Privacy Rights: Moral and Legal Foundations Bibliography Abrams, Gerald D. "The Right to Privacy when Lives are at Stake." Troubling Problems in Medical Ethics, Ed. by Marc Basson. New York: Liss, 1981. 257-268. Abramsky, Leslie C. “Questionnaires and Constitutional Privacy Rights in Public Sector Employment.” The George Washington Law Review 62 (1994): 693-717. Ackerman, M., Darrell, T., and Weitzner, D. J. “Privacy in Context.” Human Computer Interaction 16 (2001): 167-76. Adams, Helen R. “Privacy and Confidentiality: Now More than Ever, Youngsters Need to Keep their Library Under Wraps.” American Libraries 33 (2002): 44 46, 48. Adkins, David C. “Right to Privacy?: Why the Private Facts Trot Cannot Coexist with the First Amendment.” First Amendment Law Review 2 (2004): 325. Adler, G. Stoney, and Tompkins, Phillip K. “Electronic Performance Monitoring.” Management Communication Quarterly 10 (1997): 259-288. Adler, Michael. “Cyberspace, General Searches, and Digital Contraband: The Fourth Amendment and the Net Wide Search.” Yale Law Journal 106 (1996):1093-1120. Adler, Philip Jr. “Employee Privacy: Legal and Research Developments and Implications for Personnel Administration.” Sloan Management Review 26 (1985):13-22. Alderman, Ellen and Kennedy, Caroline. The Right to Privacy. Knopf Press, New York, 1995. Agre, P. E., and Rotenberg, M. “Technology and Privacy: The New Landscape.” Journal of the American Society for Information Science 50 (1999): 631-633. Agre, Philip E. “Surveillance and Capture: Two Models of Privacy.” The Information Society 10 (1994): 101-127. Agre, Philip E. “The Architecture of Identity: Embedding Privacy in Market Institutions.” Information, Communication & Society 2 (1999): 1-25. Akdeniz, Yaman. “New privacy concerns: ISPs, crime prevention and consumers' rights.” International Review of Law, Computers and Technology 14 (2000): 55-61. Akdeniz, Yaman. “Anonymity, Democracy, and Cyberspace.” Social Research 69 (2002): 223-237. Albanese, Andrew Richard, Berry, John N, DiMattia, Susan S, Kenney, Brian, Oder, Norman, and Rogers, Michael. “Privacy, Porn, and Public Access in 2004.” Library Journal 128 (2003): 68-70. 292 Alder, G. Stoney. “Ethical Issues in Electronic Performance Monitoring: A Consideration of Deontological and Teleological Perspectives.” Journal of Business Ethics 17 (1998): 729-743. Alderman, Ellen. “Homeland security & privacy: striking a delicate balance.” Carnegie Reporter 2 (2002): 22-31. Aldhouse, F. “The Transfer of Personal Data to Third Countries under EU Directive 95/46/EC.” International Review of Law, Computers and Technology 13 (1999): 75-79. Alfino, M. “Information Ethics in the Workplace: Misplacing Privacy.” Journal of Information Ethics 10 (2001): 5-8. Alfino, Mark, and Mayes, G. Randolph. “Reconstructing the Right to Privacy.” Social Theory and Practice 29 (2003): 1-18. Alge, Bradley J. “Effects of Computer Surveillance on Perceptions of Privacy and Procedural Justice.” Journal of Applied Psychology 86 (2001): 797. Allard, N. W. “Privacy Online: Washington report.” Hastings Communications and Entertainment Law Journal 20 (1998): 511 540. Allen, Anita L. “The Virtuous Spy: Privacy As an Ethical Limit.” Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008): 3-22. Anita Allen, Why Privacy Isn't Everything: Feminist Reflections on Personal Accountability. Rowman & Littlefield 2003. Allen, Anita L. “Is Privacy Now Possible? A Brief History of an Obsession.” Social Research 68 (2001): 301-06. Allen, Anita L. “Cyberspace and Privacy: A New Legal Paradigm? Gender and Privacy in Cyberspace.” Stanford Law Review 52 (2000): 1175. Allen, Anita L. Uneasy access: privacy for women in a free society. New Jersey: Rowman and Littlefield, 1988. Allen, Anita L. "Privacy and Equal Protection as Bases for Abortion Law: Citizenship, Gender, and the Constitution." Having and Raising Children, ed. Uma Narayan. University Park: Pennsylvania UP, 1999. Allen, Anita L. “Coercing Privacy.” William and Mary Law Review 40 (1999): 723. Allen, Anita L. “Lying to Protect Privacy.” Villanova Law Review 44 (1999): 161. Allen, Anita L. "Women and their Privacy: What is at Stake." Beyond Domination, ed. Carol C. Gould. Ottowa: Rowman and Allanheld, 1984, 233-249. Allen, Arthur. “Medical privacy? Forget it.” Medical Economics 75 (1998): 151-152. 293 Alpa, Guido. “The Discipline of Personal Databases and New Technologies for Formation of Individual Identity.” Sociologia del Diritto 24 (1997): 45-58. Alpert, Sheri. “Privacy Issues in Clinical Genomic Medicine, or Marcus Welby, M.D., Meets the $1000 Genome.” Cambridge Quarterly of Healthcare Ethics 17 (Fall 2008) :373-384. Alpert, Sheri A. “Protecting Medical Privacy: Challenges in the Age of Genetic Information.” Journal of Social Issues 59 (2003): 301-323. Alpert, Sheri. “Smart Cards, Smarter Policy: Medical Records, Privacy, and Health Care Reform.” Hastings Center Report 23 (1993): 13-23. Amann, Diane. “Publicker Industries v. Cohen: Public Access to Civil Proceedings and a Corporation's Right to Privacy.” Northwestern University Law Review 80 (1986): 1319-1354. Anderson, Scott A.” Privacy without the Right to Privacy.” Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008): 81-107. Andre, Judith. “Privacy as a Value and as a Right.” Journal of Value Inquiry 20 (1986): 309-317. Andrejevic, Mark. “The Work of Being Watched: Interactive Media and the Exploitation of Self Disclosure.” Critical Studies in Media Communication 19 (2002): 230-248. Andrews, Lori B. “Mom, Dad, Clone: Implications for Reproductive Privacy.” Cambridge Quarterly of Healthcare Ethics 7 (1998): 176-186. Angel, Colleen. “The Right to Privacy.” Journal of Information Ethics 9 (2000): 11-25. Apasu Gbotso, Yao. “Survey on the Constitutional Right to Privacy in the Context of Homosexual Activity.” University of Miami Law Review 40 (1986): 521-657. Apostolou, G. L. “Threat to Privacy: The Federal Government's Use of Personal Information in the New Communication Environment.” Telematics and Informatics 5 (1988): 451-459. Arblaster, Anthony. The Rise and Decline of Western Liberalism. Oxford, England: Basil Blackwell Publishers, 1984. Archer, Dane, and Erlich, Lynn. “Weighing the Evidence: A New Method for Research on Restricted Information.” Qualitative Sociology 8 (1985): 345-358. Ardito, S C. “New Filtering and Censorship Challenges.” Information Today 19 (2002): 19-21. Armstrong, H L, and Forde, P J. “Internet Anonymity Practices in Computer Crime.” Information Management and Computer Security 11 (2003): 209-215. Arneson, Richard J. “Egalitarian Justice versus The Right to Privacy?” Social Philosophy and Policy, 17 (2000): 91-119. Arnold, S E. “Internet Users at Risk: The Identity/Privacy Target Zone.” Searcher 9 (2001): 24-39. Arrow, Kenneth J. “Nozick’s Entitlement Theory of Justice.” Philosophia 7 (1978): 265-279. 294 Artandi, Susan. “Man, Information, and Society: New Patterns of Interaction.” Journal of the American Society for Information Science 30 (1979): 15-18. Arthur, John. The Unfinished Constitution: Philosophy and Constitutional Practice. Belmont: Wadsworth, 1989. Ashdown, Gerald G. “Media Reporting and Privacy Claims: Decline in Constitutional Protection for the Press.” Kentucky Law Journal 66 (1977/1978): 759-99. Athanasiou, Tom. “Encryption Technology, Privacy, and National Security.” Technology Review 89 (1986): 56-64. Auerbach, L. “Privacy and Canadian Telecommunications Regulations.” Telecommunications Policy, 7 (1983): 35-42. Austin, Lisa. “Privacy and the Question of Technology.” Law and Philosophy 22 (2003): 119-166. Awad, Naveen Farag and Krishnan, M. S.. 2006. "The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization," Management Information Systems Quarterly 30 (2006): 13-28. Ayoade, J. O., and Kosuge, T. “Breakthrough in Privacy Concerns and Lawful Access Conflicts.” Telematics and Informatics 19 (2002): 273-289. Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Englewood Cliffs: Prentice Hall, 1997. Back, Kurt W. Privacy, Self & Society. American Sociological Association (ASA), 1985. Baer, Walter S. “Technology's Challenges to the First Amendment.” Telecommunications Policy 17 (1993): 3-13. Baez, Benjamin. “Confidentiality in Qualitative Research: Reflections on Secrets, Power and Agency.” Qualitative Research 2 (2002): 35-58. Bailey, Joe. “From Public to Private: The Development of the Concept of the ‘Private.’” Social Research 69 (2002): 15-33. Bailey, Joe. “Some Meanings of 'the Private' in Sociological Thought.” Sociology 34 (2000): 381. Backer, Larry C. “Global Panopticism: States, Corporations, and the Governance of Monitoring Regimes.” Indiana Journal of Global Legal Studies 15 (Winter 2008): 102-148. Baker, Edwin. “Autonomy and Informational Privacy, or Gossip: The Central Meaning of the First Amendment.” Social Philosophy and Policy 21 (2004): 215-268. Bakich, Kathryn L. “Health Plans and Individual Rights to Privacy of Health Information, Resolving the Conflict.” Benefits Law Journal 12 (1999): 7-37. Balas, J. L. “How Should Privacy be Protected in the Electronic Library?” Computers in Libraries 21 (2001): 53-55. 295 Ball, Howard. No Pledge of Privacy: The Watergate Tapes Litigation, 1973 1974. Port Washington, NY: Kennikat, 1977. Barajas Ochoa, Rosa Elvia, and Massieu Trigo, Yolanda Cristina. “The Human Genome Project. A Challenge for Science, but a Dilemma for Humanity.” Sociologica 12 (1997): 119-154. Barnes, J A. Who Should Know What? Social Science, Privacy and Ethics. Cambridge University Press, 1980. Baxter, John D. State Security, Privacy and Information. Harvester Wheatsheaf, 1990. Bayer, Ronald. “AIDS, Privacy, and Responsibility.” Daedalus 118 (1989): 79-99. Bazillion, R J. “The Effect of Access and Privacy Legislation on the Conduct of Scholarly Research in Canada.” Social Science Information Studies 4 (1984): 5-14. Bazillion, Richard J. “Freedom of Information: A Canadian Dilemma.” Round Table, 288 (1983): 382-394. Beardsly, Elizabeth. “Privacy: Autonomy and Selective Disclosure.” In Privacy: Nomos XIII, ed. J. Roland Pennock and John W. Chapman, 56-70. New York: Atherton Press, 1971. Beauchamp, Tom L. “The Right to Privacy and the Right to Die.” Social Philosophy and Policy 17 (2000): 276-292. Beauchamp, Tom L (Ed.). Ethical Issues in Social Science Research. Baltimore: Johns Hopkins Press, 1982. Bebbington, L. W. “Managing Content: Licensing, Copyright and Privacy Issues in Managing Electronic Resources.” Legal Information Management 1 (2001): 4-12. Beck, Robert N. “The Right of Professional Privacy.” Personalist 55 (1974): 145-150. Bedi, Sonu. “Repudiating Morals Legislation: Rendering the Constitutional Right to Privacy Obsolete.” Cleveland State Law Review 53 (2005): 447 Beigler, Jerome S. "Privacy and Confidentiality." Law and Ethics in the Practice of Psychiatry, ed. Charles K. Hofling. New York: Brunner Mazel, 1981. 69-90. Belair, R. R., Lowe, T. C., Fisher, P. L., and Neier, A. “Freedom of Information vs. Privacy: an Information Dilemma.” Bulletin of the Medical Library Association 3 (1976): 13-21. Belair, Robert C. “Less Government Secrecy and More Personal Privacy? Experience with the Freedom of Information and Privacy Acts.” Civil Liberties Review 4 (1977): 10-18. Belair, Robert R. Privacy and Juvenile Justice Records. Washington, DC: United States Bureau of Justice Statistics, 1982. Belanger, F., Hiller, J. S., and Smith, W. J. “Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes.” Journal of Strategic Information Systems 11 (2002): 24570. 296 Beling, Craig T. “Transborder Data Flows: International Privacy Protection and the Free Flow of Information.” Boston College International and Comparative Law Review 6 (1983): 591-624. Bellman, Beryl L. “The Paradox of Secrecy.” Human Studies 4 (1981): 1-24. Beloff, Michael. “The Inquisitive Society: Towards the Right of Privacy.” Encounter 35 (1970): 4957. Benhabib, Seyla. “Feminist Theory and Hannah Arendt's Concept of Public Space.” History of the Human Sciences 6 (1993): 97-114. Bennett, C. H., Brassard, G., Crepeau, C., and Maurer, U. M. “Generalized Privacy Amplification.” IEEE Transactions on Information Theory 41 (1995): 1915-1923. Bennett, C. H., Brassard, G., and Robert, J. M. “Privacy Amplification by Public Discussion.” Siam Journal of Computing 17 (1988): 210-229. Bennett, Colin J. “Arguments for the Standardization of Privacy Protection Policy: Canadian Initiatives and American and International Responses.” Government Information Quarterly 14 (1997):351-62. Bennett, Colin J. “Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.” Science, Technology, and Human Values 16 (1991): 51-69. Bennett, Colin J. Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Ithaca, N.Y.: Cornell U. Pr., 1992. Bennett, Colin J., and Raab, Charles D. “The Adequacy of Privacy: The European Union Data Protection Directive and the North American response.” Information Society 13 (1997):245-63. Bennett, Collin J., and Raab, Charles D. “The Governance of Privacy: Policy Instruments in Global Perspective.” Information Polity 8 (2003): 80-84. Bennett, Colin J. “Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web.” Ethics and Information Technology 3 (2001): 197-210. Bentley, Eric Jr. “Towards an International Fourth Amendment: Rethinking Searches and Seizures Abroad after Verdugo Urquidez.” Vanderbilt Journal of Transnational Law 27 (1994): 329-417. Ben Ze'ev, Aaron. “Privacy, Emotional Closeness, and Openness in Cyberspace.” Computers in Human Behavior 19 (2003): 451-467. Benn, Stanley. “Privacy, Freedom, and Respect for Persons.” In Privacy: Nomos XIII, ed. J. Roland Pennock and John W. Chapman, 1-26. New York: Atherton Press, 1971. Benn, Stanley. “Protection and Limitation of Privacy.” Australian Law Journal 52 (1978): 601. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. 297 Benn, Stanley. “Private and Public Morality: Clean Living and Dirty Hands.” 155-182. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. Benn, Stanley and G. Gaus. “The Liberal Conception of the Public and the Private.” Benn, Stanley and G. Gaus eds. Public and Private in Social Life. 31-66. New York: St. Martin’s Press, 1983. Berardo, Felix M. “Family Privacy: Issues and Concepts.” Journal of Family Issues 19 (1998): 4-19. Berman, J., and Goldman, J. A Federal Right of Information Privacy: The Need for Reform. Washington, DC: Benton Foundation, 1989. Bertot, John Carlo, Jaeger, Paul T., and McClure, Charles R. “The Impact of the USA Patriot Act on Collection and Analysis of Personal Information Under the Foreign Intelligence Surveillance Act.” Government Information Quarterly 20 (2003): 295-314. Bibas, Steven A. "A Contractual Approach to Data Privacy." Harvard Journal of Law and Public Policy 17 (1994): 591-605. Bible, Jon D. “When Employers Look for Things Other than Drugs: The Legality of AIDS, Genetic, Intelligence, and Honesty Testing in the Workplace.” Labor Law Journal 41 (1990): 195-213. Biddle, Andrea K. Public Health, Privacy, and Politics: HIV Partner Notification. Rand Corp, 1991. Bier, William, ed. Privacy. New York: Fordham University Press, 1980. Bierman, A.K. “Spying, Liberalism, and Privacy.” Journal of Social Philosophy 5 (1974): 11-14. Bigelow, R. P. “Computers and Privacy: An American Perspective.” Information Age 8 (1986): 134140. Bishop, Nicole. “Trust Is Not Enough: Classroom Self Disclosure and the Loss of Private Lives.” Journal of Philosophy of Education 30 (1996): 429-439. Black, Tricia E. “Taking Account of the World as it Will Be: The Shifting Course of U.S. Encryption Policy.” Federal Communications Law Journal 53 (2001). Bloche, M. Gregg. “Managed Care, Medical Privacy, and the Paradigm of Consent.” Kennedy Institute of Ethics Journal 7 (1997): 381-386. Block, Lisa K., and Stokes, Garnett S. “Performance and Satisfaction in Private versus Non-private Work Settings.” Environment and Behavior 21 (1989): 277-297. Bloom, Alan. “The Right of Public Access to Information Submitted Under the Requirements of the Health Planning Act.” Public Health Reports 92 (1977): 411-413. Bloustein, Edward. Individual and Group Privacy. New Jersey: Transaction Books, 1978. Bloustein, Edward. “Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser.” New York University Law Review 39 (1964): 962-1007. Bloustein, Edward. “Group Privacy: The Right to Huddle.” Rutgers-Camden Law Journal 8 (1977): 219. 298 Blume, P. “Privacy as a Theoretical and Practical Concept.” International Review of Law, Computers and Technology 11 (1997): 193-202. Blyth, A. “Managing Security and Privacy Issues while Re-engineering the Healthcare Enterprise.” Health Informatics Journal 4 (1998): 157-66. Boag, Jordana. “The Battle of Piracy versus Privacy: How the Recording Industry Association of America (RIAA) Is Using the Digital Millennium Copyright Act (DMCA) As Its Weapon Against Internet Users' Privacy Rights.” California Western School of Law California Western Law Review 41 (2004): 241. Bocij, Paul. “Victims of Cyberstalking: An Exploratory Study of Harassment Perpetrated via the Internet.” First Monday 8 (2003). Boetzkes, Elisabeth. “Privacy, Property, and the Family in the Age of Genetic Testing: Observations from Transformative Feminism.” Journal of Social Philosophy 32 (2001): 301-316. Bogard, William. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge, England: Cambridge U Press, 1996. Boguscz, B., Davies, J. E., and Oppenheim, C. “Personal Information in UK Public Registers: Its Availability and Use.” Business Information Review 17 (2000): 82-96. Bok, Sissela. Secrets: On the Ethics of Concealment and Revelation. New York: Random House, 1983. Boling, Patricia. “Privacy as Autonomy vs. Privacy as Familial Attachment: A Conceptual Approach to Right of Privacy Cases.” Policy Studies Review 13 (1994): 91-110. Boling, Patricia. Privacy and the Politics of Intimate Life. Itahca, NY: Cornell University Press, 1996. Bonnicksen, Andrea L. “Commentaries on the Uses and Abuses of Genetic Knowledge.” Journal of Health Politics, Policy and Law 20 (1995): 795-802. Booms, Hans. “Privacy and Access to Federal Records in the Federal Republic of Germany.” Indian Archives 35 (1986): 1-5. Boone, C. Keith. “Privacy and Community.” Social Theory and Practice 9 (1983): 1-30. Bork, R.,. The Tempting of America: The Political Seduction of the Law. New York: Simon and Schuster, 1990. Borna, Shaheen, and Avila, Stephen. “Genetic Information: Consumers' Right to Privacy Versus Insurance Companies' Right to Know a Public Opinion Survey.” Journal of Business Ethics 19 (1999): 355-362. Borovoy, A. Alan. “Bugging Canada: The Protection of Privacy and the Wiretap Law.” Perception 1 (1978): 28-30. Borovoy, A. Alan. When Freedoms Collide: The Case for our Civil Liberties. London: Lester, 1988. 299 Boruch, Robert F. “Methods for Resolving Privacy Problems.” Ethical Issues in Social Science Research, ed. Tom L. Beauchamp. Baltimore: Johns Hopkins University Press, 1982. 292-314. Bostwick, Gary L. “Privacy of Personal Information: California Faces the Issues.” Public Affairs Report 18 (1977): 1-6. Botan, C. “Communication Work and Electronic Surveillance: A Model for Predicting Panoptic Effects.” Communication Monographs 63 (1996): 293-313. Botkin, Jeffrey R. “Fetal Privacy and Confidentiality.” The Hastings Center Report 25 (1995): 32-39. Bouchard, Robert F, and Franklin, Justin D. Guidebook to the Freedom of Information and Privacy Acts. New York: Clark Boardman Company Ltd, 1980. Bovard, James. Terrorism and Tyranny: Trampling Freedom, Justice, and Peace to Rid the World of Evil. New York: Palgrave MacMillan, 2003. Boyd, John. “Privacy: No Longer a Personal Matter.” Journal of the American Chamber of Commerce in Japan 23 (1986):1. Boyes-Watson, Carolyn. “Record-keeping as a Technology of Power.” Berkeley Journal of Sociology 39 (1994-1995): 1-32. Boyle, James. Shamans, Software, and Spleens. Cambridge Mass.: Harvard University Press, 1996. Boyne, Roy. “Post Panopticism.” Economy and Society 29 (2000): 285-307. Brandt, D. S. “Insecurity on the Net.” Computers in Libraries 18 (1998): 34-37. Branscomb, Anne W. Who owns information? From privacy to Public Access. New York: Basic Books/Harper Collins, 1994. Branscomb, Anne W. “Law and Culture in the Information Society.” Information Society 4 (1986): 279-311. Breckenridge, Adam C. “Personal Privacy and the Public Interest.” Humanitas 11 (1975): 75-83. Brenkert, George G. “Privacy, Polygraphs, and Work.” Business and Professional Ethics Journal 1 (1981): 19-36. Brennan, Geoffrey. “The Economy of Privacy: Institutional Design in the Economy of Esteem.” Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008): 23-51. Brenner, Susan. “The Privacy Privilege: Law Enforcement, Technology, and the Constitution.” Journal of Technology Law & Policy 7 (2002): 123-194. Bricke, John. “Privacy and the Mental in Ryle’s ‘Concept of Mind.’” Southwestern Journal of Philosophy 3 (1972): 45-54. Brill, Alida. Nobody's Business: Paradoxes of Privacy. Addison Wesley, 1990. Brin, David. The Transparent Society. Perseus Books, 1998. 300 Brockett, Patrick L, and Tankersley, E. Susan. “The Genetics Revolution, Economics, Ethics and Insurance.” Journal of Business Ethics 16 (1997): 1661-1676. Bronaugh, Richard, ed. Philosophical Law: Authority, Equality, Adjudication and Privacy. Westport, CT: Greenwood Press, 1978. Brown, George E. Jr. “Federal Information Policy: Protecting the Free Flow of Information.” Government Information Quarterly 4 (1987): 349-358. Brown, William S. “Ontological Security, Existential Anxiety and Workplace Privacy.” Journal of Business Ethics 23 (2000): 61-65. Brown, William S. “Technology, Workplace Privacy and Personhood.” Journal of Business Ethics 15 (1996): 1237-1248. Brunnstein, K. “Threats To Individual Privacy and Enterprise Security and Experiences with Internet Insafety and Insecurity.” International Information and Library Review 29 (1997): 269-270. Bruras, S. “The Journalist and ‘The Other’: A Normative Perspective on Respect for Privacy in the Ethics of Journalism.” Nordicom Review 1 (1996): 171-180. Bryant, Barbara Everitt, and Dunn, William. “The Census and Privacy.” American Demographics 17 (1995): 48-54. Bucar, Bojko. “The Invasion of Privacy of Public Officials in Early United States Jurisdiction.” Javnost/The Public 7 (2000): 91-106. Bulmer, Martin (ed.). Censuses, Surveys and Privacy. London: Macmillan, Holmes and Meier, 1979. Bulmer, Martin, and Bell, Jennifer. “The Press and Personal Privacy: Has it Gone Too Far.” Political Quarterly 56 (1985): 5-22. Bunker, M. D., and Splichal, S. L. “Relational Privacy Cases and Freedom of Information.” Newspaper Research Journal 18 (1997): 109-121. Bunker, M., and Perry, S. “Privacy Exemptions and the Press Under the FOIA.” Newspaper Research Journal 16 (1995): 84-94. Bunyan, Tony. “Telecommunications Surveillance: End of a Chapter.” Cultures et Conflits 46 (2001): 65-116. Burch, Robert. “Royce and Wittgenstein on the Context of Privacy.” History of Philosophy Quarterly 5 (1988): 287-304. Burger, Robert H (ed.). “Privacy, Secrecy, and National Information Policy.” Library Trends 35 (1986): 3-182. Bushell, C J “Privacy versus Policy, Precedent and Expediency.” Australian Computer Journal 15 (1983): 151-155. 301 Byrnes, S. J. “Privacy vs. Publicity: Flip Sides of the Same Coin?” Public Relations Review 16 (1990): 29-35. Cain, R M. “Global Privacy Concerns and Regulation: Is the United States a World Apart?” International Review of Law, Computers and Technology 16 (2002): 23-34. Calvert, Clay. “Voyeur War? The First Amendment, Privacy, and the Images from the War on Terrorism.” Journal Fordham Intellectual Property, Media & Entertainment Law Journal 15 (2005): 147. Calvert, Clay. “Victories for Privacy and Losses for Journalism? Five Privacy Controversies for 2004 and their Policy Implications for the Future of Reportage.” Journal of Law and Policy 13 (2005): 649. Calvert, Clay and Richards, Robert D. “Suing the Media, Supporting the First Amendment: The Paradox of Neville Johnson and the Battle for Privacy.” Albany Law Review Albany Law Review 76 (2004): 1097. Caming, H. W.W. “Protection of Personal Data in the United States.” The Information Society 3 (1984): 113-130. Camp, L. J. “Web Security and Privacy: An American perspective.” Information Society 15 (1999): 249-256. Campbell, Duncan, and Connor, Steve. On the Record: Surveillance, Computers and Privacy, the Inside Story. London: Joseph, 1986. Campbell, J. E., and Carlson, M. “Panopticon.com: Online Surveillance and the Commodification of Privacy.” Journal of Broadcasting & Electronic Media 46 (2002): 586-606. Caplan, Arthur L. “On Privacy and Confidentiality.” Ethical Issues in Social Science Research, ed. Tom L. Beauchamp. Baltimore: Johns Hopkins University Press, 1982. 315-328. Caplan, Arthur L. “The Right to Privacy when Lives are at Stake.” Troubling Problems in Medical Ethics, ed. Marc D. Basson. New York: Liss, 1981. 245-255. Capron, Alexander M. “Genetics and Insurance: Accessing and Using Private Information.” Social Philosophy and Policy 17 (2000): 235-275. Capron, Alexander Morgan. “Privacy: Dead and Gone?” Hastings Center Report 22 (1992): 43-45. Carney, Eliza Newlin. “Clashing over Clipper.” National Journal 25 (1993): 2184. Carracedo, Jose David. Expanding Surveillance Capabilities onto Cyber Society Activities: The Spanish Government's National Smart Card ID Project. Brisbane, Australia: International Sociological Association (ISA), 2002. Carson, John. “Defining and Protecting Civil Liberties.” Political Quarterly 41 (1970): 316-327. 302 Carson, A Scott. “Drug Testing and Privacy: Why Contract Arguments Do Not Work.” Business and Professional Ethics Journal 14 (1995): 3-22. Castiglione, Robert L. “Paul Weiss’ ‘Privacy’: The Rediscovery of Human Being.” Philosophy Today 28 (1984): 20-35. Cate, Fred H. Privacy in the Information Age. Bookings Institute Press. Washington, D.C., 1997. Caudill, E. M., and Murphy, P. E. “Consumer Online Privacy: Legal and Ethical Issues.” Journal of Public Policy & Marketing 19 (2000): 7-19. Cawkell, A. E. “Privacy, Security, and Freedom in the Information Society.” Journal of Information Science 4 (1982): 3-8. Chadwick, Ruth, Levitt, Mairi, and Shickle, Darren eds. The Right to Know and the Right not to Know. Brookfield: Avebury, 1997. Chadwick, Ruth, and Levitt, Mairi. "Mass Media and Public Discussion in Bioethics." The Right to Know and the Right not to Know, ed. Chadwick, Ruth. Brookfield: Avebury, 1997. Chaffey, Douglas Camp. “The Right to Privacy in Canada.” Political Science Quarterly 108 (1993): 117-32. Chalmers, J, Muir, R. “Patient Privacy and Confidentiality.” British Medical Journal 326 (2003): 725-6. Chalmers, Sandy. “Data Privacy: Impacts for Information Handling.” Records Management Bulletin 115 (2003): 19, 22-24. Chambers, Jean E. “Privacy, Sex, and Norms: An Indirect Control Definition.” Journal of Information Ethics 9 (2000): 10-25. Chamoux, Jean Pierre, and Chamoux, Francoise. “French Data Protection: The First Five Years.” Transnational Data Report on Information Politics and Regulation 7 (1984): 163-6. Chan, Ying Keung. “Privacy in the Family: Its Hierarchical and Asymmetric Nature.” Journal of Comparative Family Studies 31 (2000): 1-17. Chapman, John. “Personality and Privacy.” In Privacy: Nomos XIII, ed. J. Roland Pennock and John W. Chapman, 236-55. New York: Atherton Press, 1971. Chapman, John, and John W. Chapman eds. Privacy: Nomos XIII. New York: Atherton Press, 1971. Charlesworth, A. “Implementing the European Union Data Protection Directive 1995 in UK Law: The Data Protection Act 1998.” Government Information Quarterly 16 (1999): 203-40. Charlesworth, Andrew. “Law Enforcement and Libraries in the UK: Privacy, Proportionality and Good Practice.” Legal Information Management 3 (2003): 71-75. Charters, Darren. “Electronic Monitoring and Privacy Issues in Business Marketing: The Ethics of the DoubleClick Experience.” Journal of Business Ethics 35 (2002): 243-254. 303 Chartier, Roger, ed. A History of Private Life. Vol. 3: Passions of the Renaissance. Cambridge, MA: Harvard University Press, 1989. Chepaitis, E. “The Criticality of Information Ethics in Emerging Economies: Beyond Piracy and Privacy.” Journal of Information Ethics 9 (2000): 5-7. Chmara, T. “Privacy and Confidentiality Issues in Providing Public Access to the Internet.” Library Administration and Management 15 (2001): 20-2. Choldin, Harvey M. “Government Statistics: The Conflict Between Research and Privacy.” Demography 25 (1988): 145-54. Christensen, Rachel. “Privacy and Quality in Health Care.” Employee Benefit Research Institute Notes 21 (2000): 1-11. Cirasella, J. C. “At Odds?: Archives and Privacy.” Current Studies in Librarianship 24 (2000): 88-92. Claeys, Eric R. “The Private Society and the Liberal Public Good in John Locke's Thought.” Social Philosophy and Policy 25 (Summer 2008): 201-234. Clarke, R. “Person Location and Person Tracking: Technologies, Risks and Policy Implications.” Information Technology and People 14 (2001): 206-31. Clarke, R. “The Resistible Rise of the National Personal Data System.” Software Law Journal 5 (1992): 29-59. Clarke, Roger. “The Digital Persona and Its Application to Data Surveillance.” The Information Society 10 (1994): 77-92. Clarke, Simon. “Paternalism and Access to Medical Records.” Journal of Information Ethics 12 (2003): 80-91. Clement, Andrew. “Electronic Workplace Surveillance: Sweatshops and Fishbowls.” Canadian Journal of Information Science/Revue Canadienne des Sciences de l'Information 17 (1992): 1845. Cloud, Morgan. “The Fourth Amendment During the Lochner Era: Privacy, Property, and Liberty in Constitutional Theory.” Stanford Law Review 48 (1996): 555. Coenen Huther, Jacques. “The Domicile: Private and Public Spheres.” Cahiers Internationaux de Sociologie 38 (1991): 301-313. Cohen, Elliot D (ed). Philosophical Issues in Journalism. New York: Oxford University Press, 1992. Cohen, Jean L. "Is Privacy a Legal Duty?: Reconsidering Private Right and Public Virtue in the Domain of Intimacy." Public and Private: Legal, Political and Philosophical Perspectives, ed. Passerin d'Entreves, Maurizio. New York: Routledge, 2000. Cohen, Julie E. “Privacy, Visibility, Transparency, and Exposure.” The University of Chicago Law Review 75 (Winter, 2008):181-201 304 Cohen, Julie E. “The Law and Technology of Digital Rights Management: DRM and Privacy.” Berkley Technology Law Journal 18 (2003): 575. Colb, Sherry. “A World Without Privacy: Why Property does not Define the Limits of the Right Against Unreasonable Searches.” Michigan Law Review 102 (2004): 889. Collette, John. “Role Demands, Privacy and Psychological Well Being.” The International Journal of Social Psychiatry 30 (1984): 222-230. Collins, Tom A. “The Press Clause Construed In Context: The Journalists' Right of Access To Places.” Missouri Law Review 52 (1987): 751-802. Colman, Jim B. “Digital Photography and the Internet, Rethinking Privacy Law.” Journal of Intellectual Property Law 13 (2005): 205. Conklin, Kenneth R. “Privacy: Should there be a Right to it?” Educational Theory 26 (1976): 263270. Cooke, Maeve. “A Space of One's Own: Autonomy, Privacy, Liberty.” Philosophy and Social Criticism 25.1 (1999): 23-53. Cooley, Thomas. A Treatise on the Law of Torts. Chicago: Callaghan and Co., 1880. Coombs, Robert H., and West, Louis Jolyon eds. Drug Testing: Issues and Options. Oxford University Press, 1991. Coontz, Stephanie. The Social Origins of Private Life: A History of American Families 1600-1900. New York, NY: Verso, 1988. Cooper, S. “Common Law, and Privacy in Computer Mediated Environments.” New Jersey Journal of Communication 5 (1997): 167-177. Cooper, S. “Privacy and the News Media.” New Jersey Journal of Communication 3 (1995): 103-117. Cordell, Arthur J. “Preparing for the Challenges of the New Media.” The Futurist 25 (1991): 20-24. Corlett, J Angelo. “The Nature and Value of the Moral Right to Privacy.” Public Affairs Quarterly, 16 (2002): 329-350. Corley, S. “Rights of Privacy and Publicity in Advertising: Consent, Actionable Depictions, and First Amendment Limitations.” Annual Survey of American Law 1985 3 (1986): 585-602. Corn, Robert L. “Wireless tapping.” Reason 17 (1985): 20-9. Cornford, James. “The Prospects for Privacy.” Political Quarterly 52 (1981): 295-313. Cox, Gloria. “Implementation of the Routine Use Clause of the Privacy Act.” Policy Studies Review 10 (1991-1992): 42-50. Cozzetto, Don A, and Pedeliski, Theodore B. “Privacy and the Workplace: Technology and Public Employment.” Public Personnel Management 26 (1997): 515-27. 305 Crabb, Peter B. “Video Camcorders and Civil Inattention.” Journal of Social Behavior and Personality 11 (1996): 805-816. Craige, Burton. “Constitutional law – Rennie v. Klein: Constitutional Right of Privacy Protects a Mental Patient's Refusal of Psychotropic Medication.” North Carolina Law Review 57 (1979): 1481-97. Cranford, Michael. “Drug Testing and the Right to Privacy: Arguing the Ethics of Workplace Drug Testing.” Journal of Business Ethics 17 (1998): 1805-1815. Cranor, Lorrie (ed.) “Special Section: Computers, Freedom, and Privacy.” Information Society 18 (2002): 153-79. Crawford, Kimberly A. “Sneak and Peek Warrants: Legal Issues Regarding Surreptitious Searches.” FBI Law Enforcement Bulletin 66 (1997): 27-32. Crowley, Donald, and Johnson, Jeffrey L. “Balancing and the Legitimate Expectation of Privacy.” Saint Louis University Public Law Review 7 (1988): 337-58. Crozier, W Ray. “Blushing and the Exposed Self: Darwin Revisited.” Journal for the Theory of Social Behaviour 31 (2001): 61-72. Culnan, M. J. “Protecting Privacy Online: Is Self-regulation Working?” Journal of Public Policy & Marketing 19 (2000): 20-26. Culnan, Mary J, and Bies, Robert J. “Consumer Privacy: Balancing Economic and Justice Considerations.” Journal of Social Issues 59 (2003): 323-342. Culver, Charles. “Privacy.” Professional Ethics 3 (1994): 3-25. Cuozzi, W. F., and Sporn, L. “Private Lives and Public Concerns: The Decade since Gertz v Robert Welch, Inc.” Brooklyn Law Review 51 (1985): 425-478. Curry, Michael R. “Digital People, Digital Places: Rethinking Privacy in a World of Geographic Information.” Ethics and Behavior 7 (1997): 253-263. Dahl, M. K. “Privacy and Databases: A Question of Dignity.” Government Data Systems 17 (1988): 4-6. Dam, Shubhanker. “Remedying a Technological Challenge: Individual Privacy and Market Efficiency.” Albany Law Journal of Science & Technology Albany Law Journal of Science & Technology 15 (2005): 337. Dana, Jane Tucker. “Copyright and Privacy Protection of Unpublished Works: The Author's Dilemma.” Columbia Journal of Law and Social Problems 13 (1977): 351-408. Dandekar, Natalie. “Privacy: An Understanding for Embodied Persons.” Philosophical Forum 24 (1993): 331-348. Daniels, Charles B. “Privacy and Verification.” Analysis 48 (1988): 100-102. 306 Danielson, Caroline. “The Gender of Privacy and the Embodied Self: Examining the Origins of the Right to Privacy in U. S. Law.” Feminist Studies 25 (1999): 311-344. Danna, Anthony, and Gandy Jr., Oscar H. “All That Glitters Is Not Gold: Digging Beneath the Surface of Data Mining.” Journal of Business Ethics 40 (2002): 373-386. Davidson, D. M., and Kunkel, J. A. “The Developing Methodology for Analyzing Privacy Torts.” Hastings Communications and Entertainment Law Journal 6 (1983): 43-90. Davidson, Dan. “Employee Testing: An Ethical Perspective.” Journal of Business Ethics 7 (1988): 211-217. Davies, Eric, Dearnley, James, Hardy, Rachel, Iliffe, Ursula, Oppenheim, Charles, and Sturges, Paul. “User Privacy in the Digital Library Environment: An Investigation of Policies and Preparedness.” Library Management 24 (2003): 44-50. Davies, Simon. Big Brother: Australia's growing web of surveillance. Australia: Simon & Schuster, 1992. Davies, Martin. “Another Way of Being: Leisure and the Possibility of Privacy.” Philosophy of Leisure, ed. Tom Winnifrith. New York: St. Martin’s, 1989. 104-128. Davis, Andrew. “Do Children Have Privacy Rights in the Classroom?” Studies in Philosophy and Education 20 (2001): 245-254. Davis, Frederick. “What Do We Mean by ‘Right to Privacy’?” South Dakota Law Review 4(1959): 124. Davison, Scott A. “Privacy and Control.” Faith and Philosophy 14 (1997): 137-151. De Boni, Marco and Prigmore, Martyn. “A Hegelian Basis for Privacy as an Economic Right.” Contemporary Political Theory 3 (2004): 168-187. De Lint, Willem. “Arresting the Eye: Surveillance, Social Control and Resistance.” Space and Culture, 7.9 (2000): 21-49. De Munck, Jean. “The ‘Right to Privacy’ between Philosophy and Sociology.” Recherches Sociologiques 24 (1993): 45-68. DeCew, J. W. “In Pursuit of Privacy: Law, Ethics and the Rise of Technology.” Journal of Government Information 25 (1998): 307-8. DeCew, Judith Wagner. “Alternatives for Protecting Privacy while Respecting Patient Care and Public Health Needs.” Ethics and Information Technology 1 (1999): 249-255. DeCew, Judith Wagner. “Constitutional Privacy, Judicial Interpretation, and ‘Bowers versus Hardwick.’” Social Theory and Practice 15 (1989): 285-303. DeCew, Judith Wagner. “Defending the ‘Private' in Constitutional Privacy.” Journal of Value Inquiry 21 (1987): 171-184. 307 DeCew, Judith Wagner. “Drug Testing: Balancing Privacy and Public Safety.” Hastings Center Report 24 (1994): 17-25. DeCew, Judith Wagner. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Ithaca, NY: Cornell University Press, 1997. DeCew, Judith Wagner. “The Priority of Privacy for Medical Information.” Social Philosophy and Policy 17 (2000): 213-234. DeCew, Judith Wagner. “The Scope of Privacy in Law and Ethics.” Law and Philosophy 5 (1986): 145-173. DeCew, Judith Wagner. “Privacy and Policy for Genetic Research.” Ethics and Information Technology 6 (2004): 4-14. Deflem, Mathieu. “Surveillance and Criminal Statistics: Historical Foundations of Governmentality.” Studies in Law, Politics, and Society 17 (1997): 149-184. Denning, Dorothy E. “The case for ‘Clipper.’" Technology Review 98 (1995): 48-55. Dennis, J. C. “Privacy and Confidentiality of Health Information.” Journal of Government Information 28.3 (2001): 344-6. DePaulo, Bella M., Chris Wetzel, R. Weylin Sternglanz, and Molly J. Walker Wilson. “Verbal and Nonverbal Dynamics of Privacy, Secrecy, and Deceit.” Journal of Social Issues 59 (2003): 391412. Derlega, Valerian J., Metts, Sandra, Petronio, Sandra, and Margulis, Stephen T. Self Disclosure. Newbury Park, CA: SAGE Publications, Inc., 1993. Desai, M. S., Richards, T. C., Desai, K. J. “E-commerce Policies and Customer Privacy.” Information Management and Computer Security 11 (2003): 19-27. Dhillon, G. S., and Moores, T. T. “Internet Privacy: Interpreting Key Issues.” Information Resources Management Journal 14 (2001): 33-7. Diefenbach, Donald L. “The Constitutional and Moral Justifications for Copyright.” Public Affairs Quarterly 8 (1994): 225-235. Diffie, Whitfield, and Landau, Susan. Privacy on the Line: The Politics of Wiretapping and Encryption. M.I.T. Press, 1998. Dionisopoulos, P. Allan, and Craig Ducat. The Right to Privacy: Essays and Cases. St. Paul: West Publishing Co., 1976. Donos, P., and Zorkadis, V. “On Biometrics Based Authentication and Identification From A Privacy Protection Perspective: Deriving Privacy Enhancing Requirements.” Information Management and Computer Security 12 (2004): 125-137. 308 Doss, Arden, and Diane Kay Doss. “On Morals, Privacy, and the Constitution.” University of Miami Law Review 25 (1971): 395-419. Doss, Erini, and Loui, Michael C. “Ethics and the Privacy of Electronic Mail.” Information Society 11 (1995): 223-35. Douard, John W. “AIDS, Stigma, and Privacy.” AIDS & Public Policy Journal 5 (1990): 37-41. Doyle, Rodger. “Privacy in the workplace.” Scientific American 280 (1999): 36. Draper, Elaine. “Privacy Rights, Stigma, and Genetic Screening.” Forum for Applied Research and Public Policy 8 (1993): 19-22. Draper, Hayward L. “Privacy and Police Intelligence Data Banks: A Proposal To Create A State Organized Crime Intelligence System and to Regulate the Use of Criminal Intelligence Information.” Harvard Journal on Legislation 14 (1976): 1-110. Dromm, Keith. “Love and Privacy.” Journal of Applied Philosophy 19 (2002): 155-167. Duddy, Thomas. “Privacy, Self Knowledge, and the Inner Eye: The Cartesian Project Revisited.” History of European Ideas 21 (1995): 515-526. Duff, Karl J., and Johnson, Eric T. “A Renewed Employee Right to Privacy.” Labor Law Journal 34 (1983): 747-62. Duis, Perry R. “No Time for Privacy: World War II and Chicago's Families.” The War in American Culture: Society and Consciousness During World War II, Erenberg, Lewis A., & Hirsch, Susan E. eds. Chicago, IL: U Chicago Press, 1996. 17-45. Dumsday, Travis. “Group Privacy and Government Surveillance of Religious Services.” Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008):170-186, Duncan, George T (ed.). Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics. National Academy Press, 1993. Duncan, George T, and Kaufman, Sanda. “Who Should Manage Information and Privacy Conflicts?: Institutional Design for Third Party Mechanisms.” The International Journal of Conflict Management 7 (1996): 21-44. Duvall Early, Kimberly, and James O. Benedict. “The Relationship Between Privacy and Different Components of Job Satisfaction.” Environment and Behavior 24 (1992): 670-680. Dworkin, Gerald. “Privacy and the Law.” In Privacy, ed. John Yound, 113-36. New York: John Wiley and Sons, 1978. Ebbinghouse, C. “Big Brother Invades the Campus and Workplace: Infotainment and the Copyright Cops.” Searcher 11 (2003): 18-23. Ebers, Stephanie. “The Right of Privacy and Minors' Confidential Access to Contraceptives.” New York Law School Human Rights Annual 2 (1984): 131-49. 309 Eddie, G. “E-mail, the Police, and the Canadian Charter of Rights and Freedoms: Retooling our Understanding of a Reasonable Expectation of Privacy in the Cyber Age.” International Review of Law, Computers and Technology 14 (2000): 63-78. Edgar, Harold, and Sandomire, Hazel. “Medical Privacy Issues in the Age of AIDS: Legislative Options.” American Journal of Law and Medicine 16 (1990): 155-222. Edgley, Charles, and Brissett, Dennis. “A Nation of Meddlers.” Society 32 (1995): 36-46. Elgesem, Dag. “Data Privacy and Legal Argumentation.” Communication and Cognition 28 (1995): 91-111. Elgesem, Dag. “The Structure of Rights in Directive 96/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data.” Ethics and Information Technology 1 (1999): 283-293. Elmer, Greg. “Spaces of Surveillance: Indexicality and Solicitation on the Internet.” Critical Studies in Mass Communication 14 (1997): 182-191. Elwood, John P. “Outing, Privacy, and the First Amendment.” Yale Law Journal 102 (1992): 747-76. Emerson, Thomas I. “The Right of Privacy and Freedom of the Press.” Harvard Civil Rights Civil Liberties Law Review 14 (1979): 329-60. Emmons, Donald C. “Ontological Privacy.” Personalist 51 (1970): 286-304. Engelhardt Jr. H. Tristram. “Privacy and Limited Democracy: The Moral Centrality of Persons.” Social Philosophy and Policy 17 (2000): 120-140. Engstrom, Timothy H. “Corporate Appropriation of Privacy: The Transformation of the Personal and Public Spheres.” Ethics and Behavior 7 (1997): 239-252. Entin, J. L. “Privacy, Emotional Distress, and the Limits of Libel Law Reform.” Mercer Law Review 38 (1987): 835-858. Epstein, Richard A. “Deconstructing Privacy: And Putting It Back Together Again.” Social Philosophy and Policy 17 (2000): 1-24. Escobar, C. B. “Nongovernmental Cryptology and National Security: The Government Seeking to Restrict Research.” Comparative Law Journal 4 (1984): 573-603. Etzioni, Amitai. “A Communitarian Perspective on Privacy.” Connecticut Law Review 32 (2000): 897. Etzioni, Amitai. “Identification Cards in America.” Society 36 (1999): 70-76. Etzioni, Amitai. The Limits of Privacy. New York: Basic Books, 1999. Etzioni, Amitai. “Medical Records: Enhancing Privacy, Preserving the Common Good.” Hastings Center Report 29 (1999): 14-23. 310 Etzioni, Amitai. “The First Amendment Is Not an Absolute Even on the Internet.” Journal of Information Ethics 6 (1997): 64-66. Evans, A. C. “European Data Protection Law.” American Journal of Comparative Law 29 (1981): 571-82. Evans, G. A. “The Human Genome Project and Public Policy.” Public Understanding of Science 8 (1999): 161-168. Everett, Margaret. “The Social Life of Genes: Privacy, Property and the New Genetics.” Social Science and Medicine 56 (2003): 53-65. Fahey, Tony. “Privacy and the Family: Conceptual and Empirical Reflections.” Sociology 29 (1995): 687-702. Falls, M. Margaret. “Prisons and Privacy: A Moral Evaluation.” Freedom, Equality, and Social Change, ed. Peden, Creighton. Lewiston: Mellen Press, 1989. 312-323. Falls Corbitt, Margaret, and McClain, F Michael. “God and Privacy.” Faith and Philosophy 9 (1992): 369-386. Fairfield, Joshua A. T. “The New Internet Legislation's Hidden Threat to Privacy and Commerce.” Arizona State Law Journal 36 (2004): 1193. Falsone, A. M. “Privacy of Circulation Files.” Journal of Library Administration 7 (1986): 19-24. Farnsworth, David P. “Data Privacy: An American's View of European Legislation.” Transnational Data Report on Information Politics and Regulation 6 (1983): 285-90. Farrelly, Colin. “Genes and Social Justice: A Rawlsian Reply to Moore.” Bioethics 16 (2002): 72-83. Fazekas, Christopher P. “1984 is Still Fiction: Electronic Monitoring in the Workplace and U.S. Privacy Law.” Duke Law & Technology Review 15 (2004): Feiser, C. D. “Privatization and the Freedom of Information Act: An Analysis of Public Access to Private Entities under Federal Law.” Federal Communications Law Journal 52 (1999): 21-62. Felcher, Peter L, and Rubin, Edward L. “Privacy, Publicity, and the Portrayal of Real People by the Media.” Yale Law Journal 88 (1979): 1577-1622. Fenrich, William J. "Common Law Protection of Individuals' Rights in Personal Information." Fordham Law Review 65 (1996): 951-1004. Fenwick, Helen. Civil liberties. Cavendish Publishing Limited, 1994. Ferguson, Kenneth G. “Caller ID - Whose Privacy Is It, Anyway?” Journal of Business Ethics 29 (2001): 227-237. Fiatal, Robert A. “Lights, Camera, Action: Video Surveillance and the Fourth Amendment.” FBI Law Enforcement Bulletin 58 (1989): 23-31. 311 Fielding, Derek. “Librarians, Civil Liberties and Privacy.” Australian Library Journal 27 (1978): 181 189. Fifarek, Aimee. “Technology and Privacy in the Academic Library.” Online Information Review 26 (2002): 366-374. Finn, Paul. “Public Function – Private Action: A Common Law Dilemma. 93-112. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. Fish, Stanley. There's No Such Thing as Free Speech. Princeton University Press, 1994. Fisher, Linda E. “Guilt by Association: Political Profiling, Surveillance and the Privacy of Groups.” Arizona Law Review 46 (2004): 621. Flaherty, David H. Privacy and Government Data Banks: An International Perspective. London: Mansell, 1979. Flaherty, David H. Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States. Chapel Hill, NC: U of North Carolina Press, 1989. Flaherty, David H. “The Need for an American Privacy Protection Commission.” Government Information Quarterly 1 (1984): 235-58. Fletcher, Joseph F. “Mass and Elite Attitudes about Wiretapping in Canada: Implications for Democratic Theory and Politics.” The Public Opinion Quarterly 53 (1989): 225-245. Floridi L. “Four challenges for a theory of informational privacy.” Ethics and Information Technology 8 (2006): 109-119. Floridi L. “The Ontological Interpretation of Informational Privacy.” Ethics and Information Technology 7 (2005):185–200. Florini, Ann. “The End of Secrecy.” Foreign Policy 111 (1998): 50-63. Flory, J. “E-health Ethics, Privacy, and Security.” Medicine on the Net 9 (2003): 14-28. Flory, J. “Privacy and Patient Confidentiality: Special Focus.” Medicine on the Net 7 (2001): 13-27. Foddy, William H. “A Critical Evaluation of Altman's Definition of Privacy as a Dialectical Process.” Journal for the Theory of Social Behaviour 14 (1984): 297-307. Fogelberg, H. “Stateside: The Total Information Awareness System: Time to Get Paranoid?” Managing Information 10 (2003): 36-7. Fogelberg, H. “US Privacy and Global Business.” Managing Information 6 (1999): 24-5. Foner, Leonard N. “Technology and Political Artifacts: The CFP2000 Workshop on Freedom and Privacy by Design.” The Information Society 18 (2002): 153-163. Foot, Philippa. Natural Goodness. Oxford: Oxford University Press, 2001. 312 Forer, Lois G. A Chilling Effect: The Mounting Threat of Libel and Invasion of Privacy Actions to the First Amendment. Markham, Ontario, Canada: Penguin Books, 1987. Forester, Tom. and Morrison, Perry. Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing. Second Edition. MIT Press, 1990. Forester, Tom, and Morrison, Perry. “Computer Crime: New Problem for the Information Society.” Prometheus 8 (1990): 257-272. Fortner, R. S. “Physics and Metaphysics in an Information Age: Privacy, Dignity and Identity.” Communication 9 (1986): 151-172. Fox, Richard. “Someone to Watch over Us: Back to the Panopticon?” Criminal Justice 1 (2001): 251276. Foxman, E. R., and Kilcoyne, P. “Information Technology, Marketing Practice and Consumer Privacy: Ethical Issues.” Journal of Public Policy & Marketing 12 (1993): 106-119. Francis, Huw W. S. “Of Gossips, Eavesdroppers, and Peeping Toms.” Journal of Medical Ethics 8 (1982): 134-143. Francis, Leslie Pickering. “Privacy and Confidentiality: The Importance of Context.” Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008): 52-67. Fraser, John. “Community, the Private, and the Individual.” The Sociological Review 35 (1987): 795818. Freedman, Warren. The Right of Privacy in the Computer Age. Quorum Books, 1987. Freund, Paul. “Privacy: One Concept or Many?” In Privacy: Nomos XIII, ed. J. Roland Pennock and John W. Chapman, 182-98. New York: Atherton Press, 1971. Frey, R. G. “Privacy, Control, and Talk of Rights.” Social Philosophy and Policy 17 (2000): 45-67. Fried, Charles. “Privacy.” Yale Law Journal 77 (1968): 475-93. Friedman, Batya. “Social Judgments and Technological Innovation: Adolescents' Understanding of Property, Privacy, and Electronic Information.” Computers in Human Behavior 13 (1997): 327351. Friedman, David. “A World of Strong Privacy: Promises and Perils of Encryption.” Social Philosophy and Policy 13 (1996): 212-228. Friedman, David. “Privacy and Technology.” Social Philosophy and Policy 17 (2000): 186-212. Frist, Bill. “Open Sesame: Congress Must Establish Boundaries to Protect Privacy and Promote Ethical uses of New Genetic Information.” Forum for Applied Research and Public Policy 15 (2000): 44-8. Froomkin, A Michael. “Legal Issues in Anonymity and Pseudonymity.” Information Society 15 (1999): 113-27. 313 Gandy, O. H. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview Press, 1993. Gandy, O. H., and Simmons, C. E. “Technology Privacy and the Democratic Process.” Critical Studies in Mass Communication, 3.2 (1986): 155-168. Gandy, Oscar H., Jr. “African Americans and Privacy: Understanding the Black Perspective in the Emerging Policy Debate.” Journal of Black Studies 24 (1993): 178-195. Gandy, Oscar H., Jr. “The Surveillance Society: Information Technology and Bureaucratic Social Control.” Journal of Communication 39 (1989): 61-76. Gannon Leary. “`E' for exposed? E mail and privacy issues.” Electronic Library 15 (1997): 221-6. Garfinkel, S. “Database nation: the death of privacy in the Twenty-first century.” Telecommunications Policy 24 (2000): 625-8. Garfinkel, S., and Spafford, G. “Web Security, Privacy and Commerce.” Managing Information 9 (2002): 55. Garrett, Roland. “The Nature of Privacy.” Philosophy Today 18(1974): 263-284. Garrow, David J. Liberty and Sexuality: The Right to Privacy and the Making of Roe v. Wade. New York: Macmillan, 1994. Garrow, David J. “Privacy and the American Constitution.” Social Research 68 (2001): 55-82. Garzon Valdes, Ernesto. “Intimacy, Privacy and Publicity.” Analyse & Kritik 25 (2003): 17-40. Gastelaars, Marja. “The Water Closet: Public and Private Meanings.” Science as Culture 4 (1996): 483-505. Gates, K. A. “Wanted Dead or Digitized: Facial Recognition Technology and Privacy.” Television & New Media 3 (2002): 235-238. Gates, P. H. “Privacy and Access: The Inevitable Collision of Competing Values.” In Access Denied: Freedom Of Information In The Information Age, eds. Davis, C. N., and Splichal, S. L. Ames: Iowa State University Press, 2000. 103-119. Gaus, Gerald. “Public and Private Interests in Liberal Political Economy, Old and New.” Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. Gauthier, C. C. “Privacy Invasion by the News Media: Three Ethical Models.” Journal of Mass Media Ethics 17 (2002): 20-34. Gavison, Ruth. “Privacy and the Limits of Law.” Yale Law Journal 89 (1980): 421-71. Gavison, Ruth. “Information Control: Availability and Control.” 113-134. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. Gellman, R. “Perspectives on Privacy and Terrorism: All is Not Lost – Yet.” Government Information Quarterly 19 (2002): 255-64. 314 Gellman, R. “Taming the Privacy Monster: A Proposal for a Non-regulatory Privacy Agency.” Government Information Quarterly 17 (2000): 235-41. Gellman, Robert. “Public Records: Access, Privacy, and Public Policy: A Discussion Paper.” Government Information Quarterly 12 (1995): 391-426. Gerber, Scott D. “Privacy and Constitutional Theory.” Social Philosophy and Policy 17 (2000): 165185. Gerety, Tom. “Redefining Privacy.” Harvard Civil Rights Civil Liberties Law Review 12 (1977): 23396. Gerlach, Julie Waltz. “What Should IRBs Consider When Applying the Privacy Rule to Research?” Kennedy Institute of Ethics Journal 12 (2002): 299-303. Gernstein, Robert S. “Privacy and Self Incrimination.” Ethics 80 (1970): 87-101. Gerstein, Robert S. “Intimacy and Privacy.” Ethics 89 (1978): 76-81. Ghosh Dastidar, Koyeli. “Respect for Privacy: Western and Indian.” Journal of Indian Council of Philosophical Research 88: 101-109. Giglio, Ernest D. “Privacy, the News Media, and the Courts.” Political Communication and Persuasion 1 (1981): 231-55. Giglio, Ernest. Rights, Liberties and Public Policy. Ashgate Publishing Company Ltd., 1995. Gilliom, John. Surveillance, Privacy, and the Law: Employee Drug Testing and the Politics of Social Control. University of Michigan Press, 1994. Gillis, Jonathan. “Privacy Rights and Satellite Broadcasts.” Israel Law Review 27 (1993): 384-414. Gillis, R P, and Riley, T B. “Privacy in the Information Age: A Handbook for Government and Industry Professionals.” Journal of Government Information 24 (1997): 449-50. Gimenex, Enrique J. “Who Watches the Watchdogs?: The Status of Newsgathering Torts Against the Media in Light of the Food Lion Reversal.” Alabama Law Review 52 (2001): 675. Giner, Salvador. “The Withering Away of Civil Society?” Praxis International 5 (1985): 247-267. Ginsberg, Robert. “The Right to Privacy vs. Government Need to Know.” Journal of Social Philosophy 4 (1973): 5-8. Givens, Beth. The Privacy Rights Handbook. Avon Books, 1997. Glaser, P. E., and Brender, M. E. “The First Amendment in Space: News Gathering from Satellites.” Issues in Science and Technology 3 (1986): 60-67. Glasser, T. L. “Resolving the Press Privacy Conflict: Approaches to the Newsworthiness Defense.” Communications and the Law 4 (1982): 23-42. Glasser, Theodore L., and Jassem, Harvey. “Indecent Broadcasts and the Listener's Right of Privacy.” Journal of Broadcasting 24 (1980): 285-99. 315 Glenn, Richard A. The Right to Privacy: Rights and Liberties Under the Law. ABC CLIO, Inc., 2003. Glover, B. “Internet Policy Issues Debated at Ninth Conference on Computers, Freedom and Privacy.” Library Hi Tech News 17 (2000): 10-13. Godsey, Mark A. “Privacy and the Growing Plight of the Homeless: Reconsidering the Values Underlying the Fourth Amendment.” Ohio State Law Journal 53 (1992): 869-89. Goldman, Janlori. “Protecting Privacy to Improve Health Care.” Health Affairs 17 (1998): 47-60. Goold, Benjamin J. “Privacy Rights and Public Spaces: CCTV and the Problem of the ‘Unobservable Observer.’” Criminal Justice Ethics 21 (2002): 21-27. Gordon, Diana R. “The Electronic Panopticon: A Case Study of the Development of the National Criminal Records System.” Politics & Society 15 (1986-87): 483-511. Gordon Till, J. “Right to privacy?” Information World Review 175 (2001): 20. Gostin, Lawrence O. “Health Information Privacy.” Cornell Law Review 80 (1995): 451-528. Gotterbarn, Donald. “Privacy Lost: The Net, Autonomous Agents, and 'Virtual Information.'” Ethics and Information Technology 1 (1999): 147-154. Gould, James. “Abortion: Privacy versus Liberty.” Journal of Social Philosophy (1990): 98-106. Graber, Doris A. “Potholes along America's Public Information Superhighway.” Research in Political Sociology 7 (1995): 299 324. Grace, John W. “Protecting Privacy: A Growth Industry.” Canadian Business Review 11 (1984): 2830. Gray, Susan H. “Electronic Data Bases and Privacy: Policy for the 1990s.” Science, Technology, and Human Values 14 (1989): 242-257. Grcic, Joseph M. “The Right to Privacy: Behavior as Property.” Journal of Value Inquiry 20 (1986): 137-144. Green, Rachel. “Privacy in the Government Workplace: Employees’ Fourth Amendment and Statutory Rights to Privacy.” Cumberland Law Review 35 (2004): 639. Green, Richard. “(Serious) Sadomasochism: A Protected Right of Privacy?” Archives of Sexual Behavior 30 (2001): 543-550. Greenawalt, Kent. “Privacy and its Legal Protections.” Hastings Center Studies 2 (1974): 45-68. Greenlaw, Paul S., and Prundeanu, Cornelia. “The Impact of Federal Legislation to Limit Electronic Monitoring.” Public Personnel Management 26 (1997): 227-44. Griffin, James. “The Human Right to Privacy.” San Diego Law Review 44 (Fall 2007): 697-721. Grijpink, J. “Chain Computerization for Better Privacy Protection.” Information Infrastructure and Policy 6 (1997-1999): 95-107. 316 Grimshaw, Allen D. “Whose Privacy? What Harm?” Sociological Methods and Research 11 (1982): 233-47. Gritzalis, Dimitris A. “Embedding Privacy in IT Applications Development.” Information Management and Computer Security 12 (2004): 8-26. Gross, Emanuel. “The Struggle of a Democracy Against Terrorism--Protection of Human Rights: The Right to Privacy Versus the National Interest--the Proper Balance.” Cornell International Law Journal 27 (2004). Gross, Hyman. “The Concept of Privacy.” New York University Law Review 42 (1967): 34-54. Gross, Hyman. “Privacy and Autonomy.” In Privacy: Nomos XIII, ed. J. Roland Pennock and John W. Chapman, 169-81. New York: Atherton Press, 1971. Grossman, Garry S. “Transborder Data Flow: Separating the Privacy Interests of Individuals and Corporations.” Northwestern Journal of International Law and Business 4 (1982): 1-36. Guenther, K. “Pass the Cookies and Uphold the Privacy.” Computers in Libraries 21 (2001): 56-8. Guirguis, Max. “Electronic Visual Surveillance and the Reasonable Expectation of Privacy.” Journal of Technology Law & Policy 9 (2004): 143. Gumpert, Gary, and Susan J. Drucker. “Public Boundaries: Privacy and Surveillance in a Technological World.” Communication Quarterly 49 (2001): 115-130. Gumpert, Gary, and Susan J. Drucker. “The Demise of Privacy in a Private World: From Front Porches to Chat Rooms.” Communication Theory 8 (1998): 408. Gurak, Laura J. Persuasion and Privacy in Cyberspace: The Online Protests over Lotus MarketPlace and the Clipper Chip. Yale University Press, 1997. Hafen, Bruce C. “The Constitutional Status of Marriage, Kinship, and Sexual Privacy: Balancing the Individual and Social Interests.” Michigan Law Review 81 (1983): 463-574. Hager, Barry M. “Privacy Commission Urges New Controls on Data Held by Private Groups.” Congressional Quarterly Weekly Report 35 (1977): 1527-8. Haggerty, Kevin D., and Ericson, Richard V. “The Surveillant Assemblage.” The British Journal of Sociology 51 (2000): 605-622. Hallborg, Robert B., Jr. “Principles of Liberty and the Right to Privacy.” Law and Philosophy 5 (1986): 175-218. Hallie, Philip P. “The Privacy of Experience.” Journal of Philosophy 58 (1961): 337-345. Hallinan, Kathleen M. “Invasion of Privacy or Protection Against Sexual Harassment: Co-employee Dating and Employer Liability.” Columbia Journal of Law and Social Problems 26 (1993): 43564. 317 Halper, Thomas. “Privacy and Autonomy: From Warren and Brandeis to ‘Roe’ and ‘Cruzan.’” Journal of Medicine and Philosophy 21 (1996): 121-135. Halpern, Sheldon W. The Law of Defamation, Privacy, Publicity, and Moral Right. Third Edition. JPM Books, Columbus, OH, 1995. Halpin, Edward, and Wright, Steve. “The Hidden Dimensions of Global Information Networks: What Price Privacy?” Canadian Journal of Information and Library Science/Revue Canadienne des Sciences de l'Information et de Bibliotheconomie 25 (2000): 23-39. Halstuk, M. E. “When is an Invasion of Privacy Unwarranted under the FOIA?: An Analysis of the Supreme Court’s ‘Sufficient Reason’ and ‘Presumption of Legitimacy’ Standards.” Florida Journal of Law and Public Policy 16 (2005): 361. Halstuk, M. E. “Blurred Vision: How Supreme Court FOIA Opinions on Invasion of Privacy have Missed the Target of Legislative Intent.” Communication Law and Policy 4 (1999): 111-148. Hancock, Graeme. “California's Privacy Act [of 1974]: Controlling Government's use of Information.” Stanford Law Review 32 (1980): 1001-38. Hanus, Jerome J. “A Right of Information Privacy.” Policy Studies Journal 4 (1975): 136-141. Hare, Willis H. Security, Privacy and New Technology. Santa Monica, CA: Rand Corporation, 1981. Harper, Phillip Brian. Private Affairs: Critical Ventures in the Culture of Social Relations. New York: New York University Press, 1999. Hart, G. W. “Residential Energy Monitoring and Computerized Surveillance via Utility Power Flows.” IEEE Technology and Society Magazine 8 (1989): 12-16. Harter, Stephen, and Busha, Charles. “Libraries and Privacy Legislation.” Library Journal 101 (1976): 475-481. Hartman, John Dale. Legal Guidelines for Covert Surveillance Operations in the Private Sector. Butterworth Heinemann, 1993. Hartman, Laura P. “Technology and Privacy in the Workplace.” Business and Society Review 106 (2001): 1-27. Hartmann, Charles J, and Renas, Stephen M. “Anglo American Privacy Law: An Economic Analysis.” International Review of Law and Economics 5 (1985): 133-52. Hasian, Marouf, Jr. “Remembering and Forgetting: A Postmodern Interpretation of the Origins of the ‘Right of Privacy.’” Journal of Communication Inquiry 19 (1995): 33-49. Hauptman, Robert (ed.). “Ethics and the Dissemination of Information.” Library Trends 40 (1991): 199-372. Haviland, Leslie, and John Haviland. “Privacy in a Mexican Village.” 341-362. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. 318 Hearst, Alice L. “Rugged Individualism and the Right to Privacy.” Western Legal History 3 (1990): 271-286. Hebenton, Bill, and Thomas, Terry. Criminal Records: State, Citizen and the Politics of Protection. Ashgate Publishing Company Ltd., 1993. Heinlein, E. B. “Communications, Security, Privacy and the Law.” Computers & Security 13 (1994): 119-121. Heller, Nathaniel. “‘Customizable Privacy’: A New Approach to International Regulation of the Internet.” Journal of Public and International Affairs 13 (2002): 63-81. Hendricks, Evan. Hayden, Trudy. Novik, Jack. Your Right to Privacy. Second Edition. Southern Illinois University Press, 1990. Henkin, Louis. Privacy and Autonomy.” Columbia Law Review 74 (1974): 1410-33. Hermon, Joshua. “Privacy and Identity: Constructing, Maintaining, and Protecting Personhood.” DePaul Law Review 54 (2005): 671. Hermann, Donald H. J. “Pulling the Fig Leaf off the Right of Privacy: Sex and the Constitution.” DePaul Law Review 54 (2005): 909. Hernon, P., and Dugan, R E. “GIS and privacy.” Journal of Academic Librarianship 23 (1997): 51516. Hessler, Richard M., and Freerks, Kristina. “Privacy Ethics in the Age of Disclosure: Sweden and America Compared.” The American Sociologist 26 (1995): 35-53. Hewitt, Patricia. Privacy: The Information Gatherers. National Council for Civil Liberties, 1977. Higbee, Kari L. “Student Privacy Rights: Drug Testing and Fourth Amendment Protections.” Idaho Law Review 41 (2005): 361. Higgins, Michael. “High Tech, Low Privacy.” ABA Journal 85 (1999): 52-7. Hill, Alfred. “Defamation and Privacy under the First Amendment.” Columbia Law Review 76 (1976): 1205-1313. Himma, Ken. “Privacy vs. Security: Why Privacy is Not an Absolute Value or Right.” San Diego Law Review 44 (Fall 2007): 857-919. Himma, Ken. “Separation, Risk, and the Necessity of Privacy to Well-Being: A Comment on Adam Moore's Toward Informational Privacy Rights.” San Diego Law Review 44 (Fall 2007): 847-57. Hiltz, S. R., and Turoff, M. The Network Nation: Human Communication via Computer. Reading, MA: Addison Wesley, 1978. Hindman, Robert R. “Megan's Law and its Progeny: Whom Will the Courts Protect.” Boston College Law Review 39 (1997): 201-33. 319 Hiramatsu, Tsuyoshi. “Japan Adopts Privacy Protection Act.” Transnational Data and Communications Report 12 (1989): 22-9. Hiramatsu, Tsuyoshi. “Japan's New Personal Data Bill.” Transnational Data and Communications Report 10 (1987): 14-16. Hitchcock, J. A. “Net Crimes and Misdemeanors: Outmaneuvering the Spammers, Swindlers and Stalkers Who Are Targeting You Online.” New Library World 104 (2003): 181. Hixson, R. F. “Whose Life is it, Anyway? Information as Property.” Information and behavior Ruben, B. D. ed. New Brunswick, NJ: Transaction Books, 1985. 76-92. Hixson, Richard F. Privacy in a Public Society: Human Rights in Conflict. New York: Oxford University Press, 1987. Hobday, J. “Internet Accountability.” Managing Information 7 (2000): 8-9. Hodge, James G. “National Health Information Privacy and New Federalism.” Notre Dame Journal of Law, Ethics and Public Policy 14 (2000): 791-820. Hodson, Thomas J., Englander, Fred, and Englander, Valerie. “Ethical, Legal and Economic Aspects of Employer Monitoring of Employee Electronic Mail.” Journal of Business Ethics 19 (1999): 99-108. Hoefges, R. M. “The Use of State Crime and Accident Reports For Targeting, Direct Mail Solicitations: Commercial Speech, Access and Privacy.” Communication Law and Policy 3 (1998): 331-365. Hoffman, Donna L., Novak, Thomas P., and Peralta, Marcos A. “Information Privacy in the Marketplace: Implications for the Commercial Uses of Anonymity on the Web.” The Information Society 15 (1999): 129-139. Hoffman, Lance J (ed.). Computers and Privacy in the Next Decade. New York: Academic Press, Inc., 1980. Hoffmann, Stanley. “Two Universalisms in Conflict.” The Tocqueville Review/La Revue Tocqueville 21 (2000): 65-71. Hohengarten, William M. “Same Sex Marriage and the Right of Privacy.” Yale Law Journal 103 (1994): 1495-1531. Hojnik Zupanc, Ida. “An Attempt to Empirically Evaluate Privacy and Personal Space.” Anthropos 27 (1995): 82-90. Hollander, John. “The Language of Privacy.” Social Research 68 (2001): 5-28. Horibe, Masao. “Access to Information and Privacy Legislation in Japan.” Transnational Data and Communications Report 14 (1991): 31-42. 320 Hornung, Meir S. “Think before you Type: A Look at E-mail Privacy in the Workplace.” Fordham Journal of Corporate & Financial Law 11 (2005): 115. Horowitz, Irving Louis. Communicating Ideas. Oxford University Press, 1986. Horowitz, Irving Louis. “Networking America: The Cultural Context of Privacy v. Publicity.” Knowledge, Technology, and Policy 12 (2000): 85-90. Horowitz, Irving Louis. “National Consequences of International Terrorism.” Society 39 (2002): 6-10. Houlgate, Laurence D. “What Is Legal Intervention in the Family? Family Law and Family Privacy.” Law and Philosophy 17 (1998): 141-158. Howe, Eric. “The United Kingdom's Data Protection Act.” Government Information Quarterly 8 (1991): 345-57. Hu, Shengfa. Moral Value on Privacy Thinking by Major Chinese Traditional Thinkers. American Sociological Association (ASA), 1998. Hubener, Louis F. “Rights of Privacy in Open Courts: Do They Exist.” Emerging Issues in State Constitutional Law 2 (1989): 189-205. Hudson, Stephen D., and Husak, Douglas N. “Benn on Privacy and Respect for Persons.” Australasian Journal of Philosophy 57 (1979): 324-329. Huebert, Ronald. “Privacy: The Early Social History of a Word.” The Sewanee Review 105 (1997): 21-39. Humber, James M., and Almeder, Robert (eds.). Privacy and health care. Humana Press, Inc., 2001. Imparato, Nicholas (ed.) Public Policy and the Internet: Privacy, Taxes, and Contract. Hoover Institution Press, 2000. Inness, Julie. “Information, Access, or Intimate Decisions About One's Action?: The Content of Privacy.” Public Affairs Quarterly (1991): 227-242. Inness, Julie C. Privacy, Intimacy, and Isolation. New York: Oxford University Press, 1992. Introna, Lucas D. “Privacy and the Computer: Why We Need Privacy in the Information Society.” Metaphilosophy 3 (1997): 259-275. Introna, Lucas D., and Pouloudi, Athanasia. “Privacy in the Information Age: Stakeholders, Interests and Values.” Journal of Business Ethics 22 (1999): 27-38. Jackson, Henry M. “Privacy and Society.” Humanist 35 (1975): 30-32. Jaeger, P. T., McClure, C. R., and Fraser, B. T. “The Structures of Centralized Governmental Privacy Protection: Approaches, Models and Analysis.” Government Information Quarterly 19 (2002): 317-36. 321 Jaeger, Paul T., et al. “The Impact of the USA Patriot Act on Collection and Analysis of Personal Information Under the Foreign Intelligence Surveillance Act.” Government Information Quarterly 20 (2003): 295-314. James, Edward W. “Rights, Privacy, and Tainted Ideals.” Foundations of Ethics, ed. Leroy S. Rouner. Notre Dame: University of Notre Dame Press, 1983. 115-132. Jamison, Tena. “Immigration on Line: The Privacy Implications of a National Registry.” Human Rights 22 (1995): 12-15. Jenero, Kenneth A, and Mapes Riordan, Lynne D. “Electronic Monitoring of Employees and the Elusive ‘Right to Privacy.’” Employee Relations Law Journal 18 (1992): 71-102. Johnson, Deborah. Computer Ethics. Englewood Cliffs, N.J.: Prentice Hall, 1985. Johnson, Deborah G. “Mapping Ordinary Morals onto the Computer Society: A Philosophical Perspective.” The Journal of Social Issues 40 (1984): 63-76. Johnson, Deborah, and Nissenbaum, Helen eds. Computers, Ethics, and Social Values. Englewood Cliffs, CA: Prentice Hall, 1995. Johnson, Deborah G. “Computers and Ethics.” National Forum. (Summer 1991): 15-17. Johnson, Jeffery L. “A Theory of the Nature and Value of Privacy.” Public Affairs Quarterly 6 (1992): 271-288. Johnson, Jeffery L. “Constitutional Privacy.” Law and Philosophy 13 (1994): 161-193. Johnson, Jeffery L. “Privacy and the Judgment of Others.” Journal of Value Inquiry 23 (1989): 157168. Johnson, Jeffery L. “Privacy, Liberty, and Integrity.” Public Affairs Quarterly 3 (1989): 15-34. Johnson, Jeffery L., and Crowley, Donald W. “TLO and the Student Right to Privacy.” Educational Theory 36 (1986): 211-224. Johnson, Karen L. “The Sale of Human Organs: Implicating a Privacy Right.” Valparaiso University Law Review 21 (1987): 741-62. Jones, Leslie E. “An Argument against Techno Privacy.” Southwest Philosophy Review 13 (1997): 155-162. Josephs, Hilary K. “Defamation, Invasion of Privacy, and the Press in the People's Republic of China.” UCLA Pacific Basin Law Journal 11 (1993): 191-220. Joyce, John F. “The Privacy Act: A Sword and a Shield but Sometimes Neither.” Military Law Review 99 (1983): 113-67. Kahn, Jonathan. “Privacy as a Legal Principle of Identity Maintenance.” Seton Hall Law Review 33 (2003): 371-410. 322 Kalman, Laura. “The Promise and Peril of Privacy.” Reviews in American History 22 (1994): 725731. Kamenka, Eugene. “Public/Private in Marxist Theory and Marxist Practice.” 267-280. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. Kang, Jerry. “Information Privacy in Cyberspace Transactions.” Stanford Law Review 50 (1998): 1193-1294. Kaplan, Marilyn R. “Commercial Speech and the Right to Privacy: Constitutional Implications of Regulating Unsolicited Telephone Calls.” Columbia Journal of Law and Social Problems 15 (1980): 277-315. Karin Frank, Shyli. "Homelessness, the Right to Privacy, and the Obligation to Provide a Home." The Ethics of Homelessness: Philosophical Perspectives, ed. Abbarno, John M. Amsterdam: Rodopi, 1999. Karras, A. R. “The Constitutionality of the Driver's Privacy Protection Act: A Fork in the Information Access Road.” Federal Communications Law Journal 52 (1999): 125-153. Kastenmeier, Robert W. “Communications Privacy: A Legislative Perspective.” Wisconsin Law Review 4 (1989): 715-37. Kateb, George, Jeffrey Rosen, and Frederick Schauer. “Part V: Invasions of Privacy: Violations of Boundaries.” Social Research 68 (2001): 201. Kateb, George. “On Being Watched and Known.” Social Research 68 (2001): 269-295 Katz, James E., and Graverman, R. F. “Privacy Issues of a National Research and Education Network.” Telematics and Informatics 8 (1991): 71-120. Katz, J. E., and Hyman, M. M. “Dimensions of Concern over Telecommunications Privacy in the United States.” Information Society 9 (1993): 251-275. Katz, James E. “Telecommunications and Computers: Whither Privacy Policy?” Society 25 (1987): 81-86. Katz, James E. “US Telecommunications Privacy Policy: Socio-political Responses to Technological Advances.” Telecommunications Policy 12 (1988): 353-68. Kaufman, Irving R. “Press, Privacy and Malice: Reflections on New York v. Sullivan.” New York State Bar Journal 56 (1984): 10-15. Keane, John. “Democracy and the Media.” International Social Science Journal 43 (1991): 523-540. Kebbel, G. “The Different Functions of Speech in Defamation and Privacy Cases.” Journalism Quarterly 61 (1984): 629-633. Keisling, Phillip. “The Case Against Privacy: What We Lose When We Mind Our Own Business.” Washington Monthly 16 (1984): 12-22. 323 Keith, Boon. “Privacy and Community.” Social Theory and Practice 9 (1983): 1-33. Kemp, Gary. “Autonomy and Privacy in Wittgenstein and Beckett.” Philosophy and Literature 27 (2003): 164-187. Kertz, Consuelo Lauda, and Burnette, Lisa Boardman. “Telemarketing Tug of War.” Loyola Consumer Law Reporter 5 (1993): 70-80. Keynes, Edward. Liberty, Property, and Privacy: Toward a Jurisprudence of Substantive Due Process. University Park: Pennsylvania State University Press, 1996. Kieran, M., Morrison, D. E., and Svennevig, M. “Privacy, the Public and Journalism: Towards an Analytic Framework.” Journalism 1 (2000): 145-169. Kim, Pauline T. “Privacy Rights, Public Policy, and the Employment Relationship.” Ohio State Law Journal 57 (1996): 671-730. Kirby, M. D. “Access to Information and Privacy: The Ten Information Commandments.” University of Cincinnati Law Review 55 (1987): 745-761. Kirby, Michael. “Privacy and Libraries.” Australian Library Journal 26 (1977): 215-218. Kirby, Michael. “Privacy Protection: A New Beginning.” Prometheus 18 (2000): 125-32. Kirschner, Nancy M. “The Right to Financial Privacy Act of 1978.” University of Michigan Journal of Law Reform 13 (1979): 10-52. Klein, Lloyd. Singing Out for Justice: Privacy Concerns and the Impact of Crime Stopper Programs. Society for the Study of Social Problems (SSSP), 1990. Kleinig, John. “The Ethical Challenge of AIDS to Traditional Liberal Values.” AIDS & Public Policy Journal 5 (1990): 42-44. Kling, R. “Assessing Anonymous Communication on the Internet: Policy Deliberations.” Information Society 15 (1999): 79-90. Klosek, J. “Data Privacy in the Information Age.” Journal of the American Society for Information Science and Technology 53 (2002): 251-3. Kolb, Angela. “Data Protection Legislation in Eastern Germany.” Transnational Data and Communications Report 14 (1991): 33-6. Konvitz, Milton R. Fundamental Liberties of a Free People: Religion, Speech, Press, Assembly. Ithaca, NY: Cornell University Press, 1957. Konvitz, Milton R. “Privacy and the Law: A Philosophical Prelude.” Law and Contemporary Problems 31 (1966): 272-80. Kovacic, Matej. “Privacy in the Information Society.” Teorija in Praksa 37 (2000): 1019-1034. Kramer, I. R. “The Full Court Press: Sacrificing Vital Privacy Interests on the Altar of First Amendment Rhetoric.” Cardozo Arts and Entertainment Law Journal 8 (1989): 113-136. 324 Krause, Harry D., and Marcus, Paul. “Privacy.” American Journal of Comparative Law 26 (1978): 377-92. Kreie, J., Cronan, T. P. “Copyright, Piracy, Privacy, and Security Issues: Acceptable or Unacceptable Actions for End Users?” Journal of End User Computing 11 (1999): 13-20. Kritchevsky, Barbara. “Protecting Privacy: What States Can and Cannot Do.” Human Rights 19 (1992): 16-19. Krygier, Martin. “Publicness, Privateness and ‘Primitive Law.’” 307-340. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. Krysan, Maria. “Privacy and the Expression of White Racial Attitudes: A Comparison across Three Contexts.” The Public Opinion Quarterly 62 (1998): 506-544. Ku, Agnes S. “Revisiting the Notion of ‘Public’ in Habermas's Theory: Toward a Theory of Politics of Public Credibility.” Sociological Theory 18 (2000): 216-240. Ku, Catherina, Liu, Chang, and Marchewka, Jack T. “American and Taiwanese Perceptions Concerning Privacy, Trust, and Behavioral Intentions in Electronic Commerce.” Journal of Global Information Management 12 (2004): 18-40. Kukathas, Chandran. “Cultural Privacy.” Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008): 68-80. Kumar, Krishan. “The Privatized Society.” Universities Quarterly: Culture, Education & Society 40 (1986): 356-364. Kupfer, Joseph. “Privacy, Autonomy, and Self Concept.” American Philosophical Quarterly 24 (1987): 81-89. La Fontaine, J. S. “Public or Private? The Constitution of the Family in Anthropological Perspective.” International Journal of Moral and Social Studies 3 (1988): 267-289. Lackey, Douglas P. “Mental Terms and Negative Privacy.” Journal of Critical Analysis 6 (1976): 4047. Lake, Steven E. “Unrestricted Private Employee Drug Testing Programs: An Invasion of the Worker's Right to Privacy.” California Western Law Review 23 (1986): 72-104. Lally, Laura. “Privacy Versus Accessibility: The Impact of Situationally Conditioned Belief.” Journal of Business Ethics 15 (1996): 1221-1226. Lane, Frederick S. “The Naked Employee: How Technology is Compromising Workplace Privacy.” Knowledge, Technology, and Policy 16 (2003): 108-109. Langan, Kenneth James. “Computer Matching Programs: A Threat to Privacy.” Columbia Journal of Law and Social Problems 15 (1979): 143-80. Langer, Richard. “Abortion and the Right to Privacy.” Journal of Social Philosophy 23 (1992): 23-51. 325 Lansing, Paul. “The Conflict of Patient Privacy and the Freedom of Information Act.” Journal of Health Politics, Policy and Law 9 (1984): 315-22. Larson, Erik. The Naked Consumer: How Our Private Lives Become Public Commodities. New York: Holt, 1992. Larson, Jeffrey H., and Medora, N. “Privacy Preferences: A Cross Cultural Comparison of Americans and Asian Indians.” International Journal of Sociology of the Family 22 (1992): 55-66. Lashner, Marilyn A. “Privacy and the Public's Right to Know.” Journalism Quarterly 53 (1976): 67988. Laurie, Graeme T. “The Most Personal Information of All: An Appraisal of Genetic Privacy in the Shadow of the Human Genome Project.” International Journal of Law, Policy and the Family 10 (1996): 74-101. Le Poire, Beth A., Burgoon, Judee K., and Parrott, Roxanne. “Status and Privacy Restoring: Communication in the Workplace.” Journal of Applied Communication Research 20 (1992): 419436. Ledvinka, J. “Privacy Regulations and Employee Record Keeping.” Journal of Library Administration 7 (1986): 25-34. Lee, L. T. “Privacy, Security, and Intellectual Property.” Understanding the Web: The Social, Political, and Economic Dimensions of the Internet. Albarran, A. B., and Goff, D. H. eds. Ames: Iowa State University Press, 2000. 135-164. Lee, Laurie Thomas. “U.S. Telecommunications Privacy Policy and Caller ID.” California Western Law Review 30 (1993): 1-60. Lee, Laurie Thomas, and LaRose, Robert. “Caller ID and the Meaning of Privacy.” Information Society 10 (1994): 247-65. Lee, Ya Ching. “Will Self-regulation Work in Protecting Online Privacy?” Online Information Review 27 (2003): 276-283. Lemos, Ramon M. “Immediacy, Privacy, and Ineffability.” Philosophy and Phenomenological Research 25 (1965): 500-515. Lessig, Lawrence. “Privacy as Property.” Social Research 69 (2002): 247-269 Lever, Annabelle. “Must Privacy and Sexual Equality Conflict? A Philosophical Examination of Some Legal Evidence.” Social Research 67 (2000): 1137-1171. Levine, Milton. “Privacy in the Tradition of the Western World.” In Privacy, William Bier ed. 3-21. New York: Fordham University Press, 1980. Levy, Michael. “The Electronic Monitoring of Workers: Privacy in the Age of the Electronic Sweatshop.” Legal Reference Services Quarterly 14 (1995): 5-56. 326 Levy, Steven. Hackers: Heroes of the Computer Revolution. New York: Dell Publishing Co., 1984. Li, Joyce H S. “The Death of Privacy: The Lively Debate in The Washington Post (1974-1998).” Journal of Information Ethics 9 (2000): 63-88. Lieberstein, Stanley H. Who Owns What Is in Your Head?: Trade Secrets and the Mobile Employee. New York: Hawthorne Books, 1979. Linowes, David F. “Must Personal Privacy Die in the Computer Age?” American Bar Association Journal 65 (1979): 1180-4. Lippke, Richard L. “Work, Privacy, and Autonomy.” Public Affairs Quarterly 3 (1989): 41-55. Lissit, Robert. “The Privacy Piercers: Media in Review.” World & I 14 (1999): 98-103. Litt, Marc O. “‘Citizen Soldiers’ or Anonymous Justice: Reconciling the Sixth Amendment Right of the Accused, the First Amendment Right of the Media and the Privacy Right of Jurors.” Columbia Journal of Law and Social Problems 25 (1992): 371-421. Loch, Karen D., Conger, Sue, and Oz, Effy. “Ownership, Privacy and Monitoring in the Workplace: A Debate on Technology and Ethics.” Journal of Business Ethics 17 (1998): 653-663. Lockway, Larry. “The Ethical Role of Information in Sustainable Communities.” Journal of Information Ethics 4 (1995): 60-68. Lockwood, Alan L. “Values Education and the Right to Privacy.” Journal of Moral Education 7 (1977): 9-26. Losito, William F. “An Ethical Theory for Privacy in Educational Contexts.” Philosophy of Education 36 (1980): 236-244. Lu, C. L. “Seeking Privacy in Wireless Communications: Balancing the Right of Individual Privacy with the Need for Effective Law Enforcement.” Hastings Communications and Entertainment Law Journal 17 (1995): 529-556. Lubonja, Fatos. “Privacy in a Totalitarian Regime.” Social Research 68 (2001): 237-254. Ludd, Steven O. “Athletics, Drug Testing and the Right to Privacy: A Question of Balance.” Howard Law Journal 34 (1991): 599-632. Luedtke, Paul L. “Open Government and Military Justice.” Military Law Review 87 (1980): 7-72. Lund, William R. “Communitarian Politics, the Supreme Court, and Privacy: The Continuing Need for Liberal Boundaries.” Social Theory and Practice 16 (1990): 191-215. Lundstedt, Sven B. “Democracy, Technology, and Privacy.” Forum for Applied Research and Public Policy 4 (1989): 68-74. Lusky, Louis. “Invasion of Privacy: A Clarification of Concepts.” Political Science Quarterly 87 (1972): 192-209. 327 Lyon, David. “Everyday Surveillance: Personal Data and Social Classification.” Information, Communication & Society 5 (2002): 242-257. Lyon, David. “Surveillance in Cyberspace: The Internet, Personal Data, and Social Control.” Queen's Quarterly 109 (2002): 345-357. Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham, UK: Open U Press, 2001. Lyon, David. Surveillance Studies: Sociological and Comparative Approaches. Brisbane, Australia: International Sociological Association (ISA), 2002. Lyon, David. The Electronic Eye: The Rise of Surveillance Society. Oxford: Blackwell Publishers, 1994. Lyon, David. “The World Wide Web of Surveillance: The Internet and Off World Power Flows.” Information, Communication & Society 1 (1998): 91-105. Lyon, David. “Facing the Future: Seeking Ethics for Everyday Surveillance.” Ethics and Information Technology 3 (2001): 171-181. Machamer, Peter, and Boylan, Barbara. “Freedom, Information and Privacy.” Business and Professional Ethics Journal 12 (1993): 47-68. Machan, Tibor R. “The Right to Privacy versus Uniformitarianism.” Journal of Social Philosophy 23 (1992): 75-84. Mack, Arien (ed.) “Privacy.” Social Research 68 (2001): 5-338. Mack, Arien, and Sajo, Andras eds. Privacy in Post Communist Europe: Social Research 69 (2002). MacKenzie, Kevin I. “Administrative Searches and the Fourth Amendment: An Alternative to the Warrant Requirement.” Cornell Law Review 64 (1979): 856-74. MacKinnon, Catharine A. “Privacy and Equality: Notes on Their Tension.” The Tocqueville Review/La Revue Tocqueville 21 (2000): 77-85. Mael, Fred A., Mary Connerley, and Ray A. Morath. “None of Your Business: Parameters of Biodata Invasiveness.” Personnel Psychology 49 (1996): 613-651. Maida, Pamela (ed.) Freedom of Information Act guide & Privacy Act overview. United States Department of Justice, Office of Information and Privacy. Washington, DC: Superintendent of Documents, 2000. Malcolm, Clark. “Paradox in the Office: Fitting the Work Place for People, Accommodating Workers' Needs for Privacy and Accessibility, Control and Direction, Work and Play Heightens Commitment.” National Productivity Review 5 (1986): 142-9. Mangan, Mark and Wallace, Jonathan. Sex, Laws, and CyberSpace: Freedom and Censorship on the Frontiers of the Online Revolution. Herry Holt and Company, New York, 1997. 328 Manning, Rita C. “Liberal and Communitarian Defenses of Workplace Privacy.” Journal of Business Ethics 16 (1997): 817-23. Marcell, David W. “Privacy and the American Character.” South Atlantic Quarterly 66 (1967): 1-12. Marchand, Donald A. The Politics of Privacy, Computers, and Criminal Justice Records: Controlling the Social Costs of Technological Change. Information Resources Press, 1980. Margalit, Avishai. “Privacy in the Decent Society.” Social Research 68 (2001): 255-268. Margolis, Stacey. “The Public Life: The Discourse of Privacy in the Age of Celebrity.” Arizona Quarterly 51 (1995): 81-101. Margulis, Stephen T ed. “Contemporary Perspectives on Privacy: Social, Psychological, Political.” Journal of Social Issues 59 (2003): 243-4. Margulis, Stephen T. “On the Status and Contribution of Westin's and Altman's Theories of Privacy.” Journal of Social Issues 59 (2003): 411-430. Margulis, Stephen T. “Privacy as a Social Issue and Behavioral Concept.” Journal of Social Issues 59 (2003): 243-261. Marks, Lawrence Kaiser. “Telescopes, binoculars, and the Fourth Amendment.” Cornell Law Review, 67 (1982): 379-95. Marshall, Patrick G. “Your Right to Privacy.” Editorial Research Reports (Jan. 20 ,1989): 30-43. Marshall, Sandra E. “Public Bodies, Private Selves.” Journal of Applied Philosophy 5 (1988): 147158. Martin, Kirsten, and Freeman, R. Edward. “Some Problems with Employee Monitoring.” Journal of Business Ethics 43 (2003): 353-361. Marx, Gary T. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59 (2003): 369-390. Marx, Gary T. “I'll Be Watching You: Reflections on the New Surveillance.” Dissent 32 (1985): 2634. Marx, Gary T. “Technology and Gender: Thomas I. Voire and the Case of the Peeping Tom.” The Sociological Quarterly 43 (2002): 409-433. Marx, Gary T. “The Surveillance Society: The Threat of 1984 Style Techniques.” The Futurist 19 (1985): 21-26. Marx, Gary T. Undercover: Police Surveillance in America. Berkeley, CA: University of California Press, 1988. Marx, Gary T. “What's in a Name? Some Reflections on the Sociology of Anonymity.” The Information Society 15 (1999): 99-112. 329 Marx, Gary T., and Sherizen, Sanford. “Corporations that Spy on Their Employees: Technological Monitoring of Workers is Widespread.” Business and Society Review (1987): 32-7. Marx, Gary T, and Sherizen, Sanford. “Monitoring on the Job: How to Protect Privacy as well as Property.” Technology Review 89 (1986): 62-67. Marx, Gary T. “Murky Conceptual Waters: The Public and the Private.” Ethics and Information Technology 3 (2001): 157-169. Masci, David. “Internet Privacy: Is More Government Regulation Needed.” CQ Researcher 8 (1998): 955-75. Mason, David. Privacy for What? The Importance of the Social in Employee Responses to Surveillance Technologies at Work. Brisbane, Australia: International Sociological Association (ISA), 2002. Matheson, David. “A Distributive Reductionism about the Right to Privacy.” Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008): 108-129. Matheson, David. “Unknowableness and Informational Privacy.” Journal of Philosophical Research 32 (2007): 251-267. Matthews, Steve. “Privacy, Separation, and Control.” Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008):130-150. Mawby, R. I. “Overcoming the Barriers of Privacy: Police Strategies against Non-visible Crime.” Criminology 18 (1981): 501-21. Maxeiner, J. R. “Freedom of Information and the EU Data Protection Directive.” Federal Communications Law Journal 48 (1995): 93-104. May, Larry. “Privacy and Property.” Philosophy in Context 10 (1980): 40-53. McArthur, Robert L. “Reasonable Expectations of Privacy.” Ethics and Information Technology 3 (2001): 123-128. McCamus, John D. “The Delicate Balance: Reconciling Privacy Protection with the Freedom of Information Principle.” Government Information Quarterly 3 (1986): 49-61. McCarthy, J. T. The Rights of Publicity and Privacy. New York: Clark Boardman, 1987. McCloskey, H.J. “Privacy and the Right to Privacy.” Philosophy 55 (1980): 17-38. McCloskey, H.J. “The Political Ideal of Privacy.” Philosophical Quarterly 21 (1971): 303-314. McClosky, Herbert, and Brill, Alida. Dimensions of Tolerance: What Americans Believe about Civil Liberties. New York: Russell Sage Foundation, 1983. McCrohan, K. F. “Information Technology, Privacy and the Public Good.” Journal of Public Policy and Marketing 8 (1989): 265-278. 330 McCulloch, Andrew. “On the Public and the Private: A Comment on Fahey.” Sociology 31 (1997): 793-799. McFarland, Katherine M. “Privacy and Property: Two Sides of the Same Coin: The Mandate for Stricter Scrutiny for Government uses of Eminent Domain.” The Boston Public Interest Law Journal 14 (2004): 142. McDonald, Daniel W., et al. “Intellectual Property and Privacy Issues on the Internet.” South Dakota Business Review 55 (1996): 1. McDowell, Gary L. “Private Rights and Public Morality: The Nature and Extent of the Right to Privacy.” Public Interest Law Review (1991): 67-85. McGleenan, Tony. “Genetic Information and the Challenge to Privacy.” International Review of Law, Computers and Technology 12 (1998): 535-46. McGleenan, Tony. "Rights to Know and not to Know: Is there a Need for a Genetic Privacy Law?" The Right to Know and the Right not to Know, ed. Chadwick, Ruth. Avebury: Brookfield, 1997. McGovern, Theresa M. “Is Privacy Now Possible?” Social Research, 68 (2001): 327-333. McKinney, Karyn D. “Space, Body, and Mind: Parental Perceptions of Children's Privacy Needs.” Journal of Family Issues 19 (1998): 75-100. McLean, D. “Privacy Gaining Heft as an FOIA Exemption.” Communications and the Law 15 (1993): 25-46. McLean, Sheila A. M. “Mapping the Human Genome Friend or Foe?” Social Science and Medicine 39 (1994): 1221-1227. McLean, Deckle. Privacy and Its Invasion. Westport: Praeger, 1995. McMullin, E. "Openness and Secrecy in Science: Some Notes on Early History." Science, Technology, and Human Values 10 (1985): 14-23. McNair, Douglas. “The Ethics of Health Privacy – A Matter of Environmental Ethics.” Bioethics Forum 14 (1998): 9-12. McQueen, K. “Cyber Spies.” Managing Information 7 (2000): 12. McWhirter, Darien A., and Bible, Jon D. Privacy As A Constitutional Right: Sex, Drugs, And The Right To Life. Quorum Books, 1992. Meeler, David. “Is Information All We Need to Protect?” Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008):151-169, Menand, Louis, Ruth Bernard Yeazell, David Bromwich, and Nancy K. Miller. “Part IV: Privacy and the Self: The Rise and Fall of Privacy.” Social Research 68 (2001): 115. Mendelsohn, L. D. “Legislation for Personal Privacy: Its Impact on Transborder Data Flow.” Information Services and Use 7 (1987): 43-50. 331 Mensel, Robert E. “‘Kodakers Lying in Wait’: Amateur Photography and the Right of Privacy in New York, 1885-1915.” American Quarterly 43 (1991): 24-45. Merchant, Jennifer. “The Right of Genetic Privacy.” The Tocqueville Review/La Revue Tocqueville, 21 (2000): 31-55. Mesibov, Laurie. “Protection of Students' Privacy Rights: The Hatch Amendment.” School Law Bulletin 16 (1985): 15-17. Meslin, Eric M., et al. “The Ethical, Legal, and Social Implications Research Program at the National Human Genome Research Institute.” Kennedy Institute of Ethics Journal 7 (1997): 291-8. Metalitz, Steven J. “The Proposed Data Protection Directive: At What Price Privacy.” Journal of European Business 2 (1991): 13-17. Metelski, J. “Achieving Communications Privacy through Revision of the Eavesdropping Laws.” Federal Communications Law Journal 30 (1978): 135-147. Metivier Carreiro, Karen A., and LaFollette, Marcel C. “Commentary: Balancing Cyberspace Promise, Privacy, and Protection Tracking the Debate.” Science Communication 19 (1997): 3-20. Michael, James. “Open Government and Data Protection.” British Journal of Law and Society 8 (1981): 265-270. Michelfelder, Diane P. “The Moral Value of Informational Privacy in Cyberspace.” Ethics and Information Technology 3 (2001): 129-135. Mill, John Stuart. On Liberty. Indianapolis: Hackett Publishing, 1978. Miller, D. W. “What We Can Learn from the European Privacy Standard.” Healthcare Informatics 9 (1992): 92-99. Miller, Jonathan Lewis. “Search and Seizure of Air Passengers and Pilots: The Fourth Amendment takes Flight.” Transportation Law Journal 22 (1994): 199-223. Miller, S. “Privacy, Data Bases and Computers.” Journal of Information Ethics 7 (1998): 42-8. Miller, S., and Weckert, J. “Privacy, the Workplace and the Internet.” Journal of Business Ethics 28 (2000): 255-265. Miller, W. “Privacy in the Information Age: Implications for Libraries.” Library Issues: Briefings for Faculty and Administrators 19 (1999): 4. Miller, Arthur R. “Computers and Privacy.” Ethics and the Management of Computer Technology, ed. W. Michael Hoffman. Cambridge: Oelgeschlager, 1982. 93-108. Miller, Seumas. “Privacy, Data Bases, and Computers.” Journal of Information Ethics 7 (1998): 4248. Miller, Seumas, and Weckert, John. “Privacy, the Workplace, and the Internet.” Journal of Business Ethics 28 (2000): 255-265. 332 Mindle, Grant B. “Liberalism, Privacy, and Autonomy.” Journal of Politic 51 (1989): 575-598. Minor, William H. “Identity Cards and Databases in Health Care: The Need for Federal Privacy Protections.” Columbia Journal of Law and Social Problems 28 (1995): 253-96. Minow, M., Coyle, K., and Kaufman, P. “The USA Patriot Act.” Library Journal 127 (2002): 52-7. Mochmann, Ekkehard, and Mueller, Paul J (eds.). Data protection and social science research: perspectives from ten countries. Frankfurt, Germany: Campus Verlag GmbH, 1979. Monberg, John. “You Will: Social Implications of Advanced Marketing Technologies.” Ethics and Behavior 7 (1997): 229-238. Montague, Phillip. “A Child’s Right to Privacy.” Public Affairs Quarterly 2 (1988): 17- 32. Moor, James H. “Using Genetic Information while Protecting the Privacy of the Soul.” Ethics and Information Technology 1 (1999): 257-263. Moore, Adam D. “Privacy in the Family,” with Newell, B., Metoyer, C. Forthcoming in The Social Dimensions of Privacy, Cambridge University Press, 2014. Beate Roessler and Dorota Mokrosinska eds. forthcoming (2014).1 Moore, Adam D. “Coercing Privacy and Moderate Paternalism: Allen on Unpopular Privacy,” American Philosophical Association Newsletter in Philosophy and Law, Vol. 13 (Fall 2013): 914.2 Moore, Adam D. “Privacy, Speech, and the Law.” Journal of Information Ethics, Vol. 22 (summer 2013): 21-43.3 Moore, Adam D. “Privacy.” The International Encyclopedia of Ethics, edited by Hugh LaFollette. (Winter 2013), 1-11.4 Moore, Adam D. “Drug Testing and Privacy in the Workplace,” The John Marshall Journal of Computer & Information Law, Vol. 29 (Summer 2012): 463-492.5 Moore, Adam D. “Defining Privacy.” Journal of Social Philosophy 39 (Fall 2008): 411-428.6 Moore, Adam D. “Privacy in the Family,” with Newell, B., Metoyer, C. Forthcoming in The Social Dimensions of Privacy, Cambridge University Press, 2014. Beate Roessler and Dorota Mokrosinska eds. forthcoming (2014). 2 Moore, adam D. “Coercing Privacy and Moderate Paternalism: Allen on Unpopular Privacy,” American Philosophical Association Newsletter in Philosophy and Law, Vol. 13 (Fall 2013): 914. 3 Moore, Adam D. “Privacy, Speech, and the Law.” Journal of Information Ethics, Vol. 22 (summer 2013): 21-43. 4 Moore, Adam D. “Privacy.” The International Encyclopedia of Ethics, edited by Hugh LaFollette. (Winter 2013), 1-11. 5 Moore, Adam D. “Drug Testing and Privacy in the Workplace,” The John Marshall Journal of Computer & Information Law, Vol. 29 (Summer 2012): 463-492. 6 Moore, Adam D. “Defining Privacy.” Journal of Social Philosophy 39 (Fall 2008): 411-428. 1 333 Moore, Adam D. “Toward Informational Privacy Rights.” San Diego Law Review 44 (Fall 2007): 809-839.7 Moore, Adam D. “Privacy and the Encryption Debate.” Knowledge, Technology, and Policy 12 (2000): 72-84.8 Moore, Adam D. “Privacy: Its Meaning and Value.” American Philosophical Quarterly 40 (2003): 215-227.9 Moore, Adam D. “Employee Monitoring and Computer Technology: Evaluative Surveillance v. Privacy.” Business Ethics Quarterly 10 (2000): 697-709.10 Moore, Adam D. “Intangible Property: Privacy, Power, and Information Control.” American Philosophical Quarterly 35 (1998): 365-378.11 Moore, Adam D. “Owning Genetic Information and Gene Enhancement Techniques: Why Privacy and Property Rights May Undermine Social Control of the Human Genome.” Bioethics 14 (2000): 97-119.12 Moore, Barrington, Jr. “Privacy.” Society 22 (1985): 17-27. Moore, Barrington, Jr. Privacy: Studies in Social and Cultural History. New York: M. E. Sharpe Inc.1984. Moorhead, S. R., Langenbach, M., Kennedy, J., Hodgson, C. M., Ruiz, P., and Junaid, O. “Observations on the Observed: A Study of Inpatients' Perception of Being Observed.” O Irish Journal of Psychological Medicine 13 (1996): 59-61. Moreham, N. A. “Privacy in Public Places.” The Cambridge Law Journal 65 (Nov., 2006): 606-635. Moretti, Barbara. “Outing: Justifiable or Unwarranted Invasion of Privacy? The Private Facts Tort as a Remedy for Disclosures of Sexual Orientation.” Cardozo Arts and Entertainment Law Journal, 11 (1993): 857-903. Mossholder, Kevin W. “Information Privacy and Performance Appraisal: An Examination of Employee Perceptions and Reactions.” Journal of Business Ethics (1991): 151-156. Moore, Adam D. “Toward Informational Privacy Rights.” San Diego Law Review 44 (Fall 2007): 809-839. 8 Moore, Adam D. “Privacy and the Encryption Debate.” Knowledge, Technology, and Policy 12 (2000): 72-84 9 Moore, Adam D. “Privacy: Its Meaning and Value.” American Philosophical Quarterly 40 (2003): 215-227. 10 Moore, Adam D. “Employee Monitoring and Computer Technology: Evaluative Surveillance v. Privacy.” Business Ethics Quarterly 10 (2000): 697-709. 11 Moore, Adam D. “Intangible Property: Privacy, Power, and Information Control.” American Philosophical Quarterly 35 (1998): 365-378. 12 Moore, Adam D. “Owning Genetic Information and Gene Enhancement Techniques: Why Privacy and Property Rights May Undermine Social Control of the Human Genome.” Bioethics 14 (2000): 97-119. 7 334 Muhkerjee, Roopali. “Now You See It, Now You Don't: Naming Privacy, Framing Policy.” Critical Studies in Media Communication 17 (2000): 469-93. Munro, Moira, and Madigan, Ruth. “Privacy in the Private Sphere.” Housing Studies 8 (1993): 29-45. Murphy, John F. “An International Convention on Invasion of Privacy.” New York University Journal of International Law and Politics 8 (1976): 387-433. Murphy, Priscilla, and Maynard, Michael. “Framing the Genetic Testing Issue: Discourse and Cultural Clashes among Policy Communities.” Science Communication 22 (2000): 133-153. Mustafa, Husain. “Personal Privacy in an Information Society.” Virginia Social Science Journal 20 (1985): 12-21. Mylchreest, Ian. “‘Sound Law and Undoubtedly Good Policy’: Roe v. Wade in Comparative Perspective.” Journal of Policy History 7 (1995): 53-71. Nadel, Mark S. “Rings of Privacy: Unsolicited Telephone Calls and the Right of Privacy.” Yale Journal on Regulation 4 (1986): 99-128. Nagel, Thomas. “Concealment and Exposure.” Philosophy and Public Affairs 27 (1998): 3-30. Nash, Jennifer C. “From Lavender to Purple: Privacy, Black Women, and Feminist Legal Theory.” Yeshiva University Cardozo Women's Law Journal 11 (2005): 303. Nasri, W. “Privacy and Copyright.” Information Science: Search for Identity Anthony Debons ed. New York: Marcel Dekker, Inc., 1974. 337-344. Nathan, Daniel O. “Just Looking: Voyeurism and the Grounds of Privacy.” Public Affairs Quarterly, (October, 1990): 365-386. Nelkin, Dorothy. “Ironies in the Public Response to Information Technology.” National Forum 74 (1994): 7-10. Nelkin, Dorothy, and Andrews, Lori. “DNA Identification and Surveillance Creep.” Sociology of Health and Illness 21 (1999): 689-706. Nelkin, Dorothy, and Tancredi, Laurence. Dangerous Diagnostics: The Social Power of Biological Information. New York: HarperCollins, 1989. Nelson, Deborah. Pursuing Privacy in Cold War America. New York: Columbia Univ. Press, 2002. Nelson, Jaleen. “Sledge Hammers and Scalpels: The FBI Digital Wiretap Bill and its Effect on Free Flow of Information and Privacy.” UCLA Law Review 41 (1994): 1139-83. Nelson, Lisa. “Protecting the Common Good: Technology, Objectivity, and Privacy.” Public Administration Review (Sept. 15, 2002): 69-74. Neocleous, Mark. “Privacy, Secrecy, Idiocy.” Social Research 69 (2002): 85-110. Nesson, Charles. “Threats to Privacy.” Social Research 68 (2001): 105-113. 335 Neuhaus, Paul. “Privacy and confidentiality in digital reference.” Reference and User Services Quarterly 43 (2003): 26-36. Neville, Elizabeth. “The Public's Right to Know the Individual's Right to Privacy.” Policing and Society 9 (2000): 413-428. Neville, Robert. “Various Meanings of Privacy: A Philosophical Analysis.” In Privacy, ed. William Baier, 22-34. New York: Fordham University Press, 1980. Newman, M., and Marks de Chabris, G. “Employment and privacy: a problem for our time.” Journal of Business Ethics 6 (1987): 153-63. Nissenbaum, Helen. “Privacy as Contextual Integrity.” Washington Law Review 79 (2004): 119-158. Nissenbaum, Helen. "The Meaning of Anonymity in an Information Age" The Information Society, 15 (1999):141-144. Nissenbaum, Helen. “Protecting Privacy in an Information Age: The Problem of Privacy in Public.” Law and Philosophy 17 (1998): 559-596. Nissenbaum, Helen. “Toward an Approach to Privacy in Public: Challenges of Information Technology.” Ethics and Behavior 7 (1997): 207-219. Noam, E. M. “Privacy in telecommunications: markets, rights, and regulations. Part II: policy approaches.” New Telecom Quarterly 3 (1995): 37-45. Noble, John H., Jr. “Protecting the Public’s Privacy in Computerized Health and Welfare Information Systems.” Social Work 16. (1971): 35-41. Nock, Steven L. “Too Much Privacy?” Journal of Family Issues 19 (1998): 101-118. Nolan, J. “The Demise of Information Privacy in Australia.” Library Automated Systems Exchange, 29 (1998): 40-8. Nunan, Richard. “Militant Gayes, Gayes in the Military, and Privacy as Social Freedom.” Law and Philosophy 13 (1994): 481-492. Nunno, R M. “Electronic Signatures: Technology Developments and Legislative Issues.” Journal of Academic Librarianship 26 (2000): 355-8. O'Brien, David M. Privacy, Law, and Public Policy. New York: Praeger, 1979. O’Donnell, Michael J. “Reading for Terrorism: Section 215 of the USA Patriot Act and the Constitutional Right to Information Privacy.” Journal of Legislation 31 (2004): 45. O'Connell, Brian M. “Employment Privacy: Where Utopia Meets Reality.” Australian Journal of Professional and Applied Ethics 1 (1999): 96-102. O’Harrow Jr., Robert. No Place to Hide. Free Press, 2005. O'Neil, Michael. “Cybercrime Dilemma: Is it Possible to Guarantee both Security and Privacy.” Brookings Review 19 (2001): 28-31. 336 O'Neil, Robert M. “Rights in Conflict: The First Amendment's Third Century.” Law and Contemporary Problems, 65.2 (2002): 7-31. O’Neill, Onora. “Between Consenting Adults.” Philosophy and Public Affairs 14 (1985): 252-77. Ottensmeyer, Edward J., and Heroux, Mark A. “Ethics, Public Policy, and Managing Advanced Technologies: The Case of Electronic Surveillance.” Journal of Business Ethics 10 (1991): 51926. Owen, John E. “An End to Privacy in America?” Contemporary Review 223 (1973): 266-268. Ozaki, Ritsuko. “Housing as a Reflection of Culture: Privatised Living and Privacy in England and Japan.” Housing Studies, 17.2 (2002): 209-227. Packard, Noel. Electronic Monitoring: Biotechnology and Its Impact on Liberal Ideas. American Sociological Association (ASA), 1999. Parent, W.A. “A New Definition of Privacy for the Law.” Law and Philosophy 2 (1983): 305-338. Parent, W.A. “Privacy, Morality, and the Law.” Philosophy and Public Affairs 12 (1983): 269-288. Parent, W.A. “Recent Work on the Concept of Privacy.” American Philosophical Quarterly 20 (1983): 341-356. Parker, Richard. “A Definition of Privacy.” Rutgers Law Review 12 (1974): 393-422. Parmet, Wendy E. “Legal Rights and Communicable Disease: AIDS, the Police Power, and Individual Liberty.” Journal of Health Politics, Policy and Law 14 (1989): 741-771. Parmet, Wendy. “Public Health Protection and the Privacy of Medical Records.” Harvard Civil Rights Civil Liberties Law Review 16 (1981): 265-304. Parrott, Roxanne, Judee K. Burgoon, Michael Burgoon, and Beth A. LePoire. “Privacy Between Physicians and Patients: More than a Matter of Confidentiality.” Social Science & Medicine 29 (1989): 1381-5. Pateman, Carole. “Feminist Critiques of the Public/Private Dichotomy.” 281-306. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. Patton, Jason W. “Protecting Privacy in Public? Surveillance Technologies and the Value of Public Places.” Ethics and Information Technology 2 (2000): 181-187. Paul, Nora. “For the Record: Information on Individuals.” National Forum 72 (1992): 34-38. Paul, Ellen Frankel, Miller Jr., Fred D., and Paul, Jeffrey (eds.). The Right to Privacy. Cambridge: Cambridge University Press, 2000. Pedersen, Darhl M., and Shelia Frances. “Regional Differences in Privacy Preferences.” Psychological Reports 66 (1990): 731-737. Peikoff, Amy. “No Corn on this Cob: Why Reductionists Should Be All Ears for Pavesich.” Brandeis Law Journal 42 (2004): 751. 337 Pepperell, Keith. “Privacy, Rights, and Education.” Philosophical Studies in Education 1 (1990): 4156. Persson, Anders J., and Hansson, Sven Ove. “Privacy at Work: Ethical Criteria.” Journal of Business Ethics 42 (2003): 59-70. Peters, T A. “Computerized Monitoring and Online Privacy.” Library Review 49 (2000): 252. Peterson, James. “Behind the Curtain of Privacy: How Obscenity Law Inhibits the Expression of Ideas about Sex and Gender.” Wisconsin Law Review 59 (1998): 625. Peterson, S. B. “Your Life as an Open Book: Has Technology Rendered Personal Privacy Virtually Obsolete?” Federal Communications Law Journal 48 (1995): 163-186. Phelps, J., Nowak, G., and Ferrell, E. “Privacy Concerns and Consumer Willingness to Provide Personal Information.” Journal of Public Policy & Marketing 19 (2000): 27- 41. Phillips, D. J. “Beyond Privacy: Confronting Locational Surveillance in Wireless Communication.” Communication Law and Policy 8 (2003): 1-23. Pilgrim, T. A. “Docudramas and False Light Invasion of Privacy.” Communications and the Law, 10.3 (1988): 3-38. Pilgrim, Tim A. “Privacy and American Journalism: An Economic Connection.” Journalism History 14 (1987): 18-25. Pincus, Laura, and Johns, Roger. “Private Parts: A Global Analysis of Privacy Protection Schemes and a Proposed Innovation for their Comparative Evaluation.” Journal of Business Ethics 16 (1997): 1237-1260. Pinkard, Terry. “Invasions of Privacy.” Ethical Issues in Social Science Research, eds. Tom L. Beauchamp, et al. Baltimore: Johns Hopkins University Press, 1982. 257-273. Pla Rodriguez, Americo. “The Protection of Workers' Privacy: The Situation in the Americas.” International Labour Review 134 (1995): 297-313. Ploughman, Penelope. “Public Policy versus Private Rights: The Medical, Social, Ethical, and Legal Implications of the Testing of Newborns for HIV.” AIDS & Public Policy Journal 10 (1995, 1996): 182-204. Plumwood, Val. “Feminism, Privacy and Radical Democracy.” Anarchist Studies 3 (1995): 97-120 Pollio, Marie C. “The Inadequacy of HIPPA’s Privacy Rule.” New York University Annual Survey of American Law 60 (2004): 579. Posner, Richard A. “Privacy, Surveillance, and Law.” The University of Chicago Law Review75 (Winter, 2008): 245-260 Posner, Richard A. The Economics of Justice. Harvard University Press, 1981. Posner, Richard A. “The Right of Privacy.” Georgia Law Review, 12 (1978): 393. 338 Posner, Richard A. “Orwell versus Huxley: Economics, Technology, Privacy, and Satire.” Philosophy and Literature 24 (2000): 1-33. Posner, Richard A. "Privacy, Secrecy, and Reputation." Buffalo Law Review 28 (Winter 1979): 1-56. Prosser, William. “Privacy.” California Law Review 48 (1960): 383-422. Post, Robert C. Tort Law and the Communitarian Foundations of Privacy. The Responsive Community 10 (1999, 2000): 19-30 Postow, B C., “Andre on Privacy.” Journal of Value Inquiry 22 (1988): 327-330 Note, “Privacy, photography, and the press. Harvard Law Review 111 (1998):1086-1103. “Privacy, Technology, and the California "Anti-paparazzi" Statute.” Harvard Law Review 112 (1999):1367-84. Prost, Antoine and Vincent, Gerard, ed. A History of Private Life: Vol. 5: “Riddles of Identity in Modern Times.” Cambridge, Mass.: Harvard University Press, 1991. Raab, Charles D, Bennett, Colin J. “Protecting Privacy Across Borders: European Policies and Prospects.” Public Administration 72 (1994):95-112. Raab, Charles D, Bennett, Colin J. “The distribution of Privacy Risks: Who Needs Protection.” Information Society 14 (1998):263-74. Rachels, James. “Why Privacy Is Important.” Philosophy and Public Affairs 4 (1975): 323-333. Rao, Radhika. “Reconceiving Privacy: Relationships and Reproductive Technology.” UCLA Law Review 45 (1998):1077-1124. Raul, Alan Charles. Privacy and the Digital State: Balancing Public Information and Personal Privacy. Kluwer Academic Publishers Group, 2002. Regan, Priscilla M. Legislating Privacy: Technology, Social Values, And Public Policy. Chapel Hill, NC: University of North Carolina Press, 1995. Regan, Priscilla M. “The Globalization of Privacy: Implications Of Recent Changes In Europe.” American Journal of Economics and Sociology 52 (1993): 257-274. Reidenberg, J. R. “Privacy in the Information Economy: A Fortress or Frontier for Individual Rights?” Federal Communications Law Journal 44 (1992): 195-243. Reiman, Jeffrey H. “Privacy, Intimacy, and Personhood.” Philosophy and Public Affairs 6 (1976): 2644. Reiman, Jeffrey H. “Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Information Technology of the Future.” Santa Clara Computer and High Technology Law Journal 11 (1995): 27-44. Reisner, Susan L. “Balancing Inmates' Right to Privacy with Equal Employment for Prison Guards.” Women's Rights Law Reporter 4 (1978): 243-51. 339 Reitman, Alan. “Freedom of Information and Privacy: The Civil Libertarian's Dilemma.” American Archivist 38 (1975): 501-508. Relyea, Harold C. “Freedom of Information, Privacy, and Official Secrecy: The Evolution of Federal Government Information Policy Concepts [United States].” Social Indicators Research, 7 (1980):137-56. Resnik, David B. “Genetic Privacy in Employment.” Public Affairs Quarterly 7 (1993): 47-56. Reza, Sadiq. “Privacy and the Criminal Arrestee or Suspect: In Search of a Right, In Need of a Rule.” Maryland Law Review 64 (2005): 755. Rich, Ben A. “The Assault on Privacy in Healthcare Decision Making.” Denver University Law Review, 68 (1991): 1-55. Richards, David A. J. “Is My Body My Property?” Social Research 68 (2001): 83-101. Richards, David A. J. “The Jurisprudence of Privacy as a Constitutional Right.” In Privacy, ed. William Bier, 135-51. New York: Fordham University Press, 1980. Richards, David A. J. “Unnatural Acts and the Constitutional Right to Privacy: A Moral Theory.” Fordham Law Review 45 (1977): 1312-48. Richards, Neil M. “Reconciling Data Privacy and the First Amendment.” University of California Law Review 52 (2005): 1149. Richman, Sheldon. “Dissolving the Inkblot: Privacy as Property Right.” Cato Policy Report. 15 (Jan/Feb 1993). Rickless, Samuel. “The Right to Privacy Unveiled.” San Diego Law Review 44 (Fall 2007): 773-798. Rössler, Beate. The Value of Privacy. Translated by Rupert D. V. Glasgow (Cambridge, UK: Polity, 2005). Riley, T. “Access to Government Information: An International Perspective.” Journal of Media Law and Practice 2 (1981): 92-100. Roazen, Paul. “Privacy and Therapy.” Society 29 (Jan./Feb.1992): 14-17. Robbin, Alice. “State Archives and Issues of Personal Privacy: Policies and Practices.” American Archivist 49 (1986):163-75. Robison, Wade L. “Privacy and Personal Identity.” Ethics and Behavior 7 (1997): 195-205. Rohr, John A. “Privacy: Law and Values.” Thought 49 (1974):353-373. Rollins, C D. “Contingent Privacy That is Complete.” Philosophical Studies 14 (1963): 91-96. Rosen, Jeffrey. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age. New York: Random House, 2004. Rosen, Jeffrey. The Unwanted Gaze: The Destruction Of Privacy In America. Vintage Press 2001. Rosen, Jeffrey. “Out of Context: The Purposes of Privacy.” Social Research 68 (2001): 209-220. 340 Rosen, Jeffrey. “Why Privacy Matters.” The Wilson Quarterly 24 (2000): 32. Rosenberg, Alexander. “Privacy as a Matter of Taste and Rights.” Social Philosophy and Policy 17 (2000): 68-90. Rosenfeld, Frank A. “The Freedom of information act's privacy exemption and the Privacy act of 1974.” Harvard Civil Rights Civil Liberties Law Review 11 (1976): 596-631.. Rotenberg, M. “Preserving Privacy in the Information Society.” International Forum on Information and Documentation 23 (1998): 11-18. Rotenberg, Marc. “Fair information practices and the Architecture of Privacy (what Larry doesn't get).” Stanford Technology Law Review 1 (2001). Rotenberg, Marc. “Inside the Beltway: The Politics of Privacy.” Government Information Insider 4 (1995): 5-7. Roth, Louise Marie. “The Right to Privacy Is Political: Power, the Boundary between Public and Private, and Sexual Harassment.” Law & Social Inquiry 24 (1999): 45-71. Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone's Private Life and Open Secret. Simon and Schuster, 1992. Rubel, Alan. “Privacy and the U.S.A. Patriot Act: Rights, the Value of Rights, and Autonomy.” Law and Philosophy 26 (March 2007): 119-159. Rubenfeld, Jed. “The Right of Privacy.” Harvard Law Review 102 (1989): 737-807. Rubin, Paul H, Lenard, Thomas M. Privacy and the Commercial Use of Personal Information. Kluwer Academic Publishers Group, 2002. Ruiz, Blanca R. “The Right to Privacy: A Discourse Theoretical Approach.” Ratio Juris 11 (1998): 155-167. Rule, James B. “Toward Strong Privacy: Values, Markets, Mechanisms, and Institutions.” University of Toronto Law Journal 54 (2005): 147. Rushing, Don G. “Picking Your Poison: The Drug Efficacy Requirement and the Right of Privacy.” UCLA Law Review 25 (1978): 577-617. Russell, Steve. “The New Outlawry and Foucault's Panoptic Nightmare.” American Journal of Criminal Justice 17 (1993): 39-50. Ryan, Alan. “Private Selves and Public Parts.” 135-154. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. Ryan, Alan. Public and Private Property.” 223-248. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. Ryberg, Jesper. “Privacy Rights, Crime Prevention, CCTV, and the Life of Mrs Aremac.” Res Publica: A Journal of Legal and Social Philosophy 13 (2007): 127-143. 341 Samar, Vincent J. “Privacy and the Debate over Same-Sex Marriage versus Unions.” DePaul Law Review 54 (2005): 783. Samoriski, Jan H. “Private Spaces and Public Interests: Internet Navigation, Commercialism and the Fleecing of Democracy.” Communication Law and Policy 5 (2000): 93-113. Sanford, B. W. Libel and Privacy: The Prevention and Defense of Litigation. Clifton, NJ: Law and Business/Harcourt Brace Jovanovich, 1985. Saunders, John Turk. “In Defense of a Limited Privacy.” Philosophical Review 78 (1969): 237-248. Saxonhouse, Arlene. “Classical Greek Conceptions of Public and Private.” 363-384. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. Scanlon, Thomas. “Thomson on Privacy.” Philosophy and Public Affairs 4(1975): 315-322. Schauer, Frederick. “Can Public Figures Have Private Lives?” Social Philosophy & Policy 17 (2000): 293-309. Schauer, Frederick. “Free Speech and the Social Construction of Privacy.” Social Research 68 (2001): 221-232. Schick, Ida Critelli. “Personal Privacy and Confidentiality in an Electronic Environment.” Bioethics Forum 12 (1996): 25-30. Schiff, Martin. “The Emergence of Student Rights to Privacy Under the Fourth Amendment.” Baylor Law Review 34 (1982): 209-27. Schmuhl, Robert. “Presidential Perplexity: What's Public? What's Private?” Society 38 (2000): 96102. Schneider, Carl. Shame, Exposure, and Privacy. Boston: Beacon Press, 1977. Schoechle, Timothy D. “Privacy on the Information Superhighway: Will My House Still Be My Castle.” Telecommunications Policy 19 (1995): 435-52. Schoeman, Ferdinand. “Privacy: Philosophical Dimensions.” American Philosophical Quarterly 21 (1984): 199-214. Schoeman, Ferdinand D. "AIDS and Privacy." In AIDS and Ethics, Reamer, Frederic G. ed. Columbia University Press: New York, 1993. Schoeman, Ferdinand D. Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press: Cambridge, 1984. Schoeman, Ferdinand D. “Privacy and Criminal Justice Policies.” Criminal Justice Ethics 3 (1983): 71-84. Schoeman, Ferdinand D. Privacy and Social Freedom. Cambridge University Press: New York, 1992. Schonsheck, Jonathan. “Privacy and Discrete Social Spheres." Ethics and Behavior 7 (1997): 221228. 342 Schwartz, Paul M. “Property, Privacy, and Personal Data.” The Harvard Law Review 117 (2004): 2055. Scott, Gini Graham. Mind Your Own Business: The Battle for Personal Privacy. Plenum Publishing Corporation, 1995. Senchuk, Dennis M. “Privacy Regained.” Philosophical Investigations 9 (1986): 18-35 Shapiro, Stuart. “Places and Spaces: The Historical Interaction of Technology, Home, and Privacy.” Information Society 14 (1998): 275-84. Shils, Edward. The Torment of Secrecy: The Background and Consequences of American Security Policies. Chicago, IL: Ivan R. Dee, Inc, 1996. Shivers, Nonnie L. “Firing ‘Immoral’ Public Employees: If Article 8 of the European Convention on Human Rights Protects Employee Privacy Rights, Then Why can’t We?” Arizona Journal of International and Comparative Law 21 (2004): 621. Sieghart, Paul. Privacy and Computers. London: Latimer , 1976. Sillitoe, P J. “Privacy in a Public Place: Managing Public Access to Personal Information Controlled by Archives Services.” Journal of the Society of Archivists 19 (1998): 5-15. Singleton, Solveig. “Privacy and Twenty-First Century Law Enforcement: Accountability for New Techniques.” Ohio Northern University Law Review 30 (2004): 417. Simitis, S. “Reviewing Privacy in an Information Society.” University of Pennsylvania Law Review 135 (1987): 70-76. Simon, Morton J. "Right of Privacy, Right to Know: Which Prevails?" Public Relations Review 3 (1977): 5-18. Slobogin, Christopher. “Subpoenas and Privacy.” DePaul Law Review 54 (2005): 805. Slobogin, Christopher. “Technologically Assisted Physical Surveillance: The American Bar Association's Tentative Draft Standards.” Harvard Journal of Law and Technology 10 (1997): 383-463. Smith, Lamar. “DragNet: Law Enforcement, Civil Liberties, and the Internet since September 11.” LBJ Journal of Public Affairs 15 (2003): 16-25. Smith, Martha M. “Walking with the FBI: Patriotism as Personal Dissent 1 Year after 9 /11.”Journal of Information Ethics 12 (2003): 10-15. Smithsimon, Molly. “Private Lives, Public Spaces: The Surveillance State.” Dissent 50 (2003): 4349. Snortland, Neil. “The Supreme Court and the Constitutional Right to Privacy.” Midsouth Political Science Journal 11 (1990): 105-24. Solove, Daniel J. Understanding Privacy (Cambridge MA: Harvard University Press, 2008). 343 Solove, Daniel J., and Richards, Neil. “Privacy's Other Path: Recovering the Law of Confidentiality.” Georgetown Law Journal 96 (2007): 123-182. Solove, Daniel J. “The Virtues of Knowing Less: Justifying Privacy Protections against Disclosure.” Duke Law Journal 53 (2003): 967. Solove, Daniel J. The Digital Person: Technology and Privacy in the Information Age. New York and London: New York University Press, 2004. Solove, Daniel J. “A Taxonomy of Privacy.” University of Pennsylvania Law Review 154 (2006): 477. Soifer, Eldon, Szabados, Bela. “Hypocrisy and Privacy.” Journal of Philosophical Research 27 (2002): 601-618. Spence Diehl, Emily. “Stalking and Technology: The Double Edged Sword.” Journal of Technology in Human Services 22 (2003): 5-18. Spinello, Richard A. Ethical Aspects of Information Technology. Prentice Hall: Englewood Cliffs, 1995. Springer, K. A. “In God We Trust: All Others Who Enter this Store are Subject to Surveillance.” Federal Communications Law Journal 48 (1995): 187-218. Sponka, J. “Freedom of Speech and Privacy in the Information Age.” Information Society 13 (1997): 171-184. Steinke, G. “Data Privacy Approaches from US and EU Perspectives.” Telematics and Informatics 19 (2002): 193-200 Steinman, Joan. “Privacy of Association: A Burgeoning Privilege in Civil Discovery.” Harvard Civil Rights Civil Liberties Law Review 17 (1982): 355-442. Stevenson, Valerie. “FBI in Your Library? The USA PATRIOT Act and its Implications for Libraries.” Legal Information Management 3 (2003): 68-70. Stockman, Norman. “Intruding on Barrington Moore's Privacy: A Review Essay.” Theory, Culture & Society 6 (1989): 125-144. Strahilevitz, Lior J. “A Social Networks Theory of Privacy.” University of Chicago Law Review 72 (2005): 1313. Stratford, J. “Computerized and Networked Government Information: Carnivore.” Journal of Government Information 28 (2001): 109-12. Strossen, N. “Cybercrimes v. Cyberliberties.” International Review of Law, Computers and Technology 14 (2000): 11-24. Struening, Karen. “Privacy and Sexuality in a Society Divided Over Moral Culture.” Political Research Quarterly 49 (1996): 505. 344 Sullum, Jacob. “Secrets for Sale: Do Strangers with Computers Know Too Much About You.” Reason 23 (1992): 28-35. Sumberg, Theodore A. “Privacy, Freedom, and Obscenity: Stanley v Georgia.” Journal of Critical Analysis 3 (1971): 84-96. Sundby, Scott E . "Everyman's Fourth Amendment: Privacy or Mutual Trust Between Government and Citizen.” Columbia Law Review 94 (1994): 1751-1812. Sunstein, C. R. Democracy and the Problem of Free Speech. New York: Free Press, 1993. Suter, Sonia M. “Disentangling Privacy from Property: Toward a Deeper Understanding of Genetic Privacy.” The George Washington Law Review 72 (2004): 737. Swinburne, R G. “Privacy.” Analysis 24 (1964): 127-136. Sykes, C. J. The End of Privacy. New York: St. Martin’s Press, 1999. Talbott, William J. Which Rights Should be Universal? Oxford: Oxford University Press, 2005. Tavani, Herman. “Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy.” Metaphilosophy 38 (January 2007): 1-22. Tavani, Herman. “Privacy Enhancing Technologies As a Panacea for Online Privacy Concerns: Some Ethical Considerations.” Journal of Information Ethics 9 (2000): 26-36. Tavani, Herman, Grodzinsky, Frances S. “Cyberstalking, Personal Privacy, and Moral Responsibility.” Ethics and Information Technology 4 (2002): 123-132. Tavani, Herman T. “Informational Privacy, Data Mining, and the Internet.” Ethics and Information Technology 1 (1999): 137-145. Tavani, Herman T. KDD, “Data Mining, and the Challenge for Normative Privacy.” Ethics and Information Technology 1 (1999): 265-273. Taylor, James Stacey. “In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance.” Public Affairs Quarterly 19 (July 2005): 227-246. Taylor, James Stacey. “Privacy and Autonomy: A Reappraisal.” Southern Journal of Philosophy 40 (2002): 587-604. Telford, T. L. Freedom of speech in the United States. New York: Random House, 1985. Tepker, Harry F Jr. “Abortion, Privacy and State Constitutional Law: A Speculation if (or when) Roe v. Wade is Overturned.” Emerging Issues in State Constitutional Law 2 (1989): 173-87. Terrill, Richard J. “An Overview of the Privacy Issues in Criminal Justice: Trends in the United States and England.” Police Studies 1 (1978): 42-50. Thomas, Terry. Privacy and Social Services. Ashgate Publishing Company Ltd., 1995. Thompson, Dennis F. “Privacy, Politics, and the Press.” Harvard International Journal of Press/Politics 3 (1998): 103-13. 345 Thompson, M. P. “Breach of Confidence and the Protection of Privacy in English Law.” Journal of Media Law and Practice 6 (1985): 5-25. Thompson, Paul B. “Privacy, Secrecy and Security.” Ethics and Information Technology 3 (2001): 13-19. Thomson, Judith Jarvis. “The Right to Privacy.” Philosophy and Public Affairs 4 (1975): 295-314. Townsend, James B, Paul, Robert J. “Employee Privacy Rights.” Business and Public Affairs 16 (1990): 16-21. Trinkle, Catherine A. “Federal Standards for Sex Offender Registration: Public Disclosure Confronts the Right to Privacy.” William and Mary Law Review 37 (1995): 299-336. Trubow, G. B. “Peeping Sam: Uncle is Watching Us.” Journal of Computing Security 4 (1986): 1520. Tucker, David. “Privacy as a Right.” Melbourne Journal of Politics 13 (1981): 3-15. Tunick, Mark. “Does Privacy Undermine Community?” Journal of Value Inquiry 35 (2001): 517-534. Tunick, Mark. “Privacy in the Face of New Technologies of Surveillance.” Public Affairs Quarterly 14 (2000): 259-277. Tushnet, Mark. “Legal Conventionalism in the U.S. Constitutional Law of Privacy.” Social Philosophy & Policy 17 (2000): 141-164. Twight, Charlotte. “Watching You: Systematic Federal Surveillance of Ordinary Americans.” Independent Review 4 (1999): 165-2000. Tyler, Michele L. “Blowing Smoke: Do Smokers Have a Right? Limiting the Privacy Rights of Cigarette Smokers.” Georgetown Law Journal 86 (1998): 783-811. Van Den Haag, Ernest. “On Privacy.” Privacy: Nomos XIII, ed. J. Roland Pennock and John Chapman, 149-68. New York: Atherton Press, 1971. Van Den Hoven, Jeroen. “Privacy and the Varieties of Informational Wrongdoing.” Australian Journal of Professional and Applied Ethics 1 (1999): 30-43 Van De Vate, Dwight, Jr. “The Genesis of Privacy.” Journal of Existentialism 7 (1966/67): 233-242. Vidmar, Neil and Flaherty, David H. “Concern for Personal Privacy in an Electronic Age.” Journal of Communication 35 (1985): 91-103. Vitek, William. “Privacy's Place: The Role of Civility and Community in a Technological Culture.” Ethics and Behavior 7 (1997): 265-270. Vitone, P. “Reflections on Surveillance.” Canadian Journal of Communication 19 (1994): 101-110. Voakes, P S. “What Were You Thinking? A Survey of Journalists Who Were Sued For Invasion of Privacy.” Journalism and Mass Communication Quarterly 75 (1998): 378-93. 346 Volokh, Eugene. “Cyberspace and Privacy: A New Legal Paradigm? Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About You.” Stanford Law Review 52 (2000): 1049. Vreg, France. “The Contemporary Media Dilemma: Where Are the Boundaries between Privacy and the Right to Information?” Teorija in Praksa 33 (1996): 408-423. Wacks, Raymond. Personal Information: Privacy and the Law. Oxford University Press, 1989. Wacks, Raymond. The Protection of Privacy. London: Sweet & Maxwell, 1980. Walton, Anthony. “Public and Private Interests: Hegel on Civil Society and the State.” 249-266. Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983. Warner, Richard. “Surveillance and the Self: Privacy, Identity, and Technology.” DePaul Law Review 54 (2005): 847. Ware, Willis H. “The New Faces of Privacy.” Information Society 9 (1993): 195-211. Warren, Samuel, and Louis Brandeis. “The Right to Privacy.” The Harvard Law Review 4 (1890): 193-220. Washburn, P. “Electronic Journalism, Computers and Privacy.” Computer/Law Journal 2 (1982): 189-209. Wasserstrom, Richard. “Privacy: Some Arguments and Assumptions.” Philosophical Law, ed. Bronaugh, 148-66. Westport, CT: Greenwood Press, 1978. Watkins, John J. “Private Property vs. Reporter Rights: A Problem In Newsgathering: Use Of Trespass Law By Subjects Of Coverage To Accomplish What Can't Be Accomplished Through Libel Law Or Privacy Law Poses Problem For The Media.” Journalism Quarterly 54 (1977): 690-6. Weigel Garrey, Cindy J, Cook, Christine C, Brotherson, Mary Jane. “Children and Privacy: Choice, Control, and Access in Home Environments.” Journal of Family Issues 19 (1998): 43-64. Weinreb, Lloyd L. “The Right to Privacy.” Social Philosophy and Policy 17 (2000): 25-44. Weisman, A. M. “Publicity as an Aspect of Privacy and Personal Autonomy.” Southern California Law Review 55 (1982): 727-768. Weiss, Paul. Privacy. S. Illinois University Press: Carbondale, 1983. Werdegar, Matthew Mickle. “Lost? The Government Knows Where You Are: Cellular Telephone Call Location Technology and the Expectation of Privacy.” Stanford Law & Policy Review 10 (1998): 103-17. Westin, Alan F. Privacy and Freedom. New York: Atheneum, 1967. 347 Westin, Alan F. “Intrusions: Privacy Tradeoffs in a Free Society.” Public Perspective 11 (2000): 819. Westin, Alan F. “Privacy and Personnel Records: A Look at Employee Attitudes.” Civil Liberties Review 4 (1978): 28-34. Westin, Alan F. “Social and Political Dimensions of Privacy.” Journal of Social Issues 59 (2003): 431-453. Weyns, Walter. “Borderline Skirmishes. A Sociological Exploration of the Boundary between the Private and the Public Realm.” Tijdschrift voor Sociologie 19 (1998): 247-279. Whitaker, Reg. The End Of Privacy: How Total Surveillance Is Becoming A Reality. W. W. Norton & Company, Inc., 1999. White, Peter. “Privacy an International Concern.” International Library Review 12 (1980): 223-242. Whitman, James Q. “The Two Cultures of Privacy: Dignity versus Liberty.” Yale Law Journal 11(2004): 1151. Wiesenthal, David L, Wiener, Neil I. “Privacy and the Human Genome Project.” Ethics and Behavior 6 (1996): 189-202. Wigand, R. T., Shipley, C., Shipley, D. “Transborder Data Flow, Informatics, and National Policies.” Journal of Communication 34 (1984): 153-175. Willis, James, Silbey, Susan. “Self, Surveillance, and Society.” The Sociological Quarterly 43 (2002): 439-445. Winch, Samuel P. “Moral Justifications for Privacy and Intimacy.” Journal of Mass Media Ethics 11 (1996): 197.. Winseck, D. “Illusions Of Perfect Information And Fantasies Of Control In The Information Society.” New Media & Society 4 (2002): 93-122. Wolf, Rita, Thomason, Tommy, LaRocque, Paul. “The Right to Know vs. the Right of Privacy: Newspaper Identification of Crime Victims.” Journalism Quarterly 64 (1987): 503-507. Wolhandler, Steven J. “Voluntary Active Euthanasia For The Terminally Ill And The Constitutional Right To Privacy.” Cornell Law Review 69 (1984): 363-83. Wollheim, R. “Privacy.” Proceedings of the Aristotelian Society 51 (1951): 83-104. Woodbury, Marsha. “Email, Voicemail, and Privacy: What Policy Is Ethical?” Science and Engineering Ethics 6 (2000): 235-244. Woronoff, Michael A. “Public Employees Or Private Citizens: The Off Duty Sexual Activities Of Police Officers And The Constitutional Right Of Privacy [United States].” University of Michigan Journal of Law Reform 18 (1984):195-219. 348 Zabuzhko, Oksana. “Publicity and Media under Communism and After: The Destruction of Privacy.” Social Research 69 (2002): 35-47. Young, John, ed. Privacy. New York: John Wiley and Sons, 1978. Zimmerman, D. L. “False Light Invasion of Privacy: The Light that Failed.” New York University Law Review 64 (1989): 364-453. 349