A
Aaken, Dominik, Andreas Ostermaier, and Arnold Picot. “Privacy and Freedom: An Economic (Re-)Evaluation of Privacy.” Kyklos 67, no. 2: 133–155. Business Source Complete , EBSCOhost.
Abagnale, Frank W. Stealing Your Life: The Ultimate Identity Theft Prevention Plan . New York: Broadway Books, 2008.
Abdolian, Lisa Finnegan Takooshian. “The USA PATRIOT Act: Civil Liberties, the Media, and Public Opinion.” Fordham Urban Law Journal 30, no. 4 (2002).
Abeyratne, Ruwantissa. “Full Body Scanners at Airports—the Balance between Privacy and State Responsibility.” Journal of Transportation Security : 73–85.
Ablon, Lillian, Martin C. Libicki, and Andrea A. Golay. Markets for Cybercrime Tools and Stolen Data . Santa Monica: RAND Corporation, 2014.
Abraham, Kenneth S., and G. Edward White, “Prosser and His Influence.” Journal of Tort Law 6, no. 1–2 (2013): 27–74. Virginia Public Law and Legal Theory Research Paper No. 2014–51.
Abramson, Shelton, and Mali Friedman. “Key Holdings in the In re iPhone Application Dismissal Order.” InsidePrivacy, June 18, 2012.
Ackerman, Caryn J. “Fairness or Fiction: Striking a Balance between the Goals of S 3 and the Policy Concerns Motivating Qualified Immunity.” Oregon Law Review 85 (2006): 1027–1062.
Acquisti, Alessandro. Digital Privacy: Theory, Technologies, and Practices . New York: Auerbach Publications, 2008.
Addicott, Jeffrey F., and Michael T. McCaul. “The Protect America Act of 2007: A Framework for Improving Intelligence Collection in the War on Terror.” Texas Review of Law and Politics 13 (2008).
Administrative Office for the United States Courts. Wiretap—Major Offenses for Which Court-Authorized Intercepts Were Granted—During the 12-Month Period Ending December 31, 2013.
Agre, Philip. Technology and Privacy: The New Landscape . Cambridge, Mass.: MIT Press, 1997.
Ahearn, Eileen M. “Special Education in the New National Educational Data System.” Communication Disorders Quarterly 29, no. 4 (2008): 236–238.
Akerlof, George A. “The Market for ‘Lemons’: Quality Uncertainty and the Market Mechanism.” The Quarterly Journal of Economics 84, no. 3 (1970): 488–500.
Albarran, Alan B., ed. The Social Media Industries . New York: Routledge, 2013.
Alderman, Ellen, and Caroline Kennedy. The Right to Privacy. 1995; reprint, New York: Vintage Books, 1997.
Alderman, Ellen M. “Dragnet Drug Testing in Public Schools and the Fourth Amendment.” Columbia Law Review 86, no. 4 (May 1986): 852–875.
Aldrich, Richard J. GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency . London: HarperPress, 2010.
Alldridge, Peter. Personal Autonomy, the Private Sphere, and the Criminal Law: A Comparative Study . Oxford, England: Hart Pubisher, 2001.
Allen, Anita L. Unpopular Privacy: What Must We Hide? Oxford: Oxford University Press, 2011.
Allhoff, Fritz. The Affordable Care Act Decision Philosophical and Legal Implications . New York: Routledge, Taylor and Francis, 2014.
Anandarajan, M., R. D'ovidio, and A. Jenkins. “Safeguarding Consumers against Identity-Related Fraud: Examining Data Breach Notification Legislation through the Lens of Routine Activities Theory.” International Data Privacy Law 00, no. 00 (2012): 51–60.
Andreasen, Kristin. “Lawrence v. Texas: One Small Step For Gay Rights; One Giant Leap for Liberty.” Journal of Contemporary Legal Issues 14, no. 1, (2004): 73–82.
Andrews, Lori B. I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy . New York: Free Press, 2012.
Angelelli, L. Steve Paul Jobs. Computer Science Department NSF-Supported Education Infrastructure Project. 2008.
Annas, George J. “Nancy Cruzan and the Right to Die.” New England Journal of Medicine 323, no. 10 (September 6, 1990): 670–673.Arthur, John. Morality and Moral Controversies . 5th ed. Upper Saddle River, N.J.: Prentice Hall, 1999.
Antonopoulos, Andreas M. “Bitcoin Neutrality.” Bitcoin 2013 Conference, May 18, 2013, San Jose, CA. YouTube, June 10, 2013.
Anzalone, Christopher A. Supreme Court Cases on Gender and Sexual Equality, 1787–2001 . Armonk, NY: M.E. Sharpe, 2002.
Ariew, Roger, and Marjorie Grené, eds. Descartes and His Contemporaries: Meditations, Objections, and Replies . Chicago, IL: University of Chicago Press, 1995.
Armijo, Lisa Marie. The Search for Space and Dignity: Using Participatory Action Research to Explore Boundary Management among Homeless Individuals . 2002.
Armstrong, William M. E. L. Godkin: A Biography. Albany: State University of New York Press, 1978.
Arterton, F. Christopher. Teledemocracy: Can Technology Protect Democracy? Newbury Park, CA: Sage Publications; 1987.
Arthur, John, and William H. Shaw. Readings in the Philosophy of Law, 4rd ed. Upper Saddle River, NJ: Prentice Hall, 2001.
Associated Press. “Pentagon's ‘Terror Information Awareness’ Program Will End.” USA Today , September 25, 2003.
Atkin, Michelle Louise. Balancing Liberty and Security: An Ethical Study of U.S. Foreign Intelligence Surveillance, 2001– 2009. Lanham, MD: Rowman & Littlefield Publishers, 2013.
Aycock, John Daniel. Spyware and Adware . New York: Springer, 2011.
Ayday, Erman, Emiliano De Cristofaro, Jean-Pierre Hubaux, and Gene Tsudik. “Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?” Computer : 58–66.
Ayenson, Mika, Dietrich James Wambach, Ashkan Soltani, Nathan Good, and Chris Jay Hoofnagle. “Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning,” July 29, 2011.
B
Baca, Murtha, and Tony Gill. Introduction to Metadata . Los Angeles, CA: Getty Research Institute, 2008.
Bagley, Ian. “Constitutional Law—Search-Incident-to-Arrest Exception to Prohibition against Warrantless Searches Inapplicable to Cell Phone Searches—Smallwood v. State. ” Suffolk University Law Review (2014).
Bailard, Catie Snow. Democracy's Double-Edged Sword: How Internet Use Changes Citizens' Views of Their Government .
Bailey, Martha J. “ ‘Momma's Got the Pill’: How Anthony Comstock and Griswold v. Connecticut Shaped U.S. Childbearing.” American Economic Review 100, no. 1 (2010): 98–129.
Baird, Douglas G. “Note: Human Cannonballs and the First Amendment: Zacchini v. Scripps-Howard Broadcasting Co. ” Stanford Law Review 30, no. 6 (July 1978): 1185–1209.
Baker Hostetler. 2015 International Compendium of Data Privacy Laws.
Baker, Mary Beth. “Article Title.” Journal Title 57, no. 3 (2011): 96.
Baker, Patricia. “Sexual Harassment: High School Girls Speak Out.” Canadian Review of Sociology and Anthropology 34, no. 1 (February 1997): 114.
Baker, Robert. “A Theory of International Bioethics: The Negotiable and Non-Negotiable.” Kennedy Institute of Ethics Journal 8, no. 3 (1998): 233–273.
Balasubramani, Venkat. “Judge Koh Whittles Down iPhone App Privacy Lawsuit—In re iPhone Application Litig.” Technology and Marketing Law Blog, July 4, 2012.
Balko, Radley. Overkill: The Rise of Paramilitary Police Raids in America. Washington, DC: Cato Institute, 2006.
Ball, Carlos A. “Privacy, Property, and Public Sex.” Columbia Journal of Gender and Law 18, no. 1 (2009).
Ball, Howard. The Supreme Court in the Intimate Lives of Americans: Birth, Sex, Marriage, Childrearing, and Death . New York: New York University Press, 2004.
Ball, James. “NSA's PRISM Surveillance Program: How It Works and What It Can Do.” The Guardian, June 2013.
Bambauer, Derek E. “Exposed.” Minnesota Law Review 98 (2014): 2025–2092.
Bambauer, Jane. “Is Data Speech?” Stanford Law Review 66, no. 57 (2014).
Bamford, James. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency . New York: Doubleday, 2001.
Bamforth, Nicholas, ed. Sexual Orientation and Rights . Burlington, VT: Ashgate, 2014.
Barbas, Samantha. “Saving Privacy from History.” Depaul Law Review 61 (Summer 2012): 973–1048.
Barbas, Samantha. “When Privacy Almost Won: Time, Inc. v. Hill (1967).” University of Pennsylvania Journal of Constitutional Law .
Barber, N. W. “A Right to Privacy?” In Human Rights and Private Law: Privacy as Autonomy . Portland, edited by Katja S. Ziegler. Portland, OR: Hart, 2007.
Barendt, E. M. Privacy . Aldershot: Ashgate/Dartmouth, 2001.
Barendt, Eric. “Libel and Invasion of Privacy,” in Freedom of Speech, 2d ed. New York: Oxford University Press, 2007.
Barfield, Woodrow. Fundamentals of Wearable Computers and Augmented Real ity, 2d ed. Lanham, MD: Rowman and Littlefield, 2015.
Bargmeyer, Bruce E. and Daniel W. Gillman. “Metadata Standards and Metadata Registries: An Overview.” Bureau of Labor Statistics, 2000.
Barker, Adam and Jonathan Stuart Ward, “Undefined By Data: A Survey of Big Data Definitions,” arXiv preprint arXiv:1309.5821 , 2013.
Barker, Katherine, Jackie D'Amato, and Paul Sheridan. “Credit Card Fraud: Awareness and Prevention.” Journal of Financial Crime 15 (2008): 398.
Barrett Lidsky, Lyrissa. “Silencing John Doe: Defamation and Discourse in Cyberspace.” Duke Law Journal vol. 49, no. 4 (2000): 855–946.
Bartee, Alice Fleetwood. Privacy Rights: Cases Lost and Causes Won before the Supreme Court . Lanham, MD: Rowman & Littlefield, 2006. Print.
Batty, David. “Instagram Acts after BBC Finds Site Users Are Advertising Illegal Drugs.” Guardian, November 7, 2013.
Beales, J. Howard. Legislative Efforts to Combat Spam: Joint Hearing before … 108th Congress, 1st Session, July 9, 2003. Washington, DC: US Government Printing Office, 2003.
Beattie, James R., Jr. “Privacy in the First Amendment: Private Facts and the Zone of Deliberation.” Vanderbilt Law Review 44 (1991): 899–923.
Beckett, Charlie, and James Ball. Wikileaks: News in the Networked Era . Cambridge, England: Polity Press, 2012.
Bedi, Monu Singh. “Fourth Amendment Doctrine Mash-Up: The Curious Case of Cell Phone Location Data.” SSRN Electronic Journal SSRN Journal .
Beerworth, Andrew A. “United States v. Stevens: A Proposal for Criminalizing Crush Videos under Current Free Speech Doctrine.” Vermont Law Review 35, no. 4 (2011): 901.
Belangia, David. “Data Breach Preparation.” Master's thesis, SANS Technology Institute, Los Alamos National Laboratory, 2015.
Bell, David. Cyberculture: The Key Concepts . London: Routledge, 2004.
Bell, Mary Ann, and Bobby Ezell. Cybersins and Digital Good Deeds: A Book about Technology and Ethics . New York: Haworth Press, 2007.
Bellia, Patricia L. “Wikileaks and the Institutional Framework for National Security Disclosures.” Yale Law Journal 121 (2012): 1448–1526.
Bender, Lewis G., et al., eds. Critical Issues in Police Discipline: Case Studies. Springfield, IL: C. C. Thomas, 2005.
Bennett, Colin J. The Privacy Advocates: Resisting the Spread of Surveillance. Cambridge, MA: MIT Press, 2008.
Bennett, W. Lance. News: The Politics of Illusion, 9th ed. Chicago, IL: University of Chicago Press, 2011.
Benson, Kenneth R. Financial Services Modernization: GLBA of 1999: Law and Explanation . Chicago, Ill.: CCH, 1999.
Bentzen, Sheila A. “Safe for Work? Analyzing the Supreme Court's Standard of Privacy for Government Employees in Light of City of Ontario v. Quon .” Iowa Law Review 97, no. 4 (May 2012): 1283–1304.
Berg, Candace D. “Widening the Lane: An Argument for Broader Interpretation of Permissible Uses under the Driver's Privacy Protection Act.” Notre Dame Law Review 90, no. 2 (2014): 847–873.
Berg, Daniel, and Tina Klopp. Inside Wikileaks: My Time with Julian Assange at the World's Most Dangerous Website . New York: Crown Publishers, 2011.
Berger, J. M., and Jonathon Morgan. The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter. Brookings Project on U.S. Relations with the Islamic World Analysis Paper no. 20 (March 2015).
Bergman, Hannah. “Out of Sight, Out of Bounds,” The News Media and the Law 33, no. 2 (Spring 2009): 11.
Berleur, Jacques, and Diane Whitehouse. An Ethical Global Information Society Culture and Democracy Revisited .
Bernescu, Laura. “When Is a Hack Not a Hack: Addressing the CFAA's Applicability to the Internet Service Context.” University of Chicago Legal Forum (2013): 633.
Bernstein, Fred. “Glenn Greenwald: Life Beyond Borders.” Out Magazine , May 2011.
Bhagwat, Ashutosh. “Sorrell v. IMS Health: Details, Detailing, and the Death of Privacy.” Vermont Law Review 36, no. 855 (2012).
Bidgoli, Hossein. Handbook of Information Security . Hoboken, NJ: Wiley, 2006.
Binney, William, and Laura Poitras. The Program . New York Times Op-Doc, 8:27. August 22, 2012.
Birnbaum, Michael. “Europeans Seek to Learn Extent of U.S. Agencies' Data Collection.” Washington Post, June 11, 2013.
Bivins, Amy E. “United States: Privacy—House Judiciary Explores Espionage Act's Application to Wikileaks' Net Posts.” World Communications Regulation Report 6, no. 1 (2011): 16–18.
Blair, J. P. “What Do We Know about Interrogation in the United States?” Journal of Police and Criminal Psychology 20, no. 2 (September 2005): 44–57.
Blasi, Vincent. “The Checking Value in First Amendment Theory.” American Bar Foundation Research Journal 2, no. 3 (1977): 521.
Blatterer, Harry. Modern Privacy Shifting Boundaries, New Forms . New York: Palgrave Macmillan, 2010.
Bleumer, Gerrit. “Biometric Yet Privacy Protecting Person Authentication.” Information Hiding Lecture Notes in Computer Science , 99–110.
Bloemraad, Irene. Becoming a Citizen: Incorporating Immigrants and Refugees in the United States and Canada. Berkeley: University of California Press, 2006.
Bloom, Robert M. Searches, Seizures & Warrants: A Reference Guide to the United States Constitut ion. Westport, CT: Praeger, 2003.
Bloomberg BNA. “DOJ Settles, Turns Page on ‘Dark Chapter’ in Politicized Honors Program Hiring Dispute.” Daily Labor Report 53, no. 1 (March 19, 2014).
Blum, Karen, et. al. “Qualified Immunity Developments: Not Much Hope Left for Plaintiffs.” Touro Law Review 29 (2013): 633–658.
Blumenthal, David. “Launching HITECH.” New England Journal of Medicine 362 (February 2010): 382–85.
Bobis, Charles S. Terry v. Ohio 30 Years Later: A Symposium on the Fourth Amendment, Law Enforcement, and Police-citizen Encounters . Brooklyn, N.Y.: St. John's Law Review Association, 1998.
Bocij, Paul. Cyberstalking: Harassment in the Internet Age and How to Protect Your Family . Westport, CT: Praeger, 2004.
Boddie, J. “Has Apple Hit the Right Disruptive Notes?” Strategy & Innovation (July–August, 2005): 3–4.
Bodenheimer, Thomas and Kevin Grumbach. 2005. Conflict and Change in America's Health Care System. In Understanding Health Policy: A Clinical Approach, eds. Harriet Lebowitz, Shelley Reinhardt and Lester A. Sheinis, 193–203. The McGraw-Hill Companies.
Bollinger, Lee C. Images of a Free Press . Chicago, IL: University of Chicago Press, 1991.
Bonaci, T. and H. Chizack. Privacy by Design in Brain-Computer Interfaces. University of Washington, Department of EE. website: www.ee.washington.edu/techsite/papers/documents/UWEETR-2013–0001 .
Booth, Phil. “The UK Should Take Note of the U.S. Biometric Security Projects Says Privacy Advocate.” Computer Fraud & Security (2007): 7.
Borgman, Christine L. Scholarship in the Digital Age: Information, Infrastructure, and the Internet. Cambridge, MA: MIT Press, 2010.
Borjas, George J. Immigration Economics. Cambridge, MA: Harvard University Press, 2014.
Bosmajian, Haig A. Obscenity and Freedom of Expression . New York: B. Franklin, 1976.
Botcherby, Sue, and Chris Creegan. Moving Forward: Putting Sexual Orientation in the Public Domain . Manchester, UK: Equality and Human Rights Commission, 2009. [Equality and Human Rights Commission Research Summary 40].
Botkin, Jeffrey R. “Federal Privacy and Confidentiality.” The Hastings Center Report 25, no. 5 (September-October 1995).
Bourdillon, Sophie, and Joshua Phillips. Privacy vs. Security .
Bove, Victor M. “HIV Testing of Health Care Workers. (AIDS).” Physician Executive 18 (May 1, 1992).
Boyd D., Hargittai E., J. Schultz, and J, Palfrey J. (2011). “Why Parents Help Their Children Lie to Facebook about Age: Unintended Consequences of the ‘Children's Online Privacy Protection Act.’” First Monday 16, no. 11.
Boyle, David C. “Proposal to Amend the United States Privacy Act to Extend Its Protections to Foreign Nationals and Non-Resident Aliens.” Cornell International Law Journal 22, no. 2 (1989): 285–305.
Bradley, Craig M. “Reconceiving the Fourth Amendment and the Exclusionary Rule.” Law and Contemporary Problems 73 (Summer 2010): 211–238.
____. “The Wicked May Flee, but the Police May Stop Them.” Trial, April 1, 2000.
Brandeis, Louis D., and Warren, Samuel D. “The Right to Privacy.” Harvard Law Review 4, no. 193 (1890)
Brandt, Richard L. One Click: Jeff Bezos and the Rise of Amazon. New York: Portfolio/Penguin, 2011.
Branscomb, Anne W. Who Owns Information?: From Privacy to Public Access . New York: Basic Books, 1994.
Braswell, Michael, John Fuller, and Bo Lozoff. Corrections, Peacemaking, and Restorative Justice: Transforming Individuals and Institutions. Cincinnati, OH: Anderson, 2001.
Bratman, Benjamin E. “Brandeis and Warren's ‘The Right to Privacy and the Birth of the Right to Privacy.’” Tennessee Law Review 69 (Spring 2002): 638–644.
Brav, Hiawatha. “Would You Let Your TV Watch You?” The Boston Globe . June 14, 2013.
Brazhnik, Tatiana. “Cookies in E-Commerce: Balancing Privacy and Business.” SSRN, April 29, 2013.
Brehm, Robert P. “What CIOs and CTOs Need to Know About Big Data and Data Intensive Computing.” PhD diss., University of Oregon, 2012.
Brinson, Susan L. The Red Scare, Politics, and the Federal Communications Commission, 1941–1960 . Westport, CT: Praeger, 2004.
Bronk, Chris. “Wiretapping, Surveillance, and the Internet.” SSRN Electronic Journal SSRN Journal .
Broughton, Janet. Descartes's Method of Doubt. Princeton, NJ: Princeton University Press, 2003.
Browdie, Brian. “ATMs May be Top Targets for Crime: Verizon Report.” Payments Source (October 25, 2012).
Brown, Cecilia Wright, Kevin A. Peters, and Kofi Adofo Nyarko, eds. Cases on Research and Knowledge Discovery: Homeland Security Centers of Excellence. Hershey, PA: Information Science Reference, 2014.
Brownell, George A. The Origin and Development of the National Security Agency . Laguna Hills, CA: Aegean Park Press, 1981.
Bruno, Andorra, et al. Immigration Legislation and Issues in the 112th Congress . Washington, DC: Congressional Research Service, September 30, 2011.
Bryson, Kerry J. “The Naked Truth: Fourth Amendment Lessons from the U.S. Supreme Court: A Review of Recent Home-search Cases from the U.S. Supreme Court, including the Rettele Case from May, Where the Court Ruled That Police Didn't Act Unreasonably When They Forced Search.” Illinois Bar Journal (2007).
Buchanan, Sarah Alix. “An Evaluation of the FERPA (1974) on Student Records Management and Access.” MA thesis, University of California at Los Angeles, 2009.
Buckman, Deborah F. “Validity, Construction, and Application of Federal Driver's Privacy Protection Act, 18 U.S.C.A. §§ 2721 to 2725.” American Law Reports, Federal 183 (2003).
____. “Validity, Construction, and Application of Health Insurance Portability and Accountability Act of 1996 (HIPAA) and Regulations Promulgated Thereunder.” American Law Reports Annotated. 194 (2004) Fed. 133.
Buettgens, Mathew and Caitlin Carroll. 2012. Eliminating the Individual Mandate: Effects on Premiums, Coverage, and Uncompensated Care. Urban Institute Health Policy Center and Robert Wood Johnson Foundation.
“Building a Metadata Schema - Where to Start (ISO/TC 46/SC11N800R1).” National Information Standards Organization (NISO), 2014.
Bureau of Justice Statistics. “Identity Theft.” bjs.gov. Last modified February 10, 2015.
Burkoff, John. Search Warrant Law Deskbo ok. New York: Clark Boardman Callaghan, 2015.
Burnett, Mark, and James C. Foster. Hacking the Code ASP.NET Web Application Security . Rockland, MA: Syngress, 2004.
Burnett, Nicholas F. “New York Times v. Sullivan ,” in Free Speech on Trial: Communication Perspectives on Landmark Supreme Court Decisions , ed. Richard A. Parker, 116–129. Tuscaloosa: University of Alabama Press, 2003.
Burshnic, Rudolph J. “Applying the Stored Communications Act to the Civil Discovery of Social Networking Sites.” Washington and Lee Law Review 69 (2012): 1259–1293.
Buyya, R., Pandey, S. and Vecchiola, C. “Market-Oriented Cloud Computing and the Cloudbus Toolkit.” In Large Scale Network-Centric Distributed Systems , edited by H. Sarbazi-Azad and A. Y. Zomaya, 319–358. Hoboken, NJ: John Wiley & Sons, Inc., 2013.
Byford, Katrin Schatz. “Privacy in Cyberspace: Constructing a Model of Privacy for the Electronic Communications Environment.” Rutgers Computer & Technology Law Journal 1998.
Bygrave, Lee A., Data Privacy Law, an International Perspective. Oxford: Oxford University Press, 2014.
C
Cackley, Alicia Puente. Facial Recognition Technology: Commercial Uses, Privacy Issues, and Applicable Federal Law: Report to the Ranking Member, Subcommittee on Privacy, Technology and the Law, Committee on the Judiciary, U.S. Senate. Washington, DC: United States Government Accountability Office, 2015.
Caldero, Michael A., and John P. Crank. Police Ethics: The Corruption of Noble Cause, 3d ed. New York: Routledge, 2010.
Calhoun, Craig J. Habermas and the Public Sphere . Cambridge, MA: MIT Press, 1992.
California Senate Bill No. 178, California Electronic Communications Privacy Act (signed into law by California Governor Jerry Brown on October 8, 2015).
Calo, M. Ryan. “The Drone as Privacy Catalyst.” Stanford Law Review 64 (2011): 29–33.
Caloyannides, Michael A., and Michael A. Caloyannides. Privacy Protection and Computer Forensics . 2nd ed. Boston: Artech House, 2004.
Campbell, James, et al. “Privacy Regulation and Market Structure.” Journal of Economics & Management Strategy 24 (2015): 47–73.
Cantor, Norman L. Advanced Directives and the Pursuit of Dying with Dignity . Bloomberg: Indiana University Press, 1993.
Caplan, Arthur L., James J. McCartney, and Dominic A. Stisi. The Case of Terri Schiavo: Ethics at the End of Life. Amherst, NY: Prometheus Books, 2006.
Cappel, James J. “A Study of Individuals' Ethical Beliefs and Perceptions of Electronic Mail Privacy.” Journal of Business Ethics J Bus Ethics : 819–27.
Capron, Alexander Morgan. “Medical Decision-making and the Right to Die after Cruzan.” The Journal of Law, Medicine & Ethics J Law Med Ethics : 5–8.
Cardoza, Nate, Cindy Cohn, Parker Higgins, Kurt Opsahl, and Rainey Reitman. Who Has Your Back: Protecting Your Data from Government Request. Electronic Frontier Foundation, May 15, 2014.
Carolan, Eoin. “Surveillance and the Individual's Expectation of Privacy Under the Fourth Amendment.” SSRN Electronic Journal SSRN Journal .
Carpenter, Dale. Flagrant Conduct: The Story of Lawrence v Texas: How a Bedroom Arrest Decriminalized Gay Americans. W.W. Norton & Company, 2012.
Carr, Peter F. Lawfully Managing Student Records without Violating Privacy Rights . Eau Claire, WI: National Business Institute, 2013.
Carroll, Jamuna. Privacy . Detroit, MI: Greenhaven Press, 2006.
Carroll, Thomas F. “Freedom of Speech and of the Press in War Time: The Espionage Act.” Michigan Law Review 17, no. 8 (1919): 621–665.
Carter, Stephen. “A Battlefield of Drones and Privacy in Your Backyard.” Chicago Tribune, August 3, 2015.
Cate, Fred H. “The Failure of Fair Information Practice Principles.” In Consumer Protection in the Age of the “Information Economy,” new edition, edited by Jane K. Winn. Burlington, VT: Ashgate, 2006.
____. Privacy in the Information Age . Washington, D.C.: Brookings Institution Press, 1997.
Cate, Fred. “The Changing Face of Privacy Protections in the European Union and the United States.” Indiana Law Review 33 (1999): 173–232.
Catlett, Charlie. Cloud Computing and Big Data . Amsterdam: IOS Press, 2013.
Catlett, Michael S. “Clearly Not Established: Decisional Law and the Qualified Immunity Doctrine.” Arizona Law Review 47 (2005): 1031–1063.
Cavoukian, Ann, and Alexander Dix. Smart Meters in Europe Privacy by Design at Its Best . Toronto, Ont.: Information and Privacy Commissioner of Ontario, Canada, 2012.
Cepeda. Simon. NSA Intelligence Collection, Leaks, and the Protection of Classified Information: Background and Issues. New York: Nova Publishers, 2014.
Ceruzzi, Paul E. Computing: a concise history . Cambridge, Mass: MIT Press, 2012.
Chander, Anupam. Securing Privacy in the Internet Age . Stanford, CA: Stanford Law Books, 2008.
Chee, Brian J. S., and Curtis Franklin. Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center . New York: CRC, 2010.
Chemerinsky, Erwin. “Narrowing the Tort of Public Disclosure of Private Facts.” Chapman Law Review 11 (2008): 423–433.
____. “Right Result, Wrong Reasons: Reno v. Condon.” Oklahoma City University Law Review 25 (2000): 823–841.
Chen, Brian X. Always On: How the iPhone Unlocked the Anything-Anytime-Anywhere Future—and Locked Us In. Boston, MA: Da Capo Press, 2012.
Christman, Henry M., ed. The Public Papers of Chief Justice Earl Warren, rev. ed. New York: Capricorn Books, 1966.
Christodorescu, Mihai, et al. Malware Detection. New York: Springer, 2006.
Clancy, Thomas K. “Spyware, Adware, Malware, Phishing, Spam, and Identity-Related Crime,” in Cyber Crime and Digital Evidence: Materials and Cases, 2d ed. New Providence, NJ: LexisNexis, 2014.
____. “The Importance of James Otis.” Mississippi Law Journal 82, no. 2 (2013): 487–524.
____. “The Importance of James Otis.” Mississippi Law Jou rnal 82, no. 2 (2013): 487–524.
____. The Fourth Amendment: Its History and Interpretation. Durham, NC: Carolina Academic Press, 2008.
Clapham, Andrew. Human Rights in the Private Sphere . Oxford, England: Clarendon Press, 1993.
Clarke, Richard A. Cyber War: The Next Threat to National Security and What to Do about It . New York: Ecco, 2010.
Clarke, Richard A., Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, and Peter Swire. The NSA Report: Liberty and Security in a Changing World . Princeton, NJ: Princeton University Press, 2014.
Cogan, Neil H., ed. The Complete Bill of Rights: The Drafts, Debates, Sources, and Origins.
Cogen, Marc. Democracies and the Shock of War: The Law as a Battlefield. New ed. Burlington, VT: Ashgate, 2012.
Cohen, Julie E. “Inverse Relationship Between Secrecy and Privacy.” Social Research 77.3 (Fall 2010): 883–898.
____. “What Privacy Is For.” Harvard Law Review , May 1, 2013.
Cohn, Marjorie. “FISA Revised: A Blank Check for Domestic Spying.” Huffington Post, August 9, 2007.
Colao, J. J. “Snapchat: The Biggest No-Revenue Mobile App since Instagram.” Forbes , November 27, 2012.
Colby, William H. Long Goodbye: The Deaths of Nancy Cruzan . Carlsbad, Calif.: Hay House, 2002.
Cole, George F., and Marc G. Gertz, The Criminal Justice System: Politics and Policies, 10th ed. Belmont, CA: Belmont-Cengage, 2012.
Cole, Simon A. “More Than Zero: Accounting for Error in Latent Fingerprint Identification.” Journal of Criminal Law and Crimino logy 95, no. 3 (2005): 985–1078.
Coleman, E. Gabriella. Coding Freedom: The Ethics and Aesthetics of Hacking . Princeton, NJ: Princeton University Press, 2013.
Colker, Ruth. Abortion; Dialogue Pro-choice, Pro-life, and American Law . Bloomington: Indiana University Press, 1992.
Condit, Celeste Michelle. “Crafting Virtue: The Rhetorical Construction of Public Morality.” Quarterly Journal of Speech 73, no. 1 (1987): 79–97.
Congressional Research Service. Privacy: An Overview of Federal Statutes Governing Wiretapping and Electronic Wiretapping Prepared for Members and Committees of Congress (October 9, 2012).
Consumer Financial Protection Bureau, List of Consumer Reporting Agencies . Washington, DC: 2015.
“Consumer Watchdog Calls California ‘Apps’ Privacy Agreement a Step Forward, but Says Do Not Track Legislation Is Necessary to Protect Consumers.” Marketing Weekly News, March 10, 2012.
Cooper, Candance. “Preparing for Biometrics and Drones in the ‘Post Privacy’ Era”. Corporate Legal Times (November 2014).
Cooper, Frank Rudy. “‘Who's the Man?’: Masculinities Studies, Terry Stops, and Police Training.” Columbia Journal of Gender and Law 18 p. 671 (2009).
Cooper, Scott P., and Kristen J. Mathews. “State Privacy Laws,” in Proskauer on Privacy , ed. Christopher Wolf. New York: Practicing Law Institute, 2006–.
Cornish, Craig M. Drugs and Alcohol in the Workplace: Testing and Privacy . Wilmette, Ill.: Callaghan, 1988.
Cottrell, Robert C. Roger Nash Baldwin and the American Civil Liberties Union . New York: Columbia University Press, 2000.
Coyle, Erin K. “E. L. Godkin's Criticism of the Penny Press: Antecedents to a Legal Right to Privacy.” American Journalism 31, no. 2 (2014): 262–282.
Craig, John D. R. Privacy and Employment Law . Oxford: Hart, 1999.
Craig, Terence, and Mary Ludloff. Privacy and Big Data . Sebastopol, CA: O'Reilly Media, 2011.
Crocker, Thomas P. “From Privacy to Liberty: The Fourth Amendment after Lawrence.” SSRN Electronic Journal SSRN Journal .
CRS Report for Congress. P.L. 110–55, the Protect America Act of 2007: Modifications to the Foreign Intelligence Surveillance Act. February 14, 2008.
Crump, Catherine, et al. “You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements.” American Civil Liberties Union (July 2013).
____. “Data Retention: Privacy, Anonymity, and Accountability Online.” Stanford Law Review 56, no. 1 (2003): 191.
Cuddihy, William J. The Fourth Amendment. Oxford University Press, 2009.
Cullina, Matt. “Broadband Bullies: Homeowners Insurers Are Being Asked to Pay Damages for Social Media Harassment.” Best's Review , November 1, 2013.
Currie, Mary Beth. “Intrusion upon Seclusion: The Tort of Invasion of Privacy.” LawNow 37, no. 2 (November 1, 2012).
Curry, Lynne. Mapp v. Ohio: Guarding against Unreasonable Searches and Seizures. Lawrence: University Press of Kansas, 2006.
Curtis, Craig R., Michael C. Gizzi, and Michael J. Kittleson. “Using Technology the Founders Never Dreamed Of: Cell Phones As Tracking Devices and the Fourth Amendment.” University of Denver Criminal Law Review 4, no. 61 (2014.
Curtis, George E. The Law of Cybercrimes and Their Investigations . Boca Raton, FL: CRC Press, 2012.
D
Damon, Joseph P. Whole Genome Sequencing: Privacy and Security in an Era of Genomic and Advancements .
Daniel J. Solove & Paul Schwartz, Information Privacy Law (2015)
Darcy, Shane. “Battling for the Rights to Privacy and Data Protection in the Irish Courts: Schrems v. Data Protection Commissioner [2014] IEHC 213 [2014].” Utrecht Journal of International and European Law 31 (2015): 131–135.
Data Quality Campaign. Student Data Privacy Legislation: What Happened in 2015, and What Is Next? 2015.
Datta, Anwitaman, et al. Social Informatics: Third International Conference, SocInfo, 2011, Singapore, October 2011 . Berlin: Springer-Verlag, 2011.
David Cuillier and Charles N. Davis, The Art of Access: Strategies for Acquiring Public Records (CQ Press 2010)
Davidson, Stephen M. A New Era in U.S. Health Care Critical next Steps under the Affordable Care Act . Stanford, CA: Stanford Books, 2013.
Davis, J. J. “Marketing to Children Online: A Manager's Guide to the Children's Online Privacy Protection Act.” S.A.M. Advanced Management Journal 67, no. 4 (2002), 11–21.
Davis, Michelle R., and Wilson, David L. “S.C. Ranks Worst in Guarding Residents' Privacy—Journal Study Gave State Only Negative Score in U.S.” The Charlotte Obse rver (Charlotte, North Carolina), October 6, 1999.
De Mauro, Andrea, Marco Greco, and Michele Grimaldi. “What is Big Data? A Consensual Definition and a Review of Key Research Topics.” AIP Conference Proceedings 1644, no. 97 (2015). doi: 10.1063/1.4907823.
Debt Collection, Privacy, Fair Credit Reporting & Consumer. Conference on Consumer Finance Law, 2000 - Bankruptcy. www.debt.org/credit
Decker, Scott H., Leanne Fiftal Alarid, and Charles M. Katz, eds. Controversies in Criminal Justice: Contemporary Readings. New York: Oxford University Press, 2002.
Declan, Keara. Foreign Intelligence Surveillance Courts: Background, Issues, and Proposals. New York: Novinka, 2014.
Deibert, Ronald. Black Code: Surveillance, Privacy, and the Dark Side of the Internet . Hiller, Janine, and Ronnie Cohen. Internet Law & Policy . Upper Saddle River, NJ: Prentice Hall, 2002.
Del Carmen, Rolando V., and Jeffrey T. Walker. Briefs of Leading Cases in Law Enforcement, 9th ed. New York: Routledge, 2015. [United States Supreme Court cases.]
Delaney, E. (2012). “The Children's Online Privacy Protection Act and Rule: An Overview.” Journal of Civil Rights and Economic Development , 16, no. 3 (2101): 641–648.
Dempsey, John S., and Linda S. Forst. An Introduction to Policing. 6th ed. Clifton Park, NY: Delmar Cengage Learning, 2012.
Denham, Elizabeth. Investigation into the Use of Facial Recognition Technology by the Insurance Corporation of British Columbia . Victoria: Office of the Information and Privacy Commissioner for British Columbia, 2012.
Denison, Charles M. Transforming Healthcare with Health Information Technology . New York: Nova Science Publishers, 2011.
Dennis, Donna I. “Obscenity Law and the Conditions of Freedom in the Nineteenth-Century United States.” Law and Social Inquiry 27, no. 2 (May 2002): 369–399.
Denno, Deborah W. “The Privacy Rights of Rape Victims in the Media and the Law: Perspectives on Disclosing Rape Victims' Names.” Fordham Law Review 61 (1993): 1113–1131.
Dershowitz, Alan M. Is There a Right to Remain Silent?: Coercive Interrogation and the Fifth Amendment after 9/11. Oxford: Oxford University Press, 2008.
Desai, Anuj C. “Wiretapping before the Wires: The Post Office and the Birth of Communications Privacy.” Stanford Law Review 60, no. 2 (2007).
Deutschman, A. The Second Coming of Steve Jobs. New York: Broadway Books, 2000.
Devol, Kenneth S. Mass Media and the Supreme Court: The Legacy of the Warren Years, 4th ed. Mamaroneck, NY: Hastings House, 1990.
Dhasarathan, Chandramohan, Vengattaraman Thirumal, and Dhavachelvan Ponnurangam. “Data Privacy Breach Prevention Framework for the Cloud Service.” Security and Communication Networks 8, no. 6 (April 2015): 982–1005.
DiBona, Chris. Open Sources Voices from the Open Source Revolution . Beijing: O'Reilly, 1999.
Dicker, Georges. Descartes: An Analytical and Historical Introduction . Oxford, England: Oxford University Press, 1993.
Diffie, Whitfield, and Susan Eva Landau. Privacy on the Line: The Politics of Wiretapping and Encryption, updated and expanded ed. Cambridge, MA: MIT Press, 2010.
Dixon, Rod. Open Source Software Law . Boston, MA: Artech House, 2004.
Doerner, William G., and M. L. Dantzker, eds. Contemporary Police Organization and Management: Issues and Trends. Boston, MA: Butterworth-Heinemann, 2000.
Doherty, Carroll. “Balancing Act: National Security and Civil Liberties in a Post-9/11 Era.” Pew Research Center. June 7, 2013.
Donaldson, Molla S. Health Data in the Information Age: Use, Disclosure, and Privacy . Washington, DC: National Academy Press, 1994.
Donohue, Laura K. “Anglo-American Privacy and Surveillance.” Journal of Criminal Law and Criminology 96, no. 3 (Spring 2006): 1059–1208.
Donohue, Laura K. “Bulk Metadata Collection: Statutory and Constitutional Considerations.” Harvard Journal of Law and Public Policy 37 (Summer 2014): 757–900.
Doris, Elizabeth, and Kim Peterson. Government Program Briefing Smart Metering . Golden, CO: National Renewable Energy Laboratory, 2011.
Dorr, Dieter, and Russell L. Weaver, eds. The Right to Privacy in the Light of Media Convergence: Perspectives from Three Continents . Berlin: De Gruyter, 2012.
Douglas, William O. Go East, Young Man: The Early Years . New York: Random House, 1974.
____. The Court Years . New York: Random House, 1980.
Doyle, Aaron. Eyes Everywhere: The Global Growth of Camera Surveillance . Abingdon, Oxon, England: Routledge, 2012.
Doyle, Charles. Terrorism: Section by Section Analysis of the USA PATRIOT Act. Congressional Research Service Report for Congress. Washington, DC: Library of Congress, 2001.
____. Wiretapping and Electronic Surveillance: The Electronic Communications Privacy Act and Related Matters . Washington, DC: Congressional Research Service, Library of Congress, 1992.
Doyle, Michael. “False Light, Camera, Action: The Story Joe Eszterhas Forgot to Share.” Slate, February 25, 2004.
Draft Communications Data Bill . London: Stationery Office, 2012.
Drake, Bruce. “Divide between Blacks and Whites on Police Runs Deep.” Washington, DC: Pew Research Center, 2015.
Dreisbach, Christopher. Ethics in Criminal Justice . New York: McGraw-Hill, 2008.
Dryer, Randy L., and S. Shane Stroud. “Automatic License Plate Readers: An Effective Law Enforcement Tool or Big Brother's Latest Instrument of Mass Surveillance? Some Suggestions for Legislative Action.” Jurimetrics Jou rnal 55, no. 2 (Winter 2015): 225–274.
Duda, Nancy Lee. The Intersection of Privacy Concern and Trust: Beliefs of Privacy Orientation Groups . 2004.
Dudley, Christie. “Statutory (Re)Interpretation of CPNI: Protecting Mobile Privacy.” February 14, 2013.
Duffy, D. Jan. “Tortious Invasion of Privacy.” Employment Relations Today 10, no. 4 (Winter 1983): 381–390.
Duffy, Gerard J. “The New CPNI Rules.” Rural Telecommunications, March 1, 2008.
Dumas, M. Barry. Diving into the Bitstream: Information Technology Meets Society in a Digital World . New York: Routledge, 2012.
Dumbill, Edd. Volume, Velocity, Variety: What You Need to Know About Big Data. Forbes, January 19, 2012.
Dunham, Wolcott B. After the Gramm-Leach-Bliley Act: A Road Map for Insurance Companies . New York, N.Y.: Practicing Law Institute, 2000.
Durga Priya, G., and Soma Prathibha. “Assuring Correctness for Securing Outsourced Data Repository in Cloud Environment.” In 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, 1745–1748. IEEE, 2014.
Dwan, Berni. “Identity Theft.” Computer Fraud & Security , no. 4 (April 2004): 14–17.
Dworkin, Gerald. “Access to Medical Records-Discovery, Confidentiality and Privacy.” The Modern Law Review 42, no. 1 (1979): 88–91.
E
Easton, Eric B. “Ten Years After: Bartnicki v. Vopper as a Laboratory for First Amendment Advocacy and Analysis.” University of Louisville Law Review 50 (2011): 287.
Easton, Richard D., and Eric F. Frazier. GPS Declassified: From Smart Bombs to
Easttom, Chuck, and Jeff Taylor. Computer Crime, Investigation and the Law . Boston, MA: Course Technology Publishers, 2011.
Ebbe, Obi N. I., ed. Comparative and International Criminal Justice Systems: Policing, Judiciary, and Corrections, 3d ed. Boca Raton, FL: CRC Press, 2013.
Efrati, Amir. “Google's Data-Trove Dance.” Wall Street Journal, July 30, 2013.
Egelman, Serge, Adrienne Porter Felt, and David Wagner. “Choice Architecture and Smartphone Privacy: There's a Price for That.” The Economics of Information Security and Privacy : 211–236.
Eibner Christine, et al. 2010. Establishing state health insurance exchanges: implications for health insurance enrollment, spending, and small businesses. RAND. Santa 105 Monica, CA.
____. 2012. The Effect of the Affordable Care Act on Enrollment and Premiums, With and Without the Individual Mandate. RAND. Santa Monica, CA.
Ek, Kaitlin. Note, “Conspiracy and the Fantasy Defense: The Strange Case of the Cannibal Cop.” Duke Law Journal 64 (2015): 901–945.
Eldredge, Lawrence H. “William Lloyd Prosser.c California Law Review 60, no. 5 (September 1972): 1245–1251.
Elmendorf, Douglas. “CBO's Analysis of the Major Health Care Enacted in March 2010.” Testimony before the Subcommittee on Health, Committee on Energy and Commerce U.S. House of Representatives from Washington, D.C., 2011.
Emden, Christian. Changing Perceptions of the Public Sphere . Oxford, England: Berghahn Books, 2012.
Emerson, Thomas I. “The Right of Privacy and Freedom of the Press,” in vol. 1 of Privacy, 2 vols., ed. by Raymond Wacks. New York: New York University Press, 1993. Faculty Scholarship Series. Paper 2776.
Employment Systems Review Guide to the Audit Process: Employment Equity. Ottawa: Employment Equity Branch, Canadian Human Rights Commission, 2002.
Engdahl, Sylvia. Mobile Apps . Detroit, MI: Greenhaven Press, 2014.
Epstein, Richard A. “Privacy, Publication, and the First Amendment: The Dangers of First Amendment Exceptionalism.” Stanford Law Review 52 (2000): 1003–1048.
Erbschloe, Michael. Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code . Amsterdam: Elsevier Butterworth Heinemann, 2005.
Erickson, Jon. Hacking: The Art of Exploitation, 2nd ed. San Francisco: No Starch Press, 2008.
Esayas, Samson. “Breach Notification Requirements under the European Union Legal Framework: Convergence, Conflicts, and Complexity in Compliance.” John Marshall Journal of Information Technology & Privacy Law 31, no. 3 (2014): 317–368.
Espejo, Roman. AIDS . Detroit, MI: Greenhaven Press, 2012.
____. Privacy . Detroit: Greenhaven Press, 2011.
____. Smartphones . Gomez-Martin, Laura E. “Smartphone Usage and the Need for Consumer Privacy Laws.” Tlp Pittsburgh Journal of Technology Law and Policy 12 (2012).
Estlack, Russell W. Shattered Lives Shattered Dreams: The Disrupted Lives of Families in America's Internment Camps . Springville, UT: Bonneville Books, 2011.
Estulin, Daniel. Deconstructing Wikileaks . Chicago, IL: Trine Day, 2012.
Etzioni, Amitai. “HIV Testing of Infants: Privacy and Public Health.” Health Affairs 17, no. 4 (July/August 1998): 170–83.
____. “Privacy,” in Privacy in a Cyber Age: Policy and Practice. New York: Palgrave Macmillan, 2015.
____. How Patriotic Is the Patriot Act?: Freedom versus Security in the Age of Terrorism . New York: Routledge, 2004.
____. The Limits of Privacy . New York: Basic Books, 1999.
____. “Seeking Middle Ground on Privacy vs. Security.” Christian Science Monitor , October 15, 2002: 11.
“EURODAC Fingerprint Database under Fire by Human Rights Activists.” Euractiv.com, July 15, 2015.
European Commission. “Myth-Busting: The Court of Justice of the EU and the ‘Right to be Forgotten.’”
European Union Agency for Fundamental Rights and the Council of Europe. Handbook on European Data Protection Law. 2014.
Examination of the GLBA Five Years after Its Passage: Hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Eighth Congress, Second Session, on the GLBA(P.L. 106–102), T . Washington: U.S. G.P.O.:, 2006.
Executive Office of the President. Big Data and Differential Pricing . The White House. February 2015.
Executive Office of the President. Big Data: Seizing Opportunities, Preserving Values . The White House. May 1, 2014.
Eyre, William. The Real ID Act Privacy and Government Surveillance. El Paso, TX: LFB Scholarly Pub., 2011.
Ezor, Jonathan. Privacy and Data Protection in Business: Laws and Practices . New Providence, NJ: LexisNexis, 2012.
F
Faber Jonathan L. “Indiana: A Celebrity-Friendly Jurisdiction.” Res Gestae: J. Ind. State B. Ass'n 43 (March 2000). http://www.luminarygroup.com/images/ResGestae_2000–03.pdf .
Fair Credit Reporting . Boston, MA: National Consumer Law Center, 2013. www.nclc.org/library.org .
Farivar, Cyrus. “Class-Action Lawsuit Settlement Forces Netflix Privacy Changes.” Ars Technica, July 20, 2012.
Fay, John. Drug Testing . Boston: Butterworth-Heinemann, 1991.
“FBI Outlines a Wiretapping Future.” Network Security 1995, no. 11 2–3.
Felderer, Bernhard. “Can Immigration Policy Help to Stabilize Social Security Systems?,” in Economic Aspects of International Migration, ed. Herbert Giersch. Berlin: Springer-Verlag, 1994.
Feller, Joseph. Perspectives on Free and Open Source Software . Cambridge, MA: MIT Press, 2005.
Feng, Yicheng, and Pong C. Yuen. “Biometric Template Protection: Towards A Secure Biometric System.” Handbook of Pattern Recognition and Computer Vision. 455–476.
Ferguson, Andrew Guthrie. “Personal Curtilage: Fourth Amendment Security in Public.” William and Mary Law Review 55, no. 4 (2014).
Feser, Edward. Locke. London: Oneworld, 2007.
Feuer, Katherine. “Protecting Government Secrets: A Comparison of the Espionage Act and the Official Secrets Act,” Boston College International and Comparative Law Review Vol. 38, no. 1 (2015).
Fibbe, George H. “Screen-Scraping and Harmful Cybertrespass after Intel.” Mercer Law Review 55, no. 1011 (2004).
Fidler, David P. The Snowden Reader . Steininger, Michael. “Merkel under Fire as Germany Seethes over NSA Spying.” Christian Science Monitor , July 2, 2013.
Figliola, Patricia Moloney. Wireless Privacy and Spam Issues for Congress . Washington, DC: Congressional Research Service, Library of Congress, 2006.
“Financial Data Safeguards. (GLBA Regulates Financial Institution Security).” Security Management, September 1, 2002.
Financial Services Modernization: Analysis of the GLBA of 1999. New York, N.Y.: Matthew Bender, 2000.
Finkelman, Paul. “German Victims and American Oppressors: The Cultural Background and Legacy of Meyer v. Nebraska ,” in Law and the Great Plains: Essays on the Legal History of the Heartland, ed. John R. Wunder. Westport, CT: Greenwood Press, 1996.
Finn, Peter, and Sari Horwitz. “U.S. Charges Snowden with Espionage.” Washington Post, June 21, 2013.
Fishman, Clifford S. “Electronic Privacy in the Government Workplace and City of Ontario, California v. Quon : The Supreme Court Brought Forth a Mouse.”
Fishman, Steve. “Bradley Manning's Army of One.” New York . July 3, 2011.
Foege, Alec. “Consumer Data Privacy and the Importance of a Social Contract.” Data-Informed.com . August 6, 2013.
Foerstel, Herbert N. The PATRIOT Act: A Documentary and Reference Guide . Westport, CT: Greenwood, 2007.
Follow-up Review of the FBI's Progress toward Biometric Interoperability between IAFIS and IDENT. Washington, D.C.: U.S. Dept. of Justice, Office of Inspector General, Evaluations and Inspections Division, 2006.
Forer, Lois G. A Chilling Effect: The Mounting Threat of Libel and Invasion of Privacy Actions to the First Amendment. New York: Norton, 1987.
Foster, James C., and Stephen C. Foster. Programmer's Ultimate Security Deskref . Rockland, MA: Syngress, 2004.
“Fourth Amendment—Search and Seizure—Searching Cell Phones Incident to Arrest.” Harvard Law Review (2014).
“Fourth Amendment. Stop and Frisk.” The Journal of Criminal Law and Criminology 69, no. 4 (1978): 464.
Fowler, Andrew. The Most Dangerous Man in the World: The Explosive True Story of Julian Assange and the Lies, Cover-Ups and Conspiracies He Exposed. New York: Skyhorse Publishing, 2011.
Fox, Christopher. “Checking In: Historic Cell-Site Location Information and the Stored Communications Act.” Seton Hall Law Review 42 (2012): 769–792.
Francesca M. Brancato, Fourth Amendment Right to Privacy with Respect to Bank Records in Criminal Cases 29 Touro Law Review 1241 (2013)
Frankel, Alison. “Why Is DOJ Fighting to Keep Mug Shots Out of Reporters' Hands?” Reuters (August 13, 2015).
Frankfurt, Harry. Demons, Dreamers and Madmen: The Defense of Reason in Descartes' Meditations. Indianapolis, IN: Bobbs-Merrill, 1970.
Franklin, Cary. “Griswold and the Public Dimension of the Right to Privacy.” Yale Law Journal Forum 124, 332.
Frantz, Joe B., interviewer. Transcript, Earl Warren Oral History Intervie w I. September 21, 1971. Internet Copy, LBJ Library.
Freedman, Jeri. America Debates Privacy versus Security . New York: Rosen Pubishing Group, 2008.
Freeman, Lee. Information Ethics Privacy and Intellectual Property . Hershey, PA: Information Science Pub., 2005.
Friedland, Steven. “Cell Phone Searches in a Digital World: Blurred Lines, New Realities and Fourth Amendment Pluralism.” SSRN Electronic Journal SSRN Journal .
Friedman, Lawrence M. Guarding Life's Dark Se cret. Stanford, CA: Stanford University Press, 2007, 213–234.
Friedman, Leon. Obscenity: The Complete Oral Arguments before the Supreme Court in the Major Obscenity Cases, rev. ed. New York: Chelsea House, 1983.
Friend, Charles E. “Constitutional Law—Right of Privacy—Time, Inc. v. Hill, 87 S. Ct. 534 (1967).” William & Mary Law Review 8 (1967): 683–687.
Fuchs, Christian. Social Media: A Critical Introduction . Thousand Oaks, CA: Sage, 2014.
G
Gajda, Amy. “What If Samuel D. Warren Hadn't Married a Senator's Daughter?: Uncovering the Press Coverage That Led to ‘The Right to Privacy,’” Michigan State Law Review. 2008, 35.
Galbally, Javier, Julian Fierrez, Javier Ortega-Garcia, and Raffaele Cappelli. “Fingerprint Anti-spoofing in Biometric Systems.” Handbook of Biometric Anti-Spoofing Advances in Computer Vision and Pattern Recognition , 35–64.
Garber, Daniel. Descartes' Metaphysical Physics . Chicago, IL: University of Chicago Press, 1992.
Garbin, Brigette, et al. “Tracking Legislative Developments in Relation to ‘Do Not Track’ Initiative s.” In Uberveillance and the Social Implications of Microchip Implants: Emerging Technologi es, edited by M. G. Michael and Katina Michael. Hershey, PA: Information Science Reference, 2014.
Garcia, Alfredo. The Fifth Amendment: A Comprehensive Approach. Westport, CT: Greenwood Press, 2002.
Gardner, Steven. “Privacy and Debt Collection Implications of the Fair Credit Reporting Act and the 2003 Fact Act.” Consumer Finance Law Quarterly Report 58, no. 46 (2004).
Garfield, Jay L. Abortion, Moral and Legal Perspectives . Amherst: University of Massachusetts Press, 1984.
Garfinkel, Simson, and Gene Spafford. Web Security, Privacy & Commerce, 2nd ed. Sebastopol, CA: O'Reilly Media, 2011.
Garrett, Brandon. The Right to Privacy . New York: Rosen Pub. Group, 2001.
Garrow, David J. “Human Rights Hero: The Legal Legacy of Griswold v. Connecticut .” Human Rights (2011): 26–25.
____. Liberty and Sexuality: The Right to Privacy and the Making of Roe v. Wade . 1994
Gaukroger, Stephen. Descartes: An Intellectual Biography. Oxford, England: Clarendon Press, 1995.
Gavison, Ruth. “Privacy and the Limits of Law.” An Anthology: Philosophical Dimensions of Pri vacy 89, no. 3 (1980): 346–402.
Gelenbe, Erol. Information Sciences and Systems 2013: Proceedings of the 28th International Symposium on Computer and Information Sciences .
Gellman, Robert. “Willis Ware's Lasting Contribution to Privacy: Fair Information Practices.” IEEE Security & Privacy 12, no. 51 (2014).
Gellman, Robert. Fair Information Practices: A Basic History . February 11, 2015.
Gelman, Robert B., and Stanton McCandlish. Protecting Yourself Online: The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace . New York: HarperEdge, 1998.
George, Richard T. The Ethics of Information Technology and Business . Malden, MA: Blackwell, 2003.
George, Robert P. “The Concept of Public Morality.” American Journal of Jurisprudence 45, no. 1 (2000): 17–31.
Gilbert, Franc. Sixteenth Annual Institute on Privacy and Data Security Law .
Gill, Peter. Policing Politics: Security Intelligence and the Liberal Democratic State. Hoboken, NJ: Taylor and Francis, 2012.
Gilliom, John. Surveillance, Privacy, and the Law: Employee Drug Testing and the Politics of Social Control . Ann Arbor: University of Michigan Press, 1994.
Gladstone, Julia Alpert. “Data Mines and Battlefields: Looking at Financial Aggregators to Understand the Legal Boundaries and Ownership Rights in the Use of Personal Data.” Journal of Marshall Computer and Information Law 19, no. 313 (2001).
Glancy, Dorothy J. “Privacy and the Other Miss M.” Northern Illinois University Law Review 10 401 (1990).
Glancy, Dorothy J. “The Invention of the Right to Privacy.” Arizona Law Review 21, no. 1 (1979): 1–39.
Glasser, Charles, ed. International Libel & Privacy Handbook . New York: Bloomberg Press, 2006.
Gluck, Elizabeth Brody. “An Act Worth Balancing: Privacy and Safety on Today's College Campuses.” University Business 11, no. 11 (November 2008).
Godkin, Edwin Lawrence. Life and Letters of E. L. Godkin. Edited by Rollo Ogden. New York: Macmillan, 1907.
Godkin, Edwin Lawrence. The Gilded Age Letters of E. L. Godkin. Edited by William M. Armstrong. Albany: State University of New York Press, 1974.
Godwin, Mike. Cyber Rights: Defending Free Speech in the Digital Age, rev. and updated ed. Cambridge, MA: MIT Press, 2003.
Goldberg, Suzanne B. “Morals-Based Justifications for Lawrence : Before and after Lawrence v. Texas. ” Minnesota Law Review 88, no. 5 (2004).
Goldenberg, Suzanne, and Ed Pilkington, eds. “State Conservative Groups Plan US-Wide Assault on Education, Health and Tax.” Guardian (New York), December 13, 2013.
Goldfarb, Ronald, et al. After Snowden: Privacy, Secrecy and Security in the Information Age. New York: T. Dunne, 2015.
Goldstein, Emmanuel. Best of 2600: A Hacker Odyssey . Indianapolis, IN: Wiley Publishing, 2008.
Gonzales, Alfonso. Reform without Justice: Latino Migrant Politics and the Homeland Security State. New York: Oxford University Press, 2014.
Goodale, Gloria. “Privacy Concerns? What Google Now Says It Can Do with Your Data.” Christian Science Monitor, April 16, 2014.
Goode, Luke. Jürgen Habermas Democracy and the Public Sphere . London: Pluto Press, 2005.
Gottfried, Ted. Privacy Individual Right v. Social Needs . Brookfield, CT: Millbrook Press, 1994.
Government Communications Headquarters (GCHQ): New Accommodation Programme: Report . London: Stationery Office, 2003.
Grabell, M. (Jan. 27, 2012). Drive-by Scanning: Officials Expand Use and Dose of Radiation for Security Screening. ProPublica.
Graham, Richard, Richard Hall, and W. Gerry Gilmer. “Connecting the Dots …: Information Sharing by Post-Secondary Educational Institutions under the Family Education Rights and Privacy Act (FERPA).” Education and the Law 20, no. 4 (2008): 301–316.
Grama, Joanna Lyn. Legal Issues in Information Security, 2d ed. Burlington, MA: Jones & Bartlett Learning, 2015.
Grande, Allison, “EU, Google in Power Struggle Over ‘Right to Be Forgotten.’” Law360, July 30, 2014.
Grandinetti, Lucio, Ornella Pisacane, and Mehdi Sheikhalishahi. Pervasive Cloud Computing Technologies: Future Outlooks and Interdisciplinary Perspectives . Hershey, PA: Information Science Reference, 2014.
Grant, Joseph Karl. “What the Financial Services Industry Puts Together Let No Person Put Asunder: How the GLBA Contributed to the 2008–2009 American Capital Markets Crisis.” Albany Law Review , 2010.
Grant, Rebecca A. Visions of Privacy Policy Choices for the Digital Age . Toronto, Ontario, Canada: University of Toronto Press, 1999.
Gray, Dahli, and Jessica Ladig, “The Implementation of EMV Chip Card Technology to Improve Cyber Security Accelerates in the U.S. Following Target Corporation's Data Breach.” International Journal of Business Administration 6 (2015): 60.
Graybeal, J. “Achieving Semantic Interoperability.” In The MMI Guides: Navigating the World of Marine Metadata , 2009.
Grayling, A. C. Liberty in the Age of Terror: A Defence of Civil Liberties and Enlightenment Values . London: Bloomsbury, 2009.
Green, Walter L., Randy Seidehamel, and Martha Grace Rich. “Cellular Telephones and Interference with Privacy.” Mayo Clinic Proceedings 82, no. 7 (2007): 889.
Greene, Kathryn, Valerian J.Verlega, Gust A. Yep, and Sandra Petronio. Privacy and Disclosure of HIV in Interpersonal Relationships: A Sourcebook for Researchers and Practitioners. New York: Routledge, 2003.
Greenhalgh, William W. The Fourth Amendment Handbook: A Chronological Survey of Supreme Court Decisions . Chicago: Criminal Justice Section, American Bar Association, 1995.
Greenstein, Shane M., and Feng Zhu. Collective Intelligence and Neutral Point of View: The Case of Wikipedia . Cambridge, MA: National Bureau of Economic Research, 2012.
Greenwald, Glenn. “On the Espionage Act Charges against Edward Snowden.” Guardian June 22, 2013.
____. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State . New York: Metropolitan Books/H. Holt, 2014.
Greiffenhagen, Michael. Engineering, Statistical Modeling and Performance Characterization of a Real-Time Dual Camera Surveillance System . 2002.
Griffith, Elwin J. “Credit Reporting, Prescreened Lists, and Adverse Action: The Impact of the Fair Credit Reporting Act and the Equal Credit Opportunity Act.” California West Law Review 46, no. 1 (2009).
Gripsrud, Jostein. The Public Sphere . Los Angeles, CA: Sage, 2011.
Gun Control Opportunities to Close Loopholes in the National Instant Criminal Background Check System. Washington, D.C.: U.S. General Accounting Office, 2002.
Gun Control: Options for Improving the National Instant Criminal Background Check System: Report to Congressional Requesters. Washington, D.C.: U.S. General Accounting Office, 2002.
Gunning, Jennifer, and Law Ethics. Ethics, Law and Society . Aldershot, England: Ashgate, 2009.
Gutnick, Aviva Lucas, Michael Robb, Laurie Takeuchi, and Jennifer Kotler. Always Connected: The New Digital Media Habits of Young Children. New York: Joan Ganz Cooney Center at Sesame Workshop, 2011.
H
Habermas, Jurgen. The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society . Cambridge, MA: MIT Press, 1989.
Habte, M. “Federal and State Data Privacy Laws and Their Implications for the Creation and Use of Health Information Databases.” Big Data: A Business and Legal Guide. 2014, 55–78.
Hadjipetrova, Ganka, and Hannah G. Poteat. “States Are Coming to the Fore of Privacy in the Digital Era.” Landslide 6, no. 6 (July/August 2014).
Hall, John Wesley. Search and Seizure, 3rd ed. Charlottesville, VA: LEXIS Law Pub., 2000.
Hall, Kermit L., and John J. Patrick. The Pursuit of Justice: Supreme Court Decisions That Shaped America . New York: Oxford University Press, 2006.
Halper, T. “Privacy and Autonomy: From Warren and Brandeis to Roe and Cruzan.” Journal of Medicine and Philosophy , 1996, 121–135.
Halstuk, Martin E. “Shielding Private Lives from Prying Eyes: The Escalating Conflict between Constitutional Privacy and the Accountability Principle of Democracy.” Communications Law Conspectus 11 (2003): 71.
Halstuk, Martin E. “When Is an Invasion of Privacy Unwarranted under the FOIA? An Analysis of the Supreme Court's ‘Sufficient Reason’ and ‘Presumption of Legitimacy’ Standards.” University of Florida Journal of Law & Public Policy 16, no. 3 (December 2005): 361–400.
Halstuk, Martin E., and Bill F. Chamberlin, “The Freedom of Information Act 1966–2006: A Retrospective on the Rise of Privacy Protection over the Public Interest in Knowing What the Government's Up To,” Communication Law and Po licy 11, no. 4 (September 2006): 511–564.
Halstuk, Martin E., and Charles N. Davis. “The Public Interest Be Damned: Lower Court Treatment of the Reporters Committeee ‘Central Purpose’ Reformulation.” Administrative Law Review 54, no. 3 (2002): 983–1024.
Hamblen, J. W. “Preservation of Privacy in Testing.” Science 151, no. 3715 (March 11, 1966): 1174.
Hammitt, Harry A., et al., eds. Litigation under the Federal Open Government Laws . Washington, DC: Electronic Privacy Information Center, 2010.
Hampshire, Stuart, ed. Public and Private Morality . New York: Cambridge University Press, 1978.
Handley, John. “Prism and Boundless Informant: Is NSA Surveillance a Threat?” American Diplomacy, July 17, 2013.
Harding, Luke, and David Leigh. Wikileak, new. ed. London: Random House UK, 2013.
____. The Snowden Files: The Inside Story of the World's Most Wanted Man . New York: Vintage Books, 2014.
Harkinson, Josh. “Here's How Twitter Can Track You on All of your Devices.” Mother Jones, September 24, 2013.
Harper, Nick. “FISA's Fuzzy Line between Domestic and International Terrorism.” University of Chicago Law Review 81, no. 3 (Summer 2014): 1123–1164.
Harrington, Jan L. Network Security: A Practical Approach . Amsterdam: Elsevier, 2005.
Harris, Shane. “TIA Lives On.” National Journal 38, no. 8 (2006): 66–67.
____. @War: The Rise of the Military-Internet Complex . Boston, MA: Houghton Mifflin Harcourt, 2014.
Harrison, Maureen. Obscenity and Pornography Decisions of the United States Supreme Court . Carlsbad, CA: Excellent Books, 2000.
Hartley, John, Jean Burgess, and Axel Bruns, eds. A Companion to New Media Dynamics. Malden, MA: Wiley, 2013.
Hartman, Scott. Note in “Privacy, Personhood and the Courts: FOIA Exemption 7(C) in Context.” 120 Yale Law Journal 120, no. 379 (2010).
Harvey, Trevor. “Cookies Part II—Privacy Pirates or Useful Utilities?” British Journal of Healthcare Management 5, no. 8 (August 1999): 323.
Hassan, M. Kabir, and Abdullah Mamun. “Global Impact of the Gramm-Leach-Bliley Act: Evidence from Insurance Industries of Developed Countries.” Financial Market Regulation , 2010, 63–77.
Hastedt, G. P. Reading in American Foreign Policy: Problems and Responses. Lanham, MD: Rowman & Littlefield, 2016.
Hastings, Glen, and Richard Marcus. Identity Theft, Inc.: A Wild Ride with the World's #1 Identity Thief . New York: The Disinformation Company, 2006.
Hayes, David L. “Cellular Telephones and Interference with Privacy–Reply–III.” Mayo Clinic Proceedings 82, no. 7 (2007): 890.
Hayes, Paul. Subpoenas . Melbourne: Leo Cussen Institute, 2001.
Heffernan, William C. “Fourth Amendment Privacy Interests.” Journal of Criminal Law and Criminology 92, no. 1 (2001).
Heinze, Eric. Sexual Orientation: A Human Right: An Essay on International Human Rights Law . Dordrecht: M. Nijhoff Publishers, 1995.
Henry, Anna. “The Fight to Protect CPNI.” Rural Telecommunications , November 1, 2009.
Herold, Rebecca, and Christine Hertzog. Data Privacy for the Smart Grid . Reid, Irwin E. Smart Meters and the Smart Grid: Privacy and Cybersecurity Considerations . New York: Nova Science Publishers, 2012.
Herold, Rebecca. “Privacy Breach Incident Response,” in Information Security Management Handbook, 6th ed., ed. Harold F. Tipton and Micki Krause. Boca Raton, FL: Auerbach Publications, 2007.
Hersey, Pala. “Moore v. East Cleveland : The Supreme Court's Fractured Paean to the Extended Family.” Journal of Contemporary Legal Issues 14, no. 1, (2004): 57–64.
Heun, David. “Pealing Back Layers of Fraud Protection.” Payments Source (March 14, 2012)
Hiestand, Todd C. and W. Jesse Weins, eds., Sexting and Youth: A Multidisciplinary Examination Kreimer, Seth F. “Sex, Laws, and Videophones: The Problem of Juvenile Sexting Prosecutions,” in Children, Sexuality, and the Law, ed. Sacha M. Coupet and Ellen Marrus, 133–62 (New York: New York University Press, 2015).
Hills, J. “Regulation, Innovation and Market Structure in International Telecommunications: The Case of the 1956 TAT1 Submarine Cable.” Business History 49, no. 6 (2007): 868–885.
Himma, Kenneth Einar. The Handbook of Information and Computer Ethics . Hoboken, NJ: Wiley, 2008.
Hinde, Natasha. “Did Instagram Ban This Account Because of a Photo Showing Women's Pubic Hair?” The Huffington Post UK, January 21, 2015.
Hinkle, Robert, David McCraw, Daniel Kanstroom, and Eleanor Acer. Conference on Privacy and Internet Access to Court Files, Panel Two: “Should There Be Remote Public Access to Court Filings in Immigration Cases?” Fordham Law Review 79, no. 1 (2010): 25–44.
Hinsley, F. H. Codebreakers: The inside Story of Bletchley Park . Oxford: Oxford University Press, 1993.
HIPAA in Practice: The Health Information Manager's Perspective . Chicago, IL: AHIMA, 2004.
Hirschey, Jeffrey Kenneth. “Symbiotic Relationships: Pragmatic Acceptance of Data Scraping,” Berkeley Technical Law Journal 29, no. 897 (2014).
Hodder, Lucy C. Health Care Reform, a Legal Perspective: Where Are We and Where Are We Going? Concord, N.H.: New Hampshire Bar Association, 2010.
Hoff, Jessica, Enhancing Security While Protecting Privacy: The Rights Implicated by Supposedly Heightened Airport Security , 2014 Michigan State Law Review . 1609 (2014)
Holder, Eric Himpton, Laurie O. Robinson, John H. Laub, and National Institute of Justice. The Fingerprint Sourcebook . Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2011.
Holland, Stephen. “The Virtue Ethics Approach to Bioethics.” Bioethics 25, no. 4 (2011): 192–201.
Holmes, Burnham. The Fifth Amendment. Englewood Cliffs, N.J.: Silver Burdett Press, 1991.
Holtzman, David H. Privacy Lost: How Technology Is Endangering Your Privacy . San Francisco, CA: Jossey-Bass, 2006.
Hoofnagle, Chris Jay. “Identity Theft: Making the Known Unknowns Known.” Harvard Journal of Law and Technology 21, no. 1 (2007): 97–122.
Hopkins, W. Wat. “Snyder v. Phelps and the Unfortunate Death of Intentional Infliction of Emotional Distress as a Speech-Based Tort.” Journal of Media Law and Ethics, no. 3/4 (Summer/Fall 2012): 1–36.
____. Actual Malice: Twenty-Five Years After Times v. Sullivan. New York: Praeger, 1989.
Hormozi, Amir M. “Cookies and Privacy.” Information Systems Security 13, no. 6 (2005): 51–59.
Horne, Felix, and Cynthia Wong. “They Know Everything We Do”: Telecom and Internet Surveillance in Ethiopia .
Horner, Annie M. Gonzaga v. Doe: The Need for Clarity in the Clear Statement Test , 52 S.D.L.Rev 537 (2007).
Horsey, Kirsty, and Erika Rackley. “Invasion of Privacy,” in Tort Law, 4th ed. New York: Oxford University Press, 2015.
Horton, David. “The Stored Communications Act and Digital Assets.” Vanderbilt Law Review 72, no. 6 (2014): 1729–1739.
Hosek, Susan D., and Susan G. Straus. Patient Privacy, Consent, and Identity Management in Health Information Exchange: Issues for the Military Health System .
Hossain, S. M. E., and G. Chetty. “Human Identity Verification Using Physiological and Behavioral Biometric Traits.” International Journal of Bioscience, Biochemistry and Bioinformatics 1, no. 3 (2011): 199–205.
Hotaling, A. (2007). Protecting personally identifiable information on the internet: Notice and consent in the age of behavioral targeting. CommLaw Conspectus.
How the Health Insurance Portability and Accountability Act (HIPAA) and Other Privacy Laws Affect Public Transportation Operations . Washington, DC: Transportation Research Board, 2014.
Howard, Michael, and David LeBlanc. 24 Deadly Sins of Software Security Programming Flaws and How to Fix Them . New York: McGraw-Hill, 2010.
Hsia, Richard. Cybersecurity . Kostopoulos, George K. Cyberspace and Cybersecurity . Boca Raton, Fl.: CRC Press, 2013.
Hubbartt, William S. The New Battle over Workplace Privacy: How Far Can Management Go? What Rights Do Employees Have?: Safe Practices to Minimize Conflict, Confusion, and Litigation . New York: AMACOM, 1998.
Huber, Peter W. Law and Disorder in Cyberspace: Abolish the FCC and Let Common Law Rule the Telecoms . New York: Oxford University Press, 1997.
Hudson, David L. The Right to Privacy . New York: Chelsea House, 2010.
____. Let the Students Speak!: A History of the Fight for Free Expression in American Schools. Boston, MA: Beacon Press, 2011.
Huggins, Maeve E. Note in “Don't Take It Personally: Supreme Court Finds Corporations Lack Personal Privacy under FOIA Exemptions.” Catholic University Journal of Law and Technology 19, no. 481 (2011).
Hull, N. E. H. The Abortion Rights Controversy in America: A Legal Reader . Chapel Hill: University of North Carolina Press, 2004.
Humphries, Stephanie. “Institutes of Higher Education, Safety Swords, and Privacy Shields: Reconciling FERPA and the Common Law.” Journal of College and University Law 35, no. 1 (2008): 145.
Hunt, Jennifer Nichole. “Bartnicki v. Vopper: Another Media Victory or Ominous Warning of a Potential Change in Supreme Court First Amendment Jurisprudence?” Pepperdine Law Review 30 (2003): 367.
Hunter, Richard. World without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Computing . New York: Wiley, 2002.
Hutchins, John P. U.S. Data Breach Notification Law: State by State . Chicago, IL: American Bar Association, Section of Science & Technology Law, 2007.
Hutnik, Alysa Zeltzer, Robyn Mohr, and Matthew P. Sullivan. “Applying the Video Privacy Protection Act to Online Streaming.” AD Law Access, June 2, 2015.
Hyslop, Maitland. Critical Information Infrastructures: Resilience and Protection . New York: Springer, 2007.
I
Iannarelli, John. Information Governance and Security: Protecting and Managing Your Company's Proprietary Information . Waltham, MA: Elsevier, 2015.
Ignatius, David. “Rules for Spying.” Washington Post, November 3, 2013.
Im Hof, Ulrich. The Enlightenment . Tr. by William E. Yuill. Cambridge, MA: Blackwell, 1994.
Information Commissioner's Office, United Kingdom. Guidance on Data Security Breach Management .
Information Privacy Law Sourcebook . Chicago, IL: American Bar Association, 2012.
Inness, Julie C. “The Threatened Downfall of Privacy: Judith Jarvis Thomson's ‘The Right to Privacy’ and Skepticism about Privacy.” In Privacy, Intimacy, and Isolation. New York: Oxford University Press, 1996.
International Survey of Privacy Rights and Developments . United States: EPIC, 2006.
Isaac, Mike. “Exclusive: Facebook Deal Nets Instagram CEO $400 Million.” Wired, April 9, 2012.
Israel, Jonathan I. Democratic Enlightenment: Philosophy, Revolution, and Human Rights 1750–1790 . New York: Oxford University Press, 2011.
J
Jacoby, Nicolle L., Melissa Bergman Squire, and Bureau of National Affairs. Employee Background Checks: Balancing the Need to Hire Wisely with Employees' Right to Privacy. Workforce Strategies 29, no. 4 (2011).
Jain, Anil K., and Karthik Nandakumar. “Biometric Authentication: System Security and User Privacy.” Computer 11, no. 45 (2012): 87–92.
Jenkins, Simms. The Truth about Email Marketing . Upper Saddle River, NJ: FT Press, 2009.
Jennings, Laurel, and Richard M Eastman. Wiretaps and Electronic Eavesdropping: Federal Law and Legal Ethics. New York: Nova Publishers, 2013.
Jensen, Gary F., and Dean G. Rojek. Delinquency and Youth Crime, 4th ed. Long Grove, IL: Waveland Press, 2009.
Jensen, Tamila C. “From Belle Terre to East Cleveland : Zoning, the Family, and the Right of Privacy.” Family Law Quarterly 13, no. 1 (Spring 1979): 1–25.
Jentzsch, Nicola. The Economics and Regulation of Financial Privacy: An International Comparison of Credit Reporting Systems. [Electronic resource.] Heidelberg : Physica-Verlag, 2006.
John Pollack, “Streetbook: How Egyptian and Tunisian Youth Hacked the Arab Spring,” MIT Technology Review, August 23, 2011.
Johns, Fran Moreland. Perilous Times: An Inside Look at Abortion before—and after— Roe v. Wade. New York: YBK, 2013.
Johnson, Arthur M. “Theodore Roosevelt and the Bureau of Corporations.” The Mississippi Valley Historical Review 45, no. 4 (March 1959): 571–590.
Johnson, Emily M. Legalities of GPS and Cell Phone Surveillance . New York: Novinka, 2012.
Johnson, John W. Griswold v. Connecticut: Birth Control and the Constitutional Right of Privacy . University Press of Kansas, 2005.
Johnson, Johna Till. “Privacy Discussion Overdue.” Network World , August 28, 2006.
Johnson, Kenneth C. “Beast of Burden: Regulatory Compliance and the Small Carrier.” Rural Telecommunications , January 1, 2008.
Johnson, Michelle. “Of Public Interest: How Courts Handle Rape Victims' Privacy Suits.” Communications Law and Policy, 4 no. 201 (1999).
Johnson, T. A. Cybersecurity: Protecting Critical Infrastructures from Cyber-Attack and Cyber Warfare. Boca Raton, FL: CRC Press, 2015.
Jolls, Christine. “Privacy and Consent over Time: The Role of Agreement in Fourth Amendment Analysis.” William and Mary Law Review 54, no. 5 (2013).
Jones, Kyle M. L. “Learning Analytics & FERPA: Issues of Student Privacy and New Boundaries of Student Data.” Proceedings of the American Society for Information Science and Technology 50, no. 1 (2013): 1–5.
Jones, Virginia A. “Protecting Information Privacy per U.S. Federal Law.” Information Management 48, no. 2 (2014): 18.
Jonsen, Albert R. “The History of Bioethics as a Discipline.” Philosophy and Medicine 78 (2004): 31–51.
Jonsen, Albert R. A Short History of Medical Ethics . New York: Oxford University Press, 2008.
Jung, Donald J. The Federal Communications Commission, the Broadcast Industry, and the Fairness Doctrine, 1981–1987 . Lanham, MD: University Press of America, 1996.
K
Kahney, L. Inside Steve's Brain. New York: Penguin Books Ltd., 2008.
Kahney, L. The Cult of Mac. San Francisco, CA: No Starch Press Inc., 2004.
Kalaf, William M. Arizona Law Enforcement Biometrics Identification and Information Sharing Technology Framework. Ft. Belvoir: Defense Technical Information Center, 2010.
Kalafut, Andrew, Abhinav Acarya, and Minaxi Gupta. “A Study of Malware in Peer-to-Peer Networks.” Proceedings of the Sixth ACM SIGCOMM Conference on Internet Measurement (2006): 327–332.
Kallen, Stuart A. Are Privacy Rights Being Violated? Detroit, MI: Greenhaven, 2006.
Kalven, Harry, Jr. “The New York Times Case: A Note on ‘The Central Meaning of the First Amendment.’” Supreme Court Review 1964 (1964): 191–221.
Kalven, Jr., Harry. “The Reasonable Man and the First Amendment: Hill, Butts, and Walker,” Supreme Court Review 1967 (1967): 280–309.
Kamisar, Yale. “Against Assisted Suicide—Even a Very Limited Form.” University of Detroit Mercy Law Review 735 (1995).
Kanstoroom, Marci and Eric C. Osberg, Ed. A Byte at the Apple: Rethinking Education Data for the Post-NCLB Era . Washington D.C.: Thomas B. Fordham Institute Press, 2008.
“Karalexis v. Byrne and the Regulation of Obscenity: ‘I Am Curious (Stanley).’” Virginia Law Review 56, no. 6 (1970): 1205.
Karas, Stan. “Privacy, Identity, Databases: Toward a New Conception of the Consumer Privacy Discourse.” American University Law Review 52 (December 2002).
Karch, Steven B. Workplace Drug Testing . Boca Raton: CRC Press, 2008.
Karimi, Hassan A. Big Data: Techniques and Technologies in Geoinformatics . Boca Raton, FL: CRC Press/Taylor & Francis Group, 2014.
Katz, Lewis R. “Mapp after Forty Years: Its Impact on Race in America.” Case Western Reserve Law Review 52 (Winter 2001): 471–487.
Kavanagh, Paul. Open Source Software Implementation and Management . Amsterdam: Elsevier Digital Press, 2004.
Kayastha, Nipendra, Dusit Niyato, Ping Wang, and Ekram Hossain. “ Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: a Survey.” Proceedings of the IEEE 99, no. 12 (2011): 2130–2158.
Keane, Tom. “Assessing Snowden, Six Months Later.” Boston Globe, December 29, 2013.
Keen, Paul. The Crisis of Literature in the 1790s: Print Culture and the Public Sphere . New York: Cambridge University Press, 1999.
Keeton, W. Page, et al. Prosser and Keeton on the Law of Torts § 117, at 85, 5th ed., 1984.
Keiter, Robert B. “Privacy, Children, and Their Parents: Reflections on and beyond the Supreme Court's Approach.” Minnesota Law Review 66 (November 1981): 459–468.
Keizer, Garret. Privacy . New York: Picador, 2012.
Keller, Bill. “Is Glenn Greenwald the Future of News?” New York Times , (New York, NY) Oct. 27, 2013.
Kennedy, Charles H. The Business Privacy Law Handbook . Boston, MA: Artech House, 2008.
Kenny, Anthony. Descartes: A Study of His Philosophy. New York: Random House, 1968.
Kent, Stephen T. Who Goes There? Authentication through the Lens of Privacy . Washington, DC: National Academies Press, 2003.
Kerr, Orin S. “A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It.” George Washington Law Review 72, no. 6 (August 2004): 1208–1243.
____. “Cybercrime's Scope: Interpreting ‘Access’ and ‘Authorization’ in Computer Misuse Statutes.” New York University Law Review 78 (2003): 1596.
____. “Four Models of Fourth Amendment Protection.” Stanford Law Review 60, no. 2 (2007): 503–551.
____. “The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution.” Michigan Law Review 102, no. 801 (2004).
____. “Vagueness Challenges to the Computer Fraud and Abuse Act.” Minnesota Law Review 94 (2010): 1561.
Kettl, Donald F., ed. The Department of Homeland Security's First Year: A Report Card. New York: Century Foundation, 2004.
Kgopa, Alfred Thaga. Information Security Issues Facing Internet Café Users .
Kiefer, Francine. “With Passage of USA Freedom Act, Congress Tweaks Security-Privacy Balance.” The Christian Science Monitor, June 2, 2015.
Kim, Richard S. Y. “Cyber-Surveillance: A Case Study in Policy and Development.” Ph.D. dissertation, City University of New York, 2010.
Kinsley, Jennifer M. “Sexual Privacy in the Internet Age: How Substantive Due Process Protects Online Obscenity.” Vanderbilt Journal of Entertainment and Technology Law 16 (2013): 103–131.
Kizza, Joseph Migga. Ethical and Social Issues in the Information Age . 4th ed. London: Springer, 2010.
Klein, Mark. Wiring Up the Big Brother Machine—and Fighting It. Charleston, SC: BookSurge, 2009.
Kleinig, John. The Ethics of Policing. New York: Cambridge University Press, 1996.
Klitou, Demetrius. “Technological Threats to Privacy.” Part II of Privacy-Invading Technologies and Privacy by Design . The Hague: T.M.C Asser Press, 2014.
Klosek, Jacqueline. Protecting Your Health Privacy: A Citizen's Guide to Safeguarding the Security of Your Medical Information . Santa Barbara, CA: Praeger, 2011.
Knowles, Jeffrey, and Ronald Jacobs. “FCC's CPNI Rule Limits Telecoms.” Direct Marketing News , May 21, 2007.
Kobilinsky, Lawrence F., Thomas F. Liotti, and Jamel Oeser-Sweat. DNA: Forensic and Legal Applicat ions. Hoboken, NJ: Wiley-Interscience, 2005.
Kohli, Aarti, Peter L. Markowitz, and Lisa Chavez. “Secure Communities by the Numbers: An Analysis of Demographics and Due Process.” Chief Justice Earl Warren Institute on Law and Social Policy, Berkeley Law Center for Research and Administration, October 2011.
Konvitz, Milton R. “Privacy and the Law: A Philosophical Prelude.” Law and Contemporary Problems : 272–280.
Koops, Bert-Jaap, “The Trouble with European Data Protection Law.” International Data Privacy Law 4, no. 4 (2014): 250–261.
Korjus, Markus. The Foreign Intelligence Surveillance Act. New York: Nova Science Publishers, 2013.
Kostopoulos, George K. Cyberspace and Cybersecurity . Boca Raton, FL: CRC Press, 2013.
Kramer, Irwin R. “The Birth of Privacy Law: A Century Since Warren and Brandeis.” Catholic University Law Review 39 (Spring 1990): 703–724.
Kravets, David. “Mug-Shot Industry Will Dig Up Your Past, Charge You to Bury It Again.” Wired.com (Aug. 2, 2011).
____. “We Don't Need No Stinking Warrant: The Disturbing, Unchecked Rise of the Administrative Subpoena.” Wired (August 28, 2012)
Krishnan, Aishwaria. “Unified Metadata: Key to Reliable, Consistent Information Exchange Between Banks and Regulators.” Report, Fintellix Solutions Pvt. Ltd., 2015.
Kristol, David M. “HTTP Cookies: Standards, Privacy, and Politics.” ACM Transaction on Internet Techno logy 1, no. 2 (2001).
Kruegle, Herman. CCTV Surveillance: Analog and Digital Video Practices and Technology, 2nd ed. Amsterdam: Elsevier Butterworth-Heinemann, 2007.
Kuhn, Betsy. Prying Eyes: Privacy in the Twenty-first Century . Minneapolis, MN: Twenty-First Century Books, 2008.
Kulesza, Joanna. “International Law Challenges to Location Privacy Protection.” International Data Privacy Law 3, no. 3 (2013): 158–169.
L
Lab, Steven G., et al. Criminal Justice: The Essentials, 3d ed. New York: Oxford University Press, 2012.
LaCroix, Allison. “‘Bound Fast and Brought Under the Yokes’: John Adams and the Regulation of Privacy at the Founding.” Fordham Law Review 72, no. 6 (2004): 2331–2354.
Laer, Tom Van. “The Means to Justify the End: Combating Cyber Harassment in Social Media.” Journal of Business Ethics 123, no. 1 (August 2014): 85–98.
LaFave, Wayne R. Search and Seizure: A Treatise on the Fourth Amendment, 5th ed. St. Paul: West Publishing, 2014.
Lamberg, Lynne. “Confidentiality and Privacy of Electronic Medical Records.” JAMA 285, no. 24 (June 27, 2001): 3075.
Lamparello, A. (2015). Online Data Breaches, Standing, and the Third-Party Doctrine. Cardozo Law Review de Novo 119–129.
Landau, Susan Eva. Surveillance or Security?: The Risks Posed by New Wiretapping Technologies . Cambridge, MA: MIT Press, 2010.
Landree, Eric, et al. A Delicate Balance: Portfolio Analysis and Management for Intelligence Information Dissemination Programs . Santa Monica, CA: RAND, 2009.
Lane, Frederick S. The Naked Employee How Technology Is Compromising Workplace Privacy . New York: AMACOM, 2003.
Lapets, Andrei. “Machine Involvement in Formal Reasoning: Improving the Usability of Automated Formal Assistance and Verification Systems.” Ph.D. diss., Boston University, 2011.
Lapsley, Phil. Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell . New York: Grove Press, 2013.
Laptop Computer–Based Facial Recognition System Assessment . Oak Ridge, TN: Oak Ridge Y-12 Plant, 2001.
Larence, Eileen Regen. Firearm and Explosives Background Checks Involving Terrorist Watch List Records . Washington, DC: U.S. Government Accountability Office, 2009.
Larson, Robert G., III, “Forgetting the First Amendment: How Obscurity-Based Privacy and a Right to Be Forgotten Are Incompatible with Free Speech,” Communication Law and Po licy 18, no. 1 (2013): 91–120.
Lashinsky, Adam. Inside Apple: How America's Most Admired—and Secretive—Company Really Works. New York: Business Plus, 2012.
Lassieur, Allison. Abortion . San Diego, Calif.: Lucent Books, 2001.
Lassiter, G. Daniel. Police Interrogations and False Confessions: Current Research, Practice, and Policy Recommendations . Washington, D.C.: American Psychological Association, 2010.
Laurie, G. T. Genetic Privacy a Challenge to Medico-legal Norms . Cambridge, England: Cambridge University Press, 2002.
Laws, Joseph, and Yang Cai. “A Privacy Algorithm for 3D Human Body Scans.” Computational Science—ICCS 2006 Lecture Notes in Computer Science : 870–77.
Lazer, David, ed. DNA and the Criminal Justice System: The Technology of Jus tice. Cambridge, MA: MIT Press, 2004.
Lee, Cynthia. The Fourth Amendment: Searches and Seizures: Its Constitutional History and the Contemporary Debate . Amherst, N.Y.: Prometheus Books, 2011.
Lee, Ellie. Abortion Law and Politics Today . Houndmills, Basingstoke, Hampshire: Macmillan Press, 1998.
Lee, Laurie Thomas, and Robert Larose. “Caller ID and the Meaning of Privacy.” The Information Society : 247–265.
____. “The USA PATRIOT Act and Telecommunications: Privacy under Attack.” Rutgers Computer & Technology Law Journal (2003, June 22.
____. U.S. Telecommunications Privacy Policy and Caller ID: A Study of Anonymity and Solitude Interests in Conflict . Location of Publisher: Publisher's Name: 1993.
Lee, N. Genell. Legal Concepts and Issues in Emergency Care . Philadelphia, PA: W.B. Saunders, 2001.
Lee, Newton. Counterterrorism and Cybersecurity: Total Information Awareness . 2nd ed. Cham: Springer, 2015.
____. Facebook Nation: Total Information Awareness, 2d ed. New York: Springer Science + Business Media, 2014.
Lee, Ronald, and Timothy Miller. “Immigration, Social Security, and Broader Fiscal Impacts.” American Economic Review 90, no. 2 (2000): 350–354.
Leigh, David, and Luke Harding. Wikileaks: Inside Julian Assange's War on Secrecy . New York: Public Affairs, 2011.
Leipnik, Mark R. GIS in Law Enforcement Implementation Issues and Case Studies . London: Taylor & Francis, 2003.
Leith, Philip. Privacy in the Information Society .
Leming, Robert S., and Bloomington Education. Indiana v. Jamie L. Curtis: “The Case of the Questionable Book Bag Search.” A Constitution-based Scripted Trial . Washington, DC: ERIC Clearinghouse, 1992.
Leo, Richard A. Police Interrogation and American Justice. Cambridge, Mass.: Harvard University Press, 2008.
____. The Miranda Debate: Law, Justice, and Policing. Boston: Northeastern University Press, 1998.
Leo, Ross. The HIPAA Program Reference Handbook . Boca Raton: Auerbach Publications, 2005.
Leonard, Peter. “Customer Data Analytics: Privacy Settings for ‘Big Data’ Business.” International Data Privacy Law 4, no. 1 (2014): 53–68
Lerner, Joshua, and Mark Schankerman. The Comingled Code: Open Source and Economic Development . Cambridge, MA: MIT Press, 2010.
Lerner, Natan. Religion, Beliefs, and International Human Rights . Maryknoll, N.Y.: Orbis Books, 2000.
Levendowski, Amanda. “Using Copyright to Combat Revenge Porn.” NYU Journal of Intellectual Property and Entertainment Law 3 (2014): 422–446.
Lever, Annabelle. On Privacy . New York: Routledge, 2012.
Levin, Avner, and Mary Jo Nicholson. “Privacy Law in the United States, the EU, and Canada: the Allure of the Middle Ground.” University of Ottawa Law & Technology Journal 2, no. 2 (2005): 357–395.
Levine, Lee, and Stephen Wermiel. The Progeny : Justice William J. Brennan's Fight to Preserve the Legacy of New York Times v. Sullivan. Chicago, IL: American Bar Association, 2014, pp. 55–64.
Levmore, Saul. The Offensive Internet: Speech, Privacy, and Reputation . Cambridge, Mass.: Harvard University Press, 2010.
Levy, Frederick, Darren Mareniss, Corianne Iacovelli, and Jeffrey Howard. “The Patient Safety and Quality Improvement Act of 2005: Preventing Error and Promoting Patient Safety.” Journal of Legal Medicine 31, no. 4 (2010): 397–422.
Levy, Leonard W. Origins of the Fifth Amendment: The Right against Self-incrimination. New York: Oxford University Press, 1968.
Levy, Steven. Hackers: Heroes of the Computer Revolution—25th Anniversary Edition . Sebastopol, CA: O'Reilly Media, 2010.
Lewis, Anthony. Freedom for the Thought That We Hate. New York: Basic Books, 2009.
Lewis, Sean M. “The Fourth Amendment in the Hallway: Do Tenants Have a Constitutionally Protected Privacy Interest in the Locked Common Areas of Their Apartment Buildings? (Note).” Michigan Law Review (2002).
Li, Chang. New Technologies for Digital Crime and Forensics Devices, Applications, and Software. Hershey, PA: Information Science Reference, 2011.
Li, Fei, Yogachandran Rahulamathavan, Mauro Conti, and Muttukrishnan Rajarajan. “Robust Access Control Framework for Mobile Cloud Computing Network.” Computer Communications 68 (2015), 61–72.
Li, Han, Rathindra Sarathy, and Jie Zhang. “The Role of Emotions in Shaping Consumers' Privacy Beliefs about Unfamiliar Online Vendors.” Journal of Information Privacy and Security : 36–62.
Li, Jin, Zheli Liu, Xiaofeng Chen, Fatos Xhafa, Xiao Tan, and Duncan S. Wong. “ L-encdb: a Lightweight Framework for Privacy-Preserving Data Queries in Cloud Computing.” Knowledge-Based Systems 79 (2015): 18–26.
Li, Joyce H. The Center for Democracy and Technology and Internet Privacy in the U.S.: Lessons of the Last Five Years . Lanham, MD: Scarecrow Press, 2003.
Li, Stan Z., and Anil K. Jain. Handbook of Face Recognition, 2nd ed. London: Springer London, 2011.
Liang, Bryan A. “Regulating for Patient Safety: The Law's Response to Medical Errors: Collaborating on Patient Safety: Legal Concerns and Policy Requirements.” Widener Law Review 12 (2005): 83–105.
Liebow, Elliot. Tell Them Who I Am: The Lives of Homeless Women . New York: Free Press, 1993.
Lih, Andrew. The Wikipedia Revolution: How a Bunch of Nobodies Created the World's Greatest Encyclopedia . New York: Hyperion, 2009.
Lin, Zhen Owen. “Genomic Research and Human Subject Privacy.” Science , July 9, 2004.
Lind, Nancy S. Privacy in the Digital Age: 21st-Century Challenges to the Fourth Amendment .
Lind, Nancy S., and Erik Rankin, eds. Privacy in the Digital Age: 21st-Century Challenges to the Fourth Amendment. 2 vols. Santa Barbara, CA: Praeger,
Linnartz, Jean-Paul, and Pim Tuyls. “New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates.” Lecture Notes in Computer Science Audio- and Video-Based Biometric Person Authentication. 393–402.
Linzmayer, O. W. Apple Confidential: The Real Story of Apple Computer, Inc. New York, 2004.
Lipschultz, Jeremy Harris. Broadcast and Internet Indecency: Defining Free Speech . New York: Routledge, 2008.
Liss, Jerald M. “Creative Destruction and Globalization: The Rise of Massive Standardized Education Platforms.” Globalizations 10, no. 4 (08/01; 2015/10, 2013): 557–570.
Lister, Stuart, and Michael Rowe, eds. Accountability in Policing. New York: Routledge, 2015.
Liu, Chengjun, and V. K. Mago. Cross Disciplinary Biometric Systems . Berlin: Springer, 2012.
Liu, Ray H. Handbook of Workplace Drug Testing . Washington, DC: AACC Press, 1995.
Liu, Yue. “Rational Concerns about Biometric Technology.” Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions (2008): 94–134.
Looijen, D. (2010). Time for a Change: The Schema of Contract in the Digital Era. Journal on Telecommunications & High Technology Law 8: 547–570.
Lowrance, William W. Privacy, Confidentiality, and Health Research . New York: Cambroidge University Press, 2012.
Luber B, Fisher C, Appelbaum PS, Ploesser M, Lisanby SH. Lisanby. Non-invasive Brain Stimulation in the Detection of Deception: Scientific Challenges and Ethical Consequences. Behavioral Sciences & the Law , 27(2):191–208, 2009.
Lynch, Jennifer. From Fingerprints to DNA: Biometric Data Collection in U.S. Immigrant Communities and Beyond. Special Report for the Electronic Frontier Foundation and the Immigration Policy Center. May 2012.
Lyon, David. Computers, Surveillance, and Privacy . Minneapolis: University of Minnesota Press, 1996.
____. Surveillance after September 11 . Malden, MA: Polity Press, 2003.
____. Surveillance after Snowden. Malden, MA: Polity Press, 2015.
M
M. Maureen Murphy, Privacy Protection for Customer Financial Information , Congressional Research Service (2014)
Maass, Peter. “How Laura Poitras Helped Snowden Spill His Secrets.” New York Times , August 13, 2013.
“MacArthur Fellows Program—Meet the Class of 2012: Laura Poitras.” Macfound.org, October 2, 2012.
MacCormick, Neil. Enlightenment, Rights, and Revolution: Essays in Legal and Social Philosophy . Aberdeen, UK: Aberdeen University Press, 1989.
Macdonald, Lynda A. C. Tolley's Managing Email and Internet Use . Croydon: LexisNexis UK, 2004.
Machan, Tibor R. Private Rights and Public Illusions . New Brunswick, NJ: Transaction Publishers, 1995.
MacIntosh, Susanne M. “Fourth Amendment: The Plain Touch Exception to the Warrant Requirement.” Journal of Criminal Law and Criminology 84, no. 4 (1994).
MacKinnon, Catharine, and Andrea Dworkin. In Harm's Way: The Pornography Civil Rights Hearings . Cambridge, Mass.: Harvard University Press, 1997.
MacKinnon, Rebecca. Consent of the Networked: The World-wide Struggle for Internet Freedom . New York: Basic Books, 2012.
MacLean, Charles E., and Adam Lamparello, Forensic DNA Phenotyping in Criminal Investigations and Criminal Courts: Assessing and Mitigating the Dilemmas Inherent in the Science , 8(2) Recent Advances in DNA & Gene Sequencing 104–112 (2014).
Maclin, Tracey. The Supreme Court and the Fourth Amendment's Exclusionary Rule. New York: Oxford University Press, 2013.
Madden, M., S. Cortesi, U. Gasser, A., Lenhart, and M. Duggan. Parents, Teens, and Online Privacy . Pew Internet & American Life Project, 2012.
Madden, Mary, and Lee Rainie. “Americans' Attitudes about Privacy, Security and Surveillance.” Pew Research Center. May 20, 2015.
Maginnis, Maureen. “Maintaining the Privacy of Personal Information: The DPPA and the Right of Privacy.” South Carolina Law Review 51 (2000): 807–822.
Mago, V. K. Cross-Disciplinary Applications of Artificial Intelligence and Pattern Recognition Advancing Technologies . Hershey, PA: Information Science Reference, 2012.
Maguire, Mary, and Dan Okada, eds. Critical Issues in Crime and Justice: Thought, Policy, and Practice, 2d ed. Los Angeles: Sage, 2015.
Mahmood, Zaigham. Cloud Computing: Methods and Practical Approaches . London: Springer, 2013.
“Mainstream Neglect of Sexual Harassment as a Social Problem.” Canadian Journal of Sociology 21, no. 2 (March 22, 1996): 185–203.
Mandiberg, Michael. The Social Media Reader . New York: New York University Press, 2012.
Manishin, Glenn B. Complying with the CAN-SPAM Act and Other Critical Business Issues: Staying out of Trouble . New York: Practicing Law Institute, 2004.
Mank, Bradford. Suing under §1983: The Future after Gonzaga v. Doe (2003). Faculty Articles and Other Publications. Paper 123.
Mann, Robert. “The Cypherpunk Revolutionary: On Julian Assange.” The Monthly , March 1, 2011.
Mantlero, Alessandro. “The EU Proposal for a General Data Protection Regulation and the Roots of the ‘Right to Be Forgotten.’” Computer Law & Security Review 29, no. 3 (June 2013): 229–235.
Manz, Willaim H., ed. Civil Liberties in Wartime: Legislative Histories of the Espionage Act 1917 and the Sedition Act of 1918 (vol. 1, Documents 1–57). Buffalo, NY: William S. Hein & Co., Inc., 2007.
Marcel, Se. Handbook of Biometric Anti-spoofing: Trusted Biometrics under Spoofing Attacks .
Marion, Nancy E., Kelley A. Cronin, and Williard M. Oliver. Homeland Security: Policy and Politics. Durham, NC: Carolina Academic Press, 2015.
Mark, K., and M. Crossan. Apple Computer, Inc.: iPods and iTunes. Ivey Case Studies, Richard Ivey School of Business, Ivey Publishing, 2005, 1–14.
Markoff, John. “Pentagon Plans a Computer System That Would Peek at Personal Data of Americans.” New York Times , November 9, 2002.
Marks, Murray K. Computer-Graphic Facial Reconstruction . Burlington, MA: Elsevier Academic Press, 2005.
Marlin-Bennett, Renée. Knowledge Power: Intellectual Property, Information, and Privacy . Boulder, CO: Lynne Rienner, 2004.
Marshall, John. Descartes's Moral Theory. Ithaca, NY: Cornell University Press, 1998.
Martin, Greg, Rebecca Scott Bray, and Miiko Kumar, eds. Secrecy, Law, and Society. New York: Routledge, 2015.
Martin, James P., and Harry Cendrowski. Cloud Computing and Electronic Discovery. Hoboken, NJ: Wiley, 2014.
Martínez-Pérez, Borja, Isabel De La Torre-Díez, and Miguel López-Coronado. “Privacy and Security in Mobile Health Apps: A Review and Recommendations.” Journal of Medical Systems 39, no. 1 (2014): 181.
Martinovic, Ivan, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, and Dawn Song. On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. In the Proceedings of the 21st USENIX Security Symposium . USENIX, 2012.
Marzolf, Julie Schwab. Online Privacy . New York: Gareth Stevens Pub., 2013.
Mass, Warren. “USA Freedom Act Fails.” New American , December 22, 2014.
Mathieson, Rick. The On-demand Brand 10 Rules for Digital Marketing Success in an Anytime, Everywhere World . New York: AMACOM, 2010.
Maurer, Virginia, and Roger D. Blair. “Statute Law and Common Law: The Fair Credit Reporting Act.” Missouri Law Review 49, no. 289 (1984)
Maxwell, Bruce, ed. Homeland Security: A Documentary History. Washington, DC: CQ Press, 2004.
Maxwell, Lida. “Truth in Public: Chelsea Manning, Gender Identity, and the Politics of Truth-Telling.” Theory & Event 18, no. 1 (2015)
Mayer-Schönberger, Viktor. “The Internet and Privacy Legislation: Cookies for a Treat?” Computer Law & Security Review 14, no. 3 (May 1, 1998): 166–174.
McBride, Sarah, and Alexei Oreskovic. “Snapchat Breach Exposes Flawed Premise, Security Challenge.” Reuters, October 14, 2014.
McCall, Ginger. “The Face Scan Arrives.” New York Times (August 30, 2013).
McCann, E. (June 17, 2015). Medical identity theft hits all-time high. Healthcare IT News.
McClellan, Grant S., ed. The Right to Privacy . New York: H.W. Wilson, 1976.
McCullagh, Declan. “Instagram Apologizes to Users: We Won't Sell Your Photos.” C/net, December 18, 2012.
McInnis, Thomas N. The Evolution of the Fourth Amendment . Lanham, MD: Lexington Books, 2009.
McKay, Sinclair. The Secret Life of Bletchley Park: The History of the Wartime Codebreaking Centre by the Men and Women Who Were There . London: Aurum, 2010.
Mckenna, Brian. “Privacy Advocate Warns Biometric Industry to Stay Clear of Government.” Computer Fraud & Security 11 (2004): 3.
McKinney, K. D. “Space, Body, and Mind: Parental Perceptions of Children's Privacy Needs.” Journal of Family Issues (1998): 75–100.
McMurtrie, Jacqueline. “Swirls and Whorls: Litigating Post-Conviction Claims of Fingerprint Misidentification after the NAS Report.” Utah Law Review 2010, no. 2 (2010): 267–297.
McNally, Megan. Identity Theft in Today's World . Santa Barbara, CA: Praeger, 2012.
McThomas, Mary. The Dual System of Privacy Rights in the United States . Hoboken: Taylor and Francis, 2013.
Medina, Melissa. “The Stored Communications Act: An Old Statute for Modern Times.” American University Law Review 63, no. 1 (2013): 267–305.
Meiklejohn, Alexander. Free Speech and Its Relation to Self-Government. The Lawbook Exchange, Ltd., 2011.
Melson, Brent. “Protecting Privacy and Security in Software and Mobile Apps: How to Take Precautions to Keep Your Data Secure.” Wireless Design & Development , July 1, 2015.
Mena, Jesus. Homeland Security Techniques and Technologies . Hingham, MA: Charles River Media, 2004.
Merino, Noe. Abortion . Farmington Hills, MI: Greenhaven Press, 2013.
Merkow, Mark S., and Jim Breithaupt. The E-Privacy Imperative: Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age . New York: AMACOM, 2002.
Messenger, Ashley. “What Would a ‘Right to Be Forgotten’ Mean for Media in the United States?” Communications Lawyer 29, no. 1 (June 2012): 12.
Metcalfe, Daniel J. “Amending the FOIA: Is It Time for a Real Exemption 10? ” Administration and Regulation Law News 37, no. 16 (Summer 2012).
____. “Hillary's E-Mail Defense Is Laughable.” POLITICO Magazine, March 16, 2015. http://www.politico.com/magazine/story/2015/03/hillary-clinton-email-scandal-defense-laughable-foia-116116.html#.VXw6lvlViko .
____. “The History of Transparency,” in Research Handbook on Transparency , edited by Padideh Ala'i and Robert G. Vaughn. Northampton, MA: Edward Elgar, 2014.
____. “The Nature of Government Secrecy.” Government Information Quarterly 26, no. 305 (2009)
Meyer, John. “First Federal Net Privacy Law Approved.” Computers & Security : 719.
Meyer, Robinson. “The New Terminology of Snapchat.” The Atlantic , May 2, 2014.
Meyers, Martin. “T.L.O. v. New Jersey: Officially Conducted School Searches and a New Fourth Amendment Balancing Test.” Juvenile and Family Court Journal 37, no. 1 (February 1986): 25–37.
Michael, John. Anxious Intellects: Academic Professionals, Public Intellectuals, and Enlightenment Values . Durham, NC: Duke University Press, 2000.
Michalowski, Sabine. Medical Confidentiality and Crime . Aldershot, England: Ashgate, 2003.
Miles, Jason G. Instagram Power: Build Your Brand and Reach More Customers with the Power of Pictures. New York: McGraw-Hill Education, 2014.
Miller, Debra A. Homeland Security . Detroit, MI: Greenhaven Press, 2009.
Mills, Jon L. Privacy in the New Media Age. Gainesville: University Press of Florida, 2015.
Mironenko, Olga. “Body Scanners versus Privacy and Data Protection.” Computer Law & Security Review : 232–44.
Mitchell, Ian D. “Third-Party Tracking Cookies and Data Privacy.” April 25, 2012.
Mitnick, Kevin. Ghost in the Wires: My Adventures as the World's Most Wanted Hacker . New York: Little, Brown and Company, 2011.
Mizell, Louis R. Invasion of Privacy . New York: Berkley Books, 1998.
Mohapatra, Manas, Andrew Hasty, et al. Mobile Apps for Kids Current Privacy Disclosures Are Disappointing. Washington, DC: U.S. Federal Trade Commission, 2012.
Moisescot, R. Steve Jobs: A Biography by Romain Moisescot. All About Steve Jobs. 2008.
Monagle, John F. Health Care Ethics: Critical Issues . Gaithersburg, Md.: Aspen Publishers, 1994.
Mooney, Linda A., and David Knox. Understanding Social Problems, 6th ed. Belmont, CA: Wadsworth/Cengage Learning, 2009.
Moore, Adam D. Information Ethics: Privacy, Property, and Power . Seattle: University of Washington Press, 2005.
Moore, Tyler. Economics of Information Security and Privacy . New York: Springer, 2010.
Morgan, John S. “Comment, The Junking of the Fourth Amendment: Illinois v. Krull and New York v. Burger. ” Tulane Law Review 63, no. 2 (December 1988): 335–378.
Morrow, D. (1995). Oral History Interview with Jobs. April 20, 1995.
Mouzakiti, Foivi. “Transborder Data Flows 2.0: Mending the Holes of the Data Protection Directive.” European Data Protection Law Review 1 (2015): 39–51.
Muller, Max. The Manager's Guide to HR Hiring, Firing, Performance Evaluations, Documentation, Benefits, and Everything Else You Need to Know, 2d ed. New York: American Management Association, 2013.
Murphy, Bruce. Wild Bill: The Legend and Life of William O. Douglas . New York: Random House, 2003.
Murphy, Daniel Robert. Educational Records: A Practical Guide for Legal Compliance. Lanham, MD: Rowman & Littlefield, 2009.
Murphy, Paul L. The Right to Privacy and the Ninth Amendment. New York: Garland Publishing.
Murray, Jim. Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data . Burlington, MA: Syngress, 2010.
Murray, Ryan Patrick. “Myspace-ing Is Not a Crime: Why Breaching Terms of Service Agreements Should Not Implicate the Computer Fraud and Abuse Act Written February 2, 2009,” Loyola of Los Angeles Entertainment Law Review 29, no. 3 (June 2009): 475.
N
Nash, Richard. “Publishing 2020.” Publishing Research Quarterly 26, no. 2 (June 2010): 114–118.
Nass, Sharyl J., et al., eds. Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health through Research . Washington, DC: National Academies Press, 2009.
Nass, Sharyl J., Laura A Levit, and Lawrence O Gostin. Beyond the HIPAA Privacy Rule Enhancing Privacy, Improving Health through Research . Washington, DC: National Academies Press, 2009.
National Research Council. Strengthening Forensic Science in the United States: A Path For ward. Washington, DC: The National Academies Press, 2009.
National Security Agency. The Origins of NSA . Fort George G. Meade, Md.: Center for Cryptologic History, 1996.
Natoli Jr., Frank. “Biometrics in Banking: Overcoming the Barriers.” American Banker Magazine (June 2014),
Natter, Raymond. “The Reasons for the Gramm-Leach-Bliley Act.” SSRN Electronic Journal SSRN Journal .
Negangard, Richard. Legal Principles for Guiding School Administrators in the Search and Seizure of Public School Students: Protecting Students' Fourth Amendment Rights and Providing for Safe Schools . Ph.D Diss. University of Miami, 1988 Torres. Ph.D. Diss. Penn State University, 2003.
Nelles, Walter, ed. Espionage Cases: With Certain Others on Related Points. New York: National Civil Liberties Bureau, 1918.
Nelson, Steven. “Privacy Board Will Do ‘Deep Dive’ on NSA, CIA Practices.” U.S. News and World Report, April 8, 2015.
Nemeth, Charles P. Homeland Security: An Introduction to the Principles and Practice, 2nd ed. Boca Raton, FL: CRC Press, 2013.
New South Wales Privacy Committee. Private Lives and Public Health: Privacy Guidelines for HIV Testing . Sydney: Committee, 1993.
New York: Oxford University Press, 1997.
Newcombe, Chris, et al. “How Amazon's Web Services Uses Formal Methods.” Communications of the ACM 58, no. 4 (April 2015): 66–73.
Newell, Bryce Clayton. “Local Law Enforcement Jumps on the Big Data Bandwagon: Automated License Plate Recognition Systems, Information Privacy, and Access to Government Information.” Maine Law Review 66, (2014): 397–435.
Newton, Jim. Justice for All: Earl Warren and the Nation He Made. New York: Riverhead Books, 2006.
Newton, Lee. Facebook Nation: Total Information Awesomeness . New York: Springer, 2014.
Ng, Cindy. “5 Things Privacy Experts Want You to Know about Wearables.” Varonis Blog. July 17, 2014.
Nichols, Randall K., and Daniel J. Ryan. Defending Your Digital Assets against Hackers, Crackers, Spies, and Thieves . New York: McGraw-Hill, 2000.
NICS, National Instant Criminal Background Check System. Clarksburg, WV: U.S. Dept. of Justice, Federal Bureau of Investigation, Criminal Justice Information Services Division, 1998.
Nizan Geslevich Packin & Yafit Lev Aretz, Big Data and Social Netbanks: Are You Ready to Replace Your Bank ? 53 Houston Law Review __ (forthcoming 2016)
Noftsinger, John B., Jr., Kenneth F. Newbold, Jr., and Jack K. Wheeler. Understanding Homeland Security: Policy, Perspectives, and Paradoxes. New York: Palgrave Macmillan, 2007.
Nolan, Andrew, and Richard M. Thompson II. Reform of the Foreign Intelligence Surveillance Courts: Procedural and Operational Changes. Washington, DC: U.S. Library of Congress, Congressional Research Service.
Noll, A. Michael. “An Inquiry into the Privacy Aspects of Caller-ID.” Telecommunications Policy : 690–693.
Norlin, John W. Confidentiality in Student Testing: Access and Disclosure Requirements under FERPA and the IDEA . Horsham, PA: LRP Publications, 2008.
Norris, Cameron T. “Your Right to Look Like an Ugly Criminal: Resolving the Circuit Split over Mug Shots and the Freedom of Information Act.” Vanderbilt Law Review 66, no. 5 (2013).
Northouse, Clayton. Protecting What Matters: Technology, Security, and Liberty since 9/11 . Washington, DC: Computer Ethics Institute:, 2006.
Norvell, Blake Covington. “The Constitution and the NSA Warrantless Wiretapping Program: A Fourth Amendment Violation?” Yale Journal of Law & Technology 11, no. 1 (2008).
Notestine, Kerry E. Fundamentals of Employment Law. Chicago: American Bar Association, 2000.
Notturno, Mark Amadeus. Privacy and Privacy Rights . Parkersburg, WV: Interactivity Foundation Press, 2005.
Nouwt, Sjaak. Reasonable Expectations of Privacy?: Eleven Country Reports on Camera Surveillance and Workplace Privacy . The Hague, The Netherlands: T.M.C. Asser Press, 2005.
Nowrasteh, Alex Cole. “Open the Gates.” USA Today , November 1, 2013.
NSA Director of Civil Liberties and Privacy Office. NSA's Civil Liberties and Privacy Protections for Targeted SIGINT Activities under Executive Order 12333. Washington, DC: NSA Civil Liberties and Privacy Office, October 7, 2014.
O
O'Brien, David M. Privacy, Law and Public Policy . New York: Praeger, 1970.
O'Neill, Cathy and Rachel Schutt, Doing Data Science: Straight Talk from Frontline . O'Reilly Media Inc., 2013.
Odlyzko, Andrew. “Privacy, Economics, and Price Discrimination on the Internet.” In Proceedings of the Fifth International Conference on Electronic Commerce—ICEC, edited by Norman M. Sadeh et al. New York: ACM Press, 2003.
Odom, Thomas H., and Gregory S. Feder. “Challenging the Federal Driver's Privacy Protection Act: The Next Step in Developing a Jurisprudence of Process-Oriented Federalism under the Tenth Amendment.” University of Miami Law Review 53 (1998): 71–167.
Office of the Director of National Intelligence, Office of General Counsel. Intelligence Community Legal Reference Book, 2d ed. Washington, DC: Office of the Director of National Intelligence, Office of General Counsel/USGPO, 2009.
Office of the Privacy Commissioner of Canada. Key Steps for Organizations in Responding to Privacy Breaches .
Olivenbaum, Joseph M. “Ctrl-Alt-Delete: Rethinking Federal Computer Crime Legislation.” Seton Hall Law Review 27 (1997): 574.
Oliver, Dawn. Human Rights and the Private Sphere: A Comparative Study . Abingdon, United Kingdom: Routledge-Cavendish, 2007.
Olson, Parmy. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency . New York: Little, Brown and Company, 2012.
Omohundro, Steve. “Cryptocurrencies, Smart Contracts, and Artificial Intelligence.” AI Matters 1, no. 2 (December 2014): 19–21.
Orr, S. (July 28, 2014). New York knows where your license plate goes. USA Today.
Osborne, Mark, and Paul M. Summitt. How to Cheat at Managing Information Security . Rockland, MA: Syngress, 2006.
P
Palma, Paul. Computers in Society 09/10; 15th ed. New York: McGraw-Hill Irwin, 2010.
Panos, Linda. “Privacy in Schools: Dogs, Lockers, Bodies, and Backpacks (Human Rights Law).” LawNow , March 1, 2009.
Paper, Lewis J. Brandeis: Prentice-Hall, 1983.
Paradis, Daniel P. “Bartnicki v. Vopper: Cell Phones and Throwing Stones.” New England Law Review 37 (2003): 1117.
Parkinson, Hannah Jane. “James Foley: How Social Media Is Fighting Back against ISIS Propaganda ,” Guardian, August 20, 2014.
Parry, John T., and L. Song Richardson, eds. The Constitution and the Future of Criminal Justice in America. New York: Cambridge University Press, 2013.
Parsons, Kimberly D. Immigration Policy Proposals and Potential Budgetary Effects . New York: Nova Science, 2015.
Pasquale, Frank. “The Dark Market for Personal Data.” New York Times , October 17, 2014.
Pasquale, Frank. The Black Box Society: The Secret Algorithms That Control Money and
“Patent Issued for Healthcare Privacy Breach Prevention through Integrated Audit and Access Control.” Computer Weekly News, April 2, 2015.
Patterson, Kelsey T. “Narrowing It Down to One Narrow View: Clarifying and Limiting the Computer Fraud and Abuse Act.” Charleston Law Review 7, no. 3 (March 2013): 489.
Pattison, Scott. “Restricting ‘Caller ID.’” Consumers' Research Magazine , May 1, 1992.
Payne, Bridget Watson, ed. This Is Happening: Life through the Lens of Instagram. San Francisco, CA: Chronicle Books, 2013.
Payton, Theresa, and Ted Claypoole. Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family . MD: Rowman & Littlefield, 2014.
Pellegrino, E. “Toward a Virtue-Based Normative Ethics for the Health Professions.” Kennedy Institute of Ethics Journal 5, no. 3 (1995): 253–277.
Pence, Gregory. Elements of Bioethics . New York: McGraw-Hill, 2007.
Peretti, Kimberly Kiefer. “Data Breaches: What the Underground World of ‘Carding’ Reveals.” Santa Clara Computer and High Technology Law Journal 25 (2009): 375.
Persico, Deborah A. New Jersey v. T.L.O.: Drug Searches in Schools . Springfield, NJ: Enslow, 1998.
Peterson, T.F., Institute Historian. Nightwork: A History of Hacks and Pranks at MIT (updated edition). Cambridge, MA: MIT Press, 2011.
Petronio, Sandra Sporbert. Boundaries of Privacy Dialectics of Disclosure . Albany: State University of New York Press, 2002.
Pike, George H. “USA PATRIOT Act Still Raising Questions.” Information Today , July, 2015.
Pincus, Andrew. “Evolving Technology and the Fourth Amendment: The Implications of Riley v. California. ” Cato Supreme Court Review 2014–2015 (2014): 307–336.
Pincus, Walter. “NSA Reform Should Proceed Cautiously.” Washington Post , November 7, 2013.
Pinson, Chad M., and John B. Lawrence. “FCRA Preemption of State Law: A Guide Through Muddy Waters.” Journal of Consumer and Commercial Law 15, no. 47 (2012)
Poitras, Laura, dir. Citizenfour. 2014. New York: Radius-TWC, 2015. Streaming Video.
Pollack, Jack H. The Judge Who Changed America . Englewood Cliffs, NJ: Prentice-Hall, 1979.
Pollock, Joycelyn M. Ethical Dilemmas and Decisions in Criminal Justice, 8th ed. Belmont, CA: Wadsworth, 2014.
Popoli, Anna Rita. “Cookies and Electronic Commerce: A Survey About Actual Knowledge of the Issues Concerning Privacy.” December 10, 2012.
Porterfield, Jason. Julian Assange and Wikileaks . New York: Rosen Pubishing Group, 2013.
Posner, Richard A. “Orwell versus Huxley: Economics, Technology, Privacy, and Satire.” University of Chicago Law School, John M. Olin Law & Economics Working Paper No. 89 (November 1999).
____. Preventing Surprise Attacks: Intelligence Reform in the Wake of 9/11 . Lanham, MD: Rowman & Littlefield Publishers, 2004.
____. The Economics of Justice . Cambridge, MA: Harvard University Press, 1981.
Post, Robert C. “The Constitutional Concept of Public Discourse: Outrageous Opinion, Democratic Deliberation, and Hustler Magazine v. Falwell.” Harvard Law Review 103 (1990): 601–686.
Potter, Van Rensselaer. “Bioethics: The Science of Survival.” Perspectives in Biology and Medicine 14, no. 2 (1970): 127–153.
Poulsen, Kevin and Kim Zetter. “U.S. Intelligence Analyst Arrested in Wikileaks Video Probe.” Wired. June 6, 2010.
Poulsen, Kevin. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground . New York: Broadway Paperbacks, 2011.
Powers, Meghan. The Abortion Rights Movement . Detroit: Greenhaven Press/Thomson/Gale, 2006.
President's Council of Advisors on Science & Technology. Big Data and Privacy: A Technological Perspective. The White House. May 1, 2014.
Price, Ira M. “Torts: Right of Privacy: Invasion of Privacy through Fictional Works.” Michigan Law Review 45, no. 8 (June 1947): 1064–1066.
Priester, Benjamin J. “Five Answers and Three Questions After United States v. Jones (2012), the Fourth Amendment ‘GPS Case.’” Oklahoma Law Review 65 (2013): 491–532.
Primus, Eve Brensike. “Disentangling Administrative Searches.” Columbia Law Review 111, no. 2 (March 2011): 254–312.
Privacy and Civil Liberties Oversight Board. Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act , July 2, 2014.
Privacy and Civil Liberties Oversight Board. Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT ACT and on the Operations of the Foreign Intelligence Surveillance Court . Washington, DC: Publisher, 2015.
Privacy The Lost Right. Oxford Scholarship Online, 2008.
Privacy, Free Speech & the Garden Grove Cyber Café Experiment . Durham, NC: Duke University School of Law, 2004.
Probhakar, S., S. Pankanti, and A. K. Jain. “Biometric Recognition: Security and Privacy Concerns.” IEEE Security and Privacy 2, no. 1 (2003): 33–42.
Prosser, William Lloyd. “Privacy.” California Law Review 48, no. 3 (1960): 383–423.
“Prosser's Privacy at 50.” A Symposium on Privacy in the 21st Century at the University of California, Berkeley, School of Law (January 29, 2010).
Protecting Individual Privacy in the Struggle against Terrorists: A Framework for Program Assessment . Washington, DC: National Academies Press, 2008.
“Protecting Privacy under the Fourth Amendment.” The Yale Law Journal 91, no. 2 (1981): 313.
Provost, Foster and Tom Fawcett, Data Science for Business: What you need to know about data minin g. O'Reilly Media Inc., 2013.
Public Law 104–208,110 Stat. 3009 (September 30, 1996). 15 USC 1692 www.nclc.org/issues/debt-collection.html
Q
Qualman, Erik. Socialnomics: How Social Media Transforms the Way We Live and Do Business . 2d ed. Hoboken, NJ: Wiley, 2013.
Quinn, Michael J. Ethics for the Information Age . Boston, MA: Pearson/Addison-Wesley, 2005.
R
Rabbany, Ahmed. Introduction to GPS: The Global Positioning System . Boston, MA: Artech House, 2002.
Rackow, Sharon H. “How the USA Patriot Act Will Permit Governmental Infringement upon the Privacy of Americans in the Name of ‘Intelligence’ Investigations.” University of Pennsylvania Law Review 150, no. 5 (2002): 1651, 2012.
Rakower, Lauren. “Blurred Line: Zooming in on Google Street View and the Global Right to Privacy.” Brooklyn Journal of International Law 37, no. 1 (2011): 317–347.
Ransom, Harry Howe. Central Intelligence and National Security . Cambridge, MA: Harvard University Press, 1958.
Reagan, Leslie J. When Abortion Was a Crime Women, Medicine, and Law in the United States, 1867–1973 . Berkeley: University of California Press, 1997.
Reagle, Joseph Michael. Good Faith Collaboration: The Culture of Wikipedia . Cambridge, MA: MIT Press, 2010.
“Real Estate Roundtable Urges Pro-Growth Immigration Reform with Flexible Visa Caps.” Real Estate Weekly News, May 10, 2013.
Reardon, Conor M. “Cell Phones, Police Recording, and the Intersection of the First and Fourth Amendments.” Duke Law Journal (2013).
“Recent Case: Internet Law—Protection of Personal Data—Court of Justice of the European Union Creates Presumption That Google Must Remove Links to Personal Data upon Request, Case C-131/12, Google Spain SL v. Agencia Española de Protección de Datos (May 13, 2014).” Harvard Law Review 128 (2014): 735–742.
Rees, Mark I. Challenges and Opportunities of Next-Generation Sequencing for Biomedical Research . Amsterdam: Elsevier/Academic Press, 2012.
Rehnquist, William. “Is an Expanded Right of Privacy Consistent with Fair and Effective Law Enforcement?” University of Kansas Law Review 23 (1974–1975): 1.
Reid, Beth Ann. A Manual for Complying with the Freedom of Information Act and the Privacy Protection Act. Richmond, VA: Department of Management Analysis and Systems Development, 1980.
Reinecke, Leonard, and Sabine Trepete. Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web . New York: Springer Publishing Company, 2011.
Relyea, Harold. Privacy and Civil Liberties Oversight Board New Independent Agency St atus. Washington, DC: Congressional Research Service, Library of Congress, 2008.
Rembar, Charles. The End of Obscenity : The Trials of Lady Chatterley, Tropic of Cancer, and Fanny Hill . New York: Random House, 1968.
Rengel, Alexandra. Privacy in the 21st Century . Leiden: Martinus Nijhoff Publishers, 2013.
Repa, Barbara Kate. Your Rights in the Workplace , 9th ed. Berkeley, CA: Nolo, 2010.
“Report on Whole-Genome Sequencing Concerns Issued; Presidential Commission Worries About Privacy.” Biotechnology Law Report: 579.
Reporters Committee for Freedom of the Press. “Confidential Sources and Information,” in First Amendment Handbook. 7th ed. (2011).
Reyns, Bradford W. The Anti-social Network: Cyberstalking Victimization among College Students . El Paso, TX: LFB Scholarly Publishing, 2012.
Rhodes, James Ford. “Edwin Lawrence Godkin.” In Historical Essays, 1909. Reprint, Port Washington, NY: Kennikat Press, 1966.
Rhodes, Jill D., and Vincent I. Polley. The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms, and Business Professionals. Chicago, IL: American Bar Association, 2013.
Richard J. Peltz-Steele, The Law of Access to Government (Carolina Academic Press 2012)
Richards, David A. J. “Constitutional Privacy, the Right to Die and the Meaning of Life: A Moral Analysis.” William and Mary Law Review 22 (1981).
Richards, David A. J. “Liberalism, Public Morality, and Constitutional Law: Prolegomenon to a Theory of the Constitutional Right to Privacy.” Law and Contemporary Problems 51, no. 1 (1988): 123–150.
Richards, Neil M. “The Dangers of Surveillance.” Harvard Law Review 126, no. 7 (May 2013): 1934–1965.
____. “The Limits of Tort Privacy.” Journal on Telecommunications & High Technology Law 9 (2011): 357–384.
____. “Prosser's Privacy Law: A Mixed Legacy.” California Law Review 98 1887, 1924 (2010)
____. Intellectual Privacy: Rethinking Civil Liberties in the Digital Age. New York: Oxford University Press, 2015.
Richardson, Jeffrey. “Michigan Needs a Statutory Right of Publicity.” Michigan Business Journal 86, no. 26 (September 2007).
Richey, Warren. “Supreme Court: NASA's Intrusive Background Checks OK.” Christian Science Monitor , January 19, 2011.
Richie, Donald A. American Journalists: Getting the Story . Oxford: Oxford University Press, 1997.
Ridgeway, Greg. Summary of the RAND Report on NYPD's Stop, Question, and Frisk . Santa Monica, Calif.: RAND, 2009.
Rittinghouse, John W., and James F. Ransome. Wireless Operational Security . Burlington, MA: Elsevier/Digital Press, 2004.
Robert Hannigan, “The Web Is a Terrorist's Command-and-Control Network of Choice ,” Financial Times, November 3, 2014.
Roberts, Brian F. 2011. Methods and Systems for Presenting an Advertisement Associated with an Ambient Action of a User. Patent Appl. No. 13/116784, filed May 26, 2011.
Roberts, David J., and Meghann Casanova. “Automated License Plate Recognition Systems: Policy and Operation Guidance for Law Enforcement.” Washington, DC: U.S.
Robison, William Jeremy. “Free at What Cost?: Cloud Computing Privacy under the Stored Communications Act.” Georgetown Law Jou rnal 98 (2010): 1195–1239.
Rocha, Álvaro, Ana Maria Correa, Tom Wilson, and Karl A. Stroetmann. Advances in Information Systems and Technologies . Berlin: Springer, 2013.
Roderick, Leanne. “Discipline and Power in the Digital Age: The Case of the U.S. Consumer Data Broker Industry.” Critical S ociology 40, no. 5 (2014): 729–746.
Rodis-Lewis, Genevieve. Descartes: His Life and Thought, translated by Jane Marie Todd. Ithaca, NY: Cornell University Press, 1998
Rodriguez, Joshua I. “Note: Interrogation First, Miranda Warnings Afterward: A Critical Analysis of the Supreme Court's Approach to Delayed Miranda Warnings.” Fordham Urban Law Journal 40 (March 2013): 1091.
Roesner, Franziska, Brian T. Gill, and Tadayoshi Kohno. “Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages.” In Financial Cryptography and Data Security, vol. 8437 of the series Lecture Notes in Computer Science (November 9, 2014), 64–76.
Roewe, Brian. “Bill Proposes Sweeping Immigration Reform.” National Catholic Reporter , April 26, 2013.
Rohrs, Jeffrey K. Audience: Marketing in the Age of Subscribers, Fans and Followers
Rosen, David J. “Limiting Employee Liability under the CFAA: A Code-Based Approach to ‘Exceeds Authorized Access.’” Berkeley Technology Law Journal 27 (2012): 737.
Rosen, Jeffrey. The Supreme Court: The Personalities and Rivalries That Defined America . New York: Times Books, 2006.
____. The Unwanted Gaze: The Destruction of Privacy in America . New York: Vintage Books, 2001.
Rosner, Victoria. Modernism and the Architecture of Private Life . New York: Columbia University Press, 2005.
Ross, William G. “A Judicial Janus: Meyer v. Nebraska in Historical Perspective.” University of Cincinnati Law Review 57, no. 1, (1988): 125–204.
Rossow, Lawrence F., and Jacqueline Anne Stefkovich. Search and Seizure in the Public Schools, 3rd ed. Dayton, OH: Education Law Association, 2006.
Rotenberg, Marc, Body Scanners, Pat Downs Violate Law And Privacy , November 19, 2010
Rothe, Dawn L., and Kevin F. Steinmetz. “The Case of Bradley Manning: State Victimization, Realpolitik and WikiLeaks.” Contemporary Justice Review 16, no. 2 (June 2013): 280–292.
Rothstein, Mark A. Genetic Secrets Protecting Privacy and Confidentiality in the Genetic Era . New Haven, CT: Yale University Press, 1997.
Rowe, Heather. “Draft UK Data Protection Bill.” Computer Law & Security Review 10, no. 5 (1994): 280.
Roy, J. “‘Polis’ and ‘Oikos’ in Classical Athens.” Greece & Rome 46, no. 1 (1999): 1–18.
Rozemond, Marleen. Descartes's Dualism. Cambridge, MA: Harvard University Press, 1998.
Rubel, Alan. “Privacy and the USA Patriot Act: Rights, the Value of Rights, and Autonomy.” Law and Philosophy 26, no. 2 (2007): 119–159.
Rubenfeld, Jed. “The Right to Privacy.” Harvard Law Review 102 (1989): 737.
Rubenstein, Ira S. and Nathaniel Good. “Privacy By Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents.” Berkeley Technology Law Journal 28.2 (Fall 2013): 1333–1413.
Rubin, Aaron. “How Website Operators Use CFAA to Combat Data-Scraping.” Law360.
Rushin, Steven. “The Judicial Response to Mass Police Surveillance.” University of Illinois Journal of Law, Technology and Po licy 2011, no. 2 (2011): 281–328.
Rusli, Evelyn. “Instagram Pictures Itself Making Money.” Wall Street Journal, September 8, 2013.
Ruzich, Emily, Carrie Allison, Bhismadev Chakrabarti, Paula Smith, Henry Musto, Howard Ring, and Simon Baron-Cohen. “Sex and STEM Occupation Predict Autism-Spectrum Quotient (AQ) Scores in Half a Million People.” PLoS One 10, no. 10 (2015): e0141229.
S
Sack, Robert D. “Protection of Opinion under the First Amendment: Reflections on Alfred Hill, ‘Defamation and Privacy under the First Amendment.’” Columbia Law Review 100, no. 1 (January 2000): 294–330.
Salky, Steven M., and Paul B. Hynes. The Privilege of Silence Fifth Amendment Protections Against Self Incrimination. 2nd ed. Lanham: American Bar Association, 2015.
Samuels, A. “The Rights of Privacy and Freedom of Expression: The Drafting Challenge.” Statute Law Review 00, no. 00 (1999): 66–73.
Samuelson, Pamela. “Reviving Zacchini: Analyzing First Amendment Defenses in Right of Publicity and Copyright Cases.” Tulane Law Review 57, (1982): 836–929.
____. Privacy as Intellectual Property? In First Amendment Handbook, edited by James L. Swanson. New York: C. Boardman, 2002.
Sangarasivam, Yamuna. “Cyber Rebellion: Bradley Manning, WikiLeaks, and the Struggle to Break the Power of Secrecy in the Global War on Terror.” Perspectives On Global Development & Technology 12, no. 1/2 (January 2013): 69–79.
Sarat, Austin, ed. A World Without Privacy: What Law Can and Should Do? New York: Cambridge University Press, 2015.
Sarpu, Bridget A. “Google: The Endemic Threat to Privacy.” Journal of High Technology Law 15, no. 1 (2014): 97–134.
Savage, Charlie, Edward Wyatt, and Peter Baker. “U.S. Confirms That It Gathers Online Data Overseas.” New York Times, June 2013.
Savare, Matthew, and John Wintermute. “Right of Publicity Issues in Emerging Media.” Los Angeles Law 38, no. 10 (May 2015)
Schein, David D., and James D. Phillips. “Holding Credit Reporting Agencies Accountable: How the Financial Crisis May Be Contributing to Improving Accuracy in Credit Reporting.” Loyola Consumer Law Review 24, no. 329 (2012).
Schieck, Glenn R. “Undercutting Employee Mobility: The Computer Fraud and Abuse Act in the Trade Secret Context.” Brooklyn Law Review 79, no. 2 (2014): 831.
Schlabach, Gabriel R. “Privacy in the Cloud: The Mosaic Theory and the Stored Communications Act.” Stanford Law Review , 2015.
Schlag, Chris. “The New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights.” Pittsburgh Journal of Technology Law and Policy 13, no. 2 (Spring 2013).
Schmalleger, Frank. Criminal Justice Today, 13th ed. Boston, MA: Pearson, 2015.
Schmitz, Amy J. “Secret Consumer Scores and Segmentations: Separating the ‘Haves’ from ‘Have-Nots.’” Michigan State Law Review (2014): 1411.
Schneier, Bruce. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. New York: W. W. Norton, 2015.
Schneier, Bruce. Economics of Information Security and Privacy III . New York: Springer, 2013.
Schoeman, Ferdinand. “Privacy: Philosophical Dimensions of the Literature.” An Anthology: Philosophical Dimensions of Privacy 1–33.
Schulhofer, Stephen J. More Essential Than Ever: The Fourth Amendment in the Twenty-First Century . New York: Oxford University Press, 2012.
Schwabach, Aaron. Internet and the Law: Technology, Society, and Compromises . Santa Barbara, CA: ABC-CLIO, 2014.
Schwartz, Bernard, ed. The Warren Court: A Retrospective. New York: Oxford University Press, 1996.
____. The Unpublished Decisions of the Warren Court. New York: Oxford University Press, 1985, pp. 240–303.
Schwartz, John. “Two German Killers Demanding Anonymity Sue Wikipedia's Parent.” New York Times, November 12, 2009.
Secada, Jorge. Cartesian Metaphysics: The Late Scholastic Origins of Modern Philosophy. Cambridge, England: Cambridge University Press, 2000.
Setalvad, Ariha. “Instagram Direct Gets a Huge Update Focused on Messaging Your Friends.” The Verge, September 1, 2015.
Severson, Richard James. The Principles of Information Ethics . Armonk, NY: M.E. Sharpe, 1997.
Shaman, Jeffrey M. Equality and Liberty in the Golden Age of State Constitutional Law . New York: Oxford UP, 2008. Print.
Shane, Scott. “Ex-Contractor Is Charged in Leaks on NSA Surveillance.” New York Times June 21, 2013.
Shaughnessy, Perri. Invasion of Privacy . New York: Delacorte Press, 1996.
Shear, Bradley. “Ed Tech Must Embrace Stronger Student Privacy Laws.” T H E Journal (April 2015).
Sheinkopf, Cheryl M. “Balancing Free Speech, Privacy and Open Government: Why Government Should Not Restrict the Truthful Reporting of Public Record Information.” UCLA Law Review 44 (1997): 1567–1612.
Shelton-Mason County Journal Staff. “Codewords, Secrecy Become Clearer.” Shelton-Mason County Journal (August 2013).
Shema, Mike. “Browser & Privacy Attacks,” in Hacking Web Apps: Detecting and Preventing Web Application Security Problems. Boston, MA: Syngress, 2012.
Shmueli, Benjamin, and Ayelet Blecher-Prigat. “Privacy for Children.” Columbia Human Rights Law Review 42, no. 3 (Spring 2011): 759–795.
Shoebotham, Leslie A. “The Strife of Riley: The Search-Incident Consequences of Making an Easy Case Simple.” Louisiana Law Review 75 (2014): 29–70.
Shoenberger, Allen. “Privacy Wars.” Indiana International & Comparative Law Review 17 (2007): 355–393.
Shontell, Alyson. “Snap Is a Lot Bigger Than People Realize and It Could be Nearing 200 Million Active Users.” Business Insider , January 3, 2015.
Shorts, Edwin. Civil Liberties: Legal Principles of Individual Freedom. London: Sweet & Maxwell, 1998.
Siegel, Larry J., and John L. Worrall. Essentials of Criminal Justice, 9th ed. Stamford, CT: Cengage Learning, 2015.
Siegel, Neil S., and Reva B. Siegel. Contraception as a Sex Equality Right. Yale Law Journal Forum 124, 349.
Sigal, Mark. “You Say You Want a Revolution? It's Called Post-PC Computing.” Radar (O'Reilly), October 24, 2011.
Silk, Jennie Vee. “Calling Out Maryland v. King : DNA, Cell Phones, and the Fourth Amendment.” SSRN Electronic Journal SSRN Journal .
Silva, Alberto J. Cerda. “Enforcing Intellectual Property Rights by Diminishing Privacy: How the Anti-Counterfeiting Trade Agreement Jeopardizes the Right to Privacy.” American University International Law Review 26, no. 3 (2011): 601–643.
Silverman, Jacob. Terms of Service: Social Media and the Price of Constant Connection . New York: HarperCollins, 2015.
Simmons, Ric. “From Katz to Kyllo : A Blueprint for Adapting the Fourth Amendment to Twenty-First-Century Technologies.” Hastings Law Journal 53, no. 6 (August 2002): 1303– 1358.
Simon, James F. Independent Journey: The Life of William O. Douglas . New York: Harper & Row, 1980.
Sin, Yvonne Pui Man. Email Privacy: Legal and Ethical Implication of Workplace Surveillance and Monitoring . Auckland, New Zealand: Department of Management Science and Information Systems, University of Auckland, 2002.
Singer, Natasha. “A Data Broker Offers a Peek behind the Curtain.” New Yo rk Times, September 1, 2013.
Singer, Peter. Animal Liberation: A New Ethics for Our Treatment of Animals . New York: Random House, 1975.
Sipior, Janice C., Burke T. Ward, and Ruben A. Mendoza. “Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons.” Journal of Internet Commerce 10, no. 1 (2011): 1–16.
Skeen, Shelly L. “Note & Comment: City of Sherman v. Henry: Is the Texas Constitutional Right of Privacy Still a Source of Protection for Texas Citizens?” 4 Tex. Wesleyan L. Rev. 99 (1997) 99–122.
Skloot, Rebecca. The Immortal Life of Henrietta Lacks. Broadway Books 2011.
Sloan, Robert H., and Richard Warner. Unauthorized Access: The Crisis in Online Privacy and Security. Boca Raton, FL: CRC Press, 2013.
Slobogin, Christopher. Privacy at Risk: The New Government Surveillance and the Fourth Amendment . Chicago, IL: University of Chicago Press, 2007.
Slote, Michael A. From Enlightenment to Receptivity: Rethinking Our Values . New York: Oxford University Press, 2013.
Smallwood, Robert F. Information Governance: Concepts, Practices, and Best Strategies. Hoboken, NJ: Wiley, 2014.
“Smart Meter Data and Privacy.” Data Privacy for the Smart Grid, 2015, 55–74.
Smartphones . Herndon, VA: Potomac Books, 2013.
Smith, Marcia S. “Junk E-mail”: An Overview of Issues and Legislation concerning Unsolicited Commercial Electronic Mail (“Spam”) . Washington, DC: Congressional Research Service, Library of Congress, 2001.
Smith, Michael. Station X: The Codebreakers of Bletchley Park . London: Channel 4 Books, 1998.
Smith, Robert Ellis. “Consumer's Handbook Guide to Privacy Protections.” Privacy Journal, September 1, 2010.
Smolla, Rodney A. “Court Uses Human Cannonball to Shoot Hole in Gannett's First Amendment Claim.” The Media Institute, January 30, 2012.
Smolla, Rodney. “Emotional Distress and the First Amendment: An Analysis of Hustler v. Falwell.” Arizona State Law Journal 20 (January 1, 1988): 423–474.
Smolla, Rodney. Jerry Falwell v. Larry Flynt: The First Amendment on Trial . New York: St. Martin's Press, 1988.
Snowden, Edward. The Snowden Reader, edited by David P. Fidler. Bloomington: Indiana University Press, 2015.
Sobel, Richard. “The HIPAA Paradox: The Privacy Rule That's Not.” The Hastings Center Report , July 1, 2007.
Solove, Daniel J. Nothing to Hide: The False Tradeoff between Privacy and Security. New Haven, CT: Yale University Press, 2011.
____. The Digital Person: Technology and Privacy in the Information Age . New York: New York University Press, 2004.
____. The Future of Reputation Gossip, Rumor, and Privacy on the Internet . New Haven, CT: Yale University Press, 2007.
____. Understanding Privacy . Cambridge, Mass.: Harvard University Press, 2008.
Solove, Daniel J., and Paul M. Schwartz. Privacy, Law Enforcement and National Security .
Solove, Daniel J., and Woodrow Hartzog. “The FTC and the New Common Law of Privacy.” 584 Columbia Law Review 114 (2014): 583–676.
Solove, Daniel. The Future of Reputation: Gossip, Rumor and Privacy on the Internet. New Haven, CT: Yale University Press, 2007.
Soltani, Ashkan, et al. “Behavioral Advertising: The Offer You Cannot Refuse.”, Harvard Law & Policy Review 6, no. 273 (2012)
Soma, John T. Nichols. “Balance of Privacy vs. Security: A Historical Perspective of the USA PATRIOT Act.” Rutgers Computer &; Technology Law Journal , 2005.
Sorokina, Nonna. “Long-Term Impact of GLBA on the Financial Industry.” SSRN Electronic Journal SSRN Journal .
Sorrells, Felipe D. Social Security Numbers and ID Theft . New York: Nova Science Publishers, 2010.
Sotto, Lisa J. “Privacy and Data Security.” Privacy and Data Security Law Deskbook. Frederick, MD: Aspen, 2010–.
Spears, Victoria Prussen. “The Case That Started It All: Roberson v. The Rochester Folding Box Company. ” Privacy & Data Security Law Journal 3 (November 2008): 1048.
Sproule, C. “The Effect of the USA Patriot Act on Workplace Privacy.” The Cornell Hotel and Restaurant Administration Quarterly : 65–73.
Spurlock, Jefferson Tarter. “The Effects of the Cox Broadcasting Corp. v. Cohn Decision: Almost Four Decades Later.” Communications Law Review no. 14: 48–62.
Stalla-Bourdillon, Sophie, Joshua Phillips, and Mark D. Ryan. Privacy vs. Security . New York: Springer, 2015. Springer Briefs in Privacy and Security series.
Stanaland, A. J. S., M. O. Lwin, and S. Leong, (2009). “Providing Parents with Online Privacy Information: Approaches in the U.S. and the UK.” Journal of Consumer Affairs 43 no. 3 (2009): 474–494.
Stanton, Jeffrey M., and Kathryn R. Stam. The Visible Employee Using Workplace Monitoring and Surveillance to Protect Information Assets--without Compromising Employee Privacy or Trust . Medford, N.J.: Information Today, 2006.
Stein, Joshua B. Commentary on the Constitution from Plato to Rous seau. Lanham, MD: Lexington Books, 2011.
Steinberg, Robert A. “Defamation, Privacy and the First Amendment.” Duke Law Journal , no. 5 (December 1976): 1016–1050.
Steininger, Michael. “In Return to Berlin, Obama Finds a Cooler Germany.” Christian Science Monitor, June 19, 2013.
Steptoe and Johnson. Comparison of U.S. State and Federal Security Breach Notification Laws . August 26, 2015.
Stern, Seth, and Stephen Wermiel. Justice Brennan: Liberal Champion, 2010. Reprint, Lawrence: University Press of Kansas, 2013.
Sternstein, Aliya. “NSA to Crack Codes with Big Data (National Security Agency).” NextGov.com , March 30, 2012.
Stevens, Gina Marie. Privacy: Total Information Awareness Programs and Latest Developments . New York: Novinka Books, 2003. Excerpted from CRS Report No. RL31730.
Stevens, Gina Marie. Privacy: Total Information Awareness Programs and Related Information Access, Collection, and Protection Law s. Washington, DC: Congressional Research Service, 2003.
Stevens, Gina. Federal Information Security and Data Breach Notification Laws. Washington, DC: Congressional Research Service, January 28, 2010.
Stiglitz, Joseph E. “Information and the Change in the Paradigm in Economics.” American
Stone, Brad. The Everything Store: Jeff Bezos and the Age of Amazon.com . New York: Little Brown and Company, 2013.
Stone, Geoffrey R. Perilous Times: Free Speech in Wartime from the Sedition Act of 1798 to the War on Terrorism . New York: W. W. Norton, 2004.
Strahilevitz, Lior Jacob. “Toward a Positive Theory of Privacy Law.” Harvard Law Review , 2013.
Strang, Heather, and John Braithwaite, eds. Restorative Justice and Civil Society. New York: Cambridge University Press, 2001.
Strassberg, Donald, Ryan K. McKinnon, Michael A. Sustaíta, and Jordan Rullo. “Sexting by High School Students: An Exploratory and Descriptive Study.” Archives of Sexual Behavior 42, no. 1 (June 7, 2012): 15–21.
Stuart, Gary L. Miranda: The Story of America's Right to Remain Silent. Tucson: University of Arizona Press, 2004.
Stuntz, William J. “Privacy's Problem and the Law of Criminal Procedure.” Michigan Law Review 93, no. 5 (1995): 1057–1062.
Stuttard, Dafydd, and Marcus Pinto. The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd ed. Indianapolis, IN: Wiley, 2011.
Suber, Peter. Open Access. Cambridge, MA: MIT Press, 2012.
Sullum, Jacob. “When Policing Becomes Harassment: Why the NYPD's Stop-and-Frisk Program Is Unconstitutional.” Reason , July 1, 2013.
Sumberg, Theodore A. “Privacy, Freedom, and Obscenity.” Journal of Critical Analysis 3, no. 2 (1971): 84–96.
Sundar, Sindhu. “Bill Would Regulate Spying Technology Aimed at TV Viewers.” Law360. June 14, 2013.
Susman, Thomas M. “The Privacy Act and the Freedom of Information Act: Conflict and Resolution.” Journal of the Marshall Law Review 21, no. 703 (1988).
Swan, Melanie. Blockchain: Blueprint for a New Economy. Sebastopol, CA: O'Reilly Media, 2015.
Sweatt, Brian, Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, and Alex Pentland. “Building Privacy-Preserving Location-Based Apps,” in 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, Ontario, Canada, July 23–24, 2014. New York: IEEE/Wiley, 2014.
Sweeny, Jo Anne,“Sexting and Freedom of Expression: A Comparative Approach,” Kentucky Law Journal 102 (2013–2014): 103–46.
Swire, Peter P. Privacy and Surveillance with New Technologies . Wall Street Journal . “What They Know—Mobile.” August 30, 2015.
T
Talia, Domenico, Paolo Trunfio, and Fabrizio Marozzo. Data Analysis in the Cloud: Models, Techniques and Applications . Elsevier, 2015.
Tanner, Adam. Different Customers, Different Prices, Thanks To Big Data. Frobes, April 14, 2014.
Taslitz, Andrew E. Reconstructing the Fourth Amendment: A History of Search and Seizure, 1789–1868. New York: New York University Press, 2006.
Taufick, Roberto. “Understanding the Federal Trade Commission—An Overview.” Revista de Direito da Concorrência 14 (2008): 69–106.
Tavani, Herman T. “Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy.” Metaphilos ophy 38, no. 1 (2007): 1–22.
Taylor, Simon. “Fraud and Security.” European Voice. January 15, 2015. www.europeanvoice.com .
Tebbit, Mark. Philosophy of Law: An Introduct ion, 2nd ed. London, England: Routledge Taylor & Francis Group, 2005.
Terilli, Samuel A., Jr., and Sigman Splichal, “Privacy Rights in an Open and Changing Society.” In Communication and the Law, edited by W. Wat Hopkins, 283–309.
Terry, Nicolas P. “Protecting Patient Privacy in the Age of Big Data.” University of Missouri Kansas City Law Review 81, no. 2 (2012): 1–31.
Tharp, Marye C. Transcultural Marketing: Building Customer Relationships in Multicultural America . New York: Routledge, 2014.
The End of Secrecy: The Rise and Fall of WikiLeaks . London: Guardian, 2011.
The Impact of Recent Cyberstalking and Cyberharassment Cases: Leading Lawyers on Navigating Privacy Guidelines and the Legal Ramifications of Online Behavior. McQuade, Samuel C., and Sarah Gentry. Cyberstalking and Cyberbullying . New York: Chelsea House, 2012.
The Information Privacy Law Sourcebook . Chicago, IL: American Bar Association, 2012.
THE Journal Staff. “Keeping Student Data Private: Five CTOs Discuss Their Data Privacy Concerns and Reveal How They Are Working with Teachers, Students and the Community to Safeguard Student Information.” THE Journal (March 2014): 22–30.
Thibault, Edward A., and Lawrence M. Lynch. Proactive Police Management, 9th ed. Boston, MA: Pearson, 2015.
Thompson, Richard M. Governmental Tracking of Cell Phones and Vehicles: The Confluence of Privacy, Technology, and Law . Washington, DC: Congressional Research Service, 2011.
Thompson, Tamara. WikiLeaks . Detroit, MI: Greenhaven Press, 2012.
Thomson, Aimee. “Cellular Dragnet: Active Cell Site Simulators and the Fourth Amendment.” SSRN Electronic Journal SSRN Journal .
Thomson, Judith Jarvis. “The Right to Privacy.” An Anthology Philosophical Dimensions of Pri vacy 272–289. JSTOR.org.
Tilden, Samuel J. “Health Research and the HIPAA Privacy Rule.” JAMA 299, no. 11 (March 19, 2008): 1259.
Tillman, Bob. “More Information Could Mean Less Privacy: President Bush Signed the E-Government Act to Enhance Public Access to Information after Authorizing Homeland Security Legislation That May Threaten Privacy. (Capital Edge: Legislative & Regulatory Update).” Information Management Journal 37, no. 2 (March–April 2003).
____. “The Changing Political Landscape: The War on Terrorism Delays Congressional Action on Privacy, the Paperwork Reduction Act, and E-Government. (Capital Edge: Legislative & Regulatory Update).” Information Management Journal 36, no. 1 (January–February 2002): 14.
Timberg, Craig. “Try as It Might, Anti-Surveillance Group Can't Avoid Washington.” Washington Post, October 11, 2013.
Timm, Carl, and Richard Perez. “Malware Attacks,” in Seven Deadliest Social Network Attacks, tech. ed. Adam Ely. Burlington, MA: Syngress/Elsevier, 2010.
Timm, Trevor. “The Snowden Effect: New Privacy Wins Await after Data Transfer Ruling.” The Guardian, October 8, 2015.
Toledo, Fabio. Smart Metering Handbook . “What Is Privacy?” Data Privacy for the Smart Grid , 2015, 43–54.
Tomboc, Gmeleen Faye B. “The Lemons Problem in Crowdfunding.” John Marshall Journal of Information Technology & Privacy Law 30, no. 2 (2013): 253–279.
Toobin, Jeffrey. “The Solace of Oblivion: In Europe, the Right to Be Forgotten Trumps the Internet.” New Yorker, September 29, 2014.
Torres, Mario S. The Impact of Demographics and the Political Environment on the Implementation of Fourth Amendment Law in Schools . 2003.
Toth, Victor J. “Telephone Privacy—How to Invade It (Caller Identification and Automatic Number Identification) (Washington Perspective).” Business Communications Review , April 1, 1994.
Townsend, Katherine Novak. Employee Privacy Challenges & Solutions: Electronic Monitoring, Health Information, Personnel Files, and More . Brentwood, TN: M. Lee Smith Publishers, 2008.
Trepte, Sabine, and Leonard Reinecke. Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web . Berlin: Springer-Verlag, 2011.
Tribe, Lawrence H. “Lawrence v. Texas: The ‘Fundamental Right’ That Dare Not Speak Its Name.” Harvard Law Review 117, no. 6 (2004).
Trottier, Daniel. Identity Problems in the Facebook Era . New York, Routledge, 2014.
True, Michael. “The Passion of Bradley Manning: The Story Behind the Wikileaks Whistleblower.” International Journal On World Peace 31, no. 3 (September 2014): 84–87
Tsai, Wei-Tek, Guanqiu Qi, and Yinong Chen. “Choosing Cost-Effective Configuration in Cloud Storage.” In 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS) , 1–8. IEEE, 2013.
Tunick, Mark. Balancing Privacy and Free Speech: Unwanted Attention in the Age of Social Media. New York: Routledge, 2015.
Tunnell, Kenneth D. Pissing on Demand Workplace Drug Testing and the Rise of the Detox Industry . New York: New York University Press, 2004.
Turow, J., Hennessy, M., & Draper, N. (June 2015). The Tradeoff Fallacy: How Marketers are Misrepresenting American Consumers and Opening Them Up to Exploitation (University of Pennsylvania, Annenberg School for Communication).
U
United States Institute of Peace. “Cyberterrorism: How Real Is the Threat?” December 2004.
Urofsky, Melvin I. Lethal Judgments: Assisted Suicide and American Law . Lawrence, Kan.: U of Kansas, 2000. Print.
US Department of Defense. Report to Congress Regarding the Terrorism Information Awareness Program: In Response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108–7, Division M, § 111(b) . Washington, DC: Defense Advanced Research Projects Agency, 2003.
US Department of Justice. 1999 Report on Cyberstalking: A New Challenge for Law Enforcement & Industry . Washington, DC: Author, 1999.
US Government Printing Office. Protecting Our Personal Health Information, Privacy in the Electronic Age: Hearings before the Committee on Labor and Human Resources, United States Senate, One Hundred Fifth Congress, First Session Examining Standards with Respect to the Privacy of Individuals . Washington, DC: Author, 1998.
Uzelac, Elizabeth B. “Reviving the Privacy Protection Act of 1980.” Northwestern University Law Review 107, no. 3 (April 2013): 1437.
V
Vacca, John R. Biometric Technologies and Verification Systems . Boston, MA: Butterworth-Heinemann/Elsevier, 2007.
Vaidhyanathan, Siva. The Googlization of Everything (And Why We Should Worry). Berkeley: University of California Press, 2011.
Van Loo, Rory. “Helping Buyers Beware: The Need for Supervision of Big Retail.” University of Pennsylvania Law Review 163, no. 5 (April 2015): 1311–1392.
Vaughn, Robert G. The Successes and Failures of Whistleblower Laws . Cheltenham, UK: Edward Elgar Publishing Limited, 2012.
Verbeek, Theo. Descartes and the Dutch: Early Reactions to Cartesian Philosophy 1637–1650. Carbondale: Southern Illinois University Press, 1994.
Verizon. “2015 Data Breach Investigations Report.” Verizonenterprise.com. Last modified February, 2015.
Vermaat, Misty, and Susan L. Sebok. Discovering Computers 2016: Tools, Apps, Devices, and the Impact of Technology .
Vile, John R. Encyclopedia of the Fourth Amendment . Thousand Oaks, Calif.: CQ Press, 2013.
Villard, Oswald Garrison. “Edwin L. Godkin, Master of Comment and of Style.” In Some Newspapers and Newspaper-Men . New York: Alfred A. Knopf, 1923.
Vladeck, Stephen I. “Big Data before and after Snowden.” Journal of National Security Law and Policy 7, no. 2 (2014): 333–340.
Volkmer, Ingrid. The Global Public Sphere: Public Communication in the Age of Reflective Interdependence .
Volokh, Eugene. “Freedom of Speech, Cyberspace, Harassment Law, and the Clinton Administration.” Law and Contemporary Problems 63, nos. 1 and 2 (Winter/Spring 2000): 299–335.
Volonino, Linda, et al. Computer Forensics: Principles and Practices. Upper Saddle River, NJ: Pearson/Prentice Hall, 2007.
Vrankulj, Adam. “NGI: A Closer Look at the FBI's Billion-Dollar Biometric Program.” BiometricUpdate .
W
Wacks, Raymond. Privacy and Media Freedom . Oxford, England: Oxford University Press, 2013.
____. Privacy: A Very Short Introduction, 2d ed. New York: Oxford University Press, 2015.
Wakin, Michele. Otherwise Homeless: Vehicle Living and the Culture of Homelessness . Winegarten, Debra L., and Gisela J. Hinkle. Women, Homelessness and Privacy . 1990.
Waldron, Jeremy. God, Locke, and Equality: Christian Foundations in Locke's Political Thought. Cambridge, England: Cambridge University Press, 2002.
Walker, Robert Kirk. “Note: The Right to Be Forgotten.” Hastings Law Journal 64 (2012): 257–286.
Walker, Samuel. In Defense of American Liberties: A History of the ACLU. 2nd ed. Carbondale: Southern Illinois University Press, 1999.
Wanlund, Bill. “Intelligence Reform: Are U.S. Spy Agencies Prepared for 21st-century Threats?” CQ Researcher 25, no. 2 (May 29, 2015).
Warburton, Steven, and Stylianos Hatzipanagos, eds. Digital Identity and Social Media . Hershey, PA: Information Science Reference, 2013.
Warren, Earl. The Memoirs of Earl Warren. Garden City, NY: Doubleday and Company, Inc., 1977.
Warren, Samuel D., and Louis D. Brandeis. “The Right to Privacy.” Harvard Law Review 4, no. 5 (1890): 193–220.
Warren, Samuel, and Louis Brandeis. “The Right to Privacy.” Harvard Law Review 4 (1890): 193.
Watkins, Tamara E. “Privacy, the Individual, and the ‘Good’ Society. (Philosophy).” Michigan Academician , March 22, 2002.
Wayleith, Paulus R., ed. Data Security: Laws and Safeguards . New York: Nova Science Publishers, Inc., 2008.
Wayne, Logan Danielle. “The Data Broker Threat: Proposing Federal Legislation to Protect Post-Expungement Privacy.” Journal of Criminal Law and Cri minology 102, no. 1 (Winter 2012): 253–282.
Weber, Michael. Invasion of Privacy: Big Brother and the Company Hackers . Boston, MA: Premier Press, 2004.
Weber, Steve. The Success of Open Source . Cambridge, MA: Harvard University Press, 2004.
Webster, Warren R., Jr. “DNA Database Statutes & Privacy in the Information Age.” Health Matrix: Journal of Law-Medicine 10, no. 1 (Winter 2000): 119. Academic Search Premier , EBSCOhost (accessed September 26, 2015).
Weil, Nancy. “CDT to File FTC Complaint on Pentium III. (Center for Democracy and Technology).” Network World , March 1, 1999.
Weinberg, Louise. “The McReynolds Mystery Solved.” Denver University Law Review 89, no. 1 (January 2011): 133–160.
Weinstein, Donald D. “Federal Fair Credit Reporting Act—Compliance by Lenders and Other Users of Consumer Credit Information.” Banking Law Journal 89, no. 410 (1972)
Weir, Robert F., ed. Ethical Issues in Death and Dy ing, 2nd ed. New York: Columbia University Press, 1986.
Wertime, Kent, and Ian Fenwick. DigiMarketing: The Essential Guide to New Media & Digital Marketing . Singapore: John Wiley & Sons (Asia), 2008.
West, Nigel. The SIGINT Secrets: The Signals Intelligence War, 1900 to Today: Including the Persecution of Gordon Welchman . New York: W. Morrow, 1988.
Western, Bruce. “Criminal Background Checks and Employment among Workers with Criminal Records.” Criminology & Public Policy 7, no. 3 (August 2008): 413–417.
Westin, Alan F. Privacy and Freedom . New York: Athenaeum, 1970.
White House Press Release (Feb. 23, 2012). We Can't Wait: Obama Administration Calls for a Consumer Privacy Bill of Rights for the Digital Age.
White House. Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy .
White, Welsh S. “Miranda's Failure to Restrain Pernicious Interrogation Practices.” Michigan Law Review 99, no. 5 (March 2001): 1211–1247. (Symposium: Miranda after Dickerson: The Future of Confession Law).
Whitley, Joe D., and Lynne K. Zusman, eds. Homeland Security: Legal and Policy Issues. Chicago IL: ABA Section of Administrative Law and Regulatory practice, 2009.
Whitman, James Q. “Two Western Cultures of Privacy: Dignity versus Liberty.” Yale Law Journal 113, no. 6 (April 2004): 1151–1221.
Wierzel, Kimberly L. “If You Can't Beat Them, Join Them: Data Aggregators and Financial Institutions.” North Carolina Banking Institute 5, no. 457 (2001).
Wilkerson, Jared A. “Battle for the Disclosure Tort.” California Western Law Review 49 (Spring 2013): 231–268.
Wilkinson, Francis. Essential Liberty: First Amendment Battles for a Free Press . New York: Columbia University Graduate School of Journalism, 1992.
Wilkinson, Nicholas. Secrecy and the Media: The Official History of the D-notice System. Government Official History Series. New York: Routledge, 2009.
Willbern, York. “Types and Levels of Public Morality.” Public Administration Review 44, no. 2 (1984): 102–108.
Williams, Mary E. Abortion . Detroit: Greenhaven Press, 2007.
Wills, Nathan J. “A Tripartite Threat to Medical Records Privacy: Technology, HIPAA's Privacy Rule and the USA Patriot Act.” Journal of Law and Health (2002).
Wilson, C. L., and C. L. Wilson. Biometric Data Specification for Personal Identity Verification. Rockville, MD: NIST, 2013.
Winn, Peter A. “Online Court Records: Balancing Judicial Accountability and Privacy in an Age of Electronic Information.” Washington Law Review 79, no. 1 (2004): 307–329.
____. “Katz and the Origins of the ‘Reasonable Expectation of Privacy’ Test.” McGeorge Law Review 40 (2009): 1–9.
Wintemute, Robert. Sexual Orientation and Human Rights: The United States Constitution, the European Convention, and the Canadian Charter . Oxford, UK: Clarendon Press, 1995.
Winters, Michael Sean. “Push for Immigration Reform: Negotiation, Compromise Lead to Senators' New Proposal.” National Catholic Reporter , May 10, 2013.
Wirtz, Brigitte. “Technical Evaluation of Biometric Systems.” Computer Vision—ACCV'98 Lecture Notes in Computer Science. 499–506.
Wolf, Christopher Maxwell. “Smart Grids and Privacy. (Regulation and Competition).” Communications & Strategies , October 1, 2009.
Wolfe, Alan. “The Politics of Privacy, Right and Left.” Harper's Magazine , May 1, 1993.
Wolfe, C. (2000). “Public Morality and the Modern Supreme Court.” American Journal of Modern Jurisprudence 45 (1): 66–92.
Wolfe, Gregory Nathaniel. “Smile for the Camera, the World Is Going to See That Mug: The Dilemma of Privacy Interests in Mug Shots.” Columbia Law Review 133, no. 8 (2013).
Wolhandler, Steven J. “Voluntary Active Euthanasia for the Terminally Ill and the Constitutional Right to Privacy.” Cornell Law Review 363 (1984).
Woodard, Damon L., and Patrick J. Flynn. “Finger Surface as a Biometric Identifier.” Computer Vision and Image Understanding 100, no. 3 (2005): 357–384.
Woodward, Beverly. “Federal Privacy Legislation.” The Journal of Law, Medicine & Ethics 26, no. 1 (1998): 80–81.
Woodward, John D. Biometrics a Look at Facial Recognition. Santa Monica, Calif.: RAND, 2003.
Worrall, John, and Craig Hemmens. Criminal Evidence: An Introduction. Los Angeles: Roxbury, 2005.
Wortley, Richard, and Steven Smallbone. Internet Child Pornography: Causes, Investigation, and Prevention. Santa Barbara, CA: Praeger, 2012.
Wozniak, S., and G. Smith. iWoz: Computer Geek to Cult Icon: How I Invented the Personal Computer, CoFounded Apple, and Had Fun Doing It. New York: W. W. Norton & Co., 2006.
Wright, Ashlea. “Wilson v. Layne: Increasing the Scope of the Fourth Amendment Right to Privacy.” Pepperdine Law Review (2000): 163–193.
Wright, Lawrence. The Looming Tower: Al-Qaeda and the Road to 9/11 . New York: Knopf, 2006.
Wu, Stephen S. Guide to HIPAA Security and the Law . Chicago: ABA Section of Science & Technology Law, 2007.
Wugmeister, Miriam. Global Employee Privacy and Data Security Law . Arlington, VA: BNA Books, 2009.
Y
Yan, Jean. “Big Data, Bigger Opportunities - Data.gov's Roles: Promote, Lead, Contribute, and Collaborate in the Era of Big Data.” 2012 President Management Council Inter-Agency Rotation Program, Cohort 2, April 9, 2013.
Yar, Majid. Cybercrime and Society . London: SAGE Publications, 2006.
Yoffie, D. B., and M. Slind. Apple Inc., 2008. Harvard Business School Case Studies (708–480). Cambridge, MA: Harvard Business School Publishing, February 2008, 2–32.
Young, J. S., and W. L. Simon. iCon Steve Jobs: The Greatest Second Act in the History of Business. Hoboken, NJ: John Wiley and Sons, 2005, 35.
Young, John B. Privacy . Chichester, England: Wiley, 1978.
Youngs, Gillian, ed. Digital World: Connectivity, Creativity, and Rights. 2013; reprint, New York: Routledge, 2013.
Z
Zeidman, Steven. “Whither the Criminal Court: Confronting Stops-and-Frisks.” Albany Law Review 76, no. 2 (2013): 1187.
Zelermyer, William. Invasion of Privacy . Syracuse, NY: Syracuse University Press, 1959.
Zemer, Lior. “The Making of a New Copyright Lockean.” Harvard Journal of Law & Public Policy, no. 3, 29 (2006): 891–947.
Zeng, Marcia. “Metadata Basics.” Kent State University, 2015.
Zero to Eight: Children's Media Use in America 2013 . San Francisco, CA: Common Sense Media, 2013.
Zetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon . New York: Broadway Books, 2014.
Zheng, Zibin, Jieming Zhu, and Michael R. Lyu. “Service-generated Big Data and Big Data-As-a-Service: an Overview.” In 2013 IEEE International Congress on Big Data (BigData Congress) , 403–410. IEEE, 2013.
Zimmerman, Diane. “False Light Invasion of Privacy: The Light That Failed.” New York University Law Review 64, no. 2 (May 1989): 364–453.
Zittrain, Jonathan. “What the Publisher Can Teach the Patient: Intellectual Property and Privacy in an Era of Trusted Privication.” Stanford Law Review 52, no. 5 (May 2000): 1201–1250. [Symposium: Cyberspace and Privacy: A New Legal Paradigm?]
Zotti, Priscilla H. Machado. Injustice for All: Mapp v. Ohio and the Fourth Amendment. New York: Peter Lang Publishing, 2005.