Skip to main content
  1. Posts/

Open Source PhD: April 2018

·4 mins

This month, I rewrote my second-year project proposal for the third and fourth times. (First and second iterations happened in January and February). Each complete rewrite brought with it a new or expanded set of literature. I also spent ten days traveling to DrupalCon Nashville and the Computing Research Association’s Grad Women’s Cohort.

The semester is over (!!) though I still have many tasks remaining.

Below is a list of books and articles I read this month.
Adey, P. (2009). Facing Airport Security: Affect, Biopolitics, and the Preemptive Securitisation of the Mobile Body. Environment and Planning D: Society and Space, 27(2), 274–295.
Albrechtslund, A. (2008). Online social networking as participatory surveillance. First Monday, 13(3). Retrieved from
boyd, danah, & Crawford, K. (2012). CRITICAL QUESTIONS FOR BIG DATA. Information, Communication and Society., 15(5), 662–679.
Brock, A. (2018). Critical technocultural discourse analysis. New Media & Society, 20(3), 1012–1030.
Could Fitbit Data Be Used to Deny Health Coverage? (n.d.). Retrieved April 26, 2018, from
Draper, K. (2018, March 13). Madison Square Garden Has Used Face-Scanning Technology on Customers. The New York Times. Retrieved from
Duhigg, C. (2012, February 16). How Companies Learn Your Secrets. The New York Times. Retrieved from
February 27, M. B. P., & 2018. (2018, February 27). Prehistoric Puppy May Be Earliest Evidence of Pet-Human Bonding. Retrieved February 27, 2018, from
Gillen, J., & Petersen, A. (Eds.). (2004). Discourse Analysis. In Research Methods in the Social Sciences (1 edition, pp. 146–153). London ; Thousand Oaks, Calif: SAGE Publications Ltd.
Glaser, A. (2018, April 4). No Matter What Facebook Says, You Can’t Clean Up a Data Spill. Retrieved April 4, 2018, from
Grand View Research. (2016, February). Pet Wearable Market Size To Reach $2.36 Billion By 2022. Retrieved April 17, 2018, from
Haggerty, K. D., & Ericson, R. V. (2000). The Surveillant Assemblage. The British Journal of Sociology, 51(4), 605–622.
Hassan, D. (2016). Surveillance by Proxy: Sport and Security in a Modern Age. American Behavioral Scientist, 60(9), 1043–1056.
Iliadis, A., & Russo, F. (2016). Critical data studies: An introduction. Big Data & Society, 3(2), 2053951716674238.
Kitchin, R., & Lauriault, T. (2014). Towards Critical Data Studies: Charting and Unpacking Data Assemblages and Their Work (SSRN Scholarly Paper No. ID 2474112). Rochester, NY: Social Science Research Network. Retrieved from
Lawson, S., Kirman, B., Linehan, C., Feltwell, T., & Hopkins, L. (2015). Problematising Upstream Technology Through Speculative Design: The Case of Quantified Cats and Dogs. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 2663–2672). New York, NY, USA: ACM.
Lente, H. van, Swierstra, T., & Joly, P.-B. (2017). Responsible innovation as a critique of technology assessment. Journal of Responsible Innovation, 4(2), 254–261.
Lupton, D. (2016). Digital companion species and eating data: Implications for theorising digital data–human assemblages. Big Data & Society, 3(1), 2053951715619947.
Mäkinen, L. A. (2016). Surveillance On/Off: Examining Home Surveillance Systems From The User’s Perspective. Surveillance & Society, 14(1), 59–77.
Michael, K. (2015). Sousveillance: Implications for Privacy, Security, Trust, and the Law. IEEE Consumer Electronics Magazine, 4(2), 92–94.
Michael, K. (2017). Are You Addicted to Your Smartphone, Social Media, and More?: The New AntiSocial App Could Help. IEEE Consumer Electronics Magazine, 6(4), 116–121.
Neff, G., & Nafus, D. (2016). Self-Tracking. Cambridge, Massachusetts: The MIT Press.
Newman, K. (2018, January 29). Fitness App Reveals Remote Military Bases. Retrieved April 18, 2018, from
Noble, S. U. (2018). Algorithms of Oppression: How Search Engines Reinforce Racism. New York: NYU Press.
Oudheusden, M. van. (2014). Where are the politics in responsible innovation? European governance, technology assessments, and beyond. Journal of Responsible Innovation, 1(1), 67–86.
Richards, N. (2013). The Dangers of Surveillance. Retrieved April 1, 2018, from
Ritvo, S. E., & Allison, R. S. (2017). Designing for the exceptional user: Nonhuman animal-computer interaction (ACI). Computers in Human Behavior, 70, 222–233.
Seneviratne, S., Seneviratne, A., Mohapatra, P., & Mahanti, A. (2014). Your installed apps reveal your gender and more! In Proceedings of the ACM MobiCom workshop on Security and privacy in mobile environments (pp. 1–6). ACM.
Weiss, G. M., Nathan, A., Kropp, J. B., & Lockhart, J. W. (2013). WagTag: A Dog Collar Accessory for Monitoring Canine Activity Levels. In Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication (pp. 405–414). New York, NY, USA: ACM.
What Is a Telematics Device? | Allstate. (n.d.). Retrieved April 26, 2018, from
Yeshi. (2018, April 4). An Open Letter to Facebook from the Data for Black Lives Movement. Retrieved April 5, 2018, from
Ziewitz, M. (2016). Governing Algorithms: Myth, Mess, and Methods. Science, Technology & Human Values, 41(1), 3–16.