参考文献
|
-
Stone, B. (2010, April 22). For web' s new wave, sharing details is the point. New York Times, p. A1.
-
Postman, N. (1990). Informing ourselves to death, address before the German informatics society. Retrieved from http://www.mat.upm.es/~jcm/postman-informing.html
-
Williams, A. (2006, October 15). Planet Google wants you. New York Times, p. 9.1.
-
Gonsalves, A. (2006, September 8). Facebook founder apologizes in privacy flap; Users given more control. Information Week. Retrieved from http://www.informationweek.com/news/192700574
-
UK Information Commissioner' s Office (2011, January 14). The Information Commissioner' s response to a comprehensive approach on personal data protection in the European Union. Retrieved from http://www.ico.gov.uk/SearchResultAsHtml.aspx?cid=WIFIMCxWbrYJ&page=http://www.ico.gov.uk/news/current_topics/~/media/documents/library/Data_Protection/Detailed_specialist_guides/european_commission_dp_strategy_response.ashx&keywords=right to be forgotten
-
Nick O' Neill, N. (2008, July 29). Facebook starts recommending friends not on site. Retrieved from http://www.allfacebook.com/2008/07/facebook-starts-recommending-friends-not-on-site/
-
Arrington, M. (2008, January 3). Plaxo flubs it. TechCrunch. Retrieved from http://www.techcrunch.com/2008/0103/plaxo-flubs-it/
-
O'Reilly, T. (2005). What is web 2.0: Design patterns and business models for the next generation of software. Retrieved from http://oreilly.com/web2/archive/what-is-web-20.html
-
Stone, B. (2007, August 6). A mystery solved: "Fake Steve" is an editor. New York Times, p. C1.
-
Gould, E. (2008, May 25). Exposed. New York Times. Retrieved from http://www.nytimes.com/2008/05/25/magazine/25internet-t.html
-
Markoff, J. (2007, September 1). Who found the bright idea? New York Times, p. C1.
-
Swartz, J. (2007, September 12). Soon millions of Facebookers won't be incognito. USA TODAY, p. B3.
-
EUROPA (2011, December. 7). Viviane reding vice-president of the european commission, EU justice commissioner independent data protection authorities: indispensable watchdogs of the digital age meeting of the article 29 working party Brussels. Retrieved from http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/11/863&format=HTML&aged=0&language=EN&guiLanguage=en
-
Jones, T. (2008, January 10). A deadly web of deceit: A teen's online "friend" proved false, snd cyber-vigilantes are avenging her. Washington Post, p. C1.
-
Abril, P. S.(2007).A (My)Space of one' s own: On privacy and online social networks.Northwestern Journal of Technology and Intellectual Property,6(1),73-88.
-
Allen, A. L.(2008).Dredging up the past lifelogging memory, and surveillance.University of Chicago Law Review,75(1),47-74.
-
Barth, A.,Datta, A.,Mitchell, J. C.,Nissenbaum, H.(2006).Privacy and contextual integrity: Framework and applications.2006 IEEE Symposium on Security and Privacy
-
Bellia, P. L.,Freiwald, S.(2008).Fourth amendment protection for stored e-mail.University of Chicago Legal Forum,2008,121-178.
-
Benkler, Y.(2001).Siren songs and Amish children: Autonomy, information and law.New York University Law Review,76(1),23-113.
-
Benkler, Y.(2006).The wealth of networks: How social production transforms markets and freedom.New Haven:Yale University Press.
-
Benkler, Y.(2002).Coase' s penguin, or, Linux and the nature of the firm.Yale Law Journal,112(1),369-446.
-
Blackman, J.(2009).Omniveillance, Google, privacy in public, and the right to your digital identity: A tort for recording and disseminating an individual's image over the Internet.Santa Clara Law Review,49,313-392.
-
Boyd, D. M.(2004).Friendster and publicly articulated social networks.Proceedings of ACM conference on human factors in computing systems,New York:
-
Boyd, D. M.,Ellison, N. B.(2007).Social network sites: Definition, history, and scholarship.Journal of Computer-Mediated Communication,13(1),210-230.
-
Brin, D.(1999).Transparent society: Will technology force us to choose between privacy and freedom?.New York:Basic Books.
-
Carroll, M. W.(2006).Creative commons and the new intermediaries.Michigan State Law Review,45(1),45-65.
-
Ciocchetti, C. A.(2007).E-commerce and information privacy: Privacy policies as personal information protectors.American Business Law Journal,44(1),55-126.
-
Cohen, J. E.(2005).The place of the user in copyright law.Fordham Law Review,74,347-374.
-
Cohen, J. E.(2007).Cyberspace as/and space.Columbia Law Review,107(1),210-256.
-
Collins, L.(2008).Friend game.New Yorker,2008(January 21),34.
-
Cote, M.(2007).Note, getting dooced: Employee blogs and employer blogging policies under the national Labor Relations Act.Washington Law Review,82(1),121-148.
-
Dreyfuss, R. C.(1999).Warren and Brandeis Redux: Finding (more) privacy protection in intellectual property lore.Stanford Technology Law Review,1999,8.
-
EU Commission(2010).COM(2010) 609 finalCOM(2010) 609 final,Brussels:.
-
Freiwald, S.(2001).Comparative institutional analysis in cyberspace: The case of intermediary liability for defamation.Harvard Journal of Law & Technology,14,569-655.
-
Freiwald, S.(2009).A comment on James Grimmelmann' s saving facebook.Iowa Law Review Bulletin,95,5-11.
-
Gajda, A.(2009).Judging journalism: The turn toward privacy and judicial regulation of the press.California Law Review,97,1039-1105.
-
Gelman, L.(2009).Privacy, free speech, and "blurry-edged" social networks.Boston College Law Review,50(5),1315-1344.
-
Gillmor, D.(2004).We the media: Grassroots journalism by the people, for the people.Sebastopol:O'Reilly.
-
Goldman, E.(2006).A coasean analysis of marketing.Wisconsin Law Review,2006,1151-1221.
-
Grimmelmann, J.(2009).Saving facebook.Iowa Law Review,94,1137-1206.
-
Grossman, W. M.(1998).Net.wars.New York:New York University Press.
-
Hashemi, Y.(2009).Facebook' s privacy policy and its third-party partnerships: Lucrativity and liability.Boston University Journal of Science & Technology Law,15,140-161.
-
Jones, S.(Ed.)(2003).Encyclopedia of new media: An essential reference to communication and technology.Thousand Oaks:Sage Publications.
-
Kahan, D. M.,Slovic, P.,Braman, D.,Gastil, J.(2006).Fear of democracy: A cultural evaluation of sunstein on risk.Harvard Law Review,119,1071-1109.
-
Keen, A.(2008).The cult of the amateur: How blogs, Myspace, Youtube, and the rest of today's user-generated media are destroying our economy, our culture, and our values.New York:Doubleday.
-
Kerr, O. S.(2009).The case for the third-party doctrine.Michigan Law Review,107,561-601.
-
Kesan, J. P.,Shah, R. C.(2006).Setting software defaults: Perspectives from law, computer science and behavioral economics.Notre Dame Law Review,82,583-634.
-
Komesar, N. K.(1994).Imperfect alternatives: Choosing institutions in law, economics, and public policy.Chicago:The University of Chicago Press.
-
Kriescher, M.(2009).Professional benefits of online social networking.The Colorado Lawyer,38(2),61-64.
-
Lee, E.(2009).Developing copyright practices for user-generated content.Journal of Internet Law,13,1-21.
-
Lessig, L.(1999).Code and other laws of cyberspace.New York:Basic Books.
-
Levmore, S.(ed.),Nussbaum, M. C.(ed.)(2010).The offensive Internet: speech, privacy, and reputation.Cambridge:Harvard University Press.
-
Mayer-Schönberger, V.(2009).Delete: The virtue of forgetting in the digital age.Princeton:Princeton University Press.
-
McClurg, A. J.(1995).Bringing privacy law out of the closet: A tort theory of liability for intrusions in public places.North Carolina Law Review,73,989-1089.
-
Mcgeveran, W.(2009).Disclosure, endorsement, and identity in social marketing.University of Illinois Law Review,2009(4),1105-1166.
-
Mulligan, D. K.,Perzanowski, A. K.(2007).The magnificence of the disaster: Reconstructing the Sony BMG rootkit incident.Berkeley Technology Law Journal,22,1157-1232.
-
Nissenbaum, H.(1998).Protecting privacy in an information age: The problem of privacy in public.Law and Philosophy,17,559-596.
-
Nissenbaum, H.(2010).Privacy in context: Technology, policy, and the integrity of social life.Stanford:Stanford Law Books.
-
Nissenbaum, H.(2004).Privacy as contextual integrity.Washington Law Review,79(1),119-158.
-
Picker, R. C.(2008).Competition and privacy in web 2.0 and the cloud.Northwestern University Law Review,103,1-12.
-
Post, R. C.(2001).Three concepts of privacy.Georgetown Law Journal,89(6),2087-2101.
-
Putnam, R. D.(2000).Bowling alone: The collapse and revival of American community.New York:Simon & Schuster.
-
Richards, N. M.(2005).Reconciling data privacy and the first amendment.UCLA Law Review,52(4),1149-1222.
-
Richards, N. M.,Solove, D. J.(2007).Privacy' s other path: Recovering the law of confidentiality.Georgetown Law Journal,96(1),123-182.
-
Rodrigues, R.(2008).You' ve been poked: Privacy in the era of Facebook.The SciTech Lawyer,5(1),18-19+24.
-
Rubenfeld, J.(2008).The end of privacy.Stanford Law Review,61(1),101-162.
-
Samuelson, P.(2009).Unbundling fair uses.Fordham Law Review,77(5),2537-2622.
-
Shirky, C.(2008).Here comes everyone: The power of organizing without organizations.New York:Penguin Group USA.
-
Slobogin, C.(2007).Privacy at risk: The new government surveillance and the fourth amendment.Chicago:University of Chicago Press.
-
Solove, D. J.(2008).Understanding privacy.Cambridge:Harvard University Press.
-
Solove, D. J.(2004).The digital person.New York:New York University Press.
-
Solove, D. J.(2007).The future of reputation: Gossip, rumor, and privacy on the Internet.New Haven:Yale University Press.
-
Solove, D. J.(2006).A tale of two bloggers: Free speech and privacy in the blogosphere.Washington University Law Review,84,1195.
-
Solove, D. J.(2006).A taxonomy of privacy.University of Pennsylvania Law Review,154(3),477-560.
-
Sprague, R.(2008).Rethinking information privacy in an age of online transparency.Hofstra Labor and Employment Law Journal,25(2),395-417.
-
Sprague, R.(2007).Fired for blogging: Are there legal protections for employees who blog?.University of Pennsylvania Journal of Labor and Employment Law,9(2),355-387.
-
Strahilevitz, L. J.(2005).A social networks theory of privacy.University of Chicago Law Review,72,919-988.
-
Sunstein, C. R.(2005).Laws of fear: Beyond the precautionary principle.New York:Cambridge University Press.
-
Tien, L.(2004).Architectural regulation and the evolution of social norms.Yale Journal of Law & Technology,7,1-22.
-
Turner, F.(2008).From counterculture to cyberculture: Steward brand, the whole earth network, and the rise of digital utopianism.Chicago:University of Chicago Press.
-
Wallace, P.(1999).The psychology of the Internet.New York:Cambridge University Press.
-
Whitman, J. Q.(2004).The two western cultures of privacy: Dignity versus liberty.Yale Law Journal,113(6),1151-1221.
-
Zimmer, M.(2008).Privacy on planet Google: Using the theory of "contextual integrity" to clarify the privacy threats of Google' s quest for the perfect search engine.Journal of Business & Technology Law,3(1),109-126.
-
Zittrain, J.(2009).The future of the Internet - And how to stop it.New Haven:Yale University Press.
-
Zittrain, J.(2006).The generative Internet.Harvard Law Review,119(7),1974-2040.
-
李榮耕(2010)。論偵查機關對通信紀錄的調取。政大法學評論,115,115-147。
-
邱文聰(2009)。從資料自決與資訊隱私的概念區分:評「電腦處理個人資料保護法修正草案」的結構性問題。月旦法學雜誌,168,172-189。
-
劉靜怡(2010)。不算進步的立法:「個人資料保護法」初步評析。月旦法學雜誌,183,174-164。
-
顏厥安編、林鈺雄編(2010)。人權跨國性司法實踐:歐洲人權裁判研究(三)。台北=Taipei:元照=Angle。
|