-
1
-
-
84876651303
-
-
note
-
This article has been on the drawing boards for longer than I dare to admit. Along the way, many have helped its development by generously sharing their wisdom: James Der Derian, Niva Elkin-Koren, Ed Felten, Batya Friedman, Lene Hansen, audiences at CEPE, TPRC, the Yale Cybercrime and Digital Law Enforcement Conference, and Watson Institute's Symposium in Dis/Simulations of War and Peace," and University of Newcastle, Computer Science Department. Thanks, also, to Sam Howard-Spink for excellent editorial assistance.
-
-
-
-
4
-
-
84876653402
-
"Value in Technology Design: Democracy, Autonomy, and Justice"
-
See at the project available at:
-
See at the project "Value in Technology Design: Democracy, Autonomy, and Justice," available at: [http://www.nyu.edu/projects/valuesindesign/];
-
-
-
-
5
-
-
33749395687
-
"A Value Sensitive Design and Information Systems"
-
forthcoming. P. Zhang and D. Galletta, editors, M.E. Sharpe, Inc, NY
-
B. Friedman, P.H. Kahn, Jr. and A. Borning, "A Value Sensitive Design and Information Systems", forthcoming. In P. Zhang and D. Galletta, editors, Human-Computer Interaction in Management Information Systems: Foundations. M.E. Sharpe, Inc, NY;
-
Human-Computer Interaction in Management Information Systems: Foundations
-
-
Friedman, B.1
Kahn Jr., P.H.2
Borning, A.3
-
6
-
-
80052942353
-
"Design for Trust"
-
Rino Falcone, editor, Aamas 2002 International Workshop, Bologna, Italy, July 15, 2002: Selected and Invited Papers (Lecture Notes in Artificial Intelligence). Springer-Verlag, Berlin
-
Camp I. Jean, "Design for Trust". In Rino Falcone, editor, Trust, Reputation and Security: Theories and Practice: Aamas 2002 International Workshop, Bologna, Italy, July 15, 2002: Selected and Invited Papers (Lecture Notes in Artificial Intelligence). Springer-Verlag, Berlin, 2003;
-
(2003)
Trust, Reputation and Security: Theories and Practice
-
-
Camp, I.J.1
-
7
-
-
26444440601
-
"Privacy Enhancing Technologies for Internet Commerce"
-
Springer-Verlag, Berlin
-
L.Jean Camp & Carlos Osorio, "Privacy Enhancing Technologies for Internet Commerce". In Trust in the Network Economy. Springer-Verlag, Berlin, 2002;
-
(2002)
Trust in the Network Economy
-
-
Camp, L.J.1
Osorio, C.2
-
9
-
-
84866926128
-
"Will Security Enhance Trust Online, or Supplant It?"
-
M.R. Kramer and S.K. Cook, editors, in the Russell Sage Foundation Series on Trust. Russell Sage Foundation, New York
-
H. Nissenbaum. "Will Security Enhance Trust Online, or Supplant It?" In M.R. Kramer and S.K. Cook, editors, Trust and Distrust in Organizations: Dilemmas and Approaches Volume VII in the Russell Sage Foundation Series on Trust. Russell Sage Foundation, New York, 2004;
-
(2004)
Trust and Distrust in Organizations: Dilemmas and Approaches Volume VII
-
-
Nissenbaum, H.1
-
10
-
-
84876610590
-
"Commons Based Peer Production and Virtue"
-
(forthcoming)
-
Benkler Y. and Nissenbaum H. (forthcoming), "Commons Based Peer Production and Virtue."
-
-
-
Benkler, Y.1
Nissenbaum, H.2
-
11
-
-
27444447755
-
-
National Research Council, (The National Academies Press, Washington, D.C.)
-
National Research Council, The Internet Under Crisis Conditions, (The National Academies Press, Washington, D.C., 2003);
-
(2003)
The Internet Under Crisis Conditions
-
-
-
12
-
-
2142716837
-
-
(eds.) (The National Academies Press, Washingtom D.C., 2003)
-
Hennessy L. J, Patterson A. and Lin S. H. (eds.) (2003), Information Technology for Counterterrorism, (The National Academies Press, Washingtom D.C., 2003);
-
(2003)
Information Technology for Counterterrorism
-
-
Hennessy, L.J.1
Patterson, A.D.2
Lin, S.H.3
-
13
-
-
0027804413
-
"Information Systems Design Methods: Implications for Information Systems Development"
-
Baskerville R. (1993), "Information Systems Design Methods: Implications for Information Systems Development," 25(4) ACM Computing Surveys, pp. 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
14
-
-
0003714340
-
"Trust in Cyberspace"
-
Committee on Information Systems Trustworthiness, National Research Council available at:
-
"Trust in Cyberspace," Committee on Information Systems Trustworthiness, National Research Council (1999) available at: [http://www.nap.edu/readingroom/books/trust/];
-
(1999)
-
-
-
15
-
-
84876596497
-
-
see the society's dependability definition by the DIRC project, available at:
-
see the society's dependability definition by the DIRC project, available at: [http://www.dirc.org.uk/overview/index.html].
-
-
-
-
16
-
-
27944476171
-
"The American Cyber-Angst and the Real World-Any Link?"
-
R. Latham, editor, The New Press, New York
-
Bendrath, R. "The American Cyber-Angst and the Real World-Any Link?" In R. Latham, editor, Bombs and Bandwidth, pp. 49-73. The New Press, New York, 2003.
-
(2003)
Bombs and Bandwidth
, pp. 49-73
-
-
Bendrath, R.1
-
17
-
-
0344559509
-
"The National Strategy to Secure Cyberspace"
-
Feb. (available at: cyber-attacks on U.S. information networks can have serious consequences such as disrupting critical operations, loss of revenue and intellectual property, or loss of life
-
According to the "The National Strategy to Secure Cyberspace," Feb. 2003 (available at: http://www.us-cert.-gov/reading_room/cyberspace_strategy.pdf) cyber-attacks on U.S. information networks can have serious consequences such as disrupting critical operations, loss of revenue and intellectual property, or loss of life;
-
(2003)
-
-
-
18
-
-
84876597280
-
-
see also United State Senate, Committee on the Judiciary, Testimony of Mr. Keith Lourdeau, FBI Deputy Assistant Director, Cyber Division, February 24, (available at)
-
see also United State Senate, Committee on the Judiciary, Testimony of Mr. Keith Lourdeau, FBI Deputy Assistant Director, Cyber Division, February 24, 2004 (available at: http://judiciary.senate.gov/testimony.cfm?id=1054&wit_id=2995).
-
(2004)
-
-
-
19
-
-
84923496697
-
"Prohibition and Preemption"
-
Cambridge University Press
-
R. Arthur. "Prohibition and Preemption," In 5 Legal Theory, pp. 235-263, Cambridge University Press, 1999.
-
(1999)
5 Legal Theory
, pp. 235-263
-
-
Arthur, R.1
-
20
-
-
4243136729
-
"Cryptography and Competition Policy-Issues with Issues with Trusted Computing"
-
R. Anderson. "Cryptography and Competition Policy-Issues with Issues with Trusted Computing." In Proceedings Workshop on Economics and Information Sector, pp. 1-11, 2003.
-
(2003)
Proceedings Workshop on Economics and Information Sector
, pp. 1-11
-
-
Anderson, R.1
-
21
-
-
0003578254
-
-
For a description of this approach to security studies, I have used Lynne Rienner Publishers, Inc., Boulder
-
For a description of this approach to security studies, I have used B. Buzan, O. Wyer, J.D. Wilde and O. Waever, Security: A New Framework for Analysis, Lynne Rienner Publishers, Inc., Boulder, 1997;
-
(1997)
Security: A New Framework for Analysis
-
-
Buzan, B.1
Wyer, O.2
Wilde, J.D.3
Waever, O.4
-
22
-
-
0009175065
-
"Concepts of Security"
-
Ph.D. dissertation. Institute of Political Science, University of Copenhagen
-
O. Waever, "Concepts of Security," Ph.D. dissertation. Institute of Political Science, University of Copenhagen, 1995.
-
(1995)
-
-
Waever, O.1
-
23
-
-
0003578254
-
-
Lynne Rienner Publishers, Inc., Boulder
-
B. Buzan, O. Wyer, J.D. Wilde and O. Waever, Security: A New Framework for Analysis, p. 32. Lynne Rienner Publishers, Inc., Boulder, 1997.
-
(1997)
Security: A New Framework for Analysis
, pp. 32
-
-
Buzan, B.1
Wyer, O.2
Wilde, J.D.3
Waever, O.4
-
24
-
-
0039430385
-
"Terror Groups Hide Behind Web Encryption"
-
February 6
-
J. Kelley, "Terror Groups Hide Behind Web Encryption," USA Today (February 6, 2001)
-
(2001)
USA Today
-
-
Kelley, J.1
-
25
-
-
84891395253
-
"bin Laden: Steganography Master?"
-
discussed in (February 7, 2001), available at:
-
discussed in McCullagh D. (2001), "bin Laden: Steganography Master?" Wired News (February 7, 2001), available at: [http://www.wired.com/news/print/0,1294,41658,00.html].
-
(2001)
Wired News
-
-
McCullagh, D.1
-
26
-
-
27944476171
-
"The American Cyber-Angst and the Real World - Any Link?"
-
Robert Latham (ed.) (New York: The New Press)
-
R. Bendrath, "The American Cyber-Angst and the Real World - Any Link?" In Bombs and Bandwidth (2003) Robert Latham (ed.) (New York: The New Press), pp. 49-73.
-
(2003)
Bombs and Bandwidth
, pp. 49-73
-
-
Bendrath, R.1
-
27
-
-
31144435476
-
"The Terrorist Network"
-
November 26, Available at:
-
Gaudin, S. "The Terrorist Network," NetworkWorld-Fusion (November 26, 2001). Available at: [http://www.nwfusion.com/research/2001/1126featside4.html].
-
(2001)
NetworkWorld-Fusion
-
-
Gaudin, S.1
-
28
-
-
84886759923
-
"Captured Qaeda Figure Led Way To Information Behind Warning"
-
D. Jehl and D. Rohde, "Captured Qaeda Figure Led Way To Information Behind Warning," The New York Times, 2004.
-
(2004)
The New York Times
-
-
Jehl, D.1
Rohde, D.2
-
29
-
-
84876636418
-
-
For example, the testimony of Jack Valenti, President and CEO Motion Picture Association of America, before the SubCommittee on Courts, the Internet, and Intellectual Property Committee on the Judiciary U.S. House of Representatives, "International Copyright Piracy: Links to Organized Crime and Terrorism" (March 13,) available at:
-
For example, the testimony of Jack Valenti, President and CEO Motion Picture Association of America, before the SubCommittee on Courts, the Internet, and Intellectual Property Committee on the Judiciary U.S. House of Representatives, "International Copyright Piracy: Links to Organized Crime and Terrorism" (March 13, 2003) available at: [http:// www.house.gov/judiciary/valenti031303.htm].
-
(2003)
-
-
-
30
-
-
84876595976
-
"Cyberspace Threats and Vulnerabilities: A Case for Action"
-
An official rendering of threats and vulnerabilities in the context of national security concerns can be seen in February a report by President George W. Bush's Critical Infrastructure Protection Board (headed by Richard A. Clarke), especially the chapter
-
An official rendering of threats and vulnerabilities in the context of national security concerns can be seen in The National Strategy to Secure Cyberspace, February 2003, a report by President George W. Bush's Critical Infrastructure Protection Board (headed by Richard A. Clarke), especially the chapter, "Cyberspace Threats and Vulnerabilities: A Case for Action."
-
(2003)
The National Strategy to Secure Cyberspace
-
-
-
31
-
-
27944476171
-
"The American Cyber-Angst and the Real World-Any Link?"
-
R. Latham, editor, New York, The New Press, 2003, quoting Admiral Thomas R. Wilson's comments during a hearing of Senate Select Committee on Intelligence, February
-
R. Bendrath. "The American Cyber-Angst and the Real World-Any Link?" In R. Latham, editor, Bombs and Bandwidth, p.56. New York, The New Press, 2003, quoting Admiral Thomas R. Wilson's comments during a hearing of Senate Select Committee on Intelligence, February 2001.
-
(2001)
Bombs and Bandwidth
, pp. 56
-
-
Bendrath, R.1
-
32
-
-
27944476171
-
"The American Cyber-Angst and the Real World-Any Link?"
-
R. Latham, editor, The New Press, New York
-
R. Bendrath. "The American Cyber-Angst and the Real World-Any Link?" In R. Latham, editor, Bombs and Bandwidth, p. 57. The New Press, New York, 2003.
-
(2003)
Bombs and Bandwidth
, pp. 57
-
-
Bendrath, R.1
-
33
-
-
84876639909
-
"Hacker in Shackles"
-
(London)
-
K. Mitnick. "Hacker in Shackles," The Guardian (London), 1999.
-
(1999)
The Guardian
-
-
Mitnick, K.1
-
34
-
-
0007985969
-
"The Little Mermaid's Silent Security Dilemma and the Absence of Gender in the Copenhagen Schoo"
-
H. Lene. "The Little Mermaid's Silent Security Dilemma and the Absence of Gender in the Copenhagen School," Millennium, 29(2): 285-306, 2000.
-
(2000)
Millennium
, vol.29
, Issue.2
, pp. 285-306
-
-
Lene, H.1
-
35
-
-
0003275083
-
"The Value of Security: Hobbes, Marx, Nietzsche, and Baudrillard"
-
D. Campbell and M. Dillon (eds.), Manchester University Press, Manchester
-
Derian. D.J. "The Value of Security: Hobbes, Marx, Nietzsche, and Baudrillard." In D. Campbell and M. Dillon (eds.), The Political Subject of Violence. Manchester University Press, Manchester, 1993.
-
(1993)
The Political Subject of Violence
-
-
Derian, D.J.1
-
36
-
-
0003578254
-
-
Lynne Rienner Publishers, Inc., Boulder
-
B. Buzan, O. Wyer, J.D. Wilde and O. Waever. Security: A New Framework for Analysis, p. 27. Lynne Rienner Publishers, Inc., Boulder, 1997.
-
(1997)
Security: A New Framework for Analysis
, pp. 27
-
-
Buzan, B.1
Wyer, O.2
Wilde, J.D.3
Waever, O.4
-
37
-
-
0003578254
-
-
Lynne Rienner Publishers, Inc., Boulder
-
B. Buzan, O. Wyer, J.D. Wilde and O. Waever. Security: A New Framework for Analysis, especially pp.23-25. Lynne Rienner Publishers, Inc., Boulder, 1997.
-
(1997)
Security: A New Framework for Analysis
, pp. 23-25
-
-
Buzan, B.1
Wyer, O.2
Wilde, J.D.3
Waever, O.4
-
38
-
-
84876653915
-
"Privacy and Secrecy after September 11"
-
For more on the subject of government secrecy, (Latham R. ed.) (The New Press)
-
For more on the subject of government secrecy, see Rotenberg M. "Privacy and Secrecy after September 11." In Bombs and Bandwidth (Latham R. ed.) (The New Press, 2003), pp. 132-142.
-
(2003)
Bombs and Bandwidth
, pp. 132-142
-
-
Rotenberg, M.1
-
39
-
-
84876631818
-
"Justice and Security in the Accommodation of Minority Nationalism, Comparing East and West"
-
The point is derived from Draft paper presented at Princeton University
-
The point is derived from Will Kymlika, "Justice and Security in the Accommodation of Minority Nationalism, Comparing East and West." Draft paper presented at Princeton University, 2001, especially pp. 16-21.
-
(2001)
, pp. 16-21
-
-
Kymlika, W.1
-
40
-
-
84949717896
-
"The Priority of Defense"
-
For a critical discussion of this practice, see Chicago: The University of Chicago Press, Chapter 11
-
For a critical discussion of this practice, see Goodin (1982), Political Theory and Public Policy, Chicago: The University of Chicago Press, Chapter 11, "The Priority of Defense."
-
(1982)
Political Theory and Public Policy
-
-
Goodin1
-
41
-
-
84876632935
-
"The Invisible Handshake: The Reemergence of the State in the Digital Envitonment" 8 Virginia J. of L. & Tech, 6
-
A similar connection but with motion in the other direction is pointed out by Birnhak and Elkin-Koren in an important paper on the ways security concerns have allowed the state to re-enter governance of the Net by collaborating with private actors
-
A similar connection but with motion in the other direction is pointed out by Birnhak and Elkin-Koren in an important paper on the ways security concerns have allowed the state to re-enter governance of the Net by collaborating with private actors (Birnhack D. M. and Elkin-Koren N. (2003)), "The Invisible Handshake: The Reemergence of the State in the Digital Envitonment", 8 Virginia J. of L. & Tech, 6.
-
(2003)
-
-
Birnhack, D.M.1
Elkin-Koren, N.2
-
42
-
-
84876653954
-
"Intellectual property theft is a clear danger to our economy and the health, safety, and security of the American people"
-
Attorney General John Ashcroft stressed the possible dangers to the society as a result of intellectual property infringement: Attorney General John Ashcroft, Announces Recommendations of The Justice Department's Intellectual Property Task Force, October 12, 2004. available at: The possible relation between security and intellectual property theft was recognized in the task force report itself: "... those who benefit most from intellectual property theft are criminals, and alarmingly, criminal organizations with possible ties to terrorism."
-
Attorney General John Ashcroft stressed the possible dangers to the society as a result of intellectual property infringement: "Intellectual property theft is a clear danger to our economy and the health, safety, and security of the American people." Attorney General John Ashcroft, Announces Recommendations of The Justice Department's Intellectual Property Task Force, October 12, 2004. available at: [http://www.usdoj.gov/criminal/cybercrime/AshcroftIPTF.htm]. The possible relation between security and intellectual property theft was recognized in the task force report itself: "... those who benefit most from intellectual property theft are criminals, and alarmingly, criminal organizations with possible ties to terrorism."
-
-
-
-
44
-
-
31144436642
-
-
Evidence of disunity comes, for example, from the Federal District Court in Manhattan ruling in Doe v. Ashcroft, 334 F. Supp 2d, striking down, on constitutional grounds, a section of the USA PATRIOT Act that would have allowed government security agencies to subpoena personal information from Internet Service Providers without having to obtain a court order
-
Evidence of disunity comes, for example, from the Federal District Court in Manhattan ruling in Doe v. Ashcroft, 334 F. Supp 2d, 471 (2004), striking down, on constitutional grounds, a section of the USA PATRIOT Act that would have allowed government security agencies to subpoena personal information from Internet Service Providers without having to obtain a court order.
-
(2004)
, pp. 471
-
-
-
45
-
-
84876613077
-
-
note
-
Obviously, these are paradigmatic and designed to illustrate alternatives at two ends of a spectrum which offers many variations in between.
-
-
-
-
46
-
-
84876653934
-
-
note
-
Discussions with Ed Felten greatly influenced the conception of this example.
-
-
-
-
47
-
-
31144459124
-
-
Statement by Amit Yoran, Director National Cyber Security Division Department of Homeland Security, before the U.S. Senate Committee on the Judiciary Subcommittee on Terrorism, Technology, and Homeland Security, February 24
-
Statement by Amit Yoran, Director National Cyber Security Division Department of Homeland Security, before the U.S. Senate Committee on the Judiciary Subcommittee on Terrorism, Technology, and Homeland Security, February 24, 2004.
-
(2004)
-
-
-
48
-
-
84876601932
-
-
The National Strategy to Secure Cyberspace, Bush Administration, final draft released February 14, 2003 (Available at: November 24)
-
The National Strategy to Secure Cyberspace, Bush Administration, final draft released February 14, 2003 (Available at: http://www.whitehouse.gov/pcipb/, November 24, 2004).
-
(2004)
-
-
-
49
-
-
84876622625
-
"Online and Even Near Home, a New Front Is Opening in the Global Terror Battle"
-
September 23
-
E. Lipton and E. Lightblau, "Online and Even Near Home, a New Front Is Opening in the Global Terror Battle," The New York Times, September 23, 2004, A12.
-
(2004)
The New York Times
-
-
Lipton, E.1
Lightblau, E.2
-
50
-
-
84876613945
-
"Approaches to Combat Terrorism: Opportunities for Basic Research"
-
See for example the CIA and National Science Foundation joint project aimed at finding ways to monitor on-line chat rooms. For more information about this project and additional ones visit EPIC website at:
-
See for example the CIA and National Science Foundation joint project "Approaches to Combat Terrorism: Opportunities for Basic Research," aimed at finding ways to monitor on-line chat rooms. For more information about this project and additional ones visit EPIC website at: http://www.epic.org/privacy/wiretap/nsf_release.html.
-
-
-
-
51
-
-
84876618686
-
"EFF Analysis of the Cyber Security Enhancement Act"
-
See also the available at:
-
See also the "EFF Analysis of the Cyber Security Enhancement Act," available at: http://www.eff.org/Privacy/Surveillance/ ?f=20020802_eff_csea_analysis.html.
-
-
-
-
52
-
-
0003578254
-
-
discussion on Lynne Rienner Publishers, Inc., Boulder
-
B. Buzan, O. Wyer, J.D. Wilde and O. Waever. Security: A New Framework for Analysis, discussion on pp. 29-30. Lynne Rienner Publishers, Inc., Boulder, 1997.
-
(1997)
Security: A New Framework for Analysis
, pp. 29-30
-
-
Buzan, B.1
Wyer, O.2
Wilde, J.D.3
Waever, O.4
-
53
-
-
0038921813
-
"The Exclusive Right to Read"
-
Digital Millennium Copyright Act of 1998 (DMCA), Pub. L. No. 105-304, 112 Stat. 2860, Codified as 17 U.S.C. §§ 1201-1205; for commentary review see:
-
Digital Millennium Copyright Act of 1998 (DMCA), Pub. L. No. 105-304, 112 Stat. 2860, Codified as 17 U.S.C. §§ 1201-1205; for commentary review see: Litman J. (1994), "The Exclusive Right to Read," 13 Cardozo Arts & Ent. L. J., 29;
-
(1994)
13 Cardozo Arts & Ent. L. J.
, vol.29
-
-
Litman, J.1
-
54
-
-
0000627689
-
"Intellectual Property And The Digital Economy: Why The Anti-Circumvention Regulations Need To Be Revised"
-
Samuelson P. (1999), "Intellectual Property And The Digital Economy: Why The Anti-Circumvention Regulations Need To Be Revised," 14 Berkeley Tech. L. J. 519;
-
(1999)
14 Berkeley Tech. L. J.
, vol.519
-
-
Samuelson, P.1
-
55
-
-
84876662032
-
-
also, see the legislation: S. 2560, The International Inducement of Copyright Infringement Act of 2004 (The INDUCE Act)., presently "on hold"
-
also, see the legislation: S. 2560, The International Inducement of Copyright Infringement Act of 2004 (The INDUCE Act)., presently "on hold".
-
-
-
-
56
-
-
84876653949
-
"House Gives Final Approval to FY 2002 Commerce, Justice, State and Judiciary Spending Bill"
-
(November 14) available at:
-
"House Gives Final Approval to FY 2002 Commerce, Justice, State and Judiciary Spending Bill," CJIS Group News (November 14, 2001) available at: [http://www.cjisgroup.com/aboutCJIS/newsBudget111401.cfm]
-
(2001)
CJIS Group News
-
-
-
58
-
-
84876652398
-
-
See for example the attempt to create passenger profiling as part of the Secure Flight passenger prescreening program. The Transportation Security Administration has ordered airlines to turn over a month's worth of passenger data, which will allow the creation of passenger profiling. For more information about this step and the attempt to prevent such profiling in the name of privacy right, visit the Electronic Privacy Information Center (EPIC) website, available at:
-
See for example the attempt to create passenger profiling as part of the Secure Flight passenger prescreening program. The Transportation Security Administration has ordered airlines to turn over a month's worth of passenger data, which will allow the creation of passenger profiling. For more information about this step and the attempt to prevent such profiling in the name of privacy right, visit the Electronic Privacy Information Center (EPIC) website, available at: [http://www.epic.org/privacy/airtravel/profiling.html].
-
-
-
-
59
-
-
84876628856
-
-
Question 2, Article 5
-
Aquinas, Summa Theologica, Part I of II, Question 2, Article 5.
-
Summa Theologica
, Issue.Part I and II
-
-
Aquinas1
|