Computer-Mediated Communication Magazine / Volume 1, Number 5 / September 1, 1994 / Page 10


Issue Management in a Networked world: The Case of "Clipper"

by Andrew P. Dinsdale (adinsda@cms.cc.wayne.edu)

References

  1. Aldrich, H., & Herker, D. (1977). Boundary Spanning Roles and Organizational Structure. Academy of Management Review, 2, 217-230.
  2. Baker, S. A. (1994, June). Don't worry, Be Happy: Why Clipper is Good for you. Wired, 2(6), p. 100, 132-133.
  3. Bantz, C. (1990). Organizing and Enactment: Karl Weick and the Production of News. In S. R. Corman, S. P. Banks, C. R. Bantz, & M. M. Mayer (Eds.), Foundations of Organizational Communication (pp. 133-141). White Plains, NY: Longman.
  4. Barlow, J. P. (1990). Crime and Puzzlement.
  5. Barlow, J.P. (1994, April) Save the Bill of Rights: Jackboots on the Infobahn. Wired, 2(4), p.40-49.
  6. Berman, J. (1994, May). Testimony of Jerry Berman, Executive Director of the Electronic Frontier Foundation (EFF), on behalf of the EFF and the Digital Privacy and Security Working Group concerning the Digital Telephony and Communications Privacy Act of 1994. Presented Before the Senate Judiciary Subcommittee on Technology and Law and House Judiciary Subcommittee on Civil and Constitutional Rights, Washington, DC.
  7. The Bureau of National Affairs. (1994, May 4). Lawmakers Skeptical of Clinton's "Clipper Chip" Encryption Plan. Daily Report for Executives, p. 84.
  8. Coates, J. F., Coates, V. T., Jarrett, J., & Heinz, L. (1986) Issues Management: How you can Plan,Organize and Manage for the Future. Mt. Airy, MD: Lemond.
  9. Crable, R. E. and Vibbert S. L. (1985). Managing Issues and Influencing Public Policy. Public Relations Review, 11, 3-16.
  10. Debating Encryption Standards. (1992, June) Communications of the ACM, 35(7), p. 33.
  11. Electronic Frontier Foundation. (1994, January). ABOUT.EFF .
  12. Groves, M. (1994, May 18). The Cutting Edge: Computing/Technology/Innovation; Q & A: Mitchell Kapor; Lotus Founder Working to Guard Privacy in the Electronic Age. Los Angeles Times, D, p. 9.
  13. Katz, D., & Kahn, R. L. (1966). The Social Psychology of Organizations. New York: John Wiley.
  14. Levy, S. (1993). CryptoRebels. Wired Online.
  15. Levy, S. (1994, June 12). Battle of the Clipper Chip. New York Times, Late (Final), Section 6, p. 46.
  16. Long, L. W., & Hazelton, V. (1987). Public Relations: A Theoretical and Practical Response. Public Relations Review, 1, 3-13.
  17. Markoff, J. (1993, April 15). Communications Plan to Balance Access with Privacy, New York Times.
  18. McCombs, M., & Shaw, D. (1972). The Agenda Setting Function of Mass Media. Public Opinion Quarterly, 36, 176-187.
  19. Murray, F. J. (1993, April 17). Government Picks Affordable Chip to Scramble Phone Calls. Washington Times.
  20. Quittner, J. (1994, June). The Merry Pranksters go to Washington. Wired, 2(6), p. 77-81, 128-131.
  21. Stahl, S. (1994, June 20). Flaw Discovered in Clipper Chip: Government Encryption Technology in Question. Information Week, p. 28.
  22. Steele, S., & Weitzner, D. (1993, November). Clipper Summary.
  23. Walters, L. M., & Walters, T. N. (1992). Environment of Confidence: Daily Newspapers Use of Press Releases. Public Relations Review, 18(1), 31-46.
  24. Weick, K. E. (1979). The Social Psychology of Organizing (2nd ed.). New York: McGraw- Hill.
  25. Zimmerman, P. (1993). PGP 2.3a (Pretty Good Privacy) [Computer Program]. Boulder, CO: Phillip Zimmerman, Boulder Software Engineering.

Article front page: Issue Management in a Networked world: The Case of "Clipper"


This Issue / Index