期刊論文1. | Dan Burk、Jennifer A. Hess(1994)。Genetic Genetic Privacy:Constitutional Considerations in Forensic DNA Testing。Geo. Mason U. Civ.Rts L.J.,1。 |
2. | Andrea de Gorgey,Comment(1990)。The Advent of DNA Databanks: Implications for Informational Privacy。AM. J.L. & Med.,16,381。 |
3. | M. Nicole van Dam(1990)。The scarlaet letter "A":AIDS in a Computer Society。Computer L.J.,10,233。 |
4. | Lawrence A. Gostin(1995)。Health Information Privacy。Cornell L. Rev.,80,451。 |
5. | (1995)。Symposium: Privacy and ITS。Santa Clara Computer & High Tech. L.J.,11,1。 |
6. | Lillian R. Bevier(1995)。Information About Individuals in the Hands of Government:Some Reflections on Mechanism for Privacy Protection。Wm. & Marry Bill Rts. J.,3,455。 |
7. | Srth Kreimer(1991)。Sunlight, Secrets, and Scarlet Letters: The Tension Between Privacy and Disclosure in Constitutional Law。U. PA. L. Rev.,140,1。 |
8. | Paul M. Schwartz(1992)。Data Processing and Government Adminstration: The Failure of the American Legal Response to the Computer。Hastings L. J.,43,1321。 |
9. | Lillian R. BeVier(1999)。The Communications Assistance for Law Enforcement Act of 1994:A Surprising Sequel to the Break Up of At & T。Stan. L. Rev,51,1049。 |
10. | 劉靜怡(19971000)。從Cookies以及類似資訊科技的使用淺論網際網路上的個人資訊隱私保護問題。資訊法務透析,22-37。 延伸查詢 |
11. | Christopher Burns(1995)。Copyright Management and The NII: Reportto the enabling technologies committee of the association O American Publishers。 |
12. | Cohen, Julie E.(1996)。A right to Read Anonymously: A Closer Look at "Copyright Management" in Cyberspace。Connecticut Law Review,28,981-1039。 |
13. | Cohen, Julie E.(1997)。Some Reflections on Copyright Management Systems and Laws Designed to Protect Them。Berkeley Tech. L. J.,12,161。 |
14. | John Arandeo(1996)。Pandora's (E-mail) Box: E-Mail Monitoring in the Workplace。Hofstra Lab. L. J.,14,339。 |
15. | Elena N. Border,Note(1996)。(NET) worker's Rights: The NLRA and Employee Electronic Communications。Yale L.J.,105,1639。 |
16. | Laurie Thomas Lee(1994)。Watching Your E-Mail:Employee E-Mail Monitoring and Privacy Law in The Age of the "Electronic Sweatshop"。J. Marshall L. Rev.,28,139。 |
17. | David Neil King(1994)。Private-Sector Workshop Workplace: Protection from Electronic Surveillance and the Emerging Privacy Gap。S. Cal. L. Rev,67,441。 |
18. | Priscilla M. Regan(1995)。Legislating Privacy26。 |
19. | Joel R.(1992)。Privacy in the Information Economy: A Fortress of Frontier for Individual Rights?。 |
20. | Alan F. Westin(1996)。Science, Privacy,and Freedom: Issues and Proposals for the 1970's:Part II-Balancing the conflicting Demands of Privacy,Disclosure and Surveillance。 |
21. | Albert W. Alshuler(1983)。Interpersonal Privacy and the Fourth Amendment。N. I11. U. L. Rev.,4,962。 |
22. | Robert C. Post(1991)。Rereading Warren and Brandeis:Privacy,Property and Appropriation。Case Western L. Rev.,41,647。 |
23. | Charles Fried(1969)。Privacy [A moral Analysis]。Yale L. J.,77,475。 |
24. | Edward J. Bloustein。Privacy as an Aspect of Human Dignity。 |
25. | Judith B. Prowda(1995)。A Lawyer's Ramble Down the Information Superhighway: Privacy and Security of Data。Fordham L. Rev.,64,738+742。 |
26. | Oscar H. Grandy, Jr.(1996)。Legitimate Business Interest: No End in Sight? An Inquiry of Privacy in Cyberspace。U. Chi. Legal F.,1996,77。 |
27. | Edward J. Markey(199708-199)。A Privacy Safety Net。Mid Technology Review。 |
28. | Robert M. Gellman(1993)。Fragmented, Incomplete, and Discloures: The Failure of Federal Privacy Regulatory Proposals and Institutions。Sofrware L. J.,6,199。 |
29. | Paul Schwartz(1997)。Privacy and the Economics of Personal Health Care Information。Tex. L. Rev.,76,1。 |
30. | Joel R. Reidenberg、Paul M. Schwartz(1999)。Legal Perspectives on Privacy。 |
31. | Joel R. Reidenberg(1998)。Lex Informatica: The Foundation of Information Policy Rules Through Technology。Tex. L. Rev.,76,553。 |
32. | The Economist(19990501)。The Surveillance Society17-19。 |
33. | Lawrence Lessig(1996)。Reading the Constiturion in Cyberspace。Emory L. J.,45,869。 |
34. | Fred H. Cate(1995)。The RU Data Protection Directive, Information Privacy,and the Public Interest。IOWA L. Rev.,80,431。 |
35. | William A. Hodkowski(1998)。The Future of Internet Security: How New Technologies Will Shape The Internet and Affect the Law。Computer & High Tech. L. J.,13,217。 |
36. | Froomkin, A. Michael(1996)。Flood Control on the Information Ocean: Living with Anonymity, Digital Cash, and Distributed Databases。Journal of Law and Commerce,15,395-507。 |
37. | Lawrence Lessig(1997)。Constitution and Code。Cumb. L. Rev.,27。 |
38. | Reidenberg, Joel R.(1999)。Restoring America’s Privacy in Electronic Commerce。Berkeley Tech. L. J.,14,771-788。 |
39. | Kang, Jerry(1998)。Information Privacy in Cyberspace Transactions。Stanford Law Review,50(4),1193-1294。 |
40. | Hodges, M.(1997)。Is Web Business Good Business?。MIT's Technology Review,100(6),22-28。 |
41. | Warren, Samuel D.、Brandeis, Louis D.(1890)。The Right to Privacy。Harvard Law Review,4(5),193-220。 |
42. | Simitics, S.(1987)。Reviewing Privacy in an Information Society。University of Pennsylvania Law Review,135(3),707-746。 |
43. | Lessig, Lawrence(1996)。Reading the Constitution in Cyberspace。EMORY L.J.,45,869。 |
圖書1. | James Boyle(1996)。Shamans,Software,and Spleens:Law and The Construction of the Information Society。 |
2. | Simon Garfinkel(2000)。Database Nation:The Death of Privacy in the 21th Century 10。 |
3. | David Lyon(1994)。The Electronic Eyes:The Rise of Surveillance State。 |
4. | Jeffrey Rothfeder(1992)。Privacy for Sale:How Computerization has made everyon's life an open Secret。 |
5. | (199704)。A Personalized Web Todd Copilevitz。 |
6. | (19960812)。Oil Change Renews Online Privacy Fears。 |
7. | Mark Stefik(1997)。The Possible : How trusted systems and digital property rights challenge us to rethink digital publishing。 |
8. | Ferdinard D. Schoeman(1984)。Philosophical Dimensions of Privacy。 |
9. | Stefik, Mark(1999)。The Internet Edge: Social,Technical and Legal Challenges for a Networked World。 |
10. | Federal Trade Commission(199804)。Fighting Consumer Fraud: New Tools of The Trade。 |
11. | M. Ethan Katsh。Law in a Digital World。 |
12. | Robert Gellman(1997)。Conflict and Overlap in Privacy Regulation: National International,and Private。Border in Cyberspace。 |
13. | David G.(1995)。Anarchy,State, and the Internet: An Essay on Law-Making in Cyberspace。 |
14. | Radin, Margaret Jane(1996)。Contested Commodities。Cambridge, MA:Harvard UP。 |
15. | Shapiro, Andrew L.(1999)。The Control Revolution—How the Internet is Putting Individuals in Charge and Changing the World We Know。New York, NY:A Century Foundation Book。 |
16. | Tribe, Laurence(1988)。American Constitutional Law。Foundation Press。 |
17. | Lessig, Lawrence(1999)。Code and Other Laws of Cyberspace。Basic Books。 |
18. | Gandy, Oscar H. Jr.(1993)。The Panoptic Sort: A Political Economy of Personal Information。Westview。 |
19. | Linowes, D. F.(1989)。Privacy in America: Is Your Private Life in the Public Eye?。Urbana, IL:University of Illinois Press。 |
其他1. | Paul M. Schwartz(1995)。Privacy and Participation:Personal Information and Public Sector Regulation in the United States,80 IOWA L. REV.553。 |
2. | Anne Wells Branscomb(1994)。Who Owns Information:From Privacy to Public Access。 |
3. | William H. Minor(1995)。Identity Cards and Database in Health Core:The Need for Federal Privacy Protection。 |
4. | Paul M. Schwartz(1995)。The Protecion of Privacy in Health Card Reform。 |
5. | (19960903)。Htmlscript Implements "Caller ID" Feature; Simplifies Cookies and Allows HEML, Web Developers to Easily Track and Identify Individual Web Beowsers, Bus. Wire Kevib Kelly。 |
6. | Edmund Andrews(19990527)。Europe and U.S. Are Still at Odds over Privacy。 |
7. | Peter Swire,Robert Litan(1998)。None of Your Business:World Data Flows,Electronic Commerce,and The European Privacy Directive。 |
8. | Joel R. Reidenberg,Paul M. Schwartz(1998)。Data Protection Law and Online Service:Regulatory Responses,http://europa.eu.int/comm/dgt15/en/media/datapro/studies/regul.pdf。 |
9. | Steven Lohr(19991011)。Online Industry Seizes the Initiative on Privacy。 |
10. | Robert C. Post(1995)。The Social Foundations of Privacy:Community and Self in the Common Law Tort。 |
11. | Robert Unger(1987)。Social Theory:It's Situation and Its Task。 |
12. | Alan Wexelblat。How Is NII Like Prison?,http://wex.www.media.mit.edu/people/wex/panoptic~paper.html, 19980905。 |
13. | Clinton, W. J.,Gore, A., Jr.(1997)。A Framework for Global Electronic Commerce。 |