Page 208 - Privacy in a Cyber Age Policy and Practice
P. 208

196  NOTES

           24.  Shaun B. Spencer, “Reasonable Expectations and the Erosion of Privacy,” San
              Diego Law Review 39 (2002): 843.
           25. Amitai Etzioni, How Patriotic Is the Patriot Act?: Freedom Versus Security in the
              Age of Terrorism (New York: Routledge, 2004).
           26.  Lior Jacob Strahilevitz, “A Social Networks Theory of Privacy,”  John M.
              Olin Law & Economics. Working Paper no. 230, available at http://www
              .law.uchicago.edu/.
           27.  David W. Cunis, “Note, California v. Greenwood: Discarding the Traditional
              Approach to the Search and Seizure of Garbage,”  Catholic University Law
              Review 38 (1989): 543, 565.
           28.  “State Trooper, Fired for Associating with KKK, Argues for Job Back,” Wall
              Street Journal, March 6, 2008; “Patriots Cheerleader Fired After Facebook
              Swastika Photo,” Fox News, November 6, 2008; “Facebook Chat Gets 13 Virgin
              Airlines Employees Fired,” Bloomberg News, November 1, 2008.
           29.  “Thirty-Seven Percent of Companies Use Social Networks to Research Poten-
              tial Job Candidates, According to New CareerBuilder Survey,”  PRNewswire,
              April 18, 2012.
           30.  Laura Vanderkam, “How Social Media Can Affect Your Job Search,”  CNN,
              October 9, 2012.
           31.  Jonathan Dame, “Will Employers Still Ask for Facebook Passwords in 2014?”
              USA Today, January 10, 2014.
           32.  Jade Pech, “Social Networking Sites and Selection Decisions: The Impact of
              Privacy Settings of Facebook Profiles on Hiring.” Thesis, University of Central
              Oklahoma, 2013.
           33.  Kimberly Dozier, “AP Exclusive: CIA following Twitter, Facebook,” Associated
              Press, November 4, 2011.
           34.  Sean Gallagher, “Staking out Twitter and Facebook, New Service Lets Police
              Poke Perps,” Ars Technica (November 13, 2013).
           35.  California v. Greenwood, 486 U.S. 35 (1988).
           36.  Thomas K. Clancy, “What Does the Fourth Amendment Protect: Property,
              Privacy, or Security?” Wake Forest Law Review 33 (1998): 307, 316–20.
           37. Ibid.
           38.  Helen Nissenbaum, “Privacy as Contextual Integrity,” Washington Law Review
              79 (2004): 119.
           39. Ibid.
           40.  United States v. Miller, 425 U.S. 435 (1976).
           41.  Stephen E. Henderson, “Nothing New under the Sun: A Technologically Ratio-
              nal Doctrine of Fourth Amendment Search,” Mercer Law Review 56 (2004–
              2005): 510.
           42.  U.S. Postal Inspection Service, Frequently Asked Questions, accessed at https://
              postalinspectors.uspis.gov.
           43.  Orin S. Kerr, “A User’s Guide to the Stored Communications Act, and a Leg-
              islator’s Guide to Amending It,” George Washington Law Review 72 (2004),
              http://ssrn.com/abstract=421860.
           44.  Peter Swire, “Katz Is Dead. Long Live Katz.” Michigan Law Review 102 (2004):
              906.
   203   204   205   206   207   208   209   210   211   212   213