1,194
Views
45
CrossRef citations to date
0
Altmetric
Original Articles

Privacy as a Common Good in the Digital World

Pages 382-405 | Published online: 08 Dec 2010

REFERENCES

  • Agre, P. and Rotenberg, M. (eds) (1997) Technology and Privacy: The New Landscape, Cambridge, MA: The MIT Press.
  • Bennett, C. (1992) Regulating Privacy: Data Protection and Publia Policy in Europe and the United States, Ithaca, NY: Cornell University Press.
  • Bigus, J. (1996) Data Mining with Neural Networks: Solving Business Problems from Application Development to Decision Support, New York: McGraw-Hill.
  • Branscomb, A. (1994) Who Owns Information? New York: Basic Books.
  • Cate, F. (1997) Privacy in the Information Age, Washington, DC: Brookings.
  • Clarke, R. (1988) 'Information technology and dataveillance'. Communication of the ACM, 31: 498-512.
  • Culnan, M. (1999) Georgetown Internet Privacy Policy Survey: Report to the Federal Trade Commission, Washington, HC: Georgetown University School of Business. Available online: http://www. msb.edu/taculty/culnanm/gippshome.html
  • Cyert, R. and March, J. (1963) A Behavioral Theory of the Firm, Englewood Cliffs, NJ: Prentice-Hall.
  • Deutsch, K. (1963) The Nerves of Government, New York: The Free Press.
  • Flaherty, D. (1989) Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden. France. Canada and the United States, Chapel Hill: University of North Carolina Press.
  • Candy, O. (1993) The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview Press.
  • Gey, S. (1998) 'Reopening the public forum from sidewalks to Cyberspace', Ohio State Law Journal, 58: 1535-1634.
  • Goldstone, D. (1998) 'A funny thing happened on the way to the cyber forum: public vs. private in Cyberspace speech', University of Colorado Law Review, 69: 1-70.
  • Harclin, G. (1968) 'The tragedy of the commons'. Science, 162: 1243-8.
  • Harris, L. and Associates (1997) Commerce, Communication and Privacy Online, Commissioned by Privacy and American Rusiness.
  • Klein, S. and Neumann, T. (1999) 'Architecture is policy -- case study: cooperative development as a means for a standards-based Implementation for privacy on the Internet', paper presented at the Computers, Freedom and Privacy Conference, Washington, DC, March.
  • Kline, R (1996) 'Freedom ol speech on the electronic village green: applying the first amendment lessons of cable television to the Internet', Cornell Journal of Law and Public Policy, 6: 23-60.
  • Kollock, P. and Smith, M. (1994) 'Managing the virtual commons: cooperation and conflict in computer communities'. Available online:http://www.sscnet.ucla.edu/sor/csoc/papers/virtcomm/Virtcomm.htm
  • Laudon, K. (1996) 'Markets and privacy', Communications of the ACM, 39: 92-104.
  • Lessig, L. (1996) 'Reading the constitution in Cyberspace', Emory Law Journal, 45: 869-910.
  • Lessig, L. (1999) 'Re-claiming a commons', Keynote address, The Berkinan Center's Building a Digital Commons conference, 20 May 1999, Cambridge, MA. Available online: http://cyber.law.harvnrd.edu/
  • Marx, G. (1996) 'Electronic eye in the sky: some reflections on the new surveillance and popular', in D. Lyon and E. Zureik (eds) Surveillance, Computers and Privacy, Minneapolis, MN: University of Minnesota Press.
  • Mell, P. (1996) 'Seeking shade in a land of perpetual sunlight: privacy as property in the electronic wilderness', Berkeley Technology Law Journal, 11: 1-65. Available online: http://www.law.berkelev.edu/journals/btlj/articles/11-1 /mell.html
  • Mosco, V. (1989) The Pay-Per Society: Computers and Communication in the Information Age, Norwood, NJ: Ablex.
  • Nissenbaum, H. (1997) 'Toward an approach to privacy in public: challenges of information technology', Ethics and Behavior, 7: 207-19.
  • O'Harrow, R. (2000) 'Firm tracking consumers on web for drug companies', Washington Post, 15 August, El: 4.
  • Olson, M. (1965) The Logic of Collective Action: Public Goods and the Theory of Group,, Cambridge: Harvard University Press.
  • Ostrom, E. (1990) Governing the Commons: The evolution of institutions for collective action, Cambridge: Cambridge University Press.
  • Ostrom, E., Dietz, T., Dolsak, N., Stern, P., Stonich, S. and Weber. E. (2002) The Drama of the Commons, Washington, DC: National Academy Press.
  • Perritt, H. (1997) 'Cyberspace self-government: town hall democracy or rediscovered royalism?', Berkeley Technology Law Journal, 12: 1-48. Available online: http:/www.law.berkeley.edu/journals/btlj/artifles/12-2/perritt.html
  • Posner, R. (1978) 'An economic theory of privacy', Regulation, 2: 17-30.
  • Regan, P. (1995) Legislating Privacy: Technology, Social Values and Public Policy, Chapel Hill, NC: University of North Carolina Press.
  • Regan, P., Schnitler, I., and Hearne, S. (1996) Privacy and ITS: Results of a National Public Opinion Survey, Report to die US Department of Transportation, Federal Highway Administration, through Cooperative Agreement DTFH-61-93-X-00027.
  • Regan, P. (1999) 'Brokcring trust n online privacy: analysis of issues and options'. Paper presented at he meetings of the Association for Public Policy Analysis and Mangement, November, Washington, DC.
  • Rheingold, H. (1993) The Virtual Community: Homesteading on the Electronic Frontier, Reading, MA: Addison-Wesley.
  • Rothfeder, J. (1992) Privacy For Sale: How Computerization Has Made Everyone's Life an Open Secret, New York: Simon & Schuster.
  • Rule, J.. MacAdam, D., Stearns, I., and Uglow, D. (1980) The Politics of Privacy: Planning for Personal Data Systems as Powerful Technologies, New York: Elsevier.
  • Samarajiva, R. (1997) 'Interactivity as though privacy mattered', in P. Agre and M. Rotenber (eds) Technology and Privacy: The New Landscape, Cambridge, MA: The MlT Press, pp. 277-309.
  • Schwartz, P. and Reidenberg, J. (1996) Data Privacy Law: A Study of United States Data Protection, Charlottesville, VA: Michic.
  • Singleton, S. (1998) 'Privacy as censorship: a skeptical view of proposals to regulate privacy in the private sector'. Policy Analysis, 295: 1-32.
  • Smith, R. (2000) Web Bug and Find. Available online: http://tiac.net/users/smiths/privacy/whfind.htm
  • Steinbruner, J. (1974) The Cyhernetic Theory of Decision, Princeton: Princeton University Press.
  • Turner, R. (1993) The tragedy of the commons and distributed AI systems'. Available online: http://edps.umcs.maine.edu/Papers/1993/TofCommons/TR.html
  • US Department of Commerce, National Telecommunications and Information Infrastructure (1997) Privacy and Self-Regulation in the Information Age, Washington, DC: Government Printing Office. Available online: http://www. ntia. doc. gov/reports/privacy/privacy_rpt. htm
  • US Department of Health, Education and Welfare, Secretary's Advisory Committee on Automated Personal Data Systems (1973) Records, Computers and the Right-, of Citizens, Washington, DC: Government Printing Office.
  • US Federal Trade Commission (1997) Individual Reference Services: A Report to Congrefs, Washington, DC: Government Printing Office. Available online: http://www.ftc.gov/bcp/privacy2/irsdocl .html
  • US Federal Trade Commission (1998) Privacy Online: A Report to Congress, Washington, DC: Federal Trade Commission, Available online: http://www. ftc.gov/reports/privacy 3/index/html
  • US Office of the President, The White House. (1997) A Framework for Global Electronic Commerce, Washington, DC: Government Printing Office. Available online: http://www.ecornnierce. gov/framewrk.htm
  • Valauskas, E. (1996) 'Lex networkia: understanding the Internet community', first Monday. Available online: http://www.firstmonday.dk/issues/issue4/valausdas/index.html
  • Varian, H. (1998) Markets for Information Goods (as revised 16 October). Available online: http://www.sims.berkeley.edu/-bal
  • Westin, A. (1967) Privacy and Freedom, New York: Atheneum.
  • Zittrain, J. (1997) 'The rise and fall of sysopdom', Harvard Journal of Law and Technolaay, 10: 495-513. Available online: http://jolt.law.harvard.edu/low/articlcs/10hjolt495.html

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.