Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2013 | 4 | 2 | 073-096

Article title

Violence, Law and Culture: The Social Construction of US and European Privacy Identities and Transatlantic Counter-Terrorism Cooperation

Title variants

Languages of publication

EN

Abstracts

PL
Przemoc, prawo i kultura. Społeczna konstrukcja amerykańskiej i europejskiej ochrony tożsamości i transatlantycka współpraca przeciw terroryzmowi

Year

Volume

4

Issue

2

Pages

073-096

Physical description

Contributors

  • Department of History and Political Science, Molloy College

References

  • Allen, Michael. “Stranger than Science Fiction. Edwin Black, IBM, and the Holocaust.” Tecnology & Culture 43 (2002): 150-154.
  • American Civil Liberties Union (ACLU) “Surveillance Under the USA PATRIOT Act. http://www.aclu.org/national-security/surveillance-under-usa-patriot-act (accessed 12 June 2012).
  • Baldwin, David, ed. Neorealism and Neoliberalism. The Contemporary Debate. Cambridge, 1993.
  • Beckman, James. Comparative Legal Approaches to Homeland Security and Anti-Terrorism (Ash-gate, 2007).
  • Bennett, Colin J. and Charles Raab. The Governance of Privacy. Ashgate, 2003.
  • Bignami, Francesca. “Privacy and Law Enforcement in the European Union: The Data Retention Directive.” Chicago Journal of International Law 8 (2007): 233-255.
  • Bunyan, Tony. Trevi, Europol and the European State. Statewatch.org (1993). http://www.statewatch.org/news/handbook-trevi.pdf (accessed 2 September 2012).
  • Buzan, Barry. “New Patterns of Global Security in the Twenty-First Century,” International Affairs 67 (2001): 431-451.
  • Cannataci, J. “Privacy, Technology Law and Religions Across Cultures.” Journal of Law and Technology 1 (2009). http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/2009_1/cannataci/ (ac-cess¬ed 20 September 2012).
  • Center for Democracy and Technology. “Existing Federal Privacy Laws.” https://www.cdt.org/ privacy/guide/protect/laws.php (accessed 10 September 2012).
  • Church Committee, Intelligence Activities and the Rights of Americans: 1976 US Senate Report on Illegal Wiretaps and Domestic Spying by the FBI, CIA and NSA.
  • Collins, Stephen. “Dissuading State Support of Terrorism: Strikes or Sanctions? Studies in Conflict & Terrorism (2004): 1-18.
  • Committee of Experts on Terrorism (CODEXTER) Council of Europe. “Profiles on Counter-Terrorist Capacity, France.” June 2006. http://www.coe.int/t/dlapil/codexter/country_ profiles_en.asp (accessed 15 September 2012).
  • Coors, Corinna. “Headwind from Europe: The New Position of the German courts on Personality Rights after the Judgment of the European Court of Human Rights.” German Law Journal 11 (2010): 527-537.
  • The Economist, “Private Data, Public Rules.” 28 January 2012.
  • European Commission. “Commission proposes a comprehensive reform of the data protection rules.” 25 January 2012 http://ec.europa.eu/justice/newsroom/data-protection/news/ 120125_ en.htm (accessed 15 June 2012).
  • Firat, Gamze. A Common Counter-Terrorism Strategy in the European Union? How Member States’ Ideas, Norms and Identities Matter. MA Thesis. Lund University, Department of Political Science (2010).
  • Flaherty, David. Protecting Privacy in Surveillance Societies. University of North Carolina Press, 1992.
  • de Goede, Marieke, “The SWIFT Affair and the Global Politics of European Security.” Journal of Common Market Studies 50 (2012): 214-230.
  • Hart, Jeffrey A. and Sangbae Kim, “Power in the Information Age.” In Jose V. Ciprut, ed. Of Fears and Foes: International Relations in an Evolving Global Political Economy. Praeger, 2001.
  • Hoffman, Bruce. Inside Terrorism. Columbia, 2006.
  • Hoffman, Bruce. “Is Europe Soft on Terrorism?” Foreign Policy 115 (1999): 62-76.
  • Hopf, Ted. “The Promise of Constructivism in International Relations Theory”. International Security 23 (1998): 171-200.
  • Katzenstein, Peter J. “Same War-Different Views: Germany, Japan and Counterterrorism.” International Organization 57 (2003): 731-760.
  • Katzenstein, Peter J. “September 11 in Comparative Perspective: The Antiterrorism Campaigns of Germany and Japan.” International Organization (2002): 45-56.
  • Keohane, Robert O. ed. Neorealism and Its Critics. Cambridge, 1986.
  • Kierkegaard Sylvia. “US War on Terror EU SWIFT(ly) Signs Blank Cheque on EU Data.” Computer Law & Security Review 27 (2011): 451-464.
  • Kobrin, S. “Safe Harbors are Hard to Find: The Transatlantic Data Privacy Dispute, Territorial Jurisdiction and Global Governance.” Review of International Studies 20 (2004): 111-131.
  • van de Linde, Erik, Kevin O’Brien (et al.) “Quick scan of post 9/11 National Counter-Terrorism Policymaking and Implementation in Selected Countries.” RAND Europe. May 2002.
  • Luebke, David Martin, and Sybil Milton. “Locating the Victim: An Overview of Census-Taking, Tabulation Technology, and Persecution in Nazi Germany.” IEEE Annals of the History of Computing 16 (1994): 25-39.
  • MacMaster, Neil. “Identifying ‘Terrorists’ in Paris: A Police Experiment with IBM Machines during the Algerian War.” French Politics, Culture & Society 28 (2010): 23-45.
  • National Security Archive. “Electronic Surveillance From the Cold War to Al-Qaeda.” Briefing Book No. 178. 4 February 2006. http://www.gwu.edu/~nsarchiv/ NSAEBB/NSAEBB178/ index.htm (accessed 18 September 2012).
  • O’Cinneide, Colm, Myriam Hunter-Henin, Jorg Fedtke, “German Law” in J.M. Smits ed. Encyclopedia of Comparative Law (Elgar, 2006).
  • Post, Robert C. “Three Concepts of Privacy.” Yale Law School Faculty Scholarship Series. Paper 185. http://digitalcommons.law.yale.edu/fss_papers/185
  • Prosser, W. “Privacy”. California Law Review 48.3 (1960): 383-423.
  • Regan, Priscilla M. “Global Privacy Issues.” The International Studies Encyclopedia 2010.
  • Ripoll Servent, Ariadna and Alex MacKenzie, “Is the EP Still a Data Protection Champion? The Case of SWIFT.” Perspectives on European Politics and Society 12 (2011): 390-406.
  • Ruggie, John G. “What Makes the World Hang Together? Neo-utilitarianism and the Social Constructivist Challenge.” International Organization 52 (1998): 855-885.
  • Schoeman, Ferdinand. Privacy and Social Freedom. Cambridge, 1992.
  • Sedgwick, Mark. “Inspiration and the Origins of Global Waves of Terrorism.” Studies in Conflict and Terrorism (2007): 97-112.
  • Seltzer, William. “Population Statistics, the Holocaust, and the Nuremberg Trials.” Population and Development Review 24.3 (1998): 511-552.
  • Seltzer, William and Margo Anderson. Census Confidentiality under the Second War Powers Act (1942-1947). Paper prepared for the Population Association of America Annual Meeting. 29-31 March 2007. https://pantherfile.uwm.edu/margo/public/Confidentiality/Seltzer-Anderson PAA2007paper3-12-2007.doc (accessed 18 September 2012).
  • Shapiro, Jeremy and Daniel Byman. “Bridging the Transatlantic Counterterrorism Gap.” The Washington Quarterly 29 (2006): 33-50.
  • Simmel, A. “Privacy.” In D.L.Sills (ed.) International Encyclopedia of the Social Sciences 12. (1968): 480-487.
  • Sorkin, David. “Wilhelm von Humboldt: The Theory and Practice of Self-Formation (Bildung), 1791-1810.” Journal of the History of Ideas 44 (1983): 55-73.
  • Strange, Susan. “Finance, Information and Power.” Review of International Studies 16 (1990), 259-274.
  • Theoharis, Athan. “FBI Surveillance During the Cold War Years: A Constitutional Crisis.” The Public Historian 3 (1981): 4-14.
  • Theoharis, Athan. Abuse of Power: How Cold War Surveillance and Secrecy Shaped the Response to 9/11. Temple University Press, 2011.
  • Transnational Terrorism, Security and the Rule of Law (TTSRL) Case Study: France. 28 October 2008. http://www.transnationalterrorism.eu/tekst/publications/France%20case%20study%20 (WP%206%20Del%2012b).pdf (accessed 15 September 2012)
  • Transnational Terrorism, Security and the Rule of Law (TTSRL) Case Study: Germany. 20 November 2008. http://www.transnationalterrorism.eu/tekst/ publications/Germany%20case%20study%20(WP%206%20Del%2012b).pdf (accessed 15 September 2012).
  • Transnational Terrorism, Security and the Rule of Law (TTSRL) Case Study: Spain. The Ethical Justness of Counter-Terrorism Measures. 27 October 2008.http://www.transnationalterrorism.eu/tekst/publications/Spain%20case%20study%20 (WP%206%20Del%2012b).pdf (accessed 15 September 2012).
  • Wade, Ariel. “ A New Age of Privacy Protection: A Proposal for an International Personal Data Privacy Treaty.” George Washington International Law Review 659 (2010): 1-15.
  • Waltz, Kenneth. Man, the State, and War. New York, 1959.
  • Waltz, Kenneth. Theory of International Politics. Addison-Wesley, 1979.
  • Warren, Samuel and Louis Brandeis, “The Right to Privacy.” Harvard Law Review 4 (December 1890).
  • Wattellier, Jeremie. “Comparative Legal Responses to Terrorism: Lessons from Europe.” Hastings International and Comparative Law Review 27 (2004): 1-21.
  • Wendt, Alexander. “Anarchy is what states make of it: the social construction of power politics.” International Organization 46 (1992): 391-425.
  • White House Press Secretary, “Privacy Bill of Rights” 23 February 2012 http://www.whitehouse.gov/the-press-office/2012/02/23/we-can-t-wait-obama-administration-unveils-blueprint-privacy-bill-rights (accessed 15 June 2012).
  • Whitman, James Q. “The Two Western Cultures of Privacy: Dignity versus Liberty.” Yale Law School Faculty Scholarship Series. Paper 649. http://digitalcommons.law.yale.edu/fss_ papers/649 (accessed 10 August 2012)

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-77c6af32-9234-46d5-8c1e-338689d3bd22
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.