Jump to ContentJump to Main Navigation
Privacy in PerilHow We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience$

James B. Rule

Print publication date: 2009

Print ISBN-13: 9780195307832

Published to Oxford Scholarship Online: May 2012

DOI: 10.1093/acprof:oso/9780195307832.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2017. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see http://www.oxfordscholarship.com/page/privacy-policy). Subscriber: null; date: 22 January 2017

(p.211) Bibliography

(p.211) Bibliography

Source:
Privacy in Peril
Publisher:
Oxford University Press

Bibliography references:

Agre, Philip E., and Marc Rotenberg, eds. 1997. Technology and Privacy: The New Landscape. Cambridge, MA: MIT Press.

Arendt, Hannah. 1951. The Origins of Totalitarianism. New York: Harcourt, Brace and Company.

Bennett, Colin J. 1992. Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Ithaca, NY: Cornell University Press.

Bennett, Colin, and Rebecca A. Grant, eds. 1999. Visions of Privacy: Policy Choices for the Digital Age. Toronto: University of Toronto Press.

Bennett, Colin J., and Charles D. Raab. 2003. The Governance of Privacy: Policy Instruments in Global Perspective. Burlington, VT: Ashgate.

Bennett, Colin, Charles Raab, and Priscilla Regan. 2002. “People and Place: Patterns of Individual Identification within Intelligent Transportation Systems,” in David Lyon, ed., Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination. New York: Routledge.

Bigo, Didier. 1996. Police en Reseaux; l'experience europeenne. Paris: Presses de la Fondation Nationale des Science Politiques.

Brenton, Myron. 1964. The Privacy Invaders. New York: Coward, McCann.

Brown, Ian. 2006. “UK Government Powers to Access Personal Information.” Research Report, University College London.

Bunyan, Tony. 1976. The Political Police in Britain. New York: St. Martin's Press. (p.212)

Canadian Internet Policy and Public Interest Clinic, Faculty of Law, University of Ottawa. 2006. “On the Data Trail: A Report on the Canadian Data Brokerage Industry.”

Carey, Peter. 2004. Data Protection: A Practical Guide to UK and EU Law, second edition. Oxford: Oxford University Press.

Chommie, John C. 1970. The Internal Revenue Service. New York: Praeger Publishers.

Clarke, Roger. 1988. “Information Technology and Dataveillance.” Communications of the ACM, vol. 31, no. 5.

Cohen, Stanley A. 2005. Privacy, Crime and Terror: Legal Rights and Security in a Time of Peril. Markham, Ontario: LexisNexis.

Commission Nationale de l'Informatique et des Libertés. 1998. Les Libertés et l'Informatique: Vingt Deliberations Commentées. Paris: La Documentation Française.

Electronic Privacy Information Center and Privacy International. 2005. Privacy and Human Rights 2005; An International Survey of Privacy Laws and Developments. Washington, DC: Electronic Privacy Information Center.

Flaherty, David H. 1989. Protecting Privacy in Surveillance Societies. Chapel Hill: University of North Carolina Press.

Foucault, Michel. 1979. Discipline and Punish: The Birth of the Prison. New York: Vintage Books.

Fried, Charles. 1968. “Privacy.” Yale Law Journal, vol. 77.

Gellman, Robert. 2006. “Trafficking in Health Information: A Widespread Problem,” Version 1.3, July 10, 2006, available from Robert Gellman, Privacy and Information Consultant, 419 Fifth Street, SE, Washington, DC, 20003.

Gilliom, John. 2001. Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy. Chicago: University of Chicago Press.

Goold, Benjamin J. 2004. CCTV and Policing: Public Area Surveillance and Police Practices in Britain. Oxford: Oxford University Press.

Greenawalt, Kent. 1975. Legal Protections of Privacy: Final Report to the Office of Telecommunications Policy. Washington, DC: U.S. Government Printing Office.

Gregor, Thomas. 1980. “Exposure and Seclusion: A Study of Institutionalized Isolation among the Mehinaku Indians of Brazil,” in Stanton Tefft, ed., Secrecy: A Cross‐Cultural Perspective. New York: Human Sciences Press.

Hagel, J., and J. F. Rayport. 1997. “The Coming Battle for Customer Information.” Harvard Business Review, vol. 75, no. 30.

Halperin, Morton H., Jerry J. Berman, Robert L. Borosage, and Christine M. Marwick. 1976. The Lawless State: The Crimes of U.S. Intelligence Agencies. New York: Penguin Books. (p.213)

Hendricks, Evan. 2005. Credit Scores and Credit Reports: How the System Really Works, What You Can Do. Second edition. Captain John, MD: Privacy Times, Inc.

Hentoff, Nat. 2003. The War on the Bill of Rights and the Gathering Resistance. New York: Seven Stories Press.

Hondius, Frits W. 1975. Emerging Data Protection in Europe. New York: Elsevier.

Hunter, Larry. 1985. “Public Image: Privacy in the Information Age.” Whole Earth Review, vol. 32.

Kahn, Alfred J. 1966. “The Tyranny of Small Decisions: Market Failures, Imperfections, and the Limits of Economics.” Kyklos, vol. 19, no 1.

Kang, Jerry. 1998. “Information Privacy in Cyberspace Transactions.” Stanford Law Review, vol. 50, no. 4, April.

Kerr, Orin S. 2003. “Internet Surveillance Law after the USA Patriot Act: The Big Brother That Isn't.” Northwestern University Law Review, vol. 97, no. 2.

Laudon, Kenneth. 1996. “Markets and Privacy.” Communications of the ACM, vol. 39, no. 9.

Lyon, David. 2001. Surveillance Society; Monitoring Everyday Life. Philadelphia: Open University Press.

Marx, Gary. 2005. “Soft Surveillance: Mandatory Voluntarism and the Collection of Personal Data.” Dissent, Fall.

Mayer, Jane. 2006. “The Hidden Power: A Secret Architect of the War on Terror.” The New Yorker, 3 July.

McCahill, Michael, and Clive Norris. 2002. CCTV in Britain. Working Paper No. 3, Center for Criminology and Criminal Justice, School of Comparative and Applied Social Sciences, University of Hull, Hull HU6 7RX.

Michael, James. 1994. Privacy and Human Rights: An International and Comparative Study, with Special Reference to Developments in Information Technology. Paris: UNESCO.

Miller, Margaret J., ed. 2003. Credit Reporting Systems and the International Economy. Cambridge, MA: MIT Press.

Nissenbaum, Helen. 1998. “Protecting Privacy in an Information Age: The Problem of Privacy in Public.” Law and Philosophy, vol. 17.

Noiriel, Gerard. 1996. The French Melting Pot: Immigration, Citizenship, and National Identity. Minneapolis: University of Minnesota Press.

Nouwt, Sjaak, Berend R. de Vries, and Corien Prins, eds. 2005. Reasonable Expectations of Privacy? Eleven Country Reports on Camera Surveillance and Workplace Privacy. The Hague: T.M.C. Asser Press.

O'Harrow, Robert, Jr. 2005. No Place to Hide. New York: Free Press.

Orwell, George. 1949. 1984. London: Penguin Books.

Packard, Vance. 1964. The Naked Society. New York: McKay. (p.214)

Phillips, David J. 2004. “Cell Phones, Surveillance and the State.” Dissent, Spring.

Posner, Richard. 1978. “An Economic Theory of Privacy.” Regulation, May/June.

Posner, Richard. 1978. “The Right of Privacy.” Georgia Law Review, vol. 12, no. 393.

Ratner, Sidney. 1980. Taxation and Democracy in America. New York: Octagon Books/Farrar, Straus and Giroux.

Regan, Priscilla. 1995. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina Press.

Roberts, Alasdair. 2006. Blacked Out: Government Secrecy in the Information Age. New York: Cambridge University Press.

Rosen, Jeffrey. 2004. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age. New York: Random House.

Rotenberg, Marc. 2005. The Privacy Law Sourcebook. Washington, DC: Electronic Privacy Information Center.

Rovere, Richard. 1958. “The Invasion of Privacy (1): Technology and the Claims of Community.” The American Scholar, vol. 27.

Rule, James B. 1973. Private Lives and Public Surveillance. London: Allen Lane.

———. 2004. “Toward Strong Privacy: Values, Markets, Mechanisms, and Institutions,” University of Toronto Law Journal, vol. 54.

Rule, James B., Doug McAdam, Linda Stearn, and David Uglow. 1980. The Politics of Privacy. New York: Elsevier.

Rule, James B., and Lawrence Hunter. 1999. “Toward Property Rights in Personal Data,” in Colin J. Bennett and Rebecca Grant, eds., Visions of Privacy: Policy Choices for the Digital Age. Toronto: University of Toronto Press.

Schwartz, Paul M., and Joel R. Reidenberg. 1996. Data Privacy Law: A Study of United States Data Protection. Charlottesville, VA: Michie.

Scott, James C. 1998. Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed. New Haven, CT: Yale University Press.

Seipp, David J. 1978. The Right to Privacy in American History. Cambridge, MA: Program on Information Resources Policy, Harvard University.

Smith, Robert Ellis. 1997. War Stories, Volume II: Accounts of Persons Victimized by Invasion of Privacy. Providence, RI: Privacy Journal.

Solove, Daniel J. The Digital Person: Technology and Privacy in the Information Age. 2004. New York: New York University Press.

Swire, Peter P. 2004. “The System of Foreign Intelligence Surveillance Law.” The George Washington Law Review, vol. 72, no. 6, April.

Swire, Peter P., and Robert E. Litan. 1998. None of Your Business: World Data Flows, Electronic Commerce, and the European Privacy Directive. Washington, DC: The Brookings Institution. (p.215)

Thomas, L. C., J. N. Crook, and D. B. Edelman, eds. 1992. Credit Scoring and Credit Control. Oxford: The Clarendon Press.

Thompson, Catherine, and Ian Kerr. N.D. “Tailgating on Spyways: Vanishing Anonymity on Electronic Toll Roads.”

Torpey, John. 2000. The Invention of the Passport: Surveillance, Citizenship and the State. Cambridge: Cambridge University Press.

U.S. Department of Health, Education and Welfare. 1954. Vital Statistics of the United States 1950, Volume I. Washington, DC: U.S. Government Printing Office.

———. 1973. Records, Computers and the Rights of Citizens; Report of the Secretary's Advisory Committee on Automated Personal Data Systems. Washington, DC: U.S. Government Printing Office.

U.S. Department of Justice, Federal Advisory Committee on False Identification. 1976. Reporton the Criminal Use of False Identification. Washington, DC: U.S. Government Printing Office.

U.S. Privacy Protection Study Commission. 1977. Personal Privacy in an Information Society: The Report of the Privacy Protection Study Commission. Washington, DC: U.S. Government Printing Office.

U.S. Senate. 1976. Intelligence Activities and the Rights of Americans; Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities, Book II. Washington, DC: U.S. Government Printing Office.

U.S. Senate, Committee on Government Operations, U.S. House of Representatives Committee on Government Operations and Subcommittee on Government Information and Individual Rights. 1976. Legislative History of the Privacy Act of 1974. Washington, DC: U.S. Government Printing Office.

Vitalis, Andre. 1988. Informatique, Pouvoir et Libertés. Paris: Economica.

Volokh, E. 2000. “Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About You,” Stanford Law Review, vol. 52.

Warren, Samuel, and Louis D. Brandeis. 1890. “The Right to Privacy,” Harvard Law Review, vol. 4.

Waters, Nigel. 2006. “Government Surveillance in Australia,” research report commissioned by James B. Rule.

Westin, Alan F. 1967. Privacy and Freedom. New York: Atheneum.

———. 1971. “Civil Liberties Issues in Public Databanks,” in Alan F. Westin, ed. Information Technology in a Democracy. Cambridge, MA: Harvard University Press.

Westin, Alan F., and Michael A. Baker. 1972. Databanks in a Free Society: Computers, Record‐Keeping, and Privacy; Report. New York: Quadrangle. (p.216)

Whitley, Edgar, research coordinator. 2005. The Identity Project: An Assessment of the UK Identity Card Bill and Its Implications. Interim Report. London: LSE Department of Information Systems.

Winner, Langdon. 1977. Autonomous Technology: Technics‐Out‐of‐Control as a Theme in Political Thought. Cambridge, MA: MIT Press.

Zamiatin, Eugene. 1924. We. New York: E. P. Dutton and Co.