Bibliography

 

 

Adams, John.  1965.  Legal papers of John Adams.  3 vols.  Edited by L. Kinvin Wroth and Hiller B. Zobel.  Cambridge, Massachusetts: The Belknap Press of Harvard University Press.

 

Alschuler, Albert W.  1996.  Rediscovering Blackstone.  University of Pennsylvania Law Review 145:1-55.  Accessed online from LexisNexis.

 

Altman, Irwin. 1975.  The environment and social behavior : privacy, personal space, territory, crowding.  Monterey, California: Brooks/Cole Pub. Co.

 

Altman, Irwin.  1977.  Privacy regulation: culturally universal or culturally specific?  Journal of social issues 33(3):66-84.  Accessed online from LexisNexis.

 

Banks, William C., and M.E. Bowman.  2000.  Executive authority for national security surveillance.  American University law review 50(1).  Accessed online from LexisNexis.

 

Barnett, Helaine and Janis Meresman Goldman.  1982.  A lawyer’s lawyer, a judge’s judge: Justice Potter Stewart and the Fourth Amendment.  University of Cincinnati law review 51:509-544. 

 

Beniger, James R.  1986.  The control revolution: technological and economic origins of the information society.  Cambridge, Massachusetts: Harvard University Press.

 

Bentham, Jeremy.  1962.  The works of Jeremy Bentham.  New York: Russell & Russell.

 

Bok, Sissela. 1982.  Secrets: on the ethics of concealment and revelation.  New York : Pantheon Books.

 

Boyer, Paul S.  1964.  Borrowed rhetoric: the Massachusetts Excise Tax controversy of 1754.  The William and Mary quarterly, 3rd ser. 21(3):328-351.  Accessed online from JSTOR.

 

Breckenridge, Adam Carlyle.  1970.  The right to privacy.  Lincoln: University of Nebraska Press.

 

Carney, Dan.  1996.  Broad anti-terrorism measures stall in task force.  Congressional quarterly weekly report 54(31):2201-2202.  Accessed online from Academic Search Premier.

 

Carpenter, Dale.  2002.  Modern studies in privacy law: introduction: keeping secrets.  Minnesota law review 86:1097.  Accessed online from LexisNexis.

 

Cate, Fred H.  1997.  Privacy in the Information Age.  Washington, D.C.: Brookings Institution Press.

 

Chemerinsky, Erwin.  1987.  Interpreting the constitution.  New York: Praeger.

 

Cinquegrana, Americo R.  1989.  The walls (and wires) have ears: the background and first ten years of the Foreign Intelligence Surveillance Act of 1978.  University of PennsylvanialLaw review 137:793-.

 

Coke, Edward.  1979.  The fourth part of the Institutes of the laws of England.  New York : Garland Publishing.  (Reprint of 1644 ed.)

 

Coke, Edward.  1979b.  The second part of the institutes of the lawes of England.  New York : Garland Publishing.  (Reprint of 1642 ed.)

 

Colbridge, Thomas D.  2000.  Electronic surveillance.  FBI law enforcement bulletin 69(2):25-32.  Accessed online from Academic Search Premier.

 

Cole, David.  2003.  The new McCarthyism: repeating history in the war on terrorism.  Harvard civil rights - civil liberties law review 38(1-30).

 

Cooley, Thomas M.  1890.  A treatise on constitutional limitations which rest upon the legislative power of the states of the American Union.  6th ed.  Boston: Little, Brown, and Co.

 

Cuddihy, William, and B. Carmon Hardy.  1980.  A man’s house was not his castle: origins of the Fourth Amendment to the United States Constitution.  The William and Mary quarterly 37(3):371-400.

 

Dandeker, Christopher.  1990.  Surveillance, power, and modernity: bureaucracy and discipline from 1700 to the present day.  Cambridge, England: Polity Press.

 

Dean, Mitchell.  1999.  Governmentality: power and rule in modern society.  London: Sage Publications.

 

Deflem, Mathieu.  1992.  The invisibilities of social control: uncovering Gary Marx’s discovery of undercover.  Crime, law and social change 18:177-192.

 

Dempsey, James X.  1997.  Communications privacy in the digital age: revitalizing the federal wiretap laws to enhance privacy.  Albany law journal of science & technology 8:65-   .  Accessed online from LexisNexis.


 

Dempsey, James X., and David Cole.  1999.  Terrorism & the constitution: sacrificing civil liberties in the name of national security.

 

Derlega, Valerian J.,  and Alan L. Chaikin.  1977.  Privacy and self-disclosure in social relationships.  Journal of social issues 33(3):102-115.

 

DeVries, Will Thomas.  2003.  Annual review of law and technology: III. Cyber law: A. Privacy: Protecting privacy in the digital age.  Berkeley technology law journal 18:283-311.

 

Dickerson, O.M. 1939.  Writs of assistance as a cause of the revolution.  In The era of the American revolution, edited by Richard B. Morris, 40-75.  New York: Harper & Row.

 

Dworkin, R.M. (ed.).  1977.  The philosophy of law.  London: Oxford University Press.

 

Elliot, Jonathan (ed.). 1941. The debates in the several state conventions, on the adoption of the federal Constitution, as recommended by the general convention at Philadelphia, in 1787: together with the Journal of the federal convention, Luther Martin's letter, Yates minutes, Congressional opinions, Virginia and Kentucky resolutions of '98-'99, and other illustrations of the Constitution / collected and rev. from contemporary publications, by Jonathan Elliot ; published under the sanction of Congress.  5 vols. in 2 books.  Philadelphia : J.B. Lippincott Company.

 

Farber, Daniel A.  1998.  The First Amendment.  New York: Foundation Press.

 

Farmer, Dan and Charles C. Mann.  2003.  Part one surveillance nation.  Technology review 106(3):34-42.  Accessed online from Academic Search Premier.

 

Fisher, Louis, and Neal Devins.  2001.  Political dynamics of constitutional law.  St. Paul, Minn.: West Group.

 

Foucault, Michel.  1995.  Discipline and punish: the birth of the prison.  New York: Vintage Books.

 

Friedman, Dan.  2002.  Tracing the Lineage: Textual and Conceptual Similarities in the Revolutionary-Era State Declarations of Rights of Virginia, Maryland, and Delaware.  Rutgers law journal 33:929-1027).  Accessed online from LexisNexis.

Fryde, Natalie.  2001.  Why Magna Carta? Angevin England revisited.  Münster: Lit.

 

Gandy, Oscar H., Jr.  2003.  Public opinion surveys and the formation of privacy policy.  Journal of social issues 59(2):283-299.

 

Gee, James Paul.  1999.  An introduction to discourse analysis: theory and method.  London: Routledge.

 

Giddens, Anthony.  1987.  The nation-state and violence: volume two of a contemporary critique of historical materialism.  Berkeley: University of California Press.

 

Gordon, Diana R.  1986/87.  The electric Panopticon: a case study of the development of the National Criminal Records System.  Politics & society 15(4):453-482.

 

Gormley, Ken.  1992.  One hundred years of privacy.  Wisconsin law review Sept/Oct 1992:1335-1441.  Accessed online from LexisNexis.

 

Graham, Stephen, and David Wood.  2003.  Digitizing surveillance: categorization, space, inequality.  Critical social policy 23(2):227-248)

 

Gray-Lukkarila, Pamela J.  1997.  The right to privacy: constitutional and theoretical foundations.  PhD diss., The Claremont Graduate School.

 

Guirguis, Maged F.  2001.   Privacy in the dawn of a new age: a study of the legal and moral limits of high-tech government surveillance.  PhD diss., Auburn University.

 

Harris, R.P. and T.R. Moran.  1996.  Managing cultural differences: leadership strategies for a new world of business, 4th ed.  Houston: Gulf Publishing Co.

 

Hart, H.L.A.  1977.  “Positivism and the separation of law and morals.”  In The philosophy of law, edited by R.M. Dworkin, 17-37. London: Oxford University Press.

 

Henkin, Louis.  1974.  Privacy and autonomy.  Columbia law review 74:1410...   

 

Hill, Helen.  1966.  George Mason: constitutionalist.  Gloucester, Massachusetts: Peter Smith.

 

Holdsworth, W.S.  1923.  A history of English law, Volumes I-IV.  London : Methuen.

 

Holt, J.C.  1992.  Magna Carta.  Cambridge: Cambridge University Press.

 

Horwitz, Morton J.  1992.  The transformation of American law 1870-1960: the crisis of legal orthodoxy.  New York: Oxford University Press.

 

Hulsebosch, Daniel J.  2003.  The ancient constitution and the expanding empire: Sir Edward Coke’s British jurisprudence.  Accessed online from LexisNexis.

 

Hume, L.J.  1981.  Bentham and bureaucracy.  Cambridge: Cambridge University Press.

 

Innes, Julie C.  1992.  Privacy, intimacy, and isolation.  New York: Oxford University Press.

 

Jefferson, Thomas and James Madison.  1995.  The republic of letters: the correspondence between Thomas Jefferson and James Madison 1776-1826.  3 vols. Ed. James Morton Smith.  New York: W.W. Norton.

 

Julie, Richard.  2000.  High-tech surveillance tools and the Fourth Amendment: reasonable expectations of privacy in the technological age.  American criminal law review 37:127.  Accessed online from LexisNexis.

 

Jones, Harry W.  1975.  Our uncommon common law.  Tennessee Law Review 42:443-463.  Accessed online from LexisNexis.

 

Keränen, Lisa.  2001.  The Hippocratic Oath as epideictic rhetoric: reanimating medicine’s past for its future.  Journal of medical humanities 22(1):55-68.

 

Klopfer, Peter H.,  and Daniel I. Rubenstein.  1977.  The concept privacy and its biological basis.  Journal of social issues 33(3):52-65.

 

Lamm, Norman.  1972.  “The right of privacy.”  In Judaism and human rights, edited by Milton R. Konvitz, 225-233.  New York: W.W. Norton.

 

Landever, Arthur Robert.  1969.  Electronic surveillance and the American constitutional system.   PhD Diss., New York University. 

 

Lasson, Nelson B.  1937.  The history and development of the Fourth Amendment to the United States Constitution.  Baltimore: Johns Hopkins Press.

 

Laufer, Robert S., and Maxine Wolfe.  1977.  Privacy as a concept and a social issue: a multidimensional developmental theory.  Journal of social issues 33(3):22-42.

 

Levin, Hannah A.  1977.  Privacy in the courts: law and social reality.  Journal of social issues 33(3):138-153.


 

Levy, Leonard W.  1999a. Origins of the Bill of Rights.  New Haven: Yale University Press.

 

———.  1999b.  Origins of the Fourth Amendment.  Political science quarterly.  114(1):79-   .  Accessed online from EBSCO Host.

 

Lieber, Francis.  1859.  On civil liberty and self government. Philadelphia: J.B. Lippincott.

 

Locke, John.  1947.  John Locke on politics and education.  Roslyn, N.Y.: Walter J. Black. 

 

Lyon, David.  1992.  The new surveillance: electronic technologies and the maximum security society.  Crime. law and social change 18:159-175.

 

———.  1993.  An electronic panopticon?  A sociological critique of surveillance theory.  The sociological review 41(4):653-678.

 

———.  1994.  The electronic eye: the rise of surveillance society.  Minneapolis: University of Minnesota Press.

 

———.  2001.  Surveillance society: monitoring everyday life.  Buckingham: Open University Press.

 

Lyon, David, and Elia Zureik (eds.).  1996.  Computers, surveillance, and privacy.  Minneapolis: University of Minnesota Press.

 

Macey, David.  1995.  The lives of Michel Foucault.  New York: Vintage Books.

 

Magna Carta.  1215.  http://www.bl.uk/collections/treasures/magnatranslation.html.

 

Manning, D.J.  1968.  The mind of Jeremy Bentham.  London: Longmans, Green and Co.

 

Margulis, Stephen T.   1977.  Conceptions of privacy: current status and next steps.  Journal of social issues 33(3):5-21.

 

_____.  2003a.  Privacy as a social issue and behavioral concept.  Journal of social issues 59(2):243-261.

 

_____.  2003b.  On the status and contribution of Westin's and Altman's theories of privacy.  Journal of social issues 59(2):411-429.

 

Marshall, Catherine.  1984.  Elites, bureaucrats, ostriches, and pussycats: managing research in policy settings.  Anthropology & education quarterly 15(3):235-251.

 

Marshall, Catherine, and Gretchen B. Rossman.  1995.  Designing qualitative research (2nd ed.).  Thousand Oaks, California: Sage Publications.

 

Marx, Gary T.  1988.  Undercover: police surveillance in America.  Berkeley: University of California Press.

 

_____.  1992.  Some reflections on Undercover: recent developments and enduring issues.  Crime, law and social change 18:193-217.

 

McCracken, Grant. 1988. The long interview.  Newbury Park: Sage Publications.

 

McGrath, John Edward.  1999.  After privacy: surveillance culture and performative space.  PhD diss., New York University.

 

McWhirter, Darien A. 1992.  Privacy as a constitutional right: sex, drugs, and the right to life.  New York: Quorum Books.

 

Mill, John Stuart.  1946.  On liberty and considerations on representative government.  Oxford: Basil Blackwell.

 

Neill, Elizabeth.  1977.  Rites of privacy and the privacy trade: on the limits of protection for the Sacred Self.  PhD diss., University of Western Ontario.

 

Michael, Donald N. 1964.  Speculations on the relation of the computer to individual freedom and the right to privacy.  George Washington law review 33:270-286. 

 

Murphy, Paul L.  1979.  World War I and the origin of civil liberties in the United States.    

 

Nabbali, Talith, and Mark Perry.  2003.  Going for the throat: Carnivore in an Echelon world—Part I.  Computer law & security report 19(6):456-467.

 

Nehf, James P.  2003.  Recognizing the societal value in information privacy.  Washington law review 78:1.  Accessed online from LexisNexis.

 

Newell, Patricia Brierley.  1994.  A systems model of privacy.  Journal of environmental psychology 14:65-68.

 

_____.  1995.  Perspectives on privacy.  Journal of environmental psychology 15:87-104.

 

Ogborn, Miles.  1993.  Ordering the city: surveillance, public space and the reform of urban policing in England, 1835-56.  Political geography 12(6):505-521.

 

Otis, James.  1929.  The rights of the British Colonies asserted and proved.  A pamphlet originally published in 1764, reprinted in The University of Missouri studies: a quarterly of research IV(3):303-357.

 


Palmer, Elizabeth A.  2000.  Bill to protect electronic privacy sparks panel debate on the scope of surveillance conducted by police.  Congressional quarterly weekly report 58(37):2215.  Accessed online from Academic Search Premier.

 

Paper, Lewis J.  1983.  Brandeis.  Englewood Cliffs, New Jersey: Prentice-Hall.

 

Patton, Michael Quinn.  1990.  Qualitative evaluation and research methods.  2nd ed.  Newbury Park: Sage Publications.

 

Pedersen, Darhl M.  1999.  Model for types of privacy by privacy functions.  Journal of environmental psychology 19:397-405.

 

Petronio, Sandra.  2002.  Boundaries of privacy: dialectics of disclosure.  Albany, New York: State University of New York Press.

 

Pound, Roscoe.  1938.  The formative era of American law.  Gloucester, Mass.: Peter Smith.

 

Purcell, Edward A., Jr.  2000.  Brandeis and the Progressive Constitution: Erie, the judicial power, and the politics of the federal courts in twentieth-century America.  New Haven: Yale University Press.

 

Richardson, M.E.J.  2000.  Hammurabi’s laws.  Sheffield, England: Sheffield Academic Press.

 

Rotenberg, Marc.  2002.  Modern studies in privacy law: foreword: privacy and secrecy after September 11.  Minnesota law review 86:115.  Accessed online from LexisNexis.

 

Rule, James B.  1973.  Private lives and public surveillance.  London: Allen Lane.

 

Schuster, Joseph Frederick.  1965.  Electronic eavesdropping and the Fourth Amendment.  PhD diss., The Pennsylvania State University.

 

Scoglio, Stefano.  1993.  Privacy, rights and natural law: toward a transpersonal/ecological political theory.  PhD diss., University of Toronto.

 

Sehgal, Cassidy.  1999.  The power of the federal government in the electronic age.  Texas review of law & politics 4:77-83.  Accessed online from LexisNexis.

 

Self, William Ray.  1977.  A comparative analysis of privacy paradigms: the range of legal and social science conceptualizations.  PhD diss., University of Alabama.

 

Shumway, David R.  1989.  Michel Foucault.  Boston: Twayne Publishers.

 

Simmons, R.  2002.  From Katz to Kyllo: a blueprint for adapting the fourth amendment to twenty-first century technologies.  Hastings law journal 53(6):1303+ (August 2002)

 

Solove, Daniel J.  2002.  Conceptualizing privacy.  California law review 90:1087   -.  [accessed online through LexisNexis 8/7/2003]

 

Stephen, James Fitzjames.  1964.  A history of the criminal law of England.  3 vols. New York: B. Franklin.

 

Stolz, Barbara Ann.  2002.  The Foreign Intelligence Surveillance Act of 1978: the role of symbolic politics.  Law & policy 24(3):269-298.

 

Story, Joseph.  1833.  Commentaries on the constitution of the United States.   (Boston: Hilliard).

 

Tal, Yuval.  1997.  “Privacy and social norms: social control by reputational costs.”  J.D. diss., University of Chicago.

 

Tehranian, Majid.  1999.  Global communication and world politics: domination, development, and discourse.  Boulder: Lynne Rienner Publishers.

 

Thomas, Douglas and Brian D. Loader.  2000.  Cybercrime: law enforcement, security and surveillance in the information age.  New York: Routledge.

 

Tribe, Laurence.  2000.  American Constitutional law: volume one (3rd ed.).  New York: Foundation Press.

 

Tripp, David H.  1983.  Co-authorship and negotiation: the interview as act of creation.  Interchange 14(3):32-45.

 

United States. Congress. Senate. Committee on the Judiciary.  2000.  The “Carnivore” controversy: electronic surveillance and privacy in the ??? Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, September 6, 2000.

 

United States.  Continental Congress.  1774-1789.  Journals of the Continental Congress 1774-1789.  (Accessed online at http://thomas.loc.gov, March 20, 2004.)

 

Vogele, Katherine.  2002.  Thirty-first annual review of criminal procedure: I. Investigation and police practices: electronic surveillance.  Georgetown law journal 90:1209-1232.  Accessed online from LexisNexis.

 

Warren, Carol and Barbara Laslett.  1977.  Privacy and secrecy: a conceptual comparison.  Journal of social issues 33(3):43-51.

 

Warren, Samuel, and Louis D. Brandeis.  1890.  The right to privacy. Harvard law review. 4:193- .

 

Westin, Alan F.  1952.  The wire-tapping problem: an analysis and a legislative proposal.  Columbia law review 52(2):165-208.

 

Westin, Alan F.  1970.  Privacy and freedom.  London: Bodley Head.

 


Westin, Alan. F.  2003.  Social and political dimensions of privacy.  Journal of social issues 59(2):431.

 

Wetlaufer, Gerald.  1999.  Systems of belief in modern American law: a view from century’s end.  American University law review 49:1-80.  Accessed online from LexisNexis.

 

Wood, Gordon S.  1969.  The creation of the American republic 1776-1787.  Chapel Hill, North Carolina: University of North Carolina Press.

 

Wright, Benjamin Fletcher, Jr.  1931.  American interpretations of natural law: a study in the history of political thought.  Cambridge: Harvard University Press.

Yamashita, Miyo.  1998.  Electronic surveillance and the prospects for privacy in Canada’s private sector by the year 2000.  PhD diss., McGill University.

 

Yin, Robert K.  1994.  Case study research: design and methods (2nd ed.).  Thousand Oaks, California: Sage Publications.

 

Zuboff, Shoshana.  1988.  In the age of the smart machine : the future of work and power.
New York : Basic Books.