

通訊監察與民主監督
103
Greenwald, G., Poitras, L., & MacAskill, E.
(
2013, September 11
)
.
NSA shares raw intelligence including Americans’ data with Israel.
The Guardian
. Retrieved from
http://www.theguardian.comHardin, L.
(
2014
)
.
The Snowden files: The inside story of the world’s
most wanted man.
London: Vintage.
Harris, D. J., O’Boyle, M., & Warwick, E.
(
1995
)
.
Law of the Euro-
pean Convention on Human Rights.
Oxford, UK: Oxford Uni-
versity Press.
Heymann, P. B.
(
2003
)
.
Terrorism, freedom, and security: Winning
without war
. Cambridge, MA: The MIT Press.
Hoppin, M. B.
(
2012
)
. Overly intimate surveillance: Why emergent
public health surveillance programs deserve strict scrutiny under
the Fourteenth Amendment.
New York University Law Review
,
87, 6: 1950-1995.
James, W., Lin, H. S., & Millett, L. I.
(
2007
)
.
Engaging privacy and
information technology in a digital age.
Washington, DC: The
National Academies Press.
Keller, J., Parlapiano, A., Sanger, D., & Savage, C.
(
2014, January 17
)
.
Obama’s changes to government surveillance.
The New York
Times
. Retrieved from
http://www.nytimes.comKerr, O. S.
(
2012
)
. The mosaic theory of the Fourth Amendment.
Michigan Law Review,
111, 3: 311-354.
Lemmens, K.
(
2003
)
. The protection of privacy between a rights-nased
and a freedom-based approach: What the Swiss example can
teach us.
Maastricht Journal of European and Comparative Law,
10, 4: 381-404.
Lyall, S.
(
2008, December 4
)
. European Court Rules against Britain’s
policy of deeping DNA databases of suspects.
The New York
Times
. Retrieved from
http://www.nytimes.comLyon, D.
(
2007
)
.
Surveillance studies: An overview.
Cambridge, UK:
Polity.
Lyon, D.
(
2009
)
. Surveillance, power, and everyday life. In C. Avgerou,
R. Mansell, D. Quah, & R. Silverstone
(
Eds.
)
,
The Oxford
handbook of information and communication technologies
(
pp.