-
1
-
-
84879923054
-
-
available at, [hereinafter CAVOUKIAN, PRIVACY BY DESIGN]
-
Ann Cavoukian, PRIVACY BY DESIGN 1 (2009), available at http://www.ipc.on.ca/images/Resources/privacybydesign.pdf [hereinafter CAVOUKIAN, PRIVACY BY DESIGN];
-
(2009)
Privacy By Design
, vol.1
-
-
Cavoukian, A.1
-
2
-
-
84864067912
-
-
available at, [hereinafter CAVOUKIAN, SEVEN FOUNDATIONAL PRINCIPLES]
-
see Ann Cavoukian, PRIVACY BY DESIGN: THE SEVEN FOUNDATIONAL PRINCIPLES (2009), available at http://www.privacybydesign.ca/content/uploads/2009/08/7foundationalprinciples.pdf [hereinafter CAVOUKIAN, SEVEN FOUNDATIONAL PRINCIPLES].
-
(2009)
Privacy By Design: The Seven Foundational Principles
-
-
Cavoukian, A.1
-
3
-
-
84879906032
-
-
O.J. (L 281) 31 (EC)
-
See Council Directive 95/46, 1995 O.J. (L 281) 31 (EC);
-
(1995)
Council Directive
, vol.95
, Issue.46
-
-
-
8
-
-
37249018138
-
Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life
-
David Buckingham ed
-
Danah Boyd, Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life, in YOUTH, IDENTITY, AND DIGITAL MEDIA 119, 133 (David Buckingham ed., 2008);
-
(2008)
Youth, Identity, And Digital Media
, vol.119
, pp. 133
-
-
Boyd, D.1
-
9
-
-
77953552698
-
Privacy, Free Speech, and "Blurry-Edged" Social Networks
-
Lauren Gelman, Privacy, Free Speech, and "Blurry-Edged" Social Networks, 50 B.C. L. REV. 1315 (2009);
-
(2009)
B.C. L. Rev
, vol.50
, pp. 1315
-
-
Gelman, L.1
-
10
-
-
68949182898
-
Saving Facebook
-
James Grimmelmann, Saving Facebook, 94 IOWA L. REV. 1137 (2009);
-
(2009)
Iowa L. Rev
, vol.94
, pp. 1137
-
-
Grimmelmann, J.1
-
11
-
-
84878864910
-
Silent Listeners: The Evolution of Privacy and Disclosure on Facebook
-
available at
-
Fred Stutzman, Ralph Gross & Alessandro Acquisti, Silent Listeners: The Evolution of Privacy and Disclosure on Facebook, J. PRIVACY & CONFIDENTIALITY, 2012, at 7, available at http://repository.cmu.edu/jpc/vol4/iss2/2/.
-
(2012)
J. Privacy & Confidentiality
, pp. 7
-
-
Stutzman, F.1
Gross, R.2
Acquisti, A.3
-
15
-
-
84878645836
-
Regulating Privacy by Design
-
See, ("Privacy by design is an amorphous concept.")
-
See Ira S. Rubinstein, Regulating Privacy by Design, 26 BERKELEY TECH L.J. 1409, 1421 (2011) ("Privacy by design is an amorphous concept.");
-
(2011)
Berkeley Tech L.J
, vol.26
-
-
Rubinstein, I.S.1
-
16
-
-
84950319052
-
-
New York Univ. Sch. of Law, Working Paper No. 12-43, 2012, available at
-
Ira S. Rubinstein & Nathaniel Good, Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents, (New York Univ. Sch. of Law, Working Paper No. 12-43, 2012), available at https://www.privacyassociation.org/media/pdf/events_and_programs/Privacy%20by%20Design-A%20Counterfactual%20Analysis.pdf.
-
Privacy By Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents
-
-
Rubinstein, I.S.1
Good, N.2
-
17
-
-
84879949677
-
-
Address at the Computers, Privacy & Data Prot. Annual Conference: Engineering Privacy by Design, Jan. 29-30
-
Seda Gürses, Carmela Troncoso & Claudia Diaz, Address at the Computers, Privacy & Data Prot. Annual Conference: Engineering Privacy by Design (Jan. 29-30, 2011).
-
(2011)
-
-
Gürses, S.1
Troncoso, C.2
Diaz, C.3
-
19
-
-
84858168372
-
Boundary Regulation in Social Media
-
See, available at, [hereinafter Stutzman & Hartzog, Boundary Regulation]
-
See Frederic Stutzman & Woodrow Hartzog, Boundary Regulation in Social Media, in PROCEEDINGS OF THE ACM 2012 CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK 769 (2012), available at http://dl.acm.org/citation.cfm?id=2145320&bnc=1 [hereinafter Stutzman & Hartzog, Boundary Regulation];
-
(2012)
Proceedings of the ACM 2012 Conference On Computer Supported Cooperative Work
, pp. 769
-
-
Stutzman, F.1
Hartzog, W.2
-
20
-
-
84874925899
-
The Case for Online Obscurity
-
[hereinafter Hartzog & Stutzman, Online Obscurity]
-
Woodrow Hartzog & Frederic Stutzman, The Case for Online Obscurity, 101 CALIF. L. REV. 1 (2013) [hereinafter Hartzog & Stutzman, Online Obscurity].
-
(2013)
Calif. L. Rev
, vol.101
, pp. 1
-
-
Hartzog, W.1
Stutzman, F.2
-
22
-
-
84879990174
-
Protecting consumer privacy
-
See, e.g., FTC
-
See, e.g., FTC, PROTECTING CONSUMER PRIVACY, supra note 2;
-
Supra Note 2
-
-
-
23
-
-
84879912872
-
-
FTC, available at, [hereinafter FTC, MOBILE PRIVACY DISCLOSURES] ("[M]obile devices can reveal precise information about a user's location that could be used to build detailed profiles of consumer movements over time and in ways not anticipated by consumers. Indeed, companies can use a mobile device to collect data over time and 'reveal[] the habits and patterns that mark the distinction between a day in the life and a way of life.'") (quoting United States v. Maynard, 615 F.3d 544, 562 (D.C. Cir. 2010))
-
FTC, MOBILE PRIVACY DISCLOSURES: BUILDING TRUST THROUGH TRANSPARENCY 3 (2013), available at http://www.ftc.gov/os/2013/02/130201mobileprivacyreport.pdf [hereinafter FTC, MOBILE PRIVACY DISCLOSURES] ("[M]obile devices can reveal precise information about a user's location that could be used to build detailed profiles of consumer movements over time and in ways not anticipated by consumers. Indeed, companies can use a mobile device to collect data over time and 'reveal[] the habits and patterns that mark the distinction between a day in the life and a way of life.'") (quoting United States v. Maynard, 615 F.3d 544, 562 (D.C. Cir. 2010));
-
(2013)
Mobile Privacy Disclosures: Building Trust Through Transparency
, pp. 3
-
-
-
24
-
-
84879988609
-
Facebook Users Unwittingly Revealing Intimate Secrets, Study Finds
-
(Mar. 11, 2013)
-
Josh Halliday, Facebook Users Unwittingly Revealing Intimate Secrets, Study Finds, GUARDIAN (Mar. 11, 2013), http://www.guardian.co.uk/technology/2013/mar/11/facebook-users-reveal-intimate-secrets;
-
Guardian
-
-
Halliday, J.1
-
25
-
-
84879978192
-
-
Press Release, FTC, FTC to Study Data Broker Industry's Collection and Use of Consumer Data (Dec. 18, 2012), available at
-
Press Release, FTC, FTC to Study Data Broker Industry's Collection and Use of Consumer Data (Dec. 18, 2012), available at http://www.ftc.gov/opa/2012/12/databrokers.shtm.
-
-
-
-
26
-
-
81055138684
-
-
See, e.g., available at
-
See, e.g., James Manyika et al., MCKINSEY GLOBAL INST., BIG DATA: THE NEXT FRONTIER FOR INNOVATION, COMPETITION, AND PRODUCTIVITY (2011), available at http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation.
-
(2011)
Mckinsey Global Inst., Big Data: The Next Frontier For Innovation, Competition, And Productivity
-
-
Manyika, J.1
-
27
-
-
84898179886
-
A Brief History of Information Privacy Law
-
See, e.g., available at
-
See, e.g., Daniel J. Solove, A Brief History of Information Privacy Law, in PROSKAUER ON PRIVACY (2006), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=914271;
-
(2006)
Proskauer On Privacy
-
-
Solove, D.J.1
-
28
-
-
79551516184
-
The FTC, the Unfairness Doctrine, and Data Security Breach Litigation: Has the Commission Gone Too Far?
-
Michael D. Scott, The FTC, the Unfairness Doctrine, and Data Security Breach Litigation: Has the Commission Gone Too Far?, 60 ADMIN. L. REV. 127 (2008).
-
(2008)
Admin. L. Rev
, vol.60
, pp. 127
-
-
Scott, M.D.1
-
29
-
-
84879990174
-
Protecting consumer privacy
-
See, e.g., FTC
-
See, e.g., FTC, PROTECTING CONSUMER PRIVACY, supra note 2;
-
Supra Note 2
-
-
-
30
-
-
79751519568
-
Privacy on the Books and on the Ground
-
Kenneth A. Bamberger & Deirdre K. Mulligan, Privacy on the Books and on the Ground, 63 STAN. L. REV. 247 (2011).
-
(2011)
Stan. L. Rev
, vol.63
, pp. 247
-
-
Bamberger, K.A.1
Mulligan, D.K.2
-
32
-
-
84879957168
-
Seven foundational principles
-
see
-
see Cavoukian A, SEVEN FOUNDATIONAL PRINCIPLES, supra note 1;
-
Supra Note 1
-
-
Cavoukian, A.1
-
38
-
-
84879914088
-
Privacy by Design: The Next Generation in the Evolution of Privacy
-
See generally, (special issue devoted to privacy by design), available at
-
See generally Privacy by Design: The Next Generation in the Evolution of Privacy, 3 IDENTITY INFO. SOC'Y 247 (2010) (special issue devoted to privacy by design), available at http://link.springer.com/journal/12394/3/2/page/1.
-
(2010)
Identity Info. Soc'Y
, vol.3
, pp. 247
-
-
-
43
-
-
84879990174
-
Protecting consumer privacy
-
See, FTC, Privacy by design was also one of the "three core principles" called upon by the FTC in a recent report on mobile app privacy
-
See FTC, PROTECTING CONSUMER PRIVACY, supra note 2. Privacy by design was also one of the "three core principles" called upon by the FTC in a recent report on mobile app privacy.
-
Supra Note 2
-
-
-
44
-
-
84879994281
-
Mobile Privacy Disclosures
-
FTC
-
FTC, MOBILE PRIVACY DISCLOSURES, supra note 11, at 6.
-
Supra Note 11
, pp. 6
-
-
-
45
-
-
84879980128
-
Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, A Comprehensive Approach On Personal Data Protection in the European Union
-
See, 609 final (Nov. 4, 2010)
-
See Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, A Comprehensive Approach On Personal Data Protection in the European Union, COM (2010) 609 final (Nov. 4, 2010).
-
(2010)
Com
-
-
-
54
-
-
40449096076
-
Analyzing Regulatory Rules for Privacy and Security Requirements
-
See
-
See Travis D. Breaux & Annie I. Antón, Analyzing Regulatory Rules for Privacy and Security Requirements, 34 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 5, 5, 17-19 (2008).
-
(2008)
Ieee Transactions On Software Engineering
, vol.34
-
-
Breaux, T.D.1
Antón, A.I.2
-
59
-
-
33748924513
-
Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena
-
See
-
See Paul Dourish & Ken Anderson, Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena, 21 HUM.-COMPUTER INTERACTION 319 (2006).
-
(2006)
Hum.-Computer Interaction
, vol.21
, pp. 319
-
-
Dourish, P.1
Anderson, K.2
-
63
-
-
84879990174
-
Protecting Consumer Privacy
-
The FTC has identified the major substantive principles of privacy by design as data security, reasonable collection limits, sound retention practices, and data accuracy. FTC
-
The FTC has identified the major substantive principles of privacy by design as data security, reasonable collection limits, sound retention practices, and data accuracy. FTC, PROTECTING CONSUMER PRIVACY, supra note 2, at 22-32.
-
Supra Note 2
, pp. 22-32
-
-
-
64
-
-
84879971277
-
Key Facts
-
See, last visited Apr. 17
-
See Key Facts, FACEBOOK, http://newsroom.fb.com/Key-Facts (last visited Apr. 17, 2013).
-
(2013)
Facebook
-
-
-
65
-
-
84879981290
-
Community Forum
-
See, last visited Apr. 17
-
See Community Forum, AMAZON.COM, http://www.amazon.com/forum/community?_encoding=UTF8&cdOpenPostBox=1 (last visited Apr. 17, 2013);
-
(2013)
Amazon.Com
-
-
-
66
-
-
84879916327
-
Community Guidelines
-
last visited Apr. 17
-
Community Guidelines, NATION, http://www.thenation.com/community-guidelines (last visited Apr. 17, 2013).
-
(2013)
Nation
-
-
-
69
-
-
25144444373
-
A Social Networks Theory of Privacy
-
Lior Jacob Strahilevitz, A Social Networks Theory of Privacy, 72 U. CHI. L. REV. 919 (2005).
-
(2005)
U. Chi. L. Rev
, vol.72
, pp. 919
-
-
Strahilevitz, L.J.1
-
71
-
-
84926273063
-
Felicity's Condition
-
See Erving Goffman, Felicity's Condition, 89 AM. J. SOC. 1, 1 (1983).
-
(1983)
Am. J. Soc
, vol.89
-
-
Goffman, E.1
-
72
-
-
0003508667
-
-
See, e.g
-
See, e.g., Irwin Altman, The Environment And Social Behavior: Privacy, Personal Space, Territory, And Crowding (1975);
-
(1975)
The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding
-
-
Altman, I.1
-
74
-
-
0038199473
-
-
For example, numerous papers have documented the characteristics of the "attention economy" online, where a multitude of information producers compete furiously for limited attention. To attain large-scale attention requires the expense of significant resources; individuals who do not seek, or seek limited, publicity have very good reason to expect obscurity. See, e.g
-
For example, numerous papers have documented the characteristics of the "attention economy" online, where a multitude of information producers compete furiously for limited attention. To attain large-scale attention requires the expense of significant resources; individuals who do not seek, or seek limited, publicity have very good reason to expect obscurity. See, e.g., Mark Newman, Albert-László Barabási & Duncan J. Watts, The Structure And Dynamics Of Networks (2006);
-
(2006)
The Structure and Dynamics of Networks
-
-
Newman, M.1
Barabási, A.L.2
Watts, D.J.3
-
75
-
-
4243148480
-
Authoritative Sources in a Hyperlinked Environment
-
Jon M. Kleinberg, Authoritative Sources in a Hyperlinked Environment, 46 J. ASS'N COMPUTING MACHINERY 604 (1999).
-
(1999)
J. Ass'n Computing Machinery
, vol.46
, pp. 604
-
-
Kleinberg, J.M.1
-
76
-
-
33947608968
-
Selective Self-Presentation in Computer-Mediated Communication: Hyperpersonal Dimensions of Technology, Language, and Cognition
-
See, e.g
-
See, e.g., Joseph B. Walther, Selective Self-Presentation in Computer-Mediated Communication: Hyperpersonal Dimensions of Technology, Language, and Cognition, 23 COMPUTERS HUM. BEHAVIOR 2538 (2007).
-
(2007)
Computers Hum. Behavior
, vol.23
, pp. 2538
-
-
Walther, J.B.1
-
81
-
-
0347660650
-
Social Cues and Impression Formation in CMC
-
Martin Tanis & Tom Postmes, Social Cues and Impression Formation in CMC, 53 J. COMM. 676 (2003).
-
(2003)
J. Comm
, vol.53
, pp. 676
-
-
Tanis, M.1
Postmes, T.2
-
84
-
-
84879981133
-
Social Steganography: Learning to Hide in Plain Sight
-
see also, Aug. 23
-
see also Danah Boyd, Social Steganography: Learning to Hide in Plain Sight, ZEPHORIA (Aug. 23, 2010), http://www.zephoria.org/thoughts/archives/2010/08/23/social-steganography-learning-to-hide-in-plain-sight.html.
-
(2010)
Zephoria
-
-
Boyd, D.1
-
92
-
-
33745184635
-
Exploratory Search: From Finding to Understanding
-
Gary Marchionini, Exploratory Search: From Finding to Understanding, 49 COMM. ACM 41 (2006);
-
(2006)
Comm. ACM
, vol.49
, pp. 41
-
-
Marchionini, G.1
-
94
-
-
0003945547
-
-
This information, collectively known as "the dark Web," "the deep Web" or "the invisible Web," accounts for 80-99% of the World Wide Web. See, e.g., available at, ("Since they are missing the deep Web when they use such search engines, Internet searchers are therefore searching only 0.03%-or one in 3,000-of the pages available to them today.")
-
This information, collectively known as "the dark Web," "the deep Web" or "the invisible Web," accounts for 80-99% of the World Wide Web. See, e.g., Michael K. Bergman, THE DEEP WEB: SURFACING HIDDEN VALUE (2001), available at http://quod.lib.umich.edu/cgi/t/text/text-idx?c=jep;view=text;rgn=main;idno=3336451.0007.104 ("Since they are missing the deep Web when they use such search engines, Internet searchers are therefore searching only 0.03%-or one in 3,000-of the pages available to them today.");
-
(2001)
The Deep Web: Surfacing Hidden Value
-
-
Bergman, M.K.1
-
95
-
-
0012036450
-
Reap What You Sow: Harvesting the Deep Web
-
Norm Medeiros, Reap What You Sow: Harvesting the Deep Web, 18 OCLC SYS. & SERV. 18 (2002);
-
(2002)
Oclc Sys. & Serv
, vol.18
, pp. 18
-
-
Medeiros, N.1
-
96
-
-
21344453736
-
Indexing the Invisible Web: A Survey
-
Yanbo Ru & Ellis Horowitz, Indexing the Invisible Web: A Survey, 29 ONLINE INFO. REV. 249 (2005);
-
(2005)
Online Info. Rev
, vol.29
, pp. 249
-
-
Yanbo, R.1
Horowitz, E.2
-
97
-
-
84868559786
-
The Dark Side of the Internet
-
Nov. 25
-
Andy Beckett, The Dark Side of the Internet, GUARDIAN (Nov. 25, 2009), http://www.guardian.co.uk/technology/2009/nov/26/dark-side-internet-freenet;
-
(2009)
Guardian
-
-
Beckett, A.1
-
98
-
-
84874830943
-
Data is Gold - 91,000 Terabytes of Uncharted Web: Welcome to the Dark Side
-
Apr. 11, ("The dark Web, or hidden Web is approximately 550 times bigger than the Web you experience daily.")
-
Danny Devriendt, Data is Gold - 91,000 Terabytes of Uncharted Web: Welcome to the Dark Side, PORTER NOVELLI BLOG (Apr. 11, 2011), http://blog.porternovelli.com/2011/04/11/data-is-gold-%E2%80%93-91000-terabytes-of-uncharted-web-welcome-to-the-dark-side/("The dark Web, or hidden Web is approximately 550 times bigger than the Web you experience daily.");
-
(2011)
Porter Novelli Blog
-
-
Devriendt, D.1
-
99
-
-
84874827091
-
Quickstudy: Deep Web
-
Dec. 15, 12:00 PM, ("[M]ore than 500 times as much information as traditional search engines 'know about' is available in the deep Web.")
-
Russell Kay, Quickstudy: Deep Web, COMPUTERWORLD (Dec. 15, 2005, 12:00 PM), http://www.computerworld.com/s/article/107097/Deep_Web ("[M]ore than 500 times as much information as traditional search engines 'know about' is available in the deep Web.");
-
(2005)
Computerworld
-
-
Kay, R.1
-
102
-
-
84879952901
-
"Listing" and "Let Search Engines find your Blog" Settings
-
For example, the popular blogging service Blogger allows users to make their blog invisible to Google, last visited Apr. 27
-
For example, the popular blogging service Blogger allows users to make their blog invisible to Google. See "Listing" and "Let Search Engines find your Blog" Settings, GOOGLE.COM, http://www.google.com/support/blogger/bin/answer.py?hl=en&answer=41373 (last visited Apr. 27, 2011).
-
(2011)
Google.Com
-
-
-
103
-
-
84879988049
-
How Can I Control if Other Search Engines can Link to My Timeline?
-
Facebook profiles that utilize privacy settings are also not found by search engines. See, last visited May 6
-
Facebook profiles that utilize privacy settings are also not found by search engines. See How Can I Control if Other Search Engines can Link to My Timeline?, FACEBOOK, http://www.facebook.com/help/392235220834308/(last visited May 6, 2011);
-
(2011)
Facebook
-
-
-
104
-
-
84856455243
-
Privacy 2.0
-
see also, ("Today, nearly all Web programmers know robots.txt is the way in which sites can signal their intentions to robots, and these intentions are voluntarily respected by every major search engine across differing cultures and legal jurisdictions.")
-
see also Jonathan Zittrain, Privacy 2.0, 2008 U. CHI. LEGAL F. 65, 102 (2008) ("Today, nearly all Web programmers know robots.txt is the way in which sites can signal their intentions to robots, and these intentions are voluntarily respected by every major search engine across differing cultures and legal jurisdictions.").
-
(2008)
U. Chi. Legal F
, vol.2008
-
-
Zittrain, J.1
-
107
-
-
84879897302
-
-
Maomao Wu, Adaptive Privacy Management for Distributed Applications (June 2007) (unpublished Ph.D. dissertation, Lancaster University), available at
-
Maomao Wu, Adaptive Privacy Management for Distributed Applications (June 2007) (unpublished Ph.D. dissertation, Lancaster University), available at http://eprints.lancs.ac.uk/12984/1/PhdThesis-MaomaoWu.pdf.
-
-
-
-
110
-
-
8644231057
-
Public Displays of Connection
-
See
-
See J. Donath & D. Boyd, Public Displays of Connection, 22 BT TECH. J. 71 (2004).
-
(2004)
BT Tech. J
, vol.22
, pp. 71
-
-
Donath, J.1
Boyd, D.2
-
111
-
-
70449632682
-
Remarks at the 30th IEEE Symposium on Security and Privacy: De-anonymizing Social Networks (May 17-20 2009)
-
See, e.g., abstract available at
-
See, e.g., Arvind Narayanan & Vitaly Shmatikov, Remarks at the 30th IEEE Symposium on Security and Privacy: De-anonymizing Social Networks (May 17-20 2009), in 2009 IEEE SYMPOSIUM ON SEC. & PRIVACY, 2009, at 173-87 (abstract available at http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5207644&isnumber=5207632).
-
(2009)
2009 Ieee Symposium On Sec. & Privacy
, pp. 173-187
-
-
Narayanan, A.1
Shmatikov, V.2
-
114
-
-
84879928959
-
Clarity Definition
-
last visited May 30
-
Clarity Definition, MACMILLAN DICTIONARY, http://www.macmillandictionary.com/dictionary/american/clarity#clarity_3 (last visited May 30, 2013).
-
(2013)
Macmillan Dictionary
-
-
-
122
-
-
84879903736
-
-
For those seeking to make a living by writing and publishing information, obscurity is actually an obstacle to overcome. See, e.g., Children's Book Insider ed, available at
-
For those seeking to make a living by writing and publishing information, obscurity is actually an obstacle to overcome. See, e.g., Cory Doctorow, THE PROBLEM ISN'T PIRACY, THE PROBLEM IS OBSCURITY (Children's Book Insider ed., 2011), available at http://www.write4kids.com/blog/wp-content/uploads/2011/05/doctorow.pdf.
-
(2011)
The Problem Isn't Piracy, the Problem is Obscurity
-
-
Doctorow, C.1
-
123
-
-
71649106741
-
The Privacy Box: A Software Proposal
-
See, e.g., Nov. 2
-
See, e.g., Woodrow Hartzog, The Privacy Box: A Software Proposal, FIRST MONDAY (Nov. 2, 2009), http://firstmonday.org/ojs/index.php/fm/rt/printerFriendly/2682/2361.
-
(2009)
First Monday
-
-
Hartzog, W.1
-
125
-
-
84879942192
-
5 Ways to Get Around the New York Times Paywall
-
Of course, paywall technologies are both controversial and subject to circumvention. But increasing the labor required to access information is another way to lower the probability of discovery. See, e.g., Mar. 30
-
Of course, paywall technologies are both controversial and subject to circumvention. But increasing the labor required to access information is another way to lower the probability of discovery. See, e.g., Tim Brookes, 5 Ways to Get Around the New York Times Paywall, MAKEUSEOF (Mar. 30, 2011), http://www.makeuseof.com/tag/5-ways-york-times-paywall/.
-
(2011)
Makeuseof
-
-
Brookes, T.1
-
126
-
-
77953112077
-
-
It should be noted that there are privacy implications regarding the use of cookies, but these threats are better addressed by other strategies within privacy by design and are beyond the scope of this Article. See, e.g., University of California, Berkley, Working Paper, Aug. 10, available at
-
It should be noted that there are privacy implications regarding the use of cookies, but these threats are better addressed by other strategies within privacy by design and are beyond the scope of this Article. See, e.g., Ashkan Soltani et al., Flash Cookies and Privacy (University of California, Berkley, Working Paper, Aug. 10, 2009), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1446862;
-
(2009)
Flash Cookies and Privacy
-
-
Soltani, A.1
-
130
-
-
78049430766
-
-
available at, (finding that "[n]early three quarters (71%) of social networking users ages 18-29 have changed the privacy settings on their profile to limit what they share with others online")
-
Mary Madden & Aaron Smith, PEW INTERNET & AM. LIFE PROJECT, REPUTATION MANAGEMENT AND SOCIAL MEDIA 29 (2010), available at http://www.pewinternet.org/Reports/2010/Reputation-Management.aspx (finding that "[n]early three quarters (71%) of social networking users ages 18-29 have changed the privacy settings on their profile to limit what they share with others online").
-
(2010)
Pew Internet & Am. Life Project, Reputation Management And Social Media
, pp. 29
-
-
Madden, M.1
Smith, A.2
-
131
-
-
84879953216
-
-
See, e.g., Loporcaro v. City of New York, No. 100406/10, 2012 WL 1231021, at *7 (N.Y. Sup. Ct. Apr. 9, 2012) ("When a person creates a Facebook account, he or she may be found to have consented to the possibility that personal information might be shared with others, notwithstanding his or her privacy settings, as there is no guarantee that the pictures and information posted thereon, whether personal or not, will not be further broadcast and made available to other members of the public.")
-
See, e.g., Loporcaro v. City of New York, No. 100406/10, 2012 WL 1231021, at *7 (N.Y. Sup. Ct. Apr. 9, 2012) ("When a person creates a Facebook account, he or she may be found to have consented to the possibility that personal information might be shared with others, notwithstanding his or her privacy settings, as there is no guarantee that the pictures and information posted thereon, whether personal or not, will not be further broadcast and made available to other members of the public.").
-
-
-
-
134
-
-
84879993312
-
Block or Remove Pages Using a Robot.txt File
-
According to Google, "A robots.txt file restricts access to your site by search engine robots that crawl the web. These bots are automated, and before they access pages of a site, they check to see if a robots.txt file exists that prevents them from accessing certain pages.", last visited Apr. 25
-
According to Google, "A robots.txt file restricts access to your site by search engine robots that crawl the web. These bots are automated, and before they access pages of a site, they check to see if a robots.txt file exists that prevents them from accessing certain pages." Block or Remove Pages Using a Robot.txt File, GOOGLE.COM, http://support.google.com/webmasters/bin/answer.py?hl=en&answer=156449 (last visited Apr. 25, 2013).
-
(2013)
Google.Com
-
-
-
135
-
-
81255199105
-
-
See, e.g., ("Today, nearly all Web programmers know robots.txt is the way in which sites can signal their intentions to robots, and these intentions are voluntarily respected by every major search engine across differing cultures and legal jurisdictions.")
-
See, e.g., Zittrain J, supra note 57, at 102 ("Today, nearly all Web programmers know robots.txt is the way in which sites can signal their intentions to robots, and these intentions are voluntarily respected by every major search engine across differing cultures and legal jurisdictions.").
-
Supra Note 57
, pp. 102
-
-
Zittrain, J.1
-
136
-
-
84879995033
-
Can You Restrict Ages on Tumblr?
-
See, e.g, June 29
-
See, e.g., Ashley Poland, Can You Restrict Ages on Tumblr?, EHOW (June 29, 2011), http://www.ehow.com/info_8665566_can-restrict-ages-tumblr.html.
-
(2011)
Ehow
-
-
Poland, A.1
-
137
-
-
84907461137
-
Facebook Facial Recognition: Its Quiet Rise and Dangerous Future
-
See, e.g., Apr. 26
-
See, e.g., Megan Geuss, Facebook Facial Recognition: Its Quiet Rise and Dangerous Future, PCWORLD (Apr. 26, 2011), http://www.pcworld.com/article/226228/Facerec.html.
-
(2011)
Pcworld
-
-
Geuss, M.1
-
139
-
-
84883521324
-
Why Facebook's Facial Recognition is Creepy
-
June 8
-
Sarah Jacobsson Purewal, Why Facebook's Facial Recognition is Creepy, PCWORLD (June 8, 2011), http://www.pcworld.com/article/229742/why_facebooks_facial_recognition_is_creepy.html.
-
(2011)
Pcworld
-
-
Purewal, S.J.1
-
140
-
-
84879942810
-
Augmented Reality
-
last visited May 1
-
Augmented Reality, MASHABLE, http://mashable.com/follow/topics/augmented-reality/(last visited May 1, 2012);
-
(2012)
Mashable
-
-
-
141
-
-
84859353719
-
Freedom of Contract in an Augmented Reality: The Case of Consumer Contracts
-
see also
-
see also Scott R. Peppet, Freedom of Contract in an Augmented Reality: The Case of Consumer Contracts, 59 UCLA L. REV. 676 (2012).
-
(2012)
Ucla L. Rev
, vol.59
, pp. 676
-
-
Peppet, S.R.1
-
142
-
-
84879975337
-
YouTube Tool Blurs Faces to Protect Privacy
-
Mar. 29
-
See Thomas Claburn, YouTube Tool Blurs Faces to Protect Privacy, INFO. WEEK (Mar. 29, 2012), http://www.informationweek.com/news/security/privacy/232700524.
-
(2012)
Info. Week
-
-
Claburn, T.1
-
143
-
-
84879945246
-
A Privacy Manifesto in Code: What if Your Emails Never Went to Gmail and Twitter Couldn't See Your Tweets?
-
See, e.g., Apr. 4
-
See, e.g., Alexis C. Madrigal, A Privacy Manifesto in Code: What if Your Emails Never Went to Gmail and Twitter Couldn't See Your Tweets?, ATLANTIC (Apr. 4, 2012), http://www.theatlantic.com/technology/archive/12/04/a-privacy-manifesto-in-code-what-if-your-emails-never-went-to-gmail-and-twitter-couldnt-see-your-tweets/255414/.
-
(2012)
Atlantic
-
-
Madrigal, A.C.1
-
144
-
-
84879973700
-
Google+ and Pseudonyms: A Step in the Right Direction, Not the End of the Road
-
See, Jan. 24
-
See Eva Galperin, Google+ and Pseudonyms: A Step in the Right Direction, Not the End of the Road, ELECTRONIC FRONTIER FOUND. (Jan. 24, 2011), https://www.eff.org/deeplinks/2012/01/google-pseudonyms-step-right-direction-not-end-road.
-
(2011)
Electronic Frontier Found
-
-
Galperin, E.1
-
145
-
-
84879922855
-
2011 in Review: Nymwars
-
See, Dec. 26
-
See Eva Galperin, 2011 in Review: Nymwars, ELECTRONIC FRONTIER FOUND. (Dec. 26, 2011), https://www.eff.org/deeplinks/2011/12/2011-review-nymwars.
-
(2011)
Electronic Frontier Found
-
-
Galperin, E.1
-
146
-
-
84900129147
-
Statement of Rights and Responsibilities
-
last visited Apr. 26, [hereinafter Statement of Rights] ("Facebook users provide their real names and information, and we need your help to keep it that way. Here are some commitments you make to us relating to registering and maintaining the security of your account:... You will not provide any false personal information on Facebook")
-
Statement of Rights and Responsibilities, FACEBOOK, http://www.facebook.com/terms.php?ref=pf (last visited Apr. 26, 2011) [hereinafter Statement of Rights] ("Facebook users provide their real names and information, and we need your help to keep it that way. Here are some commitments you make to us relating to registering and maintaining the security of your account:... You will not provide any false personal information on Facebook").
-
(2011)
Facebook
-
-
-
147
-
-
85049612655
-
A Case for Pseudonyms
-
See, July 29
-
See Jillian C. York, A Case for Pseudonyms, ELECTRONIC FRONTIER FOUND. (July 29, 2011), https://www.eff.org/deeplinks/2011/07/case-pseudonyms.
-
(2011)
Electronic Frontier Found
-
-
York, J.C.1
-
148
-
-
84879980757
-
Boundary Regulation
-
See, e.g, finding that users often use multiple profiles for "personal" and "professional" separation
-
See, e.g., Stutzman F and Hartzog W, Boundary Regulation, supra note 9 (finding that users often use multiple profiles for "personal" and "professional" separation).
-
Supra Note 9
-
-
Stutzman, F.1
Hartzog, W.2
-
149
-
-
84879959727
-
Statement of Rights
-
("Here are some commitments you make to us relating to registering and maintaining the security of your account:... You will not create more than one personal account.")
-
Statement of Rights, supra note 97 ("Here are some commitments you make to us relating to registering and maintaining the security of your account:... You will not create more than one personal account.").
-
Supra Note 97
-
-
-
150
-
-
84879892083
-
Student Files Lawsuit After Coach Distributed Private Facebook Content
-
For example, in September 2007, a cheerleading coach at Pearl High School in Mississippi allegedly required the members of her cheerleading squad to reveal the usernames and passwords of their Facebook accounts, July 22
-
For example, in September 2007, a cheerleading coach at Pearl High School in Mississippi allegedly required the members of her cheerleading squad to reveal the usernames and passwords of their Facebook accounts. Brian Stewart, Student Files Lawsuit After Coach Distributed Private Facebook Content, STUDENT PRESS L. CENTER (July 22, 2009), http://www.splc.org/newsflash.asp?id=1938;
-
(2009)
Student Press L. Center
-
-
Stewart, B.1
-
151
-
-
84879972012
-
Site Unseen: Schools, Bosses Barred from Eyeing Students', Workers' Social Media
-
Nov. 1, 3:10 AM
-
David L. Hudson Jr Site Unseen: Schools, Bosses Barred from Eyeing Students', Workers' Social Media, A.B.A. J. (Nov. 1, 2012, 3:10 AM), http://www.abajournal.com/magazine/article/site_unseen_schools_bosses_barred_from_eyeing_students_workers_social_media.
-
(2012)
A.B.A. J
-
-
Hudson Jr., D.L.1
-
152
-
-
84879959727
-
Statement of Rights
-
Statement of Rights, supra note 97.
-
Supra Note 97
-
-
-
153
-
-
84879975546
-
-
You will not collect users' content or information, or otherwise access Facebook, using automated means (such as harvesting bots, robots, spiders, or scrapers) without our prior permission
-
You will not collect users' content or information, or otherwise access Facebook, using automated means (such as harvesting bots, robots, spiders, or scrapers) without our prior permission.
-
-
-
-
154
-
-
84879980042
-
Web Scraping Definition
-
Automated information harvesting by third parties also threatens individuals' obscurity and is typically governed via terms of use. See EF Cultural Travel BV v. Zefer Corp., 318 F.3d 58, 62 (1st Cir. 2003) ("Many webpages contain lengthy limiting conditions, including limitations on the use of scrapers."). "Web Scraping is the process of taking html or data from the web and organizing that data into an organized format Common uses for web scraping is the gathering and retrieval of large amounts of information that would be to unwieldy to gather by hand.", last visited Aug. 10
-
Automated information harvesting by third parties also threatens individuals' obscurity and is typically governed via terms of use. See EF Cultural Travel BV v. Zefer Corp., 318 F.3d 58, 62 (1st Cir. 2003) ("Many webpages contain lengthy limiting conditions, including limitations on the use of scrapers."). "Web Scraping is the process of taking html or data from the web and organizing that data into an organized format Common uses for web scraping is the gathering and retrieval of large amounts of information that would be to unwieldy to gather by hand." Web Scraping Definition, EXTRACTINGDATA.COM, http://www.extractingdata.com/web%20scraping.htm (last visited Aug. 10, 2010).
-
(2010)
Extractingdata.Com
-
-
-
156
-
-
84879959727
-
Statement of Rights
-
Statement of Rights, supra note 97.
-
Supra Note 97
-
-
-
157
-
-
84879987587
-
Flickr Community Guidelines
-
See, e.g., last visited May 1
-
See, e.g., Flickr Community Guidelines, FLICKR, http://www.flickr.com/help/guidelines/(last visited May 1, 2012);
-
(2012)
Flickr
-
-
-
158
-
-
84879935110
-
MySpace.com Terms of Use Agreement
-
last visited June 25
-
MySpace.com Terms of Use Agreement, MYSPACE, http://www.myspace.com/Help/Terms?pm_cmp=ed_footer (last visited June 25, 2009);
-
(2009)
Myspace
-
-
-
159
-
-
84879922441
-
The Twitter Rules
-
last visited May 1
-
The Twitter Rules, TWITTER, https://support.twitter.com/articles/18311-the-twitter-rules (last visited May 1, 2012);
-
(2012)
Twitter
-
-
-
160
-
-
84879910007
-
YouTube Community Guidelines
-
last visited May 1, ("We're not asking for the kind of respect reserved for nuns, the elderly, and brain surgeons. We mean don't abuse the site. Every cool new community feature on YouTube involves a certain level of trust. We trust you to be responsible, and millions of users respect that trust. Please be one of them.")
-
YouTube Community Guidelines, YOUTUBE, http://www.youtube.com/t/community_guidelines (last visited May 1, 2012) ("We're not asking for the kind of respect reserved for nuns, the elderly, and brain surgeons. We mean don't abuse the site. Every cool new community feature on YouTube involves a certain level of trust. We trust you to be responsible, and millions of users respect that trust. Please be one of them.").
-
(2012)
Youtube
-
-
-
161
-
-
84861977388
-
Website Design as Contract
-
See, e.g
-
See, e.g., Woodrow Hartzog, Website Design as Contract, 60 AM. U. L. REV. 1635 (2011).
-
(2011)
Am. U. L. Rev
, vol.60
, pp. 1635
-
-
Hartzog, W.1
-
163
-
-
84879926087
-
Flickr Community Guidelines
-
Flickr Community Guidelines, supra note 108.
-
Supra Note 108
-
-
-
166
-
-
84879915577
-
-
see also, Feb. 7, (unpublished manuscript), available at
-
see also Ryan Calo, Code, Nudge, or Notice? (Feb. 7, 2013) (unpublished manuscript), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2217013.
-
(2013)
Code, Nudge, Or Notice?
-
-
Calo, R.1
-
167
-
-
84903035283
-
-
Thaler and Sunstein conceptualize a "nudge" as "any aspect of the choice architecture that alters people's behavior in a predictable way without forbidding any options or significantly changing their economic incentives. To count as a nudge, the intervention must be easy and cheap to avoid. Nudges are not mandates."
-
Richard H. Thaler & Cass R. Sunstein, NUDGE: IMPROVING DECISIONS ABOUT HEALTH, WEALTH, AND HAPPINESS 6 (2008). Thaler and Sunstein conceptualize a "nudge" as "any aspect of the choice architecture that alters people's behavior in a predictable way without forbidding any options or significantly changing their economic incentives. To count as a nudge, the intervention must be easy and cheap to avoid. Nudges are not mandates."
-
(2008)
Nudge: Improving Decisions About Health, Wealth, And Happiness
, pp. 6
-
-
Thaler, R.H.1
Sunstein, C.R.2
-
170
-
-
84879990174
-
Protecting Consumer Privacy
-
See FTC
-
See FTC, PROTECTING CONSUMER PRIVACY, supra note 2.
-
Supra Note 2
-
-
-
171
-
-
0347989497
-
Information Privacy in Cyberspace Transactions
-
See, e.g
-
See, e.g., Jerry Kang, Information Privacy in Cyberspace Transactions, 50 STAN. L. REV. 1193 (1998);
-
(1998)
Stan. L. Rev
, vol.50
, pp. 1193
-
-
Kang, J.1
-
172
-
-
0347358110
-
Opting In, Opting Out, or No Options at All: The Fight for Control of Personal Information
-
Jeff Sovern, Opting In, Opting Out, or No Options at All: The Fight for Control of Personal Information, 74 WASH. L. REV. 1033 (1999).
-
(1999)
Wash. L. Rev
, vol.74
, pp. 1033
-
-
Sovern, J.1
-
175
-
-
33847045636
-
Setting Software Defaults: Perspectives from Law, Computer Science and Behavioral Economics
-
("[P]eople believe defaults convey information on how people should act.")
-
Jay P. Kesan & Rajiv C. Shah, Setting Software Defaults: Perspectives from Law, Computer Science and Behavioral Economics, 82 NOTRE DAME L. REV. 583, 603 (2006) ("[P]eople believe defaults convey information on how people should act.").
-
(2006)
Notre Dame L. Rev
, vol.82
-
-
Kesan, J.P.1
Shah, R.C.2
-
176
-
-
0346423429
-
Gentle Nudges vs. Hard Shoves: Solving the Sticky Norms Problem
-
See, e.g., ("The tendency of individuals to conform-a phenomenon psychologists call 'social influence'-is pervasive: diners prefer to patronize the restaurants that they think other diners will patronize, and citizens to vote for the candidates for whom they think others will vote; teenage girls are more likely to become pregnant when they see that others are having babies, and adults more likely to go on welfare when they become acquainted with others who are on the dole.")
-
See, e.g., Dan M. Kahan, Gentle Nudges vs. Hard Shoves: Solving the Sticky Norms Problem, 67 U. CHI. L. REV. 607, 613 (2000) ("The tendency of individuals to conform-a phenomenon psychologists call 'social influence'-is pervasive: diners prefer to patronize the restaurants that they think other diners will patronize, and citizens to vote for the candidates for whom they think others will vote; teenage girls are more likely to become pregnant when they see that others are having babies, and adults more likely to go on welfare when they become acquainted with others who are on the dole.");
-
(2000)
U. Chi. L. Rev
, vol.67
-
-
Kahan, D.M.1
-
177
-
-
33745949507
-
Government Regulation of Irrationality: Moral and Cognitive Hazards
-
("The main vehicle to greater decision-making competence is alteration in existing psychological states such that later psychological states possess more reliable knowledge about what ends are most valued and how best to achieve those ends. Outcome feedback and verbal feedback serve as the main mechanisms for change between earlier and later psychological states.")
-
Jonathan Klick and Gregory Mitchell, Government Regulation of Irrationality: Moral and Cognitive Hazards, 90 MINN. L. REV. 1620, 1629 (2006) ("The main vehicle to greater decision-making competence is alteration in existing psychological states such that later psychological states possess more reliable knowledge about what ends are most valued and how best to achieve those ends. Outcome feedback and verbal feedback serve as the main mechanisms for change between earlier and later psychological states.").
-
(2006)
Minn. L. Rev
, vol.90
-
-
Klick, J.1
Mitchell, G.2
-
178
-
-
84859015072
-
Against Notice Skepticism in Privacy (and Elsewhere)
-
M. Ryan Calo, Against Notice Skepticism in Privacy (and Elsewhere), 87 NOTRE DAME L. REV. 1027, 1033 (2012).
-
(2012)
Notre Dame L. Rev
, vol.87
-
-
Ryan, C.M.1
-
179
-
-
84859015072
-
Against Notice Skepticism in Privacy (and Elsewhere)
-
For preliminary results regarding an experiment that measures, among other things, "showing" as a notice technique, see
-
Id. at 1042. For preliminary results regarding an experiment that measures, among other things, "showing" as a notice technique, see
-
(2012)
Notre Dame L. Rev
, vol.87
, pp. 1042
-
-
Ryan, C.M.1
-
183
-
-
84879955121
-
Who's Viewed Your Profile?
-
last visited Apr. 27
-
Who's Viewed Your Profile?, LINKEDIN, http://www.linkedin.com/static?key=pop/pop_more_wvmp (last visited Apr. 27, 2012).
-
(2012)
Linkedin
-
-
-
185
-
-
0039648479
-
An Analysis of Out-of-Wedlock Childbearing in the United States
-
See, e.g
-
See, e.g., George A. Akerlof et al., An Analysis of Out-of-Wedlock Childbearing in the United States, 111 Q. J. ECON. 277 (1996);
-
(1996)
Q. J. Econ
, vol.111
, pp. 277
-
-
Akerlof, G.A.1
-
186
-
-
0005508977
-
Peer Effects with Random Assignment: Results for Dartmouth Roommates
-
Bruce Sacerdote, Peer Effects with Random Assignment: Results for Dartmouth Roommates, 116 Q. J. ECON. 681 (2001).
-
(2001)
Q. J. Econ
, vol.116
, pp. 681
-
-
Sacerdote, B.1
-
188
-
-
84879943349
-
What Are Friendship Pages?
-
last visited Apr. 19
-
What Are Friendship Pages?, FACEBOOK, https://www.facebook.com/help/220629401299124/(last visited Apr. 19, 2013).
-
(2013)
Facebook
-
-
-
189
-
-
0016264378
-
Judgment Under Uncertainty: Heuristics and Biases
-
See, e.g
-
See, e.g., Amos Tversky & Daniel Kahneman, Judgment Under Uncertainty: Heuristics and Biases, 185 SCIENCE 1124 (1974);
-
(1974)
Science
, vol.185
, pp. 1124
-
-
Tversky, A.1
Kahneman, D.2
-
192
-
-
84879907465
-
Mobile privacy disclosures
-
FTC
-
FTC, MOBILE PRIVACY DISCLOSURES, supra note 11, at 15-16;
-
Supra Note 11
, pp. 15-16
-
-
-
193
-
-
84879986874
-
FTC Recommends Best Practices for Mobile Privacy
-
see also, Feb. 11
-
see also Lauren Gelman, FTC Recommends Best Practices for Mobile Privacy, BLURRYEDGE STRATEGIES (Feb. 11, 2013), http://blurryedge.com/blurryedge-strategies/2013/02/ftc-recommends-best-practices-for-mobile-privacy.html.
-
(2013)
Blurryedge strategies
-
-
Gelman, L.1
-
194
-
-
84879907465
-
Mobile privacy disclosures
-
FTC
-
FTC, MOBILE PRIVACY DISCLOSURES, supra note 11, at 15. 136.
-
Supra Note 11
-
-
-
195
-
-
84879976044
-
Mobile privacy disclosures
-
FTC
-
See id. at 16.
-
Supra Note 11
, pp. 16
-
-
-
196
-
-
84861902919
-
-
("There are situations in which people assess the frequency of a class or the probability of an event by the ease with which instances or occurrences can be brought to mind.")
-
Tversky A & Daniel K, supra note 132, at 1127 ("There are situations in which people assess the frequency of a class or the probability of an event by the ease with which instances or occurrences can be brought to mind.").
-
Supra Note 132
, pp. 1127
-
-
Tversky, A.1
Daniel, K.2
-
197
-
-
84879945085
-
-
Longtime users of word-processing software Microsoft Word might analogize such a guidance tool to "Clippy," the anthropomorphized paper-clip who asked if the Word users would like help when recognized user behavior associated with specific tasks. Of course, like Clippy, obscurity-reminders should also be easily disabled by the user
-
Longtime users of word-processing software Microsoft Word might analogize such a guidance tool to "Clippy," the anthropomorphized paper-clip who asked if the Word users would like help when recognized user behavior associated with specific tasks. Of course, like Clippy, obscurity-reminders should also be easily disabled by the user.
-
-
-
-
198
-
-
84985070018
-
Framing: Toward Clarification of a Fractured Paradigm
-
(emphasis omitted)
-
Robert M. Entman, Framing: Toward Clarification of a Fractured Paradigm, 43 J. COMM. 51, 52 (1993) (emphasis omitted).
-
(1993)
J. Comm
, vol.43
-
-
Entman, R.M.1
-
199
-
-
84985070018
-
Framing: Toward Clarification of a Fractured Paradigm
-
(emphasis omitted)
-
Id. at 53.
-
(1993)
J. Comm
, vol.43
, pp. 53
-
-
Entman, R.M.1
-
200
-
-
0041906967
-
Choices, Values, and Frames
-
Daniel Kahneman & Amos Tversky, Choices, Values, and Frames, 39 AM. PSYCHOLOGIST 341 (1984).
-
(1984)
Am. Psychologist
, vol.39
, pp. 341
-
-
Kahneman, D.1
Tversky, A.2
-
201
-
-
0001331917
-
Anomalies: The Endowment Effect, Loss Aversion, and Status Quo Bias
-
See, e.g
-
See, e.g., Daniel Kahneman, Jack Knetsh & Richard Thaler, Anomalies: The Endowment Effect, Loss Aversion, and Status Quo Bias, 5 J. ECON. PERSP. 193 (1991).
-
(1991)
J. Econ. Persp
, vol.5
, pp. 193
-
-
Kahneman, D.1
Knetsh, J.2
Thaler, R.3
|