Page 208 - Privacy in a Cyber Age Policy and Practice
P. 208
196 NOTES
24. Shaun B. Spencer, “Reasonable Expectations and the Erosion of Privacy,” San
Diego Law Review 39 (2002): 843.
25. Amitai Etzioni, How Patriotic Is the Patriot Act?: Freedom Versus Security in the
Age of Terrorism (New York: Routledge, 2004).
26. Lior Jacob Strahilevitz, “A Social Networks Theory of Privacy,” John M.
Olin Law & Economics. Working Paper no. 230, available at http://www
.law.uchicago.edu/.
27. David W. Cunis, “Note, California v. Greenwood: Discarding the Traditional
Approach to the Search and Seizure of Garbage,” Catholic University Law
Review 38 (1989): 543, 565.
28. “State Trooper, Fired for Associating with KKK, Argues for Job Back,” Wall
Street Journal, March 6, 2008; “Patriots Cheerleader Fired After Facebook
Swastika Photo,” Fox News, November 6, 2008; “Facebook Chat Gets 13 Virgin
Airlines Employees Fired,” Bloomberg News, November 1, 2008.
29. “Thirty-Seven Percent of Companies Use Social Networks to Research Poten-
tial Job Candidates, According to New CareerBuilder Survey,” PRNewswire,
April 18, 2012.
30. Laura Vanderkam, “How Social Media Can Affect Your Job Search,” CNN,
October 9, 2012.
31. Jonathan Dame, “Will Employers Still Ask for Facebook Passwords in 2014?”
USA Today, January 10, 2014.
32. Jade Pech, “Social Networking Sites and Selection Decisions: The Impact of
Privacy Settings of Facebook Profiles on Hiring.” Thesis, University of Central
Oklahoma, 2013.
33. Kimberly Dozier, “AP Exclusive: CIA following Twitter, Facebook,” Associated
Press, November 4, 2011.
34. Sean Gallagher, “Staking out Twitter and Facebook, New Service Lets Police
Poke Perps,” Ars Technica (November 13, 2013).
35. California v. Greenwood, 486 U.S. 35 (1988).
36. Thomas K. Clancy, “What Does the Fourth Amendment Protect: Property,
Privacy, or Security?” Wake Forest Law Review 33 (1998): 307, 316–20.
37. Ibid.
38. Helen Nissenbaum, “Privacy as Contextual Integrity,” Washington Law Review
79 (2004): 119.
39. Ibid.
40. United States v. Miller, 425 U.S. 435 (1976).
41. Stephen E. Henderson, “Nothing New under the Sun: A Technologically Ratio-
nal Doctrine of Fourth Amendment Search,” Mercer Law Review 56 (2004–
2005): 510.
42. U.S. Postal Inspection Service, Frequently Asked Questions, accessed at https://
postalinspectors.uspis.gov.
43. Orin S. Kerr, “A User’s Guide to the Stored Communications Act, and a Leg-
islator’s Guide to Amending It,” George Washington Law Review 72 (2004),
http://ssrn.com/abstract=421860.
44. Peter Swire, “Katz Is Dead. Long Live Katz.” Michigan Law Review 102 (2004):
906.