text
stringlengths
0
118
6. Joseph Bensman & Robert Lilienfeld, Between Public and Private: The Lost
Boundaries o f the S e lf16 (1979).
7. Arnold Simmel, “Privacy Is Not an Isolated Freedom,” in Nomos X III: Pri­
vacy, 71, 73-74.
8. See, e.g., James Rachels, “Why Privacy Is Important,” in Philosophical Dimen­
sions o f Privacy: A n Anthology 290,292 (Ferdinand David Schoeman ed., 1984) (pri­
vacy is essential to “our ability to create and maintain different sorts of social rela­
tionships with different people”).
9. Robert S. Gerstein, “Intimacy and Privacy,” in Philosophical Dimensions o f Pri­
vacy, 265, 265.
10. Jeffrey Rosen, The Unwanted Gaze: The Destruction o f Privacy in America 8
(2000).
11. Gavison, “Privacy and the Limits of Law,” 455.
12. C. Keith Boone, “Privacy and Community,” 9 Social Theory and Practice 1, 8
(1983).
13. Paul M. Schwartz, “Privacy and Democracy in Cyberspace,” 52 Vanderbilt
Law Review 1609, 1613 (1999).
Notes to Pages 80—83
219
14. Anita L. Allen, Uneasy Access: Privacy fo r Women in a Free Society 51 (1988).
15. Westin, Privacy and Freedom, 37.
16. See id. at 33—34.
17. Hannah Arendt, The H um an Condition 38, 58 (1958).
18. Yao-Huai Lii, “Privacy and Data Privacy Issues in Contemporary China,” 7
Ethics and Inform ation Technology 7, 12 (2005).
19. Thomas More, Utopia 73 (Clarence H. Miller trans., 2001) (originally pub­
lished in 1516). For more examples of utopian literature’s distaste for privacy, see
Jean Marie Goulemot, “Literary Practices: Publicizing the Private,” in A H istory o f
Private Life, vol. 3, Passions o f the Renaissance 376-78 (Roger Chartier ed. & Arthur
Goldhammer trans., 1989).
20. Joseph Pulitzer, quoted in Brent Fisse &John Braithwaite, The Impact o f Pub­
licity on Corporate Offenders 1 (1983).
21. Bruno Bettelheim, “The Right to Privacy Is a Myth,” Saturday Evening Post,
July 27, 1968, at 8.
22. James B. Rule, Private Lives and Public Surveillance: Social Control in the Com­
puterA ge 21-22 (1974).
23. Kent Walker, “The Costs of Privacy,” 25 H arvard Journal o f Law and Public
Policy 87,91 (2002) (“The final consequence of increased privacy regulation of per­
sonal information is the loss of trust”).
24. Francis Fukuyama, Trust: The Social Virtues and the Creation o f Prosperity 26
(1995).
25. Steven L. Nock, The Costs o f Privacy: Surveillance and Reputation in America
124(1993).
26. Richard Posner, Economic Analysis o f Law 46 (5 th ed. 1998); Richard A. Ep­
stein, “The Legal Regulation of Genetic Discrimination: Old Responses to New
Technology,” 74 Boston U niversity Law Review 1, 12 (1994).
27. For an overview of the feminist critique of privacy, see Patricia Boling, Pri­
vacy and the Politics o f Intim ate Life (1996); Judith Wagner DeCew, In Pursuit o f Pri­
vacy: Law, Ethics, and the Rise o f Technology 81—94 (1997); Frances Olsen, “Feminist
Critiques of the Public/Private Distinction,” 10 Constitutional Commentary 327
(1993).
28. Reva B. Siegel, “ ‘The Rule of Love’: Wife Beating as Prerogative and Pri­
vacy,” 105 Yale Law Journal 2117, 2122 (1996).
29. Catharine MacKinnon, Toward a Feminist Theory o f the State 194, 191 (1989).
30. Carole Pateman, “Feminist Critiques of the Public/Private Dichotomy,” in
The Disorder o f Women: Democracy, Feminism, and Political Theory 121 (1989).
31. Westin, Privacy and Freedom, 348.
32. Harry Kalven, Jr., “Privacy in Tort Law—Were Warren and Brandeis
Wrong?” 31 Law and Contemporary Problems 326, 329 (1966).
33. Rochelle Gurstein, The Repeal o f Reticence 61-90 (1996).
34. Eve Fairbanks, “The Porn Identity,” N ew Republic, Feb. 6,2006.
35. Fred H. Cate, Privacy in the Inform ation A ge 28-29 (1997).
36. Virginia Postrel, “No Telling,” Reason M agazine, June 1998, available at
http ://www. reason.com/news/show/3 0656.html.
37. Eugene Volokh, “Freedom of Speech and Information Privacy: The Trou­
bling Implications of a Right to Stop People from Speaking About You,” 52 Stan­
ford Law Review 1049, 1050-51, 1115 (2000).
220
Notes to Pages 83-89
38. Solveig Singleton, “Privacy Versus the First Amendment: A Skeptical Ap­
proach,” 11 Fordbam Intellectual Property. M edia and Entertainm ent Law Journal 97,
152 (2000).
39. Diane L. Zimmerman, “Requiem for a Heavy-weight: A Farewell to Warren
and Brandeis’s Privacy Tort,” 68 Cornell Law Review 291, 341 (1983); see also
Kalven, “Privacy in Tort Law.”
40. William J. Stuntz, “Against Privacy and Transparency,” N ew Republic, Apr. 7,
2006.
41. Richard A. Posner, N ot a Suicide Pact: The Constitution in a Tim e o f N ational
Emergency 141 (2006).
42. Ronald Dworkin, Life's Dominion: A n A rgum ent A bout Abortion, Euthanasia,
and Individual Freedom 69-70 (1993).
43. Anita L. Allen, “Privacy,” in The O xford Handbook o f Practical Ethics 485, 492
(Hugh LaFollette ed., 2003).
44. Beate Rossler, The Value o f Privacy 69 (2005).
45. Anita Allen describes these theories as follows: “Kantian deontologists judge
privacy on the basis of whether it represents satisfaction of duties, principles, or
rules called for by due regard for the traits of personhood in virtue of which indi­
viduals have a special dignity and ought to be accorded with respect.” Allen, Uneasy
Access, 39.
46. Stanley I. Benn, Privacy, “Freedom, and Respect for Persons,” in N om osX lII:
Privacy 2, 26 (J. Roland Pennock & J. W. Chapman eds., 1971).
47. Julie C. Inness, Privacy, Intim acy, and Isolation 95 (1992).
48. Rossler, Value o f Privacy, 1, 117.
49. Charles Fried, “Privacy,” 77 Yale Law Journal 475, 477, 478 (1968).
50. Bonome v. Kaysen, 32 Media L. Rep. 1520 (Mass. Super. 2004).
51. Thomas Powers, “Can We Be Secure and Free?” 151 Public Interest 3, 5
(Spring 2003).
52. Luciano Floridi, “The Ontological Interpretation of Informational Privacy,”
7 Ethics and Inform ation Technology 185 (2005).
53. See T. Alexander Aleinikoff, “Constitutional Law in the Age of Balancing,”