adler, michael - university of washingtonfaculty.washington.edu/moore2/privacybibliography.doc  ·...

87
Privacy Rights: Moral and Legal Foundations Bibliography Abrams, Gerald D. "The Right to Privacy when Lives are at Stake." Troubling Problems in Medical Ethics, Ed. by Marc Basson. New York: Liss, 1981. 257-268. Abramsky, Leslie C. “Questionnaires and Constitutional Privacy Rights in Public Sector Employment.” The George Washington Law Review 62 (1994): 693-717. Ackerman, M., Darrell, T., and Weitzner, D. J. “Privacy in Context.” Human Computer Interaction 16 (2001): 167-76. Adams, Helen R. “Privacy and Confidentiality: Now More than Ever, Youngsters Need to Keep their Library Under Wraps.” American Libraries 33 (2002): 44 46, 48. Adkins, David C. “Right to Privacy?: Why the Private Facts Trot Cannot Coexist with the First Amendment.” First Amendment Law Review 2 (2004): 325. Adler, G. Stoney, and Tompkins, Phillip K. “Electronic Performance Monitoring.” Management Communication Quarterly 10 (1997): 259-288. Adler, Michael. “Cyberspace, General Searches, and Digital Contraband: The Fourth Amendment and the Net Wide Search.” Yale Law Journal 106 (1996):1093-1120. Adler, Philip Jr. “Employee Privacy: Legal and Research Developments and Implications for Personnel Administration.” Sloan Management Review 26 (1985):13-22. Alderman, Ellen and Kennedy, Caroline. The Right to Privacy. Knopf Press, New York, 1995. 292

Upload: vuthuy

Post on 17-Sep-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

Privacy Rights: Moral and Legal Foundations

Bibliography

Abrams, Gerald D. "The Right to Privacy when Lives are at Stake." Troubling Problems in Medical

Ethics, Ed. by Marc Basson. New York: Liss, 1981. 257-268.

Abramsky, Leslie C. “Questionnaires and Constitutional Privacy Rights in Public Sector

Employment.” The George Washington Law Review 62 (1994): 693-717.

Ackerman, M., Darrell, T., and Weitzner, D. J. “Privacy in Context.” Human Computer Interaction

16 (2001): 167-76.

Adams, Helen R. “Privacy and Confidentiality: Now More than Ever, Youngsters Need to Keep their

Library Under Wraps.” American Libraries 33 (2002): 44 46, 48.

Adkins, David C. “Right to Privacy?: Why the Private Facts Trot Cannot Coexist with the First

Amendment.” First Amendment Law Review 2 (2004): 325.

Adler, G. Stoney, and Tompkins, Phillip K. “Electronic Performance Monitoring.” Management

Communication Quarterly 10 (1997): 259-288.

Adler, Michael. “Cyberspace, General Searches, and Digital Contraband: The Fourth Amendment and

the Net Wide Search.” Yale Law Journal 106 (1996):1093-1120.

Adler, Philip Jr. “Employee Privacy: Legal and Research Developments and Implications for

Personnel Administration.” Sloan Management Review 26 (1985):13-22.

Alderman, Ellen and Kennedy, Caroline. The Right to Privacy. Knopf Press, New York, 1995.

Agre, P. E., and Rotenberg, M. “Technology and Privacy: The New Landscape.” Journal of the

American Society for Information Science 50 (1999): 631-633.

Agre, Philip E. “Surveillance and Capture: Two Models of Privacy.” The Information Society 10

(1994): 101-127.

Agre, Philip E. “The Architecture of Identity: Embedding Privacy in Market Institutions.”

Information, Communication & Society 2 (1999): 1-25.

Akdeniz, Yaman. “New privacy concerns: ISPs, crime prevention and consumers' rights.”

International Review of Law, Computers and Technology 14 (2000): 55-61.

Akdeniz, Yaman. “Anonymity, Democracy, and Cyberspace.” Social Research 69 (2002): 223-237.

Albanese, Andrew Richard, Berry, John N, DiMattia, Susan S, Kenney, Brian, Oder, Norman, and

Rogers, Michael. “Privacy, Porn, and Public Access in 2004.” Library Journal 128 (2003): 68-70.

292

Alder, G. Stoney. “Ethical Issues in Electronic Performance Monitoring: A Consideration of

Deontological and Teleological Perspectives.” Journal of Business Ethics 17 (1998): 729-743.

Alderman, Ellen. “Homeland security & privacy: striking a delicate balance.” Carnegie Reporter 2

(2002): 22-31.

Aldhouse, F. “The Transfer of Personal Data to Third Countries under EU Directive 95/46/EC.”

International Review of Law, Computers and Technology 13 (1999): 75-79.

Alfino, M. “Information Ethics in the Workplace: Misplacing Privacy.” Journal of Information Ethics

10 (2001): 5-8.

Alfino, Mark, and Mayes, G. Randolph. “Reconstructing the Right to Privacy.” Social Theory and

Practice 29 (2003): 1-18.

Alge, Bradley J. “Effects of Computer Surveillance on Perceptions of Privacy and Procedural

Justice.” Journal of Applied Psychology 86 (2001): 797.

Allard, N. W. “Privacy Online: Washington report.” Hastings Communications and Entertainment

Law Journal 20 (1998): 511 540.

Allen, Anita L. “The Virtuous Spy: Privacy As an Ethical Limit.”

Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008):

3-22.

Anita Allen, Why Privacy Isn't Everything: Feminist Reflections on Personal Accountability.

Rowman & Littlefield 2003.

Allen, Anita L. “Is Privacy Now Possible? A Brief History of an Obsession.” Social Research 68

(2001): 301-06.

Allen, Anita L. “Cyberspace and Privacy: A New Legal Paradigm? Gender and Privacy in

Cyberspace.” Stanford Law Review 52 (2000): 1175.

Allen, Anita L. Uneasy access: privacy for women in a free society. New Jersey: Rowman and

Littlefield, 1988.

Allen, Anita L. "Privacy and Equal Protection as Bases for Abortion Law: Citizenship, Gender, and

the Constitution." Having and Raising Children, ed. Uma Narayan. University Park:

Pennsylvania UP, 1999.

Allen, Anita L. “Coercing Privacy.” William and Mary Law Review 40 (1999): 723.

Allen, Anita L. “Lying to Protect Privacy.” Villanova Law Review 44 (1999): 161.

Allen, Anita L. "Women and their Privacy: What is at Stake." Beyond Domination, ed. Carol C.

Gould. Ottowa: Rowman and Allanheld, 1984, 233-249.

Allen, Arthur. “Medical privacy? Forget it.” Medical Economics 75 (1998): 151-152.

293

Alpa, Guido. “The Discipline of Personal Databases and New Technologies for Formation of

Individual Identity.” Sociologia del Diritto 24 (1997): 45-58.

Alpert, Sheri. “Privacy Issues in Clinical Genomic Medicine, or Marcus Welby, M.D., Meets the

$1000 Genome.” Cambridge Quarterly of Healthcare Ethics 17 (Fall 2008) :373-384.

Alpert, Sheri A. “Protecting Medical Privacy: Challenges in the Age of Genetic Information.”

Journal of Social Issues 59 (2003): 301-323.

Alpert, Sheri. “Smart Cards, Smarter Policy: Medical Records, Privacy, and Health Care Reform.”

Hastings Center Report 23 (1993): 13-23.

Amann, Diane. “Publicker Industries v. Cohen: Public Access to Civil Proceedings and a

Corporation's Right to Privacy.” Northwestern University Law Review 80 (1986): 1319-1354.

Anderson, Scott A.” Privacy without the Right to Privacy.” Monist: An International Quarterly

Journal of General Philosophical Inquiry 91 (January 2008): 81-107.

Andre, Judith. “Privacy as a Value and as a Right.” Journal of Value Inquiry 20 (1986): 309-317.

Andrejevic, Mark. “The Work of Being Watched: Interactive Media and the Exploitation of Self

Disclosure.” Critical Studies in Media Communication 19 (2002): 230-248.

Andrews, Lori B. “Mom, Dad, Clone: Implications for Reproductive Privacy.” Cambridge Quarterly

of Healthcare Ethics 7 (1998): 176-186.

Angel, Colleen. “The Right to Privacy.” Journal of Information Ethics 9 (2000): 11-25.

Apasu Gbotso, Yao. “Survey on the Constitutional Right to Privacy in the Context of Homosexual

Activity.” University of Miami Law Review 40 (1986): 521-657.

Apostolou, G. L. “Threat to Privacy: The Federal Government's Use of Personal Information in the

New Communication Environment.” Telematics and Informatics 5 (1988): 451-459.

Arblaster, Anthony. The Rise and Decline of Western Liberalism. Oxford, England: Basil Blackwell

Publishers, 1984.

Archer, Dane, and Erlich, Lynn. “Weighing the Evidence: A New Method for Research on Restricted

Information.” Qualitative Sociology 8 (1985): 345-358.

Ardito, S C. “New Filtering and Censorship Challenges.” Information Today 19 (2002): 19-21.

Armstrong, H L, and Forde, P J. “Internet Anonymity Practices in Computer Crime.” Information

Management and Computer Security 11 (2003): 209-215.

Arneson, Richard J. “Egalitarian Justice versus The Right to Privacy?” Social Philosophy and Policy,

17 (2000): 91-119.

Arnold, S E. “Internet Users at Risk: The Identity/Privacy Target Zone.” Searcher 9 (2001): 24-39.

Arrow, Kenneth J. “Nozick’s Entitlement Theory of Justice.” Philosophia 7 (1978): 265-279.

294

Artandi, Susan. “Man, Information, and Society: New Patterns of Interaction.” Journal of the

American Society for Information Science 30 (1979): 15-18.

Arthur, John. The Unfinished Constitution: Philosophy and Constitutional Practice. Belmont:

Wadsworth, 1989.

Ashdown, Gerald G. “Media Reporting and Privacy Claims: Decline in Constitutional Protection for

the Press.” Kentucky Law Journal 66 (1977/1978): 759-99.

Athanasiou, Tom. “Encryption Technology, Privacy, and National Security.” Technology Review 89

(1986): 56-64.

Auerbach, L. “Privacy and Canadian Telecommunications Regulations.” Telecommunications Policy,

7 (1983): 35-42.

Austin, Lisa. “Privacy and the Question of Technology.” Law and Philosophy 22 (2003): 119-166.

Awad, Naveen Farag and Krishnan, M. S.. 2006. "The Personalization Privacy Paradox: An

Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for

Personalization," Management Information Systems Quarterly 30 (2006): 13-28.

Ayoade, J. O., and Kosuge, T. “Breakthrough in Privacy Concerns and Lawful Access Conflicts.”

Telematics and Informatics 19 (2002): 273-289.

Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Englewood Cliffs:

Prentice Hall, 1997.

Back, Kurt W. Privacy, Self & Society. American Sociological Association (ASA), 1985.

Baer, Walter S. “Technology's Challenges to the First Amendment.” Telecommunications Policy 17

(1993): 3-13.

Baez, Benjamin. “Confidentiality in Qualitative Research: Reflections on Secrets, Power and

Agency.” Qualitative Research 2 (2002): 35-58.

Bailey, Joe. “From Public to Private: The Development of the Concept of the ‘Private.’” Social

Research 69 (2002): 15-33.

Bailey, Joe. “Some Meanings of 'the Private' in Sociological Thought.” Sociology 34 (2000): 381.

Backer, Larry C. “Global Panopticism: States, Corporations, and the Governance of Monitoring

Regimes.” Indiana Journal of Global Legal Studies 15 (Winter 2008): 102-148.

Baker, Edwin. “Autonomy and Informational Privacy, or Gossip: The Central Meaning of the First

Amendment.” Social Philosophy and Policy 21 (2004): 215-268.

Bakich, Kathryn L. “Health Plans and Individual Rights to Privacy of Health Information, Resolving

the Conflict.” Benefits Law Journal 12 (1999): 7-37.

Balas, J. L. “How Should Privacy be Protected in the Electronic Library?” Computers in Libraries 21

(2001): 53-55.

295

Ball, Howard. No Pledge of Privacy: The Watergate Tapes Litigation, 1973 1974. Port Washington,

NY: Kennikat, 1977.

Barajas Ochoa, Rosa Elvia, and Massieu Trigo, Yolanda Cristina. “The Human Genome Project. A

Challenge for Science, but a Dilemma for Humanity.” Sociologica 12 (1997): 119-154.

Barnes, J A. Who Should Know What? Social Science, Privacy and Ethics. Cambridge University

Press, 1980.

Baxter, John D. State Security, Privacy and Information. Harvester Wheatsheaf, 1990.

Bayer, Ronald. “AIDS, Privacy, and Responsibility.” Daedalus 118 (1989): 79-99.

Bazillion, R J. “The Effect of Access and Privacy Legislation on the Conduct of Scholarly Research

in Canada.” Social Science Information Studies 4 (1984): 5-14.

Bazillion, Richard J. “Freedom of Information: A Canadian Dilemma.” Round Table, 288 (1983):

382-394.

Beardsly, Elizabeth. “Privacy: Autonomy and Selective Disclosure.” In Privacy: Nomos XIII, ed. J.

Roland Pennock and John W. Chapman, 56-70. New York: Atherton Press, 1971.

Beauchamp, Tom L. “The Right to Privacy and the Right to Die.” Social Philosophy and Policy 17

(2000): 276-292.

Beauchamp, Tom L (Ed.). Ethical Issues in Social Science Research. Baltimore: Johns Hopkins

Press, 1982.

Bebbington, L. W. “Managing Content: Licensing, Copyright and Privacy Issues in Managing

Electronic Resources.” Legal Information Management 1 (2001): 4-12.

Beck, Robert N. “The Right of Professional Privacy.” Personalist 55 (1974): 145-150.

Bedi, Sonu. “Repudiating Morals Legislation: Rendering the Constitutional Right to Privacy

Obsolete.” Cleveland State Law Review 53 (2005): 447

Beigler, Jerome S. "Privacy and Confidentiality." Law and Ethics in the Practice of Psychiatry, ed.

Charles K. Hofling. New York: Brunner Mazel, 1981. 69-90.

Belair, R. R., Lowe, T. C., Fisher, P. L., and Neier, A. “Freedom of Information vs. Privacy: an

Information Dilemma.” Bulletin of the Medical Library Association 3 (1976): 13-21.

Belair, Robert C. “Less Government Secrecy and More Personal Privacy? Experience with the

Freedom of Information and Privacy Acts.” Civil Liberties Review 4 (1977): 10-18.

Belair, Robert R. Privacy and Juvenile Justice Records. Washington, DC: United States Bureau of

Justice Statistics, 1982.

Belanger, F., Hiller, J. S., and Smith, W. J. “Trustworthiness in Electronic Commerce: The Role of

Privacy, Security, and Site Attributes.” Journal of Strategic Information Systems 11 (2002): 245-

70.

296

Beling, Craig T. “Transborder Data Flows: International Privacy Protection and the Free Flow of

Information.” Boston College International and Comparative Law Review 6 (1983): 591-624.

Bellman, Beryl L. “The Paradox of Secrecy.” Human Studies 4 (1981): 1-24.

Beloff, Michael. “The Inquisitive Society: Towards the Right of Privacy.” Encounter 35 (1970): 49-

57.

Benhabib, Seyla. “Feminist Theory and Hannah Arendt's Concept of Public Space.” History of the

Human Sciences 6 (1993): 97-114.

Bennett, C. H., Brassard, G., Crepeau, C., and Maurer, U. M. “Generalized Privacy Amplification.”

IEEE Transactions on Information Theory 41 (1995): 1915-1923.

Bennett, C. H., Brassard, G., and Robert, J. M. “Privacy Amplification by Public Discussion.” Siam

Journal of Computing 17 (1988): 210-229.

Bennett, Colin J. “Arguments for the Standardization of Privacy Protection Policy: Canadian

Initiatives and American and International Responses.” Government Information Quarterly 14

(1997):351-62.

Bennett, Colin J. “Computers, Personal Data, and Theories of Technology: Comparative Approaches

to Privacy Protection in the 1990s.” Science, Technology, and Human Values 16 (1991): 51-69.

Bennett, Colin J. Regulating Privacy: Data Protection and Public Policy in Europe and the United

States. Ithaca, N.Y.: Cornell U. Pr., 1992.

Bennett, Colin J., and Raab, Charles D. “The Adequacy of Privacy: The European Union Data

Protection Directive and the North American response.” Information Society 13 (1997):245-63.

Bennett, Collin J., and Raab, Charles D. “The Governance of Privacy: Policy Instruments in Global

Perspective.” Information Polity 8 (2003): 80-84.

Bennett, Colin J. “Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the

World Wide Web.” Ethics and Information Technology 3 (2001): 197-210.

Bentley, Eric Jr. “Towards an International Fourth Amendment: Rethinking Searches and Seizures

Abroad after Verdugo Urquidez.” Vanderbilt Journal of Transnational Law 27 (1994): 329-417.

Ben Ze'ev, Aaron. “Privacy, Emotional Closeness, and Openness in Cyberspace.” Computers in

Human Behavior 19 (2003): 451-467.

Benn, Stanley. “Privacy, Freedom, and Respect for Persons.” In Privacy: Nomos XIII, ed. J. Roland

Pennock and John W. Chapman, 1-26. New York: Atherton Press, 1971.

Benn, Stanley. “Protection and Limitation of Privacy.” Australian Law Journal 52 (1978): 601.

Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press,

1983.

297

Benn, Stanley. “Private and Public Morality: Clean Living and Dirty Hands.” 155-182. Benn, Stanley

and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.

Benn, Stanley and G. Gaus. “The Liberal Conception of the Public and the Private.” Benn, Stanley

and G. Gaus eds. Public and Private in Social Life. 31-66. New York: St. Martin’s Press, 1983.

Berardo, Felix M. “Family Privacy: Issues and Concepts.” Journal of Family Issues 19 (1998): 4-19.

Berman, J., and Goldman, J. A Federal Right of Information Privacy: The Need for Reform.

Washington, DC: Benton Foundation, 1989.

Bertot, John Carlo, Jaeger, Paul T., and McClure, Charles R. “The Impact of the USA Patriot Act on

Collection and Analysis of Personal Information Under the Foreign Intelligence Surveillance

Act.” Government Information Quarterly 20 (2003): 295-314.

Bibas, Steven A. "A Contractual Approach to Data Privacy." Harvard Journal of Law and Public

Policy 17 (1994): 591-605.

Bible, Jon D. “When Employers Look for Things Other than Drugs: The Legality of AIDS, Genetic,

Intelligence, and Honesty Testing in the Workplace.” Labor Law Journal 41 (1990): 195-213.

Biddle, Andrea K. Public Health, Privacy, and Politics: HIV Partner Notification. Rand Corp, 1991.

Bier, William, ed. Privacy. New York: Fordham University Press, 1980.

Bierman, A.K. “Spying, Liberalism, and Privacy.” Journal of Social Philosophy 5 (1974): 11-14.

Bigelow, R. P. “Computers and Privacy: An American Perspective.” Information Age 8 (1986): 134-

140.

Bishop, Nicole. “Trust Is Not Enough: Classroom Self Disclosure and the Loss of Private Lives.”

Journal of Philosophy of Education 30 (1996): 429-439.

Black, Tricia E. “Taking Account of the World as it Will Be: The Shifting Course of U.S. Encryption

Policy.” Federal Communications Law Journal 53 (2001).

Bloche, M. Gregg. “Managed Care, Medical Privacy, and the Paradigm of Consent.” Kennedy

Institute of Ethics Journal 7 (1997): 381-386.

Block, Lisa K., and Stokes, Garnett S. “Performance and Satisfaction in Private versus Non-private

Work Settings.” Environment and Behavior 21 (1989): 277-297.

Bloom, Alan. “The Right of Public Access to Information Submitted Under the Requirements of the

Health Planning Act.” Public Health Reports 92 (1977): 411-413.

Bloustein, Edward. Individual and Group Privacy. New Jersey: Transaction Books, 1978.

Bloustein, Edward. “Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser.” New York

University Law Review 39 (1964): 962-1007.

Bloustein, Edward. “Group Privacy: The Right to Huddle.” Rutgers-Camden Law Journal 8 (1977):

219.

298

Blume, P. “Privacy as a Theoretical and Practical Concept.” International Review of Law, Computers

and Technology 11 (1997): 193-202.

Blyth, A. “Managing Security and Privacy Issues while Re-engineering the Healthcare Enterprise.”

Health Informatics Journal 4 (1998): 157-66.

Boag, Jordana. “The Battle of Piracy versus Privacy: How the Recording Industry Association of

America (RIAA) Is Using the Digital Millennium Copyright Act (DMCA) As Its Weapon

Against Internet Users' Privacy Rights.” California Western School of Law California Western

Law Review 41 (2004): 241.

Bocij, Paul. “Victims of Cyberstalking: An Exploratory Study of Harassment Perpetrated via the

Internet.” First Monday 8 (2003).

Boetzkes, Elisabeth. “Privacy, Property, and the Family in the Age of Genetic Testing: Observations

from Transformative Feminism.” Journal of Social Philosophy 32 (2001): 301-316.

Bogard, William. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge,

England: Cambridge U Press, 1996.

Boguscz, B., Davies, J. E., and Oppenheim, C. “Personal Information in UK Public Registers: Its

Availability and Use.” Business Information Review 17 (2000): 82-96.

Bok, Sissela. Secrets: On the Ethics of Concealment and Revelation. New York: Random House,

1983.

Boling, Patricia. “Privacy as Autonomy vs. Privacy as Familial Attachment: A Conceptual Approach

to Right of Privacy Cases.” Policy Studies Review 13 (1994): 91-110.

Boling, Patricia. Privacy and the Politics of Intimate Life. Itahca, NY: Cornell University Press, 1996.

Bonnicksen, Andrea L. “Commentaries on the Uses and Abuses of Genetic Knowledge.” Journal of

Health Politics, Policy and Law 20 (1995): 795-802.

Booms, Hans. “Privacy and Access to Federal Records in the Federal Republic of Germany.” Indian

Archives 35 (1986): 1-5.

Boone, C. Keith. “Privacy and Community.” Social Theory and Practice 9 (1983): 1-30.

Bork, R.,. The Tempting of America: The Political Seduction of the Law. New York: Simon and

Schuster, 1990.

Borna, Shaheen, and Avila, Stephen. “Genetic Information: Consumers' Right to Privacy Versus

Insurance Companies' Right to Know a Public Opinion Survey.” Journal of Business Ethics 19

(1999): 355-362.

Borovoy, A. Alan. “Bugging Canada: The Protection of Privacy and the Wiretap Law.” Perception 1

(1978): 28-30.

Borovoy, A. Alan. When Freedoms Collide: The Case for our Civil Liberties. London: Lester, 1988.

299

Boruch, Robert F. “Methods for Resolving Privacy Problems.” Ethical Issues in Social Science

Research, ed. Tom L. Beauchamp. Baltimore: Johns Hopkins University Press, 1982. 292-314.

Bostwick, Gary L. “Privacy of Personal Information: California Faces the Issues.” Public Affairs

Report 18 (1977): 1-6.

Botan, C. “Communication Work and Electronic Surveillance: A Model for Predicting Panoptic

Effects.” Communication Monographs 63 (1996): 293-313.

Botkin, Jeffrey R. “Fetal Privacy and Confidentiality.” The Hastings Center Report 25 (1995): 32-39.

Bouchard, Robert F, and Franklin, Justin D. Guidebook to the Freedom of Information and Privacy

Acts. New York: Clark Boardman Company Ltd, 1980.

Bovard, James. Terrorism and Tyranny: Trampling Freedom, Justice, and Peace to Rid the World of

Evil. New York: Palgrave MacMillan, 2003.

Boyd, John. “Privacy: No Longer a Personal Matter.” Journal of the American Chamber of

Commerce in Japan 23 (1986):1.

Boyes-Watson, Carolyn. “Record-keeping as a Technology of Power.” Berkeley Journal of Sociology

39 (1994-1995): 1-32.

Boyle, James. Shamans, Software, and Spleens. Cambridge Mass.: Harvard University Press, 1996.

Boyne, Roy. “Post Panopticism.” Economy and Society 29 (2000): 285-307.

Brandt, D. S. “Insecurity on the Net.” Computers in Libraries 18 (1998): 34-37.

Branscomb, Anne W. Who owns information? From privacy to Public Access. New York: Basic

Books/Harper Collins, 1994.

Branscomb, Anne W. “Law and Culture in the Information Society.” Information Society 4 (1986):

279-311.

Breckenridge, Adam C. “Personal Privacy and the Public Interest.” Humanitas 11 (1975): 75-83.

Brenkert, George G. “Privacy, Polygraphs, and Work.” Business and Professional Ethics Journal 1

(1981): 19-36.

Brennan, Geoffrey. “The Economy of Privacy: Institutional Design in the Economy of Esteem.”

Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008):

23-51.

Brenner, Susan. “The Privacy Privilege: Law Enforcement, Technology, and the Constitution.”

Journal of Technology Law & Policy 7 (2002): 123-194.

Bricke, John. “Privacy and the Mental in Ryle’s ‘Concept of Mind.’” Southwestern Journal of

Philosophy 3 (1972): 45-54.

Brill, Alida. Nobody's Business: Paradoxes of Privacy. Addison Wesley, 1990.

Brin, David. The Transparent Society. Perseus Books, 1998.

300

Brockett, Patrick L, and Tankersley, E. Susan. “The Genetics Revolution, Economics, Ethics and

Insurance.” Journal of Business Ethics 16 (1997): 1661-1676.

Bronaugh, Richard, ed. Philosophical Law: Authority, Equality, Adjudication and Privacy. Westport,

CT: Greenwood Press, 1978.

Brown, George E. Jr. “Federal Information Policy: Protecting the Free Flow of Information.”

Government Information Quarterly 4 (1987): 349-358.

Brown, William S. “Ontological Security, Existential Anxiety and Workplace Privacy.” Journal of

Business Ethics 23 (2000): 61-65.

Brown, William S. “Technology, Workplace Privacy and Personhood.” Journal of Business Ethics 15

(1996): 1237-1248.

Brunnstein, K. “Threats To Individual Privacy and Enterprise Security and Experiences with Internet

Insafety and Insecurity.” International Information and Library Review 29 (1997): 269-270.

Bruras, S. “The Journalist and ‘The Other’: A Normative Perspective on Respect for Privacy in the

Ethics of Journalism.” Nordicom Review 1 (1996): 171-180.

Bryant, Barbara Everitt, and Dunn, William. “The Census and Privacy.” American Demographics 17

(1995): 48-54.

Bucar, Bojko. “The Invasion of Privacy of Public Officials in Early United States Jurisdiction.”

Javnost/The Public 7 (2000): 91-106.

Bulmer, Martin (ed.). Censuses, Surveys and Privacy. London: Macmillan, Holmes and Meier, 1979.

Bulmer, Martin, and Bell, Jennifer. “The Press and Personal Privacy: Has it Gone Too Far.” Political

Quarterly 56 (1985): 5-22.

Bunker, M. D., and Splichal, S. L. “Relational Privacy Cases and Freedom of Information.”

Newspaper Research Journal 18 (1997): 109-121.

Bunker, M., and Perry, S. “Privacy Exemptions and the Press Under the FOIA.” Newspaper Research

Journal 16 (1995): 84-94.

Bunyan, Tony. “Telecommunications Surveillance: End of a Chapter.” Cultures et Conflits 46 (2001):

65-116.

Burch, Robert. “Royce and Wittgenstein on the Context of Privacy.” History of Philosophy Quarterly

5 (1988): 287-304.

Burger, Robert H (ed.). “Privacy, Secrecy, and National Information Policy.” Library Trends 35

(1986): 3-182.

Bushell, C J “Privacy versus Policy, Precedent and Expediency.” Australian Computer Journal 15

(1983): 151-155.

301

Byrnes, S. J. “Privacy vs. Publicity: Flip Sides of the Same Coin?” Public Relations Review 16

(1990): 29-35.

Cain, R M. “Global Privacy Concerns and Regulation: Is the United States a World Apart?”

International Review of Law, Computers and Technology 16 (2002): 23-34.

Calvert, Clay. “Voyeur War? The First Amendment, Privacy, and the Images from the War on

Terrorism.” Journal Fordham Intellectual Property, Media & Entertainment Law Journal 15

(2005): 147.

Calvert, Clay. “Victories for Privacy and Losses for Journalism? Five Privacy Controversies for 2004

and their Policy Implications for the Future of Reportage.” Journal of Law and Policy 13 (2005):

649.

Calvert, Clay and Richards, Robert D. “Suing the Media, Supporting the First Amendment: The

Paradox of Neville Johnson and the Battle for Privacy.” Albany Law Review Albany Law Review

76 (2004): 1097.

Caming, H. W.W. “Protection of Personal Data in the United States.” The Information Society 3

(1984): 113-130.

Camp, L. J. “Web Security and Privacy: An American perspective.” Information Society 15 (1999):

249-256.

Campbell, Duncan, and Connor, Steve. On the Record: Surveillance, Computers and Privacy, the

Inside Story. London: Joseph, 1986.

Campbell, J. E., and Carlson, M. “Panopticon.com: Online Surveillance and the Commodification of

Privacy.” Journal of Broadcasting & Electronic Media 46 (2002): 586-606.

Caplan, Arthur L. “On Privacy and Confidentiality.” Ethical Issues in Social Science Research, ed.

Tom L. Beauchamp. Baltimore: Johns Hopkins University Press, 1982. 315-328.

Caplan, Arthur L. “The Right to Privacy when Lives are at Stake.” Troubling Problems in Medical

Ethics, ed. Marc D. Basson. New York: Liss, 1981. 245-255.

Capron, Alexander M. “Genetics and Insurance: Accessing and Using Private Information.” Social

Philosophy and Policy 17 (2000): 235-275.

Capron, Alexander Morgan. “Privacy: Dead and Gone?” Hastings Center Report 22 (1992): 43-45.

Carney, Eliza Newlin. “Clashing over Clipper.” National Journal 25 (1993): 2184.

Carracedo, Jose David. Expanding Surveillance Capabilities onto Cyber Society Activities: The

Spanish Government's National Smart Card ID Project. Brisbane, Australia: International

Sociological Association (ISA), 2002.

Carson, John. “Defining and Protecting Civil Liberties.” Political Quarterly 41 (1970): 316-327.

302

Carson, A Scott. “Drug Testing and Privacy: Why Contract Arguments Do Not Work.” Business and

Professional Ethics Journal 14 (1995): 3-22.

Castiglione, Robert L. “Paul Weiss’ ‘Privacy’: The Rediscovery of Human Being.” Philosophy Today

28 (1984): 20-35.

Cate, Fred H. Privacy in the Information Age. Bookings Institute Press. Washington, D.C., 1997.

Caudill, E. M., and Murphy, P. E. “Consumer Online Privacy: Legal and Ethical Issues.” Journal of

Public Policy & Marketing 19 (2000): 7-19.

Cawkell, A. E. “Privacy, Security, and Freedom in the Information Society.” Journal of Information

Science 4 (1982): 3-8.

Chadwick, Ruth, Levitt, Mairi, and Shickle, Darren eds. The Right to Know and the Right not to

Know. Brookfield: Avebury, 1997.

Chadwick, Ruth, and Levitt, Mairi. "Mass Media and Public Discussion in Bioethics." The Right to

Know and the Right not to Know, ed. Chadwick, Ruth. Brookfield: Avebury, 1997.

Chaffey, Douglas Camp. “The Right to Privacy in Canada.” Political Science Quarterly 108 (1993):

117-32.

Chalmers, J, Muir, R. “Patient Privacy and Confidentiality.” British Medical Journal 326 (2003):

725-6.

Chalmers, Sandy. “Data Privacy: Impacts for Information Handling.” Records Management Bulletin

115 (2003): 19, 22-24.

Chambers, Jean E. “Privacy, Sex, and Norms: An Indirect Control Definition.” Journal of

Information Ethics 9 (2000): 10-25.

Chamoux, Jean Pierre, and Chamoux, Francoise. “French Data Protection: The First Five Years.”

Transnational Data Report on Information Politics and Regulation 7 (1984): 163-6.

Chan, Ying Keung. “Privacy in the Family: Its Hierarchical and Asymmetric Nature.” Journal of

Comparative Family Studies 31 (2000): 1-17.

Chapman, John. “Personality and Privacy.” In Privacy: Nomos XIII, ed. J. Roland Pennock and John

W. Chapman, 236-55. New York: Atherton Press, 1971.

Chapman, John, and John W. Chapman eds. Privacy: Nomos XIII. New York: Atherton Press, 1971.

Charlesworth, A. “Implementing the European Union Data Protection Directive 1995 in UK Law:

The Data Protection Act 1998.” Government Information Quarterly 16 (1999): 203-40.

Charlesworth, Andrew. “Law Enforcement and Libraries in the UK: Privacy, Proportionality and

Good Practice.” Legal Information Management 3 (2003): 71-75.

Charters, Darren. “Electronic Monitoring and Privacy Issues in Business Marketing: The Ethics of the

DoubleClick Experience.” Journal of Business Ethics 35 (2002): 243-254.

303

Chartier, Roger, ed. A History of Private Life. Vol. 3: Passions of the Renaissance. Cambridge, MA:

Harvard University Press, 1989.

Chepaitis, E. “The Criticality of Information Ethics in Emerging Economies: Beyond Piracy and

Privacy.” Journal of Information Ethics 9 (2000): 5-7.

Chmara, T. “Privacy and Confidentiality Issues in Providing Public Access to the Internet.” Library

Administration and Management 15 (2001): 20-2.

Choldin, Harvey M. “Government Statistics: The Conflict Between Research and Privacy.”

Demography 25 (1988): 145-54.

Christensen, Rachel. “Privacy and Quality in Health Care.” Employee Benefit Research Institute

Notes 21 (2000): 1-11.

Cirasella, J. C. “At Odds?: Archives and Privacy.” Current Studies in Librarianship 24 (2000): 88-92.

Claeys, Eric R. “The Private Society and the Liberal Public Good in John Locke's Thought.” Social

Philosophy and Policy 25 (Summer 2008): 201-234.

Clarke, R. “Person Location and Person Tracking: Technologies, Risks and Policy Implications.”

Information Technology and People 14 (2001): 206-31.

Clarke, R. “The Resistible Rise of the National Personal Data System.” Software Law Journal 5

(1992): 29-59.

Clarke, Roger. “The Digital Persona and Its Application to Data Surveillance.” The Information

Society 10 (1994): 77-92.

Clarke, Simon. “Paternalism and Access to Medical Records.” Journal of Information Ethics 12

(2003): 80-91.

Clement, Andrew. “Electronic Workplace Surveillance: Sweatshops and Fishbowls.” Canadian

Journal of Information Science/Revue Canadienne des Sciences de l'Information 17 (1992): 18-

45.

Cloud, Morgan. “The Fourth Amendment During the Lochner Era: Privacy, Property, and Liberty in

Constitutional Theory.” Stanford Law Review 48 (1996): 555.

Coenen Huther, Jacques. “The Domicile: Private and Public Spheres.” Cahiers Internationaux de

Sociologie 38 (1991): 301-313.

Cohen, Elliot D (ed). Philosophical Issues in Journalism. New York: Oxford University Press, 1992.

Cohen, Jean L. "Is Privacy a Legal Duty?: Reconsidering Private Right and Public Virtue in the

Domain of Intimacy." Public and Private: Legal, Political and Philosophical Perspectives, ed.

Passerin d'Entreves, Maurizio. New York: Routledge, 2000.

Cohen, Julie E. “Privacy, Visibility, Transparency, and Exposure.” The University of Chicago Law

Review 75 (Winter, 2008):181-201

304

Cohen, Julie E. “The Law and Technology of Digital Rights Management: DRM and Privacy.”

Berkley Technology Law Journal 18 (2003): 575.

Colb, Sherry. “A World Without Privacy: Why Property does not Define the Limits of the Right

Against Unreasonable Searches.” Michigan Law Review 102 (2004): 889.

Collette, John. “Role Demands, Privacy and Psychological Well Being.” The International Journal of

Social Psychiatry 30 (1984): 222-230.

Collins, Tom A. “The Press Clause Construed In Context: The Journalists' Right of Access To

Places.” Missouri Law Review 52 (1987): 751-802.

Colman, Jim B. “Digital Photography and the Internet, Rethinking Privacy Law.” Journal of

Intellectual Property Law 13 (2005): 205.

Conklin, Kenneth R. “Privacy: Should there be a Right to it?” Educational Theory 26 (1976): 263-

270.

Cooke, Maeve. “A Space of One's Own: Autonomy, Privacy, Liberty.” Philosophy and Social

Criticism 25.1 (1999): 23-53.

Cooley, Thomas. A Treatise on the Law of Torts. Chicago: Callaghan and Co., 1880.

Coombs, Robert H., and West, Louis Jolyon eds. Drug Testing: Issues and Options. Oxford

University Press, 1991.

Coontz, Stephanie. The Social Origins of Private Life: A History of American Families 1600-1900.

New York, NY: Verso, 1988.

Cooper, S. “Common Law, and Privacy in Computer Mediated Environments.” New Jersey Journal

of Communication 5 (1997): 167-177.

Cooper, S. “Privacy and the News Media.” New Jersey Journal of Communication 3 (1995): 103-117.

Cordell, Arthur J. “Preparing for the Challenges of the New Media.” The Futurist 25 (1991): 20-24.

Corlett, J Angelo. “The Nature and Value of the Moral Right to Privacy.” Public Affairs Quarterly,

16 (2002): 329-350.

Corley, S. “Rights of Privacy and Publicity in Advertising: Consent, Actionable Depictions, and First

Amendment Limitations.” Annual Survey of American Law 1985 3 (1986): 585-602.

Corn, Robert L. “Wireless tapping.” Reason 17 (1985): 20-9.

Cornford, James. “The Prospects for Privacy.” Political Quarterly 52 (1981): 295-313.

Cox, Gloria. “Implementation of the Routine Use Clause of the Privacy Act.” Policy Studies Review

10 (1991-1992): 42-50.

Cozzetto, Don A, and Pedeliski, Theodore B. “Privacy and the Workplace: Technology and Public

Employment.” Public Personnel Management 26 (1997): 515-27.

305

Crabb, Peter B. “Video Camcorders and Civil Inattention.” Journal of Social Behavior and

Personality 11 (1996): 805-816.

Craige, Burton. “Constitutional law – Rennie v. Klein: Constitutional Right of Privacy Protects a

Mental Patient's Refusal of Psychotropic Medication.” North Carolina Law Review 57 (1979):

1481-97.

Cranford, Michael. “Drug Testing and the Right to Privacy: Arguing the Ethics of Workplace Drug

Testing.” Journal of Business Ethics 17 (1998): 1805-1815.

Cranor, Lorrie (ed.) “Special Section: Computers, Freedom, and Privacy.” Information Society 18

(2002): 153-79.

Crawford, Kimberly A. “Sneak and Peek Warrants: Legal Issues Regarding Surreptitious Searches.”

FBI Law Enforcement Bulletin 66 (1997): 27-32.

Crowley, Donald, and Johnson, Jeffrey L. “Balancing and the Legitimate Expectation of Privacy.”

Saint Louis University Public Law Review 7 (1988): 337-58.

Crozier, W Ray. “Blushing and the Exposed Self: Darwin Revisited.” Journal for the Theory of

Social Behaviour 31 (2001): 61-72.

Culnan, M. J. “Protecting Privacy Online: Is Self-regulation Working?” Journal of Public Policy &

Marketing 19 (2000): 20-26.

Culnan, Mary J, and Bies, Robert J. “Consumer Privacy: Balancing Economic and Justice

Considerations.” Journal of Social Issues 59 (2003): 323-342.

Culver, Charles. “Privacy.” Professional Ethics 3 (1994): 3-25.

Cuozzi, W. F., and Sporn, L. “Private Lives and Public Concerns: The Decade since Gertz v Robert

Welch, Inc.” Brooklyn Law Review 51 (1985): 425-478.

Curry, Michael R. “Digital People, Digital Places: Rethinking Privacy in a World of Geographic

Information.” Ethics and Behavior 7 (1997): 253-263.

Dahl, M. K. “Privacy and Databases: A Question of Dignity.” Government Data Systems 17 (1988):

4-6.

Dam, Shubhanker. “Remedying a Technological Challenge: Individual Privacy and Market

Efficiency.” Albany Law Journal of Science & Technology Albany Law

Journal of Science & Technology 15 (2005): 337.

Dana, Jane Tucker. “Copyright and Privacy Protection of Unpublished Works: The Author's

Dilemma.” Columbia Journal of Law and Social Problems 13 (1977): 351-408.

Dandekar, Natalie. “Privacy: An Understanding for Embodied Persons.” Philosophical Forum 24

(1993): 331-348.

Daniels, Charles B. “Privacy and Verification.” Analysis 48 (1988): 100-102.

306

Danielson, Caroline. “The Gender of Privacy and the Embodied Self: Examining the Origins of the

Right to Privacy in U. S. Law.” Feminist Studies 25 (1999): 311-344.

Danna, Anthony, and Gandy Jr., Oscar H. “All That Glitters Is Not Gold: Digging Beneath the

Surface of Data Mining.” Journal of Business Ethics 40 (2002): 373-386.

Davidson, D. M., and Kunkel, J. A. “The Developing Methodology for Analyzing Privacy Torts.”

Hastings Communications and Entertainment Law Journal 6 (1983): 43-90.

Davidson, Dan. “Employee Testing: An Ethical Perspective.” Journal of Business Ethics 7 (1988):

211-217.

Davies, Eric, Dearnley, James, Hardy, Rachel, Iliffe, Ursula, Oppenheim, Charles, and Sturges, Paul.

“User Privacy in the Digital Library Environment: An Investigation of Policies and

Preparedness.” Library Management 24 (2003): 44-50.

Davies, Simon. Big Brother: Australia's growing web of surveillance. Australia: Simon & Schuster,

1992.

Davies, Martin. “Another Way of Being: Leisure and the Possibility of Privacy.” Philosophy of

Leisure, ed. Tom Winnifrith. New York: St. Martin’s, 1989. 104-128.

Davis, Andrew. “Do Children Have Privacy Rights in the Classroom?” Studies in Philosophy and

Education 20 (2001): 245-254.

Davis, Frederick. “What Do We Mean by ‘Right to Privacy’?” South Dakota Law Review 4(1959): 1-

24.

Davison, Scott A. “Privacy and Control.” Faith and Philosophy 14 (1997): 137-151.

De Boni, Marco and Prigmore, Martyn. “A Hegelian Basis for Privacy as an Economic Right.”

Contemporary Political Theory 3 (2004): 168-187.

De Lint, Willem. “Arresting the Eye: Surveillance, Social Control and Resistance.” Space and

Culture, 7.9 (2000): 21-49.

De Munck, Jean. “The ‘Right to Privacy’ between Philosophy and Sociology.” Recherches

Sociologiques 24 (1993): 45-68.

DeCew, J. W. “In Pursuit of Privacy: Law, Ethics and the Rise of Technology.” Journal of

Government Information 25 (1998): 307-8.

DeCew, Judith Wagner. “Alternatives for Protecting Privacy while Respecting Patient Care and

Public Health Needs.” Ethics and Information Technology 1 (1999): 249-255.

DeCew, Judith Wagner. “Constitutional Privacy, Judicial Interpretation, and ‘Bowers versus

Hardwick.’” Social Theory and Practice 15 (1989): 285-303.

DeCew, Judith Wagner. “Defending the ‘Private' in Constitutional Privacy.” Journal of Value Inquiry

21 (1987): 171-184.

307

DeCew, Judith Wagner. “Drug Testing: Balancing Privacy and Public Safety.” Hastings Center

Report 24 (1994): 17-25.

DeCew, Judith Wagner. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Ithaca, NY:

Cornell University Press, 1997.

DeCew, Judith Wagner. “The Priority of Privacy for Medical Information.” Social Philosophy and

Policy 17 (2000): 213-234.

DeCew, Judith Wagner. “The Scope of Privacy in Law and Ethics.” Law and Philosophy 5 (1986):

145-173.

DeCew, Judith Wagner. “Privacy and Policy for Genetic Research.” Ethics and Information

Technology 6 (2004): 4-14.

Deflem, Mathieu. “Surveillance and Criminal Statistics: Historical Foundations of Governmentality.”

Studies in Law, Politics, and Society 17 (1997): 149-184.

Denning, Dorothy E. “The case for ‘Clipper.’" Technology Review 98 (1995): 48-55.

Dennis, J. C. “Privacy and Confidentiality of Health Information.” Journal of Government

Information 28.3 (2001): 344-6.

DePaulo, Bella M., Chris Wetzel, R. Weylin Sternglanz, and Molly J. Walker Wilson. “Verbal and

Nonverbal Dynamics of Privacy, Secrecy, and Deceit.” Journal of Social Issues 59 (2003): 391-

412.

Derlega, Valerian J., Metts, Sandra, Petronio, Sandra, and Margulis, Stephen T. Self Disclosure.

Newbury Park, CA: SAGE Publications, Inc., 1993.

Desai, M. S., Richards, T. C., Desai, K. J. “E-commerce Policies and Customer Privacy.” Information

Management and Computer Security 11 (2003): 19-27.

Dhillon, G. S., and Moores, T. T. “Internet Privacy: Interpreting Key Issues.” Information Resources

Management Journal 14 (2001): 33-7.

Diefenbach, Donald L. “The Constitutional and Moral Justifications for Copyright.” Public Affairs

Quarterly 8 (1994): 225-235.

Diffie, Whitfield, and Landau, Susan. Privacy on the Line: The Politics of Wiretapping and

Encryption. M.I.T. Press, 1998.

Dionisopoulos, P. Allan, and Craig Ducat. The Right to Privacy: Essays and Cases. St. Paul: West

Publishing Co., 1976.

Donos, P., and Zorkadis, V. “On Biometrics Based Authentication and Identification From A Privacy

Protection Perspective: Deriving Privacy Enhancing Requirements.” Information Management

and Computer Security 12 (2004): 125-137.

308

Doss, Arden, and Diane Kay Doss. “On Morals, Privacy, and the Constitution.” University of Miami

Law Review 25 (1971): 395-419.

Doss, Erini, and Loui, Michael C. “Ethics and the Privacy of Electronic Mail.” Information Society 11

(1995): 223-35.

Douard, John W. “AIDS, Stigma, and Privacy.” AIDS & Public Policy Journal 5 (1990): 37-41.

Doyle, Rodger. “Privacy in the workplace.” Scientific American 280 (1999): 36.

Draper, Elaine. “Privacy Rights, Stigma, and Genetic Screening.” Forum for Applied Research and

Public Policy 8 (1993): 19-22.

Draper, Hayward L. “Privacy and Police Intelligence Data Banks: A Proposal To Create A State

Organized Crime Intelligence System and to Regulate the Use of Criminal Intelligence

Information.” Harvard Journal on Legislation 14 (1976): 1-110.

Dromm, Keith. “Love and Privacy.” Journal of Applied Philosophy 19 (2002): 155-167.

Duddy, Thomas. “Privacy, Self Knowledge, and the Inner Eye: The Cartesian Project Revisited.”

History of European Ideas 21 (1995): 515-526.

Duff, Karl J., and Johnson, Eric T. “A Renewed Employee Right to Privacy.” Labor Law Journal 34

(1983): 747-62.

Duis, Perry R. “No Time for Privacy: World War II and Chicago's Families.” The War in American

Culture: Society and Consciousness During World War II, Erenberg, Lewis A., & Hirsch, Susan

E. eds. Chicago, IL: U Chicago Press, 1996. 17-45.

Dumsday, Travis. “Group Privacy and Government Surveillance of Religious Services.” Monist: An

International Quarterly Journal of General Philosophical Inquiry 91 (January 2008):170-186,

Duncan, George T (ed.). Private Lives and Public Policies: Confidentiality and Accessibility of

Government Statistics. National Academy Press, 1993.

Duncan, George T, and Kaufman, Sanda. “Who Should Manage Information and Privacy Conflicts?:

Institutional Design for Third Party Mechanisms.” The International Journal of Conflict

Management 7 (1996): 21-44.

Duvall Early, Kimberly, and James O. Benedict. “The Relationship Between Privacy and Different

Components of Job Satisfaction.” Environment and Behavior 24 (1992): 670-680.

Dworkin, Gerald. “Privacy and the Law.” In Privacy, ed. John Yound, 113-36. New York: John

Wiley and Sons, 1978.

Ebbinghouse, C. “Big Brother Invades the Campus and Workplace: Infotainment and the Copyright

Cops.” Searcher 11 (2003): 18-23.

Ebers, Stephanie. “The Right of Privacy and Minors' Confidential Access to Contraceptives.” New

York Law School Human Rights Annual 2 (1984): 131-49.

309

Eddie, G. “E-mail, the Police, and the Canadian Charter of Rights and Freedoms: Retooling our

Understanding of a Reasonable Expectation of Privacy in the Cyber Age.” International Review

of Law, Computers and Technology 14 (2000): 63-78.

Edgar, Harold, and Sandomire, Hazel. “Medical Privacy Issues in the Age of AIDS: Legislative

Options.” American Journal of Law and Medicine 16 (1990): 155-222.

Edgley, Charles, and Brissett, Dennis. “A Nation of Meddlers.” Society 32 (1995): 36-46.

Elgesem, Dag. “Data Privacy and Legal Argumentation.” Communication and Cognition 28 (1995):

91-111.

Elgesem, Dag. “The Structure of Rights in Directive 96/46/EC on the Protection of Individuals with

Regard to the Processing of Personal Data and the Free Movement of Such Data.” Ethics and

Information Technology 1 (1999): 283-293.

Elmer, Greg. “Spaces of Surveillance: Indexicality and Solicitation on the Internet.” Critical Studies

in Mass Communication 14 (1997): 182-191.

Elwood, John P. “Outing, Privacy, and the First Amendment.” Yale Law Journal 102 (1992): 747-76.

Emerson, Thomas I. “The Right of Privacy and Freedom of the Press.” Harvard Civil Rights Civil

Liberties Law Review 14 (1979): 329-60.

Emmons, Donald C. “Ontological Privacy.” Personalist 51 (1970): 286-304.

Engelhardt Jr. H. Tristram. “Privacy and Limited Democracy: The Moral Centrality of Persons.”

Social Philosophy and Policy 17 (2000): 120-140.

Engstrom, Timothy H. “Corporate Appropriation of Privacy: The Transformation of the Personal and

Public Spheres.” Ethics and Behavior 7 (1997): 239-252.

Entin, J. L. “Privacy, Emotional Distress, and the Limits of Libel Law Reform.” Mercer Law Review

38 (1987): 835-858.

Epstein, Richard A. “Deconstructing Privacy: And Putting It Back Together Again.” Social

Philosophy and Policy 17 (2000): 1-24.

Escobar, C. B. “Nongovernmental Cryptology and National Security: The Government Seeking to

Restrict Research.” Comparative Law Journal 4 (1984): 573-603.

Etzioni, Amitai. “A Communitarian Perspective on Privacy.” Connecticut Law Review 32 (2000):

897.

Etzioni, Amitai. “Identification Cards in America.” Society 36 (1999): 70-76.

Etzioni, Amitai. The Limits of Privacy. New York: Basic Books, 1999.

Etzioni, Amitai. “Medical Records: Enhancing Privacy, Preserving the Common Good.” Hastings

Center Report 29 (1999): 14-23.

310

Etzioni, Amitai. “The First Amendment Is Not an Absolute Even on the Internet.” Journal of

Information Ethics 6 (1997): 64-66.

Evans, A. C. “European Data Protection Law.” American Journal of Comparative Law 29 (1981):

571-82.

Evans, G. A. “The Human Genome Project and Public Policy.” Public Understanding of Science 8

(1999): 161-168.

Everett, Margaret. “The Social Life of Genes: Privacy, Property and the New Genetics.” Social

Science and Medicine 56 (2003): 53-65.

Fahey, Tony. “Privacy and the Family: Conceptual and Empirical Reflections.” Sociology 29 (1995):

687-702.

Falls, M. Margaret. “Prisons and Privacy: A Moral Evaluation.” Freedom, Equality, and Social

Change, ed. Peden, Creighton. Lewiston: Mellen Press, 1989. 312-323.

Falls Corbitt, Margaret, and McClain, F Michael. “God and Privacy.” Faith and Philosophy 9 (1992):

369-386.

Fairfield, Joshua A. T. “The New Internet Legislation's Hidden Threat to Privacy and

Commerce.” Arizona State Law Journal 36 (2004): 1193.

Falsone, A. M. “Privacy of Circulation Files.” Journal of Library Administration 7 (1986): 19-24.

Farnsworth, David P. “Data Privacy: An American's View of European Legislation.” Transnational

Data Report on Information Politics and Regulation 6 (1983): 285-90.

Farrelly, Colin. “Genes and Social Justice: A Rawlsian Reply to Moore.” Bioethics 16 (2002): 72-83.

Fazekas, Christopher P. “1984 is Still Fiction: Electronic Monitoring in the Workplace and U.S.

Privacy Law.” Duke Law & Technology Review 15 (2004):

Feiser, C. D. “Privatization and the Freedom of Information Act: An Analysis of Public Access to

Private Entities under Federal Law.” Federal Communications Law Journal 52 (1999): 21-62.

Felcher, Peter L, and Rubin, Edward L. “Privacy, Publicity, and the Portrayal of Real People by the

Media.” Yale Law Journal 88 (1979): 1577-1622.

Fenrich, William J. "Common Law Protection of Individuals' Rights in Personal Information."

Fordham Law Review 65 (1996): 951-1004.

Fenwick, Helen. Civil liberties. Cavendish Publishing Limited, 1994.

Ferguson, Kenneth G. “Caller ID - Whose Privacy Is It, Anyway?” Journal of Business Ethics 29

(2001): 227-237.

Fiatal, Robert A. “Lights, Camera, Action: Video Surveillance and the Fourth Amendment.” FBI Law

Enforcement Bulletin 58 (1989): 23-31.

311

Fielding, Derek. “Librarians, Civil Liberties and Privacy.” Australian Library Journal 27 (1978): 181

189.

Fifarek, Aimee. “Technology and Privacy in the Academic Library.” Online Information Review 26

(2002): 366-374.

Finn, Paul. “Public Function – Private Action: A Common Law Dilemma. 93-112. Benn, Stanley and

G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.

Fish, Stanley. There's No Such Thing as Free Speech. Princeton University Press, 1994.

Fisher, Linda E. “Guilt by Association: Political Profiling, Surveillance and the Privacy of Groups.”

Arizona Law Review 46 (2004): 621.

Flaherty, David H. Privacy and Government Data Banks: An International Perspective. London:

Mansell, 1979.

Flaherty, David H. Protecting Privacy in Surveillance Societies: The Federal Republic of Germany,

Sweden, France, Canada, and the United States. Chapel Hill, NC: U of North Carolina Press,

1989.

Flaherty, David H. “The Need for an American Privacy Protection Commission.” Government

Information Quarterly 1 (1984): 235-58.

Fletcher, Joseph F. “Mass and Elite Attitudes about Wiretapping in Canada: Implications for

Democratic Theory and Politics.” The Public Opinion Quarterly 53 (1989): 225-245.

Floridi L. “Four challenges for a theory of informational privacy.” Ethics and Information

Technology 8 (2006): 109-119.

Floridi L. “The Ontological Interpretation of Informational Privacy.” Ethics and Information

Technology 7 (2005):185–200.

Florini, Ann. “The End of Secrecy.” Foreign Policy 111 (1998): 50-63.

Flory, J. “E-health Ethics, Privacy, and Security.” Medicine on the Net 9 (2003): 14-28.

Flory, J. “Privacy and Patient Confidentiality: Special Focus.” Medicine on the Net 7 (2001): 13-27.

Foddy, William H. “A Critical Evaluation of Altman's Definition of Privacy as a Dialectical Process.”

Journal for the Theory of Social Behaviour 14 (1984): 297-307.

Fogelberg, H. “Stateside: The Total Information Awareness System: Time to Get Paranoid?”

Managing Information 10 (2003): 36-7.

Fogelberg, H. “US Privacy and Global Business.” Managing Information 6 (1999): 24-5.

Foner, Leonard N. “Technology and Political Artifacts: The CFP2000 Workshop on Freedom and

Privacy by Design.” The Information Society 18 (2002): 153-163.

Foot, Philippa. Natural Goodness. Oxford: Oxford University Press, 2001.

312

Forer, Lois G. A Chilling Effect: The Mounting Threat of Libel and Invasion of Privacy Actions to the

First Amendment. Markham, Ontario, Canada: Penguin Books, 1987.

Forester, Tom. and Morrison, Perry. Computer Ethics: Cautionary Tales and Ethical Dilemmas in

Computing. Second Edition. MIT Press, 1990.

Forester, Tom, and Morrison, Perry. “Computer Crime: New Problem for the Information Society.”

Prometheus 8 (1990): 257-272.

Fortner, R. S. “Physics and Metaphysics in an Information Age: Privacy, Dignity and Identity.”

Communication 9 (1986): 151-172.

Fox, Richard. “Someone to Watch over Us: Back to the Panopticon?” Criminal Justice 1 (2001): 251-

276.

Foxman, E. R., and Kilcoyne, P. “Information Technology, Marketing Practice and Consumer

Privacy: Ethical Issues.” Journal of Public Policy & Marketing 12 (1993): 106-119.

Francis, Huw W. S. “Of Gossips, Eavesdroppers, and Peeping Toms.” Journal of Medical Ethics 8

(1982): 134-143.

Francis, Leslie Pickering. “Privacy and Confidentiality: The Importance of Context.” Monist: An

International Quarterly Journal of General Philosophical Inquiry 91 (January 2008): 52-67.

Fraser, John. “Community, the Private, and the Individual.” The Sociological Review 35 (1987): 795-

818.

Freedman, Warren. The Right of Privacy in the Computer Age. Quorum Books, 1987.

Freund, Paul. “Privacy: One Concept or Many?” In Privacy: Nomos XIII, ed. J. Roland Pennock and

John W. Chapman, 182-98. New York: Atherton Press, 1971.

Frey, R. G. “Privacy, Control, and Talk of Rights.” Social Philosophy and Policy 17 (2000): 45-67.

Fried, Charles. “Privacy.” Yale Law Journal 77 (1968): 475-93.

Friedman, Batya. “Social Judgments and Technological Innovation: Adolescents' Understanding of

Property, Privacy, and Electronic Information.” Computers in Human Behavior 13 (1997): 327-

351.

Friedman, David. “A World of Strong Privacy: Promises and Perils of Encryption.” Social

Philosophy and Policy 13 (1996): 212-228.

Friedman, David. “Privacy and Technology.” Social Philosophy and Policy 17 (2000): 186-212.

Frist, Bill. “Open Sesame: Congress Must Establish Boundaries to Protect Privacy and Promote

Ethical uses of New Genetic Information.” Forum for Applied Research and Public Policy 15

(2000): 44-8.

Froomkin, A Michael. “Legal Issues in Anonymity and Pseudonymity.” Information Society 15

(1999): 113-27.

313

Gandy, O. H. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO:

Westview Press, 1993.

Gandy, O. H., and Simmons, C. E. “Technology Privacy and the Democratic Process.” Critical

Studies in Mass Communication, 3.2 (1986): 155-168.

Gandy, Oscar H., Jr. “African Americans and Privacy: Understanding the Black Perspective in the

Emerging Policy Debate.” Journal of Black Studies 24 (1993): 178-195.

Gandy, Oscar H., Jr. “The Surveillance Society: Information Technology and Bureaucratic Social

Control.” Journal of Communication 39 (1989): 61-76.

Gannon Leary. “`E' for exposed? E mail and privacy issues.” Electronic Library 15 (1997): 221-6.

Garfinkel, S. “Database nation: the death of privacy in the Twenty-first century.”

Telecommunications Policy 24 (2000): 625-8.

Garfinkel, S., and Spafford, G. “Web Security, Privacy and Commerce.” Managing Information 9

(2002): 55.

Garrett, Roland. “The Nature of Privacy.” Philosophy Today 18(1974): 263-284.

Garrow, David J. Liberty and Sexuality: The Right to Privacy and the Making of Roe v. Wade. New

York: Macmillan, 1994.

Garrow, David J. “Privacy and the American Constitution.” Social Research 68 (2001): 55-82.

Garzon Valdes, Ernesto. “Intimacy, Privacy and Publicity.” Analyse & Kritik 25 (2003): 17-40.

Gastelaars, Marja. “The Water Closet: Public and Private Meanings.” Science as Culture 4 (1996):

483-505.

Gates, K. A. “Wanted Dead or Digitized: Facial Recognition Technology and Privacy.” Television &

New Media 3 (2002): 235-238.

Gates, P. H. “Privacy and Access: The Inevitable Collision of Competing Values.” In Access Denied:

Freedom Of Information In The Information Age, eds. Davis, C. N., and Splichal, S. L. Ames:

Iowa State University Press, 2000. 103-119.

Gaus, Gerald. “Public and Private Interests in Liberal Political Economy, Old and New.” Benn,

Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.

Gauthier, C. C. “Privacy Invasion by the News Media: Three Ethical Models.” Journal of Mass

Media Ethics 17 (2002): 20-34.

Gavison, Ruth. “Privacy and the Limits of Law.” Yale Law Journal 89 (1980): 421-71.

Gavison, Ruth. “Information Control: Availability and Control.” 113-134. Benn, Stanley and G. Gaus

eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.

Gellman, R. “Perspectives on Privacy and Terrorism: All is Not Lost – Yet.” Government

Information Quarterly 19 (2002): 255-64.

314

Gellman, R. “Taming the Privacy Monster: A Proposal for a Non-regulatory Privacy Agency.”

Government Information Quarterly 17 (2000): 235-41.

Gellman, Robert. “Public Records: Access, Privacy, and Public Policy: A Discussion Paper.”

Government Information Quarterly 12 (1995): 391-426.

Gerber, Scott D. “Privacy and Constitutional Theory.” Social Philosophy and Policy 17 (2000): 165-

185.

Gerety, Tom. “Redefining Privacy.” Harvard Civil Rights Civil Liberties Law Review 12 (1977): 233-

96.

Gerlach, Julie Waltz. “What Should IRBs Consider When Applying the Privacy Rule to Research?”

Kennedy Institute of Ethics Journal 12 (2002): 299-303.

Gernstein, Robert S. “Privacy and Self Incrimination.” Ethics 80 (1970): 87-101.

Gerstein, Robert S. “Intimacy and Privacy.” Ethics 89 (1978): 76-81.

Ghosh Dastidar, Koyeli. “Respect for Privacy: Western and Indian.” Journal of Indian Council of

Philosophical Research 88: 101-109.

Giglio, Ernest D. “Privacy, the News Media, and the Courts.” Political Communication and

Persuasion 1 (1981): 231-55.

Giglio, Ernest. Rights, Liberties and Public Policy. Ashgate Publishing Company Ltd., 1995.

Gilliom, John. Surveillance, Privacy, and the Law: Employee Drug Testing and the Politics of Social

Control. University of Michigan Press, 1994.

Gillis, Jonathan. “Privacy Rights and Satellite Broadcasts.” Israel Law Review 27 (1993): 384-414.

Gillis, R P, and Riley, T B. “Privacy in the Information Age: A Handbook for Government and

Industry Professionals.” Journal of Government Information 24 (1997): 449-50.

Gimenex, Enrique J. “Who Watches the Watchdogs?: The Status of Newsgathering Torts Against the

Media in Light of the Food Lion Reversal.” Alabama Law Review 52 (2001): 675.

Giner, Salvador. “The Withering Away of Civil Society?” Praxis International 5 (1985): 247-267.

Ginsberg, Robert. “The Right to Privacy vs. Government Need to Know.” Journal of Social

Philosophy 4 (1973): 5-8.

Givens, Beth. The Privacy Rights Handbook. Avon Books, 1997.

Glaser, P. E., and Brender, M. E. “The First Amendment in Space: News Gathering from Satellites.”

Issues in Science and Technology 3 (1986): 60-67.

Glasser, T. L. “Resolving the Press Privacy Conflict: Approaches to the Newsworthiness Defense.”

Communications and the Law 4 (1982): 23-42.

Glasser, Theodore L., and Jassem, Harvey. “Indecent Broadcasts and the Listener's Right of Privacy.”

Journal of Broadcasting 24 (1980): 285-99.

315

Glenn, Richard A. The Right to Privacy: Rights and Liberties Under the Law. ABC CLIO, Inc., 2003.

Glover, B. “Internet Policy Issues Debated at Ninth Conference on Computers, Freedom and

Privacy.” Library Hi Tech News 17 (2000): 10-13.

Godsey, Mark A. “Privacy and the Growing Plight of the Homeless: Reconsidering the Values

Underlying the Fourth Amendment.” Ohio State Law Journal 53 (1992): 869-89.

Goldman, Janlori. “Protecting Privacy to Improve Health Care.” Health Affairs 17 (1998): 47-60.

Goold, Benjamin J. “Privacy Rights and Public Spaces: CCTV and the Problem of the ‘Unobservable

Observer.’” Criminal Justice Ethics 21 (2002): 21-27.

Gordon, Diana R. “The Electronic Panopticon: A Case Study of the Development of the National

Criminal Records System.” Politics & Society 15 (1986-87): 483-511.

Gordon Till, J. “Right to privacy?” Information World Review 175 (2001): 20.

Gostin, Lawrence O. “Health Information Privacy.” Cornell Law Review 80 (1995): 451-528.

Gotterbarn, Donald. “Privacy Lost: The Net, Autonomous Agents, and 'Virtual Information.'” Ethics

and Information Technology 1 (1999): 147-154.

Gould, James. “Abortion: Privacy versus Liberty.” Journal of Social Philosophy (1990): 98-106.

Graber, Doris A. “Potholes along America's Public Information Superhighway.” Research in Political

Sociology 7 (1995): 299 324.

Grace, John W. “Protecting Privacy: A Growth Industry.” Canadian Business Review 11 (1984): 28-

30.

Gray, Susan H. “Electronic Data Bases and Privacy: Policy for the 1990s.” Science, Technology, and

Human Values 14 (1989): 242-257.

Grcic, Joseph M. “The Right to Privacy: Behavior as Property.” Journal of Value Inquiry 20 (1986):

137-144.

Green, Rachel. “Privacy in the Government Workplace: Employees’ Fourth Amendment and

Statutory Rights to Privacy.” Cumberland Law Review 35 (2004): 639.

Green, Richard. “(Serious) Sadomasochism: A Protected Right of Privacy?” Archives of Sexual

Behavior 30 (2001): 543-550.

Greenawalt, Kent. “Privacy and its Legal Protections.” Hastings Center Studies 2 (1974): 45-68.

Greenlaw, Paul S., and Prundeanu, Cornelia. “The Impact of Federal Legislation to Limit Electronic

Monitoring.” Public Personnel Management 26 (1997): 227-44.

Griffin, James. “The Human Right to Privacy.” San Diego Law Review 44 (Fall 2007): 697-721.

Grijpink, J. “Chain Computerization for Better Privacy Protection.” Information Infrastructure and

Policy 6 (1997-1999): 95-107.

316

Grimshaw, Allen D. “Whose Privacy? What Harm?” Sociological Methods and Research 11 (1982):

233-47.

Gritzalis, Dimitris A. “Embedding Privacy in IT Applications Development.” Information

Management and Computer Security 12 (2004): 8-26.

Gross, Emanuel. “The Struggle of a Democracy Against Terrorism--Protection of Human Rights: The

Right to Privacy Versus the National Interest--the Proper Balance.” Cornell International Law

Journal 27 (2004).

Gross, Hyman. “The Concept of Privacy.” New York University Law Review 42 (1967): 34-54.

Gross, Hyman. “Privacy and Autonomy.” In Privacy: Nomos XIII, ed. J. Roland Pennock and John

W. Chapman, 169-81. New York: Atherton Press, 1971.

Grossman, Garry S. “Transborder Data Flow: Separating the Privacy Interests of Individuals and

Corporations.” Northwestern Journal of International Law and Business 4 (1982): 1-36.

Guenther, K. “Pass the Cookies and Uphold the Privacy.” Computers in Libraries 21 (2001): 56-8.

Guirguis, Max. “Electronic Visual Surveillance and the Reasonable Expectation of Privacy.” Journal

of Technology Law & Policy 9 (2004): 143.

Gumpert, Gary, and Susan J. Drucker. “Public Boundaries: Privacy and Surveillance in a

Technological World.” Communication Quarterly 49 (2001): 115-130.

Gumpert, Gary, and Susan J. Drucker. “The Demise of Privacy in a Private World: From Front

Porches to Chat Rooms.” Communication Theory 8 (1998): 408.

Gurak, Laura J. Persuasion and Privacy in Cyberspace: The Online Protests over Lotus MarketPlace

and the Clipper Chip. Yale University Press, 1997.

Hafen, Bruce C. “The Constitutional Status of Marriage, Kinship, and Sexual Privacy: Balancing the

Individual and Social Interests.” Michigan Law Review 81 (1983): 463-574.

Hager, Barry M. “Privacy Commission Urges New Controls on Data Held by Private Groups.”

Congressional Quarterly Weekly Report 35 (1977): 1527-8.

Haggerty, Kevin D., and Ericson, Richard V. “The Surveillant Assemblage.” The British Journal of

Sociology 51 (2000): 605-622.

Hallborg, Robert B., Jr. “Principles of Liberty and the Right to Privacy.” Law and Philosophy 5

(1986): 175-218.

Hallie, Philip P. “The Privacy of Experience.” Journal of Philosophy 58 (1961): 337-345.

Hallinan, Kathleen M. “Invasion of Privacy or Protection Against Sexual Harassment: Co-employee

Dating and Employer Liability.” Columbia Journal of Law and Social Problems 26 (1993): 435-

64.

317

Halper, Thomas. “Privacy and Autonomy: From Warren and Brandeis to ‘Roe’ and ‘Cruzan.’”

Journal of Medicine and Philosophy 21 (1996): 121-135.

Halpern, Sheldon W. The Law of Defamation, Privacy, Publicity, and Moral Right. Third Edition.

JPM Books, Columbus, OH, 1995.

Halpin, Edward, and Wright, Steve. “The Hidden Dimensions of Global Information Networks: What

Price Privacy?” Canadian Journal of Information and Library Science/Revue Canadienne des

Sciences de l'Information et de Bibliotheconomie 25 (2000): 23-39.

Halstuk, M. E. “When is an Invasion of Privacy Unwarranted under the FOIA?: An Analysis of the

Supreme Court’s ‘Sufficient Reason’ and ‘Presumption of Legitimacy’ Standards.” Florida

Journal of Law and Public Policy 16 (2005): 361.

Halstuk, M. E. “Blurred Vision: How Supreme Court FOIA Opinions on Invasion of Privacy have

Missed the Target of Legislative Intent.” Communication Law and Policy 4 (1999): 111-148.

Hancock, Graeme. “California's Privacy Act [of 1974]: Controlling Government's use of

Information.” Stanford Law Review 32 (1980): 1001-38.

Hanus, Jerome J. “A Right of Information Privacy.” Policy Studies Journal 4 (1975): 136-141.

Hare, Willis H. Security, Privacy and New Technology. Santa Monica, CA: Rand Corporation, 1981.

Harper, Phillip Brian. Private Affairs: Critical Ventures in the Culture of Social Relations. New

York: New York University Press, 1999.

Hart, G. W. “Residential Energy Monitoring and Computerized Surveillance via Utility Power

Flows.” IEEE Technology and Society Magazine 8 (1989): 12-16.

Harter, Stephen, and Busha, Charles. “Libraries and Privacy Legislation.” Library Journal 101

(1976): 475-481.

Hartman, John Dale. Legal Guidelines for Covert Surveillance Operations in the Private Sector.

Butterworth Heinemann, 1993.

Hartman, Laura P. “Technology and Privacy in the Workplace.” Business and Society Review 106

(2001): 1-27.

Hartmann, Charles J, and Renas, Stephen M. “Anglo American Privacy Law: An Economic

Analysis.” International Review of Law and Economics 5 (1985): 133-52.

Hasian, Marouf, Jr. “Remembering and Forgetting: A Postmodern Interpretation of the Origins of the

‘Right of Privacy.’” Journal of Communication Inquiry 19 (1995): 33-49.

Hauptman, Robert (ed.). “Ethics and the Dissemination of Information.” Library Trends 40 (1991):

199-372.

Haviland, Leslie, and John Haviland. “Privacy in a Mexican Village.” 341-362. Benn, Stanley and G.

Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.

318

Hearst, Alice L. “Rugged Individualism and the Right to Privacy.” Western Legal History 3 (1990):

271-286.

Hebenton, Bill, and Thomas, Terry. Criminal Records: State, Citizen and the Politics of Protection.

Ashgate Publishing Company Ltd., 1993.

Heinlein, E. B. “Communications, Security, Privacy and the Law.” Computers & Security 13 (1994):

119-121.

Heller, Nathaniel. “‘Customizable Privacy’: A New Approach to International Regulation of the

Internet.” Journal of Public and International Affairs 13 (2002): 63-81.

Hendricks, Evan. Hayden, Trudy. Novik, Jack. Your Right to Privacy. Second Edition. Southern

Illinois University Press, 1990.

Henkin, Louis. Privacy and Autonomy.” Columbia Law Review 74 (1974): 1410-33.

Hermon, Joshua. “Privacy and Identity: Constructing, Maintaining, and Protecting Personhood.”

DePaul Law Review 54 (2005): 671.

Hermann, Donald H. J. “Pulling the Fig Leaf off the Right of Privacy: Sex and the Constitution.”

DePaul Law Review 54 (2005): 909.

Hernon, P., and Dugan, R E. “GIS and privacy.” Journal of Academic Librarianship 23 (1997): 515-

16.

Hessler, Richard M., and Freerks, Kristina. “Privacy Ethics in the Age of Disclosure: Sweden and

America Compared.” The American Sociologist 26 (1995): 35-53.

Hewitt, Patricia. Privacy: The Information Gatherers. National Council for Civil Liberties, 1977.

Higbee, Kari L. “Student Privacy Rights: Drug Testing and Fourth Amendment Protections.” Idaho

Law Review 41 (2005): 361.

Higgins, Michael. “High Tech, Low Privacy.” ABA Journal 85 (1999): 52-7.

Hill, Alfred. “Defamation and Privacy under the First Amendment.” Columbia Law Review 76

(1976): 1205-1313.

Himma, Ken. “Privacy vs. Security: Why Privacy is Not an Absolute Value or Right.” San Diego

Law Review 44 (Fall 2007): 857-919.

Himma, Ken. “Separation, Risk, and the Necessity of Privacy to Well-Being: A Comment on Adam

Moore's Toward Informational Privacy Rights.” San Diego Law Review 44 (Fall 2007): 847-57.

Hiltz, S. R., and Turoff, M. The Network Nation: Human Communication via Computer. Reading,

MA: Addison Wesley, 1978.

Hindman, Robert R. “Megan's Law and its Progeny: Whom Will the Courts Protect.” Boston College

Law Review 39 (1997): 201-33.

319

Hiramatsu, Tsuyoshi. “Japan Adopts Privacy Protection Act.” Transnational Data and

Communications Report 12 (1989): 22-9.

Hiramatsu, Tsuyoshi. “Japan's New Personal Data Bill.” Transnational Data and Communications

Report 10 (1987): 14-16.

Hitchcock, J. A. “Net Crimes and Misdemeanors: Outmaneuvering the Spammers, Swindlers and

Stalkers Who Are Targeting You Online.” New Library World 104 (2003): 181.

Hixson, R. F. “Whose Life is it, Anyway? Information as Property.” Information and behavior

Ruben, B. D. ed. New Brunswick, NJ: Transaction Books, 1985. 76-92.

Hixson, Richard F. Privacy in a Public Society: Human Rights in Conflict. New York: Oxford

University Press, 1987.

Hobday, J. “Internet Accountability.” Managing Information 7 (2000): 8-9.

Hodge, James G. “National Health Information Privacy and New Federalism.” Notre Dame Journal

of Law, Ethics and Public Policy 14 (2000): 791-820.

Hodson, Thomas J., Englander, Fred, and Englander, Valerie. “Ethical, Legal and Economic Aspects

of Employer Monitoring of Employee Electronic Mail.” Journal of Business Ethics 19 (1999):

99-108.

Hoefges, R. M. “The Use of State Crime and Accident Reports For Targeting, Direct Mail

Solicitations: Commercial Speech, Access and Privacy.” Communication Law and Policy 3

(1998): 331-365.

Hoffman, Donna L., Novak, Thomas P., and Peralta, Marcos A. “Information Privacy in the

Marketplace: Implications for the Commercial Uses of Anonymity on the Web.” The Information

Society 15 (1999): 129-139.

Hoffman, Lance J (ed.). Computers and Privacy in the Next Decade. New York: Academic Press,

Inc., 1980.

Hoffmann, Stanley. “Two Universalisms in Conflict.” The Tocqueville Review/La Revue Tocqueville

21 (2000): 65-71.

Hohengarten, William M. “Same Sex Marriage and the Right of Privacy.” Yale Law Journal 103

(1994): 1495-1531.

Hojnik Zupanc, Ida. “An Attempt to Empirically Evaluate Privacy and Personal Space.” Anthropos

27 (1995): 82-90.

Hollander, John. “The Language of Privacy.” Social Research 68 (2001): 5-28.

Horibe, Masao. “Access to Information and Privacy Legislation in Japan.” Transnational Data and

Communications Report 14 (1991): 31-42.

320

Hornung, Meir S. “Think before you Type: A Look at E-mail Privacy in the Workplace.” Fordham

Journal of Corporate & Financial Law 11 (2005): 115.

Horowitz, Irving Louis. Communicating Ideas. Oxford University Press, 1986.

Horowitz, Irving Louis. “Networking America: The Cultural Context of Privacy v. Publicity.”

Knowledge, Technology, and Policy 12 (2000): 85-90.

Horowitz, Irving Louis. “National Consequences of International Terrorism.” Society 39 (2002): 6-

10.

Houlgate, Laurence D. “What Is Legal Intervention in the Family? Family Law and Family Privacy.”

Law and Philosophy 17 (1998): 141-158.

Howe, Eric. “The United Kingdom's Data Protection Act.” Government Information Quarterly 8

(1991): 345-57.

Hu, Shengfa. Moral Value on Privacy Thinking by Major Chinese Traditional Thinkers. American

Sociological Association (ASA), 1998.

Hubener, Louis F. “Rights of Privacy in Open Courts: Do They Exist.” Emerging Issues in State

Constitutional Law 2 (1989): 189-205.

Hudson, Stephen D., and Husak, Douglas N. “Benn on Privacy and Respect for Persons.”

Australasian Journal of Philosophy 57 (1979): 324-329.

Huebert, Ronald. “Privacy: The Early Social History of a Word.” The Sewanee Review 105 (1997):

21-39.

Humber, James M., and Almeder, Robert (eds.). Privacy and health care. Humana Press, Inc., 2001.

Imparato, Nicholas (ed.) Public Policy and the Internet: Privacy, Taxes, and Contract. Hoover

Institution Press, 2000.

Inness, Julie. “Information, Access, or Intimate Decisions About One's Action?: The Content of

Privacy.” Public Affairs Quarterly (1991): 227-242.

Inness, Julie C. Privacy, Intimacy, and Isolation. New York: Oxford University Press, 1992.

Introna, Lucas D. “Privacy and the Computer: Why We Need Privacy in the Information Society.”

Metaphilosophy 3 (1997): 259-275.

Introna, Lucas D., and Pouloudi, Athanasia. “Privacy in the Information Age: Stakeholders, Interests

and Values.” Journal of Business Ethics 22 (1999): 27-38.

Jackson, Henry M. “Privacy and Society.” Humanist 35 (1975): 30-32.

Jaeger, P. T., McClure, C. R., and Fraser, B. T. “The Structures of Centralized Governmental Privacy

Protection: Approaches, Models and Analysis.” Government Information Quarterly 19 (2002):

317-36.

321

Jaeger, Paul T., et al. “The Impact of the USA Patriot Act on Collection and Analysis of Personal

Information Under the Foreign Intelligence Surveillance Act.” Government Information

Quarterly 20 (2003): 295-314.

James, Edward W. “Rights, Privacy, and Tainted Ideals.” Foundations of Ethics, ed. Leroy S. Rouner.

Notre Dame: University of Notre Dame Press, 1983. 115-132.

Jamison, Tena. “Immigration on Line: The Privacy Implications of a National Registry.” Human

Rights 22 (1995): 12-15.

Jenero, Kenneth A, and Mapes Riordan, Lynne D. “Electronic Monitoring of Employees and the

Elusive ‘Right to Privacy.’” Employee Relations Law Journal 18 (1992): 71-102.

Johnson, Deborah. Computer Ethics. Englewood Cliffs, N.J.: Prentice Hall, 1985.

Johnson, Deborah G. “Mapping Ordinary Morals onto the Computer Society: A Philosophical

Perspective.” The Journal of Social Issues 40 (1984): 63-76.

Johnson, Deborah, and Nissenbaum, Helen eds. Computers, Ethics, and Social Values. Englewood

Cliffs, CA: Prentice Hall, 1995.

Johnson, Deborah G. “Computers and Ethics.” National Forum. (Summer 1991): 15-17.

Johnson, Jeffery L. “A Theory of the Nature and Value of Privacy.” Public Affairs Quarterly 6

(1992): 271-288.

Johnson, Jeffery L. “Constitutional Privacy.” Law and Philosophy 13 (1994): 161-193.

Johnson, Jeffery L. “Privacy and the Judgment of Others.” Journal of Value Inquiry 23 (1989): 157-

168.

Johnson, Jeffery L. “Privacy, Liberty, and Integrity.” Public Affairs Quarterly 3 (1989): 15-34.

Johnson, Jeffery L., and Crowley, Donald W. “TLO and the Student Right to Privacy.” Educational

Theory 36 (1986): 211-224.

Johnson, Karen L. “The Sale of Human Organs: Implicating a Privacy Right.” Valparaiso University

Law Review 21 (1987): 741-62.

Jones, Leslie E. “An Argument against Techno Privacy.” Southwest Philosophy Review 13 (1997):

155-162.

Josephs, Hilary K. “Defamation, Invasion of Privacy, and the Press in the People's Republic of

China.” UCLA Pacific Basin Law Journal 11 (1993): 191-220.

Joyce, John F. “The Privacy Act: A Sword and a Shield but Sometimes Neither.” Military Law

Review 99 (1983): 113-67.

Kahn, Jonathan. “Privacy as a Legal Principle of Identity Maintenance.” Seton Hall Law Review 33

(2003): 371-410.

322

Kalman, Laura. “The Promise and Peril of Privacy.” Reviews in American History 22 (1994): 725-

731.

Kamenka, Eugene. “Public/Private in Marxist Theory and Marxist Practice.” 267-280. Benn, Stanley

and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.

Kang, Jerry. “Information Privacy in Cyberspace Transactions.” Stanford Law Review 50 (1998):

1193-1294.

Kaplan, Marilyn R. “Commercial Speech and the Right to Privacy: Constitutional Implications of

Regulating Unsolicited Telephone Calls.” Columbia Journal of Law and Social Problems 15

(1980): 277-315.

Karin Frank, Shyli. "Homelessness, the Right to Privacy, and the Obligation to Provide a Home." The

Ethics of Homelessness: Philosophical Perspectives, ed. Abbarno, John M. Amsterdam: Rodopi,

1999.

Karras, A. R. “The Constitutionality of the Driver's Privacy Protection Act: A Fork in the Information

Access Road.” Federal Communications Law Journal 52 (1999): 125-153.

Kastenmeier, Robert W. “Communications Privacy: A Legislative Perspective.” Wisconsin Law

Review 4 (1989): 715-37.

Kateb, George, Jeffrey Rosen, and Frederick Schauer. “Part V: Invasions of Privacy: Violations of

Boundaries.” Social Research 68 (2001): 201.

Kateb, George. “On Being Watched and Known.” Social Research 68 (2001): 269-295

Katz, James E., and Graverman, R. F. “Privacy Issues of a National Research and Education

Network.” Telematics and Informatics 8 (1991): 71-120.

Katz, J. E., and Hyman, M. M. “Dimensions of Concern over Telecommunications Privacy in the

United States.” Information Society 9 (1993): 251-275.

Katz, James E. “Telecommunications and Computers: Whither Privacy Policy?” Society 25 (1987):

81-86.

Katz, James E. “US Telecommunications Privacy Policy: Socio-political Responses to Technological

Advances.” Telecommunications Policy 12 (1988): 353-68.

Kaufman, Irving R. “Press, Privacy and Malice: Reflections on New York v. Sullivan.” New York

State Bar Journal 56 (1984): 10-15.

Keane, John. “Democracy and the Media.” International Social Science Journal 43 (1991): 523-540.

Kebbel, G. “The Different Functions of Speech in Defamation and Privacy Cases.” Journalism

Quarterly 61 (1984): 629-633.

Keisling, Phillip. “The Case Against Privacy: What We Lose When We Mind Our Own Business.”

Washington Monthly 16 (1984): 12-22.

323

Keith, Boon. “Privacy and Community.” Social Theory and Practice 9 (1983): 1-33.

Kemp, Gary. “Autonomy and Privacy in Wittgenstein and Beckett.” Philosophy and Literature 27

(2003): 164-187.

Kertz, Consuelo Lauda, and Burnette, Lisa Boardman. “Telemarketing Tug of War.” Loyola

Consumer Law Reporter 5 (1993): 70-80.

Keynes, Edward. Liberty, Property, and Privacy: Toward a Jurisprudence of Substantive Due

Process. University Park: Pennsylvania State University Press, 1996.

Kieran, M., Morrison, D. E., and Svennevig, M. “Privacy, the Public and Journalism: Towards an

Analytic Framework.” Journalism 1 (2000): 145-169.

Kim, Pauline T. “Privacy Rights, Public Policy, and the Employment Relationship.” Ohio State Law

Journal 57 (1996): 671-730.

Kirby, M. D. “Access to Information and Privacy: The Ten Information Commandments.” University

of Cincinnati Law Review 55 (1987): 745-761.

Kirby, Michael. “Privacy and Libraries.” Australian Library Journal 26 (1977): 215-218.

Kirby, Michael. “Privacy Protection: A New Beginning.” Prometheus 18 (2000): 125-32.

Kirschner, Nancy M. “The Right to Financial Privacy Act of 1978.” University of Michigan Journal

of Law Reform 13 (1979): 10-52.

Klein, Lloyd. Singing Out for Justice: Privacy Concerns and the Impact of Crime Stopper Programs.

Society for the Study of Social Problems (SSSP), 1990.

Kleinig, John. “The Ethical Challenge of AIDS to Traditional Liberal Values.” AIDS & Public Policy

Journal 5 (1990): 42-44.

Kling, R. “Assessing Anonymous Communication on the Internet: Policy Deliberations.” Information

Society 15 (1999): 79-90.

Klosek, J. “Data Privacy in the Information Age.” Journal of the American Society for Information

Science and Technology 53 (2002): 251-3.

Kolb, Angela. “Data Protection Legislation in Eastern Germany.” Transnational Data and

Communications Report 14 (1991): 33-6.

Konvitz, Milton R. Fundamental Liberties of a Free People: Religion, Speech, Press, Assembly.

Ithaca, NY: Cornell University Press, 1957.

Konvitz, Milton R. “Privacy and the Law: A Philosophical Prelude.” Law and Contemporary

Problems 31 (1966): 272-80.

Kovacic, Matej. “Privacy in the Information Society.” Teorija in Praksa 37 (2000): 1019-1034.

Kramer, I. R. “The Full Court Press: Sacrificing Vital Privacy Interests on the Altar of First

Amendment Rhetoric.” Cardozo Arts and Entertainment Law Journal 8 (1989): 113-136.

324

Krause, Harry D., and Marcus, Paul. “Privacy.” American Journal of Comparative Law 26 (1978):

377-92.

Kreie, J., Cronan, T. P. “Copyright, Piracy, Privacy, and Security Issues: Acceptable or Unacceptable

Actions for End Users?” Journal of End User Computing 11 (1999): 13-20.

Kritchevsky, Barbara. “Protecting Privacy: What States Can and Cannot Do.” Human Rights 19

(1992): 16-19.

Krygier, Martin. “Publicness, Privateness and ‘Primitive Law.’” 307-340. Benn, Stanley and G. Gaus

eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.

Krysan, Maria. “Privacy and the Expression of White Racial Attitudes: A Comparison across Three

Contexts.” The Public Opinion Quarterly 62 (1998): 506-544.

Ku, Agnes S. “Revisiting the Notion of ‘Public’ in Habermas's Theory: Toward a Theory of Politics

of Public Credibility.” Sociological Theory 18 (2000): 216-240.

Ku, Catherina, Liu, Chang, and Marchewka, Jack T. “American and Taiwanese Perceptions

Concerning Privacy, Trust, and Behavioral Intentions in Electronic Commerce.” Journal of

Global Information Management 12 (2004): 18-40.

Kukathas, Chandran. “Cultural Privacy.” Monist: An International Quarterly Journal of General

Philosophical Inquiry 91 (January 2008): 68-80.

Kumar, Krishan. “The Privatized Society.” Universities Quarterly: Culture, Education & Society 40

(1986): 356-364.

Kupfer, Joseph. “Privacy, Autonomy, and Self Concept.” American Philosophical Quarterly 24

(1987): 81-89.

La Fontaine, J. S. “Public or Private? The Constitution of the Family in Anthropological Perspective.”

International Journal of Moral and Social Studies 3 (1988): 267-289.

Lackey, Douglas P. “Mental Terms and Negative Privacy.” Journal of Critical Analysis 6 (1976): 40-

47.

Lake, Steven E. “Unrestricted Private Employee Drug Testing Programs: An Invasion of the Worker's

Right to Privacy.” California Western Law Review 23 (1986): 72-104.

Lally, Laura. “Privacy Versus Accessibility: The Impact of Situationally Conditioned Belief.”

Journal of Business Ethics 15 (1996): 1221-1226.

Lane, Frederick S. “The Naked Employee: How Technology is Compromising Workplace Privacy.”

Knowledge, Technology, and Policy 16 (2003): 108-109.

Langan, Kenneth James. “Computer Matching Programs: A Threat to Privacy.” Columbia Journal of

Law and Social Problems 15 (1979): 143-80.

Langer, Richard. “Abortion and the Right to Privacy.” Journal of Social Philosophy 23 (1992): 23-51.

325

Lansing, Paul. “The Conflict of Patient Privacy and the Freedom of Information Act.” Journal of

Health Politics, Policy and Law 9 (1984): 315-22.

Larson, Erik. The Naked Consumer: How Our Private Lives Become Public Commodities. New York:

Holt, 1992.

Larson, Jeffrey H., and Medora, N. “Privacy Preferences: A Cross Cultural Comparison of Americans

and Asian Indians.” International Journal of Sociology of the Family 22 (1992): 55-66.

Lashner, Marilyn A. “Privacy and the Public's Right to Know.” Journalism Quarterly 53 (1976): 679-

88.

Laurie, Graeme T. “The Most Personal Information of All: An Appraisal of Genetic Privacy in the

Shadow of the Human Genome Project.” International Journal of Law, Policy and the Family 10

(1996): 74-101.

Le Poire, Beth A., Burgoon, Judee K., and Parrott, Roxanne. “Status and Privacy Restoring:

Communication in the Workplace.” Journal of Applied Communication Research 20 (1992): 419-

436.

Ledvinka, J. “Privacy Regulations and Employee Record Keeping.” Journal of Library

Administration 7 (1986): 25-34.

Lee, L. T. “Privacy, Security, and Intellectual Property.” Understanding the Web: The Social,

Political, and Economic Dimensions of the Internet. Albarran, A. B., and Goff, D. H. eds. Ames:

Iowa State University Press, 2000. 135-164.

Lee, Laurie Thomas. “U.S. Telecommunications Privacy Policy and Caller ID.” California Western

Law Review 30 (1993): 1-60.

Lee, Laurie Thomas, and LaRose, Robert. “Caller ID and the Meaning of Privacy.” Information

Society 10 (1994): 247-65.

Lee, Ya Ching. “Will Self-regulation Work in Protecting Online Privacy?” Online Information

Review 27 (2003): 276-283.

Lemos, Ramon M. “Immediacy, Privacy, and Ineffability.” Philosophy and Phenomenological

Research 25 (1965): 500-515.

Lessig, Lawrence. “Privacy as Property.” Social Research 69 (2002): 247-269

Lever, Annabelle. “Must Privacy and Sexual Equality Conflict? A Philosophical Examination of

Some Legal Evidence.” Social Research 67 (2000): 1137-1171.

Levine, Milton. “Privacy in the Tradition of the Western World.” In Privacy, William Bier ed. 3-21.

New York: Fordham University Press, 1980.

Levy, Michael. “The Electronic Monitoring of Workers: Privacy in the Age of the Electronic

Sweatshop.” Legal Reference Services Quarterly 14 (1995): 5-56.

326

Levy, Steven. Hackers: Heroes of the Computer Revolution. New York: Dell Publishing Co., 1984.

Li, Joyce H S. “The Death of Privacy: The Lively Debate in The Washington Post (1974-1998).”

Journal of Information Ethics 9 (2000): 63-88.

Lieberstein, Stanley H. Who Owns What Is in Your Head?: Trade Secrets and the Mobile Employee.

New York: Hawthorne Books, 1979.

Linowes, David F. “Must Personal Privacy Die in the Computer Age?” American Bar Association

Journal 65 (1979): 1180-4.

Lippke, Richard L. “Work, Privacy, and Autonomy.” Public Affairs Quarterly 3 (1989): 41-55.

Lissit, Robert. “The Privacy Piercers: Media in Review.” World & I 14 (1999): 98-103.

Litt, Marc O. “‘Citizen Soldiers’ or Anonymous Justice: Reconciling the Sixth Amendment Right of

the Accused, the First Amendment Right of the Media and the Privacy Right of Jurors.”

Columbia Journal of Law and Social Problems 25 (1992): 371-421.

Loch, Karen D., Conger, Sue, and Oz, Effy. “Ownership, Privacy and Monitoring in the Workplace:

A Debate on Technology and Ethics.” Journal of Business Ethics 17 (1998): 653-663.

Lockway, Larry. “The Ethical Role of Information in Sustainable Communities.” Journal of

Information Ethics 4 (1995): 60-68.

Lockwood, Alan L. “Values Education and the Right to Privacy.” Journal of Moral Education 7

(1977): 9-26.

Losito, William F. “An Ethical Theory for Privacy in Educational Contexts.” Philosophy of

Education 36 (1980): 236-244.

Lu, C. L. “Seeking Privacy in Wireless Communications: Balancing the Right of Individual Privacy

with the Need for Effective Law Enforcement.” Hastings Communications and Entertainment

Law Journal 17 (1995): 529-556.

Lubonja, Fatos. “Privacy in a Totalitarian Regime.” Social Research 68 (2001): 237-254.

Ludd, Steven O. “Athletics, Drug Testing and the Right to Privacy: A Question of Balance.” Howard

Law Journal 34 (1991): 599-632.

Luedtke, Paul L. “Open Government and Military Justice.” Military Law Review 87 (1980): 7-72.

Lund, William R. “Communitarian Politics, the Supreme Court, and Privacy: The Continuing Need

for Liberal Boundaries.” Social Theory and Practice 16 (1990): 191-215.

Lundstedt, Sven B. “Democracy, Technology, and Privacy.” Forum for Applied Research and Public

Policy 4 (1989): 68-74.

Lusky, Louis. “Invasion of Privacy: A Clarification of Concepts.” Political Science Quarterly 87

(1972): 192-209.

327

Lyon, David. “Everyday Surveillance: Personal Data and Social Classification.” Information,

Communication & Society 5 (2002): 242-257.

Lyon, David. “Surveillance in Cyberspace: The Internet, Personal Data, and Social Control.” Queen's

Quarterly 109 (2002): 345-357.

Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham, UK: Open U Press,

2001.

Lyon, David. Surveillance Studies: Sociological and Comparative Approaches. Brisbane, Australia:

International Sociological Association (ISA), 2002.

Lyon, David. The Electronic Eye: The Rise of Surveillance Society. Oxford: Blackwell Publishers,

1994.

Lyon, David. “The World Wide Web of Surveillance: The Internet and Off World Power Flows.”

Information, Communication & Society 1 (1998): 91-105.

Lyon, David. “Facing the Future: Seeking Ethics for Everyday Surveillance.” Ethics and Information

Technology 3 (2001): 171-181.

Machamer, Peter, and Boylan, Barbara. “Freedom, Information and Privacy.” Business and

Professional Ethics Journal 12 (1993): 47-68.

Machan, Tibor R. “The Right to Privacy versus Uniformitarianism.” Journal of Social Philosophy 23

(1992): 75-84.

Mack, Arien (ed.) “Privacy.” Social Research 68 (2001): 5-338.

Mack, Arien, and Sajo, Andras eds. Privacy in Post Communist Europe: Social Research 69 (2002).

MacKenzie, Kevin I. “Administrative Searches and the Fourth Amendment: An Alternative to the

Warrant Requirement.” Cornell Law Review 64 (1979): 856-74.

MacKinnon, Catharine A. “Privacy and Equality: Notes on Their Tension.” The Tocqueville

Review/La Revue Tocqueville 21 (2000): 77-85.

Mael, Fred A., Mary Connerley, and Ray A. Morath. “None of Your Business: Parameters of Bio-

data Invasiveness.” Personnel Psychology 49 (1996): 613-651.

Maida, Pamela (ed.) Freedom of Information Act guide & Privacy Act overview. United States

Department of Justice, Office of Information and Privacy. Washington, DC: Superintendent of

Documents, 2000.

Malcolm, Clark. “Paradox in the Office: Fitting the Work Place for People, Accommodating Workers'

Needs for Privacy and Accessibility, Control and Direction, Work and Play Heightens

Commitment.” National Productivity Review 5 (1986): 142-9.

Mangan, Mark and Wallace, Jonathan. Sex, Laws, and CyberSpace: Freedom and Censorship on the

Frontiers of the Online Revolution. Herry Holt and Company, New York, 1997.

328

Manning, Rita C. “Liberal and Communitarian Defenses of Workplace Privacy.” Journal of Business

Ethics 16 (1997): 817-23.

Marcell, David W. “Privacy and the American Character.” South Atlantic Quarterly 66 (1967): 1-12.

Marchand, Donald A. The Politics of Privacy, Computers, and Criminal Justice Records: Controlling

the Social Costs of Technological Change. Information Resources Press, 1980.

Margalit, Avishai. “Privacy in the Decent Society.” Social Research 68 (2001): 255-268.

Margolis, Stacey. “The Public Life: The Discourse of Privacy in the Age of Celebrity.” Arizona

Quarterly 51 (1995): 81-101.

Margulis, Stephen T ed. “Contemporary Perspectives on Privacy: Social, Psychological, Political.”

Journal of Social Issues 59 (2003): 243-4.

Margulis, Stephen T. “On the Status and Contribution of Westin's and Altman's Theories of Privacy.”

Journal of Social Issues 59 (2003): 411-430.

Margulis, Stephen T. “Privacy as a Social Issue and Behavioral Concept.” Journal of Social Issues 59

(2003): 243-261.

Marks, Lawrence Kaiser. “Telescopes, binoculars, and the Fourth Amendment.” Cornell Law Review,

67 (1982): 379-95.

Marshall, Patrick G. “Your Right to Privacy.” Editorial Research Reports (Jan. 20 ,1989): 30-43.

Marshall, Sandra E. “Public Bodies, Private Selves.” Journal of Applied Philosophy 5 (1988): 147-

158.

Martin, Kirsten, and Freeman, R. Edward. “Some Problems with Employee Monitoring.” Journal of

Business Ethics 43 (2003): 353-361.

Marx, Gary T. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of

Social Issues 59 (2003): 369-390.

Marx, Gary T. “I'll Be Watching You: Reflections on the New Surveillance.” Dissent 32 (1985): 26-

34.

Marx, Gary T. “Technology and Gender: Thomas I. Voire and the Case of the Peeping Tom.” The

Sociological Quarterly 43 (2002): 409-433.

Marx, Gary T. “The Surveillance Society: The Threat of 1984 Style Techniques.” The Futurist 19

(1985): 21-26.

Marx, Gary T. Undercover: Police Surveillance in America. Berkeley, CA: University of California

Press, 1988.

Marx, Gary T. “What's in a Name? Some Reflections on the Sociology of Anonymity.” The

Information Society 15 (1999): 99-112.

329

Marx, Gary T., and Sherizen, Sanford. “Corporations that Spy on Their Employees: Technological

Monitoring of Workers is Widespread.” Business and Society Review (1987): 32-7.

Marx, Gary T, and Sherizen, Sanford. “Monitoring on the Job: How to Protect Privacy as well as

Property.” Technology Review 89 (1986): 62-67.

Marx, Gary T. “Murky Conceptual Waters: The Public and the Private.” Ethics and Information

Technology 3 (2001): 157-169.

Masci, David. “Internet Privacy: Is More Government Regulation Needed.” CQ Researcher 8 (1998):

955-75.

Mason, David. Privacy for What? The Importance of the Social in Employee Responses to

Surveillance Technologies at Work. Brisbane, Australia: International Sociological Association

(ISA), 2002.

Matheson, David. “A Distributive Reductionism about the Right to Privacy.” Monist: An

International Quarterly Journal of General Philosophical Inquiry 91 (January 2008): 108-129.

Matheson, David. “Unknowableness and Informational Privacy.” Journal of Philosophical Research

32 (2007): 251-267.

Matthews, Steve. “Privacy, Separation, and Control.” Monist: An International Quarterly Journal of

General Philosophical Inquiry 91 (January 2008):130-150.

Mawby, R. I. “Overcoming the Barriers of Privacy: Police Strategies against Non-visible Crime.”

Criminology 18 (1981): 501-21.

Maxeiner, J. R. “Freedom of Information and the EU Data Protection Directive.” Federal

Communications Law Journal 48 (1995): 93-104.

May, Larry. “Privacy and Property.” Philosophy in Context 10 (1980): 40-53.

McArthur, Robert L. “Reasonable Expectations of Privacy.” Ethics and Information Technology 3

(2001): 123-128.

McCamus, John D. “The Delicate Balance: Reconciling Privacy Protection with the Freedom of

Information Principle.” Government Information Quarterly 3 (1986): 49-61.

McCarthy, J. T. The Rights of Publicity and Privacy. New York: Clark Boardman, 1987.

McCloskey, H.J. “Privacy and the Right to Privacy.” Philosophy 55 (1980): 17-38.

McCloskey, H.J. “The Political Ideal of Privacy.” Philosophical Quarterly 21 (1971): 303-314.

McClosky, Herbert, and Brill, Alida. Dimensions of Tolerance: What Americans Believe about Civil

Liberties. New York: Russell Sage Foundation, 1983.

McCrohan, K. F. “Information Technology, Privacy and the Public Good.” Journal of Public Policy

and Marketing 8 (1989): 265-278.

330

McCulloch, Andrew. “On the Public and the Private: A Comment on Fahey.” Sociology 31 (1997):

793-799.

McFarland, Katherine M. “Privacy and Property: Two Sides of the Same Coin: The Mandate for

Stricter Scrutiny for Government uses of Eminent Domain.” The Boston Public Interest Law

Journal 14 (2004): 142.

McDonald, Daniel W., et al. “Intellectual Property and Privacy Issues on the Internet.” South Dakota

Business Review 55 (1996): 1.

McDowell, Gary L. “Private Rights and Public Morality: The Nature and Extent of the Right to

Privacy.” Public Interest Law Review (1991): 67-85.

McGleenan, Tony. “Genetic Information and the Challenge to Privacy.” International Review of Law,

Computers and Technology 12 (1998): 535-46.

McGleenan, Tony. "Rights to Know and not to Know: Is there a Need for a Genetic Privacy Law?"

The Right to Know and the Right not to Know, ed. Chadwick, Ruth. Avebury: Brookfield, 1997.

McGovern, Theresa M. “Is Privacy Now Possible?” Social Research, 68 (2001): 327-333.

McKinney, Karyn D. “Space, Body, and Mind: Parental Perceptions of Children's Privacy Needs.”

Journal of Family Issues 19 (1998): 75-100.

McLean, D. “Privacy Gaining Heft as an FOIA Exemption.” Communications and the Law 15

(1993): 25-46.

McLean, Sheila A. M. “Mapping the Human Genome Friend or Foe?” Social Science and Medicine

39 (1994): 1221-1227.

McLean, Deckle. Privacy and Its Invasion. Westport: Praeger, 1995.

McMullin, E. "Openness and Secrecy in Science: Some Notes on Early History." Science,

Technology, and Human Values 10 (1985): 14-23.

McNair, Douglas. “The Ethics of Health Privacy – A Matter of Environmental Ethics.” Bioethics

Forum 14 (1998): 9-12.

McQueen, K. “Cyber Spies.” Managing Information 7 (2000): 12.

McWhirter, Darien A., and Bible, Jon D. Privacy As A Constitutional Right: Sex, Drugs, And The

Right To Life. Quorum Books, 1992.

Meeler, David. “Is Information All We Need to Protect?” Monist: An International Quarterly Journal

of General Philosophical Inquiry 91 (January 2008):151-169,

Menand, Louis, Ruth Bernard Yeazell, David Bromwich, and Nancy K. Miller. “Part IV: Privacy and

the Self: The Rise and Fall of Privacy.” Social Research 68 (2001): 115.

Mendelsohn, L. D. “Legislation for Personal Privacy: Its Impact on Transborder Data Flow.”

Information Services and Use 7 (1987): 43-50.

331

Mensel, Robert E. “‘Kodakers Lying in Wait’: Amateur Photography and the Right of Privacy in

New York, 1885-1915.” American Quarterly 43 (1991): 24-45.

Merchant, Jennifer. “The Right of Genetic Privacy.” The Tocqueville Review/La Revue Tocqueville,

21 (2000): 31-55.

Mesibov, Laurie. “Protection of Students' Privacy Rights: The Hatch Amendment.” School Law

Bulletin 16 (1985): 15-17.

Meslin, Eric M., et al. “The Ethical, Legal, and Social Implications Research Program at the National

Human Genome Research Institute.” Kennedy Institute of Ethics Journal 7 (1997): 291-8.

Metalitz, Steven J. “The Proposed Data Protection Directive: At What Price Privacy.” Journal of

European Business 2 (1991): 13-17.

Metelski, J. “Achieving Communications Privacy through Revision of the Eavesdropping Laws.”

Federal Communications Law Journal 30 (1978): 135-147.

Metivier Carreiro, Karen A., and LaFollette, Marcel C. “Commentary: Balancing Cyberspace

Promise, Privacy, and Protection Tracking the Debate.” Science Communication 19 (1997): 3-20.

Michael, James. “Open Government and Data Protection.” British Journal of Law and Society 8

(1981): 265-270.

Michelfelder, Diane P. “The Moral Value of Informational Privacy in Cyberspace.” Ethics and

Information Technology 3 (2001): 129-135.

Mill, John Stuart. On Liberty. Indianapolis: Hackett Publishing, 1978.

Miller, D. W. “What We Can Learn from the European Privacy Standard.” Healthcare Informatics 9

(1992): 92-99.

Miller, Jonathan Lewis. “Search and Seizure of Air Passengers and Pilots: The Fourth Amendment

takes Flight.” Transportation Law Journal 22 (1994): 199-223.

Miller, S. “Privacy, Data Bases and Computers.” Journal of Information Ethics 7 (1998): 42-8.

Miller, S., and Weckert, J. “Privacy, the Workplace and the Internet.” Journal of Business Ethics 28

(2000): 255-265.

Miller, W. “Privacy in the Information Age: Implications for Libraries.” Library Issues: Briefings for

Faculty and Administrators 19 (1999): 4.

Miller, Arthur R. “Computers and Privacy.” Ethics and the Management of Computer Technology,

ed. W. Michael Hoffman. Cambridge: Oelgeschlager, 1982. 93-108.

Miller, Seumas. “Privacy, Data Bases, and Computers.” Journal of Information Ethics 7 (1998): 42-

48.

Miller, Seumas, and Weckert, John. “Privacy, the Workplace, and the Internet.” Journal of Business

Ethics 28 (2000): 255-265.

332

Mindle, Grant B. “Liberalism, Privacy, and Autonomy.” Journal of Politic 51 (1989): 575-598.

Minor, William H. “Identity Cards and Databases in Health Care: The Need for Federal Privacy

Protections.” Columbia Journal of Law and Social Problems 28 (1995): 253-96.

Minow, M., Coyle, K., and Kaufman, P. “The USA Patriot Act.” Library Journal 127 (2002): 52-7.

Mochmann, Ekkehard, and Mueller, Paul J (eds.). Data protection and social science research:

perspectives from ten countries. Frankfurt, Germany: Campus Verlag GmbH, 1979.

Monberg, John. “You Will: Social Implications of Advanced Marketing Technologies.” Ethics and

Behavior 7 (1997): 229-238.

Montague, Phillip. “A Child’s Right to Privacy.” Public Affairs Quarterly 2 (1988): 17- 32.

Moor, James H. “Using Genetic Information while Protecting the Privacy of the Soul.” Ethics and

Information Technology 1 (1999): 257-263.

Moore, Adam D. “Privacy in the Family,” with Newell, B., Metoyer, C. Forthcoming in The Social

Dimensions of Privacy, Cambridge University Press, 2014. Beate Roessler and Dorota

Mokrosinska eds. forthcoming (2014).1

Moore, Adam D. “Coercing Privacy and Moderate Paternalism: Allen on Unpopular Privacy,”

American Philosophical Association Newsletter in Philosophy and Law, Vol. 13 (Fall 2013): 9-

14.2

Moore, Adam D. “Privacy, Speech, and the Law.” Journal of Information Ethics, Vol. 22 (summer

2013): 21-43.3

Moore, Adam D. “Privacy.” The International Encyclopedia of Ethics, edited by Hugh LaFollette.

(Winter 2013), 1-11.4

Moore, Adam D. “Drug Testing and Privacy in the Workplace,” The John Marshall Journal of

Computer & Information Law, Vol. 29 (Summer 2012): 463-492.5

Moore, Adam D. “Defining Privacy.” Journal of Social Philosophy 39 (Fall 2008): 411-428.6

1 Moore, Adam D. “Privacy in the Family,” with Newell, B., Metoyer, C. Forthcoming in The Social Dimensions of Privacy, Cambridge University Press, 2014. Beate Roessler and Dorota Mokrosinska eds. forthcoming (2014).2 Moore, adam D. “Coercing Privacy and Moderate Paternalism: Allen on Unpopular Privacy,” American Philosophical Association Newsletter in Philosophy and Law, Vol. 13 (Fall 2013): 9-14.3 Moore, Adam D. “Privacy, Speech, and the Law.” Journal of Information Ethics, Vol. 22

(summer 2013): 21-43.4 Moore, Adam D. “Privacy.” The International Encyclopedia of Ethics, edited by Hugh LaFollette. (Winter 2013), 1-11.5 Moore, Adam D. “Drug Testing and Privacy in the Workplace,” The John Marshall Journal of Computer & Information Law, Vol. 29 (Summer 2012): 463-492.6 Moore, Adam D. “Defining Privacy.” Journal of Social Philosophy 39 (Fall 2008): 411-428.

333

Moore, Adam D. “Toward Informational Privacy Rights.” San Diego Law Review 44 (Fall 2007):

809-839.7

Moore, Adam D. “Privacy and the Encryption Debate.” Knowledge, Technology, and Policy 12

(2000): 72-84.8

Moore, Adam D. “Privacy: Its Meaning and Value.” American Philosophical Quarterly 40 (2003):

215-227.9

Moore, Adam D. “Employee Monitoring and Computer Technology: Evaluative Surveillance v.

Privacy.” Business Ethics Quarterly 10 (2000): 697-709.10

Moore, Adam D. “Intangible Property: Privacy, Power, and Information Control.” American

Philosophical Quarterly 35 (1998): 365-378.11

Moore, Adam D. “Owning Genetic Information and Gene Enhancement Techniques: Why Privacy

and Property Rights May Undermine Social Control of the Human Genome.” Bioethics 14

(2000): 97-119.12

Moore, Barrington, Jr. “Privacy.” Society 22 (1985): 17-27.

Moore, Barrington, Jr. Privacy: Studies in Social and Cultural History. New York: M. E. Sharpe

Inc.1984.

Moorhead, S. R., Langenbach, M., Kennedy, J., Hodgson, C. M., Ruiz, P., and Junaid, O.

“Observations on the Observed: A Study of Inpatients' Perception of Being Observed.” O Irish

Journal of Psychological Medicine 13 (1996): 59-61.

Moreham, N. A. “Privacy in Public Places.” The Cambridge Law Journal 65 (Nov., 2006): 606-635.

Moretti, Barbara. “Outing: Justifiable or Unwarranted Invasion of Privacy? The Private Facts Tort as

a Remedy for Disclosures of Sexual Orientation.” Cardozo Arts and Entertainment Law Journal,

11 (1993): 857-903.

Mossholder, Kevin W. “Information Privacy and Performance Appraisal: An Examination of

Employee Perceptions and Reactions.” Journal of Business Ethics (1991): 151-156.

7 Moore, Adam D. “Toward Informational Privacy Rights.” San Diego Law Review 44 (Fall 2007): 809-839.8 Moore, Adam D. “Privacy and the Encryption Debate.” Knowledge, Technology, and Policy 12 (2000): 72-849 Moore, Adam D. “Privacy: Its Meaning and Value.” American Philosophical Quarterly 40 (2003): 215-227.10 Moore, Adam D. “Employee Monitoring and Computer Technology: Evaluative Surveillance v. Privacy.” Business Ethics Quarterly 10 (2000): 697-709.11 Moore, Adam D. “Intangible Property: Privacy, Power, and Information Control.” American Philosophical Quarterly 35 (1998): 365-378.12 Moore, Adam D. “Owning Genetic Information and Gene Enhancement Techniques: Why Privacy and Property Rights May Undermine Social Control of the Human Genome.” Bioethics 14 (2000): 97-119.

334

Muhkerjee, Roopali. “Now You See It, Now You Don't: Naming Privacy, Framing Policy.” Critical

Studies in Media Communication 17 (2000): 469-93.

Munro, Moira, and Madigan, Ruth. “Privacy in the Private Sphere.” Housing Studies 8 (1993): 29-45.

Murphy, John F. “An International Convention on Invasion of Privacy.” New York University Journal

of International Law and Politics 8 (1976): 387-433.

Murphy, Priscilla, and Maynard, Michael. “Framing the Genetic Testing Issue: Discourse and

Cultural Clashes among Policy Communities.” Science Communication 22 (2000): 133-153.

Mustafa, Husain. “Personal Privacy in an Information Society.” Virginia Social Science Journal 20

(1985): 12-21.

Mylchreest, Ian. “‘Sound Law and Undoubtedly Good Policy’: Roe v. Wade in Comparative

Perspective.” Journal of Policy History 7 (1995): 53-71.

Nadel, Mark S. “Rings of Privacy: Unsolicited Telephone Calls and the Right of Privacy.” Yale

Journal on Regulation 4 (1986): 99-128.

Nagel, Thomas. “Concealment and Exposure.” Philosophy and Public Affairs 27 (1998): 3-30.

Nash, Jennifer C. “From Lavender to Purple: Privacy, Black Women, and Feminist Legal Theory.”

Yeshiva University Cardozo Women's Law Journal 11 (2005): 303.

Nasri, W. “Privacy and Copyright.” Information Science: Search for Identity Anthony Debons ed.

New York: Marcel Dekker, Inc., 1974. 337-344.

Nathan, Daniel O. “Just Looking: Voyeurism and the Grounds of Privacy.” Public Affairs Quarterly,

(October, 1990): 365-386.

Nelkin, Dorothy. “Ironies in the Public Response to Information Technology.” National Forum 74

(1994): 7-10.

Nelkin, Dorothy, and Andrews, Lori. “DNA Identification and Surveillance Creep.” Sociology of

Health and Illness 21 (1999): 689-706.

Nelkin, Dorothy, and Tancredi, Laurence. Dangerous Diagnostics: The Social Power of Biological

Information. New York: HarperCollins, 1989.

Nelson, Deborah. Pursuing Privacy in Cold War America. New York: Columbia Univ. Press, 2002.

Nelson, Jaleen. “Sledge Hammers and Scalpels: The FBI Digital Wiretap Bill and its Effect on Free

Flow of Information and Privacy.” UCLA Law Review 41 (1994): 1139-83.

Nelson, Lisa. “Protecting the Common Good: Technology, Objectivity, and Privacy.” Public

Administration Review (Sept. 15, 2002): 69-74.

Neocleous, Mark. “Privacy, Secrecy, Idiocy.” Social Research 69 (2002): 85-110.

Nesson, Charles. “Threats to Privacy.” Social Research 68 (2001): 105-113.

335

Neuhaus, Paul. “Privacy and confidentiality in digital reference.” Reference and User Services

Quarterly 43 (2003): 26-36.

Neville, Elizabeth. “The Public's Right to Know the Individual's Right to Privacy.” Policing and

Society 9 (2000): 413-428.

Neville, Robert. “Various Meanings of Privacy: A Philosophical Analysis.” In Privacy, ed. William

Baier, 22-34. New York: Fordham University Press, 1980.

Newman, M., and Marks de Chabris, G. “Employment and privacy: a problem for our time.” Journal

of Business Ethics 6 (1987): 153-63.

Nissenbaum, Helen. “Privacy as Contextual Integrity.” Washington Law Review 79 (2004): 119-158.

Nissenbaum, Helen. "The Meaning of Anonymity in an Information Age" The Information Society,

15 (1999):141-144.

Nissenbaum, Helen. “Protecting Privacy in an Information Age: The Problem of Privacy in Public.”

Law and Philosophy 17 (1998): 559-596.

Nissenbaum, Helen. “Toward an Approach to Privacy in Public: Challenges of Information

Technology.” Ethics and Behavior 7 (1997): 207-219.

Noam, E. M. “Privacy in telecommunications: markets, rights, and regulations. Part II: policy

approaches.” New Telecom Quarterly 3 (1995): 37-45.

Noble, John H., Jr. “Protecting the Public’s Privacy in Computerized Health and Welfare Information

Systems.” Social Work 16. (1971): 35-41.

Nock, Steven L. “Too Much Privacy?” Journal of Family Issues 19 (1998): 101-118.

Nolan, J. “The Demise of Information Privacy in Australia.” Library Automated Systems Exchange,

29 (1998): 40-8.

Nunan, Richard. “Militant Gayes, Gayes in the Military, and Privacy as Social Freedom.” Law and

Philosophy 13 (1994): 481-492.

Nunno, R M. “Electronic Signatures: Technology Developments and Legislative Issues.” Journal of

Academic Librarianship 26 (2000): 355-8.

O'Brien, David M. Privacy, Law, and Public Policy. New York: Praeger, 1979.

O’Donnell, Michael J. “Reading for Terrorism: Section 215 of the USA Patriot Act and the

Constitutional Right to Information Privacy.” Journal of Legislation 31 (2004): 45.

O'Connell, Brian M. “Employment Privacy: Where Utopia Meets Reality.” Australian Journal of

Professional and Applied Ethics 1 (1999): 96-102.

O’Harrow Jr., Robert. No Place to Hide. Free Press, 2005.

O'Neil, Michael. “Cybercrime Dilemma: Is it Possible to Guarantee both Security and Privacy.”

Brookings Review 19 (2001): 28-31.

336

O'Neil, Robert M. “Rights in Conflict: The First Amendment's Third Century.” Law and

Contemporary Problems, 65.2 (2002): 7-31.

O’Neill, Onora. “Between Consenting Adults.” Philosophy and Public Affairs 14 (1985): 252-77.

Ottensmeyer, Edward J., and Heroux, Mark A. “Ethics, Public Policy, and Managing Advanced

Technologies: The Case of Electronic Surveillance.” Journal of Business Ethics 10 (1991): 519-

26.

Owen, John E. “An End to Privacy in America?” Contemporary Review 223 (1973): 266-268.

Ozaki, Ritsuko. “Housing as a Reflection of Culture: Privatised Living and Privacy in England and

Japan.” Housing Studies, 17.2 (2002): 209-227.

Packard, Noel. Electronic Monitoring: Biotechnology and Its Impact on Liberal Ideas. American

Sociological Association (ASA), 1999.

Parent, W.A. “A New Definition of Privacy for the Law.” Law and Philosophy 2 (1983): 305-338.

Parent, W.A. “Privacy, Morality, and the Law.” Philosophy and Public Affairs 12 (1983): 269-288.

Parent, W.A. “Recent Work on the Concept of Privacy.” American Philosophical Quarterly 20

(1983): 341-356.

Parker, Richard. “A Definition of Privacy.” Rutgers Law Review 12 (1974): 393-422.

Parmet, Wendy E. “Legal Rights and Communicable Disease: AIDS, the Police Power, and

Individual Liberty.” Journal of Health Politics, Policy and Law 14 (1989): 741-771.

Parmet, Wendy. “Public Health Protection and the Privacy of Medical Records.” Harvard Civil

Rights Civil Liberties Law Review 16 (1981): 265-304.

Parrott, Roxanne, Judee K. Burgoon, Michael Burgoon, and Beth A. LePoire. “Privacy Between

Physicians and Patients: More than a Matter of Confidentiality.” Social Science & Medicine 29

(1989): 1381-5.

Pateman, Carole. “Feminist Critiques of the Public/Private Dichotomy.” 281-306. Benn, Stanley and

G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.

Patton, Jason W. “Protecting Privacy in Public? Surveillance Technologies and the Value of Public

Places.” Ethics and Information Technology 2 (2000): 181-187.

Paul, Nora. “For the Record: Information on Individuals.” National Forum 72 (1992): 34-38.

Paul, Ellen Frankel, Miller Jr., Fred D., and Paul, Jeffrey (eds.). The Right to Privacy. Cambridge:

Cambridge University Press, 2000.

Pedersen, Darhl M., and Shelia Frances. “Regional Differences in Privacy Preferences.”

Psychological Reports 66 (1990): 731-737.

Peikoff, Amy. “No Corn on this Cob: Why Reductionists Should Be All Ears for Pavesich.” Brandeis

Law Journal 42 (2004): 751.

337

Pepperell, Keith. “Privacy, Rights, and Education.” Philosophical Studies in Education 1 (1990): 41-

56.

Persson, Anders J., and Hansson, Sven Ove. “Privacy at Work: Ethical Criteria.” Journal of Business

Ethics 42 (2003): 59-70.

Peters, T A. “Computerized Monitoring and Online Privacy.” Library Review 49 (2000): 252.

Peterson, James. “Behind the Curtain of Privacy: How Obscenity Law Inhibits the Expression of

Ideas about Sex and Gender.” Wisconsin Law Review 59 (1998): 625.

Peterson, S. B. “Your Life as an Open Book: Has Technology Rendered Personal Privacy Virtually

Obsolete?” Federal Communications Law Journal 48 (1995): 163-186.

Phelps, J., Nowak, G., and Ferrell, E. “Privacy Concerns and Consumer Willingness to Provide

Personal Information.” Journal of Public Policy & Marketing 19 (2000): 27- 41.

Phillips, D. J. “Beyond Privacy: Confronting Locational Surveillance in Wireless Communication.”

Communication Law and Policy 8 (2003): 1-23.

Pilgrim, T. A. “Docudramas and False Light Invasion of Privacy.” Communications and the Law,

10.3 (1988): 3-38.

Pilgrim, Tim A. “Privacy and American Journalism: An Economic Connection.” Journalism History

14 (1987): 18-25.

Pincus, Laura, and Johns, Roger. “Private Parts: A Global Analysis of Privacy Protection Schemes

and a Proposed Innovation for their Comparative Evaluation.” Journal of Business Ethics 16

(1997): 1237-1260.

Pinkard, Terry. “Invasions of Privacy.” Ethical Issues in Social Science Research, eds. Tom L.

Beauchamp, et al. Baltimore: Johns Hopkins University Press, 1982. 257-273.

Pla Rodriguez, Americo. “The Protection of Workers' Privacy: The Situation in the Americas.”

International Labour Review 134 (1995): 297-313.

Ploughman, Penelope. “Public Policy versus Private Rights: The Medical, Social, Ethical, and Legal

Implications of the Testing of Newborns for HIV.” AIDS & Public Policy Journal 10 (1995,

1996): 182-204.

Plumwood, Val. “Feminism, Privacy and Radical Democracy.” Anarchist Studies 3 (1995): 97-120

Pollio, Marie C. “The Inadequacy of HIPPA’s Privacy Rule.” New York University Annual Survey

of American Law 60 (2004): 579.

Posner, Richard A. “Privacy, Surveillance, and Law.” The University of Chicago Law Review75

(Winter, 2008): 245-260

Posner, Richard A. The Economics of Justice. Harvard University Press, 1981.

Posner, Richard A. “The Right of Privacy.” Georgia Law Review, 12 (1978): 393.

338

Posner, Richard A. “Orwell versus Huxley: Economics, Technology, Privacy, and Satire.” Philosophy

and Literature 24 (2000): 1-33.

Posner, Richard A. "Privacy, Secrecy, and Reputation." Buffalo Law Review 28 (Winter 1979): 1-56.

Prosser, William. “Privacy.” California Law Review 48 (1960): 383-422.

Post, Robert C. Tort Law and the Communitarian Foundations of Privacy. The Responsive

Community 10 (1999, 2000): 19-30

Postow, B C., “Andre on Privacy.” Journal of Value Inquiry 22 (1988): 327-330

Note, “Privacy, photography, and the press. Harvard Law Review 111 (1998):1086-1103.

“Privacy, Technology, and the California "Anti-paparazzi" Statute.” Harvard Law Review 112

(1999):1367-84.

Prost, Antoine and Vincent, Gerard, ed. A History of Private Life: Vol. 5: “Riddles of Identity in

Modern Times.” Cambridge, Mass.: Harvard University Press, 1991.

Raab, Charles D, Bennett, Colin J. “Protecting Privacy Across Borders: European Policies and

Prospects.” Public Administration 72 (1994):95-112.

Raab, Charles D, Bennett, Colin J. “The distribution of Privacy Risks: Who Needs Protection.”

Information Society 14 (1998):263-74.

Rachels, James. “Why Privacy Is Important.” Philosophy and Public Affairs 4 (1975): 323-333.

Rao, Radhika. “Reconceiving Privacy: Relationships and Reproductive Technology.” UCLA Law

Review 45 (1998):1077-1124.

Raul, Alan Charles. Privacy and the Digital State: Balancing Public Information and Personal

Privacy. Kluwer Academic Publishers Group, 2002.

Regan, Priscilla M. Legislating Privacy: Technology, Social Values, And Public Policy. Chapel Hill,

NC: University of North Carolina Press, 1995.

Regan, Priscilla M. “The Globalization of Privacy: Implications Of Recent Changes In Europe.”

American Journal of Economics and Sociology 52 (1993): 257-274.

Reidenberg, J. R. “Privacy in the Information Economy: A Fortress or Frontier for Individual

Rights?” Federal Communications Law Journal 44 (1992): 195-243.

Reiman, Jeffrey H. “Privacy, Intimacy, and Personhood.” Philosophy and Public Affairs 6 (1976): 26-

44.

Reiman, Jeffrey H. “Driving to the Panopticon: A Philosophical Exploration of the Risks to

Privacy Posed by the Information Technology of the Future.” Santa Clara Computer and High

Technology Law Journal 11 (1995): 27-44.

Reisner, Susan L. “Balancing Inmates' Right to Privacy with Equal Employment for Prison Guards.”

Women's Rights Law Reporter 4 (1978): 243-51.

339

Reitman, Alan. “Freedom of Information and Privacy: The Civil Libertarian's Dilemma.” American

Archivist 38 (1975): 501-508.

Relyea, Harold C. “Freedom of Information, Privacy, and Official Secrecy: The Evolution of Federal

Government Information Policy Concepts [United States].” Social Indicators Research, 7

(1980):137-56.

Resnik, David B. “Genetic Privacy in Employment.” Public Affairs Quarterly 7 (1993): 47-56.

Reza, Sadiq. “Privacy and the Criminal Arrestee or Suspect: In Search of a Right, In Need of a Rule.”

Maryland Law Review 64 (2005): 755.

Rich, Ben A. “The Assault on Privacy in Healthcare Decision Making.” Denver University Law

Review, 68 (1991): 1-55.

Richards, David A. J. “Is My Body My Property?” Social Research 68 (2001): 83-101.

Richards, David A. J. “The Jurisprudence of Privacy as a Constitutional Right.” In Privacy, ed.

William Bier, 135-51. New York: Fordham University Press, 1980.

Richards, David A. J. “Unnatural Acts and the Constitutional Right to Privacy: A Moral Theory.”

Fordham Law Review 45 (1977): 1312-48.

Richards, Neil M. “Reconciling Data Privacy and the First Amendment.” University of California

Law Review 52 (2005): 1149.

Richman, Sheldon. “Dissolving the Inkblot: Privacy as Property Right.” Cato Policy Report. 15

(Jan/Feb 1993).

Rickless, Samuel. “The Right to Privacy Unveiled.” San Diego Law Review 44 (Fall 2007): 773-798.

Rössler, Beate. The Value of Privacy. Translated by Rupert D. V. Glasgow (Cambridge, UK: Polity,

2005).

Riley, T. “Access to Government Information: An International Perspective.” Journal of Media Law

and Practice 2 (1981): 92-100.

Roazen, Paul. “Privacy and Therapy.” Society 29 (Jan./Feb.1992): 14-17.

Robbin, Alice. “State Archives and Issues of Personal Privacy: Policies and Practices.” American

Archivist 49 (1986):163-75.

Robison, Wade L. “Privacy and Personal Identity.” Ethics and Behavior 7 (1997): 195-205.

Rohr, John A. “Privacy: Law and Values.” Thought 49 (1974):353-373.

Rollins, C D. “Contingent Privacy That is Complete.” Philosophical Studies 14 (1963): 91-96.

Rosen, Jeffrey. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age. New York:

Random House, 2004.

Rosen, Jeffrey. The Unwanted Gaze: The Destruction Of Privacy In America. Vintage Press 2001.

Rosen, Jeffrey. “Out of Context: The Purposes of Privacy.” Social Research 68 (2001): 209-220.

340

Rosen, Jeffrey. “Why Privacy Matters.” The Wilson Quarterly 24 (2000): 32.

Rosenberg, Alexander. “Privacy as a Matter of Taste and Rights.” Social Philosophy and Policy 17

(2000): 68-90.

Rosenfeld, Frank A. “The Freedom of information act's privacy exemption and the Privacy act of

1974.” Harvard Civil Rights Civil Liberties Law Review 11 (1976): 596-631..

Rotenberg, M. “Preserving Privacy in the Information Society.” International Forum on Information

and Documentation 23 (1998): 11-18.

Rotenberg, Marc. “Fair information practices and the Architecture of Privacy (what Larry doesn't

get).” Stanford Technology Law Review 1 (2001).

Rotenberg, Marc. “Inside the Beltway: The Politics of Privacy.” Government Information Insider 4

(1995): 5-7.

Roth, Louise Marie. “The Right to Privacy Is Political: Power, the Boundary between Public and

Private, and Sexual Harassment.” Law & Social Inquiry 24 (1999): 45-71.

Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone's Private Life and

Open Secret. Simon and Schuster, 1992.

Rubel, Alan. “Privacy and the U.S.A. Patriot Act: Rights, the Value of Rights, and Autonomy.” Law

and Philosophy 26 (March 2007): 119-159.

Rubenfeld, Jed. “The Right of Privacy.” Harvard Law Review 102 (1989): 737-807.

Rubin, Paul H, Lenard, Thomas M. Privacy and the Commercial Use of Personal Information.

Kluwer Academic Publishers Group, 2002.

Ruiz, Blanca R. “The Right to Privacy: A Discourse Theoretical Approach.” Ratio Juris 11 (1998):

155-167.

Rule, James B. “Toward Strong Privacy: Values, Markets, Mechanisms, and Institutions.” University

of Toronto Law Journal 54 (2005): 147.

Rushing, Don G. “Picking Your Poison: The Drug Efficacy Requirement and the Right of Privacy.”

UCLA Law Review 25 (1978): 577-617.

Russell, Steve. “The New Outlawry and Foucault's Panoptic Nightmare.” American Journal of

Criminal Justice 17 (1993): 39-50.

Ryan, Alan. “Private Selves and Public Parts.” 135-154. Benn, Stanley and G. Gaus eds. Public and

Private in Social Life. New York: St. Martin’s Press, 1983.

Ryan, Alan. Public and Private Property.” 223-248. Benn, Stanley and G. Gaus eds. Public and

Private in Social Life. New York: St. Martin’s Press, 1983.

Ryberg, Jesper. “Privacy Rights, Crime Prevention, CCTV, and the Life of Mrs Aremac.” Res

Publica: A Journal of Legal and Social Philosophy 13 (2007): 127-143.

341

Samar, Vincent J. “Privacy and the Debate over Same-Sex Marriage versus Unions.” DePaul Law

Review 54 (2005): 783.

Samoriski, Jan H. “Private Spaces and Public Interests: Internet Navigation, Commercialism and the

Fleecing of Democracy.” Communication Law and Policy 5 (2000): 93-113.

Sanford, B. W. Libel and Privacy: The Prevention and Defense of Litigation. Clifton, NJ: Law and

Business/Harcourt Brace Jovanovich, 1985.

Saunders, John Turk. “In Defense of a Limited Privacy.” Philosophical Review 78 (1969): 237-248.

Saxonhouse, Arlene. “Classical Greek Conceptions of Public and Private.” 363-384. Benn, Stanley

and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.

Scanlon, Thomas. “Thomson on Privacy.” Philosophy and Public Affairs 4(1975): 315-322.

Schauer, Frederick. “Can Public Figures Have Private Lives?” Social Philosophy & Policy 17 (2000):

293-309.

Schauer, Frederick. “Free Speech and the Social Construction of Privacy.” Social Research 68

(2001): 221-232.

Schick, Ida Critelli. “Personal Privacy and Confidentiality in an Electronic Environment.” Bioethics

Forum 12 (1996): 25-30.

Schiff, Martin. “The Emergence of Student Rights to Privacy Under the Fourth Amendment.” Baylor

Law Review 34 (1982): 209-27.

Schmuhl, Robert. “Presidential Perplexity: What's Public? What's Private?” Society 38 (2000): 96-

102.

Schneider, Carl. Shame, Exposure, and Privacy. Boston: Beacon Press, 1977.

Schoechle, Timothy D. “Privacy on the Information Superhighway: Will My House Still Be My

Castle.” Telecommunications Policy 19 (1995): 435-52.

Schoeman, Ferdinand. “Privacy: Philosophical Dimensions.” American Philosophical Quarterly 21

(1984): 199-214.

Schoeman, Ferdinand D. "AIDS and Privacy." In AIDS and Ethics, Reamer, Frederic G. ed. Columbia

University Press: New York, 1993.

Schoeman, Ferdinand D. Philosophical Dimensions of Privacy: An Anthology. Cambridge University

Press: Cambridge, 1984.

Schoeman, Ferdinand D. “Privacy and Criminal Justice Policies.” Criminal Justice Ethics 3 (1983):

71-84.

Schoeman, Ferdinand D. Privacy and Social Freedom. Cambridge University Press: New York,

1992.

342

Schonsheck, Jonathan. “Privacy and Discrete Social Spheres." Ethics and Behavior 7 (1997): 221-

228.

Schwartz, Paul M. “Property, Privacy, and Personal Data.” The Harvard Law Review 117 (2004):

2055.

Scott, Gini Graham. Mind Your Own Business: The Battle for Personal Privacy. Plenum Publishing

Corporation, 1995.

Senchuk, Dennis M. “Privacy Regained.” Philosophical Investigations 9 (1986): 18-35

Shapiro, Stuart. “Places and Spaces: The Historical Interaction of Technology, Home, and Privacy.”

Information Society 14 (1998): 275-84.

Shils, Edward. The Torment of Secrecy: The Background and Consequences of American Security

Policies. Chicago, IL: Ivan R. Dee, Inc, 1996.

Shivers, Nonnie L. “Firing ‘Immoral’ Public Employees: If Article 8 of the European Convention on

Human Rights Protects Employee Privacy Rights, Then Why can’t We?” Arizona Journal of

International and Comparative Law 21 (2004): 621.

Sieghart, Paul. Privacy and Computers. London: Latimer , 1976.

Sillitoe, P J. “Privacy in a Public Place: Managing Public Access to Personal Information Controlled

by Archives Services.” Journal of the Society of Archivists 19 (1998): 5-15.

Singleton, Solveig. “Privacy and Twenty-First Century Law Enforcement: Accountability for New

Techniques.” Ohio Northern University Law Review 30 (2004): 417.

Simitis, S. “Reviewing Privacy in an Information Society.” University of Pennsylvania Law Review

135 (1987): 70-76.

Simon, Morton J. "Right of Privacy, Right to Know: Which Prevails?" Public Relations Review 3

(1977): 5-18.

Slobogin, Christopher. “Subpoenas and Privacy.” DePaul Law Review 54 (2005): 805.

Slobogin, Christopher. “Technologically Assisted Physical Surveillance: The American Bar

Association's Tentative Draft Standards.” Harvard Journal of Law and Technology 10 (1997):

383-463.

Smith, Lamar. “DragNet: Law Enforcement, Civil Liberties, and the Internet since September 11.”

LBJ Journal of Public Affairs 15 (2003): 16-25.

Smith, Martha M. “Walking with the FBI: Patriotism as Personal Dissent 1 Year after 9 /11.”Journal

of Information Ethics 12 (2003): 10-15.

Smithsimon, Molly. “Private Lives, Public Spaces: The Surveillance State.” Dissent 50 (2003): 43-

49.

343

Snortland, Neil. “The Supreme Court and the Constitutional Right to Privacy.” Midsouth Political

Science Journal 11 (1990): 105-24.

Solove, Daniel J. Understanding Privacy (Cambridge MA: Harvard University Press, 2008).

Solove, Daniel J., and Richards, Neil. “Privacy's Other Path: Recovering the Law of Confidentiality.”

Georgetown Law Journal 96 (2007): 123-182.

Solove, Daniel J. “The Virtues of Knowing Less: Justifying Privacy Protections against Disclosure.”

Duke Law Journal 53 (2003): 967.

Solove, Daniel J. The Digital Person: Technology and Privacy in the Information Age. New York and

London: New York University Press, 2004.

Solove, Daniel J. “A Taxonomy of Privacy.” University of Pennsylvania Law Review 154 (2006):

477.

Soifer, Eldon, Szabados, Bela. “Hypocrisy and Privacy.” Journal of Philosophical Research 27

(2002): 601-618.

Spence Diehl, Emily. “Stalking and Technology: The Double Edged Sword.” Journal of Technology

in Human Services 22 (2003): 5-18.

Spinello, Richard A. Ethical Aspects of Information Technology. Prentice Hall: Englewood Cliffs,

1995.

Springer, K. A. “In God We Trust: All Others Who Enter this Store are Subject to Surveillance.”

Federal Communications Law Journal 48 (1995): 187-218.

Sponka, J. “Freedom of Speech and Privacy in the Information Age.” Information Society 13 (1997):

171-184.

Steinke, G. “Data Privacy Approaches from US and EU Perspectives.” Telematics and Informatics 19

(2002): 193-200

Steinman, Joan. “Privacy of Association: A Burgeoning Privilege in Civil Discovery.” Harvard Civil

Rights Civil Liberties Law Review 17 (1982): 355-442.

Stevenson, Valerie. “FBI in Your Library? The USA PATRIOT Act and its Implications for

Libraries.” Legal Information Management 3 (2003): 68-70.

Stockman, Norman. “Intruding on Barrington Moore's Privacy: A Review Essay.” Theory, Culture &

Society 6 (1989): 125-144.

Strahilevitz, Lior J. “A Social Networks Theory of Privacy.” University of Chicago Law Review 72

(2005): 1313.

Stratford, J. “Computerized and Networked Government Information: Carnivore.” Journal of

Government Information 28 (2001): 109-12.

344

Strossen, N. “Cybercrimes v. Cyberliberties.” International Review of Law, Computers and

Technology 14 (2000): 11-24.

Struening, Karen. “Privacy and Sexuality in a Society Divided Over Moral Culture.” Political

Research Quarterly 49 (1996): 505.

Sullum, Jacob. “Secrets for Sale: Do Strangers with Computers Know Too Much About You.”

Reason 23 (1992): 28-35.

Sumberg, Theodore A. “Privacy, Freedom, and Obscenity: Stanley v Georgia.” Journal of Critical

Analysis 3 (1971): 84-96.

Sundby, Scott E . "Everyman's Fourth Amendment: Privacy or Mutual Trust Between Government

and Citizen.” Columbia Law Review 94 (1994): 1751-1812.

Sunstein, C. R. Democracy and the Problem of Free Speech. New York: Free Press, 1993.

Suter, Sonia M. “Disentangling Privacy from Property: Toward a Deeper Understanding of Genetic

Privacy.” The George Washington Law Review 72 (2004): 737.

Swinburne, R G. “Privacy.” Analysis 24 (1964): 127-136.

Sykes, C. J. The End of Privacy. New York: St. Martin’s Press, 1999.

Talbott, William J. Which Rights Should be Universal? Oxford: Oxford University Press, 2005.

Tavani, Herman. “Philosophical Theories of Privacy: Implications for an Adequate Online Privacy

Policy.” Metaphilosophy 38 (January 2007): 1-22.

Tavani, Herman. “Privacy Enhancing Technologies As a Panacea for Online Privacy Concerns: Some

Ethical Considerations.” Journal of Information Ethics 9 (2000): 26-36.

Tavani, Herman, Grodzinsky, Frances S. “Cyberstalking, Personal Privacy, and Moral

Responsibility.” Ethics and Information Technology 4 (2002): 123-132.

Tavani, Herman T. “Informational Privacy, Data Mining, and the Internet.” Ethics and Information

Technology 1 (1999): 137-145.

Tavani, Herman T. KDD, “Data Mining, and the Challenge for Normative Privacy.” Ethics and

Information Technology 1 (1999): 265-273.

Taylor, James Stacey. “In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love

Government Surveillance.” Public Affairs Quarterly 19 (July 2005): 227-246.

Taylor, James Stacey. “Privacy and Autonomy: A Reappraisal.” Southern Journal of Philosophy 40

(2002): 587-604.

Telford, T. L. Freedom of speech in the United States. New York: Random House, 1985.

Tepker, Harry F Jr. “Abortion, Privacy and State Constitutional Law: A Speculation if (or when) Roe

v. Wade is Overturned.” Emerging Issues in State Constitutional Law 2 (1989): 173-87.

345

Terrill, Richard J. “An Overview of the Privacy Issues in Criminal Justice: Trends in the United

States and England.” Police Studies 1 (1978): 42-50.

Thomas, Terry. Privacy and Social Services. Ashgate Publishing Company Ltd., 1995.

Thompson, Dennis F. “Privacy, Politics, and the Press.” Harvard International Journal of

Press/Politics 3 (1998): 103-13.

Thompson, M. P. “Breach of Confidence and the Protection of Privacy in English Law.” Journal of

Media Law and Practice 6 (1985): 5-25.

Thompson, Paul B. “Privacy, Secrecy and Security.” Ethics and Information Technology 3 (2001):

13-19.

Thomson, Judith Jarvis. “The Right to Privacy.” Philosophy and Public Affairs 4 (1975): 295-314.

Townsend, James B, Paul, Robert J. “Employee Privacy Rights.” Business and Public Affairs 16

(1990): 16-21.

Trinkle, Catherine A. “Federal Standards for Sex Offender Registration: Public Disclosure Confronts

the Right to Privacy.” William and Mary Law Review 37 (1995): 299-336.

Trubow, G. B. “Peeping Sam: Uncle is Watching Us.” Journal of Computing Security 4 (1986): 15-

20.

Tucker, David. “Privacy as a Right.” Melbourne Journal of Politics 13 (1981): 3-15.

Tunick, Mark. “Does Privacy Undermine Community?” Journal of Value Inquiry 35 (2001): 517-

534.

Tunick, Mark. “Privacy in the Face of New Technologies of Surveillance.” Public Affairs Quarterly

14 (2000): 259-277.

Tushnet, Mark. “Legal Conventionalism in the U.S. Constitutional Law of Privacy.” Social

Philosophy & Policy 17 (2000): 141-164.

Twight, Charlotte. “Watching You: Systematic Federal Surveillance of Ordinary Americans.”

Independent Review 4 (1999): 165-2000.

Tyler, Michele L. “Blowing Smoke: Do Smokers Have a Right? Limiting the Privacy Rights of

Cigarette Smokers.” Georgetown Law Journal 86 (1998): 783-811.

Van Den Haag, Ernest. “On Privacy.” Privacy: Nomos XIII, ed. J. Roland Pennock and John

Chapman, 149-68. New York: Atherton Press, 1971.

Van Den Hoven, Jeroen. “Privacy and the Varieties of Informational Wrongdoing.” Australian

Journal of Professional and Applied Ethics 1 (1999): 30-43

Van De Vate, Dwight, Jr. “The Genesis of Privacy.” Journal of Existentialism 7 (1966/67): 233-242.

Vidmar, Neil and Flaherty, David H. “Concern for Personal Privacy in an Electronic Age.” Journal of

Communication 35 (1985): 91-103.

346

Vitek, William. “Privacy's Place: The Role of Civility and Community in a Technological Culture.”

Ethics and Behavior 7 (1997): 265-270.

Vitone, P. “Reflections on Surveillance.” Canadian Journal of Communication 19 (1994): 101-110.

Voakes, P S. “What Were You Thinking? A Survey of Journalists Who Were Sued For Invasion of

Privacy.” Journalism and Mass Communication Quarterly 75 (1998): 378-93.

Volokh, Eugene. “Cyberspace and Privacy: A New Legal Paradigm? Freedom of Speech and

Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About

You.” Stanford Law Review 52 (2000): 1049.

Vreg, France. “The Contemporary Media Dilemma: Where Are the Boundaries between Privacy and

the Right to Information?” Teorija in Praksa 33 (1996): 408-423.

Wacks, Raymond. Personal Information: Privacy and the Law. Oxford University Press, 1989.

Wacks, Raymond. The Protection of Privacy. London: Sweet & Maxwell, 1980.

Walton, Anthony. “Public and Private Interests: Hegel on Civil Society and the State.” 249-266.

Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press,

1983.

Warner, Richard. “Surveillance and the Self: Privacy, Identity, and Technology.” DePaul Law

Review 54 (2005): 847.

Ware, Willis H. “The New Faces of Privacy.” Information Society 9 (1993): 195-211.

Warren, Samuel, and Louis Brandeis. “The Right to Privacy.” The Harvard Law Review 4 (1890):

193-220.

Washburn, P. “Electronic Journalism, Computers and Privacy.” Computer/Law Journal 2 (1982):

189-209.

Wasserstrom, Richard. “Privacy: Some Arguments and Assumptions.” Philosophical Law, ed.

Bronaugh, 148-66. Westport, CT: Greenwood Press, 1978.

Watkins, John J. “Private Property vs. Reporter Rights: A Problem In Newsgathering: Use Of

Trespass Law By Subjects Of Coverage To Accomplish What Can't Be Accomplished Through

Libel Law Or Privacy Law Poses Problem For The Media.” Journalism Quarterly 54 (1977):

690-6.

Weigel Garrey, Cindy J, Cook, Christine C, Brotherson, Mary Jane. “Children and Privacy: Choice,

Control, and Access in Home Environments.” Journal of Family Issues 19 (1998): 43-64.

Weinreb, Lloyd L. “The Right to Privacy.” Social Philosophy and Policy 17 (2000): 25-44.

Weisman, A. M. “Publicity as an Aspect of Privacy and Personal Autonomy.” Southern California

Law Review 55 (1982): 727-768.

Weiss, Paul. Privacy. S. Illinois University Press: Carbondale, 1983.

347

Werdegar, Matthew Mickle. “Lost? The Government Knows Where You Are: Cellular Telephone

Call Location Technology and the Expectation of Privacy.” Stanford Law & Policy Review 10

(1998): 103-17.

Westin, Alan F. Privacy and Freedom. New York: Atheneum, 1967.

Westin, Alan F. “Intrusions: Privacy Tradeoffs in a Free Society.” Public Perspective 11 (2000): 8-

19.

Westin, Alan F. “Privacy and Personnel Records: A Look at Employee Attitudes.” Civil Liberties

Review 4 (1978): 28-34.

Westin, Alan F. “Social and Political Dimensions of Privacy.” Journal of Social Issues 59 (2003):

431-453.

Weyns, Walter. “Borderline Skirmishes. A Sociological Exploration of the Boundary between the

Private and the Public Realm.” Tijdschrift voor Sociologie 19 (1998): 247-279.

Whitaker, Reg. The End Of Privacy: How Total Surveillance Is Becoming A Reality. W. W. Norton &

Company, Inc., 1999.

White, Peter. “Privacy an International Concern.” International Library Review 12 (1980): 223-242.

Whitman, James Q. “The Two Cultures of Privacy: Dignity versus Liberty.” Yale Law Journal

11(2004): 1151.

Wiesenthal, David L, Wiener, Neil I. “Privacy and the Human Genome Project.” Ethics and Behavior

6 (1996): 189-202.

Wigand, R. T., Shipley, C., Shipley, D. “Transborder Data Flow, Informatics, and National Policies.”

Journal of Communication 34 (1984): 153-175.

Willis, James, Silbey, Susan. “Self, Surveillance, and Society.” The Sociological Quarterly 43

(2002): 439-445.

Winch, Samuel P. “Moral Justifications for Privacy and Intimacy.” Journal of Mass Media Ethics 11

(1996): 197..

Winseck, D. “Illusions Of Perfect Information And Fantasies Of Control In The Information

Society.” New Media & Society 4 (2002): 93-122.

Wolf, Rita, Thomason, Tommy, LaRocque, Paul. “The Right to Know vs. the Right of Privacy:

Newspaper Identification of Crime Victims.” Journalism Quarterly 64 (1987): 503-507.

Wolhandler, Steven J. “Voluntary Active Euthanasia For The Terminally Ill And The Constitutional

Right To Privacy.” Cornell Law Review 69 (1984): 363-83.

Wollheim, R. “Privacy.” Proceedings of the Aristotelian Society 51 (1951): 83-104.

Woodbury, Marsha. “Email, Voicemail, and Privacy: What Policy Is Ethical?” Science and

Engineering Ethics 6 (2000): 235-244.

348

Woronoff, Michael A. “Public Employees Or Private Citizens: The Off Duty Sexual Activities Of

Police Officers And The Constitutional Right Of Privacy [United States].” University of

Michigan Journal of Law Reform 18 (1984):195-219.

Zabuzhko, Oksana. “Publicity and Media under Communism and After: The Destruction of Privacy.”

Social Research 69 (2002): 35-47.

Young, John, ed. Privacy. New York: John Wiley and Sons, 1978.

Zimmerman, D. L. “False Light Invasion of Privacy: The Light that Failed.” New York University

Law Review 64 (1989): 364-453.

349