Page 219 - Privacy in a Cyber Age Policy and Practice
P. 219
NOTES 207
87. “Katie Kindelan, John McCain, and John Kerry Propose ‘Online Privacy
Bill of Rights,’” Social Times (March 10, 2011), http://socialtimes.com/
john-mccain-and-john-kerry-propose-online-privacy-bill-of-rights_b41604.
88. Tony Romm, “Will FTC Get the Funds It Needs to Police Internet?” Politico
(June 3, 2011), http://www.politico.com/news/stories/0611/56134.html.
89. Marcy Peek, “Passing Beyond Identity on the Internet: Espionage and Coun-
terespionage in the Internet Age,” Vermont Law Review 28 (2003): 91, 94.
90. Marcia Stepanek, “Weblining,” Business Week, April 3, 2000, http://www.
businessweek.com/2000/00_14/b3675027.htm.
91. Nicholas Carr, “The Dangers of Web Tracking,” Wall Street Journal, August 7,
2010, W1.
92. Jennifer Golbeck, Christina Robles, and Karen Turner, “Predicting Personality
with Social Media,” CHI Extended Abstracts (2011): 253–62.
Chapter 6
1. James Lewis and Stephen Baker, “The Economic Impact of Cybercrime and Cyber
Espionage,” Center for Strategic and International Studies (July 2013), http://www.
mcafee.com/us/resources/reports/rp-economic-impact-cybercrime.pdf .
2. Michael A. Riley and Ashlee Vance, “China Corporate Espionage Boom
Knocks Wind Out of U.S. Companies,” Bloomberg, http://www.bloomberg.
com/news/2012-03-15/china-corporate-espionage-boom-knocks-wind-out-
of-u-s-companies.html (accessed June 29, 2014).
3. James A. Lewis, “China’s Economic Espionage,” Foreign Affairs, http://www.
foreignaffairs.com/articles/138427/james-a-lewis/chinas-economic-espionage
(accessed June 29, 2014).
4. Sid Kircheimer, “Cybercrime Costs 508,000 U.S. Jobs,” AARP, http://blog.aarp.
org/2013/07/25/cybercrime-costs-508000-u-s-jobs/ (accessed June 29, 2014).
5. Joshua Phillip, “The Staggering Cost of Economic Espionage Against the US,”
The Epoch Times, http://www.theepochtimes.com/n3/326002-the-staggering-
cost-of-economic-espionage-against-the-us/ (accessed June 29, 2014).
6. Carrie Lukas, “It’s Time for the U.S. to Deal with Cyber-Espionage,” US News,
http://www.usnews.com/opinion/articles/2013/06/04/chinas-industrial-
cyberespionage-harms-the-us-economy (accessed June 29, 2014).
7. Jamil Anderlini, Peter Marsh, John Reed, Joseph Menn, Peggy Hollinger, and
Daniel Schäfer, “Industrial Espionage: Data Out of the Door,” Financial Times,
http://www.ft.com/intl/cms/s/0/ba6c82c0-2e44-11e0-8733-00144feabdc0.
html#axzz35DQLxMz4 (accessed June 29, 2014).
8. Danny Yadron, “Companies Wrestle with the Cost of Cybersecurity,” Wall
Street Journal http://online.wsj.com/news/articles/SB10001424052702304834
704579403421539734550 (accessed June 29, 2014).
9. The Economist, “White Hats to the Rescue,” http://www.economist.com/news/
business/21596984-law-abiding-hackers-are-helping-businesses-fight-bad-guys-
white-hats-rescue (accessed June 29, 2014).
10. Business Software Alliance, “Security,” http://www.bsa.org/advocacy/security
(accessed June 29, 2014).