| Ten years of computers, freedom and privacy: a personal retrospective | | BIB | Full-Text | 11-15 | |
| Lorrie Faith Cranor | |||
| Introduction to the workshop on freedom and privacy by design | | BIB | Full-Text | 17-18 | |
| Lenny Foner | |||
| Developing for privacy: civility frameworks and technical design | | BIB | Full-Text | 19-23 | |
| Mark S. Ackerman | |||
| Multimedia information changes the whole privacy ballgame | | BIB | Full-Text | 25-32 | |
| Anne Adams | |||
| An international standard for privacy protection: objections to the objections | | BIB | Full-Text | 33-38 | |
| Colin J. Bennett | |||
| Serve yourself: shifting power away from the brothers | | BIB | Full-Text | 39-41 | |
| Ian Brown; Gus Hosein | |||
| Notes for the workshop on freedom and privacy by design | | BIB | Full-Text | 43-44 | |
| Roger Clarke | |||
| Influencing software usage | | BIB | Full-Text | 45-55 | |
| Lorrie Faith Cranor; Rebecca N. Wright | |||
| Project "anonymity and unobservability in the Internet" | | BIB | Full-Text | 57-65 | |
| Oliver Berthold; Hannes Federrath; Marit Köhntopp | |||
| Deniable payments and electronic campaign finance | | BIB | Full-Text | 67-68 | |
| Matt Franklin; Tomas Sander | |||
| Principles for privacy protection software | | BIB | Full-Text | 69-72 | |
| Harry Hochheiser | |||
| Protecting privacy while sharing information in electronic communities | | BIB | Full-Text | 73-75 | |
| Tad Hogg; Bernardo A. Huberman; Matt Franklin | |||
| The development of destination-specific biometric authentication | | BIB | Full-Text | 77-80 | |
| Andrew R. Mark | |||
| Your place or mine?: privacy concerns and solutions for server and client-side storage of personal information | | BIB | Full-Text | 81-84 | |
| Deirdre Mulligan; Ari Schwartz | |||
| How not to design a privacy system: reflections on the process behind the Freedom product | | BIB | Full-Text | 85-87 | |
| Adam Shostack; Ian Goldberg | |||
| Global ID, trusted systems, and communications markets | | BIB | Full-Text | 89-96 | |
| Jonathan Weinberg | |||
| Obstacles to freedom and privacy by design | | BIB | Full-Text | 97-100 | |
| Rebecca N. Wright | |||
| Overview of current criminal justice information systems | | BIB | Full-Text | 101-106 | |
| James X. Dempsey | |||
| The trouble with ubiquitous technology pushers | | BIB | Full-Text | 107-113 | |
| Steve Talbott | |||
| Security and privacy in broadband Internet services | | BIB | Full-Text | 115-116 | |
| Robert Ellis | |||
| Freedom and choice in broadband Internet access | | BIB | Full-Text | 117 | |
| Miles Losch | |||
| The broadband Internet: the end of the equal voice? | | BIB | Full-Text | 119-128 | |
| John B., Jr. Morris; Jerry Berman | |||
| My net connection approaches light speed with cable, but that doesn't guarantee victory over DSL | | BIB | Full-Text | 129-135 | |
| Simson Garfinkel | |||
| Privacy commissioners: powermongers, pragmatists or patsies? | | BIB | Full-Text | 137-139 | |
| Ann Cavoukian | |||
| The Hong Kong personal data (privacy) ordinance | | BIB | Full-Text | 141-143 | |
| Stephen Lau | |||
| The Privacy Act and the Australian Federal Privacy Commissioner's functions | | BIB | Full-Text | 145-148 | |
| Malcolm Crompton | |||
| Global surveillance: the evidence for Echelon | | BIB | Full-Text | 149-154 | |
| Duncan Campbell | |||
| Panel on infomediaries and negotiated privacy techniques | | BIB | Full-Text | 155-156 | |
| Jason Catlett | |||
| Open letter to P3P developers & replies | | BIB | Full-Text | 157-164 | |
| Jason Catlett | |||
| Infomediaries and negotiated privacy: resources | | BIB | Full-Text | 165-166 | |
| Beth Givens | |||
| Infomediaries and negotiated privacy techniques | | BIB | Full-Text | 167 | |
| Alexander Dix | |||
| People as subjects and as objects: contrasting market and academic research | | BIB | Full-Text | 169-171 | |
| Bruce Umbaugh | |||
| The network society as seen by two European underdogs | | BIB | Full-Text | 173-181 | |
| Giancarlo Livraghi | |||
| The creation of an on-line community: the Spanish case | | BIB | Full-Text | 183-187 | |
| David Casacuberta | |||
| The network society as seen by two European underdogs | | BIB | Full-Text | 189-193 | |
| Andrea Monti | |||
| The media and privacy: friend, foe or folly? | | BIB | Full-Text | 195-196 | |
| Ann Cavoukian | |||
| Confronting dogma: privacy, free speech, and the Internet | | BIB | Full-Text | 197-204 | |
| Raymond Wacks | |||
| The third millennium digital commerce act | | BIB | Full-Text | 205-211 | |
| Margot Saunders | |||
| Naming and certificates | | BIB | Full-Text | 213-217 | |
| Carl M. Ellison | |||
| Internet voting: will it spur or corrupt democracy? | | BIB | Full-Text | 219-223 | |
| Lance J. Hoffman | |||
| Privacy technologies as political issues: consumption as mobilization | | BIB | Full-Text | 225-227 | |
| David J. Phillips | |||
| Internet voting: spurring or corrupting democracy? | | BIB | Full-Text | 229-230 | |
| Paul W. Craft | |||
| Compensating for a lack of transparency | | BIB | Full-Text | 231-233 | |
| Berry Schoenmakers | |||
| Negotiating the global Internet rating and filtering system: opposing views of the Bertelsmann foundation's self-regulation of Internet content proposal | | BIB | Full-Text | 235-238 | |
| Christopher D. Hunter | |||
| Is technology neutral?: space, time and the biases of communication | | BIB | Full-Text | 239-241 | |
| Leslie Regan Shade | |||
| Imperial Silicon Valley | | BIB | Full-Text | 243 | |
| Paulina Borsook | |||
| The classroom as panopticon; protecting your rights in the technology-enhanced workplace | | BIB | Full-Text | 245-248 | |
| Marita Moll | |||
| Indirect threats to freedom and privacy: governance of the Internet and the WWW | | BIBK | Full-Text | 249-254 | |
| Harry Hochheiser | |||
Keywords: freedom, internet goverance, privacy, standards | |||
| The emerging role of standards bodies in the formation of public policy | | BIB | Full-Text | 255-257 | |
| Timothy Schoechle | |||
| Personal data privacy in the Asia Pacific: a real possibility | | BIB | Full-Text | 259-262 | |
| Jim C. Tam | |||
| Personal data privacy in the Pacific Rim | | BIB | Full-Text | 263-265 | |
| Kate Lundy | |||
| Square pegs & round holes: applying campaign finance law to the Internet -- risks to free expression and democratic values | | BIB | Full-Text | 267-273 | |
| Deirdre Mulligan; James X. Dempsey | |||
| The Internet and campaign finance laws | | BIB | Full-Text | 275-280 | |
| Fred Wertheimer | |||
| Privacy excerpt from "Towards Digital eQuality: the U.S. Government working group on electronic commerce" | | BIB | Full-Text | 281-284 | |
| Peter P. Swire | |||
| Student paper competition (abstract only) | | BIBA | Full-Text | 285 | |
| Sara Basse; Jean Camp; Dan Gillmor; Wiley Hodges; Bruce Umbaugh; Danny Yee | |||
| The top three papers from the CFP 2000 student paper competition have been
printed in this proceedings. They are:
* Internet filter effectiveness: testing over and underinclusive blocking
decisions of four popular filters. Christopher D. Hunter. Pages 287-294 * When social meets technical: ethics and the design of "social" technologies. Patrick Feng. Pages 295-301 * Quantum "encryption" Mark V. Hurwitz. Pages 303-313 | |||
| Internet filter effectiveness (student paper panel): testing over and underinclusive blocking decisions of four popular filters | | BIB | Full-Text | 287-294 | |
| Christopher D. Hunter | |||
| When social meets technical (student paper panel): ethics and the design of "social" technologies | | BIB | Full-Text | 295-301 | |
| Patrick Feng | |||
| Quantum "encryption" (student paper panel) | | BIB | Full-Text | 303-313 | |
| Mark V. Hurwitz | |||
| Domain Names under ICANN: Technical Management or Policy Chokepoint | | BIBA | Full-Text | A1 | |
| Michael Froomkin; Richard Sexton; Karl Auerbach; Jerry Berman; Amadeu Abril | |||
| Domain name management can be regarded as strictly an issue of technical stability, or can also be seen as a potential chokepoint in an otherwise open, decentralized medium. In this panel, privacy advocates and technical experts will discuss the potential bottlenecks for free expression and privacy, such as the Whois Database, and possible technical alternatives to domain names, such as identifiers, in light of the current controversy over the proper role of the Internet Corporation for Assigned Names and Numbers. | |||
| Speaker: Mozelle W. Thompson, FTC Commissioner AND Get Me Pastry Cline: 25 Years of Privacy Journal's Wacky Mail | | BIBA | Full-Text | A2 | |
| Mozelle W. Thompson | |||
| On the twenty-fifth anniversary of Privacy Journal, publisher Robert Ellis Smith relates the crazy fan mail, computer-addressing snafus, and threats from government agencies and corporate entities he has known since first publishing a monthly newsletter on privacy in 1974. | |||
| Dinner speaker: Neal Stephenson: Location: Frontenac Ballroom | | BIB | Full-Text | A3 | |
| Neal Stephenson | |||
| Intellectual Property and the Digital Economy | | BIBA | Full-Text | A4 | |
| Pamela Samuelson; Yochai Benkler; David Post; Randall Davis | |||
| New laws are proposed or adopted frequently to strengthen intellectual property rights. Contract and technical protections are strengthening intellectual property protection as well. This past year saw adoption of new trademark domain name cybersquatter legislation, significant developments in the legal protection for the contents of databases, approval of a new licensing law for computer information, and more legislation and caselaw on digital copyright issues, not to mention endorsement of e-commerce and business method patents that will have substantial impacts on computers, freedom and privacy. Some have even proposed giving individuals property rights in their personal information as a way to protect privacy. What are the commercial imperatives seeming to drive toward ever stronger intellectual property rights? How valid are they? What price does society pay for ever stronger intellectual property rights? Is it worth it? | |||
| Lunch speaker: Jessica Litman: The Demonization of Piracy. Location: Frontenac Ballroom | | BIB | Full-Text | A5 | |
| Jessica Litman | |||
| Circumvention: Tool for Freedom or Crime? | | BIB | Full-Text | A6 | |
| Alex Fowler; Paul Schwartz; Barry Steinhardt; Declan McCullagh; Robin Gross | |||
| Keynote speaker: Tim O'Reilly -- Open Source: The Model for Collaboration in the Age of the Internet | | BIBA | Full-Text | A7 | |
| Tim O'Reilly | |||
| Linux and other open source projects such as Perl and Apache are not just of
interest to computer programmers or Wall Street bankers hoping to profit from
their efforts. These projects give us key insights into the nature of
collaboration in the age of the Internet.
The Internet itself started out as a way for computer scientists and other researchers to work together over large distances. In the 1990's, the Internet was discovered as a consumer phenomenon, and is in the process of transforming everything from business processes to entertainment to how people learn and communicate. But in the mad rush to commercialize the Internet, we may be losing sight of the technical and social processes that created this tremendous innovation. The Internet is at bottom an experiment in group collaboration, a self-extending evolutionary technology driven by the needs of its participants to share information. Traditionally, the Internet, and the open source projects associated with it, have governed themselves, set their own standards, and invented new tools from the bottom up. They provide essential lessons for anyone wanting to exploit the power of the internet to coordinate the efforts of widely distributed groups. | |||
| Building Diversity Online | | BIB | Full-Text | A8 | |
| Karen Coyle; Greg Bishop | |||
| Hot Topics: Health Privacy | | BIB | Full-Text | A9 | |
| Ari Schwartz; Greg Miller; Peter Swire; Angela Choy; Rebecca Daugherty | |||
| Lunch speaker: Whitfield Diffie: We Can Tap It for You Wholesale | | BIBA | Full-Text | A10 | |
| Whitfield Diffie | |||
| For reasons of efficiency, business computing is moving away from the networks of autonomous desktop machines that characterized the 80s and 90s towards an outsourcing model of thin desktops and fat servers that is in style reminiscent of the timesharing systems of the 60s and 70s. One unappreciated consequence is the increasing centralization of control over the office worker's environment. The resulting loss of ability to maintain individual machine configurations will add a new dimension of workplace surveillance, even for high level professionals and will adversely affect the privacy of all who work with computers. | |||
| Broadband and Speech | | BIB | Full-Text | A11 | |
| Ari Schwartz; Myles Losch; John Morris; Andrew Clement; Sheridan Scott; Christopher Taylor; David Colville; Liss Jeffrey | |||
| Ten Years of CFP: Looking Back, Looking Forward | | BIB | Full-Text | A12 | |
| Larry Abramson; Stewart Baker; Simon Davies; Barbara Simons; Ben Smilowitz; Jessica Litman; Ronald Plesser | |||