Page 196 - Privacy in a Cyber Age Policy and Practice
P. 196

184  NOTES

           58.  Erica Goode and Sheryl Gay Stolberg, “Legal Curbs Said to Hamper A.T.F. in
              Gun Inquiries,” New York Times (December 25, 2012).
           59.  Tamara Keith, “How Congress Quietly Overhauled Its Insider-Trading Law,”
              NPR, April 16, 2013), available at http://m.npr.org/news/Politics/177496734.
           60. Amitai Etzioni, The Limits of Privacy (New York: Basic Books, 1999).
           61.  Anna C. Henning, “Compulsory DNA Collection: A Fourth Amendment
              Analysis,” Congressional Research Service R40077 (2010): 2.
           62.  Jack Nicas, “TSA to Halt Revealing Body Scans at Airports,” Wall Street Journal
              (January 18, 2013).
           63.  Cynthia Dwork, “Differential Privacy: A Survey of Results,” in M. Agrawal
              et al., eds., TAMC, LNCS 4978 (2008): 1–19. “Roughly speaking, differen-
              tial privacy ensures that the removal or addition of a single database item
              does not (substantially) affect the outcome of any analysis. It follows that no
              risk is incurred by joining the database, providing a mathematically rigor-
              ous means of coping with the fact that distributional information may be
              disclosive.”


                                     Chapter 2

             1.  Amitai Etzioni, “A Cyber Age Privacy Doctrine: A Liberal Communitarian
              Approach,” I/S: A Journal of Law and Policy for the Information Society 10(2),
              Summer 2014, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2348117.
             2.  For example, in the paper age, arrest records were kept by local police depart-
              ments; if an individual wanted to see if a given person had ever been arrested,
              they would have to review many different police departments’ files.
             3.  Elisha Fieldstadt and Becky Bratu, “Missing Passport Databases Not Rou-
              tinely Checked: Interpol,” NBC News, March 9, 2014, http://www.nbcnews
              . com/storyline/missing-jet/missing-passport-databases-not- routinely-
              checked-interpol-n48261.
             4.  Josephine Wolff, “Papers, Please,”  Slate, March 11, 2014, www.slate.com/
              articles/technology/future_tense/2014/03/mh_370_stolen_passports_why_
              don_t_most_countries_check_interpol_s_sltd_database.html.
             5.  Fred Cate, Peter Cullen, and Viktor Mayer-Schönberger, “Reinventing Pri-
              vacy Principles for the Big Data Age,” Oxford Internet Institute, December
              6, 2013, http://www.oii.ox.ac.uk/news/?id=1013. Craig Mundie, “Privacy
              Pragmatism,”  Foreign Affairs (March/April 2014), http://www.foreignaffairs.
              com/articles/140741/craig-mundie/privacy-pragmatism.
            6.  Katz v. United States (389 U.S. 347, 1967).
            7.  Terry v. Ohio (392 U.S. 1, 1968).
            8.  United States v. White (401 U.S. 745, 1971).
            9.  United States v. Knotts (460 U.S. 276, 1983).
           10.  United States v. Karo (468 U.S. 705, 1984).
           11.  Kyllo v. United States (533 U.S. 27, 2001).
           12.  United States v. Jones (565 U.S. ___, 2012).
           13.  Florida v. Jardines (569 U.S. ___, 2013).
   191   192   193   194   195   196   197   198   199   200   201