“Why the Right to Data Portability Likely Reduces Consumer Welfare: Antitrust and Privacy Critique,” 72 Md. L. Rev. 335 (2013).

 

“The Second Wave of Global Privacy Protection: Symposium Introduction,” 74 Ohio St. L. J. 841 (2013).

 

“Finding the Best of the Imperfect Alternatives for Privacy, Health IT, and Cybersecurity,” Volume 2013, No. 2, Wis. L. Rev. 649 (2013).

 

“Automated Text Mining for Requirements Analysis of Policy Documents,” Aaron K. Massey, Jacob Eisenstein, Annie I. Antón and Peter Swire. 21st IEEE International Requirements Engineering Conference (RE’13)
Rio de Janeiro Brazil, pp. 4-13, 15-19 July 2013.

“From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud,” International Data Privacy Law (2012), doi: 10.1093/idpl/ips025.

 

“Managing Changing Compliance Requirements by Predicting Regulatory Evolution: An Adaptability Framework,” Jeremy C. Maxwell, Annie I. Antón, Peter Swire. 20th IEEE International Requirements Engineering Conference (2012), Chicago, Sept. 2012.

 

“Encryption and Globalization,” 13 Colum. Sci. & Tech. L. Rev. 416 (2012). Peter Swire & Kenesa Ahmad.

 

“A Legal Cross-References Taxonomy for Reasoning about Compliance Requirements,” Jeremy Maxwell, Annie I. Antón, Peter Swire, Maria Riaz & Christopher McCraw, Requirements Engineering Journal, Springer-Verlag, 2012.

 

“Social Networks, Privacy, and Freedom of Association: Data Protection vs. Data Empowerment,” 90 N.C. L. Rev. 1371 (2012).

 

“A Reasonableness Approach to Searches after the Jones GPS Tracking Case,” 64 Stanford L. Rev. Online 57 (2012).

 

“Why the Federal Government Should Have a Privacy Office,” 10 J. Telecomm. & High Technology L. 41 (2012).

 

“How to Address Standardless Discretion after Jones,” (2012). Erin Murphy & Peter Swire.

 

“A Legal Cross-References Taxonomy for Identifying Conflicting Software Requirements,” IEEE International Requirements Engineering Conference, (2011) (awarded “Distinguished Paper” for the conference), Jeremy Maxwell, Annie I. Antón, & Peter Swire.

“Peeping,” 24 Berkeley Journal of Law & Technology 1164 (2009).

 

“The Consumer as Producer: The Personal Mainframe and the Law of Computing,” 42 Law/Technology, 1st Quarter 2009, at 5.

 

“When Should ‘Consumers-as-Producers’ Have to Comply With Consumer Protection Laws?” 31 J. Consumer Pol’y 473 (2009).

 

“Book Review: Proportionality for High-Tech Searches,” 6 Ohio St. J. Crim. L. 751 (2009) (reviewing Christopher Slobogin, Privacy at Risk: The New Government Surveillance and the Fourth Amendment).

 

“Introductory Essay for ‘Privacy Law: Year in Review, 2008” 4 I/S: A Journal of Law and Policy for the Information Society (2009).

 

“No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime,” 7 J. Telecomm. & High Technology L. 107 (2009).

“The ID Divide: Addressing the Challenges of Identification and Authentication in American Society,” Center for American Progress (2008) (with Cassandra Q. Butts).

 

“Introductory Essay for ‘Privacy Law: Year in Review, 2007,” 3 I/S: A Journal of Law and Policy for the Information Society 373 (2008).

“Introductory Essay for ‘Privacy Law: The Year in Review, 2004’,” I/S: A Journal of Law and Policy for the Information Society (2005).

 

“Elephants and Mice Revisited: Law and Choice of Law on the Internet,” 153 U. Penn. L. Rev. 1975 (2005).

 

“Through the Privacy Lens,” 4 J. Marshall Rev. Intell. Prop. L., Issue 2 (with Julie Cohen & David Sorkin) (2005).

Katz is Dead, Long Live Katz,” 102 Mich. L. Rev. 904 (2004).

 

“The System of Foreign Intelligence Surveillance Law,” 72 Geo. Wash. L. Rev. 1306 (2004).

 

“A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security?” 3 J. Telecomm. & High Technology L. 163 (2004); republished in Knowledge Policy for the 21st Century (Mark Perry & Brian Fitzgerald, eds.) (2009).

“Financial Privacy and the Theory of High‑Tech Government Surveillance,” 77 Washington U. L.Q. 461 (1999) & Brookings‑Wharton Papers on Financial Services (1999).

“The Uses and Limits of Financial Cryptography: A Law Professor’s Perspective,” chapter in the proceedings of Financial Cryptography ’97 (Springer‑Verlag, 1997).

 

“Markets, Self‑Regulation, and Legal Enforcement in the Protection of Personal Information,” U.S. Department of Commerce, Privacy and Self‑Regulation in the Information Age (1997).

“The Race to Laxity and the Race to Undesirability: Explaining Failures in Competition Among Jurisdictions in Environmental Law,” Yale Law & Policy Rev./Yale J. on Regulation, Symposium: Constructing a New Federalism 67 (1996).

“Equality of Opportunity and Investment in Creditworthiness,” 143 U. Pa. L. Rev. 1533 (1995).

 

“The Persistent Problem of Lending Discrimination: A Law and Economics Analysis,” 73 Tex. L. Rev. 787 (1995).

“The U.S. Liability System: Background and Trends,” in Liability: Perspectives and Policies (Brookings, 1988). Robert Litan, Peter Swire & Cliff Winston.

Book Review, 1 Yale J. L & Pol’y 417 (1983) (reviewing Jerry L. Mashaw, Bureaucratic Justice: Managing Social Security Disability Claims).