Title
|
Author
|
Year
|
Unpopular Privacy: The Case for Government Mandates
This article analyzes the effect and necessity of laws mandating privacy on unwilling individuals.
|
Anita Allen |
2007 |
Face to Face With "It": And Other Neglected Contexts of Health Privacy
This paper looks at new cases involving medical privacy and the media.
|
Anita Allen |
2007 |
Terror In the Balance: Security, Liberty and the Courts
This book considers how government should act in emergencies.
|
Eric Posner, Adrian Vermeule |
2007 |
We Googled You (Case Commentary)
This paper asks if firms should hire a job candidate when online searches turn up controversial information about her.
|
John Palfrey, Diane Coutu, Michael Fertik, danah boyd |
2007 |
The Magnificence of the Disaster: Reconstructing the Sony BMG Rootkit Incident
This paper asks how a major firm came to create serious security risks for consumers’ computers.
|
Deirdre Mulligan, Aaron Perzanowski |
2007 |
Noticing Notice: A Large-Scale Experiment on the Timing of Software License Agreements
This paper looks at how consumers respond to different software licenses.
|
Deirdre Mulligan, Nathaniel Good, Jens Grossklags, Joseph A. Konstan |
2007 |
Security Analysis of the Diebold AccuVote-TS Voting Machine
This paper reveals security problems with a commonly used voting machine.
|
Edward Felten, J. Alex Halderman, Ariel J. Feldman |
2007 |
The Code of Privacy
This paper asks how we should protect privacy online.
|
Lawrence Lessig |
2007 |
Four Models of Fourth Amendment Protection
This paper asks whether Supreme Court rules protecting privacy make sense.
|
Orin Kerr |
2007 |
An Introduction to Key Themes in the Economics of Cyber-security
This paper looks at how computer security problems like viruses are solved.
|
Neil Gandal |
2007 |