IT Law Bibliography

IT Law Bibliography

Information Technology Privacy & Security Index: Bibliography Email Terrorism Information Warfare Ethics Democracy Big Brother Copyright Workplace Cybersex Child Online Protection Act of 1998 Childcare & Daycare Monitoring Voting Elections Web Cams School Monitoring Record Linkage Internal Revenue Service Intelligent Highway Sweden France Germany Canada Interactive Cable Operating Systems First Amendment Fourth Amendment Beepers Electronic Communications Privacy Act of 1986 Australia Cell Phones Clipper Chip Lotus Marketplace Piracy Welfare Social Work Electronic Funds Transfer Patents Sabotage Transborder Data Flow Freedom of Information Act Biometrics Passwords Trusted Systems Caller ID Law Enforcement Criminal Justice Information Systems 1 Privacy Protection Act of 1980 Computer Matching and Privacy Protection Act of 1988 Cryptography Access Control Encryption Privacy Act of 1974 Privacy Act of 1988 Right to Financial Privacy Act of 1978 Privacy Acts in Canadian Provinces National Crime Information Center Omnibus Crime Control and Safe Streets Act of 1968 Criminal History Information Systems Crime Internet Worm Hacking Computer Abuse Patient Privacy Medical Backup Legal Expert Systems Crypto Network Security Embezzlement Libel Computer Matching Gender Automatic Face Recognition Digital Cash Counterfeiting U.S. Census Employee Privacy Identity and Self ADAPSO Privacy, Security, and Banking Electronic Monitoring Virtual Jails Credit Bureaus Credit Cards Fair Credit Reporting Act Association of Computer Programmers and Analysts New Zealand RUSH Time-Sharing System Computers and Business Equipment Manufacturers Association Fraud Electronic Data Processing Security and Data Protection Management Direct Mail Mental Health Warren and Brandeis Puerto Rico Supreme Court Griswold Privacy and Pharmaceutical Research 2 Collaboration Global (International) Policy and Standards Echelon Health Care and Records Federal Bureau of Investigation Nursing Research and Confidentiality Foreign Intelligence Surveillance Act National Security Satellites CCTV Passports Airport Security Privacy and Community Surveillance, Society, and Privacy Videotex Auditing Human Rights Council of Europe OECD European Union Japan Norway Secrecy United Kingdom Freedom & Freedom of Information Data Protection Social Security Taxes IT Privacy and Government, General Public-Key IT Privacy & Federal Government IT Privacy & State Government IT Privacy & Local Government Authentication Insurance National Data Bank/National Data Center U.S. Army Privacy Protection Study Commission Telecommunications SDI Intelligence Artificial Intelligence Smart Cards Battlefield Drug Abuse Money Laundering National Defense Finland Privacy Legislation, General Politics Electronic Civil Disobedience Panopticon 3 Digital Formats Military Bandits Telegraph Right to Be Let Alone Unintended Consequences Eavesdropping Wiretapping Viruses Juveniles Ultra Enigma Transaction DARPA Roe v. Wade Anti-War Protestors Misuse Library Records Confidentiality Genetic Attitudes Marketing Cyberattack Free Speech Virtual Society Dossier Countermeasures Keys Utility Stalking Anonymity People Human Nature & Values Alienation Police Engineer Word Processing Soul Distributed Systems Responsibility Cipher Cyberspace Individual Rights Risk Pen Registers Dating Gang Databases Personal Data Liberty Autonomy Strategic Name 4 Weapon Navy Unix Trojan Horses PGP Strangers Privacy, Business & Corporations Vehicles Computer Science & Computer Scientists Remote Sensing ID Revolution Bug Bugging Criminal Soviet Privacy and Internet Commerce Snooping Code Cyberculture Information Theory Cameras Electronic Bracelets Vulnerable Alarms Information Highway & Superhighway Multics Magnets Ownership Chaos Bulletin Boards, BBS & Internet Forums Integrity Social Problems Social Science Psychology Panic Room Image Frank Cullen Snatching Errors Secrets Bar Codes Privacy Cost Electronic Journalism Computerized City Chat Willis Ware Wireless Operation Exodus Cookies Netscape Homeland Security National Registration 5 Profession Mortgage Software GIS, Geographical Information Systems, Clustering Radio Fastlane FCC, Federal Communications Commission Fault-Tolerant Privacy, Security, and Databases Liberty, Civil Liberties Financial Modernization Act of 1999 Protect Plastic Naval Identification Dataveillance Disaster, Fire, Catastrophe Utopian Caper Education & Higher Education Purple Justice Spying and Espionage Privacy, General Privacy and Law Computers, Technology, and Information Privacy Law Fiction Security Policy Digital Signatures Authorization Open Records Act General, Other Bibliography Abbott, Robert P., et al. A Bibliography on Computer Operating System Security: The RISOS Project. W-7405-Eng-48. Livermore, CA: Lawrence Livermore Laboratory, University of California, April 15, 1974. Anderson, Ronald E. and Edward Arthur Fagerlund. “Privacy and the Computer: An Annotated Bibliography.” Computing Reviews (November 1972): 551-9. Bergart, Jeffrey G., et al. “An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.” AD-755. Springfield, VA: National Technical Information Service, 1972. Best, Riba A. and D. Cheryn Picquet. Computer Crime, Abuse, Liability, and Security: A Comprehensive Bibliography, 1970-1984. Jefferson, NC: McFarland, 1985. Boruch, Robert F. A Bibliography on Privacy and Social Research. American Council on Education. Carlstedt, J. Protecting Errors in Operating Systems: A Selected Annotated Bibliography and Index to Terminology. ISI/Sr-78-10. 1978. Computer Security, Backup, and Recovery: A Selected Bibliography. Vista, CA: 6 Canning Publications, Inc., 1972. * Dalenius, Tore. Bibliography on Privacy-Confidentiality-Security and Surveys. November 14, 1975. Providence, RI: unpublished. NBS# 77292005. Box 680, Folder 6. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Deighton, Suzan. Privacy and Computers: A Bibliography, 1969-1978. London: Institution of Electrical Engineers, 1978. Flaherty, David H., ed. Privacy and Data Protection: An International Bibliography. White Plains, NY: Knowledge Industry Publications, Inc., 1984. * Flaherty, David H., et al. Privacy and Access to Government Data for Research: An International Bibliography. London: Mansell, 1979. Goolidge, Andrea. Annotated Bibliography on Telematics: The Technologies of Telecommunications, Computers, and Information. Monticello, IL: Vance Bibliographies, 1982. Harrison, Annette. The Problem of Privacy in the Computer Age: An Annotated Bibliography. RM-5495-PR/RC. Santa Monica, CA: The Rand Corporation, December 1967. * Harrison, Annette. The Problem of Privacy in the Computer Age: An Annotated Bibliography, vol. 2. RM-5495/1-PR/RC. Santa Monica, CA: The Rand Corporation, December 1969. Hunt, Kathleen and Rein Turn. Privacy and Security in Databank Systems: An Annotated Bibliography, 1970-1973. R-1351-NSF. Santa Monica, CA: The Rand Corporation, March 1973. Klein, S.S. “Your Right to Privacy: A Selective Bibliography.” Legal Reference Series Quarterly 12 (1992): 217-31. Kuong, Javier F. Computer Security, Auditing, and Controls: A Bibliography. Wellesley Hills, MA: Management Advisory Publications, 1973. * Kurzban, Stanley A. “A Selective, Briefly Annotated Bibliography of Works on Data Security and Privacy.” Computers & Security 1 (January 1982): 57-64. * Lamoreux, Stephen. The Right of Privacy: A Bibliography, 1890-1961. Pullman: Washington State University Press, 1963. Latin, Howard A. Privacy: A Selected Bibliography and Topical Index of Social Science Materials. South Hackensack, NJ: Fred B. Rothman, 1976. Lavin, Howard A. Privacy, A Selected Bibliography and Topical Index of Social Science Materials. Berkeley, CA: Earl Warren Legal Institute, 1976. McSweeney, A.D. “A Select Bibliography of Books, Articles, and Official Reports Relating to Privacy and Data Protection.” Journal of Law and Information Science 3 (1992): 172-8. Novotny, Eric J. “Transborder Data Flows: A Bibliography.” Stanford Journal of International Law 16 (1980): 181-99. Ontario. Commission on Freedom of Information and Individual Privacy. Freedom of Information and Individual Privacy: A Selective Bibliography. Toronto, Canada: Commission on Freedom of Information and Individual Privacy, November 1979. * Rand Corporation. Bibliography of Selected Rand Publications: Privacy in the Computer Age. SB-1047. Santa Monica, CA: The Rand Corporation, June 1973. NBS# 74042007. Box 608, Folder 10. Deposited at the Charles Babbage Institute for the History of Information Technology, University of Minnesota, Minneapolis, MN. Reed, Susan K. and Martha Gray. Controlled Accessibility Bibliography. NBS Technical Note 780. June 1973. Relyea, Harold C. and Elaine R. Tomchik. Managing Official Information: Accessibility and Protection in the Federal Government—A Selected Bibliography. Report No. 80- 183 GOV. Washington, DC: Library of Congress Research Service, October 15, 1980. Sanz, Timothy L. “Information Age Warfare: A Working Bibliography, Part I.” Military 7 Review 78 (March-April 1998): 83-90. * Sanz, Timothy L. “Information Age Warfare: A Working Bibliography, Part II.” Military Review 78 (September-November 1998): 1-10. * Scherf, John Arthur. Computer and Data Security: A Comprehensive Annotated Bibliography. MAC TR-122. Cambridge, MA: Massachusetts Institute of Technology, January 1974. In NBS# 74112004. Box 613, Folder 11. Deposited at the Charles Babbage Institute

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    204 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us