246
Views
15
CrossRef citations to date
0
Altmetric
Original Articles

THE ARCHITECTURE OF IDENTITY: Embedding privacy in market institutions

Pages 1-25 | Published online: 02 Dec 2010

REFERENCES

  • Abbate, J. (1995) "Open Systems" and the Internet', Society for Soda] Studies of Science/Societjrjor History of Technology Conference, (October) Charlottesville, VA, USA.
  • Agre, P.E. (1994) 'Surveillance and Capture: Two Models of Privacy', The Information Society 10(2):101-127.
  • ----- (1997a) Computation and Human Experience, Cambridge: Cambridge University Press.
  • ----- (1997b) 'Introduction', in P.E. Agre and M. Rotenberg (eds) Technology and Privacy: The New Landscape, Cambridge: MIT Press.
  • ----- (1997c) 'Beyond the Mirror World: Privacy and the Representational Practices of Computing', in P.E. Agre and M. Rotenberg (eds) Technology and Privacy: The New Landscape, Cambridge: MIT Press.
  • ----- (1998a) The Internet and Public Discourse', First Monday 3(3).
  • ----- (1998b) 'Yesterday'sTomorrow', Times Literary Supplement 3 July:3-4.
  • ----- (1998c) 'Designing Genres for New Media', in S.G. Jones, Cyber Society 2.0: Revisiting CMC and Community, New bury Park: Sage.
  • Akrich, M. (1992) The De-scription of Technical Objects, in W. E. Bijker and J. Law (eds) Shaping Technology/Building Society: Studies in Sociotechnical Change, Cambridge: MIT Press.
  • Arrow, K.J. (1984) Collected Papers, Volume 4: The Economics of Information, Cambridge: Harvard University Press.
  • Austin, J.L. (1962) How to Do Things with Words, Cambridge: Harvard University Press.
  • Baker, C.E. (1997) 'Giving the Audience What It Wants', Ohio State Law Journal 58(2): 311-417.
  • Bernstein, N. (1997) 'Goals Clash in Shielding Privacy' NewYork Times, 20 October.
  • Blaze, M., Feigenbaum, J., Resnick, P. and Strauss, M. (1997) 'Managing Trust in an Information-labeling System', European Transactions on Telecommunications 8:491-501.
  • Bowker, G.C. (1994) Science on the Run: Information Management and Industrial Geophysics at Schlumberger, 1920-1940, Cambridge: MIT Press.
  • Boyle, J. (1996) Shamans, Software and Spleens: Law and the Construction of the Information Society, Cambridge: Harvard University Press.
  • Brackett,M.H. (1994) Data Sharing: Using a Common Data Architecture, London: John Wiley.
  • Brynjolfsson, E. and Hitt, L.M. (1998) 'Beyond the Productivity Paradox: Computers are the Catalyst for Bigger Changes', Communications of 'the ACM 41(8): 49-55.
  • Burkert, H. (1997) 'Privacy-enhancing Technologies: Typology, Critique, Vision', in P.E. Agre and M. Rotenberg (eds) Technology and Privacy: The New Landscape, Cambridge: MIT Press.
  • Gallon, M. (1991) Techno-economic Networks and Irreversibility', in J. Law (ed.) A Sociology of Monsters: Essays on Power, Technology and Domination, London: Routledge.
  • Campbell, D.E. (1995) Incentives: Motivation and the Economics of Information, Cambridge: Cambridge University Press.
  • Cargill, C. (1994) 'Evolution and Revolution in Open Systems', StandardView 2(1):3-13.
  • Cartw right, J. (1991) Unequal Bargaining: A Study of Vitiating Factors in the Formation of Contracts, Oxford: Oxford University Press.
  • Casson, M. (1994) 'Economic Perspectives on Business Information', in L. Bud-Frierman (ed.) Information Acumen: The Understanding and Use of Knowledge in Modern Business, London: Routledge.
  • ----- (1997) Information and Organization: A New Perspective on the Theory of the Firm, Oxford: Oxford University Press.
  • Chaum, D. (1985) 'Security Without Identification: Transaction Systems to Make Big Brother Obsolete', Communications of the ACM 2 8(10): 1030-44.
  • ----- (1989) 'Privacy Protected Payments Unconditional Payer and/or Payee Untraceability', in D. Chaum and I. Schaumuller-Bichl (eds) Proceedings of Smart Card 2000, North Holland, pp. 69-93.
  • ----- (1990) 'Showing Credentials Without Identification: Transferring Signatures Between Unconditionally Unlinkable Pseudonyms', in J. Seberry and J. Pieprzyk (eds) Advances in Cryptology. Auscrypt '90, Berlin: SpringerVerlag, pp. 246-64.
  • ----- (1992) 'Achieving Electronic Privacy', Scientific American 267(2) :96-101.
  • Clarke, R. (1994) The Digital Persona and its Application to Data Surveillance', Information Society 10(2):77-92.
  • Coase, R.H. (1937) The Nature of the Firm', Economica 4(n.s.):385-405.
  • Commons, J.R. (1924) Legal Foundations of Capitalism, New York: Macmillan.
  • Donnellan, K.S. (1966) 'Reference and Definite Descriptions', Philosophkai Review 75(3):281-304.
  • Edwards, P.N. (1996) The Closed World: Computers and the Politics of Discourse in Cold War America, Cambridge, MA: MIT Press.
  • Ellis, V. (1998) Thriving Trade in Fake Drivers' Licenses Poses Tough Problem for DMV, Los Angeles Times, 5 April:Al, A26.
  • Epstein, R.A. (1993) 'Holdouts, Externalities and the Single Owner: One More Salute to Ronald Coase', Journal of Law and Economics 36:553-86.
  • Feenberg, A. (1995) Alternative Modernity: The Technical Turn in Philosophy and Social Theory, Berkeley: University of California Press.
  • Flaherty, D.H. (1989) Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada and the United States, University of North Carolina Press.
  • Gates, B. (1995) The Road Ahead, New York: Viking.
  • George, J.F. and King, J.L. (1991) 'Examining the Computing and Centralization Debate', Communications of the ACM 34(7): 63-72.
  • Goodin, R.E. (ed.) (1996) The Theory of Institutional Design, Cambridge: Cambridge University Press.
  • Granovetter, M. (1992) 'Economic Action and Social Structure: The Problem of Embeddedness', in M. Granovetter and R. Swedberg (eds) The Sociology of Economic Life, Boulder: Westview.
  • Grindley, P. (1995) Standards Strategy and Policy: Cases and Stories, Oxford: Oxford University Press.
  • Grossman, S.J. and Stiglitz, J.E. (1980) On the Impossibility of Informationally Efficient Markets', American Economic Review 70(3): 393-408.
  • Halper, M. (1998) 'Middlemania', Business 2.0 3(7):45-60.
  • Hanks, W.F. (1990) Referential Practice: Language and Lived Space Among the Maya, Chicago: University of Chicago Press.
  • Haraway, D.J. (1991) 'Situated Knowledges: The Science Question in Feminism and the Privilege of Partial Perspective', in Simians, Cyborgs, and Women: The Reinvention of Nature, New York: Routledge.
  • Hettinga, R. (1998) 'Call for Founders: An E-mail List (and Subsequent Conferences) on Digital Bearer Settlement', electronic message to the DBS mailing list, March 1998. {On file with the author.}
  • Hillier, B. (1997) The Economics of Asymmetric Information, St Martin's Press.
  • Hodgson, G.M. (1988) Economics and Institutions: A Manifesto for a Modern Institutional Economics, Cambridge: Polity Press.
  • Information and Privacy Commissioner (Ontario) and Registratiekamer (The Netherlands) (1995) Privacy-Enhancing Technologies: The Path to Anonymity, Toronto: Information and Privacy Commissioner and Rijswijk: Registratiekamer, 2 vols.
  • Kang, J. (1998) 'Information Privacy in Cyberspace Transactions', Stanford Law Review 50(4): 1193-294.
  • Katz, M.L. and Shapiro, C. (1994) 'Systems Competition and Network Effects', Journal of Economic Perspectives 8(2):93-115.
  • King, J.L. (1996) 'Where is the Payoff from Computing?', in R. Kling (ed.) Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., San Diego: Academic Press.
  • Kling, R. and Iacono, S. (1989) 'The Institutional Character of Computerized Information Systems', Office technology and People 5(1): 7-28.
  • Kripke, S. (1980) Naming and Necessity, Cambridge: Harvard University Press.
  • Landauer, T.K. (1995) The Trouble with Computers: Usefulness, Usability, and Productivity, Cambridge, MA: MIT Press.
  • Laudon, K. C. (1996) 'Markets and Privacy', Communications of the ACM 39(9): 92-104.
  • Lesperance, Y. and Levesque, H.J. (1995) 'Indexical Knowledge and Robot Action: A Logical Account', Artificial Intelligence 73(1-2):69-115.
  • Madrick, J. (1998) 'Computers:Waiting for the Revolution', NewYork Review of Books, 26 March: 29-33.
  • Mansell, R. (1996) 'Designing Electronic Commerce', in R. Mansell and R. Silverstone (eds) Communication by Design: The Politics of Information and Communication Technologies, Oxford: Oxford University Press.
  • March, J.G. and Olsen, J.P. (1989) Rediscovering Institutions: The Organizational Basis of Politics, New York: Free Press.
  • Maxemchuk, N.F. (1994) 'Electronic Document Distribution', ATT Technical Journal 73(5), pp. 73-80.
  • Mayer-Schönberger, V. (1997) 'Generational Development of Data Protection in Europe', in P.E. Agreand M. Rotenberg (eds) Technology and Privacy: The New Landscape, Cambridge, MA: MIT Press.
  • Miller, A.R. (1969) 'Personal Privacy in the Computer Age: The Challenge of New Technology in an Information-Centred Society', Michigan Law Review 67(7): 1089-1246.
  • Mirowski, P. (1989) More Heat than Light: Economics as Soda] Physics, Physics as Nature's Economics, Cambridge: Cambridge University Press.
  • Nermuth, M. (1982) Information Structures in Economics: Studies in the Theory of Markets with Imperfect Information, Berlin: Springer-Verlag.
  • Noble, D. (1997) The Religion of Technology, New York: Knopf.
  • North, D.C. (1990) Institutions, Institutional Change, and Economic Performance, Cambridge: Cambridge University Press.
  • Olson, M., Jr (1965) The Logic of Collective Action: Public Goods and the Theory of Groups, Cambridge: Harvard University Press.
  • Phillips, D.J. (1997) 'Cryptography, Secrets and the Structuring of Trust', in P.E. Agre and M. Rotenberg (eds) Technology and Privacy: The New Landscape, Cambridge: MIT Press.
  • Phlips, L. (1988) The Economics of Imperfect Information, Cambridge: Cambridge University Press.
  • Picot, A., Ripperger. T. and Wolff, B. (1996) The Fading Boundaries of the Firm: The Role of Information and Communication Technology', Journal of Institutional and Theoretical Economics 152(1):65-79.
  • Porter, T.M. (1994) 'Information, Power and the View from Nowhere', in L. Bud-Frierman (ed.) Information Acumen: The Understanding and Use of Knowledge in Modern Business, London: Routledge.
  • Posner, R.A. (1981) The Economics of Justice, Cambridge, MA: Harvard University Press.
  • Poster, M. (1990) 'Databases as Discourse', in The Mode of Information: Poststructuralism and Social Context, Cambridge: Polity Press.
  • Powell, W.W. and DiMaggio, PJ. (eds) (1991) The New Institutionalism in Organizational Analysis, Chicago: University of Chicago Press.
  • Rasmusen, E. (1994) Games and Information An Introduction to Game Theory, 2nd edn, Cambridge: Blackwell.
  • Roscheisen, M. and Winograd, T. (1996) 'A Communication Agreement Framework for Access/Action Control', Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland: IEEE Press.
  • Samuelson, P.A. (1947) Foundations of Economic Analysis, Cambridge: Harvard University Press.
  • Schaffer, S. (1994) 'Babbage's Intelligence: Calculating Engines and the Factory System', Critical Inquiry 21(1):201-28.
  • Schoeman, F. (ed.) (1984) Philosophical Dimensions of Privacy: An Anthology, Cambridge: Cambridge University Press.
  • Shapo, M.S. (1974) 'A Representational Theory of Consumer Protection: Doctrine, Function and Legal Liability for Product Disappointment', Virginia law Review 60(7): 1109-1386.
  • Sharrock, W. and Anderson, B. (1994) 'The User as a Scenic Feature of the Design Space', Design Studies 15(1):5-18.
  • Simsion, G. C. (1994) Data Modeling Essentials:Analysis, Design and Innovation, New York: Van Nostrand Reinhold.
  • Smith, B.C. (1996) On the Origin of Objects, Cambridge: MIT Press.
  • Spulber, D.F. (1996) 'Market Microstructure and Intermediation', Journal of Economic Perspectives 10(3):135-52.
  • ----- (1998) The Market Makers: How Leading Companies Create and Win Markets, New York: McGraw-Hill.
  • Stefik, M. (1997) Trusted Systems', Scientific American 276(3) :78-81.
  • Stigler, G.J. (1961) 'The Economics of Information', Journal of Political Economy 69(3):213-25.
  • ----- (1980) 'An Introduction to Privacy in Economics and Politics ', Journal of Legal Studies 9(4): 623-44.
  • Trebilcock, M. J. (1993) The Limits of Freedom of Contract, Cambridge: Harvard University Press.
  • Von Neumann, J. and Morgenstern, O. (1947) Theory of Games and Economic Behavior, Princeton: Princeton University Press.
  • Williamson, O.E. (1985) The Economic Institutions of Capitalism: Firms, Markets, Relational Contracting, New York: Free Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.