قراءات إضافية

The subject of privacy has attracted the attention of scholars from a wide variety of disciplines, including philosophy, sociology, political science, and law. To avoid swamping the reader with an impossibly vast list of sources, I have restricted this inventory to reasonable—and accessible—proportions, omitting references to the prodigious quantity of periodical literature that grapples with this kaleidoscopic concept (the most essential of which are cited in the “References” section).

الفصل الأول: الهجوم

  • P. Agre and M. Rotenberg (eds.), Technology and Privacy: The New Landscape (Cambridge, MA: MIT Press, 1997).
  • K. Ball and F. Webster (eds.), The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age (London: Pluto Press, 2003).
  • C. J. Bennett, Privacy Advocates: Resisting the Spread of Surveillance (Cambridge, MA: MIT Press, 2008).
  • C. J. Bennett and D. Lyon (eds.), Playing the Identity Card: Surveillance, Security and Identification in Global Perspective (London: Routledge, 2008).
  • A. Cavoukian and D. Tapscott, Who Knows? Safeguarding Your Privacy in a Networked World (Toronto: Random House, 1995).
  • S. Davies, Big Brother: Britain’s Web of Surveillance and the New Technological Order (London: Pan Books, 1996).
  • W. Diffie and S. Landau, Privacy on the Line: The Politics of Wiretapping and Encryption (Cambridge, MA: MIT Press, 2007).
  • P. Fitzgerald and M. Leopold, Stranger on the Line: The Secret History of Phone Tapping (London: The Bodley Head, 1987).
  • D. Flaherty, Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States (Chapel Hill, NC: University of North Carolina Press, 1989).
  • D. Flaherty, Protecting Privacy in Two-Way Electronic Services (London: Mansell Publishing Limited, 1985).
  • J. Gibb, Who’s Watching You? The Chilling Truth about the State, Surveillance and Personal Freedom (London: Collins & Brown, 2005).
  • J. Goldsmith and T. Wu, Who Controls the Internet? Illusions of a Borderless World (Oxford: Oxford University Press, 2006).
  • C. Jennings and L. Fena, The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet (New York: Free Press, 2000).
  • K. Laidler, Surveillance Unlimited: How We’ve Become the Most Watched People on Earth (Cambridge: Icon Books, 2008).
  • J. Losek, The War on Privacy (Westport, CT: Praeger, 2007).
  • D. Lyon, The Electronic Eye: The Rise of Surveillance Society (Minneapolis, MI: University of Minnesota Press, 1994).
  • D. Lyon, Surveillance after September 11 (Cambridge: Polity Press, 2003).
  • D. Lyon (ed.), Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination (London and New York: Routledge, 2003).
  • D. Lyon, Surveillance Society: Monitoring Everyday Life (Buckingham: Open University Press, 2001).
  • D. Lyon, Surveillance Studies: An Overview (Cambridge: Polity Press, 2007).
  • D. Lyon, Theorizing Surveillance: The Panopticon and Beyond (Uffculme: Willan Publishing, 2006).
  • R. Mansell and S. Collins (eds.), Trust and Crime in Information Societies (Cheltenham: Edward Elgar Publications, 2005).
  • G. Marx, Undercover: Police Surveillance in America (Berkeley, CA, and London: University of California Press, 1992).
  • M. S. Monmonier, Spying with Maps: Surveillance Technologies and the Future of Privacy (Chicago, Ill: University of Chicago Press, 2002).
  • C. Norris and G. Armstrong, The Maximum Surveillance Society: The Rise of CCTV (London: Berg, 1999).
  • J. Parker, Total Surveillance: Investigating the Big Brother World of E-spies, Eavesdroppers and CCTV (London: Piatkus Books, 2000).
  • J. K. Petersen, Understanding Surveillance Technologies: Spy Devices, Privacy, History and Applications (Boca Raton, FL: Auerbach, 2007).
  • J. B. Rule, Privacy in Peril (New York: Oxford University Press, 2007).
  • J. B. Rule, Private Lives and Public Surveillance (London: Allen Lane, 1973).
  • B. Schouten, N. C. Juul, A. Drygajlo, and M. Tistarelli (eds.), Biometrics and Identity Management (Heidelberg: Springer, 2008).
  • D. J. Solove, The Digital Person: Technology and Privacy in the Information Age (New York: New York University Press, 2004).
  • D. J. Solove, M. Rotenberg, and P. Schwartz, Privacy, Information, and Technology (New York: Aspen, 2006).
  • C. J. Sykes, The End of Privacy (New York: St Martin’s Press, 1999).
  • D. Thomas and B. B. Loader (eds.), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age (London: Routledge, 2000).
  • R. Whitaker, The End of Privacy: How Total Surveillance is Becoming a Reality (New York: New Press, 1999).

الفصل الثاني: قيمة دائمة

  • P. Birks (ed.), Privacy and Loyalty (Oxford: Oxford University Press, 1997).
  • S. Bok, Secrets: On the Ethics of Concealment and Revelation (New York: Pantheon, 1982).
  • A. Etzioni, The Limits of Privacy (New York: Basic Books, 1999).
  • D. Flaherty, Privacy in Colonial New England (Charlottesville, VA: University Press of Virginia, 1972).
  • O. Gandy, Jr, The Panoptic Sort: A Political Economy of Personal Information (Boulder, CO: Westview Press, 1993).
  • J. Griffin, On Human Rights (Oxford and New York: Oxford University Press, 2008).
  • R. F. Hixson, Privacy in a Public Society: Human Rights in Conflict (New York: Oxford University Press, 1987).
  • J. Inness, Privacy, Intimacy and Isolation (New York: Oxford University Press, 1992).
  • L. Lessig, Code and Other Laws of Cyberspace (New York: Basic Books, 1999).
  • L. Lessig, Code: Version 2.0 (New York: Basic Books, 2006).
  • A. Moore, Privacy Rights: Moral and Legal Foundations (Philadephia, PA: University of Pennsylvania Press, 2009).
  • B. Moore, Privacy: Studies in Social and Cultural History (New York: M. E. Sharp, 1984).
  • E. Neill, Rites of Privacy and the Privacy Trade: On the Limits of Protection for the Self (Montreal and Kingston: McGill-Queen’s University Press, 2001).
  • M. C. Nussbaum, Hiding from Humanity: Disgust, Shame, and the Law (Princeton, NJ: Princeton University Press, 2004).
  • J. Pennock and J. Chapman, Privacy: Nomos XIII (New York: Atherton Press, 1971).
  • J. Rosen, The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age (New York: Random House, 2004).
  • F. Schoeman (ed.), Philosophical Dimensions of Privacy: An Anthology (Cambridge: Cambridge University Press, 1984).
  • F. Schoeman, Privacy and Social Freedom (Cambridge: Cambridge University Press, 1992).
  • R. Sennett, The Fall of Public Man (Harmondsworth: Penguin, 1974).
  • D. J. Siepp, The Right to Privacy in American History (Cambridge, MA: Harvard University Press, 1978).
  • D. J. Solove, Understanding Privacy (Cambridge, MA: Harvard University Press, 2008).
  • R. Wacks, Law, Morality, and the Private Domain (Hong Kong: Hong Kong University Press, 2000).
  • R. Wacks (ed.), Privacy: The International Library of Essays in Law and Legal Theory. Volume I: The Concept of Privacy (London, Dartmouth, New York: New York University Press, 1993).
  • A. F. Westin, Privacy and Freedom (New York: Atheneum, 1967).
  • A. F. Westin and M. A. Baker, Databanks in a Free Society: Computers, Record-Keeping, and Privacy (New York: Quadrangle, 1972).
  • J. Young (ed.), Privacy (New York: Wiley, 1978).

الفصل الثالث: حق قانوني

  • A. T. Kenyon and M. Richardson (eds.), New Dimensions in Privacy Law: International and Comparative Perspectives (Cambridge: Cambridge University Press, 2006).
  • J. L. Mills, Privacy: The Lost Right (New York: Oxford University Press, 2008).
  • P. Regan, Legislating Privacy: Technology, Social Values and Public Policy (Chapel Hill, NC: University of North Carolina Press, 1995).
  • J. B. Rule and G. Greenleaf (eds.), Global Privacy Protection: The First Generation (London: Edward Elgar, 2008).
  • R. Wacks, Personal Information: Privacy and the Law (Oxford: Clarendon Press, 1989).
  • R. Wacks (ed.), Privacy: The International Library of Essays in Law and Legal Theory. Volume II: Privacy and the Law (London, Dartmouth, New York: New York University Press, 1993).
  • R. Wacks, The Protection of Privacy (London: Sweet & Maxwell, 1980).

الفصل الرابع: الخصوصية وحرية التعبير

  • L. Alexander, Is There a Right of Freedom of Expression? (Cambridge: Cambridge University Press, 2005).
  • E. Barendt, Freedom of Speech, 2nd edn. (Oxford: Oxford University Press, 2007).
  • C. Calvert, Voyeur Nation: Media, Privacy, and Peering in Modern Culture (New York: Basic Books, 2004).
  • H. Jenkins, Convergence Culture: Where Old and New Media Collide (New York: New York University Press, 2008).
  • J. Rozenberg, Privacy and the Press (Oxford: Oxford University Press, 2005).
  • D. J. Solove, The Future of Reputation: Gossip, Rumor, and Privacy on the Internet (New Haven, CT: Yale University Press, 2007).
  • H. Tomlinson, Privacy and the Media: The Developing Law (London: Matrix Chambers, 2002).
  • R. Wacks, Privacy and Press Freedom (London: Blackstone Press, 1995).

الفصل الخامس: حماية البيانات

  • C. Bennett, Regulating Privacy: Data Protection and Public Policy in Europe and the United States (Ithaca, NY: Cornell University Press, 1992).
  • C. Bennett and C. Raab, The Governance of Privacy: Policy Instruments in Global Perspective, 2nd edn. (Cambridge, MA: MIT Press, 2006).
  • M. Berthold and R. Wacks, Hong Kong Data Privacy Law: Territorial Regulation in a Borderless World, 2nd edn (Hong Kong: Sweet & Maxwell Asia, 2003).
  • L. Bygrave, Data Protection Law: Approaching its Rationale, Logic and Limits (The Hague: Kluwer Law International, 2002).
  • P. Schwartz and J. Reidenberg, Data Protection Law: A Study of United States Data Protection (Dayton: Michie, 1996).

الفصل السادس: نهاية الخصوصية

  • S. Garfinkel, Database Nation: The Death of Privacy in the Twenty-First Century (Sebastopol, CA: O’Reilly, 2000).
  • S. Gutwirth, Privacy and the Information Age (Lanham, MD: Rowman & Littlefield, 2002).
  • B. Kahin and C. Nesson (eds.), Borders in Cyberspace: Information Policy and the Global Information Infrastructure (Cambridge, MA: MIT Press, 1997).
  • G. Laurie, Genetic Privacy: A Challenge to Medico-Legal Norms (Cambridge: Cambridge University Press, 2002).
  • D. Lyon, C. Bennett, and R. Grant (eds.), Visions of Privacy: Policy Choices for the Digital Age (Toronto: University of Toronto Press, 1998).
  • K. O’Hara and N. Shadbolt, The Spy in the Coffee Machine: The End of Privacy as We Know It (Oxford: Oneworld, 2008).
  • J. Rosen, The Unwanted Gaze: The Destruction of Privacy in America (New York: Random House, 2000).
  • C. J. Sykes, The End of Privacy (London: St Martin’s Press, 2000).
  • J. Zittrain, The Future of the Internet: And How to Stop It (London: Allen Lane, 2008).

المواقع الإلكترونية

جميع الحقوق محفوظة لمؤسسة هنداوي © ٢٠٢٢