Page 256 - Privacy in a Cyber Age Policy and Practice
P. 256

Index






           accountability, 34–35, 46, 72, 107–108,   communitarianism
              109–111, 144–145, 148–149,    authoritarian, 5, 101, 124
              151–154, 161, 173            civil society, 47, 155
           administrative searches, 42, 106, 134  liberal, 5, 24, 101–103, 124–125,
           advocacy model, 102, 124–125      157–158, 168, 170
           Alexander, Keith, 35, 94, 110, 133, 151  containers, 69
           Alito, Samuel, 2, 11, 27, 57–58, 70  cookies, 75, 77
           al-Zawahiri, Ayman, 126, 131   crime
           Angwin, Julia, 80               difference between terrorism and
           arrest records, 17                crime, 128–129
                                          rates of, 9, 108, 171
           Bates, John, 144, 149           recidivism, 116–117
           big data, see privacy merchants  see also right to be forgotten
           bin Laden, Osama, 126, 130–131  cybernation, 2, 11–12, 32–36, 71–72
           Blair, Tony, 159                deriving sensitive information
           Blitz, Marc Jonathon, 3–4         through, 15, 76
           Brandeis, Louis, 2              distinction from volume, 28, 38
           Bush, George W., 35, 93, 97–98  cybersecurity, 93–100, 138, 147
           California v. Ciraolo, 57      democracy, 53, 109, 154
           California v. Greenwood, 55, 165  digital age, 21–22, 54–55, 58, 67–68,
           Camara v. Municipal Court, 134    86, 89, 106–107, 114, 116–117,
           Cate, Fred, 20                    136
           CCTV, 11, 17, 43–44            digital personhood, 40,
           cell phones                    digitization of records, 17, 19, 32, 114,
             location tracking of, 17, 75, 84, 144  118
             smart phones, 71             social media, 77–78, 81
           wiretapping of, see wiretaps   data collection, 14
           Clinton, Hillary, 114           versus secondary usages, 1–2, 19–21,
           Clapper, James, 143, 150          25, 161
           cloud storage, 17–18, 21–22, 132;    spot collection, 2, 12, 20, 28
              see also digital age        databases, 33, 46, 87, 117–118,
           common good                       137, 157–177; see also privacy
             threats to, 6, 46, 53, 104      merchants
             tradeoff with individual rights,   DeVries, WIll Thomas, 21
              103–104, 105–107, 170–177   distribution, 33–34
   251   252   253   254   255   256   257   258   259