Abstract is missing.
- Getting it Right: Global Internet Policy IssuesJames Dempsey, Veni Markocski, Mas Wigrantoro Roes Setiyadi, Teresa Peters. [doi]
- Friday, April 19th Morning KeynoteJackie Speier. [doi]
- Plenary Session #10: Are the Tools the Rules?: The Future of the Digital CommonsBruce Koball, Dewayne Hendricks. [doi]
- EEF Pioneer AwardsElectronic Frontier Foundation. [doi]
- Reputation in privacy enhancing technologiesRoger Dingledine, Nick Mathewson, Paul Syverson. [doi]
- The US/Mexico border crossing card (BCC): a case study in biometric, machine-readable idAndrew Schulman. [doi]
- A Prognosis for Use of Health, Medical, and Genetic InformationAlex Fowler, Peter Swire 0001, Mary Henderson, Gregory Fowler. [doi]
- The Cisco community fellowship program and Cisco corporate philanthropyMichael Yutrzenka. [doi]
- Security and privacy after September 11: the health care examplePeter Swire 0001, Lauren Steinfeld. [doi]
- Plenary Session #5: how to hack an electionKim Alexander, Ernie Hawkins, Peter G. Neumann, Joe Taggard, Jason Dearen, Andy Neff. [doi]
- Frequently asked questions (and answers) about John Doe anonymity [doi]
- Fact or fiction: privacy in American librariesCarrie Gardner. [doi]
- Statistics and Slobodan: crunching big data for the Milosevic case at the International Criminal Tribunal for Former YugoslaviaPatrick Ball. [doi]
- Amicus: Dendrite International, Inc. v. John DoesPaul Alan Levy, J. C. Salyer. [doi]
- Public records on the internet: the privacy dilemmaBeth Givens. [doi]
- Wednesday, April 17th Luncheon KeynoteTimothy J. Muris. [doi]
- Linking the public voice with the genetic policy process: a case studyGregory Fowler. [doi]
- Unmasking "John Doe" defendants: the case for caution in creating new legal standardsMichael S. Vogel. [doi]
- Access to information after 9/11Lee Tien. [doi]
- How copyright became controversialDrew Clark. [doi]
- Opening SpeakerJames Bamford. [doi]
- ICANN in Year 3Alan Davidson, Peter G. Neumann, Susan Crawford, Karl Auerbach. [doi]
- Motivations behind a role play at CFP: repeated assaults on the constitution by extremist property rights advocatesLance J. Hoffman. [doi]
- The Role of Consumer Education in Protecting PrivacyFran Maier, Paula Bruening, Jim Harper, Mel Petersen, Sarah Andrews. [doi]
- Plenary Session #6: Who Goes There? Privacy in Identity and Location ServicesDan Gillmor, Jason Catlett, Avi Rubin, Brian Arbogast, Roger Cochetti. [doi]
- Closing KeynoteBruce Sterling. [doi]
- The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferencesLorrie Faith Cranor. [doi]
- Executive order establishing office of homeland securityGeorge W. Bush. [doi]
- Impact on internet service providersClint N. Smith. [doi]
- Thursday, April 18th Luncheon keynoteLarry Irving. [doi]
- Wednesday, April 17th Dinner KeynoteBill Lockyer. [doi]
- Executive order on critical infrastructure protectionGeorge W. Bush. [doi]
- Plenary Session #7: Grassroots Goes Global: Activism OnlineMichael Cornfield, Jason Mark, Chris Carlsson, Caruso, Heather Mansfield. [doi]
- Piper rudnick: litigated privacy issuesRonald L. Plesser. [doi]
- Petition: Joan Melvin v. John Doe, et alJoan Melvin. [doi]
- 2002 Orwell AwardsPrivacy International. [doi]
- International Security Cooperation and PrivacySimon Davies, Gus Hosein, Ian Brown, Barry Steinhardt. [doi]
- Open SourceJohn Morris, Tim O'Reilly, Brian Behlendorf, Erwin J. Basinski. [doi]
- A preliminary study at Stanford UniversityRuchika Agrawal, Lily Sarafan, Tami Kameda, Matthew Waddell, Eric Albert, Alana Aldag, Jed Burgess, Enoch Chen, Chris Countryman, Jeremy Ginsberg, Art Hu, Sandra Liu, Walter Luh, Brad Markham, Derek Shanahan, Barbara Simons. [doi]
- Copyright and Innovation: the P2P ExperiencePeter S. Menell, Fred von Lohmann, Sarah Deutsch, Frank Hausmann, Mark Litvack. [doi]
- Amicus: Vincent Donato, et al, v. Stephen Moldow, et alPaul Alan Levy, David C. Vladeck, J. C. Salyer. [doi]