第二章 当乔治·奥威尔遇见马克·扎克伯格
[1]. Federal Trade Commission,“FTC Staff Report:Self-Regulatory Principles for Online Be-havioral Advertising—Behavioral Advertising:Tracking, Targeting,&Technology,”2009 WL 361109 at 4(Febru-ary 2009).
[2]. Audience Science Press Release,“State of Audience Targeting Industry Study:50%of A-dvertisers Set to Boost Spending on Audience Targeting in 2011,”Jan.11,2011,audiencescience/uk/press-room/press-releases/2011/state-audience-targeting-industry-study-50-advertisers-set-boost-spen.
[3]. Internet Advertising Bureau, Internet Advertising Revenue Report,2010 Full Year Results, April 2011,iab/insights_research/947883/adrevenuereport.
[4]. ComScore Press Release,“Americans Received 1 Trillion Display Ads in Q1 2010 as Online Ad-vertising Market Rebounds from 2009 Recession,”May 13,2010,comscore/Press_Events/Press_Releases/2010/5/Americans_Received_1_Trillion_Display_Ads_in_Q1_2010_as_Online_Advertis-ing_Market_Rebounds_from_2009_Recession.
[5]. Louise Story,“F.T.C.to Review Online Ads and Privacy,”The New York Times, Nov.1,2007,at C1,nytimes/2007/11/01/technology/01Privacy.html?ref=technology.
[6]. Nicholas Carlson,“Facebook Expected to File for MYM100 Billion IPO This Year,”June 13,2011,businessinsider/facebook-ipo-could-come-in-q1-2012-after-october-filing-cnbc-reports-2011-6.
[7]. Stephanie Reese,“Quick Stat:Facebook to Bring in MYM4.05 Billion in Ad Revenues This Year,”April 26,2011,emarketer/blog/index.php/tag/facebook-ad-revenue/.
[8]. Cory Doctorow, Talk at TEDx Observer,2011,http://tedxtalks.ted/video/TEDxObserver-Cory-Doctorow.
[9]. Cory Doctorow, Talk at TEDx Observer,2011,http://tedxtalks.ted/video/TEDxObserver-Cory-Doctorow.
[10]. Complaint at 2,Valentine v.NebuAd, Inc.,No.C08-05113 TEH(N.D.Cal.Nov.10,2008);Karl Bode,“Infighting at ISPs over Using NebuAD,”May 29,2008,dslreports/shownews/Infight-284ing-At-ISPs-Over-Using-NebuAD-94835;Valentine v. NebuAd, Inc.,2011WL 1296111(N.D.Cal.2011).
[11]. Complaint at 2,Valentine v.NebuAd, Inc.,No.C08-05113 TEH(N.D.Cal.Nov.10,2008).
[12]. John L.McKnight, Curriculum Vita, northwestern.edu/ipr/people/jlmvita.pdf.
[13]. Shirley Sagawa and Eli Segal, Common Interest, Common Good:Creating Value Through Business and Social Sector Partnerships(Boston:Harvard Business Press,2000),30.
[14]. D.Bradford Hunt,“Redlining,”The Electronic Encyclopedia of Chicago, encyclopedia.chicagohistory.org/pages/1050.html.
[15]. MarciaStepanek,“Weblining,”April3,2000,businessweek/2000/00_14/b3675027.htm.
[16]. David Goldman,“These Data Miners Know Everything About You,”Dec.16,2010,http://mon-ey.cnn/galleries/2010/technology/1012/gallery.data_miners/index.html.
[17]. Rowena Mason,“Acxiom:the Company That Knows if you Own a Cat or if You're Right-Hand-ed,”April 27,2009,telegraph.co.uk/finance/newsbysector/retailandconsumer/5231752/Acxiom-the-company-that-knows-if-you-own-a-cat-or-if-youre-right-handed.html.
[18]. Goldman,“These Data Miners Know Everything About You.”
[19]. Ian Ayres, Super Crunchers(New York:Bantam Dell 2007),134.
[20]. Complaint at 4,U.S.v.ChoicePoint, No.06-CV-0198(N.D.Ga.Jan.30,2006).
[21]. Complaint at 4,U.S.v.ChoicePoint, No.06-CV-0198(N.D.Ga.Jan.30,2006).at 4-6;Stipulated Final Judgment and Order for Civil Penalties, Permanent Injunction, and Other Equitable Relief, U.S.v.ChoicePoint, No.06-CV-0198(N.D.Ga.Feb.10,2006).
[22]. Marcia Savage,“LexisNexis Security Breach Worse Than Thought,”April 12,2005,sc-magazineus/lexisnexis-security-breach-worse-than-thought/article/31977/;Toby Ande-rson,“LexisNex-is Owner Reed Elsevier Buys ChoicePoint,”Feb.21,2008,usatoday/money/industries/2008-02-21-reed-choicepoint_N.htm.
[23]. Chris Cuomo, Jay Shaylor, Mary McGuirt, and Chris Francescani,“‘GMA'Gets Answe-rs:Some Credit Card Companies Financially Profiling Customers,”Jan.28,2009,http://abcnews.go/GMA/GetsAnswers/Story?id=6747461.
[24]. Eli Pariser, The Filter Bubble:What the Internet Is Hiding from You(New York:Penguin,2011),164.
[25]. Aleecia M.McDonald and Lorrie F.Cranor,“Americans'Attitudes About Internet Behavioral Ad-vertising Practices,”Proceedings of the 9th Workshop on Privacy in the Electronic Society WPES, Oct.4,2010,6.
[26]. “Consumer Reports Poll:Americans Extremely Concerned About Internet Privacy,”Sep. 25,2008,consumersunion.org/pub/core_telecom_and_utilities/006189.html.
[27]. Joseph Turow, Jennifer King, Chris Jay Hoofnagle, Amy Bleakley, and Michael Hennessy,“Con-trary to What Marketers Say, Americans Reject Tailored Advertising and Three Ac-tivities That Enable It,”September 2009,at 3,ftc.gov/os/comments/privacyroundtable/544506-00113.pdf.
[28]. Julia Angwin and Tom McGinty,“Sites Feed Personal Details to New Tracking Industr-y,”The Wall Street Journal, July 30,2010,at A1,http://online.wsj/article/SB1000142405274870397700457539 3173432219064.html.
[29]. “Tracking The Companies That Track You Online,”Dave Davies'interview with Julia Angwin, Fresh Air, Aug.19,2010,npr.org/templates/story/story.php?storyId=129298003;Julia Angwin,“The Web's New Gold Mine:Your Secrets,”The Wall Street Journal, Jul-y 30,2010,at W1,http://online.wsj/article/SB10001424052748703940904575395073512989404.html.
[30]. Mike Elgan,“Snooping:It's Not a Crime, It's a Feature,”April 16,2011,comput-erworld/s/article/print/9215853/Snooping_It_s_not_a_crime_it_s_a_feature.
[31]. Hal Berghel,“Caustic Cookies,”44 Communications of the ACM, at 19-20(2001).
[32]. David M.Kristol,“HTTP Cookies:Standards, Privacy, and Politics,”1 ACM Transactions on In-ternet Technology 151,154(2001),http://arxiv.org/PS_cache/cs/pdf/0105/0105018v1.pdf.
[33]. David M.Kristol,“HTTP Cookies:Standards, Privacy, and Politics,”1 ACM Transactions on In-ternet Technology 151,154(2001),http://arxiv.org/PS_cache/cs/pdf/0105/0105018v1.pdf.
[34]. David M.Kristol,“HTTP Cookies:Standards, Privacy, and Politics,”1 ACM Transactions on In-ternet Technology 151,154(2001),http://arxiv.org/PS_cache/cs/pdf/0105/0105018v1.pdf.
[35]. In re DoubleClick Inc.Privacy Litigation,154 F.Supp.2d 497(S.D.N.Y.2001).
[36]. Dan Butler,“More Snooping Around on the Internet,”thenakedpc/articles/v04/13/0413-04.html.
[37]. “Cookies and Privacy Demonstration,”http://cyber. law.harvard.edu/ilaw/Privacy/Demo.html.
[38]. Network Advertising Initiative,“Web Beacons—Guidelines for Notice and Chaos,”net-workadvertising.org/networks/initiatives.asp.
[39]. Network Advertising Initiative,“Web Beacons—Guidelines for Notice and Chaos,”net-workadvertising.org/networks/initiatives.asp.
[40]. Network Advertising Initiative,“Web Beacons—Guidelines for Notice and Chaos,”net-workadvertising.org/networks/initiatives.asp.
[41]. Joshua Gomez, Travis Pinnick, and Ashkan Soltani, KnowPrivacy.org Report, U.C.BerkeleySchool of Information, June 1,2009,at 8,http://knowprivacy.org/report/KnowPrivacy_Final_Report.pdf.
[42]. Richard M.Smith,“The Web Bug FAQ,”Nov.11,1999,http://w2.eff.org/Privacy/Marketing/?.
[43]. Network Advertising Initiative,“Web Beacons—Guidelines for Notice and Chaos.”
[44]. Gomez et al.,KnowPrivacy.org Report, at 8.
[45]. Gomez et al.,KnowPrivacy.org Report, at 8.
[46]. Mike Eckler,“An Introduction to Cookies;How to Manage Them,”March 16,2011,prac-ticalecommerce/articles/2653-An-Introduction-to-Flash-Cookies-How-to-Manage-Them.
[47]. John Herman,“WhatAre Flash Cookies and How CanYou StopThem?,”Sep.23,2010,popu-larmechanics/technology/how-to/computer-security/what-are-flash-cookies-and-how-can-you-stop-them.
[48]. Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, and Chris Jay Hoofna-gle,“Flash Cookies and Privacy,”Working Paper Series, August 2009,papers.ssrn/sol3/papers.cfm?abstract_id=1446862;“What are Local Shared Objects?,”adobe/produc-ts/flashplayer/articles/lso/.
[49]. Soltani et al.,“Flash Cookies and Privacy.”
[50]. CaptainPC,“And That's the Way the Cookie Crumbles,”Aug.26,2010,http://allnurses-central/general-blogs/s-way-cookies-500525.html.
[51]. Eckler,“An Introduction to Cookies;How to Manage Them.”
[52]. Paul Ohm,“The Rise and Fall of Invasive ISP Surveillence,”2009 University of Illinois Law Re-view 1417,1439(2009).
[53]. In re DoubleClick Inc.Privacy Litigation,154 F.Supp.2d 497(S.D.N.Y.2001).
[54]. “What Your Broadband Provider Knows About Your Web Use:Deep Packet Inspectionand Commu-nications Laws and Policies,”Statement of Alissa Cooper, Chief Computer Sci-entist, Center for Democra-cy&Technology, before the House Committee on Energy and Commerce, Subcommittee on Telecommunica-tions and the Internet, July 17,2008,7.
[55]. “What Your Broadband Provider Knows About Your Web Use:Deep Packet Inspectionand Commu-nications Laws and Policies,”Statement of Alissa Cooper, Chief Computer Sci-entist, Center for Democra-cy&Technology, before the House Committee on Energy and Commerce, Subcommittee on Telecommunica-tions and the Internet, July 17,2008,7.
[56]. A nonprofit public interest organization that promotes“free expression and privacy in c-ommuni-cation technologies.”See, cdt.org/about.
[57]. “What Your Broadband Provider Knows About Your Web Use,”4.
[58]. “What Your Broadband Provider Knows About Your Web Use,”4.
[59]. Jami Makan,“10 Things Facebook Won't Say,”Jan.10,2011,smartmoney/spend/technology/10-things-facebook-wont-say-1294414171193/.
[60]. Emily Steel and Geoffrey A.Fowler,“Facebook in Privacy Breach,”The Wall Street J-ournal, Oct.18,2010,at A1,http://online.wsj/article/SB10001424052702304772804575558484075236968.html.
[61]. Emily Steel and Geoffrey A.Fowler,“Facebook in Privacy Breach,”The Wall Street J-ournal, Oct.18,2010,at A1,http://online.wsj/article/SB10001424052702304772804575558484075236968.html.
[62]. Emily Steel and Geoffrey A.Fowler,“Facebook in Privacy Breach,”The Wall Street J-ournal, Oct.18,2010,at A1,http://online.wsj/article/SB10001424052702304772804575558484075236968.html.
[63]. “Web Scraping Tutorial,”March 7,2009, codediesel/php/web-scraping-in-php-tutorial/.CodeDiesel is a web development journal.
[64]. Sean O'Reilly,“Nominative Fair Use and Internet Aggregators:Copyright and Trademar-k Chal-lenges Posed by Bots, Web Crawlers and Screen-Scraping Technologies,”19 Loyola Consumer Law Re-view 273(2007).
[65]. “Google Privacy FAQ,” google/intl/en/privacy/faq.html#toc-terms-server-logs.
[66]. “Bing Privacy Supplement,”January 2011,http://privacy. microsoft/en-us/bing.mspx.
[67]. “Google Privacy FAQ.”
[68]. Omer Tene,“What Google Knows:Privacy and Internet Search Engines,”2008 Utah Law Re-view 1433,1454(2008).
[69]. “Yahoo!Privacy Policy,”http://info.yahoo/privacy/us/yahoo/details.html.
[70]. Tene,“What Google Knows:Privacy and Internet Search Engines.”
[71]. Michael Arrington,“AOL Proudly Releases Massive Amounts of Private Data,”Aug.6,2006,http://techcrunch/2006/08/06/aol-proudly-releases-massive-amounts-of-user-search-data/.
[72]. Abdur Chowdhury, Email sent to SIG-IRList newsletter, Aug.3,2006,http://sifaka.cs.uiuc.edu/xsh-en/aol/20060803_SIG-IRListEmail.txt.
[73]. Declan McCullagh,“AOL's Disturbing Glimpse into Users'Lives,”Aug.7,2006,http://news.cnet/AOLs-disturbing-glimpse-into-users-lives/2100-1030_3-6103098.html#ixzz1M56yaUU2.
[74]. Michael Barbaro and Tom Zeller, Jr.,“A Face Is Exposed for AOL Searcher 4417749,”The New York Times, Aug.9,2006,at A1,nytimes/2006/08/09/technology/09aol.html?pagewanted=all.
[75]. Michael Barbaro and Tom Zeller, Jr.,“A Face Is Exposed for AOL Searcher 4417749,”The New York Times, Aug.9,2006,at A1,nytimes/2006/08/09/technology/09aol.html?pagewanted=all.
[76]. Tene,“What Google Knows:Privacy and Internet Search Engines.”