Brandt, A. (2005). Biometric passports fail in early privacy tests. [Electronic Version].

            PC World, 23, 2, 39.
Brignall, T. (2002). The new panopticon: The Internet viewed as a structure of social

            control. [Electronic version].
Theory and Science.  
Campbell, J.E., & Carlson, M. (2002). Online surveillance and the commodification of privacy. [Electronic Version].                        
            Journal of Broadcasting & Electronic Media,
46, 4, 586-610.
Foucault, M. (1995). Discipline & punish: The birth of the prison. New York:

            Vintage Books.

Frank, T. (2005, May 16). Air traveler’s stripped bare with x-ray machine. USA Today.

Garinkel, S. (2001). Database nation. Sebastopol, CA: O’Reilly & Associates.

Gumpert, G.,, & Drucker, S. (2001). Public boundaries: Privacy and surveillance in a technological world [Electronic Version].
Communication Quarterly, 49, 2, 115-133).
Henderson, N.C. (2002). The patriot act’s impact on the government’s ability to conduct electronic surveillance of ongoing
The Duke Law Journal, 52, 1, 179-215.  
Julie, R. S. (2000). High-tech surveillance tools and the fourth amendment: Reasonable

            expectations of privacy in the technological age. [Electronic Version].
American criminal law review, 31, 1, 127-149.

Louis Harris & Associates Polls (2000). Public opinion poll database. Retrieved on May 9, 2005 from

Lyons, D. (2002). Surveillance in cyberspace: The internet, personal data, and social control. [Electronic Version]. Queen’s Quaterly, 109,
             3, 345-355.

Margulis, S.T. (2003). Privacy as a social issue and behavioral concept. [Electronic Version]. Journal of  Social Issues, 59, 2, 243-258.

Marshall, P. (2001, June 15). Privacy under attack. The CQ Researcher Online, 11, 505-528. Retrieved May 11, 2005, from    

   cqresrre2001061500. Document ID: cqresrre2001061500.

Masci, D. (1998). Internet privacy. The CQ Researcher Online, 8, 953-976, Retrieved May 11, 2005, from    
   Document ID: cqresrre1998110600.


Privacy and Technology Home Notion of Privacy How Technology Violes Privacy
Analysis of Implications Protect Your Information References
E-mail Me