REFERENCES
- Abbate, J. (1995) "Open Systems" and the Internet', Society for Soda] Studies of Science/Societjrjor History of Technology Conference, (October) Charlottesville, VA, USA.
- Agre, P.E. (1994) 'Surveillance and Capture: Two Models of Privacy', The Information Society 10(2):101-127.
- ----- (1997a) Computation and Human Experience, Cambridge: Cambridge University Press.
- ----- (1997b) 'Introduction', in P.E. Agre and M. Rotenberg (eds) Technology and Privacy: The New Landscape, Cambridge: MIT Press.
- ----- (1997c) 'Beyond the Mirror World: Privacy and the Representational Practices of Computing', in P.E. Agre and M. Rotenberg (eds) Technology and Privacy: The New Landscape, Cambridge: MIT Press.
- ----- (1998a) The Internet and Public Discourse', First Monday 3(3).
- ----- (1998b) 'Yesterday'sTomorrow', Times Literary Supplement 3 July:3-4.
- ----- (1998c) 'Designing Genres for New Media', in S.G. Jones, Cyber Society 2.0: Revisiting CMC and Community, New bury Park: Sage.
- Akrich, M. (1992) The De-scription of Technical Objects, in W. E. Bijker and J. Law (eds) Shaping Technology/Building Society: Studies in Sociotechnical Change, Cambridge: MIT Press.
- Arrow, K.J. (1984) Collected Papers, Volume 4: The Economics of Information, Cambridge: Harvard University Press.
- Austin, J.L. (1962) How to Do Things with Words, Cambridge: Harvard University Press.
- Baker, C.E. (1997) 'Giving the Audience What It Wants', Ohio State Law Journal 58(2): 311-417.
- Bernstein, N. (1997) 'Goals Clash in Shielding Privacy' NewYork Times, 20 October.
- Blaze, M., Feigenbaum, J., Resnick, P. and Strauss, M. (1997) 'Managing Trust in an Information-labeling System', European Transactions on Telecommunications 8:491-501.
- Bowker, G.C. (1994) Science on the Run: Information Management and Industrial Geophysics at Schlumberger, 1920-1940, Cambridge: MIT Press.
- Boyle, J. (1996) Shamans, Software and Spleens: Law and the Construction of the Information Society, Cambridge: Harvard University Press.
- Brackett,M.H. (1994) Data Sharing: Using a Common Data Architecture, London: John Wiley.
- Brynjolfsson, E. and Hitt, L.M. (1998) 'Beyond the Productivity Paradox: Computers are the Catalyst for Bigger Changes', Communications of 'the ACM 41(8): 49-55.
- Burkert, H. (1997) 'Privacy-enhancing Technologies: Typology, Critique, Vision', in P.E. Agre and M. Rotenberg (eds) Technology and Privacy: The New Landscape, Cambridge: MIT Press.
- Gallon, M. (1991) Techno-economic Networks and Irreversibility', in J. Law (ed.) A Sociology of Monsters: Essays on Power, Technology and Domination, London: Routledge.
- Campbell, D.E. (1995) Incentives: Motivation and the Economics of Information, Cambridge: Cambridge University Press.
- Cargill, C. (1994) 'Evolution and Revolution in Open Systems', StandardView 2(1):3-13.
- Cartw right, J. (1991) Unequal Bargaining: A Study of Vitiating Factors in the Formation of Contracts, Oxford: Oxford University Press.
- Casson, M. (1994) 'Economic Perspectives on Business Information', in L. Bud-Frierman (ed.) Information Acumen: The Understanding and Use of Knowledge in Modern Business, London: Routledge.
- ----- (1997) Information and Organization: A New Perspective on the Theory of the Firm, Oxford: Oxford University Press.
- Chaum, D. (1985) 'Security Without Identification: Transaction Systems to Make Big Brother Obsolete', Communications of the ACM 2 8(10): 1030-44.
- ----- (1989) 'Privacy Protected Payments Unconditional Payer and/or Payee Untraceability', in D. Chaum and I. Schaumuller-Bichl (eds) Proceedings of Smart Card 2000, North Holland, pp. 69-93.
- ----- (1990) 'Showing Credentials Without Identification: Transferring Signatures Between Unconditionally Unlinkable Pseudonyms', in J. Seberry and J. Pieprzyk (eds) Advances in Cryptology. Auscrypt '90, Berlin: SpringerVerlag, pp. 246-64.
- ----- (1992) 'Achieving Electronic Privacy', Scientific American 267(2) :96-101.
- Clarke, R. (1994) The Digital Persona and its Application to Data Surveillance', Information Society 10(2):77-92.
- Coase, R.H. (1937) The Nature of the Firm', Economica 4(n.s.):385-405.
- Commons, J.R. (1924) Legal Foundations of Capitalism, New York: Macmillan.
- Donnellan, K.S. (1966) 'Reference and Definite Descriptions', Philosophkai Review 75(3):281-304.
- Edwards, P.N. (1996) The Closed World: Computers and the Politics of Discourse in Cold War America, Cambridge, MA: MIT Press.
- Ellis, V. (1998) Thriving Trade in Fake Drivers' Licenses Poses Tough Problem for DMV, Los Angeles Times, 5 April:Al, A26.
- Epstein, R.A. (1993) 'Holdouts, Externalities and the Single Owner: One More Salute to Ronald Coase', Journal of Law and Economics 36:553-86.
- Feenberg, A. (1995) Alternative Modernity: The Technical Turn in Philosophy and Social Theory, Berkeley: University of California Press.
- Flaherty, D.H. (1989) Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada and the United States, University of North Carolina Press.
- Gates, B. (1995) The Road Ahead, New York: Viking.
- George, J.F. and King, J.L. (1991) 'Examining the Computing and Centralization Debate', Communications of the ACM 34(7): 63-72.
- Goodin, R.E. (ed.) (1996) The Theory of Institutional Design, Cambridge: Cambridge University Press.
- Granovetter, M. (1992) 'Economic Action and Social Structure: The Problem of Embeddedness', in M. Granovetter and R. Swedberg (eds) The Sociology of Economic Life, Boulder: Westview.
- Grindley, P. (1995) Standards Strategy and Policy: Cases and Stories, Oxford: Oxford University Press.
- Grossman, S.J. and Stiglitz, J.E. (1980) On the Impossibility of Informationally Efficient Markets', American Economic Review 70(3): 393-408.
- Halper, M. (1998) 'Middlemania', Business 2.0 3(7):45-60.
- Hanks, W.F. (1990) Referential Practice: Language and Lived Space Among the Maya, Chicago: University of Chicago Press.
- Haraway, D.J. (1991) 'Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective', in Simians, Cyborgs, and Women: The Reinvention of Nature, New York: Routledge.
- Hettinga, R. (1998) 'Call for Founders: An E-mail List (and Subsequent Conferences) on Digital Bearer Settlement', electronic message to the DBS mailing list, March 1998. {On file with the author.}
- Hillier, B. (1997) The Economics of Asymmetric Information, St Martin's Press.
- Hodgson, G.M. (1988) Economics and Institutions: A Manifesto for a Modern Institutional Economics, Cambridge: Polity Press.
- Information and Privacy Commissioner (Ontario) and Registratiekamer (The Netherlands) (1995) Privacy-Enhancing Technologies: The Path to Anonymity, Toronto: Information and Privacy Commissioner and Rijswijk: Registratiekamer, 2 vols.
- Kang, J. (1998) 'Information Privacy in Cyberspace Transactions', Stanford Law Review 50(4): 1193-294.
- Katz, M.L. and Shapiro, C. (1994) 'Systems Competition and Network Effects', Journal of Economic Perspectives 8(2):93-115.
- King, J.L. (1996) 'Where is the Payoff from Computing?', in R. Kling (ed.) Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., San Diego: Academic Press.
- Kling, R. and Iacono, S. (1989) 'The Institutional Character of Computerized Information Systems', Office technology and People 5(1): 7-28.
- Kripke, S. (1980) Naming and Necessity, Cambridge: Harvard University Press.
- Landauer, T.K. (1995) The Trouble with Computers: Usefulness, Usability, and Productivity, Cambridge, MA: MIT Press.
- Laudon, K. C. (1996) 'Markets and Privacy', Communications of the ACM 39(9): 92-104.
- Lesperance, Y. and Levesque, H.J. (1995) 'Indexical Knowledge and Robot Action: A Logical Account', Artificial Intelligence 73(1-2):69-115.
- Madrick, J. (1998) 'Computers:Waiting for the Revolution', NewYork Review of Books, 26 March: 29-33.
- Mansell, R. (1996) 'Designing Electronic Commerce', in R. Mansell and R. Silverstone (eds) Communication by Design: The Politics of Information and Communication Technologies, Oxford: Oxford University Press.
- March, J.G. and Olsen, J.P. (1989) Rediscovering Institutions: The Organizational Basis of Politics, New York: Free Press.
- Maxemchuk, N.F. (1994) 'Electronic Document Distribution', ATT Technical Journal 73(5), pp. 73-80.
- Mayer-Schönberger, V. (1997) 'Generational Development of Data Protection in Europe', in P.E. Agreand M. Rotenberg (eds) Technology and Privacy: The New Landscape, Cambridge, MA: MIT Press.
- Miller, A.R. (1969) 'Personal Privacy in the Computer Age: The Challenge of New Technology in an Information-Centred Society', Michigan Law Review 67(7): 1089-1246.
- Mirowski, P. (1989) More Heat than Light: Economics as Soda] Physics, Physics as Nature's Economics, Cambridge: Cambridge University Press.
- Nermuth, M. (1982) Information Structures in Economics: Studies in the Theory of Markets with Imperfect Information, Berlin: Springer-Verlag.
- Noble, D. (1997) The Religion of Technology, New York: Knopf.
- North, D.C. (1990) Institutions, Institutional Change, and Economic Performance, Cambridge: Cambridge University Press.
- Olson, M., Jr (1965) The Logic of Collective Action: Public Goods and the Theory of Groups, Cambridge: Harvard University Press.
- Phillips, D.J. (1997) 'Cryptography, Secrets and the Structuring of Trust', in P.E. Agre and M. Rotenberg (eds) Technology and Privacy: The New Landscape, Cambridge: MIT Press.
- Phlips, L. (1988) The Economics of Imperfect Information, Cambridge: Cambridge University Press.
- Picot, A., Ripperger. T. and Wolff, B. (1996) The Fading Boundaries of the Firm: The Role of Information and Communication Technology', Journal of Institutional and Theoretical Economics 152(1):65-79.
- Porter, T.M. (1994) 'Information, Power and the View from Nowhere', in L. Bud-Frierman (ed.) Information Acumen: The Understanding and Use of Knowledge in Modern Business, London: Routledge.
- Posner, R.A. (1981) The Economics of Justice, Cambridge, MA: Harvard University Press.
- Poster, M. (1990) 'Databases as Discourse', in The Mode of Information: Poststructuralism and Social Context, Cambridge: Polity Press.
- Powell, W.W. and DiMaggio, PJ. (eds) (1991) The New Institutionalism in Organizational Analysis, Chicago: University of Chicago Press.
- Rasmusen, E. (1994) Games and Information An Introduction to Game Theory, 2nd edn, Cambridge: Blackwell.
- Roscheisen, M. and Winograd, T. (1996) 'A Communication Agreement Framework for Access/Action Control', Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland: IEEE Press.
- Samuelson, P.A. (1947) Foundations of Economic Analysis, Cambridge: Harvard University Press.
- Schaffer, S. (1994) 'Babbage's Intelligence: Calculating Engines and the Factory System', Critical Inquiry 21(1):201-28.
- Schoeman, F. (ed.) (1984) Philosophical Dimensions of Privacy: An Anthology, Cambridge: Cambridge University Press.
- Shapo, M.S. (1974) 'A Representational Theory of Consumer Protection: Doctrine, Function and Legal Liability for Product Disappointment', Virginia law Review 60(7): 1109-1386.
- Sharrock, W. and Anderson, B. (1994) 'The User as a Scenic Feature of the Design Space', Design Studies 15(1):5-18.
- Simsion, G. C. (1994) Data Modeling Essentials:Analysis, Design and Innovation, New York: Van Nostrand Reinhold.
- Smith, B.C. (1996) On the Origin of Objects, Cambridge: MIT Press.
- Spulber, D.F. (1996) 'Market Microstructure and Intermediation', Journal of Economic Perspectives 10(3):135-52.
- ----- (1998) The Market Makers: How Leading Companies Create and Win Markets, New York: McGraw-Hill.
- Stefik, M. (1997) Trusted Systems', Scientific American 276(3) :78-81.
- Stigler, G.J. (1961) 'The Economics of Information', Journal of Political Economy 69(3):213-25.
- ----- (1980) 'An Introduction to Privacy in Economics and Politics ', Journal of Legal Studies 9(4): 623-44.
- Trebilcock, M. J. (1993) The Limits of Freedom of Contract, Cambridge: Harvard University Press.
- Von Neumann, J. and Morgenstern, O. (1947) Theory of Games and Economic Behavior, Princeton: Princeton University Press.
- Williamson, O.E. (1985) The Economic Institutions of Capitalism: Firms, Markets, Relational Contracting, New York: Free Press.