-
2
-
-
0004069172
-
-
May (July 19, 1997)
-
Szlovits, P., Doyle, J., Long, W. J., Kohane, I. and Pauker, S.G. (1994) May ‘Guardian angel: Patient-centred health information systems’. (http://medg.lcs.mit.edu/project/ga/publications.html) (July 19, 1997).
-
(1994)
Guardian angel: Patient-centred health information systems
-
-
Szlovits, P.1
Doyle, J.2
Long, W.J.3
Kohane, I.4
Pauker, S.G.5
-
3
-
-
84951722978
-
-
October (August 31, 1997)
-
Walsh, G. (1996) The Walsh Report, October, (http://www.efa.org.au/Issues/Crypto/Walsh/Walsh.htm) (August 31, 1997).
-
(1996)
The Walsh Report
-
-
Walsh, G.1
-
5
-
-
84901557851
-
Ethics and the privacy of electronic mail
-
Doss, E. and Loui, M.C. (1995) ‘Ethics and the privacy of electronic mail’, The Information Society, Vol. 11, pp.223–235.
-
(1995)
The Information Society
, vol.11
, pp. 223-235
-
-
Doss, E.1
Loui, M.C.2
-
7
-
-
84951722979
-
-
Paper delivered to 18th Regional Conference the History and Philosophy of Science, University of Colorado, Boulder, Co.
-
Katsh, E. (1994) ‘Privacy and new information technologies’, Paper delivered to 18th Regional Conference the History and Philosophy of Science, University of Colorado, Boulder, Co.
-
(1994)
Privacy and new information technologies
-
-
Katsh, E.1
-
8
-
-
0001501223
-
How did they get my name?: an exploratory investigation of consumer attitudes toward secondary information use
-
Culnan, M.J. (1993) ‘How did they get my name?: an exploratory investigation of consumer attitudes toward secondary information use’. MIS Quarterly, Vol. 17, pp.341–363.
-
(1993)
MIS Quarterly
, vol.17
, pp. 341-363
-
-
Culnan, M.J.1
-
10
-
-
84951722980
-
-
Swiss police have secretly tracked the whereabouts of mobile phone users via a telephone company computer that records billions of movements going back more than half a year (as reported in a Swiss Sunday newspaper), (Dec 28, 1997). Reuters
-
Swiss police have secretly tracked the whereabouts of mobile phone users via a telephone company computer that records billions of movements going back more than half a year (as reported in a Swiss Sunday newspaper), (Dec 28, 1997). Reuters.
-
-
-
-
11
-
-
3543055534
-
Victims tired of researchers getting away with murder
-
August 16
-
Schlossberg (1993) Victims tired of researchers getting away with murder’, Marketing News, August 16, A16, p.1.
-
(1993)
Marketing News
, vol.A16
, pp. 1
-
-
Schlossberg1
-
13
-
-
3543100079
-
The value and protection of privacy
-
van Swaay, M. (1995) ‘The value and protection of privacy’, Computer Networks and ISDN Systems, Vol. 26 (Suppl. 4), pp.149–155.
-
(1995)
Computer Networks and ISDN Systems
, vol.26
, pp. 149-155
-
-
van Swaay, M.1
-
14
-
-
21344496974
-
Avoiding misuse of new information technologies: legal and societal considerations
-
Bloom, P.N., Milne, G.R. and Adler, R. (1994) ‘Avoiding misuse of new information technologies: legal and societal considerations’, Journal of Marketing, Vol. 58, pp.98–110.
-
(1994)
Journal of Marketing
, vol.58
, pp. 98-110
-
-
Bloom, P.N.1
Milne, G.R.2
Adler, R.3
-
15
-
-
0346251466
-
List sale case to the VA Supreme Court
-
October 6
-
Avrahami, R. (1996) ‘List sale case to the VA Supreme Court’. Computer Privacy Digest, Vol. 9, No. 23, pp.3–4, October 6, ()
-
(1996)
Computer Privacy Digest
, vol.9
, Issue.23
, pp. 3-4
-
-
Avrahami, R.1
-
16
-
-
0030494587
-
Negative option selling plans: current forms versus existing regulation
-
Spriggs, M.T. and Nevin, J.R. (1996) ‘Negative option selling plans: current forms versus existing regulation’, Journal of Public Policy & Marketing, Vol. 15, pp.227–237.
-
(1996)
Journal of Public Policy & Marketing
, vol.15
, pp. 227-237
-
-
Spriggs, M.T.1
Nevin, J.R.2
-
18
-
-
84951722982
-
Direct marketing and privacy for telephone and Internet users: a South African field study
-
Bled, Slovenia
-
Gattiker, U.E., Kelb, J., Janz, L., Holsten, H., Greshake, J., Schwenteck, O. and Miller, J. (1997) ‘Direct marketing and privacy for telephone and Internet users: a South African field study’, Global Business in Practice. Proceedings of the Tenth International Bled Electronic Commerce Conference, Bled, Slovenia, pp.604–639.
-
(1997)
Global Business in Practice. Proceedings of the Tenth International Bled Electronic Commerce Conference
, pp. 604-639
-
-
Gattiker, U.E.1
Kelb, J.2
Janz, L.3
Holsten, H.4
Greshake, J.5
Schwenteck, O.6
Miller, J.7
-
19
-
-
0004066959
-
-
January 12, (http://www.cl.cam.ac.uk/ftp/users/rja14/policy.txt) (January 23, 1998)
-
Anderson, R. (1996) ‘Security in clinical information systems’, January 12, (http://www.cl.cam.ac.uk/ftp/users/rja14/policy.txt) (January 23, 1998).
-
(1996)
Security in clinical information systems
-
-
Anderson, R.1
-
21
-
-
0003402107
-
-
(July 10, 1997)
-
Blaze, M., Diffie, W., Rivest, R.L., Schneier, B., Shimomura, T., Thompson, E. and Wiener, M. (1996). ‘Minimal key lengths for symmetric ciphers to provide adequate commercial security’. (ftp://research.att.com/dist/mab/keylength.txt) (July 10, 1997).
-
(1996)
Minimal key lengths for symmetric ciphers to provide adequate commercial security
-
-
Blaze, M.1
Diffie, W.2
Rivest, R.L.3
Schneier, B.4
Shimomura, T.5
Thompson, E.6
Wiener, M.7
-
24
-
-
84951713076
-
Morality and computers: attitudes and differences in moral judgments across populations
-
Gattiker, U.E. and Kelley, L. (1999) ‘Morality and computers: attitudes and differences in moral judgments across populations’, Information Systems Research, Vol. 10, pp.223–254.
-
(1999)
Information Systems Research
, vol.10
, pp. 223-254
-
-
Gattiker, U.E.1
Kelley, L.2
-
27
-
-
84951713314
-
-
October 8 (Signaturverordnung – SibV). (Regulation for digital signatures) (1998) February 28, (unofficial English translation can be found at (http://ourworldcompuserve.com/homepages/ckuner)
-
Bundesministerium fuer Bildung, Wissenschaft, Forschung und Technologie (1997) October 8, Verordnung zur digitalen Signatur (Signaturverordnung – SibV). (Regulation for digital signatures) (http://www.iid.de/rahmensigv.html) (1998) February 28, (unofficial English translation can be found at (http://ourworldcompuserve.com/homepages/ckuner).
-
(1997)
Verordnung zur digitalen Signatur
-
-
Bundesministerium fuer Bildung, Wissenschaft, Forschung und Technologie,1
-
28
-
-
84951722983
-
-
Loi No. 90-1170 (1997) December 29, Article No. 28. ‘Telecommunications law’, (http://www.legifrance.fr) (Accessed March 1, 1998). This law is currently being modified according to Loi No. 96-659, 26.7.96 de réglementation des télécommunications art 17 (December 17, 1997)
-
Loi No. 90-1170 (1997) December 29, Article No. 28. ‘Telecommunications law’, (http://www.legifrance.fr) (Accessed March 1, 1998). This law is currently being modified according to Loi No. 96-659, 26.7.96 de réglementation des télécommunications art 17; (http://www.telecom.gouv.fr/francais/activ/telecom/nloi17.htm) (December 17, 1997)
-
-
-
-
29
-
-
84951715939
-
Frenchy Cryptosoap #123578
-
December, 18 see also
-
Thorel, J. (1997) ‘Frenchy Cryptosoap #123578’. Lambda, December, 18, Vol. 3.08, p.1 (see also http://www.freenix.fr/netizen/chiffre/avis-cssp.html).
-
(1997)
Lambda
, vol.3.08
, pp. 1
-
-
Thorel, J.1
-
30
-
-
84951722984
-
-
(regulatory framework for electronic documents and contracts in electronic form). Approved by the Italian Council of Ministers, August 5
-
Council of Ministers (1997) Schema Di Regolamento Atti, Documenti E Contratti In Forma Elettronica (regulatory framework for electronic documents and contracts in electronic form). Approved by the Italian Council of Ministers, August 5.
-
(1997)
Schema Di Regolamento Atti, Documenti E Contratti In Forma Elettronica
-
-
Council of Ministers1
-
33
-
-
21844463321
-
The Stakeholder Theory of the Corporation: Concepts, Evidence and Implications
-
Donaldson, T. and Preston, L. (1995) The Stakeholder Theory of the Corporation: Concepts, Evidence and Implications. Academy of Management Review, Vol.20, No. 1, pp.65–91.
-
(1995)
Academy of Management Review
, vol.20
, Issue.1
, pp. 65-91
-
-
Donaldson, T.1
Preston, L.2
-
37
-
-
0031529953
-
Toward a theory of stakeholder identification and salience: defining the principle of who and what really counts
-
Mitchell, R.K., Agle, B.R. and Wood, D.J. (1997) ‘Toward a theory of stakeholder identification and salience: defining the principle of who and what really counts’, Academy of Management Review, Vol. 22, pp.853–886.
-
(1997)
Academy of Management Review
, vol.22
, pp. 853-886
-
-
Mitchell, R.K.1
Agle, B.R.2
Wood, D.J.3
-
38
-
-
84951722987
-
-
‘Striking the right balance. Access to health information’ (1996) December 5 (July 21, 1997)
-
‘Striking the right balance. Access to health information’ (1996) December 5, (http://www.health.gov.ab/access.htm) (July 21, 1997).
-
-
-
-
40
-
-
0345287657
-
-
(not dated) July 18, 1997
-
Gostin, L.O., Lazzarini, Z. and Flaherty, K.M. (not dated) ‘Legislative survey of state confidentiality laws, with specific emphasis on HIV and immunization’, (http://epic.org/privacy/medial/cdc_survey.htm), July 18, 1997.
-
Legislative survey of state confidentiality laws, with specific emphasis on HIV and immunization
-
-
Gostin, L.O.1
Lazzarini, Z.2
Flaherty, K.M.3
-
43
-
-
1542385579
-
-
(July 1, 1997)
-
Abelson, H., Anderson, R., Bellovin, S.M. Beneloh, J., Blaze, M., Diffie, W. Gilmore, J., Neumann, P.G., Rivest, R.L., Schiller, J.I. and Schneider, B. (1997) ‘The risks of key recovery, key escrow, and trusted third-party encryption’. (ftp://research.att.com/dist/mab/key_study.txt) (July 1, 1997).
-
(1997)
The risks of key recovery, key escrow, and trusted third-party encryption
-
-
Abelson, H.1
Anderson, R.2
Bellovin, S.M.3
Beneloh, J.4
Blaze, M.5
Diffie, W.6
Gilmore, J.7
Neumann, P.G.8
Rivest, R.L.9
Schiller, J.I.10
Schneider, B.11
-
44
-
-
84951722991
-
-
‘Government introduces draft legislation to protect the privacy of health information’ (June 11, 1997) October 28, 1997
-
‘Government introduces draft legislation to protect the privacy of health information’ (June 11, 1997). (http://www.gov.ab.ca/~pab/4984.html), October 28, 1997.
-
-
-
-
47
-
-
84951722993
-
An act respecting the protection of personal information in the private sector
-
Chap. 17 (1993) August 4
-
Bill 68 (1993) Chap. 17 (1993) ‘An act respecting the protection of personal information in the private sector’. Gazette Officielle du Québec, Vol. 125, pp. 4253–4279, August 4,
-
(1993)
Gazette Officielle du Québec
, vol.125
, pp. 4253-4279
-
-
Bill 681
-
49
-
-
84951722994
-
-
Directive of the European Parliament and the Council (adopted by the Council on 24th of July, 1995) On the protection of individuals with regard to the processing of personal data and on the free movement of such data (final). Bruxelles: The Author
-
Directive of the European Parliament and the Council (adopted by the Council on 24th of July, 1995) On the protection of individuals with regard to the processing of personal data and on the free movement of such data (final). Bruxelles: The Author.
-
-
-
-
50
-
-
84951713577
-
-
December 19 OJ L 367/1, 31.12.94. Council Decision 94/942/CFSP, 19.12.94 establishes the lists of dual-use goods covered by the Regulation, OJ L 367/8, 31.12.94
-
Council Regulation (EC) 3381/94, (1994) December 19, ‘Setting up a community regime for the control of exports of dual-use goods’, OJ L 367/1, 31.12.94. Council Decision 94/942/CFSP, 19.12.94 establishes the lists of dual-use goods covered by the Regulation, OJ L 367/8, 31.12.94.
-
(1994)
Setting up a community regime for the control of exports of dual-use goods
-
-
Council Regulation (EC) 3381/941
-
53
-
-
84951722997
-
-
‘Cryptographic algorithms’ (not dated) (Accessed July 15, 1997)
-
‘Cryptographic algorithms’ (not dated). (http://www.cs.hut.fi/ssh/crypto/algorithms.html) (Accessed July 15, 1997).
-
-
-
|