Title |
Author |
Type |
Date |
Words |
GET SMART: HUMAN RIGHTS AND URBAN INTELLIGENCE: A RESPONSE TO GIVENS & LAM. |
Davis, Martha F. |
|
Jun 1, 2020 |
8182 |
GOVERNING PRIVACY IN THE DATAFIED CITY. |
Rubinstein, Ira S.; Petkova, Bilyana |
|
Jun 1, 2020 |
30023 |
SMARTER CITIES OR BIGGER BROTHER? HOW THE RACE FOR SMART CITIES COULD DETERMINE THE FUTURE OF CHINA, DEMOCRACY, AND PRIVACY. |
Givens, John Wagner; Lam, Debra |
|
Jun 1, 2020 |
21253 |
WORKPLACE WELLNESS PROGRAMS: EMPIRICAL DOUBT, LEGAL AMBIGUITY, AND CONCEPTUAL CONFUSION. |
Strassle, Camila; Berkman, Benjamin E. |
|
May 1, 2020 |
21022 |
PRIVACY OR THE POLLS: PUBLIC VOTER REGISTRATION LAWS AS A MODERN FORM OF VOTE DENIAL. |
Sauer, Audrey Paige |
|
Apr 1, 2020 |
11514 |
PROPERTY, PRIVACY, AND JUSTICE GORSUCH'S EXPANSIVE FOURTH AMENDMENT ORIGINALISM. |
Kahn-Fogel, Nicholas A. |
|
Mar 22, 2020 |
19036 |
Data Imperialism: The GDPR's Disastrous Impact on Africa's E-Commerce Markets. |
Mannion, Cara |
|
Mar 1, 2020 |
10088 |
PRIVACY LAW'S FALSE PROMISE. |
Waldman, Ari Ezra |
|
Feb 1, 2020 |
31531 |
Privacy Regulation and Innovation Policy. |
Lev-Aretz, Yafit; Strandburg, Katherine J. |
|
Jan 1, 2020 |
24044 |
BRINGING AN END TO THE WIRETAP ACT AS DATA PRIVACY LEGISLATION. |
Jazzar, Helen |
|
Dec 22, 2019 |
13115 |
Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage. |
Zhang, Yinghui; Zhang, Tiantian; Guo, Rui; Xu, Shengmin; Zheng, Dong |
|
Nov 1, 2019 |
7564 |
A Secure and Efficient ECC-Based Anonymous Authentication Protocol. |
Wang, Feifei; Xu, Guoai; Gu, Lize |
|
Sep 30, 2019 |
10660 |
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. |
Pu, Yuwen; Luo, Jin; Hu, Chunqiang; Yu, Jiguo; Zhao, Ruifeng; Huang, Hongyu; Xiang, Tao |
|
Sep 30, 2019 |
8076 |
CRIMINAL LAW AND DIGITAL TECHNOLOGIES: AN INSTITUTIONAL APPROACH TO RULE CREATION IN A RAPIDLY ADVANCING AND COMPLEX SETTING. |
Fehr, Colton |
|
Sep 1, 2019 |
21203 |
A Trajectory Substitution Privacy Protection Scheme in location-based services. |
Song, Cheng; Zhang, Yadong; Gu, Xinan; Wang, Lei; Liu, Zhizhong |
|
Sep 1, 2019 |
8394 |
PRIVACY'S PAST: THE ANCIENT CONCEPT AND ITS IMPLICATIONS FOR THE CURRENT LAW OF PRIVACY. |
Komamura, Keigo |
|
May 1, 2019 |
13332 |
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication. |
Lu, Tianbo; Meng, Ting; Li, Chao; Dong, Guozhen; Li, Huiyang; Zhang, Jiao; Zhang, Xiaoyan |
|
Apr 30, 2019 |
7151 |
MARKETPLACE OF IDEAS, PRIVACY, AND THE DIGITAL AUDIENCE. |
Tsesis, Alexander |
|
Apr 1, 2019 |
22129 |
Protection of Personal Information Act No. 4 of 2013: Implications for biobanks. |
Staunton, C.; de Stadler, E. |
Report |
Apr 1, 2019 |
3032 |
Artificial Intelligence: Risks to Privacy and Democracy. |
Manheim, Karl; Kaplan, Lyric |
|
Jan 1, 2019 |
29330 |
Private Blockchain-Based Secure Access Control for Smart Home Systems. |
Xue, Jingting; Xu, Chunxiang; Zhang, Yuan |
Report |
Dec 1, 2018 |
9431 |
Young People's Attributions of Privacy Rights and Obligations in Digital Sexting Culture. |
Setty, Emily |
|
Oct 1, 2018 |
9040 |
FOUR PRINCIPLES FOR DIGITAL EXPRESSION (YOU WON'T BELIEVE #3!). |
Citron, Danielle Keats; Richards, Neil M. |
|
Sep 1, 2018 |
15229 |
Legal implications of data sharing in biobanking research in low-income settings: The Nigerian experience. |
Akintola, S.O. |
|
Jul 1, 2018 |
4798 |
THE CONSTITUTIONALITY OF THE RIGHT TO VOLUNTARY ABORTION IN THE UNITED STATES SYSTEM/A CONSTITUCIONALIDADE DO DIREITO AO ABORTO VOLUNTARIO NO SISTEMA NORTE-AMERICANO. |
Pires, Teresinha Ines Teles |
|
Jul 1, 2018 |
14843 |
Consumer Privacy in an Age of Commercial Unmanned Aircraft Systems. |
Hagemann, Ryan |
Essay |
Jun 22, 2018 |
5891 |
Is there such thing as privacy anymore? |
Marasco, James |
|
Jun 7, 2018 |
1079 |
Not the Normal Trans Story: Negotiating Trans Narratives While Crowdfunding at the Margins. |
Fritz, Niki; Gonzales, Amy |
Case study |
Mar 1, 2018 |
8774 |
The Poverty of Privacy: Understanding Privacy Trade-Offs From Identity Infrastructure Users in India. |
Srinivasan, Janaki; Bailur, Savita; Schoemaker, Emrys; Seshagiri, Sarita |
Report |
Mar 1, 2018 |
8954 |
Concerns, Skills, and Activities: Multilayered Privacy Issues in Disadvantaged Urban Communities. |
Li, Xiaoqian; Chen, Wenhong; Straubhaar, Joseph D. |
Report |
Mar 1, 2018 |
9314 |
USERS' SOCIAL TRUST OF SHARING DATA WITH COMPANIES: ONLINE PRIVACY PROTECTION BEHAVIOR, CUSTOMER PERCEIVED VALUE, AND CONTINUOUS USAGE INTENTION. |
Radulescu, Adina |
Report |
Jan 1, 2018 |
2334 |
Criminal Law Principles in California: BALANCING A "RIGHT TO BE FORGOTTEN" WITH A RIGHT TO REMEMBER. |
Keiter, Mitchell |
|
Jan 1, 2018 |
19089 |
Patient Privacy in the Era of Big Data. |
Kayaalp, Mehmet |
Report |
Jan 1, 2018 |
7205 |
A NOT QUITE CONTEMPORARY VIEW OF PRIVACY. |
Epstein, Richard A. |
|
Jan 1, 2018 |
8761 |
GAWKING LEGALLY. |
Manta, Irina D. |
|
Jan 1, 2018 |
2591 |
An Adaptive Window Size Selection Method for Differentially Private Data Publishing over Infinite Trajectory Stream. |
Jo, Geonhyoung; Jung, Kangsoo; Park, Seog |
|
Jan 1, 2018 |
7790 |
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme. |
Ou, Lu; Yin, Hui; Qin, Zheng; Xiao, Sheng; Yang, Guangyi; Hu, Yupeng |
|
Jan 1, 2018 |
7438 |
A Privacy-Preserving Incentive Mechanism for Participatory Sensing Systems. |
Niu, Xiaoguang; Wang, Jiawei; Ye, Qiongzan; Zhang, Yihao |
|
Jan 1, 2018 |
10098 |
Analysis on Matrix GSW-FHE and Optimizing Bootstrapping. |
Zhao, Xiufeng; Mao, Hefeng; Liu, Shuai; Song, Weitao; Zhang, Bo |
|
Jan 1, 2018 |
5606 |
A Clustering K-Anonymity Privacy-Preserving Method for Wearable IoT Devices. |
Liu, Fang; Li, Tong |
|
Jan 1, 2018 |
4514 |
Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS. |
Qiang, Weizhong; Wang, Shizhen; Jin, Hai; Zhong, Jiangying |
|
Jan 1, 2018 |
7863 |
A Probabilistic Privacy Preserving Strategy for Word-of-Mouth Social Networks. |
Jing, Tao; Chen, Qiancheng; Wen, Yingkun |
|
Jan 1, 2018 |
9516 |
The Research of Mobile Location Privacy Protection Access Control Method Based on Game Theory. |
Zheng, Lijuan; Zhang, Linhao; Cui, Meng; Cao, Ning; Ding, Jianrui; Yalemshet, Leul; Nyakonda, Tsepo; |
|
Jan 1, 2018 |
7128 |
Leveraging Mobile Nodes for Preserving Node Privacy in Mobile Crowd Sensing. |
Chen, Qinghua; Zheng, Shengbao; Weng, Zhengqiu |
|
Jan 1, 2018 |
8708 |
SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists. |
Dagelic, Ante; Perkovic, Toni; Vujatovic, Bojan; Cagalj, Mario |
|
Jan 1, 2018 |
10888 |
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services. |
Xiong, Jinbo; Ma, Rong; Chen, Lei; Tian, Youliang; Lin, Li; Jin, Biao |
|
Jan 1, 2018 |
8161 |
Efficient Certificateless Anonymous Multi-Receiver Encryption Scheme without Bilinear Parings. |
Gao, Ronghai; Zeng, Jiwen; Deng, Lunzhi |
|
Jan 1, 2018 |
11323 |
Fuzzy Keyword Search Method over Ciphertexts supporting Access Control. |
Mei, Zhuolin; Wu, Bin; Tian, Shengli; Ruan, Yonghui; Cui, Zongmin |
Report |
Nov 1, 2017 |
12544 |
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection. |
Xu, Yanping; Wu, Chunhua; Zheng, Kangfeng; Niu, Xinxin; Lu, Tianling |
Report |
Sep 1, 2017 |
9943 |
WARRANTLESS OPERATIONS OF PUBLIC USE DRONES: CONSIDERATIONS FOR GOVERNMENT AGENCIES. |
McNeal, Gregory S.; Goodwin, William; Jones, Sezen |
|
Jul 1, 2017 |
8303 |
Biobanks in South Africa: a global perspective on privacy and confidentiality. |
Rheeder, R. |
|
May 1, 2017 |
4303 |
Reprimand issued. |
|
Brief article |
Mar 22, 2017 |
119 |
Revisiting the Open Court Principle in an Era of Online Publication: Questioning Presumptive Public Access to Parties' and Witnesses' Personal Information. |
Bailey, Jane; Burkell, Jacquelyn |
|
Mar 22, 2017 |
16465 |
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities. |
Huang, Qinlong; Wang, Licheng; Yang, Yixian |
Report |
Jan 1, 2017 |
8302 |
"WAR CRIMES" AGAINST PRIVACY: THE JURISDICTION OF DATA AND INTERNATIONAL LAW. |
Morris, P. Sean |
|
Oct 1, 2016 |
16088 |
What intellectual property can learn from informational privacy, and vice versa. |
Liebenau, Diana |
|
Sep 22, 2016 |
11091 |
FDA issues draft guidance for device-makers. |
|
Report |
Jul 1, 2016 |
205 |
Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud. |
Lee, Younho; Kim, Pyung; Park, Yongsu |
Report |
May 1, 2016 |
6804 |
THE NEW RETAIL EXPERIENCE AND ITS UNADDRESSED PRIVACY CONCERNS: HOW RFID AND MOBILE LOCATION ANALYTICS ARE COLLECTING CUSTOMER INFORMATION. |
Farshidi, Ava |
|
Mar 22, 2016 |
10666 |
Dynamic Recognition of Driver's Propensity Based on GPS Mobile Sensing Data and Privacy Protection. |
Wang, Xiaoyuan; Wang, Jianqiang; Zhang, Jinglei; Wang, Jingheng |
Report |
Jan 1, 2016 |
7298 |
The determinants of cloud computing adoption by colleges and universities. |
Klug, William; Bai, Xue |
Report |
Dec 22, 2015 |
5050 |
Privacy as a public good. |
Fairfield, Joshua A.T.; Engel, Christoph |
|
Dec 1, 2015 |
8477 |
Privacy as a public good. |
Fairfield, Joshua A.T.; Engel, Christoph |
|
Dec 1, 2015 |
23742 |
Privacy protection in personalized web search. |
Abinaya, M.; Anand, D. Vijay |
Report |
Jun 1, 2015 |
2417 |
Mining frequent patterns through microaggregation in differential privacy. |
Ni, Z.; Li, Q.M.; Liu, X.Q.; Li, T.; Hou, R. |
Report |
Apr 1, 2015 |
2891 |
Territorial implications of the "right to be forgotten". |
Cosabic, Jasna |
Report |
Apr 1, 2015 |
4947 |
2: How red flags, policies and technology can catch medical identity theft. |
Rhodes, Rob |
|
Apr 1, 2015 |
1530 |
Economic analysis and statistical disclosure limitation. |
Abowd, John M.; Schmutte, Ian M. |
Report |
Mar 22, 2015 |
13621 |
Why data privacy law is (mostly) constitutional. |
Richards, Neil M. |
|
Mar 1, 2015 |
11753 |
Criminal innovation and the warrant requirement: reconsidering the rights-police efficiency trade-off. |
Jacobi, Tonja; Kind, Jonah |
|
Feb 1, 2015 |
8044 |
Criminal innovation and the warrant requirement: reconsidering the rights-police efficiency trade-off. |
Jacobi, Tonja; Kind, Jonah |
|
Feb 1, 2015 |
21347 |
Eight nails into Katz's coffin. |
Etzioni, Amitai |
|
Dec 22, 2014 |
6835 |
Privacy issues in mediated health care disputes and considerations for advocates. |
|
|
Nov 10, 2014 |
696 |
Sexting in context: privacy norms and expectations. |
Hasinoff, Amy Adele; Shepherd, Tamara |
|
Oct 1, 2014 |
8839 |
Data governance in healthcare. |
Peterson, Todd |
|
Oct 1, 2014 |
411 |
THE RIGHT TO BE FORGOTTEN: A STEP IN THE RIGHT DIRECTION FOR CYBERSPACE LAW AND POLICY. |
Cook, Lyndsay |
|
Sep 22, 2014 |
4739 |
Business associate agreements require immediate attention. |
Nye, Sandra G. |
|
Apr 1, 2014 |
748 |
Model's nightmare is now over. |
|
|
Jan 31, 2014 |
654 |
Is data speech? |
Bambauer, Jane |
|
Jan 1, 2014 |
9232 |
Is data speech? |
Bambauer, Jane |
|
Jan 1, 2014 |
22792 |
Towards self-awareness privacy protection for internet of things data collection. |
Wong, Kok-Seng; Kim, Myung Ho |
Report |
Jan 1, 2014 |
6514 |
Privacy, corrective justice, and incrementalism: legal imagination and the recognition of a privacy tort in Ontario. |
Bennett, Thomas D.C. |
|
Sep 1, 2013 |
21222 |
Why-spy? An analysis of privacy and geolocation in the wake of the 2010 Google "Wi-Spy" controversy. |
Chow, Raymond |
|
Mar 22, 2013 |
12896 |
Forensic use of DNA information v. human rights and privacy challenges. |
Parven, Khaleda |
|
Jan 1, 2013 |
11214 |
Influence of Oakes outside the Charter, specifically labour arbitration jurisprudence. |
Khullar, Ritu |
|
Dec 30, 2012 |
7658 |
Your cellphone is spying on you: how the surveillance state co-opted personal technology. |
Bailey, Ronald |
|
Dec 6, 2012 |
2728 |
Media diversity and online advertising. |
Ammori, Marvin; Pelican, Luke |
|
Sep 22, 2012 |
13185 |
Human resource professional ethical perceptions of organizational online monitoring. |
Kaupins, Gundars; Reed, Decateur; Coco, Malcolm; Little, Andrew |
|
Sep 22, 2012 |
5475 |
Are you being tracked: that cellphone in your pocket is actually a sophisticated tracking device, and police departments are using this technology to solve crimes. What does that mean for your right to privacy? |
Smith, Patricia |
|
Sep 3, 2012 |
1046 |
PSP: prospering with digital. |
Tonkery, Dan |
|
Mar 1, 2012 |
834 |
The internet, the law, and privacy in New Zealand: dignity with liberty? |
Barrett, Jonathan; Strongman, Luke |
Report |
Feb 15, 2012 |
6628 |
Home insecurity: two privacy cases hit us where we live. |
Sullum, Jacob |
Column |
Jul 6, 2011 |
671 |
Abortion's still unanswered questions. |
Krause, Kenneth W. |
Column |
Jul 1, 2011 |
2016 |
Supporting Data Use While Protecting the Privacy, Security and Confidentiality of Student Information: A Primer for State Policymakers. |
|
Report |
Jul 1, 2011 |
344 |
America's lived constitution. |
Amar, Akhil Reed |
|
May 1, 2011 |
21794 |
Impact of privacy and confidentiality on valuation: an international perspective. |
Cooper, Tom; Faseruk, Alex; Johnson, Lewis D. |
|
Jul 1, 2010 |
7366 |
The unwelcome cohort: when the sentencing judge invades your bedroom. |
Bux, Elizabeth M. |
|
Feb 1, 2010 |
11504 |
Sources won't dry up without shield laws. |
Campbell, Linda P. |
Viewpoint essay |
Jun 22, 2009 |
337 |
Living in fear is a choice. |
|
|
Nov 2, 2007 |
556 |
Problems and solutions to corporate blogging: model corporate blogging guidelines. |
Ostrander, Benjamin |
|
Jul 1, 2007 |
10045 |
James Otis, Paul Revere, a routine traffic stop and the Massachusetts Supreme Judicial Court: when it comes to drug-detection, it's not who let the dogs out, it's who wouldn't? |
Morris, Ronen |
|
Jan 1, 2007 |
8273 |
JUSTICE AND HOME AFFAIRS: FRATTINI TO REMOVE DEFAMATION CLAUSE FROM 'ROME II'. |
|
|
Feb 1, 2006 |
854 |
Light in the darkness and other celebrations and symbols. |
|
|
Dec 1, 2005 |
2174 |
Australian patient records exempt from privacy law. |
Swartz, Nikki |
Brief Article |
May 1, 2005 |
164 |
Stand & deliver: for records and information management professionals, now is the time for self-assessment, professional betterment, and business execution. |
Kahn, Randolph A. |
|
May 1, 2005 |
3117 |
Who owns business data on personally owned computers? |
Montana, John C. |
|
May 1, 2005 |
3857 |
Nanotechnology, privacy and shifting social conventions. |
MacDonald, Chris |
|
Sep 22, 2004 |
2608 |
The privacy paradox: in keeping with the policy of the Humanist to accommodate the diverse cultural, social, political, and philosophical viewpoints of its readers, this occasional feature allows for the expression of alternative, dissenting, or opposing views on issues previously broached within these pages. |
Furrow, Dwight |
|
May 1, 2004 |
3733 |
American publishers, protesters, and travelers under surveillance. |
Hundley, Rachel |
|
May 1, 2004 |
1001 |
Monitoring privacy. |
Avery, Susan; Greisiger, Mark |
|
Sep 1, 2003 |
1555 |
Queer cheer. (Comment). |
Kim, Richard |
Editorial |
Jul 21, 2003 |
742 |
The right to privacy: What price would you pay for security? (News Special). |
Landauro, Victor |
|
Mar 28, 2003 |
846 |
Smile! You're on mandated camera: across Australia the CCTVs are watching, yet there are no laws to define boundaries of use--are they merely `protecting' us from each other or infringing on our right to privacy and anonymity? (against the current). |
Wilson, Dean |
|
Feb 1, 2003 |
937 |
Who is watching your keystrokes? An analysis of M.G.L. ch. 214 [section] 1B, right to privacy and its effectiveness against computer surveillance. |
McNulty, Janine H. |
|
Jan 1, 2003 |
10715 |
Face the facts: facial recognition technology's troubled past--and troubling future. |
Krause, Michael |
|
Oct 1, 2002 |
3485 |
Librarians Under Siege. |
Flanders, Laura |
Brief Article |
Aug 5, 2002 |
939 |
Reading level of privacy policies on Internet health Web sites. (Brief Report). |
Graber, Mark A.; D'Alessandro, Donna M.; Johnson-West, Jill |
|
Jul 1, 2002 |
3286 |
Privacy rights and public spaces: CCTV and the problem of the "unobservable observer". |
Goold, Benjamin J. |
|
Jan 1, 2002 |
5062 |
We Are Our Genes--Not! How Will Genetic Tests Be Used? |
Churchill, Larry R. |
Brief Article |
Nov 1, 2001 |
409 |
NETWORK LOBBY CONCERNED OVER COUNCIL DATA PROTECTION TALKS. |
|
Brief Article |
May 30, 2001 |
324 |
Face Off Over Facial Recognition. |
GIPS, MICHAEL A. |
|
May 1, 2001 |
3015 |
Medical Privacy, For Now. |
Hustead, Joanne L. |
Brief Article |
May 1, 2001 |
831 |
Just a Needle-Stick Away : DNA TESTING CAN CONVICT THE GUILTY; IT CAN ALSO DESTROY THE PRIVACY OF MILLIONS. |
KIMMELMAN, JONATHAN |
|
Nov 27, 2000 |
2744 |
NATIONAL JUDGES INFO. |
Mauro, Tony |
Brief Article |
Sep 1, 2000 |
302 |
Calif. FPs Endorse Minors' Confidentiality Rights. |
DONOHUE, MAUREEN |
|
Apr 15, 2000 |
317 |
INTERNET HEALTH PRIVACY. |
Frieden, Joyce |
|
Apr 1, 2000 |
132 |
`Don't ask--Please tell': Selection privacy from two perspectives. |
Connerley, Mary L.; Mael, Fred A.; Morath, Ray A. |
|
Dec 1, 1999 |
8846 |
Medical Records. |
Etzioni, Amitai |
|
Mar 1, 1999 |
8341 |
Offshore trusts for asset protection. |
Hein, Cheryl |
|
Jan 1, 1999 |
2952 |
Pushing for privacy. |
Neeley, DeQuendre |
|
Sep 1, 1998 |
1071 |
Walking a tightrope: challenges to news-gathering techniques become new arena for attacks on investigative work. |
Andron, Scott |
|
Sep 1, 1998 |
2086 |
Employee monitoring: privacy in the workplace? |
Mishra, Jitendra M.; Crampton, Suzanne M. |
|
Jun 22, 1998 |
7447 |
Tangled Web pages. |
Doherty, Brian |
|
Nov 1, 1997 |
241 |
Personal but not private: a federal judge strikes down a law restricting access to motor vehicle records. |
Kirtley, Jane |
|
Nov 1, 1997 |
749 |
Mind your own business! |
McCabe, Jane |
Editorial |
Oct 1, 1997 |
356 |
Should a secret tape be kept secret. |
Kirtley, Jane |
|
Oct 1, 1997 |
730 |
Craving for titillating bits erodes privacy, produces gossip-mongering society. |
Chittister, Joan |
Column |
Sep 19, 1997 |
1069 |
Eye of the beholder. |
Brown, Randy |
|
Jul 1, 1997 |
768 |
Woman's grief raises questions about public's right to know vs. privacy. |
Mollenkamp, Becky |
|
Apr 1, 1997 |
670 |
Big brother is watching. |
Lewis, Len |
|
Feb 1, 1997 |
2709 |
The madhatter project. |
Hultkrans, Andrew |
|
Oct 1, 1996 |
1470 |
Responding to privacy concerns of consumers. |
Kakalik, John S.; Wright, Marie A. |
|
Sep 22, 1996 |
2504 |
Anonymity, autonomy, and accountability: challenges to the First Amendment in cyberspaces. |
Branscomb, Anne Wells |
|
May 1, 1995 |
20014 |
Privacy on the poverty beat. |
Siegal, John |
|
Jun 25, 1994 |
1816 |
Photos, captions frequently test privacy boundaries. |
Cunningham, Richard P. |
Column |
Jul 1, 1993 |
1064 |
Crime victims and the media; press coverage has a lasting impact on their lives. |
Gersh, Debra |
|
Sep 26, 1992 |
1821 |
Protecting privacy in the face of technology. |
Johnson, Tom |
|
May 1, 1992 |
478 |
Protecting privacy. |
Rotenberg, Marc |
Column |
Apr 1, 1992 |
788 |
Privacy versus database statistics. |
|
|
Nov 16, 1991 |
374 |
Party line of the 90's. |
Bernie, Thomas |
|
Dec 1, 1990 |
6080 |
Press and public collide as concern over privacy rises. |
Hartman, Mitchell |
|
Nov 1, 1990 |
2858 |
When to say someone is gay. |
Hartman, Mitchell |
|
Nov 1, 1990 |
629 |
If you're allergic to animals, don't go to the zoo: reflections on the Donna Rice affair, Cincinnati episode. |
Swislow, William |
|
Jan 1, 1989 |
3755 |