This is part 0 of a bibliography of topics to review in depth. I took the main interests and narrowed them down to 3 specific applications of privacy plus this one which is more general and includes material regarding privacy and technology in a broad sense.
These lists are all incomplete due to me starting the bibliography late. It would benefit by searching references of these documents as well as evaluating sources that cite them.
The topics are not very closely attached to library science topics.
Bhagat, S., Weinsberg, U., Ioannidis, S., & Taft, N. (2014). Recommending with an agenda: active learning of private attributes using matrix factorization. Paper presented at the Proceedings of the 8th ACM Conference on Recommender systems, Foster City, Silicon Valley, California, USA.
Cameron, K. The Laws of Identity. Retrieved from http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf
Campbell, D. G., & Cowan, S. R. (2016). The Paradox of Privacy: Revisiting a Core Library Value in an Age of Big Data and Linked Data. Library Trends, 64(3), 492-511.
Faynberg, I., Lu, H. L., & Ristock, H. (2011). On dynamic access control in Web 2.0 and beyond: Trends and technologies. Bell Labs Technical Journal, 16(2), 199-218. doi:10.1002/bltj.20511
Frohmann, B. (2008). Subjectivity and information ethics. Journal of the American Society for Information Science and Technology, 59(2), 267-277. doi:10.1002/asi.20742
Gürses, S., Troncoso, C., & Diaz, C. (2011). Engineering privacy by design. Computers, Privacy & Data Protection, 14(3).
Hoepman, J.-H. (2014). Privacy design strategies. Paper presented at the IFIP International Information Security Conference.
Kum, H.-C., & Ahalt, S. (2013). Privacy by design: understanding data access models for secondary data. American Medical Informatics Association (AMIA) Joint Summits on Translation Science and Clinical Research Informatics.
Miltgen, C. L., Popovic, A., & Oliveira, T. (2013). Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context. Decision Support Systems, 56, 103-114. doi:10.1016/j.dss.2013.05.010
Muthitcharoen, A., Palvia, P. C., & Grover, V. (2011). Building a Model of Technology Preference: The Case of Channel Choices. Decision Sciences, 42(1), 205-237. doi:10.1111/j.1540-5915.2010.00306.x
Pagallo, U. (2012). On the Principle of Privacy by Design and its Limits: Technology, Ethics and the Rule of Law. In S. Gutwirth, R. Leenes, P. De Hert, & Y. Poullet (Eds.), European Data Protection: In Good Health? (pp. 331-346). Dordrecht: Springer Netherlands.
Rubenstein, I. S., & Good, N. (2013). Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents. Berkeley Technology Law Journal, 28(2), 6.
Stahl, B. C. (2013). Responsible research and innovation: The role of privacy in an emerging framework. Science and Public Policy, 40(6), 708-716. doi:10.1093/scipol/sct067
Such, J. M., Espinosa, A., & García-Fornes, A. (2014). A survey of privacy in multi-agent systems. The Knowledge Engineering Review, 29(3), 314-344. doi:10.1017/S0269888913000180