1932

Abstract

What are, and what should be, the boundaries between self and society, individuals and groups? To address these questions, we synthesize research on privacy that is relevant for two foundational sociological issues: social order and inequality. By synthesizing work on a narrow yet fundamental set of issues, we aim to improve our understanding of privacy as well as provide a foundation for understanding contemporary privacy issues associated with information and communication technology. We explore the role of privacy in maintaining social order by examining the connections of privacy with social control and with group cohesion. We also discuss how inequality produces variation in privacy and how this variation in turn contributes to inequality. Throughout the review we identify potential directions for sociological research on privacy generally and in the context of new technologies. Our discussion highlights implications of privacy that extend beyond individual-level concerns to broader social, structural impacts.

Loading

Article metrics loading...

/content/journals/10.1146/annurev-soc-060116-053643
2017-07-31
2024-03-28
Loading full text...

Full text loading...

/deliver/fulltext/soc/43/1/annurev-soc-060116-053643.html?itemId=/content/journals/10.1146/annurev-soc-060116-053643&mimeType=html&fmt=ahah

Literature Cited

  1. Acquisti A, Brandimarte L, Loewenstein G. 2015. Privacy and human behavior in the age of information. Science 347:6221509–14 [Google Scholar]
  2. Altman I. 1977. Privacy regulation: culturally universal or culturally specific. J. Soc. Issues 33:66–84 [Google Scholar]
  3. Anthony D, Kotz D, Henderson T. 2007. Privacy in location-aware computing environments. IEEE Pervasive Comput 6:464–72 [Google Scholar]
  4. Anthony D, Stablein T, Carian EK. 2015. Big Brother in the Information Age: concerns about government information gathering over time. IEEE Secur. Priv. 13:412–19 [Google Scholar]
  5. Argyle M, Kendon A. 1967. The experimental analysis of social performance. Adv. Exp. Soc. Psychol. 3:55–98 [Google Scholar]
  6. Attewell P. 1987. Big Brother and the sweatshop: computer surveillance in the automated office. Sociol. Theory 5:187–100 [Google Scholar]
  7. Ball K. 2010. Workplace surveillance: an overview. Lab. Hist. 51:187–106 [Google Scholar]
  8. Balswick JO, Balkwell JW. 1977. Self-disclosure to same- and opposite-sex parents: an empirical test of insights from role theory. Sociometry 40:3282–86 [Google Scholar]
  9. Barocas S, Selbst AD. 2016. Big Data's disparate impact. Calif. Law Rev. 104:671–732 [Google Scholar]
  10. Bates AP. 1964. Privacy—a useful concept?. Soc. Forces 42:429–34 [Google Scholar]
  11. Beniger JR. 1986. The Control Revolution: Technological and Economic Origins of the Information Society Cambridge, MA: Harvard Univ. Press
  12. Bennett C, Haggerty KD, Lyon D, Steeves V. 2014. Transparent Lives: Surveillance in Canada Athabasca, Can.: Athabasca Univ.
  13. Bennett WL, Segerberg A. 2013. The Logic of Connective Action: Digital Media and the Personalization of Contentious Politics Cambridge, UK: Cambridge Univ. Press
  14. Bernstein L. 1992. Opting out of the legal system: extralegal contractual relations in the diamond industry. J. Leg. Stud. 21:1115–57 [Google Scholar]
  15. Blumer H. 1969. Symbolic Interactionism: Perspective and Method Berkeley: Univ. Calif. Press
  16. boyd d. 2014. It's Complicated: The Social Lives of Networked Teens New Haven, CT: Yale Univ. Press
  17. boyd d, Crawford K. 2012. Critical questions for Big Data. Inf. Commun. Soc. 15:5662–79 [Google Scholar]
  18. boyd d, Hargittai E. 2010. Facebook privacy settings: Who cares?. First Monday Aug. 2. http://firstmonday.org/article/view/3086/2589 [Google Scholar]
  19. Brayne S. 2014. Surveillance and system avoidance: criminal justice contact and institutional attachment. Am. Sociol. Rev. 79:3367–91 [Google Scholar]
  20. Brooks C, Manza J. 2013. Whose Rights: Counterterrorism and the Dark Side of American Public Opinion New York: Russell Sage Found.
  21. Campos-Castillo C, Anthony DL. 2015. The double-edged sword of electronic health records: implications for patient disclosure. J. Am. Med. Inform. Assoc 22e1e130–40 [Google Scholar]
  22. Campos-Castillo C, Hitlin S. 2013. Copresence: revisiting a building block for social interaction theories. Sociol. Theory 31:168–92 [Google Scholar]
  23. Cate FH. 1997. Privacy in the Information Age Washington, DC: Brookings Inst.
  24. Coleman JS. 1990. Foundations of Social Theory Cambridge, MA: Belknap Press
  25. Collins K. 2015. A quick guide to the worst corporate hack attacks. Bloomberg March 18. http://www.bloomberg.com/graphics/2014-data-breaches/ [Google Scholar]
  26. Consum. Watch. 2011. Liars and loans: how deceptive advertisers use Google Consum. Watch. Inside Google Rep., Consum. Watch Washington, DC: http://www.consumerwatchdog.org/resources/liarsandloansplus021011.pdf
  27. Coser RL. 1961. Insulation from observability and types of social conformity. Am. Sociol. Rev. 26:128–39 [Google Scholar]
  28. Cozby PC. 1972. Self-disclosure, reciprocity, and liking. Sociometry 35:1151–60 [Google Scholar]
  29. Danna A, Jr Gandy OH. 2001. All that glitters is not gold: digging beneath the surface of data mining. J. Bus. Ethics 40:373–86 [Google Scholar]
  30. Davis J. 2015. Hacking of government computers exposed 21.5 million people. New York Times, July 9. http://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html?_r=0
  31. Davis JL. 2014. Triangulating the self: identity processes in a connected era. Symb. Interact. 37:4500–23 [Google Scholar]
  32. Davis JL, Jurgenson N. 2014. Context collapse: theorizing context collusions and collisions. Inf. Commun. Soc. 17:4476–85 [Google Scholar]
  33. Dewey C. 2014. The only guide to Gamergate you will ever need to read. The Washington Post Oct. 14. https://www.washingtonpost.com/news/the-intersect/wp/2014/10/14/the-only-guide-to-gamergate-you-will-ever-need-to-read/ [Google Scholar]
  34. DiBenigno J, Kellogg KC. 2014. Beyond occupational differences: the importance of cross-cutting demographics and dyadic toolkits for collaboration in a U.S. hospital. Adm. Sci. Q. 59:3375–408 [Google Scholar]
  35. Diekmann A, Jann B, Przepiorka W, Wehrli S. 2014. Reputation formation and the evolution of cooperation in anonymous online markets. Am. Sociol. Rev. 79:65–85 [Google Scholar]
  36. Diekmann A, Przepiorka W, Rauhut H. 2015. Lifting the veil of ignorance: an experiment on the contagiousness of norm violations. Ration. Soc. 27:3309–33 [Google Scholar]
  37. Dixon P, Gellman R. 2014. The scoring of America: how secret consumer scores threaten your privacy and your future Rep., World. Priv Forum, San Diego, CA: http://www.worldprivacyforum.org/wp-content/uploads/2014/04/WPF_Scoring_of_America_April2014_fs.pdf
  38. Donath J, boyd d. 2004. Public displays of connection. BT Technol. J. 22:471–82 [Google Scholar]
  39. Doyle A, Lippert R, Lyon D. 2012. Eyes Everywhere: The Global Growth of Camera Surveillance London: Routledge
  40. Durkheim E. 1951. Suicide New York: Free Press
  41. Earl J. 2012. Private protest? Public and private engagement online. Inf. Commun. Soc. 15:4591–608 [Google Scholar]
  42. Eder D, Hallinan MT. 1978. Sex differences in children's friendships. Am. Sociol. Rev. 43:2237–50 [Google Scholar]
  43. Ellison G, Ellison SF. 2009. Search, obfuscation, and price elasticities on the Internet. Econometrica 77:427–29 [Google Scholar]
  44. Ellison N, Heino R, Gibbs J. 2006. Managing impressions online: self-presentation processes in the online dating environment. J. Comput.-Mediat. Commun. 11:2415–41 [Google Scholar]
  45. Etzioni A. 1999. The Limits of Privacy New York: Basic Books
  46. Feinberg M, Willer R, Schultz M. 2014. Gossip and ostracism promote cooperation in groups. Psychol. Sci. 25:3656–64 [Google Scholar]
  47. Foucault M. 1979. Discipline and Punish: The Birth of the Prison New York: Vintage Books
  48. Fox RC. 1959. Experiment Perilous: Physicians and Patients Facing the Unknown New York: Free Press
  49. Gambetta D. 2009. Codes of the Underworld Princeton, NJ: Princeton Univ. Press
  50. Jr Gandy OH. 1993. The Panoptic Sort: A Political Economy of Personal Information Boulder, CO: Westview Press
  51. Gibson DR. 2014. Enduring illusions: the social organization of secrecy and deception. Sociol. Theory 32:4283–306 [Google Scholar]
  52. Giddens A. 1990. The Consequences of Modernity Stanford, CA: Stanford Univ. Press
  53. Glaser BG, Strauss AL. 1964. Awareness contexts and social interaction. Am. Sociol. Rev. 29:5669–79 [Google Scholar]
  54. Goffman A. 2014. On the Run: Fugitive Life in an American City Chicago: Univ. Chicago Press
  55. Goffman E. 1959. The Presentation of Self in Everyday Life Garden City, NY: Doubleday
  56. Goffman E. 1961. Asylums: Essays on the Social Situation of Mental Patients and Other Inmates New York: Anchor Books
  57. Goffman E. 1963. Stigma: Notes on the Management of Spoiled Identity Englewood Cliffs, NJ: Prentice-Hall
  58. Goffman E. 1966. Behavior in Public Places: Notes on the Social Organization of Gatherings New York: Free Press
  59. Goold BJ. 2004. CCTV and Policing Oxford, UK: Oxford Univ. Press
  60. Goold BJ, Loader I, Thumala A. 2013. The banality of security: the curious case of surveillance cameras. Br. J. Criminol. 53:977–96 [Google Scholar]
  61. Grimshaw AD. 1982. Whose privacy? What harm?. Sociol. Methods Res. 11:2233–47 [Google Scholar]
  62. Haggerty KD. 2006. Tear down the walls: on demolishing the panopticon. Theorizing Surveillance: The Panopticon and Beyond D Lyon 23–45 Cullompton, UK: Willan Publ. [Google Scholar]
  63. Haggerty KD, Ericson RV. 2000. The surveillant assemblage. Br. J. Sociol. 51:4605–22 [Google Scholar]
  64. Hampton KN. 2016. Persistent and pervasive community: new communication technologies and the future of community. Am. Behav. Sci. 60:1101–24 [Google Scholar]
  65. Hargittai E, Hinnant A. 2008. Digital inequality differences in young adults’ use of the Internet. Commun. Res. 35:5602–21 [Google Scholar]
  66. Harrington CL, Bielby DD. 1995. Where did you hear that? Technology and the social organization of gossip. Sociol. Q. 36:3607–28 [Google Scholar]
  67. Hechter M. 1987. Principles of Group Solidarity Berkeley: Univ. Calif. Press
  68. Hechter M, Horne C. 2009. Theories of Social Order Palo Alto, CA: Stanford Univ. Press
  69. Hier SP. 2010. Panoptic Dreams Vancouver, Can.: Univ. British Columbia Press
  70. Jr. Hintz RA, Miller DE. 1995. Openings revisited: the foundations of social interaction. Symb. Interact. 18:3355–69 [Google Scholar]
  71. Hirschauer S. 2005. On doing being a stranger: the practical constitution of civil inattention. J. Theory Soc. Behav. 35:141–67 [Google Scholar]
  72. Hoadley CM, Xu H, Lee JJ, Rosson MB. 2010. Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron. Commer. Res. Appl. 9:50–60 [Google Scholar]
  73. Horne C. 2009. The Rewards of Punishment Stanford, CA: Stanford Univ. Press
  74. Horne C, Darras B, Bean E, Srivastava A, Frickel S. 2015. Privacy, technology, and norms: the case of smart meters. Soc. Sci. Res. 51:64–76 [Google Scholar]
  75. Howard P. 2015. Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up New Haven, CT: Yale Univ. Press
  76. Huey L. 2010. A social movement for privacy/against surveillance? Some difficulties in engendering mass resistance in a land of Twitter and tweets. Case West. Res. J. Int. Law 42:699–709 [Google Scholar]
  77. Johnson MP, Leslie L. 1982. Couple involvement and network structure: a test of the dyadic withdrawal hypothesis. Soc. Psychol. Q. 45:134–43 [Google Scholar]
  78. Joseph TD. 2011. “My life was filled with constant anxiety”: anti-immigrant discrimination, undocumented status, and their mental health implications for Brazilian immigrants. Race Soc. Probl. 3:170–81 [Google Scholar]
  79. Jourard SM. 1964. The Transparent Self: Self-Disclosure and Well-Being New York: Van Nostrand Reinhold
  80. Kanter RM. 1977. Men and Women of the Corporation New York: Basic Books
  81. Kasper DVS. 2007. Privacy as a social good. Soc. Thought Res. 28:165–89 [Google Scholar]
  82. Keizer K, Lindenberg S, Steg L. 2008. The spreading of disorder. Science 322:1681–85 [Google Scholar]
  83. Kitts JA. 2003. Egocentric bias or information management? Selective disclosure and the social roots of norm misperception. Soc. Psychol. Q. 66:3222–37 [Google Scholar]
  84. Lageson SE, Vuolo M, Uggen C. 2015. Legal ambiguity in managerial assessments of criminal records. Law Soc. Inq. 40:1175–204 [Google Scholar]
  85. Lamont M, Molnár V. 2002. The study of boundaries in the social sciences. Annu. Rev. Sociol. 28:167–95 [Google Scholar]
  86. Lawler EJ, Thye SR, Yoon J. 2011. Social Commitments in a Depersonalized World New York: Russell Sage Found.
  87. Levine JA. 2013. Ain't No Trust Berkeley: Univ. Calif. Press
  88. Levy KEC. 2015. The contexts of control: information, power, and truck-driving work. Inf. Soc. 31:2160–74 [Google Scholar]
  89. Lowry RP. 1972. Toward a sociology of secrecy and security systems. Soc. Probl. 19:4437–50 [Google Scholar]
  90. Lyon D. 1994. The Electronic Eye: The Rise of Surveillance Society Minneapolis: Univ. Minn. Press
  91. Lyon D. 2003. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination New York: Routledge
  92. Margulis ST. 1977. Conceptions of privacy: current status and next steps. J. Soc. Issues 33:35–21 [Google Scholar]
  93. Margulis ST. 2003. Privacy as a social issue and behavioral concept. J. Soc. Issues 59:2243–61 [Google Scholar]
  94. Martin JL. 2009. Social Structures Princeton, NJ: Princeton Univ. Press
  95. Marwick A, boyd d. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media Soc 13:1114–33 [Google Scholar]
  96. Marx GT. 2003. A tack in the shoe: neutralizing and resisting the new surveillance. J. Soc. Issues 59:2369–90 [Google Scholar]
  97. Marx GT. 2004. What's new about the “new surveillance”? Classifying for change and continuity. Knowl. Technol. Priv. 17:118–37 [Google Scholar]
  98. Marx GT. 2009. A tack in the shoe and taking off the shoe: neutralization and counter- neutralization dynamics. Surveill. Soc. 6:3294–306 [Google Scholar]
  99. McCarthy MT. 2016. The big data divide and its consequences. Sociol. Compass 10:1131–40 [Google Scholar]
  100. Merten DE. 1999. Enculturation into secrecy among junior high school girls. J. Contemp. Ethnogr. 28:2107–37 [Google Scholar]
  101. Miall CE. 1989. Authenticity and the disclosure of the information preserve: the case of adoptive parenthood. Q. Sociol. 12:3279–302 [Google Scholar]
  102. Jr Moore B. 1984. Privacy: Studies in Social and Cultural History Armonk, NY: M.E. Sharpe
  103. Murphy RF. 1964. Social distance and the veil. Am. Anthropol. 66:1257–74 [Google Scholar]
  104. Newman N. 2014. The costs of lost privacy: consumer harm and rising economic inequality in the age of Google. William Mitchell Law Rev 40:2849–89 [Google Scholar]
  105. Nippert-Eng C. 2010. Islands of Privacy Chicago: Univ. Chicago Press
  106. Nissenbaum H. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life Stanford, CA: Stanford Univ. Press
  107. Nock S. 1993. The Costs of Privacy: Surveillance and Reputation in America New York: Aldine de Gruyter
  108. O'Brien RL. 2008. Ineligible to save? Asset limits and the saving behavior of welfare recipients. J. Community Pract. 16:183–99 [Google Scholar]
  109. Ostrom E. 1990. Governing the Commons New York: Cambridge Univ. Press
  110. Pager D. 2003. The mark of a criminal record. Am. J. Sociol. 108:937–75 [Google Scholar]
  111. Pager D. 2007. Marked: Race, Crime, and Finding Work in an Era of Mass Incarceration Chicago: Univ. Chicago Press
  112. Parsons T. 1939. The professions and social structure. Soc. Forces 17:4457–67 [Google Scholar]
  113. Pasquale F. 2015. The Black Box Society Cambridge, MA: Harvard Univ. Press
  114. Petronio S. 2002. Boundaries of Privacy: Dialectics of Disclosure New York: SUNY Press
  115. Phillips DJ, Kim YK. 2009. Why pseudonyms? Deception as identity preservation among jazz record companies, 1920–1929. Organ. Sci. 20:3481–99 [Google Scholar]
  116. Piven FF, Cloward R. 1971. Regulating the Poor New York: Pantheon
  117. Podesta J, Pritzer P, Moniz EJ, Holdren J, Zients J. 2014. Big data: seizing opportunities, preserving values Rep., Exec. Off. Pres., White House Washington, DC: https://bigdatawg.nist.gov/pdf/big_data_privacy_report_may_1_2014.pdf
  118. Rainie L, Wellman B. 2012. Networked: The New Social Operating System Cambridge, MA: MIT Press
  119. Richardson L. 1988. Secrecy and status: the social construction of forbidden relationships. Am. Sociol. Rev. 53:2209–19 [Google Scholar]
  120. Ridgeway CL. 2011. Framed by Gender: How Gender Inequality Persists in the Modern World New York: Oxford Univ. Press
  121. Roberts JM, Gregor T. 1971. Privacy: a cultural view. Privacy JR Pennock, JW Chapman 189–225 New York: Atherton Press [Google Scholar]
  122. Rosenfeld J, Denice P. 2015. The power of transparency: evidence from a British workplace survey. Am. Sociol. Rev. 80:51045–68 [Google Scholar]
  123. Rubin Z, Hill CT, Peplau LA, Dunkel-Schetter C. 1980. Self-disclosure in dating couples: sex roles and the ethic of openness. J. Marriage Fam. 42:2305–17 [Google Scholar]
  124. Rule JB. 1973. Private Lives and Public Surveillance London: Allen Lane
  125. Rule JB. 2007. Privacy in Peril: How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience New York: Oxford Univ. Press
  126. Salop S, Stiglitz J. 1977. Bargains and ripoffs: a model of monopolistically competitive price dispersion. Rev. Econ. Stud. 44:493–510 [Google Scholar]
  127. Sampson RJ, Raudenbush SW, Earls F. 1997. Neighborhoods and violent crime: a multilevel study of collective efficacy. Science 277:5328918–24 [Google Scholar]
  128. Sauder M, Lynn F, Podolny JM. 2012. Status: insights from organizational sociology. Annu. Rev. Sociol. 37:267–83 [Google Scholar]
  129. Saval N. 2014. Cubed: A Secret History of the Workplace New York: Doubleday
  130. Schradie J. 2012. The trends of class, race, and ethnicity in social media inequality: Who still cannot afford to blog. Inf. Commun. Soc. 14:4555–71 [Google Scholar]
  131. Schwartz B. 1968. The social psychology of privacy. Am. J. Sociol. 73:6741–52 [Google Scholar]
  132. Schwartz RD. 1954. Social factors in the development of legal control: a case study of two Israeli settlements. Yale Law J 63:4471–91 [Google Scholar]
  133. Sewell G. 1998. The discipline of teams: the control of team-based industrial work through electronic and peer surveillance. Adm. Sci. Q. 43:2397–428 [Google Scholar]
  134. Sewell G, Wilkinson B. 1992. Someone to watch over me: surveillance, discipline, and the just- in-time labour process. Sociology 26:2271–89 [Google Scholar]
  135. Shalhoub-Kevorkian N. 2010. E-resistance and technological in/security in everyday life: the Palestinian case. Br. J. Criminol. 52:55–72 [Google Scholar]
  136. Shamas D, Arastu N. 2016. Mapping Muslims: NYPD spying and its impact on American Muslims Rep., Muslim Am. Civ. Lib. Coalit., Creating Law Enforc. Account. Responsib., Asian Am. Leg. Def. Educ Fund, New York: http://www.law.cuny.edu/academics/clinics/immigration/clear/Mapping-Muslims.pdf
  137. Shils EA. 1956. The Torment of Secrecy: The Background and Consequences of American Security Policies Glencoe, IL: The Free Press
  138. Shils EA. 1966. Privacy: its constitution and vicissitudes. Law Contemp. Probl. 31:2281–306 [Google Scholar]
  139. Simmel G. 1906. The sociology of secrecy and of secret societies. Am. J. Sociol. 11:4441–98 [Google Scholar]
  140. Simmel G. 1950. The Sociology of Georg Simmel New York: The Free Press
  141. Simmel G. 1955. Conflict and the Web of Group Affiliations New York: The Free Press
  142. Solove DJ. 2008. Understanding Privacy Cambridge, MA: Harvard Univ. Press
  143. Stablein T, Hall JL, Pervis C, Anthony DL. 2015. Negotiating stigma in health care: disclosure and the role of electronic health records. Health Sociol. Rev. 24:227–41 [Google Scholar]
  144. Stark L. 2016. The emotional context of information privacy. Inf. Soc. 32:114–27 [Google Scholar]
  145. Stuart G. 2003. Discriminating Risk: The U.S. Mortgage Lending Industry in the Twentieth Century. Ithaca, NY: Cornell Univ. Press
  146. Sweeney L. 2013. Discrimination in online ad delivery. Comm. ACM 56:544–54 [Google Scholar]
  147. Tabuchi H. 2015. $10 million settlement in target data breach gets preliminary approval. New York Times, March 19. http://www.nytimes.com/2015/03/20/business/target-settlement-on-data-breach.html?_r=0
  148. Uggen C, Vuolo M, Lageson S, Ruhland E, Whitham HK. 2014. The edge of stigma: an experimental audit of the effects of low-level criminal records on unemployment. Criminology 52:4627–54 [Google Scholar]
  149. Varian HR. 1985. Price discrimination and social welfare. Am. Econ. Rev. 75:4870–75 [Google Scholar]
  150. Varian HR, Wallenberg F, Woroch G. 2005. The demographics of the Do-Not-Call list. IEEE Secur. Priv. 3:34–39 [Google Scholar]
  151. Vitak J. 2012. The impact of context collapse and privacy on social network site disclosures. J. Broadcast. Electron. Media 56:4451–70 [Google Scholar]
  152. Waldo J, Lin HS, Millett LI. 2007. Engaging Privacy and Information Technology in a Digital Age Washington, DC: Natl. Acad. Press
  153. Warren C, Laslett B. 1977. Privacy and secrecy: a conceptual comparison. J. Soc. Issues 33:343–51 [Google Scholar]
  154. Weber M. 1978 (1921). Economy and Society 2 G Roth, C Wittich Berkeley: Univ. Calif. Press
  155. Welsh BC, Farrington DP. 2009. Public area CCTV and crime prevention: an updated systematic review and meta-analysis. Justice Q 26:4716–45 [Google Scholar]
  156. Westin AF. 1970. Privacy and Freedom New York: Atheneum
  157. Westin AF. 2003. Social and political dimensions of privacy. J. Soc. Issues 59:2431–53 [Google Scholar]
  158. Williams R, Nesiba R, McConnell ED. 2005. The changing face of inequality in home mortgage lending. Soc. Probl. 52:2181–208 [Google Scholar]
  159. Wilsnack RW. 1980. Information control: a conceptual framework for sociological analysis. Urban Life 8:4467–99 [Google Scholar]
  160. Zerubavel E. 1979. Private time and public time: the temporal structure of social accessibility and professional commitments. Soc. Forces 58:138–58 [Google Scholar]
  161. Zerubavel E. 2006. The Elephant in the Room: Silence and Denial in Everyday Life New York: Oxford Univ. Press
  162. Zureik E, Stalker LH, Smith E, Lyon D, Chan YE. 2010. Surveillance, Privacy, and the Globalization of Personal Information: International Comparisons Montreal: McGill Queens Univ. Press
/content/journals/10.1146/annurev-soc-060116-053643
Loading
  • Article Type: Review Article
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error