Word

advertisement
Privacy Rights: Moral and Legal Foundations
Bibliography
Abrams, Gerald D. "The Right to Privacy when Lives are at Stake." Troubling Problems in Medical
Ethics, Ed. by Marc Basson. New York: Liss, 1981. 257-268.
Abramsky, Leslie C. “Questionnaires and Constitutional Privacy Rights in Public Sector
Employment.” The George Washington Law Review 62 (1994): 693-717.
Ackerman, M., Darrell, T., and Weitzner, D. J. “Privacy in Context.” Human Computer Interaction
16 (2001): 167-76.
Adams, Helen R. “Privacy and Confidentiality: Now More than Ever, Youngsters Need to Keep their
Library Under Wraps.” American Libraries 33 (2002): 44 46, 48.
Adkins, David C. “Right to Privacy?: Why the Private Facts Trot Cannot Coexist with the First
Amendment.” First Amendment Law Review 2 (2004): 325.
Adler, G. Stoney, and Tompkins, Phillip K. “Electronic Performance Monitoring.” Management
Communication Quarterly 10 (1997): 259-288.
Adler, Michael. “Cyberspace, General Searches, and Digital Contraband: The Fourth Amendment and
the Net Wide Search.” Yale Law Journal 106 (1996):1093-1120.
Adler, Philip Jr. “Employee Privacy: Legal and Research Developments and Implications for
Personnel Administration.” Sloan Management Review 26 (1985):13-22.
Alderman, Ellen and Kennedy, Caroline. The Right to Privacy. Knopf Press, New York,
1995.
Agre, P. E., and Rotenberg, M. “Technology and Privacy: The New Landscape.” Journal of the
American Society for Information Science 50 (1999): 631-633.
Agre, Philip E. “Surveillance and Capture: Two Models of Privacy.” The Information Society 10
(1994): 101-127.
Agre, Philip E. “The Architecture of Identity: Embedding Privacy in Market Institutions.”
Information, Communication & Society 2 (1999): 1-25.
Akdeniz, Yaman. “New privacy concerns: ISPs, crime prevention and consumers' rights.”
International Review of Law, Computers and Technology 14 (2000): 55-61.
Akdeniz, Yaman. “Anonymity, Democracy, and Cyberspace.” Social Research 69 (2002): 223-237.
Albanese, Andrew Richard, Berry, John N, DiMattia, Susan S, Kenney, Brian, Oder, Norman, and
Rogers, Michael. “Privacy, Porn, and Public Access in 2004.” Library Journal 128 (2003): 68-70.
292
Alder, G. Stoney. “Ethical Issues in Electronic Performance Monitoring: A Consideration of
Deontological and Teleological Perspectives.” Journal of Business Ethics 17 (1998): 729-743.
Alderman, Ellen. “Homeland security & privacy: striking a delicate balance.” Carnegie Reporter 2
(2002): 22-31.
Aldhouse, F. “The Transfer of Personal Data to Third Countries under EU Directive 95/46/EC.”
International Review of Law, Computers and Technology 13 (1999): 75-79.
Alfino, M. “Information Ethics in the Workplace: Misplacing Privacy.” Journal of Information Ethics
10 (2001): 5-8.
Alfino, Mark, and Mayes, G. Randolph. “Reconstructing the Right to Privacy.” Social Theory and
Practice 29 (2003): 1-18.
Alge, Bradley J. “Effects of Computer Surveillance on Perceptions of Privacy and Procedural
Justice.” Journal of Applied Psychology 86 (2001): 797.
Allard, N. W. “Privacy Online: Washington report.” Hastings Communications and Entertainment
Law Journal 20 (1998): 511 540.
Allen, Anita L. “The Virtuous Spy: Privacy As an Ethical Limit.”
Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008):
3-22.
Anita Allen, Why Privacy Isn't Everything: Feminist Reflections on Personal Accountability.
Rowman & Littlefield 2003.
Allen, Anita L. “Is Privacy Now Possible? A Brief History of an Obsession.” Social Research 68
(2001): 301-06.
Allen, Anita L. “Cyberspace and Privacy: A New Legal Paradigm? Gender and Privacy in
Cyberspace.” Stanford Law Review 52 (2000): 1175.
Allen, Anita L. Uneasy access: privacy for women in a free society. New Jersey: Rowman and
Littlefield, 1988.
Allen, Anita L. "Privacy and Equal Protection as Bases for Abortion Law: Citizenship, Gender, and
the Constitution." Having and Raising Children, ed. Uma Narayan. University Park:
Pennsylvania UP, 1999.
Allen, Anita L. “Coercing Privacy.” William and Mary Law Review 40 (1999): 723.
Allen, Anita L. “Lying to Protect Privacy.” Villanova Law Review 44 (1999): 161.
Allen, Anita L. "Women and their Privacy: What is at Stake." Beyond Domination, ed. Carol C.
Gould. Ottowa: Rowman and Allanheld, 1984, 233-249.
Allen, Arthur. “Medical privacy? Forget it.” Medical Economics 75 (1998): 151-152.
293
Alpa, Guido. “The Discipline of Personal Databases and New Technologies for Formation of
Individual Identity.” Sociologia del Diritto 24 (1997): 45-58.
Alpert, Sheri. “Privacy Issues in Clinical Genomic Medicine, or Marcus Welby, M.D., Meets the
$1000 Genome.” Cambridge Quarterly of Healthcare Ethics 17 (Fall 2008) :373-384.
Alpert, Sheri A. “Protecting Medical Privacy: Challenges in the Age of Genetic Information.”
Journal of Social Issues 59 (2003): 301-323.
Alpert, Sheri. “Smart Cards, Smarter Policy: Medical Records, Privacy, and Health Care Reform.”
Hastings Center Report 23 (1993): 13-23.
Amann, Diane. “Publicker Industries v. Cohen: Public Access to Civil Proceedings and a
Corporation's Right to Privacy.” Northwestern University Law Review 80 (1986): 1319-1354.
Anderson, Scott A.” Privacy without the Right to Privacy.” Monist: An International Quarterly
Journal of General Philosophical Inquiry 91 (January 2008): 81-107.
Andre, Judith. “Privacy as a Value and as a Right.” Journal of Value Inquiry 20 (1986): 309-317.
Andrejevic, Mark. “The Work of Being Watched: Interactive Media and the Exploitation of Self
Disclosure.” Critical Studies in Media Communication 19 (2002): 230-248.
Andrews, Lori B. “Mom, Dad, Clone: Implications for Reproductive Privacy.” Cambridge Quarterly
of Healthcare Ethics 7 (1998): 176-186.
Angel, Colleen. “The Right to Privacy.” Journal of Information Ethics 9 (2000): 11-25.
Apasu Gbotso, Yao. “Survey on the Constitutional Right to Privacy in the Context of Homosexual
Activity.” University of Miami Law Review 40 (1986): 521-657.
Apostolou, G. L. “Threat to Privacy: The Federal Government's Use of Personal Information in the
New Communication Environment.” Telematics and Informatics 5 (1988): 451-459.
Arblaster, Anthony. The Rise and Decline of Western Liberalism. Oxford, England: Basil Blackwell
Publishers, 1984.
Archer, Dane, and Erlich, Lynn. “Weighing the Evidence: A New Method for Research on Restricted
Information.” Qualitative Sociology 8 (1985): 345-358.
Ardito, S C. “New Filtering and Censorship Challenges.” Information Today 19 (2002): 19-21.
Armstrong, H L, and Forde, P J. “Internet Anonymity Practices in Computer Crime.” Information
Management and Computer Security 11 (2003): 209-215.
Arneson, Richard J. “Egalitarian Justice versus The Right to Privacy?” Social Philosophy and Policy,
17 (2000): 91-119.
Arnold, S E. “Internet Users at Risk: The Identity/Privacy Target Zone.” Searcher 9 (2001): 24-39.
Arrow, Kenneth J. “Nozick’s Entitlement Theory of Justice.” Philosophia 7 (1978): 265-279.
294
Artandi, Susan. “Man, Information, and Society: New Patterns of Interaction.” Journal of the
American Society for Information Science 30 (1979): 15-18.
Arthur, John. The Unfinished Constitution: Philosophy and Constitutional Practice. Belmont:
Wadsworth, 1989.
Ashdown, Gerald G. “Media Reporting and Privacy Claims: Decline in Constitutional Protection for
the Press.” Kentucky Law Journal 66 (1977/1978): 759-99.
Athanasiou, Tom. “Encryption Technology, Privacy, and National Security.” Technology Review 89
(1986): 56-64.
Auerbach, L. “Privacy and Canadian Telecommunications Regulations.” Telecommunications Policy,
7 (1983): 35-42.
Austin, Lisa. “Privacy and the Question of Technology.” Law and Philosophy 22 (2003): 119-166.
Awad, Naveen Farag and Krishnan, M. S.. 2006. "The Personalization Privacy Paradox: An
Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for
Personalization," Management Information Systems Quarterly 30 (2006): 13-28.
Ayoade, J. O., and Kosuge, T. “Breakthrough in Privacy Concerns and Lawful Access Conflicts.”
Telematics and Informatics 19 (2002): 273-289.
Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Englewood Cliffs:
Prentice Hall, 1997.
Back, Kurt W. Privacy, Self & Society. American Sociological Association (ASA), 1985.
Baer, Walter S. “Technology's Challenges to the First Amendment.” Telecommunications Policy 17
(1993): 3-13.
Baez, Benjamin. “Confidentiality in Qualitative Research: Reflections on Secrets, Power and
Agency.” Qualitative Research 2 (2002): 35-58.
Bailey, Joe. “From Public to Private: The Development of the Concept of the ‘Private.’” Social
Research 69 (2002): 15-33.
Bailey, Joe. “Some Meanings of 'the Private' in Sociological Thought.” Sociology 34 (2000): 381.
Backer, Larry C. “Global Panopticism: States, Corporations, and the Governance of Monitoring
Regimes.” Indiana Journal of Global Legal Studies 15 (Winter 2008): 102-148.
Baker, Edwin. “Autonomy and Informational Privacy, or Gossip: The Central Meaning of the First
Amendment.” Social Philosophy and Policy 21 (2004): 215-268.
Bakich, Kathryn L. “Health Plans and Individual Rights to Privacy of Health Information, Resolving
the Conflict.” Benefits Law Journal 12 (1999): 7-37.
Balas, J. L. “How Should Privacy be Protected in the Electronic Library?” Computers in Libraries 21
(2001): 53-55.
295
Ball, Howard. No Pledge of Privacy: The Watergate Tapes Litigation, 1973 1974. Port Washington,
NY: Kennikat, 1977.
Barajas Ochoa, Rosa Elvia, and Massieu Trigo, Yolanda Cristina. “The Human Genome Project. A
Challenge for Science, but a Dilemma for Humanity.” Sociologica 12 (1997): 119-154.
Barnes, J A. Who Should Know What? Social Science, Privacy and Ethics. Cambridge University
Press, 1980.
Baxter, John D. State Security, Privacy and Information. Harvester Wheatsheaf, 1990.
Bayer, Ronald. “AIDS, Privacy, and Responsibility.” Daedalus 118 (1989): 79-99.
Bazillion, R J. “The Effect of Access and Privacy Legislation on the Conduct of Scholarly Research
in Canada.” Social Science Information Studies 4 (1984): 5-14.
Bazillion, Richard J. “Freedom of Information: A Canadian Dilemma.” Round Table, 288 (1983):
382-394.
Beardsly, Elizabeth. “Privacy: Autonomy and Selective Disclosure.” In Privacy: Nomos XIII, ed. J.
Roland Pennock and John W. Chapman, 56-70. New York: Atherton Press, 1971.
Beauchamp, Tom L. “The Right to Privacy and the Right to Die.” Social Philosophy and Policy 17
(2000): 276-292.
Beauchamp, Tom L (Ed.). Ethical Issues in Social Science Research. Baltimore: Johns Hopkins
Press, 1982.
Bebbington, L. W. “Managing Content: Licensing, Copyright and Privacy Issues in Managing
Electronic Resources.” Legal Information Management 1 (2001): 4-12.
Beck, Robert N. “The Right of Professional Privacy.” Personalist 55 (1974): 145-150.
Bedi, Sonu. “Repudiating Morals Legislation: Rendering the Constitutional Right to Privacy
Obsolete.” Cleveland State Law Review 53 (2005): 447
Beigler, Jerome S. "Privacy and Confidentiality." Law and Ethics in the Practice of Psychiatry, ed.
Charles K. Hofling. New York: Brunner Mazel, 1981. 69-90.
Belair, R. R., Lowe, T. C., Fisher, P. L., and Neier, A. “Freedom of Information vs. Privacy: an
Information Dilemma.” Bulletin of the Medical Library Association 3 (1976): 13-21.
Belair, Robert C. “Less Government Secrecy and More Personal Privacy? Experience with the
Freedom of Information and Privacy Acts.” Civil Liberties Review 4 (1977): 10-18.
Belair, Robert R. Privacy and Juvenile Justice Records. Washington, DC: United States Bureau of
Justice Statistics, 1982.
Belanger, F., Hiller, J. S., and Smith, W. J. “Trustworthiness in Electronic Commerce: The Role of
Privacy, Security, and Site Attributes.” Journal of Strategic Information Systems 11 (2002): 24570.
296
Beling, Craig T. “Transborder Data Flows: International Privacy Protection and the Free Flow of
Information.” Boston College International and Comparative Law Review 6 (1983): 591-624.
Bellman, Beryl L. “The Paradox of Secrecy.” Human Studies 4 (1981): 1-24.
Beloff, Michael. “The Inquisitive Society: Towards the Right of Privacy.” Encounter 35 (1970): 4957.
Benhabib, Seyla. “Feminist Theory and Hannah Arendt's Concept of Public Space.” History of the
Human Sciences 6 (1993): 97-114.
Bennett, C. H., Brassard, G., Crepeau, C., and Maurer, U. M. “Generalized Privacy Amplification.”
IEEE Transactions on Information Theory 41 (1995): 1915-1923.
Bennett, C. H., Brassard, G., and Robert, J. M. “Privacy Amplification by Public Discussion.” Siam
Journal of Computing 17 (1988): 210-229.
Bennett, Colin J. “Arguments for the Standardization of Privacy Protection Policy: Canadian
Initiatives and American and International Responses.” Government Information Quarterly 14
(1997):351-62.
Bennett, Colin J. “Computers, Personal Data, and Theories of Technology: Comparative Approaches
to Privacy Protection in the 1990s.” Science, Technology, and Human Values 16 (1991): 51-69.
Bennett, Colin J. Regulating Privacy: Data Protection and Public Policy in Europe and the United
States. Ithaca, N.Y.: Cornell U. Pr., 1992.
Bennett, Colin J., and Raab, Charles D. “The Adequacy of Privacy: The European Union Data
Protection Directive and the North American response.” Information Society 13 (1997):245-63.
Bennett, Collin J., and Raab, Charles D. “The Governance of Privacy: Policy Instruments in Global
Perspective.” Information Polity 8 (2003): 80-84.
Bennett, Colin J. “Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the
World Wide Web.” Ethics and Information Technology 3 (2001): 197-210.
Bentley, Eric Jr. “Towards an International Fourth Amendment: Rethinking Searches and Seizures
Abroad after Verdugo Urquidez.” Vanderbilt Journal of Transnational Law 27 (1994): 329-417.
Ben Ze'ev, Aaron. “Privacy, Emotional Closeness, and Openness in Cyberspace.” Computers in
Human Behavior 19 (2003): 451-467.
Benn, Stanley. “Privacy, Freedom, and Respect for Persons.” In Privacy: Nomos XIII, ed. J. Roland
Pennock and John W. Chapman, 1-26. New York: Atherton Press, 1971.
Benn, Stanley. “Protection and Limitation of Privacy.” Australian Law Journal 52 (1978): 601.
Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press,
1983.
297
Benn, Stanley. “Private and Public Morality: Clean Living and Dirty Hands.” 155-182. Benn, Stanley
and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.
Benn, Stanley and G. Gaus. “The Liberal Conception of the Public and the Private.” Benn, Stanley
and G. Gaus eds. Public and Private in Social Life. 31-66. New York: St. Martin’s Press, 1983.
Berardo, Felix M. “Family Privacy: Issues and Concepts.” Journal of Family Issues 19 (1998): 4-19.
Berman, J., and Goldman, J. A Federal Right of Information Privacy: The Need for Reform.
Washington, DC: Benton Foundation, 1989.
Bertot, John Carlo, Jaeger, Paul T., and McClure, Charles R. “The Impact of the USA Patriot Act on
Collection and Analysis of Personal Information Under the Foreign Intelligence Surveillance
Act.” Government Information Quarterly 20 (2003): 295-314.
Bibas, Steven A. "A Contractual Approach to Data Privacy." Harvard Journal of Law and Public
Policy 17 (1994): 591-605.
Bible, Jon D. “When Employers Look for Things Other than Drugs: The Legality of AIDS, Genetic,
Intelligence, and Honesty Testing in the Workplace.” Labor Law Journal 41 (1990): 195-213.
Biddle, Andrea K. Public Health, Privacy, and Politics: HIV Partner Notification. Rand Corp, 1991.
Bier, William, ed. Privacy. New York: Fordham University Press, 1980.
Bierman, A.K. “Spying, Liberalism, and Privacy.” Journal of Social Philosophy 5 (1974): 11-14.
Bigelow, R. P. “Computers and Privacy: An American Perspective.” Information Age 8 (1986): 134140.
Bishop, Nicole. “Trust Is Not Enough: Classroom Self Disclosure and the Loss of Private Lives.”
Journal of Philosophy of Education 30 (1996): 429-439.
Black, Tricia E. “Taking Account of the World as it Will Be: The Shifting Course of U.S. Encryption
Policy.” Federal Communications Law Journal 53 (2001).
Bloche, M. Gregg. “Managed Care, Medical Privacy, and the Paradigm of Consent.” Kennedy
Institute of Ethics Journal 7 (1997): 381-386.
Block, Lisa K., and Stokes, Garnett S. “Performance and Satisfaction in Private versus Non-private
Work Settings.” Environment and Behavior 21 (1989): 277-297.
Bloom, Alan. “The Right of Public Access to Information Submitted Under the Requirements of the
Health Planning Act.” Public Health Reports 92 (1977): 411-413.
Bloustein, Edward. Individual and Group Privacy. New Jersey: Transaction Books, 1978.
Bloustein, Edward. “Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser.” New York
University Law Review 39 (1964): 962-1007.
Bloustein, Edward. “Group Privacy: The Right to Huddle.” Rutgers-Camden Law Journal 8 (1977):
219.
298
Blume, P. “Privacy as a Theoretical and Practical Concept.” International Review of Law, Computers
and Technology 11 (1997): 193-202.
Blyth, A. “Managing Security and Privacy Issues while Re-engineering the Healthcare Enterprise.”
Health Informatics Journal 4 (1998): 157-66.
Boag, Jordana. “The Battle of Piracy versus Privacy: How the Recording Industry Association of
America (RIAA) Is Using the Digital Millennium Copyright Act (DMCA) As Its Weapon
Against Internet Users' Privacy Rights.” California Western School of Law California Western
Law Review 41 (2004): 241.
Bocij, Paul. “Victims of Cyberstalking: An Exploratory Study of Harassment Perpetrated via the
Internet.” First Monday 8 (2003).
Boetzkes, Elisabeth. “Privacy, Property, and the Family in the Age of Genetic Testing: Observations
from Transformative Feminism.” Journal of Social Philosophy 32 (2001): 301-316.
Bogard, William. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge,
England: Cambridge U Press, 1996.
Boguscz, B., Davies, J. E., and Oppenheim, C. “Personal Information in UK Public Registers: Its
Availability and Use.” Business Information Review 17 (2000): 82-96.
Bok, Sissela. Secrets: On the Ethics of Concealment and Revelation. New York: Random House,
1983.
Boling, Patricia. “Privacy as Autonomy vs. Privacy as Familial Attachment: A Conceptual Approach
to Right of Privacy Cases.” Policy Studies Review 13 (1994): 91-110.
Boling, Patricia. Privacy and the Politics of Intimate Life. Itahca, NY: Cornell University Press, 1996.
Bonnicksen, Andrea L. “Commentaries on the Uses and Abuses of Genetic Knowledge.” Journal of
Health Politics, Policy and Law 20 (1995): 795-802.
Booms, Hans. “Privacy and Access to Federal Records in the Federal Republic of Germany.” Indian
Archives 35 (1986): 1-5.
Boone, C. Keith. “Privacy and Community.” Social Theory and Practice 9 (1983): 1-30.
Bork, R.,. The Tempting of America: The Political Seduction of the Law. New York: Simon and
Schuster, 1990.
Borna, Shaheen, and Avila, Stephen. “Genetic Information: Consumers' Right to Privacy Versus
Insurance Companies' Right to Know a Public Opinion Survey.” Journal of Business Ethics 19
(1999): 355-362.
Borovoy, A. Alan. “Bugging Canada: The Protection of Privacy and the Wiretap Law.” Perception 1
(1978): 28-30.
Borovoy, A. Alan. When Freedoms Collide: The Case for our Civil Liberties. London: Lester, 1988.
299
Boruch, Robert F. “Methods for Resolving Privacy Problems.” Ethical Issues in Social Science
Research, ed. Tom L. Beauchamp. Baltimore: Johns Hopkins University Press, 1982. 292-314.
Bostwick, Gary L. “Privacy of Personal Information: California Faces the Issues.” Public Affairs
Report 18 (1977): 1-6.
Botan, C. “Communication Work and Electronic Surveillance: A Model for Predicting Panoptic
Effects.” Communication Monographs 63 (1996): 293-313.
Botkin, Jeffrey R. “Fetal Privacy and Confidentiality.” The Hastings Center Report 25 (1995): 32-39.
Bouchard, Robert F, and Franklin, Justin D. Guidebook to the Freedom of Information and Privacy
Acts. New York: Clark Boardman Company Ltd, 1980.
Bovard, James. Terrorism and Tyranny: Trampling Freedom, Justice, and Peace to Rid the World of
Evil. New York: Palgrave MacMillan, 2003.
Boyd, John. “Privacy: No Longer a Personal Matter.” Journal of the American Chamber of
Commerce in Japan 23 (1986):1.
Boyes-Watson, Carolyn. “Record-keeping as a Technology of Power.” Berkeley Journal of Sociology
39 (1994-1995): 1-32.
Boyle, James. Shamans, Software, and Spleens. Cambridge Mass.: Harvard University Press,
1996.
Boyne, Roy. “Post Panopticism.” Economy and Society 29 (2000): 285-307.
Brandt, D. S. “Insecurity on the Net.” Computers in Libraries 18 (1998): 34-37.
Branscomb, Anne W. Who owns information? From privacy to Public Access. New York: Basic
Books/Harper Collins, 1994.
Branscomb, Anne W. “Law and Culture in the Information Society.” Information Society 4 (1986):
279-311.
Breckenridge, Adam C. “Personal Privacy and the Public Interest.” Humanitas 11 (1975): 75-83.
Brenkert, George G. “Privacy, Polygraphs, and Work.” Business and Professional Ethics Journal 1
(1981): 19-36.
Brennan, Geoffrey. “The Economy of Privacy: Institutional Design in the Economy of Esteem.”
Monist: An International Quarterly Journal of General Philosophical Inquiry 91 (January 2008):
23-51.
Brenner, Susan. “The Privacy Privilege: Law Enforcement, Technology, and the Constitution.”
Journal of Technology Law & Policy 7 (2002): 123-194.
Bricke, John. “Privacy and the Mental in Ryle’s ‘Concept of Mind.’” Southwestern Journal of
Philosophy 3 (1972): 45-54.
Brill, Alida. Nobody's Business: Paradoxes of Privacy. Addison Wesley, 1990.
Brin, David. The Transparent Society. Perseus Books, 1998.
300
Brockett, Patrick L, and Tankersley, E. Susan. “The Genetics Revolution, Economics, Ethics and
Insurance.” Journal of Business Ethics 16 (1997): 1661-1676.
Bronaugh, Richard, ed. Philosophical Law: Authority, Equality, Adjudication and Privacy. Westport,
CT: Greenwood Press, 1978.
Brown, George E. Jr. “Federal Information Policy: Protecting the Free Flow of Information.”
Government Information Quarterly 4 (1987): 349-358.
Brown, William S. “Ontological Security, Existential Anxiety and Workplace Privacy.” Journal of
Business Ethics 23 (2000): 61-65.
Brown, William S. “Technology, Workplace Privacy and Personhood.” Journal of Business Ethics 15
(1996): 1237-1248.
Brunnstein, K. “Threats To Individual Privacy and Enterprise Security and Experiences with Internet
Insafety and Insecurity.” International Information and Library Review 29 (1997): 269-270.
Bruras, S. “The Journalist and ‘The Other’: A Normative Perspective on Respect for Privacy in the
Ethics of Journalism.” Nordicom Review 1 (1996): 171-180.
Bryant, Barbara Everitt, and Dunn, William. “The Census and Privacy.” American Demographics 17
(1995): 48-54.
Bucar, Bojko. “The Invasion of Privacy of Public Officials in Early United States Jurisdiction.”
Javnost/The Public 7 (2000): 91-106.
Bulmer, Martin (ed.). Censuses, Surveys and Privacy. London: Macmillan, Holmes and Meier, 1979.
Bulmer, Martin, and Bell, Jennifer. “The Press and Personal Privacy: Has it Gone Too Far.” Political
Quarterly 56 (1985): 5-22.
Bunker, M. D., and Splichal, S. L. “Relational Privacy Cases and Freedom of Information.”
Newspaper Research Journal 18 (1997): 109-121.
Bunker, M., and Perry, S. “Privacy Exemptions and the Press Under the FOIA.” Newspaper Research
Journal 16 (1995): 84-94.
Bunyan, Tony. “Telecommunications Surveillance: End of a Chapter.” Cultures et Conflits 46 (2001):
65-116.
Burch, Robert. “Royce and Wittgenstein on the Context of Privacy.” History of Philosophy Quarterly
5 (1988): 287-304.
Burger, Robert H (ed.). “Privacy, Secrecy, and National Information Policy.” Library Trends 35
(1986): 3-182.
Bushell, C J “Privacy versus Policy, Precedent and Expediency.” Australian Computer Journal 15
(1983): 151-155.
301
Byrnes, S. J. “Privacy vs. Publicity: Flip Sides of the Same Coin?” Public Relations Review 16
(1990): 29-35.
Cain, R M. “Global Privacy Concerns and Regulation: Is the United States a World Apart?”
International Review of Law, Computers and Technology 16 (2002): 23-34.
Calvert, Clay. “Voyeur War? The First Amendment, Privacy, and the Images from the War on
Terrorism.” Journal Fordham Intellectual Property, Media & Entertainment Law Journal 15
(2005): 147.
Calvert, Clay. “Victories for Privacy and Losses for Journalism? Five Privacy Controversies for 2004
and their Policy Implications for the Future of Reportage.” Journal of Law and Policy 13 (2005):
649.
Calvert, Clay and Richards, Robert D. “Suing the Media, Supporting the First Amendment: The
Paradox of Neville Johnson and the Battle for Privacy.” Albany Law Review Albany Law Review
76 (2004): 1097.
Caming, H. W.W. “Protection of Personal Data in the United States.” The Information Society 3
(1984): 113-130.
Camp, L. J. “Web Security and Privacy: An American perspective.” Information Society 15 (1999):
249-256.
Campbell, Duncan, and Connor, Steve. On the Record: Surveillance, Computers and Privacy, the
Inside Story. London: Joseph, 1986.
Campbell, J. E., and Carlson, M. “Panopticon.com: Online Surveillance and the Commodification of
Privacy.” Journal of Broadcasting & Electronic Media 46 (2002): 586-606.
Caplan, Arthur L. “On Privacy and Confidentiality.” Ethical Issues in Social Science Research, ed.
Tom L. Beauchamp. Baltimore: Johns Hopkins University Press, 1982. 315-328.
Caplan, Arthur L. “The Right to Privacy when Lives are at Stake.” Troubling Problems in Medical
Ethics, ed. Marc D. Basson. New York: Liss, 1981. 245-255.
Capron, Alexander M. “Genetics and Insurance: Accessing and Using Private Information.” Social
Philosophy and Policy 17 (2000): 235-275.
Capron, Alexander Morgan. “Privacy: Dead and Gone?” Hastings Center Report 22 (1992): 43-45.
Carney, Eliza Newlin. “Clashing over Clipper.” National Journal 25 (1993): 2184.
Carracedo, Jose David. Expanding Surveillance Capabilities onto Cyber Society Activities: The
Spanish Government's National Smart Card ID Project. Brisbane, Australia: International
Sociological Association (ISA), 2002.
Carson, John. “Defining and Protecting Civil Liberties.” Political Quarterly 41 (1970): 316-327.
302
Carson, A Scott. “Drug Testing and Privacy: Why Contract Arguments Do Not Work.” Business and
Professional Ethics Journal 14 (1995): 3-22.
Castiglione, Robert L. “Paul Weiss’ ‘Privacy’: The Rediscovery of Human Being.” Philosophy Today
28 (1984): 20-35.
Cate, Fred H. Privacy in the Information Age. Bookings Institute Press. Washington, D.C.,
1997.
Caudill, E. M., and Murphy, P. E. “Consumer Online Privacy: Legal and Ethical Issues.” Journal of
Public Policy & Marketing 19 (2000): 7-19.
Cawkell, A. E. “Privacy, Security, and Freedom in the Information Society.” Journal of Information
Science 4 (1982): 3-8.
Chadwick, Ruth, Levitt, Mairi, and Shickle, Darren eds. The Right to Know and the Right not to
Know. Brookfield: Avebury, 1997.
Chadwick, Ruth, and Levitt, Mairi. "Mass Media and Public Discussion in Bioethics." The Right to
Know and the Right not to Know, ed. Chadwick, Ruth. Brookfield: Avebury, 1997.
Chaffey, Douglas Camp. “The Right to Privacy in Canada.” Political Science Quarterly 108 (1993):
117-32.
Chalmers, J, Muir, R. “Patient Privacy and Confidentiality.” British Medical Journal 326 (2003):
725-6.
Chalmers, Sandy. “Data Privacy: Impacts for Information Handling.” Records Management Bulletin
115 (2003): 19, 22-24.
Chambers, Jean E. “Privacy, Sex, and Norms: An Indirect Control Definition.” Journal of
Information Ethics 9 (2000): 10-25.
Chamoux, Jean Pierre, and Chamoux, Francoise. “French Data Protection: The First Five Years.”
Transnational Data Report on Information Politics and Regulation 7 (1984): 163-6.
Chan, Ying Keung. “Privacy in the Family: Its Hierarchical and Asymmetric Nature.” Journal of
Comparative Family Studies 31 (2000): 1-17.
Chapman, John. “Personality and Privacy.” In Privacy: Nomos XIII, ed. J. Roland Pennock and John
W. Chapman, 236-55. New York: Atherton Press, 1971.
Chapman, John, and John W. Chapman eds. Privacy: Nomos XIII. New York: Atherton Press, 1971.
Charlesworth, A. “Implementing the European Union Data Protection Directive 1995 in UK Law:
The Data Protection Act 1998.” Government Information Quarterly 16 (1999): 203-40.
Charlesworth, Andrew. “Law Enforcement and Libraries in the UK: Privacy, Proportionality and
Good Practice.” Legal Information Management 3 (2003): 71-75.
Charters, Darren. “Electronic Monitoring and Privacy Issues in Business Marketing: The Ethics of the
DoubleClick Experience.” Journal of Business Ethics 35 (2002): 243-254.
303
Chartier, Roger, ed. A History of Private Life. Vol. 3: Passions of the Renaissance. Cambridge, MA:
Harvard University Press, 1989.
Chepaitis, E. “The Criticality of Information Ethics in Emerging Economies: Beyond Piracy and
Privacy.” Journal of Information Ethics 9 (2000): 5-7.
Chmara, T. “Privacy and Confidentiality Issues in Providing Public Access to the Internet.” Library
Administration and Management 15 (2001): 20-2.
Choldin, Harvey M. “Government Statistics: The Conflict Between Research and Privacy.”
Demography 25 (1988): 145-54.
Christensen, Rachel. “Privacy and Quality in Health Care.” Employee Benefit Research Institute
Notes 21 (2000): 1-11.
Cirasella, J. C. “At Odds?: Archives and Privacy.” Current Studies in Librarianship 24 (2000): 88-92.
Claeys, Eric R. “The Private Society and the Liberal Public Good in John Locke's Thought.” Social
Philosophy and Policy 25 (Summer 2008): 201-234.
Clarke, R. “Person Location and Person Tracking: Technologies, Risks and Policy Implications.”
Information Technology and People 14 (2001): 206-31.
Clarke, R. “The Resistible Rise of the National Personal Data System.” Software Law Journal 5
(1992): 29-59.
Clarke, Roger. “The Digital Persona and Its Application to Data Surveillance.” The Information
Society 10 (1994): 77-92.
Clarke, Simon. “Paternalism and Access to Medical Records.” Journal of Information Ethics 12
(2003): 80-91.
Clement, Andrew. “Electronic Workplace Surveillance: Sweatshops and Fishbowls.” Canadian
Journal of Information Science/Revue Canadienne des Sciences de l'Information 17 (1992): 1845.
Cloud, Morgan. “The Fourth Amendment During the Lochner Era: Privacy, Property, and Liberty in
Constitutional Theory.” Stanford Law Review 48 (1996): 555.
Coenen Huther, Jacques. “The Domicile: Private and Public Spheres.” Cahiers Internationaux de
Sociologie 38 (1991): 301-313.
Cohen, Elliot D (ed). Philosophical Issues in Journalism. New York: Oxford University Press, 1992.
Cohen, Jean L. "Is Privacy a Legal Duty?: Reconsidering Private Right and Public Virtue in the
Domain of Intimacy." Public and Private: Legal, Political and Philosophical Perspectives, ed.
Passerin d'Entreves, Maurizio. New York: Routledge, 2000.
Cohen, Julie E. “Privacy, Visibility, Transparency, and Exposure.” The University of Chicago Law
Review 75 (Winter, 2008):181-201
304
Cohen, Julie E. “The Law and Technology of Digital Rights Management: DRM and Privacy.”
Berkley Technology Law Journal 18 (2003): 575.
Colb, Sherry. “A World Without Privacy: Why Property does not Define the Limits of the Right
Against Unreasonable Searches.” Michigan Law Review 102 (2004): 889.
Collette, John. “Role Demands, Privacy and Psychological Well Being.” The International Journal of
Social Psychiatry 30 (1984): 222-230.
Collins, Tom A. “The Press Clause Construed In Context: The Journalists' Right of Access To
Places.” Missouri Law Review 52 (1987): 751-802.
Colman, Jim B. “Digital Photography and the Internet, Rethinking Privacy Law.” Journal of
Intellectual Property Law 13 (2005): 205.
Conklin, Kenneth R. “Privacy: Should there be a Right to it?” Educational Theory 26 (1976): 263270.
Cooke, Maeve. “A Space of One's Own: Autonomy, Privacy, Liberty.” Philosophy and Social
Criticism 25.1 (1999): 23-53.
Cooley, Thomas. A Treatise on the Law of Torts. Chicago: Callaghan and Co., 1880.
Coombs, Robert H., and West, Louis Jolyon eds. Drug Testing: Issues and Options. Oxford
University Press, 1991.
Coontz, Stephanie. The Social Origins of Private Life: A History of American Families 1600-1900.
New York, NY: Verso, 1988.
Cooper, S. “Common Law, and Privacy in Computer Mediated Environments.” New Jersey Journal
of Communication 5 (1997): 167-177.
Cooper, S. “Privacy and the News Media.” New Jersey Journal of Communication 3 (1995): 103-117.
Cordell, Arthur J. “Preparing for the Challenges of the New Media.” The Futurist 25 (1991): 20-24.
Corlett, J Angelo. “The Nature and Value of the Moral Right to Privacy.” Public Affairs Quarterly,
16 (2002): 329-350.
Corley, S. “Rights of Privacy and Publicity in Advertising: Consent, Actionable Depictions, and First
Amendment Limitations.” Annual Survey of American Law 1985 3 (1986): 585-602.
Corn, Robert L. “Wireless tapping.” Reason 17 (1985): 20-9.
Cornford, James. “The Prospects for Privacy.” Political Quarterly 52 (1981): 295-313.
Cox, Gloria. “Implementation of the Routine Use Clause of the Privacy Act.” Policy Studies Review
10 (1991-1992): 42-50.
Cozzetto, Don A, and Pedeliski, Theodore B. “Privacy and the Workplace: Technology and Public
Employment.” Public Personnel Management 26 (1997): 515-27.
305
Crabb, Peter B. “Video Camcorders and Civil Inattention.” Journal of Social Behavior and
Personality 11 (1996): 805-816.
Craige, Burton. “Constitutional law – Rennie v. Klein: Constitutional Right of Privacy Protects a
Mental Patient's Refusal of Psychotropic Medication.” North Carolina Law Review 57 (1979):
1481-97.
Cranford, Michael. “Drug Testing and the Right to Privacy: Arguing the Ethics of Workplace Drug
Testing.” Journal of Business Ethics 17 (1998): 1805-1815.
Cranor, Lorrie (ed.) “Special Section: Computers, Freedom, and Privacy.” Information Society 18
(2002): 153-79.
Crawford, Kimberly A. “Sneak and Peek Warrants: Legal Issues Regarding Surreptitious Searches.”
FBI Law Enforcement Bulletin 66 (1997): 27-32.
Crowley, Donald, and Johnson, Jeffrey L. “Balancing and the Legitimate Expectation of Privacy.”
Saint Louis University Public Law Review 7 (1988): 337-58.
Crozier, W Ray. “Blushing and the Exposed Self: Darwin Revisited.” Journal for the Theory of
Social Behaviour 31 (2001): 61-72.
Culnan, M. J. “Protecting Privacy Online: Is Self-regulation Working?” Journal of Public Policy &
Marketing 19 (2000): 20-26.
Culnan, Mary J, and Bies, Robert J. “Consumer Privacy: Balancing Economic and Justice
Considerations.” Journal of Social Issues 59 (2003): 323-342.
Culver, Charles. “Privacy.” Professional Ethics 3 (1994): 3-25.
Cuozzi, W. F., and Sporn, L. “Private Lives and Public Concerns: The Decade since Gertz v Robert
Welch, Inc.” Brooklyn Law Review 51 (1985): 425-478.
Curry, Michael R. “Digital People, Digital Places: Rethinking Privacy in a World of Geographic
Information.” Ethics and Behavior 7 (1997): 253-263.
Dahl, M. K. “Privacy and Databases: A Question of Dignity.” Government Data Systems 17 (1988):
4-6.
Dam, Shubhanker. “Remedying a Technological Challenge: Individual Privacy and Market
Efficiency.” Albany Law Journal of Science & Technology Albany Law
Journal of Science & Technology 15 (2005): 337.
Dana, Jane Tucker. “Copyright and Privacy Protection of Unpublished Works: The Author's
Dilemma.” Columbia Journal of Law and Social Problems 13 (1977): 351-408.
Dandekar, Natalie. “Privacy: An Understanding for Embodied Persons.” Philosophical Forum 24
(1993): 331-348.
Daniels, Charles B. “Privacy and Verification.” Analysis 48 (1988): 100-102.
306
Danielson, Caroline. “The Gender of Privacy and the Embodied Self: Examining the Origins of the
Right to Privacy in U. S. Law.” Feminist Studies 25 (1999): 311-344.
Danna, Anthony, and Gandy Jr., Oscar H. “All That Glitters Is Not Gold: Digging Beneath the
Surface of Data Mining.” Journal of Business Ethics 40 (2002): 373-386.
Davidson, D. M., and Kunkel, J. A. “The Developing Methodology for Analyzing Privacy Torts.”
Hastings Communications and Entertainment Law Journal 6 (1983): 43-90.
Davidson, Dan. “Employee Testing: An Ethical Perspective.” Journal of Business Ethics 7 (1988):
211-217.
Davies, Eric, Dearnley, James, Hardy, Rachel, Iliffe, Ursula, Oppenheim, Charles, and Sturges, Paul.
“User Privacy in the Digital Library Environment: An Investigation of Policies and
Preparedness.” Library Management 24 (2003): 44-50.
Davies, Simon. Big Brother: Australia's growing web of surveillance. Australia: Simon & Schuster,
1992.
Davies, Martin. “Another Way of Being: Leisure and the Possibility of Privacy.” Philosophy of
Leisure, ed. Tom Winnifrith. New York: St. Martin’s, 1989. 104-128.
Davis, Andrew. “Do Children Have Privacy Rights in the Classroom?” Studies in Philosophy and
Education 20 (2001): 245-254.
Davis, Frederick. “What Do We Mean by ‘Right to Privacy’?” South Dakota Law Review 4(1959): 124.
Davison, Scott A. “Privacy and Control.” Faith and Philosophy 14 (1997): 137-151.
De Boni, Marco and Prigmore, Martyn. “A Hegelian Basis for Privacy as an Economic Right.”
Contemporary Political Theory 3 (2004): 168-187.
De Lint, Willem. “Arresting the Eye: Surveillance, Social Control and Resistance.” Space and
Culture, 7.9 (2000): 21-49.
De Munck, Jean. “The ‘Right to Privacy’ between Philosophy and Sociology.” Recherches
Sociologiques 24 (1993): 45-68.
DeCew, J. W. “In Pursuit of Privacy: Law, Ethics and the Rise of Technology.” Journal of
Government Information 25 (1998): 307-8.
DeCew, Judith Wagner. “Alternatives for Protecting Privacy while Respecting Patient Care and
Public Health Needs.” Ethics and Information Technology 1 (1999): 249-255.
DeCew, Judith Wagner. “Constitutional Privacy, Judicial Interpretation, and ‘Bowers versus
Hardwick.’” Social Theory and Practice 15 (1989): 285-303.
DeCew, Judith Wagner. “Defending the ‘Private' in Constitutional Privacy.” Journal of Value Inquiry
21 (1987): 171-184.
307
DeCew, Judith Wagner. “Drug Testing: Balancing Privacy and Public Safety.” Hastings Center
Report 24 (1994): 17-25.
DeCew, Judith Wagner. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Ithaca, NY:
Cornell University Press, 1997.
DeCew, Judith Wagner. “The Priority of Privacy for Medical Information.” Social Philosophy and
Policy 17 (2000): 213-234.
DeCew, Judith Wagner. “The Scope of Privacy in Law and Ethics.” Law and Philosophy 5 (1986):
145-173.
DeCew, Judith Wagner. “Privacy and Policy for Genetic Research.” Ethics and Information
Technology 6 (2004): 4-14.
Deflem, Mathieu. “Surveillance and Criminal Statistics: Historical Foundations of Governmentality.”
Studies in Law, Politics, and Society 17 (1997): 149-184.
Denning, Dorothy E. “The case for ‘Clipper.’" Technology Review 98 (1995): 48-55.
Dennis, J. C. “Privacy and Confidentiality of Health Information.” Journal of Government
Information 28.3 (2001): 344-6.
DePaulo, Bella M., Chris Wetzel, R. Weylin Sternglanz, and Molly J. Walker Wilson. “Verbal and
Nonverbal Dynamics of Privacy, Secrecy, and Deceit.” Journal of Social Issues 59 (2003): 391412.
Derlega, Valerian J., Metts, Sandra, Petronio, Sandra, and Margulis, Stephen T. Self Disclosure.
Newbury Park, CA: SAGE Publications, Inc., 1993.
Desai, M. S., Richards, T. C., Desai, K. J. “E-commerce Policies and Customer Privacy.” Information
Management and Computer Security 11 (2003): 19-27.
Dhillon, G. S., and Moores, T. T. “Internet Privacy: Interpreting Key Issues.” Information Resources
Management Journal 14 (2001): 33-7.
Diefenbach, Donald L. “The Constitutional and Moral Justifications for Copyright.” Public Affairs
Quarterly 8 (1994): 225-235.
Diffie, Whitfield, and Landau, Susan. Privacy on the Line: The Politics of Wiretapping and
Encryption. M.I.T. Press, 1998.
Dionisopoulos, P. Allan, and Craig Ducat. The Right to Privacy: Essays and Cases. St. Paul: West
Publishing Co., 1976.
Donos, P., and Zorkadis, V. “On Biometrics Based Authentication and Identification From A Privacy
Protection Perspective: Deriving Privacy Enhancing Requirements.” Information Management
and Computer Security 12 (2004): 125-137.
308
Doss, Arden, and Diane Kay Doss. “On Morals, Privacy, and the Constitution.” University of Miami
Law Review 25 (1971): 395-419.
Doss, Erini, and Loui, Michael C. “Ethics and the Privacy of Electronic Mail.” Information Society 11
(1995): 223-35.
Douard, John W. “AIDS, Stigma, and Privacy.” AIDS & Public Policy Journal 5 (1990): 37-41.
Doyle, Rodger. “Privacy in the workplace.” Scientific American 280 (1999): 36.
Draper, Elaine. “Privacy Rights, Stigma, and Genetic Screening.” Forum for Applied Research and
Public Policy 8 (1993): 19-22.
Draper, Hayward L. “Privacy and Police Intelligence Data Banks: A Proposal To Create A State
Organized Crime Intelligence System and to Regulate the Use of Criminal Intelligence
Information.” Harvard Journal on Legislation 14 (1976): 1-110.
Dromm, Keith. “Love and Privacy.” Journal of Applied Philosophy 19 (2002): 155-167.
Duddy, Thomas. “Privacy, Self Knowledge, and the Inner Eye: The Cartesian Project Revisited.”
History of European Ideas 21 (1995): 515-526.
Duff, Karl J., and Johnson, Eric T. “A Renewed Employee Right to Privacy.” Labor Law Journal 34
(1983): 747-62.
Duis, Perry R. “No Time for Privacy: World War II and Chicago's Families.” The War in American
Culture: Society and Consciousness During World War II, Erenberg, Lewis A., & Hirsch, Susan
E. eds. Chicago, IL: U Chicago Press, 1996. 17-45.
Dumsday, Travis. “Group Privacy and Government Surveillance of Religious Services.” Monist: An
International Quarterly Journal of General Philosophical Inquiry 91 (January 2008):170-186,
Duncan, George T (ed.). Private Lives and Public Policies: Confidentiality and Accessibility of
Government Statistics. National Academy Press, 1993.
Duncan, George T, and Kaufman, Sanda. “Who Should Manage Information and Privacy Conflicts?:
Institutional Design for Third Party Mechanisms.” The International Journal of Conflict
Management 7 (1996): 21-44.
Duvall Early, Kimberly, and James O. Benedict. “The Relationship Between Privacy and Different
Components of Job Satisfaction.” Environment and Behavior 24 (1992): 670-680.
Dworkin, Gerald. “Privacy and the Law.” In Privacy, ed. John Yound, 113-36. New York: John
Wiley and Sons, 1978.
Ebbinghouse, C. “Big Brother Invades the Campus and Workplace: Infotainment and the Copyright
Cops.” Searcher 11 (2003): 18-23.
Ebers, Stephanie. “The Right of Privacy and Minors' Confidential Access to Contraceptives.” New
York Law School Human Rights Annual 2 (1984): 131-49.
309
Eddie, G. “E-mail, the Police, and the Canadian Charter of Rights and Freedoms: Retooling our
Understanding of a Reasonable Expectation of Privacy in the Cyber Age.” International Review
of Law, Computers and Technology 14 (2000): 63-78.
Edgar, Harold, and Sandomire, Hazel. “Medical Privacy Issues in the Age of AIDS: Legislative
Options.” American Journal of Law and Medicine 16 (1990): 155-222.
Edgley, Charles, and Brissett, Dennis. “A Nation of Meddlers.” Society 32 (1995): 36-46.
Elgesem, Dag. “Data Privacy and Legal Argumentation.” Communication and Cognition 28 (1995):
91-111.
Elgesem, Dag. “The Structure of Rights in Directive 96/46/EC on the Protection of Individuals with
Regard to the Processing of Personal Data and the Free Movement of Such Data.” Ethics and
Information Technology 1 (1999): 283-293.
Elmer, Greg. “Spaces of Surveillance: Indexicality and Solicitation on the Internet.” Critical Studies
in Mass Communication 14 (1997): 182-191.
Elwood, John P. “Outing, Privacy, and the First Amendment.” Yale Law Journal 102 (1992): 747-76.
Emerson, Thomas I. “The Right of Privacy and Freedom of the Press.” Harvard Civil Rights Civil
Liberties Law Review 14 (1979): 329-60.
Emmons, Donald C. “Ontological Privacy.” Personalist 51 (1970): 286-304.
Engelhardt Jr. H. Tristram. “Privacy and Limited Democracy: The Moral Centrality of Persons.”
Social Philosophy and Policy 17 (2000): 120-140.
Engstrom, Timothy H. “Corporate Appropriation of Privacy: The Transformation of the Personal and
Public Spheres.” Ethics and Behavior 7 (1997): 239-252.
Entin, J. L. “Privacy, Emotional Distress, and the Limits of Libel Law Reform.” Mercer Law Review
38 (1987): 835-858.
Epstein, Richard A. “Deconstructing Privacy: And Putting It Back Together Again.” Social
Philosophy and Policy 17 (2000): 1-24.
Escobar, C. B. “Nongovernmental Cryptology and National Security: The Government Seeking to
Restrict Research.” Comparative Law Journal 4 (1984): 573-603.
Etzioni, Amitai. “A Communitarian Perspective on Privacy.” Connecticut Law Review 32 (2000):
897.
Etzioni, Amitai. “Identification Cards in America.” Society 36 (1999): 70-76.
Etzioni, Amitai. The Limits of Privacy. New York: Basic Books, 1999.
Etzioni, Amitai. “Medical Records: Enhancing Privacy, Preserving the Common Good.” Hastings
Center Report 29 (1999): 14-23.
310
Etzioni, Amitai. “The First Amendment Is Not an Absolute Even on the Internet.” Journal of
Information Ethics 6 (1997): 64-66.
Evans, A. C. “European Data Protection Law.” American Journal of Comparative Law 29 (1981):
571-82.
Evans, G. A. “The Human Genome Project and Public Policy.” Public Understanding of Science 8
(1999): 161-168.
Everett, Margaret. “The Social Life of Genes: Privacy, Property and the New Genetics.” Social
Science and Medicine 56 (2003): 53-65.
Fahey, Tony. “Privacy and the Family: Conceptual and Empirical Reflections.” Sociology 29 (1995):
687-702.
Falls, M. Margaret. “Prisons and Privacy: A Moral Evaluation.” Freedom, Equality, and Social
Change, ed. Peden, Creighton. Lewiston: Mellen Press, 1989. 312-323.
Falls Corbitt, Margaret, and McClain, F Michael. “God and Privacy.” Faith and Philosophy 9 (1992):
369-386.
Fairfield, Joshua A. T. “The New Internet Legislation's Hidden Threat to Privacy and
Commerce.” Arizona State Law Journal 36 (2004): 1193.
Falsone, A. M. “Privacy of Circulation Files.” Journal of Library Administration 7 (1986): 19-24.
Farnsworth, David P. “Data Privacy: An American's View of European Legislation.” Transnational
Data Report on Information Politics and Regulation 6 (1983): 285-90.
Farrelly, Colin. “Genes and Social Justice: A Rawlsian Reply to Moore.” Bioethics 16 (2002): 72-83.
Fazekas, Christopher P. “1984 is Still Fiction: Electronic Monitoring in the Workplace and U.S.
Privacy Law.” Duke Law & Technology Review 15 (2004):
Feiser, C. D. “Privatization and the Freedom of Information Act: An Analysis of Public Access to
Private Entities under Federal Law.” Federal Communications Law Journal 52 (1999): 21-62.
Felcher, Peter L, and Rubin, Edward L. “Privacy, Publicity, and the Portrayal of Real People by the
Media.” Yale Law Journal 88 (1979): 1577-1622.
Fenrich, William J. "Common Law Protection of Individuals' Rights in Personal Information."
Fordham Law Review 65 (1996): 951-1004.
Fenwick, Helen. Civil liberties. Cavendish Publishing Limited, 1994.
Ferguson, Kenneth G. “Caller ID - Whose Privacy Is It, Anyway?” Journal of Business Ethics 29
(2001): 227-237.
Fiatal, Robert A. “Lights, Camera, Action: Video Surveillance and the Fourth Amendment.” FBI Law
Enforcement Bulletin 58 (1989): 23-31.
311
Fielding, Derek. “Librarians, Civil Liberties and Privacy.” Australian Library Journal 27 (1978): 181
189.
Fifarek, Aimee. “Technology and Privacy in the Academic Library.” Online Information Review 26
(2002): 366-374.
Finn, Paul. “Public Function – Private Action: A Common Law Dilemma. 93-112. Benn, Stanley and
G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.
Fish, Stanley. There's No Such Thing as Free Speech. Princeton University Press, 1994.
Fisher, Linda E. “Guilt by Association: Political Profiling, Surveillance and the Privacy of Groups.”
Arizona Law Review 46 (2004): 621.
Flaherty, David H. Privacy and Government Data Banks: An International Perspective. London:
Mansell, 1979.
Flaherty, David H. Protecting Privacy in Surveillance Societies: The Federal Republic of Germany,
Sweden, France, Canada, and the United States. Chapel Hill, NC: U of North Carolina Press,
1989.
Flaherty, David H. “The Need for an American Privacy Protection Commission.” Government
Information Quarterly 1 (1984): 235-58.
Fletcher, Joseph F. “Mass and Elite Attitudes about Wiretapping in Canada: Implications for
Democratic Theory and Politics.” The Public Opinion Quarterly 53 (1989): 225-245.
Floridi L. “Four challenges for a theory of informational privacy.” Ethics and Information
Technology 8 (2006): 109-119.
Floridi L. “The Ontological Interpretation of Informational Privacy.” Ethics and Information
Technology 7 (2005):185–200.
Florini, Ann. “The End of Secrecy.” Foreign Policy 111 (1998): 50-63.
Flory, J. “E-health Ethics, Privacy, and Security.” Medicine on the Net 9 (2003): 14-28.
Flory, J. “Privacy and Patient Confidentiality: Special Focus.” Medicine on the Net 7 (2001): 13-27.
Foddy, William H. “A Critical Evaluation of Altman's Definition of Privacy as a Dialectical Process.”
Journal for the Theory of Social Behaviour 14 (1984): 297-307.
Fogelberg, H. “Stateside: The Total Information Awareness System: Time to Get Paranoid?”
Managing Information 10 (2003): 36-7.
Fogelberg, H. “US Privacy and Global Business.” Managing Information 6 (1999): 24-5.
Foner, Leonard N. “Technology and Political Artifacts: The CFP2000 Workshop on Freedom and
Privacy by Design.” The Information Society 18 (2002): 153-163.
Foot, Philippa. Natural Goodness. Oxford: Oxford University Press, 2001.
312
Forer, Lois G. A Chilling Effect: The Mounting Threat of Libel and Invasion of Privacy Actions to the
First Amendment. Markham, Ontario, Canada: Penguin Books, 1987.
Forester, Tom. and Morrison, Perry. Computer Ethics: Cautionary Tales and Ethical Dilemmas in
Computing. Second Edition. MIT Press, 1990.
Forester, Tom, and Morrison, Perry. “Computer Crime: New Problem for the Information Society.”
Prometheus 8 (1990): 257-272.
Fortner, R. S. “Physics and Metaphysics in an Information Age: Privacy, Dignity and Identity.”
Communication 9 (1986): 151-172.
Fox, Richard. “Someone to Watch over Us: Back to the Panopticon?” Criminal Justice 1 (2001): 251276.
Foxman, E. R., and Kilcoyne, P. “Information Technology, Marketing Practice and Consumer
Privacy: Ethical Issues.” Journal of Public Policy & Marketing 12 (1993): 106-119.
Francis, Huw W. S. “Of Gossips, Eavesdroppers, and Peeping Toms.” Journal of Medical Ethics 8
(1982): 134-143.
Francis, Leslie Pickering. “Privacy and Confidentiality: The Importance of Context.” Monist: An
International Quarterly Journal of General Philosophical Inquiry 91 (January 2008): 52-67.
Fraser, John. “Community, the Private, and the Individual.” The Sociological Review 35 (1987): 795818.
Freedman, Warren. The Right of Privacy in the Computer Age. Quorum Books, 1987.
Freund, Paul. “Privacy: One Concept or Many?” In Privacy: Nomos XIII, ed. J. Roland Pennock and
John W. Chapman, 182-98. New York: Atherton Press, 1971.
Frey, R. G. “Privacy, Control, and Talk of Rights.” Social Philosophy and Policy 17 (2000): 45-67.
Fried, Charles. “Privacy.” Yale Law Journal 77 (1968): 475-93.
Friedman, Batya. “Social Judgments and Technological Innovation: Adolescents' Understanding of
Property, Privacy, and Electronic Information.” Computers in Human Behavior 13 (1997): 327351.
Friedman, David. “A World of Strong Privacy: Promises and Perils of Encryption.” Social
Philosophy and Policy 13 (1996): 212-228.
Friedman, David. “Privacy and Technology.” Social Philosophy and Policy 17 (2000): 186-212.
Frist, Bill. “Open Sesame: Congress Must Establish Boundaries to Protect Privacy and Promote
Ethical uses of New Genetic Information.” Forum for Applied Research and Public Policy 15
(2000): 44-8.
Froomkin, A Michael. “Legal Issues in Anonymity and Pseudonymity.” Information Society 15
(1999): 113-27.
313
Gandy, O. H. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO:
Westview Press, 1993.
Gandy, O. H., and Simmons, C. E. “Technology Privacy and the Democratic Process.” Critical
Studies in Mass Communication, 3.2 (1986): 155-168.
Gandy, Oscar H., Jr. “African Americans and Privacy: Understanding the Black Perspective in the
Emerging Policy Debate.” Journal of Black Studies 24 (1993): 178-195.
Gandy, Oscar H., Jr. “The Surveillance Society: Information Technology and Bureaucratic Social
Control.” Journal of Communication 39 (1989): 61-76.
Gannon Leary. “`E' for exposed? E mail and privacy issues.” Electronic Library 15 (1997): 221-6.
Garfinkel, S. “Database nation: the death of privacy in the Twenty-first century.”
Telecommunications Policy 24 (2000): 625-8.
Garfinkel, S., and Spafford, G. “Web Security, Privacy and Commerce.” Managing Information 9
(2002): 55.
Garrett, Roland. “The Nature of Privacy.” Philosophy Today 18(1974): 263-284.
Garrow, David J. Liberty and Sexuality: The Right to Privacy and the Making of Roe v. Wade. New
York: Macmillan, 1994.
Garrow, David J. “Privacy and the American Constitution.” Social Research 68 (2001): 55-82.
Garzon Valdes, Ernesto. “Intimacy, Privacy and Publicity.” Analyse & Kritik 25 (2003): 17-40.
Gastelaars, Marja. “The Water Closet: Public and Private Meanings.” Science as Culture 4 (1996):
483-505.
Gates, K. A. “Wanted Dead or Digitized: Facial Recognition Technology and Privacy.” Television &
New Media 3 (2002): 235-238.
Gates, P. H. “Privacy and Access: The Inevitable Collision of Competing Values.” In Access Denied:
Freedom Of Information In The Information Age, eds. Davis, C. N., and Splichal, S. L. Ames:
Iowa State University Press, 2000. 103-119.
Gaus, Gerald. “Public and Private Interests in Liberal Political Economy, Old and New.” Benn,
Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.
Gauthier, C. C. “Privacy Invasion by the News Media: Three Ethical Models.” Journal of Mass
Media Ethics 17 (2002): 20-34.
Gavison, Ruth. “Privacy and the Limits of Law.” Yale Law Journal 89 (1980): 421-71.
Gavison, Ruth. “Information Control: Availability and Control.” 113-134. Benn, Stanley and G. Gaus
eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.
Gellman, R. “Perspectives on Privacy and Terrorism: All is Not Lost – Yet.” Government Information
Quarterly 19 (2002): 255-64.
314
Gellman, R. “Taming the Privacy Monster: A Proposal for a Non-regulatory Privacy Agency.”
Government Information Quarterly 17 (2000): 235-41.
Gellman, Robert. “Public Records: Access, Privacy, and Public Policy: A Discussion Paper.”
Government Information Quarterly 12 (1995): 391-426.
Gerber, Scott D. “Privacy and Constitutional Theory.” Social Philosophy and Policy 17 (2000): 165185.
Gerety, Tom. “Redefining Privacy.” Harvard Civil Rights Civil Liberties Law Review 12 (1977): 23396.
Gerlach, Julie Waltz. “What Should IRBs Consider When Applying the Privacy Rule to Research?”
Kennedy Institute of Ethics Journal 12 (2002): 299-303.
Gernstein, Robert S. “Privacy and Self Incrimination.” Ethics 80 (1970): 87-101.
Gerstein, Robert S. “Intimacy and Privacy.” Ethics 89 (1978): 76-81.
Ghosh Dastidar, Koyeli. “Respect for Privacy: Western and Indian.” Journal of Indian Council of
Philosophical Research 88: 101-109.
Giglio, Ernest D. “Privacy, the News Media, and the Courts.” Political Communication and
Persuasion 1 (1981): 231-55.
Giglio, Ernest. Rights, Liberties and Public Policy. Ashgate Publishing Company Ltd., 1995.
Gilliom, John. Surveillance, Privacy, and the Law: Employee Drug Testing and the Politics of Social
Control. University of Michigan Press, 1994.
Gillis, Jonathan. “Privacy Rights and Satellite Broadcasts.” Israel Law Review 27 (1993): 384-414.
Gillis, R P, and Riley, T B. “Privacy in the Information Age: A Handbook for Government and
Industry Professionals.” Journal of Government Information 24 (1997): 449-50.
Gimenex, Enrique J. “Who Watches the Watchdogs?: The Status of Newsgathering Torts Against the
Media in Light of the Food Lion Reversal.” Alabama Law Review 52 (2001): 675.
Giner, Salvador. “The Withering Away of Civil Society?” Praxis International 5 (1985): 247-267.
Ginsberg, Robert. “The Right to Privacy vs. Government Need to Know.” Journal of Social
Philosophy 4 (1973): 5-8.
Givens, Beth. The Privacy Rights Handbook. Avon Books, 1997.
Glaser, P. E., and Brender, M. E. “The First Amendment in Space: News Gathering from Satellites.”
Issues in Science and Technology 3 (1986): 60-67.
Glasser, T. L. “Resolving the Press Privacy Conflict: Approaches to the Newsworthiness Defense.”
Communications and the Law 4 (1982): 23-42.
Glasser, Theodore L., and Jassem, Harvey. “Indecent Broadcasts and the Listener's Right of Privacy.”
Journal of Broadcasting 24 (1980): 285-99.
315
Glenn, Richard A. The Right to Privacy: Rights and Liberties Under the Law. ABC CLIO, Inc., 2003.
Glover, B. “Internet Policy Issues Debated at Ninth Conference on Computers, Freedom and
Privacy.” Library Hi Tech News 17 (2000): 10-13.
Godsey, Mark A. “Privacy and the Growing Plight of the Homeless: Reconsidering the Values
Underlying the Fourth Amendment.” Ohio State Law Journal 53 (1992): 869-89.
Goldman, Janlori. “Protecting Privacy to Improve Health Care.” Health Affairs 17 (1998): 47-60.
Goold, Benjamin J. “Privacy Rights and Public Spaces: CCTV and the Problem of the ‘Unobservable
Observer.’” Criminal Justice Ethics 21 (2002): 21-27.
Gordon, Diana R. “The Electronic Panopticon: A Case Study of the Development of the National
Criminal Records System.” Politics & Society 15 (1986-87): 483-511.
Gordon Till, J. “Right to privacy?” Information World Review 175 (2001): 20.
Gostin, Lawrence O. “Health Information Privacy.” Cornell Law Review 80 (1995): 451-528.
Gotterbarn, Donald. “Privacy Lost: The Net, Autonomous Agents, and 'Virtual Information.'” Ethics
and Information Technology 1 (1999): 147-154.
Gould, James. “Abortion: Privacy versus Liberty.” Journal of Social Philosophy (1990): 98-106.
Graber, Doris A. “Potholes along America's Public Information Superhighway.” Research in Political
Sociology 7 (1995): 299 324.
Grace, John W. “Protecting Privacy: A Growth Industry.” Canadian Business Review 11 (1984): 2830.
Gray, Susan H. “Electronic Data Bases and Privacy: Policy for the 1990s.” Science, Technology, and
Human Values 14 (1989): 242-257.
Grcic, Joseph M. “The Right to Privacy: Behavior as Property.” Journal of Value Inquiry 20 (1986):
137-144.
Green, Rachel. “Privacy in the Government Workplace: Employees’ Fourth Amendment and
Statutory Rights to Privacy.” Cumberland Law Review 35 (2004): 639.
Green, Richard. “(Serious) Sadomasochism: A Protected Right of Privacy?” Archives of Sexual
Behavior 30 (2001): 543-550.
Greenawalt, Kent. “Privacy and its Legal Protections.” Hastings Center Studies 2 (1974): 45-68.
Greenlaw, Paul S., and Prundeanu, Cornelia. “The Impact of Federal Legislation to Limit Electronic
Monitoring.” Public Personnel Management 26 (1997): 227-44.
Griffin, James. “The Human Right to Privacy.” San Diego Law Review 44 (Fall 2007): 697-721.
Grijpink, J. “Chain Computerization for Better Privacy Protection.” Information Infrastructure and
Policy 6 (1997-1999): 95-107.
316
Grimshaw, Allen D. “Whose Privacy? What Harm?” Sociological Methods and Research 11 (1982):
233-47.
Gritzalis, Dimitris A. “Embedding Privacy in IT Applications Development.” Information
Management and Computer Security 12 (2004): 8-26.
Gross, Emanuel. “The Struggle of a Democracy Against Terrorism--Protection of Human Rights: The
Right to Privacy Versus the National Interest--the Proper Balance.” Cornell International Law
Journal 27 (2004).
Gross, Hyman. “The Concept of Privacy.” New York University Law Review 42 (1967): 34-54.
Gross, Hyman. “Privacy and Autonomy.” In Privacy: Nomos XIII, ed. J. Roland Pennock and John
W. Chapman, 169-81. New York: Atherton Press, 1971.
Grossman, Garry S. “Transborder Data Flow: Separating the Privacy Interests of Individuals and
Corporations.” Northwestern Journal of International Law and Business 4 (1982): 1-36.
Guenther, K. “Pass the Cookies and Uphold the Privacy.” Computers in Libraries 21 (2001): 56-8.
Guirguis, Max. “Electronic Visual Surveillance and the Reasonable Expectation of Privacy.” Journal
of Technology Law & Policy 9 (2004): 143.
Gumpert, Gary, and Susan J. Drucker. “Public Boundaries: Privacy and Surveillance in a
Technological World.” Communication Quarterly 49 (2001): 115-130.
Gumpert, Gary, and Susan J. Drucker. “The Demise of Privacy in a Private World: From Front
Porches to Chat Rooms.” Communication Theory 8 (1998): 408.
Gurak, Laura J. Persuasion and Privacy in Cyberspace: The Online Protests over Lotus MarketPlace
and the Clipper Chip. Yale University Press, 1997.
Hafen, Bruce C. “The Constitutional Status of Marriage, Kinship, and Sexual Privacy: Balancing the
Individual and Social Interests.” Michigan Law Review 81 (1983): 463-574.
Hager, Barry M. “Privacy Commission Urges New Controls on Data Held by Private Groups.”
Congressional Quarterly Weekly Report 35 (1977): 1527-8.
Haggerty, Kevin D., and Ericson, Richard V. “The Surveillant Assemblage.” The British Journal of
Sociology 51 (2000): 605-622.
Hallborg, Robert B., Jr. “Principles of Liberty and the Right to Privacy.” Law and Philosophy 5
(1986): 175-218.
Hallie, Philip P. “The Privacy of Experience.” Journal of Philosophy 58 (1961): 337-345.
Hallinan, Kathleen M. “Invasion of Privacy or Protection Against Sexual Harassment: Co-employee
Dating and Employer Liability.” Columbia Journal of Law and Social Problems 26 (1993): 43564.
317
Halper, Thomas. “Privacy and Autonomy: From Warren and Brandeis to ‘Roe’ and ‘Cruzan.’”
Journal of Medicine and Philosophy 21 (1996): 121-135.
Halpern, Sheldon W. The Law of Defamation, Privacy, Publicity, and Moral Right. Third Edition.
JPM Books, Columbus, OH, 1995.
Halpin, Edward, and Wright, Steve. “The Hidden Dimensions of Global Information Networks: What
Price Privacy?” Canadian Journal of Information and Library Science/Revue Canadienne des
Sciences de l'Information et de Bibliotheconomie 25 (2000): 23-39.
Halstuk, M. E. “When is an Invasion of Privacy Unwarranted under the FOIA?: An Analysis of the
Supreme Court’s ‘Sufficient Reason’ and ‘Presumption of Legitimacy’ Standards.” Florida
Journal of Law and Public Policy 16 (2005): 361.
Halstuk, M. E. “Blurred Vision: How Supreme Court FOIA Opinions on Invasion of Privacy have
Missed the Target of Legislative Intent.” Communication Law and Policy 4 (1999): 111-148.
Hancock, Graeme. “California's Privacy Act [of 1974]: Controlling Government's use of
Information.” Stanford Law Review 32 (1980): 1001-38.
Hanus, Jerome J. “A Right of Information Privacy.” Policy Studies Journal 4 (1975): 136-141.
Hare, Willis H. Security, Privacy and New Technology. Santa Monica, CA: Rand Corporation, 1981.
Harper, Phillip Brian. Private Affairs: Critical Ventures in the Culture of Social Relations. New
York: New York University Press, 1999.
Hart, G. W. “Residential Energy Monitoring and Computerized Surveillance via Utility Power
Flows.” IEEE Technology and Society Magazine 8 (1989): 12-16.
Harter, Stephen, and Busha, Charles. “Libraries and Privacy Legislation.” Library Journal 101
(1976): 475-481.
Hartman, John Dale. Legal Guidelines for Covert Surveillance Operations in the Private Sector.
Butterworth Heinemann, 1993.
Hartman, Laura P. “Technology and Privacy in the Workplace.” Business and Society Review 106
(2001): 1-27.
Hartmann, Charles J, and Renas, Stephen M. “Anglo American Privacy Law: An Economic
Analysis.” International Review of Law and Economics 5 (1985): 133-52.
Hasian, Marouf, Jr. “Remembering and Forgetting: A Postmodern Interpretation of the Origins of the
‘Right of Privacy.’” Journal of Communication Inquiry 19 (1995): 33-49.
Hauptman, Robert (ed.). “Ethics and the Dissemination of Information.” Library Trends 40 (1991):
199-372.
Haviland, Leslie, and John Haviland. “Privacy in a Mexican Village.” 341-362. Benn, Stanley and G.
Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.
318
Hearst, Alice L. “Rugged Individualism and the Right to Privacy.” Western Legal History 3 (1990):
271-286.
Hebenton, Bill, and Thomas, Terry. Criminal Records: State, Citizen and the Politics of Protection.
Ashgate Publishing Company Ltd., 1993.
Heinlein, E. B. “Communications, Security, Privacy and the Law.” Computers & Security 13 (1994):
119-121.
Heller, Nathaniel. “‘Customizable Privacy’: A New Approach to International Regulation of the
Internet.” Journal of Public and International Affairs 13 (2002): 63-81.
Hendricks, Evan. Hayden, Trudy. Novik, Jack. Your Right to Privacy. Second Edition. Southern
Illinois University Press, 1990.
Henkin, Louis. Privacy and Autonomy.” Columbia Law Review 74 (1974): 1410-33.
Hermon, Joshua. “Privacy and Identity: Constructing, Maintaining, and Protecting Personhood.”
DePaul Law Review 54 (2005): 671.
Hermann, Donald H. J. “Pulling the Fig Leaf off the Right of Privacy: Sex and the Constitution.”
DePaul Law Review 54 (2005): 909.
Hernon, P., and Dugan, R E. “GIS and privacy.” Journal of Academic Librarianship 23 (1997): 51516.
Hessler, Richard M., and Freerks, Kristina. “Privacy Ethics in the Age of Disclosure: Sweden and
America Compared.” The American Sociologist 26 (1995): 35-53.
Hewitt, Patricia. Privacy: The Information Gatherers. National Council for Civil Liberties, 1977.
Higbee, Kari L. “Student Privacy Rights: Drug Testing and Fourth Amendment Protections.” Idaho
Law Review 41 (2005): 361.
Higgins, Michael. “High Tech, Low Privacy.” ABA Journal 85 (1999): 52-7.
Hill, Alfred. “Defamation and Privacy under the First Amendment.” Columbia Law Review 76
(1976): 1205-1313.
Himma, Ken. “Privacy vs. Security: Why Privacy is Not an Absolute Value or Right.” San Diego
Law Review 44 (Fall 2007): 857-919.
Himma, Ken. “Separation, Risk, and the Necessity of Privacy to Well-Being: A Comment on Adam
Moore's Toward Informational Privacy Rights.” San Diego Law Review 44 (Fall 2007): 847-57.
Hiltz, S. R., and Turoff, M. The Network Nation: Human Communication via Computer. Reading,
MA: Addison Wesley, 1978.
Hindman, Robert R. “Megan's Law and its Progeny: Whom Will the Courts Protect.” Boston College
Law Review 39 (1997): 201-33.
319
Hiramatsu, Tsuyoshi. “Japan Adopts Privacy Protection Act.” Transnational Data and
Communications Report 12 (1989): 22-9.
Hiramatsu, Tsuyoshi. “Japan's New Personal Data Bill.” Transnational Data and Communications
Report 10 (1987): 14-16.
Hitchcock, J. A. “Net Crimes and Misdemeanors: Outmaneuvering the Spammers, Swindlers and
Stalkers Who Are Targeting You Online.” New Library World 104 (2003): 181.
Hixson, R. F. “Whose Life is it, Anyway? Information as Property.” Information and behavior
Ruben, B. D. ed. New Brunswick, NJ: Transaction Books, 1985. 76-92.
Hixson, Richard F. Privacy in a Public Society: Human Rights in Conflict. New York: Oxford
University Press, 1987.
Hobday, J. “Internet Accountability.” Managing Information 7 (2000): 8-9.
Hodge, James G. “National Health Information Privacy and New Federalism.” Notre Dame Journal
of Law, Ethics and Public Policy 14 (2000): 791-820.
Hodson, Thomas J., Englander, Fred, and Englander, Valerie. “Ethical, Legal and Economic Aspects
of Employer Monitoring of Employee Electronic Mail.” Journal of Business Ethics 19 (1999):
99-108.
Hoefges, R. M. “The Use of State Crime and Accident Reports For Targeting, Direct Mail
Solicitations: Commercial Speech, Access and Privacy.” Communication Law and Policy 3
(1998): 331-365.
Hoffman, Donna L., Novak, Thomas P., and Peralta, Marcos A. “Information Privacy in the
Marketplace: Implications for the Commercial Uses of Anonymity on the Web.” The Information
Society 15 (1999): 129-139.
Hoffman, Lance J (ed.). Computers and Privacy in the Next Decade. New York: Academic Press,
Inc., 1980.
Hoffmann, Stanley. “Two Universalisms in Conflict.” The Tocqueville Review/La Revue Tocqueville
21 (2000): 65-71.
Hohengarten, William M. “Same Sex Marriage and the Right of Privacy.” Yale Law Journal 103
(1994): 1495-1531.
Hojnik Zupanc, Ida. “An Attempt to Empirically Evaluate Privacy and Personal Space.” Anthropos
27 (1995): 82-90.
Hollander, John. “The Language of Privacy.” Social Research 68 (2001): 5-28.
Horibe, Masao. “Access to Information and Privacy Legislation in Japan.” Transnational Data and
Communications Report 14 (1991): 31-42.
320
Hornung, Meir S. “Think before you Type: A Look at E-mail Privacy in the Workplace.” Fordham
Journal of Corporate & Financial Law 11 (2005): 115.
Horowitz, Irving Louis. Communicating Ideas. Oxford University Press, 1986.
Horowitz, Irving Louis. “Networking America: The Cultural Context of Privacy v. Publicity.”
Knowledge, Technology, and Policy 12 (2000): 85-90.
Horowitz, Irving Louis. “National Consequences of International Terrorism.” Society 39 (2002): 6-10.
Houlgate, Laurence D. “What Is Legal Intervention in the Family? Family Law and Family Privacy.”
Law and Philosophy 17 (1998): 141-158.
Howe, Eric. “The United Kingdom's Data Protection Act.” Government Information Quarterly 8
(1991): 345-57.
Hu, Shengfa. Moral Value on Privacy Thinking by Major Chinese Traditional Thinkers. American
Sociological Association (ASA), 1998.
Hubener, Louis F. “Rights of Privacy in Open Courts: Do They Exist.” Emerging Issues in State
Constitutional Law 2 (1989): 189-205.
Hudson, Stephen D., and Husak, Douglas N. “Benn on Privacy and Respect for Persons.”
Australasian Journal of Philosophy 57 (1979): 324-329.
Huebert, Ronald. “Privacy: The Early Social History of a Word.” The Sewanee Review 105 (1997):
21-39.
Humber, James M., and Almeder, Robert (eds.). Privacy and health care. Humana Press, Inc., 2001.
Imparato, Nicholas (ed.) Public Policy and the Internet: Privacy, Taxes, and Contract. Hoover
Institution Press, 2000.
Inness, Julie. “Information, Access, or Intimate Decisions About One's Action?: The Content of
Privacy.” Public Affairs Quarterly (1991): 227-242.
Inness, Julie C. Privacy, Intimacy, and Isolation. New York: Oxford University Press, 1992.
Introna, Lucas D. “Privacy and the Computer: Why We Need Privacy in the Information Society.”
Metaphilosophy 3 (1997): 259-275.
Introna, Lucas D., and Pouloudi, Athanasia. “Privacy in the Information Age: Stakeholders, Interests
and Values.” Journal of Business Ethics 22 (1999): 27-38.
Jackson, Henry M. “Privacy and Society.” Humanist 35 (1975): 30-32.
Jaeger, P. T., McClure, C. R., and Fraser, B. T. “The Structures of Centralized Governmental Privacy
Protection: Approaches, Models and Analysis.” Government Information Quarterly 19 (2002):
317-36.
321
Jaeger, Paul T., et al. “The Impact of the USA Patriot Act on Collection and Analysis of Personal
Information Under the Foreign Intelligence Surveillance Act.” Government Information
Quarterly 20 (2003): 295-314.
James, Edward W. “Rights, Privacy, and Tainted Ideals.” Foundations of Ethics, ed. Leroy S. Rouner.
Notre Dame: University of Notre Dame Press, 1983. 115-132.
Jamison, Tena. “Immigration on Line: The Privacy Implications of a National Registry.” Human
Rights 22 (1995): 12-15.
Jenero, Kenneth A, and Mapes Riordan, Lynne D. “Electronic Monitoring of Employees and the
Elusive ‘Right to Privacy.’” Employee Relations Law Journal 18 (1992): 71-102.
Johnson, Deborah. Computer Ethics. Englewood Cliffs, N.J.: Prentice Hall, 1985.
Johnson, Deborah G. “Mapping Ordinary Morals onto the Computer Society: A Philosophical
Perspective.” The Journal of Social Issues 40 (1984): 63-76.
Johnson, Deborah, and Nissenbaum, Helen eds. Computers, Ethics, and Social Values. Englewood
Cliffs, CA: Prentice Hall, 1995.
Johnson, Deborah G. “Computers and Ethics.” National Forum. (Summer 1991): 15-17.
Johnson, Jeffery L. “A Theory of the Nature and Value of Privacy.” Public Affairs Quarterly 6
(1992): 271-288.
Johnson, Jeffery L. “Constitutional Privacy.” Law and Philosophy 13 (1994): 161-193.
Johnson, Jeffery L. “Privacy and the Judgment of Others.” Journal of Value Inquiry 23 (1989): 157168.
Johnson, Jeffery L. “Privacy, Liberty, and Integrity.” Public Affairs Quarterly 3 (1989): 15-34.
Johnson, Jeffery L., and Crowley, Donald W. “TLO and the Student Right to Privacy.” Educational
Theory 36 (1986): 211-224.
Johnson, Karen L. “The Sale of Human Organs: Implicating a Privacy Right.” Valparaiso University
Law Review 21 (1987): 741-62.
Jones, Leslie E. “An Argument against Techno Privacy.” Southwest Philosophy Review 13 (1997):
155-162.
Josephs, Hilary K. “Defamation, Invasion of Privacy, and the Press in the People's Republic of
China.” UCLA Pacific Basin Law Journal 11 (1993): 191-220.
Joyce, John F. “The Privacy Act: A Sword and a Shield but Sometimes Neither.” Military Law
Review 99 (1983): 113-67.
Kahn, Jonathan. “Privacy as a Legal Principle of Identity Maintenance.” Seton Hall Law Review 33
(2003): 371-410.
322
Kalman, Laura. “The Promise and Peril of Privacy.” Reviews in American History 22 (1994): 725731.
Kamenka, Eugene. “Public/Private in Marxist Theory and Marxist Practice.” 267-280. Benn, Stanley
and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.
Kang, Jerry. “Information Privacy in Cyberspace Transactions.” Stanford Law Review 50 (1998):
1193-1294.
Kaplan, Marilyn R. “Commercial Speech and the Right to Privacy: Constitutional Implications of
Regulating Unsolicited Telephone Calls.” Columbia Journal of Law and Social Problems 15
(1980): 277-315.
Karin Frank, Shyli. "Homelessness, the Right to Privacy, and the Obligation to Provide a Home." The
Ethics of Homelessness: Philosophical Perspectives, ed. Abbarno, John M. Amsterdam: Rodopi,
1999.
Karras, A. R. “The Constitutionality of the Driver's Privacy Protection Act: A Fork in the Information
Access Road.” Federal Communications Law Journal 52 (1999): 125-153.
Kastenmeier, Robert W. “Communications Privacy: A Legislative Perspective.” Wisconsin Law
Review 4 (1989): 715-37.
Kateb, George, Jeffrey Rosen, and Frederick Schauer. “Part V: Invasions of Privacy: Violations of
Boundaries.” Social Research 68 (2001): 201.
Kateb, George. “On Being Watched and Known.” Social Research 68 (2001): 269-295
Katz, James E., and Graverman, R. F. “Privacy Issues of a National Research and Education
Network.” Telematics and Informatics 8 (1991): 71-120.
Katz, J. E., and Hyman, M. M. “Dimensions of Concern over Telecommunications Privacy in the
United States.” Information Society 9 (1993): 251-275.
Katz, James E. “Telecommunications and Computers: Whither Privacy Policy?” Society 25 (1987):
81-86.
Katz, James E. “US Telecommunications Privacy Policy: Socio-political Responses to Technological
Advances.” Telecommunications Policy 12 (1988): 353-68.
Kaufman, Irving R. “Press, Privacy and Malice: Reflections on New York v. Sullivan.” New York
State Bar Journal 56 (1984): 10-15.
Keane, John. “Democracy and the Media.” International Social Science Journal 43 (1991): 523-540.
Kebbel, G. “The Different Functions of Speech in Defamation and Privacy Cases.” Journalism
Quarterly 61 (1984): 629-633.
Keisling, Phillip. “The Case Against Privacy: What We Lose When We Mind Our Own Business.”
Washington Monthly 16 (1984): 12-22.
323
Keith, Boon. “Privacy and Community.” Social Theory and Practice 9 (1983): 1-33.
Kemp, Gary. “Autonomy and Privacy in Wittgenstein and Beckett.” Philosophy and Literature 27
(2003): 164-187.
Kertz, Consuelo Lauda, and Burnette, Lisa Boardman. “Telemarketing Tug of War.” Loyola
Consumer Law Reporter 5 (1993): 70-80.
Keynes, Edward. Liberty, Property, and Privacy: Toward a Jurisprudence of Substantive Due
Process. University Park: Pennsylvania State University Press, 1996.
Kieran, M., Morrison, D. E., and Svennevig, M. “Privacy, the Public and Journalism: Towards an
Analytic Framework.” Journalism 1 (2000): 145-169.
Kim, Pauline T. “Privacy Rights, Public Policy, and the Employment Relationship.” Ohio State Law
Journal 57 (1996): 671-730.
Kirby, M. D. “Access to Information and Privacy: The Ten Information Commandments.” University
of Cincinnati Law Review 55 (1987): 745-761.
Kirby, Michael. “Privacy and Libraries.” Australian Library Journal 26 (1977): 215-218.
Kirby, Michael. “Privacy Protection: A New Beginning.” Prometheus 18 (2000): 125-32.
Kirschner, Nancy M. “The Right to Financial Privacy Act of 1978.” University of Michigan Journal
of Law Reform 13 (1979): 10-52.
Klein, Lloyd. Singing Out for Justice: Privacy Concerns and the Impact of Crime Stopper Programs.
Society for the Study of Social Problems (SSSP), 1990.
Kleinig, John. “The Ethical Challenge of AIDS to Traditional Liberal Values.” AIDS & Public Policy
Journal 5 (1990): 42-44.
Kling, R. “Assessing Anonymous Communication on the Internet: Policy Deliberations.” Information
Society 15 (1999): 79-90.
Klosek, J. “Data Privacy in the Information Age.” Journal of the American Society for Information
Science and Technology 53 (2002): 251-3.
Kolb, Angela. “Data Protection Legislation in Eastern Germany.” Transnational Data and
Communications Report 14 (1991): 33-6.
Konvitz, Milton R. Fundamental Liberties of a Free People: Religion, Speech, Press, Assembly.
Ithaca, NY: Cornell University Press, 1957.
Konvitz, Milton R. “Privacy and the Law: A Philosophical Prelude.” Law and Contemporary
Problems 31 (1966): 272-80.
Kovacic, Matej. “Privacy in the Information Society.” Teorija in Praksa 37 (2000): 1019-1034.
Kramer, I. R. “The Full Court Press: Sacrificing Vital Privacy Interests on the Altar of First
Amendment Rhetoric.” Cardozo Arts and Entertainment Law Journal 8 (1989): 113-136.
324
Krause, Harry D., and Marcus, Paul. “Privacy.” American Journal of Comparative Law 26 (1978):
377-92.
Kreie, J., Cronan, T. P. “Copyright, Piracy, Privacy, and Security Issues: Acceptable or Unacceptable
Actions for End Users?” Journal of End User Computing 11 (1999): 13-20.
Kritchevsky, Barbara. “Protecting Privacy: What States Can and Cannot Do.” Human Rights 19
(1992): 16-19.
Krygier, Martin. “Publicness, Privateness and ‘Primitive Law.’” 307-340. Benn, Stanley and G. Gaus
eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.
Krysan, Maria. “Privacy and the Expression of White Racial Attitudes: A Comparison across Three
Contexts.” The Public Opinion Quarterly 62 (1998): 506-544.
Ku, Agnes S. “Revisiting the Notion of ‘Public’ in Habermas's Theory: Toward a Theory of Politics
of Public Credibility.” Sociological Theory 18 (2000): 216-240.
Ku, Catherina, Liu, Chang, and Marchewka, Jack T. “American and Taiwanese Perceptions
Concerning Privacy, Trust, and Behavioral Intentions in Electronic Commerce.” Journal of
Global Information Management 12 (2004): 18-40.
Kukathas, Chandran. “Cultural Privacy.” Monist: An International Quarterly Journal of General
Philosophical Inquiry 91 (January 2008): 68-80.
Kumar, Krishan. “The Privatized Society.” Universities Quarterly: Culture, Education & Society 40
(1986): 356-364.
Kupfer, Joseph. “Privacy, Autonomy, and Self Concept.” American Philosophical Quarterly 24
(1987): 81-89.
La Fontaine, J. S. “Public or Private? The Constitution of the Family in Anthropological Perspective.”
International Journal of Moral and Social Studies 3 (1988): 267-289.
Lackey, Douglas P. “Mental Terms and Negative Privacy.” Journal of Critical Analysis 6 (1976): 4047.
Lake, Steven E. “Unrestricted Private Employee Drug Testing Programs: An Invasion of the Worker's
Right to Privacy.” California Western Law Review 23 (1986): 72-104.
Lally, Laura. “Privacy Versus Accessibility: The Impact of Situationally Conditioned Belief.”
Journal of Business Ethics 15 (1996): 1221-1226.
Lane, Frederick S. “The Naked Employee: How Technology is Compromising Workplace Privacy.”
Knowledge, Technology, and Policy 16 (2003): 108-109.
Langan, Kenneth James. “Computer Matching Programs: A Threat to Privacy.” Columbia Journal of
Law and Social Problems 15 (1979): 143-80.
Langer, Richard. “Abortion and the Right to Privacy.” Journal of Social Philosophy 23 (1992): 23-51.
325
Lansing, Paul. “The Conflict of Patient Privacy and the Freedom of Information Act.” Journal of
Health Politics, Policy and Law 9 (1984): 315-22.
Larson, Erik. The Naked Consumer: How Our Private Lives Become Public Commodities. New York:
Holt, 1992.
Larson, Jeffrey H., and Medora, N. “Privacy Preferences: A Cross Cultural Comparison of Americans
and Asian Indians.” International Journal of Sociology of the Family 22 (1992): 55-66.
Lashner, Marilyn A. “Privacy and the Public's Right to Know.” Journalism Quarterly 53 (1976): 67988.
Laurie, Graeme T. “The Most Personal Information of All: An Appraisal of Genetic Privacy in the
Shadow of the Human Genome Project.” International Journal of Law, Policy and the Family 10
(1996): 74-101.
Le Poire, Beth A., Burgoon, Judee K., and Parrott, Roxanne. “Status and Privacy Restoring:
Communication in the Workplace.” Journal of Applied Communication Research 20 (1992): 419436.
Ledvinka, J. “Privacy Regulations and Employee Record Keeping.” Journal of Library
Administration 7 (1986): 25-34.
Lee, L. T. “Privacy, Security, and Intellectual Property.” Understanding the Web: The Social,
Political, and Economic Dimensions of the Internet. Albarran, A. B., and Goff, D. H. eds. Ames:
Iowa State University Press, 2000. 135-164.
Lee, Laurie Thomas. “U.S. Telecommunications Privacy Policy and Caller ID.” California Western
Law Review 30 (1993): 1-60.
Lee, Laurie Thomas, and LaRose, Robert. “Caller ID and the Meaning of Privacy.” Information
Society 10 (1994): 247-65.
Lee, Ya Ching. “Will Self-regulation Work in Protecting Online Privacy?” Online Information
Review 27 (2003): 276-283.
Lemos, Ramon M. “Immediacy, Privacy, and Ineffability.” Philosophy and Phenomenological
Research 25 (1965): 500-515.
Lessig, Lawrence. “Privacy as Property.” Social Research 69 (2002): 247-269
Lever, Annabelle. “Must Privacy and Sexual Equality Conflict? A Philosophical Examination of
Some Legal Evidence.” Social Research 67 (2000): 1137-1171.
Levine, Milton. “Privacy in the Tradition of the Western World.” In Privacy, William Bier ed. 3-21.
New York: Fordham University Press, 1980.
Levy, Michael. “The Electronic Monitoring of Workers: Privacy in the Age of the Electronic
Sweatshop.” Legal Reference Services Quarterly 14 (1995): 5-56.
326
Levy, Steven. Hackers: Heroes of the Computer Revolution. New York: Dell Publishing Co., 1984.
Li, Joyce H S. “The Death of Privacy: The Lively Debate in The Washington Post (1974-1998).”
Journal of Information Ethics 9 (2000): 63-88.
Lieberstein, Stanley H. Who Owns What Is in Your Head?: Trade Secrets and the Mobile Employee.
New York: Hawthorne Books, 1979.
Linowes, David F. “Must Personal Privacy Die in the Computer Age?” American Bar Association
Journal 65 (1979): 1180-4.
Lippke, Richard L. “Work, Privacy, and Autonomy.” Public Affairs Quarterly 3 (1989): 41-55.
Lissit, Robert. “The Privacy Piercers: Media in Review.” World & I 14 (1999): 98-103.
Litt, Marc O. “‘Citizen Soldiers’ or Anonymous Justice: Reconciling the Sixth Amendment Right of
the Accused, the First Amendment Right of the Media and the Privacy Right of Jurors.”
Columbia Journal of Law and Social Problems 25 (1992): 371-421.
Loch, Karen D., Conger, Sue, and Oz, Effy. “Ownership, Privacy and Monitoring in the Workplace:
A Debate on Technology and Ethics.” Journal of Business Ethics 17 (1998): 653-663.
Lockway, Larry. “The Ethical Role of Information in Sustainable Communities.” Journal of
Information Ethics 4 (1995): 60-68.
Lockwood, Alan L. “Values Education and the Right to Privacy.” Journal of Moral Education 7
(1977): 9-26.
Losito, William F. “An Ethical Theory for Privacy in Educational Contexts.” Philosophy of
Education 36 (1980): 236-244.
Lu, C. L. “Seeking Privacy in Wireless Communications: Balancing the Right of Individual Privacy
with the Need for Effective Law Enforcement.” Hastings Communications and Entertainment
Law Journal 17 (1995): 529-556.
Lubonja, Fatos. “Privacy in a Totalitarian Regime.” Social Research 68 (2001): 237-254.
Ludd, Steven O. “Athletics, Drug Testing and the Right to Privacy: A Question of Balance.” Howard
Law Journal 34 (1991): 599-632.
Luedtke, Paul L. “Open Government and Military Justice.” Military Law Review 87 (1980): 7-72.
Lund, William R. “Communitarian Politics, the Supreme Court, and Privacy: The Continuing Need
for Liberal Boundaries.” Social Theory and Practice 16 (1990): 191-215.
Lundstedt, Sven B. “Democracy, Technology, and Privacy.” Forum for Applied Research and Public
Policy 4 (1989): 68-74.
Lusky, Louis. “Invasion of Privacy: A Clarification of Concepts.” Political Science Quarterly 87
(1972): 192-209.
327
Lyon, David. “Everyday Surveillance: Personal Data and Social Classification.” Information,
Communication & Society 5 (2002): 242-257.
Lyon, David. “Surveillance in Cyberspace: The Internet, Personal Data, and Social Control.” Queen's
Quarterly 109 (2002): 345-357.
Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham, UK: Open U Press,
2001.
Lyon, David. Surveillance Studies: Sociological and Comparative Approaches. Brisbane, Australia:
International Sociological Association (ISA), 2002.
Lyon, David. The Electronic Eye: The Rise of Surveillance Society. Oxford: Blackwell Publishers,
1994.
Lyon, David. “The World Wide Web of Surveillance: The Internet and Off World Power Flows.”
Information, Communication & Society 1 (1998): 91-105.
Lyon, David. “Facing the Future: Seeking Ethics for Everyday Surveillance.” Ethics and Information
Technology 3 (2001): 171-181.
Machamer, Peter, and Boylan, Barbara. “Freedom, Information and Privacy.” Business and
Professional Ethics Journal 12 (1993): 47-68.
Machan, Tibor R. “The Right to Privacy versus Uniformitarianism.” Journal of Social Philosophy 23
(1992): 75-84.
Mack, Arien (ed.) “Privacy.” Social Research 68 (2001): 5-338.
Mack, Arien, and Sajo, Andras eds. Privacy in Post Communist Europe: Social Research 69 (2002).
MacKenzie, Kevin I. “Administrative Searches and the Fourth Amendment: An Alternative to the
Warrant Requirement.” Cornell Law Review 64 (1979): 856-74.
MacKinnon, Catharine A. “Privacy and Equality: Notes on Their Tension.” The Tocqueville
Review/La Revue Tocqueville 21 (2000): 77-85.
Mael, Fred A., Mary Connerley, and Ray A. Morath. “None of Your Business: Parameters of Biodata Invasiveness.” Personnel Psychology 49 (1996): 613-651.
Maida, Pamela (ed.) Freedom of Information Act guide & Privacy Act overview. United States
Department of Justice, Office of Information and Privacy. Washington, DC: Superintendent of
Documents, 2000.
Malcolm, Clark. “Paradox in the Office: Fitting the Work Place for People, Accommodating Workers'
Needs for Privacy and Accessibility, Control and Direction, Work and Play Heightens
Commitment.” National Productivity Review 5 (1986): 142-9.
Mangan, Mark and Wallace, Jonathan. Sex, Laws, and CyberSpace: Freedom and Censorship on the
Frontiers of the Online Revolution. Herry Holt and Company, New York, 1997.
328
Manning, Rita C. “Liberal and Communitarian Defenses of Workplace Privacy.” Journal of Business
Ethics 16 (1997): 817-23.
Marcell, David W. “Privacy and the American Character.” South Atlantic Quarterly 66 (1967): 1-12.
Marchand, Donald A. The Politics of Privacy, Computers, and Criminal Justice Records: Controlling
the Social Costs of Technological Change. Information Resources Press, 1980.
Margalit, Avishai. “Privacy in the Decent Society.” Social Research 68 (2001): 255-268.
Margolis, Stacey. “The Public Life: The Discourse of Privacy in the Age of Celebrity.” Arizona
Quarterly 51 (1995): 81-101.
Margulis, Stephen T ed. “Contemporary Perspectives on Privacy: Social, Psychological, Political.”
Journal of Social Issues 59 (2003): 243-4.
Margulis, Stephen T. “On the Status and Contribution of Westin's and Altman's Theories of Privacy.”
Journal of Social Issues 59 (2003): 411-430.
Margulis, Stephen T. “Privacy as a Social Issue and Behavioral Concept.” Journal of Social Issues 59
(2003): 243-261.
Marks, Lawrence Kaiser. “Telescopes, binoculars, and the Fourth Amendment.” Cornell Law Review,
67 (1982): 379-95.
Marshall, Patrick G. “Your Right to Privacy.” Editorial Research Reports (Jan. 20 ,1989): 30-43.
Marshall, Sandra E. “Public Bodies, Private Selves.” Journal of Applied Philosophy 5 (1988): 147158.
Martin, Kirsten, and Freeman, R. Edward. “Some Problems with Employee Monitoring.” Journal of
Business Ethics 43 (2003): 353-361.
Marx, Gary T. “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of
Social Issues 59 (2003): 369-390.
Marx, Gary T. “I'll Be Watching You: Reflections on the New Surveillance.” Dissent 32 (1985): 2634.
Marx, Gary T. “Technology and Gender: Thomas I. Voire and the Case of the Peeping Tom.” The
Sociological Quarterly 43 (2002): 409-433.
Marx, Gary T. “The Surveillance Society: The Threat of 1984 Style Techniques.” The Futurist 19
(1985): 21-26.
Marx, Gary T. Undercover: Police Surveillance in America. Berkeley, CA: University of California
Press, 1988.
Marx, Gary T. “What's in a Name? Some Reflections on the Sociology of Anonymity.” The
Information Society 15 (1999): 99-112.
329
Marx, Gary T., and Sherizen, Sanford. “Corporations that Spy on Their Employees: Technological
Monitoring of Workers is Widespread.” Business and Society Review (1987): 32-7.
Marx, Gary T, and Sherizen, Sanford. “Monitoring on the Job: How to Protect Privacy as well as
Property.” Technology Review 89 (1986): 62-67.
Marx, Gary T. “Murky Conceptual Waters: The Public and the Private.” Ethics and Information
Technology 3 (2001): 157-169.
Masci, David. “Internet Privacy: Is More Government Regulation Needed.” CQ Researcher 8 (1998):
955-75.
Mason, David. Privacy for What? The Importance of the Social in Employee Responses to
Surveillance Technologies at Work. Brisbane, Australia: International Sociological Association
(ISA), 2002.
Matheson, David. “A Distributive Reductionism about the Right to Privacy.” Monist: An
International Quarterly Journal of General Philosophical Inquiry 91 (January 2008): 108-129.
Matheson, David. “Unknowableness and Informational Privacy.” Journal of Philosophical Research
32 (2007): 251-267.
Matthews, Steve. “Privacy, Separation, and Control.” Monist: An International Quarterly Journal of
General Philosophical Inquiry 91 (January 2008):130-150.
Mawby, R. I. “Overcoming the Barriers of Privacy: Police Strategies against Non-visible Crime.”
Criminology 18 (1981): 501-21.
Maxeiner, J. R. “Freedom of Information and the EU Data Protection Directive.” Federal
Communications Law Journal 48 (1995): 93-104.
May, Larry. “Privacy and Property.” Philosophy in Context 10 (1980): 40-53.
McArthur, Robert L. “Reasonable Expectations of Privacy.” Ethics and Information Technology 3
(2001): 123-128.
McCamus, John D. “The Delicate Balance: Reconciling Privacy Protection with the Freedom of
Information Principle.” Government Information Quarterly 3 (1986): 49-61.
McCarthy, J. T. The Rights of Publicity and Privacy. New York: Clark Boardman, 1987.
McCloskey, H.J. “Privacy and the Right to Privacy.” Philosophy 55 (1980): 17-38.
McCloskey, H.J. “The Political Ideal of Privacy.” Philosophical Quarterly 21 (1971): 303-314.
McClosky, Herbert, and Brill, Alida. Dimensions of Tolerance: What Americans Believe about Civil
Liberties. New York: Russell Sage Foundation, 1983.
McCrohan, K. F. “Information Technology, Privacy and the Public Good.” Journal of Public Policy
and Marketing 8 (1989): 265-278.
330
McCulloch, Andrew. “On the Public and the Private: A Comment on Fahey.” Sociology 31 (1997):
793-799.
McFarland, Katherine M. “Privacy and Property: Two Sides of the Same Coin: The Mandate for
Stricter Scrutiny for Government uses of Eminent Domain.” The Boston Public Interest Law
Journal 14 (2004): 142.
McDonald, Daniel W., et al. “Intellectual Property and Privacy Issues on the Internet.” South Dakota
Business Review 55 (1996): 1.
McDowell, Gary L. “Private Rights and Public Morality: The Nature and Extent of the Right to
Privacy.” Public Interest Law Review (1991): 67-85.
McGleenan, Tony. “Genetic Information and the Challenge to Privacy.” International Review of Law,
Computers and Technology 12 (1998): 535-46.
McGleenan, Tony. "Rights to Know and not to Know: Is there a Need for a Genetic Privacy Law?"
The Right to Know and the Right not to Know, ed. Chadwick, Ruth. Avebury: Brookfield, 1997.
McGovern, Theresa M. “Is Privacy Now Possible?” Social Research, 68 (2001): 327-333.
McKinney, Karyn D. “Space, Body, and Mind: Parental Perceptions of Children's Privacy Needs.”
Journal of Family Issues 19 (1998): 75-100.
McLean, D. “Privacy Gaining Heft as an FOIA Exemption.” Communications and the Law 15
(1993): 25-46.
McLean, Sheila A. M. “Mapping the Human Genome Friend or Foe?” Social Science and Medicine
39 (1994): 1221-1227.
McLean, Deckle. Privacy and Its Invasion. Westport: Praeger, 1995.
McMullin, E. "Openness and Secrecy in Science: Some Notes on Early History." Science,
Technology, and Human Values 10 (1985): 14-23.
McNair, Douglas. “The Ethics of Health Privacy – A Matter of Environmental Ethics.” Bioethics
Forum 14 (1998): 9-12.
McQueen, K. “Cyber Spies.” Managing Information 7 (2000): 12.
McWhirter, Darien A., and Bible, Jon D. Privacy As A Constitutional Right: Sex, Drugs, And The
Right To Life. Quorum Books, 1992.
Meeler, David. “Is Information All We Need to Protect?” Monist: An International Quarterly Journal
of General Philosophical Inquiry 91 (January 2008):151-169,
Menand, Louis, Ruth Bernard Yeazell, David Bromwich, and Nancy K. Miller. “Part IV: Privacy and
the Self: The Rise and Fall of Privacy.” Social Research 68 (2001): 115.
Mendelsohn, L. D. “Legislation for Personal Privacy: Its Impact on Transborder Data Flow.”
Information Services and Use 7 (1987): 43-50.
331
Mensel, Robert E. “‘Kodakers Lying in Wait’: Amateur Photography and the Right of Privacy in New
York, 1885-1915.” American Quarterly 43 (1991): 24-45.
Merchant, Jennifer. “The Right of Genetic Privacy.” The Tocqueville Review/La Revue Tocqueville,
21 (2000): 31-55.
Mesibov, Laurie. “Protection of Students' Privacy Rights: The Hatch Amendment.” School Law
Bulletin 16 (1985): 15-17.
Meslin, Eric M., et al. “The Ethical, Legal, and Social Implications Research Program at the National
Human Genome Research Institute.” Kennedy Institute of Ethics Journal 7 (1997): 291-8.
Metalitz, Steven J. “The Proposed Data Protection Directive: At What Price Privacy.” Journal of
European Business 2 (1991): 13-17.
Metelski, J. “Achieving Communications Privacy through Revision of the Eavesdropping Laws.”
Federal Communications Law Journal 30 (1978): 135-147.
Metivier Carreiro, Karen A., and LaFollette, Marcel C. “Commentary: Balancing Cyberspace
Promise, Privacy, and Protection Tracking the Debate.” Science Communication 19 (1997): 3-20.
Michael, James. “Open Government and Data Protection.” British Journal of Law and Society 8
(1981): 265-270.
Michelfelder, Diane P. “The Moral Value of Informational Privacy in Cyberspace.” Ethics and
Information Technology 3 (2001): 129-135.
Mill, John Stuart. On Liberty. Indianapolis: Hackett Publishing, 1978.
Miller, D. W. “What We Can Learn from the European Privacy Standard.” Healthcare Informatics 9
(1992): 92-99.
Miller, Jonathan Lewis. “Search and Seizure of Air Passengers and Pilots: The Fourth Amendment
takes Flight.” Transportation Law Journal 22 (1994): 199-223.
Miller, S. “Privacy, Data Bases and Computers.” Journal of Information Ethics 7 (1998): 42-8.
Miller, S., and Weckert, J. “Privacy, the Workplace and the Internet.” Journal of Business Ethics 28
(2000): 255-265.
Miller, W. “Privacy in the Information Age: Implications for Libraries.” Library Issues: Briefings for
Faculty and Administrators 19 (1999): 4.
Miller, Arthur R. “Computers and Privacy.” Ethics and the Management of Computer Technology,
ed. W. Michael Hoffman. Cambridge: Oelgeschlager, 1982. 93-108.
Miller, Seumas. “Privacy, Data Bases, and Computers.” Journal of Information Ethics 7 (1998): 4248.
Miller, Seumas, and Weckert, John. “Privacy, the Workplace, and the Internet.” Journal of Business
Ethics 28 (2000): 255-265.
332
Mindle, Grant B. “Liberalism, Privacy, and Autonomy.” Journal of Politic 51 (1989): 575-598.
Minor, William H. “Identity Cards and Databases in Health Care: The Need for Federal Privacy
Protections.” Columbia Journal of Law and Social Problems 28 (1995): 253-96.
Minow, M., Coyle, K., and Kaufman, P. “The USA Patriot Act.” Library Journal 127 (2002): 52-7.
Mochmann, Ekkehard, and Mueller, Paul J (eds.). Data protection and social science research:
perspectives from ten countries. Frankfurt, Germany: Campus Verlag GmbH, 1979.
Monberg, John. “You Will: Social Implications of Advanced Marketing Technologies.” Ethics and
Behavior 7 (1997): 229-238.
Montague, Phillip. “A Child’s Right to Privacy.” Public Affairs Quarterly 2 (1988): 17- 32.
Moor, James H. “Using Genetic Information while Protecting the Privacy of the Soul.” Ethics and
Information Technology 1 (1999): 257-263.
Moore, Adam D. “Privacy in the Family,” with Newell, B., Metoyer, C. Forthcoming in The Social
Dimensions of Privacy, Cambridge University Press, 2014. Beate Roessler and Dorota
Mokrosinska eds. forthcoming (2014).1
Moore, Adam D. “Coercing Privacy and Moderate Paternalism: Allen on Unpopular Privacy,”
American Philosophical Association Newsletter in Philosophy and Law, Vol. 13 (Fall 2013): 914.2
Moore, Adam D. “Privacy, Speech, and the Law.” Journal of Information Ethics, Vol. 22 (summer
2013): 21-43.3
Moore, Adam D. “Privacy.” The International Encyclopedia of Ethics, edited by Hugh LaFollette.
(Winter 2013), 1-11.4
Moore, Adam D. “Drug Testing and Privacy in the Workplace,” The John Marshall Journal of
Computer & Information Law, Vol. 29 (Summer 2012): 463-492.5
Moore, Adam D. “Defining Privacy.” Journal of Social Philosophy 39 (Fall 2008): 411-428.6
Moore, Adam D. “Privacy in the Family,” with Newell, B., Metoyer, C. Forthcoming in The
Social Dimensions of Privacy, Cambridge University Press, 2014. Beate Roessler and Dorota
Mokrosinska eds. forthcoming (2014).
2
Moore, adam D. “Coercing Privacy and Moderate Paternalism: Allen on Unpopular Privacy,”
American Philosophical Association Newsletter in Philosophy and Law, Vol. 13 (Fall 2013): 914.
3
Moore, Adam D. “Privacy, Speech, and the Law.” Journal of Information Ethics, Vol. 22 (summer
2013): 21-43.
4
Moore, Adam D. “Privacy.” The International Encyclopedia of Ethics, edited by Hugh
LaFollette. (Winter 2013), 1-11.
5
Moore, Adam D. “Drug Testing and Privacy in the Workplace,” The John Marshall Journal of
Computer & Information Law, Vol. 29 (Summer 2012): 463-492.
6
Moore, Adam D. “Defining Privacy.” Journal of Social Philosophy 39 (Fall 2008): 411-428.
1
333
Moore, Adam D. “Toward Informational Privacy Rights.” San Diego Law Review 44 (Fall 2007):
809-839.7
Moore, Adam D. “Privacy and the Encryption Debate.” Knowledge, Technology, and Policy 12
(2000): 72-84.8
Moore, Adam D. “Privacy: Its Meaning and Value.” American Philosophical Quarterly 40 (2003):
215-227.9
Moore, Adam D. “Employee Monitoring and Computer Technology: Evaluative Surveillance v.
Privacy.” Business Ethics Quarterly 10 (2000): 697-709.10
Moore, Adam D. “Intangible Property: Privacy, Power, and Information Control.” American
Philosophical Quarterly 35 (1998): 365-378.11
Moore, Adam D. “Owning Genetic Information and Gene Enhancement Techniques: Why Privacy
and Property Rights May Undermine Social Control of the Human Genome.” Bioethics 14
(2000): 97-119.12
Moore, Barrington, Jr. “Privacy.” Society 22 (1985): 17-27.
Moore, Barrington, Jr. Privacy: Studies in Social and Cultural History. New York: M. E. Sharpe
Inc.1984.
Moorhead, S. R., Langenbach, M., Kennedy, J., Hodgson, C. M., Ruiz, P., and Junaid, O.
“Observations on the Observed: A Study of Inpatients' Perception of Being Observed.” O Irish
Journal of Psychological Medicine 13 (1996): 59-61.
Moreham, N. A. “Privacy in Public Places.” The Cambridge Law Journal 65 (Nov., 2006): 606-635.
Moretti, Barbara. “Outing: Justifiable or Unwarranted Invasion of Privacy? The Private Facts Tort as
a Remedy for Disclosures of Sexual Orientation.” Cardozo Arts and Entertainment Law Journal,
11 (1993): 857-903.
Mossholder, Kevin W. “Information Privacy and Performance Appraisal: An Examination of
Employee Perceptions and Reactions.” Journal of Business Ethics (1991): 151-156.
Moore, Adam D. “Toward Informational Privacy Rights.” San Diego Law Review 44 (Fall
2007): 809-839.
8
Moore, Adam D. “Privacy and the Encryption Debate.” Knowledge, Technology, and Policy 12
(2000): 72-84
9
Moore, Adam D. “Privacy: Its Meaning and Value.” American Philosophical Quarterly 40
(2003): 215-227.
10
Moore, Adam D. “Employee Monitoring and Computer Technology: Evaluative Surveillance
v. Privacy.” Business Ethics Quarterly 10 (2000): 697-709.
11
Moore, Adam D. “Intangible Property: Privacy, Power, and Information Control.” American
Philosophical Quarterly 35 (1998): 365-378.
12
Moore, Adam D. “Owning Genetic Information and Gene Enhancement Techniques: Why
Privacy and Property Rights May Undermine Social Control of the Human Genome.” Bioethics
14 (2000): 97-119.
7
334
Muhkerjee, Roopali. “Now You See It, Now You Don't: Naming Privacy, Framing Policy.” Critical
Studies in Media Communication 17 (2000): 469-93.
Munro, Moira, and Madigan, Ruth. “Privacy in the Private Sphere.” Housing Studies 8 (1993): 29-45.
Murphy, John F. “An International Convention on Invasion of Privacy.” New York University Journal
of International Law and Politics 8 (1976): 387-433.
Murphy, Priscilla, and Maynard, Michael. “Framing the Genetic Testing Issue: Discourse and
Cultural Clashes among Policy Communities.” Science Communication 22 (2000): 133-153.
Mustafa, Husain. “Personal Privacy in an Information Society.” Virginia Social Science Journal 20
(1985): 12-21.
Mylchreest, Ian. “‘Sound Law and Undoubtedly Good Policy’: Roe v. Wade in Comparative
Perspective.” Journal of Policy History 7 (1995): 53-71.
Nadel, Mark S. “Rings of Privacy: Unsolicited Telephone Calls and the Right of Privacy.” Yale
Journal on Regulation 4 (1986): 99-128.
Nagel, Thomas. “Concealment and Exposure.” Philosophy and Public Affairs 27 (1998): 3-30.
Nash, Jennifer C. “From Lavender to Purple: Privacy, Black Women, and Feminist Legal Theory.”
Yeshiva University Cardozo Women's Law Journal 11 (2005): 303.
Nasri, W. “Privacy and Copyright.” Information Science: Search for Identity Anthony Debons ed.
New York: Marcel Dekker, Inc., 1974. 337-344.
Nathan, Daniel O. “Just Looking: Voyeurism and the Grounds of Privacy.” Public Affairs Quarterly,
(October, 1990): 365-386.
Nelkin, Dorothy. “Ironies in the Public Response to Information Technology.” National Forum 74
(1994): 7-10.
Nelkin, Dorothy, and Andrews, Lori. “DNA Identification and Surveillance Creep.” Sociology of
Health and Illness 21 (1999): 689-706.
Nelkin, Dorothy, and Tancredi, Laurence. Dangerous Diagnostics: The Social Power of Biological
Information. New York: HarperCollins, 1989.
Nelson, Deborah. Pursuing Privacy in Cold War America. New York: Columbia Univ. Press, 2002.
Nelson, Jaleen. “Sledge Hammers and Scalpels: The FBI Digital Wiretap Bill and its Effect on Free
Flow of Information and Privacy.” UCLA Law Review 41 (1994): 1139-83.
Nelson, Lisa. “Protecting the Common Good: Technology, Objectivity, and Privacy.” Public
Administration Review (Sept. 15, 2002): 69-74.
Neocleous, Mark. “Privacy, Secrecy, Idiocy.” Social Research 69 (2002): 85-110.
Nesson, Charles. “Threats to Privacy.” Social Research 68 (2001): 105-113.
335
Neuhaus, Paul. “Privacy and confidentiality in digital reference.” Reference and User Services
Quarterly 43 (2003): 26-36.
Neville, Elizabeth. “The Public's Right to Know the Individual's Right to Privacy.” Policing and
Society 9 (2000): 413-428.
Neville, Robert. “Various Meanings of Privacy: A Philosophical Analysis.” In Privacy, ed. William
Baier, 22-34. New York: Fordham University Press, 1980.
Newman, M., and Marks de Chabris, G. “Employment and privacy: a problem for our time.” Journal
of Business Ethics 6 (1987): 153-63.
Nissenbaum, Helen. “Privacy as Contextual Integrity.” Washington Law Review 79 (2004): 119-158.
Nissenbaum, Helen. "The Meaning of Anonymity in an Information Age" The Information Society,
15 (1999):141-144.
Nissenbaum, Helen. “Protecting Privacy in an Information Age: The Problem of Privacy in Public.”
Law and Philosophy 17 (1998): 559-596.
Nissenbaum, Helen. “Toward an Approach to Privacy in Public: Challenges of Information
Technology.” Ethics and Behavior 7 (1997): 207-219.
Noam, E. M. “Privacy in telecommunications: markets, rights, and regulations. Part II: policy
approaches.” New Telecom Quarterly 3 (1995): 37-45.
Noble, John H., Jr. “Protecting the Public’s Privacy in Computerized Health and Welfare Information
Systems.” Social Work 16. (1971): 35-41.
Nock, Steven L. “Too Much Privacy?” Journal of Family Issues 19 (1998): 101-118.
Nolan, J. “The Demise of Information Privacy in Australia.” Library Automated Systems Exchange,
29 (1998): 40-8.
Nunan, Richard. “Militant Gayes, Gayes in the Military, and Privacy as Social Freedom.” Law and
Philosophy 13 (1994): 481-492.
Nunno, R M. “Electronic Signatures: Technology Developments and Legislative Issues.” Journal of
Academic Librarianship 26 (2000): 355-8.
O'Brien, David M. Privacy, Law, and Public Policy. New York: Praeger, 1979.
O’Donnell, Michael J. “Reading for Terrorism: Section 215 of the USA Patriot Act and the
Constitutional Right to Information Privacy.” Journal of Legislation 31 (2004): 45.
O'Connell, Brian M. “Employment Privacy: Where Utopia Meets Reality.” Australian Journal of
Professional and Applied Ethics 1 (1999): 96-102.
O’Harrow Jr., Robert. No Place to Hide. Free Press, 2005.
O'Neil, Michael. “Cybercrime Dilemma: Is it Possible to Guarantee both Security and Privacy.”
Brookings Review 19 (2001): 28-31.
336
O'Neil, Robert M. “Rights in Conflict: The First Amendment's Third Century.” Law and
Contemporary Problems, 65.2 (2002): 7-31.
O’Neill, Onora. “Between Consenting Adults.” Philosophy and Public Affairs 14 (1985): 252-77.
Ottensmeyer, Edward J., and Heroux, Mark A. “Ethics, Public Policy, and Managing Advanced
Technologies: The Case of Electronic Surveillance.” Journal of Business Ethics 10 (1991): 51926.
Owen, John E. “An End to Privacy in America?” Contemporary Review 223 (1973): 266-268.
Ozaki, Ritsuko. “Housing as a Reflection of Culture: Privatised Living and Privacy in England and
Japan.” Housing Studies, 17.2 (2002): 209-227.
Packard, Noel. Electronic Monitoring: Biotechnology and Its Impact on Liberal Ideas. American
Sociological Association (ASA), 1999.
Parent, W.A. “A New Definition of Privacy for the Law.” Law and Philosophy 2 (1983): 305-338.
Parent, W.A. “Privacy, Morality, and the Law.” Philosophy and Public Affairs 12 (1983): 269-288.
Parent, W.A. “Recent Work on the Concept of Privacy.” American Philosophical Quarterly 20
(1983): 341-356.
Parker, Richard. “A Definition of Privacy.” Rutgers Law Review 12 (1974): 393-422.
Parmet, Wendy E. “Legal Rights and Communicable Disease: AIDS, the Police Power, and
Individual Liberty.” Journal of Health Politics, Policy and Law 14 (1989): 741-771.
Parmet, Wendy. “Public Health Protection and the Privacy of Medical Records.” Harvard Civil
Rights Civil Liberties Law Review 16 (1981): 265-304.
Parrott, Roxanne, Judee K. Burgoon, Michael Burgoon, and Beth A. LePoire. “Privacy Between
Physicians and Patients: More than a Matter of Confidentiality.” Social Science & Medicine 29
(1989): 1381-5.
Pateman, Carole. “Feminist Critiques of the Public/Private Dichotomy.” 281-306. Benn, Stanley and
G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.
Patton, Jason W. “Protecting Privacy in Public? Surveillance Technologies and the Value of Public
Places.” Ethics and Information Technology 2 (2000): 181-187.
Paul, Nora. “For the Record: Information on Individuals.” National Forum 72 (1992): 34-38.
Paul, Ellen Frankel, Miller Jr., Fred D., and Paul, Jeffrey (eds.). The Right to Privacy. Cambridge:
Cambridge University Press, 2000.
Pedersen, Darhl M., and Shelia Frances. “Regional Differences in Privacy Preferences.”
Psychological Reports 66 (1990): 731-737.
Peikoff, Amy. “No Corn on this Cob: Why Reductionists Should Be All Ears for Pavesich.” Brandeis
Law Journal 42 (2004): 751.
337
Pepperell, Keith. “Privacy, Rights, and Education.” Philosophical Studies in Education 1 (1990): 4156.
Persson, Anders J., and Hansson, Sven Ove. “Privacy at Work: Ethical Criteria.” Journal of Business
Ethics 42 (2003): 59-70.
Peters, T A. “Computerized Monitoring and Online Privacy.” Library Review 49 (2000): 252.
Peterson, James. “Behind the Curtain of Privacy: How Obscenity Law Inhibits the Expression of
Ideas about Sex and Gender.” Wisconsin Law Review 59 (1998): 625.
Peterson, S. B. “Your Life as an Open Book: Has Technology Rendered Personal Privacy Virtually
Obsolete?” Federal Communications Law Journal 48 (1995): 163-186.
Phelps, J., Nowak, G., and Ferrell, E. “Privacy Concerns and Consumer Willingness to Provide
Personal Information.” Journal of Public Policy & Marketing 19 (2000): 27- 41.
Phillips, D. J. “Beyond Privacy: Confronting Locational Surveillance in Wireless Communication.”
Communication Law and Policy 8 (2003): 1-23.
Pilgrim, T. A. “Docudramas and False Light Invasion of Privacy.” Communications and the Law,
10.3 (1988): 3-38.
Pilgrim, Tim A. “Privacy and American Journalism: An Economic Connection.” Journalism History
14 (1987): 18-25.
Pincus, Laura, and Johns, Roger. “Private Parts: A Global Analysis of Privacy Protection Schemes
and a Proposed Innovation for their Comparative Evaluation.” Journal of Business Ethics 16
(1997): 1237-1260.
Pinkard, Terry. “Invasions of Privacy.” Ethical Issues in Social Science Research, eds. Tom L.
Beauchamp, et al. Baltimore: Johns Hopkins University Press, 1982. 257-273.
Pla Rodriguez, Americo. “The Protection of Workers' Privacy: The Situation in the Americas.”
International Labour Review 134 (1995): 297-313.
Ploughman, Penelope. “Public Policy versus Private Rights: The Medical, Social, Ethical, and Legal
Implications of the Testing of Newborns for HIV.” AIDS & Public Policy Journal 10 (1995,
1996): 182-204.
Plumwood, Val. “Feminism, Privacy and Radical Democracy.” Anarchist Studies 3 (1995): 97-120
Pollio, Marie C. “The Inadequacy of HIPPA’s Privacy Rule.” New York University Annual Survey of
American Law 60 (2004): 579.
Posner, Richard A. “Privacy, Surveillance, and Law.” The University of Chicago Law Review75
(Winter, 2008): 245-260
Posner, Richard A. The Economics of Justice. Harvard University Press, 1981.
Posner, Richard A. “The Right of Privacy.” Georgia Law Review, 12 (1978): 393.
338
Posner, Richard A. “Orwell versus Huxley: Economics, Technology, Privacy, and Satire.” Philosophy
and Literature 24 (2000): 1-33.
Posner, Richard A. "Privacy, Secrecy, and Reputation." Buffalo Law Review 28 (Winter 1979): 1-56.
Prosser, William. “Privacy.” California Law Review 48 (1960): 383-422.
Post, Robert C. Tort Law and the Communitarian Foundations of Privacy. The Responsive
Community 10 (1999, 2000): 19-30
Postow, B C., “Andre on Privacy.” Journal of Value Inquiry 22 (1988): 327-330
Note, “Privacy, photography, and the press. Harvard Law Review 111 (1998):1086-1103.
“Privacy, Technology, and the California "Anti-paparazzi" Statute.” Harvard Law Review 112
(1999):1367-84.
Prost, Antoine and Vincent, Gerard, ed. A History of Private Life: Vol. 5: “Riddles of Identity in
Modern Times.” Cambridge, Mass.: Harvard University Press, 1991.
Raab, Charles D, Bennett, Colin J. “Protecting Privacy Across Borders: European Policies and
Prospects.” Public Administration 72 (1994):95-112.
Raab, Charles D, Bennett, Colin J. “The distribution of Privacy Risks: Who Needs Protection.”
Information Society 14 (1998):263-74.
Rachels, James. “Why Privacy Is Important.” Philosophy and Public Affairs 4 (1975): 323-333.
Rao, Radhika. “Reconceiving Privacy: Relationships and Reproductive Technology.” UCLA Law
Review 45 (1998):1077-1124.
Raul, Alan Charles. Privacy and the Digital State: Balancing Public Information and Personal
Privacy. Kluwer Academic Publishers Group, 2002.
Regan, Priscilla M. Legislating Privacy: Technology, Social Values, And Public Policy. Chapel Hill,
NC: University of North Carolina Press, 1995.
Regan, Priscilla M. “The Globalization of Privacy: Implications Of Recent Changes In Europe.”
American Journal of Economics and Sociology 52 (1993): 257-274.
Reidenberg, J. R. “Privacy in the Information Economy: A Fortress or Frontier for Individual
Rights?” Federal Communications Law Journal 44 (1992): 195-243.
Reiman, Jeffrey H. “Privacy, Intimacy, and Personhood.” Philosophy and Public Affairs 6 (1976): 2644.
Reiman, Jeffrey H. “Driving to the Panopticon: A Philosophical Exploration of the Risks to
Privacy Posed by the Information Technology of the Future.” Santa Clara Computer and High
Technology Law Journal 11 (1995): 27-44.
Reisner, Susan L. “Balancing Inmates' Right to Privacy with Equal Employment for Prison Guards.”
Women's Rights Law Reporter 4 (1978): 243-51.
339
Reitman, Alan. “Freedom of Information and Privacy: The Civil Libertarian's Dilemma.” American
Archivist 38 (1975): 501-508.
Relyea, Harold C. “Freedom of Information, Privacy, and Official Secrecy: The Evolution of Federal
Government Information Policy Concepts [United States].” Social Indicators Research, 7
(1980):137-56.
Resnik, David B. “Genetic Privacy in Employment.” Public Affairs Quarterly 7 (1993): 47-56.
Reza, Sadiq. “Privacy and the Criminal Arrestee or Suspect: In Search of a Right, In Need of a Rule.”
Maryland Law Review 64 (2005): 755.
Rich, Ben A. “The Assault on Privacy in Healthcare Decision Making.” Denver University Law
Review, 68 (1991): 1-55.
Richards, David A. J. “Is My Body My Property?” Social Research 68 (2001): 83-101.
Richards, David A. J. “The Jurisprudence of Privacy as a Constitutional Right.” In Privacy, ed.
William Bier, 135-51. New York: Fordham University Press, 1980.
Richards, David A. J. “Unnatural Acts and the Constitutional Right to Privacy: A Moral Theory.”
Fordham Law Review 45 (1977): 1312-48.
Richards, Neil M. “Reconciling Data Privacy and the First Amendment.” University of California
Law Review 52 (2005): 1149.
Richman, Sheldon. “Dissolving the Inkblot: Privacy as Property Right.” Cato Policy Report. 15
(Jan/Feb 1993).
Rickless, Samuel. “The Right to Privacy Unveiled.” San Diego Law Review 44 (Fall 2007): 773-798.
Rössler, Beate. The Value of Privacy. Translated by Rupert D. V. Glasgow (Cambridge, UK: Polity,
2005).
Riley, T. “Access to Government Information: An International Perspective.” Journal of Media Law
and Practice 2 (1981): 92-100.
Roazen, Paul. “Privacy and Therapy.” Society 29 (Jan./Feb.1992): 14-17.
Robbin, Alice. “State Archives and Issues of Personal Privacy: Policies and Practices.” American
Archivist 49 (1986):163-75.
Robison, Wade L. “Privacy and Personal Identity.” Ethics and Behavior 7 (1997): 195-205.
Rohr, John A. “Privacy: Law and Values.” Thought 49 (1974):353-373.
Rollins, C D. “Contingent Privacy That is Complete.” Philosophical Studies 14 (1963): 91-96.
Rosen, Jeffrey. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age. New York:
Random House, 2004.
Rosen, Jeffrey. The Unwanted Gaze: The Destruction Of Privacy In America. Vintage Press 2001.
Rosen, Jeffrey. “Out of Context: The Purposes of Privacy.” Social Research 68 (2001): 209-220.
340
Rosen, Jeffrey. “Why Privacy Matters.” The Wilson Quarterly 24 (2000): 32.
Rosenberg, Alexander. “Privacy as a Matter of Taste and Rights.” Social Philosophy and Policy 17
(2000): 68-90.
Rosenfeld, Frank A. “The Freedom of information act's privacy exemption and the Privacy act of
1974.” Harvard Civil Rights Civil Liberties Law Review 11 (1976): 596-631..
Rotenberg, M. “Preserving Privacy in the Information Society.” International Forum on Information
and Documentation 23 (1998): 11-18.
Rotenberg, Marc. “Fair information practices and the Architecture of Privacy (what Larry doesn't
get).” Stanford Technology Law Review 1 (2001).
Rotenberg, Marc. “Inside the Beltway: The Politics of Privacy.” Government Information Insider 4
(1995): 5-7.
Roth, Louise Marie. “The Right to Privacy Is Political: Power, the Boundary between Public and
Private, and Sexual Harassment.” Law & Social Inquiry 24 (1999): 45-71.
Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone's Private Life and
Open Secret. Simon and Schuster, 1992.
Rubel, Alan. “Privacy and the U.S.A. Patriot Act: Rights, the Value of Rights, and Autonomy.” Law
and Philosophy 26 (March 2007): 119-159.
Rubenfeld, Jed. “The Right of Privacy.” Harvard Law Review 102 (1989): 737-807.
Rubin, Paul H, Lenard, Thomas M. Privacy and the Commercial Use of Personal Information.
Kluwer Academic Publishers Group, 2002.
Ruiz, Blanca R. “The Right to Privacy: A Discourse Theoretical Approach.” Ratio Juris 11 (1998):
155-167.
Rule, James B. “Toward Strong Privacy: Values, Markets, Mechanisms, and Institutions.” University
of Toronto Law Journal 54 (2005): 147.
Rushing, Don G. “Picking Your Poison: The Drug Efficacy Requirement and the Right of Privacy.”
UCLA Law Review 25 (1978): 577-617.
Russell, Steve. “The New Outlawry and Foucault's Panoptic Nightmare.” American Journal of
Criminal Justice 17 (1993): 39-50.
Ryan, Alan. “Private Selves and Public Parts.” 135-154. Benn, Stanley and G. Gaus eds. Public and
Private in Social Life. New York: St. Martin’s Press, 1983.
Ryan, Alan. Public and Private Property.” 223-248. Benn, Stanley and G. Gaus eds. Public and
Private in Social Life. New York: St. Martin’s Press, 1983.
Ryberg, Jesper. “Privacy Rights, Crime Prevention, CCTV, and the Life of Mrs Aremac.” Res
Publica: A Journal of Legal and Social Philosophy 13 (2007): 127-143.
341
Samar, Vincent J. “Privacy and the Debate over Same-Sex Marriage versus Unions.” DePaul Law
Review 54 (2005): 783.
Samoriski, Jan H. “Private Spaces and Public Interests: Internet Navigation, Commercialism and the
Fleecing of Democracy.” Communication Law and Policy 5 (2000): 93-113.
Sanford, B. W. Libel and Privacy: The Prevention and Defense of Litigation. Clifton, NJ: Law and
Business/Harcourt Brace Jovanovich, 1985.
Saunders, John Turk. “In Defense of a Limited Privacy.” Philosophical Review 78 (1969): 237-248.
Saxonhouse, Arlene. “Classical Greek Conceptions of Public and Private.” 363-384. Benn, Stanley
and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press, 1983.
Scanlon, Thomas. “Thomson on Privacy.” Philosophy and Public Affairs 4(1975): 315-322.
Schauer, Frederick. “Can Public Figures Have Private Lives?” Social Philosophy & Policy 17 (2000):
293-309.
Schauer, Frederick. “Free Speech and the Social Construction of Privacy.” Social Research 68
(2001): 221-232.
Schick, Ida Critelli. “Personal Privacy and Confidentiality in an Electronic Environment.” Bioethics
Forum 12 (1996): 25-30.
Schiff, Martin. “The Emergence of Student Rights to Privacy Under the Fourth Amendment.” Baylor
Law Review 34 (1982): 209-27.
Schmuhl, Robert. “Presidential Perplexity: What's Public? What's Private?” Society 38 (2000): 96102.
Schneider, Carl. Shame, Exposure, and Privacy. Boston: Beacon Press, 1977.
Schoechle, Timothy D. “Privacy on the Information Superhighway: Will My House Still Be My
Castle.” Telecommunications Policy 19 (1995): 435-52.
Schoeman, Ferdinand. “Privacy: Philosophical Dimensions.” American Philosophical Quarterly 21
(1984): 199-214.
Schoeman, Ferdinand D. "AIDS and Privacy." In AIDS and Ethics, Reamer, Frederic G. ed. Columbia
University Press: New York, 1993.
Schoeman, Ferdinand D. Philosophical Dimensions of Privacy: An Anthology. Cambridge University
Press: Cambridge, 1984.
Schoeman, Ferdinand D. “Privacy and Criminal Justice Policies.” Criminal Justice Ethics 3 (1983):
71-84.
Schoeman, Ferdinand D. Privacy and Social Freedom. Cambridge University Press: New York, 1992.
Schonsheck, Jonathan. “Privacy and Discrete Social Spheres." Ethics and Behavior 7 (1997): 221228.
342
Schwartz, Paul M. “Property, Privacy, and Personal Data.” The Harvard Law Review 117 (2004):
2055.
Scott, Gini Graham. Mind Your Own Business: The Battle for Personal Privacy. Plenum Publishing
Corporation, 1995.
Senchuk, Dennis M. “Privacy Regained.” Philosophical Investigations 9 (1986): 18-35
Shapiro, Stuart. “Places and Spaces: The Historical Interaction of Technology, Home, and Privacy.”
Information Society 14 (1998): 275-84.
Shils, Edward. The Torment of Secrecy: The Background and Consequences of American Security
Policies. Chicago, IL: Ivan R. Dee, Inc, 1996.
Shivers, Nonnie L. “Firing ‘Immoral’ Public Employees: If Article 8 of the European Convention on
Human Rights Protects Employee Privacy Rights, Then Why can’t We?” Arizona Journal of
International and Comparative Law 21 (2004): 621.
Sieghart, Paul. Privacy and Computers. London: Latimer , 1976.
Sillitoe, P J. “Privacy in a Public Place: Managing Public Access to Personal Information Controlled
by Archives Services.” Journal of the Society of Archivists 19 (1998): 5-15.
Singleton, Solveig. “Privacy and Twenty-First Century Law Enforcement: Accountability for New
Techniques.” Ohio Northern University Law Review 30 (2004): 417.
Simitis, S. “Reviewing Privacy in an Information Society.” University of Pennsylvania Law Review
135 (1987): 70-76.
Simon, Morton J. "Right of Privacy, Right to Know: Which Prevails?" Public Relations Review 3
(1977): 5-18.
Slobogin, Christopher. “Subpoenas and Privacy.” DePaul Law Review 54 (2005): 805.
Slobogin, Christopher. “Technologically Assisted Physical Surveillance: The American Bar
Association's Tentative Draft Standards.” Harvard Journal of Law and Technology 10 (1997):
383-463.
Smith, Lamar. “DragNet: Law Enforcement, Civil Liberties, and the Internet since September 11.”
LBJ Journal of Public Affairs 15 (2003): 16-25.
Smith, Martha M. “Walking with the FBI: Patriotism as Personal Dissent 1 Year after 9 /11.”Journal
of Information Ethics 12 (2003): 10-15.
Smithsimon, Molly. “Private Lives, Public Spaces: The Surveillance State.” Dissent 50 (2003): 4349.
Snortland, Neil. “The Supreme Court and the Constitutional Right to Privacy.” Midsouth Political
Science Journal 11 (1990): 105-24.
Solove, Daniel J. Understanding Privacy (Cambridge MA: Harvard University Press, 2008).
343
Solove, Daniel J., and Richards, Neil. “Privacy's Other Path: Recovering the Law of Confidentiality.”
Georgetown Law Journal 96 (2007): 123-182.
Solove, Daniel J. “The Virtues of Knowing Less: Justifying Privacy Protections against Disclosure.”
Duke Law Journal 53 (2003): 967.
Solove, Daniel J. The Digital Person: Technology and Privacy in the Information Age. New York and
London: New York University Press, 2004.
Solove, Daniel J. “A Taxonomy of Privacy.” University of Pennsylvania Law Review 154 (2006):
477.
Soifer, Eldon, Szabados, Bela. “Hypocrisy and Privacy.” Journal of Philosophical Research 27
(2002): 601-618.
Spence Diehl, Emily. “Stalking and Technology: The Double Edged Sword.” Journal of Technology
in Human Services 22 (2003): 5-18.
Spinello, Richard A. Ethical Aspects of Information Technology. Prentice Hall: Englewood Cliffs,
1995.
Springer, K. A. “In God We Trust: All Others Who Enter this Store are Subject to Surveillance.”
Federal Communications Law Journal 48 (1995): 187-218.
Sponka, J. “Freedom of Speech and Privacy in the Information Age.” Information Society 13 (1997):
171-184.
Steinke, G. “Data Privacy Approaches from US and EU Perspectives.” Telematics and Informatics 19
(2002): 193-200
Steinman, Joan. “Privacy of Association: A Burgeoning Privilege in Civil Discovery.” Harvard Civil
Rights Civil Liberties Law Review 17 (1982): 355-442.
Stevenson, Valerie. “FBI in Your Library? The USA PATRIOT Act and its Implications for
Libraries.” Legal Information Management 3 (2003): 68-70.
Stockman, Norman. “Intruding on Barrington Moore's Privacy: A Review Essay.” Theory, Culture &
Society 6 (1989): 125-144.
Strahilevitz, Lior J. “A Social Networks Theory of Privacy.” University of Chicago Law Review 72
(2005): 1313.
Stratford, J. “Computerized and Networked Government Information: Carnivore.” Journal of
Government Information 28 (2001): 109-12.
Strossen, N. “Cybercrimes v. Cyberliberties.” International Review of Law, Computers and
Technology 14 (2000): 11-24.
Struening, Karen. “Privacy and Sexuality in a Society Divided Over Moral Culture.” Political
Research Quarterly 49 (1996): 505.
344
Sullum, Jacob. “Secrets for Sale: Do Strangers with Computers Know Too Much About You.”
Reason 23 (1992): 28-35.
Sumberg, Theodore A. “Privacy, Freedom, and Obscenity: Stanley v Georgia.” Journal of Critical
Analysis 3 (1971): 84-96.
Sundby, Scott E . "Everyman's Fourth Amendment: Privacy or Mutual Trust Between Government
and Citizen.” Columbia Law Review 94 (1994): 1751-1812.
Sunstein, C. R. Democracy and the Problem of Free Speech. New York: Free Press, 1993.
Suter, Sonia M. “Disentangling Privacy from Property: Toward a Deeper Understanding of Genetic
Privacy.” The George Washington Law Review 72 (2004): 737.
Swinburne, R G. “Privacy.” Analysis 24 (1964): 127-136.
Sykes, C. J. The End of Privacy. New York: St. Martin’s Press, 1999.
Talbott, William J. Which Rights Should be Universal? Oxford: Oxford University Press, 2005.
Tavani, Herman. “Philosophical Theories of Privacy: Implications for an Adequate Online Privacy
Policy.” Metaphilosophy 38 (January 2007): 1-22.
Tavani, Herman. “Privacy Enhancing Technologies As a Panacea for Online Privacy Concerns: Some
Ethical Considerations.” Journal of Information Ethics 9 (2000): 26-36.
Tavani, Herman, Grodzinsky, Frances S. “Cyberstalking, Personal Privacy, and Moral
Responsibility.” Ethics and Information Technology 4 (2002): 123-132.
Tavani, Herman T. “Informational Privacy, Data Mining, and the Internet.” Ethics and Information
Technology 1 (1999): 137-145.
Tavani, Herman T. KDD, “Data Mining, and the Challenge for Normative Privacy.” Ethics and
Information Technology 1 (1999): 265-273.
Taylor, James Stacey. “In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love
Government Surveillance.” Public Affairs Quarterly 19 (July 2005): 227-246.
Taylor, James Stacey. “Privacy and Autonomy: A Reappraisal.” Southern Journal of Philosophy 40
(2002): 587-604.
Telford, T. L. Freedom of speech in the United States. New York: Random House, 1985.
Tepker, Harry F Jr. “Abortion, Privacy and State Constitutional Law: A Speculation if (or when) Roe
v. Wade is Overturned.” Emerging Issues in State Constitutional Law 2 (1989): 173-87.
Terrill, Richard J. “An Overview of the Privacy Issues in Criminal Justice: Trends in the United
States and England.” Police Studies 1 (1978): 42-50.
Thomas, Terry. Privacy and Social Services. Ashgate Publishing Company Ltd., 1995.
Thompson, Dennis F. “Privacy, Politics, and the Press.” Harvard International Journal of
Press/Politics 3 (1998): 103-13.
345
Thompson, M. P. “Breach of Confidence and the Protection of Privacy in English Law.” Journal of
Media Law and Practice 6 (1985): 5-25.
Thompson, Paul B. “Privacy, Secrecy and Security.” Ethics and Information Technology 3 (2001):
13-19.
Thomson, Judith Jarvis. “The Right to Privacy.” Philosophy and Public Affairs 4 (1975): 295-314.
Townsend, James B, Paul, Robert J. “Employee Privacy Rights.” Business and Public Affairs 16
(1990): 16-21.
Trinkle, Catherine A. “Federal Standards for Sex Offender Registration: Public Disclosure Confronts
the Right to Privacy.” William and Mary Law Review 37 (1995): 299-336.
Trubow, G. B. “Peeping Sam: Uncle is Watching Us.” Journal of Computing Security 4 (1986): 1520.
Tucker, David. “Privacy as a Right.” Melbourne Journal of Politics 13 (1981): 3-15.
Tunick, Mark. “Does Privacy Undermine Community?” Journal of Value Inquiry 35 (2001): 517-534.
Tunick, Mark. “Privacy in the Face of New Technologies of Surveillance.” Public Affairs Quarterly
14 (2000): 259-277.
Tushnet, Mark. “Legal Conventionalism in the U.S. Constitutional Law of Privacy.” Social
Philosophy & Policy 17 (2000): 141-164.
Twight, Charlotte. “Watching You: Systematic Federal Surveillance of Ordinary Americans.”
Independent Review 4 (1999): 165-2000.
Tyler, Michele L. “Blowing Smoke: Do Smokers Have a Right? Limiting the Privacy Rights of
Cigarette Smokers.” Georgetown Law Journal 86 (1998): 783-811.
Van Den Haag, Ernest. “On Privacy.” Privacy: Nomos XIII, ed. J. Roland Pennock and John
Chapman, 149-68. New York: Atherton Press, 1971.
Van Den Hoven, Jeroen. “Privacy and the Varieties of Informational Wrongdoing.” Australian
Journal of Professional and Applied Ethics 1 (1999): 30-43
Van De Vate, Dwight, Jr. “The Genesis of Privacy.” Journal of Existentialism 7 (1966/67): 233-242.
Vidmar, Neil and Flaherty, David H. “Concern for Personal Privacy in an Electronic Age.” Journal of
Communication 35 (1985): 91-103.
Vitek, William. “Privacy's Place: The Role of Civility and Community in a Technological Culture.”
Ethics and Behavior 7 (1997): 265-270.
Vitone, P. “Reflections on Surveillance.” Canadian Journal of Communication 19 (1994): 101-110.
Voakes, P S. “What Were You Thinking? A Survey of Journalists Who Were Sued For Invasion of
Privacy.” Journalism and Mass Communication Quarterly 75 (1998): 378-93.
346
Volokh, Eugene. “Cyberspace and Privacy: A New Legal Paradigm? Freedom of Speech and
Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About
You.” Stanford Law Review 52 (2000): 1049.
Vreg, France. “The Contemporary Media Dilemma: Where Are the Boundaries between Privacy and
the Right to Information?” Teorija in Praksa 33 (1996): 408-423.
Wacks, Raymond. Personal Information: Privacy and the Law. Oxford University Press, 1989.
Wacks, Raymond. The Protection of Privacy. London: Sweet & Maxwell, 1980.
Walton, Anthony. “Public and Private Interests: Hegel on Civil Society and the State.” 249-266.
Benn, Stanley and G. Gaus eds. Public and Private in Social Life. New York: St. Martin’s Press,
1983.
Warner, Richard. “Surveillance and the Self: Privacy, Identity, and Technology.” DePaul Law Review
54 (2005): 847.
Ware, Willis H. “The New Faces of Privacy.” Information Society 9 (1993): 195-211.
Warren, Samuel, and Louis Brandeis. “The Right to Privacy.” The Harvard Law Review 4 (1890):
193-220.
Washburn, P. “Electronic Journalism, Computers and Privacy.” Computer/Law Journal 2 (1982):
189-209.
Wasserstrom, Richard. “Privacy: Some Arguments and Assumptions.” Philosophical Law, ed.
Bronaugh, 148-66. Westport, CT: Greenwood Press, 1978.
Watkins, John J. “Private Property vs. Reporter Rights: A Problem In Newsgathering: Use Of
Trespass Law By Subjects Of Coverage To Accomplish What Can't Be Accomplished Through
Libel Law Or Privacy Law Poses Problem For The Media.” Journalism Quarterly 54 (1977):
690-6.
Weigel Garrey, Cindy J, Cook, Christine C, Brotherson, Mary Jane. “Children and Privacy: Choice,
Control, and Access in Home Environments.” Journal of Family Issues 19 (1998): 43-64.
Weinreb, Lloyd L. “The Right to Privacy.” Social Philosophy and Policy 17 (2000): 25-44.
Weisman, A. M. “Publicity as an Aspect of Privacy and Personal Autonomy.” Southern California
Law Review 55 (1982): 727-768.
Weiss, Paul. Privacy. S. Illinois University Press: Carbondale, 1983.
Werdegar, Matthew Mickle. “Lost? The Government Knows Where You Are: Cellular Telephone
Call Location Technology and the Expectation of Privacy.” Stanford Law & Policy Review 10
(1998): 103-17.
Westin, Alan F. Privacy and Freedom. New York: Atheneum, 1967.
347
Westin, Alan F. “Intrusions: Privacy Tradeoffs in a Free Society.” Public Perspective 11 (2000): 819.
Westin, Alan F. “Privacy and Personnel Records: A Look at Employee Attitudes.” Civil Liberties
Review 4 (1978): 28-34.
Westin, Alan F. “Social and Political Dimensions of Privacy.” Journal of Social Issues 59 (2003):
431-453.
Weyns, Walter. “Borderline Skirmishes. A Sociological Exploration of the Boundary between the
Private and the Public Realm.” Tijdschrift voor Sociologie 19 (1998): 247-279.
Whitaker, Reg. The End Of Privacy: How Total Surveillance Is Becoming A Reality. W. W. Norton &
Company, Inc., 1999.
White, Peter. “Privacy an International Concern.” International Library Review 12 (1980): 223-242.
Whitman, James Q. “The Two Cultures of Privacy: Dignity versus Liberty.” Yale Law Journal
11(2004): 1151.
Wiesenthal, David L, Wiener, Neil I. “Privacy and the Human Genome Project.” Ethics and Behavior
6 (1996): 189-202.
Wigand, R. T., Shipley, C., Shipley, D. “Transborder Data Flow, Informatics, and National Policies.”
Journal of Communication 34 (1984): 153-175.
Willis, James, Silbey, Susan. “Self, Surveillance, and Society.” The Sociological Quarterly 43
(2002): 439-445.
Winch, Samuel P. “Moral Justifications for Privacy and Intimacy.” Journal of Mass Media Ethics 11
(1996): 197..
Winseck, D. “Illusions Of Perfect Information And Fantasies Of Control In The Information
Society.” New Media & Society 4 (2002): 93-122.
Wolf, Rita, Thomason, Tommy, LaRocque, Paul. “The Right to Know vs. the Right of Privacy:
Newspaper Identification of Crime Victims.” Journalism Quarterly 64 (1987): 503-507.
Wolhandler, Steven J. “Voluntary Active Euthanasia For The Terminally Ill And The Constitutional
Right To Privacy.” Cornell Law Review 69 (1984): 363-83.
Wollheim, R. “Privacy.” Proceedings of the Aristotelian Society 51 (1951): 83-104.
Woodbury, Marsha. “Email, Voicemail, and Privacy: What Policy Is Ethical?” Science and
Engineering Ethics 6 (2000): 235-244.
Woronoff, Michael A. “Public Employees Or Private Citizens: The Off Duty Sexual Activities Of
Police Officers And The Constitutional Right Of Privacy [United States].” University of
Michigan Journal of Law Reform 18 (1984):195-219.
348
Zabuzhko, Oksana. “Publicity and Media under Communism and After: The Destruction of Privacy.”
Social Research 69 (2002): 35-47.
Young, John, ed. Privacy. New York: John Wiley and Sons, 1978.
Zimmerman, D. L. “False Light Invasion of Privacy: The Light that Failed.” New York University
Law Review 64 (1989): 364-453.
349
Download