References - Springer978-0-387-28222-0/1.pdf · Internet, 487 PROC O. F THE IEE E INT' CARNAHAL N...

18
References Ackerman, M., L. Cranor and J. Reagle, Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences, PROC. ACM CONFERENCE ON ELECTRONIC COMMERCE (1998) Acquisti, A., Privacy in Electronic Commerce and the Economics of Immediate Gratification, in PROC. ACM CONF. ON ELECTRONIC COMMERCE (EC 04) (2004). Adomavicius, G. and A. Tuzhilin, User Profiling in Personalization Applications through Rule Discovery and Validation, 5 PROC. OF THE ACM SIGKDD INT'L CoNF. ON KNOWLEDGE DISCOVERY AND DATA MINING (1999). Agrawal, R. and R. Srikant, Privacy-Preserving Data Mining, in 2000 PROC. ACM SIGMOD CONF. ON MANAGEMENT OF DATA. Ainslie, George, BREAKDOWN OF WILL (2001). Albrecht, Spencer, THE AMERICAN BALLOT (1942). Allen, Anita L., Coercing Privacy, 40 WM. AND MARY L. REV. 723 (1999). Allen, Anita L., The Wanted Gaze: Accountability for Interpersonal Conduct at Work, 89 GEO. L. REV. 2013 (2001).

Transcript of References - Springer978-0-387-28222-0/1.pdf · Internet, 487 PROC O. F THE IEE E INT' CARNAHAL N...

References

Ackerman, M., L. Cranor and J. Reagle, Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences, PROC. ACM CONFERENCE ON ELECTRONIC COMMERCE (1998)

Acquisti, A., Privacy in Electronic Commerce and the Economics of Immediate Gratification, in PROC. ACM CONF. ON ELECTRONIC COMMERCE (EC 04) (2004).

Adomavicius, G. and A. Tuzhilin, User Profiling in Personalization Applications through Rule Discovery and Validation, 5 PROC. OF THE ACM SIGKDD INT'L CoNF. ON KNOWLEDGE DISCOVERY AND DATA

MINING (1999).

Agrawal, R. and R. Srikant, Privacy-Preserving Data Mining, in 2000 PROC. ACM SIGMOD CONF. ON MANAGEMENT OF DATA.

Ainslie, George, BREAKDOWN OF WILL (2001).

Albrecht, Spencer, THE AMERICAN BALLOT (1942).

Allen, Anita L., Coercing Privacy, 40 WM. AND MARY L. REV. 723 (1999).

Allen, Anita L., The Wanted Gaze: Accountability for Interpersonal Conduct at Work, 89 GEO. L. REV. 2013 (2001).

366

Ayres, Ian & Matthew Funk, Marketing Privacy, 20 YALE J. ON REG. 77 (2003).

Balkin, J.M., CULTURAL SOFTWARE: A THEORY OF IDEOLOGY 141 (1998).

Bell, Christopher L., The ISO 14001 Environmental Management Systems Standard: A Modest Perspective, 27 ENVTL. L. REP. 10 (Dec. 1997).

Benassi, P., TRUSTe: An Online Privacy Seal Program, 42 COMM. OF THE ACM (1999).

Benham, Lee, The Effect of Advertising on the Price of Eyeglasses, 15 J.L.&ECON. 337 (1972).

Berry, M. and G. Linoff, DATA MINING TECHNIQUES FOR MARKETING, SALES AND CUSTOMER SUPPORT (1997).

Blackstone, William, COMMENTARIES ON THE LAWS OF ENGLAND 2 (facsimile ed. 1979) (1766).

Boger, Z. et al., Automatic Keyword Identification by Artificial Neural Networks Compared to Manual Identification by Users of Filtering Systems, 37 iNFO. PROCESSING & MGMT. 187 (2001).

Boyle, James, A Politics of Intellectual Property: Environmentalism for the Net?, 47 DUKE L.J. 87 (1997).

Boyle, James, Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors, 66 U. CiN. L. REV. 177 (1997).

Brand, Stewart, THE MEDIA LAB: INVENTING THE FUTURE AT MIT (1987).

Brandeis, Louis & Samuel Warren, The Right to Privacy, 4 HARV. L.

REV. 193(1890).

Branscomb, Anne W., WHO OWNS INFORMATION? (1994). Calabresi, Guido & A. Douglas Melamed, Property Rules, Liability Rules, and Inalienability: One View of the Cathedral, 85 HARV. L. REV. 1089(1972).

References 367

Cameron, Alex, Digital Rights Management: Where Copyright and Privacy Collide, 2 CANADIAN PRIVACY LAW REV. 14 (2004).

Chase, Adam, The Efficiency Benefits of ''Green Taxes,'' A Tribute to Senator John Heinz, 11 UCLA J. ENVTL. L. & POL'Y 1 (1992).

Chen, G. and S. Keller-McNulty, Estimation of Deidentification Disclosure Risk in Microdata, 14 J. OF OFFICIAL STATISTICS 79 (1998).

Claessens, J. et al. Solutions for Anonymous Communication on the Internet, 487 PROC. OF THE IEEE INT'L CARNAHAN CONF. ON SECURITY TECH. 298 (1999).

Claypool, M. et al.. Implicit Interest Indicators, 6 PROC. OF THE iNT'L CoNF. ON INTELLIGENT USER INTERFACES (2001).

Coase, Ronald, The Problem of Social Cost, 3 J.L. & ECON. 1 (1960).

Cohen, Fred, Is Open Source More or Less Secure? MANAGING NETWORK SECURITY, (July 2002).

Cohen, Julie E., Examined Lives: Informational Privacy and the Subject as Object, 52 STAN. L. REV. 1373 (2000).

Conway, R. and D. Strip, Selective Partial Access to a Database, in 1976 PROC. ANN. ACM CoNF.

Dagan, Hanoch & Michael A. Heller, The Liberal Commons, 110 YALE L.J. 549(2001).

Dalenius, T. and S.P. Reiss, Data-Swapping: A Technique for Disclosure Control, 6 J. OF STATISTICAL PLANNING AND INFERENCE 73 (1982).

Deerwester, S. et al. Indexing by Latent Semantic Indexing, 41 J. OF THE AM. SOC'Y FOR INFO. SCI. (1990).

Derrida, J., Plato's Pharmacy, in DISSEMINATION (B. Johnson trans., 1981).

Derry, T.K. & Trevor I. Williams, A SHORT HISTORY OF TECHNOLOGY: FROM THE EARLIEST TIMES TO A.D. 1900 (1960).

368

Dershowitz, Alan M., WHY TERRORISM WORKS: UNDERSTANDING THE THREAT, RESPONDING TO THE CHALLENGE (2002).

Dripps, Donald A., Terror and Tolerance: Criminal Justice for the New Age of Anxiety, 1 OHIO ST. J. OF CRIM. L. 9 (2003).

du Pont, George F., The Time has Come for Limited Liability for Operators of True Anonymity Remailers in Cyberspace: An Examination of the Possibilities and Perils, 6 FALL J. TECH. L. & POL'Y 3 (2001).

Duda, R. and P. Hart, PATTERN CLASSIFICATION AND SCENE ANALYSIS

(1973).

Dworkin, G., THE THEORY AND PRACTICE OF AUTONOMY (1988).

Elliot, M.J., DIS: A New Approach to the Measurement of Statistica Disclosure Risk, INT'L. J. OF RISK MGMT. 39 (2000).

Ellmann, Stephen J., Racial Profiling and Terrorism, 22 N.Y.L.S. L. REV. 675 (2003).

Elovici, Y. et al., A New Privacy Model for Hiding Group Interests while Accessing the Web, WORKSHOP ON PRIVACY IN THE ELECTRONIC Soc'Y IN ASS'N WITH 9™ ACM CONF. ON COMPUTER AND COMM. SECURITY (2002).

Emmerink, Richard H. M., INFORMATION AND PRICING IN ROAD TRANSPORTATION (1998).

Epstein, Richard A., The Allocation of the Commons: Parking on Public Roads, 31 J. LEGAL STUD. S515 (2002).

Fellegi, LP., On the Question of Statistical Confidentiality, 67 J. OF THE AM. STATISTICAL ASS'N 7 (1972).

Fishbein, M. and I. Azjen, BELIEF, ATTITUDE, INTENTION AND BEHAVIOR: AN INTRODUCTION TO THEORY AND RESEARCH (1975).

Flaherty, David H., PROTECTING PRIVACY IN SURVEILLANCE SOCIETIES: THE FEDERAL REPUBLIC OF GERMANY, SWEDEN, FRANCE, CANADA,

AND THE UNITED STATES (1989).

References 369

Fox, Susannah, Trust and Privacy Online: Why Americans Want to Rewrite the Rule (2000).

Froomkin, A. Michael, Anonymity in the Balance, in DIGITAL ANONYMITY AND THE LAW (C. Nicoll et al. eds., 2003).

Froomkin, A. Michael, Symposium: Cyberspace and Privacy: A New Legal Paradigm?: The Death of Privacy?, 52 STAN. L. REV. 1461 (2000).

Frum, David & Richard Perle, AN END TO EVIL: HOW TO WIN THE WAR ON TERROR 69-73 (2003).

Fulda, Joseph, Data Mining and Privacy, 11 ALB. L.J. SCI. & TECH. 105 (2000).

Gabber, E. et al. On Secure and Pseudonymous Client-Relationships with Multiple Severs, 2 ACM TRANSACTIONS ON INFO. AND SYSTEMS SECURITY (1999)

Gabber, E., et al. Consistent, yet Anonymous, Web Access with LPWA, 42 COMM. OF THE ACM 42-47 (1999).

Gandy, Oscar H., Jr., THE PANOPTIC SORT: A POLITICAL ECONOMY OF PERSONAL INFORMATION 10 (1993).

Gandy, Oscar H., Jr., THE PANOPTIC SORT: A POLITICAL ECONOMY OF PERSONAL INFORMATION (1993).

Garfinkel, S., DATABASE NATION: THE DEATH OF PRIVACY IN THE 21^^ CENTURY, (2000).

Glancy, Dorothy, At the Intersection of Visible and Invisible Worlds: United States Privacy Law and the Internet, 16 SANTA CLARA COMPUTER & HIGH TECH. L.J. 357 (2000).

Goldschlag, D.M. et al. Hiding Routing Information, Information Hiding 1174 SPRINGER-VERLAG LLNCS 137 (R. Anderson ed., 1996).

Goldschlag, D.M. et al. Onion Routing for Anonymous and Private Internet Connections, 42 COMM. OF THE ACM 39 (1999).

370

Gurstein, Rochelle, THE REPEAL OF RETICENCE: A HISTORY OF AMERICA'S CULTURAL AND LEGAL STRUGGLES OVER FREE SPEECH,

OBSCENITY, SEXUAL LIBERATION, AND MODERN ART (1996).

Hagel, John III & Marc Singer, NET WORTH: SHAPING MARKETS WHEN CUSTOMERS MAKE THE RULES (1999).

Han, Jiawei and Micheline Kamber, DATA MINING: CONCEPTS AND TECHNIQUES (2001).

Hand, D. J., H. Mannila & P. Smyth, PRINCIPLES OF DATA MINING (2001).

Harris, David A., Car Wars: The Fourth Amendment's Death on the Highway, 66 GEO. WASH. L. REV. 556 (1998).

Harris, David A., PROFILES IN INJUSTICE: WHY RACIAL PROFILING CANNOT WORK 73 (2002).

Harris, David A., The Stories, the Statistics, and the Law: Why ''Driving While Black" Matters, 84 MiNN. L. REV. 265 (1999).

Hohfeld, Wesley Newcomb, Fundamental Legal Conceptions as Applied in Judicial Reasoning, 26 YALE L.J. 710(1917).

Hughes, Arthur M., THE COMPLETE DATABASE MARKETER 354 (2d ed. 1996).

Hunter, Richard, WORLD WITHOUT SECRETS: BUSINESS, CRIME, AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING 7 (2002).

Jamieson, Kathleen Hall and Karlyn Kohrs Campbell, THE INTERPLAY OF INFLUENCE: NEWS ADVERTISING, POLITICS, AND THE MASS MEDIA

195(4'^ ed., 1997).

Jange, Edward J. and Paul M. Schwartz, The Gramm-Leach-Bliley Act, Information Privacy, and the Limits of Default Rules, 86 MiNN. L. REV. 1219(2002).

Jaro, M.A., Advances in Record-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida, 84 J. OF AM. STATISTICS ASS'N, 414 (1989).

References 371

Johnson, Neil F. and Sushil Jajodia, Steganography: Seeing the Unseen, IEEE COMPUTER (February 1998) at 26.

Johnson, Stephen M., ECONOMICS, EQUITY AND THE ENVIRONMENT (2004).

Juels, A. and J. Brainard, Soft Blocking: Flexible Blocker Tags on the Cheap, PROC. 2004 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOC'Y 1 (V. Atluri, P. F. Syverson, S. De Capitani di Vimercati, eds., 2004).

Juels, A., R.L. Rivest, M. Szydlo, The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy, 8™ ACM CONF. ON COMPUTER AND COMM. SECURITY 103 (V. Atluri, ed., 2003).

Jurafsky, D. and J. H. Martin, SPEECH AND LANGUAGE PROCESSING (2000).

Kafka, Frank, THE TRIAL (Willa & Edwin Muir trans., 1937).

Kahneman, Daniel and Amos Tversky, eds., CHOICES, VALUES, AND FRAMES (2000).

Kang, Jerry, Information Privacy in Cyberspace Transactions, 50 STAN. L.REV. 1193(1998).

Kao, Alice, RIAA V. Verizon: Applying the Subpoena Provision of the DMCA, 19 BERKELEY TECH. L.J. 405 (2004)

Karas, Stan, Privacy, Identity, and Databases, 52 AM. U. L. REV. 393 (2002).

Kennedy, Michael, THE GLOBAL POSITIONING SYSTEM AND GIS: AN INTRODUCTION (2nd ed., 2002).

Kerr, Ian R. & Daphne Gilbert, The Changing Role of ISPs in the Investigation of Cybercrime, in INFORMATION ETHICS IN AN ELECTRONIC AGE: CURRENT ISSUES IN AFRICA AND THE WORLD (Thomas Mendina & Johannes Brtiz eds., 2004).

372

Kerr, Ian, The Legal Relationship Between Online Service Providers and Users, 35 CAN. BUS. L.J. 40 (2001).

Korobkin, Russell, The Endowment Effect and Legal Analysis, Symposium on Empirical Legal Realism: A New Social Scientific Assessment of Law and Human Behavior, 97 Nw. U.L. REV. 1227 (2003).

Lafave, Wayne R., The ''Routine Traffic Stop" from Start to Finish: Too Much ''Routine,'' Not Enough Fourth Amendment, 102 MICH. L. REV. 1843(2004).

Lear, Rick S. & Jefferson D. Reynolds, Your Social Security Number or Your Life: Disclosure of Personal Identification Information by Military Personnel and the Compromise of Privacy and National Security, 21 B. U. INTL. L. J. 1 (2003).

Lessig, L., The Path ofCyberlaw, 104 YALE L.J. 1743 (1995).

Lessig, L., The Law of the Horse: What Cyberlaw Might Teach, 113 HARV.L.REV. 501(1999).

Lipton, Jacqueline, Information Property: Rights and Responsibilities, 56 FLA. L. REV. 135(2004).

Litan, Robert E., Law and Policy in the Age of the Internet, 50 DUKE L. J. 1045 (2001).

Litman, Jessica, Information Privacy/Information Property, 52 STAN. L. REV. 1283 (2000).

LoPucki, Lynn M., Human Identification Theory and the Identity Theft Problem, 80 TEX. L. REV. 89 (2001).

Luz, M.Q. & M. Javed, Empirical Evaluation of Explicit versus Implicit Acquisition of User Profiles in Information Filtering Systems, 4 PROC. OF THE ACM CONF. ON DIGITAL LiBR. (1999).

Lyon, David, ed.,SuRVEiLLANCE AS SOCIAL SORTING: PRIVACY, RISK

AND AUTOMATED DISCRIMINATION (2002).

References 373

Maiden, D., Machine Learning Used by Personal WebWatcher, 1999 PROC. OF A C A I - 9 9 WORKSHOP ON MACHINE LEARNING AND

INTELLIGENT AGENTS.

Mailman, Otto, § 6, in KOMMENTAR ZUM BUNDESDATENSCHUTZGESETZ 545 (Spiros Simitis ed., 5th ed. 2003).

Maltoni, D., D. Maio, A.K. Jain, and S. Prabhakar, HANDBOOK OF FINGERPRINT RECOGNITION (2003).

Mank, Brad, The Environmental Protection Agency's Project XL and Other Regulatory Reform Initiatives: The Need for Legislative Authorization, 1998 ECOLOGY L. Q. 1.

McAdams, Richard H., The Origin, Development and Regulation of Norms, 96 MICH. L. REV. 338 (1997).

McClurg, Andrew J., A Thousand Words Are Worth a Picture: A Privacy Tort Response to Consumer Data Profiling, 98 Nw. U. L. REV. 63 (2003).

McCormick, Richard P., THE HISTORY OF VOTING IN NEW JERSEY (1953).

McLauglin, Marsha Morrow & Suzanne Vaupel, Constitutional Right of Privacy and Investigative Consumer Reports: Little Brother Is Watching You, 2 HASTING CONST. L.Q. 773 (1975).

Mill, John Stuart, ON LIBERTY (Gateway 1955) (1859).

Monahan, Kevin and Don Douglas, GPS INSTANT NAVIGATION: FROM BASIC TECHNIQUES TO ELECTRONIC CHARTING (2nd ed., 2000).

Monmonier, Mark, SPYING WITH MAPS: SURVEILLANCE TECHNOLOGIES AND THE FUTURE OF PRIVACY (2002).

Murphy, Richard S., Property Rights in Personal Information: An Economic Defense of Privacy, 84 GEO. L.J. 2381 (1996).

Nagel, R., Unraveling in Guessing Games: An Experimental Study, 85 AMER. ECON. REV. 1313 (1995).

374

Netanel, Neil Weinstock, Cyberspace Seif Governance: A Skeptical View from Liberal Democratic Theory, 88 CAL. L. REV. 395 (2000).

Orts, Eric, Reflexive Environmental Law, 89 Nw. U. L. REV. 1227 (1995).

Orwell, George, 1984 (1949).

Overton, Hon. Ben F. & Katherine E. Giddings, The Right of Privacy in Florida in the Age of Technology and the Twenty-First Century: A Need for Protection from Private and Commercial Intrusion, 25 FLA. ST. U. L REV. 25 (1997).

Pearson, Eric, ENVIRONMENTAL AND NATURAL RESOURCES LAW (2002).

Posner, R.A., The Economics of Privacy, 71 AM. ECON. REV. 405 (1981).

Posner, Richard A., The Right of Privacy, 12 GA. L. REV. 393 (1977-78).

Post, Robert C, The Unwanted Gaze, by Jeffrey Rosen: Three Concepts of Privacy, 89 GEO. L.J. 2087 (2001).

Rabushka, Alvin and Kenneth Shepsle, POLITICS IN PLURAL SOCIETIES: A THEORY OF DEMOCRATIC INSTABILITY (1972).

Radin, Margaret Jane, CONTESTED COMMODITIES (1996).

Ramsay, Iain, ADVERTISING, CULTURE AND THE LAW - BEYOND LIES,

IGNORANCE AND MANIPULATION (1996).

Raz, J., THE MORALITY OF FREEDOM (1986).

Richards, Jef, DECEPTIVE ADVERTISING (1990, Lawrence Erlbaum).

Rose, Carol M., Canons of Property Talk, or, Blackstone's Anxiety, 108 YALE L.J. 601(1998).

Rose-Ackerman, Susan, Inalienability and the Theory of Property Rights, 85 COLUM. L. REV. 931 (1985).

Salton, G., INTRODUCTION TO MODERN iNFO. RETRIEVAL (W.J. McGill, ed., McGraw-Hill 1983).

References 375

Salzman, James & Barton H. Thompson Jr., ENVIRONMENTAL LAW AND POLICY (2003).

Samarati, Pierangela and Latanya Sweeney, Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression, SRI TECH. REP. (1998).

Samuelson, Pamela, Privacy as Intellectual Property, 52 STAN L. REV. 1125(2000).

Schultz, Brian S., Electronic Money, Internet Commerce, and the Right to Financial Privacy: A Call for New Federal Guidelines, 67 U. ClN. L. REV. 779 (1999).

Schwartz, Paul M., Privacy and Democracy in Cyberspace, 52 VAND. L.

REV. 1609(1999).

Schwartz, Paul M., Privacy and Participation: Personal Information and Public Sector Regulation in the United States, 80 IOWA L. REV. 553 (1995).

Schwartz, Paul M., Privacy and the Economics of Personal Health Care Information, 76 TEX. L. REV. 1 (1997).

Schwartz, Paul M., Property, Privacy, and Personal Data, 117 HARV. L.

REV. 2055 (2004).

Schwartz, Paul, The Computer in German and American Constitutional Law: Towards an American Right of Informational Self-Determination, 37 AM. J. COMP. L. 675(1989).

Selten, R., What is Bounded Rationality? in BOUNDED RATIONALITY: THE ADAPTIVE TOOLBOX (G. Gigerenzer and R. Selten, eds., 2001).

Shabecoff, Philip, A FIERCE GREEN FiRE: THE AMERICAN ENVIRONMENTAL MOVEMENT (1993).

Shapira, B. et al, PRAW- The Model for the Private Web, J. OF THE AM. Soc'Y FOR INFO. SCI. AND TECH. (forthcoming).

Shenk, David, DATA SMOG 114 (1997).

376

Simitis, Spiros, Das Volkszählungsurteil oder der Lane Weg zur Informationsaskese, 83 KRITISCHE VIERTELJAHRESSCHRIFT FÜR GESETZGEBUNG UND RECHTSWISSENSCHAFT 359 (2000).

Simitis, Spiros Einleitung, in KOMMENTAR ZUM BUNDESDATENSCHUTZGESETZ 545 (Spiros Simitis ed., 5th ed. 2003).

Simon, H.A., MODELS OF BOUNDED RATIONALITY (1982).

Skinner, C.J. and M.J. Elliot, A Measure of Disclosure Risk for Microdata, 64 J. OF THE ROYAL STATISTICAL SOC'Y 855 (2002).

Skinner, C.J. et al.. Disclosure Control for Census Microdata, J. OF OFFICIAL STATISTICS 31 (1994).

Slobogin, Christopher, Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity, 72 MISS. L.J. 213 (2002).

Solove, Daniel J. & Marc Rotenberg, INFORMATION PRIVACY LAW (2003).

Solove, Daniel J., THE DIGITAL PERSON (2004).

Solove, Daniel J., The Virtues of Knowing Less: Justifying Privacy Protections against Disclosure, 53 DUKE L. J. 967 (2003).

Spiekermann, Sarah, Jens Grossklags, and Bertina Berendt, E-Privacy in 2^^ Generation E-Commerce: Privacy Preferences v. Actual Behavior, in 3RD ACM CONFERENCE ON ELECTRONIC COMMERCE - EC '01 (2002).

Staples, William G., THE CULTURE OF SURVEILLANCE: DISCIPLINE AND

SOCIAL CONTROL IN THE UNITED STATES (1997).

Stefani, A. and C. Strappavara, Personalizing Access to Websites: The SitelF Project, 2 PROC. OF THE WORKSHOP ON ADAPTIVE HYPERTEXT

AND HYPERMEDIA (1998).

Sterne, Jim, WHAT MAKES PEOPLE CLICK: ADVERTISING ON THE WEB (1997).

References 311

Stewart, Richard, A New Generation of Environmental Regulation?, 29 CAPITAL L. REV. 21 (2001).

Stigler, G.J., An Introduction to Privacy in Economics and Politics, 9 J. LEGAL STUDIES 623 (1980).

Strandburg, Katherine J., Privacy, Rationality, and Temptation: A Theory of Willpower Norms, RUTGERS L. REV. (forthcoming 2005).

Syverson, P. and A. Shostack, What Price Privacy? in THE ECONOMICS OF INFORMATION SECURITY (L.J. Camp and S. Lewis, eds., 2004).

Syverson, P.P. et al. Anonymous Connections and Onion Routing, 18 PROC. OF THE ANNUAL SYMP. ON SECURITY AND PRIVACY 44 (1997).

Truta, T.M. et al. Disclosure Risk Measures for Microdata, INT'L CONF. ON Sci. AND STATISTICAL DATABASE MGMT. 15 (2003).

Truta, T.M. et al. Disclosure Risk Measures for Sampling Disclosure Control Method, ANN. ACM SYMP. ON APPLIED COMPUTING 301 (2004).

Trute, Hans-Heinrich, Verfassungsrechtliche Grundlagen, in HANDBUCH DATENSCHUTZ: DIE NEUEN GRUNDLAGEN FÜR WIRTSCHAFT UND

VERWALTUNG 156 (Alexander Rossnagel ed., 2003).

Turk, M. and A. Pentland, Eigenfaces for Recognition, 3 J. COGNITIVE NEUROSCIENCE 71 (1991).

Turkington, Richard C. & Anita L. Allen, PRIVACY LAW: CASES AND MATERIALS (2"^ ed. 2002).

Urken, Arthur B, Voting in A Computer-Networked Environment, in THE INFORMATION WEB: ETHICAL AND SOCIAL IMPLICATIONS OF

COMPUTER NETWORKING (Carol Gould, ed., 1989).

Volokh, Eugene, Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People From Speaking About You, 52 STAN. L. REV. 1049 (2000).

Wayman, J.L., FUNDAMENTALS OF BioMETRic TECHNOLOGIES,

available at http://www.engr.sjsu.edu/biometrics/publications tech.html.

378

Weber, Max, ECONOMY AND SOCIETY (Guenther Roth & Claus Wittich eds., 1978).

Westin, Alan F., PRIVACY AND FREEDOM (1967).

Westin, Alan F., Privacy in the Workplace: How Well Does American Law Reflect American Values?, 72 CHI.-KENT L. REV. 271 (1996).

Westin, Alan, PRIVACY AND FREEDOM (1967).

Widyantoro, D.H. et al, Learning User Interest Dynamics with a Three-Descriptor Representation, 52 J. OF THE AM. SOC'Y OF iNFO. SCI. AND TECH. 212 (2001).

Wigmore, J. H., THE AUSTRALIAN BALLOT SYSTEM (2nd ed., Boston, 1889).

Winter, Steven L, A CLEARING IN THE FOREST: LAW, LIFE, AND MIND (2001).

Woodward, John et ai, IDENTITY ASSURANCE IN THE INFORMATION AGE (2003).

Wuchek, Wendy, Conspiracy Theory: Big Brother Enters the Brave New World of Health Care Reform, 3 DEPAUL J. HEALTH CARE L. 293 (2000).

Yao, Andrew, Protocols for Secure Computations, PROC. OF THE IEEE SYMP. ON THE FOUNDS, OF COMPUTER SCL, 160 (1982).

Zarsky, Tal Z., ''Mine Your Own Business!": Making the Case for the Implications of the Mining of Personal Information in the Forum of Public Opinion, 5 YALE J.L. & TECH. 4 (2003).

Zarsky, Tal Z., Desperately Seeking Solutions - Using Implementation-Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society, 56 ME. L. REV. 13 (2004).

Zarsky, Tal Z., Thinking Outside the Box: Considering Transparency, Anonymity, and Pseudonymity as Overall Solutions to the Problems of Information Privacy in the Internet Society, 58 U. MIAMI L. REV. 991 (2004).

References 379

Zarsky, Tal, Cookie Viewers and the Undermining of Data-Mining: A Critical Review of the DoubleClick Settlement, 2002 STAN. TECH. L. REV. PI (2002).

Zimmerman, Diane L., 68 CORNELL L. REV. 291 (1983).

Index

Access control, 118, 129-30, 135-37, 140, 145

Advertising, 7, 45-46, 52, 209, 216, 219-22, 225, 234-35, 244 Online, 209, 216, 218-19

Anonymity, 24-25, 28, 97, 162, 173-77, 180, 183, 185-88, 210, 257, 260-61, 269, 271-72, 280, 284, 287, 293, 313-14, 316-18, 324, 326, 328, 330-31, 335-39, 344, 348 Identification, 13, 57-58, 66, 75, 79,

81,94, 173-79, 181-83, 185-86, 188,204,235-36,256-57,260, 262, 272, 296, 297-306, 311, 317, 337, 339, 344, 348-49, 353

Attention, 32, 43, 46, 66, 86, 101, 112, 146, 187, 191, 194, 207, 210-11, 213, 216-18, 225-26, 230-37, 272, 286, 296

Biometrics, 115, 117-34, 135-48, 151-69, 173, 297 Authentication, 117-18, 121, 126-30,

133,143-144,148,153,317,346 Facial recognition, 127-28, 133, 135,

137, 139, 140, 142, 144, 146-48, 154, 157, 173-88

Fingerprinting, 117, 120, 122-24, 129-33, 135-38, 140, 142-46, 148, 153, 155-56

Identification, 117-18, 120-31, 135-40, 143-45, 148, 153, 156, 160, 162, 173-76, 179-88

Iris patterns, 124-25, 130, 138, 142-43 Computer Matching and Privacy

Protection Act of 1988, 151, 165, 166 Consumer behavior, 6, 20-23, 35, 40-42,

45, 50, 51, 53, 57, 60-73, 83, 93, 96, 98-99,101-03,105, 107, 111,151, 164, 170-171, 212, 217-22, 230-34, 245-46

Copyright, 270, 274, 286 Cybercrime, 269, 290, 292 Data collection, 23-27, 35, 40, 42-43, 45,

47, 58, 96, 110, 166, 192-93, 200-01, 212, 214, 255, 298, 306, 309-10

Data integration, 206, 258 Data mining, 31, 47, 191-208, 209, 214-

15, 217, 219, 225-30, 234, 237, 239, 242, 245-46, 255-57, 259-63, 266, 337 Text mining, 255, 257, 259

Data quality, 167,203,259 Data trade, 93-96, 99, 102-03, 107, 109-

12 Data warehouse, 213, 225-27 Database, 4, 6, 7 Databases, 3-8, 10-11, 50, 64,-65, 89, 94,

107, 118, 120-21, 128, 137-40, 153, 160, 166, 178-79, 187, 192-93, 199, 205, 214-15, 219, 225-28, 251, 255-

Index 382

59, 261, 263, 266, 276, 292, 295-96, 297, 304-11, 319, 329, 335, 344, 346

Decision trees, 195, 205 Direct marketing, 209, 225-26, 230-33,

237 Due process, 151, 160, 194, 198-200,

202-03 Electronic commerce, 23-27, 118, 213,

239,241,246,253 Electronic mail, 6, 12, 20, 22-23, 26, 37,

52, 213, 223, 225, 227, 235, 239, 241, 242, 244-45, 247-48, 253, 256, 339

Encryption, 23, 57, 68-69, 326, 338 Environmental law, 239-40, 253 Expectation of privacy

Normative, 170 Reasonable, 53, 154, 157, 201, 310

Experimental economics, 15-29 Externalities, 17, 225, 231-33, 243, 244-

45 Fair information practices, 163, 166

OECD Guidelines, 25, 167-68 First Amendment, 34, 158, 173-75, 177,

187,212,222,280 Fourth Amendment, 35, 52, 71, 118, 121,

126, 130, 154-59, 168, 173, 180, 182-88, 197-201, 203, 222-23, 258, 276, 278-79, 281, 295, 297-98, 300-01, 305-07, 309-10, 335, 343-44, 347-48, 359

Function creep, 132 Geolocation, 75, 78, 81 GPS, 75-92, 94, 111

Indoor, 75, 80 Gramm-Leach-Bliley Act, 42, 93, 98,

100, 108 Hidden-web, 335, 337, 343, 344, 347,

348 Inalienability, 93-95

Hybrid, 93, 95 Internet service providers, 51, 247-48,

269-92, 336, 338 Kafka, 3, 9-10, 12 Marketing, 12, 24, 28, 45-46, 50-51, 63-

64,84,86,103,198,209,217-18, 220, 225-27, 230-35, 245

Medical Information, 6, 36, 59, 84, 94, 125, 129, 134, 159, 160, 162, 197,

198, 228, 241, 260, 263, 297-98, 307, 309, 336-37, 343

Microaggregation, 349, 352-53, 356, 359 Microdata, 349, 350-63 National identity card, 295-311 Online communities, 31, 39-40, 49-50 Orwell, 3, 7-8 PATRIOT Act, 158,299 Pattern finding, 193 Peer-to-peer technology, 269-70, 284,

287 Personal information, 3-14, 15-29, 31-53,

65,90,93-114, 118,120,122,129, 133, 137, 138, 154, 156, 159, 161-67, 170-71, 179-80, 188, 191, 199-202, 209-18, 221-23, 230, 239, 241-42, 245-46, 248, 250-52, 259-60, 264-65, 272, 276-79, 284, 290, 292, 295, 304, 307-10, 317-18, 327, 332, 336, 340, 350-57, 359, 362-63 Downstream use, 93-98

Privacy Decisional, 152, 160-62 Informational, 8, 11, 15-29, 31, 32,

34, 36, 42, 48, 49, 53, 99, 102-04, 108-09, 132, 152, 159-61, 163, 168,209-10,213,221,241,245, 248, 250, 279

Locational, 75-76, 88-89, 91 Online, 35, 239, 269-70, 280, 286,

292 Privacy Act of 1974, 7, 108, 151, 158,

163-66,201,308 Privacy preserving technology, 22, 73,

206, 255-56, 259, 261 Rationality, 15-18, 23, 25- 28, 29, 31, 33,

36,43-46,51-52 RFID, 55, 57-74, 75-77, 80-84, 88, 91

Blocker, 70 Kill command, 57, 66, 70

Security, 7, 10-11, 13, 26, 36, 45, 50, 63, 68,94,98, 101, 118-19, 122, 131-36, 140-42, 145-48, 155-58, 162-63, 166-69, 180, 187, 192, 200, 203-05, 228, 257, 259, 296, 302, 305-07, 313-15, 317, 322-23, 327, 332, 336, 339, 343 September 11^ 2001, 118, 146, 158-

59,170-72, 182,311

Index

Social norms, 18, 29, 31-34, 37-44, 48-53, 270

Spam, 6, 46, 51, 225, 230, 239-47 Subpoenas, 155, 158, 162, 289, 308

National Security Letters, 158 Surveillance, 7, 8, 12, 24, 44, 67, 71, 83-

86, 129, 131, 136, 139, 141, 145-48, 153-57, 160, 171-73, 178, 180, 182, 186, 188, 201, 211-13, 269, 287, 289, 291-93,297,307,310-11,317

383

Satellite, 75 Temptation, 31-53, 302 Torts, privacy, 31, 34, 50, 53 Tracking technology, 57, 60, 63-65, 69,

75-77, 80-93, 96, 102, 109, 111-12, 130-33, 162, 171, 213, 218, 248, 287, 307

Voting, electronic, 4, 41, 313-34 Willpower, 31-53, 302