


default search action
10th Conference on Computers, Freedom and Privacy 2000: Toronto, ON, Canada
- Lorrie Faith Cranor:
Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000, Toronto, Ontario, Canada, April 4-7, 2000. ACM 2000, ISBN 978-1-58113-256-4
CFP2000 Online Real-Audio Recordings
- A. Michael Froomkin, Richard Sexton, Karl Auerbach, Jerry Berman, Amadeu Abril:
Domain Names under ICANN: Technical Management or Policy Chokepoint. 1 - Mozelle W. Thompson:
Speaker: Mozelle W. Thompson, FTC Commissioner AND Get Me Pastry Cline: 25 Years of Privacy Journal's Wacky Mail. 2 - Neal Stephenson:
Dinner speaker: Neal Stephenson: Location: Frontenac Ballroom. 3 - Pamela Samuelson, Yochai Benkler, David Post, Randall Davis:
Intellectual Property and the Digital Economy. 4 - Jessica Litman:
Lunch speaker: Jessica Litman: The Demonization of Piracy. Location: Frontenac Ballroom. 5 - Alex Fowler, Paul Schwartz, Barry Steinhardt, Declan McCullagh, Robin Gross:
Circumvention: Tool for Freedom or Crime? 6 - Tim O'Reilly:
Keynote speaker: Tim O'Reilly - Open Source: The Model for Collaboration in the Age of the Internet. 7 - Karen Coyle, Greg Bishop:
Building Diversity Online. 8 - Ari Schwartz, Greg Miller, Peter Swire, Angela Choy, Rebecca Daugherty:
Hot Topics: Health Privacy. 9 - Whitfield Diffie:
Lunch speaker: Whitfield Diffie: We Can Tap It for You Wholesale. 10 - Ari Schwartz, Myles Losch, John Morris, Andrew Clement, Sheridan Scott, Christopher Taylor, David Colville, Liss Jeffrey:
Broadband and Speech. 11 - Lorrie Faith Cranor
:
Ten years of computers, freedom and privacy: a personal retrospective. 11-15 - Larry Abramson, Stewart Baker, Simon Davies, Barbara Simons, Ben Smilowitz, Jessica Litman, Ronald L. Plesser:
Ten Years of CFP: Looking Back, Looking Forward. 12 - Leonard N. Foner:
Introduction to the workshop on freedom and privacy by design. 17-18 - Mark S. Ackerman:
Developing for privacy: civility frameworks and technical design. 19-23 - Anne Adams:
Multimedia information changes the whole privacy ballgame. 25-32 - Colin J. Bennett:
An international standard for privacy protection: objections to the objections. 33-38 - Ian Brown, Gus Hosein:
Serve yourself: shifting power away from the brothers. 39-41 - Roger Clarke
:
Notes for the workshop on freedom and privacy by design. 43-44 - Lorrie Faith Cranor
, Rebecca N. Wright:
Influencing software usage. 45-55 - Oliver Berthold, Hannes Federrath, Marit Köhntopp:
Project "anonymity and unobservability in the Internet". 57-65 - Matthew K. Franklin, Tomas Sander:
Deniable payments and electronic campaign finance. 67-68 - Harry Hochheiser
:
Principles for privacy protection software. 69-72 - Tad Hogg, Bernardo A. Huberman, Matthew K. Franklin:
Protecting privacy while sharing information in electronic communities. 73-75 - Andrew R. Mark:
The development of destination-specific biometric authentication. 77-80 - Deirdre K. Mulligan, Ari Schwartz:
Your place or mine?: privacy concerns and solutions for server and client-side storage of personal information. 81-84 - Adam Shostack, Ian Goldberg:
How not to design a privacy system: reflections on the process behind the Freedom product. 85-87 - Jonathan Weinberg:
Global ID, trusted systems, and communications markets. 89-96 - Rebecca N. Wright:
Obstacles to freedom and privacy by design. 97-100 - James X. Dempsey:
Overview of current criminal justice information systems. 101-106 - Steve Talbott:
The trouble with ubiquitous technology pushers. 107-113 - Robert Ellis:
Security and privacy in broadband Internet services. 115-116 - Miles Losch:
Freedom and choice in broadband Internet access. 117 - John B. Morris Jr., Jerry Berman:
The broadband Internet: the end of the equal voice? 119-128 - Simson L. Garfinkel
:
My net connection approaches light speed with cable, but that doesn't guarantee victory over DSL. 129-135 - Ann Cavoukian:
Privacy commissioners: powermongers, pragmatists or patsies? 137-139 - Stephen Lau:
The Hong Kong personal data (privacy) ordinance. 141-143 - Malcolm Crompton:
The Privacy Act and the Australian Federal Privacy Commissioner's functions. 145-148 - Duncan Campbell:
Global surveillance: the evidence for Echelon. 149-154 - Jason Catlett:
Panel on infomediaries and negotiated privacy techniques. 155-156 - Jason Catlett:
Open letter to P3P developers & replies. 157-164 - Beth Givens:
Infomediaries and negotiated privacy: resources. 165-166 - Alexander Dix:
Infomediaries and negotiated privacy techniques. 167 - Bruce Umbaugh:
People as subjects and as objects: contrasting market and academic research. 169-171 - Giancarlo Livraghi:
The network society as seen by two European underdogs. 173-181 - David Casacuberta
:
The creation of an on-line community: the Spanish case. 183-187 - Andrea Monti:
The network society as seen by two European underdogs. 189-193 - Ann Cavoukian:
The media and privacy: friend, foe or folly? 195-196 - Raymond Wacks:
Confronting dogma: privacy, free speech, and the Internet. 197-204 - Margot Saunders:
The third millennium digital commerce act. 205-211 - Carl M. Ellison:
Naming and certificates. 213-217 - Lance J. Hoffman:
Internet voting: will it spur or corrupt democracy? 219-223 - David J. Phillips:
Privacy technologies as political issues: consumption as mobilization. 225-227 - Paul W. Craft:
Internet voting: spurring or corrupting democracy? 229-230 - Berry Schoenmakers:
Compensating for a lack of transparency. 231-233 - Christopher D. Hunter:
Negotiating the global Internet rating and filtering system: opposing views of the Bertelsmann foundation's self-regulation of Internet content proposal. 235-238 - Leslie Regan Shade:
Is technology neutral?: space, time and the biases of communication. 239-241 - Paulina Borsook:
Imperial Silicon Valley. 243 - Marita Moll:
The classroom as panopticon; protecting your rights in the technology-enhanced workplace. 245-248 - Harry Hochheiser
:
Indirect threats to freedom and privacy: governance of the Internet and the WWW. 249-254 - Timothy Schoechle:
The emerging role of standards bodies in the formation of public policy. 255-257 - Jim C. Tam:
Personal data privacy in the Asia Pacific: a real possibility. 259-262 - Kate Lundy:
Personal data privacy in the Pacific Rim. 263-265 - Deirdre K. Mulligan, James X. Dempsey:
Square pegs & round holes: applying campaign finance law to the Internet - risks to free expression and democratic values. 267-273 - Fred Wertheimer:
The Internet and campaign finance laws. 275-280 - Peter P. Swire:
Privacy excerpt from "Towards Digital eQuality: the U.S. Government working group on electronic commerce". 281-284 - Sara Basse, L. Jean Camp, Dan Gillmor, Wiley Hodges, Bruce Umbaugh, Danny Yee:
Student paper competition (abstract only). 285 - Christopher D. Hunter:
Internet filter effectiveness (student paper panel): testing over and underinclusive blocking decisions of four popular filters. 287-294 - Patrick Feng
:
When social meets technical (student paper panel): ethics and the design of "social" technologies. 295-301 - Mark V. Hurwitz:
Quantum "encryption" (student paper panel). 303-313

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.