-
2
-
-
3242812017
-
Privacy in electronic commerce and the economics of immediate gratification
-
Acquisti, A., Privacy in Electronic Commerce and the Economics of Immediate Gratification, in PROC. ACM CONF. ON ELECTRONIC COMMERCE (EC 04) (2004).
-
(2004)
Proc. ACM Conf. on Electronic Commerce (EC 04)
-
-
Acquisti, A.1
-
11
-
-
84893636894
-
The iso 14001 environmental management systems standard: A modest perspective
-
Dec
-
Bell, Christopher L., The ISO 14001 Environmental Management Systems Standard: A Modest Perspective, 27 Envtl. L. Rep. 10 (Dec. 1997).
-
(1997)
Envtl. L. Rep.
-
-
Bell, C.L.1
-
12
-
-
0002587094
-
Truste: An online privacy seal program
-
Benassi, P., TRUSTe: An Online Privacy Seal Program, 42 Comm. Of The Acm (1999).
-
(1999)
Comm. of the Acm
-
-
Benassi, P.1
-
13
-
-
0001078944
-
The effect of advertising on the price of eyeglasses
-
Benham, Lee, The Effect of Advertising on the Price of Eyeglasses, 15 J.L.&Econ. 337 (1972).
-
(1972)
J.L.&Econ.
, vol.337
-
-
Benham, L.1
-
16
-
-
0035281460
-
Automatic keyword identification by artificial neural networks compared to manual identification by users of filtering systems
-
Boger, Z. et al., Automatic Keyword Identification by Artificial Neural Networks Compared to Manual Identification by Users of Filtering Systems, 37 Info. Processing & Mgmt. 187 (2001).
-
(2001)
Info. Processing & Mgmt
, vol.187
-
-
Boger, Z.1
-
17
-
-
0042725394
-
A politics of intellectual property: Environmentalism for the net?
-
Boyle, James, A Politics of Intellectual Property: Environmentalism for the Net?, 47 Duke L.J. 87 (1997).
-
(1997)
Duke L.J.
, vol.87
-
-
Boyle, J.1
-
18
-
-
21944439424
-
Foucault in cyberspace: Surveillance, sovereignty, and hardwired censors
-
Boyle, James, Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors, 66 U. Cin. L. Rev. 177 (1997).
-
(1997)
U. Cin. L. Rev.
, vol.177
-
-
Boyle, J.1
-
22
-
-
0001609162
-
Property rules, liability rules, and inalienability: One view of the cathedral
-
Calabresi, Guido & A. Douglas Melamed, Property Rules, Liability Rules, and Inalienability: One View of the Cathedral, 85 Harv. L. Rev. 1089(1972).
-
(1972)
Harv. L. Rev.
, vol.1089
-
-
Calabresi, G.1
Melamed, A.D.2
-
23
-
-
33749040730
-
Digital rights management: Where copyright and privacy collide
-
Cameron, Alex, Digital Rights Management: Where Copyright and Privacy Collide, 2 Canadian Privacy Law Rev. 14 (2004).
-
(2004)
Canadian Privacy Law Rev.
, vol.14
-
-
Cameron, A.1
-
24
-
-
77953510376
-
The efficiency benefits of green taxes, a tribute to senator john heinz
-
Chase, Adam, The Efficiency Benefits of Green Taxes, A Tribute to Senator John Heinz, 11 UCLA J. ENVTL. L. & POL'Y 1 (1992).
-
(1992)
Ucla J. Envtl. L. & POL'Y
, vol.1
-
-
Chase, A.1
-
25
-
-
0003157310
-
Estimation of deidentification disclosure risk in microdata
-
Chen, G. and S. Keller-McNulty, Estimation of Deidentification Disclosure Risk in Microdata, 14 J. OF OFFICIAL STATISTICS 79 (1998).
-
(1998)
J. of Official Statistics
, vol.79
-
-
Chen, G.1
Keller-McNulty, S.2
-
28
-
-
0002071502
-
The problem of social cost
-
Coase, Ronald, The Problem of Social Cost, 3 J.L. & ECON. 1 (1960).
-
(1960)
J.L. & Econ.
, vol.1
-
-
Coase, R.1
-
29
-
-
0036647822
-
Is open source more or less secure?
-
July
-
Cohen, Fred, Is Open Source More or Less Secure? MANAGING NETWORK SECURITY, (July 2002).
-
(2002)
Managing Network Security
-
-
Cohen, F.1
-
30
-
-
0347315050
-
Examined lives: Informational privacy and the subject as object
-
Cohen, Julie E., Examined Lives: Informational Privacy and the Subject as Object, 52 STAN. L. REV. 1373 (2000).
-
(2000)
Stan. L. Rev.
, vol.1373
-
-
Cohen, J.E.1
-
32
-
-
0011688438
-
The liberal commons
-
Dagan, Hanoch & Michael A. Heller, The Liberal Commons, 110 YALE L.J. 549(2001).
-
(2001)
Yale L.J.
, vol.549
-
-
Dagan, H.1
Heller, M.A.2
-
38
-
-
84155192106
-
Terror and tolerance: Criminal justice for the new age of anxiety
-
Dripps, Donald A., Terror and Tolerance: Criminal Justice for the New Age of Anxiety, 1 OHIO ST. J. OF CRIM. L. 9 (2003).
-
(2003)
Ohio St. J. of Crim. L.
, vol.9
-
-
Dripps, D.A.1
-
39
-
-
84893646585
-
The time has come for limited liability for operators of true anonymity remailers in cyberspace: An examination of the possibilities and perils
-
du Pont, George F., The Time has Come for Limited Liability for Operators of True Anonymity Remailers in Cyberspace: An Examination of the Possibilities and Perils, 6 FALL J. TECH. L. & POL'Y 3 (2001).
-
(2001)
Fall J. Tech. L. & Pol'y
, vol.3
-
-
Du Pont, G.F.1
-
42
-
-
0011572699
-
Dis: A new approach to the measurement of statistica disclosure risk
-
Elliot, M.J., DIS: A New Approach to the Measurement of Statistica Disclosure Risk, INT'L. J. OF RISK MGMT. 39 (2000).
-
(2000)
Int'l. J. of Risk Mgmt.
, vol.39
-
-
Elliot, M.J.1
-
43
-
-
33846358668
-
Racial profiling and terrorism
-
Ellmann, Stephen J., Racial Profiling and Terrorism, 22 N.Y.L.S. L. REV. 675 (2003).
-
(2003)
N.Y.L.S. L. Rev.
, vol.675
-
-
Ellmann, S.J.1
-
46
-
-
0042170036
-
The allocation of the commons: Parking on public roads
-
Epstein, Richard A., The Allocation of the Commons: Parking on Public Roads, 31 J. LEGAL STUD. S515 (2002).
-
(2002)
J. Legal Stud. S
, vol.515
-
-
Epstein, R.A.1
-
47
-
-
0002646970
-
On the question of statistical confidentiality
-
Fellegi, LP., On the Question of Statistical Confidentiality, 67 J. OF THE AM. STATISTICAL ASS'N 7 (1972).
-
(1972)
J. of the AM. Statistical Ass'n
, vol.7
-
-
Fellegi, L.P.1
-
49
-
-
0003768069
-
-
Flaherty, David H., PROTECTING PRIVACY IN SURVEILLANCE SOCIETIES: THE FEDERAL REPUBLIC OF GERMANY, SWEDEN, FRANCE, CANADA, AND THE UNITED STATES (1989).
-
(1989)
Protecting Privacy In Surveillance Societies: The Federal Republic Of Germany, Sweden, France, Canada, And The United States
-
-
Flaherty, D.H.1
-
51
-
-
84893710426
-
Anonymity in the balance
-
C. Nicoll et al. eds
-
Froomkin, A. Michael, Anonymity in the Balance, in DIGITAL ANONYMITY AND THE LAW (C. Nicoll et al. eds., 2003).
-
(2003)
Digital Anonymity and the Law
-
-
Froomkin, A.M.1
-
52
-
-
0347684347
-
Symposium: Cyberspace and privacy: A new legal paradigm?, the death of privacy?
-
Froomkin, A. Michael, Symposium: Cyberspace and Privacy: A New Legal Paradigm?: The Death of Privacy?, 52 STAN. L. REV. 1461 (2000).
-
(2000)
52 Stan. L. Rev.
, vol.1461
-
-
Froomkin, A.M.1
-
54
-
-
68349124029
-
Data mining and privacy
-
Fulda, Joseph, Data Mining and Privacy, 11 ALB. L.J. SCI. & TECH. 105 (2000).
-
(2000)
Alb. L.J. Sci. & Tech.
, vol.105
-
-
Fulda, J.1
-
55
-
-
84949287358
-
On secure and pseudonymous client-relationships with multiple severs
-
Gabber, E. et al. On Secure and Pseudonymous Client-Relationships with Multiple Severs, 2 ACM TRANSACTIONS ON INFO. AND SYSTEMS SECURITY (1999).
-
(1999)
ACM Transactions on Info. and Systems Security
-
-
Gabber, E.1
-
56
-
-
0012207557
-
Consistent, yet anonymous, web access with lpwa
-
Gabber, E., et al. Consistent, yet Anonymous, Web Access with LPWA, 42 COMM. OF THE ACM 42-47 (1999).
-
(1999)
Comm. of the ACM
, pp. 42-47
-
-
Gabber, E.1
-
60
-
-
79956080429
-
At the intersection of visible and invisible worlds: United states privacy law and the internet
-
Glancy, Dorothy, At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet, 16 SANTA CLARA COMPUTER & HIGH TECH. L.J. 357 (2000).
-
(2000)
Santa Clara Computer & High Tech. L.J.
, vol.357
-
-
Glancy, D.1
-
62
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
Goldschlag, D.M. et al. Onion Routing for Anonymous and Private Internet Connections, 42 COMM. OF THE ACM 39 (1999).
-
(1999)
Comm. of the ACM
, vol.39
-
-
Goldschlag, D.M.1
-
67
-
-
0032366626
-
Car wars: The fourth amendment's death on the highway
-
Harris, David A., Car Wars: The Fourth Amendment's Death on the Highway, 66 GEO. WASH. L. REV. 556 (1998).
-
(1998)
Geo. Wash. L. Rev.
, vol.556
-
-
Harris, D.A.1
-
69
-
-
0346932394
-
The stories, the statistics, and the law: Why driving while black", matters
-
Harris, David A., The Stories, the Statistics, and the Law: Why Driving While Black" Matters, 84 MiNN. L. REV. 265 (1999).
-
(1999)
Minn. L. Rev.
, vol.265
-
-
Harris, D.A.1
-
70
-
-
0001232077
-
Fundamental legal conceptions as applied in judicial reasoning
-
Hohfeld, Wesley Newcomb, Fundamental Legal Conceptions as Applied in Judicial Reasoning, 26 YALE L.J. 710(1917).
-
(1917)
Yale L.J.
, vol.710
-
-
Hohfeld, W.N.1
-
73
-
-
84893691558
-
-
4 ed
-
Jamieson, Kathleen Hall and Karlyn Kohrs Campbell, THE INTERPLAY OF INFLUENCE: NEWS ADVERTISING, POLITICS, AND THE MASS MEDIA 195(4'^ ed., 1997).
-
(1997)
The Interplay Of Influence: News Advertising, Politics, And The Mass Media
, vol.195
-
-
Jamieson, K.H.1
Campbell, K.K.2
-
74
-
-
70349593268
-
The gramm-leach-bliley act, information privacy, and the limits of default rules
-
Jange, Edward J. and Paul M. Schwartz, The Gramm-Leach-Bliley Act, Information Privacy, and the Limits of Default Rules, 86 MiNN. L. REV. 1219(2002).
-
(2002)
Minn. L. Rev.
, vol.1219
-
-
Jange, E.J.1
Schwartz, P.M.2
-
75
-
-
84950419860
-
Advances in record-linkage methodology as applied to matching the 1985 census of tampa, florida
-
Jaro, M.A., Advances in Record-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida, 84 J. OF AM. STATISTICS ASS'N, 414 (1989).
-
(1989)
J. of Am. Statistics Ass'n
, vol.414
-
-
Jaro, M.A.1
-
76
-
-
0031996445
-
Steganography: Seeing the un n
-
(February, ) at 26
-
Johnson, Neil F. and Sushil Jajodia, Steganography: Seeing the Un n, IEEE COMPUTER (February 1998) at 26.
-
(1998)
IEEE Computer
-
-
Johnson, N.F.1
Jajodia, S.2
-
78
-
-
20444478767
-
Soft blocking: Flexible blocker tags on the cheap
-
V. Atluri, P. F. Syverson, S. De Capitani di Vimercati, eds
-
Juels, A. and J. Brainard, Soft Blocking: Flexible Blocker Tags on the Cheap, PROC. 2004 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOC'Y 1 (V. Atluri, P. F. Syverson, S. De Capitani di Vimercati, eds., 2004).
-
(2004)
Proc. 2004 Acm Workshop On Privacy In The Electronic Soc'y 1
-
-
Juels, A.1
Brainard, J.2
-
79
-
-
18744409344
-
The blocker tag: Selective blocking of rfid tags for consumer privacy
-
V. Atluri, ed
-
Juels, A., R.L. Rivest, M. Szydlo, The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy, 8™ ACM CONF. ON COMPUTER AND COMM. SECURITY 103 (V. Atluri, ed., 2003).
-
(2003)
8™ ACM Conf. on Computer and Comm. Security, 103
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
81
-
-
28444480436
-
-
Willa & Edwin Muir trans
-
Kafka, Frank, THE TRIAL (Willa & Edwin Muir trans., 1937).
-
(1937)
The Trial
-
-
Kafka, F.1
-
83
-
-
0347989497
-
Information privacy in cyberspace transactions
-
Kang, Jerry, Information Privacy in Cyberspace Transactions, 50 STAN. L.REV. 1193(1998).
-
(1998)
Stan. L.Rev.
, vol.1193
-
-
Kang, J.1
-
84
-
-
78649273861
-
Riaa v verizon: Applying the subpoena provision of the dmca
-
Kao, Alice, RIAA V. Verizon: Applying the Subpoena Provision of the DMCA, 19 BERKELEY TECH. L.J. 405 (2004).
-
(2004)
Berkeley Tech. L.J.
, vol.405
-
-
Kao, A.1
-
85
-
-
36549032487
-
Privacy, identity, and databases
-
Karas, Stan, Privacy, Identity, and Databases, 52 AM. U. L. REV. 393 (2002).
-
(2002)
Am. U. L. Rev.
, vol.393
-
-
Karas, S.1
-
88
-
-
80053290674
-
The legal relationship between online service providers and users
-
Kerr, Ian, The Legal Relationship Between Online Service Providers and Users, 35 CAN. BUS. L.J. 40 (2001).
-
(2001)
Can. Bus. L.J.
, vol.40
-
-
Kerr, I.1
-
89
-
-
84893656688
-
The endowment effect and legal analysis, symposium on empirical legal realism: A new social scientific assessment of law and human behavior
-
Korobkin, Russell, The Endowment Effect and Legal Analysis, Symposium on Empirical Legal Realism: A New Social Scientific Assessment of Law and Human Behavior, 97 Nw. U.L. REV. 1227 (2003).
-
(2003)
Nw. U.L. Rev.
, vol.1227
-
-
Korobkin, R.1
-
90
-
-
12144257416
-
The routine traffic stop" from start to finish: Too much routine, not enough fourth amendment
-
Lafave, Wayne R., The Routine Traffic Stop" from Start to Finish: Too Much Routine, Not Enough Fourth Amendment, 102 MICH. L. REV. 1843(2004).
-
(2004)
Mich. L. Rev.
, vol.1843
-
-
Lafave, W.R.1
-
91
-
-
84893709435
-
Your social security number or your life: Disclosure of personal identification information by military personnel and the compromise of privacy and national security
-
Lear, Rick S. & Jefferson D. Reynolds, Your Social Security Number or Your Life: Disclosure of Personal Identification Information by Military Personnel and the Compromise of Privacy and National Security, 21 B. U. INTL. L. J. 1 (2003).
-
(2003)
B. U. Intl. L. J.
, vol.1
-
-
Lear, R.S.1
Reynolds, J.D.2
-
92
-
-
84937292148
-
The path ofcyberlaw
-
Lessig, L., The Path ofCyberlaw, 104 YALE L.J. 1743 (1995).
-
(1995)
Yale L.J.
, vol.1743
-
-
Lessig, L.1
-
93
-
-
77952992831
-
The law of the horse: What cyberlaw might teach
-
Lessig, L., The Law of the Horse: What Cyberlaw Might Teach, 113 HARV.L.REV. 501(1999).
-
(1999)
Harv.L.Rev.
, vol.501
-
-
Lessig, L.1
-
94
-
-
81255212274
-
Information property: Rights and responsibilities
-
Lipton, Jacqueline, Information Property: Rights and Responsibilities, 56 FLA. L. REV. 135(2004).
-
(2004)
Fla. L. Rev.
, vol.135
-
-
Lipton, J.1
-
95
-
-
0345816908
-
Law and policy in the age of the internet
-
Litan, Robert E., Law and Policy in the Age of the Internet, 50 DUKE L. J. 1045 (2001).
-
(2001)
Duke L. J.
, vol.1045
-
-
Litan, R.E.1
-
96
-
-
0347945330
-
Information privacy/information property
-
LITMAN, JESSICA, Information Privacy/Information Property, 52 STAN. L. REV. 1283 (2000).
-
(2000)
Stan. L. Rev.
, vol.1283
-
-
Litman, J.1
-
97
-
-
0346406657
-
Human identification theory and the identity theft problem
-
LoPucki, Lynn M., Human Identification Theory and the Identity Theft Problem, TEX. L. REV. 89 (2001).
-
(2001)
Tex. L. Rev.
, vol.89
-
-
LoPucki, L.M.1
-
98
-
-
12344299255
-
Empirical evaluation of explicit versus implicit acquisition of user profiles in information filtering systems
-
Luz, M.Q. & M. Javed, Empirical Evaluation of Explicit versus Implicit Acquisition of User Profiles in Information Filtering Systems, 4 PROC. OF THE ACM CONF. ON DIGITAL LiBR. (1999).
-
(1999)
Proc. of the ACM Conf. on Digital Libr.
-
-
Luz, M.Q.1
Javed, M.2
-
103
-
-
22044441299
-
The environmental protection agency's project xl and other regulatory reform initiatives: The need for legislative authorization
-
Mank, Brad, The Environmental Protection Agency's Project XL and Other Regulatory Reform Initiatives: The Need for Legislative Authorization, 1998 ECOLOGY L. Q. 1.
-
1998 Ecology L. Q. 1
-
-
Mank, B.1
-
104
-
-
0001695934
-
The origin, development and regulation of norms
-
McAdams, Richard H., The Origin, Development and Regulation of Norms, 96 MICH. L. REV. 338 (1997).
-
(1997)
Mich. L. Rev.
, vol.338
-
-
McAdams, R.H.1
-
105
-
-
1842606409
-
A thousand words are worth a picture: A privacy tort response to consumer data profiling
-
McClurg, Andrew J., A Thousand Words Are Worth a Picture: A Privacy Tort Response to Consumer Data Profiling, 98 Nw. U. L. REV. 63 (2003).
-
(2003)
Nw. U. L. Rev.
, vol.63
-
-
McClurg, A.J.1
-
107
-
-
84893676816
-
Constitutional right of privacy and investigative consumer reports: Little brother is watching you
-
McLauglin, Marsha Morrow & Suzanne Vaupel, Constitutional Right of Privacy and Investigative Consumer Reports: Little Brother Is Watching You, 2 HASTING CONST. L.Q. 773 (1975).
-
(1975)
Hasting Const. L.Q.
, vol.773
-
-
McLauglin, M.M.1
Vaupel, S.2
-
111
-
-
0346089944
-
Property rights in personal information: An economic defense of privacy
-
Murphy, Richard S., Property Rights in Personal Information: An Economic Defense of Privacy, 84 GEO. L.J. 2381 (1996).
-
(1996)
Geo. L.J.
, vol.2381
-
-
Murphy, R.S.1
-
112
-
-
0001527412
-
Unraveling in guessing games: An experimental study
-
Nagel, R., Unraveling in Guessing Games: An Experimental Study, 85 AMER. ECON. REV. 1313 (1995).
-
(1995)
Amer. Econ. Rev.
, vol.1313
-
-
Nagel, R.1
-
113
-
-
0346053624
-
Cyberspace seif governance: A skeptical view from liberal democratic theory
-
Netanel, Neil Weinstock, Cyberspace Seif Governance: A Skeptical View from Liberal Democratic Theory, 88 CAL. L. REV. 395 (2000).
-
(2000)
Cal. L. Rev.
, vol.395
-
-
Netanel, N.W.1
-
114
-
-
84923807175
-
Reflexive environmental law
-
Orts, Eric, Reflexive Environmental Law, 89 Nw. U. L. REV. 1227 (1995).
-
(1995)
Nw. U. L. Rev.
, vol.1227
-
-
Orts, E.1
-
115
-
-
84893656578
-
-
Orwell, George, 1984 (1949
-
Orwell, George, 1984 (1949).
-
-
-
-
116
-
-
0346136951
-
The right of privacy in florida in the age of technology and the twenty-first century: A need for protection from private and commercial intrusion
-
Overton, Hon. Ben F. & Katherine E. Giddings, The Right of Privacy in Florida in the Age of Technology and the Twenty-First Century: A Need for Protection from Private and Commercial Intrusion, 25 FLA. ST. U. L REV. 25 (1997).
-
(1997)
Fla. St. U. L Rev.
, vol.25
-
-
Overton, Hon.B.F.1
Giddings, K.E.2
-
118
-
-
84925971879
-
The economics of privacy
-
Posner, R.A., The Economics of Privacy, 71 AM. ECON. REV. 405 (1981).
-
(1981)
Am. Econ. Rev.
, vol.405
-
-
Posner, R.A.1
-
119
-
-
0009431934
-
The right of privacy
-
Posner, Richard A., The Right of Privacy, 12 GA. L. REV. 393 (1977-78).
-
(1977)
Ga. L. Rev.
, vol.393
-
-
Posner, R.A.1
-
120
-
-
0347033951
-
The unwanted gaze, by jeffrey rosen: Three concepts of privacy
-
Post, Robert C, The Unwanted Gaze, by Jeffrey Rosen: Three Concepts of Privacy, 89 GEO. L.J. 2087 (2001).
-
(2001)
Geo. L.J.
, vol.2087
-
-
Post, R.C.1
-
126
-
-
0000056271
-
Canons of property talk, or, blackstone's anxiety
-
Rose, Carol M., Canons of Property Talk, or, Blackstone's Anxiety, 108 YALE L.J. 601(1998).
-
(1998)
Yale L.J.
, vol.601
-
-
Rose, C.M.1
-
127
-
-
84935412230
-
Inalienability and the theory of property rights
-
Rose-Ackerman, Susan, Inalienability and the Theory of Property Rights, 85 COLUM. L. REV. 931 (1985).
-
(1985)
Colum. L. Rev.
, vol.931
-
-
Rose-Ackerman, S.1
-
130
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Samarati, Pierangela and Latanya Sweeney, Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression, SRI TECH. REP. (1998).
-
(1998)
Sri Tech. Rep.
-
-
Samarati, P.1
Sweeney, L.2
-
131
-
-
0345792391
-
Privacy as intellectual property
-
Samuelson, Pamela, Privacy as Intellectual Property, 52 STAN L. REV. 1125(2000).
-
(2000)
Stan L. Rev.
, vol.1125
-
-
Samuelson, P.1
-
132
-
-
22644449381
-
Internet commerce, and the right to financial privacy: A call for new federal guidelines
-
Schultz, Brian S., Electronic Money, Internet Commerce, and the Right to Financial Privacy: A Call for New Federal Guidelines, 67 U. ClN. L. REV. 779 (1999).
-
(1999)
U. Cln. L. Rev.
, vol.779
-
-
Schultz, B.S.1
Money, E.2
-
133
-
-
0347358112
-
Privacy and democracy in cyberspace
-
Schwartz, Paul M., Privacy and Democracy in Cyberspace, 52 VAND. L. REV. 1609(1999).
-
(1999)
Vand. L. Rev.
, vol.1609
-
-
Schwartz, P.M.1
-
134
-
-
21844513426
-
Privacy and participation: Personal information and public sector regulation in the united states
-
Schwartz, Paul M., Privacy and Participation: Personal Information and Public Sector Regulation in the United States, 80 IOWA L. REV. 553 (1995).
-
(1995)
Iowa L. Rev.
, vol.553
-
-
Schwartz, P.M.1
-
135
-
-
0347875884
-
Privacy and the economics of personal health care information
-
Schwartz, Paul M., Privacy and the Economics of Personal Health Care Information, 76 TEX. L. REV. 1 (1997).
-
(1997)
Tex. L. Rev.
, vol.1
-
-
Schwartz, P.M.1
-
136
-
-
2642572012
-
Property, privacy, and personal data
-
Schwartz, Paul M., Property, Privacy, and Personal Data, 117 HARV. L. REV. 2055 (2004).
-
(2004)
Harv. L. Rev.
, vol.2055
-
-
Schwartz, P.M.1
-
137
-
-
84893660802
-
The computer in german and american constitutional law: Towards an american right of informational self-determination
-
Schwartz, Paul, The Computer in German and American Constitutional Law: Towards an American Right of Informational Self-Determination, 37 AM. J. COMP. L. 675(1989).
-
(1989)
Am. J. Comp. L.
, vol.675
-
-
Schwartz, P.1
-
138
-
-
0008842731
-
What is bounded rationality?
-
G. Gigerenzer and R. Selten, eds
-
Selten, R., What is Bounded Rationality? in BOUNDED RATIONALITY: THE ADAPTIVE TOOLBOX (G. Gigerenzer and R. Selten, eds., 2001).
-
(2001)
Bounded Rationality: The Adaptive Toolbox
-
-
Selten, R.1
-
146
-
-
0003069881
-
Disclosure control for census microdata
-
Skinner, C.J. et al.. Disclosure Control for Census Microdata, J. OF OFFICIAL STATISTICS 31 (1994).
-
(1994)
J. of Official Statistics
, vol.31
-
-
Skinner, C.J.1
-
147
-
-
13344274350
-
Public privacy: Camera surveillance of public places and the right to anonymity
-
Slobogin, Christopher, Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity, 72 MISS. L.J. 213 (2002).
-
(2002)
Miss. L.J.
, vol.213
-
-
Slobogin, C.1
-
150
-
-
3242680656
-
The virtues of knowing less: Justifying privacy protections against disclosure
-
Solove, Daniel J., The Virtues of Knowing Less: Justifying Privacy Protections against Disclosure, 53 DUKE L. J. 967 (2003).
-
(2003)
Duke L. J.
, vol.967
-
-
Solove, D.J.1
-
155
-
-
0043019946
-
A new generation of environmental regulation?
-
Stewart, Richard, A New Generation of Environmental Regulation?, 29 CAPITAL L. REV. 21 (2001).
-
(2001)
Capital L. Rev.
, vol.21
-
-
Stewart, R.1
-
156
-
-
1542401733
-
An introduction to privacy in economics and politics
-
Stigler, G.J., An Introduction to Privacy in Economics and Politics, 9 J. LEGAL STUDIES 623 (1980).
-
(1980)
J. Legal Studies
, vol.623
-
-
Stigler, G.J.1
-
157
-
-
31644444890
-
Privacy, rationality, and temptation: A theory of willpower norms
-
forthcoming
-
Strandburg, Katherine J., Privacy, Rationality, and Temptation: A Theory of Willpower Norms, RUTGERS L. REV. (forthcoming 2005).
-
(2005)
Rutgers L. Rev.
-
-
Strandburg, K.J.1
-
161
-
-
2442625646
-
Disclosure risk measures for sampling disclosure control method
-
Truta, T.M. et al. Disclosure Risk Measures for Sampling Disclosure Control Method, ANN. ACM SYMP. ON APPLIED COMPUTING 301 (2004).
-
(2004)
Ann. ACM Symp. on Applied Computing
, vol.301
-
-
Truta, T.M.1
-
166
-
-
0347315060
-
Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you
-
Volokh, Eugene, Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People From Speaking About You, 52 STAN. L. REV. 1049 (2000).
-
(2000)
Stan. L. Rev.
, vol.1049
-
-
Volokh, E.1
-
168
-
-
0003953213
-
-
Guenther Roth & Claus Wittich eds
-
Weber, Max, ECONOMY AND SOCIETY (Guenther Roth & Claus Wittich eds., 1978).
-
(1978)
Economy and Society
-
-
Weber, M.1
-
170
-
-
0347339256
-
Privacy in the workplace: How well does american law reflect american values?
-
Westin, Alan F., Privacy in the Workplace: How Well Does American Law Reflect American Values?, 72 CHI.-KENT L. REV. 271 (1996).
-
(1996)
Chi.-Kent L. Rev.
, vol.271
-
-
Westin, A.F.1
-
172
-
-
0034833257
-
Learning user interest dynamics with a three- descriptor representation
-
Widyantoro, D.H. et al., Learning User Interest Dynamics with a Three- Descriptor Representation, 52 J. OF THE AM. SOC'Y OF iNFO. SCI. AND TECH. 212 (2001).
-
(2001)
J. of the AM. Soc'y of Info. Sci. and Tech.
, vol.212
-
-
Widyantoro, D.H.1
-
176
-
-
84893688540
-
Conspiracy theory: Big brother enters the brave new world of health care reform
-
Wuchek, Wendy, Conspiracy Theory: Big Brother Enters the Brave New World of Health Care Reform, 3 DEPAUL J. HEALTH CARE L. 293 (2000).
-
(2000)
Depaul J. Health Care L.
, vol.293
-
-
Wuchek, W.1
-
178
-
-
33645796029
-
Mine your own business!": Making the case for the implications of the mining of personal information in the forum of public opinion
-
Zarsky, Tal Z., Mine Your Own Business!": Making the Case for the Implications of the Mining of Personal Information in the Forum of Public Opinion, 5 YALE J.L. & TECH. 4 (2003).
-
(2003)
Yale J.L. & Tech.
, vol.4
-
-
Zarsky, T.Z.1
-
179
-
-
71849096032
-
Desperately king solutions - using implementation- based solutions for the troubles of information privacy in the age of data mining and the internet society
-
Zarsky, Tal Z., Desperately Seeking Solutions - Using Implementation- Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society, 56 ME. L. REV. 13 (2004).
-
(2004)
Me. L. Rev.
, vol.13
-
-
Zarsky, T.Z.1
-
180
-
-
78650941877
-
Thinking outside the box: Considering transparency, anonymity, and pseudonymity as overall solutions to the problems of information privacy in the internet society
-
Zarsky, Tal Z., Thinking Outside the Box: Considering Transparency, Anonymity, and Pseudonymity as Overall Solutions to the Problems of Information Privacy in the Internet Society, 58 U. MIAMI L. REV. 991 (2004).
-
(2004)
U. Miami L. Rev.
, vol.991
-
-
Zarsky, T.Z.1
-
181
-
-
84893683185
-
Cookie viewers and the undermining of data-mining: A critical review of the doubleclick settlement
-
Zarsky, Tal, Cookie Viewers and the Undermining of Data-Mining: A Critical Review of the DoubleClick Settlement, 2002 STAN. TECH. L. REV. PI (2002).
-
(2002)
2002 Stan. Tech. L. Rev., Pi
-
-
Zarsky, T.1
|