Main Content
Catherine Buni and Soraya Chemaly “The Unsafety Net,” The Atlantic (Oct 9, 2014)
4.5
http://m.theatlantic.com/technology/archive/2014/10/the-unsafety-net-how-social-media-turned-against-women/381261/
Charles Duhigg, "How Companies Learn Your Secrets," NY Times Magazine (Feb 16, 2012)
6.6.2
http://perma.cc/D43P-EG5D
Christian Sandvig, "Corrupt Personalization," Multicast (Jun 26, 2014)
4.8
http://perma.cc/HQQ7-VQRS
Craig Timberg, “Research in India suggests Google search results can influence an election,” Washington Post (May 12, 2014)
4.7
http://perma.cc/5KEX-3Y8G
Dan Geer, “Cybersecurity and National Policy,” Harvard National Security Journal (Jan 10, 2011)
8.2.2
http://perma.cc/T6T2-DWNQ
Dan Geer, “Heartbleed as Metaphor” LawFare (Apr. 21, 2014)
8.3.2
http://perma.cc/RZA3-YNPM
Daniel Solove, "Why Privacy Matters Even if You Have 'Nothing to Hide'," Chronicle of Higher Education (May 15, 2011)
5.2.2
http://perma.cc/HMH8-PTLV
David Carr, “Facebook Offers Life Raft, But Publishers are Wary,” New York Times (Oct 26, 2014)
1.2.5
http://www.nytimes.com/2014/10/27/business/media/facebook-offers-life-raft-but-publishers-are-wary.html?_r=2
Director of National Intelligence, Facts on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence Surveillance Act (Jun 8, 2013)
6.1.1
http://perma.cc/65UT-EUNM
Eric Chabrow, “The Real Aim of U.S. Indictment of Chinese,” GovInfoSecurity (May 20, 2014)
8.4.2
http://perma.cc/VU3X-5KQE
This book, and all H2O books, are Creative Commons licensed for sharing and re-use. Material included from the American Legal Institute is reproduced with permission and is exempted from the open license.