


default search action
10th Conference on Computers, Freedom and Privacy 2000: Toronto, ON, Canada
- Lorrie Faith Cranor:

Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000, Toronto, Ontario, Canada, April 4-7, 2000. ACM 2000, ISBN 978-1-58113-256-4
CFP2000 Online Real-Audio Recordings
- A. Michael Froomkin, Richard Sexton, Karl Auerbach, Jerry Berman, Amadeu Abril:

Domain Names under ICANN: Technical Management or Policy Chokepoint. 1 - Mozelle W. Thompson:

Speaker: Mozelle W. Thompson, FTC Commissioner AND Get Me Pastry Cline: 25 Years of Privacy Journal's Wacky Mail. 2 - Neal Stephenson:

Dinner speaker: Neal Stephenson: Location: Frontenac Ballroom. 3 - Pamela Samuelson, Yochai Benkler, David Post, Randall Davis:

Intellectual Property and the Digital Economy. 4 - Jessica Litman:

Lunch speaker: Jessica Litman: The Demonization of Piracy. Location: Frontenac Ballroom. 5 - Alex Fowler, Paul Schwartz, Barry Steinhardt, Declan McCullagh, Robin Gross:

Circumvention: Tool for Freedom or Crime? 6 - Tim O'Reilly:

Keynote speaker: Tim O'Reilly - Open Source: The Model for Collaboration in the Age of the Internet. 7 - Karen Coyle, Greg Bishop:

Building Diversity Online. 8 - Ari Schwartz, Greg Miller, Peter Swire, Angela Choy, Rebecca Daugherty:

Hot Topics: Health Privacy. 9 - Whitfield Diffie:

Lunch speaker: Whitfield Diffie: We Can Tap It for You Wholesale. 10 - Ari Schwartz, Myles Losch, John Morris, Andrew Clement, Sheridan Scott, Christopher Taylor, David Colville, Liss Jeffrey:

Broadband and Speech. 11 - Lorrie Faith Cranor

:
Ten years of computers, freedom and privacy: a personal retrospective. 11-15 - Larry Abramson, Stewart Baker, Simon Davies, Barbara Simons, Ben Smilowitz, Jessica Litman, Ronald L. Plesser:

Ten Years of CFP: Looking Back, Looking Forward. 12 - Leonard N. Foner:

Introduction to the workshop on freedom and privacy by design. 17-18 - Mark S. Ackerman:

Developing for privacy: civility frameworks and technical design. 19-23 - Anne Adams:

Multimedia information changes the whole privacy ballgame. 25-32 - Colin J. Bennett:

An international standard for privacy protection: objections to the objections. 33-38 - Ian Brown, Gus Hosein:

Serve yourself: shifting power away from the brothers. 39-41 - Roger Clarke

:
Notes for the workshop on freedom and privacy by design. 43-44 - Lorrie Faith Cranor

, Rebecca N. Wright:
Influencing software usage. 45-55 - Oliver Berthold, Hannes Federrath, Marit Köhntopp:

Project "anonymity and unobservability in the Internet". 57-65 - Matthew K. Franklin, Tomas Sander:

Deniable payments and electronic campaign finance. 67-68 - Harry Hochheiser

:
Principles for privacy protection software. 69-72 - Tad Hogg, Bernardo A. Huberman, Matthew K. Franklin:

Protecting privacy while sharing information in electronic communities. 73-75 - Andrew R. Mark:

The development of destination-specific biometric authentication. 77-80 - Deirdre K. Mulligan, Ari Schwartz:

Your place or mine?: privacy concerns and solutions for server and client-side storage of personal information. 81-84 - Adam Shostack, Ian Goldberg:

How not to design a privacy system: reflections on the process behind the Freedom product. 85-87 - Jonathan Weinberg:

Global ID, trusted systems, and communications markets. 89-96 - Rebecca N. Wright:

Obstacles to freedom and privacy by design. 97-100 - James X. Dempsey:

Overview of current criminal justice information systems. 101-106 - Steve Talbott:

The trouble with ubiquitous technology pushers. 107-113 - Robert Ellis:

Security and privacy in broadband Internet services. 115-116 - Miles Losch:

Freedom and choice in broadband Internet access. 117 - John B. Morris Jr., Jerry Berman:

The broadband Internet: the end of the equal voice? 119-128 - Simson L. Garfinkel

:
My net connection approaches light speed with cable, but that doesn't guarantee victory over DSL. 129-135 - Ann Cavoukian:

Privacy commissioners: powermongers, pragmatists or patsies? 137-139 - Stephen Lau:

The Hong Kong personal data (privacy) ordinance. 141-143 - Malcolm Crompton:

The Privacy Act and the Australian Federal Privacy Commissioner's functions. 145-148 - Duncan Campbell:

Global surveillance: the evidence for Echelon. 149-154 - Jason Catlett:

Panel on infomediaries and negotiated privacy techniques. 155-156 - Jason Catlett:

Open letter to P3P developers & replies. 157-164 - Beth Givens:

Infomediaries and negotiated privacy: resources. 165-166 - Alexander Dix:

Infomediaries and negotiated privacy techniques. 167 - Bruce Umbaugh:

People as subjects and as objects: contrasting market and academic research. 169-171 - Giancarlo Livraghi:

The network society as seen by two European underdogs. 173-181 - David Casacuberta

:
The creation of an on-line community: the Spanish case. 183-187 - Andrea Monti:

The network society as seen by two European underdogs. 189-193 - Ann Cavoukian:

The media and privacy: friend, foe or folly? 195-196 - Raymond Wacks:

Confronting dogma: privacy, free speech, and the Internet. 197-204 - Margot Saunders:

The third millennium digital commerce act. 205-211 - Carl M. Ellison:

Naming and certificates. 213-217 - Lance J. Hoffman:

Internet voting: will it spur or corrupt democracy? 219-223 - David J. Phillips:

Privacy technologies as political issues: consumption as mobilization. 225-227 - Paul W. Craft:

Internet voting: spurring or corrupting democracy? 229-230 - Berry Schoenmakers:

Compensating for a lack of transparency. 231-233 - Christopher D. Hunter:

Negotiating the global Internet rating and filtering system: opposing views of the Bertelsmann foundation's self-regulation of Internet content proposal. 235-238 - Leslie Regan Shade:

Is technology neutral?: space, time and the biases of communication. 239-241 - Paulina Borsook:

Imperial Silicon Valley. 243 - Marita Moll:

The classroom as panopticon; protecting your rights in the technology-enhanced workplace. 245-248 - Harry Hochheiser

:
Indirect threats to freedom and privacy: governance of the Internet and the WWW. 249-254 - Timothy Schoechle:

The emerging role of standards bodies in the formation of public policy. 255-257 - Jim C. Tam:

Personal data privacy in the Asia Pacific: a real possibility. 259-262 - Kate Lundy:

Personal data privacy in the Pacific Rim. 263-265 - Deirdre K. Mulligan, James X. Dempsey:

Square pegs & round holes: applying campaign finance law to the Internet - risks to free expression and democratic values. 267-273 - Fred Wertheimer:

The Internet and campaign finance laws. 275-280 - Peter P. Swire:

Privacy excerpt from "Towards Digital eQuality: the U.S. Government working group on electronic commerce". 281-284 - Sara Basse, L. Jean Camp, Dan Gillmor, Wiley Hodges, Bruce Umbaugh, Danny Yee:

Student paper competition (abstract only). 285 - Christopher D. Hunter:

Internet filter effectiveness (student paper panel): testing over and underinclusive blocking decisions of four popular filters. 287-294 - Patrick Feng

:
When social meets technical (student paper panel): ethics and the design of "social" technologies. 295-301 - Mark V. Hurwitz:

Quantum "encryption" (student paper panel). 303-313

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














