Norm Proselytizers Create a Privacy Entitlement In Cyberspace

Hetcher, Steven A.
June 2001
Berkeley Technology Law Journal;Summer2001 Supplement 1, Vol. 16, p877
Academic Journal
Explores an important development in the informal regulation of online privacy. Significance of privacy norm proselytizers; Examination on the non-moral social meaning of the personal data collection practices; Emphasis on the support of other norm entrepreneurs.


Related Articles

  • Security funds close to being slashed. English, Erin // Australian Personal Computer;Jun95, Vol. 16 Issue 6, p20 

    Reports on the US Congress' plan to reduce funding for computer security research and development programs. Security research cuts' impact on advances in electronic commerce and the United States' success in the world market; Budget cuts in the area of cryptography and encryption.

  • Hackers of the world, unite! Schwartz, J. // Newsweek;7/2/1990, Vol. 116 Issue 1, p36 

    Reports on the government crackdown on computer tampering and the announcement due next week of a new foundation intended to combat computer phobia and provide legal aid from some people snared in the `hacker dragnet.' Investigation is out of proportion; Mitch Kapor, founder of Lotus...

  • Security termed critical component of upcoming digital revolution. McGuire, Mike // PC Week;7/19/93, Vol. 10 Issue 28, p135 

    Reports on the warning issued by a group of industry executives participating in a panel on security and copyright protection at Seybold Digital World Conference. Protection of intellectual property against pranksters and computer criminals; RSA Data Security Inc.'s encryption technology;...

  • Getting cybersecurity right. Johnson, Ron // Hill;3/27/2012, Vol. 19 Issue 39, p20 

    The article offers the author's insights regarding the move of the U.S. government to address the threat of cyberterrorism in the country's computer system through supporting proposals in U.S. Congress which allow the federal government to mandate regulations to the private sectors.

  • Clipper security scheme criticized. Patch, Kimberly // PC Week;6/14/93, Vol. 10 Issue 23, p130 

    Reports on the proposed National Security Agency standard for voice and data encryption. Computer Systems Security and Privacy Advisory Board; Arguments aganist Clipper chip encryption standard; Clipper guidelines; Corporate users stand om the Clipper standard; Problem with encryption business;...

  • Safeguarding national infrastructure.  // Communications News;May99, Vol. 36 Issue 5, p8 

    Reports that representatives from private industry and the United States (US) government gathered to discuss the creation of an information sharing and assessment center (ISAC). Role of the ISAC in the efforts to protect critical infrastructures against cyber attack; Venue of the gathering;...

  • Backdoor blues.  // PC Week;07/13/98, Vol. 15 Issue 28, p65 

    Editorial. States that the United States government should abandon its key-escrow backdoor proposal. The failure of US Department of Commerce advisory committee which was charged with designing a workable architecture for implementing the key-escrow proposal; Why the government wanted the...

  • Rendering Unto CESA? Godwin, Mike // Reason;May2000, Vol. 32 Issue 1, p44 

    Highlights the contradictory encryption policy of United States (US) President Bill Clinton's administration with its support for the Cyberspace Electronic Security Act (CESA). Constitutional problems the law might pose; Result of pioneering work of US cryptographers in the 1970s; Response of...

  • Caught in the Net: Mumbai's Cybercafes.  // Foreign Policy;Nov/Dec2007, Issue 163, p92 

    The article examines attempts on the part of the government of India to observe activity in cybercafes in the city of Mumbai as a means of curbing terrorism. Vijay Mukhi, a advocate of Internet privacy and freedom, denounces the suggestion, claiming that such actions would turn computers into...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics