-
1
-
-
0010876772
-
Beyond the mirror world: Privacy and the representational practices of computing
-
eds. P. Agre and M. Rotenberg, Cambridge, MA: MIT Press
-
Agre, Phil, 1997. Beyond the mirror world: Privacy and the representational practices of computing. In Technology and privacy: The new landscape, eds. P. Agre and M. Rotenberg, pp. 29-61. Cambridge, MA: MIT Press.
-
(1997)
Technology and privacy: The new landscape
, pp. 29-61
-
-
Agre, P.1
-
2
-
-
4244020782
-
Soupçons sur la confidentialité des téléphones portatifs
-
(Montreal) December
-
American Press. 1997. Soupçons sur la confidentialité des téléphones portatifs. Le Devoir (Montreal) December 29:A-8.
-
(1997)
Le Devoir
, vol.29
, pp. A8
-
-
-
3
-
-
24544433586
-
How to comply with the fair credit reporting act
-
Rochester, NY: Lawyers Cooperative
-
Associated Credit Bureaus. 1975. How to comply with the Fair Credit Reporting Act. In Consumer credit compliance manual, pp. 659-722. Rochester, NY: Lawyers Cooperative.
-
(1975)
Consumer credit compliance manual
, pp. 659-722
-
-
-
5
-
-
0003943324
-
Introduction
-
eds. C. Bennett and R. Grant, Toronto: University of Toronto Press
-
Bennett, Colin J., and Grant, Rebecca. 1999. Introduction. In Visions of privacy, eds. C. Bennett and R. Grant, p. 316. Toronto: University of Toronto Press.
-
(1999)
Visions of privacy
, pp. 316
-
-
Bennett, C.J.1
Grant, R.2
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, David. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24:84-88.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
0022145479
-
Security without identification: Transactions systems to make big brother obsolete
-
Chaum, David. 1985. Security without identification: Transactions systems to make big brother obsolete. Communications of the ACM 28:1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
8
-
-
0027005999
-
Achieving electronic privacy
-
Chaum, David. 1992. Achieving electronic privacy. Scientific American 267(2):96-101.
-
(1992)
Scientific American
, vol.267
, Issue.2
, pp. 96-101
-
-
Chaum, D.1
-
9
-
-
0001374147
-
Managing privacy concerns strategically: The implications of fair information practices for marketing in the twenty-first century
-
eds. C.J. Bennett and R. Grant, Toronto: University of Toronto Press
-
Culnan, Mary J., and Bies, Robert J. 1999. Managing privacy concerns strategically: The implications of fair information practices for marketing in the twenty-first century. In Visions of privacy, eds. C.J. Bennett and R. Grant, pp. 149-167. Toronto: University of Toronto Press.
-
(1999)
Visions of privacy
, pp. 149-167
-
-
Culnan, M.J.1
Bies, R.J.2
-
10
-
-
0010932017
-
Re-engineering the right to privacy
-
eds. P. Agre and M. Rotenberg, Cambridge, MA: MIT Press
-
Davies, Simon G. 1997. Re-engineering the right to privacy. In Technology and privacy: The new landscape, eds. P. Agre and M. Rotenberg, pp. 143-165. Cambridge, MA: MIT Press.
-
(1997)
Technology and privacy: The new landscape
, pp. 143-165
-
-
Davies, S.G.1
-
11
-
-
84984523120
-
-
Syracuse, NY: Syracuse University Press
-
Douglas, Mary. 1980. How institutions think. Syracuse, NY: Syracuse University Press.
-
(1980)
How institutions think
-
-
Douglas, M.1
-
12
-
-
4243355127
-
Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
November
-
European Community. 1995. Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Community, November 23:L.281.
-
(1995)
Official Journal of the European Community
, vol.23
, pp. L281
-
-
-
13
-
-
79251590715
-
A secure and privacy-protecting protocols for transmitting personal information between organizations
-
Advances in cryptology-CRYPTO '86 Proceedings, ed. A.M. Odlyzko, Berlin: Springer-Verlag
-
Evertse, Jan-Hendrik, and Chaum, David. 1987. A secure and privacy-protecting protocols for transmitting personal information between organizations. In Advances in cryptology-CRYPTO '86 Proceedings, ed. A.M. Odlyzko, pp. 118-167. Lecture Notes in Computer Science, vol. 263. Berlin: Springer-Verlag.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 118-167
-
-
Evertse, J.-H.1
Chaum, D.2
-
14
-
-
0003768069
-
-
Chapel Hill: University of North Carolina Press
-
Flaherty, David. 1989. Protecting privacy in surveillance societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States. Chapel Hill: University of North Carolina Press.
-
(1989)
Protecting privacy in surveillance societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States
-
-
Flaherty, D.1
-
18
-
-
0010888307
-
Does privacy law work?
-
eds. P. Agre and M. Rotenberg, Cambridge, MA: MIT Press
-
Gellman, Robert. 1997. Does privacy law work? In Technology and privacy: The new landscape, eds. P. Agre and M. Rotenberg, pp. 193-218. Cambridge, MA: MIT Press.
-
(1997)
Technology and privacy: The new landscape
, pp. 193-218
-
-
Gellman, R.1
-
19
-
-
85010792614
-
Discovery of computer stored documents and computer-based litigation support systems: Why give up more than necessary?
-
Grady, Patrick R. 1996. Discovery of computer stored documents and computer-based litigation support systems: Why give up more than necessary? John Marshall Journal of Computer & Information Law 14:523-553.
-
(1996)
John Marshall Journal of Computer & Information Law
, vol.14
, pp. 523-553
-
-
Grady, P.R.1
-
21
-
-
85010711546
-
Narrowing the bankruptcy escape hatch
-
October
-
Johnston, David Cay. 1998. Narrowing the bankruptcy escape hatch. New York Times October 4:B-9.
-
(1998)
New York Times
, vol.4
, pp. B9
-
-
Johnston, D.C.1
-
23
-
-
0030241302
-
Markets and privacy
-
Laudon, Kenneth C. 1996. Markets and privacy. Communications of the ACM 39(9):92-104.
-
(1996)
Communications of the ACM
, vol.39
, Issue.9
, pp. 92-104
-
-
Laudon, K.C.1
-
25
-
-
0000346103
-
The juvenile court
-
Mack, Judge L.L. 1909. The juvenile court. Harvard Law Review 23:104-122.
-
(1909)
Harvard Law Review
, vol.23
, pp. 104-122
-
-
Mack, J.L.L.1
-
26
-
-
0010814656
-
The iron fist and the velvet glove: Totalitarian potential within democratic structures
-
ed. J.F. Short, Beverly Hills, CA: Sage
-
Marx, Gary T. 1986. The iron fist and the velvet glove: Totalitarian potential within democratic structures. In The social fabric: Dimensions and issues, ed. J.F. Short, pp. 135-161. Beverly Hills, CA: Sage.
-
(1986)
The social fabric: Dimensions and issues
, pp. 135-161
-
-
Marx, G.T.1
-
29
-
-
0010877010
-
The fair credit reporting act: A legislative overview
-
McNamara, Robert M., Jr. 1973. The Fair Credit Reporting Act: A legislative overview. Journal of Public Law 22:67-101.
-
(1973)
Journal of Public Law
, vol.22
, pp. 67-101
-
-
McNamara, R.M.1
-
30
-
-
0004168203
-
-
New York: Cambridge University Press
-
Nietzsche, Friedrich. 1997. Untimely meditations. New York: Cambridge University Press.
-
(1997)
Untimely meditations
-
-
Nietzsche, F.1
-
33
-
-
0010808248
-
Driving to the panopticon: A philosophical exploration of the risks to privacy posed by the highway technology of the future
-
Reiman, Jeffrey H. 1995. Driving to the panopticon: A philosophical exploration of the risks to privacy posed by the highway technology of the future. Computer & High Technology Law Journal 11: 27-44.
-
(1995)
Computer & High Technology Law Journal
, vol.11
, pp. 27-44
-
-
Reiman, J.H.1
-
35
-
-
0010878796
-
Towards property rights in personal data
-
eds. C.J. Bennett and R. Grant, Toronto: University of Toronto Press
-
Rule, James B., and Hunter, Lawrence. 1999. Towards property rights in personal data. In Visions of privacy, eds. C.J. Bennett and R. Grant, pp. 168-181. Toronto: University of Toronto Press.
-
(1999)
Visions of privacy
, pp. 168-181
-
-
Rule, J.B.1
Hunter, L.2
-
38
-
-
0010813175
-
Fair credit reporting act
-
National Consumer Law Center, Washington, DC
-
Sheldon, Jonathan, ed. 1994. Fair Credit Reporting Act. National Consumer Law Center, Consumer Credit and Sales Legal Practice Series, Washington, DC.
-
(1994)
Consumer Credit and Sales Legal Practice Series
-
-
Sheldon, J.1
-
39
-
-
0002940979
-
Establishing retention periods for electronic records
-
Skupsky, Donald S. 1993. Establishing retention periods for electronic records. Records Management Quaterly 27(2):40, 43-43, 49.
-
(1993)
Records Management Quaterly
, vol.27
, Issue.2
, pp. 40
-
-
Skupsky, D.S.1
-
41
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
Sweeney, Latanya. 1997. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine and Ethics 25:98-110.
-
(1997)
Journal of Law, Medicine and Ethics
, vol.25
, pp. 98-110
-
-
Sweeney, L.1
-
42
-
-
0040734678
-
Police switch on the candid camera that knows your face
-
11 October
-
Thomas, Robert. 1998. Police switch on the candid camera that knows your face. The Observer 11 October: 8.
-
(1998)
The Observer
, pp. 8
-
-
Thomas, R.1
-
44
-
-
0010817920
-
Knowledge discovery in databases and de-individualization
-
ed. L. Introna, London: London School of Economics
-
Vedder, Anton, Schreuders, E., and van Kralingen, Robert. 1998. Knowledge discovery in databases and de-individualization. In Proceedings for computer ethics: Philosophical enquiry (CEPE 98), ed. L. Introna, pp. 121-126. London: London School of Economics.
-
(1998)
Proceedings for computer ethics: Philosophical enquiry (CEPE 98)
, pp. 121-126
-
-
Vedder, A.1
Schreuders, E.2
Van Kralingen, R.3
|