[cyberlaw] 5/8 Privacy

Required Reading:

  • Ming-Li Wang, Information Privacy in a Network Society: Decision Making amidst Constant Change, NTU L. Rev., Mar. 2010, at 127 (2010). (Read Part I to III.)
  • 王明禮,網路時代、商業廣告與資訊隱私–從釋字第六八九號解釋談起 (發表於 2011年大法官年度學術研討會)。

Additional Reading:

  • Lessig, Code 2.0, ch. 11 (excellent overview on both surveillance and data aggregation issues).
  • In re DoubleClick Inc. Privacy Litigation, 154 F.Supp.2d 497 (S.D.N.Y., 2001). (To ease your reading load, links are to summaries made by Martin Samson, an attorney at Phillips Nizer. You should know where to locate the full text.)
  • Larry Greenemeier, International Report: What Impact Is Technology Having on Privacy around the World?, Scientific American, Aug. 18, 2008.
  • Herbert H. Thompson, How I Stole Someone’s Identity, Scientific American, Aug. 18, 2008.
  • The entire 2000 Stanford Law Review symposium — “Cyberspace and Privacy: A New Legal Paradigm?”
  • The entire 2001 Georgetown Law Journal symposium — The Unwanted Gaze, by Jeffrey Rosen”.
  • Lior Jacob Strahilevitz, A Social Networks Theory of Privacy, 72 U. Chi. L. Rev. 919 (2005).
Advertisements