[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/332186.332294acmconferencesArticle/Chapter ViewAbstractPublication PagescfpConference Proceedingsconference-collections
Article
Free access

Indirect threats to freedom and privacy: governance of the Internet and the WWW

Published: 01 April 2000 Publication History
First page of PDF

References

[1]
Agre, R (1998) The Internet and Public Discourse. First Monday, 3(3), http://www.firstmonday.dk/ issues/issue3_3/agre/.]]
[2]
Agre, P. (1999).Designing the New Information Services. Educom Review 34(5) http:// www. ed u cause, ed u/Jr/lib rary/h tml/e rm 9953 .h tml.]]
[3]
Bradner, S. (1996) RFC 2026: The Internet Standards Process- Revision 3. http://www.ietLorg/rfc/ rfc2026.txt.]]
[4]
Catlett, J. (1999) Open Letter 9/13 to P3P Developers. http://www.junkbusters.com/standards.html]]
[5]
Fielding, R., et al. (1997) RFC 2616: Hypertext Transfer Protocol- HTTP/1.1http://www.ietf.org/ rfc/rfc2616.txt]]
[6]
Garfinkel, S. The Web's Unelected Government. Technology Review, Nov/Dec. 1998, http:// www.techreview.com/articles/nov98/garfinkel.htm.]]
[7]
Hovey, R. & Bradner, S. (1996) RFC 2028" The Organizations involved in the IETF Standards Process. http://www.ietf.org/ffc/ffc2028.txt]]
[8]
Huitema, C., Postel, J., & Crocker, S. (1995) RFC 1796. Not all RFCs are Standards. http:// www.ietf, org/ffc/rfc 1796.txt.]]
[9]
Internet Architecture Board and Internet Engineering Steering Group (1996) RFC 1984: IAB and IESG Statement on Cryptographic Technology and the Internet. http://www.ietf.org/ffc/ffc1984.txt]]
[10]
IESG Secretary (1999) The IETF's position on technology to support legal intercept. h ttp://www, i e tf. o rg/mail- arc hi v e/i e tf- anno un c e/m s g05435.h tml .]]
[11]
IETF Secretariat & Malkin, G. (1994). RFC 1718: The Tao of IETF- A Guide for new Attendees of the Internet Engineering Task Force http://www.ietf.org/rfc/rfc 1718.txt]]
[12]
Internet Society (1999) Internet Society Mission Statement. http://www.isoc.org/isoc/mission/]]
[13]
Lemmey, T, Klein, S., Neumann, T. (1999) "Architecture is Policy Case Study: Cooperative Development as a Means for Standards-based Implementation for Privacy on the Internet" http:// www. eft. org/pub/Privacy/19990406_E FF_M S_P3 P_Paper/index. html.]]
[14]
Lessig, L. (1998) The Architecture of Privacy http://cyber.law.harvard.edu/works/lessig/ architecture_priv.pdf]]
[15]
Mueller, M. (1999) ICANN and Internet Governance Info 1(6), December 1999, 497-520.]]
[16]
Reagle, J. & Cranor, L. (1999) The Platform for Privacy Preferences. Communications of the ACM 42(2), February 1999. pg. 39-41.]]
[17]
Reagle, J. (1999). Why The Internet is Good: Community Governance that Works Well. http:// cyber.law.harvard.edu/people/reagle/regulation-19990326.html.]]
[18]
Resnick, P. & Miller, J. (1996) PICS: Access Controls Without Censorship. Communications of the ACM 39(10) pp. 87-93.]]
[19]
Schoechle, T. (1999) Towards a Theory of Standards. International Center for Standards. Research. http://www.standardsresearch.org/resources.html]]
[20]
Schoechle, T. (1995) The Emerging Role of Standards Bodies in the Formation of Public Policy. IEEE Standards Bearer 9(2), p 1,10.]]
[21]
Slashdot (2000) Slashdot: News for Nerds. Stuff that Matters. http://www.slashdot.org]]
[22]
Smith. R. (1999) Problems with Web Anonymizing Services. http://www.tiac.net/users/smiths/ anon/anonprob.htm]]
[23]
World Wide Web Consortium (1999) World Wide Web Consortium Process Document. http:// www.w3.org/Consortium/Process/Process- 19991111/]]
[24]
World Wide Web Consortium (1999) How Do We Join? http://www.w3.org/Consortium/Prospectus/ Joining?]]

Cited By

View all
  • (2023)Internet governance and cyber-security: a systematic literature reviewInformation Security Journal: A Global Perspective10.1080/19393555.2023.226860833:2(158-171)Online publication date: 16-Oct-2023
  • (2015)The Internet Design Tension between Surveillance and SecurityIEEE Annals of the History of Computing10.1109/MAHC.2015.2937:2(72-83)Online publication date: Apr-2015
  • (undefined)Our Data, Ourselves: Privacy, Propertization, and GenderSSRN Electronic Journal10.2139/ssrn.374101

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CFP '00: Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
April 2000
351 pages
ISBN:1581132565
DOI:10.1145/332186
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 2000

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. freedom
  2. internet goverance
  3. privacy
  4. standards

Qualifiers

  • Article

Conference

CFP00
Sponsor:
CFP00: The 10th Conference on Computers, Freedom and Privacy
April 4 - 7, 2000
Ontario, Toronto, Canada

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)6
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Internet governance and cyber-security: a systematic literature reviewInformation Security Journal: A Global Perspective10.1080/19393555.2023.226860833:2(158-171)Online publication date: 16-Oct-2023
  • (2015)The Internet Design Tension between Surveillance and SecurityIEEE Annals of the History of Computing10.1109/MAHC.2015.2937:2(72-83)Online publication date: Apr-2015
  • (undefined)Our Data, Ourselves: Privacy, Propertization, and GenderSSRN Electronic Journal10.2139/ssrn.374101

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media