메뉴 건너뛰기




Volumn , Issue , 2008, Pages 135-155

Business cases for privacy-enhancing technologies

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77954950280     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-804-8.ch007     Document Type: Chapter
Times cited : (6)

References (55)
  • 1
  • 4
    • 0002186644 scopus 로고    scopus 로고
    • Privacy-enhancing technologies: Typology, critique, vision
    • In P.E. Agre & M. Rotenberg (Eds.), MIT Press
    • Burkert, H. (1997). Privacy-enhancing technologies: Typology, critique, vision. In P.E. Agre & M. Rotenberg (Eds.), Technology and privacy: The new landscape. MIT Press.
    • (1997) Technology and Privacy: The New Landscape
    • Burkert, H.1
  • 5
    • 84925938878 scopus 로고    scopus 로고
    • Ten concepts for an e-business collaborative project management framework
    • Bled, Slovenia, June
    • Cameron, J. (2005). Ten concepts for an e-business collaborative project management framework. Proceedings of the 18th Bled eConference, Bled, Slovenia, June.
    • (2005) Proceedings of the 18th Bled EConference
    • Cameron, J.1
  • 6
    • 33646131730 scopus 로고    scopus 로고
    • Microsoft, May. Retrieved from
    • Cameron, K. (2005). The laws of identity. Microsoft, May. Retrieved from http://msdn2.microsoft.com/en-us/library/ms996456.aspx
    • (2005) The Laws of Identity
    • Cameron, K.1
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Retrieved from
    • Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2). Retrieved from http://world.std.com/~franl/crypto/chaum-acm-1981.html
    • (1981) Communications of the ACM , vol.4 , Issue.2
    • Chaum, D.1
  • 8
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Retrieved from
    • Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10). Retrieved from http://www.chaum.com/articles/Security_Wthout_Identification.htm
    • (1985) Communications of the ACM , vol.28 , Issue.10
    • Chaum, D.1
  • 9
    • 0027005999 scopus 로고
    • Achieving electronic privacy
    • Retrieved from
    • Chaum, D. (1992), Achieving electronic privacy. Sci. Am., 96-101. Retrieved from http://www.chaum.com/articles/Achieving_Electronic_Privacy.htm
    • (1992) Sci. Am , pp. 96-101
    • Chaum, D.1
  • 10
    • 0036184272 scopus 로고    scopus 로고
    • Protecting free expression online with Freenet
    • (January-February). Retrived from
    • Clarke, I., Miller, S.G., Hong, T.W., Sandberg, O. & Wiley, B. (2002). Protecting free expression online with Freenet. IEEE Internet Computing (January-February). Retrived fromhttp://freenetproject.org/papers/freenet-ieee.pdf
    • (2002) IEEE Internet Computing
    • Clarke, I.1    Miller, S.G.2    Hong, T.W.3    Sandberg, O.4    Wiley, B.5
  • 11
    • 0024011426 scopus 로고
    • Information technology and dataveillance
    • Retrieved from
    • Clarke, R. (1988). Information technology and dataveillance. Communications of the ACM, 31(5). Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/CACM88.html
    • (1988) Communications of the ACM , vol.31 , Issue.5
    • Clarke, R.1
  • 12
    • 84890803470 scopus 로고
    • Extra-organisational systems: A challenge to the software engineering paradigm
    • Madrid, September. Retrieved from
    • Clarke, R. (1992). Extra-organisational systems: A challenge to the software engineering paradigm. Proceedings of the IFIP World Congress, Madrid, September. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/SOS/PaperExtraOrgSys.html
    • (1992) Proceedings of the IFIP World Congress
    • Clarke, R.1
  • 14
    • 84953586760 scopus 로고
    • Human identification in information systems: Management challenges and public policy issues
    • Retrieved from
    • Clarke, R. (1994b). Human identification in information systems: Management challenges and public policy issues. Information Technology & People, 7(4), 6-37. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/HumanID.html
    • (1994) Information Technology & People , vol.7 , Issue.4 , pp. 6-37
    • Clarke, R.1
  • 15
    • 84900144363 scopus 로고    scopus 로고
    • Privacy, dataveillance, organisational strategy
    • Perth, May 28, 1996. Retrieved from
    • Clarke, R. (1996). Privacy, dataveillance, organisational strategy. Proceedings of the I.S. Audit & Control Association Conference (EDPAC'96), Perth, May 28, 1996. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/PStrat.html
    • (1996) Proceedings of the I.S. Audit & Control Association Conference (EDPAC'96)
    • Clarke, R.1
  • 16
    • 63849127594 scopus 로고    scopus 로고
    • Xamax Consultancy Pty Ltd, February 1998. Retrieved from
    • Clarke, R. (1998a). Privacy impact assessment guidelines. Xamax Consultancy Pty Ltd, February 1998. Retrieved from http://www.xamax.com.au/DV/PIA.html
    • (1998) Privacy Impact Assessment Guidelines
    • Clarke, R.1
  • 17
    • 70849100066 scopus 로고    scopus 로고
    • Platform for privacy preferences: An overview
    • Retrieved from
    • Clarke, R. (1998b). Platform for privacy preferences: An overview. Privacy Law & Policy Reporter, 5(2), 35-39. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/P3POview.html
    • (1998) Privacy Law & Policy Reporter , vol.5 , Issue.2 , pp. 35-39
    • Clarke, R.1
  • 18
    • 70849100066 scopus 로고    scopus 로고
    • Platform for privacy preferences: A critique
    • Retrieved from
    • Clarke, R. (1998c). Platform for privacy preferences: A critique. Privacy Law & Policy Reporter, 5(3), 46-48. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/P3PCrit.html
    • (1998) Privacy Law & Policy Reporter , vol.5 , Issue.3 , pp. 46-48
    • Clarke, R.1
  • 19
    • 0842283109 scopus 로고    scopus 로고
    • Identified, anonymous and pseudonymous transactions: The spectrum of choice
    • In S. Fischer-Hübner, G. Quirchmayr, & L. Yngström (Eds.), Kista, Schweden, IFIP WG 8.5 and WS 9.6, June 1999. Retrieved from
    • Clarke, R. (1999). Identified, anonymous and pseudonymous transactions: The spectrum of choice. In S. Fischer-Hübner, G. Quirchmayr, & L. Yngström (Eds.), User identification & privacy protection: Applications in public administration & electronic commerce. Kista, Schweden, IFIP WG 8.5 and WS 9.6, June 1999. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/UIPP99.html
    • (1999) User Identification & Privacy Protection: Applications In Public Administration & Electronic Commerce
    • Clarke, R.1
  • 20
    • 58249108270 scopus 로고    scopus 로고
    • Introducing PITs and PETs: Technologies affecting privacy
    • Retrieved from
    • Clarke, R. (2001a). Introducing PITs and PETs: Technologies affecting privacy. Privacy Law & Policy Reporter, 7(9), 181-183, 188. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/PITsPETs.html
    • (2001) Privacy Law & Policy Reporter , vol.7 , Issue.9 , pp. 181-183
    • Clarke, R.1
  • 21
    • 36249026986 scopus 로고    scopus 로고
    • P3P re-visited
    • Retrieved from
    • Clarke, R. (2001b). P3P re-visited. Privacy Law & Policy Reporter, 7(10). Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/P3PRev.html
    • (2001) Privacy Law & Policy Reporter , vol.7 , Issue.10
    • Clarke, R.1
  • 22
    • 84899256986 scopus 로고    scopus 로고
    • Meta-Brands
    • Retrieved from
    • Clarke, R. (2001c). Meta-Brands. Privacy Law & Policy Reporter, 7(11). Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/MetaBrands.html
    • (2001) Privacy Law & Policy Reporter , vol.7 , Issue.11
    • Clarke, R.1
  • 23
    • 84986178228 scopus 로고    scopus 로고
    • Person-location and person-tracking: Technologies, risks and policy implications
    • Retrieved from
    • Clarke, R. (2001d). Person-location and person-tracking: Technologies, risks and policy implications. Information Technology & People, 14(2), 206-231. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/PLT.html
    • (2001) Information Technology & People , vol.14 , Issue.2 , pp. 206-231
    • Clarke, R.1
  • 24
    • 34748863867 scopus 로고    scopus 로고
    • Trust in the context of e-business
    • Retrieved from
    • Clarke, R. (2002). Trust in the context of e-business. Internet Law Bulletin, 4(5), 56-59. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/EC/Trust.html
    • (2002) Internet Law Bulletin , vol.4 , Issue.5 , pp. 56-59
    • Clarke, R.1
  • 26
    • 84899341007 scopus 로고    scopus 로고
    • Xamax Consultancy Pty Ltd, December. Retrieved from at
    • Clarke, R. (2005). Privacy statement template. Xamax Consultancy Pty Ltd, December. Retrieved from at http://www.anu.edu.au/people/Roger.Clarke/DV/PST.html
    • (2005) Privacy Statement Template
    • Clarke, R.1
  • 27
    • 84860046939 scopus 로고    scopus 로고
    • Xamax Consultancy Pty Ltd, July 2006. Retrieved from
    • Clarke, R. (2006a). What's Privacy? Xamax Consultancy Pty Ltd, July 2006. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/Privacy.html
    • (2006) What's Privacy?
    • Clarke, R.1
  • 28
    • 84900193248 scopus 로고    scopus 로고
    • Xamax Consultancy Pty Ltd, September 2006. Retrieved from
    • Clarke, R. (2006b). Vignettes of corporate privacy disasters. Xamax Consultancy Pty Ltd, September 2006. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/PrivCorp-0609.html
    • (2006) Vignettes of Corporate Privacy Disasters
    • Clarke, R.1
  • 29
    • 33845562733 scopus 로고    scopus 로고
    • Make privacy a strategic factor - The why and the how
    • Retrieved from
    • Clarke, R. (2006c). Make privacy a strategic factor - The why and the how. Cutter IT Journal, 19(11), 26-31. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/APBD-0609.html
    • (2006) Cutter it Journal , vol.19 , Issue.11 , pp. 26-31
    • Clarke, R.1
  • 30
    • 25744478489 scopus 로고    scopus 로고
    • Privacy-enhancing identity management
    • Issue 67 (September). Retrieved from
    • Clauß, S., Pfitzmann, A., Hansen, M. & Van Herreweghen, E. (2002). Privacy-enhancing identity management. IPTS Report, Issue 67 (September). Retrieved from http://www.jrc.es/home/report/english/articles/vol67/IPT2E676.htm
    • (2002) IPTS Report
    • Clauß, S.1    Pfitzmann, A.2    Hansen, M.3    van Herreweghen, E.4
  • 31
    • 84900123256 scopus 로고
    • CPSR co-sponsors meeting on encryption, privacy and communications
    • CPSR, Archived at
    • CPSR (1991). CPSR co-sponsors meeting on encryption, privacy and communications. CPSR News Volume, 9(2). Archived at http://web.archive.org/web/20040705115955/http://www.cpsr.org/publications/newsletters/issues/1991/WinSpr1991/crypt.html
    • (1991) CPSR News Volume , vol.9 , Issue.2
  • 32
    • 84900041255 scopus 로고    scopus 로고
    • DCITA, DCITA, September 2005. Retrieved from
    • DCITA (2005). Taking care of spyware. DCITA, September 2005. Retrieved from http://www.dcita.gov.au/search/click.cgi?url=http://www.dcita.gov.au/_data/assets/pdf_file/30866/Taking_Care_of_Spyware.pdf&rank=2&collection=search
    • (2005) Taking Care of Spyware
  • 34
    • 0038426306 scopus 로고    scopus 로고
    • DOC, U.S. Department of Commerce. Retrieved from
    • DOC (2000). Safe Harbor overview. U.S. Department of Commerce. Retrieved from http://www.export.gov/safeharbor/sh_overview.html
    • (2000) Safe Harbor Overview
  • 36
    • 84900172218 scopus 로고    scopus 로고
    • Pretty poor privacy: An assessment of P3P and Internet Privacy
    • EPIC, June. Retrieved from
    • EPIC (2000). Pretty poor privacy: An assessment of P3P and Internet Privacy. Electronic Privacy Information Center and Junkbusters, June. Retrieved from http://www.epic.org/Reports/prettypoorprivacy.html
    • (2000) Electronic Privacy Information Center and Junkbusters
  • 38
    • 84900252517 scopus 로고    scopus 로고
    • Freehaven, Retrieved from
    • Freehaven (2000-). Anonymity bibliography. Retrieved from http://freehaven.net/anonbib/
    • (2000) Anonymity Bibliography
  • 39
    • 0002656375 scopus 로고
    • Anonymity and its enmities
    • 1995, at http://www.wm.edu/law/publications/jol/95_96/froomkin.html
    • Froomkin, A.M. (1995). Anonymity and its enmities. J. Online L., http://www.law.cornell.edu/jol/froomkin.htm, 1995, at http://www.wm.edu/law/publications/jol/95_96/froomkin.html
    • (1995) J. Online L
    • Froomkin, A.M.1
  • 40
    • 84900050933 scopus 로고    scopus 로고
    • Privacy online: Fair information practices in the electronic marketplace: A Federal Trade Commission report to Congress
    • FTC, May. Retrieved from
    • FTC (2000). Privacy online: Fair information practices in the electronic marketplace: A Federal Trade Commission report to Congress. Federal Trade Commission, May. Retrieved from http://www.ftc.gov/reports/privacy2000/privacy2000.pdf
    • (2000) Federal Trade Commission
  • 43
    • 84899224463 scopus 로고
    • Privacy-enhancing technologies: The path to anonymity
    • IPCR, (Ontario, Canada) and Registratiekamer (The Neth erlands), 2 vols., August. Retrieved from
    • IPCR (1995). Privacy-enhancing technologies: The path to anonymity. Information and Privacy Commissioner (Ontario, Canada) and Registratiekamer (The Neth erlands), 2 vols., August. Retrieved from http://www.ipc.on.ca/web%5Fsite.eng/matters/sum%5Fpap/papers/anon%2De.htm
    • (1995) Information and Privacy Commissioner
  • 44
    • 84900140399 scopus 로고    scopus 로고
    • Quality management -- Customer satisfaction -- Guidelines for complaints handling in organizations
    • ISO 10002, Retrieved from
    • ISO 10002 (2004). Quality management -- Customer satisfaction -- Guidelines for complaints handling in organizations. International Standards Organisation. Retrieved from http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=35539&ICS1=3&ICS2=120&ICS3=10
    • (2004) International Standards Organisation
  • 46
    • 84900086650 scopus 로고    scopus 로고
    • Privacy-enhancing technologies: White paper for decision-makers
    • MIKR, December. Retrieved from
    • MIKR (2004). Privacy-enhancing technologies: White paper for decision-makers. Dutch Ministry of the Interior and Kingdom Relations, December. Retrieved from http://www.dutchdpa.nl/downloads_overig/PET_whitebook.pdf
    • (2004) Dutch Ministry of the Interior and Kingdom Relations
  • 47
    • 84900245827 scopus 로고    scopus 로고
    • Onion, Retrieved from
    • Onion (1996-). Onion-Router.net. Retrieved from http://www.onion-router.net/Publications.html
    • (1996) Onion-Router.net
  • 48
    • 10944231396 scopus 로고
    • OECD guidelines on the protection of privacy and transborder flows of personal data
    • OECD, Paris. Retrieved from
    • OECD (1980). OECD guidelines on the protection of privacy and transborder flows of personal data. Organisation for Economic Co-operation and Development, Paris. Retrieved from http://www.oecd.org/document/18/0,2340,en_2649_201185_1815186_1_1_1_1,00.html
    • (1980) Organisation For Economic Co-operation and Development
  • 50
    • 84900122843 scopus 로고    scopus 로고
    • The privacy law sourcebook: 2001
    • Retrieved from
    • Rotenberg, M. (2004). The privacy law sourcebook: 2001. Electronic Privacy Information Center. Retrieved from http://www.epic.org/bookstore/pls2004/
    • (2004) Electronic Privacy Information Center
    • Rotenberg, M.1
  • 51
    • 84900158211 scopus 로고    scopus 로고
    • Compilation of state and federal privacy laws
    • with a 2006 Supplement. Retrieved from
    • Smith, R.E. (2002). Compilation of state and federal privacy laws. Privacy Journal, with a 2006 Supplement. Retrieved from http://www.privacyjournal.net/work1.htm
    • (2002) Privacy Journal
    • Smith, R.E.1
  • 52
    • 23344454070 scopus 로고    scopus 로고
    • Spyware: The ghost in the machine
    • Retrieved from
    • Stafford, T.F. & Urbaczewski, A. (2004). Spyware: The ghost in the machine. Commun. Association for Information Systems, 14, 291-306. Retrieved from http://web.njit.edu/~bieber/CIS677F04/stafford-spyware-cais2004.pdf
    • (2004) Commun. Association For Information Systems , vol.14 , pp. 291-306
    • Stafford, T.F.1    Urbaczewski, A.2
  • 54
    • 33847415631 scopus 로고    scopus 로고
    • W3C, World Wide Web Consortium, Retrieved from
    • W3C (1998-). Platform for privacy preferences. World Wide Web Consortium, Retrieved from http://www.w3.org/P3P/
    • (1998) Platform For Privacy Preferences
  • 55
    • 84900097974 scopus 로고    scopus 로고
    • Wikipedia, Retrieved from
    • Wikipedia (2002-). Penet remailer. Retrieved from http://en.wikipedia.org/wiki/Penet_remailer
    • (2002) Penet Remailer


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.