A comparative study of online privacy regulations in the U.S. and China

[1]  Dan Hazen,et al.  Lost in the Cloud: Research Library Collections and Community in the Digital Age , 2011 .

[2]  D. Atkin,et al.  Predicting Political Discussion in a Censored Virtual Environment , 2011 .

[3]  Ronald J. Deibert,et al.  Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.

[4]  Ronald J. Deibert,et al.  Access Denied: The Practice and Policy of Global Internet Filtering - Book Review , 2009, IEEE Transactions on Professional Communication.

[5]  Jonathan L. Zittrain,et al.  The Future of the Internet - And How to Stop It , 2008 .

[6]  Lingjie Kong Online Privacy in China: A Survey on Information Practices of Chinese Websites , 2007 .

[7]  David J. Atkin,et al.  Cross Media Ownership: An Analysis of Regulations and Practices in Australia, Hong Kong, and Singapore , 2006 .

[8]  David A. Flynn Business Week Online , 2005 .

[9]  Yongnian Zheng,et al.  Information Technology, Public Space, and Collective Action in China , 2005 .

[10]  Christopher E. Beaudoin,et al.  Internet privacy practices of news media and implications for online journalism , 2005 .

[11]  Guobin Yang,et al.  The Internet and the Rise of a Transnational Chinese Cultural Sphere , 2003 .

[12]  S. Margulis Privacy as a Social Issue and Behavioral Concept , 2003 .

[13]  David J. Atkin,et al.  Communication Technology and Society: Audience Adoption and Uses , 2002 .

[14]  Lincoln Dahlberg,et al.  Computer-Mediated Communication and The Public Sphere: A Critical Analysis , 2006, J. Comput. Mediat. Commun..

[15]  Peng Hwa Ang,et al.  The Role of Self-Regulation of Privacy and the Internet , 2001 .

[16]  Catherine M. Beise,et al.  A Study of User Attitudes toward Persistent Cookies , 2001, J. Comput. Inf. Syst..

[17]  Anita L. Allen,et al.  Is privacy now possible? A brief history of an obsession , 2001 .

[18]  Alan B. Albarran,et al.  Understanding the Web : social, political, and economic dimensions of the Internet , 2000 .

[19]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.

[20]  Colin J. Bennett,et al.  The Distribution of Privacy Risks: Who Needs Protection? , 1998, Inf. Soc..

[21]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[22]  J. W. DeCew In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .

[23]  Robert LaRose,et al.  Caller ID and the Meaning of Privacy , 1994, Inf. Soc..

[24]  Judee K. Burgoon,et al.  Privacy and Communication , 1982 .

[25]  R. Gavison Privacy and the Limits of Law , 1980 .

[26]  D. M. Pedersen Dimensions of Privacy , 1979 .

[27]  Laurence H. Tribe,et al.  American Constitutional Law , 1979 .

[28]  Lawrence D. Longley,et al.  The politics of broadcast regulation , 1978 .

[29]  R. Laufer,et al.  Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory , 1977 .

[30]  V. Derlega,et al.  Privacy and self-disclosure in social relationships. , 1977 .

[31]  S. Margulis Conceptions of Privacy: Current Status and Next Steps , 1977 .

[32]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .