메뉴 건너뛰기




Volumn 23, Issue 2, 2013, Pages 81-97

Portable Digital Devices: Meeting Challenges to Psychotherapeutic Privacy

Author keywords

confidentiality; digital devices; privacy; psychotherapy; technology

Indexed keywords


EID: 84874606144     PISSN: 10508422     EISSN: None     Source Type: Journal    
DOI: 10.1080/10508422.2012.722502     Document Type: Review
Times cited : (5)

References (105)
  • 1
    • 84874598188 scopus 로고    scopus 로고
    • Absolute Software. (n.d.)
    • Absolute Software. (n.d.). Computrace data protection [Software]. http://www.absolute.com/en/products/computrace/features.aspx (http://www.absolute.com/en/products/computrace/features.aspx)
    • Computrace data protection [Software]
  • 2
    • 84874635644 scopus 로고
    • 395 Mass. 59, 479 N.E.2d 113
    • Alberts v. Devine, 395 Mass. 59, 479 N.E.2d 113 (1985)
    • (1985) Alberts v.D
  • 4
    • 33845658747 scopus 로고    scopus 로고
    • American Association for Marriage and Family Therapy
    • American Association for Marriage and Family Therapy. (2001). Code of ethics. http://www.aamft.org/imis15/content/legal_ethics/code_of_ethics.aspx (http://www.aamft.org/imis15/content/legal_ethics/code_of_ethics.aspx)
    • (2001) Code of ethics
  • 5
    • 84874605479 scopus 로고    scopus 로고
    • Code of ethics
    • American Counseling Association
    • American Counseling Association. 2005. "Code of ethics". In Journal of Counseling & Development, 84 235-254. doi:10.1002/j.1556-6678.2006.tb00401.x
    • (2005) Journal of Counseling & Development, 84 , pp. 235-254
  • 6
    • 0036986634 scopus 로고    scopus 로고
    • Ethical principles of psychologists and code of conduct
    • American Psychological Association
    • American Psychological Association. 2002. Ethical principles of psychologists and code of conduct. American Psychologist, 57: 1060-1073.
    • (2002) American Psychologist , vol.57 , pp. 1060-1073
  • 7
    • 77958197540 scopus 로고    scopus 로고
    • Report of the Ethics Committee, 2009
    • American Psychological Association, Ethics Committee
    • American Psychological Association, Ethics Committee. 2010. Report of the Ethics Committee, 2009. American Psychologist, 65: 483-492. doi:10.1037/a0019515
    • (2010) American Psychologist , vol.65 , pp. 483-492
  • 8
    • 84874588959 scopus 로고    scopus 로고
    • Report of the Ethics Committee, 2010
    • American Psychological Association, Ethics Committee
    • American Psychological Association, Ethics Committee. 2011. Report of the Ethics Committee, 2010. American Psychologist, 66: 393-403. doi:10.1037/a0024003
    • (2011) American Psychologist , vol.66 , pp. 393-403
  • 10
    • 84874593566 scopus 로고    scopus 로고
    • Global position system and the Internet: A combination with privacy risks
    • Balough, R. C. 2001. Global position system and the Internet: A combination with privacy risks. Chicago Bar Association Record, 15: 28-29.
    • (2001) Chicago Bar Association Record , vol.15 , pp. 28-29
    • Balough, R.C.1
  • 13
    • 0026035852 scopus 로고
    • Effects of statutes requiring psychiatrists to report suspected sexual abuse of children
    • Berlin, F. S., Malin, H. and Dean, S. 1991. Effects of statutes requiring psychiatrists to report suspected sexual abuse of children. The American Journal of Psychiatry, 148: 449-453.
    • (1991) The American Journal of Psychiatry , vol.148 , pp. 449-453
    • Berlin, F.S.1    Malin, H.2    Dean, S.3
  • 14
    • 84874629475 scopus 로고    scopus 로고
    • Biddle v. Warren Gen. Hosp., 715 N.E.2d 518 (Ohio, 1999)
    • Biddle v. Warren Gen. Hosp., 715 N.E.2d 518 (Ohio, 1999)
  • 15
    • 84874637188 scopus 로고    scopus 로고
    • BlackBerry Knowledge Base
    • BlackBerry Knowledge Base. (2011). Actions performed by the BlackBerry smartphone during the removal of stored user and application data. http://btsc.webapps.blackberry.com/btsc/microsites/search.do?cmd=displayKC&docType=kc&externalId=KB16307&sliceId=1&docTypeID=DT_SUPPORTISSUE_1_1&dialogID=111365201&stateId=1%200%20111768751 (http://btsc.webapps.blackberry.com/btsc/microsites/search.do?cmd=displayKC&docType=kc&externalId=KB16307&sliceId=1&docTypeID=DT_SUPPORTISSUE_1_1&dialogID=111365201&stateId=1%200%20111768751)
    • (2011) Actions performed by the BlackBerry smartphone during the removal of stored user and application data
  • 16
    • 51049119187 scopus 로고    scopus 로고
    • Privacy in an age of terabytes and terror
    • (August 18)
    • Brown, P. (2008, August 18). Privacy in an age of terabytes and terror. Scientific American. http://www.scientificamerican.com/article.cfm?id=privacy-in-an-age (http://www.scientificamerican.com/article.cfm?id=privacy-in-an-age)
    • (2008) Scientific American
    • Brown, P.1
  • 19
    • 84874638583 scopus 로고    scopus 로고
    • Carbonite.com
    • Carbonite.com. (2011). Carbonite data security practices. http://www.carbonite.com/en/files/carbonite-data-security-practices.pdf (http://www.carbonite.com/en/files/carbonite-data-security-practices.pdf)
    • (2011) Carbonite data security practices
  • 20
    • 38649123675 scopus 로고    scopus 로고
    • Practicing safer Listserv use: Ethical use of an invaluable resource
    • Collins, L. H. 2007. Practicing safer Listserv use: Ethical use of an invaluable resource. Professional Psychology: Research and Practice, 38: 690-698.
    • (2007) Professional Psychology: Research and Practice , vol.38 , pp. 690-698
    • Collins, L.H.1
  • 21
    • 84863986619 scopus 로고    scopus 로고
    • comScore, (October 20)
    • comScore. (2011, October 20). Social networking on-the-go: U.S. mobile social media audience grows 37 Percent in the past year. http://www.comscore.com/Press_Events/Press_Releases/2011/10/Social_Networking_On-The-Go_U.S._Mobile_Social_Media_Audience_Grows_37_Percent_in_the_Past_Year (http://www.comscore.com/Press_Events/Press_Releases/2011/10/Social_Networking_On-The-Go_U.S._Mobile_Social_Media_Audience_Grows_37_Percent_in_the_Past_Year)
    • (2011) Social networking on-the-go: U.S. mobile social media audience grows 37 Percent in the past year
  • 22
    • 84874608537 scopus 로고    scopus 로고
    • Study: Hacking passwords easy as 123456
    • (January 21)
    • Coursey, D. (2010, January 21). Study: Hacking passwords easy as 123456. PCWorld. http://www.pcworld.com/businesscenter/article/187354/study_hacking_passwords_easy_as_123456.html (http://www.pcworld.com/businesscenter/article/187354/study_hacking_passwords_easy_as_123456.html)
    • (2010) PCWorld
    • Coursey, D.1
  • 24
    • 84873652329 scopus 로고    scopus 로고
    • Encryption. (n.d.)
    • Encryption. (n.d.). In Free Dictionary. http://www.thefreedictionary.com/encryption (http://www.thefreedictionary.com/encryption)
    • In Free Dictionary
  • 25
    • 0346271512 scopus 로고    scopus 로고
    • Empirical support for the United States Supreme Court's protection of the psychotherapist-patient privilege
    • Evans-Marsh, J. 2003. Empirical support for the United States Supreme Court's protection of the psychotherapist-patient privilege. Ethics and Behavior, 13: 385-400.
    • (2003) Ethics and Behavior , vol.13 , pp. 385-400
    • Evans-Marsh, J.1
  • 28
    • 84874591871 scopus 로고    scopus 로고
    • (November 17)
    • Fox, Z. (2011, November 17). 25 worst passwords of 2011. http://mashable.com/2011/11/17/worst-internet-passwords/ (http://mashable.com/2011/11/17/worst-internet-passwords/)
    • (2011) 25 worst passwords of 2011
    • Fox, Z.1
  • 29
    • 3042825662 scopus 로고    scopus 로고
    • Remembrance of data past: A study of disk sanitization practices
    • Garfinkel, S. and Shelat, A. 2003. Remembrance of data past: A study of disk sanitization practices. IEEE Security & Privacy, 1: 17-27.
    • (2003) IEEE Security & Privacy , vol.1 , pp. 17-27
    • Garfinkel, S.1    Shelat, A.2
  • 31
    • 84874584960 scopus 로고    scopus 로고
    • Fame is no laughing matter for the Star Wars Kid
    • (May 19)
    • Harmon, A. (2003, May 19). Fame is no laughing matter for the "Star Wars Kid." The New York Times. http://www.nytimes.com/2003/05/19/technology/19DORK.html (http://www.nytimes.com/2003/05/19/technology/19DORK.html)
    • (2003) The New York Times
    • Harmon, A.1
  • 32
    • 84874634326 scopus 로고    scopus 로고
    • Locating mobile phones through pinging and triangulation
    • (July 1)
    • Harrell, S. (2008, July 1). Locating mobile phones through pinging and triangulation, Pursuit Magazine. http://pursuitmag.com/locating-mobile-phones-through-pinging-and-triangulation/ (http://pursuitmag.com/locating-mobile-phones-through-pinging-and-triangulation/)
    • (2008) Pursuit Magazine
    • Harrell, S.1
  • 33
    • 84874616657 scopus 로고    scopus 로고
    • Is email privacy an oxymoron? Meeting the challenges of formulating a company email policy
    • Harris, M. S. 2002. Is email privacy an oxymoron? Meeting the challenges of formulating a company email policy. St. John's Journal of Legal Commentary, 16: 553-567.
    • (2002) St. John's Journal of Legal Commentary , vol.16 , pp. 553-567
    • Harris, M.S.1
  • 37
    • 84874633295 scopus 로고    scopus 로고
    • HITECH Breach Notification Guidance and Request for Public Comment, 74 Fed. Reg. 19006 (proposed April 27, 2009) (to be codified at 45 C.F.R. pts. 160 and 164)
    • HITECH Breach Notification Guidance and Request for Public Comment, 74 Fed. Reg. 19006 (proposed April 27, 2009) (to be codified at 45 C.F.R. pts. 160 and 164)
  • 38
    • 33947218255 scopus 로고    scopus 로고
    • In sickness, health and cyberspace: Protecting the security of electronic private health information
    • Hoffman, S. and Podgurski, A. 2007. In sickness, health and cyberspace: Protecting the security of electronic private health information. Boston College Law Review, 48: 331-386.
    • (2007) Boston College Law Review , vol.48 , pp. 331-386
    • Hoffman, S.1    Podgurski, A.2
  • 39
    • 79955004602 scopus 로고    scopus 로고
    • Regulation and public policy in the full deployment of the enhanced emergency call system (E-911) and their influence on wireless cellular and other technologies
    • Holloway, J. E., Seeman, E., O'Hara, M. and Forst, A. 2006. Regulation and public policy in the full deployment of the enhanced emergency call system (E-911) and their influence on wireless cellular and other technologies. Boston University Journal of Science & Technology Law, 12: 93-126.
    • (2006) Boston University Journal of Science & Technology Law , vol.12 , pp. 93-126
    • Holloway, J.E.1    Seeman, E.2    O'Hara, M.3    Forst, A.4
  • 41
    • 84860658310 scopus 로고    scopus 로고
    • InSites Consulting. (September 14)
    • InSites Consulting. (2011, September 14). Social media around the world 2011. http://www.slideshare.net/stevenvanbelleghem/social-media-around-the-world-2011 (http://www.slideshare.net/stevenvanbelleghem/social-media-around-the-world-2011)
    • (2011) Social media around the world 2011
  • 42
    • 68249117889 scopus 로고    scopus 로고
    • International Telecommunication Union., Retrieved from the International Telecommunication Union website
    • International Telecommunication Union. (2008). Measuring the information society: The ICT Development Index. Retrieved from the International Telecommunication Union website http://www.itu.int/ITU-/ict/publications/idi/2009/material/IDI2009_w5.pdf (http://www.itu.int/ITU-/ict/publications/idi/2009/material/IDI2009_w5.pdf)
    • (2008) Measuring the information society: The ICT Development Index
  • 43
    • 33745647277 scopus 로고    scopus 로고
    • Store it on the Web
    • (June 2)
    • Jacobi, J., & Larkin, E. (2006, June 2). Store it on the Web. PCWorld. http://www.pcworld.com/article/125729/store_it_on_the_web.html (http://www.pcworld.com/article/125729/store_it_on_the_web.html)
    • (2006) PCWorld
    • Jacobi, J.1    Larkin, E.2
  • 44
    • 79959433819 scopus 로고    scopus 로고
    • Retrieved from National Institute for Standards and Technology, U.S. Department of Commerce website, (January)
    • Jansen, W., & Grance, T. (2011, January). Guidelines on security and privacy in public cloud computing (Draft Special Publication 800-144). Retrieved from National Institute for Standards and Technology, U.S. Department of Commerce website http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800-144_cloud-computing.pdf (http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800-144_cloud-computing.pdf)
    • (2011) Guidelines on security and privacy in public cloud computing (Draft Special Publication 800-144)
    • Jansen, W.1    Grance, T.2
  • 45
    • 73049088943 scopus 로고    scopus 로고
    • Liability for all, privacy for none: The conundrum of protecting privacy rights in a pervasively electronic world
    • Joyce, F. M. and Bigart, A. E. 2007. Liability for all, privacy for none: The conundrum of protecting privacy rights in a pervasively electronic world. Valparaiso University Law Review, 41: 1481-1514.
    • (2007) Valparaiso University Law Review , vol.41 , pp. 1481-1514
    • Joyce, F.M.1    Bigart, A.E.2
  • 46
    • 84874616958 scopus 로고    scopus 로고
    • Retrieved from 10th Annual Security and Privacy Conference, (February 4)
    • Karbaliotis, C. (2009, February 4). Laptops, BlackBerries, and borders: Panel presentation [PowerPoint slides]. Retrieved from 10th Annual Security and Privacy Conference http://www.cio.gov.bc.ca/services/security/library/conferences/2009/Presentations/Karbaliotis_Constantine_Symantec-Laptops,Blackberries&BorderV0-3.pdf (http://www.cio.gov.bc.ca/services/security/library/conferences/2009/Presentations/Karbaliotis_Constantine_Symantec-Laptops,Blackberries&BorderV0-3.pdf)
    • (2009) Laptops, BlackBerries, and borders: Panel presentation [PowerPoint slides]
    • Karbaliotis, C.1
  • 47
    • 84874643560 scopus 로고    scopus 로고
    • Hi-tech in the law office: We're all confronted by the mobile security sieve
    • Kashi, J. 2004. Hi-tech in the law office: We're all confronted by the mobile security sieve. The Alaska Bar Rag, 28: 26-31.
    • (2004) The Alaska Bar Rag , vol.28 , pp. 26-31
    • Kashi, J.1
  • 48
    • 84874586627 scopus 로고    scopus 로고
    • How to: Wipe your old iPad/iPhone/iPod ready for resale
    • (March 11)
    • Kingsley-Hughes, A. (2011, March 11). How to: Wipe your old iPad/iPhone/iPod ready for resale. ZDNet. http://www.zdnet.com/blog/hardware/how-to-wipe-your-old-ipadiphoneipod-touch-ready-for-resale/11839 (http://www.zdnet.com/blog/hardware/how-to-wipe-your-old-ipadiphoneipod-touch-ready-for-resale/11839)
    • (2011) ZDNet
    • Kingsley-Hughes, A.1
  • 49
    • 84874608110 scopus 로고    scopus 로고
    • (January 27)
    • Kline, M. (2011, January 27). The parade of PHI security breaches: Escalating enforcement activity by state attorneys general-most recently in Vermont [Web log message]. http://hipaahealthlaw.foxrothschild.com/2011/01/articles/hipaa-enforcement/the-parade-of-phi-security-breaches-escalating-enforcement-activity-by-state-attorneys-general-most-recently-in-vermont/ (http://hipaahealthlaw.foxrothschild.com/2011/01/articles/hipaa-enforcement/the-parade-of-phi-security-breaches-escalating-enforcement-activity-by-state-attorneys-general-most-recently-in-vermont/)
    • (2011) The parade of PHI security breaches: Escalating enforcement activity by state attorneys general-most recently in Vermont [Web log message]
    • Kline, M.1
  • 50
    • 84874621884 scopus 로고    scopus 로고
    • Kill your phone remotely
    • (September 11)
    • Lendino, J. (2009, September 11). Kill your phone remotely. PCMag.com. http://www.pcmag.com/article2/0,2817,2352755,00.asp (http://www.pcmag.com/article2/0,2817,2352755,00.asp)
    • (2009) PCMag.com
    • Lendino, J.1
  • 51
    • 83755175326 scopus 로고    scopus 로고
    • Your voice mail may be even less secure than you thought
    • (August 19)
    • Lieber, R. (2011, August 19). Your voice mail may be even less secure than you thought. The New York Times, p. B1. http://www.nytimes.com/2011/08/20/your-money/your-phone-may-be-less-secure-than-you-thought.html?pagewanted=2&_r=1 (http://www.nytimes.com/2011/08/20/your-money/your-phone-may-be-less-secure-than-you-thought.html?pagewanted=2&_r=1)
    • (2011) The New York Times
    • Lieber, R.1
  • 52
    • 84874643845 scopus 로고    scopus 로고
    • Current development: The potential effects of United States v. Councilman on the confidentiality of attorney-client email communications
    • Liebesman, Y. J. 2005. Current development: The potential effects of United States v. Councilman on the confidentiality of attorney-client email communications. Georgetown Journal of Legal Ethics, 18: 693-922.
    • (2005) Georgetown Journal of Legal Ethics , vol.18 , pp. 693-922
    • Liebesman, Y.J.1
  • 53
    • 84874595525 scopus 로고    scopus 로고
    • MacDonald v. Klinger, 84 A.D.2d 482 (1982)
    • MacDonald v. Klinger, 84 A.D.2d 482 (1982)
  • 54
    • 0034754483 scopus 로고    scopus 로고
    • E-therapy: Practical, ethical and legal issues
    • Manhal-Baugus, M. 2001. E-therapy: Practical, ethical and legal issues. CyberPsychology & Behavior, 4: 551-563.
    • (2001) CyberPsychology & Behavior , vol.4 , pp. 551-563
    • Manhal-Baugus, M.1
  • 55
    • 0032336129 scopus 로고    scopus 로고
    • An ethics for the new surveillance
    • Marx, J. (1998). An ethics for the new surveillance. The Information Society, 14(3). http://web.mit.edu/gtmarx/www/ncolin5.html (http://web.mit.edu/gtmarx/www/ncolin5.html)
    • (1998) The Information Society , vol.14 , Issue.3
    • Marx, J.1
  • 56
    • 84874634946 scopus 로고    scopus 로고
    • Comment: Safety in numbers: Revisiting the risks to client confidences and attorney-client privilege posed by Internet electronic mail
    • Masur, J. M. 1999. Comment: Safety in numbers: Revisiting the risks to client confidences and attorney-client privilege posed by Internet electronic mail. Berkeley Technology Law Journal, 14: 1117-1160.
    • (1999) Berkeley Technology Law Journal , vol.14 , pp. 1117-1160
    • Masur, J.M.1
  • 57
    • 0347804475 scopus 로고    scopus 로고
    • Comment: Encoded confidences: Electronic mail, the Internet, and the attorney-client privilege
    • Matthews, W. P. 1996. Comment: Encoded confidences: Electronic mail, the Internet, and the attorney-client privilege. Kansas Law Review, 45: 273-300.
    • (1996) Kansas Law Review , vol.45 , pp. 273-300
    • Matthews, W.P.1
  • 58
    • 0000044766 scopus 로고
    • The adult client's conception of confidentiality in the therapeutic relationship
    • McGuire, J. M., Toal, P. and Blau, B. 1985. The adult client's conception of confidentiality in the therapeutic relationship. Professional Psychology: Research and Practice, 16: 375-384.
    • (1985) Professional Psychology: Research and Practice , vol.16 , pp. 375-384
    • McGuire, J.M.1    Toal, P.2    Blau, B.3
  • 59
    • 85047681030 scopus 로고
    • Breach of confidentiality and perceived trustworthiness of counselors
    • Merluzzi, T. V. and Brischetto, C. S. 1983. Breach of confidentiality and perceived trustworthiness of counselors. Journal of Counseling Psychology, 30: 245-251. doi:10.1037/0022-0167.30.2.245
    • (1983) Journal of Counseling Psychology , vol.30 , pp. 245-251
    • Merluzzi, T.V.1    Brischetto, C.S.2
  • 60
    • 84874600081 scopus 로고    scopus 로고
    • Microsoft
    • Microsoft. (2010). Security risks in the mobile enterprise. http://technet.microsoft.com/en-us/library/cc182262.aspx (http://technet.microsoft.com/en-us/library/cc182262.aspx)
    • (2010) Security risks in the mobile enterprise
  • 61
    • 84874607228 scopus 로고    scopus 로고
    • People v. Diaz: Is your iPhone constitutionally protected?
    • (February 23)
    • Minkevitch, H. (2011, February 23). People v. Diaz: Is your iPhone constitutionally protected? Berkeley Technology Law Journal. http://btlj.org/2011/02/23/people-v-diaz-is-your-iphone-constitutionally-protected/ (http://btlj.org/2011/02/23/people-v-diaz-is-your-iphone-constitutionally-protected/)
    • (2011) Berkeley Technology Law Journal
    • Minkevitch, H.1
  • 62
    • 84865622218 scopus 로고    scopus 로고
    • mobiThinking. (July)
    • mobiThinking. (2011, July). Global mobile statistics 2011. http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats#subscribers (http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats#subscribers)
    • (2011) Global mobile statistics 2011
  • 63
  • 64
    • 84874641142 scopus 로고    scopus 로고
    • Mrozinski v. Pogue, 423 S.E.2d 405 (Ga. Ct. App. 1992)
    • Mrozinski v. Pogue, 423 S.E.2d 405 (Ga. Ct. App. 1992)
  • 65
    • 0022085088 scopus 로고
    • Informing clients about the limits to confidentiality, risks, and their rights: Is self-disclosure inhibited?
    • Muehleman, T., Pickens, B. K. and Robinson, F. 1985. Informing clients about the limits to confidentiality, risks, and their rights: Is self-disclosure inhibited?. Professional Psychology: Research and Practice, 16: 385-397.
    • (1985) Professional Psychology: Research and Practice , vol.16 , pp. 385-397
    • Muehleman, T.1    Pickens, B.K.2    Robinson, F.3
  • 66
    • 84874583709 scopus 로고    scopus 로고
    • Travelers' laptops may be detained at border: No suspicion required under DHS policies
    • August 1
    • Nakashima, E. 2008. Travelers' laptops may be detained at border: No suspicion required under DHS policies. The Washington Post, August 1: A01
    • (2008) The Washington Post
    • Nakashima, E.1
  • 67
    • 33845658747 scopus 로고    scopus 로고
    • Washington, DC, Washington, DC,: Author, National Association of Social Workers
    • National Association of Social Workers. 2008. Code of ethics, Washington, DC: Author.
    • (2008) Code of ethics
  • 69
    • 21144466806 scopus 로고
    • If it's not absolutely confidential, will information be disclosed?
    • Nowell, D. and Spruill, J. 1993. If it's not absolutely confidential, will information be disclosed?. Professional Psychology: Research and Practice, 24: 367-369. doi:10.1037/0735-7028.24.3.367
    • (1993) Professional Psychology: Research and Practice , vol.24 , pp. 367-369
    • Nowell, D.1    Spruill, J.2
  • 70
    • 57449096592 scopus 로고    scopus 로고
    • Amend the ECPA: Fourth Amendment protection erodes as e-mails get dusty
    • Oza, A. 2008. Amend the ECPA: Fourth Amendment protection erodes as e-mails get dusty. Boston University Law Review, 88: 1043-1073.
    • (2008) Boston University Law Review , vol.88 , pp. 1043-1073
    • Oza, A.1
  • 72
    • 84874609426 scopus 로고    scopus 로고
    • People v. Endacott, 164 Cal. App. 4th 1346, 79 Cal. Rptr. 3d 907 (2008)
    • People v. Endacott, 164 Cal. App. 4th 1346, 79 Cal. Rptr. 3d 907 (2008)
  • 73
    • 84874619756 scopus 로고    scopus 로고
    • Loose lips sink attorney-client ships: Unintended technological disclosure of confidential communications
    • Piatt, W. and Dewitte, P. 2008. Loose lips sink attorney-client ships: Unintended technological disclosure of confidential communications. St. Mary's Law Journal, 39: 781-818.
    • (2008) St. Mary's Law Journal , vol.39 , pp. 781-818
    • Piatt, W.1    Dewitte, P.2
  • 74
    • 84874632796 scopus 로고    scopus 로고
    • Poneman Institute. (March)
    • Poneman Institute. (2011, March), Second annual survey on medical identity theft. http://www.protectmyid.com/images/education_center/pdf/050TypesofFraud/1_types%20of%20fraud_medical%20study.PDF (http://www.protectmyid.com/images/education_center/pdf/050TypesofFraud/1_types%20of%20fraud_medical%20study.PDF)
    • (2011) Second annual survey on medical identity theft.
  • 75
    • 84874603404 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse. (August)
    • Privacy Rights Clearinghouse. (2011, August). Fact Sheet 18: Online privacy: Using the Internet safely. https://www.privacyrights.org/fs/fs18-cyb.htm (http://https://www.privacyrights.org/fs/fs18-cyb.htm)
    • (2011) Fact Sheet 18: Online privacy: Using the Internet safely
  • 76
    • 84874591188 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse, (January 27)
    • Privacy Rights Clearinghouse. (2012, January 27). A chronology of data breaches. http://www.privacyrights.org/ar/ChronDataBreaches.htm#2008 (http://www.privacyrights.org/ar/ChronDataBreaches.htm#2008)
    • (2012) A chronology of data breaches.
  • 77
    • 84874600433 scopus 로고    scopus 로고
    • Province of British Columbia. (n.d.)
    • Province of British Columbia. (n.d.). Policy Summary No. 3: Portable storage devices. http://www.cio.gov.bc.ca/local/cio/informationsecurity/policy/summaries/3_portable_ (http://www.cio.gov.bc.ca/local/cio/informationsecurity/policy/summaries/3_portable_)
    • Policy Summary No. 3: Portable storage devices
  • 78
    • 84874624129 scopus 로고    scopus 로고
    • What would Learned Hand do? Adapting to technological change and protecting the attorney-client privilege on the Internet
    • Rand, J. W. 2000. What would Learned Hand do? Adapting to technological change and protecting the attorney-client privilege on the Internet. Brooklyn Law Review, 66: 361-420.
    • (2000) Brooklyn Law Review , vol.66 , pp. 361-420
    • Rand, J.W.1
  • 79
    • 79955031056 scopus 로고    scopus 로고
    • Comment: Can you find me now?-Tracking the limits on government access to cellular GPS location data
    • Richmond, D. P. 2007. Comment: Can you find me now?-Tracking the limits on government access to cellular GPS location data. CommLaw Conspectus, 16: 283-219.
    • (2007) CommLaw Conspectus , vol.16 , pp. 219-283
    • Richmond, D.P.1
  • 80
    • 42349108508 scopus 로고    scopus 로고
    • Data mining and Internet profiling: Emerging regulatory and technological approaches
    • Rubenstein, I. A., Lee, R. D. and Schwartz, P. M. 2008. Data mining and Internet profiling: Emerging regulatory and technological approaches. University of Chicago Law Review, 75: 261-285.
    • (2008) University of Chicago Law Review , vol.75 , pp. 261-285
    • Rubenstein, I.A.1    Lee, R.D.2    Schwartz, P.M.3
  • 81
    • 84874637022 scopus 로고    scopus 로고
    • SDAndroid. (n.d.)
    • SDAndroid. (n.d.). SHREDroid-Secure deletion for Android. http://www.securedeletion.com/ (http://www.securedeletion.com/)
    • SHREDroid-Secure deletion for Android
  • 82
    • 84874587661 scopus 로고    scopus 로고
    • Simple Encryption. (n.d.)
    • Simple Encryption. (n.d.). http://www.cs.usask.ca/content/resources/tutorials/csconcepts/1999_3/lessons/L3/SimpleEncryption.html.
  • 83
    • 84874620446 scopus 로고    scopus 로고
    • Orwell's ghost: How teletechnology is reshaping civil society
    • Slabbart, N. J. 2008. Orwell's ghost: How teletechnology is reshaping civil society. Commlaw Conspectus, 16: 349-359.
    • (2008) Commlaw Conspectus , vol.16 , pp. 349-359
    • Slabbart, N.J.1
  • 84
    • 40949116423 scopus 로고    scopus 로고
    • Note: Private eyes are watching you: With the implementation of the E-911 mandate, who will watch every move you make?
    • Smith, G. D. 2006. Note: Private eyes are watching you: With the implementation of the E-911 mandate, who will watch every move you make?. Federal Communications Law Journal, 58: 705-725.
    • (2006) Federal Communications Law Journal , vol.58 , pp. 705-725
    • Smith, G.D.1
  • 85
    • 84874587779 scopus 로고    scopus 로고
    • Softpedia. (n.d.)
    • Softpedia. (n.d.). Cryptofile 1.0. [Software]. http://handheld.softpedia.com/get/Security/Encryption/Cryptofile-38451.shtml (http://handheld.softpedia.com/get/Security/Encryption/Cryptofile-38451.shtml)
    • Cryptofile 1.0. [Software].
  • 86
    • 84874641989 scopus 로고    scopus 로고
    • Spearstone. (March 11), [Press release]
    • Spearstone. (2009, March 11). Spearstone announces Smartphone application for DiskAgent product line [Press release]. http://https://diskagent.com/press_releases/smartphone.php (http://https://diskagent.com/press_releases/smartphone.php)
    • (2009) Spearstone announces Smartphone application for DiskAgent product line
  • 87
    • 84995441250 scopus 로고    scopus 로고
    • The Electronic Communications Privacy Act and Cell Location Data: Is the whole more than the sum of its parts? 73
    • Stapleton, T. 2007. The Electronic Communications Privacy Act and Cell Location Data: Is the whole more than the sum of its parts? 73. Brooklyn Law Review,: 383-409.
    • (2007) Brooklyn Law Review , pp. 383-409
    • Stapleton, T.1
  • 88
    • 84874582046 scopus 로고    scopus 로고
    • State Board of Medical Examiners v. Hedgepath, 325 S.C. 166, 480 S.E.2d 724 (1997)
    • State Board of Medical Examiners v. Hedgepath, 325 S.C. 166, 480 S.E.2d 724 (1997)
  • 89
    • 0011215849 scopus 로고
    • Researching the effects of confidentiality law on patients' self-disclosures
    • Taube, D. O. and Elwork, A. 1990. Researching the effects of confidentiality law on patients' self-disclosures. Professional Psychology: Research and Practice, 21: 72-75.
    • (1990) Professional Psychology: Research and Practice , vol.21 , pp. 72-75
    • Taube, D.O.1    Elwork, A.2
  • 90
    • 84874640916 scopus 로고    scopus 로고
    • TechJournal (June)
    • TechJournal. (2011, June). Seven tips on keeping your mobile devices secure, report on smartphone malware. http://www.techjournalsouth.com/2011/06/seven-tips-on-keeping-your-mobile-devices-secure-report-on-smartphone-malware/ (http://www.techjournalsouth.com/2011/06/seven-tips-on-keeping-your-mobile-devices-secure-report-on-smartphone-malware/)
    • (2011) Seven tips on keeping your mobile devices secure, report on smartphone malware
  • 96
    • 84885759934 scopus 로고    scopus 로고
    • United States Computer Emergency Readiness Team
    • United States Computer Emergency Readiness Team. (2011). Cyber threats to mobile phones. http://www.us-cert.gov/reading_room/cyber_threats_to_mobile_phones.pdf (http://www.us-cert.gov/reading_room/cyber_threats_to_mobile_phones.pdf)
    • (2011) Cyber threats to mobile phones
  • 98
    • 84874632828 scopus 로고    scopus 로고
    • United States v. Arnold, 533 F.3d 1003 (9th Cir. 2008)
    • United States v. Arnold, 533 F.3d 1003 (9th Cir. 2008)
  • 99
    • 84874644205 scopus 로고    scopus 로고
    • United States v. Montoya de Hernandez, 473 U.S. 531 (1985)
    • United States v. Montoya de Hernandez, 473 U.S. 531 (1985)
  • 100
    • 84874606314 scopus 로고    scopus 로고
    • United States v. Ramsey, 431 U.S. 606 (1977)
    • United States v. Ramsey, 431 U.S. 606 (1977)
  • 101
    • 0024550156 scopus 로고
    • Psychotherapy and mandated reporting of child abuse
    • Watson, H. and Levine, M. 1989. Psychotherapy and mandated reporting of child abuse. American Journal of Orthopsychiatry, 59: 246-256.
    • (1989) American Journal of Orthopsychiatry , vol.59 , pp. 246-256
    • Watson, H.1    Levine, M.2
  • 102
    • 64849083118 scopus 로고    scopus 로고
    • Sensors and sensibilities
    • Werbach, K. 2007. Sensors and sensibilities. Cardozo Law Review, 28: 2321-2371.
    • (2007) Cardozo Law Review , vol.28 , pp. 2321-2371
    • Werbach, K.1
  • 103
    • 84874604688 scopus 로고    scopus 로고
    • Cell phone subscriptions to hit 5 billion globally
    • (February 16)
    • Whitney, L. (2010, February 16). Cell phone subscriptions to hit 5 billion globally. CNET Reviews. http://reviews.cnet.com/8301-13970_7-10454065-8.html (http://reviews.cnet.com/8301-13970_7-10454065-8.html)
    • (2010) CNET Reviews
    • Whitney, L.1
  • 104
    • 84874638550 scopus 로고    scopus 로고
    • Wickr. (n.d.)
    • Wickr. (n.d.). Wickr: Leave no trace. http://https://www.mywickr.com/ (http://https://www.mywickr.com/)
    • Wickr: Leave no trace
  • 105
    • 84874636193 scopus 로고    scopus 로고
    • November, November, San Rafael, CA, San Rafael, CA,: Paper presented at the Workshop for the American Psychological Association Insurance Trust
    • Younggren, J. November 2011. Adventures on the electronic frontier: Ethics and risk management in the digital era, November, San Rafael, CA: Paper presented at the Workshop for the American Psychological Association Insurance Trust.
    • (2011) Adventures on the electronic frontier: Ethics and risk management in the digital era
    • Younggren, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.