Setting Boundaries at Borders: Reconciling Laptop Searches and Privacy

@article{Power2007SettingBA,
  title={Setting Boundaries at Borders: Reconciling Laptop Searches and Privacy},
  author={E. Michael Power and John Gilhen and Roland L. Trope},
  journal={IEEE Security \& Privacy},
  year={2007},
  volume={5}
}
If you've traveled internationally on business, the odds are that you've taken your laptop with you. Like most business travelers, you need these ubiquitous devices to do work, make presentations, and communicate with coworkers, family, and friends via the Internet. In a previous department, we explored the notion that laptops deserve special consideration because of the increasingly blurred line between home and office, the entrusting of intimate, private information to storage on laptops, and… 
3 Citations
Investigating Information Security Awareness: Research and Practice Gaps
TLDR
The paper identifies ambiguous aspects of current security awareness approaches and the proposed classification provides a guide to identify the range of options available to researchers and practitioners when they design their research and practice on information security awareness.

References

SHOWING 1-4 OF 4 REFERENCES
Lessons for laptops from the 18th century
TLDR
It is likely that the judicial system will use analogies to the house when deciding controversies concerning the reasonable expectations of privacy in a home computer's contents, and the US Justice Department's policy on the search and seizure of computers in investigations uses such an analogy.
United States. v. Rodriquez, Federal Supplement
  • United States. v. Rodriquez, Federal Supplement
  • 1979
United States v. Arnold, Federal Supplement , 2nd Series, case no
  • United States v. Arnold, Federal Supplement , 2nd Series, case no
  • 2006
Federal Supplement
  • Federal Supplement
  • 1970