메뉴 건너뛰기




Volumn 8, Issue 6, 2006, Pages 949-967

The right not to be identified: Privacy and anonymity in the interactive media environment

Author keywords

Anonymity; Identification; Identity; Information; Interactivity; Internet; Network; Power; Privacy; User

Indexed keywords


EID: 33750701143     PISSN: 14614448     EISSN: 14617315     Source Type: Journal    
DOI: 10.1177/1461444806069650     Document Type: Article
Times cited : (57)

References (33)
  • 3
    • 33750691111 scopus 로고    scopus 로고
    • Secrets and Lies: News Media and Law Enforcement Use of Deception as an Investigative Tool
    • Bell, B. (1999) 'Secrets and Lies: News Media and Law Enforcement Use of Deception as an Investigative Tool', University of Pittsburgh Law Review 60: 745-849.
    • (1999) University of Pittsburgh Law Review , vol.60 , pp. 745-849
    • Bell, B.1
  • 4
    • 0009923904 scopus 로고    scopus 로고
    • Privacy in Cyberspace: Constructing a Model of Privacy for the Electronic Communications Environment
    • Byford, K. S. (1998) 'Privacy in Cyberspace: Constructing a Model of Privacy for the Electronic Communications Environment', Rutgers Computer and Technology Law Journal 24: 1-74.
    • (1998) Rutgers Computer and Technology Law Journal , vol.24 , pp. 1-74
    • Byford, K.S.1
  • 5
    • 0001006507 scopus 로고    scopus 로고
    • A Right to Read Anonymously: A Closer Look at "copyright Management" in Cyberspace
    • Cohen, J. (1996) 'A Right to Read Anonymously: A Closer Look at "Copyright Management" in Cyberspace', Connecticut Law Review 28: 981-1039.
    • (1996) Connecticut Law Review , vol.28 , pp. 981-1039
    • Cohen, J.1
  • 6
    • 0347315050 scopus 로고    scopus 로고
    • Examined Lives: Informational Privacy and the Subject and Object
    • Cohen, J. (2000) 'Examined Lives: Informational Privacy and the Subject and Object', Stanford Law Review 52: 1373-1438.
    • (2000) Stanford Law Review , vol.52 , pp. 1373-1438
    • Cohen, J.1
  • 7
    • 0003582713 scopus 로고    scopus 로고
    • Beyond Concern: Understanding Net Users' Attitudes about Online Privacy
    • Cranor, L. F., J. Reagle and M. S. Ackerman (1999) 'Beyond Concern: Understanding Net Users' Attitudes About Online Privacy', AT&A Labs-Research Technical Report TR 99.4.3 (available at: http://www.research.att.com/projects/ privacystudy/ ).
    • (1999) AT&A Labs-Research Technical Report
    • Cranor, L.F.1    Reagle, J.2    Ackerman, M.S.3
  • 10
    • 0000964378 scopus 로고    scopus 로고
    • Flood Control on the Information Ocean: Living with Anonymity, Digital Cash and Distributed Databases
    • Froomkin, M. (1996) 'Flood Control on the Information Ocean: Living With Anonymity, Digital Cash and Distributed Databases', Journal of Law and Commerce 15: 395-515.
    • (1996) Journal of Law and Commerce , vol.15 , pp. 395-515
    • Froomkin, M.1
  • 11
    • 0033244313 scopus 로고    scopus 로고
    • Legal Issues in Anonymity and Pseudonymity
    • Froomkin, M. (1999) 'Legal Issues in Anonymity and Pseudonymity', The Information Society 15: 113-127.
    • (1999) The Information Society , vol.15 , pp. 113-127
    • Froomkin, M.1
  • 15
    • 0347989497 scopus 로고    scopus 로고
    • Information Privacy in Cyberspace Transactions
    • Kang, J. (1998) 'Information Privacy in Cyberspace Transactions', Stanford Law Review 50: 1193-1294.
    • (1998) Stanford Law Review , vol.50 , pp. 1193-1294
    • Kang, J.1
  • 17
    • 10644239491 scopus 로고    scopus 로고
    • The USA Patriot Act and Telecommunications: Privacy under Attack
    • Lee, L. T. (2003) 'The USA Patriot Act and Telecommunications: Privacy Under Attack', Rutgers Computer and Technology Law Journal 29: 371-403.
    • (2003) Rutgers Computer and Technology Law Journal , vol.29 , pp. 371-403
    • Lee, L.T.1
  • 18
    • 0000494796 scopus 로고
    • Who Are You? Identity and Anonymity in Cyberspace
    • Long, G. P. (1994) 'Who Are You? Identity and Anonymity in Cyberspace', University of Pittsburgh Law Review 55: 1177-1213.
    • (1994) University of Pittsburgh Law Review , vol.55 , pp. 1177-1213
    • Long, G.P.1
  • 20
    • 0037310460 scopus 로고    scopus 로고
    • Recognizing the Societal Value in Information Privacy
    • Nehf, J. P. (2003) 'Recognizing the Societal Value in Information Privacy', Washington Law Review 78: 1-91.
    • (2003) Washington Law Review , vol.78 , pp. 1-91
    • Nehf, J.P.1
  • 21
    • 0040269021 scopus 로고    scopus 로고
    • Organization for Economic Cooperation and Development (OECD) Group of Experts on Information Security and Privacy. Paris: Organization for Economic Cooperation and Development.
    • Organization for Economic Cooperation and Development (OECD) Group of Experts on Information Security and Privacy (1998) Implementing the OECD 'Privacy Guidelines' in the Electronic Environment: Focus on the Internet. DSTI/ICCP/REG(97)6/FINAL. Paris: Organization for Economic Cooperation and Development.
    • (1998) Implementing the OECD 'Privacy Guidelines' in the Electronic Environment: Focus on the Internet
  • 23
    • 33750712477 scopus 로고    scopus 로고
    • The Purposes of Privacy: A Response
    • Rosen, J. (2002) 'The Purposes of Privacy: A Response', Georgetown Law Journal 89: 2117-2137.
    • (2002) Georgetown Law Journal , vol.89 , pp. 2117-2137
    • Rosen, J.1
  • 24
    • 26844528110 scopus 로고    scopus 로고
    • Privacy and Secrecy after September 11
    • Rotenberg, M. (2002) 'Privacy and Secrecy After September 11', Minnesota Law Review 86: 1115-1135.
    • (2002) Minnesota Law Review , vol.86 , pp. 1115-1135
    • Rotenberg, M.1
  • 25
    • 0347358112 scopus 로고    scopus 로고
    • Privacy and Democracy in Cyberspace
    • Schwartz, P. (1999) 'Privacy and Democracy in Cyberspace', Vanderbilt Law Review 52: 1609-1705.
    • (1999) Vanderbilt Law Review , vol.52 , pp. 1609-1705
    • Schwartz, P.1
  • 26
    • 31444450109 scopus 로고    scopus 로고
    • Identity Theft: Victims "cry Out" for Reform
    • Shoudt, E. M. (2002) 'Identity Theft: Victims "Cry Out" For Reform', American University Law Review 52: 339-392.
    • (2002) American University Law Review , vol.52 , pp. 339-392
    • Shoudt, E.M.1
  • 27
    • 33750700071 scopus 로고    scopus 로고
    • Establishing a Legitimate Expectation of Privacy in Clickstream Data
    • Skok, G. (2000) 'Establishing a Legitimate Expectation of Privacy in Clickstream Data', Michigan Telecommunications & Technology Law Review 6: 61-85.
    • (2000) Michigan Telecommunications & Technology Law Review , vol.6 , pp. 61-85
    • Skok, G.1
  • 28
    • 3242680656 scopus 로고    scopus 로고
    • Justifying Privacy Protections Against Disclosure
    • Solove, D. J. (2003) 'Justifying Privacy Protections Against Disclosure', Duke Law Journal 53: 967-1065.
    • (2003) Duke Law Journal , vol.53 , pp. 967-1065
    • Solove, D.J.1
  • 29
    • 33750722205 scopus 로고    scopus 로고
    • Reasonable Expectations and the Erosion of Privacy
    • Spencer, S. B. (2002) 'Reasonable Expectations and the Erosion of Privacy', San Diego Law Review 39: 843-911.
    • (2002) San Diego Law Review , vol.39 , pp. 843-911
    • Spencer, S.B.1
  • 30
    • 0348007197 scopus 로고    scopus 로고
    • Who's Afraid of Anonymous Speech? McIntyre and the Internet
    • Tien, L. (1996) 'Who's Afraid of Anonymous Speech? McIntyre and the Internet', Oregon Law Review 75: 117-189.
    • (1996) Oregon Law Review , vol.75 , pp. 117-189
    • Tien, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.