Bibliography
Adams, John. 1965. Legal
papers of John Adams. 3 vols. Edited by L. Kinvin Wroth and Hiller B.
Zobel.
Alschuler, Albert W.
1996. Rediscovering
Blackstone.
Altman, Irwin. 1975. The
environment and social behavior : privacy, personal space, territory, crowding.
Altman, Irwin. 1977. Privacy regulation: culturally universal or culturally specific? Journal of social issues 33(3):66-84. Accessed online from LexisNexis.
Banks, William C.,
and M.E. Bowman. 2000. Executive authority for national security
surveillance.
Barnett, Helaine
and Janis Meresman Goldman. 1982. A lawyer’s lawyer, a judge’s judge: Justice
Potter Stewart and the Fourth Amendment.
Beniger, James
R. 1986.
The control revolution:
technological and economic origins of the information society.
Bentham, Jeremy.
1962. The works of Jeremy Bentham.
Bok, Sissela. 1982. Secrets:
on the ethics of concealment and revelation.
Boyer, Paul S. 1964. Borrowed rhetoric: the Massachusetts Excise Tax controversy of 1754. The William and Mary quarterly, 3rd ser. 21(3):328-351. Accessed online from JSTOR.
Breckenridge,
Adam Carlyle. 1970. The right to privacy.
Carney, Dan. 1996. Broad anti-terrorism measures stall in task force. Congressional quarterly weekly report 54(31):2201-2202. Accessed online from Academic Search Premier.
Carpenter,
Dale. 2002. Modern studies in privacy law: introduction:
keeping secrets.
Cate, Fred
H. 1997.
Privacy in the Information Age.
Chemerinsky, Erwin.
1987. Interpreting the
constitution.
Cinquegrana,
Americo R. 1989. The walls (and wires) have ears: the
background and first ten years of the Foreign Intelligence Surveillance Act of
1978.
Coke,
Edward. 1979. The fourth part of the Institutes of the laws
of
Coke,
Edward. 1979b. The second part of the institutes of the
lawes of
Colbridge, Thomas D. 2000. Electronic surveillance. FBI law enforcement bulletin 69(2):25-32. Accessed online from Academic Search Premier.
Cole, David. 2003. The new McCarthyism: repeating history in the war on terrorism. Harvard civil rights - civil liberties law review 38(1-30).
Cooley, Thomas
M. 1890.
A treatise on constitutional limitations which rest upon the
legislative power of the states of the American
Cuddihy, William, and B. Carmon Hardy. 1980. A man’s house was not his castle: origins of the Fourth Amendment to the United States Constitution. The William and Mary quarterly 37(3):371-400.
Dandeker,
Christopher. 1990. Surveillance,
power, and modernity: bureaucracy and discipline from 1700 to the present day.
Dean,
Mitchell. 1999. Governmentality:
power and rule in modern society.
Deflem, Mathieu. 1992. The invisibilities of social control: uncovering Gary Marx’s discovery of undercover. Crime, law and social change 18:177-192.
Dempsey, James X.
1997. Communications privacy in
the digital age: revitalizing the federal wiretap laws to enhance privacy.
Dempsey, James X., and David Cole. 1999. Terrorism & the constitution: sacrificing civil liberties in the name of national security.
Derlega, Valerian J., and Alan L. Chaikin. 1977. Privacy and self-disclosure in social relationships. Journal of social issues 33(3):102-115.
DeVries, Will
Thomas. 2003. Annual review of law and technology: III.
Cyber law: A. Privacy: Protecting privacy in the digital age.
Dickerson, O.M.
1939. Writs of assistance as a cause of
the revolution. In The era of the American revolution, edited by Richard B. Morris,
40-75.
Dworkin, R.M. (ed.).
1977. The philosophy of law.
Elliot, Jonathan
(ed.). 1941. The debates in the several
state conventions, on the adoption of the federal Constitution, as recommended
by the general convention at Philadelphia, in 1787: together with the Journal
of the federal convention, Luther Martin's letter, Yates minutes, Congressional
opinions, Virginia and Kentucky resolutions of '98-'99, and other illustrations
of the Constitution / collected and rev. from contemporary publications, by
Jonathan Elliot ; published under the sanction of Congress. 5 vols. in 2 books.
Farber, Daniel A.
1998. The First Amendment.
Farmer, Dan and Charles C. Mann. 2003. Part one surveillance nation. Technology review 106(3):34-42. Accessed online from Academic Search Premier.
Fisher, Louis,
and Neal Devins. 2001. Political dynamics of constitutional law.
Foucault,
Michel. 1995. Discipline
and punish: the birth of the prison.
Friedman,
Dan. 2002. Tracing the Lineage: Textual and Conceptual
Similarities in the
Fryde,
Natalie. 2001. Why
Magna Carta? Angevin
Gandy, Oscar H., Jr. 2003. Public opinion surveys and the formation of privacy policy. Journal of social issues 59(2):283-299.
Gee, James Paul.
1999. An introduction to discourse analysis: theory and method.
Giddens,
Anthony. 1987. The
nation-state and violence: volume two of a contemporary critique of historical
materialism.
Gordon, Diana R. 1986/87. The electric Panopticon: a case study of the development of the National Criminal Records System. Politics & society 15(4):453-482.
Gormley,
Ken. 1992. One hundred years of privacy.
Graham, Stephen, and David Wood. 2003. Digitizing surveillance: categorization, space, inequality. Critical social policy 23(2):227-248)
Gray-Lukkarila,
Pamela J. 1997. The right to privacy: constitutional and
theoretical foundations. PhD diss., The
Guirguis, Maged
F. 2001. Privacy in the dawn of a new age: a study of
the legal and moral limits of high-tech government surveillance. PhD diss.,
Harris, R.P. and
T.R. Moran. 1996. Managing
cultural differences: leadership strategies for a new world of business, 4th
ed.
Hart, H.L.A. 1977. “Positivism
and the separation of law and morals.” In
The philosophy of law, edited by R.M.
Dworkin, 17-37.
Henkin, Louis.
1974. Privacy and autonomy.
Holdsworth, W.S.
1923. A history of English law, Volumes I-IV.
Holt, J.C. 1992. Magna
Carta.
Horwitz, Morton
J. 1992.
The transformation of American law
1870-1960: the crisis of legal orthodoxy.
Hulsebosch, Daniel J. 2003. The ancient constitution and the expanding empire: Sir Edward Coke’s British jurisprudence. Accessed online from LexisNexis.
Hume, L.J. 1981. Bentham
and bureaucracy.
Innes, Julie C.
1992. Privacy, intimacy, and isolation.
Jefferson, Thomas
and James Madison. 1995. The
republic of letters: the correspondence between Thomas Jefferson and James
Madison 1776-1826. 3 vols. Ed. James
Morton Smith.
Julie, Richard. 2000. High-tech surveillance tools and the Fourth Amendment: reasonable expectations of privacy in the technological age. American criminal law review 37:127. Accessed online from LexisNexis.
Jones, Harry
W. 1975.
Our uncommon common law.
Keränen, Lisa. 2001. The Hippocratic Oath as epideictic rhetoric: reanimating medicine’s past for its future. Journal of medical humanities 22(1):55-68.
Klopfer, Peter H., and Daniel I. Rubenstein. 1977. The concept privacy and its biological basis. Journal of social issues 33(3):52-65.
Lamm, Norman. 1972. “The right of privacy.” In Judaism
and human rights, edited by Milton R. Konvitz, 225-233.
Landever, Arthur Robert.
1969. Electronic surveillance and
the American constitutional system. PhD
Diss.,
Lasson, Nelson
B. 1937.
The history and development of the Fourth Amendment to the
Laufer, Robert S., and Maxine Wolfe. 1977. Privacy as a concept and a social issue: a multidimensional developmental theory. Journal of social issues 33(3):22-42.
Levin, Hannah A. 1977. Privacy in the courts: law and social reality. Journal of social issues 33(3):138-153.
Levy, Leonard W. 1999a.
Origins of the Bill of Rights.
———. 1999b. Origins of the Fourth Amendment. Political science quarterly. 114(1):79- . Accessed online from EBSCO Host.
Lieber,
Francis. 1859. On civil liberty and self government.
Locke, John. 1947. John Locke on politics and education.
Lyon, David. 1992. The new surveillance: electronic technologies and the maximum security society. Crime. law and social change 18:159-175.
———. 1993. An electronic panopticon? A sociological critique of surveillance theory. The sociological review 41(4):653-678.
———. 1994. The electronic eye: the rise of surveillance society. Minneapolis: University of Minnesota Press.
———. 2001. Surveillance society: monitoring everyday life. Buckingham: Open University Press.
Lyon, David, and Elia Zureik (eds.). 1996. Computers, surveillance, and privacy. Minneapolis: University of Minnesota Press.
Macey, David. 1995. The lives of Michel Foucault. New York: Vintage Books.
Magna Carta. 1215. http://www.bl.uk/collections/treasures/magnatranslation.html.
Manning, D.J. 1968. The mind of Jeremy Bentham. London: Longmans, Green and Co.
Margulis, Stephen T. 1977. Conceptions of privacy: current status and next steps. Journal of social issues 33(3):5-21.
_____. 2003a. Privacy as a social issue and behavioral concept. Journal of social issues 59(2):243-261.
_____. 2003b. On the status and contribution of Westin's and Altman's theories of privacy. Journal of social issues 59(2):411-429.
Marshall, Catherine. 1984. Elites, bureaucrats, ostriches, and pussycats: managing research in policy settings. Anthropology & education quarterly 15(3):235-251.
Marshall, Catherine, and Gretchen B. Rossman. 1995. Designing qualitative research (2nd ed.). Thousand Oaks, California: Sage Publications.
Marx, Gary T. 1988. Undercover: police surveillance in America. Berkeley: University of California Press.
_____. 1992. Some reflections on Undercover: recent developments and enduring issues. Crime, law and social change 18:193-217.
McCracken, Grant. 1988. The long interview. Newbury Park: Sage Publications.
McGrath, John Edward. 1999. After privacy: surveillance culture and performative space. PhD diss., New York University.
McWhirter, Darien A. 1992. Privacy as a constitutional right: sex, drugs, and the right to life. New York: Quorum Books.
Mill, John Stuart. 1946. On liberty and considerations on representative government. Oxford: Basil Blackwell.
Neill, Elizabeth. 1977. Rites of privacy and the privacy trade: on the limits of protection for the Sacred Self. PhD diss., University of Western Ontario.
Michael, Donald N. 1964. Speculations on the relation of the computer to individual freedom and the right to privacy. George Washington law review 33:270-286.
Murphy, Paul L. 1979. World War I and the origin of civil liberties in the United States.
Nabbali, Talith, and Mark Perry. 2003. Going for the throat: Carnivore in an Echelon world—Part I. Computer law & security report 19(6):456-467.
Nehf, James P. 2003. Recognizing the societal value in information privacy. Washington law review 78:1. Accessed online from LexisNexis.
Newell, Patricia Brierley. 1994. A systems model of privacy. Journal of environmental psychology 14:65-68.
_____. 1995. Perspectives on privacy. Journal of environmental psychology 15:87-104.
Ogborn, Miles. 1993. Ordering the city: surveillance, public space and the reform of urban policing in England, 1835-56. Political geography 12(6):505-521.
Otis, James. 1929. The rights of the British Colonies asserted and proved. A pamphlet originally published in 1764, reprinted in The University of Missouri studies: a quarterly of research IV(3):303-357.
Palmer, Elizabeth A. 2000. Bill to protect electronic privacy sparks panel debate on the scope of surveillance conducted by police. Congressional quarterly weekly report 58(37):2215. Accessed online from Academic Search Premier.
Paper, Lewis J. 1983. Brandeis. Englewood Cliffs, New Jersey: Prentice-Hall.
Patton, Michael Quinn. 1990. Qualitative evaluation and research methods. 2nd ed. Newbury Park: Sage Publications.
Pedersen, Darhl M. 1999. Model for types of privacy by privacy functions. Journal of environmental psychology 19:397-405.
Petronio, Sandra. 2002. Boundaries of privacy: dialectics of disclosure. Albany, New York: State University of New York Press.
Pound, Roscoe. 1938. The formative era of American law. Gloucester, Mass.: Peter Smith.
Purcell, Edward A., Jr. 2000. Brandeis and the Progressive Constitution: Erie, the judicial power, and the politics of the federal courts in twentieth-century America. New Haven: Yale University Press.
Richardson, M.E.J. 2000. Hammurabi’s laws. Sheffield, England: Sheffield Academic Press.
Rotenberg, Marc. 2002. Modern studies in privacy law: foreword: privacy and secrecy after September 11. Minnesota law review 86:115. Accessed online from LexisNexis.
Rule, James B. 1973. Private lives and public surveillance. London: Allen Lane.
Schuster, Joseph Frederick. 1965. Electronic eavesdropping and the Fourth Amendment. PhD diss., The Pennsylvania State University.
Scoglio, Stefano. 1993. Privacy, rights and natural law: toward a transpersonal/ecological political theory. PhD diss., University of Toronto.
Sehgal, Cassidy. 1999. The power of the federal government in the electronic age. Texas review of law & politics 4:77-83. Accessed online from LexisNexis.
Self, William Ray. 1977. A comparative analysis of privacy paradigms: the range of legal and social science conceptualizations. PhD diss., University of Alabama.
Shumway, David R. 1989. Michel Foucault. Boston: Twayne Publishers.
Simmons, R. 2002. From Katz to Kyllo: a blueprint for adapting the fourth amendment to twenty-first century technologies. Hastings law journal 53(6):1303+ (August 2002)
Solove, Daniel J. 2002. Conceptualizing privacy. California law review 90:1087 -. [accessed online through LexisNexis 8/7/2003]
Stephen, James Fitzjames. 1964. A history of the criminal law of England. 3 vols. New York: B. Franklin.
Stolz, Barbara Ann. 2002. The Foreign Intelligence Surveillance Act of 1978: the role of symbolic politics. Law & policy 24(3):269-298.
Story, Joseph. 1833. Commentaries on the constitution of the United States. (Boston: Hilliard).
Tal, Yuval. 1997. “Privacy and social norms: social control by reputational costs.” J.D. diss., University of Chicago.
Tehranian, Majid. 1999. Global communication and world politics: domination, development, and discourse. Boulder: Lynne Rienner Publishers.
Thomas, Douglas and Brian D. Loader. 2000. Cybercrime: law enforcement, security and surveillance in the information age. New York: Routledge.
Tribe, Laurence. 2000. American Constitutional law: volume one (3rd ed.). New York: Foundation Press.
Tripp, David H. 1983. Co-authorship and negotiation: the interview as act of creation. Interchange 14(3):32-45.
United States. Congress. Senate. Committee on the Judiciary. 2000. The “Carnivore” controversy: electronic surveillance and privacy in the ??? Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, September 6, 2000.
United States. Continental Congress. 1774-1789. Journals of the Continental Congress 1774-1789. (Accessed online at http://thomas.loc.gov, March 20, 2004.)
Vogele, Katherine. 2002. Thirty-first annual review of criminal procedure: I. Investigation and police practices: electronic surveillance. Georgetown law journal 90:1209-1232. Accessed online from LexisNexis.
Warren, Carol and Barbara Laslett. 1977. Privacy and secrecy: a conceptual comparison. Journal of social issues 33(3):43-51.
Warren, Samuel, and Louis D. Brandeis. 1890. The right to privacy. Harvard law review. 4:193- .
Westin, Alan F. 1952. The wire-tapping problem: an analysis and a legislative proposal. Columbia law review 52(2):165-208.
Westin, Alan F. 1970. Privacy and freedom. London: Bodley Head.
Westin, Alan. F. 2003. Social and political dimensions of privacy. Journal of social issues 59(2):431.
Wetlaufer, Gerald.
1999. Systems of belief in modern
American law: a view from century’s end.
Wood, Gordon S. 1969. The
creation of the American republic 1776-1787.
Wright, Benjamin Fletcher, Jr.
1931. American interpretations of natural law: a study in the history of
political thought.
Yamashita, Miyo. 1998. Electronic
surveillance and the prospects for privacy in
Yin, Robert K.
1994. Case study research: design and methods (2nd ed.).
Zuboff,
Shoshana. 1988. In the
age of the smart machine : the future of work and power.