| 
       
BOOK PUBLICATIONS 
 
      
      ACADEMIC PUBLICATIONS 
      
      
      "Peter Hustinx and Three Cliches About E.U.-U.S. Data Privacy," in Data Protection Anno 2014: How to Restore Trust?  (Hielke Hijmans & Herke Kranenborg ed.) (Intersentia 2014). "The Second Wave of Global Privacy Protection: Symposium Introduction," 74 Ohio St. L. J. 841 (2013). "Why the Right to Data Portability Likely Reduces Consumer Welfare: Antitrust and Privacy Critique," Maryland L. Rev. (forthcoming 2013). Peter Swire & Yianni Lagos. 
       
      "How to Address Standardless Discretion after Jones," (2012). Erin Murphy & Peter Swire. 
       
      
      “From Real-Time Intercepts to
Stored Records: Why Encryption Drives the Government to Seek Access to
the Cloud,” International Data Privacy Law, 2012.  
 
“Managing Changing Compliance Requirements by Predicting Regulatory
Evolution: An Adaptability Framework,” Jeremy C. Maxwell, Annie I.
Antón, Peter Swire, 20th IEEE International Requirements
Engineering Conference, 2012. 
       
“Encryption and Globalization,” 13 Colum. Sci. & Tech. L. Rev. 416 (2012). Peter Swire & Kenesa Ahmad. 
       
“A Legal Cross-References Taxonomy for Reasoning about Compliance
Requirements,” Jeremy Maxwell, Annie I. Antón, Peter Swire, Maria Riaz
& Christopher McCraw, Requirements Engineering Journal,
Springer-Verlag, 2012. 
      "Social Networks, Privacy, and Freedom of Association," 90 N.C. L. Rev. 1371 (2012). 
      
      "A Reasonableness Approach to Searches after the Jones GPS Tracking Case," 64 Stanford L. Rev. Online 57 (2012). 
 "Why the Federal Government Should Have a Privacy Policy Office," 10 J. Telecomm. & High Tech. L. 41 (2012). “A Legal Cross-References Taxonomy for Identifying Conflicting Software Requirements,” (with Maxwell and Anton) in the 19th IEEE International Conference on Requirements Engineering (2009).
“Peeping,” 
24 Berkeley Tech. L.J. 1164 (2009).   
“The Consumer 
as Producer: The Personal Mainframe and the Future of Computing,” 42 
Law/Technology, 1st Quarter 2009, at 5. 
 
“No Cop 
on the Beat: Underenforcement in E-Commerce and Cybercrime,” 7 J. Telecomm. 
& High Technology L. 107 (2009). 
 
“Book Review: 
Proportionality for High-Tech Searches,” 6 Ohio St. J. Crim. L. 751 (2009) 
(Reviewing Christopher Slobogin, Privacy at Risk: The New Government 
Surveillance and the Fourth Amendment). 
 
“The ID 
Divide: Addressing the Challenges of Identification and Authentication in 
American Society,” Center for American Progress (2008) (with Cassandra Q. 
Butts) (2008). 
 
“When Should ‘Consumers-as-Producers’ Have to Comply with Consumer Protection 
Laws?”, 31 J. Consumer Policy 473 (2008). 
 
“Introductory Essay for ‘Privacy Law: Year in Review, 2007,” 3 I/S: A Journal of 
Law and Policy for the Information Society 373 (2007). 
 
“Book 
Review: Transparency in Jeopardy,” 
Issues in Science & Tech., Winter, 2007, at 92 (Reviewing Alasdair Roberts, 
Blacked Out: Government Secrecy in the Information Age). 
“Introductory Essay for 
"Privacy Law Year 
in Review, 2005-2006” I/S: A Journal of Law and Policy for the Information 
Society (2007). 
“Privacy 
and Information Sharing in the War on Terrorism,” 51 Villanova L. Rev. 260 
(2006). 
“Introductory Essay for ‘Privacy Law: The Year 
in Review, 2004’,” I/S: A Journal of Law and Policy for the Information 
Society (2006). 
“A Theory of Disclosure for Security and 
Competitive Reasons: Open Source, Proprietary Software, and Government Systems,” 
42 Houston Law Review 1333 (2006). 
 
“Elephants 
and Mice Revisited: Law and Choice of Law on the Internet,” 153 U. Penn. L. 
Rev. 1975 (2005). 
 
“Through the Privacy 
Lens,” 4 J. Marshall Rev. Intell. Prop. L., Issue 2 (with Julie Cohen & 
David Sorkin) (2005). 
 
“Katz is 
Dead, Long Live Katz,” 102 Mich. L. Rev. 904 (2004). 
 
“The System 
of Foreign Intelligence Surveillance Law”, 72 Geo. Wash. L. Rev. 1306 
(2004). 
 
“A Model for 
When Disclosure Helps Security: What Is Different About Computer and Network 
Security?” 3 J. Telecomm. & High Technology L. 163 (2004) (and forthcoming 
as a chapter in a book to be published by the Cambridge University Press). 
 
“Efficient 
Confidentiality for Privacy, Security, and Confidential Business Information,” 
Brookings-Wharton Papers on Financial Services (Brookings, 2003). 
 
“Trustwrap: 
The Importance of Legal Rules for E-Commerce and Internet Privacy”, 54 
Hastings L.J. 847 (2003). 
 
“State 
Wiretaps and Electronic Surveillance After September 11”,
54 Hastings L.J. 971 (2003) (with Charles
Kennedy).                                                                                                                    
Appendix A:
State Wiretap Laws (as of June, 2002)                                                                       
Appendix B:
Recent State Wiretap Legislation (as of June, 2002) 
 
“The 
Surprising Virtues of the New Financial Privacy Law,” 86 Minn. L. Rev. 1263 
(2002). 
 
"Security 
and Privacy After September 11: The Health Care Example,” 86 Minn. L. Rev. 
1515 (2002) (with Lauren Steinfeld). 
 
“The 
Ethical and Legal Implications of Jaffee v. Redmond and the HIPAA Medical 
Privacy Rule for Psychotherapy and General Psychiatry,” 25 Psychiatric 
Clinics of North America 575 (2002) (with Paul Mosher). 
 
"Financial 
Privacy and the Theory of High Tech Government Surveillance," 77 Washington 
U. L.Q. 461 (1999) & Brookings Wharton Papers on Financial Services (1999).  
 
"Of 
Elephants, Mice, and Privacy: International Choice of Law and the Internet," 
32 The 
International Lawyer 991 (1998). 
 
"The Uses and 
Limits of Financial Cryptography: A Law Professor's Perspective," chapter in 
the proceedings of Financial Cryptography '97 (Springer Verlag, 1997). 
 
"Markets, 
Self Regulation, and Legal Enforcement in the Protection of Personal 
Information," U.S. Department of Commerce, Privacy and Self Regulation in 
the Information Age (1997). 
 
"The Race to Laxity and the Race 
to Undesirability: Explaining Failures in Competition Among Jurisdictions in 
Environmental Law," Yale Law & Policy Rev./Yale J. on Regulation, Symposium: 
Constructing a New Federalism 67 (1996). 
 
"Equality 
of Opportunity and Investment in Creditworthiness," 143 U. Pa. L. Rev. 1533 
(1995). 
 
"The 
Persistent Problem of Lending Discrimination: A Law and Economics Analysis," 
73 Tex. L. Rev. 787 (1995). 
 
"Safe Harbors and a Proposal to 
Improve the Community Reinvestment Act," 79 Va. L. Rev. 349 (1993). 
 
"Bank Insolvency Law Now That It 
Matters Again," 42 Duke L.J. 469 (1992). 
 
Litan, Swire & Winston, "The U.S. Liability System: Background and Trends," in 
Liability: Perspectives and Policies (Brookings, 1988). 
 
Note, The Incorporation of 
Independent Agencies Into the Executive Branch, 94 Yale L.J. 
1766 (1985).  
 
Book Review, 1 Yale J. L & Pol'y 417 (1983) (reviewing Jerry L. Mashaw, 
Bureaucratic 
Justice: Managing Social Security Disability Claims). 
 
NON-ACADEMIC PUBLICATIONS 
TESTIMONY AND 
OTHER PUBLIC COMMENTS 
UNPUBLISHED 
MATERIALS 
     |