Page 256 - Privacy in a Cyber Age Policy and Practice
P. 256
Index
accountability, 34–35, 46, 72, 107–108, communitarianism
109–111, 144–145, 148–149, authoritarian, 5, 101, 124
151–154, 161, 173 civil society, 47, 155
administrative searches, 42, 106, 134 liberal, 5, 24, 101–103, 124–125,
advocacy model, 102, 124–125 157–158, 168, 170
Alexander, Keith, 35, 94, 110, 133, 151 containers, 69
Alito, Samuel, 2, 11, 27, 57–58, 70 cookies, 75, 77
al-Zawahiri, Ayman, 126, 131 crime
Angwin, Julia, 80 difference between terrorism and
arrest records, 17 crime, 128–129
rates of, 9, 108, 171
Bates, John, 144, 149 recidivism, 116–117
big data, see privacy merchants see also right to be forgotten
bin Laden, Osama, 126, 130–131 cybernation, 2, 11–12, 32–36, 71–72
Blair, Tony, 159 deriving sensitive information
Blitz, Marc Jonathon, 3–4 through, 15, 76
Brandeis, Louis, 2 distinction from volume, 28, 38
Bush, George W., 35, 93, 97–98 cybersecurity, 93–100, 138, 147
California v. Ciraolo, 57 democracy, 53, 109, 154
California v. Greenwood, 55, 165 digital age, 21–22, 54–55, 58, 67–68,
Camara v. Municipal Court, 134 86, 89, 106–107, 114, 116–117,
Cate, Fred, 20 136
CCTV, 11, 17, 43–44 digital personhood, 40,
cell phones digitization of records, 17, 19, 32, 114,
location tracking of, 17, 75, 84, 144 118
smart phones, 71 social media, 77–78, 81
wiretapping of, see wiretaps data collection, 14
Clinton, Hillary, 114 versus secondary usages, 1–2, 19–21,
Clapper, James, 143, 150 25, 161
cloud storage, 17–18, 21–22, 132; spot collection, 2, 12, 20, 28
see also digital age databases, 33, 46, 87, 117–118,
common good 137, 157–177; see also privacy
threats to, 6, 46, 53, 104 merchants
tradeoff with individual rights, DeVries, WIll Thomas, 21
103–104, 105–107, 170–177 distribution, 33–34