{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:11:24Z","timestamp":1730214684811,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/dictap.2014.6821709","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T16:01:18Z","timestamp":1401465678000},"page":"347-352","source":"Crossref","is-referenced-by-count":0,"title":["State telecommunication surveillance: A comparative study of the US and Thai telecommunication privacy laws"],"prefix":"10.1109","author":[{"given":"Kanathip","family":"Thongraweewong","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1208","article-title":"A user's guide to the stored communications act and a legislator's guide to amending it","volume":"72","author":"kerr","year":"2004","journal-title":"George Washington Law Review"},{"key":"17","first-page":"561","article-title":"The case for the third-party doctrine","volume":"107","author":"kerr","year":"2009","journal-title":"Michican Law Review"},{"key":"18","first-page":"1309","article-title":"The fourth amendment in a world without privacy","volume":"81","author":"ohm","year":"2012","journal-title":"Mississippi Law Journal"},{"key":"15","first-page":"503","article-title":"The fourth amendment in cyberspace: Can encryption create a reasonable expectation of privacy?","volume":"33","author":"kerr","year":"1001","journal-title":"Connecticut Law Review"},{"key":"16","article-title":"First principles of communications privacy","volume":"3","author":"freiwald","year":"2007","journal-title":"Stanform Technolgy Law Review"},{"key":"13","first-page":"1934","article-title":"The danger of surveillance","volume":"126","author":"richards","year":"2013","journal-title":"Harvard Law Review"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2328744"},{"key":"11","first-page":"689","article-title":"The perils of social reading","volume":"101","author":"richards","year":"2013","journal-title":"Georgetown Law Journal"},{"key":"12","first-page":"1153","article-title":"Unraveling privacy: the personal prospectur and the threat of a full-disclosure future","volume":"105","author":"peppet","year":"2011","journal-title":"Northwestern University Law Review"},{"key":"21","article-title":"Transnational wiretaps and the fourth amendment","volume":"36","author":"nelson","year":"2008","journal-title":"Hastings Constitutional Law Quarterly"},{"key":"20","first-page":"485","article-title":"The politics of privacy in the criminal justice system: Information disclosure, the fourth amendment, and statutory law enforcement exemptions","volume":"111","author":"murphy","year":"2013","journal-title":"Michigan Law Review"},{"journal-title":"Privacy on the Line The Politics of Wiretapping and Encryption","year":"2007","author":"whitfield","key":"22"},{"key":"23","article-title":"Reviving telecommunications surveillance law","volume":"75","author":"schwartz","year":"2008","journal-title":"University of Chicago Law Review"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.416586"},{"key":"25","article-title":"Should parents be allowed to record a child's telephone conversations when they believe the child is in danger: An examination of the federal wiretap statute and the doctrine of vicarious consent in the context of a criminal prosecution","volume":"955","author":"dinger","year":"2005","journal-title":"Seattle University Law Review"},{"key":"26","first-page":"937","article-title":"The Foruth amendment and government interception of unsecured wireless communications","volume":"28","author":"hyder","year":"2013","journal-title":"Berkeley Technology Law Journal"},{"journal-title":"Personal Information Privacy and the Law","year":"1989","author":"wacks","key":"3"},{"key":"2","article-title":"The history of the idea of human right","author":"minogue","year":"1978","journal-title":"The Human Rights Reader"},{"key":"10","first-page":"273","article-title":"Behavioral advertising: the offer you cannot refuse","volume":"6","author":"hoofnagle","year":"2012","journal-title":"Harvard Law & Policy Review"},{"key":"1","first-page":"345","article-title":"Lessons from the british and american approach to compelled decryption","volume":"75","author":"palfreyman","year":"2009","journal-title":"Brook Law Review"},{"journal-title":"Your Right to Privacy A Basic Guide to Legal Rights in an Information Society","year":"1990","author":"hendricks","key":"7"},{"key":"6","first-page":"303","article-title":"Human rights and human dignity","volume":"76","author":"donnelly","year":"1982","journal-title":"Cited In the American Law Review"},{"key":"5","first-page":"303","article-title":"Human rights and human dignity","volume":"76","author":"donnelly","year":"1982","journal-title":"American Law Review"},{"key":"4","first-page":"26","author":"decew","year":"1997","journal-title":"In Pursuit of Privacy Law Ethics and the Rise of Technology"},{"key":"9","first-page":"377","article-title":"Lifestyle discrimination in employment","volume":"242","author":"sugarman","year":"2008","journal-title":"Berkeley Journal of Employment and Labor Law"},{"journal-title":"Understanding Privacy","year":"2008","author":"solove","key":"8"}],"event":{"name":"2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","start":{"date-parts":[[2014,5,6]]},"location":"Bangkok, Thailand","end":{"date-parts":[[2014,5,8]]}},"container-title":["2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6816614\/6821645\/06821709.pdf?arnumber=6821709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T12:41:20Z","timestamp":1490272880000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6821709\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/dictap.2014.6821709","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}