1932

Abstract

What are, and what should be, the boundaries between self and society, individuals and groups? To address these questions, we synthesize research on privacy that is relevant for two foundational sociological issues: social order and inequality. By synthesizing work on a narrow yet fundamental set of issues, we aim to improve our understanding of privacy as well as provide a foundation for understanding contemporary privacy issues associated with information and communication technology. We explore the role of privacy in maintaining social order by examining the connections of privacy with social control and with group cohesion. We also discuss how inequality produces variation in privacy and how this variation in turn contributes to inequality. Throughout the review we identify potential directions for sociological research on privacy generally and in the context of new technologies. Our discussion highlights implications of privacy that extend beyond individual-level concerns to broader social, structural impacts.

Loading

Article metrics loading...

/content/journals/10.1146/annurev-soc-060116-053643
2017-07-31
2024-06-17
Loading full text...

Full text loading...

/deliver/fulltext/soc/43/1/annurev-soc-060116-053643.html?itemId=/content/journals/10.1146/annurev-soc-060116-053643&mimeType=html&fmt=ahah

Literature Cited

  1. Acquisti A, Brandimarte L, Loewenstein G. 2015. Privacy and human behavior in the age of information. Science 347:6221509–14 [Google Scholar]
  2. Altman I. 1977. Privacy regulation: culturally universal or culturally specific. J. Soc. Issues 33:66–84 [Google Scholar]
  3. Anthony D, Kotz D, Henderson T. 2007. Privacy in location-aware computing environments. IEEE Pervasive Comput 6:464–72 [Google Scholar]
  4. Anthony D, Stablein T, Carian EK. 2015. Big Brother in the Information Age: concerns about government information gathering over time. IEEE Secur. Priv. 13:412–19 [Google Scholar]
  5. Argyle M, Kendon A. 1967. The experimental analysis of social performance. Adv. Exp. Soc. Psychol. 3:55–98 [Google Scholar]
  6. Attewell P. 1987. Big Brother and the sweatshop: computer surveillance in the automated office. Sociol. Theory 5:187–100 [Google Scholar]
  7. Ball K. 2010. Workplace surveillance: an overview. Lab. Hist. 51:187–106 [Google Scholar]
  8. Balswick JO, Balkwell JW. 1977. Self-disclosure to same- and opposite-sex parents: an empirical test of insights from role theory. Sociometry 40:3282–86 [Google Scholar]
  9. Barocas S, Selbst AD. 2016. Big Data's disparate impact. Calif. Law Rev. 104:671–732 [Google Scholar]
  10. Bates AP. 1964. Privacy—a useful concept?. Soc. Forces 42:429–34 [Google Scholar]
  11. Beniger JR. 1986. The Control Revolution: Technological and Economic Origins of the Information Society Cambridge, MA: Harvard Univ. Press [Google Scholar]
  12. Bennett C, Haggerty KD, Lyon D, Steeves V. 2014. Transparent Lives: Surveillance in Canada Athabasca, Can.: Athabasca Univ. [Google Scholar]
  13. Bennett WL, Segerberg A. 2013. The Logic of Connective Action: Digital Media and the Personalization of Contentious Politics Cambridge, UK: Cambridge Univ. Press [Google Scholar]
  14. Bernstein L. 1992. Opting out of the legal system: extralegal contractual relations in the diamond industry. J. Leg. Stud. 21:1115–57 [Google Scholar]
  15. Blumer H. 1969. Symbolic Interactionism: Perspective and Method Berkeley: Univ. Calif. Press [Google Scholar]
  16. boyd d. 2014. It's Complicated: The Social Lives of Networked Teens New Haven, CT: Yale Univ. Press [Google Scholar]
  17. boyd d, Crawford K. 2012. Critical questions for Big Data. Inf. Commun. Soc. 15:5662–79 [Google Scholar]
  18. boyd d, Hargittai E. 2010. Facebook privacy settings: Who cares?. First Monday Aug. 2. http://firstmonday.org/article/view/3086/2589 [Google Scholar]
  19. Brayne S. 2014. Surveillance and system avoidance: criminal justice contact and institutional attachment. Am. Sociol. Rev. 79:3367–91 [Google Scholar]
  20. Brooks C, Manza J. 2013. Whose Rights: Counterterrorism and the Dark Side of American Public Opinion New York: Russell Sage Found. [Google Scholar]
  21. Campos-Castillo C, Anthony DL. 2015. The double-edged sword of electronic health records: implications for patient disclosure. J. Am. Med. Inform. Assoc 22e1e130–40 [Google Scholar]
  22. Campos-Castillo C, Hitlin S. 2013. Copresence: revisiting a building block for social interaction theories. Sociol. Theory 31:168–92 [Google Scholar]
  23. Cate FH. 1997. Privacy in the Information Age Washington, DC: Brookings Inst. [Google Scholar]
  24. Coleman JS. 1990. Foundations of Social Theory Cambridge, MA: Belknap Press [Google Scholar]
  25. Collins K. 2015. A quick guide to the worst corporate hack attacks. Bloomberg March 18. http://www.bloomberg.com/graphics/2014-data-breaches/ [Google Scholar]
  26. Consum. Watch. 2011. Liars and loans: how deceptive advertisers use Google Consum. Watch. Inside Google Rep., Consum. Watch Washington, DC: http://www.consumerwatchdog.org/resources/liarsandloansplus021011.pdf [Google Scholar]
  27. Coser RL. 1961. Insulation from observability and types of social conformity. Am. Sociol. Rev. 26:128–39 [Google Scholar]
  28. Cozby PC. 1972. Self-disclosure, reciprocity, and liking. Sociometry 35:1151–60 [Google Scholar]
  29. Danna A, Jr Gandy OH. 2001. All that glitters is not gold: digging beneath the surface of data mining. J. Bus. Ethics 40:373–86 [Google Scholar]
  30. Davis J. 2015. Hacking of government computers exposed 21.5 million people. New York Times, July 9. http://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html?_r=0
  31. Davis JL. 2014. Triangulating the self: identity processes in a connected era. Symb. Interact. 37:4500–23 [Google Scholar]
  32. Davis JL, Jurgenson N. 2014. Context collapse: theorizing context collusions and collisions. Inf. Commun. Soc. 17:4476–85 [Google Scholar]
  33. Dewey C. 2014. The only guide to Gamergate you will ever need to read. The Washington Post Oct. 14. https://www.washingtonpost.com/news/the-intersect/wp/2014/10/14/the-only-guide-to-gamergate-you-will-ever-need-to-read/ [Google Scholar]
  34. DiBenigno J, Kellogg KC. 2014. Beyond occupational differences: the importance of cross-cutting demographics and dyadic toolkits for collaboration in a U.S. hospital. Adm. Sci. Q. 59:3375–408 [Google Scholar]
  35. Diekmann A, Jann B, Przepiorka W, Wehrli S. 2014. Reputation formation and the evolution of cooperation in anonymous online markets. Am. Sociol. Rev. 79:65–85 [Google Scholar]
  36. Diekmann A, Przepiorka W, Rauhut H. 2015. Lifting the veil of ignorance: an experiment on the contagiousness of norm violations. Ration. Soc. 27:3309–33 [Google Scholar]
  37. Dixon P, Gellman R. 2014. The scoring of America: how secret consumer scores threaten your privacy and your future Rep., World. Priv Forum, San Diego, CA: http://www.worldprivacyforum.org/wp-content/uploads/2014/04/WPF_Scoring_of_America_April2014_fs.pdf [Google Scholar]
  38. Donath J, boyd d. 2004. Public displays of connection. BT Technol. J. 22:471–82 [Google Scholar]
  39. Doyle A, Lippert R, Lyon D. 2012. Eyes Everywhere: The Global Growth of Camera Surveillance London: Routledge [Google Scholar]
  40. Durkheim E. 1951. Suicide New York: Free Press [Google Scholar]
  41. Earl J. 2012. Private protest? Public and private engagement online. Inf. Commun. Soc. 15:4591–608 [Google Scholar]
  42. Eder D, Hallinan MT. 1978. Sex differences in children's friendships. Am. Sociol. Rev. 43:2237–50 [Google Scholar]
  43. Ellison G, Ellison SF. 2009. Search, obfuscation, and price elasticities on the Internet. Econometrica 77:427–29 [Google Scholar]
  44. Ellison N, Heino R, Gibbs J. 2006. Managing impressions online: self-presentation processes in the online dating environment. J. Comput.-Mediat. Commun. 11:2415–41 [Google Scholar]
  45. Etzioni A. 1999. The Limits of Privacy New York: Basic Books [Google Scholar]
  46. Feinberg M, Willer R, Schultz M. 2014. Gossip and ostracism promote cooperation in groups. Psychol. Sci. 25:3656–64 [Google Scholar]
  47. Foucault M. 1979. Discipline and Punish: The Birth of the Prison New York: Vintage Books [Google Scholar]
  48. Fox RC. 1959. Experiment Perilous: Physicians and Patients Facing the Unknown New York: Free Press [Google Scholar]
  49. Gambetta D. 2009. Codes of the Underworld Princeton, NJ: Princeton Univ. Press [Google Scholar]
  50. Jr Gandy OH. 1993. The Panoptic Sort: A Political Economy of Personal Information Boulder, CO: Westview Press [Google Scholar]
  51. Gibson DR. 2014. Enduring illusions: the social organization of secrecy and deception. Sociol. Theory 32:4283–306 [Google Scholar]
  52. Giddens A. 1990. The Consequences of Modernity Stanford, CA: Stanford Univ. Press [Google Scholar]
  53. Glaser BG, Strauss AL. 1964. Awareness contexts and social interaction. Am. Sociol. Rev. 29:5669–79 [Google Scholar]
  54. Goffman A. 2014. On the Run: Fugitive Life in an American City Chicago: Univ. Chicago Press [Google Scholar]
  55. Goffman E. 1959. The Presentation of Self in Everyday Life Garden City, NY: Doubleday [Google Scholar]
  56. Goffman E. 1961. Asylums: Essays on the Social Situation of Mental Patients and Other Inmates New York: Anchor Books [Google Scholar]
  57. Goffman E. 1963. Stigma: Notes on the Management of Spoiled Identity Englewood Cliffs, NJ: Prentice-Hall [Google Scholar]
  58. Goffman E. 1966. Behavior in Public Places: Notes on the Social Organization of Gatherings New York: Free Press [Google Scholar]
  59. Goold BJ. 2004. CCTV and Policing Oxford, UK: Oxford Univ. Press [Google Scholar]
  60. Goold BJ, Loader I, Thumala A. 2013. The banality of security: the curious case of surveillance cameras. Br. J. Criminol. 53:977–96 [Google Scholar]
  61. Grimshaw AD. 1982. Whose privacy? What harm?. Sociol. Methods Res. 11:2233–47 [Google Scholar]
  62. Haggerty KD. 2006. Tear down the walls: on demolishing the panopticon. Theorizing Surveillance: The Panopticon and Beyond D Lyon 23–45 Cullompton, UK: Willan Publ. [Google Scholar]
  63. Haggerty KD, Ericson RV. 2000. The surveillant assemblage. Br. J. Sociol. 51:4605–22 [Google Scholar]
  64. Hampton KN. 2016. Persistent and pervasive community: new communication technologies and the future of community. Am. Behav. Sci. 60:1101–24 [Google Scholar]
  65. Hargittai E, Hinnant A. 2008. Digital inequality differences in young adults’ use of the Internet. Commun. Res. 35:5602–21 [Google Scholar]
  66. Harrington CL, Bielby DD. 1995. Where did you hear that? Technology and the social organization of gossip. Sociol. Q. 36:3607–28 [Google Scholar]
  67. Hechter M. 1987. Principles of Group Solidarity Berkeley: Univ. Calif. Press [Google Scholar]
  68. Hechter M, Horne C. 2009. Theories of Social Order Palo Alto, CA: Stanford Univ. Press [Google Scholar]
  69. Hier SP. 2010. Panoptic Dreams Vancouver, Can.: Univ. British Columbia Press [Google Scholar]
  70. Jr. Hintz RA, Miller DE. 1995. Openings revisited: the foundations of social interaction. Symb. Interact. 18:3355–69 [Google Scholar]
  71. Hirschauer S. 2005. On doing being a stranger: the practical constitution of civil inattention. J. Theory Soc. Behav. 35:141–67 [Google Scholar]
  72. Hoadley CM, Xu H, Lee JJ, Rosson MB. 2010. Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron. Commer. Res. Appl. 9:50–60 [Google Scholar]
  73. Horne C. 2009. The Rewards of Punishment Stanford, CA: Stanford Univ. Press [Google Scholar]
  74. Horne C, Darras B, Bean E, Srivastava A, Frickel S. 2015. Privacy, technology, and norms: the case of smart meters. Soc. Sci. Res. 51:64–76 [Google Scholar]
  75. Howard P. 2015. Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up New Haven, CT: Yale Univ. Press [Google Scholar]
  76. Huey L. 2010. A social movement for privacy/against surveillance? Some difficulties in engendering mass resistance in a land of Twitter and tweets. Case West. Res. J. Int. Law 42:699–709 [Google Scholar]
  77. Johnson MP, Leslie L. 1982. Couple involvement and network structure: a test of the dyadic withdrawal hypothesis. Soc. Psychol. Q. 45:134–43 [Google Scholar]
  78. Joseph TD. 2011. “My life was filled with constant anxiety”: anti-immigrant discrimination, undocumented status, and their mental health implications for Brazilian immigrants. Race Soc. Probl. 3:170–81 [Google Scholar]
  79. Jourard SM. 1964. The Transparent Self: Self-Disclosure and Well-Being New York: Van Nostrand Reinhold [Google Scholar]
  80. Kanter RM. 1977. Men and Women of the Corporation New York: Basic Books [Google Scholar]
  81. Kasper DVS. 2007. Privacy as a social good. Soc. Thought Res. 28:165–89 [Google Scholar]
  82. Keizer K, Lindenberg S, Steg L. 2008. The spreading of disorder. Science 322:1681–85 [Google Scholar]
  83. Kitts JA. 2003. Egocentric bias or information management? Selective disclosure and the social roots of norm misperception. Soc. Psychol. Q. 66:3222–37 [Google Scholar]
  84. Lageson SE, Vuolo M, Uggen C. 2015. Legal ambiguity in managerial assessments of criminal records. Law Soc. Inq. 40:1175–204 [Google Scholar]
  85. Lamont M, Molnár V. 2002. The study of boundaries in the social sciences. Annu. Rev. Sociol. 28:167–95 [Google Scholar]
  86. Lawler EJ, Thye SR, Yoon J. 2011. Social Commitments in a Depersonalized World New York: Russell Sage Found. [Google Scholar]
  87. Levine JA. 2013. Ain't No Trust Berkeley: Univ. Calif. Press [Google Scholar]
  88. Levy KEC. 2015. The contexts of control: information, power, and truck-driving work. Inf. Soc. 31:2160–74 [Google Scholar]
  89. Lowry RP. 1972. Toward a sociology of secrecy and security systems. Soc. Probl. 19:4437–50 [Google Scholar]
  90. Lyon D. 1994. The Electronic Eye: The Rise of Surveillance Society Minneapolis: Univ. Minn. Press [Google Scholar]
  91. Lyon D. 2003. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination New York: Routledge [Google Scholar]
  92. Margulis ST. 1977. Conceptions of privacy: current status and next steps. J. Soc. Issues 33:35–21 [Google Scholar]
  93. Margulis ST. 2003. Privacy as a social issue and behavioral concept. J. Soc. Issues 59:2243–61 [Google Scholar]
  94. Martin JL. 2009. Social Structures Princeton, NJ: Princeton Univ. Press [Google Scholar]
  95. Marwick A, boyd d. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media Soc 13:1114–33 [Google Scholar]
  96. Marx GT. 2003. A tack in the shoe: neutralizing and resisting the new surveillance. J. Soc. Issues 59:2369–90 [Google Scholar]
  97. Marx GT. 2004. What's new about the “new surveillance”? Classifying for change and continuity. Knowl. Technol. Priv. 17:118–37 [Google Scholar]
  98. Marx GT. 2009. A tack in the shoe and taking off the shoe: neutralization and counter- neutralization dynamics. Surveill. Soc. 6:3294–306 [Google Scholar]
  99. McCarthy MT. 2016. The big data divide and its consequences. Sociol. Compass 10:1131–40 [Google Scholar]
  100. Merten DE. 1999. Enculturation into secrecy among junior high school girls. J. Contemp. Ethnogr. 28:2107–37 [Google Scholar]
  101. Miall CE. 1989. Authenticity and the disclosure of the information preserve: the case of adoptive parenthood. Q. Sociol. 12:3279–302 [Google Scholar]
  102. Jr Moore B. 1984. Privacy: Studies in Social and Cultural History Armonk, NY: M.E. Sharpe [Google Scholar]
  103. Murphy RF. 1964. Social distance and the veil. Am. Anthropol. 66:1257–74 [Google Scholar]
  104. Newman N. 2014. The costs of lost privacy: consumer harm and rising economic inequality in the age of Google. William Mitchell Law Rev 40:2849–89 [Google Scholar]
  105. Nippert-Eng C. 2010. Islands of Privacy Chicago: Univ. Chicago Press [Google Scholar]
  106. Nissenbaum H. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life Stanford, CA: Stanford Univ. Press [Google Scholar]
  107. Nock S. 1993. The Costs of Privacy: Surveillance and Reputation in America New York: Aldine de Gruyter [Google Scholar]
  108. O'Brien RL. 2008. Ineligible to save? Asset limits and the saving behavior of welfare recipients. J. Community Pract. 16:183–99 [Google Scholar]
  109. Ostrom E. 1990. Governing the Commons New York: Cambridge Univ. Press [Google Scholar]
  110. Pager D. 2003. The mark of a criminal record. Am. J. Sociol. 108:937–75 [Google Scholar]
  111. Pager D. 2007. Marked: Race, Crime, and Finding Work in an Era of Mass Incarceration Chicago: Univ. Chicago Press [Google Scholar]
  112. Parsons T. 1939. The professions and social structure. Soc. Forces 17:4457–67 [Google Scholar]
  113. Pasquale F. 2015. The Black Box Society Cambridge, MA: Harvard Univ. Press [Google Scholar]
  114. Petronio S. 2002. Boundaries of Privacy: Dialectics of Disclosure New York: SUNY Press [Google Scholar]
  115. Phillips DJ, Kim YK. 2009. Why pseudonyms? Deception as identity preservation among jazz record companies, 1920–1929. Organ. Sci. 20:3481–99 [Google Scholar]
  116. Piven FF, Cloward R. 1971. Regulating the Poor New York: Pantheon [Google Scholar]
  117. Podesta J, Pritzer P, Moniz EJ, Holdren J, Zients J. 2014. Big data: seizing opportunities, preserving values Rep., Exec. Off. Pres., White House Washington, DC: https://bigdatawg.nist.gov/pdf/big_data_privacy_report_may_1_2014.pdf [Google Scholar]
  118. Rainie L, Wellman B. 2012. Networked: The New Social Operating System Cambridge, MA: MIT Press [Google Scholar]
  119. Richardson L. 1988. Secrecy and status: the social construction of forbidden relationships. Am. Sociol. Rev. 53:2209–19 [Google Scholar]
  120. Ridgeway CL. 2011. Framed by Gender: How Gender Inequality Persists in the Modern World New York: Oxford Univ. Press [Google Scholar]
  121. Roberts JM, Gregor T. 1971. Privacy: a cultural view. Privacy JR Pennock, JW Chapman 189–225 New York: Atherton Press [Google Scholar]
  122. Rosenfeld J, Denice P. 2015. The power of transparency: evidence from a British workplace survey. Am. Sociol. Rev. 80:51045–68 [Google Scholar]
  123. Rubin Z, Hill CT, Peplau LA, Dunkel-Schetter C. 1980. Self-disclosure in dating couples: sex roles and the ethic of openness. J. Marriage Fam. 42:2305–17 [Google Scholar]
  124. Rule JB. 1973. Private Lives and Public Surveillance London: Allen Lane [Google Scholar]
  125. Rule JB. 2007. Privacy in Peril: How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience New York: Oxford Univ. Press [Google Scholar]
  126. Salop S, Stiglitz J. 1977. Bargains and ripoffs: a model of monopolistically competitive price dispersion. Rev. Econ. Stud. 44:493–510 [Google Scholar]
  127. Sampson RJ, Raudenbush SW, Earls F. 1997. Neighborhoods and violent crime: a multilevel study of collective efficacy. Science 277:5328918–24 [Google Scholar]
  128. Sauder M, Lynn F, Podolny JM. 2012. Status: insights from organizational sociology. Annu. Rev. Sociol. 37:267–83 [Google Scholar]
  129. Saval N. 2014. Cubed: A Secret History of the Workplace New York: Doubleday [Google Scholar]
  130. Schradie J. 2012. The trends of class, race, and ethnicity in social media inequality: Who still cannot afford to blog. Inf. Commun. Soc. 14:4555–71 [Google Scholar]
  131. Schwartz B. 1968. The social psychology of privacy. Am. J. Sociol. 73:6741–52 [Google Scholar]
  132. Schwartz RD. 1954. Social factors in the development of legal control: a case study of two Israeli settlements. Yale Law J 63:4471–91 [Google Scholar]
  133. Sewell G. 1998. The discipline of teams: the control of team-based industrial work through electronic and peer surveillance. Adm. Sci. Q. 43:2397–428 [Google Scholar]
  134. Sewell G, Wilkinson B. 1992. Someone to watch over me: surveillance, discipline, and the just- in-time labour process. Sociology 26:2271–89 [Google Scholar]
  135. Shalhoub-Kevorkian N. 2010. E-resistance and technological in/security in everyday life: the Palestinian case. Br. J. Criminol. 52:55–72 [Google Scholar]
  136. Shamas D, Arastu N. 2016. Mapping Muslims: NYPD spying and its impact on American Muslims Rep., Muslim Am. Civ. Lib. Coalit., Creating Law Enforc. Account. Responsib., Asian Am. Leg. Def. Educ Fund, New York: http://www.law.cuny.edu/academics/clinics/immigration/clear/Mapping-Muslims.pdf [Google Scholar]
  137. Shils EA. 1956. The Torment of Secrecy: The Background and Consequences of American Security Policies Glencoe, IL: The Free Press [Google Scholar]
  138. Shils EA. 1966. Privacy: its constitution and vicissitudes. Law Contemp. Probl. 31:2281–306 [Google Scholar]
  139. Simmel G. 1906. The sociology of secrecy and of secret societies. Am. J. Sociol. 11:4441–98 [Google Scholar]
  140. Simmel G. 1950. The Sociology of Georg Simmel New York: The Free Press [Google Scholar]
  141. Simmel G. 1955. Conflict and the Web of Group Affiliations New York: The Free Press [Google Scholar]
  142. Solove DJ. 2008. Understanding Privacy Cambridge, MA: Harvard Univ. Press [Google Scholar]
  143. Stablein T, Hall JL, Pervis C, Anthony DL. 2015. Negotiating stigma in health care: disclosure and the role of electronic health records. Health Sociol. Rev. 24:227–41 [Google Scholar]
  144. Stark L. 2016. The emotional context of information privacy. Inf. Soc. 32:114–27 [Google Scholar]
  145. Stuart G. 2003. Discriminating Risk: The U.S. Mortgage Lending Industry in the Twentieth Century. Ithaca, NY: Cornell Univ. Press [Google Scholar]
  146. Sweeney L. 2013. Discrimination in online ad delivery. Comm. ACM 56:544–54 [Google Scholar]
  147. Tabuchi H. 2015. $10 million settlement in target data breach gets preliminary approval. New York Times, March 19. http://www.nytimes.com/2015/03/20/business/target-settlement-on-data-breach.html?_r=0
  148. Uggen C, Vuolo M, Lageson S, Ruhland E, Whitham HK. 2014. The edge of stigma: an experimental audit of the effects of low-level criminal records on unemployment. Criminology 52:4627–54 [Google Scholar]
  149. Varian HR. 1985. Price discrimination and social welfare. Am. Econ. Rev. 75:4870–75 [Google Scholar]
  150. Varian HR, Wallenberg F, Woroch G. 2005. The demographics of the Do-Not-Call list. IEEE Secur. Priv. 3:34–39 [Google Scholar]
  151. Vitak J. 2012. The impact of context collapse and privacy on social network site disclosures. J. Broadcast. Electron. Media 56:4451–70 [Google Scholar]
  152. Waldo J, Lin HS, Millett LI. 2007. Engaging Privacy and Information Technology in a Digital Age Washington, DC: Natl. Acad. Press [Google Scholar]
  153. Warren C, Laslett B. 1977. Privacy and secrecy: a conceptual comparison. J. Soc. Issues 33:343–51 [Google Scholar]
  154. Weber M. 1978 (1921). Economy and Society 2 G Roth, C Wittich Berkeley: Univ. Calif. Press [Google Scholar]
  155. Welsh BC, Farrington DP. 2009. Public area CCTV and crime prevention: an updated systematic review and meta-analysis. Justice Q 26:4716–45 [Google Scholar]
  156. Westin AF. 1970. Privacy and Freedom New York: Atheneum [Google Scholar]
  157. Westin AF. 2003. Social and political dimensions of privacy. J. Soc. Issues 59:2431–53 [Google Scholar]
  158. Williams R, Nesiba R, McConnell ED. 2005. The changing face of inequality in home mortgage lending. Soc. Probl. 52:2181–208 [Google Scholar]
  159. Wilsnack RW. 1980. Information control: a conceptual framework for sociological analysis. Urban Life 8:4467–99 [Google Scholar]
  160. Zerubavel E. 1979. Private time and public time: the temporal structure of social accessibility and professional commitments. Soc. Forces 58:138–58 [Google Scholar]
  161. Zerubavel E. 2006. The Elephant in the Room: Silence and Denial in Everyday Life New York: Oxford Univ. Press [Google Scholar]
  162. Zureik E, Stalker LH, Smith E, Lyon D, Chan YE. 2010. Surveillance, Privacy, and the Globalization of Personal Information: International Comparisons Montreal: McGill Queens Univ. Press [Google Scholar]
/content/journals/10.1146/annurev-soc-060116-053643
Loading
  • Article Type: Review Article
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error