text
stringlengths 0
118
|
---|
18. Frederick Schauer, “Fear, Risk and the First Amendment: Unraveling the |
‘Chilling Effect,”’ 58 Boston U niversity Law Review 685, 693 (1978) (emphasis |
omitted). |
19. Daniel J. Solove, “The First Amendment as Criminal Procedure,” 82 New |
York U niversity Law Review 112, 119-23, 154-59 (2007). |
20. Robert Merton, Social Theory and Social Structure 375 (1957). |
21. Joel R. Reidenberg, “Privacy Wrongs in Search of Remedies,” 54 Hasting? |
Law Journal 877, 882-83 (2003). |
22. Priscilla M. Regan, Legislating Privacy: Technology, Social Values, and Public |
Policy 225 (1995). |
23. Privacy Act, 5 U.S.C. §552a. |
Notes to Pages 180-192 |
245 |
24. Robert Gellman, “Does Privacy Law Work?” in Technology and Privacy: The |
New Landscape (Philip E. Agre & Marc Rotenberg eds., 1997). |
25. 306 F.3d 170, 180-82 (4th Cir. 2002), cert, granted (June 27, 2003). |
26. See Doe v. Chao, 540 U.S. 614 (2004). |
27. U.S. West, Inc. v. Fed. Communications Comm’n, 182 F.3d 1224, 1235 |
(10th Cir. 1999). |
28. Solove, D igital Person, 93-101; Daniel J. Solove, “Identity Theft, Privacy, |
and the Architecture of Vulnerability,” 54 H astings Law Journal 1227 (2003). |
29. Dyer v. Northwest Airlines Corp., 334 F Supp. 2d 1196, 1200 (D.N.D. |
2004). Another court reached a similar conclusion. See In re Northwest Airlines |
Privacy Litigation, 2004 WL 1278459 (D.Minn. 2004). |
30. 293 A.D.2d 598, 599-600 (N.Y. App. Div. 2002). |
31. John M. Roberts & Thomas Gregor, “Privacy: A Cultural View,” in Notnos |
X III: Privacy 199, 203-14 (J. Roland Pennock & J. W. Chapman eds., 1971). |
32. Dan Rosen, “Private Lives and Public Eyes: Privacy in the United States and |
Japan,” 6 Florida Journal o f International Law 141, 172-73 (1990). |
33. James Whitman, “The Two Western Cultures of Privacy: Dignity Versus |
Liberty,” 113 Yale Law Journal 1151, 1160, 1163, 1171, 1204, 1164, 1221 (2004). |
34. Joel R. Reidenberg, “Setting Standards for Fair Information Practices in the |
U.S. Private Sector,” 80 Iowa Law Review 497, 500 (1995). |
35. Francesca Bignami, “European Versus American Liberty: A Comparative |
Analysis of Anti-terrorism Data-Mining,” 48 Boston College Law Review 609, |
682-86 (2007). |
36. See Marc Rotenberg, “Fair Information Practices and the Architecture of |
Privacy (What Larry Doesn’t Get),” 2001 Stanford Technology Law Review 1 (2001). |
37. Bennett, Regulating Privacy, 96. |
38. Board of Education v. Earls, 536 U.S. 822, 828-29 (2002). |
39. Id. at 832, 833. |
40. Id. at 834. |
41. Nat’l Fed’n of Fed. Employees v. Cheney, 884 F.2d 603 (D.C. Cir. 1989) |
(sustaining U.S. Army’s drug-testing program). |
42. Vemonia School District v. Acton, 515 U.S. 646, 682 (1995). |
43. Earls, 536 U.S. at 848 (Ginsburg, J., dissenting). |
44. See id. at 833 (majority opinion). |
45. John M. Poindexter, “Finding the Face of Terror in Data,” New York Times, |
Sept. 10, 2003, at A25. |
46. Shane Harris, “TIA Lives On,” N ational Journal, Feb. 23, 2006. |
47. GAO Report, D ata M ining: Federal Efforts Cover a W ide Range o f Uses 2 (May |
2004). |
--- |
" |
48. Jacqueline KJosek, The W ar on Privacy 51 (2007). |
49. Leslie Cauley, “NSA Has Massive Database of Americans’ Phone Calls,” |
U SA Today, May 11, 2006, at Al; Susan Page, “Lawmakers: NSA Database Incom |
plete,” U SA Today, June 30, 2006, at Al. |
50. Cauley, “NSA Has Massive Database.” |
51. Daniel J. Solove, Marc Rotenberg, & Paul M. Schwartz, Infom iation Privacy |
Law 603-04 (2d ed. 2006). |
52. Richard A. Posner, “Our Domestic Intelligence Crisis,” Washington Post, |
Dec. 21, 2005, at A31. |
246 |
Notes to Pages 193-196 |
53. Richard A. Posner, N ot a Suicide Pact: The Constitution in a Tim e o f National |
Emergency 97 (2006). |
54. Solove, D igital Person, 165-209; see also Daniel J. Solove, “Digital Dossiers |
and the Dissipation of Fourth Amendment Privacy,” 75 Southern California Law |
Review 1083 (2002). |
55. Roger Clarke, “Information Technology and Dataveillance” 3 (1987), http:// |
www.anu.edu.au/people/Roger.Clarke/DV/CACM88.html. |
56. Christopher Slobogin, “Transaction Surveillance by the Government,” 75 |
Mississippi Law Journal 139 (2005). |
57. Solove, “First Amendment as Criminal Procedure,” 112. |
58. Solove, D igitalPetson, 27-55. |
59. George Orwell, Nineteen Eighty-four (Plume ed. 2003) (originally published |
in 1949). |
60. Franz Kafka, The Trial 158-59 (Breon Mitchell trans., 1998) (originally pub |
lished in 1937). |
61. Solove, D igital Person, 221. |
62. Peck v. United Kingdom [2003] ECHR 44 (2003), at *115. |
63. Id. at TI153, 59, 62. |
Index |
Abortion, 36 |
Abuse, 128; privacy shrouding, 81-82, 97 |
Accessibility, 188. See also Inaccessibility; |
Increased accessibility |
Accidental privacy, 20 |
Accountability, 194; Allen on, 48 |
Acquisti, Alessandro, 73 |
Adams, Michelle, 59, 112 |
Addresses, 69 |
Adultery, 56-57, 95 |
Advertising, 157-58 |
Aesop, 149 |
L'affaire Rachel, 155 |
After the Banquet (Mishima), 141 |
“Age of balancing,” 87 |
“Age of the Goldfish Bowl,” 4 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.