Harbinja, 2019
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Harbinja | Post-mortem privacy 2.0: theory, law, and technology | |
| Hartzog et al. | The case for online obscurity | |
| Väyrynen et al. | Knowledge protection challenges of social media encountered by organizations | |
| Iacovino | Shaping and reshaping cultural identity and memory: maximising human rights through a participatory archive | |
| Beye et al. | Privacy in online social networks | |
| Abed et al. | The challenges of institutional distance: Data privacy issues in cloud computing | |
| Chung et al. | Crisis communication strategy on social media and the public’s cognitive and affective responses: A case of foster farms salmonella outbreak | |
| Morse et al. | The posthumous privacy paradox: Privacy preferences and behavior regarding digital remains | |
| Barrett-Maitland et al. | Security in social networking services: a value-focused thinking exploration in understanding users’ privacy and security concerns | |
| Beyer et al. | Digital planning: the future of elder law | |
| Sold et al. | Researching extremist content on social media platforms: Data protection and research ethics challenges and opportunities | |
| Harbinja | Emails and death: Legal issues surrounding post-mortem transmission of emails | |
| Khosla et al. | Sexual and reproductive health and rights and bodily autonomy in a digital world | |
| Vaughan | Principle versus practice: the institutionalisation of ethics and research on the far right | |
| Lyons et al. | The Privacy Leader Compass: A Comprehensive Business-Oriented Roadmap for Building and Leading Practical Privacy Programs | |
| Ursic | The Failure of Control Rights in the Big Data Era: Does a Holistic Approach Offer a Solution? | |
| Hofman | " Between knowing and not knowing": privacy, transparency and digital records | |
| Barwick | All Blogs Go to Heaven: Preserving Valuable Digital Assets Without the Uniform Fiduciary Access to Digital Assets Act's Removal of Third Party Privacy Protections | |
| Pantic | Gatekeeping and unpublishing: How editors make publishing and unpublishing decisions | |
| Tye | Comment, Exploring the Intersections of Privacy and Generative AL: A Dive into Attorney-Client Privilege and ChatGPT, 64 | |
| Shore Ingber | Protecting private communications through law and policy: The case of the screenshot feature | |
| Bailey et al. | Reframing Technology-Facilitated Gender-Based Violence at the Intersections of Law & Society | |
| Kleve et al. | Code is Murphy's law | |
| Tanaya et al. | Legal Studies Regarding Pornography On Live Streaming Through Social Media In The Era Of Digital Disruption | |
| Little et al. | The unsolicited algorithm: unveiling gendered harms and (non) consent in apple iOS features |