All Academic, Inc. Research Logo

Info/CitationFAQResearchAll Academic Inc.
Document

Freedom of Speech and Segmenting the Citizens
Unformatted Document Text:  ICA-10-10582 24 References Baker, E. C. (1992). "Advertising and A Democratic Press." University of Pennsylvania Law Review 140(6): 2097-2235. Baker, E. C. (1998). "The Media that Citizens Need." University of Pennsylvania Law Review 147: 317-408. Bennett, W. L. and J. B. Manheim (2001). The Big Spin: Strategic Communication and the Transformation of Pluralist Democracy. Mediated Politics: Communication in the Future of Democracy. R. M. Entman. Cambridge, Cambridge University Press: 279-298. Bland v. Fessler, 88 F.3d 729 (U.S. Ct. App. 1996). Bolger et Al. v. Youngs Corp., 463 U.S. 60 (1983). Buckley v. Valeo, 424 U.S.1 (1976) Cate, F. H. (1997). Privacy in The Information Age. Washington D.C., Brookings Institution Press. Cohen, J. E. (1996). "A Right to Read Anonymously: A Closer Look at "Copyright Management" in Cyberspace." Connecticut Law Review 28: 981-1058. Cohen, J. E. (2000). "Examined Lives: Informational Privacy and the Subject as Object." Stanford Law Review 52(5): 1373-1438. Cohen, J. E. (2001). Privacy, Ideology, and Technology: A Response to Jeffrey Rosen. Consolidated Edison Co. v. Public Service Commission, 447 U.S. 530 (1980). Dahlgren, P. (2001). The Public Sphere and the Net: Structure, Space, and Communication. Mediated Politics: Communication in the Future of Democracy. R. M. Entman. Cambridge, Cambridge University Press:33-55. Edelman, M. (2001). The Politics of Misinformation. Cambridge, Cambridge University Press. Electronic Privacy Information Center (2002). “Public Opinion on Privacy.” Available online: http://www.epic.org/privacy/survey/default.html. Visited: October 18, 2002 Gandy, O. H. (1996). "Legitimate Business Interest: No End in Sight? An Inquiry into the Status of Privacy in Cyberspace." University of Chicago Legal Forum 1996: 77-137. Gandy, O. H. (2000). "Exploring Identity and Identification in Cyberspace." NotreDame Journal of Law, Ethics and Public Policy 14(2): 1085-1111. Gandy, O. H. (2001). Dividing Practices: Segmentation and Targeting in the Emerging Public Sphere. Mediated Politics: Communication in the Future of Democracy. R. M. Entman. Cambridge, Cambridge University Press: 141-160. Gandy, O. H. (2002). Data Mining And Surveillance in the Post-9.11 Environment. IAMCR, Barcelona. Gavison, R. (1980). "Privacy and The Limits oof Law." Yale Law Journal 89: 421-471. Giddens, A. (1984). The Constitution of Society. Berkeley and Los Angeles, University of California Press: 402. Habermas, J. (1998). Between Facts And Norms: Contributions to a Discourse Theory of Law and Democracy. Boston, MIT Press. Kang, J. (1998). "Information Privacy in Cyberspace Transactions." Stanford Law Review 50: 1193-1294. Kang, J. (2000). "Cyber-Race." Harvard Law Preview 113: 1130-1208. Lessig, L. (1999). Privacy. Code and Other Laws of Cyberspace. New York, Basic Books: 142-163. Lyon, D. (2001). Surveillance Society: Monitoring Everyday Life. Philadelphia, Open University Press. Lysaght v. State of New Jersey, 837 F. Supp. 646 (D. NJ. 1993). Madison, J. (1787). The Size and Variety of the Union as a Check on Faction: The Federalist No.10. Marx, G. (1988). Unintended Consequences: Targets, Third Parties, and Informers. Undercover Police Surveillance in America. Berkeley, CA, University of California Press: 127-158.

Authors: Popescu, Mihaela. and Baruh, Lemi.
first   previous   Page 25 of 26   next   last



background image
ICA-10-10582
24
References
Baker, E. C. (1992). "Advertising and A Democratic Press." University of Pennsylvania Law Review 140(6):
2097-2235.
Baker, E. C. (1998). "The Media that Citizens Need." University of Pennsylvania Law Review 147: 317-408.
Bennett, W. L. and J. B. Manheim (2001). The Big Spin: Strategic Communication and the Transformation of
Pluralist Democracy. Mediated Politics: Communication in the Future of Democracy. R. M. Entman.
Cambridge, Cambridge University Press: 279-298.
Bland v. Fessler, 88 F.3d 729 (U.S. Ct. App. 1996).
Bolger et Al. v. Youngs Corp., 463 U.S. 60 (1983).
Buckley v. Valeo, 424 U.S.1 (1976)
Cate, F. H. (1997). Privacy in The Information Age. Washington D.C., Brookings Institution Press.
Cohen, J. E. (1996). "A Right to Read Anonymously: A Closer Look at "Copyright Management" in
Cyberspace." Connecticut Law Review 28: 981-1058.
Cohen, J. E. (2000). "Examined Lives: Informational Privacy and the Subject as Object." Stanford Law Review
52(5): 1373-1438.
Cohen, J. E. (2001). Privacy, Ideology, and Technology: A Response to Jeffrey Rosen.
Consolidated Edison Co. v. Public Service Commission, 447 U.S. 530 (1980).
Dahlgren, P. (2001). The Public Sphere and the Net: Structure, Space, and Communication. Mediated Politics:
Communication in the Future of Democracy. R. M. Entman. Cambridge, Cambridge University Press:
33-55.
Edelman, M. (2001). The Politics of Misinformation. Cambridge, Cambridge University Press.
Electronic Privacy Information Center (2002). “Public Opinion on Privacy.” Available online:
http://www.epic.org/privacy/survey/default.html. Visited: October 18, 2002
Gandy, O. H. (1996). "Legitimate Business Interest: No End in Sight? An Inquiry into the Status of Privacy in
Cyberspace." University of Chicago Legal Forum 1996: 77-137.
Gandy, O. H. (2000). "Exploring Identity and Identification in Cyberspace." NotreDame Journal of Law, Ethics
and Public Policy 14(2): 1085-1111.
Gandy, O. H. (2001). Dividing Practices: Segmentation and Targeting in the Emerging Public Sphere. Mediated
Politics: Communication in the Future of Democracy. R. M. Entman. Cambridge, Cambridge
University Press: 141-160.
Gandy, O. H. (2002). Data Mining And Surveillance in the Post-9.11 Environment. IAMCR, Barcelona.
Gavison, R. (1980). "Privacy and The Limits oof Law." Yale Law Journal 89: 421-471.
Giddens, A. (1984). The Constitution of Society. Berkeley and Los Angeles, University of California Press:
402.
Habermas, J. (1998). Between Facts And Norms: Contributions to a Discourse Theory of Law and Democracy.
Boston, MIT Press.
Kang, J. (1998). "Information Privacy in Cyberspace Transactions." Stanford Law Review 50: 1193-1294.
Kang, J. (2000). "Cyber-Race." Harvard Law Preview 113: 1130-1208.
Lessig, L. (1999). Privacy. Code and Other Laws of Cyberspace. New York, Basic Books: 142-163.
Lyon, D. (2001). Surveillance Society: Monitoring Everyday Life. Philadelphia, Open University Press.
Lysaght v. State of New Jersey, 837 F. Supp. 646 (D. NJ. 1993).
Madison, J. (1787). The Size and Variety of the Union as a Check on Faction: The Federalist No.10.
Marx, G. (1988). Unintended Consequences: Targets, Third Parties, and Informers. Undercover Police
Surveillance in America. Berkeley, CA, University of California Press: 127-158.


Convention
Convention is an application service for managing large or small academic conferences, annual meetings, and other types of events!
Submission - Custom fields, multiple submission types, tracks, audio visual, multiple upload formats, automatic conversion to pdf.
Review - Peer Review, Bulk reviewer assignment, bulk emails, ranking, z-score statistics, and multiple worksheets!
Reports - Many standard and custom reports generated while you wait. Print programs with participant indexes, event grids, and more!
Scheduling - Flexible and convenient grid scheduling within rooms and buildings. Conflict checking and advanced filtering.
Communication - Bulk email tools to help your administrators send reminders and responses. Use form letters, a message center, and much more!
Management - Search tools, duplicate people management, editing tools, submission transfers, many tools to manage a variety of conference management headaches!
Click here for more information.

first   previous   Page 25 of 26   next   last

©2012 All Academic, Inc.