Aiello, J.R., & Kolb, K.J. (1996). Electronic performance monitoring: A risk factor for workplace monitoring. In S.L Sauter & L.R Murphy (Eds.), Organizational risk factors for job stress (pp. 163-179). American Psychological Association.
Benn, S.I. (1988). A theory of freedom . Cambridge: Cambridge University Press.
DeTienne, K.B. (1993). Big brother or friendly coach. Futurist, 27 , 33-37. Garson, B. (1988). The electronic sweatshop . New York: Simon and Shuster.
Glasbeek, H. (1998). Occupational health and safety law. Australian Journal of Labour Law , 11, 95-120.
Magney, J. (1996). Computing and ethics: Control and surveillance versus cooperation and empowerment. In J. Kizza, (Ed.), Social and ethical effects of the computer revolution (pp. 200-209). Jefferson, NC: McFarland & Co.
Miller, A. (1982). Miller s court . New York: Houghton Mifflin.
Miller, S. (1997). Privacy and the Internet. Australian Computer Journal, 29, 12-15.
Miller, S. (1998). Corruption and anti-corruption in the profession of policing. Professional Ethics, 6 (3 & 4), 83-106.
Miller, S., & Weckert, J. (2000). Privacy, the workplace and the Internet. Journal of Business Ethics, 28 (3), 255-265.
Nagel, T. (2002). Concealment and exposure. In T. Nagel (Ed.), Concealment and exposure and other essays . Oxford: Oxford University Press.
Newburn, T. (1999). Understanding and preventing police corruption: Lessons from the literature. Police Research Series , Paper 110. London: Home Office.
Rule, J.B. (1996). High-tech workplace surveillance; what s really new? In D. Lyon & E. Zureik (Eds.), Computers, surveillance and privacy (pp. 66-76). Minneapolis: Minnesota Press.
Warren, S., & Brandeis, L. (1890). The right to privacy. Harvard Law Review, 4 (5), 193-220.