2013 | 4 | 2 | 073-096
Article title

Violence, Law and Culture: The Social Construction of US and European Privacy Identities and Transatlantic Counter-Terrorism Cooperation

Title variants
Languages of publication
Przemoc, prawo i kultura. Społeczna konstrukcja amerykańskiej i europejskiej ochrony tożsamości i transatlantycka współpraca przeciw terroryzmowi
Physical description
  • Department of History and Political Science, Molloy College
  • Allen, Michael. “Stranger than Science Fiction. Edwin Black, IBM, and the Holocaust.” Tecnology & Culture 43 (2002): 150-154.
  • American Civil Liberties Union (ACLU) “Surveillance Under the USA PATRIOT Act. (accessed 12 June 2012).
  • Baldwin, David, ed. Neorealism and Neoliberalism. The Contemporary Debate. Cambridge, 1993.
  • Beckman, James. Comparative Legal Approaches to Homeland Security and Anti-Terrorism (Ash-gate, 2007).
  • Bennett, Colin J. and Charles Raab. The Governance of Privacy. Ashgate, 2003.
  • Bignami, Francesca. “Privacy and Law Enforcement in the European Union: The Data Retention Directive.” Chicago Journal of International Law 8 (2007): 233-255.
  • Bunyan, Tony. Trevi, Europol and the European State. (1993). (accessed 2 September 2012).
  • Buzan, Barry. “New Patterns of Global Security in the Twenty-First Century,” International Affairs 67 (2001): 431-451.
  • Cannataci, J. “Privacy, Technology Law and Religions Across Cultures.” Journal of Law and Technology 1 (2009). (ac-cess¬ed 20 September 2012).
  • Center for Democracy and Technology. “Existing Federal Privacy Laws.” privacy/guide/protect/laws.php (accessed 10 September 2012).
  • Church Committee, Intelligence Activities and the Rights of Americans: 1976 US Senate Report on Illegal Wiretaps and Domestic Spying by the FBI, CIA and NSA.
  • Collins, Stephen. “Dissuading State Support of Terrorism: Strikes or Sanctions? Studies in Conflict & Terrorism (2004): 1-18.
  • Committee of Experts on Terrorism (CODEXTER) Council of Europe. “Profiles on Counter-Terrorist Capacity, France.” June 2006. profiles_en.asp (accessed 15 September 2012).
  • Coors, Corinna. “Headwind from Europe: The New Position of the German courts on Personality Rights after the Judgment of the European Court of Human Rights.” German Law Journal 11 (2010): 527-537.
  • The Economist, “Private Data, Public Rules.” 28 January 2012.
  • European Commission. “Commission proposes a comprehensive reform of the data protection rules.” 25 January 2012 120125_ en.htm (accessed 15 June 2012).
  • Firat, Gamze. A Common Counter-Terrorism Strategy in the European Union? How Member States’ Ideas, Norms and Identities Matter. MA Thesis. Lund University, Department of Political Science (2010).
  • Flaherty, David. Protecting Privacy in Surveillance Societies. University of North Carolina Press, 1992.
  • de Goede, Marieke, “The SWIFT Affair and the Global Politics of European Security.” Journal of Common Market Studies 50 (2012): 214-230.
  • Hart, Jeffrey A. and Sangbae Kim, “Power in the Information Age.” In Jose V. Ciprut, ed. Of Fears and Foes: International Relations in an Evolving Global Political Economy. Praeger, 2001.
  • Hoffman, Bruce. Inside Terrorism. Columbia, 2006.
  • Hoffman, Bruce. “Is Europe Soft on Terrorism?” Foreign Policy 115 (1999): 62-76.
  • Hopf, Ted. “The Promise of Constructivism in International Relations Theory”. International Security 23 (1998): 171-200.
  • Katzenstein, Peter J. “Same War-Different Views: Germany, Japan and Counterterrorism.” International Organization 57 (2003): 731-760.
  • Katzenstein, Peter J. “September 11 in Comparative Perspective: The Antiterrorism Campaigns of Germany and Japan.” International Organization (2002): 45-56.
  • Keohane, Robert O. ed. Neorealism and Its Critics. Cambridge, 1986.
  • Kierkegaard Sylvia. “US War on Terror EU SWIFT(ly) Signs Blank Cheque on EU Data.” Computer Law & Security Review 27 (2011): 451-464.
  • Kobrin, S. “Safe Harbors are Hard to Find: The Transatlantic Data Privacy Dispute, Territorial Jurisdiction and Global Governance.” Review of International Studies 20 (2004): 111-131.
  • van de Linde, Erik, Kevin O’Brien (et al.) “Quick scan of post 9/11 National Counter-Terrorism Policymaking and Implementation in Selected Countries.” RAND Europe. May 2002.
  • Luebke, David Martin, and Sybil Milton. “Locating the Victim: An Overview of Census-Taking, Tabulation Technology, and Persecution in Nazi Germany.” IEEE Annals of the History of Computing 16 (1994): 25-39.
  • MacMaster, Neil. “Identifying ‘Terrorists’ in Paris: A Police Experiment with IBM Machines during the Algerian War.” French Politics, Culture & Society 28 (2010): 23-45.
  • National Security Archive. “Electronic Surveillance From the Cold War to Al-Qaeda.” Briefing Book No. 178. 4 February 2006. NSAEBB/NSAEBB178/ index.htm (accessed 18 September 2012).
  • O’Cinneide, Colm, Myriam Hunter-Henin, Jorg Fedtke, “German Law” in J.M. Smits ed. Encyclopedia of Comparative Law (Elgar, 2006).
  • Post, Robert C. “Three Concepts of Privacy.” Yale Law School Faculty Scholarship Series. Paper 185.
  • Prosser, W. “Privacy”. California Law Review 48.3 (1960): 383-423.
  • Regan, Priscilla M. “Global Privacy Issues.” The International Studies Encyclopedia 2010.
  • Ripoll Servent, Ariadna and Alex MacKenzie, “Is the EP Still a Data Protection Champion? The Case of SWIFT.” Perspectives on European Politics and Society 12 (2011): 390-406.
  • Ruggie, John G. “What Makes the World Hang Together? Neo-utilitarianism and the Social Constructivist Challenge.” International Organization 52 (1998): 855-885.
  • Schoeman, Ferdinand. Privacy and Social Freedom. Cambridge, 1992.
  • Sedgwick, Mark. “Inspiration and the Origins of Global Waves of Terrorism.” Studies in Conflict and Terrorism (2007): 97-112.
  • Seltzer, William. “Population Statistics, the Holocaust, and the Nuremberg Trials.” Population and Development Review 24.3 (1998): 511-552.
  • Seltzer, William and Margo Anderson. Census Confidentiality under the Second War Powers Act (1942-1947). Paper prepared for the Population Association of America Annual Meeting. 29-31 March 2007. PAA2007paper3-12-2007.doc (accessed 18 September 2012).
  • Shapiro, Jeremy and Daniel Byman. “Bridging the Transatlantic Counterterrorism Gap.” The Washington Quarterly 29 (2006): 33-50.
  • Simmel, A. “Privacy.” In D.L.Sills (ed.) International Encyclopedia of the Social Sciences 12. (1968): 480-487.
  • Sorkin, David. “Wilhelm von Humboldt: The Theory and Practice of Self-Formation (Bildung), 1791-1810.” Journal of the History of Ideas 44 (1983): 55-73.
  • Strange, Susan. “Finance, Information and Power.” Review of International Studies 16 (1990), 259-274.
  • Theoharis, Athan. “FBI Surveillance During the Cold War Years: A Constitutional Crisis.” The Public Historian 3 (1981): 4-14.
  • Theoharis, Athan. Abuse of Power: How Cold War Surveillance and Secrecy Shaped the Response to 9/11. Temple University Press, 2011.
  • Transnational Terrorism, Security and the Rule of Law (TTSRL) Case Study: France. 28 October 2008. (WP%206%20Del%2012b).pdf (accessed 15 September 2012)
  • Transnational Terrorism, Security and the Rule of Law (TTSRL) Case Study: Germany. 20 November 2008. publications/Germany%20case%20study%20(WP%206%20Del%2012b).pdf (accessed 15 September 2012).
  • Transnational Terrorism, Security and the Rule of Law (TTSRL) Case Study: Spain. The Ethical Justness of Counter-Terrorism Measures. 27 October 2008. (WP%206%20Del%2012b).pdf (accessed 15 September 2012).
  • Wade, Ariel. “ A New Age of Privacy Protection: A Proposal for an International Personal Data Privacy Treaty.” George Washington International Law Review 659 (2010): 1-15.
  • Waltz, Kenneth. Man, the State, and War. New York, 1959.
  • Waltz, Kenneth. Theory of International Politics. Addison-Wesley, 1979.
  • Warren, Samuel and Louis Brandeis, “The Right to Privacy.” Harvard Law Review 4 (December 1890).
  • Wattellier, Jeremie. “Comparative Legal Responses to Terrorism: Lessons from Europe.” Hastings International and Comparative Law Review 27 (2004): 1-21.
  • Wendt, Alexander. “Anarchy is what states make of it: the social construction of power politics.” International Organization 46 (1992): 391-425.
  • White House Press Secretary, “Privacy Bill of Rights” 23 February 2012 (accessed 15 June 2012).
  • Whitman, James Q. “The Two Western Cultures of Privacy: Dignity versus Liberty.” Yale Law School Faculty Scholarship Series. Paper 649. papers/649 (accessed 10 August 2012)
Document Type
Publication order reference
YADDA identifier
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.