Page 74 - วารสารกฎหมายสิทธิมนุษยชน. ปีที่ 1 ฉบับที่ 1 (มกราคม - เมษายน 2563)
P. 74
72 วารสารกฎหมายสิทธิมนุษยชน
Donnelly, J. (1972). Human Rights and Human Dignity: An Analytic Critique of Non-Western,
Conceptions of Human Rights. American Political Science Review, 76, 303-316.
Electronic Frontier Foundation. (2017, May). Hearing Wednesday: EFF Argues Against
Massive Government Hacking in ‘Playpen’ Case. Electronic Frontier Foundation.
Retrieved from https://www.eff.org/press/releases/hearing-wednesday-eff-argues-
against-massive-government-hacking-playpen-case
Electronic Frontier Foundation. (2016, May). Security Win: Burr-Feinstein Proposal Declared
“Dead” for This Year. Electronic Frontier Foundation. Retrieved from
https://www.eff.org/deeplinks/2016/05/win-one-security-burr-feinstein-proposal-
declared-dead-year
Gavison, R. (1980). Privacy and the Limits of Law. The Yale Law Journal, 89(3), 421-471.
Halboob, W, Alghathbar, K. S., Mahmod, R., Udzir, N. I., Abdullah, M. D., & Deghantanha, A.
(2014). An Efficient Computer Forensics Selective Imaging Model. In J. J. Park, I.
Stojmenovic, M. Choi, & F. Xhafa (Eds.), Future Information Technology, Lecture
Notes in Electrical Engineering, Springer.
Halperin, M. (1975, October). Controlling the Intelligence Agencies. First Principles, I(2).
Hendricks, E., Hayden, T., & Novik, J. D. (1990). Your right to Privacy: A Basic Guide to Legal
Rights in an information Society. US: Southern Illinois University Press.
Kerr, O. (2005). Searches and Seizures in a Digital World. Harvard Law Review, 119, 531:585.
Mensah, B. (2002). European Human Rights Case Summaries. Routledge-Cavendish.
Organization for Economic Co-operation and Development (OECD). (2008). Development of
Policies for Protection of Critical Information Infrastructures, Ministerial
Background Report. In OECD Ministerial Meeting on the Future of the Internet
Economy, Seoul, South Korea.
Posner, R. (1998). Economic analysis of law (5th ed.). U.S.: Aspen Law & Business.
Rowland, D., Kohl, U., & Charlesworth, A. (2012). Information Technology Law
(4th ed.). Routledge.
Salgado, R.P. (2005). Fourth Amendment Search and the Power of the Hash. Harvard
Law Review, 119(38), 38-40
Samuel W. D., & Louis, B. D. (1890). The Right to Privacy. Harvard Law Review, 4(15).
Thongraweewong, K. (2014, May). State Telecommunication Surveillance : A Comparative
Study of the US and Thai Telecommunication Privacy Laws. Paper presented at
the Society of Digital Information and Wireless Communication (SDIWC), IEEE
(Thailand section), University of the Thai Chamber of Commerce.
Van Den Haag, E. (1971). On Privacy. In R. J. Pennock, & J. W. Chapman (Eds.), Privacy,
New York: Atherton.
Wacks, R. (1989). Personal Information : Privacy and the Law. Oxford: Clarendon Press.

