Information Technology Privacy & Security

Index:

Bibliography Email Terrorism Information Warfare Ethics Democracy Big Brother Copyright Workplace Cybersex Child Online Protection Act of 1998 Childcare & Daycare Monitoring Voting Elections Web Cams School Monitoring Record Linkage Internal Revenue Service Intelligent Highway Sweden France Germany Canada Interactive Cable Operating Systems First Amendment Fourth Amendment Beepers Electronic Communications Privacy Act of 1986 Australia Cell Phones Clipper Chip Lotus Marketplace Piracy Welfare Social Work Electronic Funds Transfer Patents Sabotage Transborder Data Flow Freedom of Information Act Biometrics Passwords Trusted Systems Caller ID Law Enforcement Criminal Information Systems

1 Privacy Protection Act of 1980 Computer Matching and Privacy Protection Act of 1988 Cryptography Access Control Encryption Privacy Act of 1974 Privacy Act of 1988 Right to Financial Privacy Act of 1978 Privacy Acts in Canadian Provinces National Crime Information Center Omnibus Crime Control and Safe Streets Act of 1968 Criminal History Information Systems Crime Internet Worm Hacking Computer Abuse Patient Privacy Medical Backup Legal Expert Systems Crypto Network Security Embezzlement Libel Computer Matching Gender Automatic Face Recognition Digital Cash Counterfeiting U.S. Census Employee Privacy Identity and Self ADAPSO Privacy, Security, and Banking Electronic Monitoring Virtual Jails Credit Bureaus Credit Cards Fair Credit Reporting Act Association of Computer Programmers and Analysts New Zealand RUSH Time-Sharing System Computers and Business Equipment Manufacturers Association Fraud Electronic Data Processing Security and Data Protection Management Direct Mail Mental Health Warren and Brandeis Puerto Rico Supreme Court Griswold Privacy and Pharmaceutical Research

2 Collaboration Global (International) Policy and Standards Echelon Health Care and Records Federal Bureau of Investigation Nursing Research and Confidentiality Foreign Intelligence Surveillance Act National Security Satellites CCTV Passports Airport Security Privacy and Community Surveillance, Society, and Privacy Videotex Auditing Human Rights Council of Europe OECD European Union Japan Norway Secrecy United Kingdom Freedom & Freedom of Information Data Protection Social Security Taxes IT Privacy and Government, General Public-Key IT Privacy & Federal Government IT Privacy & State Government IT Privacy & Local Government Authentication Insurance National Data Bank/National Data Center U.S. Army Privacy Protection Study Commission Telecommunications SDI Intelligence Artificial Intelligence Smart Cards Battlefield Drug Abuse Money Laundering National Defense Finland Privacy Legislation, General Politics Electronic Civil Disobedience Panopticon

3 Digital Formats Military Bandits Telegraph Right to Be Let Alone Unintended Consequences Eavesdropping Wiretapping Viruses Juveniles Ultra Enigma Transaction DARPA Roe v. Wade Anti-War Protestors Misuse Library Records Confidentiality Genetic Attitudes Marketing Cyberattack Free Speech Virtual Society Dossier Countermeasures Keys Utility Stalking Anonymity People Human Nature & Values Alienation Police Engineer Word Processing Soul Distributed Systems Responsibility Cipher Cyberspace Individual Rights Risk Pen Registers Dating Gang Databases Personal Data Liberty Autonomy Strategic Name

4 Weapon Navy Unix Trojan Horses PGP Strangers Privacy, Business & Corporations Vehicles Computer Science & Computer Scientists Remote Sensing ID Revolution Bug Bugging Criminal Soviet Privacy and Internet Commerce Snooping Code Cyberculture Information Theory Cameras Electronic Bracelets Vulnerable Alarms Information Highway & Superhighway Multics Magnets Ownership Chaos Bulletin Boards, BBS & Internet Forums Integrity Social Problems Social Science Psychology Panic Room Image Frank Cullen Snatching Errors Secrets Bar Codes Privacy Cost Electronic Journalism Computerized City Chat Willis Ware Wireless Operation Exodus Cookies Netscape Homeland Security National Registration

5 Profession Mortgage Software GIS, Geographical Information Systems, Clustering Radio Fastlane FCC, Federal Communications Commission Fault-Tolerant Privacy, Security, and Databases Liberty, Civil Liberties Financial Modernization Act of 1999 Protect Plastic Naval Identification Dataveillance Disaster, Fire, Catastrophe Utopian Caper Education & Higher Education Purple Justice Spying and Espionage Privacy, General Privacy and Law Computers, Technology, and Information Privacy Law Fiction Security Policy Digital Signatures Authorization Open Records Act General, Other

Bibliography

Abbott, Robert P., et al. A Bibliography on Computer Operating System Security: The RISOS Project. W-7405-Eng-48. Livermore, CA: Lawrence Livermore Laboratory, University of California, April 15, 1974. Anderson, Ronald E. and Edward Arthur Fagerlund. “Privacy and the Computer: An Annotated Bibliography.” Computing Reviews (November 1972): 551-9. Bergart, Jeffrey G., et al. “An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.” AD-755. Springfield, VA: National Technical Information Service, 1972. Best, Riba A. and D. Cheryn Picquet. Computer Crime, Abuse, Liability, and Security: A Comprehensive Bibliography, 1970-1984. Jefferson, NC: McFarland, 1985. Boruch, Robert F. A Bibliography on Privacy and Social Research. American Council on Education. Carlstedt, J. Protecting Errors in Operating Systems: A Selected Annotated Bibliography and Index to Terminology. ISI/Sr-78-10. 1978. Computer Security, Backup, and Recovery: A Selected Bibliography. Vista, CA:

6 Canning Publications, Inc., 1972. * Dalenius, Tore. Bibliography on Privacy-Confidentiality-Security and Surveys. November 14, 1975. Providence, RI: unpublished. NBS# 77292005. Box 680, Folder 6. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Deighton, Suzan. Privacy and Computers: A Bibliography, 1969-1978. London: Institution of Electrical Engineers, 1978. Flaherty, David H., ed. Privacy and Data Protection: An International Bibliography. White Plains, NY: Knowledge Industry Publications, Inc., 1984. * Flaherty, David H., et al. Privacy and Access to Government Data for Research: An International Bibliography. London: Mansell, 1979. Goolidge, Andrea. Annotated Bibliography on Telematics: The Technologies of Telecommunications, Computers, and Information. Monticello, IL: Vance Bibliographies, 1982. Harrison, Annette. The Problem of Privacy in the Computer Age: An Annotated Bibliography. RM-5495-PR/RC. Santa Monica, CA: The Rand Corporation, December 1967. * Harrison, Annette. The Problem of Privacy in the Computer Age: An Annotated Bibliography, vol. 2. RM-5495/1-PR/RC. Santa Monica, CA: The Rand Corporation, December 1969. Hunt, Kathleen and Rein Turn. Privacy and Security in Databank Systems: An Annotated Bibliography, 1970-1973. R-1351-NSF. Santa Monica, CA: The Rand Corporation, March 1973. Klein, S.S. “Your Right to Privacy: A Selective Bibliography.” Legal Reference Series Quarterly 12 (1992): 217-31. Kuong, Javier F. Computer Security, Auditing, and Controls: A Bibliography. Wellesley Hills, MA: Management Advisory Publications, 1973. * Kurzban, Stanley A. “A Selective, Briefly Annotated Bibliography of Works on Data Security and Privacy.” Computers & Security 1 (January 1982): 57-64. * Lamoreux, Stephen. The Right of Privacy: A Bibliography, 1890-1961. Pullman: Washington State University Press, 1963. Latin, Howard A. Privacy: A Selected Bibliography and Topical Index of Social Science Materials. South Hackensack, NJ: Fred B. Rothman, 1976. Lavin, Howard A. Privacy, A Selected Bibliography and Topical Index of Social Science Materials. Berkeley, CA: Earl Warren Legal Institute, 1976. McSweeney, A.D. “A Select Bibliography of Books, Articles, and Official Reports Relating to Privacy and Data Protection.” Journal of Law and Information Science 3 (1992): 172-8. Novotny, Eric J. “Transborder Data Flows: A Bibliography.” Stanford Journal of International Law 16 (1980): 181-99. Ontario. Commission on Freedom of Information and Individual Privacy. Freedom of Information and Individual Privacy: A Selective Bibliography. Toronto, Canada: Commission on Freedom of Information and Individual Privacy, November 1979. * Rand Corporation. Bibliography of Selected Rand Publications: Privacy in the Computer Age. SB-1047. Santa Monica, CA: The Rand Corporation, June 1973. NBS# 74042007. Box 608, Folder 10. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Reed, Susan K. and Martha Gray. Controlled Accessibility Bibliography. NBS Technical Note 780. June 1973. Relyea, Harold C. and Elaine R. Tomchik. Managing Official Information: Accessibility and Protection in the Federal Government—A Selected Bibliography. Report No. 80- 183 GOV. Washington, DC: Library of Congress Research Service, October 15, 1980. Sanz, Timothy L. “Information Age Warfare: A Working Bibliography, Part I.” Military

7 Review 78 (March-April 1998): 83-90. * Sanz, Timothy L. “Information Age Warfare: A Working Bibliography, Part II.” Military Review 78 (September-November 1998): 1-10. * Scherf, John Arthur. Computer and Data Security: A Comprehensive Annotated Bibliography. MAC TR-122. Cambridge, MA: Massachusetts Institute of Technology, January 1974. In NBS# 74112004. Box 613, Folder 11. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Shearer, Benjamin F. and Marilyn Huxford. Communications and Society: A Bibliography on Communications Technologies and Their Social Impact. Westport, CT: Greenwood Press, 1983. Stewart, Alva W. Privacy in the Workplace: A Bibliographic Survey. P 2086. Monticello, IL: Vance Bibliographies, 1987. * Tavani, Herman T. “A Computer Ethics Bibliography.” Computers and Society (December 1995): 9-38. Turn, Rein. Bibliography of Selected Computer Security Publications, January 1980- October 1989. Washington, DC: NIST, December 1990. United States. Department of Commerce. Bureau of the Census. Information Privacy and Statistics: A Topical Bibliography. Washington, DC: GPO, July 1978. United States. Department of Health, Education, and Welfare. “Bibliography on Record Keeping and Personal Privacy.” In Records, Computers, and the Rights of Citizens. Washington, DC: GPO, July 1973. United States. Department of Justice. Security and Privacy of Information: A Bibliography. Washington, DC: U.S. Department of Justice, 1979. United States. National Library of Medicine. Current Bibliographies in Medicine: Confidentiality of Electronic Health Data. Washington, DC: GPO, 1996. * Vance, Mary A. Right of Privacy: A Bibliography. P-2391. Monticello, IL: Vance Bibliographies, April 1988. Vance, Mary A. Computer Crime: A Bibliography. P-2355. Monticello, Ill.: Vance Bibliographies, 1988. White, Anthony G. Confidentiality, Privacy Issues: A Bibliographic Update. P 2146. Monticello, IL: Vance Bibliographies, 1987. White, Anthony G. Privacy, Confidentiality: A Selected Bibliography. P 1093-1136. Monticello, IL: Vance Bibliographies, 1982. Witzer, Harold. Computer Security Bibliography. Wilmington, DE: AVCO Computer Services, January 1971. Zureik, E. and D. Hartling. The Social Context of the Information and Communication Technologies: A Bibliography. 2nd ed. New York: Pergamon Press, 1980.

Email

Axsmith, C. “Email Privacy and the Law.” In Proceedings of the 15th National Computer Security Conference (Baltimore, MD, 1992), 120-5. Baum, Kevin J. “Email in the Workplace and the Right of Privacy.” Villanova Law Review 42 (1997): 1011-17. Bernstein, Andrea. “Who’s Reading Your Email?” Newsday, July 15, 1996, p. A21. Betts, Mitch and Joseph Maglitta. “IS Policies Target Email Harrassment.” Computerworld (February 13, 1995): 12. Brown, Bonnie. “Is Email Private or Public? Companies Own Email and Can Monitor It.” Computerworld 28 (June 27, 1994): 135-7. Burke, Steven. “Electronic-Mail Privacy to be Tested in Court in Suit Against Epson.” PC Week 7 (August 20, 1990): 124. Castagnoli, C. “Someone’s Been Reading My Email: Privacy Protection for Electronic

8 Mail Users in the U.S. and the E.C.” Computer Law & Practice 9 (1993): 215-23. Cohen, Noam S. “Corporations Try to Bar Use of Email by Unions.” New York Times, August 23, 1999. Dunca, Richard. “A Privacy Act Would Force Firms to Inform Their Employees About Email Monitoring.” PC Week (June 28, 1993): 203-4. Etzioni, Amitai. “Some Privacy, Please, for Email.” The New York Times, November 23, 1997, p. C12. Fryer, Bronwyn and Roberta Furger. “Who’s Reading Your Email?” PC World (August 1993): 166-71. Giallonardo, N. “Steve Jackson Games v. United States Secret Service: The Government’s Unauthorized Seizure of Private E-Mail Warrants More than the Fifth Circuit’s Slap on the Wrist.” John Marshall Journal of Computer & Information Law 14 (Fall 1995): 179-208. Grogan, David, et al. “Terror by Email.” People Weekly (March 6, 1995): 59-60. Hoffman, Thomas. “Brokers Can Monitor Email More Easily.” Computerworld (July 20, 1998): 38. Johnson, David R. and John Podesta. “Electronic Mail and Privacy: Setting Your Company’s Policy.” Chief Information Offices Journal 4 (1991): 51-3. Lee, Laurie Thomas. “Watch Your Email: Employee Email Monitoring and Privacy Law in the Age of the ‘Electronic Sweatshop.’” John Marshall Law Review 28 (1994): 139- 48. Lehman, Anne L. “Email in the Workplace: Question of Privacy, Property, or Principle?” CommLaw Conspectus 5 (1997): 99-100. Linn, J. and S.T. Kent. “Privacy for DARPA-INTERNET Mail.” In Proceedings of the 12th National Computer Security Conference, 215-29. 1989. McGraw, David K. “Sexual Harrassment in Cyberspace: The Problem of Unwelcome Email.” Rutgers Computer & Technology Law Journal 21 (1995): 491-518. Nelson, Corey L. “Is Email Private or Public? Employers Have No Right to Snoop Through Mail.” Computerworld 28 (June 27, 1994): 135-7. Nycum, Susan Hubbell. “Privacy in Electronic Funds Transfer, Point of Sale, and Electronic Mail Systems in the Next Decade.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 39-42. New York: Academic Press, 1980. Rose, J. “Email Security Risks: Taking Hacks at the Attorney-Client Privilege.” Rutgers Computer & Technology Law Journal 23 (1997): 179-225. Sanderson, M. “Big Brother’s Day at the Office Email Monitoring.” Computer Fraud & Security (December 2000): 9-11. Schneier, Bruce. Email Security: How to Keep Your Electronic Messages Private. John Wiley & Sons, 1995. Sheilds, Stella F. “Development of a Methodology for the Analysis of Electronic Mail Communication Networks with Implications for Transborder Data Flow.” Ph.D. diss., State University of New York at Buffalo, 1989. Sipior, Janice C. and Burke T. Ward. “The Dark Side of Employee Email.” Communications of the ACM (July 1, 1999): 88. Sullivan, John. “An Ambiguous Email Trail in Torture Case.” New York Times, March 23, 1998, p. B5. Sundstrom, Scott A. “You’ve Got Mail! (And the Government Knows It): Applying the Fourth Amendment to Workplace Email Monitoring.” New York University Law Review 73 (1998): 2064-5. Trubow, George B. “When is Monitoring Email Really Snooping?” IEEE Software 9 (1992): 97-8. Weisband, Suzanne P. and B. Reinig. “Managing User Perceptions of Email Privacy.” Communications of the ACM 38 (1995): 40-7. Weise, Elizabeth. “‘Self-Destruct’ Email Offers Virtual Privacy.” USA Today, October

9 7, 1999, p. A1. White, Jarrold J. “[email protected]: Employer Monitoring of Employee Email.” Alabama Law Review 48 (1997): 1079-80.

Terrorism

Anthes, Gary H. “InfoTerrorist Threat Growing.” Computerworld (January 30, 1995): 1-2. Arquilla, John, et al. “Networks, Netwar, and Information-Age Terrorism.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 75-111. Santa Monica, CA: The Rand Corporation, 1999. Bequai, August. Technocrimes: The Computerization of Crime and Terrorism. Lexington, MA: Lexington Books/D.C. Heath, 1987. Bloombecker, Jay. “International Computer Crime: Where Terrorism and Transborder Data Flow Meet.” Computers & Security 1 (January 1982): 41-53. Clymer, Adam. “Senate Rejects Pentagon Plan to Mine Citizens’ Personal Data for Clues to Terrorism.” New York Times, January 24, 2003, p. A12. “Computer Terrorism Coming to Britain.” The Independent, November 28, 1991. “Cyberterrorism Threatens Online Security; Federal Panel Cites ‘Weapons of Mass Disruption.’” Computerworld 31/41 (1997): 14. Ellison, Larry. “Digital Ids Can Help Prevent Terrorism.” Wall Street Journal, October 8, 2001, p. A26. Grogan, David, et al. “Terror by Email.” People Weekly (March 6, 1995): 59-60. Hardy, Stephen M. “New Guerrilla Warfare.” Journal of Electronic Defense (September 1996): 46. MacDonald, Heather. “Use CompStat Against Terror.” Daily News, November 4, 2001, p. 43. Munro, Neil. “The Pentagon’s New Nightmare: An Electronic Pearl Harbor.” Washington Post (July 16, 1995): C3. * Parenti, Christian. The Soft Cage: Surveillance in America from Slavery to the War on Terror. New York: Basic Books, 2003. “Policy Forum: Pearl Harbor in Information Warfare?” The Washington Quarterly 20 (2 1997): 39. Ricks, Thomas E. “Information Warfare Defense is Urged: Pentagon Panel Warns of ‘Electronic Pearl Harbor.’” Wall Street Journal (January 6, 1997): B2. Russo, Charles. “Bugged on the Bus: Surveillance in the Aftermath of Terrorism.” San Francisco Bay Guardian, September 19, 2001. Schwartau, Winn. CyberShock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists, and Weapons of Mass Disruption. New York: Thunder’s Mouth Press, 2000. Schwartau, Winn. Information Warfare: Cyberterrorism: Protecting Your Personal Security in the Electronic Age. Second edition. New York: Thunder’s Mouth Press, 1996. Sullivan, John. “Others Tell of Online Chats with Torture Suspect.” New York Times, December 10, 1996, p. B3. Verton, Dan. Black Ice: The Invisible Threat of Cyber-Terrorism. McGraw-Hill, 2003.

Information Warfare

Acherman, Robert K. “Command, Control Simulation Develops Information Warriors.” Signal (February 1997): 2528. Acherman, Robert K. “Navy Doctrine, Systems Face Information Warfare Makeover.” Signal (July 1996): 5760.

10 Adams, Charlotte. “Information Warfare Takes a Front Seat.” Military & Aerospace Electronics (June 1996): 19-21. Ahrari, M. Ehsan. “U.S. Military Strategic Perspectives on the PRC: New Frontiers of Information-Based War.” Asian Survey 37 (December 1997): 1163-80. Alberts, David S. Defensive Information Warfare. Washington, DC: Directorate of Advanced Concepts, Technologies and Information Strategies, NDU, August 1996. Aldrich, Richard W. “The International Legal Implications of Information Warfare.” Airpower Journal (Fall 1996): 99110. Alexander, David. “Information Warfare and the Digitized Battlefield.” Military Technology (September 1995): 5764. Allard, Kenneth. “Data Transforms Warfare.” Defense News (March 4, 1996): 24. Anshel, M. “Deploying Advanced Mathematics for Defensive Information Warfare.” EDI Forum: The Journal of Electronic Commerce 12 (1999): 73-77. Anthes, Gary H. “DOD on Red Alert to Fend off Info Attacks.” Computerworld (January 6, 1997): 1-2. Anthes, Gary H. “Feds Limit Info Warfare Role.” Computerworld (September 18, 1995): 24. Anthes, Gary H. “Info Warfare Risk Growing.” Computerworld (May 22, 1995): 1, 16. Anthes, Gary H. “New Laws Sought for Info Warfare.” Computerworld (June 5, 1995): 55. Anthes, Gary H. “Security Pundits Weigh War Threat.” Computerworld (October 2, 1995): 71. “Army Plan Fosters Dynamic Information War Framework.” Signal (November 1993): 5558. Arquilla, John. “Ethics and Information Warfare.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 379-401. Santa Monica, CA: The Rand Corporation, 1999. Arquilla, John, et al. “Networks, Netwar, and Information-Age Terrorism.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 75-111. Santa Monica, CA: The Rand Corporation, 1999. Arquilla, John. “Strategic Implications of Information Dominance.” Strategic Review (Summer 1994): 2430. Arquilla, John and David Ronfeldt. The Advent of Netwar. Santa Monica, CA: The Rand Corporation, 1996. Arquilla, John and David Ronfeldt, eds. In Athena’s Camp: Preparing for Conflict in the Information Age. Santa Monica, CA: The Rand Corporation, 1997. Ashman, Bruce W. Defensive Information Warfare in Today’s Joint Operations: What’s the Real Threat? Carlisle Barracks, PA: AWC, 1997. “Axent Announces Contract Win to Protect AF Bases from Information Warfare.” C4i News (November 6, 1997): 1. Barnaby, Frank. “Microelectronics and War.” In The Militarization of High Technology, ed. John Tirman. Cambridge, MA: Ballinger, 1984. Berkowitz, Bruce D. “Warfare in the Information Age.” Issues in Science and Technology (Fall 1995): 59-67. Blanchette, Joel G. “USACAPOC’s FOCUS Project: Waging the War for Information.” Special Warfare (January 1996): 45-49. Blount, Kerry A. “A Two-Component Strategy for Winning the Information War.” ARMY (January 1995): 1011. Blount, Kerry A. “Wrestling with Information Warfare’s ‘Dark Side.’” ARMY (February 1996): 912. Bond, J.N. Peacetime Foreign Data Manipulation as One Aspect of Offensive Information Warfare: Questions of Legality Under the United Nations Charter Article 2(4). Newport, RI: Naval War College (NWC), June 14, 1996.

11 Boorda, Jeremy M. “Copernicus Forward: C4I for the 21st Century.” Surface Warfare (July-August 1995): 2-7. Boorda, Jeremy M. “Leading the Revolution in C4I.” Joint Force Quarterly (JFQ) (Autumn 1995): 1417. Borning, Alan. “Computer System Reliability and Nuclear War.” Communications of the ACM 30 (February 1987): 112-31. Borning, Alan. “Computer System Reliability and Nuclear War.” In Computers in Battle: Will They Work? eds. David Bellin and Gary Chapman, 101-47. Boston: Harcourt Brace Jovanovich, 1987. Braunberg, Andrew C. “Air Force Pursues Two-Sided Information Warfare Strategy.” Signal (July 1996): 6365. Buchan, Glenn C. “Implications of Information Vulnerabilities for Military Operations.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 283-323. Santa Monica, CA: The Rand Corporation, 1999. Builder, Carl H. “The American Military Enterprise in the Information Age.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 19-44. Santa Monica, CA: The Rand Corporation, 1999. Busey, James B. “Information Warfare Calculus Mandates Protective Actions.” Signal (October 1994): 15. “Businesses Face Threat of Information Warfare.” Signal (June 1996): 4546. Campen, Alan D. “Rush to Information Based Warfare Gambles with National Security.” Signal (July 1995): 6769. Campen, Alan D., ed. The First Information War: The Story of Communications, Computers, and Intelligence Systems in the Persian Gulf War. Fairfax, VA: Armed Forces Communications and Electronics Association International Press, 1992. Campen, Alan D., et al., eds. Cyberwar: Security, Strategy, and Conflict in the Information Age. AFCEA International, 1996. Canavan, Gregory H. Simulation, Computing, Information and Future Warfare. Los Alamos, NM: Los Alamos National Laboratory, 1993. “Can You Be Trusted? IT Security.” Business & Technology (June 2001): 35-42. Caravella, Frank J. “ADA’s Role in Winning the Information War.” ADA: Air Defense Artillery (September-October 1995): 23. Carr, Thomas H. War on the Cheap: Using Information Warfare to Lengthen the Decision Cycle. Newport, RI: Naval War College, February 12, 1996. “CIA Director Warns Information Warfare Poses Danger to U.S.” Wall Street Journal (June 26, 1996): B6. Clapper, James R., Jr. and Eben H. Trevino Jr. “Critical Security Dominates Information Warfare Moves.” Signal (March 1995): 7172. “Commanders Pull Intelligence in Information Warfare Strategy.” Signal (August 1994): 2931. Cooper, Pat. “Cyberwar Recasts National Security.” Army Times (June 26, 1995): 26. Cooper, Pat. “Newest Information Warfare Technology Could Backfire On Battlefield of the Future.” Defense News (May 6, 1996): 26. Cooper, Pat. “Pentagon Debates Potential of Information Warfare.” Defense News (May 13, 1996): 3. Cooper, Pat. “War Game Reveals IW Vulnerabilities.” Defense News (March 4, 1996): 33. Cordesman, Anthony H. and Justin G. Cordesman. Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland. Westport, CT: Praeger, 2002. Correll, John T. “War in Cyberspace.” Air Force Magazine (January 1998): 33-6. “Crucial Network Imperatives Spawn Information War Peril.” Signal (June 1996): 3538.

12 Davis, Lynn E. “Arms Control, Export Regimes, and Multilateral Cooperation.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 361-77. Santa Monica, CA: The Rand Corporation, 1999. De Borchgrave, Arnaud. “Is America at Risk in a Cyberwar?” Insight on the News (March 11, 1996): 48. Deitchman, S.J. “Information Warfare.” Issues in Science and Technology 12 (2 1996): 15-17. DeLanda, Manuel. War in the Age of Intelligent Machines. New York: Zone Books, 1991. Denning, Dorothy Elizabeth R. Information Warfare & Security. Addison-Wesley, 1998. “Digitized Zephyr Lifting Fog from No Man’s Land: Army Pushes Information Warfare Transition.” National Defense (September 1995): 3233. Dishong, Donald J. On Studying the Effect of Information Warfare on C2 Decision Making. Monterey, CA: Naval Postgraduate School, June 1994. Downs, Lawrence G. Digital Data Warfare: Using Malicious Computer Code as a Weapon. Maxwell AFB, AL: US Air War College, Air University, April 1995. Edwards, Paul N. The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, MA: MIT Press, 1997. Edwards, Paul N. “A History of Computers and Weapons Systems.” In Computers in Battle: Will They Work? eds. David Bellin and Gary Chapman, 45-60. Boston: Harcourt Brace Jovanovich, 1987. Emmett, P.C. “Software Warfare: The Emerging Future.” RUSI Journal (December 1992): 56-60. Fialka, John J. “Pentagon Studies Art of ‘Information Warfare’ to Reduce its Systems’ Vulnerability to Hackers.” Wall Street Journal (July 3, 1995): A20. Flughum, David A. “Cyberwar Plans Trigger Intelligence Controversy.” Aviation Week and Space Technology (January 19, 1998): 52-8. Fogleman, Ronald R. “What Information Warfare Means to You.” Air Force Times (July 17, 1995): 31. Francois, Kenneth, et al. Information Warfare on the Map: A Concept for Strategy- Making in the Information Age. Washington, DC: School of Information Warfare and Strategy, NDU, May 29, 1996. Fukuyama, Francis and Abram N. Shulsky. “Military in the Information Age: Lessons from the World of Business.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 327-60. Santa Monica, CA: The Rand Corporation, 1999. Gompert, David C. “Right Makes Might: Freedom and Power in the Information Age.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 45-73. Santa Monica, CA: The Rand Corporation, 1999. Goodman, S.E. “War, Information Technologies, and International Asymmetries.” Communications of the ACM (December 1996): 11-16. Greenberg, Lawrence T. Old Law for a New World? The Applicability of International Law to Information Warfare. Stanford, CA: Center for International Security and Arms Control, Institute for International Studies, Stanford University, 1997. Grier, Peter. “Preparing for 21st-Century Information War.” Government Executive (August 1995): 13032. Grier, Peter. “The Top Contract Categories: Electronics and Communications—Byting through the Fog of War.” Government Executive (August 1994): 127-29. Guisnel, Jean. Cyberwars: Espionage on the Internet. New York: Plenum Press, 1997. Gunther, Judith, et al. “Digital Warrior.” Popular Science (September 1994): 60-64. Hardy, Stephen M. “A Question of Symmetry?” Journal of Electronic Defense

13 (January 1997): 4244. Harknett, Richard J. “Information Warfare and Deterrence.” Parameters (Autumn 1996): 93107. Harshberger, Edward and David Ochmanek. “Information and Warfare: New Opportunities for U.S. Military Forces.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 157-78. Santa Monica, CA: The Rand Corporation, 1999. Holzer, Robert. “Navy Eyes Single Command to Guide Info Warfare.” Navy Times (February 6, 1995): 35. Hosmer, Stephen T. “The Information Revolution and Psychological Effects.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 217-51. Santa Monica, CA: The Rand Corporation, 1999. Houghtaling, Pamela A. “New Information Warfare System Advances Army into Next Century.” Signal (March 1996): 3739. Hunt, Carl W. “Commercial Systems Enhance Information Warfare Capability.” Signal (March 1997): 6465. Hutcherson, Norman B. Command and Control Warfare: Putting Another Tool in the WarFighter’s Data Base. Research Report No. AU-ARI-94-1. Maxwell AFB, AL: Air University Press, September 1994. “Information Warfare Center Stands Up in Little Creek.” Marine Corps Gazette (November 1995): 8-9. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second edition. Science Applications International Corporation, July 4, 1996. “Information Warriors Raze Enemy’s Vital Data Chains.” National Defense (March 1995): 3031. “Infowar Convention Raises Security Issues.” Computer Fraud and Security 11 (1996): 6. Johnson, Craig L. “Information Warfare—Not a Paper War.” Journal of Electronic Defense (August 1994): 5556. Johnson, L. Scott. “Toward a Functional Model of Information Warfare.” Studies in Intelligence 1 (1997). Johnson, Robert E. Information Warfare: Impact on Command and Control Decisionmaking. Carlisle Barracks, PA: AWC, April 1996. Johnson, Stuart E. and Martin C. Libicki, ed. Dominant Battlespace Awareness. Washington, DC: Center for Advanced Concepts and Technology, Institute for National Strategic Studies, NDU Press, October 1995. Joint Warfighting Science and Technology Plan. Washington, DC: Office of the Director of Defense Research and Engineering, May 1996. Jones, A. “Protection in Programming Systems.” Ph.D. thesis, Carnegie-Mellon University, June 1973. Kabay, Michael E. “Prepare Yourself for Information Warfare.” Computerworld (March 20, 1995): SS-27. Kaneshige, Thomas. “Is the U.S. Prepared for Cyberwar?” Computer (July 1, 1996): 20-21. Keuhl, Daniel. Target Sets for Strategic Information Warfare in an Era of Comprehensive Situational Awareness. School of Information Warfare and Strategy, NDU, January 24, 1995. Khalilzad, Zalmay M. “Defense in a Wired World: Protection, Deterrence, and Prevention.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 403-36. Santa Monica, CA: The Rand Corporation, 1999. Khalilzad, Zalmay M. and John P. White, eds. The Changing Role of Information Warfare. Santa Monica, CA: The Rand Corporation, 1999.

14 Khan, M. Masud R. The Privacy of the Self. New York: International Universities Press, 1974. Killam, Timothy B. Weapons of Mass Disruption For the Operational InfoWarrior. Newport, RI: NWC, February 12, 1996. Kirk, David C. Artificial Intelligence Applications to Information Warfare. Carlisle Barracks, PA: AWC, March 22, 1996. Klinefelter, Stephen. The National Security Strategy and Information Warfare. Carlisle Barracks, PA: AWC, 1997. Kovacich, Gerald. “Information Warfare and the Information System Security Professional.” Computers & Security 16 (1 1997): 14. Kuschner, Karl W. Legal and Practical Constraints on Information Warfare. Newport, RI: NWC, June 14, 1996. Ladd, John. “Computers and War: Philosophical Reflections on Ends and Means.” In Computers in Battle: Will They Work? eds. David Bellin and Gary Chapman, 297-314. Boston: Harcourt Brace Jovanovich, 1987. Landay, Jonathan S. “U.S. Worries about Growing Threat of ‘Cyberwar’ in Information Age.” Christian Science Monitor (June 7, 1996): 1. Lawlor, Maryann. “Science Board Task Force Challenges Defensive Information Warfare Status.” Signal (September 1997): 63 “Lawmakers Get Education on Perils of Cyber Warfare.” C4i News (March 27, 1997). Leopold, George. “‘Infowar’: Can Bits Really Replace Bullets?” Electronic Engineering Times (November 6, 1995): 65-66. Libicki, Martin C. Defending Cyberspace and Other Metaphors. Washington, DC: NDU, 1997. Libicki, Martin C. “Information Warfare: A Brief Guide to Defense Preparedness— Information Systems Play an Important Role in Society, So Threats to Their Security Should Be Taken Seriously—But There is No Need to Panic.” Physics Today 50 (9 1997): 40. Libicki, Martin C. The Mesh and the Net: Speculations on Armed Conflicts in a Time of Free Silicon. Washington, DC: Center for Advanced Concepts and Technology, Institute for National Strategic Studies, NDU, March 1994. Libicki, Martin C. “Silicon and Security in the Twenty-First Century.” Strategic Review (Summer 1992): 62-65. Libicki, Martin C. and Jeremy Shapiro. “Conclusion: The Changing Role of Information in Warfare.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 437-52. Santa Monica, CA: The Rand Corporation, 1999. Locke, Jeffrey S. Command and Control Warfare: Promise and Challenge for the Operational Commander. Newport, RI: NWC, February 13, 1995. Lohr, Steve. “National Security Experts Plan for Wars Whose Targets and Weapons Are All Digital.” New York Times (September 30, 1996): D1. Madsen, Wayne. “Information Warfare.” Information Systems Security (Fall 1995): 12-15. “Marine Corps Information Warfare Combines Services’ Needs, Defines Their Differences.” Signal (July 1996): 6162. Mason, Jerry. “Operationalizing Information Warfare.” Surface Warfare (September- October 1996): 3335. Matthews, William. “Girding for Cyberwar.” Air Force Times (July 18, 1994): 36. Mayer, M.G. Influence of Future Command, Control, Communications, and Computers (C4) on Doctrine and the Operational Commander’s Decisionmaking Process. Newport, RI: NWC, March 6, 1996. McAuliffe, Amy. “Building the Eyes and Ears of the Battlefield.” Military & Aerospace Electronics (June 1995): 10-12.

15 McAuliffe, Amy. “COTS Key to Info Warfare.” Military & Aerospace Electronics (March 1995): 20. McAuliffe, Amy. “Information Warfare: Technology and Beyond.” Military & Aerospace Electronics (December 1995): 6-8. McCollum, William W. The Role of the Intelligence Community in Preparing to Win the Information War. Carlisle Barracks, PA: AWC, 1997. McHugh, Francis J. Fundamentals of War Gaming. 3rd ed. Newport, RI: Naval War College, March 1966. McKenna, James T. “Rome Lab Targets Info Warfare Defenses.” Aviation Week & Space Technology (August 12, 1996): 65-66. Metz, Steven and James Kievit. “Siren Song of Technology and Conflict Short of War.” Special Warfare (January 1996): 210. Minor, Dale. The Information War. New York: Hawthorne Books, 1970. Molander, Roger C., et al. “Strategic Information Warfare: A New Face of War.” Parameters (Autumn 1996): 8192. Molander, Roger C., et al. Strategic Information Warfare: A New Face of War. Santa Monica, CA: The Rand Corporation, 1996. Molander, Roger C., et al. “U.S. Strategic Vulnerabilities: Threats Against Society.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 253-81. Santa Monica, CA: The Rand Corporation, 1999. Munro, Neil. The Quick and the Dead: Electronic Combat and Modern Warfare. New York: St. Martin’s Press, 1991. Munro, Neil. “Reno Proposes Cyberspace Defense.” Washington Technology (April 25, 1996): 53-54. Munro, Neil. “Sketching a National Information Warfare Defense Plan.” Communications of the ACM (November 1996): 1517. Munro, Neil. “White House Edges Closer to Cyberwar.” Washington Technology (March 21, 1996): 12. Mussington, David. “Systematic Intrusions in DOD Computer Systems.” Pointer (August 1996): 16. Naylor, Sean, D. “Info War.” Army Times (May 17, 1993): 12-14. Neilson, Robert E., ed. Sun Tzu and Information Warfare: A Collection of Winning Papers from the Sun Tzu Art of War in Information Warfare Competition. National Defense University Press, 1997. Newell, Clayton R. “The Technological Future of War.” Military Review (October 1989): 22-28. Nichiporuk, Brian. “U.S. Military Opportunities: Information-Warfare Concepts of Operation.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 179-215. Santa Monica, CA: The Rand Corporation, 1999. Nichiporuk, Brian and Carl H. Builder. Information Technologies and the Future of Land Warfare. Santa Monica, CA: The Rand Corporation, 1995. Paylor, Mark A. Command and Control (C2) In Future Warfare. Newport, RI: NWC, March 6, 1996. Pfaltzgraff, Robert L., Jr. and Richard H. Shultz, Jr., eds. War in the Information Age: New Challenges For U.S. Security Policy. Brassey’s, 1997. “Planners Seek New Models to Study Information Wars.” National Defense (July- August 1996): 57. Planning Considerations for Defensive Information Warfare: Information Assurance. Arlington, VA: DISA, 1993. Powell, Colin L. “Information-Age Warriors.” Byte (July 1992): 370. Power, Richard. “CSI Special Report On Information Warfare.” Computer Security Journal (October 1995). Power, Richard. Current and Future Danger: A CSI Primer on Computer Crime and

16 Information Warfare. San Francisco, CA: Computer Security Institute, 1995. Price, Alfred. The History of U.S. Electronic Warfare. 2 vols. Westford, MA: The Murray Printing Company, 1984. “Rapid Technology Growth Spawns Land Information Warfare Activity.” Signal (July 1996): 5154. Rhea, John. “The Dilemma of Using COTS in Electronic Warfare Systems.” Military & Aerospace Electronics (September 1996): 8-10. Richardson, Doug. “Confounding the Enemy: The Black Art of Infowar.” Defence ’96: The World in Conflict (1996): 155-59. Richardson, Doug. “Information Warfare—New Threats and New Opportunities.” Asian Defense Journal (April 1997): 50-55. Ricks, Thomas E. “Information Warfare Defense is Urged: Pentagon Panel Warns of ‘Electronic Pearl Harbor.’” Wall Street Journal (January 6, 1997): B2. Robinson, Clarence A., Jr. “Army Information Operations Protect Command and Control.” Signal (July 1996): 4750. Robinson, Clarence A., Jr. “Defense Organization Safeguards War Fighters’ Information Flow.” Signal (October 1995): 1518. Robinson, Clarence A., Jr. “Electronic Combat Techniques Provide Information War Edge.” Signal (July 1995): 3335. Robinson, Clarence A., Jr. “Information Warfare Avoids Army Virus Contamination.” Signal (November 1993): 75. Robinson, Clarence A., Jr. “Information Warfare Demands Battlespace Visualization Grasp.” Signal (February 1997): 1720. Robinson, Clarence A., Jr. “Information Warfare Strings Trip Wire Warning Strategy.” Signal (May 1996): 2933. Ross, Jimmy D. “Winning the Information War.” ARMY (February 1994): 2628. Ryan, Donald E., Jr. “Implications of Information-Based Warfare.” JFQ (Autumn- Winter 1994-1995): 114-16. Sanz, Timothy L. “Information Age Warfare: A Working Bibliography, Part I.” Military Review 78 (March-April 1998): 83-90. * Sanz, Timothy L. “Information Age Warfare: A Working Bibliography, Part II.” Military Review 78 (September-November 1998): 1-10. Schwartau, Winn. “Information Warfare: Chaos on the Electronic Superhighway.” Marine Corps Gazette (October 1994): 79-80. Schwartau, Winn. Information Warfare: Chaos on the Electronic Superhighway. New York: Thunder’s Mouth Press, 1994. Schwartau, Winn. Information Warfare: Cyberterrorism: Protecting Your Personal Security in the Electronic Age. Second edition. New York: Thunder’s Mouth Press, 1996. Scott, William B. “‘Information Warfare’ Demands New Approach.” Aviation Week & Space Technology (March 13, 1995): 85-88. Seagraves, Mary Ann and Richard J. Szymber. “Owning the Weather: The Environmental Side of the Information War.” Army RD&A Bulletin (March-April 1995): 23-30. Shapiro, Jeremy. “Information and War: Is It a Revolution?” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 113-53. Santa Monica, CA: The Rand Corporation, 1999. Shukman, David. Tomorrow’s War: The Threat of High-Technology Weapons. Harcourt Brace, 1996. Soo Hoo, Kevin J. Strategic Information Warfare: A New Arena for Arms Control? Stanford, CA: Center for International Security and Arms Control, Institute for International Studies, Stanford University, 1997. Sterling, Bruce. “War is Virtual Hell.” Wired 1 (1993): 46-51, 94-9.

17 Stewart, John F., Jr. “Command and Control Warfare and Intelligence on the Future Digital Battlefield.” Army RD&A Bulletin (November-December 1994): 14-15. Stewart, Michael J. Information Operations, Information Warfare: Policy Perspectives and Implications for the Force. Carlisle Barracks, PA: AWC, 1997. Strassmann, Paul A. Elements of an Information Management Doctrine for Low- Intensity Warfare. Washington, DC: NDU, January 20, 1994. Tempestilli, Mark. “Network Force.” US Naval Institute Proceedings (June 1996): 42- 46. Tempestilli, Mark. Waging Information Warfare: Making the Connection Between Information and Power in a Transformed World. Newport, RI: Joint Military Operations Department, NWC, May 16, 1995. Thomas, Timothy L. “Deterring Information Warfare: A New Strategic Challenge.” Parameters (Winter 1996-1997): 81-91. Thomas, T.R. InfoWar, InfoTheft, and InfoSec. Los Alamos, NM: Los Alamos National Laboratory, 1993. Thomberson, Clark. “Role of Military Funding in Academic Computer Science.” In Computers in Battle: Will They Work? eds. David Bellin and Gary Chapman, 283-96. Boston: Harcourt Brace Jovanovich, 1987. Thompson, Michael J. Information Warfare—Who is Responsible? Coordinating the Protection of Our National Information Infrastructure. Carlisle Barracks, PA: AWC, 1997. Thrasher, Roger D. Information Warfare: Implications for Forging the Tools. Monterey, CA: Naval Postgraduate School, June 1996. Van Creveld, Martin. “High Technology and the Transformation of War: Part 1.” RUSI Journal (October 1992): 76-81. Van Creveld, Martin. “High Technology and the Transformation of War: Part 2.” RUSI Journal (December 1992): 61-64. Vandewart, R.L. and R.L. Craft. Analytic Tools for Information Warfare. Albuquerque, NM: Sandia National Laboratories 1996. Vistica, Gregory L. “Cyberwar and Sabotage.” Newsweek (May 31, 1999). Waller, Douglas and Mark Thompson. “Onward Cyber Soldiers.” Time (August 21, 1995): 38-45. Wardynski, E. Casey. “Labor Economics of Information Warfare.” Military Review (May-June 1995): 56-61. “Warfare in the Information Age: Cutting-Edge Technology Helps Soldiers Keep the Peace in Bosnia.” Popular Science 249 (1996): 52-57. Whisenhunt, Robert H. Information Warfare and the Lack of a U.S. National Policy. Study Project. Carlisle Barracks, PA: AWC, April 15, 1996. Williamson, John. “Winning the Data War.” Jane’s Defence Weekly (May 20, 1995): 44-46. Wood, J. Robert. “Lessons Learned in Information Age Warfare.” ARMY (February 1996): 32-35.

Ethics

Anderson, Ronald E., et. al. “ACM Code of Ethics and Professional Conduct.” Communications of the ACM 33 (May 1992): 94-9. Anderson, Ronald E., et al. “Codes of Professional Ethics.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 876-7. San Diego: Academic Press, 1996. Anderson, Ronald E., et al. “Using the New ACM Code of Ethics in Decision Making.” Communications of the ACM 36 (February 1993): 98-107. Anderson, Ross. Security Engineering. John Wiley & Sons, 2001.

18 Anderson, Ross, ed. Personal Medical Information: Security, Engineering, and Ethics. Springer-Verlag, 1997. Arquilla, John. “Ethics and Information Warfare.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 379-401. Santa Monica, CA: The Rand Corporation, 1999. Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice-Hall, 1997. Baird, B.J., et al. “The Moral Cracker?” Computers & Security 6 (December 1987): 471-78. Baird, Robert M., et al., eds. Cyberethics: Social & Moral Issues in the Computer Age. Amherst, NY: Prometheus Books, 2000. Barnes, John A. Who Should Know What? Social Science, Privacy, and Ethics. New York: Cambridge University Press, 1980. Bok, Sissela. Secrets: On the Ethics of Concealment and Revelation. New York: Pantheon Books, 1982. Boruch, Robert F. and Joe S. Cecil, eds. Solutions to Ethical and Legal Problems in Social Research. New York: Academic Press, 1983. Bowyer, Kevin W. Ethics and Computing: Living Responsibly in a Computerized World. IEEE Computer Society Press, 1996. Bray, D.L. “Abuses of Attorneys’ Computer Databases Threaten Professional Ethics.” Computer/Law Journal 7 (Summer 1987): 439-53. Britz, J.J. “Technology as a Threat to Privacy: Ethical Challenges and Guidelines for the Information Professionals.” Internet & Higher Education 13 (1996): 175-93. Brown, Geoffrey. The Information Game: Ethical Issues in a Microchip World. Atlantic Highlands, NJ: Humanities Press, 1990. Brown, Geoffrey. “Privacy and Information: A New Moral Problem?” Culture, Education, and Society/New Universities Quarterly 39 (1985). Cerf, Vint. “Ethics and the Internet.” Communications of the ACM 32 (June 1989): 710. DeCew, Judith Wagner. “The Scope of Privacy in Law and Ethics.” Law and Philosophy 5 (August 1986): 145-73. Dejoie, Roy, et al., eds. Ethical Issues in Information Systems. Boston: Boyd & Fraser, 1991. * Edgar, Stacey L. Morality and Machines: Perspectives on Computer Ethics. Sudbury, MA: Jones and Bartlett, 1997. Epstein, Richard G. The Case of the Killer Robot: Stories About the Professional, Ethical, and Societal Dimensions of Computing. New York: Wiley, 1996. Ermann, M. David, et al., eds. Computers, Ethics, and Society. 2nd edition. Oxford University Press, 1997. Ezorsky, G., ed. Moral Rights in the Workplace. New York: State University of New York Press, 1987. Farber, David J. “NSF Poses Code of Networking Ethics.” Communications of the ACM 32 (June 1989): 688. Forester, Tom and Perry Morrison. Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing. Cambridge, MA: The MIT Press, 1992. Forester, Tom and Perry Morrison, Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing. 2nd edition. Cambridge, MA: MIT Press, 1994. Gould, Carol C., ed. The Information Web: Ethical and Social Implications of Computer Networking. Boulder, CO: Westview Press, 1989. Hitch, Leslie and Jerry Miller. “Historical Perspectives on Technology, Ethics, and Privacy.” IEEE Transactions of Professional Communications (March 1994). Johnson, Deborah G. Computer Ethics. Englewood Cliffs, NJ: Prentice-Hall, 1985. Johnson, Deborah G. Computer Ethics. Second edition. Englewood Cliffs, NJ:

19 Prentice-Hall, 1994. Johnson, Deborah G. “Hacker Ethics.” In Computer Ethics, Second Edition, 112-8. Englewood Cliffs, NJ: Prentice-Hall, 1995. Johnson, Deborah G. and John W. Snapper, eds. Ethical Issues in the Use of Computers. Belmont, CA: Wadsworth, 1985. Kizza, Joseph Migga. Computer Network Security and Cyber Ethics. Jefferson, NC: McFarland, 2001. Kizza, Joseph Migga. Ethical and Social Issues in the Information Age. Springer, 1998. Kizza, Joseph Migga, ed. Ethics in the Computer Age: Conference Proceedings. New York: Association for Computing Machinery, 1994. Kling, Rob. “Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 848-69. San Diego: Academic Press, 1996. Ladd, John. “Computers and Moral Responsibility: A Framework for an Ethical Analysis.” In The Information Web: Ethical and Social Implications of Computer Networking, ed. Carol Gould. Boulder, CO: Westview Press, 1989. Langford, Duncan. Internet Ethics. New York: St. Martin’s Press, 2000. Martin, C. Dianne and David H. Martin. “Professional Codes of Conduct and Computer Ethics Education.” Computers & Society 20 (June 1990): 18-29. * Marx, Gary T. “An Ethics for the New Surveillance.” Computers and Society (June 1998): 1-2. Marx, Gary T. “An Ethics for the New Surveillance.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 39-67. Toronto, Canada: University of Toronto Press, 1999. Mowshowitz, Abbe. Conquest of Will: Information Processing in Human Affairs. Reading, MA: Addison-Wesley, 1976. Mowshowitz, Abbe. “Information Systems and Ethical Judgment.” In Proceedings of the IFIP 2nd NCC Conference, Baden, Austria, June 1979. Amsterdam, The Netherlands: North-Holland Publishing, 1984. Parent, William A. “Privacy, Morality, and the Law.” In Ethical Issues in the Use of Computers, eds. D. Johnson and J. Snapper, 201-14. Belmont, CA: Wadsworth Publishers, 1985. Parent, William A. “Privacy, Morality, and the Law.” Philosophy and Public Affairs 12 (1983): 269-88. Parker, Donn B. Ethical Conflicts in Computer Science and Technology. Arlington, VA: AFIPS Press, 1979. Parker, Donn B. “The Ethics of Voluntary and Involuntary Disclosure of Company- Private Information.” In The Information Web, ed. C. Gould, 259-68. San Francisco, CA: Westview Press, 1989. Parker, Donn B. “Rules of Ethics in Information Processing.” Communications of the ACM 11 (March 1968): 198-201. Parker, Donn B., et al. Ethical Conflicts in Information and Computer Science, Technology, and Business. Wellesley, MA: QED Information Sciences, Inc., 1990. Pauli, Kevin P. “Ethical Decision-Making and Information Systems Management: The Effects of Moral Intensity, , and Moral Disengagement.” Ph.D. diss, The University of Nebraska-Lincoln, 2001. Rice, C.A., et al. “Methodological, Technical, and Ethical Issues of a Computerized Data System.” Journal of Family Practitioners 10 (1980): 1061-7. Roberts, P. and J. Webber. “Virtuous Hackers: Developing Ethical Sensitivity in a Community of Practice.” Australian Journal of Information Systems 9 (May 2002): 172-77.

20 Rubin, Richard. “Moral Distancing and the Use of Information Technologies: The Seven Temptations.” In Ethics in the Computer Age: Conference Proceedings, ed. Joseph Migga Kizza, 151-5. New York: Association for Computing Machinery, 1994. Severson, Richard J. The Principles of Information Ethics. Sharpe, 1997. Spafford, Eugene H. “Are Computer Hacker Break-ins Ethical?” Journal of Systems and Software 17 (January 1992): 41-7. Spafford, Eugene H. “Is a Computer Break-In Ever Ethical?” Information Technology Quarterly 9 (1990): 9-14. Spinello, Richard A. Case Studies in Information and Computer Ethics. Prentice-Hall, 1997. Spinello, Richard A. Ethical Aspects of Information Technology. Englewood Cliffs, NJ: Prentice-Hall, 1995. Stichler, Richard N. and Robert Hauptman, eds. Ethics, Information and Technology: Readings. McFarland, 1997. * Tavani, Herman T. “A Computer Ethics Bibliography.” Computers and Society (December 1995): 9-38. Trubow, George B. “Microcomputers: Legal Approaches and Ethical Implications.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 23-9. New York: Academic Press, 1980. Unger, Stephen H. Controlling Technology: Ethics and the Responsible Engineer. New York: Holt, Rinehart & Winston, 1982. Van den Hoven, M.J. Information Technology and Moral Philosophy: Philosophical Explorations in Computer Ethics. Rotterdam, The Netherlands: Ridderprint BV, 1995. Weckert, John and Douglas Adeney. Computer and Information Ethics. Greenwood, 1997. Whitby, Blay. “The Virtual Sky is Not the Limit: Ethics in VR.” Intelligent Tutoring Media (February 1993): 23-8. Williams, Mary B. “Ethical Issues in Computing: Work, Privacy, and Justice.” In Computers, Ethics, and Society, eds. M. David Ermann, et al., 3-19. New York: Oxford University Press, 1997.

Democracy

Agre, Philip E. “Supporting the Intellectual Life of a Democratic Society.” Ethics and Information Technology 3 (2001): 289-98. Anzovin, Steven. “Digital Democracy.” Compute! 14 (November 1991): 24. Arterton, F. Christopher. Teledemocracy: Can Technology Protect Democracy? Beverley Hills, CA: Sage Publications, 1987. Bailie, Mashoed and Dwayne Winseck, eds. Democratizing Communication? Comparative Perspectives on Information and Power. Cresskill, NJ: Hampton Press, 1997. Baldwin, Deborah. “Push-Button Democracy.” Utne Reader 53 (September 1992): 19-22. Burnham, David. The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics, and Our Democratic Process. New York: Random House, 1983. Firestone, Charles M. ed. Democracy in the Information Age: Background Readings. Aspen Institute, 1994. Gandy, Oscar H., Jr. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview Press, 1993. Gandy, Oscar H., Jr. “Information Privacy and the Crisis of Control.” In Communication: For and Against Democracy, eds. Mark Raboy and Peter Bruck. New York: Black Rose Books, 1989. Gandy, Oscar H. “The Surveillance Society: Information Technology and Bureaucratic

21 Social Control.” Journal of Communication 39 (1989): 69. Gandy, Oscar H., Jr. and Todd Kristel. “Conditioning Consent: In Search of the Social Locations of Privacy Orientations in the Age of Surveillance.” In Developments of Communications and Democracy: Main Papers and Abstracts of the 17th IAMCR Conference, ed. S. Splichal. Ljubljana: International Association for Mass Communication Research, 1990. Gandy, Oscar H., Jr. and C. Simmons. “Technology, Privacy and the Democratic Process.” Critical Studies in Mass Communications 3 (June 1986): 155-68. Grossman, Lawrence K. The Electronic Republic: Reshaping Democracy in the Information Age. Viking, 1995. Hedges, Chris. “Serbian Response to Tyranny: Take the Movement to the Web.” New York Times, December 8, 1996. Johnson, Deborah G. “Is the Global Information Infrastructure a Democratic Technology?” In Cyberethics: Social & Moral Issues in the Computer Age, eds. Robert M. Baird, et al., 304-18. Amherst, NY: Prometheus Books, 2000. Marx, Gary T. “The Iron Fist and the Velvet Glove: Totalitarian Potentials Within Democratic Structures.” In The Social Fabric: Dimensions and Issues, 135-62. Beverly Hills, CA: Sage, 1986. Meeks, Brock N. “Better Democracy Through Technology.” In Cyberethics: Social & Moral Issues in the Computer Age, eds. Robert M. Baird, et al., 288-94. Amherst, NY: Prometheus Books, 2000. Oz, Effy. “Electronic Democracy.” In Ethics for the Information Age, 301-3. Burr Ridge, IL: Business and Educational Technologies, 1994. Raab, Charles D. “The Governance of Data Protection.” In Modern Governance, ed. J. Kooiman. London: Sage, 1993. Raab, Charles D. “Privacy, Democracy, Information.” In The Governance of Cyberspace, ed. Brian D. Loader. New York: Routledge, 1997. Rheingold, Howard. “Disinformacracy.” In The Virtual Community: Homesteading on the Electronic Frontier. New York: Harper Collins Press, 1994. Rheingold, Howard. “Electronic Democracy.” Whole Earth Review 7 (1991): 4-11. Saco, Diana. “Cyberspace and Democracy: Spaces and Bodies in the Age of the Internet.” Ph.D. diss., University of Minnesota, 1998. Schwartz, Paul M. “Privacy and Democracy in Cyberspace.” Vanderbilt Law Review 52 (1999): 1609, 1656-7. United Nations. Economic and Social Council. Commission on Human Rights. Human Rights and Scientific and Technological Developments. Uses of Electronics Which May Affect the Rights of the Person and the Limits Which Should Be Placed on Such Uses in a Democratic Society. 1974. Van Meurs, Philip Cornelus. “Technology, Society and Democracy: The Social Impact of, and Democratic Control over Technology, with Special Reference to Information Technology and Data Protection.” Ph.D. London School of Economics and Political Science, 1990. Westin, Alan F., ed. Information Technology in a Democracy. Cambridge, MA: Harvard University Press, 1971. Westin, Alan F. and Michael A. Baker. Databanks in a Free Society: Computers, Record-Keeping, and Privacy. Washington, DC: Quadrangle Books, 1972. Winner, Langdon. “A Victory for Computer Populism.” Technology Review (May-June 1991): 66. Winner, Langdon, ed. Democracy in a Technological Society. Kluwer Academic Press, 1992.

Big Brother

22 American Civil Liberties Union. Big Brother in the Wires: Wiretapping in the Digital Age. March 1998. Barr, R. “Lack of Computer Security Held a Boon to Big Brothers.” Electronic News (February 13, 1968): 35. “Big Brother is Listening.” New York Times, June 21, 1969, p. 26. “'Big Brother' May Be a Computer.” Los Angeles Times, October 8, 1967, p. G7. Davies, Simon. “Spanners in the Works: How the Privacy Movement is Adapting to the Challenge of Big Brother.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 244-61. Toronto, Canada: University of Toronto Press, 1999. Boeth, Richard. “Hello Computers, Goodbye Privacy; or, 1984 is Just Around the Corner.” Cosmopolitan 166 (June 1969): 116-9, 170-1. Caldwell, B. “Big Brother is Watching.” Informationweek 275 (June 18, 1990): 34-36. Carlson, Margaret. “The Case for a National ID Card: Big Brother Already Knows Where You Live—Why Not Let Him Make You Safer?” Time Magazine, January 21, 2002. Carter, L.J. “National Data Bank: Its Advocates Try to Erase Big Brother Image.” Science 163 (January 10, 1969): 160-2. Chaum, David. “Security Without Identification: Big Brother Takes Over Through New Identification System.” Informatie 29 (1987): 213-27. Chaum, David. “Security Without Identification: Transactions Systems to Make Big Brother Obsolete.” Communications of the ACM 28 (October 1985): 1030-44. Dority, Barbara. “A Brave New World—or a Technological Nightmare? Big Brother is Watching.” The Humanist, 61 (May 1, 2001). Earley, Pete. “Big Brother Makes a Date.” San Francisco Examiner, October 12, 1986. Elmer-DeWitt, Philip. “Peddling Big Brother.” Time (June 24, 1991): 62. Ferryman, J. “People and Vehicle Tracking: Big Brother Looking After You.” Measurement & Control 35 (September 2002): 197-203. Field, Anne R., et al. “Big Brother Inc. May Be Closer Than You Think.” Business Week (February 9, 1987): 84-6. Greenberg, Lawrence T. and S.E. Goodman. “Is Big Brother Hanging by His Bootstraps?” Communications of the ACM 39 (July 1996): 11-15. “Has Big Brother Got Your Number?” Senior Scholastic (Teacher’s Edition) 98 (March 29, 1971): 12-6. Hirsch, Phil. “Computer Systems and the Issue of Privacy: How Far Away is 1984?” Datamation (December 1972): 90-3. Madsen, Wayne. “Smart Cards: Big Brother on a Chip.” Information Systems Security 5 (Fall 1996): 10-20. Maiden, A.N. “Watching Big Brother.” Time (February 11, 1991): 40-6. Markoff, John. “Big Brother and the Computer Age.” New York Times, May 6, 1993, D1, D7. Markoff, John. “U.S. as Big Brother of Computer Age.” New York Times, May 6, 1993, p. D1. Martin, Shannon E. Bits, Bytes, and Big Brother: Federal Information Control in the Technological Age. Praeger, 1995. Orwell, George. 1984. New York: Harcourt Brace Jovanovich, 1949. “Plans to Block a Future Big Brother: HEW Report on Records, Computers, and the Rights of Citizens.” Science News 104 (August 4, 1973): 70. Power, Carol. “Big Brother is Watching and Analyzing.” Irish Times, September 7, 2001. Sanderson, M. “Big Brother’s Day at the Office Email Monitoring.” Computer Fraud & Security (December 2000): 9-11. Schulman, Miriam. “Little Brother is Watching You.” In Cyberethics: Social & Moral

23 Issues in the Computer Age, eds. Robert M. Baird, et al., 155-61. Amherst, NY: Prometheus Books, 2000. Sesser, S.N. “Big Brother Keeps Tabs on Insurance Buyers.” The New Republic (April 27, 1968): 11-2. Simpson, Glenn R. “Big Brother-in-Law: If the FBI Hopes to Get the Goods on You, It May Ask ChoicePoint.” Wall Street Journal, April 13, 2001, p. A1. Solomon, T. “Personal Privacy and the ‘1984’ Syndrome.” Western New England Law Review 7 (1985): 753-90. Streitfeld, David and Charles Piller. “Big Brother Finds an Ally in Once-Wary High Tech.” Los Angeles Times, January 19, 2002, p. A1. Thompson, Anthony A. Big Brother in Britain Today. London: Michael Joseph, 1970. Tobin, R.L. “1984 Minus Sixteen and Counting.” Saturday Review 51 (April 13, 1968): 77-8. Wallich, H.C. “Big Brother Computer.” Newsweek (July 25, 1966): 80. Will, Ian. The Big Brother Society. London: Harrap, 1983. Winer, J.M. “Regulating the Free Flow of Information: A Privacy Czar as the Ultimate Big Brother.” John Marshall Journal of Computer & Information Law 19 (Fall 2000): 37-70. “Your Uncle Sam a Big Brother?” Electronic News (March 4, 1968): 2.

Copyright

Cohen, Julie E. “A Right to Read Anonymously: A Closer Look at ‘Copyright Management’ in Cyberspace.” Connecticut Law Review 28 (1996): 981-1019. Fisher, Lawrence M. “Xerox Sues Apple Computer Over Macintosh Copyright.” The New York Times, December 15, 1989, D1. Gordon, Robert L. “Program Writers Get Expanded Protection.” Computer Careers News 2 (January 12, 1981): 3. “Microsoft Corp.: Raid at Westinghouse Unit Yields Unauthorized Copies.” The Wall Street Journal, May 7, 1991, p. B4. Rosch, Winn L. “The Look-and-Feel Issue: The Copyright Law on Trial.” PC Magazine (May 26, 1987): 157-64. Samuelson, Pamela. “Why the Look and Feel of Software User Interfaces Should Not Be Protected by Copyright Law.” Communications of the ACM 32 (May 1989): 563- 72. Scaletta, Phillip J., Jr. “The Legal Ramifications of the Computer Age: Part 2— Contracts, Patents, and Copyrights.” Data Management (November 1970): 20-2.

Workplace

“Addressing the New Hazards of the High Technology Workplace.” Harvard Law Review 104 (1991): 1898-1916. Ahrens, Michele P. “Liability Waiting to Strike: Violation of an Employee’s Privacy Through Disclosure of Records.” Loyola of Los Angeles Law Review 14 (1980-1): 335-404. Attewell, Paul. “Big Brother in the Sweatshop: Computer Surveillance in the Automated Sweatshop.” In Computerization and Controversy, eds. C. Dunlop and Rob Kling, 236-56. San Diego, CA: Academic Press, 1991. Bible, Jon D. and Darien A. McWhirter. Privacy in the Workplace: A Guide for Human Resource Managers. New York: Quorum Books, 1990. Brenkert, George. “Privacy, Polygraphs, and Work.” Professional Ethics Journal 1 (Fall 1981): 19-35. Chen, Jeng-Chung. “Trust and Privacy in Electronic Monitoring Workplaces.” Ph.D.

24 diss, University of Hawaii, 2001. Clement, Andrew. “Computers at Work: Empowering Action by Low-Level Users.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 383-406. San Diego: Academic Press, 1996. Clement, Andrew. “Office Automation and the Technical Control of Information Workers.” In The Political Economy of Information, ed. Vincent Mosco and Janet Wasko. Madison, WI: University of Wisconsin Press, 1988. Crush, Jonathan. “Power and Surveillance in the South African Gold Mines.” Journal of South African Studies 18 (1992): 825-44. Donnelly, Harrison. “Privacy in the Workplace.” Editorian Research Reports (March 21, 1986): 207-24. Duff, Karl J. “A Renewed Employee Right to Privacy.” Labor Law Review 34 (December 1983): 747-62. Duffy, D.J. “Privacy vs. Disclosure: Balancing Employee and Employer Rights.” Employee Relations Law Journal 7 (Spring 1982): 594-609. Duffy, J., et al. “Big Brother in the Workplace: Privacy Rights Versus Employer Needs.” Industrial Relations Law Journal 9 (1987): 30-56. “Electronic Monitoring in the Workplace: The Need for Standards.” George Washington Law Review 52 (March 1984): 438-58. Ezorsky, G., ed. Moral Rights in the Workplace. New York: State University of New York Press, 1987. Fisher, Kimball and Mareen Duncan Fisher. The Distributed Mind: Achieving High Performance Through the Collective Intelligence of Knowledge Work Teams. AMACOM, 1997. Flynn, Laurie. “PC Software Bosses Turn into Snoops.” Washington Post, June 28, 1993, p. WBIZ21. Garson, Barbara. The Electronic Sweatshop: How Computers Are Transforming the Office of the Future into the Factory of the Past. New York: Simon & Schuster, 1988. Gerhardt-Powals, Jill and Matthew H. Powals. “Downloading Liability: Employers Could Face Harassment Claims Arising from Internet Use.” New Jersey Law Journal (September 1, 1997): 33. Guernsey, Lisa. “The Web: New Ticket to a Pink Slip.” New York Times, December 16, 1999, p. E1. Guiliano, Vincent E. “The Mechanization of Office Work.” Scientific American (1982). Hampton, J. “Big Brother is Watching You: Construction Worker Monitoring.” Construction Computing (April 2001): 7-9. Hanchett, Doug. “Computer Goof-offs Beware: The Boss May Be Watching.” Boston Herald, August 6, 2000. Horowitz, Tony. “Mr. Edens Profits from Watching His Workers’ Every Move.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 322-5. San Diego: Academic Press, 1996. “How Security Does Pay Off.” The Office (September 1971): 22. Joyner, Tammy. “Big Boss is Watching.” Atlanta Constitution, July 25, 2001. Koepp, Stephen. “The Boss That Never Blinks.” Time (July 28, 1986): 46-7. * Introna, Lucas D. “Workplace Surveillance, Privacy, and .” Computers and Society (December 2000): 33-9. Irving, R.H., et al. “Computerized Performance Monitoring Systems: Use and Abuse.” Communications of the ACM 29 (August 1986): 794-801. Irwin, Neil. “Security Software Spies on Workers: SilentRunner Finds Unusual Traffic.” Washington Post, August 17, 2001. Jackson, L. “Office Automation Provides Opportunity to Examine What Workers Actually Do.” Industrial Engineering 16 (1984): 90-3. Kling, Rob. “Computerization at Work.” In Computerization and Controversy: Value

25 Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 278-308. San Diego: Academic Press, 1996. Knights, David and Andrew Sturdey. “New Technology and the Self-Disciplined Worker in the Insurance Industry.” In Deciphering Science and Technology, eds. Ian Varcoe, et al. London, UK: MacMillan, 1990. * Lane, Frederick S. The Naked Employee: How Technology is Compromising Workplace Privacy. New York: AMACOM, 2003. Lewis, Diane E. “Devices Keep Close Watch on Workplace.” Boston Globe, June 24, 2001. Marx, Gary T. and Sanford Sheriden. “Corporations that Spy on Their Employees: Technological Monitoring of Workers is Widespread.” Business and Society Review (Winter 1987): 32-7. Marx, Gary T. and Sanford Sheriden. “Monitoring on the Job: How to Protect Privacy as Well as Property.” Technology Review (November-December 1986): 63-72. McLaughlin, Marsha. “An Attempt to Tether Electronic Workplace.” New England Business 11 (1989): 13-6. Menard, A.P. and A.K. Morrill. “The Employer and the Law of Privacy in the Workplace: The U.S. Model to Date.” North Carolina Journal of International Law and Commercial Regulation 9 (Winter 1983): 93-115. Miller, S.M. “Is Big Brother Watching? Workplace Privacy.” Office Solutions 18 (May 2001): 14-16. Nussbaum, Karen. “Computer Monitoring: A Threat to the Right of Privacy?” In Ethical Issues in Information Systems, eds. Roy Dejoie, et al., 134-9. Boston: Boyd & Fraser, 1991. Nussbaum, Karen. “Workers Under Surveillance.” Computerworld 26 (January 6, 1992). Oz, Effy. “Monitoring in the Workplace.” In Ethics for the Information Age, 62-8. Burr Ridge, IL: Business and Educational Technologies, 1994. Pekala, Nancy. “High-Tech, High-Touch Screening Sifts Out Quality Applicants.” Journal of Property Management 66 (March 1, 2001). Perin, Constance. “The Moral Fabric of the Office: Panopticon Discourse and Schedule Flexibilities.” Research in the Sociology of (1991): 241-68. Powell, E. “Privacy Issues in the Workplace.” Office Solutions 19 (January 2002): 38- 41. Sewell, Graham and Barry Wilkinson. “Someone to Watch Over Me: Surveillance, Discipline, and the Just-in-Time Labour Process.” Sociology 26 (1992): 271-89. Thompson, E.P. “Time, Work-Discipline, and Industrial Capitalism.” Past and Present 38 (1967). Tye, Larry. “Technology Tests Privacy in the Workplace.” Boston Globe, September 6, 1993, p. 13. Vu, Hao-Nhien. “Preventing Internet-Based Sexual Harassment in the Workplace.” L.A. Daily Journal (October 3, 1997): 5. Washington, Pearl. “Watching the Work Place.” Washington Post, September 2, 1984. Wilborn, S. Elizabeth. “Revisiting the Public-Private Distinction: Employee Monitoring in the Workplace.” Georgia Law Review 32 (1998): 825-46. Winner, Langdon. “Electronic Office: Playpen or Prison.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 83-4. San Diego: Academic Press, 1996. Zuboff, Shoshana. “New Worlds of Computer-Mediated Work.” Harvard Business Review 60 (1982): 142-52. Zweig, David. “Where is the Line Between Benign and Intrusive? An Examination of Psychological Barriers to the Acceptance of Awareness Monitoring Technologies.”

26 Ph.D. diss., University of Waterloo, 2001.

Cybersex

Bandler, James. “Office Porn Cases Raise Issues of Privacy, Protection.” Boston Globe, June 24, 1999. Branwyn, Gareth. “Compu-Sex: Erotica for Cybernauts.” South-Atlantic Quarterly 92 (Fall 1993): 784. Dvorak, John C. “America, Are You Ready for Simulated Sex and Virtual Reality?” PC Computing (May 1992): 78. Elmer-DeWitt, Philip and William Dowell. “Fire Storm on the Computer Nets: A New Study of Cyberporn, Reported in a Time Cover Story, Sparks Controversy.” Time (July 24, 1995): 57. Finkelstein, Katherine Eban. “Deal Proposed for Defendant in Net Sex Case.” New York Times, November 22, 2002, p. B1. Fox, Butterfield. “Pornography Cited in Ouster of Harvard Divinity School Dean.” The New York Times, May 20, 1999, p. A21. Gregorian, Dareh. “Same Judge OK’d for Cybersex Trial.” New York Post, October 20, 2000, p. 14. Hamblett, Mark. “Shield Law: Consent Issues Arise in ‘Cybersex’ Appeal.” New York Law Journal (February 3, 1999): 1. Italiano, Laura. “Cyberfiend Sex Conviction Tossed.” New York Post, December 22, 1999, p. 5. Italiano, Laura. “Ollie Beats Rap in Cybersex Case.” New York Post, November 2, 2001, p. 21. Katz, Al. “Privacy and Pornography: Stanley v. Georgia.” Supreme Court Review (1969): 203-16. Lawrence, J.M. “Harvard Cyberporn Users Get a Shock.” The Boston Herald, February 19, 1995, p. 1. Lewis, Peter H. “The FBI Sting Operation on Child Pornography Raises Questions About Encryption.” New York Times, September 25, 1995. McGraw, David K. “Sexual Harrassment in Cyberspace: The Problem of Unwelcome Email.” Rutgers Computer & Technology Law Journal 21 (1995): 491-518. McQuillan, Alice, et al. “Cybersex Suspect an Eerie Charmer.” Daily News, December 11, 1996, p. 8. Pfeifer, Stuart. “O.C. to Track Sex Criminals with GPS Probation.” Los Angeles Times, December 23, 2001. Platt, Charles. Anarchy Online: Net Sex, Net Crime. Harper, 1997. Rimm, Martin. “Marketing Pornography on the Information Superhighway.” Georgia Law Journal 83 (1995): 1849-67. Rohde, David. “Call for Sex-Abuse Trial is Said to Harm Rape Shield Law.” New York Times, December 23, 1999, p. B3. Rohde, David. “Ex-Student to Get New Trial in Internet Sex-Assault Case.” New York Times, December 22, 1999, p. B3. Ross, Barbara. “Trial Tests Cybersex Privacy.” Daily News, August 17, 1997, p. 8. Ross, Barbara and Dave Goldiner. “Cybersex Conviction: Grad Student Guilty of Kidnap, Sex Abuse.” Daily News, April 16, 1998, p. 8. Ross, Barbara and Dave Goldiner. “Cybersex Testimony: Sure Torture Would End in Murder, Woman Says.” Daily News, March 18, 1998, p. 7. Shattuck, Roger. Forbidden Knowledge: From Prometheus to Pornography. Vu, Hao-Nhien. “Preventing Internet-Based Sexual Harassment in the Workplace.” L.A. Daily Journal (October 3, 1997): 5. Wallace, Jonathan D. and Mark Mangan. Sex, Laws, and Cyberspace. New York: Holt,

27 1996. Wing, K.R. “Constitutional Protection of Sexual Privacy in the 1980s: What is Big Brother Doing in the Bedroom?” American Journal of Public Health 76 (February 1986): 201-4. Winner, Langdon. “Cyberpornography.” Technology Review 97 (February 1994): 70. Zick, Timothy. “Congress, The Internet, and the Intractable Pornography Problem: The Child Online Protection Act of 1998.” Creighton Law Review 32 (1999): 1147-88.

Child Online Protection Act of 1998

Lewis, Peter H. “The FBI Sting Operation on Child Pornography Raises Questions About Encryption.” New York Times, September 25, 1995. Shields, Hannah and Mae Churchill. “Kids in the Computer.” The Progressive 38 (October 1974): 37-9. Zick, Timothy. “Congress, The Internet, and the Intractable Pornography Problem: The Child Online Protection Act of 1998.” Creighton Law Review 32 (1999): 1147-88.

Childcare & Daycare Monitoring

Hamilton, Tyler. “Candid Cameras: Child Care Centres are Experimenting with Web Cams That Let Parents Look in on Their Kids’ Activities Via Internet; It May Be Fun But Is It Right?” Toronto Star, March 4, 2002. Ryan, Patti. “Daycare Goes Live to Air Digital Technology and the Internet Let Working Parents Peek in on Their Kids.” Toronto Globe and Mail, May 25, 2001. Salkowski, Joe. “Child-Care Web Cams Put Focus on Trust.” Chicago Tribune, July 23, 2001.

Voting

Farmer, James, et al. “Cheating the Vote-Count System.” Datamation (May 1970): 76-80. Flannagan, P. “Computer-Aided Voting: Big Help or Big Brother?” Computer Decisions 60 (October 1988). Hammet, Jim. “Computer Mapping Helped Clinton Campaign Target Voters.” InfoWorld 14 (November 30, 1992): 24-7. Kassicieh, S., et al. “Security, Integrity, and Public Acceptance of Electronic Voting: Managing Elections in the 1990s.” Journal of System Management (December 1988): 6-10. Leonard, Jennifer, et al. “Vulnerable on All Counts: How Computerized Vote Tabulation Threatens the Integrity of Our Elections.” CPSR Newsletter 6 (Fall 1988): 12-8. Saltman, Roy E. “Accuracy, Integrity, and Security in Computerized Vote-Tallying.” Communications of the ACM 31 (October 1988): 1184-91. Saltman, Roy E. Effective Use of Computing Technology in Vote-Tallying. Gettysburg, MD: Institute for Computer Science and Technology, n.d. Schmidt, D.D. “Automatic Voter Registration: Efficient, Fair, Possible Now.” Whole Earth Review (Winter 1985): 82-3. Smith, G.W. and J. Debenham. “Intelligent Voting Systems: Using Computers for Choosing Our Leaders.” Futurist (September-October 1988): 38-42. Urken, Arnold. “Voting in a Computer Networking Environment.” In The Information Web, ed. C. Gould, 177-206. San Francisco, CA: Westview Press, 1989.

Elections

28

Frenkel, Karen A. “Computers and Elections.” Communications of the ACM 31 (1988): 1176-83. Garneau, George. “Computerized Reporting of Election Results.” Editor & Publisher 119 (March 1, 1986): 26-7. Neumann, Peter G. “Risks in Computerized Elections.” Communications of the ACM 33 (November 1990): 170. Nurmi, H., et al. “Secret Ballot Elections in Computer Networks.” Computers and Society 10 (1991): 553-60. Peterson, Ivars. “How to Steal an Election the Modern Way.” Science News 144 (October 30, 1993): 282-3. Segal, Edward. “Software Solutions: Choosing the Right Campaign Software.” Campaigns and Elections 12 (April 1992): 40-6. Tobe, Frank L. “Campaign and Computers.” Campaign and Elections 14 (June 1993): 64.

Web Cams

Hafner, Katherine M. “Where the Hall Monitor is a Webcam.” New York Times, February 27, 2003. Hamilton, Tyler. “Candid Cameras: Child Care Centres are Experimenting with Web Cams That Let Parents Look in on Their Kids’ Activities Via Internet; It May Be Fun But Is It Right?” Toronto Star, March 4, 2002. Salkowski, Joe. “Child-Care Web Cams Put Focus on Trust.” Chicago Tribune, July 23, 2001.

School Monitoring

Bjorhus, Jennifer. “Cameras on Campus: Big Brother at School?” Seattle Times, January 14, 1995. Hafner, Katherine M. “Where the Hall Monitor is a Webcam.” New York Times, February 27, 2003. Moore, Tina. “Fingerprint System Replaces Lunch Money in Pa. Schools.” Washington Post, February 25, 2001.

Record Linkage

Acheson, Ernest Donald, ed. Record Linkage in Medicine. London: E. and S. Livingston, 1968. Nelson, Dawn D. “Record Linkage v. Confidentiality from the Perspective of the U.S. Bureau of Census.” In Protection of Privacy, Automatic Data Processing and Progress in Statistical Documentation, 325-36. Brussels, Belgium: Office of Official Publications of the European Communities, 1987. Newcombe, H.B. and J.M. Kennedy. “Record Linkage: Making Maximum Use of the Discriminating Power of Identifying Information.” Communications of the ACM 5 (November 1962): 563-6. Newcombe, H.B., et al. “Automatic Linking of Vital Records.” Science 130 (1959): 954-9. Steinberg, J. “Data-Linkage Problems and Solutions.” In Data Bases, Computers, and the Social Sciences, ed. R.L. Bisco. New York: Wiley-Interscience, 1970. Steinberg, J. “Some Aspects of Statistical Data Linkage for Individuals.” In Data Bases, Computers, and the Social Sciences, ed. R.L. Bisco. New York: Wiley- Interscience, 1970.

29

Internal Revenue Service

Baker, B.R.C., et al. “Big Brother 1994: Marketing Data and the IRS.” Journal of Public Policy and Marketing 5 (1988): 227-42. Barr, Stephen. “Probe Finds IRS Workers Were ‘Browsing’ in Files.” The Washington Post, August 3, 1993, p. A1. “IRS Computer Data Bank Searches: An Infringement of the Fourth Amendment Search and Seizure Clause.” Santa Clara Law Review 25 (Winter 1985): 153-89. Messik, R. “IRS Computer Bank Searches: An Infringement on the Fourth Amendment Search and Seizure Clause.” Santa Clara Law Review 25 (1985): 153- 89. Ottenburg, Miriam. “Electronic Tax Fraud Investigated at IRS.” Evening Star (Washington, DC), June 24, 1970, p. A-1. Powell, Eileen Alt. “Wider Use of IRS Records Sought, Riling Rights Groups, Tax Experts.” Wall Street Journal 200 (September 8, 1982): 35. United States. Congress. Office of Technology Assessment. A Preliminary Analysis of the IRS Tax Administration System. PB-273143. Washington, DC: GPO, 1977.

Intelligent Highway

Agre, Philip E. and Christine A. Harbs. “Social Choice About Privacy: Intelligent Vehicle-Highway Systems in the United States.” Information, Technology, and People 7 (1994): 63-90. Alpert, Sheri. “Privacy and Intelligent Highway: Finding the Right of Way.” Santa Clara Computer and High Technology Law Journal 11 (1995). Betts, Mitch. “Driver Privacy on the Way?” Computerworld (February 28, 1994): 29. Clymer, Adam. “Bay Area Traffic Tracking Creates Concern for Privacy.” New York Times, August 26, 2002. Garfinkel, Simson L. “Someday Smart Roads May Watch Us Too Closely.” Cleveland Plain Dealer, May 8, 1995. Glancy, Dorothy J., ed. Privacy and Intelligent Transportation Systems: Legal Research Reports. Santa Clara, CA: Santa Clara Legal Research Project on Privacy and ITS, March 1995. Halpern, S.W. “The Traffic in Souls: Privacy Interests and the Intelligent Vehicle Highway Systems.” Santa Clara Computer and High Technology Law Journal 11 (1995). Keith, John P. “High Tech Can Reduce Traffic.” Newsday, February 23, 1987. Lyall, Sarah. “Day 1 of London’s Pay-to-Enter Plan for Cars Goes Smoothly.” New York Times, February 18, 2003, p. A2. Sipress, Alan. “‘Big Brother’ Could Soon Ride Along in Back Seat; Traffic Monitoring Stirs Privacy Fears.” Washington Post, October 8, 2000. Reiman, J. “Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future.” Santa Clara Computer and High Technology Law Journal 11 (1995): 27-44. Wald, Matthew L. “Car ‘Black Box’ Reveals Details from Accidents.” New York Times, May 30, 1999. Weld, John. “Would You Buy a Shrink Wrapped Automobile?” Monitor (September- November 1986).

Sweden

Anderson, Stanley V. “Public Access to Government Files in Sweden.” American

30 Journal of Comparative Law 21 (1973): 419-73. Anderson, Stanley V. “Some Essential Characteristics of an Effective Public Records Law: Sweden and the United States.” Administrative Law Review 25 (1973): 329-33. Bing, Jon. “Transnational Data Flows and the Scandinavian Data Protection Legislation.” Scandinavian Studies in Law 24 (1980): 65-96. Corell, Simon and Jens Danielsson. “The Swedish Data Act and Health Care Data Usage.” In Medinfo 83, eds. Jan H. Van Bemmel, et al., 973-6. Amsterdam, The Netherlands: North Holland, 1983. Dalenius, Tore. “Data Protection Legislation in Sweden: A Statistician’s Perspective.” Journal of the Royal Statistical Society, Series A (General) 142 (Part 3, 1979): 285- 98. Dalenius, Tore. Swedish Data Act and Statistical Data. Confidentiality in Surveys Report No. 22. April 5, 1977. NBS# 77146019. Box 674, Folder 9. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Danielsson, Jens. “Experiences Gained by the Swedish Data Act Regarding Health- Care Data Usage Integrity.” In Data Protection in Health Information Systems: Where Do We Stand? eds. G. Griesser, et al., 27-38. Amsterdam, The Netherlands: Elsevier Science Publishers B.V., 1983. Flaherty, David H. Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States. Chapel Hill: The University of North Carolina Press, 1989. Freese, Jan. The Future of Data Protection. Voorburg: Embassy of Sweden and Netherlands Central Bureau of Statistics, 1987. Freese, Jan. International Data Flow. Lund: Studentlitteratur, 1979. Freese, Jan. “The Right to Be Alone in Sweden.” Transnational Data Report 6 (December 1983): 447-9. Freese, Jan. “The Swedish Data Act.” Current Sweden 294 (1982): 2-9. Hafli, T. “Transborder Dataflow: Scandinavian Solution.” Information Privacy 1 (1979): 326-30. Nisenoff, Norman, et al. “The Privacy of Computerized Records: The Swedish Experience and Possible U.S. Policy Impacts.” Information Processing and Management 15 (1979): 205-11. Persson, Gert. “Computerized Personal Registers and the Protection of Privacy.” Current Sweden 344 (February 1986): 1-10. Peterson, Hans and Don Fenna. “Medical Informatics and Privacy Legislation in Sweden.” Biosciences Communications 2 (1976): 306-12. Seipel, Peter. Computing Law: Perspectives on a New Legal Discipline. Stockholm, Sweden: LiberFörlag, 1977. Solarz, Arthur. Computer Technology and Computer Crime. BRA Report 8. Stockholm, Sweden: National Swedish Council for Crime Prevention, 1981. Stromholm, Stig. Right of Privacy and Rights of Personality, A Comparative Study. Stockholm, Sweden: P.A. Norstedt & Soners Forlag, 1967. Sweden. Commission on New Information Technology. New Views: Computers and New Media—Anxiety and Hopes. Stockholm, Sweden: The Commission on New Information Technology, 1979. Sweden. Commission on Publicity and Secrecy of Official Documents. Computers and Privacy. Stockholm, Sweden: Ministry of Justice, 1972. Sweden. Ministry of Defence. The Vulnerability of the Computerized Society: Considerations and Proposals. Stockholm, Sweden: LiberFörlag, 1979. Sweden, Ministry of Defence. The Vulnerable Computer Society. Stockholm, Sweden: Secretariat for National Security Policy and Long-Range Defence Planning, Ministry of Defence, 1976.

31 Vinge, Per Gunnar. Swedish Data Act. Stockholm: The Federation of Swedish Industries, 1974. Wicklein, John. “How Sweden Keeps Its Computers Honest.” The Progressive 44 (November 1980): 34-8.

France

Chamoux, Jean-Pierre and Françoise Chamoux. “French Data Protection: The First Five Years.” Transnational Data Report 7 (April-May 1984): 163-6. Echikson, W. “French Risk It All On a Smart Card.” Boston Globe, February 28, 1994. Flaherty, David H. Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States. Chapel Hill: The University of North Carolina Press, 1989. Joinet, Louis. “French Law in Relation to Information Privacy.” In Transnational Data Regulations: The Realities, 20-7. Wellesley, MA: Online Conferences, Ltd., 1979. Maisl, Herbert. “Legal Aspects of Data Flows Between Public Agencies in France.” Computer Networks 3 (1979): 199-204. Nugter, A.C.M. Transborder Flow of Personal Data within the EC: A Comparative Analysis of the Privacy Statutes of the Federal Republic of Germany, France, the United Kingdom, and the Netherlands. Kluwer, 1990. Pipe, Russell. A Business Guide to Privacy and Data Protection Legislation. Paris, France: ICC Publishing, 1981. Wagner, Wenceslas J. “The Development of the Theory of the Right to Privacy in France.” Washington Quarterly Law Review (1971): 45-69. Wagner, Wenceslas J. “Photography and the Right to Privacy: The French and American Approaches.” Catholic Lawyer 25 (1980): 195-227. Wagner, Wenceslas J. “The Right to One’s Own Likeness in French Law.” Indiana Law Journal 46 (1970): 1-36.

Germany

Andrews, Edmund L. “U.S. Restrictions on Exports Aid German Software Maker.” New York Times, April 7, 1997, p. D1. * Black, Edwin. IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation. New York: Crown Publishers, 2001. Bull, Hans Peter. “Regulation of Transborder Data Flow Under the German Data Act.” Transnational Data Report 4 (1981): 13-4. Carr, James G. “Wiretapping in West Germany.” The American Journal of Comparative Law 29 (1981): 607-46. Data Protection in the Federal Republic of Germany. Bulletin 1. Bonn, West Germany, January 11, 1980. Flaherty, David H. Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States. Chapel Hill: The University of North Carolina Press, 1989. “German Federal Data Protection Act of 1977: Protecting the Right to Privacy?” Boston College International and Comparative Law Review 6 (Winter 1983): 243-71. Hogrebe, Edmund F.M. “Second Look at Implementing the German Data Protection Act.” Transnational Data Report 1 (1978): 9-12. Mayer, Milton. They Thought They Were Free: The Germans, 1933-1945. Chicago, IL; University of Chicago Press, 1955. Nugter, A.C.M. Transborder Flow of Personal Data within the EC: A Comparative Analysis of the Privacy Statutes of the Federal Republic of Germany, France, the

32 United Kingdom, and the Netherlands. Kluwer, 1990. Oliver, P. and R. von Borries. “Data Protection and Censuses Under the West German Constitution.” Public Law (Summer 1984): 199-206. “The Reform of West German Data Protection Law as a Necessary Correlate to Improving Domestic Security.” Columbia Journal of Transnational Law 24 (1986): 597-621. Riccardi, J. Lee. “The German Data Protection Act of 1977: Protecting the Right to Privacy?” Boston College International and Comparative Law Review 6 (Winter 1983): 243-71. Schwartz, Paul M. “The Computer in German and American Constitutional Law: Toward an American Right of Information Self-Determination.” American Journal of Comparative Law 37 (1989): 675-701. Sokoll, G. “The Impact of the Privacy and Data Protection Legislation on the Efficiency of Health and Social Administration in the Federal Republic of Germany.” Ica Information 24 (July 1982): 51-61. Tye, Larry. “German System Puts Lid on Data.” Boston Globe, September 7, 1993, p. 1, 10-1. Wiesel, George. “INPOL: The West German Police Information System.” Police Studies 4 (1980): 22-35.

Canada

Auerbach, Lewis. “Privacy and Canadian Telecommunications Regulation.” Telecommunications Policy (March 1983): 35-42. Baudot, J., et al. Personal Records: Procedures, Practices, and Problems. A Study for the Privacy and Computers Task Force. Ottawa, Canada: Department of Communication and Justice, 1971. Bazillion, Richard J. “The Effect of Access and Privacy Legislation on the Conduct of Scholarly Research in Canada.” Social Science Information Studies 4 (1984): 5-15. Bennett, Colin John. “Adequate Data Protection by the Year 2000: The Prospects for Privacy in Canada.” International Review of Law, Computers, and Technology 11 (1997): 79-93. Bennett, Colin John. “Arguments for the Standardization of Privacy Protection Policy: Canadian Initiatives and American International Responses.” Government Information Quarterly 14 (1997): 351-62. Bennett, Colin John. “The Formation of a Canadian Privacy Policy: The Art and Craft of Lesson Drawing.” Canadian Public Administration 33 (1990): 551-70. Bennett, Colin John. “Protecting Privacy on the Canadian Information Highway: Policy Developments and Regulatory Options.” Canadian Journal of Information and Library Science 21 (1996): 1-19. Bennett, Colin John. “Rules of the Road and Level Playing Fields: The Politics of Data Protection in the Canadian Private Sector.” International Review of Administrative Sciences 62 (1996): 479-92. Brown, Michael, et al. Privacy and Personal Data Protection: A Report on Personal Record-Keeping by the Ministries and Agencies of the Ontario Government. Toronto, Canada: Government of Ontario, March 1980. Brown, Timothy G. Government Secrecy, Individual Privacy, and the Public’s Right to Know: An Overview of the Ontario Law. Toronto, Ontario, Canada: Government of Ontario, November 1979. Canada. Information Highway Advisory Council. Connection, Community, Content: The Challenge of the Information Highway. Ottawa, Canada: Minister of Supply and Services, September 1995. Canadian Organization for Advancement of Computers in Health. Guidelines to

33 Promote the Confidentiality and Security of Automated Health Records. December 1979. Carroll, John Millar. “Snapshot 1971: How Canada Organizes Information About People.” In Proceedings of the Fall Joint Computer Conference, vol. 41, 445-52. Montvale, NJ: AFIPS Press, 1972. Carroll, John Millar and P.M. McLellan. “The Data Security Environment of Canadian Resource-Sharing Systems.” INFOR: Canadian Journal of Operational Research and Information Processing (March 1971): 58-67. Chaffey, Douglas Camp. “The Right to Privacy in Canada.” Political Science Quarterly 108 (1993): 117-32. Cohen, Stanley A. “Invasion of Privacy: Police and Electronic Surveillance in Canada.” McGill Law Journal 27 (November 1982): 619-75. Cohen, Stanley A. Invasion of Privacy: Police and Electronic Surveillance in Canada. Toronto: Carswell, 1983. Davis, Robert W. K. and Scott C. Hutchison. Computer Crime in Canada: An Introduction to Technological Crime and Related Legal Issues. Carswell, 1997. Flaherty, David H. The Origins and Development of Social Insurance Numbers in Canada. Ottawa, Canada: Department of Justice, 1981. Flaherty, David H. Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States. Chapel Hill: The University of North Carolina Press, 1989. Flaherty, David H. “Protecting Privacy in Police Information Systems: Data Protection in the Canadian Police Information Centre.” University of Toronto Law Journal 36 (Spring 1986): 116-48. Flaherty, David H. Research and Statistical Uses of Ontario Government Personal Data. Toronto, Canada: Government of Ontario, January 1979. Friesen, Ron J. “Privacy and Security of Data Banks.” In Proceedings of the Workshop on Mapping and Related Applications of Computers to Canadian Work, eds. J.E. Watkin and F.R. Lipsett, 149-60. Ottawa, Canada: National Research Council, 1977. Granger, M.P. “Records, Privacy, and Computer Security: A Doctor’s View.” Canadian Doctor (February 1981): 63-70. Humphreys, Edward H. Privacy in Jeopardy: Student Records in Canada. Research in Education Series/9. Toronto, Canada: The Ontario Institute for Studies in Education Press, 1980. Information and Privacy Commissioner (Ontario, Canada) and Registratiekamer (Netherlands). Privacy Enhancing Technologies: The Path to Anonymity. 2 vols. 1995. Jordan, F.J.E. Privacy, Computer Data Banks, Communications, and the Constitution: A Study by the Privacy and Computer Task Force. Ottawa, Canada: Department of Communications and Department of Justice. Katz, Kenneth. Regulation of Federal Data Banks: A Study for the Privacy and Computer Task Force. Ottawa, Canada: Department of Communication and Department of Justice, 1972. Laperrière, René. Privacy and the Private Sector: Protection of Privacy in the Federal Private Sector. Montreal, Canada: Groupe de Recherche Informatique et Droit, March 1994. Laperrière, René. “The ‘Quebec Model’ of Data Protection: A Compromise Between Laissez-Faire and Public Control in a Technological Era.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 182-96. Toronto, Canada: University of Toronto Press, 1999. Laperrière, René, et al. “The Transborder Flow of Personal Data from Canada: International and Comparative Law Issues.” Jurimetrics Journal 32 (Summer 1992): 547-69.

34 Lawson, Ian. Privacy and Free Enterprise: The Legal Protection of Personal Information in the Private Sector. Ottawa, Canada: Public Interest Advocacy Centre, 1992. Lawson, Ian. Privacy and the Information Highway: Regulatory Options for Canada. Ottawa, Canada: Industry Canada, 1995. Leadbeater, A. “Computer Matching and Individual Rights: A Canadian Perspective.” Government Information Quarterly 5 (1988): 191-4. Leighton, Barry. “Visions of Community Policing: Rhetoric and Reality in Canada.” Canadian Journal of Criminology 33 (1991): 493-5. Lipscombe, C.F. “Confidentiality and Automated Health Data Systems: The Position of the Canadian Psychiatric Association.” Canadian Journal of Psychiatry 25 (1980): 595-7. Lundell, E. Drake, Jr. “Canadian Study Sees Role for United Nations in Privacy Issue.” Computerworld (December 20, 1972): 2. McCamus, John D. “The Report of the Ontario Commission on Freedom of Information and Individual Privacy.” In Freedom of Information: Canadian Perspectives, ed. John D. McCamus, 306-27. Toronto: Butterworths, 1981. McCamus, John D., ed. Freedom of Information: Canadian Perspectives. Toronto, Canada: Butterworths, 1981. Nock, David A. “Star Wars: Aspects of the Social Construction of Citations in Anglo- Canadian Sociology.” Canadian Review of Sociology and Anthropology 29 (1992): 346-61. Osler, Andrew. “Warily into a Wired Up World: Social Implications of Canada’s Telidon System.” Maclean’s 94 (November 16, 1981): 8. Peladeau, Pierrot. “The Informational Privacy Challenge: The Technological Rule of Law.” In Human Rights in Canada: Into the 1990s and Beyond, 93-116. Ottawa, Canada: Human Rights Research and Education Centre, 1990. Prentice, M.R. The Information Revolution: Some Policy Perceptions. Ottawa, Canada: Department of Communications, May 8, 1979. The Privacy and Computer Task Force Report. Ottawa, Canada: Communications Canada, Information Services, 1972. Rankin, T. Murray. “Business Secrets Across International Borders: One Aspect of the Transborder Data Flow Debate.” Canadian Business Law Journal 10 (May 1985): 213-46. Rankin, T. Murray. Freedom of Information in Canada: Will the Doors Stay Shut? Ottawa, Canada: Canadian Bar Association, 1977. Rankin, T. Murray. “The New Access to Information and Privacy Act: A Critical Annotation.” Ottawa Law Review 15 (1983): 1-37. Rankin, T. Murray. “The New Canadian Access to Information Act and Privacy Act: A Critical Annotation.” Government Publications Review 10 (1983): 287-311. Rankin, T. Murray. “Privacy and Technology: A Canadian Perspective.” Alberta Law Review 22 (1984): 323-47. Rankin, T. Murray. Privacy and Technology: A Canadian Perspective. Cambridge, UK: Cambridge University, 1983. Robinson, Peter. “Legal Issues Raised by Transborder Data Flow.” Canada-U.S. Law Journal 11 (1986): 295-316. Robinson, Peter. “Transborder Dataflow: A Canadian Perspective.” Information Privacy 2 (March 1980): 55-9. Rowat, Donald C., ed. The Right to Know: Essays on Governmental Publicity and Public Access to Information. Ottawa, Canada: Department of Political Science, Carleton University, 1980. Science Council of Canada. Planning Now for an Information Society: Tomorrow is Too Late. Ottawa, Canada: Minister of Supply and Services, 1982.

35 Sharp, John M. Credit Reporting and Privacy: The Law in Canada and the USA. Toronto, Canada: Butterworths, 1970. Sharp, John M. Regulatory Models: A Study for the Privacy and Computers Task Force. Ottawa, Canada: Department of Communications and Department of Justice, 1972. Soloway, Susan. Public Access to Commercial Information in Government Files. Commission on Freedom of Information and Individual Privacy. Research Publication 17. Toronto, Canada: Government of Ontario, May 1980. Usprich, S.J. The Theory and Practice of Self-Regulation: A Study for the Privacy and Computer Task Force. Ottawa, Canada: Departments of Communication and Department of Justice, 1972. Vidmar, Neil. Privacy and Two-Way Cable Television: A Study of Canadian Public Opinion. Downsview, Ontario: Ontario Ministry of Transportation and Communications, 1983. Watt, J. David. The Law of Electronic Surveillance in Canada. Toronto, Canada: Carswell, 1979. Weisstaub, D.N. and C.C. Gotlieb. The Nature of Privacy: A Study by the Privacy and Computer Task Force. Ottawa, Canada: Department of Communications and Department of Justice, 1972. Westwood, John. “Life in the Privacy Trenches: Experiences of the British Columbia Civil Liberties Association.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 231-43. Toronto, Canada: University of Toronto Press, 1999. Williams, S.J. Legal Protection of Privacy: A Study for the Privacy and Computers Task Force. Ottawa, Canada: Departments of Communications and Justice.

Interactive Cable

“As Interactive Cable Enters, Does Privacy Go Out the Window?” Comm/Ent Law Journal 4 (Summer 1982): 781-97. Console, Stephen. “Cable Television Privacy Act: Protecting Privacy Interests from Emerging Cable TV Technology.” Federal Communications Law Journal 35 (1983): 71-94. Flaherty, David H. Protecting Privacy: Data Protection in Two-Way Cable Television Services. Downsview, Ontario, Canada: Ontario Ministry of Transportation and Communications, 1983. Flaherty, David H. Protecting Privacy in Two-Way Electronic Services. White Plains, NY: Knowledge Industry Publications, 1985. Hoff, K.M.H. “Two-Way Cable Television and Informational Privacy.” Comm/Ent Law Journal 6 (Summer 1984): 797-836. “Interactive Cable Television: Privacy Legislation.” Gonzaga Law Review 19 (1983- 4): 709-25. Larson, Erik. “Watching Americans Watch TV.” Atlantic Monthly (March 1992): 66-80. “Privacy Rules for Two-Way Cable TV Urged.” Transnational Data Report 6 (December 1983): 426. Segal, G.R. “The Threat from Within: Cable Television and the Invasion of Privacy.” Computer/Law Journal 7 (Summer 1986): 89-116. Vidmar, Neil. Privacy and Two-Way Cable Television: A Study of Canadian Public Opinion. Downsview, Ontario: Ontario Ministry of Transportation and Communications, 1983.

Operating Systems

36 Abbott, Robert P., et al. A Bibliography on Computer Operating System Security: The RISOS Project. W-7405-Eng-48. Livermore, CA: Lawrence Livermore Laboratory, University of California, April 15, 1974. Abbott, Robert P., et al. Security Analysis and Enhancements of Computer Operating Systems: The RISOS Project. NBSIR 76-1041. Livermore, CA: Lawrence Livermore Laboratory, University of California, 1976. Attanasio, C.R., et al. “Penetrating an Operating System: A Study of VM/370 Integrity.” IBM Systems Journal 15 (1976): 102-16. Berson, T.A. and G.L. Barksdale, Jr. “KSOS: Development Methodology for a Secure Operating System.” In Proceedings of the National Computer Conference, vol. 48, 365-71. Montvale, NJ: AFIPS Press, 1979. Branstad, Dennis K. “Privacy and Protection in Operating Systems.” IEEE Computer (January 1973): 9-17. Carlstedt, J. Protecting Errors in Operating Systems: A Selected Annotated Bibliography and Index to Terminology. ISI/Sr-78-10. 1978. Cohen, E. and D. Jefferson. “Protection in the Hydra Operating System.” ACM Operating Systems Review 9 (November 1975): 141-60. Davida, George I. and Brian J. Matt. “Crypto-Secure Operating Systems.” In Proceedings of the National Computer Conference, vol. 51, 575-81. Arlington, VA: AFIPS Press, 1982. De Vivo, M., et al. “Internet Security Attacks at the Basic Levels.” Operating Systems Review 32 (April 1998): 4-15. Feiertag, Richard J. and Peter G. Neumann. “The Foundations of a Provably Secure Operating System.” In Proceedings of the National Computer Conference, vol. 48, 329-34. Montvale, NJ: AFIPS Press, 1979. Fernandez, E.B. and C. Wood. “The Relationship Between Operating System and Data Base System Security: A Survey.” Proceedings of the 1977 IEEE COMPSAC Conference, 453-62. Ford Aerospace and Communication Corporation. Kernelized Secure Operating System (KSOS). TR7932. Palo Alto, CA, November 1978. Gaines, R. Stockton and Norman Z. Shapiro. “Some Security Principles and Their Application to Computer Security.” Operating Systems Review 12 (July 1978): 19- 28. Glaser, Edward L. “A Brief Description of Privacy Measures in the MULTICS Operating System.” In Proceedings of the Spring Joint Computer Conference, vol. 30, 303-4. Washington, DC: Thompson Books, 1967. Gold, B.D, et al. “A Security Retrofit of VM/370.” In Proceedings of the National Computer Conference, vol. 48, 335-44. Montvale, NJ: AFIPS Press, 1979. Gramp, F.T. and R.H. Morris. “Unix Operating System Security.” AT&T Bell Laboratories Journal of Technology 63 (1984). Harrison, M.A., et al. “Protection in Operating Systems.” Communications of the ACM 19 (August 1976): 461-71. Hollingsworth, Dennis, et al. Security Test and Evaluation Tools: An Approach to Operating System Security Analysis. Santa Monica, CA: The Rand Corporation, September 1974. Linden, Theodore A. “Operating System Structures to Support Security and Reliable Software.” Computing Surveys 8 (December 1976): 409-45. Main, Jeremy. “Computer Time-Sharing: Everyman at the Console.” Fortune (August 1967): 88-91, 187-90. McCauley, E.J. and P.J. Drongowski. “KSOS: The Design of a Secure Operating System.” In Proceedings of the National Computer Conference, vol. 48, 345-53. Montvale, NJ: AFIPS Press, 1979. * Murray, William Hugh. “MS-DOS, An Insecure Operating System.” In Computer

37 Security Reference Book, eds. K.M. Jackson, et al., 593-605. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Padlipsky, M.A., et al. “KSOS: Computer Network Applications.” In Proceedings of the National Computer Conference, vol. 48, 373-81. Montvale, NJ: AFIPS Press, 1979. Popek, Gerald J. and David A. Farber. “A Model for Verification of Data Security in Operating Systems.” Communications of the ACM 21 (September 1978): 737-49. Schroeder, M.D. “Engineering a Security Kernel for Multics.” ACM Operating Systems Review 9 (November 1975): 25-32. Walker, Stephen T. “The Advent of Trusted Computer Operating Systems.” In Proceedings of the National Computer Conference, vol. 49, 655-65. Arlington, VA: AFIPS Press, 1980. Wood, Helen M. “Access Control Mechanisms for a Network Operating System.” In Proceedings of the National Computer Conference, vol. 48, 821-9. Montvale, NJ: AFIPS Press, 1979. Wood, Helen M. and Stephen R. Kimbleton. “Access Control Mechanisms for a Network Operating System.” In Proceedings of the National Computer Conference, 821-30. 1979. Woodward, John P.L. “Applications for Multilevel Secure Operating Systems.” In Proceedings of the National Computer Conference, vol. 48, 319-28. Montvale, NJ: AFIPS Press, 1979. Young, Charles R. “A Security Policy for a Profile-Oriented Operating System.” In Proceedings of the National Computer Conference, vol. 50, 273-82. Montvale, NJ: AFIPS Press, 1981.

First Amendment

Askin, Frank. “Police Dossiers and Emerging Principles of First Amendment Adjudication.” Stanford Law Review 22 (1970): 196. Bertelsman, W.O. “The First Amendment and Protection of Reputation and Privacy: New York Times vs. Sullivan and How It Grew.” Kentucky Law Journal 56 (1967-8): 718-56. Cohen, David S. “The Public’s Right of Access to Government Information Under the First Amendment.” Chicago-Kent Law Review 51 (1974): 164-85. Cutera, Teri A. “Computer Networks, Libel, and the First Amendment.” Computer/Law Journal (December 1992): 555-83. Ervin, Samuel James, Jr. “The First Amendment: A Living Thought in the Computer Age.” Columbia Human Rights Law Review 4 (Winter 1972). Pierce, Kenneth J. “Public Cryptography, Arms Export Controls, and the First Amendment: A Need for Legislation.” Cornell International Law Journal 17 (1984): 197-236. Samuelson, Pamela. “First Amendment Rights for Information Providers.” Communications of the ACM 34 (June 1991): 19-23.

Fourth Amendment

Adler, Michael. “Cyberspace, General Searches, and Digital Contraband: The Fourth Amendment and the Net-Wide Search.” Yale Law Journal 105 (1996): 1093. Gutterman, Melvin. “Fourth Amendment Privacy and Standing: ‘Wherever the Twain Shall Meet.’” North Carolina Law Review 60 (1981-2): 1-57. Hodges, David P. “Electronic and Visual Surveillance and the Fourth Amendment: The Arrival of Big Brother?” Hastings Constitutional Law Quarterly 3 (Winter 1976): 216-99. “IRS Computer Data Bank Searches: An Infringement of the Fourth Amendment

38 Search and Seizure Clause.” Santa Clara Law Review 25 (Winter 1985): 153-89. Lassen, Nelson. “The History and Development of the Fourth Amendment to the United States Constitution.” The Johns Hopkins University Studies in Historical and Political Science 55 (1937). Little, Rory K. “Protecting Privacy Under the Fourth Amendment.” The Yale Law Journal 91 (December 1981): 313-43. Messik, R. “IRS Computer Bank Searches: An Infringement on the Fourth Amendment Search and Seizure Clause.” Santa Clara Law Review 25 (1985): 153- 89. Schroeder, Russell H., Jr. “Fourth Amendment, Electronic Eavesdropping, and the Invasion of Privacy.” South Dakota Law Review 17 (1972): 238-50. Serr, Brian J. “Great Expectations of Privacy: A New Model for Fourth Amendment Protection.” Minnesota Law Review 73 (1989): 583-4. Slobogin, Christopher and Joseph E. Schumacher. “Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at Understandings Recognized and Permitted by Society.” Duke Law Journal 42 (1993): 727-37. Solove, Daniel J. “Digital Dossiers and the Dissipation of Fourth Amendment Privacy.” Southern California Law Review 75 (2002): 1083-98. Sundstrom, Scott A. “You’ve Got Mail! (And the Government Knows It): Applying the Fourth Amendment to Workplace Email Monitoring.” New York University Law Review 73 (1998): 2064-5. Thornburg, R.H. “Face Recognition Technology: The Potential Orwellian Implications and Constitutionality of Current Uses Under the Fourth Amendment.” John Marshall Journal of Computer & Information Law 20 (Winter 2002): 321-46. Tomkovicz, J.J. “Beyond Secrecy for Secrecy’s Sake: Toward an Expanded Vision of the Fourth Amendment Privacy Province.” Hastings Law Journal 36 (May 1985): 645- 737. “Tracking Katz: Beepers, Privacy, and the Fourth Amendment.” Yale Law Journal 86 (1977): 1461-1508. “Tying Privacy in Knotts: Beeper Monitoring and Collective Fourth Amendment Rights.” Virginia Law Review 71 (March 1985): 297-341. Webber, D. “Fourth Amendment: Of Warrants, Electronic Surveillance, Expectations of Privacy, and Tainted Fruits.” Journal of Criminal Law and Criminology 75 (Fall 1984): 630-52.

Beepers

“Tracking Katz: Beepers, Privacy, and the Fourth Amendment.” Yale Law Journal 86 (1977): 1461-1508. “Tying Privacy in Knotts: Beeper Monitoring and Collective Fourth Amendment Rights.” Virginia Law Review 71 (March 1985): 297-341.

Electronic Communications Privacy Act of 1986

Burnside, R.S. “The Electronic Communications Privacy Act of 1986: The Challenges of Applying Ambiguous Statutory Language to Intricate Telecommunication Technologies.” Rutgers Computer & Technology Law Journal 13 (1987): 451-517. Clukey, Laura L. “The Electronic Communications Privacy Act of 1986: The Impact on Software Communications Technologies.” Software Law Journal 2 (Spring 1988): 243-63. Electronic Communications Privacy Act of 1986, Pub. L. No. 99-508, 100 Stat. 1848 (1986).

39 North, G.A. “Carnivore in Cyberspace: Extending the Electronic Communications Privacy Act’s Framework to Carnivore Surveillance.” Rutgers Computer & Technology Law Journal 28 (2002): 155-91.

Australia

Arndt, H.W. “The Cult of Privacy.” Australian Quarterly 21 (1949): 69-71. Clarke, Roger A. “Just Another Piece of Plastic for Your Wallet: The ‘Australia Card’ Scheme.” Prometheus 5 (1987): 29-45. Coxon, H. “The Freedom of Information Debate in Australia.” Government Publications Review 8 (1981): 373-80. Curtis, Lindsay J. “Freedom of Information: The Australian Approach.” Australian Law Journal 54 (1980): 525-35. Davies, Simon G. Big Brother: Australia’s Growing Web of Surveillance. Sydney, Australia: Simon & Schuster, 1992. Goldsworthy, Ashley W. “Computers and their Social Implications in the Australian Scene.” Australian Computer Journal 9 (1977): 25-31. Graham, Peter. “The Australia Card: A Burden Rather Than Relief?” Australian Quarterly (Autumn 1986): 4-14. Greenleaf, Graham and R. Clarke. “A Critique of the Australian Law Reform Commission’s Information Privacy Proposals.” Journal of Law and Social Change 13 (1984-5): 51-82. Hughes, G. “An Overview of Data Protection in Australia.” Melbourne University Law Review 18 (1991): 83-120. Kirby, Michael D. “The Computer, the Individual, and the Law.” Australian Law Journal 55 (1981): 443-57. Marshall, A. “The ‘Australia Card’: A Survey of the Privacy Problems Arising From the Proposed Introduction of an Australian Identity Card.” Journal of Law and Information Science 2 (1986): 111-34. Morris, S., et al. “Australian Healthcare: A Smart Card for a Clever Country.” International Journal of Biomedical Computing 40 (October 1995): 101-5. Paterson, Moira. “Privacy Protection in Australia: The Need for an Effective Private Sector Regime.” Federal Law Review 26 (1998): 371-400.

Cell Phones

Cameron, Amy. “Homing Device: How Your Cell Phone Tracks Your Movements.” Maclean’s (February 19, 2001). Lacey, Mark. “Florida Couple Say They Recorded Gingrich’s Call.” Los Angeles Times, January 14, 1997, p. A1. Markoff, John. “Cellular Industry Rejects U.S. Plan for Surveillance.” New York Times, September 20, 1996, p. A1. Schwartz, Ephraim. “FBI Phone Tapping and Locating Cell Phones Making 911 Calls: Is It Privacy or Paranoia?” InfoWorld (January 15, 2001). Wayner, Peter. “Technology That Tracks Cell Phones Draws Fire.” New York Times, February 23, 1998.

Clipper Chip

Andrews, Edmund L. “U.S. Plans to Give Push Giving FBI Access in Computer Codes: ‘Clipper Chip’ to Be Used.” New York Times, February 5, 1994, p. A1, A48. Carney, Eliza Newlin. “Clashing over Clipper.” National Journal 25 (1993): 2184-7. Davis, Bob. “Clipper Chip Is Your Friend.” Wall Street Journal, March 22, 1994.

40 Denning, Dorothy Elizabeth R. “The Clipper Encryption System.” American Scientist 81 (July-August 1993). Denning, Dorothy Elizabeth R. “Clipper Chip Will Reinforce Privacy.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 659-63. San Diego: Academic Press, 1996. Froomkin, A. Michael. “The Metaphor is the Key: Cryptography, the Clipper Chip, and the Constitution.” University of Pennsylvania Law Review 143 (1995): 709-897. * Gurak, Laura J. Persuasion and Privacy in Cyberspace: The Online Protests over Lotus Marketplace and the Clipper Chip. New Haven, CT: Yale University Press, 1997. Hoffman, Lance J. “Clipping Clipper.” Communications of the ACM (September 1993): 15. Kabay, Michael E. “Vigilance is Needed to Keep Clipper Chip in Check.” Network World (May 31, 1993): 43. Levy, Steven. “Battle of the Clipper Chip.” New York Times Magazine, June 12, 1994. Levy, Steven. “Clipper Chick.” Wired (September 1996). Levy, Steven. “The Cypherpunks vs. Uncle Sam: The Battle of the Clipper Chip.” New York Times Magazine (June 12, 1994): 44-51, 60, 70. Lewis, Peter H. “Collisions in Cyberspace on Data Encryption Plan.” New York Times, March 26, 1994, p. 37. Lewis, Peter H. “Of Privacy and Security: The Clipper Chip.” New York Times, April 14, 1994. Markoff, John. “At AT&T, No Joy on Clipper Flaw.” New York Times, June 3, 1994, p. D1. Markoff, John. “Gore Shifts Stance on Chip Code.” New York Times, July 21, 1994, p. D1. Markoff, John. “U.S. Adopts a Disputed Coding Standard.” New York Times, May 27, 1994, p. D1. Markoff, John. “White House Proposes Initiatives on Data Scrambling.” New York Times, July 13, 1996. Meeks, Brock N. “Same Old Shit: The Government’s Not-So-New ‘Clipper II’: A Train Wreck Waiting to Happen.” Wired (November 1995): 88. Murray, Frank J. “Government Picks Affordable Chip to Scramble Phone Calls.” Washington Times, April 17, 1993, p. C5. Safire, William. “Sink the Clipper Chip.” New York Times, February 14, 1994, p. A17. Salamone, Salvatore. “Clinton’s Clipper: Can It Keep a Secret?” Data Communications (August 1993): 53-6. Scheurer, K. “The Clipper Chip: Cryptography Technology and the Constitution: The Government’s Answer to Encryption ‘Chips’ Away at Constitutional Rights.” Rutgers Computer & Technology Law Journal 21 (1995): 263-92. Sobel, David. “The NSA’s Clipper Chip Proposal.” Covert Action Quarterly (Fall 1993): 50-1. Wakeman, A.J. “Cryptofascism or Crypto-Crimefighting: A Brief History of the Clipper Controversy.” Lasie 25 (November-December 1994): 40-55. Wayner, Peter. “Clipped Wings?” Byte (July 1993): 36. Weitzner, Daniel J. “The Clipper Chip, Key Escrow, and the Constitution.” Networks & Policy (Summer 1993): 1-4.

Lotus Marketplace

Culnan, Mary J. “The Lessons of Lotus Marketplace: Implications for Consumer Privacy in the 1990s.” In The First Conference on Computers, Freedom, and Privacy, March 25, 1991. Fisher, Lawrence M. “New Data Base Ended by Lotus and Equifax.” New York Times,

41 January 24, 1991, p. D4. * Gurak, Laura J. Persuasion and Privacy in Cyberspace: The Online Protests over Lotus Marketplace and the Clipper Chip. New Haven, CT: Yale University Press, 1997. Gurak, Laura J. “The Rhetorical Dynamics of a Community Protest in Cyberspace: The Case of Lotus Marketplace.” Ph.D. diss., Rensselaer Polytechnic Institute, 1994. Gurak, Laura J. “Rhetorical Dynamics of Corporate Communication in Cyberspace: The Protest Over Lotus MarketPlace.” IEEE Transactions on Professional Communication 38 (1996): 2-10. Miller, M.W. “Lotus Is Likely to Abandon Consumer Data Project.” The Wall Street Journal January 23, 1991, p. B1. O’Connor, Rory J. “Privacy Flap Kills Lotus Data Base.” San Jose Mercury News, January 24, 1991, p. A1. Samuelson, Pamela. “How to Interpret the Lotus Decision (And How Not To).” Communications of the ACM 35 (November 1990): 27-33. Wilke, John R. “Lotus Product Spurs Fears About Privacy.” Wall Street Journal, November 13, 1990 [1991?], p. B1, B5.

Piracy

Anthes, Gary H. “Piracy on the Rise: Companies Fear Liability.” Computerworld 28 (April 28, 1994): 12. “Anti-Piracy Tactics: ‘Computer Cheats Take Cadsoft’s Bait.’” Software Engineering Notes 18 (April 1993): 14. Cangialosi, Charles. “The Electronic Underground: Computer Piracy and Electronic Bulletin Boards.” Rutgers Computer and Technology Law Journal 15 (1989): 265- 301. “Coalition to Combat Software Piracy.” Info World (December 7, 1987): 5. The Electronic Vault: Computer Piracy and Privacy. The Yankee Group, 1984. Friedman, Batya. “Social Judgments and Technological Innovation: Adolescents’ Conceptions of Computer Piracy and Privacy.” Ph.D. diss., University of California, Berkeley, 1988. Gates, William H., III. “Protection from Pirates.” The Washington Post, October 18, 1993, p. 19. Gwynne, Peter. “Stalking Asian Software Pirates.” Technology Review 95 (February- March 1992): 15-6. Hamilton, David and Jacob M. Schlesinger. “Microsoft Targets Software Piracy by Japan PC Users.” The Wall Street Journal, March 4, 1993, p. A10. Hecht, Jeff. “Internet ‘Pirate’ Charged in U.S.” New Scientist 142 (April 23, 1994): 7. Marshall, Patrick G. “Software Piracy: Can the Government Help Stop the Drain on Profits?” CQ Researcher 3 (May 21, 1993): 443-8. Martin, Janette. “Pursuing Pirates.” Datamation (August 1, 1992): 41-2. Wallich, Paul. “A Rogues Routing.” Scientific American 272 (May 1995): 31. Wallich, Paul. “Wire Pirates.” Scientific American (March 1994): 90-101. Weisband, Suzanne P. and Seymour E. Goodman. “Subduing Software Pirates.” Technology Review (October 1993): 30-3. Wilson, David L. “Ruling on Software Piracy Prompts Debate.” Chronicle of Higher Education 41 (January 13, 1995): A20. “World Wire: Software Piracy in China.” The Wall Street Journal, October 14, 1993, p. A13.

Welfare

Bristol, James T. and Lawrence Felton. “Social, Legal, and Ethical Aspects of Privacy

42 in Computerized Public Welfare Records in Texas.” Law and Computer Technology 8 (1975): 118-32. Cook, Christopher D. “To Combat Welfare Fraud, States Reach for Debit Cards.” Christian Science Monitor, May 25, 1999. Cook, Christopher D. “Swiping Benefits.” The Progressive (March 1999). Dery, David. Computers in Welfare. London: SAGE Publications, 1982. Huggins, Phyllis. “Computer Plays Big Role in Defrauding Welfare Unit.” Computerworld (October 7, 1970). Wilson, Dolores Y.P. “Computerization of Welfare Recipients: Implications for the Individual and the Right to Privacy.” Rutgers Journal of Computers and Law 4 (1979): 163-209.

Social Work

Gardner, Sidney L. and Robin White. “Privacy, Technology, and Human Services: 1984 Minus One.” New England Journal of Human Services 3 (Winter 1983): 12-21. Nellis, Mike. “Keeping Tags on the Underclass.” Social Work Today (May 25, 1989): 18-9. Noble, J.H., Jr. “Protecting the Public’s Privacy in Computerized Health and Welfare Information Systems.” Social Work 16 (January 1971): 35-41. “Protection from Privacy and Ethical Dilemmas in Computer Applications in Social Work.” Computer Applications in Social Work and Allied Professions 3 (1986). Schrier, Carol J. “Guidelines for Record-Keeping Under Privacy and Open-Access Laws.” Social Work 25 (November 1980): 452-7. “Social Workers Balk at Computers.” San Francisco Chronicle, July 16, 1968, p. 2. Wilson, Suanna J. Confidentiality in Social Work: Issues and Principles. New York: Free Press, 1978.

Electronic Funds Transfer

Beker, H.J., et al. “Simplifying Key Management in Electronic Funds Transfer Point of Sale Systems.” Electronics Letters 19 (1983): 442-4. Bequai, August. The Cashless Society: EFTS at the Crossroads. New York: Wiley, 1981. Bequai, August. “Survey of Fraud and Privacy Obstacles to the Development of an Electronic Funds Transfer System.” Catholic University Law Review 25 (1976): 766- 800. Colton, Kent W. and Kenneth L. Kraemer, eds. Computers and Banking: Electronic Funds Transfer Systems and Public Policy—Applications of Modern Technology in Business. New York: Plenum Press, 1979. * Davies, Donald W. “Schemes for Electronic Funds Transfer at the Point of Sale.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 667-89. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Davies, Donald W. and W.L. Price. Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronics Funds Transfer. Second Edition. John Wiley and Sons, 1989. Dewey, Russell. “System Auditability and Control in an EFTS Environment.” In Proceedings of the National Computer Conference, vol. 47, 185-9. Montvale, NJ: AFIPS Press, 1978. Edwards, Raoul D. “Privacy and Security Concerns in EFT (Electronic Funds Transfer) Growth.” U.S. Banker 93 (June 1982): 64-7. Electronic Funds Transfer Act, Pub. L. No. 95-630, 92 Stat. 3728 (1978), Pub. L. No. 97-375, 96 Stat. 1825 (1982), Pub. L. No. 101-73, 103 Stat. 440 (1989), Pub. L. No.

43 102-242, 105 Stat. 2301 (1991). Federal Deposit Insurance Corporation. Division of Management Systems and Economic Analysis. Introduction to EFT Security. August 1976. NBS# 77200020. Box 676, Folder 10. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Greguras, Fred M. “United States EFT Privacy Act: The Legislative Charge Begins.” Information Privacy 2 (March 1980): 50-4. Greguras, F.M. and D.J. Sykes. “Authentication in EFT: The Legal Standard and the Operational Reality.” Computer/Law Journal 2 (Winter 1980): 67-86. Kaufman, D. and Karl Auerbach. “A Secure, National System for Electronic Funds Transfer.” In Proceedings of the National Computer Conference, vol. 45, 129-38. Montvale, NJ: AFIPS Press, 1976. Kling, Rob. “Value Conflicts and Social Choice in Electronic Funds Transfer System Developments.” Communications of the ACM 21 (1978). Kling, Rob. “Value Conflicts in the Design and Organization of EFT Systems.” In Computerization and Controversy, eds. C. Dunlop and R. Kling, 421-35. San Diego, CA: Academic Press, 1991. Kraemer, Kenneth L. and Kent W. Colton. “Policy, Values, and EFT Research: Anatomy of a Research Agenda.” In Proceedings of the National Computer Conference, vol. 49, 841-53. Arlington, VA: AFIPS Press, 1980. Kudlinkski, James R. “Confidentiality of EFT Information.” University of San Francisco Law Review 13 (1979): 449-65. Mayland, P.F. “EFT Network Risk Begs CEO Attention.” Bank Management 69 (1993): 42-6. Norman, L.S. “Unauthorized Access to EFT Information: Who Should Be Responsible?” Computer/Law Journal 6 (Summer 1985): 171-85. Nycum, Susan Hubbell. “Privacy in Electronic Funds Transfer, Point of Sale, and Electronic Mail Systems in the Next Decade.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 39-42. New York: Academic Press, 1980. Rule, James B. Value Choices in Electronic Funds Transfer Policy. Washington, DC: GPO, 1975. Scaletta, Phillip J., Jr. “Privacy Rights and Electronic Funds Transfer Systems: An Overview.” Catholic University of America Law Review 25 (1976): 801-11. Sutherland, Asbill and Brennan Sutherland. Privacy Issues in Electronic Funds Transfer Systems: Recommendations for a Public Policy. Springfield, VA: National Technical Information Service, 1978. United States. Congress. Office of Technology Assessment. Selected Electronic Funds Transfer Issues: Privacy, Security, and Equity—Background Paper. Washington, DC: GPO, 1982. United States. National Commission on Electronic Fund Transfers. EFT and the Public Interest: A Report of the National Commission on Electronic Fund Transfers. Washington, DC: GPO, 1977. Yestingsmeier, J. “Electronic Funds Transfer Systems: The Continuing Need for Privacy Legislation.” Computers & Society 13-14 (1983-1984): 5-9.

Patents

Diamond, Commissioner of Patents and Trademarks v. Diehr et al. 450 U.S. 1048- 1073. Gilbert, Lee A. “Patent Secrecy Orders: The Unconstitutionality of Interference in Civilian Cryptography Under Present Procedures.” Santa Clara Law Review 22 (1982): 325, 357. Heckel, Paul. “Debunking the Software Patent Myths.” Communications of the ACM

44 35 (June 1992): 121-40. Jakes, J. Michael and E. Robert Yoches. “Basic Principles of Patent Protection for Computer Software.” Communications of the ACM 32 (August 1989): 922-4. * Levine, Jack. United States Cryptographic Patents, 1861-1981. Terre Haute, IN: Cryptologia, Inc., 1983. Scaletta, Phillip J., Jr. “The Legal Ramifications of the Computer Age: Part 2— Contracts, Patents, and Copyrights.” Data Management (November 1970): 20-2. Shapley, Deborah. “NSA Slaps Secrecy Order on Inventors’ Communications Patent.” Science 201 (September 8, 1978): 891-4. Stallman, Richard M. and Simson Garfinkle. “Viewpoint: Against Software Patents.” Communications of the ACM 35 (January 1992): 17-22, 121.

Sabotage

“DP Operator Arrested: Sabotage Was the Problem.” Computerworld (August 2, 1972): 1. Hawkins, David H. “Protecting EDP Systems from Fifth-Column Attacks.” Management Review (October 1972): 51-3. Immel, Richard A. “Whir, Click—Blooey! Sabotage, Accidents, and Fraud Woes for Computer Center.” The Wall Street Journal, March 22, 1971, p. 1. Mandell, Mel. “Computer Security: Sabotage Fears Discounted.” Computers and Automation (October 1971): 29. Matthews, William. “Susceptible to Sabotage.” Air Force Times (February 5, 1996): 28. Merritt, Michael. “System Sabotaged by Phone.” Computerworld (December 15, 1971): 1. Peterzell, Jay. “Spying and Sabotage by Computer.” Time 133 (March 20, 1989): 25- 6. “Poor Security Leaves DP Facilities Ripe for Sabotage.” Computerworld (June 17, 1970): 1. “Sabotage Course Shows Action May Have Bad Effect on Society.” Computerworld (November 25, 1970): 1. Sakkas, Peter E. “Espionage and Sabotage in the Computer World.” International Journal of Intelligence and Counterintelligence (Summer 1991): 155-202. Vistica, Gregory L. “Cyberwar and Sabotage.” Newsweek (May 31, 1999). “Yippies Convene, Discuss Methods of DP Sabotage.” Computerworld (April 14, 1971): 2.

Transborder Data Flow

Aldrich, Robert F. “Emerging Approaches in Transborder Data Flow.” In Issues in International Telecommunications Policy: A Sourcebook, ed. Jane H. Yurow, 137-78. Washington, DC: The George Washington University, Center for Telecommunications Studies, 1983. Aldrich, Robert F. “Emerging Issues in Transborder Data Flow.” In Issues in International Telecommunications Policy: A Sourcebook, ed. Jane H. Yurow, 137-78. Washington, DC: The George Washington University, Center for Telecommunications Studies, 1983. Bach, Gabriel. “Law and Politics in Transborder Data Flow.” Law/Technology 14 no. 2 (1981): 1-24. Beling, Craig T. “Transborder Data Flows: International Privacy Protection and the Free Flow of Information.” Boston College International and Comparative Law Review 6 (Spring 1983): 591-624.

45 Bigelow, Robert P. “Transborder Dataflows Barriers.” Information Privacy 1 (1979): 331-4. Bing, Jon. “Legal Problems Related to Transborder Data Flows.” In An Exploration of Legal Issues in Information and Communication Technologies, 60-134. Paris: OECD, 1983. Bing, Jon. “Transnational Data Flows and the Scandinavian Data Protection Legislation.” Scandinavian Studies in Law 24 (1980): 65-96. Bloombecker, Jay. “International Computer Crime: Where Terrorism and Transborder Data Flow Meet.” Computers & Security 1 (January 1982): 41-53. Bull, Hans Peter. “Regulation of Transborder Data Flow Under the German Data Act.” Transnational Data Report 4 (1981): 13-4. Buss, Martin D.J. “Legislative Threat to Transborder Data Flow: New International Barriers to Information Exchange Make Both National and Company Privacy Policies Necessary.” Harvard Business Review 62 (May-June 1984): 111-8. Connor, Steve. “The Invisible Border Guard.” New Scientist (January 5, 1984). Coombe, George W. and Susanne L. Kirk. “Privacy, Data Protection, and Transborder Data Flow: A Corporate Response to International Expectations.” Business Lawyer 39 (November 1983): 33-66. Cooper, David M. “Transborder Data Flow and the Protection of Privacy: The Harmonization of Data Protection Law.” Fletcher Forum 8 (Summer 1984): 335-52. Eger, John M. “Emerging Restrictions on Transnational Data Flows: Privacy Protection or Non-Tariff Trade Barriers?” Law and Policy in International Business 10 (1978): 1055-103. Farnsworth, David P. “Data Privacy or Data Protection and Transborder or Transnational Data Flow: An American’s View of European Legislation.” International Business Lawyer 11 (1983): 114-8. Fishman, William L. “Introduction to Transborder Data Flows.” Stanford Journal of International Law 16 (1980): 1-26. Gassman, H.P. “Privacy Implications of Transborder Data Flows: Outlook for the 1980s.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 109- 17. New York: Academic Press, 1980. Gotlieb, A., et al. “Transborder Transfer of Information by Communications and Computer Systems: Issues and Approaches to Guiding Principles.” American Journal of International Law 68 (1974): 227-57. Grossman, Gary. “Transborder Data Flow: Separating the Privacy Interests of Individuals and Corporations.” Northwestern Journal of International Law and Business 4 (Spring 1982): 1-36. Hafli, T. “Transborder Dataflow: Scandinavian Solution.” Information Privacy 1 (1979): 326-30. Hardy, I. Trotter. “Transborder Data Flow: An Overview and Critique of Recent Concerns.” Rutgers Computer and Technology Law Journal 9 (1983): 247-64. International Institute of Communications. Transborder Data Flows: A Current Review. London, United Kingdom: International Institute of Communications, 1983. Katzan, Harry S., Jr. Multinational Computer Systems: An Introduction to Transnational Data Flow and Data Regulation. New York: Van Nostrand Reinhold, 1980. Kirby, Michael D. “Legal Aspects of Transborder Data Flows.” Computer/Law Journal 11 (April 1991): 233-45. Kirby, Michael D. “Transborder Data Flows and the ‘Basic Rules’ of Data Privacy.” Stanford Journal of International Law 16 (1980): 27-66. Kirsch, William J. “The Protection of Privacy and Transborder Flows of Personal Data: The Work of the Council of Europe, The Organization for Economic Cooperation and Development, and the European Economic Community.” Legal Issues of European

46 Integration 2 (1982): 21-50. Laperrière, René, et al. “The Transborder Flow of Personal Data from Canada: International and Comparative Law Issues.” Jurimetrics Journal 32 (Summer 1992): 547-69. Markoski, Joseph P. “Telecommunications Regulations as Barriers to the Transborder Flow of Information.” Cornell International Law Journal 14 (1981): 287-331. Novotny, Eric J. “Transborder Data Flow Regulation: Technical Issues of Legal Concern.” Computer/Law Journal 3 (1982): 105-24. Novotny, Eric J. “Transborder Data Flows: A Bibliography.” Stanford Journal of International Law 16 (1980): 181-99. Novotny, Eric J. “Transborder Data Flows and International Law: A Framework for Policy Oriented Inquiry.” Stanford Journal of International Law 16 (1980): 141-80. Novotny, Eric Joseph. “Transborder Data Flows and World Public Order: Law and Policy Problems in Controlling Global Computer Communication Technology.” 2 vols. Ph.D. diss., Georgetown University, 1985. Nugter, A.C.M. Transborder Flow of Personal Data within the EC: A Comparative Analysis of the Privacy Statutes of the Federal Republic of Germany, France, the United Kingdom, and the Netherlands. Kluwer, 1990. Nycum, Susan Hubbell and Susan Courtney-Saunders. “Transborder Data Flow: Legal Persons in Privacy Protection Legislation.” In Proceedings of the National Computer Conference, vol. 49, 587-93. Arlington, VA: AFIPS Press, 1980. Online Conferences Ltd. Transnational Data Regulation: The Realities. Wellesley, MA: QED Information Sciences Inc., 1979. Organisation for Economic Cooperation and Development. OECD Guidelines on the Protection of Privacy and Transborder Flow of Personal Data. Paris: OECD, 1980. Organisation for Economic Cooperation and Development. Transborder Data Flows and the Protection of Privacy: Information Computer Communications Policy. Paris, France: OECD, 1979. Palmer, Janet and Andria Page Dukes. “Transborder Data Flow: A Corporate Concern.” In Proceedings of the National Computer Conference, vol. 55, 441-8. Reston, VA: AFIPS Press, 1986. Plesser, Ronald L. “Issue of Data Flow Across National Borders Must Be Faced.” ABA Banking Journal 74 (1982): 71-8. Ploman, E.W. “Transborder Data Flows: The International Legal Framework.” Computer/Law Journal 3 (Summer 1982): 551-62. Pool, Ithiel de Sola and Richard B. Solomon. “Intellectual Property and Transborder Data Flows.” Stanford Journal of International Law 16 (1980): 113-40. Raab, Charles D. and Colin J. Bennett. “Protecting Privacy Across Borders: European Policies and Prospects.” Public Administration 72 (1994): 95-112. Rankin, T. Murray. “Business Secrets Across International Borders: One Aspect of the Transborder Data Flow Debate.” Canadian Business Law Journal 10 (May 1985): 213-46. Robinson, Peter. “Legal Issues Raised by Transborder Data Flow.” Canada-U.S. Law Journal 11 (1986): 295-316. Robinson, Peter. “Transborder Dataflow: A Canadian Perspective.” Information Privacy 2 (March 1980): 55-9. Roche, Edward Mozley. “The Computer Communications Lobby, The U.S. Department of State Working Group on Transborder Data Flows, and Adoption of the OECD Guidelines on the Protection of Privacy and Transborder Data Flows of Personal Data.” Ph.D. diss., Columbia University, 1987. Safirstein, Peter. “How Do We Best Control the Flow of Electronic Information Across Sovereign Borders?” In Proceedings of the National Computer Conference, vol. 48, 279-82. Montvale, NJ: AFIPS Press, 1979.

47 Sanger, David E. “Wire Static: Multinationals Worry as Countries Regulate Data Crossing Borders; Firms See Linkups Periled by Bids to Protect Privacy or Local Industry.” Wall Street Journal 198 (August 26, 1981): 1. Sauvant, Karl P. Transnational Corporations and Transborder Data Flows: Background and Overview. Amsterdam, The Netherlands: North Holland, 1984. Seipel, Peter. “Transborder Flows of Personal Data: Reflections on the OECD Guidelines.” Transnational Data Report 4 (January 1981): 32-44. Sheilds, Stella F. “Development of a Methodology for the Analysis of Electronic Mail Communication Networks with Implications for Transborder Data Flow.” Ph.D. diss., State University of New York at Buffalo, 1989. “Transborder Data Flow: Problems with the Council of Europe Convention, or Protecting States from Protectionism.” Northwestern Journal of International Law and Business 4 (Autumn 1982): 601-25. “Transborder Data Flows and the Possibility of Guidance in Personal Data Protection by the ITU.” Houston Journal of International Law 6 (Spring 1984): 215-41. “Transborder Data Flows: International Privacy Protection and the Free Flow of Information.” Boston College International and Comparative Law Review 6 (Spring 1983): 591-624. “Transborder Data Flows: New Frontiers—Or None?” Journal of Communications 29 (1979): 113-55. Trotter, Hardy I., Jr. “Transborder Data Flow: An Overview and Critique of Recent Concerns.” Rutgers Computer & Technology Law Journal 9 (1983): 247-64. Turn, Rein. “Privacy Protection and Transborder Data Flows.” In Proceedings of the National Computer Conference, vol. 49, 581-6. Arlington, VA: AFIPS Press, 1980. Turn, Rein. “Transborder Dataflows: Implementation of Privacy Protection.” Information Privacy 3 (May 1981): 98-119. Turn, Rein. “Transborder Dataflows: Issues and Organizations.” Information Privacy 3 (January 1981): 6-20. Turn, Rein. “Transborder Dataflows: Privacy Protection.” Information Privacy 3 (March 1981): 56-67. Turn, Rein, ed. Transborder Data Flows: Concerns in Privacy Protection and Free Flow of Information. Arlington, VA: AFIPS, 1979. Wigand, Rolf T., et al. “Transborder Data Flow, Informatics, and National Policies.” Journal of Communications (Winter 1984): 153-75. Zimmerman, Jane A. “Transborder Data Flow: Problems with the Council of European Convention, or Protecting States from Protectionism.” Northwestern Journal of International Law and Business 4 (1982): 602-25.

Freedom of Information Act

Adler, Judith L. “The Impact of FOIA on Scientific Research Guarantees.” Columbia Journal of Law and Social Problems 17 (1981): 1-45. Alder, Allan and Morton H. Halperin. Litigation under the Federal Freedom of Information Act and Privacy Act. Washington, DC: Center for National Security Studies, 1983. Arnold, Marc and Andrew Kisseloff. “An Introduction to the Federal Privacy Act of 1974 and Its Effect on the Freedom of Information Act.” New England Law Review 11 (1975-6): 463-96. Belair, Robert R. “Agency Implementation of the Privacy Act and the Freedom of Information Act: Impact on the Government’s Collection, Maintenance, and Dissemination of Personally Identifiable Information.” The John Marshall Journal of Practice and Procedure 10 (August 1977): 465-512. Belair, Robert R. “Agency Implementation of the Privacy Act and the Freedom of

48 Information Act: Impact on the Government’s Collection, Maintenance, and Dissemination of Personally Identifiable Information.” John Marshall Journal of Practice and Procedure 10 (1977): 465-512. Belair, Robert R. “How the Freedom of Information Act and Privacy Act are Working.” Civil Liberties Review 4 (1977): 10-8. Clark, Elias. “Holding Government Accountable: The Amended Freedom of Information Act.” Yale Law Journal 84 (March 1975): 741-69. “Controversy Over the Freedom of Information Act: Pro and Con.” Congressional Digest 61 (February 1982): 35-64. Davis, K.C. “The Information Act: A Preliminary Analysis.” The University of Chicago Law Review 34 (1967): 761-812. Drachsler, David A. “Freedom of Information Act and the ‘Right’ of Non-Disclosure.” Administrative Law Review 28 (1976): 1-11. Easterbrook, Frank H. “Privacy and the Optimal Extent of Disclosure Under the Freedom of Information Act.” Journal of Legal Studies 9 (1980): 775-800. Freedom of Information Act, Pub. L. No. 89-487, 80 Stat. 250 (1966), Pub. L. No. 90-23, 81 Stat. 54 (1967), Pub. L. No. 93-502, 88 Stat. 1561 (1974), Pub. L. No. 99-570, 100 Stat. 3204-48 (1986). Gordon, A.C. and J.P. Heinz, eds. Public Access to Information. New Brunswick, NJ: Transaction Books, 1979. Gordon, Robert L. The Freedom of Information Act and the Privacy Act. Madison, WI: The University of Wisconsin Law School and University of Wisconsin Extension, 1977. Gorski, James. “Access to Information? Exemptions from Disclosure Under the Freedom of Information Act and the Privacy Act of 1974.” Williamette Law Journal 13 (1976): 135-71. Hatch, Orrin G. “The Freedom of Information Act: Balancing Freedom of Information with Confidentiality for Law Enforcement.” Journal of Contemporary Law 9 (1983): 1- 40. Hulett, Mary. “Privacy and the Freedom of Information Act.” Administrative Law Review 27 (Summer 1975): 275-94. Kennedy, Leslie A. “Freedom of Information Act Implementation: An Evaluation of USDA and HHS.” Government Publications Review 9 (1982): 453-64. Kirtley, J.E. “From File Drawer to Floppy Disk: FOIA Implications of Electronic Data Collection Raised in Two Recent Supreme Court Cases.” Government Information Quarterly 6 (1989): 335-38. Lansing, Paul. “The Conflict of Patient Privacy and the Freedom of Information Act.” Journal of Health Politics, Policy, and Law 9 (Summer 1984): 315-22. Marwick, Christine M., ed. Litigation Under the Amended Federal Freedom of Information Act. 5th ed. Washington, DC: The Project on National Security and Civil Liberties, 1980. Morris, Robert A., et al. “Research and the Freedom of Information Act.” American Psychologist 36 (1981): 819-26. “National Security, Law Enforcement, and Business Secrets Under the Freedom of Information Act.” Business Lawyer 38 (1982-3): 707-39. Shulman, Laurence J. “The Freedom of Information Act and Medicare Cost Reports.” American Journal of Law and Medicine 6 (1981): 543-58. Smith, Jim. “The Freedom of Information Act of 1966: A Legislative History Analysis.” Law Library Journal 74 (1981): 231-80. Theoharis, Athan G. “The Freedom of Information Act and Intelligence Agencies.” Government Publications Review 9 (January-February 1982): 37. United States. Department of Justice. Freedom of Information Act Guide and Privacy Act Overview. Washington, DC: GPO, 1992. United States. General Accounting Office. Government Field Offices Should Better

49 Implement the Freedom of Information Act. LCD-78-120. Washington, DC: GAO, July 25, 1978. Walterscheid, E.C. “Access to Federally Funded Research Data Under the Freedom of Information Act.” Rutgers Computer & Technology Law Journal 15 (1989): 1-61.

Biometrics

Bertillon, Alphonse. Instructions for Taking Descriptions for the Identification of Criminals and Others by the Means of Anthropometrical Indications. Chicago, IL, 1889. Bertillon, Alphonse. Signaletic Instructions, Including the Theory and Practice of Anthropometrical Identification. Chicago, IL: The Werner Company, 1896. Brewer, Charles B. “Finger-Prints: Their Use in the United States Navy and Else Where.” Century (September 1909). * Cole, Simon A. Suspect Identities: A History of Fingerprinting and Criminal Identification. Cambridge, MA: Harvard University Press, 2001. Cooper, Gary K. “Automated Fingerprint Storage, Retrieval, and Sharing in California.” In Proceedings of the International Forensic Symposium on Latent Prints, 77-81. Washington, DC: GPO, 1987. Cummins, Harold and Charles Midlo. Finger Prints, Palms, and Soles: An Introduction to Dermatoglyphics. Philadelphia, PA: The Blakiston Company, 1943. Cushman, Jonah, Jr. “Identification Cards Linked to Biometrics Considered.” Houston Chronicle, January 20, 2002. Davies, Simon G. “Touching Big Brother: How Biometric Technology Will Fuse Flesh and Machine.” Information Technology and People 7 (1994): 43. * Everett, David. “Identity Verification and Biometrics.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 37-73. Oxford, UK: Butterworth- Heinemann Ltd, 1992. Faulds, Henry. “On the Skin Furrows of the Hand.” Nature (October 28, 1880). Fosdick, Raymond B. “The Passing of the Bertillon System of Identification.” Journal of the American Institute of Criminal Law and Criminology 6 (1915): 363-9. Gomes, Lee. “Face Recognition Technology Questioned.” Wall Street Journal, September 27, 2001, p. B11. Hamer, Mick. “All-Seeing Scan Spares Your Blushes.” New Scientist (August 17, 2002): 10. Herman, Robin. “British Police Embrace ‘DNA Fingerprints;’ But These Gene Scans Worry Civil Libertarians.” Washington Post, November 24, 1987. Holmes, J.P., et al. A Performance Evaluation of Biometric Identification Device. Albuquerque, NM: Sandia National Laboratories, 1990. Hoover, J.E. “Fingerprinting: The Work of the Identification Division of the Federal Bureau of Investigation.” The Student Lawyer Journal (October 1961): 13-5, 24-5. Hulme, G.V. “Slow Acceptance for Biometrics.” Informationweek 926 (February 10, 2003): 56-62. Jain, Anil K., et al. “Biometric Identification.” Communications of the ACM 43 (February 2000): 90-8. Jain, Anil K., et al. Biometrics: Promising Frontiers for Emerging Identification Market. Technical Report MSU-CSE-00-2. Department of Computer Science, Michigan State University, February 2000. Jain, Anil K., et al. “An Identity-Authentication System Using Fingerprints.” Proceedings of the IEEE 85 (1997): 1365-88. Kirkpatrick, Michael D. “Solving Cold Cases with Digital Fingerprints.” Sherriff (July- August 2001): 14-7. Klug, David J., et al. Automated Fingerprint Identification Systems: Their Acquisition,

50 Management, Performance, and Organizational Impact. Washington, DC: National Institute of Justice, 1992. Kroeker, K.L. “Graphics and Security: Exploring Visual Biometrics.” IEEE Computer Graphics & Applications 22 (July-August 2002): 16-21. Mack, David. “Apartment Security System Gives Residents Palm Reading.” Chicago Sun-Times, October 22, 1995. * Markowitz, Judith. “Voice Biometrics.” Communications of the ACM 43 (September 2000): 66-73. Marshall, Edward. “Everybody’s Fingerprint Should Be Kept on File.” New York Times Magazine (May 26, 1912). Moore, Tina. “Fingerprint System Replaces Lunch Money in Pa. Schools.” Washington Post, February 25, 2001. Reed, Bill. “Automated Fingerprint Identification: From Will West to Minnesota Nine- Fingers and Beyond.” Journal of Police Science and Administration 9 (1981): 318-21. Reitman, Valerie. “You Bought It: And You Left Your Prints.” Philadelphia Inquirer, July 8, 1990. Rhodes, Henry T.F. Alphonse Bertillon: Father of Scientific Detection. New York: Abelard-Schuman, 1956. Rinkenberger, G. and R. Chandros. “Non-Forgeable Personal Identification System Using Cryptography and Biometrics.” In Proceedings of the 13th NIST-NCSC National Computer Security Conference, 80-9. 1990. Scarborough, Steve. “New AFIS Looks at Partial Prints.” Law Enforcement Technology (May 2001): 80. Schulman, Andrew. “National ID Card, The Next Generation: The U.S.-Mexico Border Crossing Card (BCC), a Case Study in Biometric, Machine-Readable ID.” In Proceedings of the 12th Annual Conference on Computers, Freedom, and Privacy, April 2002, 1. New York: ACM Press, 2002. Search Group, Inc. Legal and Policy Issues Relating to Biometric Identification Technologies. Sacramento, CA: Search Group, Inc., 1990. Simon, C. and I. Goldstein. “Retinal Photographs as a Means of Identifying Individuals.” New York State Journal of Medicine 35 (1935): 901-6. Stock, Robert M. “An Historical Overview of Automated Fingerprint Identification Systems.” In Proceedings of the International Forensic Symposium on Latent Prints, 51. Washington, DC: GPO, 1987. Twain, Mark. Pudd’nhead Wilson: A Tale. London: Chatto & Windus, 1894. Wilder, Harris Hawthorn. “Palms and Soles.” American Journal of Anatomy 1 (1902): 440. Wilson, Thomas F. and Paul L. Woodard. Automated Fingerprint Identification Systems: Technology and Policy Issues. Pub. No. NCJ-104342. Washington, DC: GPO, April 1987. Woodward, J.D. “Biometrics: Privacy’s Foe or Privacy’s Friend.” Proceedings of the IEEE 85 (September 1997): 1480-92.

Passwords

Computer Science & Technology: The Use of Passwords for Controlled Access to Computer Resources. U.S. Department of Commerce, National Bureau of Standards, May 1977. In U.S. Government Computing Collection, ca. 1945-1983. CBI 63. Box 16. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Gates, J. “What’s in a Password?” Edpacs 19 (February 1992): 5-11. Leavitt, Don. “Passwords Protect Data and Programs.” Computerworld (December 6, 1972): 13.

51 Meissner, Paul. “The Computerized Password.” Privacy Journal 3 (August 1977): 3-5. Morris, Robert and Ken Thompson. “Password Security: A Case History.” Communications of the ACM 22 (November 1979): 594-7. Porter, Sigmund N. “A Password Extension for Improved Human Factors.” Computers & Security 1 (January 1982): 54-6. Seeley, Donn. “Password Cracking: A Game of Wits.” Communications of the ACM 32 (June 1989): 700-3. Wood, Helen M. “The Use of Passwords for Controlled Access to Computer Resources.” In Proceedings of the National Computer Conference, vol. 46, 27-33. Montvale, NJ: AFIPS Press, 1977. Wood, Helen M. The Use of Passwords for Controlled Access to Computer Resources. Special Publication 500-9. National Bureau of Standards. May 1977. “Identity Code for Individuals.” The Office (June 1970).

Trusted Systems

* Camp, L. Jean. Trust and Risk in Internet Commerce. Cambridge, MA: MIT Press, 2000. Cavoukian, Ann and Tyler J. Hamilton. The Privacy Payoff: How Successful Businesses Build Customer Trust. Toronto: McGraw-Hill Ryerson, 2002. Friedman, Batya, et al. “Trust Online.” Communications of the ACM 43 (December 2000): 34-40. Fukuyama, Francis. Trust: The Social Virtues and the Creation of Prosperity. New York: Simon and Schuster, 1995. Herlihy, M.P. and J.D. Tygar. “Implementing Distributed Capacities Without a Trusted Kernel.” In Dependable Computing for Critical Applications, eds. A. Avizienis and J.C. Caprie. Berlin: Springer-Verlag, 1991. MacKenzie, D. and G. Pottinger. “Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military.” IEEE Annals of the History of Computing 19 (1997): 41. Minsky, Naftaly H. “Regularity-Based Trust in Cyberspace.” iTrust (2003): 17-32. * Neumann, Peter G. “Trusted Systems.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 837-62. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Schneider, Fred B. Trust in Cyberspace. Washington, DC: National Academy Press, 1999. Shapiro, Susan P. “The Social Control of Impersonal Trust.” American Journal of Sociology 93 (1987): 623-58. Simmons, Gustavus J. “How to Insure that Data Acquired to Verify Treaty Compliance are Trustworthy.” Proceedings of the IEEE 76 (1988): 621-7. Thompson, Ken. “Reflections on Trusting Trust.” Communications of the ACM 27 (August 1984): 761-3. Turn, Rein. “Private Sector Needs for Trusted/Secure Computer Systems.” In Proceedings of the National Computer Conference, vol. 51, 449-60. Arlington, VA: AFIPS Press, 1982. Turn, Rein. Trusted Computer Systems: Needs and Incentives for Use in Government and the Private Sector. R-2811-D, R, E. Santa Monica, CA: The Rand Corporation, June 1981.

Caller ID

Gandy, Oscar H., Jr. “Caller ID: A Two-Edged Sword.” In Pacific Telecommunication: Weaving the Technological and Social Fabric, eds. Dan Wedemayer and Mark Lofstrum. Pacific Telecommunications Council, 1990.

52 Katz, James E. “Caller ID, Privacy, and Social Processes.” Telecommunications Policy (October 1990): 372-410. Katz, James E. “Public Concern Over Privacy: The Phone is the Focus.” Telecommunications Policy 14 (1991): 373-411. Marx, Gary T. “Hang Up on Caller ID.” Washington Post, January 20, 1990, p. A17.

Law Enforcement

Ackroyd, Stephen, et al. New Technology and Practical Police Work: A Case of Arrested Development? Open University Press, 1991. Anderson, Cerisse. “E-ZPass Records Held Subject to Police Subpoena.” New York Law Journal 218 (July 3, 1997). Andrews, Edmund L. “U.S. Seeks Wiretap Software for Law Enforcement.” New York Times, February 12, 1994, p. 1. Arce, Rose Marie. “Surveillance and DNA Testing are Among the Latest Police Weapons: But How Will We Balance Fighting Crime and Preserving Civil Rights?” Newsday, May 30, 1999, p. A17. Askin, Frank. “Police Dossiers and Emerging Principles of First Amendment Adjudication.” Stanford Law Review 22 (1970): 196. Baran, Paul. “Some Caveats on the Contribution of Technology to Law Enforcement.” P-3550. Santa Monica, CA: The Rand Corporation, April 1967. Belair, Robert R. and Charles D. Bock. “Police Use of Remote Camera Systems for Surveillance of Public Streets.” Columbia Human Rights Law Review 4 (1972): 143- 202. Boothroyd, Jim. “Help From on High.” Police Review (May 19, 1989): 110-3. Bouza, Anthony V. Police Intelligence: The Operations of an Investigative Unit. New York: AMS Press, 1976. Bravin, Jess. “Washington Police to Play ‘I Spy’ Camera Network Will Monitor People All Over District; Civil Libertarians Worry.” Wall Street Journal, February 13, 2002. Buckley, John L. “The Future of Computers in Security and Law Enforcement: Part I.” Law and Order (August 1965): 36-8. Buckley, John L. “The Future of Computers in Security and Law Enforcement: Part II.” Law and Order (September 1965): 48. Campbell, Duncan. “Lifting the Veil on Police Computers.” New Scientist 18 (1979): 159-61. Campbell, Duncan. “Society Under Surveillance.” In Policing the Police, vol. 2, ed. Peter Hain, 65-150. London: John Calder, 1980. Chan, S. and L.J. Camp. “Law Enforcement Surveillance in the Network Society.” IEEE Technology & Society Magazine 21 (Summer 2002): 22-30. Cohen, Stanley A. “Invasion of Privacy: Police and Electronic Surveillance in Canada.” McGill Law Journal 27 (November 1982): 619-75. Cohen, Stanley A. Invasion of Privacy: Police and Electronic Surveillance in Canada. Toronto: Carswell, 1983. “False Arrest Spark Police Mea Culpa.” Computerworld (June 6, 1973): 6. Flynn, Kevin. “Fighting Crime with Ingenuity, 007 Style: Gee-Whiz Police Gadgets Get a Trial Run in New York.” New York Times, March 7, 2000, p. B1. Friesen, Ron J. “Privacy and Security of Data Banks.” In Proceedings of the Workshop on Mapping and Related Applications of Computers to Canadian Police Work, eds. J.E. Watkin and F.R. Lipsett, 149-60. Ottawa, Canada: National Research Council, 1977. Goldberg, Carey. “DNA Databanks Giving Police a Powerful Weapon, and Critics.” New York Times, February 19, 1998, p. A1. Greenawalt, Kent. “Wiretapping and Bugging: Striking a Balance Between Privacy

53 and Law Enforcement.” Juidcature 50 (May 1967): 303-9. Halbfinger, David M. “Protestors Assail Rising Use of Police Cameras.” New York Times, February 2, 1998, p. B3. Hanlon, Joseph. “Security Breach Leads to Police Data Theft.” Computerworld (February 10, 1971): 1. Hatch, Orrin G. “The Freedom of Information Act: Balancing Freedom of Information with Confidentiality for Law Enforcement.” Journal of Contemporary Law 9 (1983): 1- 40. Herdy, Amy. “Eye on Ybor: Police Cameras Go Spy-Tech.” St. Petersburg Times, June 30, 2001. Herman, Robin. “British Police Embrace ‘DNA Fingerprints;’ But These Gene Scans Worry Civil Libertarians.” Washington Post, November 24, 1987. Hsu, Spencer S. “DC Forms Network of Surveillance, Police Video Links Raise Rights Issues.” Washington Post, February 17, 2002. Hsu, Spencer S. “DC Police Cameras Raise Privacy Issues.” Washington Post, February 15, 2002. Kashbuam, William K. “Crime-Fighting By Computer: Scope Widens.” New York Times, March 24, 2002, p. 43. Kashbaum, William K. “Police Department Takes Steps to Modernize Its Technology.” New York Times, March 23, 2002, p. B3. Kettle, Martin. “The Politics of Policing and the Policing of Politics.” In Policing the Police, vol. 2, ed. Peter Hain, 9-64. London: John Calder, 1980. Kocieniewski, David. “Police to Press Property-Crime Fight and Install Cameras.” New York Times, February 5, 1997, p. B4. Leighton, Barry. “Visions of Community Policing: Rhetoric and Reality in Canada.” Canadian Journal of Criminology 33 (1991): 493-5. Levine, Emil H. Information Science: Law Enforcement Applications. Cincinnati, OH: Anderson Publishing, 1979. Levitt, Leonard. “NYPD Seeks to Overturn Surveillance Rules.” Newsday, September 26, 2002, p. 4. Making, John. “‘Star Wars’ Meets ‘Police Story.’” Houston Chronicle, August 14, 1987. Manning, Peter. “Technological Dramas and the Police: Statement and Counterstatement in Organizational Analysis.” Criminology 30 (1991): 327-46. Manwaring-Wright, S. The Policing Revolution: Police Technology, Democracy, and Liberty in Britain. Brighton, UK: Harvester, 1983. Marchand, Donald A. Police Intelligence Information and Privacy: Policy Guidelines for the 1980s. Columbia, SC: Bureau of Governmental Research and Service, University of South Carolina. Marx, Gary T. Undercover: Police Surveillance in America. Berkeley: University of California Press, 1988. Marx, Gary T. and Nancy Reichman. “Routinizing the Discovery of Secrets: Computers and Informants.” American Behavioral Scientist 27 (1984): 423-52. Marzulli, John. “Cops Go High-Tech to Net Stalkers.” Daily News, October 21, 1999, p. 32. McDonald, Phyllis Partial. “Managing Police Operations: Implementing the NYPD Crime Control Model Using CompStat.” In Analyzing Crime Patterns: Frontiers of Practice, eds. Victor Goldsmith, et al. Thousand Oaks, CA: Sage, 2000. “National Security, Law Enforcement, and Business Secrets Under the Freedom of Information Act.” Business Lawyer 38 (1982-3): 707-39. “NYC’s CompStat Continues to Win Admirers.” Law Enforcement Journal (October 31, 1997): 55. Perotta, Tom. “Police Request Broader Surveillance Rights.” New York Law Journal

54 228 (September 26, 2002): 1. “Police and Electronics.” Chip 10 (October 1982): 16-20. “Police Computers Used for Improper Tasks.” New York Times, November 1, 1992, p. A38. Pounder, Chris and Stuart Anderson. The Police Use of Computers. Edinburgh, Scotland: TAG(S), 1982. Pounder, C.N.M. “Data Protection and the Police.” Journal of Law and Society 10 (1983): 109-17. Rogers, Donna. “Trends in Crime Analysis and Crime Mapping.” Law Enforcement Technology (May 2000): 36. * Safir, Howard. Security: Policing Your Homeland, Your State, Your City. New York: St. Martin’s Press, 2003. * Safir, Howard. “Surveillance.” In Security: Policing Your Homeland, Your State, Your City, 119-33. New York: St. Martin’s Press, 2003. * Safir, Howard. “Technology and Policing.” In Security: Policing Your Homeland, Your State, Your City, 23-36. New York: St. Martin’s Press, 2003. Scarborough, Steve. “New AFIS Looks at Partial Prints.” Law Enforcement Technology (May 2001): 80. Schwabe, William, et al. Challenges and Choices for Crime-Fighting Technology: Federal Support of State and Local Law Enforcement. Santa Monica, CA: The Rand Corporation, 2001. Strandberg, Keith W. “Speeding Up Identifications.” Law Enforcement Technology (May 2001): 42-7. Tobias, Marc Weber. Police Communications. Springfield: Thomas, 1974. Tuttle, Harris B., Sr. “History of Photography in Law Enforcement.” Finger Print and Identification Magazine 43 (October 1961):3-28. Walsh, William. “CompStat: An Analysis of an Emerging Managerial Program.” Policing: An International Journal of Policing Strategies and Management 24 (2001). Woodward, Calvin. “Police on the Internet Trail: Online Data Can Be Used in Probes.” Richmond Times-Dispatch, May 28, 1999.

Criminal Justice Information Systems

Askin, Frank. “Police Dossiers and Emerging Principles of First Amendment Adjudication.” Stanford Law Review 22 (1970): 196. Beaser, Lawrence J. “Computerized Criminal Justice Information Systems: A Recognition of the Competing Interests: An Introduction.” Villanova Law Review 22 (1977): 1172-80. Belair, Robert R. Criminal Justice Information Policy: Intelligence and Investigative Records. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics, 1984. Belair, Robert R. Criminal Justice Information Policy: Privacy and Juvenile Justice Records. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics, 1983. Calpin, J.C., et al. Evolution and Interface of Four Criminal Justice Information Systems: Interim Report, 1979. National Criminal Justice Information and Statistics Service, 1979. “Computerized Criminal Justice Information Systems: A Recognition of Competing Interests.” Villanova Law Review 22 (1977): 1171-1213. Cooper, Gary R. and Robert R. Cooper. Criminal Justice Information Policy: Privacy and the Private Employer. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics, 1981. Cooper, Gary R., et al. Privacy and Security of Criminal History Information:

55 Compendium of State Legislation. Sacramento, CA: U.S. Department of Justice, Bureau of Justice Statistics, 1981. “Data Accuracy in Criminal Justice Information Systems: The Need for Legislation to Minimize Constitutional Harm.” Computer/Law Journal 6 (Spring 1986): 677-747. Dilworth, Donald, ed. Identification Wanted: Development of the American Criminal Identification System, 1893-1943. Gaithersburg, MD: International Association of Chiefs of Police, 1977. “Dissemination of Arrest Records and the Iowa Tracis Bill.” Iowa Law Review 59 (June 1974): 1162-93. Donash, Shelly Feuer. “Database Program Targets Illegal Gun Traffic.” New York Times, May 13, 2001. Draper, Hayward L. “Privacy and Police Intelligence Data Banks: A Proposal to Create a State Organized Crime Intelligence System and to Regulate the Use of Criminal Intelligence Information.” Harvard Journal on Legislation 14 (December 1976): 1- 110. Flaherty, David H. “Protecting Privacy in Police Information Systems: Data Protection in the Canadian Police Information Centre.” University of Toronto Law Journal 36 (Spring 1986): 116-48. Friesen, Ron J. “Privacy and Security of Data Banks.” In Proceedings of the Workshop on Mapping and Related Applications of Computers to Canadian Work, eds. J.E. Watkin and F.R. Lipsett, 149-60. Ottawa, Canada: National Research Council, 1977. Goldberg, Carey. “DNA Databanks Giving Police a Powerful Weapon, and Critics.” New York Times, February 19, 1998, p. A1. Laucher, J.W., ed. “Criminal Justice Information and Statistics Systems.” In Proceedings of the Fourth International Search Symposium. Washington, DC: Search Group, Inc., 1979. Massachusetts. Governor’s Commission on Privacy and Personal Data. A Report on Certain Aspects of the Massachusetts Criminal Justice Information Systems. Boston: Governor’s Commission on Privacy and Personal Data, 1974. Murphy, John J. Arrest by Computer: The Controversy Over Bail and Extradition. Lexington, MA: Lexington Books, 1975. Nevada. Commission on Crime, Delinquency, and Corrections. Nevada Privacy and Security Plan: A Component of the State Criminal Justice Information System Development Program. Carson City, NV: Nevada Commission on Crime, Delinquency, and Corrections, 1976. “New Computer System to Extend Long Arm of Law in N.Y.” Salt Lake Tribune, December 25, 1967, p. 8A. North Carolina. Department of Natural Resources and Community Development. North Carolina: Security and Privacy Plan for the North Carolina Criminal Justice Information System. Raleigh, NC: North Carolina Department of Natural Resources and Community Development, 1976. Nowakowski, Elizabeth G. “Criminalizing of Illegal Aliens: Work Authorization Cards May Invade Privacy.” The Journal of Criminal Law and Criminology 72 (Summer 1981): 637-70. Rosenfeld, A.R. “Security and Privacy of Criminal Justice Information Systems.” State Government 47 (Winter 1974): 37-41. Search Group, Inc. National Conference on News Media Access to Criminal Justice Information Proceedings, January 17-18, 1980. Sacramento, CA: Search Group, Inc., 1980. Search Group, Inc. Standards for Security and Privacy of Criminal Justice Information. 2nd ed. Sacramento, CA: The Search Group, 1978. Strandberg, Keith W. “Speeding Up Identifications.” Law Enforcement Technology (May 2001): 42-7.

56 “Symposium: Computerized Criminal Justice Information Systems—A Recognition of Competing Interests.” Villanova Law Review 22 (1977): 1171-1213. Trubow, George B. Privacy and Security of Criminal History Information: An Analysis of Privacy Issues. Washington, DC: GPO, 1978. Trubow, George B. Privacy and Security of Criminal History Information: Compendium of State Legislation. Washington, DC: National Criminal Justice Information and Statistics Service, 1978. Tuttle, Harris B., Sr. “History of Photography in Law Enforcement.” Finger Print and Identification Magazine 43 (October 1961):3-28. United States. Congress. Senate. Committee on the Judiciary. Security and Privacy of Criminal Arrest Records. Washington, DC: GPO, 1972. United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Constitutional Rights. Criminal Justice Data Banks: 1974. Washington, DC: GPO, 1974. United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Constitutional Rights. Criminal Justice Information and Protection of Privacy Act of 1974. Washington, DC: GPO, 1975. United States. Department of Justice. Bureau of Justice Statistics. Criminal Justice Information Policy: Privacy and Juvenile Justice Data. Washington, DC: GPO, 1982. United States. Department of Justice. Bureau of Justice Statistics. Criminal Justice Information Policy: Privacy and the Private Employer. Washington, DC: U.S. Department of Justice, 1981. United States. Department of Justice. Bureau of Justice Statistics. Criminal Justice Information Policy: Research Access to Criminal Justice Data. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics, 1982. United States. Department of Justice. Bureau of Justice Statistics. Privacy and Security of Criminal History Information: Privacy and the Media. Washington, DC: U.S. Department of Justice, 1979. United States. Department of Justice. Federal Bureau of Investigation. National Crime Information Center. Computerized Criminal History Program: Background, Concept, and Policy. Washington, DC: Federal Bureau of Investigation, 1981. United States. Department of Justice. Law Enforcement Assistance Administration. National Criminal Justice Information and Statistics Service. Comprehensive Data Systems Program: Guideline Manual. Washington, DC: National Criminal Justice Information and Statistics Service, 1978. United States. Department of Justice. Law Enforcement Assistance Administration. National Criminal Justice Information and Statistics Service. Computer Crime: Criminal Justice Resource Manual. Washington, DC: U.S. Department of Justice, 1979. United States. Department of Justice. Law Enforcement Assistance Administration. National Criminal Justice Information and Statistics Service. Confidentiality of Research and Statistical Data. Washington, DC: U.S. Department of Justice, 1979. United States. Department of Justice. Law Enforcement Assistance Administration. National Criminal Justice Information and Statistics Service. Privacy and Security of Criminal History Information: A Guide to Dissemination. Washington, DC: National Criminal Justice Information and Statistics Service, 1977. United States. Department of Justice. Law Enforcement Assistance Administration. National Criminal Justice Information and Statistics Service. Privacy and Security of Criminal History Information: A Summary of State Plans. Washington, DC: National Criminal Justice Information and Statistics Service, 1977. United States. Department of Justice. Security and Privacy of Criminal Justice Information: A Bibliography. Washington, DC: U.S. Department of Justice, 1979. Whisenand, Paul M. “Automated Police Information Systems: An Argument for

57 Vertical and Horizontal Integration.” The Journal of Criminal Law, Criminology, and Police Science 62 (1971): 422-9. Wiesel, George. “INPOL: The West German Police Information System.” Police Studies 4 (1980): 22-35.

Privacy Protection Act of 1980

Privacy Protection Act of 1980, Pub. L. No. 96-440, 94 Stat. 1879-1883 (1980).

Computer Matching and Privacy Protection Act of 1988

Computer Matching and Privacy Protection Act of 1988, Pub. L. No. 100-503, 102 Stat. 2507 (1988), Pub. L. No. 101-56, 103 Stat. 149 (1989), Pub. L. No. 101-508, 104 Stat. 1388-334 (1990). United States. Congress. Senate. Computer Matching and Privacy Protection Act of 1986: Hearing Before the Subcommittee on Oversight of Government Management of the Committee on Governmental Affairs. Washington, DC: GPO, September 16, 1986. Van Geel, Mieke. “The Computer Matching and Privacy Act of 1988.” Tilburg Foreign Law Review 2 (1992): 41.

Cryptography

Adam, John. “Cryptography = Privacy?” IEEE Spectrum (August 1992): 29. Bamford, James. The Puzzle Palace: A Report on America’s Most Secret Agency. Boston, MA: Houghton Mifflin, 1982. Beckett, B. Introduction to Cryptography. Oxford, UK: Blackwell Scientific Publications, 1988. Bellin, David. “Who Holds the Keys? The U.S. Government & Cryptography Policy.” Computers and Society 24 (September 1994): 6-7. * Bidzos, D. James. “Public Key Cryptography.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 121-134. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Bidzos, D. James and B.S. Kaliski. An Overview of Cryptography. LAN Times Network Technology, 1990. Blanchette, J.-F. and D.G. Johnson. “Cryptography, Data Retention, and the Panopticon Society.” Computers & Society 28 (June 1998): 1-2. Brandstad, Dennis, et al. Report of the Workshop on Cryptography in Support of Computer Security. NBSIR 77-1291. September 1977. Branstad, Dennis K. “Data Protection Through Cryptography.” Dimensions 59 (September 1975): 195-7. Branstad, Dennis K., et al. Report of the Workshop on Cryptography in Support of Computer Security. Washington, DC: National Bureau of Standards, September 1977. Bright, Herbert S. and Richard L. Enison. “Cryptography Using Modular Software Elements.” In Proceedings of the National Computer Conference, vol. 45, 113-23. Montvale, NJ: AFIPS Press, 1976. Bright, Herbert S. and Richard L. Enison. “Quasi-Random Number Sequences From a Long-Period TLP Generator, with Remarks on Applications to Cryptography.” ACM Computing Surveys 11 (December 1979): 357-70. Burris, Harrison R. “Computer Network Cryptography Engineering.” In Proceedings of the National Computer Conference, vol. 45, 91-6. Montvale, NJ: AFIPS Press, 1976. Burris, Harrison R. “A Security Analysis of the Federal Data Encryption Standard.” In

58 Proceedings of the 1978 Asilomar Conference on Circuits, Systems, and Computers, 481-6. IEEE, 1978. Chaum, David. “The Dining Cryptographer’s Problem: Unconditional Sender and Receiver Untraceability.” Journal of Cryptography 1 (1988): 65-75. Chesson, Frederick W. “Computers and Cryptography.” Datamation 19 (January 1973): 62-4, 77-81. Crandall, Richard E. “The Challenge of Large Numbers.” Scientific American (February 1997). Dam, Kenneth W. and Herbert S. Lin, eds. Cryptography’s Role in Securing the Information Society. Washington, DC: National Academy Press, 1996. * Deavours, Cipher A. “Unicity Points in Cryptanalysis.” Cryptologia 1 (January 1977): 46-68. * Deavours, Cipher A. and Louis Kruh. “Mechanics of the German Telecipher Machine.” Cryptologia 10 (October 1986): 243-7. Deavours, Cipher A. and Louis Kruh. Machine Cryptography and Modern Cryptanalysis. Norwood, MA: Artech House, 1985. * Deavours, Cipher A., et al. Cryptology: Yesterday, Today, and Tomorrow. Norwood, MA: Artech House, Inc., 1987. Denning, Dorothy Elizabeth R. Cryptography and Data Security. Reading, MA: Addison-Wesley, 1982. Diffie, Whitfield. “The First Ten Years of Public Key Cryptography.” Proceedings of the IEEE 76 (May 1988): 560-77. * Diffie, Whitfield. “Ultimate Cryptography.” Communications of the ACM 44 (March 2001): 84-6. Diffie, Whitfield and Martin E. Hellman. “Exhaustive Cryptanalysis of the NBS Data Encryption Standard.” IEEE Computer (June 1977): 74-84. Diffie, Whitfield and Martin E. Hellman. “Multiuser Cryptographic Techniques.” In Proceedings of the National Computer Conference, vol. 45, 109-12. Montvale, NJ: AFIPS Press, 1976. Diffie, Whitfield and Martin E. Hellman. “New Directions in Cryptography.” IEEE Transactions on Information Theory 22 (November 1976): 644-54. Diffie, Whitfield and Martin E. Hellman. “Privacy and Authentication: An Introduction to Cryptography.” Proceedings of the IEEE 67 (March 1978): 397-427. * Diffie, Whitfield and Susan Eva Landau. Privacy on the Line: The Politics of Wiretapping and Encryption. Cambridge, MA: MIT Press, 1998. Diffie, Whitfield, et al. “Authentication and Authenticated Key Exchanges.” In Designs, Codes, and Cryptography, vol. 2, 107-25. 1992. Feistel, Horst. “Cryptographc Coding for Data-Bank Privacy.” RC 2827. Yorktown Heights, NY: IBM Corporation, 1970. Feistel, Horst. “Cryptography and Computer Privacy.” Scientific American 228 (May 5, 1973): 15-23. Feistel, Horst, et al. “Some Cryptographic Techniques for Machine-to-Machine Data Communications.” Proceedings of the IEEE 63 (November 1975): 1545-54. Ferguson, Niels and Bruce Schneier. Practical Cryptography. John Wiley & Sons, 2003. Ferguson, Tom. Private Locks, Public Keys, and State Secrets: New Problems in Guarding Information with Cryptography. Cambridge, MA: Program on Information Resources Privacy, Harvard University, 1982. Friedman, T.D. and Lance J. Hoffman. “Execution Time Requirements for Encipherment Programs.” Communications of the ACM 17 (1974): 445-9. Friedman, William F. “Edgar Allan Poe, Cryptographer.” In Articles on Cryptography and Cryptanalysis Reprinted from the Signal Corps Bulletin, 181-2. Washington, DC: GPO, 1942.

59 Friedman, William F. Military Cryptanalysis. 4 vols. Washington, DC: GPO, 1938- 1941. Friedman, William F. and E.S. Friedman. The Shakespearean Ciphers Examined. Cambridge, UK: Cambridge University Press, 1957. Froomkin, A. Michael. “The Metaphor is the Key: Cryptography, the Clipper Chip, and the Constitution.” University of Pennsylvania Law Review 143 (1995): 709-897. Gardiner, Martin. “A New Kind of Cypher That Would Take Millions of Years to Break.” Scientific American 237 (August 1977): 120-4. Gilbert, Lee A. “Patent Secrecy Orders: The Unconstitutionality of Interference in Civilian Cryptography Under Present Procedures.” Santa Clara Law Review 22 (1982): 325, 357. Greenwood, D. “The Basics of Public Key Cryptography and Digital Signatures.” In Toward an Electronic Patient Record ’97: Proceedings, vol. 1, 128-31. Newton, MA: MRI, 1997. Gudes, Ehud, et al. “The Application of Cryptography for Data Base Security.” In Proceedings of the National Computer Conference, vol. 45, 97-107. Montvale, NJ: AFIPS Press, 1976. Guillou, Louis C. and Bernard Lorig. “Cryptography and Teleinformatics.” Computers & Security 1 (January 1982): 27-33. Heidema, John H. “Computer Cryptography for Coded Communications.” Personal Computing 4 (November 1980): 66-8. Hellman, Martin E. “Computer Encryption: Key Size.” Science 198 (October 7, 1977): 8. Hellman, Martin E. “The Mathematics of Public-Key Cryptography.” Scientific American 241 (August 1979): 146-57. Hellman, Martin E. and Whitfield Diffie. “A Critique of the Proposed Data Encryption Standard.” Communications of the ACM (March 1976): 164-5. Herlihy, M.P. and J.D. Tygar. “How to Make Replicated Data Secure.” In Advances in Cryptography—CRYPTO ’87, ed. Pomerance. Berlin, Germany: Springer-Verlag, 1987. Ingemarsson, Ingemar. “Analysis of Secret Functions with Application to Computer Cryptography.” In Proceedings of the National Computer Conference, vol. 45, 125-7. Montvale, NJ: AFIPS Press, 1976. * Kahn, David. “The Annotated ‘The American Black Chamber.’” Cryptologia 9 (January 1985): 1-37. Kahn, David. Kahn on Codes: Secrets of the New Cryptology. New York: Macmillan, 1983. Kahn, David. “Modern Cryptography.” Scientific American 215 (July 1966): 38-46. Klüber, Johann Ludwig. Kryptographik. Tübingen, Germany: J.G. Cotta, 1809. Kohnfelder, L.M. “On the Signature Reblocking Problem in Public-Key Cryptosystems.” Communications of the ACM 21 (February 1978): 79. Kohnfelder, L.M. “Towards a Practical Public-Key Cryptosystem.” B.A. thesis, Massachusetts Institute of Technology, 1978. Kolata, Gina B. “100 Quadrillion Calculations Later, Eureka!” New York Times, April 27, 1994, p. A13. Kolata, Gina B. “Computer Encryption and the National Security Agency Connection.” Science 197 (July 29, 1977): 438-40. Kolata, Gina B. “Cryptography on the Brink of a Revolution?” Science 197 (August 19, 1977): 747-8. Konheim, Alan G. Cryptography: A Primer. New York: John Wiley and Sons, 1981. Kranakis, E. Primality and Cryptography. Stuttgart: Wiley-Teubner, 1986. Krishnamurthy, E.V. “Computer Cryptography Techniques for Processing and Storage of Confidential Information.” International Journal of Control (November 1970): 753-

60 61. Kruh, Louis. “Cipher Equipment: Hagelin Pocket Cryptographer, Type CD-57.” Cryptologia 1 (1977): 255-60. Kruh, Louis. “Cryptology and the Law—VII.” Cryptologia 10 (October 1986): 248. * Kruh, Louis. “The Genesis of the Jefferson/Bazeries Cipher Machine.” Cryptologia 5 (October 1981): 193-208. * Kruh, Louis. “Memories of Friedman.” Cryptologia 4 (January 1980): 23-6. * Kruh, Louis. “Reminiscences of a Master Cryptologist.” Cryptologia 4 (January 1980): 45-50. * Kruh, Louis. “Who Wrote ‘The American Black Chamber.’” Cryptologia 2 (April 1978): 130-3. Langie, André. Cryptography. London: Constable & Co., Ltd, 1922. Langie, André and E.A. Soudart. Traité de cryptographie. Paris: F. Alcan, 1925. Lempel, Abraham. “Cryptology in Transition.” ACM Computing Surveys 11 (December 1979): 285-304. Lennon, Richard E. “Cryptography Architecture for Information Security.” IBM Systems Journal 17 (1978): 138-50. Lennon, Richard E. “Putting Data Encryption to Work, Part II.” Mini-Micro Systems 11 (December 1978): 85-8. Lin, Hung-Yu. “Modern Cryptography and Its Application in Communication Security.” Ph.D. diss., University of Missouri-Kansas City, 1995. Massey, J.L. “An Introduction to Contemporary Cryptography.” Proceedings of the IEEE 76 (1988). Menezes, Alfred J., et al. Handbook of Applied Cryptography. CRC Press, 1996. Meyer, Carl H. “Design Considerations for Cryptography.” In Proceedings of the National Computer Conference, vol. 42, 603-6. Montvale, NJ: AFIPS Press, 1973. Meyer, Carl H. “Enciphering Data for Secure Transmission.” Computer Design (April 1974): 129-34. Meyer, Carl H. and Stephen M. Matyas. Cryptography: A New Dimension in Computer Data Security—A Guide for the Design and Implementation of Secure Systems. New York: John Wiley & Sons, 1982. Meyer, Carl H. and W.L. Tuchman. “Pseudorandom Codes Can Be Cracked.” Electronic Design 23 (November 9, 1972): 74-6. Micali, Silvio. Fair Cryptosystems. Technical Memo. Laboratory for Computer Science, Massachusetts Institute of Technology, August 21, 1992. Mueller-Schloer, Christian and Neal R. Wagner. “The Implementation of a Cryptography-Based Secure Office System.” In Proceedings of the National Computer Conference, vol. 51, 487-92. Arlington, VA: AFIPS Press, 1982. Notz, W.A. and J.L. Smith. An Experimental Application of Cryptography to a Remotely Accessed Data System. RC-3508. White Plains, NY: IBM Corporation, August 1971. Peterson, Ivars. “A Fierce Debate Erupts Over Cryptography and Privacy.” Science News 143 (June 19, 1993): 394-6. * Phillips, David J. “Cryptography, Secrets, and the Structuring of Trust.” In Technology and Privacy: The New Landscape, eds. Philip E. Agre and Marc Rotenberg, 243-76. Cambridge, MA: MIT Press, 1997. Pierce, Kenneth J. “Public Cryptography, Arms Export Controls, and the First Amendment: A Need for Legislation.” Cornell International Law Journal 17 (1984): 197-236. * Piper, Fred and Sean Murphy. Cryptography: A Very Short Introduction. Oxford, UK: Oxford University Press, 2002. Piper, Fred, et al. Digital Signatures: Information Systems and Control. ISACA, 2000.

61 Public Cryptography Study Group. “Report of the Public Cryptography Study Group.” Academe 67 (December 1981): 371-82. Reed, I.S. and Rein Turn. “A Generalization of Shift-Register Sequences.” Journal of the ACM (July 1969): 461-73. Reed, I.S. and Rein Turn. “A Generalization of Shift-Register Sequences.” P-3698. Santa Monica, CA: The Rand Corporation, January 1969. Rotenberg, Marc. “The Only Locksmith in Town.” Index on Censorship (January 1990): 12. Sacco, Luigi. Manual of Cryptography. Washington, DC: GPO, 1941. Schneier, Bruce. Applied Cryptography. Second Edition. New York: Wiley, 1996. Schneier, Bruce. “Why Cryptography is Harder Than It Looks.” Information Security Bulletin 2 (March 1997): 31-6. Schwartz, John. “U.S. Data Decoding Plan Delayed.” Washington Post, June 8, 1993, p. A12. Shapley, Deborah. “DOD Vacillates on Wisconsin Cryptography Work.” Science 201 (July 14, 1978): 141. Simmons, Gustavus J., ed. Contemporary Cryptography: The Science of Information Integrity. New York: IEEE Press, 1992. Singh, Simon. The Code Book: The Evolution of Secrecy from Mary Queen of Scots to Quantum Cryptography. New York: Doubleday, 1999. Sinkov, Abraham. Elementary Cryptanalysis: A Mathematical Approach. New York: Random House, 1968. Skatrud, Ralph O. “The Application of Cryptographic Techniques to Data Processing.” In Proceedings of the Fall Joint Computer Conference, vol. 35, 111-17. Montvale, NJ: AFIPS Press, 1969. Skatrud, Ralph O. “Computers and Cryptography.” In Privacy: Legal and Technical Protection in the Computer Age. Berkeley: University of California, October 1970. Skatrud, Ralph O. “A Consideration of the Application of Cryptographic Techniques to Data Processing.” In Proceedings of the Fall Joint Computer Conference, vol. 35, 111-7. 1969. Skatrud, Ralph O. “Cryptographic Techniques in Data Processing.” Computer Services (July 1970): 13. Smid, Miles E. and Dennis K. Branstad. “The Data Encryption Standard: Past and Future.” In Contemporary Cryptography: The Science of Information Integrity, ed. Gustavus J. Simmons, 43-6. Smith, John Lynn. The Design of Lucifer, A Cryptographic Device for Data Communications. RC-3326. White Plains, NY: IBM Corporation, April 15, 1971. Smith, John Lynn. “Hardware Implementation of a Cryptographic System.” IBM Technical Disclosure Bulletin 14 (August 1971): 1004-8. Smith, John Lynn, et al. “An Experimental Application of Cryptography to a Remotely Accessed Data System.” Proceedings of the ACM (1972): 282-98. Smith, Laurence Dwight. Cryptography. New York: Dover Publications, 1955. * Smith, Laurence Dwight. Cryptography: The Science of Secret Writing. New York: W.W. Norton & Company, Inc., 1943. Smith, Richard E. Internet Cryptography. Addison Wesley, 1997. Stahl, Fred Alan. “A Homophonic Cipher for Computational Cryptography.” In Proceedings of the National Computer Conference, vol. 42, 563-8. Montvale, NJ: AFIPS Press, 1973. Stahl, Fred Alan. On Computational Security. Report R-637. January 1974. In NBS# 74077003. Box 610, Folder 21. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Turchen, Lesta V. “Herbert Osborne Yardley and American Cryptography.” M.A. thesis, University of South Dakota, 1969.

62 Van Tilborg, H.C.A. An Introduction to Cryptography. Norwell, MA: Kluewer, 1988. Walsh, D. Codes and Cryptography. Oxford, UK: Oxford Science Publications, 1988. Walsh, John. “Shunning Cryptocensorship.” Science 212 (June 12, 1981): 1250. Wayner, Peter. Disappearing Cryptography. Boston, MA: AP Professional, 1996. Weingarten, Fred W. “Cryptography: Who Holds the Key?” SIAM News (January- February 1997): 2. Willett, Michael. “A Tutorial on Public Key Cryptography.” Computers & Security 1 (January 1982): 72-9. Wood, Charles Cresson. “Future Applications of Cryptography.” Computers & Security 1 (January 1982): 65-71. Zim, Herbert S. Codes and Secret Writing. New York: William Morrow and Co., 1948.

Access Control

Bergart, Jeffrey G. “Computer Security, Access Control, and Privacy Protection in Computer Systems.” M.A. thesis, University of Pennsylvania, 1972. Bergart, Jeffrey G., et al. “An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.” AD-755. Springfield, VA: National Technical Information Service, 1972. Hoffman, Lance J. “The Formulary Model for Access Control and Privacy in Computer Systems.” Ph.D. diss., Stanford University, 1970. Hoffman, Lance J. “The Formulary Model for Flexible Privacy and Access Control.” In Proceedings of the Fall Joint Computer Conference, vol. 39, 587-601. Montvale, NJ: AFIPS Press, 1971. * Hruska, Jan. “Access Control for Personal Computers.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 607-16. Oxford, UK: Butterworth- Heinemann Ltd, 1992. Hsiao, David K. “Access Control in an Online File System.” In File Organization: Selected Papers from File 68: An IAG Conference, 246-57. Kingslake, R. “Access Control Requirements for Control and Privacy.” Information Privacy 1 (September 1979): 312-4. Mulgan, G.J. Communication and Control. New York: The Guilford Press, 1991. “Problems and Potential Solutions in Computer Control.” Industrial Security (April 1969). Reed, Susan K. and Martha Gray. Controlled Accessibility Bibliography. NBS Technical Note 780. June 1973. Spiro, Bruce E. “Access Control: The Key to Information Security in a Remote User System.” In Proceedings of the National Computer Conference, vol. 56, 455. Reston, VA: AFIPS Press, 1987. Wood, Helen M. “Access Control Mechanisms for a Network Operating System.” In Proceedings of the National Computer Conference, vol. 48, 821-9. Montvale, NJ: AFIPS Press, 1979. Wood, Helen M. “The Use of Passwords for Controlled Access to Computer Resources.” In Proceedings of the National Computer Conference, vol. 46, 27-33. Montvale, NJ: AFIPS Press, 1977. Wood, Helen M. The Use of Passwords for Controlled Access to Computer Resources. Special Publication 500-9. National Bureau of Standards. May 1977. Wood, Helen M. and Stephen R. Kimbleton. “Access Control Mechanisms for a Network Operating System.” In Proceedings of the National Computer Conference, 821-30. 1979. Computer Science & Technology: The Use of Passwords for Controlled Access to Computer Resources. U.S. Department of Commerce, National Bureau of Standards, May 1977. In U.S. Government Computing Collection, ca. 1945-1983. CBI 63. Box

63 16. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN.

Encryption

Anthes, Gary H. “Federal Encryption Policy Wins Few Fans.” Computerworld (February 14, 1994): 57. Athanasiou, Tom. “Encryption: Technology, Privacy, and National Security.” Technology Review 89 (August-September 1986): 56-66. Bamford, James, et al. “Computer Encryption and the National Security Agency Connection.” Science 97 (July 29, 1977): 438-40. Bayh, Birch. “Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard.” IEEE Communication Society Magazine 16 (November 1978): 53-5. Biham, Eli and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. New York: Springer-Verlag, 1993. Brandstad, Dennis. Computer Security and the Data Encryption Standard. NBS Special Publication 500-27. February 1978. Branstad, Dennis K., ed. Computer Security and the Data Encryption Standard. Washington, DC: National Bureau of Standards, February 1978. Bryce, Heather. “The NBS Data Encryption Standard: Products and Principles.” Mini- Micro Systems 14 (March 1981): 111-6. Carson, John H., et al. “A Microprocessor Selective Encryption Terminal for Privacy Protection.” In Proceedings of the National Computer Conference, vol. 46, 35-8. Montvale, NJ: AFIPS Press, 1977. Coppersmith, Don. “The Data Encryption Standard and Its Strength Against Attacks.” IBM Research Journal 38 (May 1994). Daly, James. “Security Pros, Clinton Clash Over Encryption Standards.” Computerworld (January 31, 1994): 79. * Denning, Dorothy Elizabeth R. and Dennis K. Branstad. “A Taxonomy for Key Escrow Encryption Systems.” Communications of the ACM 39 (March 1996): 34-40. Edwards, D.J. On-Line Crytanalytic Aid System (OCAS). MAC TR-27. Cambridge, MA: MIT Electrical Engineering Department, May 1966. Ehrlich, Paul. “High Cost Stifles Sales of Encryption Devices in U.S.” MIS Week (November 4, 1981): 1. Ehrsam, W.F., et al. “A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard (DES).” IBM Systems Journal 17 (1978): 106-25. Electronic Frontier Foundation. Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. Sepastopol, CA: O’Reilly, 1998. Gait, Jason. “Encryption Standard: Validating Hardware Techniques.” Dimensions 62 (July-August 1978): 22-4. * Ganley, Michael and Fred Piper. “Encryption Algorithms.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 91-119. Oxford, UK: Butterworth- Heinemann Ltd, 1992. Goldwasser, S. and S. Micali. “Probabilistic Encryption.” Journal of Computer and System Sciences 28 (April 1984): 270-99. Jackson, K.M. Secure Information Transfer: PC Encryption—A Practical Guide. Oxford, UK: Blackwell Scientific Publications, 1990. Katzan, Harry S., Jr. Standard Data Encryption Algorithm. New York: Petrocelli Books, 1977. * King, Henry R. “Big Brother, the Holding Company: A Review of Key-Escrow Encryption Technology.” Rutgers Computer & Technology Law Journal 21 (1995): 224-62.

64 Kinnucan, Paul. “Data Encryption Gurus: Tuchman and Meyer.” Mini-Micro Systems 11 (October 1978): 54-60. Kline, Charles S. and Gerald J. Popek. “Public Key vs. Conventional Key Encryption.” In Proceedings of the National Computer Conference, vol. 48, 831-7. Montvale, NJ: AFIPS Press, 1979. Klopfenstein, Dena R. “Deciphering the Encryption Debate: A Constitutional Analysis of Current Regulations and a Prediction for the Future.” Emory Law Journal 48 (1999): 765, 774. Leavitt, Don. “Encrypting Routines Offered, But Not Widely Used.” Computerworld (December 6, 1972): 18. Lewis, Peter H. “The FBI Sting Operation on Child Pornography Raises Questions About Encryption.” New York Times, September 25, 1995. Markoff, John. “Industry Defies U.S. on Data Encryption.” New York Times, January 14, 1994, p. D3. Markoff, John. “Industry Rebuffs U.S. on Encryption.” New York Times, November 8, 1995, p. C3. Markoff, John. “Move on Unscrambling of Messages is Assailed.” New York Times, April 17, 199, p. A16. Mintz, John and John Schwartz. “Encryption Program Draws Fresh Attacks.” Washington Post, September 18, 1993, p. C1, C6. Morris, Robert, et al. “Assessment of the National Bureau of Standards’ Proposed Federal Data Encryption Standard.” Cryptologia 1 (July 1977): 282-91. Needham, Roger M. and Michael D. Schroeder. “Using Encryption for Authentication in Large Networks of Computers.” Communications of the ACM 21 (December 1978): 993-9. Pless, V.S. “Encryption Schemes for Computer Confidentiality.” IEEE Transactions on Computers 26 (1977): 1133-6. Popek, Gerald J. and Charles S. Kline. “Encryption and Secure Computer Networks.” ACM Computing Surveys 11 (December 1979): 331-56. Preston, Alyson. “Encryption Technology is on the Rise in the Private Sector.” PC Week (June 28, 1993): 207. Ritts, Ronald R. “Data Encryption Basics.” Telecommunications 15 (June 1981): 39- 44. * Rivest, Ronald L. “‘Forwards and Backwards’ Encryption.” Cryptologia 4 (January 1980): 30-3. Rushinek, A. and S. Rushinek. “Data Encryption Features for Computer Hardware and Software Profitability: I/O Ports, Expansion Slots, Algorithms, Cyphers, and Security.” Computers & Security 10 (June 1991): 345-57. Simmons, Gustavus J. “Symmetric and Asymmetric Encryption.” ACM Computing Surveys 11 (December 1979): 305-30. Solomon, Richard J. “The Encryption Controversy.” Mini-Micro Systems 11 (February 1978): 22-6. Soma, John T. and C.P. Henderson. “Encryption, Key Recovery, and Commercial Trade Secret Assets: A Proposed Legislative Model.” Rutgers Computer & Technology Law Journal 25 (1999): 97-134. Sykes, David J. “Protecting Data by Encryption.” Datamation 22 (August 1976): 81- 5. United States. Department of Commerce. National Bureau of Standards. Data Encryption Standard. IFIPS Pub. 46. Washington, DC: GPO, January 1977. United States. Department of Commerce. National Bureau of Standards. “Encryption Algorithm for Computer Data Protection.” Federal Register 40 (March 17, 1975). Vedder-Brown, Zhonette M. “Government Regulation of Encryption: The Entry of ‘Big Brother’ or the Status Quo?” American Criminal Law Review 35 (1998): 1387, 1403-

65 4. * Victor, Hillary. “Big Brother is at Your Back Door: An Examination of the Effect of Encryption Regulation on Privacy and Crime.” John Marshall Journal of Computer & Information Law 18 (Spring 2000): 825-73.

Privacy Act of 1974

Alder, Allan and Morton H. Halperin. Litigation under the Federal Freedom of Information Act and Privacy Act. Washington, DC: Center for National Security Studies, 1983. Arnold, Marc and Andrew Kisseloff. “An Introduction to the Federal Privacy Act of 1974 and Its Effect on the Freedom of Information Act.” New England Law Review 11 (1975-6): 463-96. Bearden, Gary. Implementation of the Privacy Act of 1974. Melville, NY: FAIM Technical Products, 1975. Belair, Robert R. “Agency Implementation of the Privacy Act and the Freedom of Information Act: Impact on the Government’s Collection, Maintenance, and Dissemination of Personally Identifiable Information.” The John Marshall Journal of Practice and Procedure 10 (August 1977): 465-512. Belair, Robert R. “Agency Implementation of the Privacy Act and the Freedom of Information Act: Impact on the Government’s Collection, Maintenance, and Dissemination of Personally Identifiable Information.” John Marshall Journal of Practice and Procedure 10 (1977): 465-512. Belair, Robert R. “How the Freedom of Information Act and Privacy Act are Working.” Civil Liberties Review 4 (1977): 10-8. Belair, Robert R. “Less Government Secrecy and More Personal Privacy? Experience with the Freedom of Information and Privacy Acts.” Civil Liberties Review 4 (1977): 10-8. Bergin, Thomas Joseph, Jr. “Federal Agency Implementation of the Privacy Act of 1974.” Ph.D. diss., The American University, 1978. Bigelow, Robert P. “The Privacy Act of 1974.” The Practical Lawyer 21 (September 1, 1975). Bouchard, Robert F. and Justin D. Franklin, eds. Guidebook to the Freedom of Information and Privacy Acts. New York: Clark Boardman, 1980. Bushkin, Arthur A. and Samuel I. Schaen. The Privacy Act of 1974: A Reference Manual for Compliance. McLean, VA: System Development Corporation, 1976. Fong, Elizabeth. Computer Science & Technology: A Data Base Management Approach to Privacy Act Compliance. Washington DC: Dept. of Commerce, National Bureau of Standards, 1977. Gordon, Robert L. The Freedom of Information Act and the Privacy Act. Madison, WI: The University of Wisconsin Law School and University of Wisconsin Extension, 1977. Gorski, James. “Access to Information? Exemptions from Disclosure Under the Freedom of Information Act and the Privacy Act of 1974.” Williamette Law Journal 13 (1976): 135-71. Hyman, U.H. “The Family Educational Rights and Privacy Act of 1974 and College Record Systems of the Future.” Computer/Law Journal 3 (Summer 1982): 563-618. Nycum, Susan Hubbell. Criminal Sanctions Under the Privacy Act of 1974. Menlo Park, CA: Standard Research Institute, 1976. Privacy Act of 1974, Pub. L. No. 93-579, 88 Stat. 1896 (1974), Pub. L. No. 94-394, 90 Stat. 1198 (1976), Pub. L. No. 95-38, 91 Stat. 179 (1977), Pub. L. No. 100-503, 102 Stat. 2513 (1988). “The Privacy Act of 1974: An Overview and Critique.” Washington University Law Quarterly 4 (1976): 667-718.

66 United States. Congress. House of Representatives. Committee on Government Operations. Government Information and Individual Rights Subcommittee. Implementation of the Privacy Act: Data Banks. Washington, DC: GPO, 1975. United States. Congress. House of Representatives. Committee on House Administration. Legislative History of the Privacy Act of 1974: Source Book on Privacy. Washington DC: GPO, 1976. United States. Department of Commerce. National Bureau of Standards. Computer Security Guidelines for Implementing the Privacy Act of 1974. Washington, DC: GPO, 1975. United States. Department of Commerce. National Bureau of Standards. Institute for Computer Sciences and Technology. Computer Security Guidelines for Implementing the Privacy Act of 1974. April 15, 1975. In NBS# NBS00187. Box 695, Folder 1. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. United States. Privacy Protection Study Commission. The Privacy Act of 1974: An Assessment. Washington, DC: GPO, 1977.

Privacy Act of 1988

Bygrave, Lee A. “The Privacy Act of 1988: A Study in the Protection of Privacy and the Protection of Political Power.” Federal Law Review 19 (1990): 128-53.

Right to Financial Privacy Act of 1978

Davitt, Lorena K. “The Right to Financial Privacy Act: New Protection for Financial Records.” Fordham Urban Law Review 8(1979-80): 597-627. Kaplan, Sandy Mitchell. “Financial Privacy in an Electronic Fund Transfer Environment: An Analysis of the Right to Financial Privacy Act of 1978 and California Financial Privacy Law.” University of San Francisco Law Review 13 (1979): 485-503. Kirschner, Nancy M. “The Financial Privacy Act of 1978: The Congressional Response to United States v. Miller—A Procedural Right to Challenge Government Access to Financial Records.” University of Michigan Journal of Law Reform 13 (1979-80): 10- 52. Kuenster, Karen Anne. “The Right to Financial Privacy Act of 1978.” DePaul Law Review 28 (1978-9): 1059-82. “Right to Financial Privacy Act and the SEC.” Washington and Lee Law Review 39 (Summer 1982): 1073-94. Right to Financial Privacy Act of 1978, Pub. L. No. 95-630, 92 Stat. 3697 (1978), Pub. L. No. 96-3, 93 Stat. 5 (1978), Pub. L. No. 96-443, 94 Stat. 1855 (1980), Pub. L. No. 97-320, 96 Stat. 1527 (1982), Pub. L. No. 98-21, 97 Stat. 83 (1983), Pub. L. No. 99-569, 100 Stat. 397 (1986), Pub. L. No. 99-570, 100 Stat. 3207-22 (1986), Pub. L. No. 100-690, 102 Stat. 4357(1988), Pub. L. No. 101-73, 103 Stat. 438, 496, 497, 498 (1989), Pub. L. No. 101-647, 104 Stat. 4791 (1990), Pub. L. No. 102-242, 105 Stat. 2375 (1991), Pub. L. No. 102-550, 106 Stat. 4059 (1992), Pub. L. No. 102-568, 106 Stat. 4342 (1992). Smith, M. Elizabeth. “The Public’s Need for Disclosure v. the Individual’s Right to Financial Privacy: An Introduction to the Financial Privacy Act of 1978.” Administrative Law Review 32 (1980): 511-35. Trubow, George B. and Dennis L. Hudson. “The Right to Financial Privacy Act of 1978: New Protection from Federal Intrusion.” John Marshall Journal of Practice and Procedure 12 (1978-9): 487-508.

Privacy Acts in Canadian Provinces

67

Burns, Peter. “A Retrospective View of the Protection of Privacy Act: A Fragile Rede is Recked.” University of British Columbia Law Review 13 (1979): 123-57. Rankin, T. Murray. “The New Access to Information and Privacy Act: A Critical Annotation.” Ottawa Law Review 15 (1983): 1-37. Rankin, T. Murray. “The New Canadian Access to Information Act and Privacy Act: A Critical Annotation.” Government Publications Review 10 (1983): 287-311. Vaver, David. “What’s Mine is Not Yours: Commercial Appropriation of Personality Under the Privacy Acts of British Columbia, Manitoba, and Saskatchewan.” University of British Columbia Law Review 15 (1981): 241-340. Wilkinson, Margaret Ann. “Impact of the Ontario ‘Freedom of Information and Protection of Privacy Act 1987’ Upon Affected Organizations.” Ph.D., University of Western Ontario, 1992.

National Crime Information Center

Dahl, Mary Karen. “The National Crime Information Center: A Case Study in National Databases.” CPSR Newsletter 6 (1988): 2-15. DeWeese, J. Taylor. “Giving the Computer a Conscience: FBI’s National Crime Information Center.” Harper’s 247 (November 1973): 14. DeWeese, J. Taylor. “Reforming Our ‘Record Prisons’: A Proposal for the Federal Regulation of Crime Data Banks.” Rutgers Camden Law Journal 6 (Summer 1974): 26-83. Hemphill, Stuart R. “Protection of Privacy and Computerized Records in the National Crime Information Center.” University of Michigan Journal of Law Reform 7 (Spring 1974): 594-614. “Protection of Privacy of Computerized Records in the National Crime Information Center.” University of Michigan Journal of Law Reform 7 (Spring 1974): 594-614. Richards, Evelyn. “Proposed FBI Crime Computer System Raises Questions on Accuracy, Privacy: Report Warns of Potential Risk Data Bank Poses to Civil Liberties.” Washington Post, February 13, 1989. Robinson, Stanley. “The National Crime Information Center (NCIC) of the FBI: Do We Want It?” Computers and Automation (June 1971): 16-9. United States. Congress. Office of Technology Assessment. Alternatives for a National Computerized Criminal History System. Washington, DC: GPO, 1982. United States. Congress. Office of Technology Assessment. An Assessment of Alternatives for a National Computerized Criminal History System. Washington, DC: GPO, 1982. United States. Congress. Office of Technology Assessment. A Preliminary Assessment of the National Crime Information Center and the Computerized Criminal History System. PB-291845. Washington, DC: Office of Technology Assessment, December 1978. United States. Department of Justice. National Crime Information Center: The Investigative Tool, A Guide to the Use and Benefits of the NCIC. Washington, DC: GPO, March 1982. United States. Department of Justice. Federal Bureau of Investigation. National Crime Information Center. Computerized Criminal History Program: Background, Concept, and Policy. Washington, DC: Federal Bureau of Investigation, 1981. United States. National Crime Information Center. National Crime Information Center Computerized Criminal History Program: Background, Concept, and Policy. Washington, DC: National Crime Information Center, 1976. University of South Carolina. Bureau of Governmental Research and Service. The History and Background Assessment of the National Crime Information Center and

68 Computerized Criminal History Program. Columbia, SC: Bureau of Governmental Research and Service, University of South Carolina, June 1979.

Omnibus Crime Control and Safe Streets Act of 1968

“Eavesdropping Provisions of the Omnibus Crime Control and Safe Streets Act of 1968: How Do They Stand in Light of Recent Supreme Court Decisions?” Valparaiso University Law Review 3 (Fall 1968): 89-101. Fly, S. “New Taps on Freedom: Title III of the Omnibus Crime Control and Safe Streets Act of 1968.” Nation 208 (June 2, 1969): 697-9.

Criminal History Information Systems

Gallati, Robert R.J. “Security and Privacy Consideration in Criminal History Information Systems.” Technical Report 2. Sacramento, CA: Project SEARCH, California Crime Technological Research Foundation, July 1970. Katzenbach, N. deB. and R.W. Tomc. “Crime Data Centers: The Use of Computers in Crime Detection and Prevention.” Columbia Human Rights Law Review 4 (Winter 1972). Madden, Thomas J. and Helen S. Lessin. “Privacy: A Case for Accurate and Complete Criminal History Records.” Villanova Law Review 22 (1976-7): 1191-1204. National Scientific Corporation Management and Systems Consultants. Michigan: Privacy and Security Plan for Criminal History Record Information. Arlington, VA: National Scientific Corporation Management and Systems Consultants, 1978. New York State. Division of Criminal Justice Services. New York: Criminal History Record Information Plan. Washington, DC: U.S. Department of Justice, 1975. Nolfi, R. Privacy and Security Plan for Criminal History Records in the District of Columbia: Final Report. Washington, DC: District of Columbia Office of Criminal Justice Plans and Analysis, 1976. Oregon. Law Enforcement Council. Oregon: Security and Privacy Plan for Criminal History Record Information Systems. Salem, OR: Oregon Law Enforcement Council, 1976. Project SEARCH. Committee on Security and Privacy. Security and Privacy Considerations in Criminal History Information Systems. Technical Report No. 2. June 1970. In NBS# 71221002. Box 523, Folder 19. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Roth, Jeffrey A. “A Cost Model of Computerized Criminal History Exchange.” In Operations Research in Law Enforcement, Justice, and Societal Security, eds. Sidney H. Brounstein and Murray Kamrass, 19-23. Lexington, MA: Lexington Books, 1976. Thomas, J. and Helen S. Lessin. “Privacy: A Case for Accurate Complete Criminal History Records.” Villanova Law Review 22 (1976-7): 1191-1204.

Crime

Adelaide, J., et al. “Acid Phreak and Phiber Optik: Is Computer Hacking a Crime?” Harper’s Magazine 280 (March 1990): 45-7. American Bar Association. Report on Computer Crime. ABA Task Force on Computer Crime, Section of Criminal Justice, 1984. Andrews, Rodney D. “Computer Crime: The Worm in the Apple.” In The Information Web, ed. C. Gould, 229-58. San Francisco, CA: Westview Press, 1989. Baker, G.D. “Trespassers Will Be Prosecuted: Computer Crime in the 1990s.” Computer/Law Journal 12 (October 1993): 61-100.

69 Ball, Leslie D. “Computer Crime.” Technology Review (April 1982). Barlow, John Perry. “Crime and Puzzlement.” Whole Earth Review (Fall 1990): 45-56. Becker, Jay. “The Trial of a Computer Crime.” Computer/Law Journal 2 (Spring 1980): 441-56. Bequai, August. Computer Crime. Lexington, MA: Lexington Books, 1978. Bequai, August. Technocrimes: The Computerization of Crime and Terrorism. Lexington, MA: Lexington Books/D.C. Heath, 1987. Best, Riba A. and D. Cheryn Picquet. Computer Crime, Abuse, Liability, and Security: A Comprehensive Bibliography, 1970-1984. Jefferson, NC: McFarland, 1985. BloomBecker, Buck. Spectacular Computer Crimes: What They Are and How They Cost American Business Half a Billion Dollars a Year! Homewood, IL: Dow Jones- Irwin, 1990. Bloombecker, Jay. The Computer Crime Law Reporter. Los Angeles, CA: California State University, 1984. Bloombecker, Jay. “International Computer Crime: Where Terrorism and Transborder Data Flow Meet.” Computers & Security 1 (January 1982): 41-53. Bloombecker, Jay. “The Trial of Computer Crime.” International Business Lawyer 9 (1981): 429-32. Bloomberg, David. “Cons Hit the Internet.” Law and Order (June 2001). Bloombecker, Jay. “New Federal Law Bolsters Computer Security Efforts.” Computerworld (October 27, 1986): 53-62. Bloombecker, Jay. “The Trial of Computer Crime.” International Business Lawyer 9 (1981): 429-32. Bloomberg, David. “Cons Hit the Internet.” Law and Order (June 2001). Boyd, J. and A. Hawley. “Computer Crime.” Computer Law and Practices 5 (1989): 190-1. Brand, Richard. “Is Computer Hacking a Crime?” Harper’s (March 1990): 47. Branscomb, A.W. “Rogue Computer Programs and Computer Rogues: Tailoring the Punishment to Fit the Crime.” Rutgers Computer & Technology Law Journal 16 (1990): 1-62. Britton, Herchell. “Computer Crime: The Continuing Problem.” Security World (August 1981): 71. Carney, P.L. “Police Say Mafia’s DP Use Impedes Crime Prevention.” Computerworld (December 2, 1970): 1. Carney, P.L. “‘Suspected Companies’ on Crime Commission Lists.” Computerworld (December 30, 1970): 1. Cashion, Richard. “Corporate Computer Crime and Abuse Policy Statement.” In Proceedings of the National Computer Conference, vol. 56, 453. Reston, VA: AFIPS Press, 1987. Chantico Publishing Co., Inc. Combating Computer Crime: Prevention, Detection, Investigation. New York: McGraw-Hill, 1992. Chen, Christopher D. “Computer Crime and the Computer Fraud and Abuse Act of 1986.” Computer/Law Journal 10 (Winter 1990): 71-86. Ciongoli, Adam G. “Computer Related Crimes.” American Criminal Law Review (Spring 1994). Clark, Don. “Computer Crime Breeds New Concern.” St. Paul Pioneer Press, May 3, 1982, p. 1B, 8B. Clark, Franklin and Ken Diliberto. Investigating Computer Crime. CRC Press, 1996. Cohen, Michael. “Home Secure: Home Crime is Down, but Demand for Security Systems is Way Up.” Boston Globe, April 26, 1999. Coldwell, R.A. “Some Social Parameters of Computer Crime.” The Australian Computer Journal 22 (May 1990): 43-6. Coldwell, R.A. “University Students’ Attitudes Towards Computer Crime: A Research

70 Note.” Computers and Society 23 (July 1993): 11-4. “The Computer Thieves.” Newsweek Magazine (June 18, 1973): 109-12. Conly, Catherine H. Organizing for Computer Crime Investigation and Prosecution. Washington, DC: National Institute of Justice, July 1989. Conwall, Hugo. Datatheft: Computer Fraud, Industrial Espionage, and Information Crimes. London: Heinemann, 1987. Cornwall, H. Data Theft: Computer Fraud, Industrial Espionage, and Information Crime. Heinemann Professional Publishing, 1987. Croal, N’Gai and Jennifer Tanaka. “Gunning for Bytes.” Newsweek (June 10, 1996): 11. Daly, James. “Toughter Computer Crime Laws Sought.” Computerworld (April 5, 1993). Davies, Donald W. “Computer Crime Risks and the Impact of New Technology.” Computer Law and Security Report 5 (1990): 2-7. Davies, Donald W. “The Nature of Computer Crimes.” Computer and Law 2 (July 1991): 8-13. “Don’t Fall Victim to Crooks and Crackers Internet.” Business & Technology (March 2001): 23-24. Egan, Mike. “Ohio Bill Expands Law to Cover WP, DP Theft.” Management Information Systems (June 24, 1981): 21. Ehrlich, Paul. “Survey: ‘Weak’ Laws Hinder Computer Crime Prosecution.” MIS Week (September 9, 1981): 26. Fettmann, Eric. “Isn’t Crime the Worst Privacy Invasion of All?” New York Post, December 20, 1998, p. 81. Garland, David. The Culture of Control: Crime and Social Order in Contemporary Society. Chicago, IL: University of Chicago Press, 1993. Gellman, Harvey S. “Crime in Industry: Using the Computer to Steal.” Vital Speeches of the Day (December 15, 1970): 152-5. Gellman, Harvey S. “How the Computer Can Be Used to Rob You Blind.” Risk Management (August 1971). Gellman, Harvey S. “Using the Computer to Steal.” Computers and Automation (April 1971): 16-9. Gemignani, Michael C. “Computer Crime: The Law in ’80.” Indiana Law Review 13 (1980): 681-723. Godbout, W. “Computer Theft by Computer.” Security World (May 1971). Goldsmith, Tom. “Computer Crime Bill is Alive at Justice; DOE Cleans House.” Computer Careers News 2 (January 12, 1981): 2. Gonzales, P. “Addressing Computer Crime Legislation: Progress and Regress.” Computer/Law Journal 4 (Summer 1983): 195-206. Goodell, Jeff. The Cyberthief and the Samurai. Dell, 1996. Goodell, Jeff. “The Samurai and the Cyberthief.” Rolling Stone 707 (May 4, 1995): 43. “Has the Mafia Permeated the Computer Community?” Computerworld (August 28, 1968). “Has the Mafia Permeated the Computer Community?” Computerworld (September 11, 1968). Henderson, Bruce and Jeffrey Young. “Computer Crime.” Business Week (April 20, 1981): 86-92. Henderson, Bruce and Jeffrey Young. “The Heist.” Esquire (May 1981): 36-47. Hitt, J. and P. Tough. “Is Computer Hacking a Crime?” Harper’s Magazine (March 1980): 45-57. Hollinger, R.C. and L. Lanza-Kaduce. “The Process of Criminalization: The Case of Computer Crime Laws.” Criminology 26 (1988): 101-26.

71 “How Bad Guys Thwart Computers.” The Office (September 1970): 32. Hyman, Warren. “Larceny Enters the Electronic Age: The Problem of Detecting and Preventing Computer Crime.” Gonzaga Law Review 19 (1982-3): 517-38. Icove, D.J. “Collaring the Cybercrook: An Investigator’s View.” IEEE Spectrum 34 (June 1997): 31-36. Ingraham, Donald G. “On Charging Computer Crime.” Computer/Law Journal 2 (Spring 1980): 429-39. Jaspan, Norman. The Thief in the White Collar. Philadelphia: J.B. Lippincott Company, 1971. Johnson, D. “Control and Prevention of Thefts of Proprietary Information.” Industrial Security (February 1968). “Journal Warns of Dishonest ‘Computer-Operators.’” Computerworld (April 17, 1968). “Just Plain Grabbing is Becoming Old Hat to Securities Thieves.” The Wall Street Journal, October 26, 1970. Kling, Rob. “Computer Abuse and Computer Crime as Organizational Activities.” Computer/Law Journal 2 (Spring 1980): 403-27. Krieger, M.M. “Current and Proposed Computer Crime Legislation.” Computer/Law Journal 2 (Summer 1980): 721-73. Laberis, Bill. “CPU Programmed to Hide Theft.” Computerworld (June 8, 1981): 2. Lasden, Martin. “Computer Crime.” Computer Decisions (June 1981): 104-24. Lawren, Bill. “Breaking and Entering: Did the Government Confiscate Hackers’ Rights in its Raids on Computer Crime?” Omni (December 1990). Lefer, H. “How to Shield Your Office Against Crime.” Modern Office Procedures (April 1970): 21-9. Lehnen, R.G. “Impact of Bureau of the Census Disclosure: Avoidance Policy on the Utility of the National Crime Survey.” Review of Public Data Use 6 (November 1978): 17-22. * Littman, Jonathan. The Fugitive Game: Online with Kevin Mitnick. Boston, MA: Little, Brown, 1996. Littman, Jonathan. The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen. Boston, MA: Little, Brown, 1997. Luck, J.E. “Description of a Real-Time Completely Automatic Speaker Verification System.” In Proceedings of the Carnahan Conference of Electronic Crime Countermeasures, 98-113. Lexington, KY: University of Kentucky, 1969. Mandell, Steven L. “Computer Crime.” In Computers, Data Processing, and the Law. New York: West Publishing Co., 1984. McEwen, J. Thomas, et al. Dedicated Computer Crime Units. Washington, DC: National Institute of Justice, June 1989. McKenna, Pat. “Hacker Trackers: OSI (Office of Special Investigations) Computer Cops Fight Crime Online.” Airman (April 1996): 2429. McKnight, Gerald. Computer Crime. New York: Walker, 1973. McQuiston, John T. “Four Charged with Theft Via Computer.” New York Times, March 19, 1995, p. A25. Morton, Thomas J. “Manipulation of Penn Central Computers Cited in Boxcar Theft.” Computerworld (March 31, 1971): 1. Myers, Michael. “Crimes of the ‘Net.’” Newsweek (November 14, 1994): 47. Nelson, B. “Straining the Capacity of the Law: The Idea of Computer Crime in the Age of the Computer Worm.” Computer/Law Journal 11 (April 1991): 299-321. Neville, Haig G. “Computer Capers Herald New Crime Wave of Embezzlement.” The National Underwriter: Property Edition (August 20, 1971): 1. Newman, Oscar. Architectural Design for Crime Prevention. Washington, DC: Department of Justice, 1973. Nycum, Susan Hubbell. “Anatomy of a Computer Crime.” In AFIPS Conference

72 Proceedings, 1151-55. Montale, NJ: AFIPS Press, 1978. Nycum, Susan Hubbell. “Computer Crime: A Comment.” Computer/Law Journal 2 (Spring 1980): xv-xvi. Nycum, Susan Hubbell. “The Criminal Law Aspects of Computer Abuse: Part I, State Penal Laws” Rutgers Journal of Computers & the Law 5 (1976): 271-95. Nycum, Susan Hubbell. “The Criminal Law Aspects of Computer Abuse: Federal Criminal Code.” Rutgers Journal of Computers & The Law 5 (1976): 297-322. Nycum, Susan Hubbell. “Legal Aspects of Computer Abuse.” In Digest of Papers: 12th IEEE Computers Society International Conference on Computers the Next 5 Years, 181-83. New York: IEEE, 1976. Parker, Donn B. “The Antisocial Use of Computers.” Computers and Automation (August 1972): 22. Parker, Donn B. “Computer Abuse Perpetrators and Vulnerabilities of Computer Systems.” In Proceedings of the National Computer Conference, vol. 45, 65-73. Montvale, NJ: AFIPS Press, 1976. Parker, Donn B. “Computer Abuse Research Update.” Computer/Law Journal 2 (Spring 1980): 329-52. * Parker, Donn B. “Computer Crime.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 437-76. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Parker, Donn B. Computer Crime: Computer Security Techniques. Washington, DC: U.S. Department of Justice, Bureau of Justice Statistics, 1985. Parker, Donn B. Computer Crime: Criminal Justice Resource Manual. Washington, DC: National Institute of Justice, 1989. Parker, Donn B. Computers and Public Concern. TER-09. Palo Alto, CA: Control Data Corporation, 1968. Parker, Donn B. Crime by Computer. New York: Charles Scribner’s Sons, 1976. Parker, Donn B. Fighting Computer Crime: A New Framework for Protecting Information. New York: Wiley, 1998. Parker, Donn B. Managers’ Guide to Computer Security. Reston, VA: Prentice-Hall, 1983. Parker, Donn B. “The Many Faces of Data Vulnerability.” IEEE Spectrum (May 1984): 46-8. Parker, Donn B. “The Nature of Computer Related Crime.” In Proceedings of the International Conference on Computer Communication, 121-6. 1972. Parker, Donn B. Papers. CBI 166. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Parker, Donn B. and Susan H. Nycum. “Computer Crime.” Communications of the ACM 27 (April 1984): 313-5. Platt, Charles. Anarchy Online: Net Sex, Net Crime. Harper, 1997. “Plot Thickens in Plotting Program Theft.” Datamation (April 15, 1971): 47. Poindexter, Denris F. “Tighter Security to Curb EDP Crime.” The Office (August 1981): 45-9. Power, Richard. Current and Future Danger: A CSI Primer on Computer Crime and Information Warfare. San Francisco, CA: Computer Security Institute, 1995. Prew, M. Minimizing the Impact of Computer Crime on Your Earnings. Wigham Poland, 1984. “Real DP Crime May Blossom.” Computerworld (November 25, 1970). Rohde, David. “Cyberwhiz: Other Pals Bailed Out.” Daily News, December 10, 1996, p. 8. “Scandinavia’s First Data Theft Occurs at Service Bureau.” Computerworld (November 18, 1970). Schjølberg, Stein. “Computer-Assisted Crime in Scandinavia.” Computer/Law Journal 2 (Spring 1980): 457-69.

73 * Sheehan, Richard. “Computer Crime Insurance.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 499-513. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Sieber, Ulrich. The International Handbook on Computer Related Crime and the Infringements of Privacy. New York: John Wiley and Sons, Inc., 1987. Smalheiser, Marvin. “Computer ‘Accomplice’ in Thefts.” Computerworld (February 16, 1972): 1. Smalheiser, Marvin. “DP Crime: Who Does It?” Computerworld (May 30, 1973): 2. Sokolik, Stanley L. “Computer Crime: The Need for Deterrent Legislation.” Computer/Law Journal 2 (Spring 1980): 353-83. Solarz, Arthur. Computer Technology and Computer Crime. BRA Report 8. Stockholm, Sweden: National Swedish Council for Crime Prevention, 1981. Spitzer, Steven. “The Rationalization of Crime Control in Capitalist Society.” In Social Control and the State, eds. A. Scull and S. Cohen. 1986. “Sticking Up a Computer.” Innovation Magazine (1969). Stiefel, Rudy C. “Proceedings of Carnahan Conference on Electronic Crime Countermeasures.” PB-190. Springfield, VA: National Technical Information Service, April 16, 1970. Sullivan, John. “Attack That Began on Internet is Described.” New York Times, March 17, 1998, p. B3. Sullivan, John. “Woman in Internet Case Says Accused Beat Her.” New York Times, March 18, 1998, p. B5. Taber, John K. “A Survey of Computer Crime Studies.” Computer/Law Journal 2 (Spring 1980): 275-327. Tabor, J. “On Computer Crime.” Computer Law Journal 1 (?): 517. Tabor, J. “A Survey of Computer Crime Studies.” Computer Law Journal 2 (?): 275 Taeuber, R.C. “The Right to Privacy.” Bulletin of the American Society for Information Science 1 (1975): 17-8. Tagg, W. “Is Breaking into a Timesharing System a Crime?” Creative Computing 1 (March-April 1976): 4. “Telephone Used in Computer Theft.” Business Automation (April 1, 1971). “The Thief Outside.” The Office (August 1970): 35-8. Thomas, Douglas and Brian Loader. Cybercrime: Law Enforcement, Security, and Surveillance in the Information Age. New York: Routledge, 2000. Tien, James M., et al. Electronic Fund Transfer Systems Fraud: Computer Crime. Washington, DC: U.S. Dept. of Justice, Bureau of Justice Statistics, 1985. Tompkins, J.B., Jr. and L.A. Mar. “The 1984 Federal Computer Crime Statute: A Partial Answer to a Pervasive Problem.” Computer/Law Journal 6 (Winter 1986): 459-83. United States. Congress. House of Representatives. Computer Crime and Computer Security: Hearing Before the Subcommittee on Crime, U.S. House of Representatives. Washington, DC: GPO, May 23, 1985. United States. Department of Justice. Bureau of Justice Statistics. Computer Crime: Expert Witness Manual. Washington, DC: GPO, 1981. United States. Department of Justice. Bureau of Justice Statistics. Computer Crime: Legislative Resource Manual. Washington, DC: GPO, 1981. Vance, Mary A. Computer Crime: A Bibliography. P-2355. Monticello, Ill.: Vance Bibliographies, 1988. Van Duyn, Julia A. The Human Factor in Computer Crime. Princeton, NJ: Petrocelli Books, 1985. Van Tassel, Dennis. “Computer Crime.” In Proceedings of the Fall Joint Computer Conference, vol. 37, 445-50. 1970. Volgyes, Mary R. “The Investigation, Prosecution, and Prevention of Computer

74 Crime: A State-of-the-Art Review.” Computer/Law Journal 2 (Spring 1980): 385- 402. Wasik, Martin. Crime and the Computer. Oxford, England: Clarendon Press, 1991. Wessells, Michael G. “Crime by Computer.” In Computer, Self, and Society, 126-35. Englewood Cliffs, NJ: Prentice-Hall, 1990. Whiteside, Thomas. “Annals of Crime: Dead Souls in the Computer, Part I” New Yorker (August 22, 1977): 35-65. Whiteside, Thomas. “Annals of Crime: Dead Souls in the Computer, Part II.” New Yorker (August 29, 1977): 34-64. Whiteside, Thomas. Computer Capers: Tales of Electronic Thievery, Embezzlement, and Fraud. New York: Thomas Y. Crowell, 1978. Wilson, D.C. “Viewing Computer Crime: Where Does the Systems Error Really Exist?” Computer/Law Journal 11 (April 1991): 265-85.

Internet Worm

Andrews, Rodney D. “Computer Crime: The Worm in the Apple.” In The Information Web, ed. C. Gould, 229-58. San Francisco, CA: Westview Press, 1989. Eisenberg, Ted, et al. “The Cornell Commission: On Morris and the Worm.” Communications of the ACM 32 (June 1989): 706-9. Nelson, B. “Straining the Capacity of the Law: The Idea of Computer Crime in the Age of the Computer Worm.” Computer/Law Journal 11 (April 1991): 299-321. Rochlis, Jon A. and Mark W. Eichin. “With Microscope and Tweezers: The Worm from MIT’s Perspective.” Communications of the ACM 32 (June 1989): 689-98. Shoch, John and Jon A. Hupp. “The ‘Worm’ Programs: Early Experience with a Distributed Computation.” Communications of the ACM 25 (March 1982): 172-80. Spafford, Eugene H. “An Analysis of the Internet Worm.” In Proceedings of the 2nd European Software Engineering Conference, eds. C. Ghezzi and J.A. McDermid, 446- 68. Berlin, Germany: Springer-Verlag, 1989. Spafford, Eugene H. “Crisis and Aftermath.” Communications of the ACM 32 (1989): 6. Spafford, Eugene H. “The Internet Worm: Crisis and Aftermath.” Communications of the ACM 32 (June 1989): 678-87. Spafford, Eugene H. The Internet Worm Program: An Analysis. Department of Computer Sciences, Purdue University, 1988. Spafford, Eugene H. and S.A. Weeber. “Software Forensics: Can We Track Code to Its Authors?” Computers & Security 12 (October 1993): 585-95.

Hacking

Adelaide, J., et al. “Acid Phreak and Phiber Optik: Is Computer Hacking a Crime?” Harper’s Magazine 280 (March 1990): 45-7. Alexander, Michael. “Feds Crack Hacker Gang.” Datamation 41 (April 1, 1995): 15. Alger, J.I. “From Hackers to Projectors of Power.” Bulletin of the American Society of Information Science 23 (October-November 1996): 6-8. Anderson, Ian. “Hacker Runs Ring Around Military Security.” New Scientist (April 28, 1988). Brand, Richard. “Is Computer Hacking a Crime?” Harper’s (March 1990): 47. Bromberg, Craig. “In Defense of Hackers.” New York Times Magazine (April 21, 1991): 44. Cheswick, William and Steven Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Boston: Addison-Wesley, 1994. “China Executes Hacker.” Software Engineering Notes 18 (July 1993): p. A12.

75 Chirilla, J. “Hackers, Crackers, Phreaks, Script Kiddies, and Cyberpunks.” Database & Network Journal 32 (December 2002): 19-20. Cornwall, H. Hackers Handbook. Century, 1985. Cornwall, H. New Hackers Handbook. London: Century Publications, 1989. “Data Espionage: Hackers in Space.” Funkschau 22 (October 23, 1987): 43-44. Denning, Dorothy Elizabeth R. “The United States v. Craig Neidorf, a Debate on Electronic Publishing, Constitutional Rights, and Hacking.” Communications of the ACM 34 (1991): 23-32. Dyson, Esther. “Hacker’s Rights.” Forbes (January 7, 1991). Evers, Stacey. “Stopping the Hacking of Cyber Information.” Jane's Defence Weekly (April 10, 1996): 2225. “A Hacker is Indicted in Computer Fraud Case.” New York Times, March 11, 1995, p. A25. “Hackers, Beware on Defense.” Navy Times (August 14, 1995): 30. Hafner, Katherine M. and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster, 1991. Harrington, Maureen. “Cyber Rebel.” Denver Post, March 3, 1996. Hitt, J. and P. Tough. “Is Computer Hacking a Crime?” Harper’s Magazine (March 1980): 45-57. Johnson, Deborah G. “Hacker Ethics.” In Computer Ethics, Second Edition, 112-8. Englewood Cliffs, NJ: Prentice-Hall, 1995. Landreth, B. Out of the Inner Circle: A Hacker’s Guide to Computer Security. Bellevue, WA: Microsoft Press, 1985. Landreth, B. Out of the Inner Circle: The True Story of a Computer Intruder Capable of Cracking the Nation’s Most Secure Computer Systems. New York: Microsoft Press, 1989. Lawren, Bill. “Breaking and Entering: Did the Government Confiscate Hackers’ Rights in its Raids on Computer Crime?” Omni (December 1990). Lee, John A.N., et al. “Positive Alternatives: A Report on an ACM Panel on Hacking.” Communications of the ACM 29 (April 1986): 297-300. Levy, Steven. Hackers: Heroes of the Computer Revolution. New York: Doubleday, 1985. Lewyn, Mark. “Why the Legion of Doom Has Little to Fear from the Feds.” Business Week (April 15, 1991): 31. * Littman, Jonathan. The Fugitive Game: Online with Kevin Mitnick. Boston, MA: Little, Brown, 1996. Littman, Jonathan. The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen. Boston, MA: Little, Brown, 1997. Luzwick, P. “Crackers and Phreakers Conduct Better Coherent Knowledge Based Operations Then Most Companies.” Computer Fraud & Security (March 2000): 16-17. Machlis, Sharon. “Security Experts: Hacker Detection is Key.” Computerworld (March 3, 1997): 59, 67. Madsen, J.B. “The Greatest Cracker-Case in Denmark: The Detecting, Tracing, and Arresting of Two International Crackers.” In Proceedings of UNIX Security Symposium III, 17-40. Berkeley, CA: USENIX Association, 1992. Markoff, John. “Hacker Case Underscores Internet’s Vulnerability.” New York Times, February 17, 1995, p. D1. McClure, Stuart, et al. Hacking Exposed: Network Security Secrets & Solutions. Fourth edition. Osborne-McGraw Hill, 2003. Moses, Jonathan M. “Wiretap Inquiry Spurs Computer Hacker Charges.” Wall Street Journal (July 9, 1992). Mungo, Paul and Bryan Clough. Approaching Zero: The Extraordinary World of Hackers, Phreakers, Virus Writers, and Keyboard Criminals. New York: Random

76 House, 1992. Nuwere, Ejovi and David Chanoff. Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace. New York: W. Morrow, 2002. “Passive Entry ‘Good Way’ to Obtain Sensitive Data.” Computerworld (May 16, 1973): 4. Penenberg, Adam L. “The Demonizing of a Hacker.” Forbes (April 19, 1999). Platt, Charles. “Hackers: Threat or Menace?” Wired (November 1994): 82-85. Raymond, Eric, ed. The New Hacker’s Dictionary. Cambridge, MA: The MIT Press, 1991. Roberts, P. and J. Webber. “Virtuous Hackers: Developing Ethical Sensitivity in a Community of Practice.” Australian Journal of Information Systems 9 (May 2002): 172-77. * Samociuk, Martin. “Hacking.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 543-61. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Samuelson, Pamela. “Can Hackers Be Sued for Damages Caused by Computer Viruses?” Communications of the ACM 32 (June 1989): 666-9. Schell, Bernadette H., et al. The Hacking of America: Who’s Doing It, Why, and How. Westport, CT: Quorum Books, 2002. Schwartau, Winn. CyberShock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists, and Weapons of Mass Disruption. New York: Thunder’s Mouth Press, 2000. Schwartz, John. “The Hacker Dragnet.” Newsweek (April 30, 1990): 50. Shenon, Philip. “Defense Dept. Computers Face a Hacker Threat, Report Says: Growing Danger to U.S. Security is Cited.” New York Times (May 23, 1996): A11. Shimomura, Tsutomu. Take-Down: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw. Hyperion, 1996. Slatalla, Michelle and Joshua Quittner. Masters of Deception: The Gang That Ruled Cyberspace. New York: HarperCollins Publishers, Inc., 1994. Smith, A.D. and W.T. Rupp. “Issues in Cybersecurity: Understanding the Potential Risks Associated with Hackers/Crackers.” Information Management & Computer Security 10 (2002): 178-83. Spafford, Eugene H. “Are Computer Hacker Break-ins Ethical?” Journal of Systems and Software 17 (January 1992): 41-7. Steffora, Ann and Martin Cheek. “Hacking Goes Legit.” Industry Week 243 (February 7, 1994): 43. Stephenson, P. “Hiring Hackers.” Information Systems Security 8 (Summer 1999): 10-13. Sterling, Bruce. Hacker Crackdown: Law and Disorder on the Electronic Frontier. New York: Bantam Books, 1992. Stoll, Clifford. The Cuckoo’s Egg. New York: Pocket Books, 1989. Stoll, Clifford. “The Cuckoo’s Egg Revisited.” Byte (June 1993). Stoll, Clifford. “Stalking the Wily Hacker.” Communications of the ACM 31 (May 1988): 484-97. Turkle, Sherry. “Hackers: Loving the Machine for Itself.” In The Second Self. New York: Simon and Schuster, 1984. Waters, J.K. “Can the Hackers Be Stopped?” Application Development Trends 9 (June 2002): 39-43. “West German Crackers Enter NASA Computers.” Software Engineering Notes 12 (October 1987): 14. Zachary, G. Pascal. “Group to Defend Civil Rights of Hackers Founded by Computer Industry Pioneer.” Wall Street Journal (July 11, 1990).

Computer Abuse

77

Doswell, R. and G.L. Simmons. Fraud and Abuse of IT Systems. Manchester, UK: National Computing Center, 1986. Parker, Donn B., et al. Final Report: Computer Abuse. Stanford, CA: Stanford Research Institute, 1973. Schultz, Brad. “Expert Gives Strong Advice to Halt DP Abuse.” Computerworld (September 28, 1981): 14. Steier, Rosalie, ed. “Congress Tackles Computer Abuse.” Communications of the ACM 27 (January 1984): 10-1. Tettenborn, A. “Some Legal Aspects of Computer Abuse.” The Company Lawyer 2 (1981): 147-254. Westin, Alan F. “Information Abuse and the Personal Computer.” Popular Computing (August 1982): 112-6.

Patient Privacy

Cooper, Almeta E. “Physician’s Dilemma: Protection of the Patient’s Right to Privacy.” St. Louis University Law Journal 22 (1978): 397-432. Dewitt, C. “Can Patient Records Be Both Private and Accessible?” Hospital Journal of the American Hospital Association 55 (1981): 87-90. Hanlon, Joseph. “Diagnostic DP Impractical: M.D. Hits Privacy Safeguards.” Computerworld (June 30, 1971): 2. Kolata, Gina B. “When Patients’ Records Are Commodities for Sale.” New York Times, November 15, 1995. Lansing, Paul. “The Conflict of Patient Privacy and the Freedom of Information Act.” Journal of Health Politics, Policy, and Law 9 (Summer 1984): 315-22. Miller, M.W. “Data Tap: Patients’ Records are Treasure Trove for Budding Industry.” Wall Street Journal, February 27, 1992, p. A1. Schuster, Eleanor Ann. “Privacy and the Hospitalization Experience.” Ph.D. diss., University of California, San Francisco, 1972. Spicer, M. and G. Grootemaat. “Condition Reporting System Protects Patients Privacy.” Hospitals 55 (1981): 69-73. Wallace, Scott. “The Computerized Patient Record.” Byte (May 1994): 67-75.

Medical

Adams, B.R. “Medical Research and Personal Privacy.” Villanova Law Review 30 (September 1985): 1077-128. Alfano, Guy S. “Privacy of the Data Generator.” Journal of Clinical Computing 2 (July 1972): 2-5. Alpert, Sheri. “Smart Cards, Smarter Policy: Medical Records, Privacy and Health Care Reform.” Hastings Center Report 23 (November-December 1993): 13-23. Anderson, Ross, ed. Personal Medical Information: Security, Engineering, and Ethics. Springer-Verlag, 1997. Barrows, Randolph C., Jr. and Paul D. Clayton. “Privacy, Confidentiality, and Electronic Medical Records.” Journal of the American Medical Informatics Association 3 (March-April 1996): 139-48. Baskin, Fran Frieder. “Confidential Medical Records: Insurers and the Threat to Informational Privacy.” Insurance Law Journal (1978): 590-610, 660-1. Bass, Allison. “Computerized Medical Records Put Privacy on the Line.” Boston Globe, February 22, 1995, p. 1, 5. Beggs-Baker, S., et al. “Individual Privacy Considerations for Computerized Health Information Systems.” Medical Care 12 (1974): 75-84.

78 Bochnik, H.J. and C. Gartnerhuth. “Legal Requirements Concerning Confidential Medical Information in the Conflict Between Personal Rights and Social Interests.” Internist 24 (1983): 211-9. Boulanger, M.H. “Legal Aspects of the Medical Data Card.” Computer Law & Security Report 6 (September-October 1990): 8-11. Boyer, Barry B. “Computerized Medical Records and the Right to Privacy: The Emerging Federal Response.” Buffalo Law Review 25 (Fall 1975): 37-118. Brannigan, Vincent M. “Software Quality Regulation Under the Safe Medical Devices Act of 1990: Hospitals are Now the Canaries in the Software Mines.” In Proceedings of the Annual Symposium on Computer Applications in Medical Care, ed. Paul D. Clayton, 238-42. New York: McGraw-Hill, Inc., 1991. Brannigan, Vincent M. and Bernd Beier. “Standards for Privacy in Medical Information Systems: A Technico-Legal Revolution.” In Proceedings of the Annual Symposium on Computer Applications in Medical Care, vol. 14, ed. Randolph A. Miller, 266-70. Washington, DC: IEEE Computer Society Press, 1990. Brannigan, Vincent M. and Ruth E. Dayhoff. “Liability for Personal Injuries Caused by Defective Medical Computer Programs.” American Journal of Law and Medicine 7 (Summer 1981): 123-44. Brannigan, Vincent M. and Ruth E. Dayhoff. “Medical Informatics: The Revolution in Law, Technology, and Medicine.” Journal of Legal Medicine 7 (March 1986): 1-53. “Campaign to Protect Personal Privacy: Medical Information Bureau Case as Part of Movement to Curtail Business Access to Personal Data.” Business Week (November 16, 1974): 88. “Computers, the Disclosure of Medical Information, and the Fair Credit Reporting Act.” Computer/Law Journal 3 (Summer 1982): 619-39. “Confidentiality of Patient Health Information: A Position Statement of the American Medical Record Association.” Medical Trial Techniques Quarterly 27 (1980): 195-217. “Confidentiality of Personnel Files in the Private Sector.” University of California Davis Law Review 15 (Winter 1981): 473-92. Cotton, Paul. “Confidentiality: A Sacred Trust Under Siege.” Medical World News (March 27, 1969): 55-60. Courtney, Robert H., Jr. “Data Security and Privacy.” In Proceedings of the 6th Annual National Colloquium on Information Retrieval, 9-14. Philadelphia: Medical Documentation Service, May 1969. Cushman, R. “Information and Medical Ethics: Protecting Patient Privacy.” IEEE Technology & Society Magazine 15 (Fall 1996): 32-39. Davies, Simon G. “Medical Records.” International Privacy Bulletin (January 1994). Denis, Martin K. “Privacy Rights and Medical Disclosures: An Employer’s Dilemma.” Employment Relations Today 14 (Spring 1987): 65-74. Dubro, Alec. “Your Medical Records: How Private Are They?” California Lawyer 3 (April 1983): 33-4. Durham, Samuel C. “Right to Privacy: Confidentiality of Medical Illness Files.” Gonzaga Law Review 7 (1971-2): 106-17. “Employee Medical Records and the Constitutional Right to Privacy.” Washington and Lee Law Review 38 (Fall 1981): 1267-84. Fargo, John. “Medical Data Privacy: Automated Interference with Contractual Relations.” Buffalo Law Review 25 (Winter 1976): 491-517. Federal Privacy of Medical Information Act, 96th Congress, 2nd Session, March 19, 1980. House Report 96-832 Part 1. Frechette, Jean-Guy. Access to Medical Record Information: The Legal Aspect. 2nd ed. Sherbrooke, Quebec, Canada, 1979. Freed, Roy N. “Legal Aspects of Computer Use in Medicine.” Law and Contemporary Problems 32 (Autumn 1967): 674-706.

79 Freed, Roy N. “A Legal Structure for a National Medical Data Center.” Boston University Law Review 49 (Winter 1969): 79-94. Freud, R.N. “Legal Aspects of Computer Use in Medicine.” Law and Contemporary Problems 32 (1967): 674. Friedlander, Walter J. “The Basis of Privacy and Autonomy in Medical Practice: A Model.” Social Science and Medicine 16 (1982): 1709-18. Gabrieli, E.R. “Right of Privacy and Medical Computing.” Datamation 16 (April 1970): 173-8. Gill, Christopher J. “Medical Expert Systems: Grappling with the Issues of Liability.” High Technology Law Journal 1 (Fall 1986): 483-520. Gostin, Lawrence O. “Health Information Privacy.” Cornell Law Review 80 (1994): 101-32. Gostin, Lawrence O., et al. “Privacy and Security of Personal Information in a New Health Care System.” Journal of the American Medical Association 270 (November 24, 1993): 2487-93. Hiller, Marc D. and Lee F. Seidel. “Patient Care Management Systems, Medical Records, and Privacy: A Balancing Act.” Public Health Reports 97 (July-August 1982): 332-45. Huber, George A. and Loren Roth. “Preserving the Confidentiality of Medical Information Regarding Non-Patients.” Virginia Law Review 66 (1980): 583-96. “Invasion of Privacy Justified Where Hospital Records are Sought for Grand Jury Investigations.” Villanova Law Review 26 (January 1981): 499-520. Jackson, C.B. “Guardians of Medical Data.” Prism: The Socioeconomic Magazine of the American Medical Association 2 (June 1974). Jacobs, J.A. “FDA Pre-Market Approval of New Medical Devices: Confidentiality of Data.” Food Drug Cosmetic Law Journal 35 (1980): 576-87. Kenny, D.J. “Confidentiality: The Confusion Continues.” Journal of Medical Ethics 8 (1982): 9-11. Kenny, D.J. “Problems of Defining Institutional Responsibilities for Confidentiality.” In Data Protection in Health Information Systems: Where Do We Stand? eds. G. Griesser, et al., 53-8. Amsterdam, The Netherlands: Elsevier Science Publishers B.V., 1983. Kersten, S. “Report on Data Protection in the Medical Profession.” Computers und Recht 5 (November 1989): 1020-26. Klugman, Ellen. “Toward a Uniform Right to Medical Records: A Proposal for a Model Patient Access and Information Practices Statute.” UCLA Law Review 30 (1983): 1349-85. Kmentt, K.A. “Private Medical Records: Are They Public Property?” Medical Trial Technique Quarterly 33 (1987): 274-307. Knoppers, Bartha. “Confidentiality and Accessibility of Medical Information: A Comparative Analysis.” Revue de Droit 12 (1982): 397-431. Larkin, Howard. “Electronic Review Could Alter Legal Standard of Care.” American Medical News 34 (April 1, 1991): 15. LeBlang, Theodore R. “Invasion of Privacy: Medical Practice and the Tort of Intrusion.” Washburn Law Journal 18 (1978-9): 205-29. Lindberg, Donald A. “Biomedical Informatics: Precious Scientific Resource and Public Policy Dilemma.” Transactions of the American Clinical and Climatological Association 114 (2003): 113-20. London, Jack R. “Privacy in the Medical Context.” In Aspects of Privacy Law, ed. Dale Gibson, 281-94. Toronto, Canada: Butterworths, 1980. Martin, B.A. and M.R. Eastwood. “The Confidentiality of Medical Records: The Right to Privacy Versus the Public Interest.” Canadian Journal of Psychiatry 25 (October 1980): 492-6.

80 McIntrye, Neil. “Medical Records: Computers and the Patient.” Medico-Legal Journal 50 (1982): 159-70. McWay, Dana C. Legal Aspects of Health Information Management. Delmar, 1997. “Medical Privacy Issues.” University of California Los Angeles Law Review 30 (August 1983): 1283-385. Miller, Arthur R. “A Nation of Datamaniacs.” Prism: The Socioeconomic Magazine of the American Medical Association 2 (June 1974). Miller, Randolph A. “Legal Issues Related to Medical Decision-Support Systems.” International Journal of Clinical Monitoring & Computing 6 (April 1989): 75-80. Miller, Randolph A. and Kenneth W. Goodman. “Ethical Challenges in the Use of Decision-Support Software in Clinical Practice.” In Ethics, Computing, and Medicine:Informatics and the Transformation of Health Care, ed. Kenneth W. Goodman, 102-15. Cambridge: Cambridge University Press, 1998. Miller, Randolph A., et al. “Ethical and Legal Issues Related to the Use of Computer Programs in Clinical Medicine.” Annals of Internal Medicine 102 (April 1985): 529-36. Morihara, John. “Computers, the Disclosure of Medical Information, and the Fair Credit Reporting Act.” Computer/Law Journal 3 (Summer 1982): 619-39. Morris, S., et al. “Australian Healthcare: A Smart Card for a Clever Country.” International Journal of Biomedical Computing 40 (October 1995): 101-5. Mortimer, Hope. “Computer-Aided Medicine: Present and Future Issues of Liability.” Computer Law Journal 9 (Spring 1989): 177-203. Newman, Scott. “Privacy in Personal Medical Information: A Diagnosis.” University of Florida Law Review 33 (1981): 394-424. Ng, B. “Universal Health Identifier: Invasion of Privacy or Medical Advancement?” Rutgers Computer & Technology Law Journal 26 (2000): 331-56. O’Reilly, J.T. “Medical Privacy and Medical Research: Is Government the Problem or the Solution?” University of Dayton Law Review 12 (Winter 1986): 243-74. Papagounos, G. and B. Spyropoulos. “The Multifarious Function of Medical Records: Ethical Issues.” Methods of Information in Medicine 38 (December 1999): 317-20. Parmet, Wendy. “Public Health Protection and the Privacy of Medical Records.” Harvard Civil Rights-Civil Liberties Law Review 16 (1981): 265-304. Payton, J. and A.J. Ashbury. “ABC of Computing: Computer Security.” British Medical Journal 287 (1983): 965-7. Pea, Robert. “Bush Rolls Back Rules on Privacy of Medical Data.” New York Times, August 10, 2002. Pear, Robert. “Future Bleak for Bill to Keep Health Records Confidential.” The New York Times, June 21, 1999, p. A12. Peterson, Hans and Don Fenna. “Medical Informatics and Privacy Legislation in Sweden.” Biosciences Communications 2 (1976): 306-12. Petras, Dorothy Donahue and Susan Scarpelli. “Computers, Medical Malpractice, and the Ghost of T.J. Hooper.” Rutgers Journal of Computers and the Law 5 (1975): 15- 49. “Position Statement on Confidentiality of Medical Records: Does the Physician Have a Right to Privacy Concerning His or Her Own Health Records?” American Journal of Psychiatry 141 (February 1984): 331-2. “Privacy in Personal Medical Information: A Diagnosis.” University of Florida Law Review 33 (Spring 1981): 394-424. “Privacy Rights in Medical Records.” Fordham Urban Law Journal 13 (1984-5): 165- 204. “Public Health Protection and the Privacy of Medical Records.” Harvard Civil Rights Law Review 16 (Summer 1981): 265-304. Renshaw, C.C., Jr. “Is Privacy Obsolete?” Prism: The Socioeconomic Magazine of the American Medical Association 2 (June 1974).

81 “Right of Privacy and Medical Computing.” Datamation 16 (1970): 173-81. Rosen, C.E. “Signing Away Medical Privacy.” The Civil Liberties Review 3 (1976): 54- 9. Rotenberg, Marc. “Medical Record Privacy.” Journal of Health Politics, Policy, and Law (Spring 1995). Sieghart, Paul and John Dawson. “Computer-Aided Medical Ethics.” Journal of Medical Ethics 13 (December 1987): 185-8. Sinskey, Patricia E. “Employee Medical Records and the Constitutional Right to Privacy.” Washington and Lee Law Review 38 (1981): 1267-84. Stern, Laurence C. “Medical Information Bureau: The Life Insurer’s Databank.” Rutgers Journal of Computers and the Law 4 (1974): 1-41. United States. Congress. House of Representatives. Committee on Government Operations. Government Information and Individual Rights Subcommittee. Privacy of Medical Records. Washington, DC: GPO, 1980. United States. Congress. Office of Technology Assessment. Protecting Privacy in Computerized Medical Information. Washington, DC: GPO, 1993. Van Dam, M.N. “The Scarlet Letter ‘A’: AIDS in a Computer Society.” Computer/Law Journal 10 (April 1990): 233-64. Walters, LeRoy. “Ethical Aspects of Medical Confidentiality.” In Contemporary Issues in Bioethics, eds. Tom L. Beauchamp and LeRoy Walters, 169-75. Encino, CA: Dickenson Publishing, 1978. Ware, Willis H. Privacy Dimensions of Medical Record Keeping. Santa Monica, CA: The Rand Corporation, 1994. Weed, Lawrence L. and J.M. Rumsey. “Confidentiality: Hindrance or Necessity?” Prism: The Socioeconomic Magazine of the American Medical Association 2 (June 1974). Westin, Alan F. “We Can’t Everything on the Machines.” Prism: The Socioeconomic Magazine of the American Medical Association 2 (June 1974). Wiant, Terry Lynn. “Policy and Its Impact on Medical Record Security.” Ph.D. diss., University of Kentucky, 2003. Willy, F.J. “Right to Privacy in Personal Medical Information.” Medical Trial Technique Quarterly 24 (1977): 164-83. Winslade, William J. “Confidentiality of Medical Records: An Overview of Concepts and Legal Policies.” Journal of Legal Medicine 3 (1982): 497-533.

Backup

“Computer Security: Backup and Recovery Methods.” EDP Analyzer (January 1972): 1-15. * Jackson, Keith. “Backup for Personal Computers.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 617-39. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Jacobson, Robert V. “Planning for Back-Up Facilities.” Computer Services (May 1970): 22-9. Lang, William, Jr. “Backup Files are a Must.” Administrative Management (October 1971): 55. * Lobel, Jerome. “Backup Procedures: Large Computers.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 871-94. Oxford, UK: Butterworth- Heinemann Ltd, 1992.

Legal Expert Systems

82 D’Amato. “Can/Should Computers Replace Judges?” Georgia Law Review 11 (1977): 1277. Finkelstein, Michael O. and Walter B. Fairley. “A Bayesian Approach to Identification Evidence.” Harvard Law Review 83 (1969): 489. Kaplan, John. “Decision Theory and the Factfinding Process.” Stanford Law Review 20 (1967-68): 1065. Lempert, Richard O. “Modeling Relevance.” Michigan Law Review 75 (1977): 1021. Lempert, Richard O. “The New Evidence Scholarship: Analyzing the Process of Proof.” B.U. Law Review 66 (1986): 439. Lucash, Richard M. “Legal Liability for Malfunction and Misuse of Expert Systems.” SIGCHI Bulletin 18 (1986): 35-43. Maggs, Peter B. and Cary G. deBessonet. “Automated Logical Analysis of Systems of Legal Rules.” Jurimetrics Journal 12 (1972): 158. McCarty, L. Thorne. “Reflections on Taxman: An Experiment in Artificial Intelligence and Legal Reasoning.” Harvard Law Review 90 (1977): 837. Popple, James. “Legal Expert Systems: The Inadequacy of a Rule-Based Approach.” Australian Computer Journal 23 (February 1991): 11-6. Popple, James. A Pragmatic Legal Expert System. Ashgate, 1996. Popple, James. SHYSTER: A Pragmatic Legal Expert System. Ph.D. diss., Australian National University, Canberra, 1993. Rissland, Edwina L. “Comment, Artificial Intelligence and Law: Stepping Stones to a Model of Legal Reasoning.” Yale Law Journal 99 (1990): 1957. Tillers, Peter. “Introduction: A Personal Perspective on ‘Artificial Intelligence and Judicial Proof.’” Cardozo Law Review 22 (2001): 1365-80. Tribe, Laurence H. “Trial by Mathematics: Precision and Ritual in the Legal Process.” Harvard Law Review 84 (1971): 1329.

Crypto

Acar, Tolga. “High-Speed Algorithms and Architectures for Number-Theoretic Cryptosystems.” Ph.D. diss., Oregon State University, 1998. Barker, Wayne G. Cryptanalysis of the Hagelin Cryptograph. Laguna Hills, CA: Aegean Park Press, 1977. Barker, Wayne G. Cryptanalysis of the Simple Substitution Copher with Word Divisions. Laguna Hills, CA: Aegean Park Press, 1975. * Barker, Wayne G. “Solving a Hagelin, Type C-57, Cipher.” Cryptologia 2 (January 1978): 1-8. * Barlow, John Perry. “Decrypting the Puzzle Palace.” Communications of the ACM (July 1992): 25-30. * Barlow, John Perry. “A Plain Text on Crypto Policy.” Communications of the ACM 36 (November 1993): 21-6. Blakey, G.R. “Safeguarding Cryptographic Keys.” In Proceedings of the National Computer Conference, vol. 48, 313-7. Montvale, NJ: AFIPS Press, 1979. * Bright, Herbert S. “Cryptanalytic Attack and Defense: Cipher-Text Only, Known- Plain-Text, Chosen-Plain-Text.” Cryptologia 1 (October 1977): 366-70. Bright, Herbert S. “Information Content Authorization Using Cryptographic Algorithms.” In Proceedings of the 1980 IEEE-NBS Symposium on Computer Network Protocols, 128-31. May 29, 1980. * Callimahos, Lambros D. “The Legendary William F. Friedman.” Cryptologia 15 (July 1991): 219. * Carroll, John Millar. “The Resurrection of Multiple-Key Ciphers.” Cryptologia 8 (1984): 262-5. * Carroll, John Millar and Steve Martin. “The Automated Cryptanalysis of Substitution

83 Ciphers.” Cryptologia 10 (October 1986): 193-209. Carroll, John Millar and P.M. McLellan. “Fast ‘Infinite-Key’ Privacy Transformation for Resource-Sharing Systems.” In Proceedings of the Fall Joint Computer Conference, vol. 37, 223-30. 1970. Carroll, John Millar, et al. “Multi-Dimensional Security Program for a Generalized Information Retrieval System.” In Proceedings of the Fall Joint Computer Conference, vol. 39, 571-77. Montvale, NJ: AFIPS Press, 1971. Childs, J. “My Recollections of G2/A6.” Cryptologia 2 (July 1978): 201-14. “Cryptic Computers.” Scientific American (January 1970): 52. “Cryptographic Package May End 360 Program Thefts.” Computerworld (June 24, 1970). * Davies, Donald W. “The Early Models of the Siemens and Halske T52 Cipher Machine.” Cryptologia 7 (July 1983): 235-53. * Deavours, Cipher A. “Analysis of the Hebern Cryptograph Using Isomorphs.” Cryptologia 1 (April 1977): 167-85. ElGamal, Tahir. “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.” IEEE Transactions on Information Theory IT-31 (1985): 469- 72. Escobar, C.B. “Nongovernmental Cryptology and National Security: The Government Seeking to Restrict Research.” Computer/Law Journal 4 (Winter 1984): 573-603. Eyraud, Charles. Precis de Cryptographie Moderne. Second edition. Paris: Editions Raoul Tari, 1959. * Fischer, Elliot. “Measuring Cryptographic Performance with Production Processes.” Cryptologia 5 (July 1981): 158-62. * Fischer, Elliot. “A Theoretical Measure of Cryptographic Performance.” Cryptologia 5 (January 1981): 59-62. * Fischer, Elliot. “Uncaging the Hagelin Cryptograph.” Cryptologia 7 (January 1983): 89-92. Foster, C.C. Cryptanalysis for Microcomputers. Rochelle Park, NJ: Hayden, 1982. Gaines, Helen Fouché. Cryptanalysis. New York: Dover Press, 1956. * Gaines, Helen Fouché. Elementary Cryptanalysis. Boston, MA: American Photographic Publishing Co., 1939. Girsdansky, M.B. “Cryptology, the Computer, and Data Privacy.” Computers and Automation 21 (April 1972): 12-9. Girsdansky, M.B. “Data Privacy: Cryptology and the Computer at IBM Research.” IBM Research Reports 7 (1971). Givierge, Marcel. Cours de Cryptographie. Paris: Gerger-Levrault, 1932. Godwin, Mike. “The New Cryptographic Landscape.” E-Commerce Law Weekly 1 (October 19, 1999). * Hammer, Carl. “Higher-Order Homophonic Codes.” Cryptologia 5 (October 1981): 231-42. * Hammer, Carl. “How Did TJB Encode B2?” Cryptologia 3 (1979): 9-15. Hammer, Carl. “Signature Simulation and Certain Cryptographic Codes.” Communications of the ACM 14 (January 1971): 3-14. Henry, Paul S. “Fast Decryption Algorithm for the Knapsack Cipher.” Computers & Security 1 (January 1982): 80-3. Hinsley, F.H. and Alan Stripp, eds. Codebreakers. Oxford University Press, 1994. Hoffman, Lance J., ed. Building Big Brother: The Cryptographic Policy Debate. New York: Springer-Verlag, 1995. Kahn, David. The Codebreakers. New York: Macmillan Company, 1967. Kahn, David. “The History of Steganography.” In Information Hiding: First International Workshop Proceedings, 1-5. Berlin, Germany: Springer-Verlag, 1996. Kennedy, Robert E. “Crypto.” Personal Computing 5 (March 1981): 48-54.

84 Kochanski, M. “A Survey of Data Insecurity Devices.” Cryptologia 11 (1987): 1-15. * Kruh, Louis and Cipher A. Deavours. “The Typex Cryptograph.” Cryptologia 7 (April 1983): 145-65. Landau, Susan Eva, et al. Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy: A Report of a Special Panel of the ACM U.S. Public Policy Committee. New York: Association for Computing Machinery, 1994. * Leighton, Albert C. and Stephen M. Matyas. “The Search for the Key to Nicholas Trist’s Book Cipher.” Cryptologia 7 (October 1983): 297-314. * Levy, Steven. Crypto: How the Code Rebels Beat the Government, Saving Privacy in the Digital Age. New York: Viking, 2001. Levy, Steven. “Crypto Rebels.” Wired (May-June 1993). Lewin, Ronald. American Magic: Codes, Ciphers, and the Defeat of Japan. New York: Farrar Straus, 1982. * Lundstrom, John B. “A Failure of Radio Intelligence: An Episode in the Battle of the Coral Sea.” Cryptologia 7 (April 1983): 97-118. * Mache, Wolfgang. “Geheimschreiber.” Cryptologia 10 (October 1986): 230-42. Marks, Leo. Between Silk and Cyanide: A Codemaker’s War. New York: Free Press, 2000. Matsui, M. “Linear Cryptanalysis Method for DES Cipher.” In Advances in Cryptology: Proceedings of Eurocrypt ’93. New York: Springer-Verlag, 1994. Matyas, S.M. and C.H. Meyer. “Generation, Distribution, and Installation of Cryptographic Keys.” IBM Systems Journal 17 (1978): 126-37. Mellen, Greg E. “Cryptology, Computers, and Common Sense.” In Proceedings of the National Computer Conference, vol. 42, 569-79. Montvale, NJ: AFIPS Press, 1973. * Mellen, Greg E. “Graphic Solution of a Linear Transformation.” Cryptologia 5 (January 1981): 1-19. * Mellen, Greg E. and Lloyd Greenwood. “The Cryptology of Multiplex Systems, Part 1.” Cryptologia 1 (January 1977): 4-16. * Mellen, Greg E. and Lloyd Greenwood. “The Cryptology of Multiplex Systems, Part 2.” Cryptologia 1 (April 1977): 150-65. Michelman, Eric H. “The Design and Operation of Public-Key Cryptosystems.” In Proceedings of the National Computer Conference, vol. 48, 305-11. Montvale, NJ: AFIPS Press, 1979. * Morris, Robert. “The Hagelin Cipher Machine (M-209): Reconstruction of the Internal Settings.” Cryptologia 2 (July 1978): 267-89. Murphy, S. “The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts.” Journal of Cryptology 2 (1990): 145-54. National Security Agency. Influence of U.S. Cryptologic Organizations on the Digital Computer Industry. December 1977. Revised. * Price, Wyn. “Management of Cryptographic Keys.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 135-54. Oxford, UK: Butterworth-Heinemann Ltd, 1992. * Reeds, James. “‘Cracking’ a Random Number Generator.” Cryptologia 1 (January 1977): 20-6. * Reeds, James. “Entropy Calculations and Particular Methods of Cryptanalysis.” Cryptologia 1 (July 1977): 235-54. * Reeds, James. “Rotor Algebra.” Cryptologia 1 (April 1977): 186-94. Reese, W.D. Command and Control in the Information Age. Newport, RI: NWC, June 14, 1996. * Rivest, Ronald L. “Remarks on a Proposed Cryptanalytic Attack of the MIT Public Key Cryptosystem.” Cryptologia (January 1978): 62-5. Rivest, Ronald L. “Response to NIST’s Proposal.” Communications of the ACM 35 (July 1992): 41-7.

85 * Rivest, Ronald L. “Statistical Analysis of the Hagelin Cryptograph.” Cryptologia 5 (January 1981): 27-32. Rivest, Ronald L., et al. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” MIT Technical Memo LCS/TM 82. Laboratory for Computer Science, Massachusetts Institute of Technology, April 1977. Rivest, Ronald L., et al. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” Communications of the ACM 21 (February 1978): 120-6. Rohrbach, H. “Mathematical and Mechanical Methods in Cryptology, II.” Cryptologia 2 (1978): 20-37. Rosenheim, Shawn James. The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet. Baltimore, MD: Johns Hopkins University Press, 1997. * Rubin, Frank. “Computer Methods for Decrypting Random Stream Ciphers.” Cryptologia 2 (July 1978): 215-31. * Rubin, Frank. “Decrypting a Stream Cipher Based on J-K Flip-Flops.” Cryptologia 5 (January 1981): 51-7. * Schatz, Bruce R. “Automated Analysis of Cryptograms.” Cryptologia 1 (April 1977): 116-42. Schwartau, Winn. “Crypto Policy and Business Privacy.” PC Week (June 28, 1993): 207. Shapley, Deborah and Gina Kolata. “Cryptology: Scientists Puzzle Over Threat to Open Research, Publication.” Science 197 (September 30, 1977): 1345-9. Simons, Jim. “A Study of the Lucifer Crypto-Algorithm.” IBM Memorandum. August 18, 1973. Van Tassel, Dennis. “Advanced Cryptographic Techniques for Computers.” Communications of the ACM 12 (December 1969): 664-5. Van Tassel, Dennis. “Cryptographic Techniques for Computers.” In Proceedings of the Spring Joint Computer Conference, vol. 34, 367-72. Montvale, NJ: AFIPS Press, 1969. Van Tassel, Dennis. “Cryptographic Techniques for Computers: Substitution Methods.” Information and Storage Retrieval (June 1970): 241-9. Ware, Willis H. “Privacy and Security Policy Choices in an NII Environment.” In Cryptography: Policy and Algorithms, Proceedings of an International Conference, 20-39. Berlin, Germany: Springer-Verlag, 1996. Wolf, James R. Secret Writing. New York: McGraw-Hill Book Company, 1970. Wolfe, J.M. A First Course in Cryptanalysis. Brooklyn, NY: Brooklyn College Press, 1943. Yardley, Herbert Osborne. The American Black Chamber. Indianapolis, IN: The Bobbs-Merrill Company, 1931. Yardley, Herbert Osborne. “Ciphers.” Saturday Evening Post, May 9, 1931. Yardley, Herbert Osborne. “Codes.” Saturday Evening Post, April 18, 1931. Yardley, Herbert Osborne. “Cryptograms and Their Solution.” Saturday Evening Post, November 21, 1931.

Network Security

Abrams, M.D. and H.J. Podell, eds. Tutorial: Computer and Network Security. Washington, DC: IEEE, 1987. Heinrich, Frank R. and David J. Kaufman. “A Centralized Approach to Computer Network Security.” In Proceedings of the National Computer Conference, vol. 45, 85- 90. Montvale, NJ: AFIPS Press, 1976. Hinckley, A.C. Issues in Computer Network Security. Bedford, MA: Mitre Corp., 1978. Kizza, Joseph Migga. Computer Network Security and Cyber Ethics. Jefferson, NC: McFarland, 2001.

86 McClure, Stuart, et al. Hacking Exposed: Network Security Secrets & Solutions. Fourth edition. Osborne-McGraw Hill, 2003. Nye, J. Michael. “Network Security and Vulnerability.” In Proceedings of the National Computer Conference, vol. 51, 647-53. Arlington, VA: AFIPS Press, 1982. Nye, J. Michael. “A Primer on Security.” Mini-Micro Systems 14 (July 1981): 166-74.

Embezzlement

Adelson, Alan M. “Embezzlement by Computer.” Security World (September 1965). Adelson, Alan M. “Whir, Blink, Jackpot! Crooked Operators Use Computers to Embezzle Money from Companies.” The Wall Street Journal, April 5, 1968, p. 1. Allan, J.A. “Embezzlement by Electronics.” Accountants Magazine (April 1960): 253- 5. Allen, B. “Embezzler’s Guide to the Computer.” Harvard Business Review (July 1975): 53. Amir, M. “Computer Embezzlement: Prevention and Control.” Computer Bulletin (November 1971). “Computers: Embezzlement from Banks.” Certified Accountants Journal (November 1969): 639-40. Dansinger, Sheldon J. “Embezzling Primer.” Computers and Automation (November 1967): 41-3. Neville, Haig G. “Computer Capers Herald New Crime Wave of Embezzlement.” The National Underwriter: Property Edition (August 20, 1971): 1. Schweisheimer, W. “Embezzlement by Computer.” Bankers Monthly (June 1970): 291-2. Whiteside, Thomas. Computer Capers: Tales of Electronic Thievery, Embezzlement, and Fraud. New York: Thomas Y. Crowell, 1978.

Libel

Adams, E.L. “The Right of Privacy and Its Relation to the Law of Libel.” American Law Review 39 (January-February 1905): 37-8. Cutera, Teri A. “Computer Networks, Libel, and the First Amendment.” Computer/Law Journal (December 1992): 555-83.

Computer Matching

Betts, Mitch. “Computer Matching Nabs Double-Dippers.” Computerworld 28 (April 28, 1994): 90. Computer Matching and Privacy Protection Act of 1988, Pub. L. No. 100-503, 102 Stat. 2507 (1988), Pub. L. No. 101-56, 103 Stat. 149 (1989), Pub. L. No. 101-508, 104 Stat. 1388-334 (1990). Cruse, R.E., Jr. “Invasions of Privacy and Computer Matching Programs: Another Perspective.” Computer/Law Journal 11 (October 1992): 461-80. Hayden, Trudy and Norma Rollins. An Evaluation of New York State’s Wage Reporting System: The Real Cost of Computer Matching. New York: NYCLU, December 1982. Kirchner, J.A. “Privacy: A History of Computer Matching in Federal Government.” Computerworld 15 (December 14, 1981): 1-16. Kusserow, Richard F. “The Government Needs Computer Matching to Root Out Waste and Fraud.” Communications of the ACM 27 (1984): 542-5. Kusserow, Richard P. “The Government Needs Computer Matching to Root Out Waste and Fraud.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 652-8. San Diego: Academic Press, 1996.

87 Lanagan, K.J. “Computer Matching Programs: A Threat to Privacy.” Columbia Journal of Law & Social Problems 25 (1979). Langan, Kenneth James. “Computer Matching Programs: A Threat to Privacy?” Columbia Journal of Law and Social Problems 15 (1979): 143-80. Leadbeater, A. “Computer Matching and Individual Rights: A Canadian Perspective.” Government Information Quarterly 5 (1988): 191-4. “An Overview of Computer Matching, Its Privacy Implications, and the Regulatory Schemes of Select Jurisdictions.” Government Information Quarterly 9 (1992): 35. Reichman, Nancy. “Computer Matching: Towards Computerized Systems of Regulation.” Law and Policy (October 1987): 387-415. Shattuck, John H.F. “Computer Matching is a Serious Threat to Individual Rights.” Communications of the ACM 27 (June 1984): 538-41. Shattuck, John H.F. “Computer Matching is a Serious Threat to Individual Rights.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 645-51. San Diego: Academic Press, 1996. Shattuck, John H.F. “Computer Matching: Should It Be Banned?” Communications of the ACM 27 (June 1984): 537-45. Shattuck, John H.F. “In the Shadow of 1984: National Identification Systems, Computer-Matching and Privacy in the United States.” Hastings Law Journal 35 (July 1984): 991-1005. United States. Congress. Senate. Computer Matching and Privacy Protection Act of 1986: Hearing Before the Subcommittee on Oversight of Government Management of the Committee on Governmental Affairs. Washington, DC: GPO, September 16, 1986. Van Geel, Mieke. “The Computer Matching and Privacy Act of 1988.” Tilburg Foreign Law Review 2 (1992): 41. Weiss, Laura B. “Government Steps Up Use of Computer Matching to Find Fraud in Programs.” Congressional Quarterly Service Weekly Report 41 (February 26, 1983): 431-3.

Gender

Allen, Anita L. and Erin Mack. “How Privacy Got Its Gender.” Northern Illinois University Law Review 10 (1990): 441-78. Allen, Anita L. Uneasy Access: Privacy for Women in a Free Society. Totowa, NJ: Rowman and Littlefield, 1985. Heeter, Carrie. “Gender Differences and VR.” Virtual Reality World (March-April 1994).

Automatic Face Recognition

Agre, Philip E. “Your Face is Not a Bar Code: Arguments Against Automatic Face Recognition in Public Places.” Whole Earth 106 (Winter 2001): 74-7. McGuire, David. “Rep. Armey Blasts Tampa over Face-Recognition System.” Newsbytes News Network, July 2, 2001. Sullivan, Andy. “U.S. Urged to Regulate Face-Scan Technology: Security Industry Reacts to Backlash.” San Diego Union-Tribune, August 9, 2001.

Digital Cash

Armer, Paul. “Privacy Aspects of the Cashless and Checkless Society: Testimony Before the Senate Subcommittee on Administrative Practice and Procedure.” P-3822. Santa Monica, CA: The Rand Corporation, April 1968.

88 Bequai, August. The Cashless Society: EFTS at the Crossroads. New York: Wiley, 1981. Brands, S. “Untraceable Off-Line Cash in Wallet With Observers.” In Advances in Cryptology—CRYPTO ’93, 302-18. Berlin, Germany: Springer-Verlag, 1993. Brickell, E., et al. “Trustee-Based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change.” In Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, 457-66. 1995. “The Cashless Society.” News Front (May 1968): 30-4. Chaum, David. “On-line Cash Checks.” In Advances in Cryptology—EUROCRYPT ’89, 288-93. Berlin: Springer-Verlag, 1989. Chaum, David. Prepaid Smart Card Techniques: A Brief Introduction and Comparison. Digicash, 1994. Claiborne, William. “Federal, State Benefits Systems Move Toward Cashless Automation.” Washington Post, June 1, 1994. Froomkin, A. Michael. “Regulation and Computing and Information Technology: Flood Control on the Information Ocean—Living with Anonymity, Digital Cash, and Distributed Databases.” Journal of Law & Commerce 15 (1996): 395-482. Levy, Steven. “E-Money (That’s What I Want).” Wired (December 1994). “Money Goes Electronic in the 1970s.” Business Week (January 13, 1968): 54-74. Reistad, D.L. “Developments in the ‘Checkless Society.’” Computer Digest (February 1968): 13-4. Stiefel, Rudy C. “A ‘Checkless’ Society or an ‘Unchecked’ Society?” Computers and Automation (October 1970). Woundhuysen, James. “Chequelless, Cashless, Clueless in the Smart Card Society.” Management Today (November 1, 1990).

Counterfeiting

McClellan, D. “Desktop Counterfeiting.” Technology Review (February-March 1995).

U.S. Census

Ashbrook, J.M. “When Census Gets Out of Hand.” Congressional Record: Extensions of Remarks (March 4, 1968): E1471. “Battle Looms on ’70 Census Information.” Advertising Age 40 (February 24, 1969): 31. Betts, J.E. “The Census: Coherent Plan for National Data Gathering Needed.” Congressional Record—House, October 16, 1967, p. H13429-H13430. Betts, J.E. “The Census: Invasion of Privacy.” Congressional Record—House, October 10, 1967, p. H13169-H13172. Betts, J.E. “Census Questions and the National Data Center.” Congressional Record— House, October 31, 1967, p. H14277-H14280. Betts, J.E. “Census Reactions.” Congressional Record—House, July 24, 1967, p. H19875-H19876. Betts, J.E. “Newspapers Support Census Reform.” Congressional Record—House, May 28, 1968, p. H4376-H4379. Betts, J.E. “Proposed Census Reform.” Congressional Record—House, May 21, 1968, p. H4052-H4075. Large, A.J. “A Curious Business: As 1970 Census Nears, Some Critics Complain of Invasion of Privacy.” Wall Street Journal 173 (March 31, 1969): 1. Nelson, Dawn D. “Record Linkage v. Confidentiality from the Perspective of the U.S. Bureau of Census.” In Protection of Privacy, Automatic Data Processing and Progress in Statistical Documentation, 325-36. Brussels, Belgium: Office of Official

89 Publications of the European Communities, 1987. Okamura, Raymond. “The Myth of Census Confidentiality.” Amerasia (1981): 111-20. “Privacy and the 1970 Census.” National Review 21 (March 11, 1969): 220-1. Sperry, K. “Privacy: Curb Sought on Census.” Science 160 (April 5, 1968): 51. United States. Bureau of the Census. Minutes of the Census Advisory Committee on Privacy and Confidentiality. Washington, DC: Bureau of the Census, 1973-4.

Employee Privacy

Adler, Philip, Jr. “Employee Privacy: Legal and Research Developments and Implications for Personnel Administration.” Sloan Management Review 26 (Winter 1985): 13-22. Bylinsky, Gene. “How Companies Spy on Employees.” Fortune (November 1991). Dunca, Richard. “A Privacy Act Would Force Firms to Inform Their Employees About Email Monitoring.” PC Week (June 28, 1993): 203-4. “Employees Accused of Illegal Computer Use.” Datamation (December 1967): 78. Flint, D. and D. Mallon. “Big Brother: Some Reflections on Employee Monitoring.” Computer Law & Security Report 19 (January 2003): 30-35. Huggins, Phyllis. “Employee Charged in Program ‘Theft.’” Computerworld (March 10, 1971): 1. Kallman, Ernest. “Electronic Monitoring of Employees.” Journal of Systems Management (June 1993): 17-21. Lange, Diane. “Employees Called Biggest Security Risk at Centers.” Computerworld (June 23, 1971): 2. Lee, Laurie Thomas. “Watch Your Email: Employee Email Monitoring and Privacy Law in the Age of the ‘Electronic Sweatshop.’” John Marshall Law Review 28 (1994): 139- 48. Lehman, Anne L. “Email in the Workplace: Question of Privacy, Property, or Principle?” CommLaw Conspectus 5 (1997): 99-100. Lundell, E. Drake, Jr. “Firm Sues Ex-Employees Over Proprietary Programs.” Computerworld (December 22, 1971): 6. Mitsch, Robert J. “Ensuring Privacy and Accuracy of Computerized Employee Record Systems: Computer Power, Uncontrolled, Can Generate Problems.” Personnel Administrator 28 (September 1983): 37. Nelson, Corey L. “Is Email Private or Public? Employers Have No Right to Snoop Through Mail.” Computerworld 28 (June 27, 1994): 135-7. O’Meara, John Corbett. “The Emerging Law of Employees’ Right to Privacy: Some Useful Recommendations About Practices and Employment Information.” Personnel Administrator 30 (June 1985): 159. Perl, Peter. “Monitoring by Computer Sparks Employee Concerns.” Washington Post, September 21, 1984, p. 1. Piller, Charles. “Bosses with X-Ray Eyes: Your Employer May Be Using Computers to Keep Tabs on You.” Macworld (July 1993): 118-23. “Respecting Employee Privacy: New Policies Limit Both Data and Access to Personnel Records.” Business Week (January 11, 1982): 130-2. Rifkin, Glenn. “Do Employees Have a Right to Electronic Privacy?” New York Times, December 8, 1991, p. C8. Sipior, Janice C. and Burke T. Ward. “The Dark Side of Employee Email.” Communications of the ACM (July 1, 1999): 88. Tolchinsky, Paul D., et al. “Employee Perceptions of Invasion of Privacy: A Field Simulation Report.” Journal of Applied Psychology 66 (June 1981): 308-13. “The Union’s Right to Information at the Expense of Employees’ Privacy Rights.” University of Toledo Law Review 15 (Winter 1984): 755-809.

90 Westin, Alan F. “Privacy and Personnel Records: A Look at Employee Attitudes.” The Civil Liberties Review 4 (1978): 28-34. Westin, Alan F. and Stephan Salisbury, eds. Individual Rights and the Corporation: A Reader on Employee Rights. New York: Pantheon Books, 1980. White, Jarrold J. “[email protected]: Employer Monitoring of Employee Email.” Alabama Law Review 48 (1997): 1079-80. Woodman, Richard, et al. “A Survey of Employee Perceptions of Information Privacy in Organizations.” Academy of Management Journal 25 (1982): 647-63.

Identity and Self

Agre, Philip E. “The Architecture of Identity: Embedding Privacy in Market Institutions.” Information, Communications, and Society 2 (1999): 1-25. Barglow, Raymond. The Crisis of the Self in the Age of Information: Computers, Dolphins, and Dreams. New York: Routledge, 1994. Benn, Stanley I. and Gerald F. Gaus, eds. Public and Private in Social Life. New York: Croom-Helm, 1983. Bensman, Joseph and Robert Lilienfeld. Between Public and Private: The Lost Boundaries of the Self. New York: Free Press, 1979. Bollier, David. The Future of Community and Personal Identity in the Coming Electronic Culture: A Report of the Third Annual Aspen Institute Roundtable on Information Technology, Aspen, Colorado, August 18-21, 1994. Aspen Institute, 1995. Bryant, Christopher. “Privacy, Privatization, and Self-Determination.” In Privacy, ed. J. Young. London, UK: Wiley, 1978. Clarke, Roger A. “The Digital Persona and Its Application to Data Surveillance.” Information Society 10 (1994): 77-92. Davies, Simon G. A Case of Mistaken Identity: An International Study of Identity Cards. Toronto, Canada: Information and Privacy Commissioner of Ontario, 1995. Donner, Frank J. “Case of the Private I.” Nation 205 (December 11, 1967): 629-33. Fortner, Robert S. “Physics and Metaphysics in an Information Age: Privacy, Dignity and Identity.” Communication 9 (1986): 151-72. Giddens, Anthony. Modernity and Self-Identity. Stanford, CA: Stanford University Press, 1991. Giddens, Anthony. Self and Society in the Late Modern Age. Stanford, CA: Stanford University Press, 1991. Goffman, Erving. The Presentation of Self in Everyday Life. Garden City, NY: Doubleday, 1959. Goffman, Erving. Stigma: Notes on the Management of Spoiled Identity. New York: Simon & Schuster, 1963. Joyce, R. and G. Gupta. “Identity Authentication Based on Keystroke Latencies.” Communications of the ACM 33 (1990): 168-76. Lyon, David. “British Identity Cards: The Unpalatable Logic of European Membership?” The Political Quarterly 62 (1991): 377-85. Marx, Gary T. “Fraudulent Identification and Biography.” In New Directions in the Study of Justice, Law, and Social Control. New York: Plenum, 1990. Meissner, Paul. Evaluation of Techniques for Verifying Personal Identity. PB-255-200. Washington, DC: National Bureau of Standards, 1976. Post, Robert C. “The Social Foundations of Privacy: Community and Self in the Common Law Tort.” California Law Review 77 (1989): 957-1010. Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Simon and Schuster, 1995. Winner, Langdon. “Just Me and My Machine: The New Solipsism.” Whole Earth

91 Review (December 1984-January 1985): 29. Winner, Langdon. “Mythinformation in the High-Tech Era.” IEEE Spectrum 21 (1984): 90-6.

ADAPSO

ADAPSO. “ADAPSO Position Paper on Privacy Problems.” October 13, 1970. NBS# 75027013. Box 632, Folder 33. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Association of Data Processing Service Organizations. ADAPSO’s Position Paper on Privacy Problems. October 21, 1970.

Privacy, Security, and Banking

Alexander, Richard and Roberta K. Spurgeon. “Privacy, Banking Records, and the Supreme Court: A Before and After Look at Miller.” Southwestern University Law Review 10 (1978): 13-33. “Bankers Group Urges Use of Social Security Numbers for Records.” Wall Street Journal, March 6, 1968, p. 8. “Banks Spending for Computer Security in the Wild West.” Information Week (October 12, 1970). Bloom, Jay M. “Bank Records and the Right to Privacy.” California State Bar Journal 52 (May-June 1977): 198-202. Britt, P. “Moving Forward with Smart Cards.” Savings and Community Banker 3 (1994): 6-7. Brooke, Phillip. “Protection of Privacy Vital in Any Improved Bank Computer Program.” American Banker (May 6, 1971): 1. Browne, Peter S. and Timothy J. Saltmarsh. “Now is the Time to Implement Communications Security.” ABA Banking Journal (July 1981): 54-60. Burt, K.H. “Computer Center Security: Protecting the Achilles Heel.” Bank Administration (April 1970): 36-9. “Calculated Computer Errors Manipulate Three Banks’ Security: $1 Million Lost.” Computerworld (March 25, 1970): 1. Carlson, Paul. “A Bank Protects Its ‘Memory.’” Banking (April 1971): 38-9. “Computer Growth Calls for Security in Banks.” Data Management (September 1970): 156. “Credit Reporting and Privacy.” Banking 61 (March 1969): 53. “Data Privacy? Don’t Bank on It.” The Economist 283 (April 17, 1982): 31. Davis, Elaine Block. “Government Access to Bank Records in the Aftermath of United States v. Miller and the Tax Reform Act of 1976.” Houston Law Review 14 (1977): 636-71. Dearhammer, William G. “Commercial Credit Information and Privacy Legislation: An Update.” Journal of Commercial Bank Lending 63 (June 1981): 46-51. “Electronic Security in the Computer Room.” Banking (May 1970): 86. “The Electronic Transfer of Money and Credit As It Will Affect the Banker, the Consumer, and the Retailer.” Automatic Data Processing Newsletter 11 (February 6, 1967). Freiser, J. and H.T. Snelling. “Bank Management’s Role in EDP Security.” Bankers Magazine (Winter 1972): 78-83. Gallagher, C.E. “Efficiency: Purchased at the Price of Privacy.” Banking 60 (April 1968): 38-9. Gellman, Harvey S. Electronic Banking Systems and Their Effects on Privacy: A Study by the Privacy and Computer Task Force. Ottawa, Canada: Department of

92 Communications and Department of Justice, 1972. Hansell, Saul. “Citibank Fraud Case Raises Computer Security Questions.” New York Times, August 19, 1995, p. 31. Holzman, R.S. “Banks and Customer Privacy: When Income Tax Agents Call, How Secret is Bank’s Data on its Clients?” Finance 85 (November 1967): 27-9. * Hutcheon, Alfred. “Automated Teller Machines.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 711-29. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Johnson, C.B. “Protection Primer for EDP Records.” Banking (December 1969): 85-6. Kling, Rob. “Electronic Fund Transfer Systems and Quality of Life.” In Proceedings of the National Computer Conference, vol. 47, 191-7. Montvale, NJ: AFIPS Press, 1978. Leavitt, Don. “Physical DP Tampering Discounted in Bank ‘Shuffle.’” Computerworld (April 25, 1973): 4. Linowes, David F. Privacy and Banking: A Research Survey. Urbana: University of Illinois at Urbana-Champaign, 1979. Luedtke, Sherilee and Jeffrey D. Gross. “Electronic Fund Transfers: Regulation and the Right to Financial Privacy.” Gonzaga Law Review 16 (1981): 313-55. McLuhan, Marshall and Bruce Powers. “Electronic Banking and the Death of Privacy.” Journal of Communication 31 (1981): 164-9. Merritt, Michael. “DP Figures in Bank Loss of $128,000.” Computerworld (February 3, 1971): 1. “New Threats and New Defenses.” Banking (August 1970): 69-70. O’Brien, James A. “The Computer and Banking’s Protection.” Banking (September 1968): 115-8. Pratt, Lester A. Bank Frauds: Their Detection and Prevention. The Ronald Press Company, 1965. Pray, Francis X. “Bank Customer Has No Reasonable Expectation of Privacy of Bank Records: United States v. Miller.” San Diego Law Review 14 (1977): 414-34. * Pugh, Brian. “Security in Banking.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 691-710. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Sheehan, John and Jerrold Thompson. “Bank Records v. Privacy: Is There a Viable Solution?” Glendale Law Review 3 (1978-9): 235-48. Trabbold, W.E. “The Privacy Trap.” Journal of Commercial Bank Lending 51 (November 1968): 37-42. Watterson, Lynn. “Data Banks Can Protect Privacy.” Banking 60 (January 1968): 56. Wessler, John. “Federal Court Decision Bolsters Bank EDP Role.” Electronic News (January 22, 1968): 38.

Electronic Monitoring

Alge, Bradley John. “Electronic Performance Monitoring and Control Systems: An Examination of the Roles of Organizational Justice and Organizational Privacy.” Ph.D. diss., The Ohio State University, 1999. Bridger, Chet. “Nowhere to Hide Now: Computer Monitoring of Your Daily Life is Making Privacy a Thing of the Past.” Buffalo News, February 7, 2000. Chalykoff, John and Nitin Nohria. “Note on Electronic Monitoring.” Harvard Business School Publications, 1990. Davies, Simon G. Monitor: Extinguishing Privacy on the Information Superhighway. Pan Books, 1996. DeTienne, Kristen Bell. “Big Brother is Watching: Computer Monitoring and Communication.” IEEE Transactions on Professional Communications 37 (March 1994): 5-10. DeTienne, Kristen Bell. “Big Brother or Friendly Coach: Computer Monitoring.” The

93 Futurist (September-October 1993): 33-7. Grant, Rebecca A. and Christopher A. Higgins. “Computerized Performance Monitors: Are They Costing You Customers?” Sloan Management Review 29 (1988): 39-45. Lipman, A.D. “Congress Considers Electronic Monitoring Bill.” Telemarketing Magazine 10 (October 1991): 42-4. Piturro, Marlene. “Electronic Monitoring.” Information Center (July 1990).

Virtual Jails

Alexander, E. “Electronic Monitoring of Felons by Computer: Threat or Boon to Civil Liberties?” Social Theory and Practice 11 (Spring 1985): 89-95. Blanchard, Matthew P. “Satellite Monitoring Network Creates Virtual Jail for Suspects.” Pittsburgh Post-Gazette, September 9, 2001. Condit, T. and G. Nicholson. “Electronic Surveillance in Custodial Settings.” Journal of California Law Enforcement 10 (October 1975): 43-7. Corbett, Ronald and Gary T. Marx. “Critique—No Soul in the New Machine: Technofallacies in the Electronic Monitoring Movement.” Justice Quarterly 8 (1991): 399-414. Crowe, Ann H. “Electronic Supervision: From Decision-Making to Implementation Offender.” Corrections Today (August 1, 2002). Crowe, Ann H., et al. Supervision with Electronic Technology. Lexington, KY: American Probation and Parole Association, 2002. Lilly, Robert and Richard Ball. “A Brief History of House Arrest and Electronic Monitoring.” Northern Kentucky Law Review 17 (1987): 343-74. Lilly, Robert and Joan Himan. The Electronic Monitoring of Offenders. Leicester, UK: De Montfort University Law Monographs, 1991. Martinez, Julia C. “Satellites May Shed Light on Parolees.” Denver Post, July 17, 2001. Nellis, Mike. “The Electronic Monitoring of Offenders in England and Wales.” British Journal of Criminology 31 (1991): 165-85. Pyle, Amy. “Teens ‘Jailed’ But Don’t Go Behind Bars: Surveillance Device Keeps Youth Home.” Los Angeles Times, October 4, 1989. Russel, K. and R. Lilly. The Electronic Monitoring of Offenders. Leicester, UK: Leicester Polytechnic Law School, 1989.

Credit Bureaus

“‘Alert’ Program Spots Credit Ring.” Computerworld (December 9, 1970): 1. Allen, Michael. “To Repair Bad Credit, Advisers Give Clients Someone Else’s Data.” Wall Street Journal, August 14, 1990, p. A1. “Anti-Trust, Privacy Threat Seen Lurking in Credit Bureaus.” Electronic News 13 (December 23, 1968): 22. Blume, Peter. “Credit Reporting and Data Protection: Efficiency Versus Privacy.” The International Computer Lawyer 1 (1993): 12. Breedon, D. “Privilege of Credit vs. the Right of Privacy.” Stores 50 (October 1968): 24-6. Bush, T.W. “Credit Data Firm Uses Computer to Paint ‘Profiles.’” Los Angeles Times, March 25, 1968, p. C9-10. “Credit Bureaus, Criticized at Senate Hearings, Offer Voluntary Guidelines to Guard Privacy.” Management Services 6 (January 1969): 15. “Credit Investigations and the Right to Privacy: Quest for a Remedy.” Georgetown Law Journal 57 (February 1969): 509-33. “Dallas Firm Readies Program to Automate Credit Checks.” Electronic News (April 22,

94 1968): 45. Dart, John M., Jr. “Arrest and Credit Records: Can the Right of Privacy Survive?” Florida Law Review 24 (1971-2): 681-700. Drattel, Alan. “Corralling Credit Data.” Business Automation (February 1968): 40-3, 49. Earley, Pete. “Government to Share Deadbeat List with Private Credit-Rating Bureaus.” Washington Post, April 25, 1984. Harris, Louis and Alan F. Westin. The Equifax Report on Consumers in the Information Age. Atlanta, GA: Equifax, Inc., 1990. Miller, Michael. “Credit Report Firms Face Greater Pressure.” Wall Street Journal, September 23, 1991, p. 1. Miller, Michael. “Equifax to Stop Selling Data to Junk Mailers.” Wall Street Journal, August 13, 1991, p. B1. O’Connor, William J., Jr. “The Impact of Privacy Legislation on the Financial Sector: Consumers Credit Bureaus and Credit Grantors.” The Business Lawyer 34 (1979): 1121-28. Reed, Roy. “Tax Unit Scored at Credit Inquiry.” New York Times (March 14, 1968): 22. Sesser, S.N. “Prying for Pay: How Credit Bureaus Collect and Use Data on Millions of Persons.” Wall Street Journal (February 5, 1968): 1, 12.

Credit Cards

Dunn, Ashley. “On Line, and Inside Credit Card Security.” New York Times, March 19, 1995, p. A37. Mandell, Lewis. The Credit Card Industry: A History. New York: Twayne Publishers, 1990. Simmons, Matty. The Credit Card Catastrophe: The 20th-Century Phenomenon that Changed the World. Fort Lee, NJ: Barricade Books, 1995. “Visa Computer Pinpoints Use of Lost, Stolen Cards.” Wall Street Journal, August 3, 1984. “The Zone of Privacy: Although Individual Dignity Must Be Preserved, Business in Our Easy-Credit Economy Needs Information for Survival.” Journal of American Insurance 44 (September-October 1968): 29-32.

Fair Credit Reporting Act

“Fair Credit Bill Would Protect Against False Billing.” Computerworld (August 12, 1970). Fair Credit Reporting Act, Pub. L. No. 91-508, 84 Stat. 1128 (1970), Pub. L. No. 95- 598, 92 Stat. 2676 (1978), Pub. L. No. 101-73, 103 Stat. 439 (1989), Pub. L. No. 102-242, 105 Stat. 2300 (1991), Pub. L. No. 102-537, 106 Stat. 3531 (1992), Pub. L. No. 102-550, 106 Stat. 4082 (1992). Fisher, Joseph F. “Access to Fair Credit Reports: Current Practices and Proposed Legislation.” American Business Law Journal 19 (Fall 1981): 319-42. Rasor, P.B. “Privacy Implications of Consumer Credit Protection Laws.” John Marshall Law Review 19 (Summer 1986): 941-57.

Association of Computer Programmers and Analysts

Association of Computer Programmers and Analysts. “The Data Bank and Your Privacy: The ACPA’s Position.” ACPQ: The Newsletter of the Association of Computer Programmers and Analysts (September-October 1972): 3-6.

95

New Zealand

Auburn, F.M. “Report of the Sub-Committee of the Law Revision Commission on Computer Data Banks and Privacy.” New Zealand Universities Law Review 6 (1974): 190-4.

RUSH Time-Sharing System

Babcock, J.D. “A Brief Discussion of Privacy Measures in the RUSH Time-Sharing System.” In Proceedings of the Spring Joint Computer Conference, vol. 30, 301-2. Washington, DC: Thompson Book Company, 1967.

Computers and Business Equipment Manufacturers Association

Bachman, Charles W. Computers and Business Equipment Manufacturers Association (CBEMA): Privacy Series Update Nos.3, 5, 8-13, 1975-1977. In Charles Bachman Papers, 1951-1996. Box 6, Folder 10. CBI 125. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Computer Business Equipment Manufacturers Association. Privacy Series—2. 1973. NBS# 74064002. Box 609, Folder 19. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN.

Fraud

Allen, Brandt R. “Computer Fraud.” Financial Executive (May 1971): 38. Carmichael, D.R. “Fraud in EDP Systems.” Internal Auditor (May 1969): 28-38. “Computer Frauds Seen as Danger to EDP Operations.” Computerworld (August 26, 1970): S-5. Bologna, Jack. Corporate Fraud: The Basics of Prevention and Detection. Stoneham, MA: Butterworth Publishers, 1984. Bride, Edward J. “Auditor-Dper Cooperation ‘Only Way’ to Prevent Fraud.” Computerworld (June 13, 1973): 10. Burgess, John. “FBI Uncovers Massive Theft, Fraud, at IBM.” Boston Globe, September 23, 1993. Doswell, R. and G.L. Simmons. Fraud and Abuse of IT Systems. Manchester, UK: National Computing Center, 1986. “DP Fraud: Mum’s the Word.” Computerworld (March 24, 1971): 6. Farquhar, B. “Fraud.” Computer Fraud and Security Bulletin 11 (1989): 7-10. Freed, Roy N. “Computer Fraud: A Management Trap.” Business Horizons (June 1969): 25-30. “How to Protect Your Computer from Theft, Fraud, Fire.” Chain Store Age (August 1972): 17-9. Johnson, K. “One Less Thing to Believe In: Fraud at Fake Cash Machine.” New York Times, May 13, 1993, p. A1. Krauss, Leonard I. and Aileen MacGahan. Computer Fraud and Countermeasures. Englewood Cliffs, NJ: Prentice-Hall, 1979. Luzwick, P. “Attack Crises and Disasters with a Vengeance Computer Security.” Computer Fraud & Security (July 2001): 15-16. Neumann, Peter G. “Fraud by Computer.” Communications of the ACM 35 (August 1982): 154. “On Computer Fraud.” The Wall Street Journal, April 5, 1968.

96 Smalheiser, Marvin. “Safford Summons User Group to Rally Against DP Fraud.” Computerworld (June 20, 1973): 1. Sommer, P. “The People Problem.” Computer Fraud and Security Bulletin (February 1990): 13-5. * Tantam, Mark. “Investigation of Computer Fraud.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 515-41. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Taylor, Alan. “Auditor Negligence, Fear of DP Called Keys to Fraud.” Computerworld (April 25, 1973): 3. Taylor, Alan. “The Great Fraud: DP or Not DP?” Computerworld (April 25, 1973): 1. Taylor, Alan. “Must In-House DP Be Banned as Too Open to Fraud?” Computerworld (June 13, 1973): 19.

Electronic Data Processing Security and Data Protection

Allen, Brandt R. “EDP Security.” Data Management (January 1972): 18-24. Anderson, Arthur F. “Records Protection in the Age of EDP.” Office (October 1968). Auernhammer, Herbert. “Legislation on Data Processing and Particularly on Data Transmission and Deletion.” In Policy Issues in Data Protection and Privacy, 159-68. Paris, France: OECD, 1976. Bingham, Harvey W. Security Techniques for EDP of Multi-Level Classified Information. RADC-TR-65-415. New York: Rome Air Force Development Center, 1965. Canning, Richard G. “Information Security and Privacy.” EDP Analyzer 24 (February 1986): 1-11, 16. Courtney, Robert H., Jr. Forty Commonly Found Deficiencies in the Security of Data Proceeding Activities. IBM Data Security and Privacy Systems Development Division, June 1971. Courtney, Robert H., Jr. “Security Risk Assessment in Electronic Data Processing.” In Proceedings of the National Computer Conference, vol. 46, 97-104. Montvale, NJ: AFIPS Press, 1977. Courtney, Robert H., Jr. Security Risk Assessment in Electronic Data Processing Systems. TR-21.700. SCD Kingston, New York, December 1975. “Data Security in the CDB.” EDP Analyzer (May 1970): 1-14. Horton, Frank. “Privacy Safeguards Urged.” EDP Weekly (September 21, 1970): 3. Howes, Paul R. “EDP Security: Is Your Guard Up?” Management Review (July 1971): 29-32. “Integrity and Security of Personal Data.” EDP Analyzer 14 (April 1976): 1-14. Levine, R.A. “How to Protect Your EDP Records.” New York Certified Public Accountant (May 1969): 353-6. Peck, Paul L. “Achieving Security and Privacy of Information in an Online Data Processing Environment.” In Proceedings of Online 72: International Conference on Online Interactive Computing, 107-29. Middlesex, England, 1972. Peck, Paul L. “Data Processing Safeguards.” Journal of Systems Management (October 1972): 11-7. “Protecting Valuable Data, Part 1.” EDP Analyzer 11 (December 1973): 1-13. “Protecting Valuable Data, Part 2.” EDP Analyzer 12 (January 1974): 1-14. “Records Protection in the Age of EDP.” The Office (October 1968). “Redefinition of Security Sought for EDP Sales to East Europe.” Electronic News, January 24, 1966. Scoma, Louis, Jr. “Protecting Your EDP.” The Office (September 1971): 53-4. Scoma, Louis, Jr. “Security in the Computer Complex.” Computers and Automation (November 1970): 10.

97 “Security in Data Processing.” Data Processor (February 1973): 12-4. “Security of the Computer Center.” EDP Analyzer (December 1971): 1-13. “Security Protection for EDP Files Seen Crucial.” Computerworld (August 26, 1970): S-6. Smith, Troy J. “Internal Auditing of Controls for Data Processing Department.” The Internal Auditor (May 1968): 44-50. Smith, Troy J. “Internal Controls for Data Processing.” Computers and Automation (November 1969). Tudor, Garry A. “Protection of Data Information and Data Processing Resources, Part 3.” The EDP Auditor (Fall 1976): 18-23. United States. Department of Commerce. National Bureau of Standards. Guidelines for Automatic Data Processing Physical Security and Risk Management. Washington, DC: GPO.

Management

Pollard, Sidney. The Genesis of Modern Management. London: Arnold, 1965. Sanford, Donn W. Data Processing Management Association Statement on Privacy and Security in Computer Systems. March 5, 1974. In NBS# 74119006. Box 614, Folder 6. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN.

Direct Mail

Ballard, David P. “Privacy and Direct Mail Advertising.” Fordham Law Review 47 (1979): 495-526. Morton, Thomas J. “Firms Sue in Mailing List Theft.” Computerworld (July 8, 1970): 1. Rule, James B. “My Mailbox is Mine.” Wall Street Journal, August 15, 1990, p. A8.

Mental Health

Bank, Rheta R. and Eugene M. Laska. “Protecting Privacy and Confidentiality in a Multiple Use, Multiple User Mental Health Information System.” Evaluation and Program Planning 1 (1978): 141-58. Baran, Paul. “Remarks on the Question of Privacy Raised by the Automation of Mental Health Records.” P-3523. Santa Monica, CA: The Rand Corporation, April 1967. Gobert, J.J. “Accommodating Patient Rights and Computerized Mental Health Systems.” North Carolina Law Review 54 (January 1976): 153-87. Noll, John O. and Mark J. Hanlon. “Patient Privacy and Confidentiality at Mental Health Centers.” American Journal of Psychiatry 133 (1976): 1286-9. Lanman, R.B. “The Federal Confidentiality Protections for Alcohol and Drug Abuse Patient Records: A Model for Mental Health and Other Medical Records?” American Journal of Orthopsychiatry 50 (1980): 666-77. Laska, Eugene M. and Rheta Banks, eds. Safeguarding Psychiatric Privacy: Computer Systems and Their Uses. New York: John Wiley and Sons, 1975.

Warren and Brandeis

Barron, James H. “Warren and Brandeis, The Right to Privacy: Demystifying a Landmark Citation.” Suffolk University Law Review 13 (1979): 875-922. Bloustein, Edward J. “Privacy, Tort Law, and the Constitution: Is Warren and

98 Brandeis’ Tort Petty and Unconstitutional As Well?” Texas Law Review 46 (April 1968): 611-750. Pratt, Walter F. “The Warren and Brandeis Argument for a Right to Privacy.” Public Law (1975): 161-79. Turkington, Richard C. “Legacy of the Warren and Brandeis Article: The Emerging Unencumbered Right to Informational Privacy.” Northern Illinois University Law Review 10 (1990): 479-520. Warren, Samuel D. and Louis D. Brandeis. “The Right to Privacy.” Harvard Law Review 4 (1890): 193-220. Zimmerman, D.L. “Requiem for a Heavyweight: A Farewell to Warren and Brandeis’s Privacy Tort.” Cornell Law Review 68 (March 1983): 291-367.

Puerto Rico

Basora, Federico L. “Surveillance, Data Banks, and Privacy: A Constitutional Impact Statement.” Revista Juridica de La Universidad de Puerto Rico 44 (1975): 113-42.

Supreme Court

Beaney, William M. “The Constitutional Right to Privacy in the Supreme Court.” The Supreme Court Review 212 (1962): 212-51. Charns, Alexander. Cloak and Gavel: FBI Wiretaps, Bugs, Informers, and the Supreme Court. Urbana: University of Illinois Press, 1992. Coffee, Melvin A. “Supreme Court’s Couch Decision Signals New Directions in Guarding Client’s Records.” The Journal of Taxation 38 (1973): 258-61.

Griswold

Beaney, William M. “The Griswold Case and the Expanding Right to Privacy.” Wisconsin Law Review (1966): 979-95.

Privacy and Pharmaceutical Research

Belair, Robert R. “Drug Use Research: Privacy Pitfalls.” Food Drug Cosmetic Law Journal (January 1980): 235-40. O’Harrow, Robert, Jr. “Prescription Sales, Privacy Fears: CVS, Giant Share Customer Records with Drug Marketing Firm.” The Washington Post, February 15, 1998, p. A1.

Collaboration

Bellotti, Victoria. “What You Don’t Know Can Hurt You: Privacy in Collaborative Computing.” In People and Computers, vol. 12. Springer-Verlag, 1996.

Global (International) Policy and Standards

* Bennett, Colin John. “Convergence Revisited: Toward a Global Policy for the Protection of Personal Data?” In Technology and Privacy: The New Landscape, eds. Philip E. Agre and Marc Rotenberg, 99-123. Cambridge, MA: MIT Press, 1997. Bennett, Colin John. “Difference Processes, One Result: The Convergence of Data Protection Policy in Europe and the United States.” Governance 1 (1988): 415-41. Bennett, Colin John. “Privacy Standards: An Innovation in National and International Policy.” Privacy Laws and Business Newsletter 36 (September 1996): 8-10. Bennett, Colin John. “The Public Surveillance of Personal Data: A Cross-National

99 Analysis.” In Computers, Surveillance, and Privacy, eds. David Lyon and Elia Zureik. Minneapolis: University of Minnesota Press, 1996. Bennett, Colin John. Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Ithaca, NY: Cornell University Press, 1992. Bennett, Colin John. “Regulating the Computer: A Comparative Study of Personal Data Protection Policy.” Ph.D. diss., University of Illinois at Urbana-Champaign, 1986. Bennett, Colin John. “Regulating the Computer: Comparing Policy Instruments in Europe and the United States.” European Journal of Political Research 16 (1988): 437-66. Bennett, Colin John. “Understanding Ripple Effects: The Cross-National Adoption of Policy Instruments for Bureaucratic Accountability.” Governance 10 (1997): 213-34. Bennett, Colin John and Charles D. Raab. “The Adequacy of Privacy: The European Union Data Protection Directive and the North American Response.” The Information Society 13 (1997). Feng, Patrick. “Designing a ‘Global’ Privacy Standard: Politics and Expertise in Technical Standards-Setting.” Ph.D. diss, Rensselaer Polytechnic Institute, 2002. Regan, Priscilla M. “The Globalization of Privacy: Implications of Recent Changes in Europe.” American Journal of Economics and Sociology 52 (1994): 257-74. Reidenberg, Joel R. “The Globalization of Privacy Solutions: The Movement Towards Obligatory Standards for Fair Information Practices.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 217-28. Toronto, Canada: University of Toronto Press, 1999. Reidenberg, Joel R. “Rules of the Road for Global Electronic Highways: Merging the Trade and Technical Paradigms.” Harvard Journal of Law and Technology 6 (1993): 287-305.

Echelon

Campbell, Duncan. “Global Surveillance: The Evidence for Echelon.” In Proceedings of the Tenth Conference on Computers, Freedom, and Privacy, 149-54. New York: Association of Computing Machinery, 2000.

Health Care and Records

Aldrich, Robert F. New Approaches: A Report on the Conference on the Emerging Revolution in Health Records Policy. Washington, DC: The National Commission on Confidentiality of Health Records, June 1979. Betts, Mitch. “Privacy Key to Public Trust in Health Care Reform.” Computerworld (November 22, 1993): 63. Bruce, Jo Anne Czecowski. Privacy and Confidentiality of Health Care Information. 2nd ed. Chicago, IL: American Hospital Publishers, 1988. Carey, J. “The Role of Physical Security in the Information Security World.” Journal of Healthcare Protection Management 19 (Summer 2003): 1-13. Cavoukian, Ann. “The Promise of Privacy-Enhancing Technologies: Applications in Health Information Networks.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 116-28. Toronto, Canada: University of Toronto Press, 1999. Chapman, Audrey R., ed. Health Care and Information Ethics: Protecting Fundamental Human Rights. Kansas City, MO: Sheed and Ward, 1997. Clayton, Paul D. “Improving the Privacy and Security of Electronic Health Information.” Academic Medicine 72 (June 1997): 522-3. “Computer Maintained Health Records Offer More Privacy than Manual Files.”

100 Minicomputer News 3 (February 1977): 2. Culpepper, Thomas C. “Tackling the Privacy Requirements: A Standard Exists for Administering Security Policies.” Healthcare Informatics 19 (January 2002): 88-90. Curran, William J., et al. “Privacy, Confidentiality, and Other Legal Considerations in the Establishment of a Centralized Health-Data System.” New England Journal of Medicine 281 (July 31, 1969): 241-8. Dennis, Jill Callahan. Privacy and Confidentiality of Health Information. AHA Press/Jossey-Bass Publication, 2000. Duncan, Karen. Information Technology and Health Care: The Critical Issues. Arlington, VA: AFIPS Press, 1980. For the Record: Protecting Electronic Health Information. Washington, DC: National Academy Press, 1997. Gellman, Robert M. “Personal, Legislative, and Technical Privacy Choices: The Case of Health Privacy Reform in the United States.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 129-45. Toronto, Canada: University of Toronto Press, 1999. Gellman, Robert M. “Prescribing Privacy: The Uncertain Role of the Physician in the Protection of Patient Privacy.” North Carolina Law Review 62 (January 1984): 255- 94. Griesser, G.G. “Data Security and Data Protection in Health Information Systems.” In Information Systems for Health Services, ed. G. McLachlan, 57-67. Copenhagen, Denmark: World Health Organization, Regional Office for Europe, 1980. Griesser, G.G., ed. “Realization of Data Protection in Health Information Systems.” In Proceedings of the IFIP-WG 4.2 Working Conference on Realization of Data Protection in Health Information Systems. Amsterdam, The Netherlands: North- Holland Publishing, 1980. Griesser, G.G., et al., eds. Data Protection in Health Information Systems: Where Do We Stand? Amsterdam, The Netherlands: Elsevier Science Publishers, 1983. “Health-Care Plan on Computer Disks Spreading ‘Virus’?” Editor & Publisher 126 (November 6, 1993): 13. Health Security Act, 103rd Cong., 2nd Session, August 12, 1994. House Rept 103- 601 Part 5. Hiller, Marc D. and V. Beyda. “Computers, Health Records, and the Right to Privacy.” Journal of Health Politics, Policy, and the Law 6 (1981): 463-87. Institute of Medicine. The Computer-Based Patient Record: An Essential Technology for Health Care. Washington, DC: National Academy Press, 1991. Institute of Medicine. Health Data in the Information Age: Use Disclosure and Privacy. Washington, DC: National Academy Press, 1994. Kurtz, G. “EMR Confidentiality and Information Security.” Journal of Healthcare Information Management 17 (Summer 2003): 41-48. Marietti, C. “HIPAA: Blueprint for Privacy and Security; Bringing Information Protection Up to Code Will Require a New Way of Doing Things.” Healthcare Informatics 19 (January 2002): 55-60. McWay, Dana C. Legal Aspects of Health Information Management. Delmar, 1997. National Research Council. The Computerized Patient Record: An Essential Technology for Health Care. Washington, DC: National Academy Press, 1991. National Research Council. For the Record: Protecting Electronic Health Information. Washington, DC: National Academy Press, 1997. Ontario. Commission of Inquiry into the Confidentiality of Health Information. Report of the Commission of Inquiry into the Confidentiality of Health Information. 3 vols. Toronto, Canada: J.C. Thatcher, Queen’s Printer of Ontario, 1980. Pelletier, A., et al. “Strategies for Complying with the HIPAA Security Rule.” Journal of Healthcare Information Management 17 (Summer 2003): 49-53.

101 Perron, Margaret. Judicial Decisions in Health Records Confidentiality. Washington, DC: National Commission on Confidentiality of Health Records, September 1979. Proctor, P.E., et al. “Rightsizing HIPAA Security Compliance for Smaller Organizations.” Journal of Healthcare Information Management 17 (Summer 2003): 34-40. Raab, Selwyn. “New Jersey Officials Say Mafia Infiltrated Health-Care Industry,” New York Times, 21 August 21, 1996, p. A1. Schuchman, Herman, et al. Confidentiality of Health Records: The Meeting of Law, Ethics, and Clinical Issues. New York: Gardner Press, Inc., 1982. Schwartz, Paul M. “Privacy and the Economics of Personal Health Care Information.” Texas Law Review 76 (1997): 1-75. Schwartz, Paul M. “The Protection of Privacy in Health Care Reform.” Vanderbilt Law Review 48 (1995): 295-347. Spingarn, Natalie Davis. Confidentiality: Report of the Conference on Confidentiality of Health Records, Key Biscayne, Florida, November 6-9, 1974. Washington, DC: American Psychiatric Association, 1975. United States. Congress. Office of Technology Assessment. Bringing Health Care Online: The Role of Information Technologies. Washington, DC: GPO, 1995. United States. Department of Health, Education, and Welfare. Records, Computers, and the Rights of Citizens. Washington DC: GPO, July 1973. Ware, Willis H. “Legislative Issues Surrounding the Confidentiality of Health Records.” P-5355. Santa Monica, CA: The Rand Corporation, 1975. Ware, Willis H., ed. Records, Computers, and the Rights of Citizens: Report of the Secretary’s Advisory Committee on Automated Data Systems. DHEW Publication No. (OS) 73-94. Washington, DC: U.S. Department of Health, Education, and Welfare, July 1973. Watson, Bruce L. “Disclosure of Computerized Health Care Information: Provider Privacy Rights Under Supply Side Competition.” American Journal of Law & Medicine 7 (Fall 1981): 265-300. Way, George T.C. “The Issue of Privacy and Confidentiality in Computerization of All Hospital Discharges in New York State.” In Information Technology and Health Care: The Critical Issues, ed. Karen Duncan, 63-70. Arlington, VA: American Federation of Information Processing Societies Inc., 1980. Westin, Alan F. Computers, Health Records, and Citizen’s Rights. New York: Petrocelli Books, 1977. Wolowitz, David. Confidential Communications to Health Care Providers: The Health Care Privilege in New Hampshire. Manchester, NH: McLane, Graf, Raulerson, and Middleton, 1995.

Federal Bureau of Investigation

Burnham, David. “FBI Says 12,000 Reports on Suspects are Issues Each Day.” New York Times, August 25, 1985. Burnham, David. “How Long Should the Arm of the Law Be?” The New York Times Magazine (December 12, 1982): 120-1. “FBI Accuses Youth of Tapping T/S Service, Copying Data Files.” Computerworld (July 29, 1970): 1. Fiatal, R.A. “Minimization Requirements in Electronic Surveillance.” FBI Law Enforcement Bulletin 56 (May 1987): 25-30. Fiatal, R.A. “Minimization Requirements in Electronic Surveillance.” FBI Law Enforcement Bulletin 56 (June 1987): 21-30. Foerstal, Herbert. Surveillance in the Stacks: The FBI’s Library Awareness Program. New York: Greenwood Press, 1991.

102 Guerra, John L. “Carnivore: FBI’s Packet Sniffer May Have Loose Fangs.” Billing World and OSS Today (April 2002). Johnson, D. “Documents Disclose FBI Investigations of Some Librarians.” New York Times, November 7, 1989, p. A1. Kenney, Michael. “Sargent Told FBI Data System Will Include Rights Safeguards.” Boston Globe, July 13, 1973, p. 5. Miller, John and Michael Stone. The Cell: Inside the 9/11 Plot, and Why the FBI and CIA Failed to Stop It. New York: Hyperion, 2002. Morton, Thomas J. “FBI Accusses Youth of Tapping T/S Service, Copying Data Files.” Computerworld (July 19, 1970). Nelson, Jaleen. “Sledge Hammers and Scalpels: The FBI Wiretap Bill and Its Effect on Free Flow of Information and Privacy.” UCLA Law Review 41 (1994): 1139-42. Simpson, Glenn R. “Big Brother-in-Law: If the FBI Hopes to Get the Goods on You, It May Ask ChoicePoint.” Wall Street Journal, April 13, 2001, p. A1. United States. National Commission for the Review of Federal and State Laws Relating to Wiretapping and Federal Surveillance. Electronic Surveillance: Report of the National Commission for the Review of Federal and State Laws Relating to Wiretapping and Electronic Surveillance. Washington, DC: GPO, 1976. Wilson, Mark. “Surveillance of Individual Reading Habits: Constitutional Limitations on Disclosure of Library Borrower Reading Lists.” American University Law Review 30 (Fall 1980): 275-321.

Nursing

Malloy, N.P. “The Informatics Nurse Specialist as Privacy Officer.” Journal of Healthcare Information Management 17 (Summer 2003): 54-58. Romano, Carol Ann. Computer Technology: Applications and Implications for Clinical Nursing Practice. Videorecording. Pittsburgh, PA: ECI/AREN, 1989.

Research and Confidentiality

Ackeroyd, Anne. “Ethnography, Personal Data, and Computers.” In Conducting Qualitative Research, ed. R.G. Burgess. JAI Press, 1988. Astin, Alexander W. and Robert F. Boruch. “A ‘Link’ File System for Assuring Confidentiality of Research Data in Longitudinal Studies.” American Educational Research Journal 7 (1970): 615-24. Boruch, Robert F. “Educational Research and the Confidentiality of Data.” ACE Research Reports 4 (1969). Boruch, Robert F. “Maintaining Confidentiality of Data in Educational Research: A Systematic Analysis.” American Psychologist 26 (May 1971): 413-30. Boruch, Robert F. “Security of Information Processing: Implications from Social Research.” In Proceedings of the Fall Joint Computer Conference, vol. 41, 425-33. Montvale, NJ: AFIPS Press, 1972. Boruch, Robert F. “Strategies for Eliciting and Merging Confidential Social Research Data.” Policy Sciences (September 1972): 375-97. Boruch, Robert F. and Joe S. Cecil. Assuring the Confidentiality of Social Research Data. Philadelphia: University of Pennsylvania Press, 1979.

103 CERL. “Courtesy and Security for Students on the PLATO System.” Unpublished paper, 1987. In University of Illinois at Urbana-Champaign. Computer-based Education Research Laboratory. Reports and Documents in the Archives of the Computer-based Education Research Laboratory (CERL), 1958-1993. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Clark, Cynthia Z.F. and Jerry L. Coffey. “How Many People Can Keep a Secret? Data Interchange Within a Decentralized System.” In Proceedings of the Section on Survey Research Methods (American Statistical Association), 1-6. Washington, DC: American Statistical Association, 1983. Fraser, A. “Privacy and the Secondary Use of Data in Health Research in Scotland.” Journal of Health Services Research and Policy 8 (July 2003): supplement S1, 12-16. Gold, Ellen B. “Confidentiality and Privacy Protection in Epidemiologic Research.” In Ethics and Epidemiology, eds. Steven S. Coughlin and Tom L. Beauchamp, 128-41. New York: Oxford University Press, 1996. Iezzoni, Lisa I. “Ethical Considerations in Conducting Health-Care Research: Protecting Privacy.” In Ethical Dimensions of Health Policy, 355-78. New York: Oxford University Press, 2002. Kelman, Herbert. “Privacy and Research with Human Beings.” Journal of Social Issues 33 (1977): 169-95. Lako, C.J. “Privacy Protection and Population-Based Health Research.” Social Science and Medicine 23 (1986): 293-5. Linowes, David F. and Michele M. Hoyman. “Data Confidentiality, Social Research, and the Government.” Library Trends 30 (Winter 1982): 489-503. Martin, M.E. “Statisticians, Confidentiality, and Privacy.” American Journal of Public Health 67 (1977): 165-7. Mochmann, Ekkehard and Paul J. Müller, eds. Data Protection and Social Science Research: Perspectives from Ten Countries. Frankfurt, Germany: Campus Verlag, 1979. Mugge, Robert H. “Issues in Protecting Confidentiality in National Health Statistics.” In Proceedings of the Section on Survey Research Methods, 13-5. Washington, DC: American Statistical Association, 1983. National Research Council. Social Social Research Council. Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics. Washington, DC: National Academy Press, 1993. National Research Council. Privacy and Confidentiality as Factors in Survey Response. Washington, DC: National Academy of Sciences, 1979. Nehls, G.J., et al. “Confidentiality and Freedom of Information for Epidemiological Data in Governmental Research.” Environmental Research 25 (1981): 160-6. Oyen, O. “Social Research and the Protection of Privacy: A Review of the Norwegian Development.” Acta Sociologica 19 (1976): 249-62. Peterson, J. “Promises, Compromises, and Commitments: The Protection of Confidential Research Data.” The American Behavioral Scientist 27 (March-April 1984): 453-80. Raab, Charles D., ed. Data Protection and Privacy: Proceedings of a Conference. London, UK: Social Research Association, March 1982. Radner, Daniel B. “Inter-Agency Data Matching Projects for Research Purposes.” Social Security Bulletin (July 1988): 22, 56-7. Sasfy, Joseph H. and Lawrence G. Siegel. A Study of Research Access to Confidential Criminal Justice Agency Data. McLean, VA: Mitre Corp., March 1982. Shapiro, S. “Privacy, Research, and the Health of the Public.” American Journal of Public Health 66 (1976): 1050-1. Simitis, Spiros. “Data Protection and Research: A Case Study of Control.” American

104 Journal of Comparative Law 29 (Fall 1981): 583-606. Wolfle, D. “Use of Human Subjects.” Science 159 (February 23, 1968): 831.

Foreign Intelligence Surveillance Act

Cinquegrana, Amerigo. “The Walls (and Wires) Have Ears: The Background and First Ten Years of the Foreign Intelligence Surveillance Act of 1978.” University of Pennsylvania Law Review 137 (1989): 814-5.

National Security

Benson, Robert Louis and Michael Warner, eds. Venona: Soviet Espionage and the American Response, 1939-1957. Washington, DC: National Security Agency and Central Intelligence Agency, 1996. Berkowitz, Bruce D. “Technology and Intelligence Reform.” Orbis (Winter 1996-7): 107-19. * Berkowitz, Bruce D. and Allan E. Goodman. Best Truth: Intelligence in the Information Age. New Haven, CT: Yale University Press, 2000. Berkowitz, Bruce D. and Allan E. Goodman. Strategic Intelligence for American National Security. Princeton, NJ: Princeton University Press, 1989. Farrell, Peter T. A National Security Strategy for Information Assurance. Carlisle Barracks, PA: AWC, 1997. Halperin, Morton H. and Daniel Hoffman. Freedom vs. National Security: Secrecy and Surveillance. New York: Chelsea House Publishers, 1977. Judy, Richard W. “Technology and Soviet National Security.” In Soviet National Security Policy Under Perestroika, ed. George E. Hudson, 109-29. Boston, MA: Unwin Hyman, 1990. Kennedy, K.J., et al. Grand Strategy for Information Age National Security. Carlisle Barracks, PA: AWC, May 12, 1996. Malloy, P.S. “Controls on the Export of Militarily Sensitive Technology: National Security Imperative or U.S. Industry Impediment?” Rutgers Computer & Technology Law Journal 18 (1992): 841-78. Ross, Mitchell S. National Information Systems: The Archilles Heel of National Security. Carlisle Barracks, PA: AWC, 1997. Schwartzstein, Stuart J.D., ed. The Information Revolution and National Security: Dimensions and Directions. Washington, DC: Center for Strategic and International Studies, 1996.

Satellites

Eisenbeis, Kathleen M. Privatizing Government Information: The Effects of Policy on Access to Landsat Satellite Data. Metuchen, NJ: Scarecrow Press, 1995. Florini, Anne M. “The Opening Skies: Third-Party Imaging Satellites and U.S. Security.” International Security (Fall 1988): 91-123. Hult, J.L. “Satellites and Technology for Communications: Shaping the Future.” P- 3760. Santa Monica, CA: The Rand Corporation, January 1968. Leugers, Jerry and Christopher Williams. “Satellite Comunications: Opening the Gateway to C4I.” Surface Warfare (July-August 1995): 1617. Richelson, Jeffrey T. America’s Secret Eyes in Space: The U.S. Keyhole Spy Satellite Program. New York: Harper & Row, 1990. Wheelon, Albert D. “CORONA: The First Reconnaissance Satellites.” Physics Today (February 1997): 24-30. Wheelon, Albert D. “Lifting the Veil on CORONA.” Space Policy (November 1995):

105 249-60.

CCTV

Norris, Clive and Gary Armstrong. “CCTV and the Social Structure of Surveillance.” Crime Prevention Studies 10 (): 157-78. Norris, Clive and Gary Armstrong. The Maximum Surveillance Society: The Rise of CCTV. New York: Berg, 1999. Norris, Clive, et al., eds. Surveillance, Closed Circuit Television, and Social Control. Aldershot, UK: Ashgate, 1998. Norton, Kelly. “Cashing in on CCTV Technology.” Security Management (March 1, 1992). O’Brien, Jim. “CCTV Watches the World Go By.” Security Management (June 1, 1992). Peterson, Molly M. “Video Surveillance Network Raises Questions on Civil Liberties.” National Journal’s Technology Daily (May 22, 2002). Robb, Gary C. “Police Use of CCTV Surveillance: Constitutional Implications and Proposed Regulations.” University of Michigan Journal of Law Reform 13 (1979-80): 571-602. “Video Vigilantes.” Newsweek (July 22, 1991): 42-7.

Passports

Torpey, John. The Invention of the Passport: Surveillance, Citizenship, and the State. Cambridge, MA: Cambridge University Press, 2000.

Airport Security

Cushman, John H. “Airlines Seek EZ Pass for Fast Security Check.” New York Times, January 13, 2002, section 5, p. 3. Hahn, Robert. “The Economics of Airline Safety and Security.” Harvard Journal of Law and Public Policy 20 (1997): 791-809. Maney, Kevin. “The Naked Truth About a Possible Airport Screening Device.” USA Today, August 7, 2002, p. 3B. O’Harrow, Robert, Jr. “Air Security Network Advances: Lockheed to Develop Surveillance System to Check Travelers’ Backgrounds.” Washington Post, March 1, 2003.

Privacy and Community

Boone, C.K. “Privacy and Community.” Social Theory and Practice 9 (Spring 1983): 1-30. Chermayeff, S. and C. Alexander. Community and Privacy: Towards a New Architecture of Humanism. New York: Anchor Books, 1965. Etzioni, Amitai. Spirit of Community: Rights, Responsibilities, and the Communitarian Agenda. New York: Simon and Schuster, 1993. Fagin, Barry. “Liberty and Community Online.” In Cyberethics: Social & Moral Issues in the Computer Age, eds. Robert M. Baird, et al., 332-52. Amherst, NY: Prometheus Books, 2000. Rovere, Michael V. “The Invasion of Privacy: Technology and the Claims of Community.” American Scholar 27 (1958): 413. Strong, Tracy B. “The Practical Unity of Community and Privacy.” Humanitas 11 (1975): 85-97.

106

Surveillance, Society, and Privacy

Agre, Philip E. “Surveillance and Capture: Two Models of Privacy.” The Information Society 10 (April-June 1994): 101-27. Armer, Paul. “Computer Technology and Surveillance.” Computers and People (September 1975): 8-11. Arnold, S. Richard. “Electronic Visual Surveillance and the Right of Privacy: When is Electronic Observation Reasonable?” Washington and Lee Law Review 35 (1978): 1048-63. Askin, Frank. “Surveillance: The Social Science Perspective.” Columbia Human Rights Law Review 4 (Winter 1972): 62-88. Athan, Theo Harris. Spying on Americans: Political Surveillance from Hoover to the Huston Plan. Philadelphia: Temple University Press, 1978. Balint, Kathryn. “Looking After You: Technology Takes Surveillance to a New Level.” San Diego Union-Tribune, November 5, 2000. Blakey, G.R. and J.A. Hancock. “Proposed Electronic Surveillance Control Act.” Notre Dame Lawyer 43 (June 1968): 657. Bogard, William. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge, UK: Cambridge University Press, 1996. Buckley, R. “Under Surveillance.” Information Age (January 2001): 22-26. Burnham, David. “Surveillance.” In The Rise of the Computer State. New York: Random House, 1980. Campbell, Duncan and Steve Connor. On the Record: Surveillance, Computers, and Privacy—The Inside Story. London: Michael Joseph Ltd, 1986. Campbell, Kim. “Stand Still Too Long and You’ll Be Watched.” Christian Science Monitor, November 7, 2002, p. 17. Carey, Jack. “ACLU Decries Super Bowl Surveillance.” USA Today, February 2, 2001, p. 1C. Columbia Human Rights Law Review, ed. Surveillance, Dataveillance, and Personal Freedoms: Use and Abuse of Information Technology. Fairlawn, NJ, 1973. Corcoran, Elizabeth and John Mintz. “Administration Steps Back on Computer Surveillance.” Washington Post, July 21, 1994, p. A1, A10. Dandeker, Christopher. Surveillance, Power, and Modernity: Bureaucracy and Discipline from 1700 to the Present Day. New York: St. Martin’s Press, 1990. Davies, Simon G. Big Brother: Britain’s Web of Surveillance and the New Technological Order. London: Pan Books, 1996. DeBose, Brian. “Millions Spent to Develop Cameras; Budgets on Rise for Surveillance.” Washington Times, April 17, 2002. Donner, Frank J. The Age of Surveillance: The Aims and Methods of America’s Political Intelligence System. New York: Random House, 1981. Dubro, Alec. “Surveillance.” Mother Jones 9 (December 1984): 21-3. Dutton, William H. and R.G. Meadow. “A Tolerance for Surveillance: American Public Opinion Concerning Privacy and Civil Liberties.” In Government Infrastructures, ed. K.B. Levitan. New York: Greenwood Press, 1986. * Flaherty, David H. “Controlling Surveillance: Can Privacy Protection Be Made Effective?” In Technology and Privacy: The New Landscape, eds. Philip E. Agre and Marc Rotenberg, 167-91. Cambridge, MA: MIT Press, 1997. Flaherty, David H. “The Emergence of Surveillance Societies in the Western World: Toward the Year 2000.” Government Information Quarterly 5 (1988): 377-87. Flaherty, David H. Final Report of the Bellagio Conference on Current and Future Problems of Data Protection: Nineteen Eighty-Four and After. London, Ontario, Canada: The Privacy Project, University of Western Ontario, May 15, 1984.

107 Flaherty, David H. “Governmental Surveillance and Bureaucratic Accountability: Data Protection Agencies in Western Societies.” Science, Technology, and Human Values 11 (Winter 1986): 7-18. Flaherty, David H. “Limiting Governmental Surveillance and Promoting Bureaucratic Accountability.” Science, Technology & Human Values 11 (1986): 7-18. Frankel, Bruce. “New Sides to Old Debate on Surveillance.” USA Today, April 25, 1995, p. A1. Gilliom, John. Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy. Chicago, IL: University of Chicago Press, 2001. Gumpert, Gary and Susan J. Drucker. “Public Boundaries: Privacy and Surveillance in a Technological World.” Communication Quarterly 49 (2001): 115-21. Halbfinger, David M. “Spread of Surveillance Cameras Raises Prospect of Prying Eyes.” New York Times, February 22, 1998. Halloran, Richard. “Inquiry on Surveillance Hears State Aide.” New York Times, March 11, 1971, p. 26. Harrison, Keely. “The Naked Ape: Electronic Surveillance of Consumer’s Choices.” Super Marketing, March 24, 1995. Jessop, Bob. “Capitalism, Nation-States, and Surveillance.” In Social Theory of Modern Societies: Anthony Giddens and His Critics, eds. D. Held and J.B. Thompson. New York: Cambridge University Press, 1989. Keyes, Wayne L. “Electronic Surveillance.” Howard Law Journal (1980): 184-96. Lapin, Lee. How to Get Anything on Anybody: The Encyclopedia of Personal Surveillance. Paladin Press, 1991. LeMond, Alan and Ron Fry. No Place to Hide: A Guide to Bugs, Wiretaps, Surveillance, and Other Privacy Invasions. New York: St. Martin’s Press, 1975. * Lyon, David. The Electronic Eye: The Rise of Surveillance Society. Minneapolis: University of Minnesota Press, 1994. Lyon, David. “The New Surveillance? Electronic Technologies and the Maximum Surveillance Society.” Crime, Law, and Social Change 17 (1992): 159-72. Lyon, David. “Surveillance Societies, Privacy, and Social Control: Trends and Counter-Trends.” Artificial Intelligence and Society (1992). Lyon, David, ed. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. New York: Routledge, 2002. Lyon, David and Elia Zureik, eds. Computers, Surveillance, and Privacy. University of Minnesota Press, 1996. Markoff, John. “A Push for Surveillance Software.” New York Times, February 28, 1994, p. D1. Marx, Gary T. “I’ll Be Watching You: Reflections on the New Surveillance.” Dissent 32 (Winter 1985): 26-34. Marx, Gary T. “The New Surveillance.” Technology Review 88 (May-June 1985): 42- 8. Marx, Gary T. “The Surveillance Society: The Threat of 1984-Style Techniques.” The Futurist (June 1985): 21-6. Neumann, Peter G. “Risks of Surveillance: Surveillance of Computer and Communications.” Communications of the ACM (August 1993): 122. Nock, Steven L. The Costs of Privacy: Surveillance and Reputation in America. New York: Aldine de Gruyter, 1993. * Parenti, Christian. The Soft Cage: Surveillance in America from Slavery to the War on Terror. New York: Basic Books, 2003. “Proposal for Legislative Control of Electronic Surveillance.” Indiana Law Journal 43 (Fall 1967): 130. Rodota, S. Privacy and Data Surveillance: Social Contract in the Computer Age. New York: Shocken Books, 1974.

108 Rosen, Jeffrey. “A Cautionary Tale for a New Age of Surveillance.” New York Times Magazine, October 7, 2001. Rule, James B. Private Lives and Public Surveillance: Social Control in the Computer Age. New York: Schocken Books, 1974. Rule, James B., et al. “Documentary Identification and Mass Surveillance in the United States.” Social Problems 31 (1983): 222-34. Samarajiva, Rohan. “Surveillance by Design: Public Networks and the Control of Consumption.” In Communication by Design, ed. R. Mansell and R. Silverstone. Oxford University Press, 1996. Sankar, Pamela. “State Power and Record-Keeping: The History of Individualized Surveillance in the United States, 1790-1935.” Ph.D. diss., University of Pennsylvania, 1992. Savage, Marcia and Amanda Stirpe. “Under Surveillance: Location-Based Wireless Technology Raises Privacy Concerns for Solution Providers.” Computer Reseller News 104 (July 2001). Staples, William G.. The Culture of Surveillance: Discipline and Social Control in the United States. New York: St. Martin’s Press, 1997. Surveillance, Data Surveillance, and Personal Freedoms. Fair Lawn, NJ: R.E. Burdicks Inc., 1973. United States. Congress. Office of Technology Assessment. Electronic Surveillance and Civil Liberties. OTA-CIT-293. Gaithersburg, MD: GPO, 1986. United States. Library of Congress. Congressional Research Service. Privacy and Surveillance Technology in a Democracy. Washington, DC: Library of Congress Research Service, 1978. Van Tassel, Dennis. “Daily Surveillance Sheet, 1987, from a Nationwide Data Bank.” Computers and People (August 1975): 31-2. Weber, S.J. “Habeas Data: The Right of Privacy Versus Computer Surveillance.” University of San Francisco Law Reports 5 (1971): 358-77. Westin, Alan F. “Science, Privacy and Freedom: Issues and Proposals for the 1970s— Part I, The Current Impact of Surveillance on Privacy.” Columbia Law Review 66 (1966): 1003-50; 1205-1253. Wilson, Kevin Gerard. “The Social Significance of Home Networking: Public Surveillance and Social Management.” Ph.D. diss., McGill University, 1985. Wood, David Murakami, ed. A Report on the Surveillance Society; For the Information Commissioner by the Surveillance Studies Network. September 2006.

Videotex

Booth, P.J., ed. Privacy in Videotex. Vancouver, Canada: Group West, 1981. “Videotex: A Welcome New Technology or an Orwellian Threat to Privacy?” Cardozo Arts and Entertainment Law Journal 2 (1983): 287-312.

Auditing

Bonyun, David. The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security. Ottawa, Ontario, Canada: I.P. Sharp Associates Limited, 1981. Camp, L. Jean and J.D. Tygar. “Providing Auditing While Protecting Privacy.” The Information Society 10 (1994): 59-71. Jancure, E. and A. Berger, eds. Computers, Auditing, and Control. Philadelphia: Auerbach Publishing Company, 1973. Krauss, Leonard I. SAFE: Security Audit and Field Evaluation for Computer Facilities and Information Systems. East Brunswick, NJ: Firebrand, Krauss, and Company,

109 1972. Kuong, Javier F. Computer Security, Auditing, and Controls: Text and Readings. Wellesley Hills, MA: Management Advisory Publications, 1973. Minsky, Naftaly H. “Towards Continuously Auditable Systems.” IICIS (1997): 23-41. Shelton, L.B. and E.W. Reid. “Unauthorized Intervention in Computer Processing.” Internal Auditor (July 1969): 59. “System Protection Depends on Well-Educated Auditor.” Computerworld (March 28, 1973): 8.

Human Rights

Bygrave, Lee A. “Data Protection Pursuant to the Right to Privacy in Human Rights Treaties.” International Journal of Law and Information Technology 6 (1997): 247- 84. Hixson, Richard F. Privacy in a Public Society: Human Rights in Conflict. New York: Oxford University Press, 1987. Miller, Arthur R. “Computers, Data Banks, and Individual Privacy: An Overview.” Columbia Human Rights Law Review 4 (Winter 1972): 1-265. Miller, Arthur R. “Our Right to Privacy Needs Protection from the Press.” The Human Rights Review 7 (1978): 16-9, 74-8. “Privacy: Who Is Listening In? Special Report on Technology vs. Freedom.” Human Rights 10 (Fall 1982): 17-29. Trubow, George B. “Fighting Off the New Technology.” Human Rights 10 (Fall 1982): 26-9, 54-6. Weingarten, Fred W. “Privacy: A Terminal Idea.” Human Rights 10 (Fall 1982): 18- 21, 54-6.

Council of Europe

Council of Europe. Committee of Experts on Data Protection. The Use of Personal Data in the Social Security Field. Strasbourg: Council of Europe, September 14, 1982. Council of Europe. Explanatory Report on the Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data. Strasbourg: Council of Europe, 1981. Council of Europe. Legislation and Data Protection: Proceedings of the Rome Conference on Problems Relating to the Development and Application of Legislation on Data Protection. Rome: Camera dei Deputati, 1983. Hondius, Frits W. “Data Law in Europe.” Stanford Journal of International Law 16 (Summer 1980): 87-113. Jefferson, M. and P. Thornberry. “European Convention on Data Processing.” Solicitors’ Journal 126 (January 8, 1982): 5-7. Kirsch, William J. “The Protection of Privacy and Transborder Flows of Personal Data: The Work of the Council of Europe, The Organization for Economic Cooperation and Development, and the European Economic Community.” Legal Issues of European Integration 2 (1982): 21-50. “Transborder Data Flow: Problems with the Council of Europe Convention, or Protecting States from Protectionism.” Northwestern Journal of International Law and Business 4 (Autumn 1982): 601-25.

OECD

Kallner, C.G. “Personal Data: The Open Access Approach.” In Policy Issues in Data

110 Protection and Privacy: Concepts and Perspectives, 59-65. Paris, France: OECD, 1976. Kirby, Michael D. “Legal Aspects of Information Technology.” In An Exploration of Legal Issues in Information and Communication Technologies, 10-57. Paris, France: OECD, 1983. Niblett, G. Bryan F. Digital Information and the Privacy Problem. Paris, France: OECD, 1971. Niblett, G. Bryan F. OECD Informatics Studies: Digital Information and the Privacy Problem. No. 2. 1971. NBS# 72355040. Box 578, Folder 11. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Organisation for Economic Cooperation and Development. High Level Conference on Information, Computer, and Communications Policies for the 1980s. Paris, France: OECD, 1980. Organisation for Economic Cooperation and Development. Policy Issues in Data Protection and Privacy: Concepts and Perspectives. Paris, France: OECD, 1976. Ramsey, Thomas J. “Europe Responds to the Challenge of the New Information Technologies: A Teleinformatics Strategy for the 1980s.” Cornell International Law Journal 14 (1981): 237-85. Tenglin, Ulrika. “The Vulnerability of the Computerized Society.” In High Level Conference on Information and Communication Policies for the 80s, 359-77. Paris, France: Organization for Economic Cooperation and Development, 1980.

European Union

Bennett, Colin John and Charles D. Raab. “The Adequacy of Privacy: The European Union Data Protection Directive and the North American Response.” The Information Society 13 (1997). “Falling into the Gap: The European Union’s Data Protection Act and Its Impact on U.S. Law and Commerce.” John Marshall Journal of Computer & Information Law 18 (Summer 2000): 981-1018. Greenleaf, Graham. “The 1995 EU Directive on Data Protection: An Overview.” International Privacy Bulletin 3 (1995): 1-21. Maxeiner, James. “Business Information and ‘Personal Data’: Some Common-Law Observations About the EU Draft Protection Directive.” Iowa Law Review 80 (1995): 619-22. Wuermeling, U.U. “Harmonisation of European Union Privacy Law.” John Marshall Journal of Computer & Information Law 14 (Spring 1996): 411-60.

Japan

Hiramatsu, T. “Privacy Law in Japan.” Transnational Data Report 6 (January-February 1983): 43-4. Horibe, M. “The Information Society and Privacy: Current State of Personal Data Protection in Japan.” Jipdec Informatization Quarterly 115 (1998): 3-61. Srinivasan, Srinija. “Privacy and Data Protection in Japan.” Government Information Quarterly 9 (1992): 121.

Norway

Data Banks and Society. Oslo: Norwegian University Press, 1972. Føyen, Arve. “Experiences with Implementation of the Norwegian Personal Registers Act.” In Legislation and Data Protection: Proceedings of the Rome Conference on

111 Problems Relating to the Development and Application of Legislation on Data Protection, 212-26. Rome: Camera dei Deputati, 1983. Føyen, Arve. “Implementation of the Norwegian Personal Data Registers Act.” Information Privacy 2 (1980): 190-3. Oyen, O. “Social Research and the Protection of Privacy: A Review of the Norwegian Development.” Acta Sociologica 19 (1976): 249-62.

Secrecy

Baran, Paul. On Distributed Communications: IX. Security, Secrecy, and Tamper- Free Considerations. RM-3765-PR. Santa Monica, CA: The Rand Corporation, 1964. Burger, Robert H., ed. “Privacy, Secrecy, and National Information Policy.” Library Trends 35 (Summer 1986): 3-182. Davis, Bob. “A Supersecret Agency Finds Selling Secrecy to Others Isn’t Easy.” Wall Street Journal, March 28, 1988. Galnoor, I., ed. Government Secrecy in Democracies. New York: New York University Press, 1977. Goren, Dina. Secrecy and the Right to Know. Ramat Gan, Israel: Turtledove Publishing, 1979. Halperin, Morton H. and Daniel Hoffman. Freedom vs. National Security: Secrecy and Surveillance. New York: Chelsea House Publishers, 1977. Hoffman, Daniel N. Governmental Secrecy and the Founding Fathers: A Study in Constitutional Controls. Westport, CT: Greenwood Press, 1981. “Machine that Takes Secrecy in Hand.” Business Week (May 10, 1969): 51. Michael, James. The Politics of Secrecy. Middlesex, England: Penguin Books, 1982. Posner, Richard A. “Privacy, Secrecy, and Reputation.” Buffalo Law Review 28 (1979): 1-55. Relyea, Harold C. “Freedom of Information, Privacy, and Official Secrecy: The Evolution of Federal Government Information Policy Concepts.” Social Indicators Research 7 (1980): 137-56. Robertson, Kenneth G. Public Secrets: A Study of the Development of Government Secrecy. New York: St. Martin’s Press, 1982. Rourke, Francis E. Secrecy and Publicity: Dilemmas of Democracy. Baltimore, MD: The Johns Hopkins Press, 1961. Rowat, Donald C., ed. Administrative Secrecy in Developed Countries. London: United Kingdom, The Macmillan Press, 1979. Shannon, Claude E. “Communication Theory of Secrecy Systems.” Bell Systems Technical Journal 28 (October 1949): 656-715. Shils, Edward. The Torment of Secrecy: The Background and Consequences of American Security Policies. Glencoe, IL: Free Press, 1956. Singh, Simon. The Code Book: The Evolution of Secrecy from Mary Queen of Scots to Quantum Cryptography. New York: Doubleday, 1999. Smith, Stephen. “Secrecy and Your Personal Computer.” Personal Computing 2 (August 1978): 75-8. Stevenson, Russell B., Jr. Corporations and Information: Secrecy, Access, and Disclosure. Baltimore, MD: The Johns Hopkins University Press, 1980. Tefft, Stanton K., ed. Secrecy: A Cross-Cultural Perspective. New York: Human Sciences Pres, 1980. Tomkovicz, J.J. “Beyond Secrecy for Secrecy’s Sake: Toward an Expanded Vision of the Fourth Amendment Privacy Province.” Hastings Law Journal 36 (May 1985): 645- 737. United States. Congress. Office of Technology Assessment. Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information. OTA-CIT-310.

112 Washington, DC: GPO, 1987. Wiggins, James Russell. Freedom or Secrecy. New York: Oxford University Press, 1956.

United Kingdom

“Britons Campaign Against Peril of Computers to Private Lives.” New York Times, April 21, 1969, p. ? Bull, Gillian. “Recent Attempts to Achieve a U.K. Information Policy.” Computer/Law Journal 3 (1982): 147-66. Douglas, A.S. “The U.K. Privacy White Paper, 1975.” In Proceedings of the National Computer Conference, vol. 45, 33-38. Montvale, NJ: AFIPS Press, 1976. Howe, Eric. “The United Kingdom’s Data Protection Act.” Government Information Quarterly 8 (1991): 345. Michael, James. “Breach of Confidence.” New Law Journal (1981): 568. Michael, James. “Data Protection.” Public Law (1982): 360-6. Michael, James. “Interests of Third Parties: The Extent to Which Government Should Keep Information Secret for the Sake of Third Parties.” Journal of Media Law and Practice 3 (1982): 133-43. Michael, James. “Official Information Law in the United Kingdom.” Government Publications Review 10 (1983): 61-9. Michael, James. “Open Government and Data Protection.” British Journal of Law and Society 8 (1981): 265-70. Michael, James. “Privacy of Britain’s Computers.” New Statesman 96 (November 3, 1978): 566. Nugter, A.C.M. Transborder Flow of Personal Data within the EC: A Comparative Analysis of the Privacy Statutes of the Federal Republic of Germany, France, the United Kingdom, and the Netherlands. Kluwer, 1990.

Freedom & Freedom of Information

Brin, David. “The Transparent Society.” Wired (December 1996). * Brin, David. The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? Reading, MA: Addison-Wesley, 1998. Brucker, Herbert. Freedom of Information. New York: Macmillan Co., 1949. Cawkell, A.E. “Privacy, Security, and Freedom in the Information Society.” Journal of Information Science 4 (March 1982): 3-8. Christie, George C. “The Right to Privacy and the Freedom to Know: A Comment on Professor Miller’s the Assault on Privacy.” University of Pennsylvania Law Review 119 (1971): 970-91. Cranor, Lorrie Faith. “Ten Years of Computers, Freedom, and Privacy: A Personal Retrospective.” In Proceedings of the Tenth Conference on Computers, Freedom, and Privacy: Challenging the Assumptions, 11-5. New York: ACM Press, 2000. Cyberspace Highways: Access, Ethics, and Control; Proceedings of the 4th Annual Conference on Computers, Freedom, and Privacy. Chicago, 1994. Drosnin, Deborah, ed. Access Reports: Freedom of Information. Washington, DC. Feeley, J. “Freedom of Information: Attitudes, Rights, Laws, and Policy.” The Canadian Journal of Information Science 5 (May 1980): 1-10. Finn, James and Leonard R. Sussman, eds. Today’s American: How Free? New York: Freedom House, 1986. Forkosch, Morris D. “Freedom of Information in the United States.” De Paul Law Review 20 (1970): 1-175. “Freedom of Information Developments Around the World.” Government Publications

113 Review 10 (1983): 1-96. Gelman, Robert B. Protecting Yourself Online: The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace. New York: HarperCollins, 1998. Hoffman, Lance J., ed. Proceedings of the Second Conference on Computers, Freedom, and Privacy. Baltimore: Association of Computing Machinery, 1992. Kadie, Carl M. “Applying Library Intellectual Freedom Principles to Public and Academic Computers.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 569-79. San Diego: Academic Press, 1996. Kennedy, Edward M. “Is the Pendulum Swinging Away from Freedom of Information?” Harvard Civil Rights-Civil Liberties Law Review 16 (1981): 311-7. Lacy, Dan Mabry. Freedom and Communications. Urbana, IL: University of Illinois Press, 1965. Lebowitz, Brian E. “The Freedom of Nonfree Information: An Economic Proposal for Government Disclosure of Privately Submitted Commercial Information.” Stanford Law Review 32 (January 1980): 339-72. Lloyd, Ian J. “Data Processing and Individual Freedom: Data Protection and Beyond.” Ph.D. diss., University of Strathclyde, 1988. McCarthy, John. “Information.” Scientific American 215 (September 1966): 64-73. McClain, Wallis E., ed. A Summary of Freedom of Information and Privacy Laws of the 50 States. Washington, DC: Plus Publications, 1977. Michael, Donald N. “Speculations on the Relation of the Computer to Individual Freedom and the Right to Privacy.” George Washington Law Review 33 (1964-65): 270-86. O’Brien, David M. “Freedom of Information, Privacy, and Information Control: A Contemporary Administrative Dilemma.” Public Administration Review 39 (1979): 323-8. Orr, Joseph E. Information Dominance: A Policy of Selective Engagement. Carlisle Barracks, PA: AWC, 1997. Pool, Ithiel de Sola. Technologies of Freedom: On Free Speech in the Electronic Age. Cambridge, MA: Harvard University Press, 1983. Powers, Thomas F. “Can We Be Secure and Free?” Public Interest 151 (Spring 2003): 11-2. Ramey, J.W. “Computer Information Sharing: Threat to Individual Freedom.” Proceedings of the American Documentation Institute (1967): 273-7. Reidenberg, Joel R. “Setting Standards for Fair Information Practice in the U.S. Private Sector.” Iowa Law Review 80 (1995): 497-551. Richmond, S. “Freedom of Information: The History.” Riverina Library Review 4 (Spring 1987): 142-47. Riley, Tom and Harold Relyea, eds. Freedom of Information Trends in the Information Age. London: Frank Cass, 1982. * Rosen, Jeffrey. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age. New York: Random House, 2004. Rosenberg, Jerry Martin. The Death of Privacy: Do Governments and Industrial Computers Threaten Our Personal Freedom? New York: Random House, 1969. Rule, James B. “Future of Freedom: Politics and Technology.” Dissent 29 (Spring 1982): 201-6. Schoeman, Ferdinand David. Privacy and Social Freedom. Cambridge, UK: Cambridge University Press, 1992. Shubik, M. “Information, Rationality, and Free Choice.” Daedalus 96 (Summer 1967): 771-8. Slough, M.C. Privacy, Freedom, and Responsibility. Springfield, IL: Charles C. Thomas Press, 1969. Slough, M.C. “Privacy, Freedom, and Responsibility.” University of Kansas Law

114 Review 16 (April 1968): 323. Smith, Martin. “Freedom of Information: The UK Lags Behind.” Round Table (1981): 243-52. Society of Conservative Lawyers. Legal Research Committee. Computers and Freedom. London: Conservative Research Department, 1968. Star, Jack. “The Computer Data Bank: Will It Kill Your Freedom?” Look 32 (June 25, 1968): 27-9. Warner, Malcolm and Michael Graham Stone. The Data Bank Society: Organizations, Computers, and Social Freedom. London: George Allen & Unwin, 1970. Warren, Jim C., et al., eds. Computers, Freedom, and Privacy: A Comprehensive, Edited Transcript of the First Conference on Computers, Freedom, and Privacy held March 26-28, 1991, in Burlingame, California. Los Alamitos, CA: IEEE Computer Society Press, 1991. Wessel, Milton R. Freedom’s Edge: The Computer Threat to Society. Reading, MA: Addison-Wesley Publishing Company, 1974. Westin, Alan F. Privacy and Freedom. New York: Atheneum Press, 1967. Wicklein, John. Electronic Nightmare: The New Communications and Freedom. New York: The Viking Press, 1981. Wiggins, James Russell. Freedom or Secrecy. New York: Oxford University Press, 1956. Wood, Charles Cresson. “Burning Computer Security, Privacy, and Freedom Issues.” Computers & Security 10 (1991): 524.

Data Protection

American Federation of Information Processing Societies. Selected Documents on Data Protection. Arlington, VA: AFIPS, 1979. Bing, Jon. “The Council of Europe Convention and the OECD Guidelines on Data Protection.” Michigan Yearbook of International Legal Studies (1984): 271-303. Blume, Peter. “An EEC Policy for Data Protection.” Computer/Law Journal 11 (October 1992): 399-440. * Bosworth, Bruce. Codes, Ciphers, and Computers. Hayden Book Company, 1982. Bourn, Colin and John Benyon, eds. Data Protection: Perspectives on Information Privacy. University of Leicester, Continuing Education Unit, 1984. Bride, Edward J. “FJCC Explores Data Protection.” Computerworld (December 6, 1972): 1. Burkert, Herbert. Freedom of Information and Data Protection: Study on Data Security and Confidentiality. Bonn: Gesellschaft für Mathematik und Datenverarbeitung, August 1983. Burkert, Herbert. “Institutions of Data Protection: An Attempt at a Functional Explanation of European National Data Protection Laws.” Computer/Law Journal 3 (1982): 167-88. Cole, P.E. “New Challenge to the U.S. Multinational Corporation in the European Economic Community: Data Protection Laws.” New York University Journal of International Law and Politics 17 (Summer 1985): 893-947. “Computer Data Protection.” Industrial Security (1970): 20-9. Dammann, Ulrich, et al. Data Protection Legislation: An International Documentation. Frankfurt am Main, West Germany: Metzner, 1977. Durbin, J. “Statistics and the Report of the Data Protection Committee.” Journal of the Royal Statistical Society, Series A (General) 142 (1979): 299-306. * Early, T. Lawrence. “Data Protection.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 477-98. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Epperson, G. Michael. “Contracts for Transnational Information Services: Securing

115 the Equivalency of Data Protection.” Harvard International Law Journal 22 (1981): 157-75. Evans, A.C. “European Data Protection Law.” American Journal of Comparative Law 29 (Fall 1981): 571-82. Evans, J.M. “Data Protection: The International Aspects.” Baker 132 (September 1982): 37. Flaherty, David H. “On Making Data Protection Effective.” Transnational Data and Communications Report 9 (April 1986): 15-6. Flaherty, David H. “On the Utility of Constitutional Rights to Privacy and Data Protection.” Case Western Reserve Law Review 41 (1991): 831-55. Franklin, Charles E. H., ed. Business Guide to Privacy and Data Protection Legislation. Kluwer, 1996. Golsong, Herbert. “Toward a European Convention on Data Protection.” Computer Networks 3 (1979): 215-8. Hondius, Frits W. “A Decade of International Data Protection.” Netherlands International Law Review 30 (1983): 103-28. Hondius, Frits W. Emerging Data Protection in Europe. New York: American Elsevier Publishing, 1975. Kirby, Michael D. “Data Protection and Law Reform.” Computer Networks 3 (1979): 149-63. Madsen, Wayne. Handbook of Personal Data Protection. New York: Stockton Press, 1992. * Mayer-Schönberger, Viktor. “Generational Development of Data Protection in Europe.” In Technology and Privacy: The New Landscape, eds. Philip E. Agre and Marc Rotenberg, 219-41. Cambridge, MA: MIT Press, 1997. McBridge, J. “Citizen’s Privacy and Data Banks: Enforcement of the Standards in the Data Protection Act 1984.” Les Cahiers de Droit 25 (September 1984): 533-78. Mellors, Colin and David Pollitt. “Legislating for Privacy: Data Protection in Western Europe.” Parliamentary Affairs 37 (Spring 1984): 199-215. “New Technologies’ Impact on Data Protection.” Transnational Data Report 7(June- July 1984): 204-15. Pagano, Rodolfo. “Panorama of Personal Data Protection Laws.” In Legislation and Data Protection: Proceedings of the Rome Conference on Problems Relating to the Development and Application of Legislation on Data Protection, 236-348. Rome, Italy: Camera dei Deputati, 1983. Pearson, Hilary E. “Data Protection in Europe.” The Computer Lawyer 8 (1991): 24. Pounder, Chris and Freddy Kosten. “The Data Protection Directives.” Data Protection News 21 (Spring 1995): 2-38. “Protecting the Individual: Report of the European Parliament Subcommittee on Data Protection and the Rights of the Individual.” Information Privacy 1 (1979): 335-64. Raab, Charles D. “Data Protection in Britain: Governance and Learning.” Governance 6 (1993): 43-66. Raab, Charles D. “From Balancing to Steering: New Directions for Data Protection.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 68-93. Toronto, Canada: University of Toronto Press, 1999. Raab, Charles D. and Colin J. Bennett. “Taking the Measure of Privacy: Can Data Protection Be Evaluated?” International Review of Administrative Sciences 62 (1996): 95-112. Regan, Priscilla M. “American Business and the European Data Protection Directive: Lobbying Strategies and Tactics.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 199-216. Toronto, Canada: University of Toronto Press, 1999. Rooms, Peter L.P. and John Dexter. “Problems of Data Protection Law for Private

116 Multinational Communication Networks.” Computer Networks 3 (1979): 205-14. Rosenbaum, J.I. “The European Commission’s Draft Directive on Data Protection.” Jurimetrics Journal 33 (1992): 1-12. Rotenburg, Marc. “In Support of a Data Protection Board in the United States.” Government Information Quarterly 8 (1991): 79-83. Schwartz, Paul M. “European Data Protection Law and Restrictions on International Data Flows.” Iowa Law Review 80 (1995): 471-96. Simitis, Spiros. “From the Market to the Polis: European Data Protection Law and Restrictions on International Data Flows.” Iowa Law Review 80 (1995): 445-69. Sizer, Richard and Philip Newman. The Data Protection Act: A Practical Guide. Aldershot: Gower, 1984. Stadlen, Godfrey. “Survey of National Data Protection Legislation.” Computer Networks 3 (1979): 174-86. Taylor, R.L. and R.S. Feingold. “Computer Data Protection.” Industrial Security (August 1970): 20-9. Trubow, George B. “The European Harmonization of Data Protection Laws Threatens U.S. Participation in Trans Border Data Flow.” Northwestern Journal of International Law and Business 13 (1992): 159-76. Yannopoulos, G.N. “Harmonising Data Protection in Europe: The Experience of Greece.” Tolley’s Communications Law 2 (1997): 222-26.

Social Security

Altmeyer, Arthur J. The Formative Years in Social Security. Madison, WI: University of Wisconsin Press, 1966. “Bankers Group Urges Use of Social Security Numbers for Records.” Wall Street Journal, March 6, 1968, p. 8. Bride, Edward J. “Panel Warned of SS Number Trend.” Computerworld (August 30, 1972): 1. Crank, Sandy. “The Evolution of Privacy and Disclosure Policy in the Social Security Administration.” Social Security Bulletin 48 (June 1985): 7-13. Flynn, Laurie. “Company Stops Online Access to Key Social Security Numbers.” New York Times, June 13, 1996, p. B11. Garfinkel, Simson L. “Risks of Social Security Numbers.” Communications of the ACM 38 (October 1995): 146. Hibbert, Chris. “What to Do When They Ask for Your Social Security Number.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 686-96. San Diego: Academic Press, 1996. Mayer, Stephen. “Privacy and the Social Security Number: Section 1211 of the Tax Reform Act of 1976.” Rutgers Journal of Computers and the Law 6 (1978): 221-64. Rotenberg, Marc. “The Use of the Social Security Number as a National Identifier.” Computers & Society 21 (1991): 13-9. Smith, Robert Ellis. “Social Security Numbers: Uses and Abuses.” Privacy Journal (2001): 2. Stafford, S. “Is the Social Security Number Being Abused?” Government Executive 4 (June 1972): 62-3. United States. Social Security Administration. Privacy and Customer Service in the Electronic Age. Washington, DC: GPO, November 1997.

Taxes

Benedict, James N. and Leslie A. Luppert. “Federal Income Tax Returns: The Tension Between Government Access and Confidentiality.” Cornell Law Review 64 (1978-9):

117 940-87. Bengelsdorf, I.S. “Computers Taking Over Tax Collection: Your Financial History Recorded on Tape.” Los Angeles Times, April 3, 1966, Sect. A, p. 1. Bittker, Boris I. “Federal Income Tax Returns: Confidentiality vs. Public Disclosure.” Washburn Law Journal 20 (Spring 1981): 479-94. Caplin, M.M. “The Taxpayer-Identifying Number System: The Key to Modern Tax Administration.” American Bar Association Journal 49 (December 1963): 1161-5. Gartlan, Michael J. “Need for Reform of the Informational and Evidentiary Use of Tax Returns in Nontax Criminal Prosecutions.” American Criminal Law Review 14 (1976): 163-91. Neumann, Peter G. “Aggravation by Computer: Life, Death, and Taxes.” Communications of the ACM 35 (July 1992): 122. Powell, Eileen Alt. “Wider Use of IRS Records Sought, Riling Rights Groups, Tax Experts.” Wall Street Journal 200 (September 8, 1982): 35. United States. Congress. Office of Technology Assessment. A Preliminary Analysis of the IRS Tax Administration System. PB-273143. Washington, DC: GPO, 1977.

IT Privacy and Government, General

American Bar Foundation. “The Computerization of Government Files: What Impact on the Individual.” University of California at Los Angeles Law Review 15 (September 1968): 1371-1495. Bradley, R.J. “Ramifications of Privacy and Security.” Government Data Systems 4 (December 1975-January 1976): 34-36. “The Computerization of Government Files: What Impact on the Individual?” UCLA Law Review 15 (September 1968): 1371-1498. Connelly, Mark Q. “Secrets and Smokescreens: A Legal and Economic Analysis of Government Disclosures of Business Data.” Wisconsin Law Review (1981): 207-73. Douglas, W.O. “The Computerization of Government Files; What Impact on the Individual?” UCLA Law Review 15 (1968): 1371-1498. Duncan, George T., et al., eds. Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics. Washington, DC: National Academy Press, 1993. Earley, Pete. “Watching Me, Watching You: A Growing Government Computer Network That Makes a Mockery of Privacy.” Washington Post Magazine, May 11, 1986. Earley, Pete. “Your Government is Watching You.” Washington Post-National Weekly Edition, May 19, 1986, p. 6-7. Ervin, Samuel James, Jr. “Privacy and Government Investigations.” University of Illinois Law Forum 2 (1971): 138-50. Flaherty, David H. Privacy and Government Data Banks: An International Perspective. London: Mansell, 1979. Frenkel, Karen A. “Government: Computing as a Political Force.” Personal Computing 13 (October 1989): 99-106. “Government Data Bases and Privacy.” Futurist 20 (September-October 1986): 52-3. “Government Watch on 200 Million Americans?” U.S. News & World Report 60 (May 16, 1966): 56-9. Hood, Christopher C. The Tools of Government. Chatham, NJ: Chatham House, 1986. Horton, Forest W., Jr. and D.A. Marchand, eds. Information Management in Public Administration: An Introduction and Resource Guide to Government in the Information Age. Washington, DC: Information Resources Press, 1982. Hufstedler, Shirley. “Invisible Searches for Tangible Things: Regulation of Governmental Information Gathering.” University of Pennsylvania Law Review 127

118 (1979): 1483-1523. Licklider, J.C.R. “Computers and Government.” In The Computer Age: A Twenty Year Review, ed. M. Dertouzos and J. Moses. Cambridge, MA: MIT Press, 1979. Long, Edward V. The Intruders: The Invasion of Privacy by Government and Industry. New York: Frederick A. Praeger, 1966. Lopez, Xavier. “Balancing Information Privacy with Efficiency and Open Access.” Government Information Quarterly 11 (1994): 255-60. Markoff, John. “Electronics Plan Aims to Balance Government Access with Privacy.” New York Times, April 16, 1993, p. A1. Martinotti, Guido. “Data Processing, Government, and the Public: Reflections on the Italian Case.” International Social Science Journal 30 (1979): 146-63. Mathews, Anthony S. The Darker Reaches of Government: Access to Information About Public Administration in the United States, Britain, and South Africa. Berkeley, CA: University of California Press, 1978. McCarthy, K.R. and J.W. Kormeier. “Maintaining the Confidentiality of Confidential Business Information Submitted to the Federal Government.” The Business Lawyer 36 (1980): 57-78. “Project: Government Information and the Rights of Citizens.” Michigan Law Review 73 (1975): 971-1340. “Public Access to Government-Held Computerized Information.” Northwestern University Law Review 68 (1973): 433-52. Quade, Vicki. “Privacy in Peril: Technology and Government Erode Protections.” American Bar Association Journal 69 (1983): 565-69. Rasor, P.B. “Controlling Government Access to Personal Financial Records.” Washburn Law Journal 25 (Spring 1986): 417-36. Regan, Priscilla M. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina Press, 1995. Regan, Priscilla M. “Personal Information Policies in the United States and Britain: The Dilemma of Implementation Considerations.” Journal of Public Policy 4 (February 1984): 19-38. Regan, Priscilla M. “Privacy, Government Information, and Technology.” Public Administration Review (November-December 1986): 629-34. Regan, Priscilla M. “Protecting Privacy and Controlling Bureaucracies: Constraints of British Constitutional Principles.” Governance 3 (1990): 33-54. Regan, Priscilla M. “Public Use of Private Information: A Comparison of Personal Information Policies in the United States and Britain.” Ph.D. diss., Cornell University, 1981. Renninger, C.R. and D.K. Branstad. Government Looks at Privacy and Security in Computer Systems: A Summary. Washington, DC: GPO, 1974. Schwartz, Paul M. “Data Processing and Government Administration: The Failure of the American Legal Response to the Computer.” Hastings Law Journal 43 (1992): 1321-89. Schwartz, Paul M. “Privacy and Participation: Personal Information and Public Sector Regulation in the United States.” Iowa Law Review 80 (March 1995): 553-618. “Sellers of Government Data Thrive.” New York Times, December 26, 1991, p. D2. Senat, Eugene Joseph, Jr. “Privacy Versus Public Access: An Analysis of How Courts Balance These Two Competing Social Interests When Government Records are Computerized.” Ph.D. diss., The University of North Carolina at Chapel Hill, 2000. Southard, C. Dennis. “Individual Privacy and Governmental Efficiency: Technology’s Effect on the Government’s Ability to Gather, Store, and Distribute Information.” Computer/Law Journal 9 (Summer 1989): 359-74. Splichal, Sigman L. “The Impact of Computer Privacy Concerns on Access to Government Information.” Ph.D. diss., University of Florida, 1993.

119 Vache, James M. and Michael J. Makibe. “Privacy in Government Records: Philosophical Perspectives and Proposals for Legislation.” Gonzaga Law Review 14 (1978-9): 515-57. Ward, James A. “The Impact of Computers on the Government.” In Proceedings of the Fall Joint Computer Conference, vol. 27, pt. 2, 37-44. Washington, DC: Spartan Books Inc., 1965. Westin, Alan F. “Computers and the Public’s Right of Access to Government Information.” Advances in Computers 17 (1978): 283-316. Young, R.W. “Constitutional Limitations on Government Disclosure of Private Trade and Secret Information.” Indiana Law Journal 56 (1981): 347-73.

Public-Key

Adams, Carlisle and Steve Lloyd. Understanding Public-Key Infrastructure. Macmillan Technical Publishing, 1999. Merkel, Ralph C. and Martin Hellman. “Hiding Information and Signatures in Public Key Knapsacks.” IEEE Transactions on Information Theory 2 (September 1978): 525-30. Omura, J.K. “A Computer Dial Access System Based on Public Key Techniques.” IEEE Communications Magazine 25 (1987): 73-9.

IT Privacy & Federal Government

Chinn, Julie Chapman. “Protecting Privacy From Government Invasion: Legislation at the Federal and State Levels.” Memphis State University Law Review 8 (1978): 783- 802. “Federal Government Computer Data Sharing and the Threat to Privacy.” University of Detroit Journal of Urban Law 61 (Summer 1984): 605-23. Linowes, David F. and Colin J. Bennett. “Privacy: Its Role in Federal Government Information Policy.” Library Trends 31 (1986): 19-42. United States. Commission on Federal Paperwork. Confidentiality and Privacy: A Report of the Commission on Federal Paperwork. Washington, DC: GPO, July 29, 1977. United States. Congress. House of Representatives. Committee on Government Operations. International Information Flow: Forging a New Framework. Washington, DC: GPO, 1980. United States. Congress. House of Representatives. Committee on Government Operations. Government Information and Individual Rights Subcommittee. Public Reaction to Privacy Issues. Washington, DC: GPO, 1980. United States. Congress. Office of Technology Assessment. Computer-Based National Information Systems: Technology and Public Policy Issues. OTA-CIT-163. Washington, DC: Office of Technology Assessment Publishing Office, 1981. United States. Congress. House of Representatives. The Computer and the Invasion of Privacy: Hearings Before a Subcommittee of the Committee on Government Operations. 89th Congress, First Session (Gallagher Report). Washington, DC: GPO, July 26-28, 1966. United States. Congress. House of Representatives. Committee on Government Operations. Problems Associated with Computer Technology in Federal Programs and Private Industry. Washington, DC: GPO, 1976. United States. Congress. House of Representatives. Committee on Government Operations. Staff Study of Computer Security in Federal Programs. Washington, DC: GPO, 1977. United States. Congress. Office of Technology Assessment. Issue Update on

120 Information Security and Privacy in Network Environments. Washington, DC: GPO, 1995. United States. Congress. Office of Technology Assessment. Management, Security, and Congressional Oversight. OTA-CIT-297. Gaithersburg, MD: GPO, 1986. United States. Congress. Office of Technology Assessment. Electronic Record Systems and Individual Privacy. Washington, DC: GPO, 1986. United States. Congress. Office of Technology Assessment. The Electronic Supervisor: New Technology, New Tensions. Washington, DC: GPO, 1981. United States. Congress. Office of Technology Assessment. Information Security and Privacy in Network Environments. Washington, DC: GPO, 1994. United States. Congress. Senate. Committee on Government Operations and Committee on the Judiciary. Ad Hoc Subcommittee on Privacy and Information Systems. Subcommittee on Constitutional Rights. Privacy: The Collection, Use, and Computerization of Personal Data. Washington, DC: GPO, 1974. United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Constitutional Rights. Uncle Sam is Watching You. Washington, DC: Public Affairs Press, 1971. United States. Congress. Senate. Computer Privacy: Hearings Before the Subcommittee on Administrative Practice and Procedure of the Committee of the Judiciary. 90th Cong., First Session (Long Report). Washington, DC: GPO, March 14- 15, 1967. United States. Congress. Senate. Privacy: The Collection, Use, and Computerization of Personal Data: Joint Hearings Before the Ad Hoc Subcommittee on Privacy and Information Systems (Part I). June 1974. Committee on the Judiciary. U.S. Senate. In U.S. Government Computing Collection, ca. 1945-1983. CBI 63. Box 10. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. United States. Congress. Senate. Privacy: The Collection, Use, and Computerization of Personal Data: Joint Hearings Before the Ad Hoc Subcommittee on Privacy and Information Systems (Part II). June 1974. Committee on the Judiciary. U.S. Senate. In U.S. Government Computing Collection, ca. 1945-1983. CBI 63. Box 10. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. United States. Congress. Senate. Protecting Individual Privacy in Federal Gathering, Use, and Disclosure of Information. Report No. 93-1183. Washington, DC: GPO, 1974. United States. Department of Commerce. National Bureau of Standards. Approaches to Privacy and Security in Computer Systems. Washington, DC: GPO, September 1974. United States. Department of Commerce. National Bureau of Standards. Computer Science and Technology: Accessing Individual Records from Personal Data Files Using Non-Unique Identifiers. Washington, DC: GPO, 1977. United States. Department of Commerce. National Bureau of Standards. Computer Science and Technology: Computers, Personal Administration, and Citizen Rights. NBS Special Publication 500-50. Washington, DC: GPO, 1979. United States. Department of Commerce. National Bureau of Standards. Evaluation of Techniques for Automated Personal Identification. FIPS PUB 48. April 1977. United States. Department of Commerce. National Bureau of Standards. Executive Guide to Computer Security. Washington, DC: GPO. United States. Department of Commerce. National Bureau of Standards. Exploring Privacy and Data Security Costs: A Summary of a Workshop. August 1975. United States. Department of Commerce. National Bureau of Standards. Government Looks at Privacy and Security in Computer Systems. Washington, DC: GPO, February

121 1974. United States. Department of Commerce. National Bureau of Standards. Guidelines on Evaluation of Techniques for Automated Personal Identification. FIPS-PUB-48. Federal Information Processing Standards, U.S. Department of Commerce, National Bureau of Standards, April 1977. In U.S. Government Computing Collection, ca. 1945-1983. CBI 63. Box 16. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. United States. Department of Commerce. National Bureau of Standards. The Privacy Mandate: Planning for Action. Washington, DC: U.S. Department of Commerce, National Bureau of Standards, 1975. United States. Department of Commerce. National Bureau of Standards. Security of Personal Computer Systems: A Management Guide. January 1985. United States. Department of Commerce. National Bureau of Standards. Institute for Computer Sciences and Technology. Department of Commerce Program in Privacy, Confidentiality and Computer Security: Volume I, Report of Program. September 1973. In NBS# NBS00096. Box 689, Folder 5. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. United States. Department of Commerce. National Telecommunications and Information Administration. The Foundations of United States Information Policy. Washington, DC: U.S. Department of Commerce, June 1980. United States. Department of Commerce. National Telecommunications and Information Administration. Issues in Information Policy. Washington, DC: U.S. Department of Commerce, February 1981. United States. Department of the Navy. Office of Naval Research. Naval Ship Research and Development Center. ADP Data Security and Privacy: Proceedings of the Conference on Secure Data Sharing. Bethesda, MD: Office of Naval Research, August 1973. United States. Domestic Council Committee on the Right to Privacy. National Information Policy: Report to the President. Washington, DC: National Commission on Libraries and Information Science, 1976. United States. General Accounting Office. Automated Systems Security: Federal Agencies Should Strengthen Safeguards Over Personal and Other Sensitive Data. LCD-78-123. Washington, DC: GAO, January 23, 1979. United States. General Accounting Office. Challenges of Protecting Personal Information in an Expanding Federal Computer Network Environment. Washington, DC: GAO, 1978. United States. General Accounting Office. Communications Privacy: Federal Policy and Actions. GAO/OSI-92-2-3. Washington, DC: GAO, November 1993. United States. General Accounting Office. Government Computers and Privacy. GAO/IMTEC-90-70BR. Washington, DC: GAO, 1990. United States. Library of Congress. Congressional Research Service. Citizen Control Over Records Held by Third Parties. Report No. 78-255 GOV. Washington, DC: Library of Congress Research Service, December 8, 1978. United States. Library of Congress. Congressional Research Service. Federal Information Management Policy: Critical Directions. Report no. 81-101 SPR. Washington, DC: Library of Congress Research Service, June 1980. Westin, Alan F. “The Federal Government as a Source of Privacy Problems and a Possible Part of the Solution.” The Business Lawyer 34 (March 1979): 1129-36.

IT Privacy & State Government

Bostwick, Gary L. Privacy of Information: California Faces the Issues. Berkeley, CA:

122 Institute of Governmental Studies, University of California, 1977. Brant, Jonathan, et al. “Public Records, FIPA, and CORI: How Massachusetts Balances Privacy and the Right to Know.” Suffolk University Law Review 15 (March 1981): 23-77. Chinn, Julie Chapman. “Protecting Privacy From Government Invasion: Legislation at the Federal and State Levels.” Memphis State University Law Review 8 (1978): 783- 802. Goldstein, B.D. “Confidentiality and Dissemination of Personal Information: an Examination of State Laws Governing Data Protection.” Emory Law Journal 41 (1992): 1185-1280. Gemberling, D.A. and G.A. Weissman. “Data Privacy: Everything You Wanted to Know About the Minnesota Government Data Practices Act.” William Mitchell Law Review 8 (1982): 573-673. Governor’s Commission on Privacy and Personal Data. Privacy in Massachusetts: Your Rights Under the Law. November 1974. NBS# 74336003. Box 631, Folder 21. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Hancock, Graeme. “California’s Privacy Act: Controlling Government’s Use of Information?” Stanford Law Review 32 (1980): 1001-38. Imhof, P.L. and E.A. Levine. “Impact of the Information Age on Access and Dissemination of Government Information in Florida.” Florida State University Law Review 14 (Fall 1986): 635-55. Sills, A.J. “Automated Data Processing and the Issue of Privacy.” State Government 40 (Spring 1967): 92-101.

IT Privacy & Local Government

Danzinger, James N., et al. Computers and Politics: High Technology in American Local Governments. New York: Columbia University Press, 1982. Kraemer, Kenneth L. “Computers, Information, and Power in Local Governments.” In Human Choice and Computers, vol. 2, 213-35. New York: North Holland Publishing Company, 1980. Marchand, Donald A. and Mark E. Tompkins. “Information Management and Use in Public Organizations: Some Impacts on Citizen Participation.” State and Local Government Review 13 (September 1981): 103-9.

Authentication

Bright, Herbert S., et al. “Information Segment Content-Authentication: A Problem and an Answer.” Computerworld (April 21, 1980). Diffie, Whitfield and Martin E. Hellman. “Privacy and Authentication: An Introduction to Cryptography.” Proceedings of the IEEE 67 (March 1978): 397-427. Evans, A., Jr. and W. Kantrowitz. “A User Authentication Scheme Not Requiring Secrecy in the Computer.” Communications of the ACM 17 (1974): 437-42. Jennifer, G., et al. “Kerberos: An Authentication Service for Open Network Systems.” In Proceedings of the USENIX Winter Conference, 191-202. 1988. Simmons, Gustavus J. “A Survey of Information Authentication.” Proceedings of the IEEE 76 (1988).

Insurance

Anderson, Arthur F. “Computer Insurance.” Accountant (April 6, 1968). Bride, Edward J. “Insurance May Be Cheaper than Security.” Computerworld

123 (September 6, 1972): 3. Matthias, R.H. “Informational Privacy in the Insurance Relationship: A Review of the Privacy Protection Study Commission’s Insurance Recommendations.” Drake Law Review 27 (1977-8): 605-37. Sesser, S.N. “Big Brother Keeps Tabs on Insurance Buyers.” The New Republic (April 27, 1968): 11-2. Skipper, J.R., et al. Privacy and the Insurance Industry. Atlanta, GA: Publishing Services Division, College of Business Administration, Georgia State University, 1979. United States. Congress. House of Representatives. Committee on Government Operations. Government Information and Individual Rights Subcommittee. Confidentiality of Insurance Records. Washington, DC: GPO, 1981.

National Data Bank/National Data Center

Carter, L.J. “National Data Bank: Its Advocates Try to Erase Big Brother Image.” Science 163 (January 10, 1969): 160-2. Chartrand, R.L. “The Federal Data Center: Proposals and Reactions.” Law and Computer Technology 1 (October 1968): 12-9. Dunn, E.S., Jr. “The Idea of a National Data Center and the Issue of Personal Privacy.” American Statistician 21 (February 1967): 21-7. Miller, Arthur R. “The National Data Center and Personal Privacy.” The Atlantic (November 1967): 53-7. “Model Code is Urged to Forestall Abuse of National Data Bank.” Management Services 5 (May 1968): 9. “Privacy and Efficient Government: Proposals for a National Data Center.” Harvard Law Review 82 (December 1968): 400-17. Sawyer, Jack and Howard Schechter. “Computers, Privacy, and the National Data Center: The Responsibility of Social Scientists.” American Psychologist 23 (November 1968): 810-8. Schultze, C.L.A. “A Data System for Measuring and Analyzing Public Programs: Detailed Specification of the Powers, Functions, and Responsibilities of a Federal Data Center Might Satisfy Congressional Doubts About Invasion of Privacy.” Monthly Labor Review 93 (March 1970): 13-5. Sprague, C.R. and David N. Ness. “Privacy and a National Data Bank.” Banking 60 (June 1968): 50-1. Sprague, C.R. and David N. Ness. “Privacy and a National Data Bank.” Journal of Accountancy (April 1968): 43-7. United States. Congress. House of Representatives. Privacy and the National Data Bank Concept. Washington, DC: GPO, August 2, 1968.

U.S. Army

“Army Plan Fosters Dynamic Information War Framework.” Signal (November 1993): 5558. Arnold, Wallace C. and Thomas H. Killion. “Soldierinformation Interface.” Army RD&A Bulletin (January-February 1995): 7-10. Betzold, Victor A. “Data Storage and Retrieval for the Digital Battlefield.” Army RD&A Bulletin (November-December 1995): 26-29. Blount, Kerry A. “A Two-Component Strategy for Winning the Information War.” ARMY (January 1995): 1011. Blount, Kerry A. “Wrestling with Information Warfare’s ‘Dark Side.’” ARMY (February 1996): 912.

124 Clark, Wesley K. “Digitization: Key to Landpower Dominance.” ARMY (November 1993): 28-33. Cooper, Pat. “Internet Link to Defense Data May be Too Easy.” Army Times (January 22, 1996): 27. Davison, David A. and Steve Taulbee. “Digitizing the Battlefield.” Army RD&A Bulletin (May-June 1995): 49-51. Grange, David L. and James A. Kelley. “Victory through Information Dominance.” ARMY (March 1997): 32-36. Guenther, Otto and Robert F. Giordano. “Enabling Technologies and Advanced Concepts for the Digitized Force XXI.” Army RD&A Bulletin (November-December 1994): 21-24. Hitt, Parker. Manual for Solution of Military Ciphers. Fort Leavenworth, KS: U.S. Army School Service, 1918. Jensen, Joan M. Army Security in America, 1775-1980. New Haven, CT: Yale University Press, 1991. Loop, Tony. “Warfighter Information Network and the Next Generation of Switches.” Army Communicator: Voice of the Signal Corps (Spring 1996): 814. Morton, Thomas J. “Bomb Demolishes Army Computer Complex.” Computerworld (September 2, 1970): 1. Rigby, Joe W. “Turning Point in Modernizing the Army . . . Acquiring the Digitized Force.” Army RD&A Bulletin (November-December 1994): 1617. Sullivan, Gordon R. “Force XXI: Digitizing the Battlefield.” Army RD&A Bulletin (November-December 1994): 2-3. United States. Army. Security Agency. Historical Background of the Signal Security Agency, Volume Two: World War I, 1917-1919. 1946 United States. Army. Security Agency. Historical Background of the Signal Security Agency, Volume Three: The Peace, 1919-1939. 1946. United States. War Department. Army Security Agency. The History of Army Strip Cipher Devices. 1948. Washer, Thomas F. “Expanding the Division Communications Network on the Air- Assault Battlefield.” Army Communicator: Voice of the Signal Corps (Spring-Summer 1995): 15-18.

Privacy Protection Study Commission

Flaherty, David H. “The Need for an American Privacy Protection Study Commission.” Government Information Quarterly 1 (1984): 235-58. Linowes, David F. “The U.S. Privacy Protection Commission: A Retrospective View from the Chair.” American Behavioral Scientist 26 (May-June 1983): 577-90. United States. Privacy Protection Study Commission. Employment Records. Washington, DC: GPO, July 1977. United States. Privacy Protection Study Commission. Personal Privacy in an Information Society. Washington, DC: GPO, July 1977. United States. Privacy Protection Study Commission. Privacy Law in the States. Washington, DC: GPO, 1977. United States. Privacy Protection Study Commission. Technology and Privacy. Washington, DC: GPO, July 1977.

Telecommunications

Frank, Ronald A. “Phone Lines Prone to Compromise.” Computerworld (December 6, 1972): 19. Headrick, Daniel R. The Invisible Weapon: Telecommunications and International

125 Politics, 1851-1945. Oxford University Press, 1991. Hurst, Gerald A. Taking Down Telecommunications. Maxwell AFB, AL: Air University, 1994. Katz, James E. “Telecommunications and Computers: Whither Privacy Policy?” Society 25 (1987): 81-6. Mathison, S.L. and P.M. Walker. Computers and Telecommunications: Issues in Public Policy. Englewood Cliffs, NJ: Prentice-Hall, 1969. Nycum, Susan Hubbell. “Protection of Databases in the International Telecommunications Environment.” In IFIP Transactions A: Computer Science & Technology, vol. A-52, 219-31. 1994. Ruiz, Blanca R. Privacy in Telecommunications: A European and an American Approach. Kluwer Law International, 1997. Schod, Pat. “Digital Technology: Foundation for Voice Security.” Telecommunications 15 (June 1981): 60-82. Stix, Gary. “Call and Tell.” Scientific American (April 1991): 152-3. United States. Congress. Senate. Committee on Commerce, Science, and Transportation. Long Range Goals in International Telecommunications and Information: An Outline for United States Policy. Washington, DC: GPO, 1983. United States. Library of Congress. Congressional Research Service. Science Policy Research Division. Information and Telecommunications: An Overview of Issues, Technologies, and Applications. Washington, DC: GPO, 1981. * Willetts, Dennis. “Telecommunications Security.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 731-48. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Wolinsky, C. and J. Sylvester. “Privacy in the Telecommunications Age.” Communications of the ACM 35 (February 1992).

SDI

Parnas, David Lorge. “Computers in Weapons: The Limits of Confidence.” In Computers in Battle: Will They Work? eds. David Bellin and Gary Chapman, 209-31. Boston: Harcourt Brace Jovanovich, 1987. Parnas, David Lorge. “SDI: A Violation of Professional Responsibility.” Abacus 4 (Winter 1987): 46-52. Parnas, David Lorge. “Software Aspects of Strategic Defense Systems.” Communications of the ACM (December 1985): 1326-35. Roberts, Eric and Steve Berlin. “Computers and the Strategic Defense Initiative.” In Computers in Battle: Will They Work? eds. David Bellin and Gary Chapman, 149-69. Boston: Harcourt Brace Jovanovich, 1987. Simons, Geoff. Bugs and Star Wars: The Hazards of Unsafe Computing. Manchester, England: NCC Blackwell, 1989. United States. Congress. Office of Technology Assessment. SDI: Technology, Survivability, and Software—Summary. Washington, DC: GPO, 1988.

Intelligence

Frost, Mike. Spyworld: Inside the Canadian and American Intelligence Establishments. Doubleday, 1994. Kincaid, William K., Jr. “Command, Control, Communications, and Intelligence.” Aerospace America (December 1992): 44-45. Levitt, Leonard. “No Connection to Intelligence.” Newsday, September 30, 2002, p. A12. Lowrey, Dennis A. “Center Without Walls: Training in the Information Age.” Military

126 Intelligence (October-December 1995): 45-48. Madsen, Wayne. “Intelligence Agency Threats to Computer Security.” International Journal of Intelligence and Counterintelligence (Winter 1993): 413-88. McAuliffe, Daniel J. “Command, Control, Communications, and Intelligence.” Aerospace America (December 1994): 3536. Michelson, Jeffrey. The U.S. Intelligence Community. Cambridge, MA: Ballinger, 1989. Minihan, Kenneth. “Information Dominance: Meeting the Intelligence Needs of the 21st Century.” American Intelligence Journal (March 1994): 15-19. Mussington, David. “Throwing the Switch in Cyberspace.” Jane’s Intelligence Review (July 1996): 33134. Richelson, Jeffrey T. The U.S. Intelligence Community. Cambridge, MA: Ballinger, 1989. Shapley, Deborah. “Intelligence Agency Chief Seeks ‘Dialogue’ with Academics.” Science 202 (October 27, 1978): 407-9. United States. Department of Justice. Bureau of Justice Statistics. Privacy and Intelligence Information. Washington, DC: Department of Justice, 1981.

Artificial Intelligence

Athanasiou, Tom. “Artificial Intelligence as Military Technology.” In Computers in Battle: Will They Work? eds. David Bellin and Gary Chapman, 233-57. Boston: Harcourt Brace Jovanovich, 1987. Buchanan, Bruce Gardner and Thomas E. Headrick. “Some Speculations About Artificial Intelligence and Legal Reasoning.” Stanford Law Review 23 (1970): 40. Frank, Steven J. “What AI Practitioners Should Know About the Law.” AI Magazine 9 (Spring 1988): 63-75. Schultz, Alan C. “Artificial Intelligence and Security: An Overview.” In Proceedings of the National Computer Conference, vol. 56, 73-6. Reston, VA: AFIPS Press, 1987. Turley, Tod M. “Expert Software Systems: The Legal Implications.” Computer Law Journal 8 (Fall 1988): 455-77. Zuboff, Shoshana. In the Age of the Smart Machines. New York: Basic Books, 1988.

Smart Cards

Chaum, David, ed. Smart Card 2000. Amsterdam, The Netherlands: North Holland, 1991. Doubet, Lorna. “Built-in Intelligence: Impact of Smart Cards Debated.” San Francisco Chronicle, September 24, 1987. Draper, S. “Security Aspects of Smart Cards.” In Computer Security in the Age of Information, ed. Caelli. Amsterdam, The Netherlands: Elsevier, 1989. Madsen, Wayne. “Smart Cards: Big Brother on a Chip.” Information Systems Security 5 (Fall 1996): 10-20. O’Connell, Jennifer. “Smart Cards Threat to Privacy.” Sunday Business Post, April 25, 1999. Pattison, Ian. “Smart Cards: Chipping into Greater Customer Loyalty.” Guardian, July 31, 1999. Shelfer, Katherine M. and J. Drew Procaccino. “Smart Card Evolution.” Communications of the ACM 45 (July 2002): 83-8. Vernon, Mark. “Network: Smart Cards Get Smarter.” Independent, February 18, 1997.

Battlefield

127

Alexander, David. “Information Warfare and the Digitized Battlefield.” Military Technology (September 1995): 5764. Bellin, David and Gary Chapman, eds. Computers in Battle: Will They Work? Boston: Harcourt Brace Jovanovich, 1987. Betzold, Victor A. “Data Storage and Retrieval for the Digital Battlefield.” Army RD&A Bulletin (November-December 1995): 26-29. Calvo, Mark D. “Digitizing the Force XXI Battlefield.” Military Review (May-June 1996): 68-70. Chapman, Gary. “The New Generation of High-Technology Weapons.” In Computers in Battle: Will They Work? eds. David Bellin and Gary Chapman, 61-100. Boston: Harcourt Brace Jovanovich, 1987. Cooper, Pat. “Newest Information Warfare Technology Could Backfire On Battlefield of the Future.” Defense News (May 6, 1996): 26. Cunningham, W.B. and M.M. Taylor. “Information for Battle Command.” Military Review (November 1994): 81-84. Dunnigan, James F. Digital Soldiers: The Evolution of High-Tech Weaponry and Tomorrow’s Brave New Battlefield. New York: St. Martin’s Press, 1996. Gehly, Darryl. “Controlling the Battlefield.” Journal of Electronic Defense (June 1993): 42-49. Jacky, Jonathan. “The Strategic Computing Program.” In Computers in Battle: Will They Work? eds. David Bellin and Gary Chapman, 171-208. Boston: Harcourt Brace Jovanovich, 1987. Johnson, Stuart E. and Martin C. Libicki, ed. Dominant Battlespace Awareness. Washington, DC: Center for Advanced Concepts and Technology, Institute for National Strategic Studies, NDU Press, October 1995. Kittle, Robert A. “Will Computers Fight the Battles of the Future?” U.S. News & World Report (August 26, 1985): 46. McAuliffe, Amy. “Building the Eyes and Ears of the Battlefield.” Military & Aerospace Electronics (June 1995): 10-12. Mengxiong, Chang. Prospects For Weapons, Troops, and Battlefields in the Information Age. Wright-Patterson AFB, OH: National Air Intelligence Center, February 6, 1996. Murphy, Dennis M. “Information Operations on the Nontraditional Battlefield.” Military Review (November-December 1996): 16-18. Ornstein, Severo M. “Computers in Battle: A Human Overview.” In Computers in Battle: Will They Work? eds. David Bellin and Gary Chapman, 1-43. Boston: Harcourt Brace Jovanovich, 1987. Robinson, Clarence A., Jr. “Information Warfare Demands Battlespace Visualization Grasp.” Signal (February 1997): 1720. Siegel, Lenny and John Markoff. “High Technology and the Emerging Dual Economy.” In Computers in Battle: Will They Work? eds. David Bellin and Gary Chapman, 259- 81. Boston: Harcourt Brace Jovanovich, 1987. Stewart, John F., Jr. “Command and Control Warfare and Intelligence on the Future Digital Battlefield.” Army RD&A Bulletin (November-December 1994): 14-15. Tapscott, Mark. “New Pictures Emerging in Battlefield Intelligence.” Defense Electronics (April 1993): 31-38. Walsh, Robert S. “Information Enhancement on Today’s Battlefield.” Marine Corps Gazette (October 1995): 27-29.

Drug Abuse

Gardiner, Sean. “NYPD Detectives Make Vegas Arrest: Busboy Allegedly Used

128 Internet to Sell Drugs.” Newsday, February 25, 2000, p. A34. Lanman, R.B. “The Federal Confidentiality Protections for Alcohol and Drug Abuse Patient Records: A Model for Mental Health and Other Medical Records?” American Journal of Orthopsychiatry 50 (1980): 666-77. McFee, Michele. “Drug Deals Busted on Internet.” Daily News, August 7, 2000, p. 5. United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Constitutional Rights. Drug Abuse Data Banks: Case Studies in the Protection of Privacy. Washington, DC: GPO, 1974. Weissman, J.C. and B.R. Berns. “Patient Confidentiality and the Criminal Justice System: A Critical Examination of the New Federal Confidentiality Regulations.” Contemporary Drug Problems 5 (Winter 1976): 531-52.

Money Laundering

United States. Congress. Office of Technology Assessment. Information Technologies for Control of Money Laundering. OTA-ITC-630. Gaitherburg, MD: GPO, 1995.

National Defense

Arnold, H.D., et al. “Targeting Financial Systems as Centers of Gravity: ‘Low Intensity to No Intensity’ Conflict.” Defense Analysis 10 (2 1994): 181-208. Campen, Alan D. “Vulnerability of Info Systems Demands Immediate Action.” National Defense (November 1995): 2627. Gambel, Daniel W. “MLS (MultiLevel Security): Data Security for the DOD and the Rest of Us.” Defense Electronics (June 1995): 10. Gray, Jim. “Turning Lessons Learned into Policy.” Journal of Electronic Defense (October 1993): 87-92. Guilbault, R.G. “Information Empowerment: The Key Force Multiplier.” Defense & Security Electronics (January 1996): 10-14. Information Security: Computer Attacks at Department of Defense Pose Increasing Risk. GAO/AIMD-96-84. Washington, DC: Government Accounting Office (GAO), May 1996. Landau, Susan Eva. “Zero Knowledge and the Department of Defense.” Notices of the American Mathematical Society 35 (1988): 5-12. McKenna, James T. “Tighter Security Urged for Defense Computers.” Aviation Week & Space Technology (January 20, 1997): 60-61. Metzgar, Terry. “Hostile Intercepts Aimed At Information Systems.” National Defense (May-June 1993): 24-26. “Security Defenses for the Computer Room.” Management Review (May 1969): 67-8. United States. Department of Defense. Department of Defense Trusted Computer System Evaluation Criteria. Fort Meade, MD: National Computer Security Center, 1985. Sullivan, Walter. “U.S. Seeks to Link to Industry on Computer Defenses.” New York Times, August 12, 1981, p. A17. Taube, Mortimer. “Man-Machine Relations in Defense Systems,” in Computers and Common Sense: The Myth of Thinking Machines, 80-98. New York: Columbia University Press, 1961.

Finland

Pietarinen, Ilmari. “Finland’s Privacy Legislation.” Transnational Data Report 6 (March 1983): 101-3.

129 Privacy Legislation, General

“A Bill to Prevent the Invasion of Privacy Through the Misuse of Computer Information.” Computers and Automation (July 1969): 13-4. Bing, Jon. “A Comparative Outline of Privacy Legislation.” Comparative Law Yearbook 2 (1978): 149-81. Davis, Ruth M. “Implication of Privacy Legislation on the Use of Computer Technology in Business.” Jurimetrics Journal 17 (Fall 1976): 95-110. Farnsworth, David P. “Data Privacy: An American’s View of European Legislation.” Transnational Data Report 6 (July-August 1983): 285-90. Janssen, C.J. Privacy Legislation and its Implication Toward the Computer Industry. Springfield, VA: National Technical Information Service, 1977. Johnsen, K. “System Implications of Privacy Legislation.” Information Privacy 2 (March 1980): 60-8. Kastenmeier, Robert W., et al. “Communications Privacy: A Legislative Perspective.” Wisconsin Law Review (1989): 715. Oz, Effy. “Legislation for Privacy and Access to Information.” In Ethics for the Information Age, 177-93. Burr Ridge, IL: Business and Educational Technologies, 1994. Pauly, Charles W. “Let Industry Beware: A Survey of Privacy Legislation and Its Potential Impact on Business.” Tulsa Law Journal 11 (1975-76): 68-84. “Privacy Legislation, 1975-1977.” Institute for Certification of Computer Professionals Records, 1960-1993. CBI 116. Box 11, Folder 35. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Savage, Nigel and Chris Edwards. “The Legislative Control of Data Processing: The British Approach.” Computer/Law Journal 6 (Summer 1985): 143-56. Shuster, Alvin. “British Panel Calls for Legislation to Protect Privacy.” New York Times, July 13, 1972, p. 4. Thom, J. and P. Thorne. “Privacy Legislation and the Right of Access.” Journal of Computing 15 (November 1983). Tucker, Greg. “Europe Grasps Nettle of Data Processing Protection Legislation.” Computing Australia (September 19, 1988): 24-9.

Politics

Ackroyd, Carol, et al. The Technology of Political Control. 2nd ed. New York: Wiley, 1977. Agboh, Dennis. “The Use and Impact of Computer Technology on Political Elections.” Computers and Society (March 1994): 21-7. Arnopoulos, Paris. “Political Dimensions of an Information Society: A General Overview.” Paper no. 1-12. Montreal, Canada: GAMMA, January 1982. Berney, Karen. “Electronic Politics.” Nation’s Business 74 (June 1986): 62-3. Brook, James and Iain A. Boal, eds. Resisting the Virtual Life: The Culture and Politics of Information. City Lights, 1995. Center for Public Integrity. Nothing Sacred: The Politics of Privacy. Washington, DC: The Center for Policy Integrity, 1998. Cornford, James. “The Prospects for Privacy.” Political Quarterly 52 (July-September 1981): 295-313. Daly, James and Nell Margolis. “Computers and Politics: High-Tech a Campaign Also- Ran.” Computerworld 22 (November 7, 1988): 154-6. Furger, Roberta. “PCs and Politics.” PC World 10 (September 1992): 27-9. Gardner, Amanda. “John Phillips: Selling McPolitics.” M 9 (September 1992): 66-7.

130 Laudon, Kenneth C. Computers and Bureaucratic Reform: The Political Functions of Urban Information Systems. New York: John Wiley and Sons, 1974. Levinson, Sanford. “Public Lives and the Limits to Privacy.” Political Science and Politics 21 (1988): 263-80. Lowi, Theodore. “The Political Impact of Information Technology.” IEEE Transactions on Communications 23 (1975). Lowi, Theodore. “The Political Impact of Information Technology.” In The Microelectronics Revolution, ed. Tom Forester, 466. Cambridge, MA: The MIT Press, 1980. Neustadt, Richard M. “Electronic Politics.” In The Information Technology Revolution, ed. Tom Forester, 561-8. Cambridge, MA: MIT Press, 1985. Oettinger, Anthony G. and Paul J. Berman. High and Low Politics: Information Resources for the 80s. Cambridge, MA: Ballinger Publishing, 1977. Ronfeldt, David F. Cyberocracy, Cyberspace, And Cyberology: Political Effects of the Information Revolution. Santa Monica, CA: The Rand Corporation, 1991. Rule, James B., et al. The Politics of Privacy: Planning for Personal Data Systems as Powerful Technologies. New York: Elsevier, 1980. Schwartz, Evan I. “Putting the PC into Politics.” Business Week (March 16, 1992): 112-4. Smith, Anthony. The Geopolitics of Information: How Western Culture Dominates the World. London: Faber & Faber, 1980. Smith, Anthony. The Politics of Information: Problems of Policy in Modern Media. London, United Kingdom: The Macmillan Press, 1978. Stone, Michael G. and Malcolm Warner. “Politics, Privacy, and Computers.” The Political Quarterly 40 (July-September 1969): 256-67. Swanson, Judith A. The Public and the Private in Aristotle’s Political Philosophy. Ithaca, NY: Cornell University Press, 1992. Talingdan, Arsenio. “Implications of Computer Use in Politics.” Technology and Society 2 (September 1980): 8-11.

Electronic Civil Disobedience

Critical Art Ensemble. Electronic Civil Disobedience and Other Unpopular Ideas. Autonomedia, 1996.

Panopticon

Foucault, Michel. Discipline and Punish: The Birth of the Prison. New York: Vintage, 1977. Gandy, Oscar H., Jr. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview Press, 1993. Gordon, Diana. “The Electronic Panopticon: A Case-Study of the Development of the National Criminal Records System.” Politics and Society 15 (1987): 483-511. Lee, Felicia R. “Keeping Watch in Washington Square.” New York Times, January 3, 1998, p. B3. Lyon, David. “Bentham’s Panopticon: From Moral Architecture to Electronic Surveillance.” Queen’s Quarterly 98 (1991): 596-617. Mathiesen, Thomas. “The Viewer Society: Michel Foucault’s ‘Panopticon’ Revisited.” Theoretical Criminology 215 (1997): 221. Meissner, Paul. “Computers: A Seeing-Eye Watching You.” Science Digest 81 (June 1977): 64-7. Perin, Constance. “The Moral Fabric of the Office: Panopticon Discourse and Schedule Flexibilities.” Research in the Sociology of Organizations (1991): 241-68.

131 Shearing, Clifford and Philip Stenning. “From the Panopticon to Disneyworld: The Development of Discipline.” In Perspectives in Criminal Law, eds. A. Doob and E.L. Greenspan, 336. Toronto: Canada Law Books, 1985. Spears, Russell and Martin Lea. “Panacea or Panopticon? The Hidden Power in Computer-Mediated Communication.” Communication Research 21 (1994): 427-59. Strub, Harry. “The Theory of Panoptic Control: Bentham’s Panopticon and Orwell’s Nineteen Eighty-Four.” Journal of the History of the Behavioral Sciences 25 (1989): 40-59.

Digital Formats

Acherman, Robert K. “Digital Formats Complicate Information Security Tasks.” Signal (February 1997): 2123.

Military

Acherman, Robert K. “Military Planners Gird for Information Revolution.” Signal (May 1995): 7172. Belknap, M. Military Decision Making in The Information Age. Newport, RI: Joint Military Operations Department, NWC, February 12,1996. Candela, Rosario. The Military Cipher of Commandant Bazeries. New York: Cardanus Press, 1938. “Commercial, Military Information Security Requirements Meld.” Signal (May 1996): 1089. Giboney, Thomas B. “Commander’s Control From Information Chaos.” Military Review (November 1991): 34-38. Harley, J.A. “Information, Technology, and the Center of Gravity.” National War College Review (Winter 1997): 66-87. Harley, J.A. Information, Technology, and the Center of Gravity. Newport, RI: NWC, June 14, 1996. Hughes, David. “609th Sqdn. Pursues New Realm of Combat.” Aviation Week & Space Technology (April 29, 1996): 52-53. Hunter, Roger C. “Disabling Systems and the Air Force.” Airpower Journal (Fall 1994): 4347. “IW Squadron to Evaluate Offensive Tactics.” Aviation Week & Space Technology (November 27, 1995): 54. Kahan, James P. et al. Understanding Commander’s Information Needs. Santa Monica: The Rand Corporation, 1989. Lum, Zachary A. “We Want the Airwaves: Defense on the C2 (Command and Control) Front.” Journal of Electronic Defense (June 1996): 3740. Macedonia, Michael R. “Information Technology in Desert Storm.” Military Review (October 1992): 34-41. Matthys, Erick T. “Harnessing Technology for the Future.” Military Review (May-June 1995): 7176. Maxwell, Arthur G., Jr. Joint Training for Information Managers. Washington, DC: Center for Advanced Concepts and Technology, Institute for National Strategic Studies, NDU, May 1996. Maze, Rick. “Military Computers Vulnerable to Intrusion.” Navy Times (July 29, 1996): 25. Messmer, Ellen. “Report Pushes for Military Buildup on the Net.” Network World (January 20, 1997): 31. Nifong, Michael R. “The Key to Information Dominance.” Military Review (May-June 1996): 62-67.

132 North, David. “U.S. Using Disinformation Policy to Impede Technical Data Flow.” Aviation Week and Space Technology (March 17, 1986): 16-7. Roberts, Eric. “Programming and the Pentagon.” Abacus 4 (Summer 1987): 54-7. Schell, R.R., et al. Preliminary Notes on the Design of Secure Military Computer Systems, MCI-73-1. HQ Electronic Systems Division. Hanscom AFB, MA, January 1973. Szafranski, Richard. “Neocortical Warfare? The Acme of Skill.” Military Review (November 1994): 41-55. Thompson, Mark and Douglas Waller. “If War Comes Home.” Time (August 21, 1995): 44-46.

Bandits

Adelson, Alan M. “Computer Bandits.” True (February 1969): 50. Barrett, Daniel J. Bandits on the Information Superhighway. Sebastopol, CA: O’Reilly, 1996. Bright, Herbert S. and Richard L. Enison. “Outline of a Bandit Program: A Self- Effacing Trojan Horse Scenario.” Technical Note 913-30. Bethesda, MD: COMPLAN, 1977. In Charles Bachman Papers, 1951-1996. Box 6, Folder 9. CBI 125. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN.

Telegraph

“Inviolability of Telegrams.” New York Tribune, January 11, 1880, p. 5. Plum, William. The Military Telegraph During the Civil War. Chicago, 1882. “Privacy of Telegrams.” New York Tribune, December 26, 1876, p. 1. “Privacy of the Telegraph.” New York Times, March 21, 1879, p. 1.

Right to Be Let Alone

Adams, Richard H., Jr. “The Right to Be Let Alone.” University of Florida Law Review 17 (1965): 597-608. Caine, Burton. “Computers and the Right to Be Let Alone: A Civil Libertarian View.” Villanova Law Review 22 (1977): 1181-90. Craven, J. Braxton, Jr. “Personhood: The Right to Be Let Alone.” Duke Law Journal (September 1976): 699-720. Ernst, Morris L. and Alan U. Schwartz. Privacy: The Right to Be Let Alone. New York: The Macmillan Company, 1962. Freese, Jan. “The Right to Be Alone in Sweden.” Transnational Data Report 6 (December 1983): 447-9. Gerstein, Robert S. Privacy: The Right to Be Left Alone. New York: Houghton Mifflin, 1973. Linowes, David F. “Right to Be Left Alone.” Business and Society Review 18 (1976): 77-8.

Unintended Consequences

Alberts, David S. The Unintended Consequences of Information Age Technologies. Washington, DC: Center for Advanced Concepts and Technology, Institute for National Strategic Studies, NDU, 1996.

Eavesdropping

133

Buchwald, D.D. “Eavesdropping, Informers, and the Right of Privacy: A Judicial Tightrope.” Cornell Law Quarterly 52 (Summer 1967): 975-1001. Dash, Samuel, et al. The Eavesdroppers. New Brunswick, NJ: Rutgers University Press, 1959. “Gadgets with Big Ears: An End to Privacy?” U.S. News & World Report 38 (April 22, 1955): 46-8. Godwin, Mike. “Government Eavesdropping (Thinking Clearly About Digital Telephony.” Internet World (September 1994): 93-5. * Godwin, Mike. “To Tap or Not to Tap.” Communications of the ACM 36 (March 1993): 34-5. Henzi, F. “Electronic Eavesdropping.” Illinois Bar Journal 56 (July 1968): 938. Markoff, John. “New Communication System Stirs Talk of Privacy vs. Eavesdropping.” New York Times, April 16, 1993. Metelski, J. “Achieving Communications Privacy Through Revision of the Eavesdropping Laws.” Federal Communications Law Journal 30 (1978): 135-47. Paulsen, Monrad G. The Problems of Electronic Eavesdropping. Philadelphia: American Law Institute, 1977. Purgslove, S.D. “The Eavesdroppers: ‘Fallout’ from R&D.” Electronic Design (June 21, 1966): 35-43. Runft, J.L. “Electronic Eavesdropping Threat to the Right of Privacy: Can the States Help?” Idaho Law Review 3 (Fall 1966): 13. Schroeder, Russell H., Jr. “Fourth Amendment, Electronic Eavesdropping, and the Invasion of Privacy.” South Dakota Law Review 17 (1972): 238-50. Schwartz, Herman. “Electronic Eavesdropping: What the Supreme Court Did Not Do.” Criminal Law Bulletin 4 (March 1968): 83. Schwartz, Herman. “The Legitimation of Electronic Eavesdropping: The Politics of ‘Law and Order.’” Michigan Law Review 67 (January 1969): 455-510. Westin, Alan F. “Privacy: Use of Eavesdropping Devices.” McCall’s 95 (February 1968): 58-9. Westin, Alan F. “The Snooping Machine.” Playboy 15 (May 1968), 130-32, 152-7.

Wiretapping

American Civil Liberties Union. Big Brother in the Wires: Wiretapping in the Digital Age. March 1998. Branscomb, Lewis M. and Anne Wells Branscomb. “To Tap or Not to Tap.” Communications of the ACM 36 (March 1993): 36-7. Brownell, Herbert. “The Public Security and Wire Tapping.” Cornell Law Quarterly (1954): 195-212. Chartrand, Sabra. “Clinton Gets a Wiretapping Bill That Covers New Technologies.” New York Times, October 9, 1994, p. A27. Corn, Robert L. “Wireless Tapping.” Reason 17 (August 1985): 20-9. Courtney, Jeremiah. “Electronic Eavesdropping, Wiretapping, and Your Right to Privacy.” Federal Communications Bar Journal (1973): 1-60. * Denning, Dorothy Elizabeth R. “To Tap or Not to Tap.” Communications of the ACM 36 (March 1993): 26-33. Fadiman, Clifton. “Please Tap My Wire, I Like It!” Holiday (July 1964): 12-7. Fitzgerald, Patrick and Mark Leopold. Stranger on the Line: The Secret History of Phone Tapping. London: Bodley Head, 1987. Greenawalt, Kent. “The Consent Problem in Wiretapping and Eavesdropping: Surreptitious Monitoring with the Consent of a Participant in a Conversation.” Columbia Law Review 68 (February 1968): 189-240.

134 Markoff, John. “Flaw Discovered in Federal Plan for Wiretapping.” New York Times, June 2, 1994, p. A1. Marx, Gary T. “To Tap or Not to Tap.” Communications of the ACM 36 (March 1993): 41. McGee, Jim. “Tension Rises Over Digital Taps.” Washington Post, October 27, 1996, p. H1. “‘No Great Feat to Wiretap’ Says Canadian Computer Professor.” Computerworld (November 25, 1970). “Phone ‘Phreaks’ Just Can’t Tap Data Line Alone.” Computerworld (October 20, 1971): 3. Rivest, Ronald L. “To Tap or Not to Tap.” Communications of the ACM 36 (March 1993): 39-40. Rotenberg, Marc. “To Tap or Not to Tap.” Communications of the ACM 36 (March 1993): 36-9. Rotenberg, Marc. “Wiretapping Bill: Costly and Intrusive.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 664-8. San Diego: Academic Press, 1996. Schwartz, Herman. “Wiretapping and Eavesdropping: Pros and Cons.” Current History 53 (July 1967): 31-7. Schwartz, Herman. “The Wiretapping Problem.” Colleague 4 (October 1967): 4-9. Solomon, K.I. “Wiretapping and Bugging: A Counter Proposal.” New York State Bar Journal 40 (February 1968): 94. Steele, Shari. “EFF Organizes Coalition to Oppose Wiretap Proposal.” Networks & Policy 1 (1993). Wirbel, Loring. “Somebody is Listening.” The Progressive 44 (November 1980): 16-9.

Viruses

Anthes, Gary H. “Virus Fighters Face Expanding Threat.” Computerworld 28 (June 20, 1994): 39-41. Beard, Jonathan. “Virus Busters Bet a Shot in the Arm.” New Scientist 141 (January 15, 1994): 18-9. Branscomb, Anne Wells. Rogue Computer Programs—Viruses, Worms, Trojan Horses, and Time Bombs: Pranks, Prowess, Protection, or Prosecution? Harvard Center for Information Policy Research, 1989. Chapman, Gary. “CPSR Statement on the Computer Virus.” Communications of the ACM 32 (June 1989): 699. * Cohen, Frederick. “Computer Viruses.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 641-64. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Cohen, Frederick. “Computer Viruses.” Ph.D. diss., University of Southern California, 1986. Cohen, Frederick. “Computer Viruses: Theory and Experiments.” In Computer Security: A Global Challenge, eds. J. Finch and E. Dougall, 143-57. Elsevier: North- Holland, 1984. Cohen, Frederick. “Friendly Contagion.” Sciences 31 (September 1991): 22-8. Cohen, Frederick. “On the Implications of Computer Viruses and Methods of Defense.” Computers & Security 7 (April 1988): 167-84. “Computer Viruses: Is There a Legal ‘Antibiotic’?” Rutgers Computer & Technology Law Journal 16 (1990): 253-84. Dehaven, John. “Stealth Virus Attacks.” Byte 19 (March 1994): 137-42. Denning, Dorothy Elizabeth R. “The Science of Computing: Computer Viruses.” American Scientist 76 (May-June 1988): 236-8. Denning, Peter J., ed. Computers Under Attack: Intruders, Worms, and Viruses. New

135 York: ACM Press, 1990. Desilets, R.B., Jr. “Software Vendors’ Exposure to Products Liability for Computer Viruses.” Computer/Law Journal 9 (Fall 1989): 509-26. Dvorak, John C. “Virus Wars: A Serious Warning.” PC Magazine (February 1988): 71. Evancoe, Paul R. and Mark Bentley. “Computer Viruses Loom As Future Era Weapons.” National Defense (February 1994): 19-21. Fites, Philip E. The Computer Virus Crisis. New York: Van Nostrand Reinhold, 1992. Gunn, J.B. “Use of Virus Functions to Provide a Virtual APL Interpreter Under User Control.” Communications of the ACM (1974): 163-8. Hayes, Arthur S. “Establishing Liability for Computer Viruses.” Wall Street Journal, October 26, 1990, p. B1. Highland, Harold Joseph. “A History of Computer Viruses: Introduction.” Computers & Security 16 (1997): 412-5. Highland, Harold Joseph. “A History of Computer Viruses: The Famous ‘Trio.’” Computers & Security 16 (1997): 416-29. Highland, Harold Joseph. “A History of Computer Viruses: Three Special Viruses.” Computers & Security 16 (1997): 430-8. Hoffman, Lance J. Rogue Programs: Viruses, Worms, and Trojan Horses. New York: Van Nostrand Reinhold, 1990. Hruska, Jan. Computer Viruses and Anti-Virus Warfare. Chichester, UK: Ellis Horwood, 1990. Kane, Pamela. V.I.R.U.S. Protection: Vital Information Resources Under Seige. New York: Bantam Books, 1989. King, Kenneth M. “Overreaction to External Attacks on Computer Systems Could Be More Harmful Than the Viruses Themselves.” Chronicle of Higher Education (November 23, 1988). Kluth, Daniel J. “The Computer Virus Threat: A Survey of Current Criminal Statutes.” Hamline Law Review 13 (Spring 1990): 297-312. Levin, R. Computer Virus Handbook. New York: McGraw-Hill, 1990. Lewyn, Mark. “‘Killer’ Computer Viruses: An Idea Whose Time Shouldn’t Come.” Business Week (July 23, 1990): 30. Lore, Lew, et al. “Vengeance by ‘Virus.’” U.S. News & World Report 105 (October 3, 1988): 10. Louw, Eric and Neil M. Duffy. Managing Computer Viruses. Oxford: Oxford University Press, 1992. Markoff, John. “Can Computer Viruses Be Domesticated to Serve Mankind?” New York Times, October 6, 1991, p. D18. Markoff, John. “U.S. Moving to Restrict Access to Facts About Computer Virus.” New York Times, November 11, 1988, p. A28. Markoff, John. “Virus Outbreaks Thwart Computer Experts.” New York Times, May 30, 1989, p. C1. McAfee, J. and C.Haynes. Computer Viruses, Worms, Data Didlers, Killer Programs, and Other Threats to Your System. New York: St. Martin’s Press, 1989. Moore, Thomas H. “Colleges Seem Vulnerable to Legal Actions Arising from Computer Viruses.” Chronicle of Higher Education 35 (June 28, 1989): p. A1, A20. Pozzo, M. and T.E. Gray. “An Approach to Containing Computer Viruses.” Computers and Security 6 (1987): 321-31. Rheingold, Howard. “Computer Viruses.” Whole Earth Review (September 22, 1988). Richardson, Doug. “More Pernicious Computer Viruses Menace, Germinate.” Signal (December 1991): 64. Schemo, Diana Jean. “Software Maker Accused of Using Virus to Compel Client to Pay Bill.” New York Times, November 23, 1993, p. A1. Schmeridewaind, John. “The Virus Perpetrator: Criminal or Hero?” San Francisco

136 Chronicle, November 23, 1988, p. C1. Spafford, Eugene H., et al. “A Computer Virus Primer.” In Computers Under Attack: Intruders, Worms, and Viruses, ed. Peter J. Denning. Reading, MA: Addison-Wesley, 1990. Spafford, Eugene H., et al. Computer Viruses: Dealing With Electronic Vandalism and Programmed Threats. Arlington, VA: ADAPSO, 1989. Stang, D.J. Computer Viruses. Second Edition. Washington, DC: National Computer Security Association, 1990. Stephenson, P. “Crackers, Viruses, and Things That Go Bump in the Night.” Computers in Accounting 7 (December 1991): 61-64. Sudetic, Chuck. “Bulgarians Linked to Computer Virus.” New York Times, December 21, 1990, p. A9. Trumbull, Mark. “Computer ‘Viruses’ Infiltrate Government.” Christian Science Monitor (July 14, 1988): p. 3. Wack, John P. and Lisa J. Carnahan. Computer Viruses and Related Threats: A Management Guide. Washington, DC: NIST, 1989. Webster, Anne E. “University of Delaware and the Pakistani Virus.” Computers & Security 8 (1989): 107-10. Zachary, G. Pascal. “Computer Viruses May Win Military Role.” Wall Street Journal, November 11, 1991, p. B1.

Juveniles

Altman, Michael, et al. “Juvenile Information Systems: A Comparative Analysis.” Juvenile Justice 24 (February 1974): 2-48. Cornelison, Ronald G. “JURIS: A Juvenile Court Information System.” Juvenile Justice 24 (February 1974): 35-41. Czajkoski, Eugene H. “Computer Backfire on the Ethical Mission of Juvenile Justice.” Juvenile Justice 24 (February 1974): 24-9. Griffeth, Robert E. “Orange County Sheriff’s Department Computerized Central Juvenile Index.” Juvenile Justice 24 (February 1974): 30-4. Horvath, Janice. “A Non-Technical Description of the Michigan Youth Services Information System.” Juvenile Justice 24 (February 1974): 19-23. “Implementation of PROFILE: Utah’s Juvenile Information System.” Juvenile Justice 24 (February 1974): 12-8. MacDonald, Malcolm E. “Confidentiality and Security of Computerized Records.” Juvenile Justice 24 (February 1974): 42-8.

Ultra

Calvocoressi, Peter. Top Secret Ultra. New York: Pantheon Books, 1981. Erskine, Ralph. “Ultra and the Polish Contribution.” Cryptologia 9 (1985): 322. Lewin, Ronald. Ultra Goes to War. New York: Farrar Straus, 1978. Smith, Bradley F. The Ultra-Magic Deals and the Most Special Relationship, 1940- 1946. Novato, CA: Presidio, 1993. Welchman, Gordon. “From Polish Bomba to British Bombe: The Birth of Ultra.” Intelligence and National Security 1 (1986): 71. Welchman, Gordon. The Hut Six Story: Breaking the Enigma Codes. New York: McGraw Hill, 1982. Winterbotham, F.W. The Ultra Secret. New York: Dell Publishing Company, 1974.

Enigma

137 Bertrand, Gustave. Enigma: ou la plus Grande Engime de la Guerre, 1939-1945. Paris, 1973. * Bloch, Gilbert and Ralph Erskine. “Enigma: The Dropping of the Double Encipherment.” Cryptologia 10 (July 1986): 134-41. * Deavours, Cipher A. “The Black Chamber: How the British Broke Enigma.” Cryptologia 4 (July 1980): 129-32. * Deavours, Cipher A. “The Black Chamber: La Methode des Batons.” Cryptologia 4 (October 1980): 240-7. Garliński, Józef. Intercept, The Enigma War. London: J.M. Dent & Sons, 1979. Harris, Robert. Enigma. Hutchinson, 1995. Hodges, Andrew. Turing: The Enigma. New York: Simon & Schuster, 1983. Kozaczuk, Wladyslaw. Enigma: How the German Machine Cipher Was Broken and How It Was Read by the Allies in World War Two. Frederick, MD, 1984. Stengers, Jean. “Enigma, the French, the Poles, and the British, 1931-1940.” In The Missing Dimension, ed. Christopher Andrew and David Dilks, 135. London, 1984.

Transaction

Ames, S.R. User Interface Multilevel Security Issues in a Transaction-Oriented Data Base Management System. MTP-178. Bedford, MA: The MITRE Corporation, December 1976. Chaum, David. “Security Without Identification: Transactions Systems to Make Big Brother Obsolete.” Communications of the ACM 28 (October 1985): 1030-44. Gray, Jim and A. Reuter. Transaction Processing: Concepts and Techniques. San Francisco, CA: Morgan Kaufmann Publishers, 1993. Johnson, Deborah G. “The Public-Private Status of Transactions in Computer Networks.” In The Information Web, ed. C. Gould, 37-55. San Francisco, CA: Westview Press, 1989.

DARPA

Anderson, R.H. and A.C. Hearn. An Exploration of Cyberspace Security R & D Investment Strategies for DARPA: The Day After . . . in Cyberspace. MR-797-DARPA. 1996.

Roe v. Wade

Baker, Tyler. “Roe and Paris: Does Privacy Have a Principle?” Stanford Law Review 26 (1974): 1161-89.

Anti-War Protestors

“Anti-War Protestors Erase 1,000 Dow Tapes.” Computerworld (December 3, 1969): 1. “Students Protest Labs, Occupy Center.” Computerworld (February 24, 1971): 4.

Misuse

Adams, J. Mack. Social Effects of Computer Use and Misuse. New York: John Wiley and Sons, 1976. Foltz, Charles Bryan. “The Impact of Deterrent Countermeasures Upon Individual Intent to Commit Misuse: A Behavioral Approach.” Ph.D. diss., University of Arkansas, 2000.

138 Lundell, E. Drake, Jr. “‘Absent’ Dper Cites City Misuse.” Computerworld (December 20, 1972): 4. “Precautions Preclude Misuse of Student Data.” Computerworld (March 4, 1970): 1. Reynolds, Jayne H. “Computer Misuse: A Look at Vulnerable Areas.” Best’s Review: Life/Health Edition (May 1971): 76. Ross, Joel E. “Computers: Their Use and Misuse.” Business Horizons (April 1972): 55-60. Sacco, V.F. and E. Zureik. “Correlates of Computer Misuse: Data From a Self- Reporting Sample.” Behaviour & Information Technology 9 (1990): 353-69. Snapper, John W. “On Whether a Misuse of Computer Technology is a Violation of Personal Privacy.” In The Information Web, ed. C. Gould, 71-86. San Francisco, CA: Westview Press, 1989. Swan, Peter N. “Privacy and Record Keeping: Remedies for the Misuse of Accurate Information.” North Carolina Law Review 54 (1976): 585-621.

Library Records

Batty, C. David. “Strain on the Quality of Mercy; or, Has the Computer a Conscience?” Library Journal 93 (December 15, 1968): 4619-20. Crooks, Joyce M. “Civil Liberties, Libraries, and Computers.” Library Journal 101 (February 1, 1976): 482-7. Hinz, Carolyn M. “Brown v. Johnston: The Unexamined Issue of Privacy in Public Library Circulation Records in Iowa.” Iowa Law Review 69 (1984): 535-50. Jacob, M.E.L. and D.L. Rings. “National and International Information Policies.” Library Trends 35 (Summer 1986): 119-69. Johnson, B.S. “A More Cooperative Clerk: The Confidentiality of Library Records.” Law Library Journal 81 (1989): 769-804. Maron, M.E. “Large Scale Data Banks: Will People Be Treated as Machines?” Special Libraries 60 (January 1969): 3-9. Swan, John C. “Public Records and Library Privacy.” Library Journal 108 (1983): 1645-50.

Confidentiality

Albisser, A.M., et al. “Patient Confidentiality, Data Security, and Provider Liabilities in Diabetes Management.” Diabetes Technology & Therapeutics 5 (2003): 631-40. Carroll, John Millar. Confidential Information Sources: Public and Private. Los Angeles: Security World Publishing, 1975. Comber, Edward V. “Management of Confidential Information.” In Proceedings of the Fall Joint Computer Conference, vol. 35, 135-43. Montvale, NJ: AFIPS Press, 1969. Curran, William J. and Rheta Bank. “The Multistate Information System and Confidentiality and Privacy Protection.” In Safeguarding Psychiatric Privacy: Computer Systems and Their Uses, eds. Eugene M. Laska and Rheta Bank, 405-45. New York: John Wiley and Sons, 1975. Curran, Willam J., et al. “Protection of Privacy and Confidentiality.” Science 182 (1973): 797-802. Dalenius, Tore. Matching Personal Files: A Threat to Individual Privacy, Confidentiality in Surveys. Report No. 21. March 31, 1977. NBS# 77139004. Box 672, Folder 11. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Fletcher, Patricia. “Current Issues in Confidentiality.” Computers and Society (Summer 1986): 8-17. Fredgant, Perry R. “Confidentiality of Personal Files in the Private Sector.” University

139 of California Davis Law Review 15 (1981-2): 473-92. Gevers, J.K.M. “Issues in the Accessibility and Confidentiality of Patient Records.” Social Science Medicine 17 (1983): 1181-90. Hansen, Morris H. “Insuring Confidentiality of Individual Records in Data Storage and Retrieval for Statistical Purposes.” In Proceedings of the Fall Joint Computer Conference, vol. 39, 579-85. Montvale, NJ: AFIPS Press, 1971. Hedderly, R. “Memory Banks, Data Banks, and Confidentiality.” Bulletin of the British Psychological Society 30 (1980): 121-3. Kobrin, Janet. “Confidentiality of Genetic Information.” UCLA Law Review 30 (1983): 1283-315. Lancaster, Betty Jean. “The Impact of the Computer on Patient Confidentiality: A Historical Review.” M.S.N. thesis, California State University, Dominquez Hills, 1994. Lee, Aileen A. “Electronic Data Processing in Private Hospitals: Patient Privacy, Confidentiality, and Control.” Suffolk University Law Review 13 (1979): 1386-1429. “No Basis for Assuming Software Can Ensure Confidential Systems.” Computerworld (November 27, 1971): 4. Nye, S.G. “Patient Confidentiality and Privacy: The Federal Initiative.” American Journal of Orthopsychiatry 50 (1980): 649-58. Oyen, Else. “The Social Functions of Confidentiality.” Current Sociology 30 (Summer 1982): 1-42. Perr, I.N. “Privacy, Privileged Communications, and Confidentiality.” In Critical Issues in American Psychiatry and the Law, ed. R. Rosner, 263-88. Springfield, IL: Charles C. Thomas Publisher, 1982. Rothstein, Mark A., ed. Genetic Secrets: Protecting Privacy and Confidentiality in the Genetic Era. New Haven, CT: Yale University Press, 1997. “Statistical Data Privacy and Confidentiality.” Transnational Data Report 6 (October- November 1983): 368-75. Study on Data Security and Confidentiality: Report to the Commission of the European Communities. 6 vols. 1980. Van Tassel, Dennis. “Keeping Confidential Information Confidential.” Journal of Systems Management (February 1969): 14-5. Westin, Alan F. “Legal Measures on National Levels to Protect Privacy and Confidentiality.” In Safeguarding Psychiatric Privacy: Computer Systems and Their Uses, eds. Eugene M. Laska and Rheta Bank, 365-80. New York: John Wiley and Sons, 1975. Winslade, William J. “Confidentiality.” In Encyclopedia of Bioethics, revised edition, ed. Warren Thomas Reich, 451-59. New York: Simon and Schuster Macmillan, 1995.

Genetic

Cranor, Carl F., ed. Are Genes Us? The Social Consequences of the New Genetics. New Brunswick, NJ: Rutgers University Press, 1994. Kobrin, Janet. “Confidentiality of Genetic Information.” UCLA Law Review 30 (1983): 1283-315. Reilly, Philip. Banking Our Genes: DNA Data on the Information Highway. Videorecording. Boston, MA: Eunice Kennedy Shriver Center, 1995. Rifkin, Jeremy. The Biotech Century: Harnessing the Gene and Remaking the World. New York: Jeremy P. Tarcher/Putnam, 1998. Rothstein, Mark A., ed. Genetic Secrets: Protecting Privacy and Confidentiality in the Genetic Era. New Haven, CT: Yale University Press, 1997. Winslade, William J. “Confidentiality.” In Encyclopedia of Bioethics, revised edition, ed. Warren Thomas Reich, 451-59. New York: Simon and Schuster Macmillan, 1995.

140 Attitudes

Anderson, Ronald E. “Sociological Analysis of Public Attitudes Toward Computers and Information Files.” In Proceedings of the Spring Joint Computer Conference, vol. 40, 649-57. 1972. Gardiner, W. Lambert. Public Acceptance of the New Information Technologies: The Role of Attitudes. Information Society Project. Paper no. I-9. Montreal, Canada: GAMMA, April 1980. Harris, Louis and Associates. The Dimensions of Privacy: A National Opinion Research Survey of Attitudes Toward Privacy. Stevens Point, WI: Sentry Insurance, 1979. Stone, E.F., et al. “A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations.” Journal of Applied Psychology 68 (August 1983): 459-68. Westin, Alan F. The Dimensions of Privacy: A National Opinion Research Survey of Attitudes Towards Privacy. New York: Garland, 1981.

Marketing

Cespedes, F.V. and H. J. Smith. “Database Marketing: New Rules for Policy and Practice.” Sloan Management Review 34 (Summer 1993): 7-22. Culnan, Mary J. “How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use.” MIS Quarterly 7 (September 1993): 341-63. Culnan, Mary J. and Robert J. Bies. “Managing Privacy Concerns Strategically: The Implications of Fair Information Practices for Marketing in the Twenty-First Century.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 149-67 Toronto, Canada: University of Toronto Press, 1999. David Shepard Associates, Inc. The New Direct Marketing: How to Implement a Profit-Driven Database Marketing Strategy. 2nd ed. Dow Jones-Irwin, 1995. Godin, Seth. Permission Marketing. Simon & Schuster, 1999. Hatch, Denison. “Privacy: How Much Data Do Direct Marketers Really Need?” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 669-78. San Diego: Academic Press, 1996. Laudon, Kenneth C. “Markets and Privacy.” Communications of the ACM 39 (1996): 92-104. Laudon, Kenneth C. “Markets and Privacy.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 697-726. San Diego: Academic Press, 1996. Liu, H. “Privacy-Implicated System Design in the Virtual Marketplace.” Ph.D. diss., Ohio State University, 1996. Morris, Linda and Steven Pharr. “Invasion of Privacy: A Dilemma for Marketing Research and Database Technology.” Journal of Information Systems Management 43 (1992): 10. O’Harrow, Robert, Jr. “CVS Also Cuts Ties to Marketing Service: Like Giant, Firm Cites Privacy on Prescriptions.” The Washington Post, February 19, 1998, p. E1. O’Harrow, Robert, Jr. “Data Firms Getting Too Personal?” Washington Post, March 8, 1998. Paul, Noel C. “How Marketers See You: They Go High Tech to Get Inside Your Head.” Christian Science Monitor, December 11, 2000. Posch, Robert. “Direct Marketing is Not a Significant Privacy Threat.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 679-85. San Diego: Academic Press, 1996. Schwartz, D.O. “Sharing Responsibility for E-Commerce and the Privacy Issue.”

141 Direct Marketing 61 (June 1998): 48-52.

Cyberattack

Anthes, Gary H. “U.S. Easy Target for Cyberattacks.” Computerworld (May 27, 1996): 7.

Free Speech

Glasser, Ira. “The Struggle for a New Paradigm: Protecting Free Speech and Privacy in the Virtual World of Cyberspace.” Nova Law Review 23 (1999): 627-8. Godwin, Mike. Cyber Rights: Defending Free Speech in the Digital Age. New York: Times Books, 1998. Godwin, Mike and T. Smith, eds. Cyber Rights: Privacy and Free Speech in the Digital Age. New York: Times Books, 1997. Lavelle, Marianne. “Next Rights Battle is Going Online: Infonauts Say Cybercops Trample Speech, Assembly, and Other Rights.” National Law Journal (July 25, 1994): A1.

Virtual

Antoff, Michael. “Living in a Virtual World.” Popular Science (June 1993): 124. Aukstakalnis, Steve and David Blatner. Silicon Mirage: The Art and Science of Virtual Reality. Berkeley, CA: PeachPit Press, 1992. Bacard, Andre. “Welcome to Virtual Reality.” The Humanist (March-April 1993): 42- 3. Carey, John, et al. “Virtual Reality: How a Computer-Generated World Could Change the Real World.” Business Week (October 5, 1992): 96-103. Corliss, Richard. “Virtual Man!” Time (November 1, 1993): 80-3. Hamilton, Joan, et al. “Virtual Reality: How a Computer-Generated World Could Change the Real World.” Business Week (October 5, 1992): 97-105. Hime, Michael. The Metaphysics of Virtual Reality. New York: Oxford University Press, 1993. Rosecrance, Richard. “The Rise of the Virtual State.” Foreign Affairs (July-August 1996): 45-61.

Society

Arquilla, John and David Ronfeldt, eds. Society and Security in the Information Age. Baltimore, MD: Johns Hopkins University Press, 1998. Beniger, James. The Control Revolution: The Technological and Economic Origins of the Information Society. Cambridge, MA: Harvard University Press, 1986. Burnham, David. “Tales of a Computer State.” Nation (April 1983). Burnham, David. The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics, and Our Democratic Process. New York: Random House, 1983. Ellul, Jacques. The Technological Society. New York: Vintage Books, 1964. Esquerra, Ronald Lee. “Personal Privacy in a Computer Information Society.” Ph.D. diss., The University of Arizona, 1982. Gill, Karamjit S., ed. Information Society: New Media, Ethics and Postmodernism. Springer-Verlag, 1996. Goodwin, G. and L. Humphreys. “Freeze-Dried Stigma: Cybernetics and Social Control.” Humanity and Society 6 (November 1982). Harris, Louis and Associates. The Road After 1984: The Impact of Technology on

142 Society. New Haven, CT: Southern New England Telephone, 1984. Hoffman, Lance J. “Impacts of Information System Vulnerabilities on Society.” In Proceedings of the National Computer Conference, vol. 51, 461-7. Arlington, VA: AFIPS Press, 1982. Hundley, Richard O. and Robert H. Anderson. Security in Cyberspace: An Emerging Challenge for Society. Santa Monica, CA: The Rand Corporation, 1994. Kling, Rob. “The Centrality of Organizations in the Computerization of Society.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 108-32. San Diego: Academic Press, 1996. Kling, Rob. “Computerization and Social Transformations.” Science, Technology & Human Values 16 (1991): 342-67. Kling, Rob. “Computers as Tools and Social Systems: The Car-Computer Analogy.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 16-21. San Diego: Academic Press, 1996. Krippendorff, Klaus, ed. Communication and Control in Society. New York: Gordon and Breach, 1979. Laudon, Kenneth C. Dossier Society: Value Choices in the Design on National Information Systems. New York: Columbia University Press, 1986. Lyon, David. The Information Society: Issues and Illusions. Oxford, UK: Basil Blackwell, 1988. MacBride, Robert. The Automated State: Computer Systems as a New Force in Society. New York: Chilton Book Company, 1967. Martin, James and Adrian R. Norman. The Computerized Society. Englewood Cliffs, NJ: Prentice-Hall Inc., 1970. Masuda, Yoneji. “Privacy in the Future Information Society.” Computer Networks 3 (1979): 164-70. Matley, Ben G. “A National Computer Policy: Forging the Final Synergy of Computers and Society.” In Proceedings of the National Computer Conference, vol. 53, 469-73. Reston, VA: AFIPS Press, 1984. Miller, Arthur R. “The Dossier Society.” University of Illinois Law Forum 2 (1971): 154-67. Miller, Arthur R. “Personal Privacy in the Computer Age: The Challenge of a New Technology in an Information-Oriented Society.” Michigan Law Review 67 (April 1969): 1089-1246. Mosco, Vincent. The Pay-Per Society: Computers and Communications in the Information Age. Toronto, Canada: Garamond, 1989. Packard, Vance. The Naked Society. New York: David McKay Co., 1964. Robins, Kevin and Frank Webster. “Plan and Control: Towards a Cultural History of the Information Society.” Theory and Society 18 (1989): 323-51. Tollett, Kenneth S. “Bugs in the Driving Dream: The Technocratic War Against Privacy.” Howard Law Journal 17 (1971-73): 775-96. Turn, Rein and Eric J. Novotny. “Resiliency of the Computerized Society.” In Proceedings of the National Computer Conference, vol. 51, 341-9. Arlington, VA: AFIPS Press, 1982. Walker, Martin. “Computer-Watched Society.” World Press Review 27 (December 1980): 55. Ware, Willis H. “Computers and Society: The Technological Setting.” P-5094. Santa Monica, CA: The Rand Corporation, 1973. Ware, Willis H. “Computers in Society’s Future.” P-4684. Santa Monica, CA: The Rand Corporation, 1971. Webster, Frank and Kevin Robins. “Plan and Control: Towards a Cultural History of the Information Society.” Theory and Society (1989): 334. Wilson, Kevin Gerard. Technologies of Control: The New Interactive Media for the

143 Home. Madison, WI: University of Wisconsin Press, 1988. Wriston, Walter B. The Twilight of Sovereignty: How the Information Revolution is Transforming Our World. New York: Scribners, 1992. Yates, Joanna. Control Through Communication. Baltimore, MD: Johns Hopkins University Press, 1989.

Dossier

Aryek, Neier. Dossier: The Secret Files They Keep on You. New York: Stein and Day, 1975. Countryman, Vern. “Computers and Dossiers.” The Nation 213 (August 30, 1971): 134-49. Countryman, Vern. “Computers and Dossiers: Part I.” Computers and Automation (January 1972). Countryman, Vern. “Computers and Dossiers: Part II.” Computers and Automation (February 1972). Countryman, Vern. “The Diminishing Right of Privacy: The Personal Dossier and the Computer.” Texas Law Review 49 (1971): 837-71. Davies, L.E. “Computer Plan for Personal ‘Dossiers’ in Santa Clara Stirs Fears of Invasion of Privacy.” New York Times, August 1, 1966, p. 27. Hoffman, Lance J. and W.F. Miller. “Getting a Personal Dossier from a Statistical Data Bank.” Datamation (May 1970): 74-5. Kaysen, C. “Data Banks and Dossiers.” Public Interest (Spring 1967): 265. Lundell, E. Drake, Jr. “Disclosure of Federal Dossiers Proposed.” Computerworld (June 28, 1972): 1. * Miller, Arthur R. The Assault on Privacy: Computers, Data Banks, and Dossiers. Ann Arbor: The University of Michigan Press, 1971. Mitgang, Herbert. Dangerous Dossiers. New York: Ballantine Books, 1989. Neier, Aryeh. Dossier: The Secret Files They Keep on You. New York: Stein and Day, 1975. Wheeler, Stanton, ed. Files and Dossiers in American Life. New York: Russell Sage Foundation, 1970. Wheeler, Stanton, ed. On Record: Files and Dossiers in American Life. New York: Russell Sage Foundation, 1969.

Countermeasures

Attanasio, C.R. An Approach to Countermeasures to System Penetrations. Research Report RC-6782 10/5/77. Yorktown Heights, NY: IBM T.J. Watson Research Center. Denning, Dorothy Elizabeth R. and Peter J. Denning, eds. Internet Besieged: Countering Cyberspace Scofflaws. Reading, MA: Addison-Wesley, 1997. Lee, James G. Counterspace Operations for Information Dominance. Maxwell AFB, AL, School of Advanced Airpower Studies, Air University, October 1994.

Keys

Bank, David. “The Keys to the Kingdom.” San Jose Mercury News, June 27, 1994. Bride, Edward J. “Firms Offer Card, Key Systems for Data Security.” Computerworld (August 26, 1970). Elmer-DeWitt, Philip. “Who Should Keep the Keys.” Time (March 14, 1994). Gordon, J. “Strong RSA Keys.” Electronics Letters 20 (1984): 514-6. Jones, R.W. “Some Techniques for Handling Encipherment Keys.” ICL Technical Journal 3 (1982): 175-88.

144 “Key Punch Crooks.” Time (December 25, 1972): 69. Krewson, N.N. and J.B. Tait. “Holographic Security Key.” IBM Technical Disclosure Bulletin 14 (May 1972): 3832-4. Markoff, John. “Cyberspace Under Lock and Key.” New York Times, February 13, 1994, p. D4. Markoff, John. “Wrestling Over the Keys to the Codes.” New York Times, May 9, 1993, p. C9. Moore, J.H. and G.J. Simmons. “Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys.” IEEE Transactions on Software Engineering 13 (1987): 262-73. Morton, Thomas J. “Prevention of Public Access ‘Key’ to DP Center Security.” Computerworld (June 9, 1971): 2. U.S. Council for International Business. Statement of the United States Council for International Business on the Key Escrow Chip. New York: U.S. Council for International Business, 1993.

Utility

Baran, Paul. “The Coming Computer Utility: Laissez-Faire, Licensing, or Regulation?” P-3466. Santa Monica, CA: The Rand Corporation, April 1967. Baran, Paul. “Communication Policy Issues for the Coming Computer Utility.” P-3685. Santa Monica, CA: The Rand Corporation, May 1968. Bushnell, D.D. “The Information Utility and the Right of Anonymity.” Educational Technology 7 (December 30, 1967). Graham, Robert M. “Protection in an Information Processing Utility.” Communications of the ACM 11 (May 1968): 365-9. Sackman, H. and N. Nie, eds. The Information Utility and Social Choice. Montvale, NJ: AFIPS Press, 1970. Sprague, Richard E. “The Invasion of Privacy and a National Information Utility for Individuals.” Computers and Automation (January 1970): 48-9. Vanderbilt, D. Controlled Information Sharing in a Computer Utility. MAC-TR-67. Cambridge, MA: MIT, Project MAC, October 1969.

Stalking

Banks, Michael A. Web Psychos, Stalkers, and Pranksters. Coriolis Group, 1997. Marzulli, John. “Cops Go High-Tech to Net Stalkers.” Daily News, October 21, 1999, p. 32.

Anonymity

Bushnell, D.D. “The Information Utility and the Right of Anonymity.” Educational Technology 7 (December 30, 1967). Clark, G. and M. Acey. “Mondex Blows Users’ Anonymity.” Network Week 1 (1995): 1. Cohen, Julie E. “A Right to Read Anonymously: A Closer Look at ‘Copyright Management’ in Cyberspace.” Connecticut Law Review 28 (1996): 981-1019. Froomkin, A. Michael. “Anonymity and Its Enmities.” Journal of Online Law 1.1. Information and Privacy Commissioner (Ontario, Canada) and Registratiekamer (Netherlands). Privacy Enhancing Technologies: The Path to Anonymity. 2 vols. 1995. Martin, David Michael, Jr. “Local Anonymity in the Internet.” Ph.D. diss., Boston University, 1999.

145 Mendels, Pamela. “The Two Faces of Online Anonymity.” New York Times, July 21, 1999. Wallace, Jonathan D. “Nameless in Cyberspace: Anonymity on the Internet.” Cato Briefing Papers 54 (December 8, 1999).

People

Baran, Paul. “Communications, Computers, and People.” In Proceedings of the Fall Joint Computer Conference, vol. 27, pt. 2, 45-49. Washington, DC: Thompson Book Company, 1965. Baran, Paul. “Communications, Computers, and People.” P-3235. Santa Monica, CA: The Rand Corporation, 1964. Baran, Paul. “Communications, Computers, and People.” In Proceedings of the Fall Joint Computer Conference, vol. 27, pt. 1, 243-47. Washington, DC: Spartan Books Inc., 1965.

Human Nature & Values

Baude, P. “High Technology, the Human Image, and Constitutional Value.” Indiana Law Review 18 (Summer 1985): 643-53. Berry, Dianne and Anna Hart, eds. Expert Systems: Human Issues. Cambridge, MA: MIT Press, 1990. Cater, Douglass. “The Survival of Human Values.” Journal of Communication 31 (1981): 190-4. Dunlop, Charles and Rob Kling, eds. Computerization and Controversy: Value Conflicts and Social Choices. Boston: Academic Press, 1991. Forester, Tom, ed. Computers in the Human Context. New York: Basil Blackwell, 1989. Fried, Charles. An Anatomy of Values. Cambridge, MA: Harvard University Press, 1970. Fukuyama, Francis. The Great Disruption: Human Nature and the Reconstitution of Social Order. Free Press, 1999. Hickman, Larry A., ed. Technology as a Human Affair. New York: McGraw Hill, 1990. Milberg, S., et al. “Values, Personal Information, Privacy, and Regulatory Approaches.” Communications of the ACM 38 (1995): 65-74. Rosenberg, Jerry Martin. “Human and Organizational Implications of Computer Privacy.” In Proceedings of the National Computer Conference, vol. 45, 39-43. Montvale, NJ: AFIPS Press, 1976. Sheridan, Thomas B. “Computer Control and Human Alienation.” Technology Review (October 1980). Uhlig, Ronald P. “Human Factors in Computer Message Systems.” Datamation 23 (May 1977): 120-6. Ware, Willis H. “Computers, Personal Privacy, and Human Choice.” P-5149. Santa Monica, CA: The Rand Corporation, 1973.

Alienation

Inness, Julie C. Privacy, Intimacy and Isolation. New York: Oxford University Press, 1992. Sheridan, Thomas B. “Computer Control and Human Alienation.” Technology Review (October 1980).

Police

146

Barlow, John Perry. “Jackboots on the Infobahn.” Wired (April 1994): 40-8. “Computers Outfoxed, But Not the Police, in Check-Kiting Caper: Theft Exceeding $880,000.” The Wall Street Journal (March 13, 1970): 15. Garrison, O.V. Spy Government: The Emerging Police State in America. New York: L. Stuart, 1967. Greenman, Catherine. “A Well-Equipped Patrol Officer: Gun, Flashlight, Computer.” New York Times, January 21, 1999. Janssen, R.F. “Administration Studies Plan to Generalize Data; Hopes to Avoid ‘Police State’ Image.” The Wall Street Journal, November 11, 1966, p. 6. Schiedermayer, P.L. “The Many Aspects of Computer Security.” The Police Chief (July 1970): 20. “Warrant Requirement for Searches of Computerized Information.” Brigham Young University Law Review 67 (January 1987): 179-212. Winick, Raphael. “Searches and Seizures of Computers and Computer Data.” Harvard Journal of Law and Technology 75 (1994): 105-6.

Engineer

Baran, Paul. “On the Future Computer Era: Modification of the American Character and the Role of the Engineer; or, A Little Caution in the Haste to Number.” P-3780. Santa Monica, CA: The Rand Corporation, October 1968. Baxter, Stephen and David Lisburn. Reengineering Information Technology: Success Through Empowerment. New York: Prentice-Hall, 1994. Raizman, Marc. “The Engineer and Society: Role in Bugging Devices Examined.” Electronic News (April 1, 1968): 28. Turn, Rein. “Toward Data Security Engineering.” P-5142. Santa Monica, CA: The Rand Corporation, 1974. Wood, F.B. “The of Engineers and Scientists.” In Proceedings of the Western Joint Computer Conference, vol. 15, 310-13. New York: Institute of Radio Engineers, March 1959.

Word Processing

Barker, Jane and Hazel Downing. “Word Processing and the Transformation of Patriarchal Relations of Control in the Office.” Capital and Class 10 (1980): 64-99. Barker, Jane and Hazel Downing. “Word Processing and the Transformation of Patriarchal Relations of Control in the Office.” In The Social Shaping of Technology, ed. Donald McKenzie and Judy Wajcman. Milton Keynes, UK: Open University Press, 1985.

Soul

Barrett, William. The Death of the Soul: From Descartes to the Computer. New York: Anchor Press, 1986.

Distributed Systems

Barwise, Jon and Jerry Seligman. Information Flow: The Logic of Distributed Systems. Cambridge, UK: Cambridge University Press, 1997. Lampson, Butler W., et al. Distributed Systems: Architecture and Implementation. Springer-Verlag, 1981. Rushby, J.M. and B. Randell. “A Distributed Secure System.” IEEE Computer 16

147 (1983): 55-67. * Sherwood, John. “Distributed Systems.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 797-819. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Von Glahn, Peter Grant. “A Distributed System Architecture for Handling Sensitive Information in the Automated Office.” Ph.D. diss., University of Delaware, 1985.

Responsibility

Bechtel, William. “Attributing Responsibility to Computer Systems.” Metaphilosophy 16 (October 1985): 296-305. “Individual Responsibility.” Data Systems News (February 1969): 4. Lanier, Jaron. “Karma Vertigo: Or Considering the Excessive Responsibilities Placed on Us by the Dawn of the Information Infrastructure.” Netview: Global Business Network News 6 (Winter 1994-5). “Manufacturer Has Special Responsibility for Security Safeguards, Says FCC’s Lee.” Computerworld (December 16, 1970): 7. Snapper, John W. “Responsibility for Computer-Based Errors.” Metaphilosophy 16 (October 1985): 289-95. Westin, Alan F. “Privacy Rights and Responsibilities in the Next Era of the Information Age.” In Toward an Information Bill of Rights and Responsibilities, ed. C. Firestone and J. Schement. Aspen Institute, 1995.

Cipher

Beker, Henry and Fred Piper. Cipher Systems: The Protection of Communication. London: Northwood Books, 1982. Cooke, Jean. Codes and Ciphers. Wayland, 1990. Copland, Miles. Beyond Cloak and Cipher. New York: Pennacle Books, 1975. * D’Agapeyeff, Alexander. Codes and Ciphers. London: Oxford University Press, 1939. Gardner, Martin. “A New Kind of Cipher That Would Take Millions of Years to Break.” Scientific American 237 (August 1977). Gardner, Martin. Penrose Tiles to Trapdoor Ciphers. New York: Freeman, 1989. Gewffe, P.R. “How to Protect Data with Ciphers That are Really Hard to Break.” Electronics (January 4, 1973): 99-101. Kugel, H.C. “Three Cipher-Decipher Programs Make Good OS/360 Demo’s.” Canadian Datasystems (April 1972): 38-40. Laffin, John. Codes and Ciphers. New York: Abelard-Schuman, 1964. Mansfield, Louis C.S. One Hundred Problems in Cipher. London: A. Maclehose & Co., 1936. Mansfield, Louis C.S. Solutions of Codes and Ciphers. London: A. Maclehose & Co., 1936. Peleg, Shmuel and Azriel Rosenfeld. “Breaking Substitution Ciphers Using a Relaxaton Algorithm.” Communications of the ACM 22 (November 1979): 598-605. * Pratt, Fletcher. Secret and Urgent: The Story of Codes and Ciphers. Indianapolis, IN: The Bobbs-Merrill Company, 1939. Tuckerman, B. A Study of the Vigenere-Vernan Single and Multiple Loop Enciphering Systems. Report RC 2879. Yorktown Heights, NY: T.J. Watson Research Lab, 1970. Weber, Ralph E. United States Diplomatic Codes and Ciphers. Chicago, 1979. Wilson, Charles J. “Solving Ciphers.” Personal Computing 4 (June 1980): 78-9. Wrixon, Fred B. Codes and Ciphers. Englewood Cliffs, NJ: Prentice-Hall, 1992.

Cyberspace

148

* Barlow, John Perry. “Private Life in Cyberspace.” Communications of the ACM (August 1991): 23-5. Black, Steven K. A Sobering Look at the Contours of Cyberspace. Pittsburgh, PA: Ridgway Center for International Security Studies, University of Pittsburgh, 1996. Kang, Jerry. “Information Privacy in Cyberspace Transactions.” Stanford Law Review 50 (1998): 1193-99. Ludlow, Peter, ed. High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace. Cambridge, MA: MIT Press, 1996. Miller, Steven E. Civilizing Cyberspace: Policy, Power, and the Information Superhighway. Reading, MA: Addison-Wesley, 1996. “No Sheriffs Patrol Universal Cyberspace Frontier Towns.” Signal (June 1996): 3942. Sussman, Vic. “Is Anything Safe in Cyberspace?” U.S. News and World Report (January 23, 1995): 55-60. Sussman, Vic. “Policing Cyberspace.” U.S. News & World Report (January 23, 1995): 55-60. Swaine, Michael. “Programming Paradigms: The Cyberspace Amendment.” Dr. Dobbs Journal (June 1991): 115.

Individual Rights

Bouvard, Marguerite Guzman and Jacques Bouvard. “Computerized Information and Effective Protection of Individual Rights.” Society 12 (September-October 1975): 62- 7. Curry, Michael R. “The Digital Individual and the Private Realm.” Annals of the Association of American Geographers 87 (1997): 681-99. Donovan, Bob. “Security and ‘Individual Privacy’: Part 3.” Security World (September 1967): 29-31, 38-9. Ervin, Samuel James, Jr. “The Computer: Individual Privacy.” Vital Speeches of the Day 33 (May 1, 1967): 421-6. Goldman, Janlori. “Privacy and Individual Empowerment in the Interactive Age.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 97-115. Toronto, Canada: University of Toronto Press, 1999. Reich, C.A. “Individual Rights and Social Welfare: The Emerging Legal Issues.” Yale Law Journal 74 (1965): 1245-57. Reidenberg, Joel R. “Privacy in the Information Economy: A Fortress or Frontier for Individual Rights?” Federal Communications Law Journal 44 (1992): 195-243. Rule, James B. “Preserving Individual Autonomy in an Information-Oriented Society.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 65-87. New York: Academic Press, 1980. Scaletta, Phillip J., Jr. “The Computer as a Threat to Individual Privacy.” Data Management (January 1971): 18-23. Shapiro, Andrew L. The Control Revolution: How the Internet is Putting Individuals in Charge and Changing the World We Know. New York: Public Affairs, 1999. Sieglerschmidt, H. “European Report on Data Processing and the Rights of the Individual.” Information Age 4 (1982): 170-81. Wood, S.G. “Computers and the Protection of Individual Liberties.” American Journal of Comparative Law 30 (1982): 583-600.

Risk

* Camp, L. Jean. Trust and Risk in Internet Commerce. Cambridge, MA: MIT Press, 2000.

149 Campbell, Robert P. and Gerald A. Sands. “A Modular Approach to Computer Security Risk Management.” In Proceedings of the National Computer Conference, vol. 48, 293-303. Montvale, NJ: AFIPS Press, 1979. Computers at Risk: Safe Computing in the Information Age. Washington, DC: National Academy Press, 1991. Duncan, G. and D. Lambert. “The Risk of Disclosure for Microdata.” Journal of Business and Economic Statistics 7 (1989): 207-17. Elgesem, Dag. “Privacy, Respect for Persons, and Risk.” In Philosophical Perspectives on Computer-Mediated Communication, ed. C. Ess. New York, 1996. Ericson, Richard V. and Kevin D. Haggerty. Policing the Risk Society. Toronto, Canada: University of Toronto Press, 1997. Hamilton, C.R. “Risk Management and Security.” Information Systems Security 8 (Summer 1999): 69-78. Hammer, Carl. “Risk Assessment and Computer Security.” Conference Presentation. Sperry Welfare Users Association Meeting, Harrisburg Pennsylvania. May 20-23, 1984. Harrisburg, PA. In Carl Hammer Papers, Box 11, Folder 23. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Hundley, Richard O. and Robert H. Anderson. A Qualitative Methodology for the Assessment of Cyberspace Related Risks. Santa Monica, CA: The Rand Corporation, 1996. * Moses, Robin. “Risk Analysis and Management.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 227-63. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Neumann, Peter G. Computer-Related Risks. ACM Press, 1994. Orwant, Carol J. “Securing Data and Software: Accessing Risks and Enhancing Protection.” IDC Publication No. 1180. Washington, DC, April 1990. Venemon, Kathleen Patricia. “An Assessment of Information Inference Risk from Statistical Queries.” Ph.D. diss., The University of Utah, 1991. Ward, G.M. and J.D. Harris. Managing Computer Risk. John Wiley and Sons, 1986.

Pen Registers

Fishman, Clifford S. “Pen Registers and Privacy: Risks, Expectations, and the Nullification of Congressional Intent.” Catholic University Law Review 29 (1979-80): 558-96.

Dating

Swarns, Rachel L. “Arrest at Columbia Shows Risks in Online Dating.” New York Times, December 8, 1996, p. 51.

Gang Databases

Berger, Leslie. “Gang Statistics Compiled in Vast Database.” Los Angeles Times, May 22, 1992.

Personal Data

Bing, Jon. “Classification of Personal Information with Respect to the Sensitivity Aspect.” In Databanks and Society: The First International Symposium on Data Banks and Society. Olso, Norway: Tromso, 1972. Clarke, Roger A. “The Resistable Rise of the National Personal Data System.”

150 Software Law Journal 5 (1992): 29-59. Estadella-Yuste, Olga. “The Draft Directive of the European Community Regarding the Protection of Personal Data.” International and Comparative Law Quarterly 41 (1992): 170-8. Graham, Jonathan P. “Privacy, Computers, and the Commercial Dissemination of Personal Information.” Texas Law Review 65 (June 1987): 1395-1439. Greggans, David and Simon Blunt. What They Know About You. London, UK: Bow Publications Ltd, 1974. Hosch, Heyward C. “The Interest in Limiting Disclosure of Personal Information: A Constitutional Analysis.” Vanderbilt Law Review 36 (January 1983): 139-97. “Interest in Limiting the Disclosure of Personal Information: A Constitutional Analysis.” Vanderbilt Law Review 36 (January 1983): 139-97. Karst, K.L. “‘The Files’: Legal Controls Over the Accuracy and Accessibility of Stored Personal Data.” Law and Contemporary Problems 31 (Spring 1966): 341-76. Linowes, David F. “Your Personal Information Has Gone Public.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 637-42. San Diego: Academic Press, 1996. Marx, Gary T. “For Sale: Personal Information About You.” Washington Post, December 11, 1989, p. A15. Moore, G.B., et al. Computer Science and Technology: Accessing Individual Records from Personal Data Files Using Non-Unique Identifiers. No. 003-003-01726-4; C13- 10-500-2. Washington, DC: National Bureau of Standards, 1977. Pestieau, Caroline. “Protecting Personal Data in the Public Sector: A Quebec Commissioner’s Toolbox.” Government Information Quarterly 4 (1987): 135-42. Ruggles, M. “Mixed Signals: Personal Data Control in the Intelligent Network.” Media Information Australia 67 (February 1993): 28-39. Rule, James B. and Lawrence Hunter. “Towards Property Rights in Personal Data.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 168-81. Toronto, Canada: University of Toronto Press, 1999. Sprague, Richard E. “Personalized Data Systems.” Business Automation (October 1969): 47. Tye, Larry. “‘Bill of Rights’ Sought to Limit Use of Personal Data.” Boston Globe, September 8, 1993, p. 1, 12-3. Ware, Willis H. “Handling Personal Data.” Datamation 23 (October 1977): 83-7.

Liberty

Campbell, Duncan. “Technology and Liberty.” New Statesman 107 (February 24, 1984). Gellhorn, Walter. Security, Loyalty, and Science. Ithaca, NY: Cornell University Press, 1950. Kapor, Mitchell. “Civil Liberties in Cyberspace.” Scientific American 265 (1991): 158- 64. Murphy, Paul L. World War I and the Origin of Civil Liberties in the United States. New York: W.W. Norton & Co., 1979. Westin, Alan F. “Life, Liberty, and the Pursuit of Privacy.” Think 35 (May-June 1969): 12-21.

Autonomy

Henkin, Louis. “Privacy and Autonomy.” Columbia Law Review 74 (1974): 1410-33. Rule, James B., et al. “Preserving Individual Autonomy in an Information-Oriented Society.” In Computer Privacy in the Next Decade, 65-87. New York: Academic

151 Press, 1980.

Strategic

Betts, Mitch. “Strategic Systems: Pitfalls in Stopping Competitors.” Computerworld (August 1989). Griffith, Thomas E. Strategic Attack of National Electrical Systems. Maxwell Air Force Base (AFB), AL: Air University, 1994. Wiseman, Charles. Strategic Information Systems. Homewood, IL: Irwin, 1988.

Name

Galloway, Joseph L. “How Your Privacy is Being Stripped Away: Your Name, and Much More, is Being Scrutinized Daily by Growing Legions of Business and Government Computers.” U.S. News 96 (April 30, 1984): 46-8. Gordon, Harold R. “Right of Property in Name, Likeness, Personality, and History.” Northwestern University Law Review 55 (1960): 553-613. Novak, Eleanor, et al. “The Value of Your Name.” Media, Culture, and Society (1990): 525-43. Savell, Lawrence E. “Right of Privacy: Appropriation of a Person’s Name, Portrait, or Picture for Advertising Purposes Without Prior Written Consent: History and Scope in New York.” Albany Law Review 48 (1983): 1-47. Schwartz, John. “How Did They Get My Name?” Newsweek (June 3, 1991): 40-2.

Weapon

Blazar, Ernest. “Planners: Information is the Best Weapon.” Navy Times (September 5, 1994): 8. Welch, Jonathan. “International Money Market: A Weapon in Waiting?” Royal United Services Institute (RUSI) Journal (April 1996): 3440.

Navy

Blazar, Ernest. “Planners: Information is the Best Weapon.” Navy Times (September 5, 1994): 8. Cooper, Pat. “New Effort Afoot to Keep Ships’ Computers Afloat.” Navy Times (November 20, 1995): 31. “Safeguarding the Info Highway.” Navy Times (October 16, 1995): 26.

Unix

Biba, K.J., et al. A Kernel-Based Secure UNIX Design. WP-21196. Bedford, MA: The MITRE Corporation, April 6, 1977. Curry, D.A. Improving the Security of Your UNIX System. SRI International, 1990. * Ferbrache, David and Gavin Shearer. “UNIX System Security.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 751-79. Oxford, UK: Butterworth- Heinemann Ltd, 1992. Garfinkel, Simson L. and Eugene H. Spafford. Practical UNIX Security. Sebastopol, CA: O’Reilly & Associates, 1991. Gramp, F.T. and R.H. Morris. “Unix Operating System Security.” AT&T Bell Laboratories Journal of Technology 63 (1984). Popek, Gerald J., et al. “UCLA Secure Unix.” In Proceedings of the National Computer Conference, vol. 48, 355-64. Montvale, NJ: AFIPS Press, 1979.

152 Wood, P.H. and S.G. Kochan. UNIX System Security. Hayden Books, 1985.

Trojan Horses

Bright, Herbert S. and Richard L. Enison. “Outline of a Bandit Program: A Self- Effacing Trojan Horse Scenario.” Technical Note 913-30. Bethesda, MD: COMPLAN, 1977. In Charles Bachman Papers, 1951-1996. Box 6, Folder 9. CBI 125. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Cook, Kara L. “Electronic Tracking Devices and Privacy: See No Evil, Hear No Evil, But Beware of Trojan Horses.” Loyola University of Chicago Law Journal 9 (1977): 227-47.

PGP

Garfinkel, Simson L. “Pretty Good Privacy (PGP).” In Encyclopedia of Computer Science, 4th ed., eds. Anthony Ralston, Edwin D. Reilly, and David Hemmendinger, 1421-2. London: Nature Publishing Group, 2000. Garfinkel, Simson L. PGP: Pretty Good Privacy. Sebastopol, CA: O’Reilly and Associates, 1995. Rose, Bruce D. “Phil Zimmermann’s Pretty Good Privacy: Issues, History, and Mechanics.” B.S. thesis, California Polytechnic State University, 1997. Warren, Jim C. “Is Phil Zimmermann Being Persecuted? Why? By Whom? Who’s Next?” MicroTimes (April 1995). Zimmermann, Philip. PGP: Source Code and Internals. MIT Press, 1995.

Strangers

Katz, James E. and Philip Aspden. “A Nation of Strangers?” In Cyberethics: Social & Moral Issues in the Computer Age, eds. Robert M. Baird, et al., 295-303. Amherst, NY: Prometheus Books, 2000.

Privacy, Business & Corporations

Bournazos, Kimon and Norman E. French. “Information Management and Privacy in Business.” Data Management (July 1971): 18-23. Branscomb, Anne Wells. Who Owns Information? From Privacy to Public Access. New York: Basic Books, 1994. Brenner, Walter and Lutz Kolbe, eds. The Information Superhighway and Private Households: Case Studies of Business Impacts. Physica-Verlag, 1996. Bride, Edward J. “Businesses Not Security-Conscious.” Computerworld (May 12, 1971): 1. Cavoukian, Ann and Tyler J. Hamilton. The Privacy Payoff: How Successful Businesses Build Customer Trust. Toronto: McGraw-Hill Ryerson, 2002. Cheatham, Carole. “Privacy Controls: Is Your Company Doing Enough?” Mississippi Business Review 44 (October 1982): 8-12. “Computers in the Private Sector: Right to Informational Privacy for the Consumer.” Washburn Law Journal 22 (Spring 1983): 469-90. * Davies, Simon G. “Re-Engineering the Right to Privacy: How Privacy Has Been Transformed from a Right to a Commodity.” In Technology and Privacy: The New Landscape, eds. Philip E. Agre and Marc Rotenberg, 143-65. Cambridge, MA: MIT Press, 1997. Davis, Ruth M. “Implication of Privacy Legislation on the Use of Computer Technology

153 in Business.” Jurimetrics Journal 17 (Fall 1976): 95-110. Dellecave, Tom Jr. “Insecurity: Is Technology Putting Your Company’s Primary Asset—Its Information—at Risk?” Sales & Marketing Management (April 1996): 3850. Driver, Albert W., Jr. “Developments in Privacy Law and Their Impacts on Business.” The Business Lawyer 34 (March 1979): 1093-1102. Everett, John H. and Elizabeth P. Crowe. Information for Sale. 2nd edition. McGraw- Hill, 1994. Feder, Barnaby J. “Getting the Electronics Just Right: Wells Fargo is a Case Study in How a Company Can Exploit the Information Revolution.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 141-7. San Diego: Academic Press, 1996. Goldstein, Robert C. and R.L. Nolan. “Personal Privacy Versus the Corporate Computer.” Harvard Business Review 53 (March-April 1975): 62-70. Gordin, George, Jr. “Corporate Intrusion on Privacy.” Business Lawyer 34 (1979): 111-20. Greguras, Fred M. “Informational Privacy and the Private Sector.” Creighton Law Review 11 (1977): 312-51. Hansell, Saul. “Big Web Sites to Track Steps of Their Users.” New York Times, August 16, 1998, p. A1. Higgins, Steve. “Computers & Technology Web Interests Consider Rules on Collecting Surfer Profiles.” Investor’s Business Daily, November 19, 1996. Kling, Rob, et al. “Information Entrepreneurialism, Information Technologies, and the Continuing Vulnerability of Privacy.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 727-43. San Diego: Academic Press, 1996. Kornblum, Janet. “Amazon.com Feature Fuels Privacy Fears.” USA Today, August 26, 1999, p. A1. Larson, Erik. The Naked Consumer: How Our Private Lives Become Public Commodities. New York: Henry Holt & Co., 1992. Louis Harris and Associates Inc. The Equifax Report on Consumers in the Information Age. Atlanta, GA: Equifax Inc., 1990. “Manufacturers’ Safeguards for Data Called Inadequate.” Computerworld (November 11, 1970): 3. Markoff, John. “Europe’s Plan to Protect Privacy Worry Business.” New York Times, April 11, 1991, p. A1, D6. Marx, Gary T. “The Case of the Omniscient Organization.” Harvard Business Review (March-April 1990): 4-12. McCarthy, K.R. and J.W. Kormeier. “Maintaining the Confidentiality of Confidential Business Information Submitted to the Federal Government.” The Business Lawyer 36 (1980): 57-78. Pauly, Charles W. “Let Industry Beware: A Survey of Privacy Legislation and Its Potential Impact on Business.” Tulsa Law Journal 11 (1975-76): 68-84. Reitman, Valerie. “Firms Scrap Plans to Sell Database with Personal Details on Consumers.” Philadelphia Inquirer, January 24, 1991, p. 1. Robins, Kevin and Frank Webster. “Cybernetic Capitalism: Information, Technology, and Everyday Life.” In The Political Economy of Information, eds. Janet Wasko and Vincent Mosco, 71. Madison: University of Wisconsin Press, 1988. United States. Congress. House of Representatives. Economic and Commercial Law Subcommittee of the Judiciary Committee. The Threat of Foreign Economic Espionage to U.S. Corporations. Washington, DC: GPO, 1992. Varney, C. “Consumer Privacy in the Information Age: A View from the United States FTC.” Privacy Laws and Business 36 (1996): 2-7. Weitzen, H.S. Infopreneurs: Turning Data Into Dollars. New York: John Wiley, 1988.

154 We Know Where You Live. Coronet/Nova Films, 1991. Westermeier, J.T., Jr. and Kenneth D. Polin. “Privacy Report to Alter Relations of Business to the Individual.” Data Management 15 (September 1977): 30-3.

Vehicles

Donohue, Richard. “Report on the Department of Motor Vehicles: Law, Policy, and Practices Affecting Personal Privacy.” In Commission on Personal Privacy: Supplement Three, 1-8. Sacramento, CA: State of California, 1982. Ferryman, J. “People and Vehicle Tracking: Big Brother Looking After You.” Measurement & Control 35 (September 2002): 197-203. Foschio, Lois G. “Motor Vehicle Records: Balancing Individual Privacy and the Public’s Legitimate Need to Know.” Communications and the Law 6 (February 1984): 15-20. Garfinkel, Simson L. “Nobody Fucks with the DMV.” Wired (February 1994): 87-127. Murray, T.A. “Privacy: Vehicle Name Lists ‘Invasion.’” Los Angeles Herald-Examiner (January 21, 1968).

Computer Science & Computer Scientists

Kling, Rob. “Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 848-69. San Diego: Academic Press, 1996. Kling, Rob. “Information and Computer Scientists as Moral Philosophers and Social Analysts.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 32-8. San Diego: Academic Press, 1996.

Remote Sensing

Biondo, Jeanette T. “Problems of Remote Sensing: A Look at American Law for an Approach to Sensed States’ Demands.” Fletcher Forum 9 (Summer 1985): 447-66.

ID

Carlson, Margaret. “The Case for a National ID Card: Big Brother Already Knows Where You Live—Why Not Let Him Make You Safer?” Time Magazine, January 21, 2002. Chen, David W. “China Readies Super ID Card, A Worry to Some.” New York Times, August 18, 2003. Davies, Simon G. “The Worst ID They Ever Had.” Wired (June 1995). Dershowitz, Alan M. “Why Fear National ID Cards?” New York Times, October 13, 2001, p. A23. Eaton, Joseph W. Card-Carrying Americans: Privacy, Security, and the National ID. Totowa, NJ: Rowman & Littlefield, 1986. Landler, Mark. “Fine-Tuning for Privacy, Hong Kong Plans Digital ID.” New York Times, February 18, 2002, p. C1.

Revolution

Birkerts, Sven. “The Electronic Hive: Refuse It.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 79-82. San Diego: Academic Press, 1996. Grant, C.B. “Will Students Wreck Your Computer Center?” Data Processing Magazine

155 (May 1969): 62-3. Hanlon, Joseph. “Ten Students Convicted in 1969 Computer Center Burning.” Computerworld (April 29, 1970). Huggins, Phyllis. “Programmer Thankful for ‘Bug’ During Computer Center Bombing.” Computerworld (May 27, 1970): 1. Huggins, Phyllis. “Rebuilt Fresno State DP Center Follows Tight Security.” Computerworld (July 8, 1970). “Limiting Access to Centers Called a Major Problem.” Computerworld (June 24, 1970). Nelson, F.B. “Campus Computers: Target for Militants and Almost Anyone Else.” Datamation (October 15, 1970): 37. “Radical Rumblings Heeded, Centers Increase Security.” Computerworld (October 14, 1970). “Revolutionary Force Bombs IBM Office.” Computerworld (March 18, 1970): 1. “Students Demolish Computer Center.” Computerworld (February 26, 1969): 1. “Twenty Students Take Over DP Center, Promise They Don’t Plan Any Damage.” Computerworld (November 25, 1970). “Two Arrested in Threat to Destroy DP Center.” Computerworld (August 12, 1970): 1. “University of Wisconsin Computer Center Bombed; Damage Studied.” Computerworld (September 9, 1970): 6. “Violence by Rebels Threatens Centers.” Computerworld (October 7, 1970): 1. Vogel, Tom, et al. “Radical Groups Spread the Word Online.” Wall Street Journal, January 6, 1997. “Wirecutters, Acid Used on Computer.” Computerworld (April 9, 1969): 7.

Bug

Shapiro, Fred R. “The First Bug: Exposing the Myth.” Byte 19 (April 1994): 308.

Bugging

Carroll, John Millar. “Bugging the Big Brains.” Executive (December 1969): 46. Koehn, Hank E. “Are Companies Bugged About Bugging?” Journal of Systems Management (January 1973): 12-3.

Criminal

“Computers Breed New Type of Criminal.” Data Management (August 1972): 36. Fields, Gordon B. “Privacy ‘Rights’ and the New Oregon Criminal Code.” Oregon Law Review 51 (1971-2): 494-514. Forester, Tom and Perry Morrison. “Who are the Computer Criminals and Why Do They Do It?” In Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing, Second Edition, 41-4. Cambridge, MA: MIT Press, 1994. Gallati, Robert R.J. “Criminal Justice Systems and the Right to Privacy.” Public Automation: Output (July 1967). Gallati, Robert R.J. “The New York State Identification and Intelligence System.” In Information Technology in a Democracy. Cambridge, MA: Harvard University Press, 1971. Gordon, Diana. “The Electronic Panopticon: A Case-Study of the Development of the National Criminal Records System.” Politics and Society 15 (1987): 483-511. Hearnden, Keith. “Computer Criminals are Human, Too.” Long Range Planning, vol. 19 (1986).

156 Higgins, Stephen B. “The Press and Criminal Record Privacy.” Saint Louis University Law Journal 20 (1975-6): 509-30. Maltz, Michael D. “Privacy, Criminal Records, and Information Systems.” In Operations Research in Law Enforcement, Justice, and Societal Security, eds. Sidney H. Brounstein and Murray Kamrass, 247-61. Lexington, MA: Lexington Books, 1976. Marchand, Donald A. The Politics of Privacy, Computers, and Criminal Justice Records: Controlling the Social Costs of Technological Change. Arlington, VA: Information Resources Press, 1980. National Lawyers Guild. Raising and Litigating Electronics Claims in Criminal Cases. San Francisco: Lake Law Books, 1977. Rothman, Stanley. “The Protection of Privacy and Security in Criminal Offender Record Information Systems.” In Proceedings of the Fall Joint Computer Conference, vol. 41, 423-4. Montvale, NJ: AFIPS Press, 1972. Sheridan, J.H. “Is There a Computer Criminal Working for You?” In Information Systems for Management: A Book of Readings, 499-511. New York: Plano Business Publications, 1987. Smith, M. Elizabeth. “The Public Dissemination of Arrest Records and the Right to Reputation: The Effect of Paul v. Davis on Individual Rights.” American Journal of Criminal Law 5 (1977): 72-89. Steele, Walter W., Jr. “A Suggested Legislative Device for Dealing with Abuses of Criminal Records.” University of Michigan Journal of Law Reform 6 (1972-3): 32-57. Uda, Joan. “Privacy, Law Enforcement, and Public Interest: Computerized Criminal Records.” Montana Law Review 36 (Winter 1975): 60-79. Watts, F.G. and C.R. Work. “Developing an Automated Information System for the Prosecutor.” American Criminal Law Quarterly 9 (Fall 1970): 164-9. Weinstein, David. “Confidentiality of Criminal Records: Privacy v. The Public Interest.” Villanova Law Review 22 (1976-7): 1205-13. Wright, J.B. “Adult Individual Criminal Records and the New Media: Problems of Access and Privacy.” Ph.D. diss., Syracuse University, 1977. Zenk, Gordon Karl. Project SEARCH: The Struggle for Control of Criminal Information in America. Westport, CT: Greenwood Press, 1979.

Soviet

Broad, WilliamJ. “Evading the Soviet Ear at Glen Cove.” Science 217 (September 1982): 910-1. Haynes, John Earl and Harvey Klehr. Venona: Decoding Soviet Espionage in America. New Haven, CT: Yale University Press, 1999. Hemsley, John. “The Influence of Technology on Soviet Doctrine.” In The Lost Empire: Perceptions of Soviet Policy Shifts in the 1990s, ed. John Hemsley, 161-76. Washington, DC: Brassey’s, 1991. Hill, Malcolm R. Soviet Advanced Manufacturing Technology and Western Export Controls. Brookfield, VT: Gower Publishing, 1991. Meadows, J.E. “Software Protection in Transactions with the Soviet Union.” Rutgers Computer & Technology Law Journal 12 (1986): 133-67. Schrage, Michael. “U.S. Seeking to Limit Access of Soviets to Computer Data.” Washington Post, May 27, 1986, p. A1. Weigle, Marcia Anne. “Technology and Society: Ideological Implications of Information and Computer Technologies in the Soviet Union.” Ph.D. diss., University of Notre Dame, 1988.

Privacy and Internet Commerce

157 Alexander, Paulette Shirley. “The Interface Between Consumers and Commercial Internet Sites: Information Privacy Concerns and Fair Information Practice/Privacy Statements.” Ph.D. diss., The University of Memphis, 2001. * Camp, L. Jean. Trust and Risk in Internet Commerce. Cambridge, MA: MIT Press, 2000. Ford, Warwick and Michael S. Baum. Secure Electronic Commerce. Prentice Hall, 1997. Garfinkel, Simson L. and Eugene H. Spafford. Web Security & Commerce. Sebastopol, CA: O’Reilly, 2000. Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone’s Private Life an Open Secret. New York: Simon and Schuster, 1992. Subramanian, Srividhya. “Design and Verification of Secure E-Commerce Protocols.” Ph.D. diss., The Ohio State University, 1999. Swire, Peter P. and Robert E. Litan. None of Your Business: World Data Flows, Electronic Commerce, and the European Privacy Directive. Washington, DC: Brookings Institute Press, 1998. Wacker, J. “Drafting Agreements for Secure Electronic Commerce.” In Proceedings of the World Wide Electronic Commerce: Law, Policy, Security, and Controls Conference, 6. 1995. Walden, I. “Are Privacy Requirements Inhibiting Electronic Commerce?” In Proceedings of the World Wide Electronic Commerce: Law, Policy, Security, and Controls Conference, 10. 1995.

Snooping

Brothers, J. “Is Snooping Ever Justified?” Good Housekeeping 164 (May 1967): 66. “Computers: Safeguarding Time-Sharing Privacy: An All-Out War on Data-Snooping.” Electronics (April 17, 1967): 157-9. Deutsch, L.P. “Snooping by Computer.” San Francisco Chronicle, July 19, 1968. Forbes, Malcolm S., Jr. “High-Tech Snoops.” Forbes (March 14, 1994): 26. Grossman, Lev. “Welcome to the Snooper Bowl.” Time 157 (February 12, 2001). Hirsch, Phil. “The Punchcard Snoopers.” Nation (October 16, 1967): 5-7. Hotz, Robert Lee. “Demanding the Ability to Snoop.” Los Angeles Times, October 3, 1993, p. A1. “Labor Letter: Computer Snooping.” Wall Street Journal, May 26, 1992, p. A1. Rowan, Ford. “Computer Snoopers.” Politics Today 5 (July 1978): 32-6. Wilke, John R. “Technology: For Network Managers, Snooping Gets Easier.” Wall Street Journal, March 23, 1992, p. B1.

Code

Browne, Malcolm. “Scientists Accuse Security Agency of Harrassment Over Code Studies.” New York Times, October 18, 1977. Hotz, Robert Lee. “Computer Code’s Security Worries Privacy Watchdog.” Los Angeles Times, October 4, 1993, p. A1, A20. Lebkowsky, Jon. “The Internet Code Ring.” Fringeware Review 9 (January 1995). Markoff, John. “Paper on Codes is Sent Despite U.S. Objections.” New York Times, August 9, 1989. Markoff, John. “U.S. Code Agency is Jostling for Civilian Turf.” New York Times, January 24, 1994, p. D1, D5.

Cyberculture

158 Dery, Mark, ed. Flame Wars: The Discourse of Cyberculture. Durham, NC: Duke University Press, 1994. Hilton, Alice Mary. “An Ethos for the Age of Cyberculture.” In Proceedings of the Spring Joint Computer Conference, vol. 25, 139-53. Baltimore, MD: Spartan Books Inc., 1963. Seabrook, John. “My First Flame.” New Yorker (June 6, 1994): 70-9.

Information Theory

Reed, I.S. The Application of Information Theory to Privacy in Data Banks. R-1282- NSF. Santa Monica, CA: The Rand Corporation, 1973. Reed, I.S. “Information Theory and Privacy in Data Banks.” In Proceedings of the National Computer Conference, vol. 42, 581-7. Montvale, NJ: AFIPS Press, 1973. Reed, I.S. “Information Theory and Privacy in Data Banks.” P-4952. Santa Monica, CA: The Rand Corporation, 1970. Robins, Kevin and Frank Webster. “Information as Capital: A Critique of Daniel Bell.” In The Ideology of the Information Age, eds. J. Slack and F. Feges, 95-117. Norwood, NJ: Ablex, 1987. Wolfowitz, J. Coding Theorems of Information Theory. Berlin: Springer-Verlag, 1961.

Cameras

Marlow, Kristina. “Sit Down, Be Quiet: The Camera is Watching.” Chicago Tribune, December 24, 1994. McAleer, Phelim. “‘Fool-Proof’ Security Cameras Put the Innocent in the Frame.” Sunday Times, July 18, 1999. Sweeney, James F. “Proliferating Cameras Spark Privacy Debate.” The Plain Dealer, January 11, 2002.

Electronic Bracelets

Pfeifer, Stuart. “O.C. to Track Sex Criminals with GPS Probation.” Los Angeles Times, December 23, 2001. Schwitzgebel, R.K. “Electronic Alternatives to Imprisonment.” Lex et Scientia 5 (July- September 1968): 99-104. Schwitzgebel, R.K. “Electronic Innovation in the Behavioral Sciences: A Call to Responsibility.” American Psychologist 22 (May 1967): 364-70. Wilber, Del Quentin. “Teens Slip Monitors, Are Held in Killings.” Baltimore Sun, July 31, 2002.

Vulnerable

Bradley, John. The Vulnerability of the Digital Computer. Washington, DC: National Computer Research Institute, 1972. “How Vulnerable is the Computer System?” ADP Newsletter (March 8, 1971). Lundell, E. Drake, Jr. “More Secure (But Vulnerable) Systems Expected Soon.” Computerworld (December 13, 1972): 13. Peterson, A. Padgett. “Tactical Computers Vulnerable To Malicious Software Attacks.” Signal (November 1993): 74-5.

Alarms

Cantor, Lon. “Electronic Intrusion Alarms.” Electronics World (September 1968): 44-

159 6. “A Rise in Internet Break-ins Sets Off Security Alarm.” Software Engineering Notes 19 (April 1994): 5.

Information Highway & Superhighway

Campen, Alan D. “Cooperative Effort Encourages Safe Information Highway Travel.” Signal (October 1995): 4344. * Cohen, Frederick B. Protection and Security on the Information Superhighway. New York: Wiley, 1995. Guynes, Steve. “Privacy Considerations As We Enter the ‘Information Highway’ Era.” Computers and Society 24 (September 1994); 16-9. * Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. New York: Doubleday, 1995.

Multics

Bell, D.E. and L.J. LaPadula. Computer Security Model: Unified Exposition and Multics Interpretation. ESD-TR-75-306. Hanscom AFB, MA: The MITRE Corporation, HQ Electronic Systems Division, June 1975. Bell, D.E. and L.J. LaPadula. Secure Computer Systems: Mathematical Foundations. MTR-2547, Vol. 1. Hanscom AFB, MA: The MITRE Corporation, March 1, 1973. Bell, D.E. and L.J. LaPadula. Secure Computer Systems: A Mathematical Model. MTR- 2547, Vol. 2. Hanscom AFB, MA: The MITRE Corporation, May 31, 1973. Bell, D.E. and L.J. LaPadula. Secure Computer Systems: A Refinement of the Mathematical Model. MTR-2547, Vol. 3. Hanscom AFB, MA: The MITRE Corporation, December 1973. Glaser, Edward L. “A Brief Description of Privacy Measures in the MULTICS Operating System.” In Proceedings of the Spring Joint Computer Conference, vol. 30, 303-4. Washington, DC: Thompson Books, 1967. Honeywell, Inc. MULTICS Records, 1965-1982. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. CBI 66. Karger, Paul A. and R.R. Shell. Multics Security Evaluation: Vulnerability Analysis. ESD-TR-74-193. HQ Electronic Systems Division, Hanscom AFB, MA, June 1974. Saltzer, J.H. “Protection and the Control of Information Sharing in Multics.” Communications of the ACM 17 (1974): 388-402. Saltzer, J.H. and M.D. Schroeder. “The Protection of Information in Computer Systems.” Proceedings of the IEEE 63 (September 1975): 1278-1308. Schroeder, M.D. “Engineering a Security Kernel for Multics.” ACM Operating Systems Review 9 (November 1975): 25-32. Schroeder, M.D., et al. Final Report of the Multics Kernel Design Project. MIT/LCS/TR-196. 1977. Vyssotsky, V.A., et al. “Structure of the MULTICS Supervisor.” In Proceedings of the Fall Joint Computer Conference, vol. 27, 203-12. 1965.

Magnets

Piasta, Frank. “SRI Researcher Says Danger of Magnets to Tape ‘Hogwash.’” Computerworld (February 16, 1972): 1. Schneider, Michael W. Electromagnetic Spectrum Domination: 21st Century Center of Gravity or Achilles Heel. Fort Leavenworth, KS: SAMS, CGSC, May 5, 1994. * Swinbank, Peter. “Electromagnetic Radiation.” In Computer Security Reference

160 Book, eds. K.M. Jackson, et al., 75-90. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Tiffany, W.D. “Are Computer’s Files Vulnerable to Magnets?” The Office (September 1972): 51.

Ownership

Branscomb, Anne Wells. “Who Owns Creativity?” Technology Review (May-June 1988): 38-45. Branscomb, Anne Wells. “Who Owns Information?” Transnational Data and Communications Report 9 (June 1986): 9-11. Hammond, R. Grant. “Quantum Physics, Econometric Models, and Property Rights to Information.” McGill Law Journal 27 (1981): 47-72. Johnson, Deborah G. “Should Computer Programs Be Owned?” Metaphilosophy 16 (October 1985): 276-88. Lieberstein, Stanley M. Who Owns What is in Your Head? New York: Hawthorn Books, Inc., 1979. Wessel, Andrew E. The Social Use of Information: Ownership and Access. New York: Wiley, 1976.

Chaos

Broad, William J. “The Chaos Factor.” Science 4 (January-February 1983): 41-9. Brown, David. Cybertrends: Chaos, Power, and Accountability in the Information Age. Viking, 1997.

Bulletin Boards, BBS & Internet Forums

Gangialosi, Charles. “The Electronic Underground: Computer Privacy and Electronic Bulletin Boards.” Rutgers Computer and Technology Law Journal 15 (1989): 265- 301. Kling, Rob. “Social Relationships in Electronic Forums: Hangouts, Salons, Workplaces, and Communities.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 426-54. San Diego: Academic Press, 1996. Zachary, G. Pascal. “Technology: Software Firms Keep Eye on Bulletin Boards.” The Wall Street Journal, November 11, 1991, p. B1.

Integrity

Courtney, Robert H., Jr. and Willis H. Ware. “What Do We Mean by Integrity?” Computers & Security 13 (May 1994): 206-8. Nielsen, Norman R., et al. “Effective Safeguards for Computer System Integrity.” In Proceedings of the National Computer Conference, vol. 45, 75-84. Montvale, NJ: AFIPS Press, 1976.

Social Problems

Brune, Hans H. “The Social Implications of Information Processing.” Information & Management 1 (1978): 143-56. David, E.E., Jr. and R.M. Fano. “Some Thoughts About the Social Implications of Accessible Computing.” In Proceedings of the Fall Joint Computer Conference, vol. 27, pt. 1, 243-47. Washington, DC: Spartan Books Inc., 1965.

161 Dial, O. Eugene. “The Social Impact of Computers.” In Proceedings of the Spring Joint Computer Conference, Vol. 36, 449-51. Montvale, NJ: AFIPS Press, 1970. Goffman, Erving. Behavior in Public Places: Notes on the Social Organization of Gatherings. New York: Free Press, 1963. Goldhamer, H. and R. Westrum, eds. The Social Effects of Communication Technology. R-486-RSF. Santa Monica, CA: The Rand Corporation, May 1970. Gotlieb, Calvin C. and A. Borodin. Social Issues in Computing. New York: Academic Press, 1973. Hurd, Cuthbert. “The Social Problems of Automation.” In Proceedings of the Western Joint Computer Conference, vol. 13, 13-14. New York: American Institute of Electrical Engineers, March 1959. Hussain, Donna S. and Khateeb M. Hussain. The Computer Challenge: Technology, Applications, and Social Implications. Santa Rosa, CA: Burgess Communications, 1986. Kling, Rob. “Information Technology and the Shifting Balance Between Privacy and Social Control.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 614-36. San Diego: Academic Press, 1996. Kling, Rob. “Models for the Social Accountability of Computing.” Telecommunications Policy 4 (September 1980): 166-82. Kling, Rob. “The Seductive Equation of Technological Progress with Social Progress.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 22-5. San Diego: Academic Press, 1996. Kling, Rob. “Social Controversies About Computerization.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 10-5. San Diego: Academic Press, 1996. Kling, Rob, ed. Computerization and Controversy: Value Conflicts and Social Choices. 2nd ed. San Diego: Academic Press, 1996. Larson, H.T. “The Social Problems of Automation.” In In Proceedings of the Western Joint Computer Conference, vol. 13, 7. New York: American Institute of Electrical Engineers, March 1959. Laswell, Harold D. “The Social Consequences of Automation.” In Proceedings of the Western Joint Computer Conference, vol. 13, 7-10. New York: American Institute of Electrical Engineers, March 1959. Laver, Murray. Computers and Social Change. New York: Cambridge University Press, 1980. Logsdon, Thomas S. Computers and Social Controversy. Potomac, MD: Computer Science Press, 1980. Nanus, Burt, et al. The Social Implications of the Use of Computers Across National Boundaries. Montvale, NJ: AFIPS Press, 1973. Perrolle, Judith. Computers and Social Change: Information, Property, and Power. Belmont, CA: Wadsworth, 1987. Sackman, H. “Computers and Social Choice.” P-4915. Santa Monica, CA: The Rand Corporation, October 1972. Schafer, B.J. “The Social Problems of Automation.” In Proceedings of the Western Joint Computer Conference, vol. 13, 10-13. New York: American Institute of Electrical Engineers, March 1959.

Social Science

Dumont, M. “Social Science Versus Privacy.” Journal of Humanistic Psychology 16 (1976): 81. Habermas, Jürgen. The Structural Transformation of the Public Sphere. Cambridge, MA: MIT Press, 1962.

162 Muller, P.J. and H.H. Kuhlmann. “Integrated Information Bank Systems, Social Book- keeping, and Privacy.” International Social Sciences Journal, UNESCO 24 (1972): 584-602. Rankin, L. John. “The Socio-Economic Consequences and Limits of the Information Revolution.” Information Services and Use 1 (1981): 65-73. Stewart, D.K. Social Implications of Social Science Data Archives. TM-3729/000/00. Santa Monica, CA: System Development Corporation, November 7, 1967. Wilsnack, Richard. “Information Control: A Conceptual Framework for Sociological Analysis.” Urban Life 8 (1980): 467-99.

Psychology

Hosmer, Stephen T. “The Information Revolution and Psychological Effects.” In The Changing Role of Information Warfare, eds. Zalmay M. Khalilzad and John P. White, 217-51. Santa Monica, CA: The Rand Corporation, 1999. Morton, Thomas J. “Psychologist Views ‘Insecurity’ at DP Centers.” Computerworld (July 22, 1970). Schwartz, Barry. “The Social Psychology of Privacy.” American Journal of Sociology 73 (May 1968): 741-52.

Panic Room

Calvo, Dana. “Opening a Door to Panic Rooms.” Los Angeles Times, March 27, 2002. Hartlaub, Peter. “Safe House, High-end ‘Panic Room’ Hideouts Becoming More Common.” San Francisco Chronicle, April 8, 2002.

Image

Grant, Daniel. “Computer Copycats Blur Rights: Electronic Manipulation of Images Has Made Copyright Infringement Hard to Combat.” Computer Science Monitor (October 3, 1991): 12. Hunter, Larry. “Public Image.” Whole Earth Review (January 1985).

Frank Cullen

Burroughs Corporation Records. Frank Cullen Papers, 1955-1976. CBI 90. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Cullen, Frank. “Computer Security and Privacy, 1971-1975.” In Frank Cullen Papers, 1955-1976. CBI 90. Box 1, Folder 4. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN.

Snatching

“Californian Charged with Data Snatching from Rival Computer.” The Wall Street Journal (March 4, 1971): 13. Elmer-DeWitt, Philip. “Invasion of the Data Snatchers!” Time (September 26, 1988): 62-3.

Errors

Bride, Edward J. “Bad Input Causes Court Errors.” Computerworld (October 13, 1971): 1.

163 Cohen, B. and F. Cohen. “Error Prevention at a Radon Measurement Service Laboratory.” Radiation Protection Management 6 (1989): 43-7. “Federal Reserve Computer Error Caused Puzzling Money Mark-Up Steps.” The Wall Street Journal (Feburary 18, 1972): 19. Human Error. AD-689 365. Springfield, VA: National Technical Information Service.

Secrets

“Can Your Computer Keep a Secret?” Industry Week (February 1, 1971): 46-8. Clark, Don. “Bidzos Holds Key to Guarding Internet Secrets.” Wall Street Journal, April 16, 1996. Eder, Peter F. “Privacy on Parade: Your Secrets for Sale.” Futurist (July 1994). Goldsmith, W.B., Jr. “Secret Message Coder/Decoder.” Personal Computing 5 (March 1981): 45-7. “How I Steal Company Secrets.” Business Management (October 1965). “IBM to Seek Ways to Teach Computers How to Keep Secrets.” The Wall Street Journal, May 17, 1972, p. 9. Shamir, Adi. “How to Share a Secret.” Communications of the ACM 22 (November 1979): 612-3. “Ward Pleads Guilty to Trade Secret Theft.” Computerworld (November 15, 1972): 1.

Bar Codes

Nelson, Ben. Punched Cards to Bar Codes: A Complete History of Automated Data Collection. Peterborough, NH: Helmers Publishing, 1997. Watkins, Linda M. “Bar Codes are Black-and-White Stripes and Soon They Will Be Read All Over.” Wall Street Journal, January 8, 1985.

Privacy Cost

Goldstein, Robert C. The Cost of Privacy: Operational and Financial Implications of Databank-Privacy Regulation. Brighton, MA: Honeywell Information Systems, 1975. Goldstein, Robert C. Modeling Privacy Costs: A New Model for Implementing Fair Information Practices and Determining Costs Thereof. Phoenix, AZ: Honeywell Information Systems, Inc., 1980. Goldstein, Robert C. “Privacy Cost Research: An Agenda.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 51-6. New York: Academic Press, 1980. Krell, Robert Alfred. “Development and Analysis of a Model of the Cost Impact of Privacy Safeguards in a Computer Network.” D.B.A., The George Washington University, 1977. Turn, Rein and Norman Z. Shapiro. “Privacy and Security in Databank Systems: Measures of Effectiveness, Costs, and Protector-Intruder Interactions.” In Security and Privacy in Computer Systems, 267-86. Los Angeles, CA: Melville Publishing, 1973. Turn, Rein and Norman Z. Shapiro. “Privacy and Security in Databank Systems: Measures of Effectiveness, Costs, and Protector-Intruder Interactions.” In Proceedings of the Fall Joint Computer Conference, vol. 41, 435-44. Montvale, NJ: AFIPS Press, 1972. Turn, Rein and Norman Z. Shapiro. “Privacy and Security in Databank Systems: Measures of Effectiveness, Costs, and Protector-Intruder Interactions.” P-4871. Santa Monica, CA: The Rand Corporation, July 1972. Whiedon, Donald. “How Much Will Privacy ‘Cost?’” Computer Decisions (August 1979): 54-62.

164

Electronic Journalism

Washburn, Pat. “Electronic Journalism, Computers, and Privacy.” Computer/Law Journal 3 (Winter 1982): 189-209.

Computerized City

“A City Where Computers Will Know About Everybody.” U.S. News & World Report, May 15, 1967, p. 78-9. Wilson, Caroline. “Securing America’s New Town Centers.” Security Management (June 1, 1992).

Chat

Gumpert, Gary and Susan J. Drucker. “The Demise of Privacy in a Private World: From Front Porches to Chat Rooms.” In Cyberethics: Social & Moral Issues in the Computer Age, eds. Robert M. Baird, et al., 171-187. Amherst, NY: Prometheus Books, 2000. Schwartz, John. “Could Online Chat Byte Back? A CEO’s Rush to Edit the Past Illustrates Perils of Posting.” Washington Post, October 7, 1999, p. A1.

Willis Ware

Ware, Willis H. “Computer Data Banks and Security Controls.” P-4329. Santa Monica, CA: The Rand Corporation, March 1970. NBS# 70120004. Box 484, Folder 12. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Ware, Willis H. “Computer Privacy and Computer Security.” P-5354. Santa Monica, CA: The Rand Corporation, 1974. Ware, Willis H. “The Cyber-Posture of the National Information Infrastructure.” In Information Security Management and Small Systems Security, IFIP TC11 WG11.1/WG11.2, Seventh Annual Working Conference on Information Security Management and Small Systems Security, 179-203. Norwell, MA: Kluwer Academic Publishers, 1999. Ware, Willis H. “Data Banks, Privacy, and Society.” P-5131. Santa Monica, CA: The Rand Corporation, 1973. Ware, Willis H. “Emerging Privacy Issues.” Computers & Security 5 (June 1986): 101-13. Ware, Willis H. “Information Systems Security and Privacy.” Communications of the ACM 27 (April 1984): 315-21. Ware, Willis H. “Information Systems, Security, and Privacy.” Educom 19 (Summer 1984): 6-11. Ware, Willis H. Information Systems, Security and Privacy. Santa Monica, CA: Rand Corporation, November 1983. Ware, Willis H. “The New Faces of Privacy.” Information Society 9 (July-September 1993): 195-211. Ware, Willis H. “New Vistas on Info-System Security.” In Information Security in Research and Business: Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC ’97), 177-96. London: Chapman & Hall, 1997. Ware, Willis H. Papers. CBI 40. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Ware, Willis H. “Policy Aspects of Privacy and Access.” Information Society 2 (1984):

165 327-50. Ware, Willis H. “Policy Considerations for Data Networks.” Computing Systems 7 (Winter 1994): 1-44. Ware, Willis H. “Privacy and Information Technology: The Years Ahead.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 9-22. New York: Academic Press, 1980. Ware, Willis H. Privacy and Security Policy in a National Information Infrastructure Environment. Santa Monica, CA: The Rand Corporation, 1996. Ware, Willis H. “Privacy: The Private Sector and Society’s Needs.” P-5414. Santa Monica, CA: The Rand Corporation, 1975. Ware, Willis H. “Records, Computers, and the Rights of Citizens.” Datamation 19 (September 1973): 112-14. Ware, Willis H. “Records, Computers, and the Rights of Citizens.” P-5077. Santa Monica, CA: The Rand Corporation, 1973. Ware, Willis H. “Security and Privacy in Computer Systems.” In Proceedings of the Spring Joint Computer Conference, vol. 30, 279-82. Washington, DC: Thompson Book Company, 1967. Ware, Willis H. “Security and Privacy in Computer Systems.” P-3544. Santa Monica, CA: The Rand Corporation, April 1967. NBS# 6724147. Box 406, Folder 9. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Ware, Willis H. “Security and Privacy: Similarities and Differences.” In Proceedings of the Spring Joint Computer Conference, vol. 30, 287-90. 1967. Ware, Willis H. “Testimony Before the Assembly Statewide Information Policy Committee.” P-4214. Santa Monica, CA: The Rand Corporation, October 1969. Ware, Willis H., ed. Security Controls for Computer Systems. R-607. Santa Monica, CA: The Rand Corporation, February 1970.

Wireless

Cooper, David Anthony. “The Design and Implementation of a Private Message Service for Mobile Computers (Wireless Networks).” Ph.D. diss., Cornell University, 1995.

Operation Exodus

Weyhrauch, B.B. “Operation Exodus: The United States Government’s Program to Intercept Illegal Exports of High Technology.” Computer/Law Journal 7 (Fall 1986): 203-25.

Cookies

St. Laurent, S. Cookies. New York: McGraw-Hill, 1998.

Netscape

Freier, A., et al. The SSL Protocol, Version 3. Mountain View, CA: Netscape Communications Corporation, 1996. Sandberg, J. “Netscape Software for Cruising Internet is Found to Have Another Security Flaw.” Wall Street Journal, September 25, 1995, p. B12.

Homeland Security

166 Feinberg, L.E. “Homeland Security: Implications for Information Policy and Practice— First Appraisal.” Government Information Quarterly 19 (2002): 265-88. Plesser, Ronald L. “USA Patriot Act for Internet and Communications Companies.” Computer Lawyer 19 (March 2002): 1. * Safir, Howard. “Homeland Security.” In Security: Policing Your Homeland, Your State, Your City, 135-53. New York: St. Martin’s Press, 2003.

National Registration

Dovey, H.O. “Why National Registration Had to Go.” Public Administration 64 (Winter 1986): 459-62.

Profession

Frankel, M.S. “Professional Codes: Why How, and With What Impact?” Journal of 8 (1989): 109-16. Parker, Donn B., et al. “All in a Day’s Work: Nine Provocative Examples in the Practice of Computing Professionals.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 870-5. San Diego: Academic Press, 1996. “Professional Conduct in Information Processing.” Communications of the ACM 11 (1968): 135.

Mortgage

Fenner, E. “How Mortgage Lenders Can Peek Into Your Files.” Money (April 1993): 44-8.

Software

Enfield, Ronald L. “The Limits of Software Reliability.” Technology Review (April 1987): 36-43. Hawkins, David H. “How Safe is Your Software?” Computer Decisions (June 1972): 18-20. Markoff, John. “Federal Inquiry on Software Examines Privacy Programs.” New York Times, September 21, 1993, p. D1, D3. Markoff, John. “Security Flaw is Discovered in Software Used in Shopping.” New York Times, September 19, 1995, p. A1, D21. * Martin, David. “Software Methods.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 291-310. Oxford, UK: Butterworth-Heinemann Ltd, 1992. McKenzie, John F. “Implementation of the Core List of Export Controls: Computer and Software Controls.” Software Law Journal 5 (1992): 1. National Research Council. Intellectual Property Issues in Software. Washington, DC: National Academy Press, 1991. Stallman, Richard M. “The GNU Manifesto.” GNU Emacs Manual (1987): 175-84.

GIS, Geographical Information Systems, Clustering

Dansby, H. Bishop. “Informational Privacy and GIS.” In Proceedings of the Annual Conference of the URISA, 18-28. San Francisco, CA: URISA, 1991. Goss, John. “‘We Know Who You Are and We Know Where You Live’: The Instrumental Rationality of Geodemographic Systems.” Economic Geography 71 (April 1, 1995).

167 Shapiro, S. “Places and Spaces: The Historical Interaction of Technology, Home, and Privacy.” Information Society 14 (October-December 1998): 275-84. “Spies in the Sky Zero in on Farm Cheats.” The European, July 6-23, 1992, p. 1. Tedeschi, Bob. “Critics Press Legal Assault on Tracking of Web Users.” The New York Times, February 7, 2000, p. C1. Wallack, Todd. “They Know Where You’ve Been.” San Francisco Chronicle, February 12, 2001. Want, Roy, et al. “The Active Badge Location System.” ACM Transactions on Information Systems 10 (January 1992): 91-102. Weiss, M.J. The Clustering of America. New York: Harper & Row, 1988.

Radio

Forbes, Gordon. “Helmet Radios Give Scrambling New Meaning.” USA Today, April 7, 1994.

Fastlane

Kerber, Ross. “MTA Gives Court Toll-Use Data; Spurs Privacy Fears About Fastlane.” Boston Globe, August 13, 2001. Palmer, Thomas C., Jr. “Complaints About Fastlane Mistakes Are Piling Up.” Boston Globe, June 10, 2001. Palmer, Thomas C., Jr. “Cooperation to Begin Sunday Between Fastlane, E-ZPass.” Boston Globe, November 17, 1999. Palmer, Thomas C., Jr. “State Cracks Down on Fastlane Violators; Threatens to Withhold Vehicle Registrations.” Boston Globe, February 14, 2001.

FCC, Federal Communications Commission

“Telling It to the FCC.” Business Week (March 9, 1968): 38.

Fault-Tolerant

* Weber, Carl and Alan Goodman. “Fault-Tolerant Computing.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 863-70. Oxford, UK: Butterworth- Heinemann Ltd, 1992.

Privacy, Security, and Databases

Ames, S.R. User Interface Multilevel Security Issues in a Transaction-Oriented Data Base Management System. MTP-178. Bedford, MA: The MITRE Corporation, December 1976. Bachman, Charles W. The Issue of Security and Privacy in Database Systems, 1973- 1981. In Charles Bachman Papers, 1951-1996. Box 6, Folder 7-9. CBI 125. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Bacot, Eugene. “Trapping Data Bank Busters.” Business Administration (January 1971): 16-9. Betts, J.E. “Federal Data Bank Closer to a Reality.” Congressional Record—House, August 24, 1967, p. 24060-24061. Betts, Mitch. “Computerized Records: An Open Book.” Computerworld (August 9, 1993). Bushkin, Arthur A. The Security Implications of Privacy. Springfield, VA: NTIS, June

168 1975. Chin, F.Y. and G. Ozsoyoglu. “Statistical Database Design.” ACM Transactions on Database Systems (March 1981): 113-39. “Computers, Data Banks, and Individual Privacy: On the Needs and Values of Data Banks.” Minnesota Law Review 53 (1968): 211-45. Denning, Dorothy Elizabeth R. “Secure Statistical Databases with Random Sample Queries.” ACM Transactions on Database Systems 5 (September 1980): 291-315. Denning, Dorothy Elizabeth R. and J. Schlorer. “Inference Controls for Statistical Databases.” Computer (July 1983): 69-82. Denning, Dorothy Elizabeth R., et al. “The Tracker: A Threat to Statistical Data Base Security.” ACM Transactions on Data Base Systems 4 ( ): 76-96. DeRensis, Paul R. “The Civil Liabilities of Data Base Operators.” The Practical Lawyer 24 (July 1978): 25-38. Fernandez, E.B., et al. Data Base Security and Integrity. Reading, MA: Addison- Wesley, 1981. Forester, Tom and Perry Morrison. “Database Disasters.” In Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing, Second Edition, 132-8. Cambridge, MA: MIT Press, 1994. Gardiner, W. Lambert. Personal Data Banks: Invasion of Privacy or Erosion of Autonomy? Information Society Programme. Paper no. I-24. Montreal, Canada: GAMMA, Feburary 1982. * Garfinkel, Simson L. Database Nation: The Death of Privacy in the 21st Century. Sebastopol, CA: O’Reilly, 2000. Garrison, William A. and C.V. Ramamoorthy. “Privacy and Security in Data Banks.” AD-718 406. Springfield, VA: National Technical Information Service, November 1970. Guynes, Steve. “Protecting Statistical Databases: A Matter of Privacy.” Computers and Society 19 (March 1989): 15-23. Halls, Craig C. “Raiding the Data Banks: A Developing Problem for Technologists and Lawyers.” Journal of Contemporary Law 5 (1979): 245-66. Henderson, Robert P. The Growing Threat to Privacy Posed by Computer Data Banks. February 1972. NBS# 72287022. Box 570, Folder 18. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Hirsch, Phil. “The World’s Biggest Data Bank.” Datamation (May 1970): 66-73. Jordan, F.J.E. Privacy, Computer Data Banks, Communications, and the Constitution: A Study for the Privacy and Computer Task Force. Ottawa, Canada: Department of Communications and Department of Justice, 1982. Kimball, Peter. The File. San Diego, CA: Harcourt Brace Jovanovich, 1983. Kirchner, J.A. “File Match May Aid Draft.” Computerworld (May 7, 1979): 1. Laudon, Kenneth C. “Data Quality and Due Process in Large Interorganizational Record Systems.” Communications of the ACM 29 (1986): 4-11. Laudon, Kenneth C. “Privacy and Federal Data Banks.” Society 17 (January-February 1980): 50-6. Lauren, Roy H. “Reliability of Data Bank Records.” Datamation (May 1970): 88-9. Leavitt, Don. “Cipher/1 Designed for Assurance of Total File Privacy.” Computerworld (June 10, 1970). Lee, Jennifer. “Welcome to the Database Lounge.” New York Times, March 21, 2002, p. G1. Linowes, David F. “How Databanks Get the Goods on Everybody.” Business and Society Review 26 (Summer 1978): 54-7. Lundell, E. Drake, Jr. “World Group Urges Right of Inspection of Data Banks.” Computerworld (May 9, 1973): 7.

169 Lutter, Frederick H. “Protect the Database.” Administrative Management (November 1970): 10. Minsky, Naftaly H. “Intentional Resolution of Privacy Protection in Database Systems.” Communications of the ACM 19 (1976): 148-59. Morris, Grant. “The Computer Data Bank-Privacy Controversy.” The Catholic University of America Law Review 22 (1973): 628-52. Ozsoyoglu, G. and F.Y. Chin. “Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design.” IEEE Transactions of Software Engineering (May 1982): 223-34. Pinkerton, J.A. “Is Your Computer Safe?” Computer Decisions (June 1972): 12-4. Rowe, B.C., ed. Privacy, Computers, and You: Workshop on the Data Bank Society. Manchester: The National Computing Centre Limited, 1972. Rubin, Michael Rogers. “The Computer and Personal Privacy, Part III: The Regulation of Computer Records in the United States.” Library Hi Tech 7 (1989): 11. Ruggles, Richard. “How a Data Bank Might Operate.” Think 35 (May-June 1969): 22- 3. Ruggles, Richard. “On the Needs and Values of Data Banks.” Minnesota Law Review 53 (December 1968): 211-45. “See What the ‘Data Banks’ Know About You.” U.S. News & World Report, April 8, 1968, p. 82. Shapiro, N.Z. and M. Davis. Uncrackable Data Banks. R-1382-NSF. Santa Monica, CA: The Rand Corporation, 1973. Slappey, Sterling G. “Lots of People Know Your Secrets: Computerized Data Banks.” Nation’s Business 62 (October 1974): 30-4. Sorkin, Michael D. “State Sued on Data Bank: Privacy Invasion Charged.” Computerworld (September 27, 1972): 1. Soskolne, C.L. “Privacy and Data Banks.” Humanitas Stasch, Dieter. Data Banks in the Public Sector and the Problems of Protection and Privacy. DAS/SPR/69.57. September 17, 1969. NBS# 69337021. Box 471, Folder 13. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. “Summary of Recommendations on Operation of Data Banks re Privacy.” Data Processing Digest (October 1970): 34. Sundgren, B. Security and Privacy of Statistical Data Bases. Statistisk Tidskrift, 1972. “Symposium: Computers, Data Bank, and Individual Privacy.” Minnesota Law Review 53 (December 1968): 211-45. Turn, Rein. “Cost Implications of Privacy Protection in Databank Systems.” Data Base 6 (Spring 1975): 3-9. Turn, Rein. Privacy and Security in Personal Information Databank Systems. R-1044- NSF. Santa Monica, CA: The Rand Corporation, 1974. Turn, Rein. “Privacy and Security in Transnational Data Processing.” In Proceedings of the National Computer Conference, vol. 48, 283-91. Montvale, NJ: AFIPS Press, 1979. Turn, Rein. “Privacy Protection Costs in Record-Keeping Systems.” Information Privacy 1 (September 1979): 298-302. Turn, Rein. “Privacy Protection in Databanks: Principles and Costs.” P-5296. Santa Monica, CA: The Rand Corporation, September 1974. Turn, Rein. “Privacy Protection in Record-Keeping Systems.” Information Management 1 (October 1978): 187-97. Turn, Rein. “Privacy Transformations for Databank Systems.” In Proceedings of the National Computer Conference, vol. 42, 589-601. Montvale, NJ: AFIPS Press, 1973. Turn, Rein. “Privacy Transformations for Databank Systems.” P-4955. Santa Monica,

170 CA: The Rand Corporation, 1973. Turn, Rein. “Remarks on the Instrumentation of Databank Systems for Data Security.” P-5151. Santa Monica, CA: The Rand Corporation, 1974. Turn, Rein, et al. “Privacy and Security in Centralization vs. Decentralized Databank Systems.” P-5346. Santa Monica, CA: The Rand Corporation, 1975. Wagner, S. “Records and the Invasion of Privacy.” Social Sciences Journal (1965): 1082-5. Warner, S. “Records and the Invasion of Privacy.” Social Science Journal (1965): 1082-5. Weinstein, Michael. “Who Accesses What on Remote Terminal? DP Managers Must Have Stricter Control.” Computerworld (December 6, 1972): 24. Westin, Alan F., et al. Report of the Project on Computer Data Banks. New York: Quadrangle Press, 1974. “What the ‘Databanks’ Know About You.” U.S. News & World Report (April 8, 1968): 82-5. Zikopoulos, P. “The Database Security Blanket.” DB2 Magazine 6 (2001): 20-27.

Liberty, Civil Liberties

Collins, Sarah P. Citizens Control Over Records Held by Third Parties. CRS Report, December 8, 1978. Dyer-Witheford, Nick. Cyber-Marx: Cycles and Circuits of Struggle in High- Technology Capitalism. Champaign, IL: University of Illinois Press, 1999. Steinmüller, Wilhelm. “New Technologies and the Protection of Civil Liberties.” Information Age 4 (1982): 226-40. Stouffer, Samuel. Communism, Conformity, and Civil Liberties. New York: Doubleday, 1955.

Financial Modernization Act of 1999

Financial Modernization Act of 1999 (“Gramm-Leach-Bliley Act”). 15 USC, Subchapter I, Sec. 6801-6809.

Protect

Corasick, M.J. and B.C. Brockway. “Protection of Computer-Based Information.” Albany Law Review 40 (1975-6): 113-53. “Data Unprotected.” The Economist 287 (April 16-22, 1983): 18. Dobkin, David P., et al. “Secure Data Bases: Protection Against User Influence.” ACM Transactions on Data Base Systems 4 (March 1979): 97-106. Duggan, Michael A. “Software Protection.” Datamation (June 1969): 113-6. Gemignani, Michael C. “Legal Protection for Computer Software: The View from ’79.” In Ethical Issues in the Use of Computers, eds. Deborah G. Johnson and John W. Snapper, 305-25. Belmont, CA: Wadsworth, 1985. Goetz, Martin A. “Software Protection: You Bet Your Company.” Infosystems 24 (July 1977): 60-4, 101. Graham, G. Scott and Peter J. Denning. “Protection: Principles and Practice.” In Proceedings of the Spring Joint Computer Conference, vol. 40, 417-29. 1972. Graham, Robert L. “The Legal Protection of Computer Software.” Communications of the ACM 5 (May 1984): 422-6. * Grover, Derrick. “Copy Protection.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 155-67. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Grover, Derrick. The Protection of Computer Software: Its Technology and

171 Applications. Cambridge, UK: Cambridge University Press, 1989. “Guard That Computer.” Nations Business (April 1971): 84-6. “IBM Launches Program to Protect Access to Sensitive Data.” Management Advisor (July 1972): 6-7. Lahore, J. “Computers and the Law: The Protection of Intellectual Property.” Florida Law Review 9 (March 1978): 15-41. Lampson, Butler W. “Dynamic Protection Structures.” In Proceedings of the Fall Joint Computer Conference, vol. 35, 27-38. Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM (October 1973): 613-5. Lampson, Butler W. “Protection.” In Proceedings of the Fifth Annual Princeton Conference on Information Sciences and Systems, 437-43. Princeton, NJ: Princeton University, March 1971. Lampson, Butler W. “Protection.” Operating Systems Review 8 (January 1974): 18- 24. Lampson, Butler W. “Scheduling and Protection in an Interactive Multi-Processor System.” Ph.D. diss., University of California, Berkeley, 1967. Lefkowitz, Saul and E. Robert Yoches. “The Role of Trademarks in the Protection of Computer Software.” Communications of the ACM 32 (December 1989): 1391-6. Lunin, Lois F. “Protection Against Catastrophe: A Plan for Insuring Continuity of Information.” In Proceedings of the American Society for Information Science, vol. 5, 295-9. New York: Greenwood Publishing Corporation, 1968. Millard, Christopher. Legal Protection for Computer Programs and Data. M.A. thesis, University of Toronto, 1983. Morris, J.H., Jr. “Protection in Programming Languages.” Communications of the ACM 16 (January 1973): 15-21. Mullender, S. “Protection.” In Distributed Systems, ed. S. Mullender. Reading, MA: Addison-Wesley, 1989. Needham, Roger M. “Protection Systems and Protection Implementations.” In Proceedings of the Fall Joint Computer Conference, vol. 41, 571-8. 1972. Peck, Paul L. “Protecting Corporate Computer Information.” In Ideas for Management: Proceedings of the ASM International Systems Meeting, 30-40. 1972. Peck, Paul L. Survey of Applicable Safeguards for Insuring the Integrity of Information in the Data Processing Environment. AD-726 571. Springfield, VA: National Technical Information Service, June 1971. Poindexter, Denris F. “Protecting the Cookie Jar.” Infosystems (August 1981): 36-40. Raber, Ellen and Michael O. Riley. “Protective Coatings for Secure Integrated Circuits.” Energy and Technology Review (May-June 1989): 13-20. Ramirez, J. “Problems in Protection of Information in a Multiuser Online System.” M.A. thesis, University of Pennsylvania, 1968. “Redundancy, Robustness Protect Vital National Information Links.” Signal (May 1996): 3639. Reinert, Thomas E., Jr. “Federal Protection of Employment Record Privacy.” Harvard Journal of Legislation 18 (Winter 1981): 207-51. Roddy, J. “The Federal Computer Systems Protection Act.” Rutgers Journal of Computers & The Law 7 (1980): 343-65. Schroeder, M.D. and J.H. Salzer. “Hardware Architecture for Implementing Protection Rings.” Communications of the ACM 15 (March 1972): 157-70. Schweitzer, J.A. Protecting Information on Local Area Networks. Butterworths, 1988. Sterling, T.D. “Stressing Design Rather Than Performance Standards to Ensure Protection of Information: Comments.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 103-7. New York: Academic Press, 1980. Stonebraker, Michael and P. Rubenstein. “The INGRES Protection System.”

172 Proceedings of the 1976 ACM Conference, 80-4. New York: Association of Computing Machinery, 1976. Voss, C. “The Legal Protection of Computer Programs in the European Economic Community.” Computer/Law Journal 11 (October 1992): 441-59. Weiner, Tim. “Head of C.I.A. Plans Center To Protect Federal Computers.” New York Times (June 26, 1996): B7. Weissman, Clark. “Programming Protection: What Do You Want to Pay?” SDC Magazine 10 (July-August 1967): 30-1. Zaiden, Dennis J. “Steps You Can Take to Protect Your Computer Operation.” LKHH Accountant (1972): 29-35.

Plastic

“Chains of Plastic: Dropping the Budget Bureau’s Plan for File of Information on U.S. Citizens.” Newsweek 68 (August 8, 1966): 27. Evans, David and Richard Schmalensee. Paying with Plastic: The Digital Revolution in Buying and Borrowing. Cambridge, MA: MIT Press, 1999.

Naval

“FIWC Commissioned.” Naval Aviation News (January-February 1996): 2.

Identification

Clarke, Roger A. “Human Identification in Information Systems: Management Challenges and Public Policy Issues.” Information Technology and People 7 (1994): 6-37. Hayden, Trudy. Immigration and Refugee Policy: The Privacy Implications of a Work Authorization Identification System. New York: New York Civil Liberties Union Privacy Project. 1981. Reistad, D.L. “Customer Identification and Invasion of Privacy.” The Credit World (December 1967): 19-20. Warfel, G.H. Identification Technologies. 1979.

Dataveillance

Clarke, Roger A. “Information Technology and Dataveillance.” Communications of the ACM 31 (May 1989): 498-512.

Disaster, Fire, Catastrophe

Friedman, Stanley. “Contingency and Disaster Planning.” Computers & Security 1 (January 1982): 34-40. “Looking at Fire Hazards.” Fire Journal (May 1970). Monbousse, R.M. Industrial Security for Strikes, Riots, and Disasters. C.C. Thomas Publishers, 1968. Rames, David. “Recovering from Disasters.” Computer Decisions (September 1981): 107-89. Scoma, Louis, Jr. “How Secure is Your Computer Operation from a Disaster?” The Office (August 1981): 96-8. * Sherwood, John. “Contingency Planning.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 265-89. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Sutro, Louis L. “Emergency Simulation of the Duties of the President of the United

173 States.” In Proceedings of the Western Joint Computer Conference, vol. 15, 314-23. New York: Institute of Radio Engineers, March 1959. Titus, D.W., Jr. “Computer-Room Fire: The Topic No One Talks About.” The Office (August 1981): 56. Van Tassel, Dennis. “A Contingency Plan for Catastrophe.” Datamation (July 1, 1971): 30-3. Young, Glenn T. and Walter E. Ulrich. “Planning for Disaster: A Vital Security Step.” Information Systems News (June 15, 1981): 18-22.

Utopian

Iacono, Suzanne and Rob Kling. “Computerization Movements and Tales of Technological Utopianism.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 85-105. San Diego: Academic Press, 1996. Kling, Rob. “Hopes and Horrors: Technological Utopianism and Anti-Utopianism in Narratives of Computerization.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 40-58. San Diego: Academic Press, 1996. Kling, Rob. “Learning About the Possible Futures of Computerization from the Present and the Past.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 26-31. San Diego: Academic Press, 1996.

Caper

Carley, William and Timothy O’Brien. “Cyber Caper: How Citicorp System Was Raided and Funds Moved Across the World.” Wall Street Journal, September 12, 1995, p. 1. Neville, Haig G. “Computer Capers Herald New Crime Wave of Embezzlement.” The National Underwriter: Property Edition (August 20, 1971): 1.

Education & Higher Education

Hollander, Patricia A. Computers in Education: Legal Liabilities and Ethical Issues Concerning Their Use and Misuse. Asheville, NC: College Administration Publications, Inc., 1986. McLachlin, Beverley M. “Education Records and the Right to Privacy.” University of British Columbia Law Review 15 (1981): 175-88. Taylor, Alton L., ed. Protecting Individual Rights to Privacy in Higher Education. San Francisco, CA: Jossey-Bass, Inc., 1977. Willett, Nancy Howard. “Computers on the Higher Education Campus: Legal Implications of Selected Privacy Considerations.” Ed.D. diss., University of Southern California, 1987.

Purple

* Clark, Ronald William. The Man Who Broke Purple: The Life of Colonel William F. Friedman, Who Deciphered the Japanese Code in World War II. Boston, MA: Little, Brown and Company, 1977. Lewin, Ronald. American Magic: Codes, Ciphers, and the Defeat of Japan. New York: Farrar Straus, 1982.

Justice

Cooper, Claire. “When Justice Starts Watching Videos: Computer Animation Newest Way to Make Point in Courtroom.” Sacramento Bee, January 4, 1993, p. A1.

174 Medak, G.M. and P.M. Whisenand. “Security, Justice, and the Computer.” Datamation (June 15, 1971): 24. Posner, Richard A. The Economics of Justice. Cambridge, MA: Harvard University Press, 1981.

Spying and Espionage

Engberg, Edward. The Spy in the Corporate Structure and the Right to Privacy. Cleveland: World Publishing Company, 1967. “Foiling the Computer Spy.” Supervisory Management (April 1969): 40-42. Frost, Mike. Spyworld: Inside the Canadian and American Intelligence Establishments. Doubleday, 1994. Guisnel, Jean. Cyberwars: Espionage on the Internet. New York: Plenum Press, 1997 Harwood, Richard. “Espionage: Cloak-and-Computer Stories.” Washington Post- National Weekly Edition, December 23, 1985, p. 6-7. Johnson, W. “Information Espionage: An Old Problem with a New Face.” Computerworld 23 (October 1989). Luzwick, P. “Stop the Presses for a Late Breaking Story: Countries and Companies Spy on Each Other.” Computer Fraud & Security (November 2000): 16-17. Marshall, Eliot. “I Spy, You Spy.” The New Republic 163 (October 3, 1970): 15-6. Miller, Michael. “Productivity Spies.” Wall Street Journal, June 3, 1985, p. 1, 15.

Privacy, General

Abelson, P.H. “Privacy.” Science 158 (October 20, 1967): 323. Alderman, Ellen and Caroline Kennedy. The Right to Privacy. New York: Alfred A. Knopf, 1995. Allen, Anita L. “Lying to Protect Privacy.” Villanova Law Review 44 (1999): 161-79. Alschuler, Albert W. “A Different View of Privacy.” Texas Law Review 49 (1971): 872- 80. Altman, Irwin. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey, CA: Brooks/Cole Publishing, 1975. Altman, Irwin. “Privacy: A Conceptual Analysis.” Environment and Behavior 8 (1976): 7-29. Altman, Irwin. “Privacy Regulation: Culturally Universal or Culturally Specific.” The Journal of Social Issues 33 (1977): 66-84. Alton, Irwin. “Privacy: A Conceptual Analysis.” Environment and Behavior 8 (1976). Anastapolo, George. “The Public Interest in Privacy: On Becoming and Being Human.” DePaul Law Review 26 (1976-7): 767-806. Anderton, J.M. “Origin of Privacy as a Legal Right in the United States.” Notre Dame Lawyer 22 (November 1946): 106-8. Apperson, Melissa, ed. Privacy and Confidentiality: Can They Be Protected? Boston, MA: Public Responsibility in Medicine and Research, Inc., 1982. Armer, Paul. “The Individual: His Privacy, Self-Image, and Obsolescence.” Computers and People (June 1975): 16-22. Asaro, Andrea. “The Public/Private Distinction in American Liberal Thought: Unger’s Critique and Synthesis.” American Journal of Jurisprudence 28 (1983): 118-48. Bain, Harry. “Privacy: What’s Happening to a Fundamental Right?” SDC Magazine 10 (July-August 1967): 1-24. Baker, Michael A. “Record Privacy as a Marginal Problem: The Limits of Consciousness and Concern.” In Surveillance, Dataveillance, and Personal Freedoms, ed. Columbia Human Rights Law Staff, 99-111. Fairlawn, NJ: R.E. Burdick, Inc., 1973.

175 Baker, Michael A. “Record Privacy as a Marginal Problem: The Limits of Consciousness and Concern.” Columbia Human Rights Law Review 4 (Winter 1972): 89-100. Bates, A. “Privacy: A Useful Concept?” Social Forces 42 (May 1964): 429-34. Bazelon, David. “Probing Privacy.” Georgia Law Review 12 (1977). Beardsley, Elizabeth. “Privacy, Autonomy, and Selective Disclosure.” In Nomos XIII: Privacy, ed. J. Pennock and J. Chapman. New York: Atherton Press, 1971. Benn, Stanley I. “Privacy, Freedom, and Respect for Persons.” In Philosophical Dimensions of Privacy: An Anthology, ed. Ferdinand Schoeman. Cambridge, UK: Cambridge University Press, 1984. Bennett, Colin John. The Political Economy of Privacy: A Review of the Literature. Hackensack, NJ: Center for Social and Legal Research, 1995. Bennett, Colin John and Rebecca Grant. Visions of Privacy: Policy Choices for the Digital Age. Toronto, Canada: University of Toronto Press, 1999. Bennett, Colin John and Charles D. Raab. “The Distribution of Privacy Risks: Who Needs Protection.” The Information Society 14 (1998): 263-74. Berg, John L., ed. Exploring Privacy and Data Security Costs: A Summary of a Workshop. NBS Technical Note 876. Washington, DC: Government Printing Office, 1972. Berman, Jerry and Janlori Goldman. A Federal Right of Information Privacy: The Need for Reform. Washington, DC: The Benton Foundation, 1989. Berman, Jerry and Janlori Goldman. “A Federal Right of Information Privacy: The Need for Reform.” Benton Foundation Project on Communication and Information Policy Opinions. Paper No. 4. Washington, DC, 1989. Bier, William C. Privacy: A Vanishing Value. New York: Fordham University Press, 1980. Bloustein, Edward J. “Group Privacy: The Right to Huddle.” In Individual and Group Privacy. New Brunswick, NJ: Transaction Books, 1978. Bloustein, Edward J. “Group Privacy: The Right to Huddle.” Rutgers Camden Law Journal 8 (1977): 219-83. Bloustein, Edward J. Individual and Group Privacy. New Brunswick, NJ: Transaction Books, 1978. Bloustein, Edward J. “Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser.” In Philosophical Dimensions of Privacy: An Anthology, ed. F. Schoeman, 157-202. Cambridge, UK: Cambridge University Press, 1984. Bloustein, Edward J. “Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser.” New York University Law Review 39 (1968): 962-70. Breckenridge, Adam Carlyle. “Personal Privacy and the Public Interest.” Humanitas 11 (1975): 75-83. Breckenridge, Adam Carlyle. The Right to Privacy. Lincoln: University of Nebraska Press, 1970. Brenton, Myron. The Privacy Invaders. New York: Coward-McCann, 1964. Bride, Edward J. “NAS Warns of Despair in Privacy Invasion Fight.” Computerworld (October 25, 1972): 4. Brill, Alida. Nobody’s Business: The Parodoxes of Privacy. Reading, MA: Addison- Wesley, 1990. Brittan, Leon. “Right of Privacy in England and the United States.” Tulane Law Review 37 (Fall 1963): 235-69. Campbell, Duncan and Steve Connor. “The Battle Against Privacy.” New Statesman 9 (1986). Cantor, Norman F. Privacy in Western Civilization. Special Committee on Science and Law of the Association of the Bar of New York City. 1963. Chaves, Corrine. “The Death of Personal Privacy.” Computerworld (January 1992):

176 25-7. Chu, Albert L.C. “The Need to Know—The Right to Privacy.” Business Automation (June 1971): 31-5. Cobb, Nathan. “The End of Privacy.” Boston Globe Magazine (April 26, 1992). Communication Control Corporation. The Rape of American Privacy. 1973. NBS# 74052004. Box 609, Folder 2. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Davis, Frederick. “What Do We Mean by ‘Right to Privacy’?” San Diego Law Review 4 (1959). Domestic Council Committee on the Right of Privacy. National Information Policy. Report to the President of the United States, 1976. NBS# 77063001. Box 669, Folder 2. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Edelman, Lawrence. “Chalk One Up for Privacy Rights.” Boston Globe, January 24, 1991, 65-6. Ervin, Samuel James, Jr. “Justice, the Constitution, and Privacy.” Vital Speeches of the Day 39 (September 1, 1973): 677-81. Etzioni, Amitai. The Limits of Privacy. New York: Basic Books, 1999. Everest, Gordon C. “Nonuniform Privacy Laws: Implications and Attempts at Uniformity.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 141-50. New York: Academic Press, 1980. Faulkner, William. “On Privacy, the American Dream, What Happened to It?” Harper’s 211 (July 1955): 33-8. * Flaherty, David H. Privacy in Colonial New England. Charlottesville: University Press of Virginia, 1967. Flaherty, David H. “Visions of Privacy: Past, Present, and Future.” In Visions of Privacy: Policy Choices for the Digital Age, eds. Colin J. Bennett and Rebecca Grant, 19-38. Toronto, Canada: University of Toronto Press, 1999. Flato, L. “Behind the Privacy Bill.” Computer Decisions, 24-26. Fried, Charles. “Privacy.” Yale Law Journal 77 (January 1968): 475-93. Froomkin, A. Michael. “The Death of Privacy?” Stanford Law Review 52 (May 2000):1461-1543. Garrett, Roland. “The Nature of Privacy.” Philosophy Today 18 (1974). Gest, Ted. “Report on Privacy; Who is Watching You?” U.S. News 93 (July 12, 1982): 34-7. Gettleman, Marvin E. Privacy in the Perspective of United States History. Special Committee on Science and Law of the Association of the Bar of New York City. 1964. Gilmore, John. “Preserving Privacy in America.” 3 (Summer 1991). Glancy, Dorothy J. “The Invention of the Right to Privacy.” Arizona Law Review 21 (1979): 1-39. Glasser, George. “Privacy, 1974-1975.” In George Glasser Papers, 1960-1989. CBI 23. Box 6, Folders 13-14. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Gormley, K. “One Hundred Years of Privacy.” Wisconsin Law Review (1992): 1335- 1441. Grace, John W. “Protecting Privacy: A Growth Industry.” Canadian Business Review 11 (Summer 1984): 28-30. Gross, Hyman. “The Concept of Privacy.” New York University Law Review 42 (March 1967): 34-54. Halmos, Paul. Solitude and Privacy. London: Routledge and Kegan Paul Limited, 1952. Handler, Earl. “The Right of Privacy and Some of Its Recent Developments.” Dickinson Law Review 44 (October 1939): 39-48.

177 Hartmann, C.J. and S.M. Renas. “Anglo-American Privacy Law: An Economic Analysis.” International Review of Law and Economics 5 (December 1985): 133-52. Hofstadter, Samuel H. and George Horowitz. The Right of Privacy. New York: Central Book Company, 1964. Holder, Dennis. “Privacy Lost.” Student Lawyer 12 (December 1983): 14-20. Huff, Thomas. “Thinking Clearly About Privacy.” Washington Law Review 55 (1980): 777-94. Kacedon, Basil W. “The Right of Privacy.” Boston University Law Review 12 (June 1932): 353-95. Kacedon, Basil W. “The Right of Privacy.” Boston University Law Review 12 (November 1932): 600-47. Lawrence, David. “The Lost Right of Privacy.” American Mercury 38 (May 1936): 12- 6. Lincoln, Thomas L. “Privacy: A Real-World Problem with Fuzzy Boundaries.” Methods of Information in Medicine 32 (April 1993): 104-7. Linowes, David F. Privacy in America: Is Your Private Life in the Public Eye? Urbana: University of Illinois Press, 1989. Linowes, David F. “Privacy Invaders.” Barrister 5 (1978): 12-5. Long, Robert Emmet, ed. Rights to Privacy. Wilson, 1997. Luhn, Robert. “A Privacy Toolkit.” Whole Earth Review (Fall 1993): 116-25. Madgwick, Donald and Hilary Barker. Privacy Under Attack. London: National Council for Civil Liberties, 1968. Madgwick, Donald and Tony Smythe. The Invasion of Privacy. London: Pitman, 1974. Marcell, D.W. “Privacy and the American Character.” South Atlantic Quarterly 66 (Winter 1967): 1-12. Maxcell, David M. “Privacy and the American Character.” South Atlantic Quarterly 66 (1967): 1-12. Mayer, Michael F. Rights of Privacy. New York: Law-Arts Publishers, 1972. McCloskey, Herbert J. “Privacy and the Right to Privacy.” Philosophy 55 (1980): 17- 38. McLaughlin, Marsha and Suzanne Vaupel. “Constitutional Rights of Privacy and Investigative Consumer Reports.” Hastings Constitutional Law Quarterly 2 (1975): 773-823. McLean, Deckle. Privacy and its Invasion. Westport, CT: Praeger, 1995. Miller, Arthur R. “On Proposals and Requirements for Solutions.” Minnesota Law Review 53 (December 1968): 224-33. Miller, Arthur R. “The Privacy Revolution: A Report from the Barricades.” Washburn Law Journal 19 (1979-80): 1-22. Miller, Arthur Selwyn. “Privacy in the Corporate State: A Constitutional Value of Dwindling Significance.” Administrative Law Review 75 (1973): 231-64. Miller, Arthur Selwyn. “Privacy in the Corporate State: A Constitutional Value of Dwindling Significance.” Journal of Public Law 22 (1973): 3-35. Miller, Arthur Selwyn. “Privacy in the Modern Corporate State: A Speculative Essay.” Administrative Law Review 25 (1973): 231-67. Miller, Richard I. “Privacy Calls for More Than a Figleaf.” Computerworld 2 (July 17, 1968): 2. Moore, Barrington, Jr. Privacy: Studies in Social and Cultural History. Armonk, NY: M.E. Sharpe, 1984. Nizer, Louis. “Right of Privacy: A Half-Century’s Developments.” Michigan Law Review 39 (February 1941): 526-60. Noble, June and William Noble. The Private Me. New York: Delacorte Press, 1980. O’Brien, David M. “Privacy and the Right of Access: Purposes and Paradoxes of Information Control.” Administrative Law Review 30 (1978): 45-92.

178 O’Connor, Thomas H. “Right to Privacy in Historical Perspective.” Massachusetts Law Quarterly 53 (June 1968): 101-15. Pennock, J. Roland and John W. Chapman, eds. Privacy: Nomos XIII. New York: Atherton Press, 1971. Petrocelli, William. Low Profile: How to Avoid the Privacy Invaders. New York: McGraw-Hill, 1981. Posner, Richard A. “An Economic Theory of Privacy.” Regulation (May-June 1978): 19-26. Posner, Richard A. “The Economics of Privacy.” American Economic Review 71 (May 1981): 405-9. Posner, Richard A. “The Right to Privacy.” Georgia Law Review 12 (1978): 393-422. Poster, Mark. The Mode of Information. New York: Polity Press, 1990. Powers, Mary T. “The Right to Privacy in Nebraska.” Creighton Law Review 13 (1979- 80): 935-53. Pratt, Walter F. Privacy in Britain. Lewisburg, PA: Bucknell University Press, 1979. Privacy in a Free Society: Final Report-Annual Chief Justice Earl Warren Conference on Advocacy in the United States, June 7-8, 1974. Cambridge, MA: The Roscoe Pound-American Trial Lawyers Foundation, 1974. “The Privacy Thing.” Business Automation (May 1971). “Privacy Rights in Personal Information.” Annual Survey of American Law (1986): 495-666. Quittner, Joshua. “Invasion of Privacy.” Time (August 25, 1997). Rachels, James. “Why Privacy is Important.” Philosophy & Public Affairs 4 (Summer 1975): 323-33. Raines, John C. Attack on Privacy. Valley Forge, PA: Judson Press, 1974. “Recent Developments in the Right of Privacy.” University of Chicago Law Review 15 (Summer 1948): 926-39. Reiman, Jeffrey H. “Privacy, Intimacy, and Personhood.” Philosophy and Public Affairs 6 (Fall 1976): 26-44. Roberts, John M. and Thomas Gregor. “Privacy: A Cultural View.” In Nomos XIII: Privacy, eds. J. Pennock and J. Chapman, 199-225. New York: Atherton Press, 1971. Rule, James B. “For Whose Eyes Only?” New York Times, March 4, 1990. Rule, James B. “Where Does It All End? The Public Invasion of Privacy.” Commonweal (February 14, 1992): 14-6. Schoeman, Ferdinand David, ed. Philosophical Dimensions of Privacy: An Anthology. Cambridge, UK: Cambridge University Press, 1984. Scott, Gini Graham. Mind Your Own Business: The Battle for Personal Privacy. New York: Insight Books/Plenum Press, 1995. Seipp, David J. The Right to Privacy in American History. Cambridge, MA: Program in Information Resources Policy, Harvard University, July 1978. Sennett, Richard. The Fall of Public Man. New York: Alfred A. Knopf, 1977. Severn, William. The Right of Privacy. New York: Ives Washburn, 1973. Shank, R. “Privacy: History, Legal, Social, and Ethical Aspects.” Library Trends 35 (Summer 1986): 7-18. Shattuck, John H.F. Rights of Privacy. Skokie, IL: National Textbook Company, 1977. Simmel, Arnold. “Privacy.” In International Encyclopedia of the Social Sciences, ed. David L. Sills, 480-86. New York: Macmillan and Free Press, 1968. Smith, Robert Ellis. Privacy: How to Protect What’s Left of It. Garden City, NY: Anchor Press/Doubleday, 1979. Smith, Robert Ellis. “Privacy Still Threatened.” Datamation (1982): 297-306. Smith, Robert Ellis and Eric Siegel. War Stories: Accounts of Persons Victimized by Invasions of Privacy. Providence, RI: Privacy Journal, 1993. Smith, Robert Ellis and Eric Siegel. War Stories II. Providence, RI: Privacy Journal,

179 1997. Smith, S.C. The Rights of Privacy: Selected Writings of the Last Decade, 1958-1968. New Haven, CT: Yale Law Library, 1968. Sobel, Lester A., ed. War on Privacy. New York: Facts on File, 1976. Sodden, James R. Privacy: Right or Privilege? Boston, MA: Allyn and Bacon, 1977. Sorkin, Michael D., et al. “Privacy Issues Grow More Lively.” Computerworld (December 20, 1972): 1-2. Stromholm, Stig. Right of Privacy and Rights of Personality, A Comparative Study. Stockholm, Sweden: P.A. Norstedt & Soners Forlag, 1967. Stuart, Roger. “The Right to Remain Unsnooped Upon.” Pittsburgh Post-Gazette, January 8, 1995. Sykes, Charles J. The End of Privacy. New York: St. Martin’s Press, 1999. Thomson, Judith Jarvis. “The Right to Privacy.” Philosophy and Public Affairs 4 (Summer 1975): 295-314. Towe, T.E. “Growing Awareness of Privacy in America.” Montana Law Review 37 (1976): 39-89. Trueman, B. “Optimality of the Disclosure of Private Information in a Production- Exchange Economy.” Journal of Finance 38 (1983): 913-24. Tuerkheimer, Frank M. “The Underpinnings of Privacy Protection.” Communications of the ACM 36 (August 1993): 69-73. Turkington, Richard C., et al. Privacy: Cases and Materials. Houston, TX: The John Marshall Publishing Co., 1992. Vesey, G. “What Defines Privacy.” In Consciousness and the Physical World, eds. B.D. Josephson and V.S. Ramachandran, 19-39. Oxford, England: Pergamon Press, 1980. Veyne, Paul, ed. A History of Private Life. Cambridge, MA: Harvard University Press, 1987. Wacks, Raymond. “Privacy and the Practitioner.” Public Law (Summer 1983): 260-9. Wacks, Raymond. The Protection of Privacy. London: Sweet & Maxwell, 1980. Wasserstrom, Richard A. “The Legal and Philosophical Foundations of the Right to Privacy.” In Biomedical Ethics, eds. T. Mappes and J. Zembaty, 109-19. New York: McGraw-Hill, 1981. Wasserstrom, Richard A. “Privacy: Some Arguments and Assumptions.” In Philosophical Law: Authority, Equality, Adjudication, Privacy, ed. Richard Bronaugh, 148-66. Westport, CT: Greenwood Press, 1978. Weiss, Paul. Privacy. Carbondale: Southern Illinois University Press, 1983. Westin, Alan F. Privacy in Western History: From the Age of Pericles to the American Republic. Special Committee on Science and Law of the Association of the Bar of New York City. 1965. Wickens, Barbara. “Perserving Individual Privacy.” Macleans (April 26, 1993): 20-1. Wright, Marie A. and John S. Kakalik. “The Erosion of Privacy?” In Cyberethics: Social & Moral Issues in the Computer Age, eds. Robert M. Baird, et al., 162-170. Amherst, NY: Prometheus Books, 2000. Young, John B., ed. Privacy. Chichester: John Wiley and Sons, 1978. Yankwich, L.R. “Right of Privacy: Its Development, Scope, and Limitations.” Notre Dame Lawyer 27 (Summer 1952): 449. Zelermyer, W. Invasion of Privacy. Syracuse, NY: Syracuse University Press, 1959.

Privacy and Law

Aldrich, Robert F. Privacy Protection Law in the United States. Washington, DC: U.S. Department of Commerce, National Telecommunications Information Administration, 1982.

180 Beaney, William M. “The Right to Privacy and American Law.” Law and Contemporary Problems 31 (1966): 263. Becker, Gary S. “Privacy and Malfeasance: A Comment.” Journal of Legal Studies 9 (December 1980): 823-6. Bedingfield, D. “Privacy or Publicity? The Enduring Confusion Surrounding the American Tort of Invasion of Privacy.” Modern Law Review 55 (1992): 111-18. Brant, Jonathan and Lysia Bowling O’Brien. A Compilation of Massachusetts Law Relating to Privacy and Personal Data. 4th ed. Boston: Massachusetts Bar Foundation, 1978. Brownstein, Ronald. “Computer Communications Vulnerable as Privacy Laws Lag Behind.” National Journal 16 (January 14, 1984): 52-7. Burns, Peter. “Privacy and the Common Law: A Tangled Skein Unravelling?” In Aspects of Privacy Law, ed. Dale Gibson, 21-40. Toronto, Canada: Butterworths, 1980. “Circling the Wagons: Informational Privacy and Family Testimonial Privileges.” Georgia Law Review 20 (Fall 1985): 173-220. Clouse, Gary R. “The Constitutional Right to Withhold Private Information.” Northwestern University Law Review 77 (November 1982): 536-64. Gellman, Robert M. “Can Privacy Be Regulated Effectively on a National Level? Thoughts on the Possible Need for International Privacy Rules.” Villanova Law Review 41 (1996): 129-65. Gavison, Ruth. “Privacy and the Limits of Law.” The Yale Law Journal 89 (January 1980): 421-71. * Gellman, Robert M. “Does Privacy Law Work?” In Technology and Privacy: The New Landscape, eds. Philip E. Agre and Marc Rotenberg, 193-218. Cambridge, MA: MIT Press, 1997. Halpern, S.W. “Rethinking the Right of Privacy: Dignity, Decency, and the Law’s Limitations.” Rutgers Law Review 43 (1991): 539-63. Harrington, M. “Privacy and the Poor.” University of Illinois Law Forum 2 (1971). Hatch, Walter. “When Privacy Goes Public.” Seattle Times, February 8, 1987. Larremore, Wilbur. “The Law of Privacy.” Columbia Law Review 12 (December 1912): 693-708. Leiberman, Jethro K. Privacy and the Law. New York: Lothrop, Lee, and Shephard Company, 1978. Linowes, David F. “Are New Privacy Laws Needed?” Vital Speeches of the Day 44 (May 1, 1978): 436-9. National Association of Attorneys General. Privacy: Personal Data and the Law. Raleigh, NC: National Association of Attorneys General, 1976. O’Brien, David M. Privacy, Law, and Public Policy. New York: Praeger Publishers, 1979. * O’Brien, David M. The Right of Privacy: Its Constitutional & Social Dimensions. Austin, TX: Tarlton Law Library, University of Texas School of Law, May 1980. Parent, William A. “A New Definition of Privacy for the Law.” Law and Philosophy 2 (1983): 305-38. Parent, William A. “Privacy: A Brief Survey of the Conceptual Landscape.” Santa Clara Law and Technology Journal 11 (1995): 21-6. Parent, William A. “Recent Work on the Concept of Privacy.” American Philosophical Quarterly 20 (1983): 341-55. Parker, Richard. “A Definition of Privacy.” Rutgers Law Journal 27 (1974). Parker, Richard B. “A Definition of Privacy.” Rutgers Law Review 27 (1974): 275-96. Pemberton, J. de J., Jr. “On the Dangers, Legal Aspects, and Remedies.” Minnesota Law Review 53 (December 1968): 220-4. Prosser, William L. “Privacy.” California Law Review 48 (August 1960): 383-423.

181 Pyle, Christopher H. “The Invasion of Privacy.” Proceedings of the Academy of Political Science 34 (1982): 131-42. Ratcliffe, James M., ed. Privacy: Policy and the Law. New York: Doubleday, 1971. “The Right to Privacy in Nineteenth-Century America.” Harvard Law Review 94 (1981): 1892-1910. * Rosen, Jeffrey. The Unwanted Gaze: The Destruction of Privacy in America. New York: Random House, 2000. Rosenbaum, B.L. “Invasion of Privacy?” Personnel Journal 47 (October 1968): 728- 30. Schneider, Carl D. Shame, Exposure, and Privacy. New York: Norton, 1977. Skousen, Mark. The Complete Guide to Financial Privacy. Revised edition. New York: Simon and Schuster, 1983. Smith, Robert Ellis. Compilation of State and Federal Privacy Laws. 7th ed. Providence, RI: Privacy Journal, 1992. Smith, Robert Ellis. “Law of Privacy in a Nutshell.” Privacy Journal (1993): 50-1. Wacks, Raymond. Personal Information: Privacy and the Law. Oxford: Clarendon Press, 1989. Schmeck, Harold M., Jr. “A Federal Panel Urges New Laws to Protect the Privacy of Personal Records.” New York Times, August 1, 1973, p. 17.

Computers, Technology, and Information Privacy Law

* Agre, Philip E. “Beyond the Mirror World: Privacy and the Representational Practices of Computing.” In Technology and Privacy: The New Landscape, eds. Philip E. Agre and Marc Rotenberg, 29-61. Cambridge, MA: MIT Press, 1997. * Agre, Philip E. and Marc Rotenberg, eds. Technology and Privacy: The New Landscape. Cambridge, MA: MIT Press, 1997. American Bar Association. Report on the National Symposium on Personal Privacy and Information Technology, October 4-7, 1981. Washington, DC: American Bar Association, 1982. Andrews, Wright H. “An Overview of the Emerging Statutory ‘Right’ of Information Privacy.” Law and Computer Technology 10 (1977): 82-94. Armer, Paul. “Social Implications of the Computer Utility.” P-3642. Santa Monica, CA: The Rand Corporation, 1967. Armer, Paul. Social Implications of the Computer Utility: Toward a Computer Utility. Englewood Cliffs, NJ: Prentice-Hall, 1967. Association for Computing Machinery. Privacy, Security, and the Information Processing Industry. New York: Association for Computing Machinery, 1976. Auburn, F.M. “Legal Problems of Electronic Information Storage.” Tasmania University Law Review 4 (1971-2): 86-91. Bacard, Andre. The Computer Privacy Handbook. Berkeley, CA: Peachpit Press, 1995. Banzhaf, John F. “When Your Computer Needs a Lawyer.” Communications of the ACM 11 (August 1968): 543-9. Baran, Paul. “On the Engineer’s Responsibility in Protecting Privacy.” P-3829. Santa Monica, CA: The Rand Corporation, May 1968. Bigelow, Robert P. “Legal and Security Issues Posed by Computer Utilities.” Harvard Business Review 45 (September-October 1967): 150-61. “Conceptualizing National Identification: Informational Privacy Rights Protected.” John Marshall Law Review 19 (Summer 1986): 1007-29. “The Debate on Information Privacy, Part I.” EDP Analyzer 13 (November 1975): 1- 13. “The Debate on Information Privacy, Part II.” EDP Analyzer 13 (December 1975): 1-

182 14. Belair, Robert R. “Information Privacy.” In Issues in Information Policy, ed. Helen Shaw, 37-52. NTIA-SP-80-9. Washington, DC: U.S. Department of Commerce, National Telecommunications and Information Administration, February 1981. * Bellotti, Victoria. “Design for Privacy in Multimedia Computing and Communications Environments.” In Technology and Privacy: The New Landscape, eds. Philip E. Agre and Marc Rotenberg, 63-98. Cambridge, MA: MIT Press, 1997. Benjamin, L.M. “Privacy, Computers, and Personal Information: Toward Equality and Equity in an Information Age.” Communications and the Law 13 (1991): 3-16. Bennett, Colin John. “Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.” Science, Technology, and Human Values 16 (1991): 51-69. Bennett, Colin John. “Privacy Protection on the Information Highway.” Policy Options 16 (1995): 43-5. Berkeley, E.C. “Individual Privacy and Central Computer Files.” Computers and Automation 15 (October 1966): 7. Berman, Jerry and Deirdre Mulligan. “The Internet and the Law: Privacy in the Digital Age.” Nova Law Review 23 (1999): 549-59. Berman, Jerry and Deidre Mulligan. “Privacy in the Digital Age: Work in Progress.” Nova Law Review 23 (1999): 551, 556. Betts, Mitch. “Critics Anticipate Privacy Abuses on Superhighway.” Computerworld 28 (January 31, 1994): 27. Bigelow, Robert P. “Some Legal Aspects of Commercial Remote Access Computer Service.” Datamation (August 1969). Bing, Jon. “Information Law?” Journal of Media Law and Practice 2 (December 1981): 219-39. Bing, Jon. “Personal Data Systems: Comparative Perspectives on a Basic Concept in Privacy Legislation.” Information Privacy 2 (January 1980): 28-33. Bing, John and Knut S. Selmer, eds. A Decade of Computers and Law. Oslo: Norwegian University Press, 1980. Blekeli, Ragnar Dag. “Framework for the Analysis of Privacy and Information Systems.” Information Privacy 1 (1979): 214-7. Brictson, R.C. Computers and Privacy: Implications of a Management Tool. SP- 2953/001/00. Santa Monica, CA: System Development Corporation, March 14, 1968. Brictson, R.C. “An Interview: SDC’s Commitment to the Problem.” SDC Magazine 10 (July-August 1967): 33. Brictson, R.C. Some Thoughts on the Social Implications of Computers and Privacy. SP-2953. Santa Monica, CA: System Development Corporation, September 25, 1967. British Computer Society. Privacy and Public Welfare Committee. Privacy and the Computer: Steps to Practicality, ed. L. Ellis. London: British Computer Society, July 1972. NBS# 74242002. Box 624, Folder 8. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. * Burkert, Herbert. “Privacy-Enhancing Technologies: Typology, Critique, Vision.” In Technology and Privacy: The New Landscape, eds. Philip E. Agre and Marc Rotenberg, 125-42. Cambridge, MA: MIT Press, 1997. Byford, K.S. “Privacy in Cyberspace: Constructing a Model of Privacy for the Electronic Communications Environment.” Rutgers Computer & Technology Law Journal 24 (1998): 1-74. Bynum, T. et al., eds. Computing and Privacy. New Haven, CT: Research Center on Computing and Society, 1992. Carroll, John Millar. “Privacy and the Computer.” Data Systems News (August- September 1970): 10.

183 Cate, Fred H. Privacy in the Information Age. Washington, DC: Brookings Institution Press, 1997. Cavazos, Edward A. and Gavino Morin. Cyberspace and the Law: Your Rights and Duties in the Online World. Cambridge, MA: MIT Press, 1994. Cavoukian, Ann and Don Tapscott. Who Knows: Safeguarding Your Privacy in a Networked World. New York: Random House, 1996. Chaum, David. “Achieving Electronic Privacy.” Scientific American 267 (August 1, 1992): 96-101. Chaum, David. “A New Paradigm for Individuals in the Information Age.” In Proceedings from IEEE 5th Symposium on Security and Privacy (Oakland, CA: April- May 1984), 99-103. Clement, Andrew. “Considering Privacy in the Development of Multimedia Communications.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 907-31. San Diego: Academic Press, 1996. “Computer Privacy.” Scientific American 236 (February 1977): 50. “Computerized Life: But Who Shall Govern the Governors?” Kansas City Star, September 11, 1967. “The Constitutional Protection of Informational Privacy.” Boston University Law Review 71 (1991): 133-60. Corbett, J. “Computers and the Protection of Privacy.” New Law Journal 126 (June 3, 1976): 556-9. Cox, B. Maintaining Privacy in Electronic Transactions. Pittsburgh, PA: Information Networking Institute, Carnegie Mellon University, 1994. Davidson, Mark. “Computer Privacy.” Science Digest 82 (September 1977): 42-4. Davidson, Timothy A. “Computer Information Privacy.” The Office 70 (August 1969): 10-7. Davis, Ruth M. “A Technologist’s View of Privacy and Security in Automated Information Systems.” Rutgers Journal of Computers and Law 4 (1975): 264-93. DeCew, Judith Wagner. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Ithaca, NY: Cornell University Press, 1997. DeCew, Judith Wagner. “The War Between Profit and Privacy.” Chicago Tribune, March 14, 1991. Dempsy, James X. “Communications Privacy in the Digital Age: Revitalizing the Federal Wiretap Laws to Enhance Privacy.” Albany Law Journal of Science and Technology 65 (1997): 75. Dial, O. Eugene and Edward M. Goldberg. Privacy, Security, and Computers: Guidelines for Municipal and Other Public Information Systems. New York: Praeger, 1975. Douglas, W.O. “Computerized Man: Cause of Privacy.” Vital Speeches of the Day 33 (September 1, 1967): 700-4. Doyle, Charles. “Privacy in the Age of Computers.” CRS Review (July-August 1990): 6-8. Ellis, L. Privacy and the Computer—Steps to Practicality. July 1972. NBS# 73348004. Box 604, Folder 5. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Elmer-DeWitt, Philip. “Cyberpunks and the Constitution.” Time (April 8, 1991): 81. Fanwick, Charles. Maintaining Privacy of Computerized Data. SP-2647. Santa Monica, CA: System Development Corporation, December 1966. Fenwick, W.A. “Privacy.” Data Management 13 (May 1975): 18-21. Finkelstein, Katherine Eban. “The Computer Cure: Privacy Isn’t Always the Best Medicine.” New Republic 219 (September 14, 1998): 28-32. Fisher, Joy, ed. Data Transmission and Privacy. Dordrecht, The Netherlands: Nijhoff, 1994.

184 Fisher, Susan E. “What Do Computers Know About You?” PC Week (February 11, 1991): 156-7. Fortner, Robert S. “Privacy is Not Enough: Personhood and High Technology.” Conrad Grebel Review 7 (1989) 159-177. Foster, J.E. Electronics and Privacy: Security Aspects. Stratford, CT: Avco Lycoming Division, 1968. Freedman, Warren. “The Right of Privacy in the Age of Computer Data and Processing.” Texas Tech Law Review 13 (1982): 1361-1400. Freedman, Warren. The Right of Privacy in the Computer Age. New York: Quorum Books, 1987. Friedman, L.M. “Disclosure of Information: A Coin with Two Sides.” Public Administration Review 17 (Winter 1957): 10-3. Friedman, R.C. “EDP and the Law.” Data Management (August 1972): 14-5. Frigault, Ronald Roger. “Students, Privacy, and the New Technology.” Ph.D. diss., The University of Texas at Austin, 1989. Fromholz, Haley J. “Discovery, Evidence, Confidentiality, and Security Problems Associated with the Use of Computer-Based Litigation Support Systems.” Washington University Law Quarterly (Summer 1977): 445-60. Gallagher, Cornelius. The Computer and Invasion of Privacy. New York: Arno Press, 1967. Gallati, Robert R.J. “Security and Privacy Policy.” In Proceedings of the Spring Joint Computer Conference, 1967. Garfinkel, Simson L. “Privacy and the New Technology: What They Do Know Can Hurt You.” The Nation (February 28, 2000). Gerhart, J. M. “Technology Encroaches on the Reasonable Expectation of Privacy: Dow Chemical Company vs. United States.” New Mexico Law Review 17 (1987): 391- 408. Givens, Beth and Dale Fetherling. The Privacy Rights Handbook: How to Take Control of Your Personal Information. New York: Avon Books, 1997. Glaz, Umni. “The Silicon Curtain.” Computer Decisions 9 (September 1977): 30-4. Goldstein, B. “Privacy: A Public Issue.” Data Systems News 9 (November 1968): 30- 1. Gordon, Hedy. “The Interface of Living Systems and Computers: The Legal Issues of Privacy.” Computer/Law Journal 2 (Fall 1980): 877-90. Gottlieb, A.E. “Computers and Privacy.” Law and Computer Technology (January- February 1972): 17-25. Gould, John P. “Privacy and the Economics of Information.” Journal of Legal Studies 9 (1980): 827-42. Granger, M.P. “Records, Privacy, and Computer Security: A Doctor’s View.” Canadian Doctor (February 1981): 63-70. Gray, Susan. “Electronic Databases and Privacy: Policy for the 1990s.” Science, Technology, and Human Values 14 (1989): 242-57. Greenier, E.J., Jr. “Computers and Privacy: A Proposal for Self-Regulation.” Proceedings of the ACM (October 1969): 231-69. Greguras, Fred M. “Information Systems and Privacy Issues in the USA.” Information Privacy 2 (1980): 90-7. Gupta, G.K. “International Developments in Information Privacy.” Advances in Computers 23 (1983): 253-94. Halsbury, The Earl of. “Lord Halsbury Speaks on Computer Privacy.” Computers and Automation (July 1970): 42-3. Hanlon, Joseph. “British Study Discounts Computer Privacy Threats.” Computerworld (July 26, 1972): 4. Hellman, John Jay. “Privacy and Information Systems: An Argment and an

185 Implementation.” M.A. thesis, Massachusetts Institute of Technology, 1970. Hellman, John Jay. “Privacy and Information Systems: An Argument and an Implementation.” P-4298. Santa Monica, CA: The Rand Corporation, May 1970. Henderson, Robert P. “Computers and Privacy.” Advanced Management Journal (July 1971): 8-12. Henderson, Robert P. “Controlling the Computer’s Threat to Privacy.” Michigan Business Review (November 1971): 9-14. Hewitt, Patricia. Privacy: The Information Gatherers. London: National Council for Civil Liberties, September 1977. Hewitt, Patricia, ed. Computers, Records, and the Right to Privacy. Surrey, England: Input Two-Nine, 1979. Hoffman, Lance J. “Computers and Privacy: A Survey.” Computing Surveys 1 (June 1969): 85-103. Hoffman, Lance J. Modern Methods for Computer Security and Privacy. Englewood Cliffs, NJ: Prentice-Hall, 1977. Hoffman, Lance J. “A Research Agenda for Privacy in the Next Decade.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 3-6. New York: Academic Press, 1980. Hoffman, Lance J., comp. Security and Privacy in Computer Systems. Los Angeles: Melville Publishing Company, 1973. Hoffman, Lance J., ed. Computers and Privacy in the Next Decade: Proceedings of the Workshop on Computers and Privacy in the Next Decade, Asilomar Conference Grounds, Pacific Grove, California, February 25-28, 1979. New York: Academic Press, 1980. Horton, Frank. “Privacy, Security, and a Free America.” Vital Speeches of the Day 37 (November 1, 1970): 44-7. Introna, Lucas D. “Privacy and the Computer: Why We Need Privacy in the Information Society.” In Cyberethics: Social & Moral Issues in the Computer Age, eds. Robert M. Baird, et al., 188-99. Amherst, NY: Prometheus Books, 2000. Introna, Lucas D. “Privacy and the Computer: Why We Need Privacy in the Information Society.” Metaphilosophy 28 (1997): 259-75. “Intrusions Upon Informational Seclusion in the Computer Age.” John Marshall Law Review 17 (Summer 1984): 831-48. Isaacson, Portia. “The Personal Computer Versus Personal Privacy.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 35-7. New York: Academic Press, 1980. * Jennings, Charles and Lori Fena. The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet. New York: The Free Press, 2000. Karasik, Eve H. “A Normative Analysis of Disclosure, Privacy, and Computers: The State Cases.” Computer/Law Journal 10 (1990): 603-34. Katz, James E. and Annette R. Tassone. “Public Opinion Trends: Privacy and Information Technology.” Public Opinion Quarterly 54 (Spring 1990): 125-43. Keliher, Michael J. “Computer Security and Privacy.” Vital Speeches of the Day 46 (August 15, 1980): 662-6. Kirby, Michael D. “Access to Information and Privacy: The Ten Information Commandments.” University of Cincinnati Law Review 55 (1987): 745-59. Kirby, Michael D. “Eight Years to 1984: Privacy and Law Reform.” Rutgers Journal of Computers and the Law 5 (1976): 487-502. Kitch, Edmund W. “The Law and Economics of Rights in Valuable Information.” Journal of Legal Studies 9 (1980): 683-723. Lau, T., et al. “Privacy Interfaces for Information Management.” Communications of the ACM 42 (October 1999): 88-94. Lautsch, John C. “Foundations of Various State Information Practice Laws.” Data

186 Management 15 (January 1977): 19-23. “Legal Aspects of Computerized Information Systems.” Honeywell Computer Journal 7 (1973): 1-96. Leigh, Lawrence J. “Information Privacy: Constitutional Challenges to the Collection and Dissemination of Personal Information by Government Agencies.” Hastings Constitutional Law Quarterly 3 (1976): 229-59. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. Lessig, Lawrence. “The Path of Cyberlaw.” Yale Law Journal 104 (1995): 1743-8. Lessig, Lawrence. “Reading the Constitution in Cyberspace.” Emory Law Journal 45 (1996): 869-82. Lickson, C.P. “Privacy and the Computer Age.” IEEE Spectrum (October 1968): 58- 63. Lickson, C.P. “Protection of the Privacy of Data Communications by Computer: Another Case Study on the Impact of Computer Technology on the Law.” Business Lawyer 23 (July 1968): 971-81. Lickson, C.P. “The Right of Privacy in the Computer Age.” IEEE Computer Group News 2 (January 1968): 13-7. Linowes, David F. “Must Personal Privacy Die in the Computer Age?” American Bar Association Journal 65 (1979): 1180-4. Litman, Jessica. “Information Privacy/Information Property.” Stanford Law Review 52 (2000). Long, Edward V. “Computer Privacy: ‘Sword of Damocles.’” Comgressional Record— Senate, October 10, 1967, p. S14517-S14518. Lyon, David. “New Technology and the Limits of Luddism.” Science as Culture 7 (1989): 122-34. Lyon, David. “Privacy, Persons, and Protection.” In The Information Society: Issues and Illusions, 99-104. New York: Polity Press, 1988. Martin, James. Security, Accuracy, and Privacy in Computer Systems. Englewood Cliffs, NJ: Prentice-Hall, Inc., 1973. Marx, Gary T. “Privacy and Technology.” Whole Earth Review (Winter 1991): 91-5. Marx, Gary T. “Privacy and Technology.” The World and I (September 1990). Marx, Gary T. “Privacy and the Home: The King Doesn’t Have to Enter Your Cottage to Invade Your Privacy.” Impact Assessment Bulletin 7 (?): 31-59. Mathieson, S.A. “Online: In Sight of the Law.” Guardian, March 1, 2001. Matley, Ben G. “Computer Privacy in America: Conflicting Practices and Policy Choices.” In Proceedings of the IEEE Symposium on Security and Privacy, 219-23. 1985. Meldman, Richard. “Privacy Expectations in the Information Age.” Ekistics 50 (September-October 1983): 392-7. Miller, Arthur R. “Computers and Privacy.” In Ethics and the Management of Computer Technology: Proceedings of the Fourth National Conference on Business Ethics, eds. W. Michael Hoffman and Jennifer M. Moore, 93-108. Cambridge, MA: Oelgeschlageer, Gunn, and Hain, 1982. Miller, Arthur R. “Computers and Privacy.” In Ethical Issues in Information Science, eds. R. Dejoie, et al., 118-33. Boston, MA: Boyd and Fraser, 1991. Miller, Michael. “Lawmakers Begin to Heed Calls to Protect Privacy and Civil Liberties as Computer Usage Explodes.” Wall Street Journal, April 11, 1991, p. A16. Miller, Richard I. “Computers and the Law of Privacy.” Datamation (September 1968): 49-55. Miller, Richard I. “Invasion of Privacy by Computer.” Lex et Scientia 5 (February 1968): 18-24. Miller, Roger F. “Computers and Privacy: What Price Analytic Power?” Proceedings of

187 the ACM (1971): 706-16. Mitau, G. Theodore. “Toward a Comprehensive Fair Information Standards Law: A Commentary on the Data Privacy Issue in Minnesota.” Minnesota Law Review 62 (1978): 642-79. Moon, B.A.M. and B.J. Clarke. “Privacy: A Field Study of Computer Files on the Individual.” Data Base: A Quarterly Newsletter of the Special Interest Group on Business Data Processing of the ACM 6 (Winter 1974): 5-9. Moor, James H. “How to Invade and Protect Privacy with Computers.” In The Information Web, ed. C. Gould, 57-70. San Francisco, CA: Westview Press, 1989. Moor, James H. “Toward a Theory of Privacy in the Information Age.” In Cyberethics: Social & Moral Issues in the Computer Age, eds. Robert M. Baird, et al., 200-212. Amherst, NY: Prometheus Books, 2000. Moore, Patrick L. “United States v. Miller: Without a Right to Informational Privacy, Who Will Watch the Watchers?” John Marshall Journal of Practice and Procedure 10 (1977): 629-50. Murdock, Lauretta E. “The Use and Abuse of Computerized Information: Striking a Balance Between Personal Privacy Interests and Organizational Information Needs.” Albany Law Review 44 (1980): 589-619. Murphy, Richard S. “Property Rights in Personal Information: An Economic Defense of Privacy.” Georgia Law Journal 84 (1996): 1831. Murray, J.A., ed. Information Processing and the Right to Privacy: A Crossroads Decision for North Americans. Windsor, Ontario, Canada: University of Windsor Press, 1973. Mustafa, Husain. “Personal Privacy in an Information Society.” Virginia Social Science Journal 20 (Winter 1985): 12-21. Noll, A.M. “Interactions of Computers and Privacy.” Honeywell Computing Journal 7 (1973): 163-72. Nora, Simon and Alan Minc. The Computerization of Privacy. Cambridge, MA: MIT Press, 1980. Nycum, Susan Hubbell. “Legal Protection for Computer Programs.” Computer/Law Journal 1 (1978): 1-83. * Nycum, Susan Hubbell. “Selected Legal Aspects of Computer Security in the U.S.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 397-415. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Nycum, Susan Hubbell. “Testimony on Computer Security.” Computers & Society 13- 14 (1983-1984): 2-4. Nycum, Susan Hubbell and William A. Lowell. “Common Law and Statutory Liability for Inaccurate Computer-Based Data.” Emory Law Journal 30 (1981): 446-81. Oz, Effy. “Invasion of Privacy.” In Ethics for the Information Age. Burr Ridge, IL: Business and Educational Technologies, 1994. Parsons, Carole W. “Data Processing and the Right to Privacy.” In Proceedings of the International Conference on the Future of Public Administration, vol. 9, 1903-24. Quebec, Canada: Ecole Nationale d’Administration Publique, May 27-31, 1979. Peck, R.S. “Extending the Constitutional Right to Privacy in the New Technological Age.” Hofstra Law Review 12 (Summer 1984): 893-912. Peritt, Henry H. Law and the Information Superhighway: Privacy, Access, Intellectual Property, Commerce, Liability. New York: Wiley, 1996. Perry, Gregory E. and Cherie Ballard. “A Chip By Any Other Name Would Still Be a Potato: The Failure of Law and its Definitions to Keep Pace with Computer Technology.” Texas Tech Law Review 24 (1993): 797-828. Petersen, H.E. “Protecting Privacy Within the Computer System.” In Proceedings of the American Society of Industrial Security, 99-101. September 1967. Petersen, H.E. and Rein Turn. “System Implications of Information Privacy.” In

188 Proceedings of the Spring Joint Computer Conference, vol. 30, 291-300. Washington, DC: Thompson Book Company, 1967. Petersen, H.E. and Rein Turn. “System Implications of Information Privacy.” P-3504. Santa Monica, CA: The Rand Corporation, April 1967. Piller, Charles. “Privacy in Peril.” MacWorld (July 1993): 8-14. Potvin, Louise. “Privacy Issues in the Information Age: What Corporations Need to Know.” Government Information Quarterly 8 (1991): 95-9. Poxter, John D. State Security, Privacy, and Information. New York: Harvester Wheatsheaf, 1990. “Privacy and Computer Law.” Law Institute Journal 65 (1991): 462-522. “Privacy, Computerized Information Systems, and the Common Law: A Comparative Study in the Private Sector.” Gonzaga Law Review 18 (1982-3): 567-604. Ranabarger, J.K. “Computers: Another Challenge to Privacy.” M.A. thesis, University of Kansas, 1968. Regan, Priscilla M. “Ideas of Interests: Privacy in Electronic Communications.” Policy Studies Journal 21 (1993): 450-69. Reidenberg, Joel R. and François Gamet-Pol. “The Fundamental Role of Privacy and Confidence in the Network.” Wake Forest Law Review 30 ( ): 105-25. Rosen, Jeffrey. “Why Internet Privacy Matters.” New York Times Magazine (April 30, 2000). Rosenoer, Jonathan. Cyberlaw: The Law of the Internet. Springer, 1997. Rotenberg, Marc. “Communications Privacy: Implications for Network Design.” Communications of the ACM 36 (1993): 61. Rotenberg, Marc. Privacy Law in the United States: Failing to Make the Grade. Computer Professionals for Social Responsibility, 1991. Rotenberg, Marc. “Protecting Privacy.” Communications of the ACM 35 (April 1992): 164. Rothfeder, Jeffrey. “Is Nothing Private? Computers Hold Lots of Data on You—And There are Few Limits on Its Use.” Business Week (September 4, 1989): 74-82. Rothman, Stanley. “Protecting Privacy: Pros and Cons.” In Data Bases, Computers, and the Social Sciences, ed. R.L. Bisco. New York: Wiley-Interscience, 1970. Rovere, Michael V. “The Invasion of Privacy: Technology and the Claims of Community.” American Scholar 27 (1958): 413. Rubin, Michael Rogers. Private Rights, Public Wrongs: The Computer and Personal Privacy. Norwood, NJ: Ablex Publishing Corporation, 1988. Rule, James B. “Privacy: Impact of New Technologies.” In The Five Year Outlook: Problems, Opportunities, and Constraints in Science and Technology, vol. 4, 521-32. Washington, DC: National Science Foundation, 1980. Salasin, John. “A Control Systems Model of Privacy.” In Proceedings of the National Computer Conference, vol. 45, 45-51. Montvale, NJ: AFIPS Press, 1976. Salton, G. “Progress Report on Information Privacy and Data Security.” Journal of the American Society for Information Science 31 (1980): 75-83. * Samarajiva, Rohan. “Interactivity as Though Privacy Mattered.” In Technology and Privacy: The New Landscape, eds. Philip E. Agre and Marc Rotenberg, 277-309. Cambridge, MA: MIT Press, 1997. Samarajiva, Rohan. “Privacy in Electronic Public Space: Emerging Issues.” Canadian Journal of Communication 19 (1994): 87-99. Scaletta, Phillip J., Jr. “The Legal Ramifications of the Computer Age: Part 1—Suing and Computer: Printout as Evidence.” Data Management (October 1970): 12-5. Schneier, Bruce and David Banisar, eds. The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance. New York: Wiley, 1997. Schwartz, Laurens R. “Chapter 8: Computer Privacy.” In Computer Law Forms Handbook, 325-32. New York: Clark Boardman Company, Ltd., 1989.

189 Schwartz, Paul M. and Joel R. Reidenberg. Data Privacy Law: A Study of United States Data Protection. Charlottesville, VA: Michie, 1996. Seipel, Peter. Computing Law: Perspectives on a New Legal Discipline. Stockholm, Sweden: LiberFörlag, 1977. Sieghart, Paul. “Computers, Information, Privacy, and the Law.” Journal of the Royal Society of Arts 135 (1977): 456-72. Sieghart, Paul. Privacy and Computers. London: Latimer, 1976. Simitis, Spiros. “Reviewing Privacy in an Information Society.” University of Pennsylvania Law Review 135 (March 1987): 707-46. Simons, G.L. Privacy in the Computer Age. Manchester, England: The National Computing Centre Limited, 1982. Simpson, Alan, ed. Computer Privacy: Where to and Why. London: Input Two-Nine, 1977. Skelly, Stephen J. “Balancing Privacy and Efficiency in an Electronic World.” Law and Computer Technology 12 (1979): 38-49. Smith, Henry Jefferson. Managing Privacy: Information Technology and Corporate America. Chapel Hill: University of North Carolina Press, 1994. Smith, Henry Jefferson. “Managing Information: A Study of Personal Information Privacy.” Ph.D. diss., Harvard University, 1990. Smith, Robert Ellis. “Ben Franklin’s Web Site: Privacy and Curiosity from Plymouth Rock to the Internet.” Privacy Journal (2000): 407. Smith, Robert Ellis. “Can Technology Protect Privacy, Not Threaten It?” Privacy Journal (September 1994). Solove, Daniel J. and Marc Rotenberg. Information Privacy Law. New York: Aspen Publishers, 2003. Soma, John T. and Richard A. Wehmhoefen. “A Legal and Technical Assessment of the Effect of Computers on Privacy.” Denver Law Journal 60 (1983): 449-83. Steinmüller, Wilhelm. “Legal Problems of Computer Networks: A Methodological Survey.” Computer Networks 3 (1979): 187-98. Sterling, Rhys A. “Privacy Information Systems and the Common Law: A Comparative Study in the Private Sector.” Gozaga Law Review 19 (1982-3): 567- 604. Sternal, Guy J. “Informational Privacy and Public Records.” Pacific Law Journal 8 (January 1977): 222-7. Stone, Michael G. Computer Privacy. New York: Anbar, 1968. Titus, James P. “Security and Privacy.” Communications of the ACM (June 1967): 379-80. Tribe, Laurence. “The Constitution in Cyberspace.” The Humanist (September- October 1991): 15. Trubow, George B. “The Development and Status of ‘Informational Privacy’ Law and Policy in the United States.” In Invited Papers on Privacy: Law, Ethics, and Technology, 1-9. Washington, DC: American Bar Association, 1982. Trubow, George B. Privacy Law and Practice. New York: Times Mirror Books, 1991. Trubow, George B. “Protecting Informational Privacy in the Information Society.” Northern Illinois University Law Review 10 (1990): 521-42. Trubow, George B. Watching the Watchers: The Coordination of Federal Privacy Policy. Washington, DC: The Benton Foundation, 1989. Trubow, George B. and Joseph E. Collins. “Security, Privacy, and Law.” In Proceedings of the National Computer Conference, vol. 56, 449-50. Reston, VA: AFIPS Press, 1987. Turn, Rein. “A Brief History of Computer Privacy/Security Research at Rand.” P-4798. Santa Monica, CA: The Rand Corporation, March 1972. Turn, Rein. A Brief History of Computer Privacy/Security Research at Rand. AD-748-

190 917. Springfield, VA: National Technical Information Service, March 1972. Turn, Rein. “Classification of Personal Information for Privacy Protection Purposes.” In Proceedings of the National Computer Conference, vol. 45, 301-7. Montvale, NJ: AFIPS Press, 1976. Turn, Rein. “Classification of Personal Information for Privacy Protection Purposes.” P-5652. Santa Monica, CA: The Rand Corporation, 1976. Turn, Rein. Computers in the 1980s. New York: Columbia University Press, 1974. Turn, Rein. “Technical Implications of Privacy Protection Requirements.” Information Privacy 2 (January 1980): 2-6. Tye, Larry. “Privacy Lost in a High-Tech Era.” Boston Globe, September 5, 1993, p. 1, 18. Tye, Larry. “Privacy Threat Raises a Cry for New Protection.” Boston Globe, September 8, 1993, p. 12-3. University of Maryland. Center for Philosophy and Public Policy. “Privacy in the Computer Age.” Philosophy & Public Policy 4 (Fall 1984): 1-5. Vidmar, Neil and David Flaherty. “Concern for Personal Privacy in an Electronic Age.” Journal of Communication (1986): 91-103. Watson, Thomas J., Jr. “Technology and Privacy.” Address to the Commonwealth Club of California, San Francisco, April 5, 1968. Weingarten, Fred W. “Information Technology and Privacy Trends in Products and Services.” In Invited Papers on Privacy: Law, Ethics, and Technology, 15-26. Washington, DC: American Bar Association, 1982. Westin, Alan F. “Civil Liberties and Computerized Data Systems.” In Computers, Communications, and the Public Interest, ed. Martin Greenberger. Baltimore: Johns Hopkins Press, 1970. Westin, Alan F. Computer Science & Technology: Computers, Personnel Administration, and Citizen’s Rights. Washington, DC: GPO, 1979. Westin, Alan F. “Computers and the Protection of Privacy.” Technology Review 71 (April 1969): 32-7. Westin, Alan F. “Home Information Systems: The Privacy Debate.” Datamation 28 (July 1982): 100-14. Westin, Alan F. “Legal Safeguards to Insure Privacy in a Computer Society.” Communications of the ACM 10 (September 1967): 533-7. Westin, Alan F. “Legal Safeguards to Insure Privacy in a Computer Society.” In Perspectives on the Computer Revolution, ed. Z.W. Pylyshyn. Englewood Cliffs, NJ: Prentice-Hall, Inc., 1970. Westin, Alan F. “The Long-Term Implications of Computers for Privacy and the Protection of Public Order.” In Computers and Privacy in the Next Decade, ed. Lance J. Hoffman, 167-81. New York: Academic Press, 1980. Westin, Alan F. “Managing Consumer Privacy Issues: A Checklist.” Transnational Data and Communication Report (July-August 1991): 35-7. Westin, Alan F. “New Issues of Computer Privacy in the Eighties.” In Information Processing 83, Proceedings of the IFIP 9th World Computer Congress, Paris, France, September 19-23, 1983, ed. R.E.A. Mason, 733-9. North-Holland/IFIP, 1983. Westin, Alan F. “New Laws Will Protect Your Privacy.” Think: An IBM Corporation Magazine 35 (May 1969): 27-31. Westin, Alan F. “Personnel Practices in the U.S. Civil Service.” Information Age 4 (July 1982): 149-69. Westin, Alan F. “The Problem of Privacy and Security with Computerized Data Collection.” Conference Board Record 11 (March 1974): 31-4. Westin, Alan F. “Privacy and the Home Computer.” Popular Computing (July 1982). Westin, Alan F. “Privacy Issues in Personnel Administration.” Information Age 4 (January 1982): 5-12.

191 Westin, Alan F. “Special Report: Legal Safeguards to Insure Privacy in a Computer Society.” Communications of the ACM 10 (1967): 533-7. White, J.V. “Privacy in the Information Society.” Vital Speeches of the Day (March 1, 1982): 313-5. Whitear, G. “Privacy and the Computer.” New Law Journal 122 (1972): 555-6. “Who Watches the Watchers?” Data Systems News (December 1970). Williams, S.J., et al. Privacy, Technology, and the American Citizen. Cambridge, MA: Massachusetts Institute of Technology, 1974. Williams, Sylvia M. “Teleinformatics, the Protection of Privacy, and the Law.” Annals of Air and Space 7 (1982): 447-68. Wong, K. “Implications of Computer Security and Privacy in the 1980s.” Information

Fiction

Anderson, Poul. “Sam Hall.” In Machines That Think: The Best Science Fiction Stories About Robots and Computers, eds. Isaac Asimov, et al., 297-331. New York: Holt, Rinehart, and Winston, 1983. Brin, David. Earth. New York: Bantam, 1990. Brown, Dan. Digital Fortress. New York: St. Martin’s Press, 1998. Brunner, John. Shockwave Rider. New York: Ballantine Books, 1975. * Card, Orson Scott. Ender’s Game. New York: Tor Books, 1985. Stephenson, Neal. Snow Crash. New York: Bantam, 1992.

Security

Alireza, Khalid A. “Client/Server Security and Off-Line Guessing.” Ph.D. diss., Illinois Institute of Technology, 2000. Allen, Brandt R. “Computer Security: Part I.” Data Management (January 1972): 18- 24. Allen, Brandt R. “Computer Security: Part II.” Data Management (February 1972): 24-30. Allen, Brandt R. “Danger Ahead: Safeguard Your Computer.” Harvard Business Review (November 1968): 97-101. Anderson, Arthur F. “Company Security Practices.” Conference Board Record (October 1967). Anderson, James P. “Information Security in a Multi-user Computer Environment.” In Advances in Computers, vol. 12, ed. Morris Robinoff, 1-36. New York: Academic Press, Inc., 1972. Barker, Richard. Computer Security Handbook. Second Edition. Blue Ridge Summit, PA: TAB Reference Books, 1991. Barr, R. “Lack of Computer Security Held a Boon to Big Brothers.” Electronic News (February 13, 1968): 35. Bartram, Peter. “Software Security.” Data Systems (December 1971): 16-7. Bates, William S. “Security of Computer-Based Information Systems.” Datamation 16 (May 1970): 60-5. Beardsley, Charles W. “Is Your Computer Insecure?” IEEE Spectrum 9 (January 1972): 67-78. Behrens, Carl. “Computers and Security.” Science News (June 3, 1967): 532-3. Bell, D.E. and L.J. LaPadula. Computer Security Model: Unified Exposition and Multics Interpretation. ESD-TR-75-306. Hanscom AFB, MA: The MITRE Corporation, HQ Electronic Systems Division, June 1975. Bell, D.E. and L.J. LaPadula. Secure Computer Systems: Mathematical Foundations. MTR-2547, Vol. 1. Hanscom AFB, MA: The MITRE Corporation, March 1, 1973.

192 Bell, D.E. and L.J. LaPadula. Secure Computer Systems: A Mathematical Model. MTR- 2547, Vol. 2. Hanscom AFB, MA: The MITRE Corporation, May 31, 1973. Bell, D.E. and L.J. LaPadula. Secure Computer Systems: A Refinement of the Mathematical Model. MTR-2547, Vol. 3. Hanscom AFB, MA: The MITRE Corporation, December 1973. Biba, K.J. Integrity Considerations for Secure Computer Systems. Report MTR 3153. Bedford, MA: The MITRE Corporation, 1975. Bray, Melvyn. “How Safe Is Your System?” Data Systems (December 1971): 12-5. Bride, Edward J. “IBM, Security Test Sites Vie on Software Strength.” Computerworld (June 13, 1973): 1. Bride, Edward J. “Navy Users Told 100% Security Unreachable.” Computerworld (May 16, 1973): 1. Brown, William F., ed. AMR’s Guide to Computer and Software Security. New York: Advanced Management Research International, Inc., 1971. Browne, Peter S. “Blueprint for Computer Security Drawn by State Farm Specialist.” National Underwriter 16 (June 1972): 47-9. Browne, Peter S. “Computer Security: A Survey.” Database: Quarterly Newsletter of ACM Special Interest Group on Business Data Processing 4 (Fall 1972): 1-12. Browne, Peter S. “Computer Security: A Survey.” In Proceedings of the National Computer Conference, vol. 45, 53-63. Montvale, NJ: AFIPS Press, 1976. Buch, E.R. An Introduction to Data Security and Controls. Pinner, Middlesex, Britain: On Line Publications, 1982. Buckley, John L. “Computers, Automation, and Security.” Law and Order (March 1965). Burton, G. “Late Leap Forward Internet Security.” Information Age (May 2000): 30- 32. Bushkin, Arthur A. A Framework for Computer Security. Springfield, VA: NTIS, June 1975. Carey, John. “Spy vs. Computer Nerd: The Fight Over Data Security.” Business Week (October 4, 1993): 43. Carroll, John Millar. Computer Security. Los Angeles: Security World Publishing, 1977. Carroll, John Millar. “How Safe is Your Computer?” Business Quarterly (Autumn 1971): 86-9. Chaum, David. “Security Without Identification: Big Brother Takes Over Through New Identification System.” Informatie 29 (1987): 213-27. Chaum, David. “Security Without Identification: Transactions Systems to Make Big Brother Obsolete.” Communications of the ACM 28 (October 1985): 1030-44. * Checkley, John. “Building Secure Systems.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 821-36. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Cheheyl, Maureen Harris, et al. “Verifying Security.” ACM Computing Surveys 13 (September 1981): 279-339. Chu, Albert L.C. “Computer Security: The Corporate Achilles Heel.” Business Administration (February 1, 1971): 32-8. “Computer Designs Tamperproof Computer.” Data Management (September 1969): 55. “Computer Security.” Industrial Security (December 1969): 18-37. “Computer Security is Sensitive Area.” Industry Week (October 5, 1970): 13-4. Conway, Richard W., et al. “On the Implementation of Security Measures in Information Systems.” Communications of the ACM 15 (April 1972): 211-20. Conway, Richard W., et al. “Selective Security Capabilities in ASAP: A Fole Management System.” In Proceedings of the Spring Joint Computer Conference, vol. 40, 1181-5. 1972.

193 Cooper, James Arlin. Computer-Security Technology. Lexington, MA: Lexington Books, 1984. * Cowcher, Randle. “Physical Security.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 311-32. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Cross, Richard F. “Safeguarding Classified Information.” Industrial Security (August 1967). Cross, Richard F. “Tighter Security for Computers.” Industrial Security (August 1971): 86-9. “Dangers to Software Security Discussed.” Computerworld (August 26, 1970): S-2. “Data Security and Control Must Go Hand in Hand.” Computerworld (January 19, 1972): 10. Davies, D. The Security of Data in Networks. Los Angeles, CA: IEEE Computer Society Press, 1981. Davis, A.G. “Security of the Computer Center.” Industrial Security (April 1971): 20. Davis, D. “Kerberos Plus RSA for World Wide Web Security.” In Proceedings of the First USENIX Workshop on Electronic Commerce, 185-8. 1995. Davis, Morton S. “Service Bureaus Need to Improve Data Security.” Computerworld (August 26, 1970). * DeMaio, Harry. “Foreword.” In Computer Security Reference Book, eds. K.M. Jackson, et al., vii-viii. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Dembart, Lee. “Computer Industry Worries, as Imposters Crack Security.” The Minneapolis Star, March 9, 1982, p. 1B, 4B. DeMillo, Richard A., et al. Foundations of Secure Computation. New York: Academic Press, 1978. Denning, Dorothy Elizabeth R. “A Lattice Model of Secure Information Flow.” Communications of the ACM 19 (May 1976): 236-42. Denning, Dorothy Elizabeth R. and Peter J. Denning. “Data Security.” ACM Computing Surveys 11 (September 1979): 227-49. Dennis, Robert L. Security in the Computer Environment. SP-2400/000/01. August 18, 1966. Santa Monica, CA: System Development Corporation, August 1966. NBS# 6623662. Box 370, Folder 10. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Dickey, C. Lewis. “Securing the Computer.” Journal of Systems Management (February 1972): 8-10. “Dissatisfaction Expressed with Data Security.” Computerworld (November 11, 1970): 3. Dobkin, David P. Future Outlook for Data Security. TR 79-5. Tucson, AZ: University of Arizona, March 1979. Donn, Edward S. “Secure Your Digital Data.” Electronic Engineer (May 1972): 5-7. * Douglass, Gordon. “Networks: LAN Security.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 781-96. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Duncan, G. and D. Lambert. “Disclosure-Limited Data Dissemination.” Journal of the American Statistics Association 81 (1986): 10-27. Duncan, Tom and Phillip B. Wolfe. “Informational Privacy: The Concept, Its Acceptance, and Affect on State Information Practices.” Washburn Law Journal 15 (1976): 273-89. Ehrlich, Paul. “Built-In Security Features Called Latest Product Trend.” MIS Week (September 16, 1981): 1-11. Enger, Isadore, et al. Automatic Security Classification Study. RADC-TR-67-472. New York: Rome Air Force Development Center, October 1967. “Experts Agree: ‘There are No Secure Computers.’” Information Systems News (June 15, 1981): 20.

194 Fanwick, Charles. “Computer Safeguards: How Safe Are They?” SDC Magazine (July 1967): 26-8. Farr, M.A.L., et al. Computers and the Professional: Security for Computer Systems. Manchester, England: National Computing Centre, Ltd., 1972. Fisher, Royal P. Information Systems Security. Englewood Cliffs, NJ: Prentice-Hall, 1984. Fordyce, Samantha. “Computer Security: A Current Assessment.” Computers & Security 1 (January 1982): 9-16. Forsdick, H.C. and D.P. Reed. Patterns of Security Violations: Multiple References to Arguments. MIT, 1975. Gaines, R. Stockton. “Secure Personal Computing in an Insecure Network.” Communications of the ACM 22 (August 1979): 476-82. Garland, Robert F. “Computer Programs: Control and Security.” Management Accounting (December 1966). Gasser, M. Building a Secure Computer System. New York: Van Nostrand/Rheinhold, 1988. Gassman, H.P. “Computer Networks, Privacy Protection, and Security.” International Journal of Computer Applications in Technology 4 (1991): 203-206. Glaseman, S., et al. “Problem Areas in Computer Security Assessment.” In Proceedings of the National Computer Conference, vol. 46, 105-12. Montvale, NJ: AFIPS Press, 1977. Goldberg, S.L. and L.J. Woodrum. “Data Security and Recovery Techniques.” IBM Technical Disclosure Bulletin 14 (April 1972): 3286-7. Goode, George E. “Security for Teleprinters and Data Communications.” Data Management (January 1973): 21-6. Hafner, Katherine M. “Is Your Computer Secure?” Business Week (August 1, 1988): 64-72. Hamilton, Peter. Computer Security. Philadelphia: Auerbach Publishers, 1973. Hammer, Carl. “The Computer and Security.” Conference Presentation. Association of Records Executives and Administrators, Washington, DC. April 29, 1970. In Carl Hammer Papers, Box 1, Folder 53. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Hammer, Carl. “Managing Computer Security.” Conference Presentation. California Association of County Data Processors, Concord, CA. October 12, 1984. In Carl Hammer Papers, Box 11, Folder 12. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Hammer, Carl. “Managing Computer Security.” Conference Presentation. Armed Forces Communications and Electronics Association, Washington, DC, August 27-29, 1985. In Carl Hammer Papers, Box 12, Folder 3. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Hammer, Carl. “Managing Computer Security.” Conference Presentation. IST/ RAMP Third Annual User’s Conference, Alexandria, Virginia. September 25-28, 1985. In Carl Hammer Papers, Box 12, Folder 8. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Hammer, Carl. “Security Considerations for Electronic Systems.” Conference Presentation. National Classification Management Society (Panel on Research in Automated Classification Management). Washington, DC. July 19, 1967. In Carl Hammer Papers, Box 1, Folder 35. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Hirschfield, Richard A. “Security in On-Line Systems: A Primer for Management.” Computers and Management (September 1971): 15-7. Holland, Geoffrey. “Computer Security.” Accountancy (March 1972): 43-5.

195 Hsiao, David K., et al. Computer Security. New York: Academic Press, 1979. Hsiao, David K., et al. Computer Security. New York: Academic Press, 1979. “IBM Plans $40 Million Study to Develop ‘Secure’ DP.” Computerworld (May 24, 1972): 1-2. “Identi-Logic Spreads Security Blanket.” Datamation (May 1, 1971): 66. Industrial Security Manual for Safeguarding Classified Information. DOD 5220.22-M. Washington, DC: GPO, July 1, 1966. “Information Systems, Networks Spark Major Security Challenges.” Signal (June 1996): 43. International Business Machines. Data Processing Division. Considerations in Data Security in a Computer Environment. White Plains, NY, April 1968. NBS# NBS00400. Box 708, Folder 9. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. International Business Machines. Data Processing Division. The Considerations of Data Security in a Computer Environment. Form 520-2169. White Plains, NY: IBM Corporation, 1969. July 1970. NBS# 72237006. Box 564, Folder 14. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. International Business Machines. Data Processing Division. Data Security and Data Processing. 6 vols. 1974. In NBS# 74295001-74295007. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. International Business Machines. Data Processing Division. Data Security: Threats and Deficiencies in Computer Operations—A Report on a Completed Study (A Translation from an IBM Svenska AB Publication. First Edition. October 1975. In NBS# 77292020. Box 681, Folder 5. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. International Business Machines. Data Processing Division. An Executive’s Guide to Data Security: A Translation from an IBM Svenska AB Publication. First Edition. October 1975. In NBS# 77292015. Box 681, Folder 3. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. * Jackson, K.M., et al., eds. Computer Security Reference Book. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Jacobson, Robert V. “Big-Time Security Analysis Needed.” Computerworld (June 27, 1973): 19. Jacobson, Robert V. “Providing Data Security.” Automation (June 1970): 85-90. Jacobson, Robert V. “Providing Security Protection for Computer Files.” Bests Review: Life/Health Insurance Edition (May 1970): 42-4. Jarzembowski, J., et al. “A System Engineering Approach to Multilevel Security for Communication Processors.” In Charles Bachman Papers, 1951-1996. Box 6, Folder 9. CBI 125. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Johnson, James H. “DP Security Needs Not Unusual.” Computerworld (August 11, 1971): 8. * Keane, Owen. “Legal Aspects of Computer Security in the U.K.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 369-96. Oxford, UK: Butterworth- Heinemann Ltd, 1992. Kent, Steven T. “Some Thoughts on TCP and Communication Security.” Local Network Note No. 6. Cambridge, MA: MIT Laboratory for Computer Science, May 4, 1977. Keung, Stephen Sai-Lung. “Design and Analysis of Security Protocols Against Off- Line Guessing Attacks.” Ph.D. diss., University of California, Irvine, 1997.

196 * Knowles, Terry. “Standards.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 351-68. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Landwehr, Carl E. “The Best Available Technologies for Computer Security.” IEEE Computer 16 (?): 7. Landwehr, Carl E. “Formal Models for Computer Security.” ACM Computing Surveys 13 (September 1981): 247-8. Leiss, Ernst L. Principles of Data Security. New York: Plenum Press, 1982. Lipton, R.J. and L. Snyder. “A Linear Time Algorithm for Deciding Subject Security.” Journal of the ACM 24 (July 1977): 455-64. Lundell, E. Drake, Jr. and Molly Upton. “Users Awaken to Security Needs: Guarding Centers Primary Concern.” Computerworld (December 6, 1972): 1. Lunt, T.F., et al. “The SeaView Security Model.” IEEE Transactions on Software Engineering 16 (1990): 593-607. Luther, Frederick H. “Keeping the Computer Secure.” Administrative Management (October 1970): 10. MacDonald, M.B., Jr. and J.K. Brown. “Company Security Practices.” Conference Board Record (October 1967): 40-7. Markoff, John. “Computer Insecurity on the Rise.” New York Times, November 1, 1993, p. D1. Menkus, Belden. “Computer Security Needs a Common Sense Approach.” Administrative Management (March 1973): 28-9. Menkus, Belden. Computer Security Needs a Common Sense Approach. March 1973. In NBS# 73120013. Box 588, Folder 2. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Merkel, Ralph C. “Secure Communications Over Insecure Channels.” Communications of the ACM 21 (April 1978): 294-9. Millen, J.K. “Security Kernel Validation in Practice.” Communications of the ACM 19 (May 1976): 243-50. Mintz, Harold K. “Safeguard Computer Information.” Software Age (May 1970): 23- 5. * Mitnick, Kevin D. and William L. Simon. The Art of Deception: Controlling the Human Element of Security. Indianapolis, IN: Wiley Publishing, Inc., 2002. Molho, Lee M. “Hardware Aspects of Secure Computing.” In Proceedings of the Spring Joint Computer Conference, vol. 36, 135-41. Montvale, NJ: AFIPS Press, 1970. “More Work Needed to Solve Problem of Data Security.” Computerworld (May 27, 1970): 6. Moulton, Rolf T. Computer Security Handbook: Strategies and Techniques for Preventing Loss or Theft. Englewood Cliffs, NJ: Prentice-Hall, 1986. Mundt, K.H. “New Dimensions in Data Security.” In Proceedings of the 15th National Computer Security Conference, 438-47. Baltimore, MD, 1992. Nelson, R. and J. Jarzembowski. “Multilevel Security: An Overview and New Directions.” In Proceedings of the IEEE/NBS Trends and Applications Symposium, 41- 48. May 19, 1977. Neugent, William. “Acceptance Criteria for Computer Security.” In Proceedings of the National Computer Conference, vol. 51, 441-8. Arlington, VA: AFIPS Press, 1982. Neumann, Peter G. “On Hierarchical Design of Computer Systems for Critical Applications.” IEEE Transactions on Software Engineering 12 (1986): 905-20. Norman, Adrian R.D. Computer Insecurity. New York: Chapman and Hall, 1983. Orceyre, M.J. “Data Security.” Journal of Chemical Information and Computer Sciences 15 (February 1975). Osmundsen, Sheila. “Security in a PC Network Age.” Digital News (June 8, 1992). Palme, Jacob. “Software Security.” Datamation 20 (January 1974): 51-5.

197 Perry, William E. Computer Control and Security: A Guide for Managers and Systems Analysts. New York: John Wiley and Sons, 1981. Perry, William E. “Developing a Computer Security and Control Strategy.” Computers & Security 1 (January 1982): 17-26. Perry, William E. Management Strategies for Computer Security. Butterworth, 1985. Peters, Bernard. “Security Considerations in a Multi-Programmed Computer System.” In Proceedings of the Spring Joint Computer Conference, vol. 30, 283-86. Washington, DC: Thompson Books, 1967. Pfleeger, C.P. Security in Computing. Carmel, IN: Prentice-Hall, 1989. PRC Public Management Services, Inc. Oklahoma: Privacy and Security Plan—Final Report, 1976. Washington, DC: U.S. Department of Justice, 1976. Presnick, Walter. “Protecting Your Computer’s Security.” Data System News (February 1970). “A Pushbutton Lock for Computer Room Security.” The Office (March 1971): 161-3. “Railroads Outline their Approaches to Computer Security.” Railway Age (September 13, 1971): 68. Reider, Harry R. “Maintaining the Security of Computer Records.” Burroughs Clearing House (February 1971): 28. Reider, Harry R. “Safeguarding Computer Records.” Management Control (October 1972): 245-8. “Responsibilities Assigned in IBM Security Study.” Electronic News (August 21, 1972): 26. Rogaway, Phillip. “The Round Complexity of Secure Protocols.” Ph.D. diss. Massachusetts Institute of Technology, 1991. Schell, R.R. and P.A. Karger. Security in Automatic Data Processing (ADP) Network Systems. ESD-TR-77-19. HQ Electronic Systems Division, Hanscom AFB, MA, December 1976. Schiller, W.L. “The Design and Specification of a Security Kernel for the PDP-11/45.” MITRE Technical Report MTR-2934. March 1975. Schneier, Bruce. Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Copernicus Books, 2003. * Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World. New York: John Wiley & Sons, Inc., 2000. Schwartz, John. “Retired General’s Mission: Making Cyberspace Secure; Dangers of ‘Information Warfare’ Rising, Marsh Says.” Washington Post (January 31, 1997): A19. Search Group, Inc. Security and Privacy Rulemaking: Resources, Terms, and References. Sacramento, CA: Search Group, Inc., 1978. Secure Automated Facility Environment Project (SAFE). What Every Executive Should Know About Privacy in Information Systems. 1974 ca. NBS# 74322001. Box 630, Folder 13. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. “Security Cut Damage from DP Center Blast.” Computerworld (December 23, 1970): 1. “Security Men Thrive on the Wages of Fear.” Business Week (June 20, 1970): 112-4. Security World Publishing Co., Inc. Computer Security: Equipment, Personnel, and Data. 1974. In NBS# 74154001. Box 617, Folder 6. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Shankar, K.S. “The Total Computer Security Problem: An Overview.” IEEE Computer 10 (June 1977): 50-73. SHARE, Inc. The Security Blanket: News and Views from the Share Management Division Security Project. Chicago, SHARE, Inc., 1979. In SHARE, Inc. Records,

198 Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. CBI 21. Slivika, R.T. and J.W. Darrow. “Methods and Problems in Computer Security.” Rutgers Journal of Computers & The Law 5 (1976): 217-69. Smalheiser, Marvin. “Be Safe: Try to Break Your System.” Computerworld (June 6, 1973): 1. Smalheiser, Marvin. “Equity Investor Suit Says IBM Safeguards Lacking.” Computerworld (May 16, 1973): 1. * Smith, Garry. “Formal Methods.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 189-225. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Smith, Henry Jefferson. “Privacy Policies and Practices: Inside the Organizational Maze.” Communications of the ACM 36 (December 1993): 105-22. Smith, Janna Malamud. Private Matters: In Defense of the Personal Life. Reading, MA: Addison-Wesley, 1997. * Smith, Martin. “Personnel Security.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 417-36. Oxford, UK: Butterworth-Heinemann Ltd, 1992. “Some Tips on Computer Security.” Industry Week (August 3, 1970): 22. Sorensen, J.L. “Common Sense in Computer Security.” Journal of Systems Management (April 1972): 12-4. Squires, Tony. Computer Security: The Personnel Aspect. Manchester, UK: NCC Publications, 1980. * Stanford, Chris. “Security Tokens.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 169-85. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Sykes, David J. “Enhancing Data Security.” Datacomm User (January 1977): 25-8. “Symposium: Computers in Law and Society.” Washington University Law Quarterly (1977): 371-540. Smith, M. Commonsense Computer Security. McGraw-Hill, 1989. * Smith, Martin. “Document Security.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 333-47. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Tassel, Coleman J. “Information Security in a Computer Environment.” Computers and Automation (July 1969). Thorsen, J.-E. Computer Security: Equipment, Personnel, and Data. Los Angeles: Security World Publishing Company, Inc., 1974. Tolchin, Martin and Susan J. Tolchin. Selling Our Security: The Erosion of America’s Assets. New York: Knopf, 1992. Tuchman, W.L. “Computer Security and IBM.” Science 197 (September 2, 1977): 938. Turn, Rein and H.E. Petersen. “Security of Computerized Information Systems.” P- 4405. Santa Monica, CA: The Rand Corporation, July 1970. Turn, Rein and H.E. Petersen. Security of Computerized Information Systems. AD- 709 366. Springfield, VA: National Technical Information Service, July 1970. Turn, Rein and Willis H. Ware. “Privacy and Security in Computer Systems.” American Scientist 63 (1975): 196-203. Turn, Rein and Willis H. Ware. “Privacy and Security in Computer Systems.” P-5361. Santa Monica, CA: The Rand Corporation, 1975. Turn, Rein and Willis H. Ware. Privacy and Security in Computer Systems. March- April 1975. In NBS# 75150007. Box 644, Folder 9. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Turn, Rein and Willis H. Ware. “Privacy and Security Issues in Information Systems.” IEEE Transactions on Computers C-25 (December 1976): 1353-61. Turn, Rein, et al. “Data Security Research at The Rand Corporation: Description and Commentary.” P-4914. Santa Monica, CA: The Rand Corporation, October 1972.

199 Turn, Rein, ed. Advances in Computer System Security. Dedham, MA: Artech House, 1981. Twigg, T. “Need to Keep Digital Data Secure?” Electronic Design (November 9, 1972): 68-71. Tygar, J.D. and B. Yee. “Strongbox: A System for Self-Securing Programs.” In CMU Computer Science: A 25th Anniversary Commemorative, ed. R. Rashid, 163-98. New York: Addison-Wesley, 1991. Van Tassel, Dennis. Computer Security Management. Englewood Cliffs, NJ: Prentice- Hall, Inc., 1972. Van Tassel, Dennis. “Information Security in a Computer Environment.” Computers and Automation (July 1969): 24-8. Walter, K.G., et al. Primitive Models for Computer Security. ESD-TR-74-117. January 23, 1974. In NBS# 74325001. Box 631, Folder 12. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Waring, L.P. “What is Computer Security?” Information Age 4 (1982): 142-8. Wasserman, Joseph J. Plugging the Leaks in Computer Security. October 1969. NBS# NBS00399. Box 708, Folder 8. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Wasserman, Joseph J. “Plugging the Leaks in Computer Security.” Harvard Business Review (September 1969): 119-29. Wasserman, Joseph J. “Protecting Your Computer’s Security.” Data Systems News (February 1970): 17. Weintraub, Jeff and Krishan Kumar, eds. Public and Private in Thought and Practice: Perspectives on a Grand Dichotomy. Chicago: University of Chicago Press, 1997. Weiss, H. “Computer Security: An Overview.” Datamation (January 1974): 42-7. Weissman, Clark. Security Controls in the ADEPT-50 Time-Sharing System. SP-3342. Santa Monica, CA: System Development Corporation, May 29, 1969. Weissman, Clark. “Security Controls in the ADEPT-50 Time-Sharing System.” In Proceedings of the Fall Joint Computer Conference, vol. 35, 119-33. Montvale, NJ: AFIPS Press, 1969. Weissman, Clark. “Trade-Off Considerations in Security System Design.” Data Management (April 1972): 14-9. Welke, Larry A. “What About Security: On Centers.” Modern Data (September 1971): 34. Willis, John A. “Is Your Computer Center Safe?” Computer Decisions (June 1972): 12-4. Witten, Ian H. “Computer (In)security: Infiltrating Open Systems.” Abacus 4 (Summer 1987): 7-25. Wofsey, Marvin M. “Data Security.” Data Management (September 1972): 80-6. Yee, B. “Using Secure Co-Processors.” Ph.D. diss., Carnegie Mellon University, 1994. “Your Computer: How Secure?” Chemical Engineering (November 1970).

Rights

Brody, H. “Of Bytes and Rights.” Technology Review 95 (1992): 22-9. Lappin, Todd. “Cyber Rights in Fantasyland.” Wired (November 1996). Prisendorf, Anthony. “The Computer vs. the Bill of Rights.” The Nation (October 31, 1966): 449-52. “The Road to 1984.” Bill of Rights Journal 16 (1983): 1-37. Robbins, A. “Computers and the Bill of Rights.” The Nation 219 (September 28, 1974): 260-1. Szekely, Ivan. “New Rights and Old Concerns: Information Privacy in Public Opinion

200 and the Press in Hungary.” Informatization and the Public Sector 3 (1994): 99-113. Werhane, Patricia. Persons, Rights, and Corporations. Englewood Cliffs, NJ: Prentice Hall, 1985. Wiesner, J.B. “The Information Revolution and the Bill of Rights.” Computers and Automation (May 1971): 8.

Policy

Clement, John. “Development and Management of a National Information Policy.” In Proceedings of the National Computer Conference, vol. 56, 451. Reston, VA: AFIPS Press, 1987. Compaine, B.J. Issues in New Information Technology. Norwood, NJ: Ablex Publishing, 1988. “The Computer: A Target.” Dun’s Review (January 1971): 34-6. Dalfen, C. International Factors: A Study for the Privacy and Computer Task Force. Ottawa, Canada: Department of Communications and Department of Justice, 1972. Drake, William J., ed. The New Information Infrastructure: Strategies for US Policy. New York: The Twentieth Century Fund Press, 1995. Dunn, R. “Policy Issues Presented by the Interdependence of Computer and Communications Services.” Law and Contemporary Problems 34 (1969): 369. Gotlieb, Calvin C. Towards a National Computer and Communications Policy: Seven National Approaches. Toronto, Canada: Institute for Research on Public Policy, 1980. Greenberger, Martin, ed. Computers, Communications, and the Public Interest. Baltimore, MD: Johns Hopkins Press, 1971. Hernon, Peter, et al., eds. Federal Information Policies in the 1990s: Views and Perspectives. Ablex, 1996. Relyea, Harold C., et al. The Presidency and Information Policy. New York: Center for the Study of the Presidency, 1981. Rubin, Michael Rogers. Information Economics and Policy in the United States. Littleton, CO: Libraries Unlimited, 1983.

Digital Signatures

National Institute of Standards and Technology. “A Proposed Federal Information Processing Standard for the Digital Signature Standard (DSS).” Federal Register 56 (August 1991): 169. Rabin, M.O. Digital Signatures, Foundations of Secure Communication. New York: Academic Press, 1978.

Authorization

Friedman, T.D. “The Authorization Problem in Shared Files.” IBM Systems Journal 9 (1970): 258-80.

Open Records Act

Quarles, Dennis P. “Informational Privacy Under the Open Records Act.” Mercer Law Review 32 (Fall 1980): 393-406.

General, Other

Ernest, M.L. “What Else Will Computers Do To Us.” The Wall Street Journal, October 21, 1970.

201 Ganley, Oswald H. and Gladys D. Ganley. To Inform or Control? The New Communications Network. New York: McGraw-Hill, 1982. Gellman, Robert M. “Fragmented, Incomplete, and Discontinuous: The Failure of Federal Regulatory Proposals and Institutions.” Software Law Journal 6 (1993): 199- 238. George, Joey F. and John L. King. “Examining the Computing and Centralization Debate.” Communications of the ACM 34 (July 1991): 62-72. Gotlieb, Calvin C. “Computers: A Gift of Fire.” In Information Processing 80: Proceedings of IFIP Congress 80, ed. Simon Lavington, 863-72. Amsterdam, The Netherlands: North-Holland Publishing, 1980. Hagel, J. and A.G. Armstrong. Net.Gain. Boston, MA: Harvard Business School Press, 1997. “Halting the Electronic Hijacker.” Modern Office Procedures (September 1968). Hanson, B. “Can Congress Take the Necessary Steps to Ensure an ‘Informed Nation?’” Government Information Quarterly 6 (1989): 153-57. “Harry C. Jordan: Better Mousetrap?” Forbes (October 1, 1967): 67. Hawkins, Dana. “Who’s Watching Now?” U.S. News & World Report (September 15, 1997). Hellman, Harold. Technophobia: Getting Out of the Technological Trap. New York: M. Evans and Company, 1976. “Inside Eastern’s Data Center.” Business Week (February 5, 1972): 60-1. Itkin, R.L. “Misappropriation of Computer Services: The Need to Enforce Civil Liability.” Computer/Law Journal 4 (Fall 1983): 401-20. Johnston, Chris, et al. “Wired: Just Say No to Computer Paranoia.” Village Voice 33 (October 25, 1988): p. S4. Kapor, Mitchell. “A Little Perspective Please.” Forbes (June 21, 1993). Kelly, Kevin. “The Electronic Hive: Embrace It.” In Computerization and Controversy: Value Conflicts and Social Choices, 2nd ed., ed. Rob Kling, 75-8. San Diego: Academic Press, 1996. Kelly, Kevin. Out of Control. Reading, MA: Addison-Wesley, 1994. Kelly, W.E. “Computer Systems: Slaves or Masters?” Management Accounting (October 1971): 9-11. Kraemer, Kenneth L., et al. The Management of Information Systems. New York: Columbia University Press, 1981. Lacayo, Richard. “Nowhere to Hide.” Time (November 11, 1991): 34-40. Lalonde, Peter and Paul Lalonde. The Mark of the Beast: Your Money, Computers, and the End of the World. Eugene, OR: Harvest House Publishers, 1994. Lange, Larry. “Warnings for an Electronic Nation.” Electronic Engineering Times (September 22, 1997): 93. Le Bon, Gustave. The Crowd: A Study of the Popular Mind. New York: Ballantine Books, 1969. Leavitt, Don. “Compression Shields Data While Operations Improve.” Computerworld (December 6, 1972): 16. Lundell, E. Drake, Jr. “‘Inflexible’ DP Systems Said to Attract Dishonesty.” Computerworld (November 1, 1972): 2. Mann, Paul. “Cyber Threat Expands with Unchecked Speed.” Aviation Week & Space Technology (July 8, 1996): 63-64. McHugh, John. “Intrusion and Intrusion Detection.” International Journal of Information Security 1 (2001): 14-35. McKenzie, Kenneth F., Jr. “Beyond Luddites and Magicians: Examining the MTR.” Parameters (Summer 1995): 15-21. McLellan, V. “Computer Systems Under Siege.” New York Times, January 31, 1988. McPhail, Tom. Electronic Colonialism. Beverly Hills, CA: Sage Publications, 1981.

202 Morrison, David C. “Bang! Bang! You’ve Been Inhibited!” National Journal (March 28, 1992): 758-59. Morton, Oliver. “The Information Advantage.” The Economist (June 10, 1995): 5-20. Mylott, Thomas R. “Data Regulation.” In Computer Law for Computer Professionals, eds. M. Ermann, et al., 120-6. Englewood Cliffs, NJ: Prentice Hall, 1984. Newman, Oscar. Defensible Space. New York: Macmillan, 1972. Newman, Richard J. “Ready! Aim! Reboot!” U.S. News & World Report (January 20, 1997): 45. Nissenbaum, Helen. “Computing and Accountability.” Communications of the ACM 37 (January 1994): 73-80. Norback, Craig T. The Computer Invasion. New York: Van Nostrand Reinhold, 1981. “Nose Counters Step on Some Toes.” Business Week (February 17, 1968): 84, 89. Nye, Joseph S., Jr. and William A. Owens. “America’s Information Edge.” Foreign Affairs (March-April 1996): 20-36. Packard, Vance. “Don’t Tell It to the Computer.” New York Times Magazine, January 8, 1967, p. 44. Patton, Peter C. OH 325. Oral history interview by Philip L. Frana, 30 Aug 2000, Minneapolis, Minnesota. Deposited at the Charles Babbage Institute for the History of Information Technology. University of Minnesota, Minneapolis. * Pearson, Peter. “Personal Computers.” In Computer Security Reference Book, eds. K.M. Jackson, et al., 565-92. Oxford, UK: Butterworth-Heinemann Ltd, 1992. Perham, John. “The Computer: A Target.” Dun’s Review (January 1971): 34. Pincus, Walter. “Data to Be Destroyed.” Washington Post, March 31, 1976, p. 1. Plishner, M.J. “It’s None of Your Business—Or is It? California Addresses the Computer Age.” Rutgers Computer & Technology Law Journal 8 (1981): 235-66. Rankin, L. John. OH 32. Oral history interview by George D. Green for American Business History series. September 11, 1980. Valhalla, New York. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis. Rapoport, R. “Electronic Alligators.” Saturday Review of the Sciences (March 1973): 35-8. Roszak, Theodore. The Cult of Information: The Folklore of Computers and the True Art of Thinking. New York: Pantheon, 1986. Rothfeder, Jeffrey. “Holes in the Net.” Corporate Computing (May 1993). Rubin, Michael Rogers. “Guilty Until Proven Innocent.” Information Management Review 2 (1986): 65. Ruggie, J. “International Responses to Technology: Concepts and Trends.” International Organization 29 (1975): 557-83. Rule, James B. and Paul Attewell. “What Do Computers Do?” Social Problems 36 (?): 225-40. Savage, John E., et al. The Mystical Machine: Issues and Ideas in Computing. Reading, Mass.: Addison-Wesley, 1986. Schiller, Herbert. Who Knows? Information in the Age of the Fortune 500. Norwood, NJ: Ablex Publishing, 1981. Shattuck, John H.F. and Muriel Morisey Spence. “The Dangers of Information Control.” Technology Review (April 1988): 62-73. Sieghart, Paul. “The International Implications of the Development of Microelectronics.” The Information Society 1 (1981): 1-15. Sieghart, Paul, ed. Microchips with Everything: The Consequences of Information Technology. London: Comedia Publishing Group, 1982. Simon, Herbert A. “The Consequences of Computers for Centralization and Decentralization.” In The Computer Age: A Twenty-Year View, eds. Michael L. Dertouzos and Joel Moses, 212-27. Cambridge, Mass.: MIT Press, 1979.

203 Smith, William D. “Controls Haven’t Caught Up to Boom in Computers.” New York Times, February 22, 1970, Section 3, p. 11. Solomonides, Tony and Les Levidow, eds. Compulsive Technology: Computers as Culture. London: Free Association Books, 1985. Stipp, David. “Techno-Hero or Public Enemy.” Fortune (November 11, 1996). Taylor, Frederick Winslow. The Principles of Scientific Management. 1911. “Technology and Contemplation.” America 100 (November 15, 1958): 188-9. “The Ties that Bind.” Economist (June 10, 1995): D18-20. “They Will Probably Answer Now.” New York Tribune, June 10, 1890, p. 3. Tinnin, David. “How IBM Stung Hitachi.” Fortune 107 (1983): 50-6. Wasserman, Joseph J. “The Vanishing Trail.” Bell Telephone Magazine (July 1968). Webster, Frank and Kevin Robins. Information Technology: A Luddite Analysis. Norwood, NJ: Ablex, 1986. “What You Don’t Know Could Hurt You.” The Economist 278 (March 7-13, 1981): 57. Wilson, G.I. and Frank Bunkers. “Uncorking the Information Genie.” Marine Corps Gazette (October 1995): 29-31.

204