HCI Bibliography Home | HCI Conferences | CFP Archive | Detailed Records | RefWorks | EndNote | Hide Abstracts
CFP Tables of Contents: 920002

Proceedings of the 2000 Conference on Computers, Freedom and Privacy

Fullname:Proceedings of the Tenth Conference on Computers, Freedom and Privacy
Note:Challenging the Assumptions
Editors:Lorrie Faith Cranor
Location:Toronto, Ontario, Canada
Dates:2000-Apr-04 to 2000-Apr-07
Standard No:ISBN: 1-58113-256-5; ACM DL: Table of Contents hcibib: CFP00
Links:Conference Home Page
  1. CFP2000 Online Real-Audio Recordings
Ten years of computers, freedom and privacy: a personal retrospective BIBFull-Text 11-15
  Lorrie Faith Cranor
Introduction to the workshop on freedom and privacy by design BIBFull-Text 17-18
  Lenny Foner
Developing for privacy: civility frameworks and technical design BIBFull-Text 19-23
  Mark S. Ackerman
Multimedia information changes the whole privacy ballgame BIBFull-Text 25-32
  Anne Adams
An international standard for privacy protection: objections to the objections BIBFull-Text 33-38
  Colin J. Bennett
Serve yourself: shifting power away from the brothers BIBFull-Text 39-41
  Ian Brown; Gus Hosein
Notes for the workshop on freedom and privacy by design BIBFull-Text 43-44
  Roger Clarke
Influencing software usage BIBFull-Text 45-55
  Lorrie Faith Cranor; Rebecca N. Wright
Project "anonymity and unobservability in the Internet" BIBFull-Text 57-65
  Oliver Berthold; Hannes Federrath; Marit Köhntopp
Deniable payments and electronic campaign finance BIBFull-Text 67-68
  Matt Franklin; Tomas Sander
Principles for privacy protection software BIBFull-Text 69-72
  Harry Hochheiser
Protecting privacy while sharing information in electronic communities BIBFull-Text 73-75
  Tad Hogg; Bernardo A. Huberman; Matt Franklin
The development of destination-specific biometric authentication BIBFull-Text 77-80
  Andrew R. Mark
Your place or mine?: privacy concerns and solutions for server and client-side storage of personal information BIBFull-Text 81-84
  Deirdre Mulligan; Ari Schwartz
How not to design a privacy system: reflections on the process behind the Freedom product BIBFull-Text 85-87
  Adam Shostack; Ian Goldberg
Global ID, trusted systems, and communications markets BIBFull-Text 89-96
  Jonathan Weinberg
Obstacles to freedom and privacy by design BIBFull-Text 97-100
  Rebecca N. Wright
Overview of current criminal justice information systems BIBFull-Text 101-106
  James X. Dempsey
The trouble with ubiquitous technology pushers BIBFull-Text 107-113
  Steve Talbott
Security and privacy in broadband Internet services BIBFull-Text 115-116
  Robert Ellis
Freedom and choice in broadband Internet access BIBFull-Text 117
  Miles Losch
The broadband Internet: the end of the equal voice? BIBFull-Text 119-128
  John B., Jr. Morris; Jerry Berman
My net connection approaches light speed with cable, but that doesn't guarantee victory over DSL BIBFull-Text 129-135
  Simson Garfinkel
Privacy commissioners: powermongers, pragmatists or patsies? BIBFull-Text 137-139
  Ann Cavoukian
The Hong Kong personal data (privacy) ordinance BIBFull-Text 141-143
  Stephen Lau
The Privacy Act and the Australian Federal Privacy Commissioner's functions BIBFull-Text 145-148
  Malcolm Crompton
Global surveillance: the evidence for Echelon BIBFull-Text 149-154
  Duncan Campbell
Panel on infomediaries and negotiated privacy techniques BIBFull-Text 155-156
  Jason Catlett
Open letter to P3P developers & replies BIBFull-Text 157-164
  Jason Catlett
Infomediaries and negotiated privacy: resources BIBFull-Text 165-166
  Beth Givens
Infomediaries and negotiated privacy techniques BIBFull-Text 167
  Alexander Dix
People as subjects and as objects: contrasting market and academic research BIBFull-Text 169-171
  Bruce Umbaugh
The network society as seen by two European underdogs BIBFull-Text 173-181
  Giancarlo Livraghi
The creation of an on-line community: the Spanish case BIBFull-Text 183-187
  David Casacuberta
The network society as seen by two European underdogs BIBFull-Text 189-193
  Andrea Monti
The media and privacy: friend, foe or folly? BIBFull-Text 195-196
  Ann Cavoukian
Confronting dogma: privacy, free speech, and the Internet BIBFull-Text 197-204
  Raymond Wacks
The third millennium digital commerce act BIBFull-Text 205-211
  Margot Saunders
Naming and certificates BIBFull-Text 213-217
  Carl M. Ellison
Internet voting: will it spur or corrupt democracy? BIBFull-Text 219-223
  Lance J. Hoffman
Privacy technologies as political issues: consumption as mobilization BIBFull-Text 225-227
  David J. Phillips
Internet voting: spurring or corrupting democracy? BIBFull-Text 229-230
  Paul W. Craft
Compensating for a lack of transparency BIBFull-Text 231-233
  Berry Schoenmakers
Negotiating the global Internet rating and filtering system: opposing views of the Bertelsmann foundation's self-regulation of Internet content proposal BIBFull-Text 235-238
  Christopher D. Hunter
Is technology neutral?: space, time and the biases of communication BIBFull-Text 239-241
  Leslie Regan Shade
Imperial Silicon Valley BIBFull-Text 243
  Paulina Borsook
The classroom as panopticon; protecting your rights in the technology-enhanced workplace BIBFull-Text 245-248
  Marita Moll
Indirect threats to freedom and privacy: governance of the Internet and the WWW BIBKFull-Text 249-254
  Harry Hochheiser
Keywords: freedom, internet goverance, privacy, standards
The emerging role of standards bodies in the formation of public policy BIBFull-Text 255-257
  Timothy Schoechle
Personal data privacy in the Asia Pacific: a real possibility BIBFull-Text 259-262
  Jim C. Tam
Personal data privacy in the Pacific Rim BIBFull-Text 263-265
  Kate Lundy
Square pegs & round holes: applying campaign finance law to the Internet -- risks to free expression and democratic values BIBFull-Text 267-273
  Deirdre Mulligan; James X. Dempsey
The Internet and campaign finance laws BIBFull-Text 275-280
  Fred Wertheimer
Privacy excerpt from "Towards Digital eQuality: the U.S. Government working group on electronic commerce" BIBFull-Text 281-284
  Peter P. Swire
Student paper competition (abstract only) BIBAFull-Text 285
  Sara Basse; Jean Camp; Dan Gillmor; Wiley Hodges; Bruce Umbaugh; Danny Yee
The top three papers from the CFP 2000 student paper competition have been printed in this proceedings. They are:
  • Internet filter effectiveness: testing over and underinclusive blocking
       decisions of four popular filters. Christopher D. Hunter. Pages 287-294
  • When social meets technical: ethics and the design of "social" technologies.
       Patrick Feng. Pages 295-301
  • Quantum "encryption" Mark V. Hurwitz. Pages 303-313
  • Internet filter effectiveness (student paper panel): testing over and underinclusive blocking decisions of four popular filters BIBFull-Text 287-294
      Christopher D. Hunter
    When social meets technical (student paper panel): ethics and the design of "social" technologies BIBFull-Text 295-301
      Patrick Feng
    Quantum "encryption" (student paper panel) BIBFull-Text 303-313
      Mark V. Hurwitz

    CFP2000 Online Real-Audio Recordings

    Domain Names under ICANN: Technical Management or Policy Chokepoint BIBAFull-Text A1
      Michael Froomkin; Richard Sexton; Karl Auerbach; Jerry Berman; Amadeu Abril
    Domain name management can be regarded as strictly an issue of technical stability, or can also be seen as a potential chokepoint in an otherwise open, decentralized medium. In this panel, privacy advocates and technical experts will discuss the potential bottlenecks for free expression and privacy, such as the Whois Database, and possible technical alternatives to domain names, such as identifiers, in light of the current controversy over the proper role of the Internet Corporation for Assigned Names and Numbers.
    Speaker: Mozelle W. Thompson, FTC Commissioner AND Get Me Pastry Cline: 25 Years of Privacy Journal's Wacky Mail BIBAFull-Text A2
      Mozelle W. Thompson
    On the twenty-fifth anniversary of Privacy Journal, publisher Robert Ellis Smith relates the crazy fan mail, computer-addressing snafus, and threats from government agencies and corporate entities he has known since first publishing a monthly newsletter on privacy in 1974.
    Dinner speaker: Neal Stephenson: Location: Frontenac Ballroom BIBFull-Text A3
      Neal Stephenson
    Intellectual Property and the Digital Economy BIBAFull-Text A4
      Pamela Samuelson; Yochai Benkler; David Post; Randall Davis
    New laws are proposed or adopted frequently to strengthen intellectual property rights. Contract and technical protections are strengthening intellectual property protection as well. This past year saw adoption of new trademark domain name cybersquatter legislation, significant developments in the legal protection for the contents of databases, approval of a new licensing law for computer information, and more legislation and caselaw on digital copyright issues, not to mention endorsement of e-commerce and business method patents that will have substantial impacts on computers, freedom and privacy. Some have even proposed giving individuals property rights in their personal information as a way to protect privacy. What are the commercial imperatives seeming to drive toward ever stronger intellectual property rights? How valid are they? What price does society pay for ever stronger intellectual property rights? Is it worth it?
    Lunch speaker: Jessica Litman: The Demonization of Piracy. Location: Frontenac Ballroom BIBFull-Text A5
      Jessica Litman
    Circumvention: Tool for Freedom or Crime? BIBFull-Text A6
      Alex Fowler; Paul Schwartz; Barry Steinhardt; Declan McCullagh; Robin Gross
    Keynote speaker: Tim O'Reilly -- Open Source: The Model for Collaboration in the Age of the Internet BIBAFull-Text A7
      Tim O'Reilly
    Linux and other open source projects such as Perl and Apache are not just of interest to computer programmers or Wall Street bankers hoping to profit from their efforts. These projects give us key insights into the nature of collaboration in the age of the Internet.
       The Internet itself started out as a way for computer scientists and other researchers to work together over large distances. In the 1990's, the Internet was discovered as a consumer phenomenon, and is in the process of transforming everything from business processes to entertainment to how people learn and communicate. But in the mad rush to commercialize the Internet, we may be losing sight of the technical and social processes that created this tremendous innovation.
       The Internet is at bottom an experiment in group collaboration, a self-extending evolutionary technology driven by the needs of its participants to share information. Traditionally, the Internet, and the open source projects associated with it, have governed themselves, set their own standards, and invented new tools from the bottom up. They provide essential lessons for anyone wanting to exploit the power of the internet to coordinate the efforts of widely distributed groups.
    Building Diversity Online BIBFull-Text A8
      Karen Coyle; Greg Bishop
    Hot Topics: Health Privacy BIBFull-Text A9
      Ari Schwartz; Greg Miller; Peter Swire; Angela Choy; Rebecca Daugherty
    Lunch speaker: Whitfield Diffie: We Can Tap It for You Wholesale BIBAFull-Text A10
      Whitfield Diffie
    For reasons of efficiency, business computing is moving away from the networks of autonomous desktop machines that characterized the 80s and 90s towards an outsourcing model of thin desktops and fat servers that is in style reminiscent of the timesharing systems of the 60s and 70s. One unappreciated consequence is the increasing centralization of control over the office worker's environment. The resulting loss of ability to maintain individual machine configurations will add a new dimension of workplace surveillance, even for high level professionals and will adversely affect the privacy of all who work with computers.
    Broadband and Speech BIBFull-Text A11
      Ari Schwartz; Myles Losch; John Morris; Andrew Clement; Sheridan Scott; Christopher Taylor; David Colville; Liss Jeffrey
    Ten Years of CFP: Looking Back, Looking Forward BIBFull-Text A12
      Larry Abramson; Stewart Baker; Simon Davies; Barbara Simons; Ben Smilowitz; Jessica Litman; Ronald Plesser