Main Content
Catherine Buni and Soraya Chemaly “The Unsafety Net,” The Atlantic (Oct 9, 2014)
4.5
http://m.theatlantic.com/technology/archive/2014/10/the-unsafety-net-how-social-media-turned-against-women/381261/
Charles Duhigg, "How Companies Learn Your Secrets," NY Times Magazine (Feb 16, 2012)
6.6.2
http://perma.cc/D43P-EG5D
Christian Sandvig, "Corrupt Personalization," Multicast (Jun 26, 2014)
4.8
http://perma.cc/HQQ7-VQRS
Craig Timberg, “Research in India suggests Google search results can influence an election,” Washington Post (May 12, 2014)
4.7
http://perma.cc/5KEX-3Y8G
Dan Geer, “Cybersecurity and National Policy,” Harvard National Security Journal (Jan 10, 2011)
8.2.2
http://perma.cc/T6T2-DWNQ
Dan Geer, “Heartbleed as Metaphor” LawFare (Apr. 21, 2014)
8.3.2
http://perma.cc/RZA3-YNPM
Daniel Solove, "Why Privacy Matters Even if You Have 'Nothing to Hide'," Chronicle of Higher Education (May 15, 2011)
5.2.2
http://perma.cc/HMH8-PTLV
David Carr, “Facebook Offers Life Raft, But Publishers are Wary,” New York Times (Oct 26, 2014)
1.2.5
http://www.nytimes.com/2014/10/27/business/media/facebook-offers-life-raft-but-publishers-are-wary.html?_r=2
Director of National Intelligence, Facts on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence Surveillance Act (Jun 8, 2013)
6.1.1
http://perma.cc/65UT-EUNM
Eric Chabrow, “The Real Aim of U.S. Indictment of Chinese,” GovInfoSecurity (May 20, 2014)
8.4.2
http://perma.cc/VU3X-5KQE
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.