next up previous contents
Next: About this document ... Up: main Previous: Appendix 2: Fair End   Contents

Bibliography

Acquisti & Grossklags, 2005
Acquisti, Allessandro, & Grossklags, Jens. 2005.
Uncertainty, Ambiguity and Privacy.
4th Annual Workshop on Economics and Information Security.

Appelbaum et al., 1987
Appelbaum, Paul S., Lidz, Charles W., & Meisel, Alan. 1987.
Informed Consent: Legal Theory and Clinical Practice.
Oxford University Press.

Apple Inc., 2003
Apple Inc.
Software License Agreement SDK version 1.0 [online].
2003.
Available from: http://developer.apple.com/sdk/ [last checked 22/08/2008].

Beauchamp & Childress, 1994
Beauchamp, Tom L., & Childress, James F. 1994.
Principles of Biomedical Ethics. 4th edn.
Oxford University Press.

Belgrove, 2008
Belgrove, Carl. 2008.
Whose license is it anyway?
National Consumer Council.

Bennett, 1999
Bennett, Geoffrey D.
Toshiba/Microsoft Saga [online].
1999.
Available from: http://www.netcraft.com.au/geoffrey/toshiba.html [last checked 18/07/2008].

Black Hill Software, 2007
Black Hill Software.
EULAs Part 2: Minimum entitlements and Software Code of Conduct [online].
2007.
Available from: http://www.picnam.com/andrew/EULA2.html [last checked 10/09/2008].

Brooke, 1988
Brooke, Henry. 1988.
Consent to treatment or research: the incapable patient.
Chap. 2 of: Hirsch, Steven R., & Harris, John (eds), Consent and the incompetent patient.
The Royal College of Psychiatrists.

Brownsword, 2004
Brownsword, Roger. 2004.
The Cult of Consent: Fixation and Fallacy.
KCLJ, 15, 223-251.

Brownsword, 2008
Brownsword, Roger. 2008.
An Introduction to Legal Research.
Tech. rept. Wellcome Trust.

Christman, 2007
Christman, John. 2007.
Autonomy in Moral and Political Philosophy.
In: Zalta, Edward N. (ed), The Stanford Encyclopedia of Philosophy, fall 2007 edn.
Available from: http://plato.stanford.edu/archives/fall2007/entries/autonomy-moral/ [last checked 26-05-2008].

Clarke, 2006
Clarke, Roger. 2006.
What's `Privacy'?
July.
Available from: http://www.anu.edu.au/people/Roger.Clarke/DV/Privacy.html [last checked 02/01/2009].

Commonwealth of Australia, 1974
Commonwealth of Australia. 1974 (August).
Trade Practices Act.
Commonwealth of Australia.

Council of Europe, 1997
Council of Europe. 1997.
Convention for the Protection of Human Rights and Dignity of the Human Being with Regard to the Application of Biology and Medicine: Convention on Human Rights and Biomedicine.
In: European Treaty Series.
Available from: http://conventions.coe.int/Treaty/en/Treaties/Html/164.htm [last checked 02/01/2009].

Creative Commons, 2008a
Creative Commons.
Creative Commons Network Website [online].
2008.
Available from: http://creativecommons.net [last checked 20/10/2008].

Creative Commons, 2008b
Creative Commons.
Creative Commons Website [online].
2008.
Available from: http://creativecommons.org/ [last checked 20/10/2008].

Darke & Shanks, 2000
Darke, Peta, & Shanks, Graeme. 2000.
Research Methods for Students and Professionals: Information Management and Systems.
Centre for Information Studies.

de los Reyes, 2002
de los Reyes, Robert.
You May Read This Column Subject to the Following Terms... [online].
2002.
Available from: http://www.frictionlessinsight.com/archives/2002/03/you-may-read-th.html [last checked 22/08/2008].

DuBois, 2007
DuBois, James M. 2007.
Rethinking Informed Consent in Bioethics.
Journal of the American Medical Association, 298(23), 2799-2800.

EB Games, 2009
EB Games.
EB Games Returns Policy [online].
2009.
Available from: http://ebgames.com.au/help.cfm#returns [last checked 02/01/2009].

Edelman, 2005
Edelman, B.
What Passes for "Consent" at 180Solutions [online].
June 2005.
Available from: http://www.benedelman.org/news/062805-1.html [last checked 13/03/2007].

Edelman, 2007
Edelman, Benjamin.
Zango Practises Violating Zango's Recent Settlement with the FTC [online].
2007.
Available from: http://www.benedelman.org/spyware/zango-violations/ [last checked 21/07/2008].

Electronic Frontier Foundation, 2008
Electronic Frontier Foundation. 2008.
Best Practices for Online Service Providers.
Tech. rept. Electronic Frontier Foundation.
Available from: http://www.eff.org/wp/osp [last checked 02/01/2009].

European Union, 2000
European Union.
Charter of Fundamental Rights [online].
2000.
Available from: http://www.europarl.europa.eu/charter/pdf/text_en.pdf [last checked 20/08/2008].

Faden & Beauchamp, 1986
Faden, R. R., & Beauchamp, T. L. 1986.
A History and Theory of Informed Consent.
Oxford University Press.

Flick, 2004
Flick, Catherine. 2004.
The Controversy Over Trusted Computing.
Ph.D. thesis, University of Sydney.

Fortinet, 2008
Fortinet.
Facebook Widget Installing Spyware [online].
2008.
Available from: http://www.fortiguardcenter.com/advisory/FGA-2007-16.html [last checked 02/01/2009].

Foster, 2006
Foster, Ed.
Looking for a Good International EULA [online].
2006.
Available from: http://www.gripe2ed.com/scoop/story/2006/4/18/0847/98248 [last checked 20/08/2008].

Foster, 2007
Foster, Ed.
FEULA [online].
2007.
Available from: http://www.gripewiki.com/index.php/FEULA [last checked 20/08/2008].

Frankfurt, 1971
Frankfurt, Harry. 1971.
Freedom of the Will and the Concept of a Person.
Cambridge University Press.

Free Software Foundation, 2008
Free Software Foundation.
Free Software Foundation website [online].
2008.
Available from: http://www.fsf.org [last checked 02/01/2009].

Friedman & Howe, 2002
Friedman, B., & Howe, D. C. 2002.
Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design.
In: 35th Hawaii International Conference on System Sciences.

Friedman et al., 2000
Friedman, B., Millett, L., & Felten, E. 2000.
Informed consent online: A conceptual model and design principles.
Tech. rept. 00-12-2. UW-CSE.

Friedman et al., 2002
Friedman, Batya, Kahn, Jr., Peter H., & Borning, Alan. 2002.
Value Sensitive Design: Theory and Methods.
Tech. rept. 02-12-01. Dept. of Computer Science and Engineering, University of Washington.

Friedman et al., 2006
Friedman, Batya, Kahn, Jr., Peter H., & Borning, Alan. 2006.
Human-Computer Interaction and Management Information Systems: Foundations.
M. E. Sharpe.
Chap. 16.

Gambetta, 2000
Gambetta, Diego. 2000.
Can we trust trust?
Chap. 13, pages 213-237 of: Gambetta, Diego (ed), Trust: Making and Breaking Cooperative Relations.
Department of Sociology, University of Oxford.

Garfinkel, 2004a
Garfinkel, Simson. 2004a.
The Pure Software Act: A Proposal for Mandatory Software Labeling.
In: Egelman, Serge, & Kumaraguru, Ponnurangam (eds), DIMACS Workshop and Working Group Meeting on Usable Privacy and Security Software.
Carnegie Mellon University.

Garfinkel, 2004b
Garfinkel, Simson. 2004b.
The Pure Software Act of 2006.
Technology Review, April.

Gibson, 2008
Gibson, Edward P.
WHEN you click ``YES'', ``I AGREE'', and ``ALLOW'' do you really mean ``I don't know, so I'll click on it and hope for the best''? [online].
2008.
Available from: http://tinyurl.com/y9taxdo [last checked 12/06/2008].

Good et al., 2006
Good, Nathaniel, Grossklags, Jens, Thaw, David, Perzanowski, Aaron, Mulligan, Deirdre K., & Konstan, Joseph. 2006.
User Choices and Regret: Understanding Users' Decision Process about Consensually acquired Spyware.
I/S: A Journal of Law and Policy for the Information Society, 2(2).
Available from: http://www.truststc.org/pubs/61.html [last checked 02/01/2009].

Google, Inc., 2006
Google, Inc.
Software Principles [online].
2006.
Available from: http://www.google.com/corporate/software_principles.html [last checked 10/09/2008].

Google, Inc., 2008
Google, Inc.
Google FAQ [online].
2008.
Available from: http://www.google.com/support/bin/answer.py?answer=45449 [last checked 14/10/2008].

Greer et al., 2005
Greer, Sarah, Sowden, Elizabeth, & Scharff, Lauren F. V. 2005.
Email Format and Instructions: Influences on Reading Times, Retention, and Preferences.
American Journal of Psychological Research, 1(1).

Hansell, 2008
Hansell, Suaul. 2008.
Will the Profit Motive Undermine Trust in TRUSTe?
New York Times, July.
Available from: http://bits.blogs.nytimes.com/2008/07/15/will-profit-motive-undermine-trust-in-truste/ [last checked 02/01/2009].

Healan, 2005
Healan, Mike. 2005.
Funny Business in Antispywareland.
SpywareInfo, March.
Available from: http://www.spywareinfo.com/newsletter/archives/2005/mar13.php [last checked 02/01/2009].

Heels, 2004
Heels, Erik J.
The 'Duh' of Shrinkwrap Licenses [online].
2004.
Available from: http://www.erikjheels.com/?p=282 [last checked 18/07/2008].

IEEE Software and Systems Engineering Standards Committee, 2001
IEEE Software and Systems Engineering Standards Committee.
IEEE Computer Society Software Engineering Standards Committee Policies [online].
2001.
Available from: http://standards.computer.org/sesc/s2esc_pols/SP-01_User_Expectations.htm [last checked 12/06/2008].

Javacool Software, 2007
Javacool Software.
EULAlyzer Webpage [online].
2007.
Available from: http://www.javacoolsoftware.com/eulalyzer.html [last checked 15/10/2008].

Kant, 1785
Kant, Immanuel. 1785.
The Groundwork of the Metaphysics of Morals.
Routledge Classics.

Krazit, 2006
Krazit, Tom.
Trial software trying PC users' patience [online].
2006.
Available from: http://news.zdnet.com/2100-3513_22-148238.html [last checked 15/09/2008].

Levy, 2008
Levy, David M. 2008.
The Handbook of Information and Computer Ethics: Information Overload.
Wiley & Sons.
Chap. 20.

Leyden, 2006
Leyden, John. 2006.
Malware lurks behind safety seal.
The Register, September.
Available from: http://www.theregister.co.uk/2006/09/26/truste_privacy_seal_row/ [last checked 22/10/2008].

Magid, 2005
Magid, Larry.
It Pays to Read License Agreements [online].
2005.
Available from: http://www.pcpitstop.com/spycheck/eula.asp [last checked 11/08/2008].

Manning & Perkins, 1994
Manning, B., & Perkins, D.
Internet RFC 1746 - Ways to Define User Expectations [online].
1994.
Available from: http://www.faqs.org/rfcs/rfc1746.html [last checked 02/01/2009].

Manson & O'Neill, 2007
Manson, Neil C., & O'Neill, Onora. 2007.
Rethinking Informed Consent in Bioethics.
Cambridge University Press.

McCoy et al., 2004
McCoy, Scott, Galletta, Dennis, Everard, Andrea, & Polak, Peter. 2004 (December 10-11).
A Study of the Effects of Online Advertising: A Focus on Pop-Up and In-Line Ads.
In: Proceedings of the Third Annual Workshop on HCI Research in MIS.

McMillan, 2006
McMillan, Robert. 2006.
Movie Download Service Sued over Spyware.
PC World.
Available from: http://www.pcworld.com/article/126738/movie_download_service_sued_over_spyware.html [last checked 02/01/2009].

McRobb & Rogerson, 2005
McRobb, S., & Rogerson, S. 2005.
Privacy Policies Online: further results form a continuing investigation.
In: ETHICOMP.

Microsoft Corporation, 2005
Microsoft Corporation.
Microsoft Component Installer Software Development Kit for Windows [online].
2005.
Available from: http://msdn.microsoft.com/en-us/library/ms994369.aspx [last checked 21/07/2008].

Mill, 1859/1985
Mill, John Stuart. 1859/1985.
On Liberty.
Penguin Classics.

Miller et al., 1971
Miller, GA, Galanter, E, & Pribram, KH. 1971.
Plans and the Structure of Behavior.
Holt.

Miller, 1997
Miller, Keith.
Ethical Standards in Software Engineering: A Proposed Informed Consent Standard [online].
1997.
Available from: http://webpages.cs.luc.edu/~laufer/ethics97/papers/Miller.html [last checked 10/09/2008].

Mills & Weldon, 1987
Mills, Carol Bergfeld, & Weldon, Linda J. 1987.
Reading text from computer screens.
ACM Comput. Surv., 19(4), 329-357.

Moise, 2004
Moise, Wesner.
Trial Versions [online].
2004.
Available from: http://wesnerm.blogs.com/net_undocumented/2004/10/trial_versions.html [last checked 15/09/2008].

Moumjid & Callu, 2003
Moumjid, Nora, & Callu, Marie-France. 2003.
Informed Consent and Risk Communication in France.
British Medical Journal, 327(7417), 734-735.
Available from: http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=200812.

Mulder et al., 2006
Mulder, Ingrid, de Poot, Henk, Verwij, Carla, Janssen, Ruud, & Bijlsma, Marcel. 2006.
An information overload study: using design methods for understanding.
Pages 245-252 of: OZCHI '06: Proceedings of the 20th conference of the computer-human interaction special interest group (CHISIG) of Australia on Computer-human interaction: design: activities, artefacts and environments.
New York, NY, USA: ACM.

My Digital Life, 2006
My Digital Life.
Extend or Reset Trial Period of Trial Demo Software [online].
2006.
Available from: http://www.mydigitallife.info/2006/10/12/extend-or-reset-trial-period-of-trial-demo-software/ [last checked 15/09/2008].

National Health and Medical Research Council et al., 2007
National Health and Medical Research Council, Australian Research Council, & Australian Vice-Chancellors' Committee.
National Statement on Ethical Conduct in Human Research [online].
March 2007.
Available from: http://www.nhmrc.gov.au/publications/synopses/_files/e72.pdf [last checked 02/01/2009].

Russinovich, 2006
Russinovich, M.
Sony, Rootkits, and Digital Rights Management Gone Too Far [online].
2006.
Available from: http://blogs.technet.com/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx [last checked 02/01/2009].

Rutter, 2001
Rutter, Jason. 2001.
From the Sociology of Trust Towards a Sociology of `E-trust'.
International Journal of New Product Development and Innovation Management, 2(4), 371-385.

Ryker et al., 1997
Ryker, Randy, Nath, Ravinder, & Henson, James. 1997.
Determinants of Computer User Expectations and their Relationships with User Satisfaction: An Empirical Study.
Information Processing and Management, 33(4), 529-537.

SpeedBit, 2008
SpeedBit.
SpeedBit Website [online].
2008.
Available from: http://www.speedbit.com/ [last checked 15/10/2008].

Spriggs, 2007
Spriggs, Merle. 2007.
The value and practical limits of informed consent.
In: Clark, Steve, & Oakley, Justin (eds), Informed Consent and Clinician Accountability: The Ethics of Report Cards on Surgeon Performance.
Cambridge University Press.

StopBadware, 2008a
StopBadware.
StopBadware.org, Mozilla Partner to Protect Consumers [online].
September 2008.
Available from: http://www.stopbadware.org/home/pr_091508 [last checked 14/10/2008].

StopBadware, 2008b
StopBadware.
StopBadware.org Website [online].
2008.
Available from: http://www.stopbadware.org/home [last checked 14/10/2008].

Sullivan, 1988
Sullivan, David. 1988.
The incapable patient and the law.
Chap. 1 of: Hirsch, Steven R., & Harris, John (eds), Consent and the incompetent patient.
The Royal College of Psychiatrists.

Tinker, 1955
Tinker, Miles A. 1955.
Prolonged Reading Tasks in Visual Research.
The Journal of Applied Psychology, 39(6).

TRUSTe, 2008a
TRUSTe.
TRUSTe Software Whitelist [online].
2008.
Available from: http://www.truste.org/pvr.php?page=td_licensees [last checked 02/01/2009].

TRUSTe, 2008b
TRUSTe.
TRUSTe Trusted Download Program [online].
2008.
Available from: http://www.truste.org/tdp/trusted_download_program.php [last checked 16/10/2008].

United States Department of Health and Human Sciences, 2000
United States Department of Health and Human Sciences. 2000.
Protection of Human Subjects.
Code of Federal Regulations Title 45, 46.
Available from: http://www.access.gpo.gov/nara/cfr/waisidx_00/45cfr46_00.html [last checked 02/01/2009].

U.S. Government, 1949
U.S. Government. 1949.
Trials of War Criminals before the Nuremberg Military Tribunals under Control Council Law No. 10.
Vol. 2.
Washington, D.C.: U.S. Government Printing Office.
Available from: http://ohsr.od.nih.gov/guidelines/nuremberg.html.

Wagstaff, 2004
Wagstaff, Jeremy.
TRUSTE's Own Phishing Hole [online].
2004.
Available from: http://www.loosewireblog.com/2004/11/trustes_own_phi.html [last checked 22/10/2008].

Walsham, 1993
Walsham, G. 1993.
Interpreting Information Systems in Organizations.
Wiley.

Weckert, 2005
Weckert, John. 2005.
On-line Trust.
Pages 95-117 of: Cavalier, Robert (ed), The Impact of the Internet on Our Moral Lives.
SUNY Press.

World Medical Association, 2004
World Medical Association.
Declaration of Helsinki: Declaration of Ethical Principles for Medical Research Involving Human Subjects [online].
2004.
Available from: http://www.wma.net/e/policy/b3.htm [last checked 22/10/2008].

Wroclawski, 2007
Wroclawski, Serge.
How to get a Windows tax refund [online].
2007.
Available from: http://www.linux.com/articles/59381 [last checked 15/09/2008].

Yin, 1993
Yin, R. 1993.
Applications of Case Study Research.
Sage Publishing.

Zango, 2007
Zango.
End User License Agreement [online].
2007.
Available from: http://www.zango.com/destination/corporate/eula.aspx [last checked 29/11/2008].

Zango, 2008
Zango, Inc.
Zango Website [online].
08 2008.
Available from: http://www.zango.com [last checked 12/08/2008].


Catherine Flick 2010-02-03