Bibliography On Privacy
- "SLAPPing Down Anonymous Speech", Pass it on...
What the Press is Reporting and Why (www.mediaunspun.com), 2002/07/12.
- "Web consortium backs P3P privacy standard", CNN.com,
By Brian Sullivan,
April 18, 2002 Posted: 8:25 a.m. EDT (1225 GMT)
- "Just How Trusty Is Truste?", By Paul Boutin, Lycos, 2:00 a.m. April 9, 2002 PDT
- "Va. Tech faculty voice alarm over seized computer -
Professors have expressed the most concern about privacy rights regarding intellectual property and personal e-mails from students",
By KEVIN MILLER,
THE ROANOKE TIMES, Wednesday, April 10, 2002.
- "Win-XP Search Assistant silently downloads files",
By Thomas C Greene in Washington
Posted: 11/04/2002 at 20:47 GMT
- "A Tale of Broadband Oppression", (and violated privacy), by Aaron Krowne, April 7, 2002.
- "Virginia Tech police temporarily seize a professor's computer. Some say an investigation into a spray-painting spree is going too far", by KEVIN MILLER
THE ROANOKE TIMES, Saturday, April 06, 2002.
- "Judges Set Precedent for Workplace Privacy",
By Andy Sullivan, Reuters, Wednesday September 19 6:29 PM ET
- "Security Considerations for Remote Electronic Voting over the Internet", Avi Rubin, AT&T Labs - Research, firstname.lastname@example.org.
This paper discusses the security considerations for remote electronic voting in public elections. In particular, we examine the feasibility of
running national federal elections over the Internet. The focus of this paper is on the limitations of the current deployed infrastructure in
terms of the security of the hosts and the Internet itself. We conclude that at present, our infrastructure is inadequate for remote Internet
- "Corporate Case in Ohio Raises Questions on Internet Anonymity", By JOHN SCHWARTZ, New York Times, Oct. 2000.
Should an anonymous e-mail'er be revealed to the recipient by the ISP?
- The Carnivore FOIA Litigation
On July 11, 2000, the existence of an FBI Internet monitoring system called "Carnivore" was widely reported.
Although the public details were sketchy, reports indicated that the Carnivore system is installed at the
facilities of an Internet Service Provider (ISP) and can monitor all traffic moving through that ISP. The FBI
claims that Carnivore "filters" data traffic and delivers to investigators only those "packets" that they are
lawfully authorized to obtain. Because the details remain secret, the public is left to trust the FBI's
characterization of the system and -- more significantly -- the FBI's compliance with legal requirements.
- "Protect Your E-Mail From Prying Eyes", by Mitt Jones, PCWorld, March 2000.
PROBLEM: You worry that your personal and business e-mail might be vulnerable to snooping. SOLUTION: Encrypt your sensitive e-mail correspondence with software or a Web-based service.
As Web developer for various businesses, Jeff Burson, of Birmingham, Alabama, felt a need for heightened e-mail security when exchanging professional correspondence with his partner or with clients. "Sometimes we exchange [critical] ideas for a client, and we need to make sure that nothing sensitive gets out," he says.
- "Feds may be reading your mail", by Bill Wallace, CNN.com, April 26, 2000.
(IDG) -- Got an international e-mail pen pal or
chat buddy? Belong to a mailing list that
includes one person from outside the United
States? Use a cell phone much? If you do, odds
are good that Big Brother is watching you.
According to intelligence experts in the United
States and Europe, a massive electronic intercept
program called Project Echelon scans all Internet traffic, cell phone conversations, faxes, and
long-distance telephone calls -- virtually every type of electronic communication -- looking for
evidence of terrorist activity, military threats, and transnational crime.
- "Keystroke cops, New software raises troubling questions on worker privacy", By Michael J. McCarthy, THE WALL STREET JOURNAL, 2000/03/07.
- The fundamental paper on Privacy, so far as I know, is not on-line
anywhere, so you will have to find it in paper:
Warren, S.D., and Louis D. Brandeis. 15 December 1890. "The Right
to Privacy", Harvard Law Review, Vol. IV, No. 5, pp. 193-220.
- 1990 Symposium on Research in Security and Privacy, IEEE Computer
Society Press, l990.
- 1991Symposium on Research in Security and Privacy, IEEE Computer
Society Press, l991.
- Jay BloomBecker, ed., Computer Crime, Computer Security, Computer
Ethics, National Center for Computer Crime Data, l986 ISBN 0-933561-02-4.
- British Computer Society Staff, Privacy and the Computer: Steps
to Practicality, John Wiley and Sons, Inc., l972, ISBN 0-471-25610-2
- D. Flaherty, Protecting privacy in surveillance societies. University
of North Carolina Press, l989
- Lance J. Hoffman ed., Computer and Privacy in the Next Decade,
Academic Press, Inc., l980 ISBN 0-12-352060-6
- How to Defend Your PC of Mainframe, Saint Martin's Press, l989,
- Donald A. Marchand, The Politics of Privacy, Computers, and Criminal
Justice Records Controlling the Social Costs of Technological Change,
Information Resources Press, l980, ISBN 0-87815-030-7
- Security & Privacy, 10th IEEE symposium on l989 Proceedings,
IEEE Computer Society Press, l989, 345 pp. ISBN 0-8186-8939-0
- Security and Privacy-Volume 1 (1980-1984)(Compendium), IEEE Computer
- Security and Privacy-Volume 2 (1985-1987)(Compendium), IEEE Computer
- Ulrich Sieber, The International Handbook on Computer Related Crime
and the Infringements of Privacy, John Wiley and Sons., Inc., l987,
- Yankee Group Staff, The Electronic Vault: Computer Piracy and Privacy,
The Yankee Group, l984 no ISBN
- Fair Measures thoughts on Privacy and the Internet.
- Cookies and Internet Privacy, Lori Eichelberger, Cookie Central, 1997-1998.
- "Australia data warehouse raises privacy concerns", December 3, 1999 Web posted at: 3:44 p.m. EST (2044 GMT) by Luisa Bustos
- "RealNetworks apologizes for privacy breach", November 2, 1999, Web posted at: 9:15 AM EST (1415 GMT), CNN.com.
- "The Big Privacy Lie" by Jesse Berst, Editorial Director, ZDNet AnchorDesk, 99/10/13.
- "Privacy rights are left at home: Work! You're on company camera", by LIZ STEVENS FORT WORTH STAR-TELEGRAM, Wednesday, October 06, 1999.
- "E-Privacy May Be Up To The Industry", by Madeleine Acey, TechWeb, (09/23/99, 2:14 p.m. ET)
- "Amazon.com's "data mining" irks critics", Roanoke Times, 99/08/30.
- "Harvard Dean Linked to Pornography", A case of privacy, from Boston Globe, May 19, 1999.
- IBM to pull Web ads over privacy concerns, by Kim Girard, Staff Writer, CNET News.com, March 31, 1999.
- The Better Business Bureau: BBBOnLine® Privacy Program, 17 March 1999.
- Privacy and Chips, forwarded by Chris Ellison of the Internet Freedom Campaign, email@example.com, in the Ethical Spectacle, March 1999.
- The Dawn of the Infomediary by James Glave, 24.Feb.99.PST, Wired News. A proposal for a company that will protect individual's private data.
- Hey Blockheads! Piracy May Require Privacy, by Renee Deger, The Recorder, Tuesday, February 23, 1999.
- "Spy on Your Customer" program by James Sexton, Feb. 1999.
- Intel blinks: ID tracker will be off initially, but advocacy groups still plan a boycott until privacy issues is addressed, by Staff, ZDNN, 20 January 1999.
- Intel: Privacy is our concern as well; Chip maker will continue to discuss privacy issues surrounding processor ID numbers by Robert Lemos, ZDNN, 20 January 1999.
- Posing a Privacy Problem? Driver's-License Photos Used in Anti-Fraud Database by Robert O'Harrow Jr. Washington Post Staff Writer, Friday, January 22, 1999; Page A01.
- CPSR Spam Page
- The State Police of Virginia maintains a page related to the whereabouts of convicted sex-offenders. Is this an invasion of their privacy?
- Virginia Right to Privacy (extract from Code of Virginia, Section 8,01-40)
- "Scope of an Employee's Right of Privacy in Employer Communications", by Rod Dixon, VIRGINIA JOURNAL of LAW and TECHNOLOGY, Fall 1997.
- "Employee Monitoring: Is There Privacy in the Workplace?", Privacy Rights Clearinghouse, August 1997.
- Prohibition of use as evidence of intercepted
wire or oral communications - is this applicable to employer interception or monitoring of e-mail?, Part 2515, US Code:
Whenever any wire or oral communication has been intercepted, no
part of the contents of such communication and no evidence derived
therefrom may be received in evidence in any trial, hearing, or
other proceeding in or before any court, grand jury, department,
officer, agency, regulatory body, legislative committee, or other
authority of the United States, a State, or a political subdivision
thereof if the disclosure of that information would be in violation of
- "Who Owns Information?", a lecture by Ann Wells Branscomb, 1996.
- Concerns about universities posting student information identified by social security numbers is the subject of a page by Glen Roberts. Virginia Tech is identified as one of the culprits, but the link produces a 404 error!
- In Fall 1996, the class was privileged to have as its guest Lee Hollaar, University of Utah, who spoke about the State of Utah Digital Signature Act, a leading piece of legislation that will permit the "legalization" of digital documents that require signatures.
- International Developments Affecting Digital Signatures by Stewart A. Baker and Steptoe & Johnson
- National Cyber Detective Network: I haven't invested in this yet, but the implications (if well founded) are troublesome!
- Junk mailings are frequently the result of the accessability of personal data in a data-base somewhere. This then is also a question of privacy.
- Net privacy at issue: FTC is exploring whether
to regulate collection, sale of personal data.
- My recent experience with telemarketing phone calls.
- "Spending Bill Allows for Internet Censorship, Internet censorship amendments tied to an appropriations bill wins approval in the Senate", by James Niccolai, IDG News Service, July 24, 1998, 12:03 p.m. PT
- Surreptitious Recording: State Hidden Camera Statutes
- The U.S. House of Representatives Internet
Law Library -- Privacy and information access.
- The UN Human
Rights statement contains a right to privacy provision in article 12.
Crimes, and Privacy, School of Law, Santa Clara University, by D. Friedman.
- Besides the other links in this directory, you may also want to check
out the Electronic Frontier Foundation
-- they usualy have something to say about most things!
- CPSR maintains
a directory containing several files and other directories related to privacy.
AND THE NATIONAL INFORMATION INFRASTRUCTURE: PRINCIPLES FOR PROVIDING
AND USING PERSONAL INFORMATION", a report by the US Government Privacy
- MIT distribution site
for PGP (Pretty Good Privacy)
- The Privacy
- The page from MIT
6.805/STS085: Readings on Privacy Implications of Computer Networks
statement on the export of encryption devices.
- The (now) Annual
Conference on Computers, Freedom and Privacy is an excellent source
of materials on this topic.
- Other items referring to privacy can be found in an ACM Crossroads
and the text of the so-called Buckley
- On-Line Privacy
-- a WWW page by Yow ( firstname.lastname@example.org ) has some interesting comments and
lots of links.
- Ware, Willis. 1993. "THE
NEW FACES OF PRIVACY", Rand Corporation, Santa Monica CA, 28 pp.
- The PGP (Pretty Good Privacy) home
page often has some interesting links on privacy.
- A collection of articles at Washington
University at St. Louis.
- Consider looking up, or asking for information through one of the privacy
- A series of lectures on privacy
being run as an on-line discussion group.
- Alternatively you may want to examine the "Privacy
Forum", an interactive forum sponsored in part by ACM, MCI, and
Cisco Systems. The Privacy forum is a LISTSERV with extensive archives.
and Using Information Collected from Children On-line
- A report on the
FBI proposal to develop a wiretap capability. (2 Nov 1995)
- "Encryption: Impact on Law Enforcement", an FBI Report. (8 July 1998)
- Joel McNamara's home page
contains several links including several to position papers on privacy
and encryption discussed at the Sept. 1995 NIST meeting.
- A presentation on the The
State of Utah Digital Signature Act 1995, 1996, by Lee Hollaar is interesting
reading and provides instructors with the slides for a parallel presentation.
The details about the Act
are also available on-line.
METAPHOR IS THE KEY: CRYPTOGRAPHY, THE CLIPPER CHIP, AND THE CONSTITUTION
by A. Michael Froomkin
IN BIG BROTHER: The Cryptographic Policy Debate, Edited by Lance J.
by Mikael Aurili, CS 3604, Fall 1996.
- Electronic Storage by Stacey Reitz, CS 3604, Fall 1996.
Away Our Privacy by Dennis Seay, CS 3604, Fall 1996.
- A collection of articles at Washington
University at St. Louis.
World of Strong Privacy: Promises and Perils of Encryption by D. Friedman.
See also the "paper"
bibliography and in 1993, Ronald E. Anderson, Deborah G. Johnson, Donald
Gotterbarn and Judith Perrolle published an article "Using the new
ACM code of ethics in decision making" (Commmunications of the
ACM, February, 1993) that contained a useful
set of references.
France: LOI N° 78-17 DU 6 JANVIER 1978 relative à l'informatique, aux fichiers et aux libertés.
Last updated 2002/07/12
© J.A.N. Lee, 1996-2002.