End Notes


1. Simson Garfinkle, Database Nation (O'Reilly & Associates, Inc., 2000), p. 4.

2. Webster's New Collegiate Dictionary (G. & C. Merriam & Co., 1977).

3. Samuel D. Warren and Louis D. Brandeis, "The Right to Privacy," Harvard Law Review, Vol. IV, No. 5 (December 15, 1890).

4. Press release, "Cyber crime bleeds U.S. corporations, survey shows; financial losses from attacks climb for third year in a row," Computer Security Institute (April 7, 2002). Available online at www.gocsi.com/press/20020407.html.

5. Ironically, the author of Solitaire, Wes Cherry, did not receive a single cent for creating his Windows version of the game. "Some program manager in the Windows group saw it and decided to release it with Windows 3.0," Cherry said in an interview with journalist Charles Slocum. "[T]he condition was I did it for free (I was uncompensated other than the use of a computer they provided to work on it during my senior year of college). I probably could have negotiated some kind of one-time payment, but Microsoft really doesn't like to give per-copy royalties unless they absolutely need the technology." Charles B. Slocum, "Solitary Confinement," Written by (February, 2001).

6. 42 U.S.C. 2000e-2(a)(1).

7. Harris v. Forklift Systems, Inc., 510 U.S. 17 (1993) (internal citations and quotations omitted).

8. "Workplace shooting suspect accused of killing seven victims in seven minutes," Court TV website, [n.d.]. Available online at www.courttv.com/trials/mcdermott/background.html.

9. A "phreaker" is someone who breaks into telephone systems, primarily by using equipment or even whistling to fake dial tones.




The Naked Employee. How Technology Is Compromising Workplace Privacy
Naked Employee, The: How Technology Is Compromising Workplace Privacy
ISBN: 0814471498
EAN: 2147483647
Year: 2003
Pages: 93

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net