메뉴 건너뛰기




Volumn 88, Issue 2, 2013, Pages 385-418

Obscurity by design

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84879956282     PISSN: 00430617     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (39)

References (202)
  • 1
    • 84879923054 scopus 로고    scopus 로고
    • available at, [hereinafter CAVOUKIAN, PRIVACY BY DESIGN]
    • Ann Cavoukian, PRIVACY BY DESIGN 1 (2009), available at http://www.ipc.on.ca/images/Resources/privacybydesign.pdf [hereinafter CAVOUKIAN, PRIVACY BY DESIGN];
    • (2009) Privacy By Design , vol.1
    • Cavoukian, A.1
  • 2
    • 84864067912 scopus 로고    scopus 로고
    • available at, [hereinafter CAVOUKIAN, SEVEN FOUNDATIONAL PRINCIPLES]
    • see Ann Cavoukian, PRIVACY BY DESIGN: THE SEVEN FOUNDATIONAL PRINCIPLES (2009), available at http://www.privacybydesign.ca/content/uploads/2009/08/7foundationalprinciples.pdf [hereinafter CAVOUKIAN, SEVEN FOUNDATIONAL PRINCIPLES].
    • (2009) Privacy By Design: The Seven Foundational Principles
    • Cavoukian, A.1
  • 3
    • 84879906032 scopus 로고
    • O.J. (L 281) 31 (EC)
    • See Council Directive 95/46, 1995 O.J. (L 281) 31 (EC);
    • (1995) Council Directive , vol.95 , Issue.46
  • 8
    • 37249018138 scopus 로고    scopus 로고
    • Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life
    • David Buckingham ed
    • Danah Boyd, Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life, in YOUTH, IDENTITY, AND DIGITAL MEDIA 119, 133 (David Buckingham ed., 2008);
    • (2008) Youth, Identity, And Digital Media , vol.119 , pp. 133
    • Boyd, D.1
  • 9
    • 77953552698 scopus 로고    scopus 로고
    • Privacy, Free Speech, and "Blurry-Edged" Social Networks
    • Lauren Gelman, Privacy, Free Speech, and "Blurry-Edged" Social Networks, 50 B.C. L. REV. 1315 (2009);
    • (2009) B.C. L. Rev , vol.50 , pp. 1315
    • Gelman, L.1
  • 10
    • 68949182898 scopus 로고    scopus 로고
    • Saving Facebook
    • James Grimmelmann, Saving Facebook, 94 IOWA L. REV. 1137 (2009);
    • (2009) Iowa L. Rev , vol.94 , pp. 1137
    • Grimmelmann, J.1
  • 11
    • 84878864910 scopus 로고    scopus 로고
    • Silent Listeners: The Evolution of Privacy and Disclosure on Facebook
    • available at
    • Fred Stutzman, Ralph Gross & Alessandro Acquisti, Silent Listeners: The Evolution of Privacy and Disclosure on Facebook, J. PRIVACY & CONFIDENTIALITY, 2012, at 7, available at http://repository.cmu.edu/jpc/vol4/iss2/2/.
    • (2012) J. Privacy & Confidentiality , pp. 7
    • Stutzman, F.1    Gross, R.2    Acquisti, A.3
  • 15
    • 84878645836 scopus 로고    scopus 로고
    • Regulating Privacy by Design
    • See, ("Privacy by design is an amorphous concept.")
    • See Ira S. Rubinstein, Regulating Privacy by Design, 26 BERKELEY TECH L.J. 1409, 1421 (2011) ("Privacy by design is an amorphous concept.");
    • (2011) Berkeley Tech L.J , vol.26
    • Rubinstein, I.S.1
  • 17
    • 84879949677 scopus 로고    scopus 로고
    • Address at the Computers, Privacy & Data Prot. Annual Conference: Engineering Privacy by Design, Jan. 29-30
    • Seda Gürses, Carmela Troncoso & Claudia Diaz, Address at the Computers, Privacy & Data Prot. Annual Conference: Engineering Privacy by Design (Jan. 29-30, 2011).
    • (2011)
    • Gürses, S.1    Troncoso, C.2    Diaz, C.3
  • 19
    • 84858168372 scopus 로고    scopus 로고
    • Boundary Regulation in Social Media
    • See, available at, [hereinafter Stutzman & Hartzog, Boundary Regulation]
    • See Frederic Stutzman & Woodrow Hartzog, Boundary Regulation in Social Media, in PROCEEDINGS OF THE ACM 2012 CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK 769 (2012), available at http://dl.acm.org/citation.cfm?id=2145320&bnc=1 [hereinafter Stutzman & Hartzog, Boundary Regulation];
    • (2012) Proceedings of the ACM 2012 Conference On Computer Supported Cooperative Work , pp. 769
    • Stutzman, F.1    Hartzog, W.2
  • 20
    • 84874925899 scopus 로고    scopus 로고
    • The Case for Online Obscurity
    • [hereinafter Hartzog & Stutzman, Online Obscurity]
    • Woodrow Hartzog & Frederic Stutzman, The Case for Online Obscurity, 101 CALIF. L. REV. 1 (2013) [hereinafter Hartzog & Stutzman, Online Obscurity].
    • (2013) Calif. L. Rev , vol.101 , pp. 1
    • Hartzog, W.1    Stutzman, F.2
  • 22
    • 84879990174 scopus 로고    scopus 로고
    • Protecting consumer privacy
    • See, e.g., FTC
    • See, e.g., FTC, PROTECTING CONSUMER PRIVACY, supra note 2;
    • Supra Note 2
  • 23
    • 84879912872 scopus 로고    scopus 로고
    • FTC, available at, [hereinafter FTC, MOBILE PRIVACY DISCLOSURES] ("[M]obile devices can reveal precise information about a user's location that could be used to build detailed profiles of consumer movements over time and in ways not anticipated by consumers. Indeed, companies can use a mobile device to collect data over time and 'reveal[] the habits and patterns that mark the distinction between a day in the life and a way of life.'") (quoting United States v. Maynard, 615 F.3d 544, 562 (D.C. Cir. 2010))
    • FTC, MOBILE PRIVACY DISCLOSURES: BUILDING TRUST THROUGH TRANSPARENCY 3 (2013), available at http://www.ftc.gov/os/2013/02/130201mobileprivacyreport.pdf [hereinafter FTC, MOBILE PRIVACY DISCLOSURES] ("[M]obile devices can reveal precise information about a user's location that could be used to build detailed profiles of consumer movements over time and in ways not anticipated by consumers. Indeed, companies can use a mobile device to collect data over time and 'reveal[] the habits and patterns that mark the distinction between a day in the life and a way of life.'") (quoting United States v. Maynard, 615 F.3d 544, 562 (D.C. Cir. 2010));
    • (2013) Mobile Privacy Disclosures: Building Trust Through Transparency , pp. 3
  • 24
    • 84879988609 scopus 로고    scopus 로고
    • Facebook Users Unwittingly Revealing Intimate Secrets, Study Finds
    • (Mar. 11, 2013)
    • Josh Halliday, Facebook Users Unwittingly Revealing Intimate Secrets, Study Finds, GUARDIAN (Mar. 11, 2013), http://www.guardian.co.uk/technology/2013/mar/11/facebook-users-reveal-intimate-secrets;
    • Guardian
    • Halliday, J.1
  • 25
    • 84879978192 scopus 로고    scopus 로고
    • Press Release, FTC, FTC to Study Data Broker Industry's Collection and Use of Consumer Data (Dec. 18, 2012), available at
    • Press Release, FTC, FTC to Study Data Broker Industry's Collection and Use of Consumer Data (Dec. 18, 2012), available at http://www.ftc.gov/opa/2012/12/databrokers.shtm.
  • 27
    • 84898179886 scopus 로고    scopus 로고
    • A Brief History of Information Privacy Law
    • See, e.g., available at
    • See, e.g., Daniel J. Solove, A Brief History of Information Privacy Law, in PROSKAUER ON PRIVACY (2006), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=914271;
    • (2006) Proskauer On Privacy
    • Solove, D.J.1
  • 28
    • 79551516184 scopus 로고    scopus 로고
    • The FTC, the Unfairness Doctrine, and Data Security Breach Litigation: Has the Commission Gone Too Far?
    • Michael D. Scott, The FTC, the Unfairness Doctrine, and Data Security Breach Litigation: Has the Commission Gone Too Far?, 60 ADMIN. L. REV. 127 (2008).
    • (2008) Admin. L. Rev , vol.60 , pp. 127
    • Scott, M.D.1
  • 29
    • 84879990174 scopus 로고    scopus 로고
    • Protecting consumer privacy
    • See, e.g., FTC
    • See, e.g., FTC, PROTECTING CONSUMER PRIVACY, supra note 2;
    • Supra Note 2
  • 30
    • 79751519568 scopus 로고    scopus 로고
    • Privacy on the Books and on the Ground
    • Kenneth A. Bamberger & Deirdre K. Mulligan, Privacy on the Books and on the Ground, 63 STAN. L. REV. 247 (2011).
    • (2011) Stan. L. Rev , vol.63 , pp. 247
    • Bamberger, K.A.1    Mulligan, D.K.2
  • 32
    • 84879957168 scopus 로고    scopus 로고
    • Seven foundational principles
    • see
    • see Cavoukian A, SEVEN FOUNDATIONAL PRINCIPLES, supra note 1;
    • Supra Note 1
    • Cavoukian, A.1
  • 38
    • 84879914088 scopus 로고    scopus 로고
    • Privacy by Design: The Next Generation in the Evolution of Privacy
    • See generally, (special issue devoted to privacy by design), available at
    • See generally Privacy by Design: The Next Generation in the Evolution of Privacy, 3 IDENTITY INFO. SOC'Y 247 (2010) (special issue devoted to privacy by design), available at http://link.springer.com/journal/12394/3/2/page/1.
    • (2010) Identity Info. Soc'Y , vol.3 , pp. 247
  • 43
    • 84879990174 scopus 로고    scopus 로고
    • Protecting consumer privacy
    • See, FTC, Privacy by design was also one of the "three core principles" called upon by the FTC in a recent report on mobile app privacy
    • See FTC, PROTECTING CONSUMER PRIVACY, supra note 2. Privacy by design was also one of the "three core principles" called upon by the FTC in a recent report on mobile app privacy.
    • Supra Note 2
  • 44
    • 84879994281 scopus 로고    scopus 로고
    • Mobile Privacy Disclosures
    • FTC
    • FTC, MOBILE PRIVACY DISCLOSURES, supra note 11, at 6.
    • Supra Note 11 , pp. 6
  • 45
    • 84879980128 scopus 로고    scopus 로고
    • Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, A Comprehensive Approach On Personal Data Protection in the European Union
    • See, 609 final (Nov. 4, 2010)
    • See Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, A Comprehensive Approach On Personal Data Protection in the European Union, COM (2010) 609 final (Nov. 4, 2010).
    • (2010) Com
  • 54
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing Regulatory Rules for Privacy and Security Requirements
    • See
    • See Travis D. Breaux & Annie I. Antón, Analyzing Regulatory Rules for Privacy and Security Requirements, 34 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 5, 5, 17-19 (2008).
    • (2008) Ieee Transactions On Software Engineering , vol.34
    • Breaux, T.D.1    Antón, A.I.2
  • 59
    • 33748924513 scopus 로고    scopus 로고
    • Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena
    • See
    • See Paul Dourish & Ken Anderson, Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena, 21 HUM.-COMPUTER INTERACTION 319 (2006).
    • (2006) Hum.-Computer Interaction , vol.21 , pp. 319
    • Dourish, P.1    Anderson, K.2
  • 63
    • 84879990174 scopus 로고    scopus 로고
    • Protecting Consumer Privacy
    • The FTC has identified the major substantive principles of privacy by design as data security, reasonable collection limits, sound retention practices, and data accuracy. FTC
    • The FTC has identified the major substantive principles of privacy by design as data security, reasonable collection limits, sound retention practices, and data accuracy. FTC, PROTECTING CONSUMER PRIVACY, supra note 2, at 22-32.
    • Supra Note 2 , pp. 22-32
  • 64
    • 84879971277 scopus 로고    scopus 로고
    • Key Facts
    • See, last visited Apr. 17
    • See Key Facts, FACEBOOK, http://newsroom.fb.com/Key-Facts (last visited Apr. 17, 2013).
    • (2013) Facebook
  • 65
    • 84879981290 scopus 로고    scopus 로고
    • Community Forum
    • See, last visited Apr. 17
    • See Community Forum, AMAZON.COM, http://www.amazon.com/forum/community?_encoding=UTF8&cdOpenPostBox=1 (last visited Apr. 17, 2013);
    • (2013) Amazon.Com
  • 66
    • 84879916327 scopus 로고    scopus 로고
    • Community Guidelines
    • last visited Apr. 17
    • Community Guidelines, NATION, http://www.thenation.com/community-guidelines (last visited Apr. 17, 2013).
    • (2013) Nation
  • 69
    • 25144444373 scopus 로고    scopus 로고
    • A Social Networks Theory of Privacy
    • Lior Jacob Strahilevitz, A Social Networks Theory of Privacy, 72 U. CHI. L. REV. 919 (2005).
    • (2005) U. Chi. L. Rev , vol.72 , pp. 919
    • Strahilevitz, L.J.1
  • 71
    • 84926273063 scopus 로고
    • Felicity's Condition
    • See Erving Goffman, Felicity's Condition, 89 AM. J. SOC. 1, 1 (1983).
    • (1983) Am. J. Soc , vol.89
    • Goffman, E.1
  • 74
    • 0038199473 scopus 로고    scopus 로고
    • For example, numerous papers have documented the characteristics of the "attention economy" online, where a multitude of information producers compete furiously for limited attention. To attain large-scale attention requires the expense of significant resources; individuals who do not seek, or seek limited, publicity have very good reason to expect obscurity. See, e.g
    • For example, numerous papers have documented the characteristics of the "attention economy" online, where a multitude of information producers compete furiously for limited attention. To attain large-scale attention requires the expense of significant resources; individuals who do not seek, or seek limited, publicity have very good reason to expect obscurity. See, e.g., Mark Newman, Albert-László Barabási & Duncan J. Watts, The Structure And Dynamics Of Networks (2006);
    • (2006) The Structure and Dynamics of Networks
    • Newman, M.1    Barabási, A.L.2    Watts, D.J.3
  • 75
    • 4243148480 scopus 로고    scopus 로고
    • Authoritative Sources in a Hyperlinked Environment
    • Jon M. Kleinberg, Authoritative Sources in a Hyperlinked Environment, 46 J. ASS'N COMPUTING MACHINERY 604 (1999).
    • (1999) J. Ass'n Computing Machinery , vol.46 , pp. 604
    • Kleinberg, J.M.1
  • 76
    • 33947608968 scopus 로고    scopus 로고
    • Selective Self-Presentation in Computer-Mediated Communication: Hyperpersonal Dimensions of Technology, Language, and Cognition
    • See, e.g
    • See, e.g., Joseph B. Walther, Selective Self-Presentation in Computer-Mediated Communication: Hyperpersonal Dimensions of Technology, Language, and Cognition, 23 COMPUTERS HUM. BEHAVIOR 2538 (2007).
    • (2007) Computers Hum. Behavior , vol.23 , pp. 2538
    • Walther, J.B.1
  • 81
    • 0347660650 scopus 로고    scopus 로고
    • Social Cues and Impression Formation in CMC
    • Martin Tanis & Tom Postmes, Social Cues and Impression Formation in CMC, 53 J. COMM. 676 (2003).
    • (2003) J. Comm , vol.53 , pp. 676
    • Tanis, M.1    Postmes, T.2
  • 84
    • 84879981133 scopus 로고    scopus 로고
    • Social Steganography: Learning to Hide in Plain Sight
    • see also, Aug. 23
    • see also Danah Boyd, Social Steganography: Learning to Hide in Plain Sight, ZEPHORIA (Aug. 23, 2010), http://www.zephoria.org/thoughts/archives/2010/08/23/social-steganography-learning-to-hide-in-plain-sight.html.
    • (2010) Zephoria
    • Boyd, D.1
  • 92
    • 33745184635 scopus 로고    scopus 로고
    • Exploratory Search: From Finding to Understanding
    • Gary Marchionini, Exploratory Search: From Finding to Understanding, 49 COMM. ACM 41 (2006);
    • (2006) Comm. ACM , vol.49 , pp. 41
    • Marchionini, G.1
  • 94
    • 0003945547 scopus 로고    scopus 로고
    • This information, collectively known as "the dark Web," "the deep Web" or "the invisible Web," accounts for 80-99% of the World Wide Web. See, e.g., available at, ("Since they are missing the deep Web when they use such search engines, Internet searchers are therefore searching only 0.03%-or one in 3,000-of the pages available to them today.")
    • This information, collectively known as "the dark Web," "the deep Web" or "the invisible Web," accounts for 80-99% of the World Wide Web. See, e.g., Michael K. Bergman, THE DEEP WEB: SURFACING HIDDEN VALUE (2001), available at http://quod.lib.umich.edu/cgi/t/text/text-idx?c=jep;view=text;rgn=main;idno=3336451.0007.104 ("Since they are missing the deep Web when they use such search engines, Internet searchers are therefore searching only 0.03%-or one in 3,000-of the pages available to them today.");
    • (2001) The Deep Web: Surfacing Hidden Value
    • Bergman, M.K.1
  • 95
    • 0012036450 scopus 로고    scopus 로고
    • Reap What You Sow: Harvesting the Deep Web
    • Norm Medeiros, Reap What You Sow: Harvesting the Deep Web, 18 OCLC SYS. & SERV. 18 (2002);
    • (2002) Oclc Sys. & Serv , vol.18 , pp. 18
    • Medeiros, N.1
  • 96
    • 21344453736 scopus 로고    scopus 로고
    • Indexing the Invisible Web: A Survey
    • Yanbo Ru & Ellis Horowitz, Indexing the Invisible Web: A Survey, 29 ONLINE INFO. REV. 249 (2005);
    • (2005) Online Info. Rev , vol.29 , pp. 249
    • Yanbo, R.1    Horowitz, E.2
  • 97
    • 84868559786 scopus 로고    scopus 로고
    • The Dark Side of the Internet
    • Nov. 25
    • Andy Beckett, The Dark Side of the Internet, GUARDIAN (Nov. 25, 2009), http://www.guardian.co.uk/technology/2009/nov/26/dark-side-internet-freenet;
    • (2009) Guardian
    • Beckett, A.1
  • 98
    • 84874830943 scopus 로고    scopus 로고
    • Data is Gold - 91,000 Terabytes of Uncharted Web: Welcome to the Dark Side
    • Apr. 11, ("The dark Web, or hidden Web is approximately 550 times bigger than the Web you experience daily.")
    • Danny Devriendt, Data is Gold - 91,000 Terabytes of Uncharted Web: Welcome to the Dark Side, PORTER NOVELLI BLOG (Apr. 11, 2011), http://blog.porternovelli.com/2011/04/11/data-is-gold-%E2%80%93-91000-terabytes-of-uncharted-web-welcome-to-the-dark-side/("The dark Web, or hidden Web is approximately 550 times bigger than the Web you experience daily.");
    • (2011) Porter Novelli Blog
    • Devriendt, D.1
  • 99
    • 84874827091 scopus 로고    scopus 로고
    • Quickstudy: Deep Web
    • Dec. 15, 12:00 PM, ("[M]ore than 500 times as much information as traditional search engines 'know about' is available in the deep Web.")
    • Russell Kay, Quickstudy: Deep Web, COMPUTERWORLD (Dec. 15, 2005, 12:00 PM), http://www.computerworld.com/s/article/107097/Deep_Web ("[M]ore than 500 times as much information as traditional search engines 'know about' is available in the deep Web.");
    • (2005) Computerworld
    • Kay, R.1
  • 102
    • 84879952901 scopus 로고    scopus 로고
    • "Listing" and "Let Search Engines find your Blog" Settings
    • For example, the popular blogging service Blogger allows users to make their blog invisible to Google, last visited Apr. 27
    • For example, the popular blogging service Blogger allows users to make their blog invisible to Google. See "Listing" and "Let Search Engines find your Blog" Settings, GOOGLE.COM, http://www.google.com/support/blogger/bin/answer.py?hl=en&answer=41373 (last visited Apr. 27, 2011).
    • (2011) Google.Com
  • 103
    • 84879988049 scopus 로고    scopus 로고
    • How Can I Control if Other Search Engines can Link to My Timeline?
    • Facebook profiles that utilize privacy settings are also not found by search engines. See, last visited May 6
    • Facebook profiles that utilize privacy settings are also not found by search engines. See How Can I Control if Other Search Engines can Link to My Timeline?, FACEBOOK, http://www.facebook.com/help/392235220834308/(last visited May 6, 2011);
    • (2011) Facebook
  • 104
    • 84856455243 scopus 로고    scopus 로고
    • Privacy 2.0
    • see also, ("Today, nearly all Web programmers know robots.txt is the way in which sites can signal their intentions to robots, and these intentions are voluntarily respected by every major search engine across differing cultures and legal jurisdictions.")
    • see also Jonathan Zittrain, Privacy 2.0, 2008 U. CHI. LEGAL F. 65, 102 (2008) ("Today, nearly all Web programmers know robots.txt is the way in which sites can signal their intentions to robots, and these intentions are voluntarily respected by every major search engine across differing cultures and legal jurisdictions.").
    • (2008) U. Chi. Legal F , vol.2008
    • Zittrain, J.1
  • 107
    • 84879897302 scopus 로고    scopus 로고
    • Maomao Wu, Adaptive Privacy Management for Distributed Applications (June 2007) (unpublished Ph.D. dissertation, Lancaster University), available at
    • Maomao Wu, Adaptive Privacy Management for Distributed Applications (June 2007) (unpublished Ph.D. dissertation, Lancaster University), available at http://eprints.lancs.ac.uk/12984/1/PhdThesis-MaomaoWu.pdf.
  • 110
    • 8644231057 scopus 로고    scopus 로고
    • Public Displays of Connection
    • See
    • See J. Donath & D. Boyd, Public Displays of Connection, 22 BT TECH. J. 71 (2004).
    • (2004) BT Tech. J , vol.22 , pp. 71
    • Donath, J.1    Boyd, D.2
  • 111
    • 70449632682 scopus 로고    scopus 로고
    • Remarks at the 30th IEEE Symposium on Security and Privacy: De-anonymizing Social Networks (May 17-20 2009)
    • See, e.g., abstract available at
    • See, e.g., Arvind Narayanan & Vitaly Shmatikov, Remarks at the 30th IEEE Symposium on Security and Privacy: De-anonymizing Social Networks (May 17-20 2009), in 2009 IEEE SYMPOSIUM ON SEC. & PRIVACY, 2009, at 173-87 (abstract available at http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5207644&isnumber=5207632).
    • (2009) 2009 Ieee Symposium On Sec. & Privacy , pp. 173-187
    • Narayanan, A.1    Shmatikov, V.2
  • 114
    • 84879928959 scopus 로고    scopus 로고
    • Clarity Definition
    • last visited May 30
    • Clarity Definition, MACMILLAN DICTIONARY, http://www.macmillandictionary.com/dictionary/american/clarity#clarity_3 (last visited May 30, 2013).
    • (2013) Macmillan Dictionary
  • 122
    • 84879903736 scopus 로고    scopus 로고
    • For those seeking to make a living by writing and publishing information, obscurity is actually an obstacle to overcome. See, e.g., Children's Book Insider ed, available at
    • For those seeking to make a living by writing and publishing information, obscurity is actually an obstacle to overcome. See, e.g., Cory Doctorow, THE PROBLEM ISN'T PIRACY, THE PROBLEM IS OBSCURITY (Children's Book Insider ed., 2011), available at http://www.write4kids.com/blog/wp-content/uploads/2011/05/doctorow.pdf.
    • (2011) The Problem Isn't Piracy, the Problem is Obscurity
    • Doctorow, C.1
  • 123
    • 71649106741 scopus 로고    scopus 로고
    • The Privacy Box: A Software Proposal
    • See, e.g., Nov. 2
    • See, e.g., Woodrow Hartzog, The Privacy Box: A Software Proposal, FIRST MONDAY (Nov. 2, 2009), http://firstmonday.org/ojs/index.php/fm/rt/printerFriendly/2682/2361.
    • (2009) First Monday
    • Hartzog, W.1
  • 125
    • 84879942192 scopus 로고    scopus 로고
    • 5 Ways to Get Around the New York Times Paywall
    • Of course, paywall technologies are both controversial and subject to circumvention. But increasing the labor required to access information is another way to lower the probability of discovery. See, e.g., Mar. 30
    • Of course, paywall technologies are both controversial and subject to circumvention. But increasing the labor required to access information is another way to lower the probability of discovery. See, e.g., Tim Brookes, 5 Ways to Get Around the New York Times Paywall, MAKEUSEOF (Mar. 30, 2011), http://www.makeuseof.com/tag/5-ways-york-times-paywall/.
    • (2011) Makeuseof
    • Brookes, T.1
  • 126
    • 77953112077 scopus 로고    scopus 로고
    • It should be noted that there are privacy implications regarding the use of cookies, but these threats are better addressed by other strategies within privacy by design and are beyond the scope of this Article. See, e.g., University of California, Berkley, Working Paper, Aug. 10, available at
    • It should be noted that there are privacy implications regarding the use of cookies, but these threats are better addressed by other strategies within privacy by design and are beyond the scope of this Article. See, e.g., Ashkan Soltani et al., Flash Cookies and Privacy (University of California, Berkley, Working Paper, Aug. 10, 2009), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1446862;
    • (2009) Flash Cookies and Privacy
    • Soltani, A.1
  • 130
    • 78049430766 scopus 로고    scopus 로고
    • available at, (finding that "[n]early three quarters (71%) of social networking users ages 18-29 have changed the privacy settings on their profile to limit what they share with others online")
    • Mary Madden & Aaron Smith, PEW INTERNET & AM. LIFE PROJECT, REPUTATION MANAGEMENT AND SOCIAL MEDIA 29 (2010), available at http://www.pewinternet.org/Reports/2010/Reputation-Management.aspx (finding that "[n]early three quarters (71%) of social networking users ages 18-29 have changed the privacy settings on their profile to limit what they share with others online").
    • (2010) Pew Internet & Am. Life Project, Reputation Management And Social Media , pp. 29
    • Madden, M.1    Smith, A.2
  • 131
    • 84879953216 scopus 로고    scopus 로고
    • See, e.g., Loporcaro v. City of New York, No. 100406/10, 2012 WL 1231021, at *7 (N.Y. Sup. Ct. Apr. 9, 2012) ("When a person creates a Facebook account, he or she may be found to have consented to the possibility that personal information might be shared with others, notwithstanding his or her privacy settings, as there is no guarantee that the pictures and information posted thereon, whether personal or not, will not be further broadcast and made available to other members of the public.")
    • See, e.g., Loporcaro v. City of New York, No. 100406/10, 2012 WL 1231021, at *7 (N.Y. Sup. Ct. Apr. 9, 2012) ("When a person creates a Facebook account, he or she may be found to have consented to the possibility that personal information might be shared with others, notwithstanding his or her privacy settings, as there is no guarantee that the pictures and information posted thereon, whether personal or not, will not be further broadcast and made available to other members of the public.").
  • 134
    • 84879993312 scopus 로고    scopus 로고
    • Block or Remove Pages Using a Robot.txt File
    • According to Google, "A robots.txt file restricts access to your site by search engine robots that crawl the web. These bots are automated, and before they access pages of a site, they check to see if a robots.txt file exists that prevents them from accessing certain pages.", last visited Apr. 25
    • According to Google, "A robots.txt file restricts access to your site by search engine robots that crawl the web. These bots are automated, and before they access pages of a site, they check to see if a robots.txt file exists that prevents them from accessing certain pages." Block or Remove Pages Using a Robot.txt File, GOOGLE.COM, http://support.google.com/webmasters/bin/answer.py?hl=en&answer=156449 (last visited Apr. 25, 2013).
    • (2013) Google.Com
  • 135
    • 81255199105 scopus 로고    scopus 로고
    • See, e.g., ("Today, nearly all Web programmers know robots.txt is the way in which sites can signal their intentions to robots, and these intentions are voluntarily respected by every major search engine across differing cultures and legal jurisdictions.")
    • See, e.g., Zittrain J, supra note 57, at 102 ("Today, nearly all Web programmers know robots.txt is the way in which sites can signal their intentions to robots, and these intentions are voluntarily respected by every major search engine across differing cultures and legal jurisdictions.").
    • Supra Note 57 , pp. 102
    • Zittrain, J.1
  • 136
    • 84879995033 scopus 로고    scopus 로고
    • Can You Restrict Ages on Tumblr?
    • See, e.g, June 29
    • See, e.g., Ashley Poland, Can You Restrict Ages on Tumblr?, EHOW (June 29, 2011), http://www.ehow.com/info_8665566_can-restrict-ages-tumblr.html.
    • (2011) Ehow
    • Poland, A.1
  • 137
    • 84907461137 scopus 로고    scopus 로고
    • Facebook Facial Recognition: Its Quiet Rise and Dangerous Future
    • See, e.g., Apr. 26
    • See, e.g., Megan Geuss, Facebook Facial Recognition: Its Quiet Rise and Dangerous Future, PCWORLD (Apr. 26, 2011), http://www.pcworld.com/article/226228/Facerec.html.
    • (2011) Pcworld
    • Geuss, M.1
  • 139
    • 84883521324 scopus 로고    scopus 로고
    • Why Facebook's Facial Recognition is Creepy
    • June 8
    • Sarah Jacobsson Purewal, Why Facebook's Facial Recognition is Creepy, PCWORLD (June 8, 2011), http://www.pcworld.com/article/229742/why_facebooks_facial_recognition_is_creepy.html.
    • (2011) Pcworld
    • Purewal, S.J.1
  • 140
    • 84879942810 scopus 로고    scopus 로고
    • Augmented Reality
    • last visited May 1
    • Augmented Reality, MASHABLE, http://mashable.com/follow/topics/augmented-reality/(last visited May 1, 2012);
    • (2012) Mashable
  • 141
    • 84859353719 scopus 로고    scopus 로고
    • Freedom of Contract in an Augmented Reality: The Case of Consumer Contracts
    • see also
    • see also Scott R. Peppet, Freedom of Contract in an Augmented Reality: The Case of Consumer Contracts, 59 UCLA L. REV. 676 (2012).
    • (2012) Ucla L. Rev , vol.59 , pp. 676
    • Peppet, S.R.1
  • 142
    • 84879975337 scopus 로고    scopus 로고
    • YouTube Tool Blurs Faces to Protect Privacy
    • Mar. 29
    • See Thomas Claburn, YouTube Tool Blurs Faces to Protect Privacy, INFO. WEEK (Mar. 29, 2012), http://www.informationweek.com/news/security/privacy/232700524.
    • (2012) Info. Week
    • Claburn, T.1
  • 143
    • 84879945246 scopus 로고    scopus 로고
    • A Privacy Manifesto in Code: What if Your Emails Never Went to Gmail and Twitter Couldn't See Your Tweets?
    • See, e.g., Apr. 4
    • See, e.g., Alexis C. Madrigal, A Privacy Manifesto in Code: What if Your Emails Never Went to Gmail and Twitter Couldn't See Your Tweets?, ATLANTIC (Apr. 4, 2012), http://www.theatlantic.com/technology/archive/12/04/a-privacy-manifesto-in-code-what-if-your-emails-never-went-to-gmail-and-twitter-couldnt-see-your-tweets/255414/.
    • (2012) Atlantic
    • Madrigal, A.C.1
  • 144
    • 84879973700 scopus 로고    scopus 로고
    • Google+ and Pseudonyms: A Step in the Right Direction, Not the End of the Road
    • See, Jan. 24
    • See Eva Galperin, Google+ and Pseudonyms: A Step in the Right Direction, Not the End of the Road, ELECTRONIC FRONTIER FOUND. (Jan. 24, 2011), https://www.eff.org/deeplinks/2012/01/google-pseudonyms-step-right-direction-not-end-road.
    • (2011) Electronic Frontier Found
    • Galperin, E.1
  • 145
    • 84879922855 scopus 로고    scopus 로고
    • 2011 in Review: Nymwars
    • See, Dec. 26
    • See Eva Galperin, 2011 in Review: Nymwars, ELECTRONIC FRONTIER FOUND. (Dec. 26, 2011), https://www.eff.org/deeplinks/2011/12/2011-review-nymwars.
    • (2011) Electronic Frontier Found
    • Galperin, E.1
  • 146
    • 84900129147 scopus 로고    scopus 로고
    • Statement of Rights and Responsibilities
    • last visited Apr. 26, [hereinafter Statement of Rights] ("Facebook users provide their real names and information, and we need your help to keep it that way. Here are some commitments you make to us relating to registering and maintaining the security of your account:... You will not provide any false personal information on Facebook")
    • Statement of Rights and Responsibilities, FACEBOOK, http://www.facebook.com/terms.php?ref=pf (last visited Apr. 26, 2011) [hereinafter Statement of Rights] ("Facebook users provide their real names and information, and we need your help to keep it that way. Here are some commitments you make to us relating to registering and maintaining the security of your account:... You will not provide any false personal information on Facebook").
    • (2011) Facebook
  • 147
    • 85049612655 scopus 로고    scopus 로고
    • A Case for Pseudonyms
    • See, July 29
    • See Jillian C. York, A Case for Pseudonyms, ELECTRONIC FRONTIER FOUND. (July 29, 2011), https://www.eff.org/deeplinks/2011/07/case-pseudonyms.
    • (2011) Electronic Frontier Found
    • York, J.C.1
  • 148
    • 84879980757 scopus 로고    scopus 로고
    • Boundary Regulation
    • See, e.g, finding that users often use multiple profiles for "personal" and "professional" separation
    • See, e.g., Stutzman F and Hartzog W, Boundary Regulation, supra note 9 (finding that users often use multiple profiles for "personal" and "professional" separation).
    • Supra Note 9
    • Stutzman, F.1    Hartzog, W.2
  • 149
    • 84879959727 scopus 로고    scopus 로고
    • Statement of Rights
    • ("Here are some commitments you make to us relating to registering and maintaining the security of your account:... You will not create more than one personal account.")
    • Statement of Rights, supra note 97 ("Here are some commitments you make to us relating to registering and maintaining the security of your account:... You will not create more than one personal account.").
    • Supra Note 97
  • 150
    • 84879892083 scopus 로고    scopus 로고
    • Student Files Lawsuit After Coach Distributed Private Facebook Content
    • For example, in September 2007, a cheerleading coach at Pearl High School in Mississippi allegedly required the members of her cheerleading squad to reveal the usernames and passwords of their Facebook accounts, July 22
    • For example, in September 2007, a cheerleading coach at Pearl High School in Mississippi allegedly required the members of her cheerleading squad to reveal the usernames and passwords of their Facebook accounts. Brian Stewart, Student Files Lawsuit After Coach Distributed Private Facebook Content, STUDENT PRESS L. CENTER (July 22, 2009), http://www.splc.org/newsflash.asp?id=1938;
    • (2009) Student Press L. Center
    • Stewart, B.1
  • 151
    • 84879972012 scopus 로고    scopus 로고
    • Site Unseen: Schools, Bosses Barred from Eyeing Students', Workers' Social Media
    • Nov. 1, 3:10 AM
    • David L. Hudson Jr Site Unseen: Schools, Bosses Barred from Eyeing Students', Workers' Social Media, A.B.A. J. (Nov. 1, 2012, 3:10 AM), http://www.abajournal.com/magazine/article/site_unseen_schools_bosses_barred_from_eyeing_students_workers_social_media.
    • (2012) A.B.A. J
    • Hudson Jr., D.L.1
  • 152
    • 84879959727 scopus 로고    scopus 로고
    • Statement of Rights
    • Statement of Rights, supra note 97.
    • Supra Note 97
  • 153
    • 84879975546 scopus 로고    scopus 로고
    • You will not collect users' content or information, or otherwise access Facebook, using automated means (such as harvesting bots, robots, spiders, or scrapers) without our prior permission
    • You will not collect users' content or information, or otherwise access Facebook, using automated means (such as harvesting bots, robots, spiders, or scrapers) without our prior permission.
  • 154
    • 84879980042 scopus 로고    scopus 로고
    • Web Scraping Definition
    • Automated information harvesting by third parties also threatens individuals' obscurity and is typically governed via terms of use. See EF Cultural Travel BV v. Zefer Corp., 318 F.3d 58, 62 (1st Cir. 2003) ("Many webpages contain lengthy limiting conditions, including limitations on the use of scrapers."). "Web Scraping is the process of taking html or data from the web and organizing that data into an organized format Common uses for web scraping is the gathering and retrieval of large amounts of information that would be to unwieldy to gather by hand.", last visited Aug. 10
    • Automated information harvesting by third parties also threatens individuals' obscurity and is typically governed via terms of use. See EF Cultural Travel BV v. Zefer Corp., 318 F.3d 58, 62 (1st Cir. 2003) ("Many webpages contain lengthy limiting conditions, including limitations on the use of scrapers."). "Web Scraping is the process of taking html or data from the web and organizing that data into an organized format Common uses for web scraping is the gathering and retrieval of large amounts of information that would be to unwieldy to gather by hand." Web Scraping Definition, EXTRACTINGDATA.COM, http://www.extractingdata.com/web%20scraping.htm (last visited Aug. 10, 2010).
    • (2010) Extractingdata.Com
  • 156
    • 84879959727 scopus 로고    scopus 로고
    • Statement of Rights
    • Statement of Rights, supra note 97.
    • Supra Note 97
  • 157
    • 84879987587 scopus 로고    scopus 로고
    • Flickr Community Guidelines
    • See, e.g., last visited May 1
    • See, e.g., Flickr Community Guidelines, FLICKR, http://www.flickr.com/help/guidelines/(last visited May 1, 2012);
    • (2012) Flickr
  • 158
    • 84879935110 scopus 로고    scopus 로고
    • MySpace.com Terms of Use Agreement
    • last visited June 25
    • MySpace.com Terms of Use Agreement, MYSPACE, http://www.myspace.com/Help/Terms?pm_cmp=ed_footer (last visited June 25, 2009);
    • (2009) Myspace
  • 159
    • 84879922441 scopus 로고    scopus 로고
    • The Twitter Rules
    • last visited May 1
    • The Twitter Rules, TWITTER, https://support.twitter.com/articles/18311-the-twitter-rules (last visited May 1, 2012);
    • (2012) Twitter
  • 160
    • 84879910007 scopus 로고    scopus 로고
    • YouTube Community Guidelines
    • last visited May 1, ("We're not asking for the kind of respect reserved for nuns, the elderly, and brain surgeons. We mean don't abuse the site. Every cool new community feature on YouTube involves a certain level of trust. We trust you to be responsible, and millions of users respect that trust. Please be one of them.")
    • YouTube Community Guidelines, YOUTUBE, http://www.youtube.com/t/community_guidelines (last visited May 1, 2012) ("We're not asking for the kind of respect reserved for nuns, the elderly, and brain surgeons. We mean don't abuse the site. Every cool new community feature on YouTube involves a certain level of trust. We trust you to be responsible, and millions of users respect that trust. Please be one of them.").
    • (2012) Youtube
  • 161
    • 84861977388 scopus 로고    scopus 로고
    • Website Design as Contract
    • See, e.g
    • See, e.g., Woodrow Hartzog, Website Design as Contract, 60 AM. U. L. REV. 1635 (2011).
    • (2011) Am. U. L. Rev , vol.60 , pp. 1635
    • Hartzog, W.1
  • 163
    • 84879926087 scopus 로고    scopus 로고
    • Flickr Community Guidelines
    • Flickr Community Guidelines, supra note 108.
    • Supra Note 108
  • 166
    • 84879915577 scopus 로고    scopus 로고
    • see also, Feb. 7, (unpublished manuscript), available at
    • see also Ryan Calo, Code, Nudge, or Notice? (Feb. 7, 2013) (unpublished manuscript), available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2217013.
    • (2013) Code, Nudge, Or Notice?
    • Calo, R.1
  • 167
    • 84903035283 scopus 로고    scopus 로고
    • Thaler and Sunstein conceptualize a "nudge" as "any aspect of the choice architecture that alters people's behavior in a predictable way without forbidding any options or significantly changing their economic incentives. To count as a nudge, the intervention must be easy and cheap to avoid. Nudges are not mandates."
    • Richard H. Thaler & Cass R. Sunstein, NUDGE: IMPROVING DECISIONS ABOUT HEALTH, WEALTH, AND HAPPINESS 6 (2008). Thaler and Sunstein conceptualize a "nudge" as "any aspect of the choice architecture that alters people's behavior in a predictable way without forbidding any options or significantly changing their economic incentives. To count as a nudge, the intervention must be easy and cheap to avoid. Nudges are not mandates."
    • (2008) Nudge: Improving Decisions About Health, Wealth, And Happiness , pp. 6
    • Thaler, R.H.1    Sunstein, C.R.2
  • 170
    • 84879990174 scopus 로고    scopus 로고
    • Protecting Consumer Privacy
    • See FTC
    • See FTC, PROTECTING CONSUMER PRIVACY, supra note 2.
    • Supra Note 2
  • 171
    • 0347989497 scopus 로고    scopus 로고
    • Information Privacy in Cyberspace Transactions
    • See, e.g
    • See, e.g., Jerry Kang, Information Privacy in Cyberspace Transactions, 50 STAN. L. REV. 1193 (1998);
    • (1998) Stan. L. Rev , vol.50 , pp. 1193
    • Kang, J.1
  • 172
    • 0347358110 scopus 로고    scopus 로고
    • Opting In, Opting Out, or No Options at All: The Fight for Control of Personal Information
    • Jeff Sovern, Opting In, Opting Out, or No Options at All: The Fight for Control of Personal Information, 74 WASH. L. REV. 1033 (1999).
    • (1999) Wash. L. Rev , vol.74 , pp. 1033
    • Sovern, J.1
  • 175
    • 33847045636 scopus 로고    scopus 로고
    • Setting Software Defaults: Perspectives from Law, Computer Science and Behavioral Economics
    • ("[P]eople believe defaults convey information on how people should act.")
    • Jay P. Kesan & Rajiv C. Shah, Setting Software Defaults: Perspectives from Law, Computer Science and Behavioral Economics, 82 NOTRE DAME L. REV. 583, 603 (2006) ("[P]eople believe defaults convey information on how people should act.").
    • (2006) Notre Dame L. Rev , vol.82
    • Kesan, J.P.1    Shah, R.C.2
  • 176
    • 0346423429 scopus 로고    scopus 로고
    • Gentle Nudges vs. Hard Shoves: Solving the Sticky Norms Problem
    • See, e.g., ("The tendency of individuals to conform-a phenomenon psychologists call 'social influence'-is pervasive: diners prefer to patronize the restaurants that they think other diners will patronize, and citizens to vote for the candidates for whom they think others will vote; teenage girls are more likely to become pregnant when they see that others are having babies, and adults more likely to go on welfare when they become acquainted with others who are on the dole.")
    • See, e.g., Dan M. Kahan, Gentle Nudges vs. Hard Shoves: Solving the Sticky Norms Problem, 67 U. CHI. L. REV. 607, 613 (2000) ("The tendency of individuals to conform-a phenomenon psychologists call 'social influence'-is pervasive: diners prefer to patronize the restaurants that they think other diners will patronize, and citizens to vote for the candidates for whom they think others will vote; teenage girls are more likely to become pregnant when they see that others are having babies, and adults more likely to go on welfare when they become acquainted with others who are on the dole.");
    • (2000) U. Chi. L. Rev , vol.67
    • Kahan, D.M.1
  • 177
    • 33745949507 scopus 로고    scopus 로고
    • Government Regulation of Irrationality: Moral and Cognitive Hazards
    • ("The main vehicle to greater decision-making competence is alteration in existing psychological states such that later psychological states possess more reliable knowledge about what ends are most valued and how best to achieve those ends. Outcome feedback and verbal feedback serve as the main mechanisms for change between earlier and later psychological states.")
    • Jonathan Klick and Gregory Mitchell, Government Regulation of Irrationality: Moral and Cognitive Hazards, 90 MINN. L. REV. 1620, 1629 (2006) ("The main vehicle to greater decision-making competence is alteration in existing psychological states such that later psychological states possess more reliable knowledge about what ends are most valued and how best to achieve those ends. Outcome feedback and verbal feedback serve as the main mechanisms for change between earlier and later psychological states.").
    • (2006) Minn. L. Rev , vol.90
    • Klick, J.1    Mitchell, G.2
  • 178
    • 84859015072 scopus 로고    scopus 로고
    • Against Notice Skepticism in Privacy (and Elsewhere)
    • M. Ryan Calo, Against Notice Skepticism in Privacy (and Elsewhere), 87 NOTRE DAME L. REV. 1027, 1033 (2012).
    • (2012) Notre Dame L. Rev , vol.87
    • Ryan, C.M.1
  • 179
    • 84859015072 scopus 로고    scopus 로고
    • Against Notice Skepticism in Privacy (and Elsewhere)
    • For preliminary results regarding an experiment that measures, among other things, "showing" as a notice technique, see
    • Id. at 1042. For preliminary results regarding an experiment that measures, among other things, "showing" as a notice technique, see
    • (2012) Notre Dame L. Rev , vol.87 , pp. 1042
    • Ryan, C.M.1
  • 183
    • 84879955121 scopus 로고    scopus 로고
    • Who's Viewed Your Profile?
    • last visited Apr. 27
    • Who's Viewed Your Profile?, LINKEDIN, http://www.linkedin.com/static?key=pop/pop_more_wvmp (last visited Apr. 27, 2012).
    • (2012) Linkedin
  • 185
    • 0039648479 scopus 로고    scopus 로고
    • An Analysis of Out-of-Wedlock Childbearing in the United States
    • See, e.g
    • See, e.g., George A. Akerlof et al., An Analysis of Out-of-Wedlock Childbearing in the United States, 111 Q. J. ECON. 277 (1996);
    • (1996) Q. J. Econ , vol.111 , pp. 277
    • Akerlof, G.A.1
  • 186
    • 0005508977 scopus 로고    scopus 로고
    • Peer Effects with Random Assignment: Results for Dartmouth Roommates
    • Bruce Sacerdote, Peer Effects with Random Assignment: Results for Dartmouth Roommates, 116 Q. J. ECON. 681 (2001).
    • (2001) Q. J. Econ , vol.116 , pp. 681
    • Sacerdote, B.1
  • 188
    • 84879943349 scopus 로고    scopus 로고
    • What Are Friendship Pages?
    • last visited Apr. 19
    • What Are Friendship Pages?, FACEBOOK, https://www.facebook.com/help/220629401299124/(last visited Apr. 19, 2013).
    • (2013) Facebook
  • 189
    • 0016264378 scopus 로고
    • Judgment Under Uncertainty: Heuristics and Biases
    • See, e.g
    • See, e.g., Amos Tversky & Daniel Kahneman, Judgment Under Uncertainty: Heuristics and Biases, 185 SCIENCE 1124 (1974);
    • (1974) Science , vol.185 , pp. 1124
    • Tversky, A.1    Kahneman, D.2
  • 192
    • 84879907465 scopus 로고    scopus 로고
    • Mobile privacy disclosures
    • FTC
    • FTC, MOBILE PRIVACY DISCLOSURES, supra note 11, at 15-16;
    • Supra Note 11 , pp. 15-16
  • 193
    • 84879986874 scopus 로고    scopus 로고
    • FTC Recommends Best Practices for Mobile Privacy
    • see also, Feb. 11
    • see also Lauren Gelman, FTC Recommends Best Practices for Mobile Privacy, BLURRYEDGE STRATEGIES (Feb. 11, 2013), http://blurryedge.com/blurryedge-strategies/2013/02/ftc-recommends-best-practices-for-mobile-privacy.html.
    • (2013) Blurryedge strategies
    • Gelman, L.1
  • 194
    • 84879907465 scopus 로고    scopus 로고
    • Mobile privacy disclosures
    • FTC
    • FTC, MOBILE PRIVACY DISCLOSURES, supra note 11, at 15. 136.
    • Supra Note 11
  • 195
    • 84879976044 scopus 로고    scopus 로고
    • Mobile privacy disclosures
    • FTC
    • See id. at 16.
    • Supra Note 11 , pp. 16
  • 196
    • 84861902919 scopus 로고    scopus 로고
    • ("There are situations in which people assess the frequency of a class or the probability of an event by the ease with which instances or occurrences can be brought to mind.")
    • Tversky A & Daniel K, supra note 132, at 1127 ("There are situations in which people assess the frequency of a class or the probability of an event by the ease with which instances or occurrences can be brought to mind.").
    • Supra Note 132 , pp. 1127
    • Tversky, A.1    Daniel, K.2
  • 197
    • 84879945085 scopus 로고    scopus 로고
    • Longtime users of word-processing software Microsoft Word might analogize such a guidance tool to "Clippy," the anthropomorphized paper-clip who asked if the Word users would like help when recognized user behavior associated with specific tasks. Of course, like Clippy, obscurity-reminders should also be easily disabled by the user
    • Longtime users of word-processing software Microsoft Word might analogize such a guidance tool to "Clippy," the anthropomorphized paper-clip who asked if the Word users would like help when recognized user behavior associated with specific tasks. Of course, like Clippy, obscurity-reminders should also be easily disabled by the user.
  • 198
    • 84985070018 scopus 로고
    • Framing: Toward Clarification of a Fractured Paradigm
    • (emphasis omitted)
    • Robert M. Entman, Framing: Toward Clarification of a Fractured Paradigm, 43 J. COMM. 51, 52 (1993) (emphasis omitted).
    • (1993) J. Comm , vol.43
    • Entman, R.M.1
  • 199
    • 84985070018 scopus 로고
    • Framing: Toward Clarification of a Fractured Paradigm
    • (emphasis omitted)
    • Id. at 53.
    • (1993) J. Comm , vol.43 , pp. 53
    • Entman, R.M.1
  • 200
  • 201
    • 0001331917 scopus 로고
    • Anomalies: The Endowment Effect, Loss Aversion, and Status Quo Bias
    • See, e.g
    • See, e.g., Daniel Kahneman, Jack Knetsh & Richard Thaler, Anomalies: The Endowment Effect, Loss Aversion, and Status Quo Bias, 5 J. ECON. PERSP. 193 (1991).
    • (1991) J. Econ. Persp , vol.5 , pp. 193
    • Kahneman, D.1    Knetsh, J.2    Thaler, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.