Skip to main content Accessibility help
×
Hostname: page-component-7c8c6479df-8mjnm Total loading time: 0 Render date: 2024-03-29T12:20:26.217Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  24 July 2009

Andrew T. Kenyon
Affiliation:
University of Melbourne
Megan Richardson
Affiliation:
University of Melbourne
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
New Dimensions in Privacy Law
International and Comparative Perspectives
, pp. 270 - 285
Publisher: Cambridge University Press
Print publication year: 2006

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aikman, Colin C., ‘Recent Constitutional Changes in the South-West Pacific’ in 1968 New Zealand Official Yearbook (Wellington: Government Printer, 1968)Google Scholar
Alderman, Ellen and Kennedy, Caroline, The Right to Privacy (New York: Alfred A. Knopf, 1995)Google Scholar
Allen, Anita L. and Mack, Erin, ‘How Privacy Got Its Gender’ (1990) 10 Northern Illinois University Law Review441Google Scholar
Ames, Winslow, Prince Albert and Victorian Taste (London: Chapman & Hall, 1968)Google Scholar
Amestoy, Jeffrey L., ‘Uncommon Humanity: Reflections on Judging in a Post-Human Era’ (2003) 78 New York University Law Review1581Google Scholar
Anderson, David A., ‘The Failure of American Privacy Law’ in Basil, S. Markesinis (ed.), Protecting Privacy (Oxford: Oxford University Press, 1999)Google Scholar
Article 29 Working Party, Working Document on Data Protection Issues related to RFID Technology, 10107/05/EN, WP 105, 19 January 2005
Article 29 Working Party, Working Document on Data Protection Issues related to Intellectual Property Rights, WP 104, 18 January 2005
Article 29 Working Party, Working Document on Transfers of Personal Data to Third Countries: Applying Article 26 (2) of the EU Data Protection Directive to Binding Corporate Rules for International Data Transfers, MARKT/11639/02/EN, WP 74, 3 June 2003
Article 29 Working Party, Opinion 2/2002 on the use of Unique Identifiers in Telecommunication Terminal Equipments: The Example of Ipv6, 10750/02/EN/final, WP 58, 30 May 2002
Article 29 Working Party, Working Document on Determining the International Application of EU Data Protection Law to Personal Data Processing on the Internet by non-EU Based Websites, 5035/01/EN/Final, WP 56, 30 May 2002
Article 29 Working Party, Opinion 3/2001 on the Level of Protection of the Australian Privacy Amendment (Private Sector) Act 2000, 5095/00/EN, WP 40, 26 January 2001
Article 29 Working Party, Recommendation 1/99 on Invisible and Automatic Processing of Personal Data on the Internet Performed by Software and Hardware, DG MARKT 5093/98, WP 17, 23 February 1999
Article 29 Working Party, Opinion 1/98 Platform for Privacy Preferences (P3P) and the Open Profiling Standard (OPS), XV D/5032/98, WP 11, 16 June 1998
Article 29 Working Party, Recommendation 3/97: Anonymity on the Internet, DG MARKT D/5022/97, WP 6, 3 December 1997
Asia-Pacific Economic Cooperation, Report of the APEC Electronic Commerce Steering Group 11th Meeting, 2005/SOM I, 24–25 February 2005
Asia-Pacific Economic Cooperation, APEC Ministers Endorse the APEC Privacy Framework, Media Release, Santiago, Chile, 20 November 2004, available from http://www.apec.org/apec/news_media/2004_media_releases.html
Asia-Pacific Privacy Charter Council, Submission to the APEC Electronic Commerce Steering Group Privacy Sub-Group (31 May 2004), available at http://www.bakercyberlawcentre.org/appcc/APEC_APPCCsub.htm
Australia, Copyright Convergence Group, Highways to Change – Copyright in the New Communications Environment (Canberra: AGPS, 1994)
Australia, Department of Communications, Information Technology and the Arts, A Guide to Digital Rights Management (Canberra: DCITA, 2002)
Australia, House of Representatives Standing Committee on Legal and Constitutional Affairs, Inquiry into Technological Protection Measures (TPM) Exceptions (Canberra: House of Representatives, 1 March 2006)
Australia, Office of the Privacy Commissioner, Getting in on the Act: The Review of the Private Sector Provisions of the Privacy Act 1988 (March 2005)
Australia, Senate Legal and Constitutional References Committee, The Real Big Brother: Inquiry into the Privacy Act 1988 (Canberra: Senate Printing Unit, June 2005)
Australian Law Reform Commission, Privacy, Report No. 22 (Canberra: AGPS, 1983)
Australian Privacy Foundation, Submission to Senate Legal and Constitutional Inquiry into Privacy Act 1988 (March 2005)
Barendt, Eric, Freedom of Speech (2nd edn, Oxford: Oxford University Press, 2005)Google Scholar
Barendt, Eric, ‘Privacy and the Press’ in Barendt, Eric M. (ed.), Yearbook of Media and Entertainment Law 1995 (Oxford: Clarendon Press, 1995)Google Scholar
Becker, Eberhard, Buhse, Willms, Günnewig, Dirk and Rump, Niels (eds.), Digital Rights Management: Technological, Economic, Legal and Political Aspects (Lecture Notes in Computer Science Vol. 2770) (Berlin: Springer, 2003)CrossRefGoogle Scholar
Belgian Privacy Commission, Opinion on the Protection of the Privacy of Minors on the Internet, Avis no. 38/2002, 16 September 2002
Bennett, Colin J. and Raab, Charles D., The Governance of Privacy: Policy Instruments in Global Perspective (London: Ashgate, 2003)Google Scholar
Bernstein, Gaia, ‘Information Technologies and Identity’ [2005] 1 Computer Law Review International (formerly Computer und Recht International)1Google Scholar
Blasi, Vincent, ‘Learned Hand and the Self-Government Theory of the First Amendment: Masses Publishing Co. v. Patten’ (1990) 61 University of Colorado Law Review1Google Scholar
Bloustein, Edward J., ‘Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser’ (1964) 39 New York University Law Review962Google Scholar
Bok, Sissela, Secrets: On the Ethics of Concealment and Revelation (New York: Pantheon Books, 1982)Google Scholar
Boulanger, Marie-Hélène and de Terwangne, Cécile, ‘Internet et le respect de la vie privée’ in Montero, Etienne (ed.), L'internet face au droit, Cahier du CRID no. 12 (Namur: Story-Scientia, 1997)Google Scholar
Bowrey, Kathy, Law and Internet Cultures (Cambridge: Cambridge University Press, 2005)Google Scholar
Boyce, George, Curran, James and Wingate, Pauline (eds.), Newspaper History from the Seventeenth Century to the Present Day (London: Constable, 1978)Google Scholar
Braithwaite, John and Drahos, Peter, Global Business Regulation (Cambridge: Cambridge University Press, 2000)Google Scholar
Brennan, William J. Jr, ‘Reason, Passion, and “The Progress of the Law”’ (1988) 10 Cardozo Law Review3Google Scholar
Brennan, William J. JrThe Constitution of the United States: Contemporary Ratification’ (1985) 27 South Texas Law Review433Google Scholar
Brennan, William J. JrThe Supreme Court and the Meiklejohn Interpretation of the First Amendment’ (1965) 79 Harvard Law Review1CrossRefGoogle Scholar
Burrows, John and Cheer, Ursula, Media Law in New Zealand (5th edn, South Melbourne: Oxford University Press, 2005)Google Scholar
Campbell, Emily, ‘Mandatory AIDS Testing and Privacy: A Psycholegal Perspective’ (1990) 66 North Dakota Law Review449Google ScholarPubMed
Cardozo, Benjamin N., The Nature of the Judicial Process (New Haven: Yale University Press, 1921)Google Scholar
Carter, David and Palmer, Mathew (eds.), Roles and Perspectives in the Law: Essays in Honour of Sir Ivor Richardson (Wellington: Victoria University Press, 2002)Google Scholar
Catlett, Jason, Open Letter 9/13 to P3P Developers, 13 September 1999, available at http://www.junkbusters.com/standards.html
Clarke, Roger, ‘Beyond the OECD Guidelines: Privacy Protection for the 21st Century’ (2000), available at http://www.anu.edu.au/people/Roger.Clarke/DV/PP21C.html
Clarke, Roger, ‘The Digital Persona and its Application to Data Surveillance’ (1994) 10 (2) The Information Society, available at http://www.anu.edu.au/people/Roger.Clarke/DV/DigPersona.htmlCrossRefGoogle Scholar
Cohen, Julie E., ‘Examined Lives: Informational Privacy and the Subject as Object’ (2000) 52 Stanford Law Review 1373CrossRefGoogle Scholar
Cohen, Julie E., ‘DRM and Privacy’ (2003) 18 Berkeley Technology Law Journal 575Google Scholar
Cohen, Julie E., ‘Normal Discipline in the Age of Crisis’ (Draft, 4 August 2004), see http://www.ssrn.com
Cohen-Almagor, Raphael, Speech, Media and Ethics: The Limits of Free Expression (Basingstoke, UK: Palgrave, 2001)CrossRefGoogle Scholar
Coleman, Jules and Shapiro, Scott (eds.), The Oxford Handbook of Jurisprudence & Philosophy of Law (Oxford: Oxford University Press, 2002)Google Scholar
Colvin, Madeleine (ed.), Developing Key Privacy Rights (Oxford: Hart, 2002)Google Scholar
Council of Europe, Draft Framework Decision on the Retention of Data Processed and Stored in Connection with the Provision of Publicly Available Electronic Communications Services or Data on Public Communications Networks for the Purpose of Prevention, Investigation, Detection and Prosecution of Crime and Criminal Offences including Terrorism, 8958/04, CRIMORG 36, TELECOM 82, 28 April 2004
Council of Europe, Committee of Ministers, Guidelines for the Protection of Individuals with regard to the Collection and Processing of Personal Data on Information Highways, Recommendation no. R (99) 5, 23 February 1999
Damich, Edward J., ‘The Right of Personality: A Common-Law Basis for the Protection of the Moral Rights of Authors’ (1988) 23 Georgia Law Review1Google Scholar
DeCew, , Wagner, Judith, In Pursuit of Privacy (Ithaca, New York: Cornell University Press, 1997)Google Scholar
Delbar, Catherine, Mormont, Marinette and Schots, Marie, (European Industrial Relations Observatory Online), Comparative Report on New Technology and Respect for Privacy at the Workplace, TN0307101S, 12 August 2003
Dent, Chris and Kenyon, Andrew T., ‘Defamation Law's Chilling Effect: A Comparative Content Analysis of Australian and US Newspapers’ (2004) 9 Media & Arts Law Review89Google Scholar
Dewey, John, Democracy and Education (New York: Macmillan, 1961)Google Scholar
Dhont, Jan and Perez-Asinari, María Verónica, ‘New Physics and the Law: A Comparative Approach to the EU and US Privacy and Data Protection Requirement – Looking for “Adequate Protection”’ in Mensbrugghe, F. (ed.), L'utilisation de la méthode comparative en droit européen–Usage of Comparative Methodology in European Law (Belgium: Presses Universitaires de Namur, 2003)Google Scholar
Dhont, Jan, Pérez-Asinari, , María Verónica, and Poullet, Yves (with the assistance of Reidenberg, Joel R. and Bygrave, Lee A.), Safe Harbour Implementation Study (Namur: CRID, 2004)Google Scholar
Dinant, J. Marc, ‘Law and Technology Convergence in the Data Protection Field’ in Walden, Ian and Hörnle, Julia (eds.), E-Commerce Law and Practice in Europe (Cambridge: Woodhead, 2002)Google Scholar
Dinant, J. MarcLe visiteur visité – Quand les éditeurs de logiciel internet passent subrepticement à travers les mailles du filet juridique’ (Winter 2001) 6:2Lex Electronica, available from http://www.lex-electronica.orgGoogle Scholar
Dobbs, Dan B., The Law of Torts (St Paul, Minn.: West, 2000)Google Scholar
Dworkin, Ronald, A Matter of Principle (Cambridge, Mass.: Harvard University Press, 1985)Google Scholar
Dyer, Richard, Heavenly Bodies: Film Stars and Society (London: MacMillan, 1987)Google Scholar
Eberle, Edward J., ‘Human Dignity, Privacy, and Personality in German and American Constitutional Law’ [1997] Utah Law Review 963Google Scholar
Ely, John Hart, Democracy and Distrust: A Theory of Judicial Review (Cambridge, Mass.: Harvard University Press, 1980)Google Scholar
Ely, John Hart, ‘The Wages of Crying Wolf: A Comment on Roe v. Wade’ (1973) 82 Yale Law Journal 920
Emerson, Thomas I., ‘The Right of Privacy and Freedom of the Press’ (1979) 14 Harvard Civil Rights–Civil Liberties Law Review329Google Scholar
Emerson, Thomas I.Toward a General Theory of the First Amendment’ (1963) 72 Yale Law Journal877CrossRefGoogle Scholar
European Commission, Seventh Report on the Situation regarding the Protection of Individuals with regard to the Processing of Personal Data and Privacy in the European Union and in Third Countries (Luxembourg: Office for Official Publications of the European Communities, 2004)
European Commission, Communication from the Commission to the European Parliament, The Council, The European Economic and Social Committee and the Committee of the Regions on Unsolicited Commercial Communications or ‘Spam’, COM(2004) 28, 22 January 2004
European Commission, Second Stage Consultation of Social Partners on the Protection of Workers' Personal Data (30 October 2002)
European Commission, Digital Rights: Background, Systems, Assessment, Commission Staff Working Paper, SEC(2002) 197, 14 February 2002
European Commission, Copyright and Related Rights in the Information Society: Green Paper from the European Commission to the European Council, COM/95/0382 final, 19 July 1995
European Parliament, Report on the Existence of a Global System for the Interception of Private and Commercial Communications (ECHELON interception system), 2001/2098(INI)
Faulks, Sebastian, The Fatal Englishman (London: Random House, 1996)Google Scholar
Feldman, David, Civil Liberties and Human Rights in England and Wales (2nd edn, Oxford: Oxford University Press, 2002)Google Scholar
Ficsor, Mihaly, The Law of Copyright and the Internet: The 1996 WIPO Copyright Treaties, their Interpretation and Implementation (Oxford: Oxford University Press, 2002)Google Scholar
Fineman, Martha A., ‘Intimacy Outside of the Natural Family’ (1991) 23 Connecticut Law Review955Google Scholar
Fish, Stanley, There's No Such Thing as Free Speech (Oxford: Oxford University Press, 1994)Google Scholar
Flew, Terry, New Media: An Introduction (2nd edn, South Melbourne: Oxford University Press, 2005)Google Scholar
Ford, Peter, ‘Implementing the Data Protection Directive – An Outside Perspective’ (2003) 9 Privacy Law & Policy Reporter141Google Scholar
Foucault, Michel, Discipline and Punish: The Birth of the Prison, transl. Sheridan, Alan (Harmondsworth: Penguin, 1979)Google Scholar
Frame, Alex, ‘Lawyers and the Making of Constitutions: Making Constitutions in the South Pacific’ in Carter, David and Palmer, Mathew (eds.), Roles and Perspectives in the Law: Essays in Honour of Sir Ivor Richardson (Wellington: Victoria University Press, 2002)Google Scholar
Franzen, Jonathan, How to be Alone (London: Harper Collins, 2002)Google Scholar
Freund, Paul A., On Law and Justice (Cambridge, Mass.: Belknap Press of Harvard University Press, 1968)CrossRefGoogle Scholar
Friedman, David D., Landes, William M. and Posner, Richard A., ‘Some Economics of Trade Secret Law’ (1991) 5 Journal of Economic Perspectives61CrossRefGoogle Scholar
Frye, Northrop, Anatomy of Criticism (Princeton: Princeton University Press, 1957)Google Scholar
Gavison, Ruth, ‘Too Early for a Requiem: Warren and Brandeis were Right on Privacy vs Free Speech’ (1992) 43 South Carolina Law Review437Google Scholar
Geller, Paul Edward, ‘Toward an Overriding Norm in Copyright: Sign Wealth’ (1994) 159 Revue Internationale du Droit d'Auteur (RIDA)3Google Scholar
Georges, Marie, ‘Relevons les défis de la protection des données à caractère personnel: l'Internet et la CNIL’ in Lemoire, P. (ed.), Commerce électronique- Marketing et vie privée (Paris: LaSer, 1999)Google Scholar
Ginsburg, Jane C., ‘How Copyright Got a Bad Name for Itself’ (2002) 26 Columbia Journal of Law and the Arts61Google Scholar
Ginsburg, Jane C., 'Copyright or ‘Infograb’: Comment on General Report on Limitations Found Outside Copyright’ in Baulch, Libby, Green, Michael and Wybum, Mary (eds.), The Boundaries of Copyright, its Proper Limitations and Exceptions, (Sydney: ALAI Study Days, Australian Copyright Council, 1999)Google Scholar
Ginsburg, Jane C. and Besek, June M. (eds.), Adjuncts and Alternatives to Copyright, Proceedings of the ALAI Congress, Columbia University, New York (2002)Google Scholar
Goldstein, Paul, Copyright's Highway (revised edn, Stanford: Stanford University Press, 2003)Google Scholar
Gould, John, Birds of Australia (Part XXVI, London: John Gould, 1847)Google Scholar
Greenleaf, Graham, ‘APEC's Privacy Framework: A New Low Standard’ (2005) 11 (5) Privacy Law & Policy Reporter 121
Greenleaf, GrahamAPEC's Privacy Standard Regaining Strength’ (2004) 10 (8) Privacy Law & Policy Reporter158Google Scholar
Greenleaf, GrahamAPEC Privacy Principles: More Lite with Every Version’ (2003) 10 (6) Privacy Law & Policy Reporter105Google Scholar
Greenleaf, GrahamAPEC Privacy Principles Version 2 – Not Quite so Lite, and NZ wants OECD Full Strength’ (2003) 10 (3) Privacy Law & Policy Reporter45Google Scholar
Greenleaf, GrahamAustralia's APEC Privacy Initiative: The Pros and Cons of “OECD Lite”’ (2003) 10 (1) Privacy Law & Policy Reporter1Google Scholar
Greenleaf, GrahamSafe Harbor's Low Benchmark for “Adequacy”: EU Sells Out Privacy for US$’ (2000) 7 Privacy Law & Policy Reporter45Google Scholar
Greenleaf, GrahamPrivate Sector Bill Amendments Ignore EU Problems’ (2000) 7 Privacy Law & Policy Reporter41Google Scholar
Greenleaf, Graham, ‘Global Protection of Privacy in Cyberspace – Implications for the Asia-Pacific’, paper at ‘Towards an Asia-Pacific Information Privacy Convention?’, 1998 Internet Law Symposium, Science & Technology Law Center, Taipei, Taiwan, 23–24 June 1998, available at http://austlii.edu.au/itlaw/articles/TaiwanSTLC.html
Greenleaf, Graham, ‘Stopping Surveillance: Beyond “Efficiency” and the OECD’ (1996) 3 Privacy Law & Policy Reporter148Google Scholar
Greenleaf, Graham, ‘Towards an Asia-Pacific Information Privacy Convention’ (1995) 2 Privacy Law & Policy Reporter127Google Scholar
Grijpink, Jan and Prins, Corien, ‘Digital Anonymity on the Internet: New Rules for Anonymous Electronic Transactions?’ (2001) 17 Computer Law and Security Report379CrossRefGoogle Scholar
Halpern, Sheldon W., ‘The “Inviolate Personality” – Warren and Brandeis After One Hundred Years’ (1990) 10 Northern Illinois University Law Review387Google Scholar
Hamelink, Cees J., The Ethics of Cyberspace (London, Sage: 2000)Google Scholar
Harris, David and Joseph, Sarah (eds.), The International Covenant on Civil and Political Rights and United Kingdom Law (Oxford: Clarendon Press, 1995)Google Scholar
Hill, John L., ‘A Third Theory of Liberty: The Evolution of Our Conception of Freedom in American Constitutional Thought’ (2000) 29 Hastings Constitutional Law Quarterly115Google Scholar
Hong Kong, Law Reform Commission of Hong Kong, Civil Liability for Invasion of Privacy (Hong Kong: The Commission, December 2004)
Huff, Thomas, ‘Thinking Clearly about Privacy’ (1980) 55 Washington Law Review777Google Scholar
Hugenholtz, Bernt (ed.), The Future of Copyright in a Digital Environment: Proceedings of the Royal Academy Colloquium (The Hague: Kluwer Law International, 1996)Google Scholar
Hughes, Aneurin, ‘A Question of Adequacy? The European Union's Approach to Assessing the Privacy Amendment (Private Sector) Act 2000 (Cth)’ (2001) 24 University of New South Wales Law Journal270Google Scholar
Hughes, G. Bernard, Victorian Pottery and Porcelain (London: Country Life, 1959)Google Scholar
Kahn, Jonathan, ‘Privacy as a Legal Principle of Identity Maintenance’ (2003) 33 Seton Hall Law Review371Google Scholar
Kalven, Harry, Jr., ‘The New York Times Case: A Note on “The Central Meaning of the First Amendment”’ 1964 Supreme Court Review 191Google Scholar
Kant, Immanuel, The Moral Law: Kant's Groundwork of the Metaphysic of Morals, translated and analysed by Paton, H. J. (London: Hutchinson University Library, 1948)Google Scholar
Katyal, Sonia K., ‘The New Surveillance’ (2003) 54 Case Western Reserve Law Review297Google Scholar
Keeton, W. Page (ed.), Prosser and Keeton on Torts (5th edn, St Paul, Minn.: West, 1984)Google Scholar
Keith, Kenneth, ‘A Bill of Rights: Does It Matter?’ (1997) 32 Texas International Law Journal393Google Scholar
Keith, Kenneth, ‘Democracy and a Bill of Rights for New Zealand? Judicial Review versus Democracy?’ (1985) 11 New Zealand Universities Law Review307Google Scholar
Keith, Kenneth (ed.), Essays on Human Rights (Wellington: Sweet & Maxwell, 1968)Google Scholar
Kenyon, Andrew T., Defamation: Comparative Law and Practice (London: UCL Press, 2006)Google Scholar
Kerr, Ian R., ‘If Left to Their Own Devices… How DRM and Anti-Circumvention Laws Can Be Used to Hack Privacy’ in Geist, Michael (ed.), In the Public Interest: The Future of Canadian Copyright Law (Ottawa: Irwin Law, 2005) pp. 167–210
Keuleers, Ewout and Dinant, J. Marc, ‘Data Protection: Multi-Application Smart Cards: The use of Global Unique Identifiers for Cross-Profiling Purposes – Part II: Towards a Privacy Enhancing Smart Card Engineering’ (2004) 20 (1) Computer Law and Security Report22Google Scholar
Kirby, Michael, ‘Privacy Protection, A New Beginning: OECD Principles 20 Years On’ (1999) 6 Privacy Law & Policy Reporter25Google Scholar
Koelman, Kamiel J., ‘Copyright Law and Economics in the EU Copyright Directive: Is the Droit d'Auteur Passé?’ (2004) 35 (6) International Review of Intellectual Property and Competition Law603Google Scholar
Lacey, Nicola, A Life of H. L. A. Hart: The Nightmare and the Noble Dream (Oxford: Oxford University Press, 2004)Google Scholar
Landes, William M. and Posner, Richard A., The Economic Structure of Intellectual Property Law (Cambridge, Mass.: Harvard University Press, 2003)Google Scholar
Larkin, Philip, Collected Poems (with introduction by A. Thwaite) (London: Marvell/Faber and Faber, 1988)Google Scholar
Leadbeater, Charles, Up the Down EscalatorWhy the Global Pessimists are Wrong (London: Penguin, 2003)Google Scholar
Léonard, Thierry, ‘E-commerce et protection des données à caractère personnel: quelques considérations sur la licéité des pratiques nouvelles de marketing sur internet’, February 2000, available at http://www.droit.fundp.ac.be/Textes/Leonard1.pdf
Lewis, Anthony, ‘Privacy and Civilization’ (2002) 27 Nova Law Review225Google Scholar
Lewis, Anthony, Make No Law: The Sullivan Case and the First Amendment (New York: Random House, 1991)Google Scholar
Lichtenberg, Judith, (ed.), Democracy and the Mass Media (Cambridge: Cambridge University Press, 1990)CrossRefGoogle Scholar
Lindsay, David, ‘An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law’ (2005) Melbourne University Law Review179
Lindsay, David, ‘Naomi Campbell in the House of Lords: Implications for Australia’ (2004) 11(1) Privacy Law & Policy Reporter4Google Scholar
Logeais, Elisabeth and Schroeder, Jean- Baptiste, ‘The French Right of Image: An Ambiguous Concept Protecting the Human Persona’ (1998) 18 Loyola of Los Angeles Entertainment Law Journal511Google Scholar
Louveaux, Sophie and Perez-Asinari, Maria Veronica, ‘New European Directive 2002/58 on the Processing of Personal Data and the Protection of Privacy in the Electronic Communication Sector – Some Initial Remarks’ (2003) 6(5) Computer and Telecommunications Law Review133Google Scholar
Lumby, Catherine, Gotcha: Life in a Tabloid World (St Leonards, NSW: Allen & Unwin, 1999)Google Scholar
Lumby, Catherine and Probyn, Elspeth (eds.), Remote Control: New Media, New Ethics (Cambridge: Cambridge University Press, 2003)CrossRefGoogle Scholar
Lyon, David, Surveillance Society: Monitoring Everyday Life (Philadelphia: Open University, 2001)Google Scholar
Lyon, David, ‘Everyday Surveillance: Personal Data and Social Classification’ (2002) 5(2) Information, Communication & Society242CrossRefGoogle Scholar
McKee, Alan, The Public Sphere: An Introduction (Cambridge: Cambridge University Press, 2005)Google Scholar
MacKinnon, Catharine, Towards a Feminist Theory of the State (Cambridge, Mass.: Harvard University Press, 1989)Google Scholar
Markesinis, Basil. S. (ed.), Protecting Privacy (Oxford: Oxford University Press, 1999)Google Scholar
Markesinis, Basil. S., ‘Our Patchy Law of Privacy – Time to Do Something About it’ (1990) 53 Modern Law Review802CrossRefGoogle Scholar
Markesinis, Basil. S., ‘The Calcutt Report Must Not Be Forgotten’ (1992) 55 Modern Law Review118CrossRefGoogle Scholar
Markesinis, Basil S., Cinneide, O' Colm, Fedtke, Joerg and Hunter-Henin, Myriam, ‘Concerns and Ideas about the Developing English Law of Privacy (and how Knowledge of Foreign Law Might Be of Help)’ (2004) 52 American Journal of Comparative Law133CrossRefGoogle Scholar
Markesinis, Basil S. and Unberath, Hannes, The German Law of Torts: A Comparative Treatise (4th edn, Oxford: Hart, 2002)Google Scholar
May, Christopher, The Information Society: A Sceptical View (Cambridge: Polity, 2002)Google Scholar
Mayer-Schönberger, Viktor, ‘The Internet and Privacy Legislation: Cookies for a Treat?’ (1997) 1 West Virginia Journal of Law and Technology 1.1Google Scholar
Meiklejohn, Alexander, ‘The First Amendment is an Absolute’ [1961] Supreme Court Review 245
Michael, James, ‘Privacy’ in Harris, David and Joseph, Sarah (eds.), The International Covenant on Civil and Political Rights and United Kingdom Law (Oxford: Clarendon Press, 1995)Google Scholar
Michelman, Frank, ‘Law's Republic’ (1988) 97 Yale Law Journal1493CrossRefGoogle Scholar
Mill, John Stuart, Autobiography (London: Oxford University Press, 1971)Google Scholar
Mill, John Stuart, Utilitarianism, On Liberty, Essay on Bentham, ed. and intro. Mary, Warnock (London: Collins, 1962)Google Scholar
Mintz, Jonathan B., ‘The Remains of Privacy's Disclosure Tort: An Exploration of the Private Domain’ (1996) 55 Maryland Law Review425Google Scholar
Moreham, N. A., ‘Recognising Privacy in England and New Zealand’ (2004) 63 Cambridge Law Journal555CrossRefGoogle Scholar
Morgan, Jonathan, ‘Privacy in the House of Lords – Again’ (2004) 120 Law Quarterly Review563Google Scholar
Morgan, Jonathan, ‘Privacy, Confidence, and Horizontal Effect: “Hello” Trouble’ (2003) 62 Cambridge Law Journal444CrossRefGoogle Scholar
Morgan, Richard G., ‘Roe v. Wade and the Lesson of the Pre-Roe Case Law’ (1979) 77 Michigan Law Review1724CrossRefGoogle Scholar
Morison, William, ‘Unfair Competition and Passing Off’ (1956) 2 Sydney Law Review50Google Scholar
Muller, Jerry, Adam Smith in His Time and Ours: Designing the Decent Society (Princeton: Princeton University Press, 1995)Google Scholar
Negroponte, Nicholas, Being Digital (New York: Knopf, 1995)Google Scholar
Netanel, Neil, ‘Alienability Restrictions and the Enhancement of Author Autonomy in United States and Continental Copyright Law’ (1994) 12 Cardozo Arts and Entertainment Law Journal1Google Scholar
New South Wales Law Reform Commission, Surveillance: An Interim Report, Report no. 98 (Sydney: NSWLRC, 2001)
New Zealand, Committee on Official Information, Towards Open Government: General Report (Wellington: Government Printer, 1980)
New Zealand, Committee on Official Information, Towards Open Government, Supplementary Report (Wellington: Government Printer, 1981)
New Zealand, Law Commission, Evidence Law: Witness Anonymity, NZLC R42 (Wellington: Law Commission, 1997)
New Zealand, Legislation Advisory Committee, Report No. 8. (Wellington: New Zealand Department of Justice, 1994)
New Zealand, Legislation Advisory Committee, Legislative Change: Guidelines on Process & Content (Wellington: New Zealand Department of Justice, 1991)
New Zealand, Minister of Justice, A Bill of Rights for New Zealand – A White Paper (1985) Appendices to the Journal of the House of Representatives, A 6
Niemann, Jan-Malte, ‘Monitoring Internet and Email Usage – Germany – Surfing into Unemployment? Private Internet Use and Emailing Under German Labour Law’ (2002) 18(2) Computer Law and Security Report114CrossRefGoogle Scholar
Nimmer, Melville B., ‘The Right to Speak From Times to Time: First Amendment Theory Applied to Libel and Misapplied to Privacy’ (1968) 56 California Law Review935CrossRefGoogle Scholar
Organisation for Economic Cooperation and Development (OECD), Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, (1981) 20 ILM 422, adopted 23 September 1980
Palmer, Geoffrey, ‘Privacy and the Law’ [1975] New Zealand Law Journal 747
Parent, W. A., ‘A New Definition of Privacy for the Law’ (1983) 2 Law and Philosophy305CrossRefGoogle Scholar
Paul, Ellen, Miller, Fred, and Paul, Jeffery (eds.), The Right to Privacy (Cambridge: Cambridge University Press, 2000)Google Scholar
Pennock, J. Roland and Chapman, John W. (eds.), Privacy (series: Nomos XIII; New York: Atherton Press, 1971)Google Scholar
Phillipson, Gavin, ‘Transforming Breach of Confidence? Towards a Common Law Right of Privacy under the Human Rights Act’ (2003) 66 Modern Law Review726CrossRefGoogle Scholar
Phillipson, Gavin, 'Judicial Reasoning in Breach of Confidence Cases under the Human Rights Act: Not Taking Privacy Seriously? [2003] European Human Rights Law Review (Privacy Special) 53Google Scholar
Phillipson, Gavin, ‘The Human Rights Act, “Horizontal Effect” and the Common Law: a Bang or a Whimper?’ (1999) 62 Modern Law Review824CrossRefGoogle Scholar
Phillipson, Gavin and Fenwick, Helen, ‘Breach of Confidence as a Privacy Remedy in the Human Rights Act Era’ (2000) 63 Modern Law Review660CrossRefGoogle Scholar
Posner, Richard A., Overcoming Law (Cambridge, Mass.: Harvard University Press, 1995)Google Scholar
Posner, Richard A., ‘Privacy, Secrecy, and Reputation’ (1979) 28 Buffalo Law Review 1Google Scholar
Posner, Richard A., ‘The Right to Privacy’ (1978) 12 Georgia Law Review293Google Scholar
Post, Robert C., ‘Meiklejohn's Mistake: Individual Autonomy and the Reform of Public Discourse’ (1993) 64 University of Colorado Law Review1109Google Scholar
Post, Robert C., ‘Rereading Warren and Brandeis: Privacy, Property, and Appropriation’ (1991) 41 Case Western Law Review647Google Scholar
Post, Robert C., ‘The Social Foundations of Privacy: Community and Self in the Common Law Tort’ (1989) 77 California Law Review957CrossRefGoogle Scholar
Poullet, Yves, ‘Making Data Subjects Aware of Their Rights and Capable of Protecting Themselves’, Conference on the Rights and Responsibilities of Data Subjects, Council of Europe, Prague, 14–15 October 2004 (being published)
Poullet, Yves and Dinant, J. Marc, Information Self-Determination in the Internet Era: Thoughts on Convention No. 108 for the Purposes of the Future Work of the Consultative Committee, 13 December 2004 (T-PD (2004) 04 final)
Pound, Reginald, Albert: A Biography of the Prince Consort (London: Michael Joseph, 1973)Google Scholar
Prescott, Peter, ‘Kaye v. Robertson – A Reply’ (1991) 54 Modern Law Review451CrossRefGoogle Scholar
Prosser, William L., ‘Privacy’ (1960) 48 California Law Review383CrossRefGoogle Scholar
Rachels, James, ‘Why Privacy is Important’ (1975) 4 Philosophy and Public Affairs323Google Scholar
Rasky, H. L., ‘Can an Employer search the Contents of his Employees’ E-mail?' (1998) 20 Advocates' Quarterly221Google Scholar
Raz, Joseph, ‘Free Expression and Personal Identification’ (1991) 11 Oxford Journal of Legal Studies303CrossRefGoogle Scholar
Reidenberg, Joel R., ‘Resolving Conflicting International Data Privacy Rules in Cyberspace’ (2000) 52 Stanford Law Review1315CrossRefGoogle Scholar
Reiman, Jeffrey H., ‘Privacy, Intimacy, and Personhood’ (1976) 6 Philosophy and Public Affairs26Google Scholar
Richardson, Megan, ‘Privacy and Precedent: The Court of Appeal's Decision in Hosking v. Runting’ (2005) 11 New Zealand Business Law Quarterly82Google Scholar
Richardson, Megan, ‘Whither Breach of Confidence: A Right of Privacy for Australia?’ (2002) 26 Melbourne University Law Review381Google Scholar
Robertson, Andrew (ed.), The Law of Obligations: Connections and Boundaries, (London: UCL Press, 2004)Google Scholar
Rodota, Stefano, ‘Beyond the EU Directive: Directions for the Future’ in Poullet, Yves, Terwangne, Cé cile and Turner, Paul (eds.), Privacy: New Risks and Opportunities, Cahier du CRID no. 13 (Antwerpen: Kluwer, 1997)Google Scholar
Rogers, Heather and Tomlinson, Hugh, ‘Privacy and Expression: Convention Rights and Interim Injunctions’ [2003] European Human Rights Law Review (Privacy Special) 37Google Scholar
Rorty, Richard, Philosphy and Social Hope (London: Penguin, 1999)Google Scholar
Rorty, Richard, Contingency, Irony, and Solidarity (Cambridge: Cambridge University Press, 1989)CrossRefGoogle Scholar
Rotenberg, Marc, ‘Fair Information Practices and the Architecture of Privacy (What Larry Doesn't Get)’ [2001] Stanford Technology Law Review 1
Rozenberg, Joshua, Privacy and the Press (revised edn, Oxford: Oxford University Press, 2005)CrossRefGoogle Scholar
Rubenfeld, Jed, ‘The Right of Privacy’ (1989) 102 Harvard Law Review737CrossRefGoogle Scholar
Sack, Robert D., Sack on Defamation: Libel, Slander, and Related Problems(3rd edn, New York City: Practising Law Institute, 1999)Google Scholar
Sanderson, M. A., ‘Is Von Hannover v. Germany a Step Backward for the Substantive Analysis of Speech and Privacy Interests?’ (2004) 6 European Human Rights Law Review631Google Scholar
Schauer, Frederick, ‘The Exceptional First Amendment’ in Ignatieff, Michael (ed.), American Exceptionalism and Human Rights (Princeton: Princeton University Press, 2005)Google Scholar
Schauer, Frederick, Free Speech: A Philosophical Enquiry (Cambridge: Cambridge University Press, 1982)Google Scholar
Schauer, Frederick, ‘Reflections on the Value of Truth’ (1991) 41 Case Western Reserve Law Review699Google Scholar
Schnably, Stephen J, ‘Beyond Griswold: Foucauldian and Republican Approaches to Privacy’ (1991) 23 Connecticut Law Review861Google Scholar
Schneider, Elizabeth, ‘The Violence of Privacy’ (1991) 23 Connecticut Law Review973Google Scholar
Schoeman, Ferdinand (ed.), Philosophical Dimensions of Privacy: An Anthology (Cambridge: Cambridge University Press, 1984)CrossRefGoogle Scholar
Schwartz, Paul M., ‘Beyond Lessig's Code for Internet Privacy: Cyberspace, Filters, Privacy Control and Fair Information Practices’ (2000) Wisconsin Law Review 749
Seipel, Peter, ‘Information System Quality as a Legal Concern’ in Gasser, Urs (ed.), Information Quality Regulation: Foundations, Perspectives, Applications (Baden-Baden: Nomos, 2004)Google Scholar
Seipel, Peter(ed.), Law and Information Technology: Swedish Views, Swedish Government Official Reports, SOU 2002: 112Google Scholar
Sheppard, Annamay T., ‘Thoughts on Bowers v. Hardwick’ (1988) 40 Rutgers Law Journal521Google Scholar
Sherborne, David and Jethani, Sapna, ‘The Privacy Codes’ in Tugendhat, Michael and Christie, Iain (eds.), The Law of Privacy and the Media (Oxford: Oxford University Press, 2002) and First Cumulative Updating Supplement (2004)Google Scholar
Sherman, Brad and Bently, Lionel, The Making of Modern Intellectual Property Law (Cambridge: Cambridge University Press, 1999)Google Scholar
Sherman, Brad and Strowel, Alain, Of Authors and Origins (Oxford: Clarendon Press, 1994)Google Scholar
James, Skone Francis E., Copinger on the Law of Copyright (6th edn, London: Sweet & Maxwell, 1927)Google Scholar
Smith, Joseph H. and Kerrigan, William (eds.), Pragmatism's Freud (Baltimore: Johns Hopkins University Press, 1986)Google Scholar
Smolla, Rodney A., Smolla & Nimmer on Freedom of Speech (3rd edn, New York: Clark Boardman Callaghan, 1996–2005)Google Scholar
Smolla, Rodney A., ‘Accounting for the Slow Growth of American Privacy Law’ (2002) 27 Nova Law Review289Google Scholar
Smolla, Rodney A., ‘Information as Contraband: The First Amendment and Liability for Trafficking in Speech’ (2002) 96 Northwestern University Law Review1099Google Scholar
Tang, Raymond, ‘Personal Data Privacy: The Asian Agenda’, paper at 25th International Conference of Data Protection and Privacy Commissioners, Sydney, 10–12 September 2003, available from http://www.pco.org.hk
Taylor, Charles, The Ethics of Authenticity (Cambridge, Mass.: Harvard University Press, 1992)Google Scholar
Terwangne, Cé cile, ‘Affaire Lindqvist ou quand la Cour de justice des Communautés européennes prend position en matière de protection des données personnelles’ (2004) 19 Revue du Droit des Technologies de l'Information67Google Scholar
Thomas, Kendall, ‘Beyond the Privacy Principle’ (1992) 92 Columbia Law Review1431CrossRefGoogle Scholar
Thompson, John B., Political Scandal: Power and Visibility in the Media Age (Cambridge: Polity Press, 2000)Google Scholar
Tugendhat, Michael and Christie, Iain (eds.), The Law of Privacy and the Media (Oxford: Oxford University Press, 2002) and First Cumulative Updating Supplement (2004)Google Scholar
Tullock, Gordon, The Economics of Special Privilege and Rent Seeking (Dordrecht: Kluwer, 1989)CrossRefGoogle Scholar
Tully, James (ed.), Philosophy in an Age of Pluralism (Cambridge: Cambridge University Press, 1994)CrossRefGoogle Scholar
Turkington, Richard, ‘Confidentiality Policy for HIV-Related Information: An Analytic Framework for Sorting Out Hard and Easy Cases’ (1989) 34 Villanova Law Review871Google Scholar
Turner, Graeme, Ending the Affair: The Decline of Television Current Affairs in Australia (Sydney: University of NSW Press, 2005)Google Scholar
Turner, Graeme, Understanding Celebrity (London: Sage, 2004)CrossRefGoogle Scholar
Turner, Graeme, Bonner, Frances and Marshall, P. David, Fame Games: The Production of Celebrity in Australia (Melbourne: Cambridge University Press, 2000)Google Scholar
United Kingdom, Committee on Homosexual Offences and Prostitution, Report of the Committee on Homosexual Offences and Prostitution (London: HMSO, 1957)
United Kingdom, Home Office, Report of the Committee on Privacy and Related Matters, Cm 1102 (London: HMSO, 1990)
United Kingdom, House of Commons, Culture, Media and Sport Committee, Privacy and Media Intrusion, Fifth Report of Session 2002–03, HC 458-I
United Kingdom, Ofcom, Ofcom Review of Public Service Television Broadcasting: Phase 2 – Meeting the Digital Challenge (London: Ofcom, 2004)
United Nations, Human Rights Committee, Concluding Observations of the Human Rights Committee: New Zealand, CPR/CO/75/NZL, 26 July 2003
United Nations, Human Rights Committee, Concluding Observations of the Human Rights Committee: United Kingdom of Great Britain and Northern Ireland, CCPR/CO/73/UK, CCPR/CO/73/UKOT, 6 December 2001
United States, Committee on Intellectual Property Rights and the Emerging Information Infrastructure, The Digital Dilemma (Washington, DC: National Academy Press, 2000)
United States, Congressional Budget Office, Copyright Issues in Digital Media (Washington, DC: CBO, August 2004)
United States, Federal Trade Commission, Prepared Statement of the Federal Trade Commission on ‘Privacy Online: Fair Information Practices in the Electronic Marketplace’ (May 2000)
United States, Information Infrastructure Task Force, Intellectual Property and the National Information Infrastructure: The Report of the Working Group on Intellectual Property Rights Information Infrastructure Task Force (Washington, DC: United States Department of Congress, 1995)
Wassenhove, Stanislas, Leersnyder, Michael and Chuffart, Gael, Nouvelles technologies et impact sur le droit du travail (Kortrijk-Heule: UGA, 2003)Google Scholar
Wacks, Raymond, Law, Morality, and the Private Domain (Hong Kong: Hong Kong University Press, 2000)Google Scholar
Wacks, Raymond, ‘What has Data Protection to do with Privacy?’ (2000) 6 Privacy Law & Policy Reporter143Google Scholar
Wacks, Raymond, ‘Towards a New Legal and Conceptual Framework for the Protection of Internet Privacy’ (1999) 3 Irish Intellectual Property Review1Google Scholar
Wacks, Raymond, ‘Privacy and Press Freedom: Oil on Troubled Waters’ (1999) 4 Media & Arts Law Review259Google Scholar
Wacks, Raymond, ‘Privacy and Media Intrusion: A New Twist’ (1999) 6 Privacy Law & Policy Reporter48Google Scholar
Wacks, Raymond, ‘Media Intrusion: An Expanded Role for the Privacy Commissioner?’ (1999) 29 Hong Kong Law Journal341Google Scholar
Wacks, Raymond, ‘Pursuing Paparazzi: Privacy and Intrusive Photography’ (1998) 1 Hong Kong Law Journal1Google Scholar
Wacks, Raymond, Privacy and Press Freedom (Oxford: Oxford University Press, 1995)Google Scholar
Wacks, Raymond, Personal Information: Privacy and the Law (Oxford: Clarendon Press, 1993)Google Scholar
Wacks, Raymond, (ed.), Privacy: Volume I (Aldershot: Dartmouth; New York: New York University Press, 1993)Google Scholar
Wacks, Raymond, ‘Controlling AIDS: Some Legal Issues’ (1988) 138 New Law Journal254 and 283.Google Scholar
Wacks, Raymond, The Protection of Privacy (London: Sweet & Maxwell, 1980)Google Scholar
Wacks, Raymond, ‘The Poverty of “Privacy”’ (1980) 96 Law Quarterly Review73Google Scholar
Wade, H. W. R., ‘Horizons of Horizontality’ (2000) 116 Law Quarterly Review217Google Scholar
Wallace, Amy, The Prodigy (New York: E. P. Dutton, 1986)Google Scholar
Warren, Samuel D. and Brandeis, Louis D., ‘The Right to Privacy’ (1890) 4 Harvard Law Review193CrossRefGoogle Scholar
Waters, Nigel, ‘Rethinking Information Privacy – A Third Way in Data Protection?’ (2000) 6 Privacy Law & Policy Reporter121Google Scholar
Weaver, Russell L., Kenyon, Andrew T., Partlett, David F. and Walker, Clive P., The Right to Speak Ill: Defamation, Reputation and Free Speech (Durham, NC: Carolina Academic Press, 2006)Google Scholar
Wellek, Rene (ed.), The Attack on Literature and Other Essays (Chapel Hill: University of North Carolina Press, 1982)Google Scholar
Wermiel, Stephen J., ‘Law and Human Dignity: The Judicial Soul of Justice Brennan’ (1998) 7 William and Mary Bill of Rights Journal223Google Scholar
Westin, Alan, Privacy and Freedom (London: Bodley Head, 1967)Google Scholar
White, Antony, ‘Data Protection and the Media’ [2003] European Human Rights Law Review (Privacy Special) 25; volume also published as Jonathan, Cooper (ed.) Privacy (London: Sweet and Maxwell, 2003)Google Scholar
White, Stephen K., Sustaining Affirmation: The Strengths of Weak Ontology in Political Theory (Princeton: Princeton University Press, 2000)Google Scholar
Whitman, James Q., ‘The Two Western Cultures of Privacy: Dignity versus Liberty’ (2004) 113 Yale Law Journal1151CrossRefGoogle Scholar
Wilson, A. N., The Victorians (London: Arrow Books, 2003)Google Scholar
Woodmansee, Martha and Jaszi, Peter, The Construction of Authorship: Textual Appropriation in Law and Literature (Durham: Duke University Press, 1994)Google Scholar
Young, John B. (ed.), Privacy (New York: Wiley, 1978)Google Scholar
Zammit, Brigitte, ‘Traffic Data Retention under EC Law’ (2005) 11(1) Computer and Telecommunications Law Review17Google Scholar
Zimmerman, Diane L., ‘Requiem for a Heavyweight: a Farewell to Warren and Brandeis's Privacy Tort’ (1983) 68 Cornell Law Review291Google Scholar
Aikman, Colin C., ‘Recent Constitutional Changes in the South-West Pacific’ in 1968 New Zealand Official Yearbook (Wellington: Government Printer, 1968)Google Scholar
Alderman, Ellen and Kennedy, Caroline, The Right to Privacy (New York: Alfred A. Knopf, 1995)Google Scholar
Allen, Anita L. and Mack, Erin, ‘How Privacy Got Its Gender’ (1990) 10 Northern Illinois University Law Review441Google Scholar
Ames, Winslow, Prince Albert and Victorian Taste (London: Chapman & Hall, 1968)Google Scholar
Amestoy, Jeffrey L., ‘Uncommon Humanity: Reflections on Judging in a Post-Human Era’ (2003) 78 New York University Law Review1581Google Scholar
Anderson, David A., ‘The Failure of American Privacy Law’ in Basil, S. Markesinis (ed.), Protecting Privacy (Oxford: Oxford University Press, 1999)Google Scholar
Article 29 Working Party, Working Document on Data Protection Issues related to RFID Technology, 10107/05/EN, WP 105, 19 January 2005
Article 29 Working Party, Working Document on Data Protection Issues related to Intellectual Property Rights, WP 104, 18 January 2005
Article 29 Working Party, Working Document on Transfers of Personal Data to Third Countries: Applying Article 26 (2) of the EU Data Protection Directive to Binding Corporate Rules for International Data Transfers, MARKT/11639/02/EN, WP 74, 3 June 2003
Article 29 Working Party, Opinion 2/2002 on the use of Unique Identifiers in Telecommunication Terminal Equipments: The Example of Ipv6, 10750/02/EN/final, WP 58, 30 May 2002
Article 29 Working Party, Working Document on Determining the International Application of EU Data Protection Law to Personal Data Processing on the Internet by non-EU Based Websites, 5035/01/EN/Final, WP 56, 30 May 2002
Article 29 Working Party, Opinion 3/2001 on the Level of Protection of the Australian Privacy Amendment (Private Sector) Act 2000, 5095/00/EN, WP 40, 26 January 2001
Article 29 Working Party, Recommendation 1/99 on Invisible and Automatic Processing of Personal Data on the Internet Performed by Software and Hardware, DG MARKT 5093/98, WP 17, 23 February 1999
Article 29 Working Party, Opinion 1/98 Platform for Privacy Preferences (P3P) and the Open Profiling Standard (OPS), XV D/5032/98, WP 11, 16 June 1998
Article 29 Working Party, Recommendation 3/97: Anonymity on the Internet, DG MARKT D/5022/97, WP 6, 3 December 1997
Asia-Pacific Economic Cooperation, Report of the APEC Electronic Commerce Steering Group 11th Meeting, 2005/SOM I, 24–25 February 2005
Asia-Pacific Economic Cooperation, APEC Ministers Endorse the APEC Privacy Framework, Media Release, Santiago, Chile, 20 November 2004, available from http://www.apec.org/apec/news_media/2004_media_releases.html
Asia-Pacific Privacy Charter Council, Submission to the APEC Electronic Commerce Steering Group Privacy Sub-Group (31 May 2004), available at http://www.bakercyberlawcentre.org/appcc/APEC_APPCCsub.htm
Australia, Copyright Convergence Group, Highways to Change – Copyright in the New Communications Environment (Canberra: AGPS, 1994)
Australia, Department of Communications, Information Technology and the Arts, A Guide to Digital Rights Management (Canberra: DCITA, 2002)
Australia, House of Representatives Standing Committee on Legal and Constitutional Affairs, Inquiry into Technological Protection Measures (TPM) Exceptions (Canberra: House of Representatives, 1 March 2006)
Australia, Office of the Privacy Commissioner, Getting in on the Act: The Review of the Private Sector Provisions of the Privacy Act 1988 (March 2005)
Australia, Senate Legal and Constitutional References Committee, The Real Big Brother: Inquiry into the Privacy Act 1988 (Canberra: Senate Printing Unit, June 2005)
Australian Law Reform Commission, Privacy, Report No. 22 (Canberra: AGPS, 1983)
Australian Privacy Foundation, Submission to Senate Legal and Constitutional Inquiry into Privacy Act 1988 (March 2005)
Barendt, Eric, Freedom of Speech (2nd edn, Oxford: Oxford University Press, 2005)Google Scholar
Barendt, Eric, ‘Privacy and the Press’ in Barendt, Eric M. (ed.), Yearbook of Media and Entertainment Law 1995 (Oxford: Clarendon Press, 1995)Google Scholar
Becker, Eberhard, Buhse, Willms, Günnewig, Dirk and Rump, Niels (eds.), Digital Rights Management: Technological, Economic, Legal and Political Aspects (Lecture Notes in Computer Science Vol. 2770) (Berlin: Springer, 2003)CrossRefGoogle Scholar
Belgian Privacy Commission, Opinion on the Protection of the Privacy of Minors on the Internet, Avis no. 38/2002, 16 September 2002
Bennett, Colin J. and Raab, Charles D., The Governance of Privacy: Policy Instruments in Global Perspective (London: Ashgate, 2003)Google Scholar
Bernstein, Gaia, ‘Information Technologies and Identity’ [2005] 1 Computer Law Review International (formerly Computer und Recht International)1Google Scholar
Blasi, Vincent, ‘Learned Hand and the Self-Government Theory of the First Amendment: Masses Publishing Co. v. Patten’ (1990) 61 University of Colorado Law Review1Google Scholar
Bloustein, Edward J., ‘Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser’ (1964) 39 New York University Law Review962Google Scholar
Bok, Sissela, Secrets: On the Ethics of Concealment and Revelation (New York: Pantheon Books, 1982)Google Scholar
Boulanger, Marie-Hélène and de Terwangne, Cécile, ‘Internet et le respect de la vie privée’ in Montero, Etienne (ed.), L'internet face au droit, Cahier du CRID no. 12 (Namur: Story-Scientia, 1997)Google Scholar
Bowrey, Kathy, Law and Internet Cultures (Cambridge: Cambridge University Press, 2005)Google Scholar
Boyce, George, Curran, James and Wingate, Pauline (eds.), Newspaper History from the Seventeenth Century to the Present Day (London: Constable, 1978)Google Scholar
Braithwaite, John and Drahos, Peter, Global Business Regulation (Cambridge: Cambridge University Press, 2000)Google Scholar
Brennan, William J. Jr, ‘Reason, Passion, and “The Progress of the Law”’ (1988) 10 Cardozo Law Review3Google Scholar
Brennan, William J. JrThe Constitution of the United States: Contemporary Ratification’ (1985) 27 South Texas Law Review433Google Scholar
Brennan, William J. JrThe Supreme Court and the Meiklejohn Interpretation of the First Amendment’ (1965) 79 Harvard Law Review1CrossRefGoogle Scholar
Burrows, John and Cheer, Ursula, Media Law in New Zealand (5th edn, South Melbourne: Oxford University Press, 2005)Google Scholar
Campbell, Emily, ‘Mandatory AIDS Testing and Privacy: A Psycholegal Perspective’ (1990) 66 North Dakota Law Review449Google ScholarPubMed
Cardozo, Benjamin N., The Nature of the Judicial Process (New Haven: Yale University Press, 1921)Google Scholar
Carter, David and Palmer, Mathew (eds.), Roles and Perspectives in the Law: Essays in Honour of Sir Ivor Richardson (Wellington: Victoria University Press, 2002)Google Scholar
Catlett, Jason, Open Letter 9/13 to P3P Developers, 13 September 1999, available at http://www.junkbusters.com/standards.html
Clarke, Roger, ‘Beyond the OECD Guidelines: Privacy Protection for the 21st Century’ (2000), available at http://www.anu.edu.au/people/Roger.Clarke/DV/PP21C.html
Clarke, Roger, ‘The Digital Persona and its Application to Data Surveillance’ (1994) 10 (2) The Information Society, available at http://www.anu.edu.au/people/Roger.Clarke/DV/DigPersona.htmlCrossRefGoogle Scholar
Cohen, Julie E., ‘Examined Lives: Informational Privacy and the Subject as Object’ (2000) 52 Stanford Law Review 1373CrossRefGoogle Scholar
Cohen, Julie E., ‘DRM and Privacy’ (2003) 18 Berkeley Technology Law Journal 575Google Scholar
Cohen, Julie E., ‘Normal Discipline in the Age of Crisis’ (Draft, 4 August 2004), see http://www.ssrn.com
Cohen-Almagor, Raphael, Speech, Media and Ethics: The Limits of Free Expression (Basingstoke, UK: Palgrave, 2001)CrossRefGoogle Scholar
Coleman, Jules and Shapiro, Scott (eds.), The Oxford Handbook of Jurisprudence & Philosophy of Law (Oxford: Oxford University Press, 2002)Google Scholar
Colvin, Madeleine (ed.), Developing Key Privacy Rights (Oxford: Hart, 2002)Google Scholar
Council of Europe, Draft Framework Decision on the Retention of Data Processed and Stored in Connection with the Provision of Publicly Available Electronic Communications Services or Data on Public Communications Networks for the Purpose of Prevention, Investigation, Detection and Prosecution of Crime and Criminal Offences including Terrorism, 8958/04, CRIMORG 36, TELECOM 82, 28 April 2004
Council of Europe, Committee of Ministers, Guidelines for the Protection of Individuals with regard to the Collection and Processing of Personal Data on Information Highways, Recommendation no. R (99) 5, 23 February 1999
Damich, Edward J., ‘The Right of Personality: A Common-Law Basis for the Protection of the Moral Rights of Authors’ (1988) 23 Georgia Law Review1Google Scholar
DeCew, , Wagner, Judith, In Pursuit of Privacy (Ithaca, New York: Cornell University Press, 1997)Google Scholar
Delbar, Catherine, Mormont, Marinette and Schots, Marie, (European Industrial Relations Observatory Online), Comparative Report on New Technology and Respect for Privacy at the Workplace, TN0307101S, 12 August 2003
Dent, Chris and Kenyon, Andrew T., ‘Defamation Law's Chilling Effect: A Comparative Content Analysis of Australian and US Newspapers’ (2004) 9 Media & Arts Law Review89Google Scholar
Dewey, John, Democracy and Education (New York: Macmillan, 1961)Google Scholar
Dhont, Jan and Perez-Asinari, María Verónica, ‘New Physics and the Law: A Comparative Approach to the EU and US Privacy and Data Protection Requirement – Looking for “Adequate Protection”’ in Mensbrugghe, F. (ed.), L'utilisation de la méthode comparative en droit européen–Usage of Comparative Methodology in European Law (Belgium: Presses Universitaires de Namur, 2003)Google Scholar
Dhont, Jan, Pérez-Asinari, , María Verónica, and Poullet, Yves (with the assistance of Reidenberg, Joel R. and Bygrave, Lee A.), Safe Harbour Implementation Study (Namur: CRID, 2004)Google Scholar
Dinant, J. Marc, ‘Law and Technology Convergence in the Data Protection Field’ in Walden, Ian and Hörnle, Julia (eds.), E-Commerce Law and Practice in Europe (Cambridge: Woodhead, 2002)Google Scholar
Dinant, J. MarcLe visiteur visité – Quand les éditeurs de logiciel internet passent subrepticement à travers les mailles du filet juridique’ (Winter 2001) 6:2Lex Electronica, available from http://www.lex-electronica.orgGoogle Scholar
Dobbs, Dan B., The Law of Torts (St Paul, Minn.: West, 2000)Google Scholar
Dworkin, Ronald, A Matter of Principle (Cambridge, Mass.: Harvard University Press, 1985)Google Scholar
Dyer, Richard, Heavenly Bodies: Film Stars and Society (London: MacMillan, 1987)Google Scholar
Eberle, Edward J., ‘Human Dignity, Privacy, and Personality in German and American Constitutional Law’ [1997] Utah Law Review 963Google Scholar
Ely, John Hart, Democracy and Distrust: A Theory of Judicial Review (Cambridge, Mass.: Harvard University Press, 1980)Google Scholar
Ely, John Hart, ‘The Wages of Crying Wolf: A Comment on Roe v. Wade’ (1973) 82 Yale Law Journal 920
Emerson, Thomas I., ‘The Right of Privacy and Freedom of the Press’ (1979) 14 Harvard Civil Rights–Civil Liberties Law Review329Google Scholar
Emerson, Thomas I.Toward a General Theory of the First Amendment’ (1963) 72 Yale Law Journal877CrossRefGoogle Scholar
European Commission, Seventh Report on the Situation regarding the Protection of Individuals with regard to the Processing of Personal Data and Privacy in the European Union and in Third Countries (Luxembourg: Office for Official Publications of the European Communities, 2004)
European Commission, Communication from the Commission to the European Parliament, The Council, The European Economic and Social Committee and the Committee of the Regions on Unsolicited Commercial Communications or ‘Spam’, COM(2004) 28, 22 January 2004
European Commission, Second Stage Consultation of Social Partners on the Protection of Workers' Personal Data (30 October 2002)
European Commission, Digital Rights: Background, Systems, Assessment, Commission Staff Working Paper, SEC(2002) 197, 14 February 2002
European Commission, Copyright and Related Rights in the Information Society: Green Paper from the European Commission to the European Council, COM/95/0382 final, 19 July 1995
European Parliament, Report on the Existence of a Global System for the Interception of Private and Commercial Communications (ECHELON interception system), 2001/2098(INI)
Faulks, Sebastian, The Fatal Englishman (London: Random House, 1996)Google Scholar
Feldman, David, Civil Liberties and Human Rights in England and Wales (2nd edn, Oxford: Oxford University Press, 2002)Google Scholar
Ficsor, Mihaly, The Law of Copyright and the Internet: The 1996 WIPO Copyright Treaties, their Interpretation and Implementation (Oxford: Oxford University Press, 2002)Google Scholar
Fineman, Martha A., ‘Intimacy Outside of the Natural Family’ (1991) 23 Connecticut Law Review955Google Scholar
Fish, Stanley, There's No Such Thing as Free Speech (Oxford: Oxford University Press, 1994)Google Scholar
Flew, Terry, New Media: An Introduction (2nd edn, South Melbourne: Oxford University Press, 2005)Google Scholar
Ford, Peter, ‘Implementing the Data Protection Directive – An Outside Perspective’ (2003) 9 Privacy Law & Policy Reporter141Google Scholar
Foucault, Michel, Discipline and Punish: The Birth of the Prison, transl. Sheridan, Alan (Harmondsworth: Penguin, 1979)Google Scholar
Frame, Alex, ‘Lawyers and the Making of Constitutions: Making Constitutions in the South Pacific’ in Carter, David and Palmer, Mathew (eds.), Roles and Perspectives in the Law: Essays in Honour of Sir Ivor Richardson (Wellington: Victoria University Press, 2002)Google Scholar
Franzen, Jonathan, How to be Alone (London: Harper Collins, 2002)Google Scholar
Freund, Paul A., On Law and Justice (Cambridge, Mass.: Belknap Press of Harvard University Press, 1968)CrossRefGoogle Scholar
Friedman, David D., Landes, William M. and Posner, Richard A., ‘Some Economics of Trade Secret Law’ (1991) 5 Journal of Economic Perspectives61CrossRefGoogle Scholar
Frye, Northrop, Anatomy of Criticism (Princeton: Princeton University Press, 1957)Google Scholar
Gavison, Ruth, ‘Too Early for a Requiem: Warren and Brandeis were Right on Privacy vs Free Speech’ (1992) 43 South Carolina Law Review437Google Scholar
Geller, Paul Edward, ‘Toward an Overriding Norm in Copyright: Sign Wealth’ (1994) 159 Revue Internationale du Droit d'Auteur (RIDA)3Google Scholar
Georges, Marie, ‘Relevons les défis de la protection des données à caractère personnel: l'Internet et la CNIL’ in Lemoire, P. (ed.), Commerce électronique- Marketing et vie privée (Paris: LaSer, 1999)Google Scholar
Ginsburg, Jane C., ‘How Copyright Got a Bad Name for Itself’ (2002) 26 Columbia Journal of Law and the Arts61Google Scholar
Ginsburg, Jane C., 'Copyright or ‘Infograb’: Comment on General Report on Limitations Found Outside Copyright’ in Baulch, Libby, Green, Michael and Wybum, Mary (eds.), The Boundaries of Copyright, its Proper Limitations and Exceptions, (Sydney: ALAI Study Days, Australian Copyright Council, 1999)Google Scholar
Ginsburg, Jane C. and Besek, June M. (eds.), Adjuncts and Alternatives to Copyright, Proceedings of the ALAI Congress, Columbia University, New York (2002)Google Scholar
Goldstein, Paul, Copyright's Highway (revised edn, Stanford: Stanford University Press, 2003)Google Scholar
Gould, John, Birds of Australia (Part XXVI, London: John Gould, 1847)Google Scholar
Greenleaf, Graham, ‘APEC's Privacy Framework: A New Low Standard’ (2005) 11 (5) Privacy Law & Policy Reporter 121
Greenleaf, GrahamAPEC's Privacy Standard Regaining Strength’ (2004) 10 (8) Privacy Law & Policy Reporter158Google Scholar
Greenleaf, GrahamAPEC Privacy Principles: More Lite with Every Version’ (2003) 10 (6) Privacy Law & Policy Reporter105Google Scholar
Greenleaf, GrahamAPEC Privacy Principles Version 2 – Not Quite so Lite, and NZ wants OECD Full Strength’ (2003) 10 (3) Privacy Law & Policy Reporter45Google Scholar
Greenleaf, GrahamAustralia's APEC Privacy Initiative: The Pros and Cons of “OECD Lite”’ (2003) 10 (1) Privacy Law & Policy Reporter1Google Scholar
Greenleaf, GrahamSafe Harbor's Low Benchmark for “Adequacy”: EU Sells Out Privacy for US$’ (2000) 7 Privacy Law & Policy Reporter45Google Scholar
Greenleaf, GrahamPrivate Sector Bill Amendments Ignore EU Problems’ (2000) 7 Privacy Law & Policy Reporter41Google Scholar
Greenleaf, Graham, ‘Global Protection of Privacy in Cyberspace – Implications for the Asia-Pacific’, paper at ‘Towards an Asia-Pacific Information Privacy Convention?’, 1998 Internet Law Symposium, Science & Technology Law Center, Taipei, Taiwan, 23–24 June 1998, available at http://austlii.edu.au/itlaw/articles/TaiwanSTLC.html
Greenleaf, Graham, ‘Stopping Surveillance: Beyond “Efficiency” and the OECD’ (1996) 3 Privacy Law & Policy Reporter148Google Scholar
Greenleaf, Graham, ‘Towards an Asia-Pacific Information Privacy Convention’ (1995) 2 Privacy Law & Policy Reporter127Google Scholar
Grijpink, Jan and Prins, Corien, ‘Digital Anonymity on the Internet: New Rules for Anonymous Electronic Transactions?’ (2001) 17 Computer Law and Security Report379CrossRefGoogle Scholar
Halpern, Sheldon W., ‘The “Inviolate Personality” – Warren and Brandeis After One Hundred Years’ (1990) 10 Northern Illinois University Law Review387Google Scholar
Hamelink, Cees J., The Ethics of Cyberspace (London, Sage: 2000)Google Scholar
Harris, David and Joseph, Sarah (eds.), The International Covenant on Civil and Political Rights and United Kingdom Law (Oxford: Clarendon Press, 1995)Google Scholar
Hill, John L., ‘A Third Theory of Liberty: The Evolution of Our Conception of Freedom in American Constitutional Thought’ (2000) 29 Hastings Constitutional Law Quarterly115Google Scholar
Hong Kong, Law Reform Commission of Hong Kong, Civil Liability for Invasion of Privacy (Hong Kong: The Commission, December 2004)
Huff, Thomas, ‘Thinking Clearly about Privacy’ (1980) 55 Washington Law Review777Google Scholar
Hugenholtz, Bernt (ed.), The Future of Copyright in a Digital Environment: Proceedings of the Royal Academy Colloquium (The Hague: Kluwer Law International, 1996)Google Scholar
Hughes, Aneurin, ‘A Question of Adequacy? The European Union's Approach to Assessing the Privacy Amendment (Private Sector) Act 2000 (Cth)’ (2001) 24 University of New South Wales Law Journal270Google Scholar
Hughes, G. Bernard, Victorian Pottery and Porcelain (London: Country Life, 1959)Google Scholar
Kahn, Jonathan, ‘Privacy as a Legal Principle of Identity Maintenance’ (2003) 33 Seton Hall Law Review371Google Scholar
Kalven, Harry, Jr., ‘The New York Times Case: A Note on “The Central Meaning of the First Amendment”’ 1964 Supreme Court Review 191Google Scholar
Kant, Immanuel, The Moral Law: Kant's Groundwork of the Metaphysic of Morals, translated and analysed by Paton, H. J. (London: Hutchinson University Library, 1948)Google Scholar
Katyal, Sonia K., ‘The New Surveillance’ (2003) 54 Case Western Reserve Law Review297Google Scholar
Keeton, W. Page (ed.), Prosser and Keeton on Torts (5th edn, St Paul, Minn.: West, 1984)Google Scholar
Keith, Kenneth, ‘A Bill of Rights: Does It Matter?’ (1997) 32 Texas International Law Journal393Google Scholar
Keith, Kenneth, ‘Democracy and a Bill of Rights for New Zealand? Judicial Review versus Democracy?’ (1985) 11 New Zealand Universities Law Review307Google Scholar
Keith, Kenneth (ed.), Essays on Human Rights (Wellington: Sweet & Maxwell, 1968)Google Scholar
Kenyon, Andrew T., Defamation: Comparative Law and Practice (London: UCL Press, 2006)Google Scholar
Kerr, Ian R., ‘If Left to Their Own Devices… How DRM and Anti-Circumvention Laws Can Be Used to Hack Privacy’ in Geist, Michael (ed.), In the Public Interest: The Future of Canadian Copyright Law (Ottawa: Irwin Law, 2005) pp. 167–210
Keuleers, Ewout and Dinant, J. Marc, ‘Data Protection: Multi-Application Smart Cards: The use of Global Unique Identifiers for Cross-Profiling Purposes – Part II: Towards a Privacy Enhancing Smart Card Engineering’ (2004) 20 (1) Computer Law and Security Report22Google Scholar
Kirby, Michael, ‘Privacy Protection, A New Beginning: OECD Principles 20 Years On’ (1999) 6 Privacy Law & Policy Reporter25Google Scholar
Koelman, Kamiel J., ‘Copyright Law and Economics in the EU Copyright Directive: Is the Droit d'Auteur Passé?’ (2004) 35 (6) International Review of Intellectual Property and Competition Law603Google Scholar
Lacey, Nicola, A Life of H. L. A. Hart: The Nightmare and the Noble Dream (Oxford: Oxford University Press, 2004)Google Scholar
Landes, William M. and Posner, Richard A., The Economic Structure of Intellectual Property Law (Cambridge, Mass.: Harvard University Press, 2003)Google Scholar
Larkin, Philip, Collected Poems (with introduction by A. Thwaite) (London: Marvell/Faber and Faber, 1988)Google Scholar
Leadbeater, Charles, Up the Down EscalatorWhy the Global Pessimists are Wrong (London: Penguin, 2003)Google Scholar
Léonard, Thierry, ‘E-commerce et protection des données à caractère personnel: quelques considérations sur la licéité des pratiques nouvelles de marketing sur internet’, February 2000, available at http://www.droit.fundp.ac.be/Textes/Leonard1.pdf
Lewis, Anthony, ‘Privacy and Civilization’ (2002) 27 Nova Law Review225Google Scholar
Lewis, Anthony, Make No Law: The Sullivan Case and the First Amendment (New York: Random House, 1991)Google Scholar
Lichtenberg, Judith, (ed.), Democracy and the Mass Media (Cambridge: Cambridge University Press, 1990)CrossRefGoogle Scholar
Lindsay, David, ‘An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law’ (2005) Melbourne University Law Review179
Lindsay, David, ‘Naomi Campbell in the House of Lords: Implications for Australia’ (2004) 11(1) Privacy Law & Policy Reporter4Google Scholar
Logeais, Elisabeth and Schroeder, Jean- Baptiste, ‘The French Right of Image: An Ambiguous Concept Protecting the Human Persona’ (1998) 18 Loyola of Los Angeles Entertainment Law Journal511Google Scholar
Louveaux, Sophie and Perez-Asinari, Maria Veronica, ‘New European Directive 2002/58 on the Processing of Personal Data and the Protection of Privacy in the Electronic Communication Sector – Some Initial Remarks’ (2003) 6(5) Computer and Telecommunications Law Review133Google Scholar
Lumby, Catherine, Gotcha: Life in a Tabloid World (St Leonards, NSW: Allen & Unwin, 1999)Google Scholar
Lumby, Catherine and Probyn, Elspeth (eds.), Remote Control: New Media, New Ethics (Cambridge: Cambridge University Press, 2003)CrossRefGoogle Scholar
Lyon, David, Surveillance Society: Monitoring Everyday Life (Philadelphia: Open University, 2001)Google Scholar
Lyon, David, ‘Everyday Surveillance: Personal Data and Social Classification’ (2002) 5(2) Information, Communication & Society242CrossRefGoogle Scholar
McKee, Alan, The Public Sphere: An Introduction (Cambridge: Cambridge University Press, 2005)Google Scholar
MacKinnon, Catharine, Towards a Feminist Theory of the State (Cambridge, Mass.: Harvard University Press, 1989)Google Scholar
Markesinis, Basil. S. (ed.), Protecting Privacy (Oxford: Oxford University Press, 1999)Google Scholar
Markesinis, Basil. S., ‘Our Patchy Law of Privacy – Time to Do Something About it’ (1990) 53 Modern Law Review802CrossRefGoogle Scholar
Markesinis, Basil. S., ‘The Calcutt Report Must Not Be Forgotten’ (1992) 55 Modern Law Review118CrossRefGoogle Scholar
Markesinis, Basil S., Cinneide, O' Colm, Fedtke, Joerg and Hunter-Henin, Myriam, ‘Concerns and Ideas about the Developing English Law of Privacy (and how Knowledge of Foreign Law Might Be of Help)’ (2004) 52 American Journal of Comparative Law133CrossRefGoogle Scholar
Markesinis, Basil S. and Unberath, Hannes, The German Law of Torts: A Comparative Treatise (4th edn, Oxford: Hart, 2002)Google Scholar
May, Christopher, The Information Society: A Sceptical View (Cambridge: Polity, 2002)Google Scholar
Mayer-Schönberger, Viktor, ‘The Internet and Privacy Legislation: Cookies for a Treat?’ (1997) 1 West Virginia Journal of Law and Technology 1.1Google Scholar
Meiklejohn, Alexander, ‘The First Amendment is an Absolute’ [1961] Supreme Court Review 245
Michael, James, ‘Privacy’ in Harris, David and Joseph, Sarah (eds.), The International Covenant on Civil and Political Rights and United Kingdom Law (Oxford: Clarendon Press, 1995)Google Scholar
Michelman, Frank, ‘Law's Republic’ (1988) 97 Yale Law Journal1493CrossRefGoogle Scholar
Mill, John Stuart, Autobiography (London: Oxford University Press, 1971)Google Scholar
Mill, John Stuart, Utilitarianism, On Liberty, Essay on Bentham, ed. and intro. Mary, Warnock (London: Collins, 1962)Google Scholar
Mintz, Jonathan B., ‘The Remains of Privacy's Disclosure Tort: An Exploration of the Private Domain’ (1996) 55 Maryland Law Review425Google Scholar
Moreham, N. A., ‘Recognising Privacy in England and New Zealand’ (2004) 63 Cambridge Law Journal555CrossRefGoogle Scholar
Morgan, Jonathan, ‘Privacy in the House of Lords – Again’ (2004) 120 Law Quarterly Review563Google Scholar
Morgan, Jonathan, ‘Privacy, Confidence, and Horizontal Effect: “Hello” Trouble’ (2003) 62 Cambridge Law Journal444CrossRefGoogle Scholar
Morgan, Richard G., ‘Roe v. Wade and the Lesson of the Pre-Roe Case Law’ (1979) 77 Michigan Law Review1724CrossRefGoogle Scholar
Morison, William, ‘Unfair Competition and Passing Off’ (1956) 2 Sydney Law Review50Google Scholar
Muller, Jerry, Adam Smith in His Time and Ours: Designing the Decent Society (Princeton: Princeton University Press, 1995)Google Scholar
Negroponte, Nicholas, Being Digital (New York: Knopf, 1995)Google Scholar
Netanel, Neil, ‘Alienability Restrictions and the Enhancement of Author Autonomy in United States and Continental Copyright Law’ (1994) 12 Cardozo Arts and Entertainment Law Journal1Google Scholar
New South Wales Law Reform Commission, Surveillance: An Interim Report, Report no. 98 (Sydney: NSWLRC, 2001)
New Zealand, Committee on Official Information, Towards Open Government: General Report (Wellington: Government Printer, 1980)
New Zealand, Committee on Official Information, Towards Open Government, Supplementary Report (Wellington: Government Printer, 1981)
New Zealand, Law Commission, Evidence Law: Witness Anonymity, NZLC R42 (Wellington: Law Commission, 1997)
New Zealand, Legislation Advisory Committee, Report No. 8. (Wellington: New Zealand Department of Justice, 1994)
New Zealand, Legislation Advisory Committee, Legislative Change: Guidelines on Process & Content (Wellington: New Zealand Department of Justice, 1991)
New Zealand, Minister of Justice, A Bill of Rights for New Zealand – A White Paper (1985) Appendices to the Journal of the House of Representatives, A 6
Niemann, Jan-Malte, ‘Monitoring Internet and Email Usage – Germany – Surfing into Unemployment? Private Internet Use and Emailing Under German Labour Law’ (2002) 18(2) Computer Law and Security Report114CrossRefGoogle Scholar
Nimmer, Melville B., ‘The Right to Speak From Times to Time: First Amendment Theory Applied to Libel and Misapplied to Privacy’ (1968) 56 California Law Review935CrossRefGoogle Scholar
Organisation for Economic Cooperation and Development (OECD), Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, (1981) 20 ILM 422, adopted 23 September 1980
Palmer, Geoffrey, ‘Privacy and the Law’ [1975] New Zealand Law Journal 747
Parent, W. A., ‘A New Definition of Privacy for the Law’ (1983) 2 Law and Philosophy305CrossRefGoogle Scholar
Paul, Ellen, Miller, Fred, and Paul, Jeffery (eds.), The Right to Privacy (Cambridge: Cambridge University Press, 2000)Google Scholar
Pennock, J. Roland and Chapman, John W. (eds.), Privacy (series: Nomos XIII; New York: Atherton Press, 1971)Google Scholar
Phillipson, Gavin, ‘Transforming Breach of Confidence? Towards a Common Law Right of Privacy under the Human Rights Act’ (2003) 66 Modern Law Review726CrossRefGoogle Scholar
Phillipson, Gavin, 'Judicial Reasoning in Breach of Confidence Cases under the Human Rights Act: Not Taking Privacy Seriously? [2003] European Human Rights Law Review (Privacy Special) 53Google Scholar
Phillipson, Gavin, ‘The Human Rights Act, “Horizontal Effect” and the Common Law: a Bang or a Whimper?’ (1999) 62 Modern Law Review824CrossRefGoogle Scholar
Phillipson, Gavin and Fenwick, Helen, ‘Breach of Confidence as a Privacy Remedy in the Human Rights Act Era’ (2000) 63 Modern Law Review660CrossRefGoogle Scholar
Posner, Richard A., Overcoming Law (Cambridge, Mass.: Harvard University Press, 1995)Google Scholar
Posner, Richard A., ‘Privacy, Secrecy, and Reputation’ (1979) 28 Buffalo Law Review 1Google Scholar
Posner, Richard A., ‘The Right to Privacy’ (1978) 12 Georgia Law Review293Google Scholar
Post, Robert C., ‘Meiklejohn's Mistake: Individual Autonomy and the Reform of Public Discourse’ (1993) 64 University of Colorado Law Review1109Google Scholar
Post, Robert C., ‘Rereading Warren and Brandeis: Privacy, Property, and Appropriation’ (1991) 41 Case Western Law Review647Google Scholar
Post, Robert C., ‘The Social Foundations of Privacy: Community and Self in the Common Law Tort’ (1989) 77 California Law Review957CrossRefGoogle Scholar
Poullet, Yves, ‘Making Data Subjects Aware of Their Rights and Capable of Protecting Themselves’, Conference on the Rights and Responsibilities of Data Subjects, Council of Europe, Prague, 14–15 October 2004 (being published)
Poullet, Yves and Dinant, J. Marc, Information Self-Determination in the Internet Era: Thoughts on Convention No. 108 for the Purposes of the Future Work of the Consultative Committee, 13 December 2004 (T-PD (2004) 04 final)
Pound, Reginald, Albert: A Biography of the Prince Consort (London: Michael Joseph, 1973)Google Scholar
Prescott, Peter, ‘Kaye v. Robertson – A Reply’ (1991) 54 Modern Law Review451CrossRefGoogle Scholar
Prosser, William L., ‘Privacy’ (1960) 48 California Law Review383CrossRefGoogle Scholar
Rachels, James, ‘Why Privacy is Important’ (1975) 4 Philosophy and Public Affairs323Google Scholar
Rasky, H. L., ‘Can an Employer search the Contents of his Employees’ E-mail?' (1998) 20 Advocates' Quarterly221Google Scholar
Raz, Joseph, ‘Free Expression and Personal Identification’ (1991) 11 Oxford Journal of Legal Studies303CrossRefGoogle Scholar
Reidenberg, Joel R., ‘Resolving Conflicting International Data Privacy Rules in Cyberspace’ (2000) 52 Stanford Law Review1315CrossRefGoogle Scholar
Reiman, Jeffrey H., ‘Privacy, Intimacy, and Personhood’ (1976) 6 Philosophy and Public Affairs26Google Scholar
Richardson, Megan, ‘Privacy and Precedent: The Court of Appeal's Decision in Hosking v. Runting’ (2005) 11 New Zealand Business Law Quarterly82Google Scholar
Richardson, Megan, ‘Whither Breach of Confidence: A Right of Privacy for Australia?’ (2002) 26 Melbourne University Law Review381Google Scholar
Robertson, Andrew (ed.), The Law of Obligations: Connections and Boundaries, (London: UCL Press, 2004)Google Scholar
Rodota, Stefano, ‘Beyond the EU Directive: Directions for the Future’ in Poullet, Yves, Terwangne, Cé cile and Turner, Paul (eds.), Privacy: New Risks and Opportunities, Cahier du CRID no. 13 (Antwerpen: Kluwer, 1997)Google Scholar
Rogers, Heather and Tomlinson, Hugh, ‘Privacy and Expression: Convention Rights and Interim Injunctions’ [2003] European Human Rights Law Review (Privacy Special) 37Google Scholar
Rorty, Richard, Philosphy and Social Hope (London: Penguin, 1999)Google Scholar
Rorty, Richard, Contingency, Irony, and Solidarity (Cambridge: Cambridge University Press, 1989)CrossRefGoogle Scholar
Rotenberg, Marc, ‘Fair Information Practices and the Architecture of Privacy (What Larry Doesn't Get)’ [2001] Stanford Technology Law Review 1
Rozenberg, Joshua, Privacy and the Press (revised edn, Oxford: Oxford University Press, 2005)CrossRefGoogle Scholar
Rubenfeld, Jed, ‘The Right of Privacy’ (1989) 102 Harvard Law Review737CrossRefGoogle Scholar
Sack, Robert D., Sack on Defamation: Libel, Slander, and Related Problems(3rd edn, New York City: Practising Law Institute, 1999)Google Scholar
Sanderson, M. A., ‘Is Von Hannover v. Germany a Step Backward for the Substantive Analysis of Speech and Privacy Interests?’ (2004) 6 European Human Rights Law Review631Google Scholar
Schauer, Frederick, ‘The Exceptional First Amendment’ in Ignatieff, Michael (ed.), American Exceptionalism and Human Rights (Princeton: Princeton University Press, 2005)Google Scholar
Schauer, Frederick, Free Speech: A Philosophical Enquiry (Cambridge: Cambridge University Press, 1982)Google Scholar
Schauer, Frederick, ‘Reflections on the Value of Truth’ (1991) 41 Case Western Reserve Law Review699Google Scholar
Schnably, Stephen J, ‘Beyond Griswold: Foucauldian and Republican Approaches to Privacy’ (1991) 23 Connecticut Law Review861Google Scholar
Schneider, Elizabeth, ‘The Violence of Privacy’ (1991) 23 Connecticut Law Review973Google Scholar
Schoeman, Ferdinand (ed.), Philosophical Dimensions of Privacy: An Anthology (Cambridge: Cambridge University Press, 1984)CrossRefGoogle Scholar
Schwartz, Paul M., ‘Beyond Lessig's Code for Internet Privacy: Cyberspace, Filters, Privacy Control and Fair Information Practices’ (2000) Wisconsin Law Review 749
Seipel, Peter, ‘Information System Quality as a Legal Concern’ in Gasser, Urs (ed.), Information Quality Regulation: Foundations, Perspectives, Applications (Baden-Baden: Nomos, 2004)Google Scholar
Seipel, Peter(ed.), Law and Information Technology: Swedish Views, Swedish Government Official Reports, SOU 2002: 112Google Scholar
Sheppard, Annamay T., ‘Thoughts on Bowers v. Hardwick’ (1988) 40 Rutgers Law Journal521Google Scholar
Sherborne, David and Jethani, Sapna, ‘The Privacy Codes’ in Tugendhat, Michael and Christie, Iain (eds.), The Law of Privacy and the Media (Oxford: Oxford University Press, 2002) and First Cumulative Updating Supplement (2004)Google Scholar
Sherman, Brad and Bently, Lionel, The Making of Modern Intellectual Property Law (Cambridge: Cambridge University Press, 1999)Google Scholar
Sherman, Brad and Strowel, Alain, Of Authors and Origins (Oxford: Clarendon Press, 1994)Google Scholar
James, Skone Francis E., Copinger on the Law of Copyright (6th edn, London: Sweet & Maxwell, 1927)Google Scholar
Smith, Joseph H. and Kerrigan, William (eds.), Pragmatism's Freud (Baltimore: Johns Hopkins University Press, 1986)Google Scholar
Smolla, Rodney A., Smolla & Nimmer on Freedom of Speech (3rd edn, New York: Clark Boardman Callaghan, 1996–2005)Google Scholar
Smolla, Rodney A., ‘Accounting for the Slow Growth of American Privacy Law’ (2002) 27 Nova Law Review289Google Scholar
Smolla, Rodney A., ‘Information as Contraband: The First Amendment and Liability for Trafficking in Speech’ (2002) 96 Northwestern University Law Review1099Google Scholar
Tang, Raymond, ‘Personal Data Privacy: The Asian Agenda’, paper at 25th International Conference of Data Protection and Privacy Commissioners, Sydney, 10–12 September 2003, available from http://www.pco.org.hk
Taylor, Charles, The Ethics of Authenticity (Cambridge, Mass.: Harvard University Press, 1992)Google Scholar
Terwangne, Cé cile, ‘Affaire Lindqvist ou quand la Cour de justice des Communautés européennes prend position en matière de protection des données personnelles’ (2004) 19 Revue du Droit des Technologies de l'Information67Google Scholar
Thomas, Kendall, ‘Beyond the Privacy Principle’ (1992) 92 Columbia Law Review1431CrossRefGoogle Scholar
Thompson, John B., Political Scandal: Power and Visibility in the Media Age (Cambridge: Polity Press, 2000)Google Scholar
Tugendhat, Michael and Christie, Iain (eds.), The Law of Privacy and the Media (Oxford: Oxford University Press, 2002) and First Cumulative Updating Supplement (2004)Google Scholar
Tullock, Gordon, The Economics of Special Privilege and Rent Seeking (Dordrecht: Kluwer, 1989)CrossRefGoogle Scholar
Tully, James (ed.), Philosophy in an Age of Pluralism (Cambridge: Cambridge University Press, 1994)CrossRefGoogle Scholar
Turkington, Richard, ‘Confidentiality Policy for HIV-Related Information: An Analytic Framework for Sorting Out Hard and Easy Cases’ (1989) 34 Villanova Law Review871Google Scholar
Turner, Graeme, Ending the Affair: The Decline of Television Current Affairs in Australia (Sydney: University of NSW Press, 2005)Google Scholar
Turner, Graeme, Understanding Celebrity (London: Sage, 2004)CrossRefGoogle Scholar
Turner, Graeme, Bonner, Frances and Marshall, P. David, Fame Games: The Production of Celebrity in Australia (Melbourne: Cambridge University Press, 2000)Google Scholar
United Kingdom, Committee on Homosexual Offences and Prostitution, Report of the Committee on Homosexual Offences and Prostitution (London: HMSO, 1957)
United Kingdom, Home Office, Report of the Committee on Privacy and Related Matters, Cm 1102 (London: HMSO, 1990)
United Kingdom, House of Commons, Culture, Media and Sport Committee, Privacy and Media Intrusion, Fifth Report of Session 2002–03, HC 458-I
United Kingdom, Ofcom, Ofcom Review of Public Service Television Broadcasting: Phase 2 – Meeting the Digital Challenge (London: Ofcom, 2004)
United Nations, Human Rights Committee, Concluding Observations of the Human Rights Committee: New Zealand, CPR/CO/75/NZL, 26 July 2003
United Nations, Human Rights Committee, Concluding Observations of the Human Rights Committee: United Kingdom of Great Britain and Northern Ireland, CCPR/CO/73/UK, CCPR/CO/73/UKOT, 6 December 2001
United States, Committee on Intellectual Property Rights and the Emerging Information Infrastructure, The Digital Dilemma (Washington, DC: National Academy Press, 2000)
United States, Congressional Budget Office, Copyright Issues in Digital Media (Washington, DC: CBO, August 2004)
United States, Federal Trade Commission, Prepared Statement of the Federal Trade Commission on ‘Privacy Online: Fair Information Practices in the Electronic Marketplace’ (May 2000)
United States, Information Infrastructure Task Force, Intellectual Property and the National Information Infrastructure: The Report of the Working Group on Intellectual Property Rights Information Infrastructure Task Force (Washington, DC: United States Department of Congress, 1995)
Wassenhove, Stanislas, Leersnyder, Michael and Chuffart, Gael, Nouvelles technologies et impact sur le droit du travail (Kortrijk-Heule: UGA, 2003)Google Scholar
Wacks, Raymond, Law, Morality, and the Private Domain (Hong Kong: Hong Kong University Press, 2000)Google Scholar
Wacks, Raymond, ‘What has Data Protection to do with Privacy?’ (2000) 6 Privacy Law & Policy Reporter143Google Scholar
Wacks, Raymond, ‘Towards a New Legal and Conceptual Framework for the Protection of Internet Privacy’ (1999) 3 Irish Intellectual Property Review1Google Scholar
Wacks, Raymond, ‘Privacy and Press Freedom: Oil on Troubled Waters’ (1999) 4 Media & Arts Law Review259Google Scholar
Wacks, Raymond, ‘Privacy and Media Intrusion: A New Twist’ (1999) 6 Privacy Law & Policy Reporter48Google Scholar
Wacks, Raymond, ‘Media Intrusion: An Expanded Role for the Privacy Commissioner?’ (1999) 29 Hong Kong Law Journal341Google Scholar
Wacks, Raymond, ‘Pursuing Paparazzi: Privacy and Intrusive Photography’ (1998) 1 Hong Kong Law Journal1Google Scholar
Wacks, Raymond, Privacy and Press Freedom (Oxford: Oxford University Press, 1995)Google Scholar
Wacks, Raymond, Personal Information: Privacy and the Law (Oxford: Clarendon Press, 1993)Google Scholar
Wacks, Raymond, (ed.), Privacy: Volume I (Aldershot: Dartmouth; New York: New York University Press, 1993)Google Scholar
Wacks, Raymond, ‘Controlling AIDS: Some Legal Issues’ (1988) 138 New Law Journal254 and 283.Google Scholar
Wacks, Raymond, The Protection of Privacy (London: Sweet & Maxwell, 1980)Google Scholar
Wacks, Raymond, ‘The Poverty of “Privacy”’ (1980) 96 Law Quarterly Review73Google Scholar
Wade, H. W. R., ‘Horizons of Horizontality’ (2000) 116 Law Quarterly Review217Google Scholar
Wallace, Amy, The Prodigy (New York: E. P. Dutton, 1986)Google Scholar
Warren, Samuel D. and Brandeis, Louis D., ‘The Right to Privacy’ (1890) 4 Harvard Law Review193CrossRefGoogle Scholar
Waters, Nigel, ‘Rethinking Information Privacy – A Third Way in Data Protection?’ (2000) 6 Privacy Law & Policy Reporter121Google Scholar
Weaver, Russell L., Kenyon, Andrew T., Partlett, David F. and Walker, Clive P., The Right to Speak Ill: Defamation, Reputation and Free Speech (Durham, NC: Carolina Academic Press, 2006)Google Scholar
Wellek, Rene (ed.), The Attack on Literature and Other Essays (Chapel Hill: University of North Carolina Press, 1982)Google Scholar
Wermiel, Stephen J., ‘Law and Human Dignity: The Judicial Soul of Justice Brennan’ (1998) 7 William and Mary Bill of Rights Journal223Google Scholar
Westin, Alan, Privacy and Freedom (London: Bodley Head, 1967)Google Scholar
White, Antony, ‘Data Protection and the Media’ [2003] European Human Rights Law Review (Privacy Special) 25; volume also published as Jonathan, Cooper (ed.) Privacy (London: Sweet and Maxwell, 2003)Google Scholar
White, Stephen K., Sustaining Affirmation: The Strengths of Weak Ontology in Political Theory (Princeton: Princeton University Press, 2000)Google Scholar
Whitman, James Q., ‘The Two Western Cultures of Privacy: Dignity versus Liberty’ (2004) 113 Yale Law Journal1151CrossRefGoogle Scholar
Wilson, A. N., The Victorians (London: Arrow Books, 2003)Google Scholar
Woodmansee, Martha and Jaszi, Peter, The Construction of Authorship: Textual Appropriation in Law and Literature (Durham: Duke University Press, 1994)Google Scholar
Young, John B. (ed.), Privacy (New York: Wiley, 1978)Google Scholar
Zammit, Brigitte, ‘Traffic Data Retention under EC Law’ (2005) 11(1) Computer and Telecommunications Law Review17Google Scholar
Zimmerman, Diane L., ‘Requiem for a Heavyweight: a Farewell to Warren and Brandeis's Privacy Tort’ (1983) 68 Cornell Law Review291Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Edited by Andrew T. Kenyon, University of Melbourne, Megan Richardson, University of Melbourne
  • Book: New Dimensions in Privacy Law
  • Online publication: 24 July 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511494208.012
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Edited by Andrew T. Kenyon, University of Melbourne, Megan Richardson, University of Melbourne
  • Book: New Dimensions in Privacy Law
  • Online publication: 24 July 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511494208.012
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Edited by Andrew T. Kenyon, University of Melbourne, Megan Richardson, University of Melbourne
  • Book: New Dimensions in Privacy Law
  • Online publication: 24 July 2009
  • Chapter DOI: https://doi.org/10.1017/CBO9780511494208.012
Available formats
×