Page 74 - วารสารกฎหมายสิทธิมนุษยชน. ปีที่ 1 ฉบับที่ 1 (มกราคม - เมษายน 2563)
P. 74

72          วารสารกฎหมายสิทธิมนุษยชน




            Donnelly, J. (1972). Human Rights and Human Dignity: An Analytic Critique of Non-Western,
                   Conceptions of Human Rights.  American Political Science Review, 76, 303-316.
            Electronic Frontier Foundation. (2017, May). Hearing Wednesday: EFF Argues Against
                   Massive Government Hacking in ‘Playpen’ Case. Electronic Frontier Foundation.
                   Retrieved from https://www.eff.org/press/releases/hearing-wednesday-eff-argues-
                   against-massive-government-hacking-playpen-case
            Electronic Frontier Foundation. (2016, May). Security Win: Burr-Feinstein Proposal Declared
                   “Dead” for This Year. Electronic Frontier Foundation. Retrieved from
                   https://www.eff.org/deeplinks/2016/05/win-one-security-burr-feinstein-proposal-
                   declared-dead-year
            Gavison, R. (1980). Privacy and the Limits of Law. The Yale Law Journal, 89(3), 421-471.
            Halboob, W, Alghathbar, K. S., Mahmod, R., Udzir, N. I., Abdullah, M. D., & Deghantanha, A.
                   (2014). An Efficient Computer Forensics Selective Imaging Model. In J. J. Park, I.
                   Stojmenovic, M. Choi, & F. Xhafa (Eds.), Future Information Technology, Lecture
                   Notes in Electrical Engineering, Springer.
            Halperin, M. (1975, October). Controlling the Intelligence Agencies. First Principles, I(2).
            Hendricks, E., Hayden, T., & Novik, J. D. (1990). Your right to Privacy: A Basic Guide to Legal
                   Rights in an information Society. US: Southern Illinois University Press.
            Kerr, O. (2005). Searches and Seizures in a Digital World. Harvard Law Review, 119, 531:585.
            Mensah, B. (2002). European Human Rights Case Summaries. Routledge-Cavendish.
            Organization for Economic Co-operation and Development (OECD). (2008). Development of
                   Policies for Protection of Critical Information Infrastructures, Ministerial
                   Background Report. In OECD Ministerial Meeting on the Future of the Internet
                   Economy, Seoul, South Korea.
            Posner, R. (1998). Economic analysis of law (5th ed.). U.S.: Aspen Law & Business.
            Rowland, D., Kohl, U., & Charlesworth, A. (2012). Information Technology Law
                   (4th ed.). Routledge.
            Salgado, R.P. (2005). Fourth Amendment Search and the Power of the Hash. Harvard
                   Law Review, 119(38), 38-40
            Samuel W. D., & Louis, B. D. (1890). The Right to Privacy. Harvard Law Review, 4(15).
            Thongraweewong, K. (2014, May).  State Telecommunication Surveillance : A Comparative
                   Study of the US and Thai Telecommunication Privacy Laws. Paper presented at
                   the Society of Digital Information and Wireless Communication (SDIWC), IEEE
                   (Thailand section), University of the Thai Chamber of Commerce.
            Van Den Haag, E. (1971). On Privacy. In R. J. Pennock, & J. W. Chapman (Eds.), Privacy,
                   New York: Atherton.
            Wacks, R. (1989). Personal Information : Privacy and the Law. Oxford: Clarendon Press.
   69   70   71   72   73   74   75   76   77   78   79