메뉴 건너뛰기




Volumn 6, Issue 6, 2004, Pages 691-706

Privacy policy and PETs: The influence of policy regimes on the development and social implications of privacy enhancing technologies

Author keywords

Identification; Personally identifiable information; Privacy policy; Privacy enhancing technology; Surveillance

Indexed keywords


EID: 10944244304     PISSN: 14614448     EISSN: None     Source Type: Journal    
DOI: 10.1177/146144804042523     Document Type: Review
Times cited : (46)

References (30)
  • 1
    • 84937186415 scopus 로고    scopus 로고
    • The architecture of identity: Embedding privacy in market institutions
    • Agre, P. (1999) 'The Architecture of Identity: Embedding Privacy in Market Institutions', Information, Communication and Society 2(1): 1-25.
    • (1999) Information, Communication and Society , vol.2 , Issue.1 , pp. 1-25
    • Agre, P.1
  • 2
    • 0006364798 scopus 로고    scopus 로고
    • Design for privacy in multimedia computing and communications environments
    • P.E. Agre and M. Rotenberg (eds) Cambridge, MA: MIT Press
    • Bellotti, V. (1997) 'Design for Privacy in Multimedia Computing and Communications Environments', in P.E. Agre and M. Rotenberg (eds) Technology and Privacy: the New Landscape, pp. 63-89. Cambridge, MA: MIT Press.
    • (1997) Technology and Privacy: The New Landscape , pp. 63-89
    • Bellotti, V.1
  • 5
    • 84860065040 scopus 로고    scopus 로고
    • 'Report to Congress Regarding the Terrorism Information Awareness Program in Response to Consolidated Appropriations Resolution', L. No. 108-7, Division M, § 111(b), URL (consulted May 2003)
    • Defense Advanced Research Projects Agency (DARPA) (2003) 'Report to Congress Regarding the Terrorism Information Awareness Program in Response to Consolidated Appropriations Resolution', L. No. 108-7, Division M, § 111(b), URL (consulted May 2003): http://www.eff.org/Privacy/TIA/TIA-report.pdf
    • (2003)
  • 6
    • 0004125178 scopus 로고
    • (trans. A. Sheridan). New York: Vintage Books
    • Foucault, M. (1979) Discipline and Punish (trans. A. Sheridan). New York: Vintage Books.
    • (1979) Discipline and Punish
    • Foucault, M.1
  • 7
    • 21144459954 scopus 로고
    • Toward a political economy of personal information
    • Gandy, O. (1993a) 'Toward a Political Economy of Personal Information', Critical Studies in Mass Communication 10(1): 70-97.
    • (1993) Critical Studies in Mass Communication , vol.10 , Issue.1 , pp. 70-97
    • Gandy, O.1
  • 11
    • 84860067385 scopus 로고    scopus 로고
    • n.d. URL (consulted September)
    • Lumeria (n.d.) 'What is Privacy?', URL (consulted September 2001): http://www.lumeria.com/paper1/1.sthml
    • (2001) What is Privacy?
    • Lumeria1
  • 14
    • 0000638018 scopus 로고
    • Feminist critiques of the public/private distinction
    • S. Benn and G. Gaus (eds) London: Croom Helm
    • Pateman, C. (1983) 'Feminist Critiques of the Public/Private Distinction', in S. Benn and G. Gaus (eds) Public and Private in Social Life, pp. 281-303. London: Croom Helm.
    • (1983) Public and Private in Social Life , pp. 281-303
    • Pateman, C.1
  • 15
    • 0039085035 scopus 로고    scopus 로고
    • Cryptography, secrets, and the structuring of trust
    • P. Agre and M. Rotenberg (eds) Cambridge, MA: MIT Press
    • Phillips, D. (1997) 'Cryptography, Secrets, and the Structuring of Trust', in P. Agre and M. Rotenberg (eds) Technology and Privacy: The New Landscape, pp. 243-76. Cambridge, MA: MIT Press.
    • (1997) Technology and Privacy: The New Landscape , pp. 243-276
    • Phillips, D.1
  • 16
    • 84937380519 scopus 로고    scopus 로고
    • Negotiating the digital closet: Online pseudonymity and the politics of sexual identity
    • Phillips, D. (2002) 'Negotiating the Digital Closet: Online Pseudonymity and the Politics of Sexual Identity', Information, Communication and Society 5(3): 406-24.
    • (2002) Information, Communication and Society , vol.5 , Issue.3 , pp. 406-424
    • Phillips, D.1
  • 17
    • 85072817147 scopus 로고    scopus 로고
    • Privacy and the phenetic urge: Geodemographics and the changing spatiality of local practice
    • D. Lyon (ed.) London: Routledge
    • Phillips, D. and M. Curry (2003) 'Privacy and the Phenetic Urge: Geodemographics and the Changing Spatiality of Local Practice', in D. Lyon (ed.) Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination, pp 137-52. London: Routledge.
    • (2003) Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination , pp. 137-152
    • Phillips, D.1    Curry, M.2
  • 19
    • 84860063711 scopus 로고    scopus 로고
    • Privacy Challenge for Business, (n.d.) URL consulted September
    • Privacy Challenge for Business, (n.d.) URL (consulted September 2001): http://www.zeroknowledge.com/business/default.asp
    • (2001)
  • 20
    • 84860062060 scopus 로고    scopus 로고
    • Privacy Rights Management Technology, (n.d.) URL consulted September
    • Privacy Rights Management Technology, (n.d.) URL (consulted September 2001): http://www.zeroknowledge.com/business/privacyrights.asp
    • (2001)
  • 22
    • 10944258595 scopus 로고    scopus 로고
    • Prophets zero in on profits
    • 28 March
    • Riga, A. (2001) 'Prophets Zero in on Profits', The Gazette (Montreal), 28 March, p. D1.
    • (2001) The Gazette (Montreal)
    • Riga, A.1
  • 26
    • 0031150446 scopus 로고    scopus 로고
    • Weaving technology and policy together to maintain confidentiality
    • Sweeney, L. (1997) 'Weaving Technology and Policy Together to Maintain Confidentiality', Journal of Law, Medicine and Ethics 25(2-3): 98-110.
    • (1997) Journal of Law, Medicine and Ethics , vol.25 , Issue.2-3 , pp. 98-110
    • Sweeney, L.1
  • 27
    • 10944246068 scopus 로고    scopus 로고
    • KDD: The challenge to individualism
    • Vedder, A. (1999) 'KDD: the Challenge to Individualism', Ethics and Information Technology 1(4): 275-81.
    • (1999) Ethics and Information Technology , vol.1 , Issue.4 , pp. 275-281
    • Vedder, A.1
  • 30
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • paper presented Washington, DC, 23-29 August
    • Whitten, A. and J. Tygar (1999) 'Why Johnny Can't Encrypt: a Usability Evaluation of PGP 5.0', paper presented at the 8th USENIX Security Symposium, Washington, DC, 23-29 August.
    • (1999) 8th USENIX Security Symposium
    • Whitten, A.1    Tygar, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.