LEGAL ISSUES: GENERAL
Barlow. John Perry. "Crime and puzzlement: in advance of the law on the electronic frontier". Whole Earth Review No. 68 (Fall 1990):44-57.
Barlow. John Perry; Mitch Kapor. "Across the electronic frontier". (1990). [available via ftp eff.org]
Branscomb, Anne W. "Common law for the electronic frontier". Scientific American v.265, n.3 (September 1991):154-158.
Branscomb, Anne W. "Overview: global governances of global networks". pp. 1-33 in Toward a Law of Global Communications Networks, ed. Anne W. Branscomb (NY: Longman, 1986).
Branscomb, Anne Wells. (1993). "Jurisdictional Quandaries for Global Networks", in Global Networks: computers and international communication, ed. Linda M. Harasim. Cambridge, MA: MIT Press:83-103.
Brenner, Anita Susan. "Don't call it cyberlaw (TM)!: recent developments in the law and policy of telecommunications and computer database networks". Seminar materials: Second International Symposium on National Security and National Competitiveness: Open Source Solutions, Washington D.C. November 2-4 1993.
Brody, Hugh. "Of bytes and rights". Technology Review (November/December 1992):22-29.
Connolly, Frank W.; Steven W. Gilbert; Peter Lyman. "A Bill of Rights for electronic citizens, Part One". EDUCOM Review (Fall/Winter 1991):53-56.
Figallo, Cliff. "Defending the new frontier". Index on Censorship 7 (July 1991):25.
Godwin, Mike. "New Frontiers: a visitor's guide". Index on Censorship 2 (1993):11-13.
Hammitt, Harry. "Formatting freedom in the computer age". Index on Censorship 7 (July 1991):30-31.
Kapor, Mitchell. "Civil liberties in cyberspace". Scientific American, v.265, B.3 (September 1991):158-164.
Kirby, Michael A.; Catherine A. Murray. (1993). "Information Security: at risk?" in Global Networks: computers and international communication, ed. Linda M. Harasim. Cambridge, MA: MIT Press: 167-182.
Rose, Lance; Jonathan Wallace. SYSLAW, 2nd ed. (Winona, MN: PC Information Group Inc., 1992).
Shade, Leslie Regan. "The Challenges of Cyberspace: current issues in the legal protection of networked communities", pp. 58-68 in. Working Papers, McGill Unversity, Graduate Program in Communications, 1992.
Tribe, Laurence. "The Constitution in Cyberspace: law and liberty beyond the electronic frontier". Keynote Address to the first U.S. Conference on Computers, Freedom, & Privacy (April 1991).
"U.S.: the consequences of digital electronics and the Constitution". Intermedia, v.19, n.3 (May-June 1991):6-7.
PRIVACY
Amidon, Paige. (1992, July). "Widening privacy concerns". Online :64.
Barlow, John Perry. (1991, August). "Private life in cyberspace". Communications of the ACM, v.34, n.8 :23-25.
Burnside, Russell S. (1987). "The Electronic Communications Privacy Act of 1986: the challenge of applying ambiguous statutory language to intricate telecommunications technologies"/ Rutgers Computer and Technology Law Journal, v.13 :451-517.
Detweiler, L. (1992) "Privacy & Anonymity FAQ, Parts 1-3". [ftp [email protected]:pub/usenet/news.answers/net-privacy]
Flaherty, David H. (1989). Protecting privacy in surveillance societies: the Federal Republic of Germant, Sweden, France, Canada, amd the United States. (Chapel Hill, North Carolina: the University of North Carolina Press)..
Gandy, Oscar H., Jr; Charles E. Simmons. (1986). "Technology, privacy and the democratic process". Critical Studies in Mass Communication :155-168.
Gandy, Oscar H., Jr. (1989, Summer). 'The surveillance society: information technology and bureaucratic social control". Journal of Communication v.39,n.3 :61-76.
Higgins,. Steve. (1992, September 14). "E-mail issues trigger legal dilemmas". PC Week Business:155.
Jeeves, Mahatma Kane. (1992, March). "The Joy of Handles, or: everything you always wanted to know about me (but have no right to ask)". Fido News, v.9, n.9.
Katz, James E. (1988, December). "US telecommunications privacy policy: socio-political responses to technological advances". Telecommunications Policy:353-368.
Piller, Charles. (1993, July). "Bosses with X-ray eyes". Macworld:118-123.
Piller Charles. (1993, July). "Privacy in peril". Macworld:124-130.
Privacy and Accuracy Issues in Network Information Center Databases. (1992, July). . Network Working Group. J. Curran. Request for Comments: 1355 NNSC. FYI: 15 A. Marine. (Menlo Park, CA: SR.I).
Privacy Protection Study Commission. (1977). Personal Privacy in an Information Society. Washington, D.C.: GPO.
Rosenberg, Ronni. (1989, january). "Privacy in the computer age". Palo Alto, CA: Computer Professionals for Social Responsibility, ([No.CL-100-3]
Rotenberg, Marc. (1992, July 21). "Proposed policy guidelines for the NREN".. Open Forum on Library and Information Service's Roles in the National Research and Education Network (NREN), National Commission on Libraries and Information Science (NCLIS), Washington D.C..
Rule, James B. (1989). "Data Wars: privacy protection in federal policy", pp.7-38 in New Directions in Telecommunications Policy, ed. Paula R. Newberg. (Durham, N.C.:Duke University Press.).
Schiller, Dan; RosaLinda Fregoso. (1991, June). "A private view of the digital world". Telecommunications Policy:195-208.
Schwartz, Michael F. (1993, September). "Internet Resource Discovery at the University of Colorado". IEEE Computer Magazine:____.
Schwartz, Michael F. (1993, Spring). "Resource Discovery and Privacy". Internet Society News, v.2, n.1:16-18.
Trubow, George B. (1990). "Protecting informational privacy in the information age". Northern Illinois Law Review v.10:521-542.
Wolinsky, Carol; James Sylvester. (1992, February). "Privacy in the telecommunications age". Communications of the ACM, v.35, n.2:23-25.
CRYPTOGRAPHY
Banisar, Dave. (1993, July). "Battle for control of encryption technology", IEEE Software:1-3.
Bennett, Charles H.; Gilles Brassard; Artur E. Ekert. (1992, October). "Quantum cryptography". Scientific American, v. 267, n.4:50-57.
Branscomb, Lewis M.; Anne W. Branscomb. (1993, March). "Response to Denning". Communications of the ACM, v. 36, n.3: 37.
Chaum, David. (1992, August) "Achieving electronic privacy". Scientific American :96-101.
Computer Professionals for Social Responsibility. ed. Banisar & Rotenberg. (1993, July 7). The Third CPSR Crypotgraphy and Privacy Conference Source Book. (Washington, D.C.: CPSR).
"Debating Encryption Standards", (1992, July). Communications of the ACM, n.35, n. 7:32-54.
Denning, Dorothy E. (1982). Cryptography and Data Security. (Reading, MA: Addison-Wesley).
Denning, Dorothy E. (1993, March). "To Tap Or Not To Tap?" Communications of the ACM, v.36, n.3: 25-44.
Denning, Dorothy E. (1993, May 11). "Cryptography, Clipper and Capstone". in The Third CPSR Crypotgraphy and Privacy Conference Source Book
Dibble , Julian. (1993, August 3). "Code Warriors: battling for the keys to privacy in the info age". Village Voice:33-37.
Diffie, Whitfield. (1993, May 11). "The impact of a secret cryptographc standard on encryption, privacy, law enforcement, and technology". . in The Third CPSR Crypotgraphy and Privacy Conference Source Book
Kahn, David. (1984, September). "Cryptology and the origins of spread spectrum". IEEE Spectrum:70-80.
Kahn, David. (1967). The Codebreakers: the story of secret writing. (NY: Macmillan).
Levy, Steven. (1993, May/June). "Crypto rebels". Wired: 54-61.
Loen, Larry. (1993, July 1). "Hiding data in plain sight: some key questions about cryptography". EFFector Online 4.05.
Markoff, John. (1993, April 16). "New communication system stirs talk of privacy vs. eavesdropping". New York Times :A1.
Rivest, Ron. (1992, July). "Response to NIST's proposal". Communications of the ACM v.365, n.7:41-47.
Online Resources include: cypherpunks mailing list; Electronic Frontier Foundation archives, CPSR ftp files.; sci-crypt FAQ.
CENSORSHIP/FREEDOM OF SPEECH
Barringer, Felicity. "Electronic bulletin boards need editing. No they don't". New York Times (March 11, 1990).
Canadian Charter of Rights and Freedoms, Constitutional Act, 1982. [available eff.org gopher: Canadian Charter--Full Text]
Cavavos, Edward. "Computer Bulletin Board Systems and the Right of Reply: redefining defamation liability for a new technology." Review of Litigation v.12 (1992):231.
Cisler, Steve. "Protection and the Internet". Matrix News, v. 3, n. 11 (November 1993). [also available via anonymous ftp from ftp.apple.com in the alug/communet directory]
Cutrera, Terri A. "Computer networks, libel, and the First Amendment". Computer Law Journal v.11 (December 1992):555-583.
Electrifying Speech: new communications technologies and traditional civil liberties, Human Rights Watch, 1992. [ftp cpsr.org]
FCC vs. Pacifica Foundation, 438 U.S. 726 (1978).
Feder, B. "Computer messages assailed as anti-semitic". New York Times (October 24, 1991):A21.
Gates, Henry Louis Jr. "Let them talk". The New Republic (September 20 & 27, 1993):37-49.
Hentoff, Nat. Free Speech for Me--But Not for Thee: how the American left and right relentlessly censor each other. NY: HarperPerennial, 1992.
Jacqmotte, Benoit; Michael Broadhurst. �Homolka newsgroup suspended�. The McGill Tribune (November 16-22, 1993):8.
Matsuda, Mari; Charles R. Lawrence III; Richard Delgado; Kimberle Crenshaw. Words That Wound: critical race theory, assaultive speech, and the First Amendment. Boulder, CO: Westview Press, 1993.
Miller, Philip H. "New technology, old problem: determining the First Amendment status of electronic information services". Fordham Law Review, v.61 (1993):1147-1201.
Naughton, Edward J. "Is Cyberspace a public forum?: computer bulletin action". The Georgetown Law Journal, v.81 (1992):409-441.
Perritt, Henry H., Jr. "Tort liability, the First Amendment, and Equal Access to Electronic Networks". Harvard Journal of Law and Technology, v..5 (Spring Issue 1992):65-151.
Samuelson, Pamela. "First Amendment rights for information providers?" (1991, June). Communications of the ACM, v.34, n.6:29-23.
Schwartz, Bryan. "Law and Society column: ...the question of censorship and computer bulletin boards". The Globe and Mail (March 4, 1993):A18.
Smolla, Rodney A. Free Speech in an Open Society. NY: Vintage Books, 1993.
"Technology Bytes Back: censorship and the new communication order". in Index on Censorship 2 (1993):4-16.
Online sources Usenet groups (alt.culture.usenet; [email protected] University of British Columbia. Report of the Task Force on the Appropriate Use of Information Technology. December 1992.
PORNOGRAPHY AND COMPUTERS
Abernathy, Joe. "Sex and the single hacker". Village Voice (March 16, 1993):49.
de Grazia, Edward. Girls Lean Back Everywhere: the law of obscenity and the assault on genius. NY: Vintage Books, 1993.
de Lacey, Justine. "The Sexy Computer". The Atlantic Monthly (July 1987):18-26.
Dworkin, Ronald. "The coming battles over free speech" New York Review of Books (June 11, 1992):56-64.
Fine, Sean. "Confusion about the meaning of porn". The Globe and Mail (March 26, 1993):A7.
Friedman, Matt. "Dirty Downloading". Hour (Montreal). (April 1-7, 1993):8.
Furniss, Maureen. "Sex with a Hard (disk) On: computer bulletin boards and pornography". Wide Angle, v.15, n.2 (April 1993):19-37.
Hunt, Lynn. "Introduction: obscenity and the origins of modernity, 1500-1800", pp. 9-45 in The Invention of Pornography: obscenity and the origins of modernity, 1500-1800. NY: Zone Books, 1993.
Lacey, Liam. "Call me modem, or sex and the single nerd". The Globe and Mail (April 11, 1992).
MacKinnon. Catherine A. Only Words. Cambridge, MA: Harvard University Press, 1993.
Miller vs. California, 413 U.S. 15 (1973)
Moon, Peter. "Network sex: is increasingly explicit material on some computer bulletin boards free speech, or obscenity?" The Globe and Mail (July 20, 1992):6.
Pearson, Ian. "Terminal Sex". Saturday Night (February, 1991):19-25.
Price, Wayne T. "Low-tech problem hits PC networks". U.S.A. Today (August 6, 1993):1. R v. Butler. National Reporter 134:2 (1992):81.
Regina v. Keegstra [1991] 2 W.W.R. 1 (1990) (Can).
Ross, Val. "Glad Day case tests community standards". The Globe and Mail (December 17, 1992):A11.
COMPUTERS AND ACADEMIC FREEDOM
Aggerholm, Barbar. "UW to probe offensive images in computer network". Kitchener Waterloo Record (Tuesday, July 20, 1993).
American Association of University Professors (AAUP). "On Freedom of Expression and Campus Speech Codes". Academe (July/August 1992).
CAF (Computers and Academic Freedom) Archives:[available at ftp eff.org, or through Gopher].Banned Computer Material, 1992; Policy--Examples of the Best Policies;.
Canadian Library Association (CLA). "Statement on Intellectual Freedom�" Adopted 1974, amended 1983 and 1985.
Computers and Academic Freedom Statement--Draft. [available eff.org CAF Statement-Draft; also message ID [email protected]]
Kadie, Carl. "Content: the Academic Freedom Model". Paper presented at Third Conference on Computers, Freedom, and Privacy, Burlingame, California, March 1993.
McCarthy, John. "Attempt at Censorship of Electronic Libraries at
Stanford University".
[Posted in newsgroups:
rec.arts.books,aus.general,news.admin.policy,aus.politics;
From: [email protected] (John McCarthy)Message-ID:
Painter, Joanne. "UNI to look into sexual harassment via computer".
The Age (Australia) (October 5, 1993):8
Shapiro, Bernard. "Memorandum to Executive Heads of All Colleges and
Universities" (September 1992). [available at eff.org: gopher;
Message ID [email protected]. Tuesday, 20 Oct.1992
University of British Columbia (UBC). Report on the Task Force on
the Appropriate Use of Information Technology. Prepared for Dr.
Bernard S. Sheehan, Assoc. VP, Information and Computing Systems
(December 1992). [available via anonymous FTP from ftp.ubc.ca in
/pub/info/ubc/reports/appropriate.use.ps]
University of Illinois at Urbana-Champaign. "Final Report of the
Committee on the Status of Women Graduate Students and Faculty in
the College of Engineering", Marianne Winslett, editor, University
of Illinois at Urbana-Champaign, Urbana, IL, June 30,
1993.[available gopher.eff.org: academic/women-in-eng.uiuc.txt. ]
UWM Post v. Board of Regents of University of Wisconsin, 774 F.
Supp. 1163 (E.D. Wis. 1991)]
Utley, Alison. "JANET harassed by computer porn". Times Higher
Education Supplement (March 5, 1993).
Copyright © 1995 BCLA Information Policy Committee
This page last updated 31 January 1996.