text
stringlengths
0
118
information, 21; on data mining, 192-93
Postrel, Virginia, 83
Post, Robert, 2, 47, 92, 97,165, 169-70
Power, 87; privacy impeding women’s po­
litical, 82-83; of norms, 94-95; of
interrogation, 115; blackmail and,
152-53; imbalances, 178-79
Powers, Thomas, 86
Pragmatism, 46, 49, 87-89, 91-93;
embracing specifics, 47; family
resemblances and, 47; emphasis in, 75
Privacy: as sweeping concept, 1; defining
difficulty, 1-2; as issue of global concern,
2-4; in Brazil, 3; in Canada, 3; in France, 3;
in Germany, 3; in India, 3; in Japan, 3;
multinational guidelines, 3; in South
Africa, 3; “zone of,” 3; technology and,
4-5; fundamental right, 5; panic about, 5;
as “protean,” 7; understanding, 11; essence,
14,44; Douglas on, 17; inaccessibility and,
19; accidental, 20; common denominator,
20, 37; compulsory, 20; Fourth
Amendment on, 22; group, 23; boundaries,
39; as umbrella term, 45—46; context of,
47-48; in dynamic world, 65-67;
expectations, 74; quest for traditional, 77;
in self-development, 79; for creative
expression, 80; in democracy, 80; as socially
detrimental, 80-81; abuse shrouded by,
81-82,97; impeding commerce, 82-83;
impeding women’s political power, 82-83;
crime prevention and, 83; restricting
information, 83; balancing, 87-88; interests
aligned against, 89; constitutive, 92; as
individual rights, 92; protecting, 93; in
social structure, 93; norms and, 93-98;
society and, 93-98; women’s lack of, 97; as
protection against plurality of problems,
98-100, 171—72; future of, 196-97; “death”
of, 201n23. See also Conceptions of privacy;
Conceptualizing privacy; OECD Privacy
Guidelines; Pluralistic conception of
privacy; Reasonable expectation of privacy
Privacy Act (1974), 122, 128, 130, 159,
234n201; shortcomings of, 179-80;
enforcement of, 180; purpose of, 180;
liquidated-damages provision, 231 n 141
Privacy Act (Australia), 131
Privacy and Freedom (Westin), 4
Privacy-as-secrecy, 22, 23
Privacy, Intimacy, and Isolation (Inness), 34-35
Privacy invasion, 9, 24
Privacy law, 99; ineffective, 2; foundation of,
15; U.S. versus European, 185
Privacy problems, 7,9, 10,40; rising of, 76,
189; harm from, 94; as disruptive, 99-100;
identifying, 101; Prosser on, 101; types of,
103; framework for, 172; nature of, 174;
individual/societal harms, 174-75;
recognizing/redressing, 179-83; analyzing,
183; cultural differences and, 183-87; across
borders, 186; enforcing, 186; creating new,
197. See also Privacy taxonomy
Privacy reconstruction: generality, 9,40-41,
46-50; overview, 39-41; method, 40-46;
focus, 41, 67-77; variability', 41, 50-67
Privacy' rights, 45, 50
Privacy taxonomy, 101-5, 222nl; groups of
activities, 10-11; as contextual approach,
173; focus of, 173; problems in, 184;
framework of, 189. See also Information
collection; Information dissemination;
Information processing; Invasion
Privacy theory: proposed new, 8-11;
generality and, 9; variability and, 9;
developing, 12; of Westin, 24; as general,
40-41; as particular, 41;
cultural/historical variation in, 66-67;
focus of, 76; in future, 196-97. See also
Conceptions of privacy
The Privacy Invaders (Brenton), 4
“The Right of Privacy,” 32
Privacy'torts, 16, 137
Privacy'value: difficulties in assessing, 78;
virtues/vices, 79-84; .Allen on, 84, 97;
intrinsic/instrumental, 84-89; theories of,
84- 89; nonconsequentialist accounts of,
85— 87; pragmatic account of, 87-89,
Index
255
91-93; individual rights and, 89; social,
89-98; communitarian critique, 90-91;
society and, 91, 173-74; pluralistic,
98-100, 187-96; assessing, 99-100; as
variable, 100; Regan on, 179
Privacy violations, 6, 10; Allen on, 18
Private: information, 21; matters, 24; public
versus, 50; body as, 53
Property: information as, 26; control over
personal information and, 26—27; rights,