ACM (2003). “Letter to Senators John Warner and Carl Levin,” by U.S. Public Policy Committee of the Association for Computing Machinery, on ACM web site, 23 January at 〈http://www.acm.org/usacm/Letters/tia_final.html〉. (Accessed 7 February 2003.)
Agre, P. and Rotenberg, M. (eds.) (1997). Technology and Privacy: The New Landscape, Cambridge: MIT Press.
Allen, A. (1988). Uneasy Access: Privacy for Women in a Free Society, Totowa, N.J.: Rowman and Littlefield.
Ashcroft Announcement (2001). “Attorney General Ashcroft and Deputy Attorney General Thompson Announce Reorganization and Mobilization of the Nation’s Justice and Law Enforcement Resources,” on DOJ website, 8 November at 〈http://www.usdoj.gov/ag/speeches/2001/agcrisisremarks11_08.htm〉. (Accessed 31 December 2002.)
Ashcroft Testimony (2001). “DOJ Oversight: Preserving Our Freedoms While Defending Against Terrorism,” on DOJ website, 6 December at <http://judiciary.senate.gov/testimony.cfm?id=128&wit_id=85>. (Accessed 10 February 2003.)
Attorney General’s Remarks (2001). “Attorney General John Ashcroft Remarks Following his Tour of the Pentagon,” on DOJ web site, 09-19-01 at 〈http://www.usdoj.gov/ag/speeches/2001/0919remarkstourpentagon.htm〉. (Accessed 5 February 2003.)
Attorney General’s Remarks (2002). “Attorney General John Ashcroft Remarks to International Association of Chiefs of Police Conference,” on DOJ web site, 4 October at 〈http://www.usdoj.gov/ag/speeches/2002/100702chiefsofpolicemn1.htm〉. (Accessed 5 February 2003.)
Best, J. (1987). “Rhetoric in Claims-Making: Constructing the Missing Children Problem” in Social Problems 34: 101–121.
Best, J. (1990). Threatened Children: Rhetoric and Concern About Child-Victims, Chicago: University of Chicago Press.
Bloustein, E. (1964). “Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser,” in New York University Law Review 39: 962–1007.
Brin, D. (1998). The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom?, Reading, MA: Addison-Wesley.
Chronicle (2003). “Editorial: Spying by Any Name,” in The San Francisco Chronicle, 26 May at 〈http://www.sfgate.com/cgi-bin/article.cgi?f=/chronicle/a/2003/05/26/ED272707.DTL〉, (Accessed 26 January 2004.)
Church Committee (1976). “Intelligence Activities and the Rights of Americans: Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities,” on cointelpro.org website, 26 April at 〈http://www.derechos.net/paulwolf/cointelpro/cointel.htm〉. (Accessed 18 November 2003.)
DeCew, J. (1997). In Pursuit of Privacy: Law, Ethics, and the Rise of Technology, Ithaca: Cornell University Press.
DeCew, J. (2002). “Privacy,” Stanford Encyclopedia of Philosophy, at 〈http://plato.stanford.edu/entries/privacy/〉. (Accessed 14 January 2004.)
Etzioni, A. (2000). The Limits of Privacy, New York: Basic Books.
Fried, C. (1970). An Anatomy of Values, Cambridge: Harvard University Press.
Friedrich, C. (1971). “Security versus Privacy: The Democratic Dilemma,” in Pennock, J. and Chapman, J. (eds.) Privacy, Nomos Series 13, Yearbook of the American Society for Political and Legal Philosophy, New York: Atherton Press, 105–120.
Gaboury, F. (2001). “ACLU and AFL-CIO Blast Ashcroft” in People’s Weekly World Newspaper Online, at 〈http://www.pww. org/article/view/323/1/30/〉. (Accessed 7 Feburary 2003.)
Gusfield, J. (1963). Symbolic Crusade: Status Politics and the American Temperance Movement, Urbana: University of Illinois Press.
Gusfield, J. (1967). “Moral Passage: The Symbolic Process in Public Designations of Deviance,” in Social Problems 15: 175–188.
Gusfield, J. (1968). “On Legislating Morals: The Symbolic Process of Designating Deviance,” in California Law Review 58: 54–73.
Gusfield, J. (1981). The Culture of Public Problems: Drinking-Driving and the Symbolic Order, Chicago: University of Chicago Press.
Gusfield, J. (1984). “On the Side: Practical Action and Social Constructivism in Social Problems Theory,” in Schneider, W. and Kitsuse, J. (eds.) Studies in the Sociology of Social Problems, Norwood, NJ: Ablex, 31–51.
Hatch, O. (2001). “Statement,” DOJ Oversight: Preserving Our Freedoms While Defending Against Terrorism, 6 December at <http://www.senate.gov/~judiciary/print_member_statement.cfm?id=121&wit_id=51>. (Accessed 7 February 2003.)
Hudson, A. (2003). “Congress Kills Data-Mining Computer Program,” in The Washington Times, at 〈http://www.washingtontimes.com/national/20030925-115156-7992r.htm〉. (Accessed 21 January 2004.)
Inness, J. (1992). Privacy, Intimacy, and Isolation, Oxford: Oxford University Press.
Kitsuse J. (1980). “Coming Out All Over: Deviance and the Politics of Social Problems” in Social Problems 28: 1–13.
Leahy, P. (2001). “Statement,” DOJ Oversight: Preserving Our Freedoms While Defending Against Terrorism, 6 December at <http://www.senate.gov/~judiciary/print_member_statement.clm?id=121&wit_id=50>. (Accessed 7 February 2003.)
Leahy, P. (2004). “Comments of Sen. Patrick Leahy on the TIA Data Mining Program Report to Congress” in IWS—The Information Warfare Site, at <http://www.iwar.org.uk/news-archive/tia/leahy.htm>. (Accessed 26 January 2004.)
Liptak, A. (2002). “The Nation: Citizen Watch; In the Name of Security, Privacy for Me, Not Thee,” in The New York Times, 24 November at <http://query.nytimes.com/search/restricted/article?res=F30A14F7385D0C778EDA80994DA404482>. (Accessed 26 January 2004.)
Lyon, D. (2003). Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, New York: Routledge.
MacKinnon, C. (1989). Toward a Feminist Theory of the State, Cambridge: Harvard University Press.
Mayle, A. and Knott, A. (2003). “Total Business Awareness: The Corporate Contracting behind John Poindexter’s Total Information Awareness Program,” in Multinational Monitor, Jan/Feb, Volume 24, Numbers 1 & 2. at <http://multinationalmonitor.org/mm2003/03jan-feb/janfeb03corp3.html>. (Accessed 1 February 2004.)
McCann, M. (1996). “Causal versus Constitutive Explanations (or, On the Difficulty of Being So Positive….),” in Law & Social Inquiry 21(2): 457–482.
McCullagh, D. (2002). “Federal Database Spy Site Fading Away,” in News. Com, 20 December at <http://news.com.com/2102-1023_3-978598.html>. (Accessed on 1 February 2004.)
McCullagh, D. (2003). “Republican Senator Slams Database Plan,” 22 January at <http://news.com.com/2100-1023-981753.html>. (Accessed 1 February 2004.)
Merry S. (1995). “Resistance and the Cultural Power of Law” in Law & Society Review 29: 11–26.
Parent, W. (1983). “Privacy, Morality, and the Law,” in Philosophy and Public Affairs 12: 269–288.
Phillips, D. and Curry, M. (2003). “Privacy and the phenetic urge: Geodemographics and the changing spatiality of local practice,” in Lyon, D. (ed.) Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, New York: Routledge, 137–152.
Prosser, W. (1960). “Privacy,” in California Law Review 48: 383–423.
Rachels, J. (1975). “Why Privacy is Important,” in Philosophy and Public Affairs 4: 323–333.
Regan, P. (1995). Legislating Privacy: Technology, Social Values, and Public Policy, Chapel Hill: The University of North Carolina Press.
Rice Testimony (2004). “Testimony of Condoleezza Rice Before 9/11 Commission,” in The New York Times, 8 April at <http://www.nytimes.com/2004/04/08/politics/08RICE-TEXT.html>. (Accessed 10 April 2004.)
Rosen, J. (2004). “How to Protect America, and Your Rights,” in The New York Times, 6 February at <http://query.nytimes.com/gst/abstract.html?res=F60613FC3B5F0C758CDDAB0894DC404482>. (Accessed 26 February 2004.)
Rosenzweig, P. (2004). “Congress Should not Prematurely Short-Circuit the Total Information Awareness Program,” on Heritage Foundation web site at <http://www.heritage.org/Research/HomelandDefense/em853.cfm>. (Accessed 26 January 2004.)
Scanlon, T. (1975). “Thomson on Privacy,” in Philosophy and Public Affairs 4: 315–322.
Schneider, J. (1978). “Deviant Drinking as Disease: Alcoholism as Social Accomplishment,” in Social Problems 25: 361–372.
Schneider, J. (1984). “Morality, Social Problems, and Everyday Life,” in Schneider, W. and Kitsuse, J. (eds.) Studies in the Sociology of Social Problems, Norwood, NJ: Ablex, 180–206.
Schneider, J. (1985). “Social Problems Theory: The Constructionist View” in Annual View of Sociology 11: 209–229.
Schoeman, F. (1992). Privacy and Social Freedom, Cambridge: Cambridge University Press.
Seper, J. (2003). “Grassley Airs Concerns over Tracking System,” in The Washington Times, 22 January at <http://nl.newsbank.com/nl-search/we/Archives?p_product=WT&p_theme=wt&p_action=search&p_maxdocs=200&p_text_search-0= grassley%20AND%20airs%20AND%20concerns&sdispstring=grassley%20airs%20concerns%20AND%20date(2003)&p_field_date0=YMD_date&p_params_date-0= date:B,E&p_text_date-0=2003&p_perpage=10&p_sort=YMD_date:D&xcal_useweights=no>. (Accessed 26 January 2004.)
Simmel, A. (1971). “Privacy Is not an Isolated Freedom,” in Pennock, J. and Chapman, J. (eds.) Privacy, Nomos Series 13, Yearbook of the American Society for Political and Legal Philosophy, New York: Atherton Press, 71–87.
Singel, R. (2003). “Pentagon Defends Data Search Plan,” in Wired News, at 〈http://www.wired.com/news/privacy/0,1848,58936.html〉. (Accessed 26 January 2003.)
Spector, M. and Kitsuse, J. (1973). “Social Problems: A Reformulation,” in Social Problems 21: 145–190.
Spector, M. and Kitsuse, J. (1977). Constructing Social Problems, Menlo Park, CA: Cummings.
Spector, M. and Kitsuse, J. (1997). “Social Problems: A Re-formulation,” in Social Problems 21: 145–159.
Spector, M. and Kitsuse, J. (2001). Constructing Social Problems, New Brunswick: Transaction Publishers.
Thompson, D. (2002). “What Price Freedom: Developing the Capability to Build Dossiers on All Americans,” in Capital Hill Blue, 21 November at 〈http://www.capitolhillblue.com/artman/publish/article_1647.shtml〉. (Accessed 1 February 2004.)
Thomson, J. (1975). “The Right to Privacy,” in Philosophy and Public Affairs 4: 295–314.
Toner, R. and Elder, J. (2004). “Poll Bolsters Bush on Terrorism but Finds Doubts on Economy,” in The New York Times, 18 January at 〈http://www.nytimes.com/2004/01/18/politics/campaigns/18POLL.html?ex=1389762000&en=6fa728883730bfc1&ei=5007& partner=USERLAND〉. (Accessed 18 January 2004.)
Warren, S. and Brandeis, L. (1890), “The Right to Privacy” in Harvard Law Review, 4: 193–220.
Westin, A. (1967), Privacy and Freedom, New York: Atheneum.
Wyden, R. (2003), “Wyden Wins Fight to Curb Government Snooping: ‘Total Information Awareness’ Amendment Slated to Become Law,” on web site of Sen. Wyden, at 〈http://wyden.senate.gov/media/2003/02132003_tia.html〉. (Accessed 26 January 2004.)