-
1
-
-
84900292366
-
-
URLs were checked in January
-
Except where otherwise noted, URLs were checked in January 2007.
-
(2007)
Except where otherwise noted
-
-
-
3
-
-
35048824687
-
Laws, PETS and other technologies for privacy protection
-
February
-
Borking, J.J. & Raab, C. (2001). Laws, PETS and other technologies for privacy protection. Journal of Information, Law and Technology, 1(February).
-
(2001)
Journal of Information, Law and Technology
, vol.1
-
-
Borking, J.J.1
Raab, C.2
-
4
-
-
0002186644
-
Privacy-enhancing technologies: Typology, critique, vision
-
In P.E. Agre & M. Rotenberg (Eds.), MIT Press
-
Burkert, H. (1997). Privacy-enhancing technologies: Typology, critique, vision. In P.E. Agre & M. Rotenberg (Eds.), Technology and privacy: The new landscape. MIT Press.
-
(1997)
Technology and Privacy: The New Landscape
-
-
Burkert, H.1
-
5
-
-
84925938878
-
Ten concepts for an e-business collaborative project management framework
-
Bled, Slovenia, June
-
Cameron, J. (2005). Ten concepts for an e-business collaborative project management framework. Proceedings of the 18th Bled eConference, Bled, Slovenia, June.
-
(2005)
Proceedings of the 18th Bled EConference
-
-
Cameron, J.1
-
6
-
-
33646131730
-
-
Microsoft, May. Retrieved from
-
Cameron, K. (2005). The laws of identity. Microsoft, May. Retrieved from http://msdn2.microsoft.com/en-us/library/ms996456.aspx
-
(2005)
The Laws of Identity
-
-
Cameron, K.1
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Retrieved from
-
Chaum, D. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2). Retrieved from http://world.std.com/~franl/crypto/chaum-acm-1981.html
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
8
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Retrieved from
-
Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10). Retrieved from http://www.chaum.com/articles/Security_Wthout_Identification.htm
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
-
-
Chaum, D.1
-
9
-
-
0027005999
-
Achieving electronic privacy
-
Retrieved from
-
Chaum, D. (1992), Achieving electronic privacy. Sci. Am., 96-101. Retrieved from http://www.chaum.com/articles/Achieving_Electronic_Privacy.htm
-
(1992)
Sci. Am
, pp. 96-101
-
-
Chaum, D.1
-
10
-
-
0036184272
-
Protecting free expression online with Freenet
-
(January-February). Retrived from
-
Clarke, I., Miller, S.G., Hong, T.W., Sandberg, O. & Wiley, B. (2002). Protecting free expression online with Freenet. IEEE Internet Computing (January-February). Retrived fromhttp://freenetproject.org/papers/freenet-ieee.pdf
-
(2002)
IEEE Internet Computing
-
-
Clarke, I.1
Miller, S.G.2
Hong, T.W.3
Sandberg, O.4
Wiley, B.5
-
11
-
-
0024011426
-
Information technology and dataveillance
-
Retrieved from
-
Clarke, R. (1988). Information technology and dataveillance. Communications of the ACM, 31(5). Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/CACM88.html
-
(1988)
Communications of the ACM
, vol.31
, Issue.5
-
-
Clarke, R.1
-
12
-
-
84890803470
-
Extra-organisational systems: A challenge to the software engineering paradigm
-
Madrid, September. Retrieved from
-
Clarke, R. (1992). Extra-organisational systems: A challenge to the software engineering paradigm. Proceedings of the IFIP World Congress, Madrid, September. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/SOS/PaperExtraOrgSys.html
-
(1992)
Proceedings of the IFIP World Congress
-
-
Clarke, R.1
-
14
-
-
84953586760
-
Human identification in information systems: Management challenges and public policy issues
-
Retrieved from
-
Clarke, R. (1994b). Human identification in information systems: Management challenges and public policy issues. Information Technology & People, 7(4), 6-37. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/HumanID.html
-
(1994)
Information Technology & People
, vol.7
, Issue.4
, pp. 6-37
-
-
Clarke, R.1
-
15
-
-
84900144363
-
Privacy, dataveillance, organisational strategy
-
Perth, May 28, 1996. Retrieved from
-
Clarke, R. (1996). Privacy, dataveillance, organisational strategy. Proceedings of the I.S. Audit & Control Association Conference (EDPAC'96), Perth, May 28, 1996. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/PStrat.html
-
(1996)
Proceedings of the I.S. Audit & Control Association Conference (EDPAC'96)
-
-
Clarke, R.1
-
16
-
-
63849127594
-
-
Xamax Consultancy Pty Ltd, February 1998. Retrieved from
-
Clarke, R. (1998a). Privacy impact assessment guidelines. Xamax Consultancy Pty Ltd, February 1998. Retrieved from http://www.xamax.com.au/DV/PIA.html
-
(1998)
Privacy Impact Assessment Guidelines
-
-
Clarke, R.1
-
17
-
-
70849100066
-
Platform for privacy preferences: An overview
-
Retrieved from
-
Clarke, R. (1998b). Platform for privacy preferences: An overview. Privacy Law & Policy Reporter, 5(2), 35-39. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/P3POview.html
-
(1998)
Privacy Law & Policy Reporter
, vol.5
, Issue.2
, pp. 35-39
-
-
Clarke, R.1
-
18
-
-
70849100066
-
Platform for privacy preferences: A critique
-
Retrieved from
-
Clarke, R. (1998c). Platform for privacy preferences: A critique. Privacy Law & Policy Reporter, 5(3), 46-48. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/P3PCrit.html
-
(1998)
Privacy Law & Policy Reporter
, vol.5
, Issue.3
, pp. 46-48
-
-
Clarke, R.1
-
19
-
-
0842283109
-
Identified, anonymous and pseudonymous transactions: The spectrum of choice
-
In S. Fischer-Hübner, G. Quirchmayr, & L. Yngström (Eds.), Kista, Schweden, IFIP WG 8.5 and WS 9.6, June 1999. Retrieved from
-
Clarke, R. (1999). Identified, anonymous and pseudonymous transactions: The spectrum of choice. In S. Fischer-Hübner, G. Quirchmayr, & L. Yngström (Eds.), User identification & privacy protection: Applications in public administration & electronic commerce. Kista, Schweden, IFIP WG 8.5 and WS 9.6, June 1999. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/UIPP99.html
-
(1999)
User Identification & Privacy Protection: Applications In Public Administration & Electronic Commerce
-
-
Clarke, R.1
-
20
-
-
58249108270
-
Introducing PITs and PETs: Technologies affecting privacy
-
Retrieved from
-
Clarke, R. (2001a). Introducing PITs and PETs: Technologies affecting privacy. Privacy Law & Policy Reporter, 7(9), 181-183, 188. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/PITsPETs.html
-
(2001)
Privacy Law & Policy Reporter
, vol.7
, Issue.9
, pp. 181-183
-
-
Clarke, R.1
-
21
-
-
36249026986
-
P3P re-visited
-
Retrieved from
-
Clarke, R. (2001b). P3P re-visited. Privacy Law & Policy Reporter, 7(10). Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/P3PRev.html
-
(2001)
Privacy Law & Policy Reporter
, vol.7
, Issue.10
-
-
Clarke, R.1
-
22
-
-
84899256986
-
Meta-Brands
-
Retrieved from
-
Clarke, R. (2001c). Meta-Brands. Privacy Law & Policy Reporter, 7(11). Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/MetaBrands.html
-
(2001)
Privacy Law & Policy Reporter
, vol.7
, Issue.11
-
-
Clarke, R.1
-
23
-
-
84986178228
-
Person-location and person-tracking: Technologies, risks and policy implications
-
Retrieved from
-
Clarke, R. (2001d). Person-location and person-tracking: Technologies, risks and policy implications. Information Technology & People, 14(2), 206-231. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/PLT.html
-
(2001)
Information Technology & People
, vol.14
, Issue.2
, pp. 206-231
-
-
Clarke, R.1
-
24
-
-
34748863867
-
Trust in the context of e-business
-
Retrieved from
-
Clarke, R. (2002). Trust in the context of e-business. Internet Law Bulletin, 4(5), 56-59. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/EC/Trust.html
-
(2002)
Internet Law Bulletin
, vol.4
, Issue.5
, pp. 56-59
-
-
Clarke, R.1
-
26
-
-
84899341007
-
-
Xamax Consultancy Pty Ltd, December. Retrieved from at
-
Clarke, R. (2005). Privacy statement template. Xamax Consultancy Pty Ltd, December. Retrieved from at http://www.anu.edu.au/people/Roger.Clarke/DV/PST.html
-
(2005)
Privacy Statement Template
-
-
Clarke, R.1
-
27
-
-
84860046939
-
-
Xamax Consultancy Pty Ltd, July 2006. Retrieved from
-
Clarke, R. (2006a). What's Privacy? Xamax Consultancy Pty Ltd, July 2006. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/Privacy.html
-
(2006)
What's Privacy?
-
-
Clarke, R.1
-
28
-
-
84900193248
-
-
Xamax Consultancy Pty Ltd, September 2006. Retrieved from
-
Clarke, R. (2006b). Vignettes of corporate privacy disasters. Xamax Consultancy Pty Ltd, September 2006. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/PrivCorp-0609.html
-
(2006)
Vignettes of Corporate Privacy Disasters
-
-
Clarke, R.1
-
29
-
-
33845562733
-
Make privacy a strategic factor - The why and the how
-
Retrieved from
-
Clarke, R. (2006c). Make privacy a strategic factor - The why and the how. Cutter IT Journal, 19(11), 26-31. Retrieved from http://www.anu.edu.au/people/Roger.Clarke/DV/APBD-0609.html
-
(2006)
Cutter it Journal
, vol.19
, Issue.11
, pp. 26-31
-
-
Clarke, R.1
-
30
-
-
25744478489
-
Privacy-enhancing identity management
-
Issue 67 (September). Retrieved from
-
Clauß, S., Pfitzmann, A., Hansen, M. & Van Herreweghen, E. (2002). Privacy-enhancing identity management. IPTS Report, Issue 67 (September). Retrieved from http://www.jrc.es/home/report/english/articles/vol67/IPT2E676.htm
-
(2002)
IPTS Report
-
-
Clauß, S.1
Pfitzmann, A.2
Hansen, M.3
van Herreweghen, E.4
-
31
-
-
84900123256
-
CPSR co-sponsors meeting on encryption, privacy and communications
-
CPSR, Archived at
-
CPSR (1991). CPSR co-sponsors meeting on encryption, privacy and communications. CPSR News Volume, 9(2). Archived at http://web.archive.org/web/20040705115955/http://www.cpsr.org/publications/newsletters/issues/1991/WinSpr1991/crypt.html
-
(1991)
CPSR News Volume
, vol.9
, Issue.2
-
-
-
32
-
-
84900041255
-
-
DCITA, DCITA, September 2005. Retrieved from
-
DCITA (2005). Taking care of spyware. DCITA, September 2005. Retrieved from http://www.dcita.gov.au/search/click.cgi?url=http://www.dcita.gov.au/_data/assets/pdf_file/30866/Taking_Care_of_Spyware.pdf&rank=2&collection=search
-
(2005)
Taking Care of Spyware
-
-
-
34
-
-
0038426306
-
-
DOC, U.S. Department of Commerce. Retrieved from
-
DOC (2000). Safe Harbor overview. U.S. Department of Commerce. Retrieved from http://www.export.gov/safeharbor/sh_overview.html
-
(2000)
Safe Harbor Overview
-
-
-
36
-
-
84900172218
-
Pretty poor privacy: An assessment of P3P and Internet Privacy
-
EPIC, June. Retrieved from
-
EPIC (2000). Pretty poor privacy: An assessment of P3P and Internet Privacy. Electronic Privacy Information Center and Junkbusters, June. Retrieved from http://www.epic.org/Reports/prettypoorprivacy.html
-
(2000)
Electronic Privacy Information Center and Junkbusters
-
-
-
38
-
-
84900252517
-
-
Freehaven, Retrieved from
-
Freehaven (2000-). Anonymity bibliography. Retrieved from http://freehaven.net/anonbib/
-
(2000)
Anonymity Bibliography
-
-
-
39
-
-
0002656375
-
Anonymity and its enmities
-
1995, at http://www.wm.edu/law/publications/jol/95_96/froomkin.html
-
Froomkin, A.M. (1995). Anonymity and its enmities. J. Online L., http://www.law.cornell.edu/jol/froomkin.htm, 1995, at http://www.wm.edu/law/publications/jol/95_96/froomkin.html
-
(1995)
J. Online L
-
-
Froomkin, A.M.1
-
40
-
-
84900050933
-
Privacy online: Fair information practices in the electronic marketplace: A Federal Trade Commission report to Congress
-
FTC, May. Retrieved from
-
FTC (2000). Privacy online: Fair information practices in the electronic marketplace: A Federal Trade Commission report to Congress. Federal Trade Commission, May. Retrieved from http://www.ftc.gov/reports/privacy2000/privacy2000.pdf
-
(2000)
Federal Trade Commission
-
-
-
43
-
-
84899224463
-
Privacy-enhancing technologies: The path to anonymity
-
IPCR, (Ontario, Canada) and Registratiekamer (The Neth erlands), 2 vols., August. Retrieved from
-
IPCR (1995). Privacy-enhancing technologies: The path to anonymity. Information and Privacy Commissioner (Ontario, Canada) and Registratiekamer (The Neth erlands), 2 vols., August. Retrieved from http://www.ipc.on.ca/web%5Fsite.eng/matters/sum%5Fpap/papers/anon%2De.htm
-
(1995)
Information and Privacy Commissioner
-
-
-
44
-
-
84900140399
-
Quality management -- Customer satisfaction -- Guidelines for complaints handling in organizations
-
ISO 10002, Retrieved from
-
ISO 10002 (2004). Quality management -- Customer satisfaction -- Guidelines for complaints handling in organizations. International Standards Organisation. Retrieved from http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=35539&ICS1=3&ICS2=120&ICS3=10
-
(2004)
International Standards Organisation
-
-
-
46
-
-
84900086650
-
Privacy-enhancing technologies: White paper for decision-makers
-
MIKR, December. Retrieved from
-
MIKR (2004). Privacy-enhancing technologies: White paper for decision-makers. Dutch Ministry of the Interior and Kingdom Relations, December. Retrieved from http://www.dutchdpa.nl/downloads_overig/PET_whitebook.pdf
-
(2004)
Dutch Ministry of the Interior and Kingdom Relations
-
-
-
47
-
-
84900245827
-
-
Onion, Retrieved from
-
Onion (1996-). Onion-Router.net. Retrieved from http://www.onion-router.net/Publications.html
-
(1996)
Onion-Router.net
-
-
-
48
-
-
10944231396
-
OECD guidelines on the protection of privacy and transborder flows of personal data
-
OECD, Paris. Retrieved from
-
OECD (1980). OECD guidelines on the protection of privacy and transborder flows of personal data. Organisation for Economic Co-operation and Development, Paris. Retrieved from http://www.oecd.org/document/18/0,2340,en_2649_201185_1815186_1_1_1_1,00.html
-
(1980)
Organisation For Economic Co-operation and Development
-
-
-
50
-
-
84900122843
-
The privacy law sourcebook: 2001
-
Retrieved from
-
Rotenberg, M. (2004). The privacy law sourcebook: 2001. Electronic Privacy Information Center. Retrieved from http://www.epic.org/bookstore/pls2004/
-
(2004)
Electronic Privacy Information Center
-
-
Rotenberg, M.1
-
51
-
-
84900158211
-
Compilation of state and federal privacy laws
-
with a 2006 Supplement. Retrieved from
-
Smith, R.E. (2002). Compilation of state and federal privacy laws. Privacy Journal, with a 2006 Supplement. Retrieved from http://www.privacyjournal.net/work1.htm
-
(2002)
Privacy Journal
-
-
Smith, R.E.1
-
52
-
-
23344454070
-
Spyware: The ghost in the machine
-
Retrieved from
-
Stafford, T.F. & Urbaczewski, A. (2004). Spyware: The ghost in the machine. Commun. Association for Information Systems, 14, 291-306. Retrieved from http://web.njit.edu/~bieber/CIS677F04/stafford-spyware-cais2004.pdf
-
(2004)
Commun. Association For Information Systems
, vol.14
, pp. 291-306
-
-
Stafford, T.F.1
Urbaczewski, A.2
-
54
-
-
33847415631
-
-
W3C, World Wide Web Consortium, Retrieved from
-
W3C (1998-). Platform for privacy preferences. World Wide Web Consortium, Retrieved from http://www.w3.org/P3P/
-
(1998)
Platform For Privacy Preferences
-
-
-
55
-
-
84900097974
-
-
Wikipedia, Retrieved from
-
Wikipedia (2002-). Penet remailer. Retrieved from http://en.wikipedia.org/wiki/Penet_remailer
-
(2002)
Penet Remailer
-
-
|