Page 196 - Privacy in a Cyber Age Policy and Practice
P. 196
184 NOTES
58. Erica Goode and Sheryl Gay Stolberg, “Legal Curbs Said to Hamper A.T.F. in
Gun Inquiries,” New York Times (December 25, 2012).
59. Tamara Keith, “How Congress Quietly Overhauled Its Insider-Trading Law,”
NPR, April 16, 2013), available at http://m.npr.org/news/Politics/177496734.
60. Amitai Etzioni, The Limits of Privacy (New York: Basic Books, 1999).
61. Anna C. Henning, “Compulsory DNA Collection: A Fourth Amendment
Analysis,” Congressional Research Service R40077 (2010): 2.
62. Jack Nicas, “TSA to Halt Revealing Body Scans at Airports,” Wall Street Journal
(January 18, 2013).
63. Cynthia Dwork, “Differential Privacy: A Survey of Results,” in M. Agrawal
et al., eds., TAMC, LNCS 4978 (2008): 1–19. “Roughly speaking, differen-
tial privacy ensures that the removal or addition of a single database item
does not (substantially) affect the outcome of any analysis. It follows that no
risk is incurred by joining the database, providing a mathematically rigor-
ous means of coping with the fact that distributional information may be
disclosive.”
Chapter 2
1. Amitai Etzioni, “A Cyber Age Privacy Doctrine: A Liberal Communitarian
Approach,” I/S: A Journal of Law and Policy for the Information Society 10(2),
Summer 2014, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2348117.
2. For example, in the paper age, arrest records were kept by local police depart-
ments; if an individual wanted to see if a given person had ever been arrested,
they would have to review many different police departments’ files.
3. Elisha Fieldstadt and Becky Bratu, “Missing Passport Databases Not Rou-
tinely Checked: Interpol,” NBC News, March 9, 2014, http://www.nbcnews
. com/storyline/missing-jet/missing-passport-databases-not- routinely-
checked-interpol-n48261.
4. Josephine Wolff, “Papers, Please,” Slate, March 11, 2014, www.slate.com/
articles/technology/future_tense/2014/03/mh_370_stolen_passports_why_
don_t_most_countries_check_interpol_s_sltd_database.html.
5. Fred Cate, Peter Cullen, and Viktor Mayer-Schönberger, “Reinventing Pri-
vacy Principles for the Big Data Age,” Oxford Internet Institute, December
6, 2013, http://www.oii.ox.ac.uk/news/?id=1013. Craig Mundie, “Privacy
Pragmatism,” Foreign Affairs (March/April 2014), http://www.foreignaffairs.
com/articles/140741/craig-mundie/privacy-pragmatism.
6. Katz v. United States (389 U.S. 347, 1967).
7. Terry v. Ohio (392 U.S. 1, 1968).
8. United States v. White (401 U.S. 745, 1971).
9. United States v. Knotts (460 U.S. 276, 1983).
10. United States v. Karo (468 U.S. 705, 1984).
11. Kyllo v. United States (533 U.S. 27, 2001).
12. United States v. Jones (565 U.S. ___, 2012).
13. Florida v. Jardines (569 U.S. ___, 2013).