics, and the Rise of Technology (Cornell University Press, Ithaca NY, 1997)
11. P.B. De Laat, in Proceedings AISB/IACAP 2012, Stream Social Turn (available at http://events.cs.bham.ac.uk/turing12/proceedings/11.pdf#page=67) (2012)
12. E. Diener, R. Crandall, Ethics in Social and Behavioral Research (University of Chicago Press, Chicago IL, 1978)
13. J. Domingo-Ferrer, Proceedings of the 2010 international conference on Privacy in statistical databases (PSD'10), edited by J. Domingo-Ferrer, E. Magkos (Springer-Verlag, Berlin, 2010), p. 258
14. P. Eckersley, How Unique Is Your Web Browser? (Electronic Frontier Foundation, 2009)
15. B. Friedman (ed.), Human values and the design of computer technology (Cambridge University Press, New York, 1997)
16. B. Friedman, N.G. Freier, Theories of information behavior: A researcher's guide edited by K.E. Fisher, S. Erdelez, E.F. McKechnie (Information today, Medford NJ, 2005), p. 368
17. B.C.M. Fung, K. Wang, R. Chen, P.S. Yu, ACM Computing Surveys 42, Article No. 14 (2010)
18. F. Giannotti, D. Pedreschi, S. Pentland, P. Lukowicz, D. Kossmann, J. Crowley, D.A Helbing, Eur. Phys. J. Special Topics 214, 49 (2012)
19. F. Giannotti, G. Pedreschi, Mobility, Data Mining and Privacy - Geographic Knowledge Discovery (Springer, Berlin, 2008)
20. S. Gutwirth, R. Leenes, P. De Hert, Y. Poullet (eds.), European Data Protection: In Good Health? (Springer, New York, 2012)
21. D. Helbing, S. Bishop, R. Conte, P. Lukowicz, J.B. McCarthy, Eur. Phys. J. Special Topics 214, 11 (2012)
22. D. Helbing, S. Balietti, Eur. Phys. J. Special Topics 195, 3 (2011)
23. D. Helbing, I. Farkas, T. Vicsek, Nature 407, 487 (2000)
24. A. Hundepool, J. Domingo-Ferrer, L. Franconi, S. Giessing, E. Schulte Nordholt, K. Spicer, P.-P. de Wolf, Statistical Disclosure Control (Wiley, Chichester UK, 2012)
25. ICT Advisory Group Report of the ICT Advisory Group (ISTAG) European Challenges and Flagships. 2020 and beyond. (ftp://ftp.cordis.europa.eu/pub/fp7/ict/docs/ fet-proactive/press-17 en.pdf, 2009, Retrieved 9-7-2011)
26. A. Janc, L. Olejnik, Feasibility and Real-World Implications of Web Browser History Detection (http://w2spconf.com/2010/papers/p26.pdf, 2010, Retrieved 12-9-2012)
27. R.K. Merton, The Sociology of Science. Theoretical and Empirical Investigations (University of Chicago Press, Chicago, 1973)
28. A. Monreale, Privacy by Design in Data Mining, Ph.D. thesis, University of Pisa, 2011
29. A. Monreale, G.L. Andrienko, N.V. Andrienko, F. Giannotti, D. Pedreschi, S. Rinzivillo, S. Wrobel, Trans. Data Privacy 3, 91 (2010)
30. N. Monteiro No Privacy, no poetry, no progress (Department of Political Science, University of Chicago, Political Theory Workshop, 18 October 2004. www.pwt.uchicago.edu/monteiro002.pdf)
31. B. Moore, Privacy: Studies in Social and Cultural History (M.E. Sharpe, New York, 1984)
32. D. Nagel, M. Rath, M. Zimmer (eds.), Ethics of Secrecy (Special issue of International Review of Information Ethics 17, 2012)
33. T. Nagel, Philosophy Public Affairs 27, 3 (1998)
34. H. Nissenbaum, Washington Law Rev. 79, 119 (2004)
35. T.D. Perry, Professional Philosophy. What it is and Why it Matters (D. Reidel Publishing Company, Dordrecht, 1986)
36. J. Rawls, A Theory of Justice (The Belknap Press of Harvard University Press, Cambridge MA, 1971)
37. B. Roessler, The Value of Privacy (Polity Press, Cambridge, 2004)
38. S. Ruggieri, D. Pedreschi, F. Turini, ACM Transactions on Knowledge Discovery from Data 4, Article 9 (2010)
39. S. Ruggieri, D. Pedreschi, F. Turini, ACM International Conference on Management of Data (SIGMOD 2010), 1127 (2010)
40. F.D. Schoeman, Philosophical Dimensions of Privacy: An Anthology (Cambridge University Press; Cambridge, 1984)
41. J. Smart, M. Scott, J.B. McCarthy, K.T. Tan, P. Argyrakis, S. Bishop, R. Conte, S. Havlin, M. San Miguel, D. Stauffacher, Eur. Phys. J. Special Topics 214, 635 (2012)
42. J.F.C. Timmermans, R. Heersmink, M.J. van den Hoven, Ethical Issues of Emerging ICT Applications (ETICA Workpackage 2, Deliverable 2.2, http://moriarty.tech.dmu.ac.uk:8080/index.jsp?page=10525, 2010)
43. M.J. Van den Hoven, Austr. J. Prof. Appl. Ethics 1, 30 (1999)
44. M.J. Van den Hoven, E. Rooksby, Information technology and moral philosophy, edited by M.J. van den Hoven, J. Weckert (Cambridge University Press, Cambridge, 2008), p. 376
45. M.J. Van den Hoven, in The Cambridge. Handbook of Information and Computer Ethics edited by F. Luciano (Cambridge University Press, New York, 2010), p. 59
46. M.J. Van den Hoven, Informationage 7, 4 (2005)
47. M.J. Van den Hoven, G.J.C. Lokhorst, I.R. Van de Poel, Sci. Eng. Ethics 18, 143 (2012)
48. Van den Hoven, Information Technology and Moral Philosophy, edited by J. Van den Hoven, J. Weckert (Cambridge University Press, Cambridge, 2009), p. 301
49. J.D. Velleman, Self to Self. Selected essays (Cambridge University Press, Cambridge, 2006)
50. M. Walzer, Spheres of Justice (Blackwell, Oxford, 1983)
51. G. Wondracek, T. Holz, E. Kirda, C. Kruegel, Proceedings of the 2010 IEEE Symposium on Security and Privacy (IEEE, 2010), p. 223
1. Abul, O., Bonchi, F., and Giannotti F. Hiding Sequential and Spatiotemporal Patterns. IEEE Transactions of Knowledge and Data Engineering 22(12), 1709 (2010)
2. Appiah, A.Stereotypes and the Shaping of Identity California Law Review 88(1), 41 (2000)
3. Benkler, Y. and Nissenbaum, H. The Journal of Political Philosophy 4(14), 394 (2006)
4. Benn, S. A Theory of Freedom (Cambridge University Press, Cambridge, 1988)
5. Berlin, I. Four Essays on Liberty (Oxford University Press, Oxford, 1969)
6. boyd, d.[sic] and Crawford, K. Symposium on the Dynamics of the Internet and Society, September 2011. (available at: http://ssrn.com/abstract=1926431), 2011
7. Buckingham Shum, S., Aberer, K., Schmidt, A., Bishop, S., Lukowicz, P., Anderson, S., Charalabidis, Y., Domingue, J., de Freitas, S., Dunwell, I., Edmonds, B., Grey, F., Haklay, M., Jelasity, M., Karpistenko, A., Kohlhammer, J., Lewis, J., Pitt, J., Sumner R. and Helbing D. Towards a Global Participatory Platform: Democratising Open Data, Complexity Science and Collective Intelligence. European Physical Journal - Special Topics 214, final pagination (2012)
8. Christen M., Fischer J., Huppenbauer M., Tanner C. and van Schaik C. (eds.) Empirically Informed Ethics. Morality Between Facts and Norms (Springer, New York, in press).
9. Craig T. and Ludloff, M.E. Privacy and Big Data (O'Reilly, Sebastopol, 2011)
10. DeCew, J. W. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology (Cornell University Press, Ithaca NY, 1997)
11. De Laat, P.B. in Proceedings AISB/IACAP 2012, Stream Social Turn (available at http://events.cs.bham.ac.uk/turing12/proceedings/11.pdf#page=67), 2012
12. Diener, E. and Crandall, R. Ethics in Social and Behavioral Research (University of Chicago Press, Chicago IL, 1978)
13. Domingo-Ferrer, J. in: Proceedings of the 2010 international conference on Privacy in statistical databases (PSD'10), edited by Domingo-Ferrer J. and Magkos E. (SpringerVerlag, Berlin, 2010), p. 258
14. Eckersley, P. How Unique Is Your Web Browser? (Electronic Frontier Foundation, 2009)
15. Friedman, B. (Ed.) Human values and the design of computer technology (Cambridge University Press, New York, 1997)
16. Friedman, B. and Freier, N. G. in Theories of information behavior: A researcher's guide edited by K. E. Fisher, S. Erdelez, and E. F. McKechnie (Information today, Medford NJ, 2005), p. 368
17. Fung, B.C.M., Wang, K., Chen, R. and Yu, P.S. ACM Computing Surveys 42(4), Article No. 14 (2010)
18. Giannotti, F., Pedreschi, D., Pentland, S., Lukowicz, P., Kossmann, D., Crowley, J. and Helbing D. A Planetary Nervous System for social mining and collective awareness. European Physical Journal - Special Topics 214, final pagination (2012)
19. Giannotti, F., and Pedreschi, G. Mobility, Data Mining and Privacy - Geographic Knowledge Discovery (Springer, Berlin, 2008)
20. Gutwirth, S., Leenes, R., De Hert, P. and Poullet, Y. (eds.) European Data Protection: In Good Health?, (Springer, New York, 2012)
21. Helbing, D., Bishop, S., Conte, R., Lukowicz, P. and McCarthy, J.B. FuturICT: Participatory Computing to Understand and Manage our Complex World in a More Sustainable and Resilient Way. European Physical Journal - Special Topics 214, final pagination (2012)
22. Helbing, D. and Balietti, S. European Physical Journal - Special Topics 195, 3 (2011)
23. Helbing, D., Farkas, I. and Vicsek T. Nature 407, 487 (2000)
24. Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Schulte Nordholt, E., Spicer, K., and de Wolf, P.-P., Statistical Disclosure Control (Wiley, Chichester UK, 2012)
26. Janc, A., Olejnik, L. Feasibility and Real-World Implications of Web Browser History Detection (http://w2spconf.com/2010/papers/p26.pdf, 2010, Retrieved 12-9-2012)
27. Merton, R.K. The Sociology of Science. Theoretical and Empirical Investigations (University of Chicago Press, Chicago, 1973)
28. Monreale, A. Privacy by Design in Data Mining (PhD Thesis, University of Pisa, 2011).
29. Monreale, A., Andrienko, G.L., Andrienko, N.V., Giannotti, F., Pedreschi, D., Rinzivillo, S. and Wrobel, S. Transactions on Data Privacy 3(2), 91 (2010)
30. Monteiro, N. No Privacy, no poetry, no progress, (Department of Political Science, University of Chicago, Political Theory Workshop, 18 October 2004. www.pwt.uchicago.edu/monteiro002.pdf)
31. Moore, B, Privacy: Studies in Social and Cultural History (M.E. Sharpe, New York, 1984)
32. Nagel, D., Rath, M., Zimmer M. (eds.) Ethics of Secrecy (Special issue of International Review of Information Ethics 17, 2012)
33. Nagel, T. Philosophy & Public Affairs 27, 3 (1998)
34. Nissenbaum, H. Washington Law Review 79(1), 119 (2004)
35. Perry, T.D. Professional Philosophy. What it is and Why it Matters (D. Reidel Publishing Company, Dordrecht, 1986)
36. Rawls, J. A Theory of Justice (The Belknap Press of Harvard University Press, Cambridge MA, 1971)
37. Roessler, B. The Value of Privacy (Polity Press, Cambridge, 2004)
38. Ruggieri, S., Pedreschi, D. and Turini F. ACM Transactions on Knowledge Discovery from Data 4(2), Article 9 (2010)
39. Ruggieri, S., Pedreschi, D. and Turini F. ACM International Conference on Management of Data (SIGMOD 2010), 1127 (2010)
40. Schoeman, F.D. Philosophical Dimensions of Privacy: An Anthology (Cambridge University Press; Cambridge, 1984)
41. Smart, J., Scott, M., McCarthy, J.B., Tan, K.T., Argyrakis, P., Bishop, S., Conte, R., Havlin, S., San Miguel M. and Stauffacher D. The Governance, Financial and Legal Structure of FuturICT Confronting challenges. European Physical Journal - Special Topics 214, final pagination (2012)
42. Timmermans, J.F.C., Heersmink, R., and van den Hoven M.J. Ethical Issues of Emerging ICT Applications (ETICA Workpackage 2, Deliverable 2.2, http://moriarty.tech.dmu.ac.uk:8080/index.jsp?page=10525, 2010)
43. Van den Hoven, M. J. Australian Journal of Professional and Applied Ethics 1(1), 30 (1999)
44. Van den Hoven, M.J. and Rooksby, E. in Information technology and moral philosophy edited by MJ van den Hoven and J Weckert (Cambridge University Press, Cambridge, 2008) 376
45. Van den Hoven, M.J. in The Cambridge. Handbook of Information and Computer Ethics edited by Luciano Floridi (Cambridge University Press, New York, 2010), 59
46. Van den Hoven, M.J. Informationage 7(2), 4 (2005)
47. Van den Hoven, M.J., Lokhorst, G.J.C. and Van de Poel, I.R. Science and Engineering Ethics 18(1), 143 (2012)
48. Van den Hoven in: Information Technology and Moral Philosophy edited by J. Van den Hoven and John Weckert (Cambridge University Press, Cambridge, 2009), p. 301
49. Velleman, J.D. Self to Self. Selected essays (Cambridge University Press, Cambridge, 2006)
50. Walzer, M. Spheres of Justice (Blackwell, Oxford, 1983)
51. Wondracek, G., Holz, T., Kirda, E., and Kruegel, C. Proceedings of the 2010 IEEE Symposium on Security and Privacy (IEEE, 2010), 223