1363:
allocate its resources to its intended assignees due to the ID issues. With the rise of
Aadhaar, India has debated whether Aadhaar violates an individual's privacy and whether any organization should have access to an individual's digital profile, as the Aadhaar card became associated with other economic sectors, allowing for the tracking of individuals by both public and private bodies. Aadhaar databases have suffered from security attacks as well and the project was also met with mistrust regarding the safety of the social protection infrastructures. In 2017, where the Aadhar was challenged, the Indian Supreme Court declared privacy as a human right, but postponed the decision regarding the constitutionality of Aadhaar for another bench. In September 2018, the Indian Supreme Court determined that the Aadhaar project did not violate the legal right to privacy.
1307:("PIPEDA") is enforceable in all jurisdictions unless a substantially similar provision has been enacted on the provincial level. However, inter-provincial or international information transfers still engage PIPEDA. PIPEDA has gone through two law overhaul efforts in 2021 and 2023 with the involvement of the Office of the Privacy Commissioner and Canadian academics. In the absence of a statutory private right of action absent an OPC investigation, the common law torts of intrusion upon seclusion and public disclosure of private facts, as well as the Civil Code of Quebec may be brought for an infringement or violation of privacy. Privacy is also protected under ss. 7 and 8 of the
255:
1130:
1640:
of our consciousness consists of internal representations that remain private and are rarely externalized. This internal privacy, which
Magnani refers to as a form of "information property" or "moral capital," is crucial for preserving free choice and personal agency. According to Magnani, when too much of our identity and data is externalized and subjected to scrutiny, it can lead to a loss of personal control, dignity, and responsibility. The protection of privacy, therefore, safeguards our ability to develop and pursue personal projects in our own way, free from intrusive external forces.
2095:
detailed user profiles, which are sold to advertisers and other third parties. This practice is often done without explicit user consent, leading to an invasion of privacy as individuals have little control over how their information is used. The sale of personal data can result in targeted advertising, manipulation, and even potential security risks, as sensitive information can be exploited by malicious actors. This commercial exploitation of personal data undermines user trust and raises significant ethical and legal concerns regarding data protection and privacy rights.
1891:
correlations between privacy concerns and information sharing behavior, which speaks against the privacy paradox. A meta-analysis of 166 studies published on the topic reported an overall small but significant relation between privacy concerns and informations sharing or use of privacy protection measures. So although there are several individual instances or anecdotes where behavior appear paradoxical, on average privacy concerns and privacy behaviors seem to be related, and several findings question the general existence of the privacy paradox.
2348:(VPN), where users must download software. Using a VPN hides all data and connections that are exchanged between servers and a user's computer, resulting in the online data of the user being unshared and secure, providing a barrier between the user and their ISP, and is especially important to use when a user is connected to public Wi-Fi. However, users should understand that all their data does flow through the VPN's servers rather than the ISP. Users should decide for themselves if they wish to use either an anonymizing proxy or a VPN.
1633:
describes the fulfillment of selected behaviour to achieve chosen outcomes. Outcome realization control is the personal interpretation of one’s achieved outcome. The relationship between two factors– primary and secondary control, is defined as the two-dimensional phenomenon where one reaches personal control: primary control describes behaviour directly causing outcomes, while secondary control is behaviour indirectly causing outcomes. Johnson explores the concept that privacy is a behaviour that has secondary control over outcomes.
381:
565:(573 U.S. 373), where David Leon Riley was arrested after he was pulled over for driving on expired license tags when the police searched his phone and discovered that he was tied to a shooting, that searching a citizen's phone without a warrant was an unreasonable search, a violation of the Fourth Amendment. The Supreme Court concluded that the cell phones contained personal information different from trivial items, and went beyond to state that information stored on the cloud was not necessarily a form of evidence.
41:
1301:, a 1985 piece of legislation applicable to personal information held by government institutions. The provinces and territories would later follow suit with their own legislation. Generally, the purposes of said legislation are to provide individuals rights to access personal information; to have inaccurate personal information corrected; and to prevent unauthorized collection, use, and disclosure of personal information. In terms of regulating personal information in the private sector, the federal
1670:. Through the "social ritual" of privacy, or the social practice of respecting an individual's privacy barriers, the social group communicates to developing children that they have exclusive moral rights to their bodies—in other words, moral ownership of their body. This entails control over both active (physical) and cognitive appropriation, the former being control over one's movements and actions and the latter being control over who can experience one's physical existence and when.
904:, where it was revealed that AccuWeather was selling locational data. This consisted of a user's locational data, even if they opted out within Accuweather, which tracked users' location. Accuweather sold this data to Reveal Mobile, a company that monetizes data related to a user's location. Other international cases are similar to the Accuweather case. In 2017, a leaky API inside the McDelivery App exposed private data, which consisted of home addresses, of 2.2 million users.
201:
2013:
8248:
578:(585 U.S. ____). In this case, the FBI used cell phone records without a warrant to arrest Timothy Ivory Carpenter on multiple charges, and the Supreme Court ruled that the warrantless search of cell phone records violated the Fourth Amendment, citing that the Fourth Amendment protects "reasonable expectations of privacy" and that information sent to third parties still falls under data that can be included under "reasonable expectations of privacy".
888:, and their improper use violates that user's privacy. A recent MIT study by de Montjoye et al. showed that four spatio-temporal points constituting approximate places and times are enough to uniquely identify 95% of 1.5M people in a mobility database. The study further shows that these constraints hold even when the resolution of the dataset is low. Therefore, even coarse or blurred datasets confer little privacy protection.
2189:, is a different concept from the collecting, aggregating, and disseminating information because those three are a misuse of available data, whereas invasion is an attack on the right of individuals to keep personal secrets. An invasion is an attack in which information, whether intended to be public or not, is captured in a way that insults the personal dignity and right to private space of the person whose data is taken.
963:
589:(NSA), where it was discovered that the NSA continues to breach the security of millions of people, mainly through mass surveillance programs whether it was collecting great amounts of data through third party private companies, hacking into other embassies or frameworks of international countries, and various breaches of data, which prompted a culture shock and stirred international debate related to digital privacy.
2168:
information was collected or the intent of making it available. Exposure is a special type of disclosure in which the information disclosed is emotional to the subject or taboo to share, such as revealing their private life experiences, their nudity, or perhaps private body functions. Increased accessibility means advertising the availability of information without actually distributing it, as in the case of
2433:. Also, the stress from overcrowding is connected to an increase in infant mortality rates and maternal stress. The lack of privacy that comes with overcrowding is connected to other issues in animals, which causes their relationships with others to diminish. How they present themselves to others of their species is a necessity in their life, and overcrowding causes the relationships to become disordered.
1617:
includes accessing personal information about them.) Behavioral barriers communicate to others—verbally, through language, or non-verbally, through personal space, body language, or clothing—that an individual does not want the other person to access or experience them. Lastly, normative barriers, such as laws and social norms, restrain others from attempting to access or experience an individual.
1887:. However, this does not mean that they are not concerned about their privacy. Susan B. Barnes gave a case in her article: in a television interview about Facebook, a student addressed her concerns about disclosing personal information online. However, when the reporter asked to see her Facebook page, she put her home address, phone numbers, and pictures of her young son on the page.
1859:: "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." Shade believes that privacy must be approached from a people-centered perspective, and not through the marketplace.
2437:
be in the enclosures due to safety reasons, however
Attenborough states that this is not an excuse for them to be constantly watched by unnecessary eyes. Also, animals will start hiding in unobserved spaces. Animals in zoos have been found to exhibit harmful or different behaviours due to the presence of visitors watching them:
854:. In the wake of Amanda Todd's death, the Canadian parliament proposed a motion purporting to stop bullying, but Todd's mother herself gave testimony to parliament rejecting the bill due to its provisions for warrantless breaches of privacy, stating "I don't want to see our children victimized again by losing privacy rights."
1385:(ICO), an independent public body set up to promote access to official information and protect personal information. They do this by promoting good practice, ruling on eligible complaints, giving information to individuals and organisations, and taking action when the law is broken. The relevant UK laws include:
1830:'product' that is not reported is fraud. For Lessig, privacy breaches online can be regulated through code and law. Lessig claims "the protection of privacy would be stronger if people conceived of the right as a property right", and that "individuals should be able to control information about themselves".
2394:
Although there are laws that promote the protection of users, in some countries, like the U.S., there is no federal digital privacy law and privacy settings are essentially limited by the state of current enacted privacy laws. To further their privacy, users can start conversing with representatives,
2343:
can be used to prevent
Internet service providers (ISP) from knowing which sites one visits and with whom one communicates, by hiding IP addresses and location, but does not necessarily protect a user from third party data mining. Anonymizing proxies are built into a user's device, in comparison to a
2103:
It can happen that privacy is not harmed when information is available, but that the harm can come when that information is collected as a set, then processed together in such a way that the collective reporting of pieces of information encroaches on privacy. Actions in this category which can lessen
2078:
From 2004 to 2008, building from this and other historical precedents, Daniel J. Solove presented another classification of actions which are harmful to privacy, including collection of information which is already somewhat public, processing of information, sharing information, and invading personal
1862:
Dr. Eliza Watt, Westminster Law School, University of
Westminster in London, UK, proposes application of the International Human Right Law (IHRL) concept of “virtual control” as an approach to deal with extraterritorial mass surveillance by state intelligence agencies. Dr. Watt envisions the “virtual
1643:
Acknowledging other conceptions of privacy while arguing that the fundamental concern of privacy is behavior selection control, Johnson converses with other interpretations including those of Maxine Wolfe and Robert S. Laufer, and Irwin Altman. He clarifies the continuous relationship between privacy
1639:
expands on this concept by highlighting how privacy is essential in maintaining personal control over one's identity and consciousness. He argues that consciousness is partly formed by external representations of ourselves, such as narratives and data, which are stored outside the body. However, much
1616:
In addition to the psychological barrier of reserve, Kirsty Hughes identified three more kinds of privacy barriers: physical, behavioral, and normative. Physical barriers, such as walls and doors, prevent others from accessing and experiencing the individual. (In this sense, "accessing" an individual
891:
Several methods to protect user privacy in location-based services have been proposed, including the use of anonymizing servers and blurring of information. Methods to quantify privacy have also been proposed, to calculate the equilibrium between the benefit of obtaining accurate location information
1926:
A study conducted by
Susanne Barth and Menno D.T. de Jo demonstrates that decision making takes place on an irrational level, especially when it comes to mobile computing. Mobile applications in particular are often built up in such a way that spurs decision making that is fast and automatic without
1854:
Leslie Regan Shade argues that the human right to privacy is necessary for meaningful democratic participation, and ensures human dignity and autonomy. Privacy depends on norms for how information is distributed, and if this is appropriate. Violations of privacy depend on context. The human right to
1656:
In various legal contexts, when privacy is described as secrecy, a conclusion is reached: if privacy is secrecy, then rights to privacy do not apply for any information which is already publicly disclosed. When privacy-as-secrecy is discussed, it is usually imagined to be a selective kind of secrecy
1136:
2007 privacy ranking. On one end of the spectrum, green indicates countries that uphold human rights standards while on the other end, red indicates countries considered endemic surveillance societies. This ranking was the last global report conducted by
Privacy International, and it is demonstrated
732:
A review and evaluation of scholarly work regarding the current state of the value of individuals' privacy of online social networking show the following results: "first, adults seem to be more concerned about potential privacy threats than younger users; second, policy makers should be alarmed by a
697:
began as a government and academic effort up through the 1980s, private corporations began to enclose the hardware and software of the
Internet in the 1990s, and now most Internet infrastructure is owned and managed by for-profit corporations. As a result, the ability of governments to protect their
2436:
For example, David
Attenborough claims that the gorilla's right to privacy is being violated when they are looked at through glass enclosures. They are aware that they are being looked at, therefore they do not have control over how much the onlookers can see of them. Gorillas and other animals may
1972:
Users are not always given the tools to live up to their professed privacy concerns, and they are sometimes willing to trade private information for convenience, functionality, or financial gain, even when the gains are very small. One study suggests that people think their browser history is worth
1722:
advanced this notion by writing that privacy matters because "there is a close connection between our ability to control who has access to us and to information about us, and our ability to create and maintain different sorts of social relationships with different people." Protecting intimacy is at
1694:
In addition, privacy may be seen as a state that fosters personal growth, a process integral to the development of self-identity. Hyman Gross suggested that, without privacy—solitude, anonymity, and temporary releases from social roles—individuals would be unable to freely express themselves and to
865:
In the US, while federal law only prohibits online harassment based on protected characteristics such as gender and race, individual states have expanded the definition of harassment to further curtail speech: Florida's definition of online harassment includes "any use of data or computer software"
774:
are popular today. A search for photos with the hashtag #selfie retrieves over 23 million results on
Instagram and 51 million with the hashtag #me. However, due to modern corporate and governmental surveillance, this may pose a risk to privacy. In a research study which takes a sample size of 3763,
1850:
components. Shared ideas about privacy allows freedom of conscience and diversity in thought. Public values guarantee democratic participation, including freedoms of speech and association, and limits government power. Collective elements describe privacy as collective good that cannot be divided.
1829:
and Lawrence Lessig focus on the economic aspects of personal information control. Posner criticizes privacy for concealing information, which reduces market efficiency. For Posner, employment is selling oneself in the labour market, which he believes is like selling a product. Any 'defect' in the
1677:
In addition, privacy may be viewed as a state that enables autonomy, a concept closely connected to that of personhood. According to Joseph Kufer, an autonomous self-concept entails a conception of oneself as a "purposeful, self-determining, responsible agent" and an awareness of one's capacity to
932:
directly challenged that portrayal, stating "I'm glad that they are fixing what they call bugs, but I take exception with their strong denial that they track users." In 2021, the U.S. state of Arizona found in a court case that Google misled its users and stored the location of users regardless of
2385:
In a social sense, simply limiting the amount of personal information that users posts on social media could increase their security, which in turn makes it harder for criminals to perform identity theft. Moreover, creating a set of complex passwords and using two-factor authentication can allow
2376:
Concrete solutions on how to solve paradoxical behavior still do not exist. Many efforts are focused on processes of decision making, like restricting data access permissions during application installation, but this would not completely bridge the gap between user intention and behavior. Susanne
1949:
The willingness to incur a privacy risk is suspected to be driven by a complex array of factors including risk attitudes, personal value for private information, and general attitudes to privacy (which are typically measured using surveys). One experiment aiming to determine the monetary value of
1247:
is administered by the Office of the Australian Information Commissioner. The initial introduction of privacy law in 1998 extended to the public sector, specifically to Federal government departments, under the Information Privacy Principles. State government agencies can also be subject to state
2094:
Companies like Google and Meta collect vast amounts of personal data from their users through various services and platforms. This data includes browsing habits, search history, location information, and even personal communications. These companies then analyze and aggregate this data to create
1930:
Users of mobile applications generally have very little knowledge of how their personal data are used. When they decide which application to download, they typically are not able to effectively interpret the information provided by application vendors regarding the collection and use of personal
1902:
and in most cases not closely related. A main explanation for the partial mismatch in the context of privacy specifically is that users lack awareness of the risks and the degree of protection. Users may underestimate the harm of disclosing information online. On the other hand, some researchers
1890:
The privacy paradox has been studied and scripted in different research settings. Several studies have shown this inconsistency between privacy attitudes and behavior among online users. However, by now an increasing number of studies have also shown that there are significant and at times large
1681:
The studies of psychologists such as Jean Piaget and Victor Tausk show that, as children learn that they can control who can access and experience them and to what extent, they develop an autonomous self-concept. In addition, studies of adults in particular institutions, such as Erving Goffman's
1628:
Carl A. Johnson has identified the psychological concept of “personal control” as closely tied to privacy. His concept was developed as a process containing four stages and two behavioural outcome relationships, with one’s outcomes depending on situational as well as personal factors. Privacy is
1558:
from the attention of others if they wish to do so, and the right to be immune from scrutiny or being observed in private settings, such as one's own home. Although this early vague legal concept did not describe privacy in a way that made it easy to design broad legal protections of privacy, it
1362:
project in 2009, which resulted in all 1.2 billion Indians being associated with a 12-digit biometric-secured number. Aadhaar has uplifted the poor in India by providing them with a form of identity and preventing the fraud and waste of resources, as normally the government would not be able to
1211:
One example of the free market approach is to be found in the voluntary OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. The principles reflected in the guidelines, free of legislative interference, are analyzed in an article putting them into perspective with
861:
introduced a registration system for online commenters in 2007, they reported that malicious comments only decreased by 0.9%, and in 2011 it was repealed. A subsequent analysis found that the set of users who posted the most comments actually increased the number of "aggressive expressions" when
547:
tracker on his car that was placed without a warrant, that warrantless tracking infringes the Fourth Amendment. The Supreme Court also justified that there is some "reasonable expectation of privacy" in transportation since the reasonable expectation of privacy had already been established under
1632:
Johnson examined the following four stages to categorize where people exercise personal control: outcome choice control is the selection between various outcomes. Behaviour selection control is the selection between behavioural strategies to apply to attain selected outcomes. Outcome effectance
2167:
There are various examples of this. Breach of confidentiality is when one entity promises to keep a person's information private, then breaks that promise. Disclosure is making information about a person more accessible in a way that harms the subject of the information, regardless of how the
1822:
believes networked computer databases pose threats to privacy. He develops 'data protection' as an aspect of privacy, which involves "the collection, use, and dissemination of personal information". This concept forms the foundation for fair information practices used by governments globally.
1690:
Privacy may be understood as a prerequisite for the development of a sense of self-identity. Privacy barriers, in particular, are instrumental in this process. According to Irwin Altman, such barriers "define and limit the boundaries of the self" and thus "serve to help define ." This control
1574:
wrote in the late 19th century that "nothing is better worthy of legal protection than private life, or, in other words, the right of every man to keep his affairs to himself, and to decide for himself to what extent they shall be the subject of public observation and discussion." Adopting an
1083:
The ability to do online inquiries about individuals has expanded dramatically over the last decade. Importantly, directly observed behavior, such as browsing logs, search queries, or contents of a public Facebook profile, can be automatically processed to infer secondary information about an
1810:
Privacy self-synchronization is a hypothesized mode by which the stakeholders of an enterprise privacy program spontaneously contribute collaboratively to the program's maximum success. The stakeholders may be customers, employees, managers, executives, suppliers, partners or investors. When
1612:
is a physical separation from others; Intimacy is a "close, relaxed; and frank relationship between two or more individuals" that results from the seclusion of a pair or small group of individuals. Anonymity is the "desire of individuals for times of 'public privacy.'" Lastly, reserve is the
1339:
Although there are comprehensive regulations for data protection in the European Union, one study finds that despite the laws, there is a lack of enforcement in that no institution feels responsible to control the parties involved and enforce their laws. The European Union also champions the
1255:
In 2008 the Australian Law Reform Commission (ALRC) conducted a review of Australian privacy law and produced a report titled "For Your Information". Recommendations were taken up and implemented by the Australian Government via the Privacy Amendment (Enhancing Privacy Protection) Bill 2012.
146:
Throughout history, there have been various conceptions of privacy. Most cultures acknowledge the right of individuals to keep aspects of their personal lives out of the public domain. The right to be free from unauthorized invasions of privacy by governments, corporations, or individuals is
1673:
Alternatively, Stanley Benn defined privacy in terms of a recognition of oneself as a subject with agency—as an individual with the capacity to choose. Privacy is required to exercise choice. Overt observation makes the individual aware of himself or herself as an object with a "determinate
1851:
Regan's goal is to strengthen privacy claims in policy making: "if we did recognize the collective or public-good value of privacy, as well as the common and public value of privacy, those advocating privacy protections would have a stronger basis upon which to argue for its protection".
474:) and other activities such as wiretapping and photography. As important records became digitized, Westin argued that personal data was becoming too accessible and that a person should have complete jurisdiction over their data, laying the foundation for the modern discussion of privacy.
2386:
users to be less susceptible to their accounts being compromised when various data leaks occur. Furthermore, users should protect their digital privacy by using anti-virus software, which can block harmful viruses like a pop-up scanning for personal information on a users' computer.
1927:
assessing risk factors. Protection measures against these unconscious mechanisms are often difficult to access while downloading and installing apps. Even with mechanisms in place to protect user privacy, users may not have the knowledge or experience to enable these mechanisms.
1999:, for services that cannot exist without the user sharing private data. However, the general public is typically not given the choice whether to share private data or not, making it difficult to verify any claim that a service truly cannot exist without sharing private data.
310:(1689), Locke argued that a man is entitled to his own self through one’s natural rights of life, liberty, and property. He believed that the government was responsible for protecting these rights so individuals were guaranteed private spaces to practice personal activities.
720:
Several online social network sites (OSNs) are among the top 10 most visited websites globally. Facebook for example, as of August 2015, was the largest social-networking site, with nearly 2.7 billion members, who upload over 4.75 billion pieces of content daily. While
446:
and modern censorship and privacy, a notable example being that large social media companies, rather than the government, are able to monitor a user's data and decide what is allowed to be said online through their censorship policies, ultimately for monetary purposes.
4004:
Athanasios S. Voulodimos and Charalampos Z. Patrikakis, "Quantifying Privacy in Terms of Entropy for Context Aware Services", special issue of the Identity in the Information Society journal, "Identity Management in Grid and SOA", Springer, vol. 2, no 2, December
1335:
In 2016, the European Union passed the General Data Protection Regulation (GDPR), which was intended to reduce the misuse of personal data and enhance individual privacy, by requiring companies to receive consent before acquiring personal information from users.
621:
The Internet and technologies built on it enable new forms of social interactions at increasingly faster speeds and larger scales. Because the computer networks which underlie the Internet introduce such a wide range of novel security concerns, the discussion of
1863:
control” test, understood as a remote control over the individual's right to privacy of communications, where privacy is recognized under the ICCPR, Article 17. This, she contends, may help to close the normative gap that is being exploited by nation states.
1587:
Control over one's personal information is the concept that "privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others." Generally, a person who has
1678:
control the boundary between self and other—that is, to control who can access and experience him or her and to what extent. Furthermore, others must acknowledge and respect the self's boundaries—in other words, they must respect the individual's privacy.
748:
reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and
2205:
is when an entity somehow injects itself into the personal decision-making process of another person, perhaps to influence that person's private decisions but in any case doing so in a way that disrupts the private personal thoughts that a person has.
2091:. Another example is how consumers and marketers also collect information in the business context through facial recognition which has recently caused a concern for things such as privacy. There is currently research being done related to this topic.
1219:
In a consumer protection approach, in contrast, it is claimed that individuals may not have the time or knowledge to make informed choices, or may not have reasonable alternatives available. In support of this view, Jensen and Potts showed that most
1931:
data. Other research finds that this lack of interpretability means users are much more likely to be swayed by cost, functionality, design, ratings, reviews and number of downloads than requested permissions for usage of their personal data.
1665:
Privacy may be understood as a necessary precondition for the development and preservation of personhood. Jeffrey Reiman defined privacy in terms of a recognition of one's ownership of their physical and mental reality and a moral right to
669:
are not merely individual because they require both the ability to obtain images without someone's consent as well as the social and economic infrastructure to disseminate that content widely. Therefore, privacy advocacy groups such as the
1270:
1811:
self-synchronization is reached, the model states that the personal interests of individuals toward their privacy is in balance with the business interests of enterprises who collect and use the personal information of those individuals.
350:(1859) argued for the importance of protecting individual liberty against the tyranny of the majority and the interference of the state. His views emphasized the right of privacy as essential for personal development and self-expression.
1023:
The Internet has become a significant medium for advertising, with digital marketing making up approximately half of the global ad spending in 2019. While websites are still able to sell advertising space without tracking, including via
2176:
of someone, and can include using the value of someone's reputation or likeness to advance interests which are not those of the person being appropriated. Distortion is the creation of misleading information or lies about a person.
1907:
even though they care about their privacy. Psychologists Sonja Utz and Nicole C. Krämer particularly pointed out that the privacy paradox can occur when users must trade-off between their privacy concerns and impression management.
1875:
is a phenomenon in which online users state that they are concerned about their privacy but behave as if they were not. While this term was coined as early as 1998, it was not used in its current popular sense until the year 2000.
2351:
In a more non-technical sense, using incognito mode or private browsing mode will prevent a user's computer from saving history, Internet files, and cookies, but the ISP will still have access to the users' search history. Using
1487:, and various state laws. The Privacy Act of 1974 only applies to federal agencies in the executive branch of the federal government. Certain privacy rights have been established in the United States via legislation such as the
1613:"creation of a psychological barrier against unwanted intrusion"; this creation of a psychological barrier requires others to respect an individual's need or desire to restrict communication of information concerning themself.
1475:'s penumbral argument as having a "facial absurdity", casting doubt on the validity of a constitutional right to privacy in the United States and of previous decisions relying on it. In the United States, the right of
1707:
In a way analogous to how the personhood theory imagines privacy as some essential part of being an individual, the intimacy theory imagines privacy to be an essential part of the way that humans have strengthened or
907:
In the wake of these types of scandals, many large American technology companies such as Google, Apple, and Facebook have been subjected to hearings and pressure under the U.S. legislative system. In 2011, US Senator
733:
large part of users who underestimate risks of their information privacy on OSNs; third, in the case of using OSNs and its services, traditional one-dimensional privacy approaches fall short". This is exacerbated by
2044:
The privacy calculus model posits that two factors determine privacy behavior, namely privacy concerns (or perceived risks) and expected benefits. By now, the privacy calculus has been supported by several studies.
1542:
Samuel D. Warren and Louis Brandeis wrote "The Right to Privacy", an article in which they argued for the "right to be let alone", using that phrase as a definition of privacy. This concept relies on the theory of
775:
researchers found that for users posting selfies on social media, women generally have greater concerns over privacy than men, and that users' privacy concerns inversely predict their selfie behavior and activity.
404:, the increased ability to share information can lead to new ways in which privacy can be breached. It is generally agreed that the first publication advocating privacy in the United States was the 1890 article by
1502:
Unlike the EU and most EU-member states, the US does not recognize the right to privacy of non-US citizens. The UN's Special Rapporteur on the right to privacy, Joseph A. Cannataci, criticized this distinction.
1266:
1094:
353:
Discussions surrounding surveillance coincided with philosophical ideas on privacy. Jeremy Bentham developed the phenomenon known as the Panoptic effect through his 1791 architectural design of a prison called
181:", which means set apart from what is public, personal and belonging to oneself, and not to the state. It is also derived from the Latin word 'privo,' which conveys the idea of deprivation or being robbed of.
1381:(usually breach of confidence) and privacy must then be considered under EC law. In the UK, it is sometimes a defence that disclosure of private information was in the public interest. There is, however, the
1691:
primarily entails the ability to regulate contact with others. Control over the "permeability" of the self's boundaries enables one to control what constitutes the self and thus to define what is the self.
1157:
also defines the right to privacy. Among most countries whose constitutions do not explicitly describe privacy rights, court decisions have interpreted their constitutions to intend to give privacy rights.
5980:
Flaherty, D. (1989). Protecting privacy in surveillance societies: The federal republic of Germany, Sweden, France, Canada, and the United States. Chapel Hill, U.S.: The University of North Carolina Press.
1845:
Priscilla Regan believes that individual concepts of privacy have failed philosophically and in policy. She supports a social value of privacy with three dimensions: shared perceptions, public values, and
1950:
several types of personal information indicated relatively low evaluations of personal information. Despite claims that ascertaining the value of data requires a "stock-market for personal information",
1652:
Privacy is sometimes defined as an option to have secrecy. Richard Posner said that privacy is the right of people to "conceal information about themselves that others might use to their disadvantage".
3575:
5223:
4216:
1786:
Government agencies, corporations, groups/societies and other organizations may desire to keep their activities or secrets from being revealed to other organizations or individuals, adopting various
3270:
1790:
practices and controls in order to keep private information confidential. Organizations may seek legal protection for their secrets. For example, a government administration may be able to invoke
1742:
Physical privacy may be a matter of cultural sensitivity, personal dignity, and/or shyness. There may also be concerns about safety, if, for example one is wary of becoming the victim of crime or
487:
devices that can reveal previously unknown information without a warrant constitutes a violation of privacy. In 2019, after developing a corporate rivalry in competing voice-recognition software,
7766:
161:
There are multiple techniques to invade privacy, which may be employed by corporations or governments for profit or political reasons. Conversely, in order to protect privacy, people may employ
1682:
study of "total institutions" such as prisons and mental institutions, suggest that systemic and routinized deprivations or violations of privacy deteriorate one's sense of autonomy over time.
3806:"Amanda Todd's mother raises concerns about cyberbullying bill: Families of cyberbullying victims want legislation, but some have concerns about warrantless access to Canadians personal data"
430:
describes the life of Winston Smith in 1984, located in Oceania, a totalitarian state. The all-controlling Party, the party in power led by Big Brother, is able to control power through mass
262:
There is a highlighted quote on the importance of being honest with oneself, and after two and a half pages concludes with a suspicion that telephone operators are listening in on every call.
3813:
1674:
character" and "limited probabilities." Covert observation, on the other hand, changes the conditions in which the individual is exercising choice without his or her knowledge and consent.
1398:
581:
Beyond law enforcement, many interactions between the government and citizens have been revealed either lawfully or unlawfully, specifically through whistleblowers. One notable example is
2164:
Information dissemination is an attack on privacy when information which was shared in confidence is shared or threatened to be shared in a way that harms the subject of the information.
1596:
said that "Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. Nevertheless, in the era of
4089:
7875:
4449:
4114:
1260:
1088:
4065:
3782:
1059:
has received some reactions for features that prohibit advertisers from tracking a user's data without their consent. Google attempted to introduce an alternative to cookies named
6002:
753:. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information. This has created a need by many candidates to control various online
2087:
In the context of harming privacy, information collection means gathering whatever information can be obtained by doing something to obtain it. Examples include surveillance and
1530:, defines privacy as an appropriate information flow, where appropriateness, in turn, is defined as conformance with legitimate, informational norms specific to social contexts.
737:
research indicating that personal traits such as sexual orientation, race, religious and political views, personality, or intelligence can be inferred based on a wide variety of
4265:
1735:
Physical privacy could be defined as preventing "intrusions into one's physical space or solitude." An example of the legal basis for the right to physical privacy is the U.S.
1137:
that countries that do have the legal right to privacy explicitly mentioned in their constitutions trend closer to yellow and green while those that do not trend closer to red.
1048:. Since the introduction of mobile phones, data brokers have also been planted within apps, resulting in a $ 350 billion digital industry especially focused on mobile devices.
6183:"The 'Privacy Paradox' in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure"
1644:
and personal control, where outlined behaviours not only depend on privacy, but the conception of one’s privacy also depends on his defined behavioural outcome relationships.
4975:
1547:
and focuses on protecting individuals. The citation was a response to recent technological developments, such as photography, and sensationalist journalism, also known as
1303:
1172:
7870:
358:. The phenomenon explored the possibility of surveillance as a general awareness of being watched that could never be proven at any particular moment. French philosopher
304:’s (1632-1704) writings on natural rights and the social contract laid the groundwork for modern conceptions of individual rights, including the right to privacy. In his
2302:
messaging app, which encrypts messages so that only the recipient can read the message, is notable for being available on many mobile devices and implementing a form of
7209:
6105:
552:(1965). The Supreme Court also further clarified that the Fourth Amendment did not only pertain to physical instances of intrusion but also digital instances, and thus
645:
The Internet's effect on privacy includes all of the ways that computational technology and the entities that control it can subvert the privacy expectations of their
1973:
the equivalent of a cheap meal. Another finds that attitudes to privacy risk do not appear to depend on whether it is already under threat or not. The methodology of
1894:
However, the relationship between concerns and behavior is likely only small, and there are several arguments that can explain why that is the case. According to the
1823:
Flaherty forwards an idea of privacy as information control, "ndividuals want to be left alone and to exercise some control over how information about them is used".
1186:
published its Privacy Guidelines in 1980. The European Union's 1995 Data Protection Directive guides privacy protection in Europe. The 2004 Privacy Framework by the
7920:
3006:
973:
803:
An invasion of someone's privacy may be widely and quickly disseminated over the Internet. When social media sites and other online communities fail to invest in
362:(1926-1984) concluded that the possibility of surveillance in the instance of the Panopticon meant a prisoner had no choice but to conform to the prison's rules.
6558:"Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources"
1883:
to refer to the ambiguous boundary between private and public space on social media. When compared to adults, young people tend to disclose more information on
1063:
which it claimed reduced the privacy harms, but it later retracted the proposal due to antitrust probes and analyses that contradicted their claims of privacy.
706:. Privacy regulations are often further constrained to only protect specific demographics such as children, or specific industries such as credit card bureaus.
1183:
4251:
3572:
7935:
7816:
2201:
is any unwanted entry into a person's private personal space and solitude for any reason, regardless of whether data is taken during that breach of space.
1554:
There is extensive commentary over the meaning of being "let alone", and among other ways, it has been interpreted to mean the right of a person to choose
412:, "The Right to Privacy", and that it was written mainly in response to the increase in newspapers and photographs made possible by printing technologies.
4634:
3494:
4908:
3872:
3266:
1567:
Limited access refers to a person's ability to participate in society without having other individuals and organizations collect information about them.
1496:
1182:
says "No one shall be subjected to arbitrary interference with privacy, family, home or correspondence, nor to attacks upon honor and reputation." The
4716:
1248:
based privacy legislation. This built upon the already existing privacy requirements that applied to telecommunications providers (under Part 13 of the
8284:
8147:
5119:
1736:
1432:
757:
in addition to controlling their online reputations, the conjunction of which has led to legal suits against both social media sites and US employers.
150:
With the rise of technology, the debate regarding privacy has expanded from a bodily sense to include a digital sense. In most countries, the right to
7335:
7855:
6458:
3436:
1746:. There are different things that can be prevented to protect one's physical privacy, including people watching (even through recorded images) one's
1739:, which guarantees "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures".
1480:
4369:
2377:
Barth and Menno D.T. de Jong believe that for users to make more conscious decisions on privacy matters, the design needs to be more user-oriented.
8112:
8051:
7940:
3805:
1986:
1579:
said that privacy is "the condition of being protected from unwanted access by others—either physical access, personal information, or attention."
715:
6479:"The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review"
1903:
argue that the mismatch comes from lack of technology literacy and from the design of sites. For example, users may not know how to change their
396:
As technology has advanced, the way in which privacy is protected and violated has changed with it. In the case of some technologies, such as the
6451:
Utz, S., & Kramer, N. (2009). The privacy paradox on social network sites revisited: The role of individual characteristics and group norms.
3089:
1459:
1401:. The ICO has also provided a "Personal Information Toolkit" online which explains in more detail the various ways of protecting privacy online.
3840:
2136:
secondary use, which is when people agree to share their data for a certain purpose, but then the data is used in ways without the data donors'
5971:
Popa, C., et al., "Managing Personal Information: Insights on Corporate Risk and Opportunity for Privacy-Savvy Leaders", Carswell (2012), Ch. 6
4079:
211:
6412:"Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression"
4456:
4104:
132:) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
7806:
6521:
Kokolakis, Spyros (January 2017). "Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon".
1052:
5059:"What is Griswold v. Connecticut? How access to contraception and other privacy rights could be at risk after SCOTUS overturned Roe v. Wade"
4827:
2142:
exclusion is the use of a person's data without any attempt to give the person an opportunity to manage the data or participate in its usage
7885:
7359:
6411:
5058:
3299:
2395:
letting representatives know that privacy is a main concern, which in turn increases the likelihood of further privacy laws being enacted.
2057:, there are various ways to discuss what kinds of processes or actions remove, challenge, lessen, or attack privacy. In 1960 legal scholar
1716:
includes individuals volunteering to self-disclose most if not all personal information, this is one area in which privacy does not apply.
4933:
3778:
5423:"The future of consumer data protection in the E.U. Re-thinking the "notice and consent" paradigm in the new era of predictive analytics"
1488:
1318:
1313:
which is typically applied in the criminal law context. In Quebec, individuals' privacy is safeguarded by articles 3 and 35 to 41 of the
988:
572:
A recent notable occurrence of the conflict between law enforcement and a citizen in terms of digital privacy has been in the 2018 case,
7053:
2172:. Blackmail is making a threat to share information, perhaps as part of an effort to coerce someone. Appropriation is an attack on the
1856:
1754:
and unauthorized access to one's personal possessions or places. Examples of possible efforts used to avoid the former, especially for
1394:
857:
Even where these laws have been passed despite privacy concerns, they have not demonstrated a reduction in online harassment. When the
4041:
4016:
2024: with: more description of the mechanics of the privacy calculus model and how it relates to the privacy paradox. You can help by
1051:
Digital privacy has become the main source of concern for many mobile users, especially with the rise of privacy scandals such as the
8631:
8303:
What is considered a human right is in some cases controversial; not all the topics listed are universally accepted as human rights
7895:
7811:
7801:
4972:
6369:
Acquisti, A., & Gross, R. (2006, June). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In
1657:
in which individuals keep some information secret and private while they choose to make other information public and not private.
1592:
with another person is not considered "protected" by privacy rights with respect to the person they are in the relationship with.
8707:
8536:
1309:
842:
Despite the way breaches of privacy can magnify online harassment, online harassment is often used as a justification to curtail
533:
Police and citizens often conflict on what degree the police can intrude a citizen's digital privacy. For instance, in 2012, the
392:. A major selling point of dial telephone service was that it was "secret", in that no operator was required to connect the call.
5925:
3544:
8337:
8277:
6644:
3215:
2254:, there are multiple angles of privacy and multiple techniques to improve them to varying extents. When actions are done at an
1097:
made a distinction between collecting the contents of messages sent between users and the metadata surrounding those messages.
807:, an invasion of privacy can expose people to a much greater volume and degree of harassment than would otherwise be possible.
8127:
7483:
6732:
6689:
6045:
5666:
5381:
5336:
4411:
3420:
3250:
2873:
2595:
2553:
1377:
In the United Kingdom, it is not possible to bring an action for invasion of privacy. An action may be brought under another
1179:
1150:
634:
inculcate a security-focused conceptualization of privacy which reduces their obligations to uphold privacy into a matter of
4849:
729:
recently announced that it will be acquiring and permanently storing the entire archive of public Twitter posts since 2006.
8505:
7950:
7756:
7184:
3573:
http://www.emeraldinsight.com/journals.htm?issn=1066-2243&volume=21&issue=4&articleid=1926600&show=abstract
3186:
1699:. Such self-discovery and self-criticism contributes to one's understanding of oneself and shapes one's sense of identity.
1382:
1084:
individual, such as sexual orientation, political and religious views, race, substance use, intelligence, and personality.
7234:
6011:, p. 229: "In my view, the protection of privacy would be stronger if people conceived of the right as a property right.".
5082:
2947:
569:
evidently became a landmark case, protecting the digital protection of citizen's privacy when confronted with the police.
9305:
9208:
8664:
8616:
8387:
8107:
7915:
7905:
7865:
7653:
2496:
929:
337:
argued that legal actions should be judged by the extent of their contribution to human wellbeing, or necessary utility.
6384:
5398:"Predicting Data that People Refuse to Disclose; How Data Mining Predictions Challenge Informational Self-Determination"
3341:
3314:
7847:
7821:
7781:
7592:
7511:
5888:
5154:
1436:
534:
1559:
strengthened the notion of privacy rights for individuals and began a legacy of discussion on those rights in the US.
9238:
8270:
8024:
7945:
7930:
7826:
7690:
7311:
6394:
5596:
3351:
3324:
1416:
1410:
1187:
1010:
661:
of users who share information online without expecting it to be stored and retained indefinitely. Phenomena such as
241:
139:, which can include the concepts of appropriate use and protection of information. Privacy may also take the form of
7134:
6833:
Trepte, Sabine; Reinecke, Leonard; Ellison, Nicole B.; Quiring, Oliver; Yao, Mike Z.; Ziegele, Marc (January 2017).
6074:
3886:
3462:
9203:
7713:
4241:
2122:
process, thus making facts which were intended to not name particular people to become associated with those people
1415:
In the United States, more systematic treatises of privacy did not appear until the 1890s, with the development of
1141:
Most countries give citizens rights to privacy in their constitutions. Representative examples of this include the
678:
argue that addressing the new privacy harms introduced by the Internet requires both technological improvements to
385:
4131:
450:
In the 1960s, people began to consider how changes in technology were bringing changes in the concept of privacy.
7900:
7831:
7796:
7527:
2444:
in zoos engage in less social behaviours, including physical contact and sex, than ones in off-exhibit buildings.
1544:
1390:
1261:
Privacy in Australian law § Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015
1089:
Privacy in Australian law § Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015
992:
858:
1037:
313:
In the political sphere, philosophers hold differing views on the right of private judgment. German philosopher
8669:
8566:
8322:
8122:
8102:
8056:
8019:
7925:
7880:
6278:"Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior"
5822:
4876:"Explaining Trust in Large Biometric Infrastructures: A Critical Realist Case Study of India's Aadhaar Project"
4295:
3372:
2586:
2245:
2074:
Encroaching someone's personality rights, and using their likeness to advance interests which are not their own
2071:
Promoting access to information about a person which could lead the public to have incorrect beliefs about them
1847:
1492:
1252:), and confidentiality requirements that already applied to banking, legal and patient / doctor relationships.
675:
405:
375:
6456:
4155:
3862:
3519:
2971:
Information Privacy, Official Reference for the Certified Information privacy Professional (CIPP), Swire, 2007
2698:
2068:
Public disclosure of personal information about a person which could be embarrassing for them to have revealed
468:
shifted the debate regarding privacy from a physical sense, how the government controls a person's body (i.e.
8864:
8029:
7860:
7835:
3392:
1060:
671:
539:
314:
158:, and many countries have passed acts that further protect digital privacy from public and private entities.
6556:
Barth, Susanne; de Jong, Menno D. T.; Junger, Marianne; Hartel, Pieter H.; Roppelt, Janina C. (2019-08-01).
6106:"The role of international human rights law in the protection of online privacy in the age of surveillance."
290:, associated with domestic life. Privacy is valued along with other basic necessities of life in the Jewish
9320:
8606:
7890:
7258:
1146:
522:
6247:"Online Privacy Concerns and Privacy Management: A Meta-Analytical Review: Privacy Concerns Meta-Analysis"
5907:
5422:
2129:, which includes when an organization is supposed to be responsible for protecting data instead suffers a
1353:
1162:
274:
Privacy has historical roots in ancient Greek philosophical discussions. The most well-known of these was
9279:
8700:
8432:
8342:
7910:
6756:
5605:
2616:
329:, pertaining to one’s rights and obligations as defined by an existing corporate order. On the contrary,
306:
223:
4266:"EFF technologist cites Google "breach of trust" on FLoC; key ad-tech change agent departs IAB Tech Lab"
2425:
Lack of privacy in public spaces, caused by overcrowding, increases health issues in animals, including
1330:
434:
and limited freedom of speech and thought. George Orwell provides commentary on the negative effects of
8309:
6946:
6942:
3234:
2569:
2058:
1955:
1944:
1713:
1608:
Alan Westin defined four states—or experiences—of privacy: solitude, intimacy, anonymity, and reserve.
1570:
Various theorists have imagined privacy as a system for limiting access to one's personal information.
1420:
1045:
952:
574:
460:
was a popular book on privacy from that era and led US discourse on privacy at that time. In addition,
5497:
Hughes, Kirsty (2012). "A Behavioural Understanding of Privacy and Its Implications for Privacy Law".
5187:
3948:
de Montjoye, Yves-Alexandre; César A. Hidalgo; Michel Verleysen; Vincent D. Blondel (March 25, 2013).
2310:. Encryption and other privacy-based security measures are also used in some cryptocurrencies such as
2231:
moments" captured on the companies' smart speakers in order to improve the quality of their automated
1958:
regularly place price tags on this form of data as it is shared between corporations and governments.
8950:
8654:
8596:
8142:
8086:
8066:
7791:
7751:
6788:"Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation"
4183:
3836:
2573:
1238:
824:
544:
6600:
Frik, Alisa; Gaudeul, Alexia (2020-03-27). "A measure of the implicit value of privacy under risk".
4217:"Privacy by default, abuse by design: EU competition concerns about Apple's new app tracking policy"
271:
The concept of privacy has been explored and discussed by numerous philosophers throughout history.
8611:
8576:
8521:
8407:
7546:
7210:"Dark web finds bitcoin increasingly more of a problem than a help, tries other digital currencies"
4592:"Consolidated federal laws of Canada, Personal Information Protection and Electronic Documents Act"
4290:
1386:
1292:
924:
to record and store users' locations in unencrypted files. Apple claimed this was an unintentional
586:
34:
7286:
827:. When someone's physical location or other sensitive information is leaked over the Internet via
254:
9310:
9160:
9109:
8970:
8965:
8317:
8137:
8132:
8004:
7786:
6277:
6215:
2511:
2345:
2303:
2216:
1951:
1940:
1483:
has limited the effects of lawsuits for breach of privacy. Privacy is regulated in the US by the
1447:
1129:
1116:
948:
631:
477:
New technologies can also create new ways to gather private information. In 2001, the legal case
7437:
6672:; Wagner, David (2013), "Choice Architecture and Smartphone Privacy: There's a Price for That",
5658:
5652:
5247:
Oulasvirta, Antti; Suomalainen, Tiia; Hamari, Juho; Lampinen, Airi; Karvonen, Kristiina (2014).
3720:"Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?"
3675:
Giroux, Henry A. (2015-05-04). "Selfie Culture in the Age of Corporate and State Surveillance".
3289:
1995:
and David J. Krieger that the privacy paradox should not be considered a paradox, but more of a
8821:
8693:
8347:
8332:
8178:
7776:
7771:
7718:
4427:
2674:
2299:
2281:
2186:
1795:
1709:
1372:
1142:
1078:
1025:
875:
820:
734:
479:
291:
7659:
6787:
4993:
2025:
333:(1748-1832), an English philosopher, interpreted law as an invasion of privacy. His theory of
9315:
9170:
8659:
8467:
8457:
8422:
8157:
7728:
7683:
7502:
7336:"Your Technology Is Tracking You. Take These Steps For Better Online Privacy : Life Kit"
6951:
5219:
4591:
3947:
3892:
1571:
1341:
1178:
Beyond national privacy laws, there are international privacy agreements. The United Nations
1133:
1120:
900:
There have been scandals regarding location privacy. One instance was the scandal concerning
650:
635:
147:
enshrined in the privacy laws of many countries and, in some instances, their constitutions.
4551:
608:
9325:
9119:
8586:
8546:
8427:
7976:
7761:
7663:
7558:
7369:
7054:"The business of personal data: Google, Facebook, and privacy issues in the EU and the USA"
6669:
6316:
4777:
4323:
3961:
3604:
1977:
describes how to provide users with sufficient context to make privacy-informed decisions.
1842:, whose social value is an essential component in the functioning of democratic societies.
1523:
1517:
1314:
1296:
1282:
1154:
885:
417:
20:
6246:
6156:
5853:
5724:
Benn, Stanley. "Privacy, freedom, and respect for persons". In Schoeman, Ferdinand (ed.).
4790:
4765:
4137:. The Superior Court of the State of Arizona In and For the County of Maricopa. 2021-06-03
1167:
Many countries have broad privacy laws outside their constitutions, including Australia's
8:
9254:
8940:
8854:
8636:
8357:
8352:
8327:
8193:
8061:
8046:
7996:
7733:
7395:
5908:"Fixing the Fourth Amendment with trade secret law: A response to Kyllo v. United States"
4740:
4677:
3888:
Empirical analysis of online anonymity and user behaviors: the impact of real name policy
2491:
2453:
2441:
2295:
2277:
1791:
1484:
1205:
726:
616:
561:
543:(565 U.S. 400), in the case of Antoine Jones who was arrested of drug possession using a
28:
9066:
5033:
4781:
4327:
3965:
3608:
3567:
Hugl, Ulrike (2011), "Reviewing Person's Value of Privacy of Online Social Networking,"
2981:
2061:
created the following list of activities which can be remedied with privacy protection:
1145:, which says "the privacy, private life, honor and image of people are inviolable"; the
744:
Intrusions of social media privacy are known to affect employment in the United States.
9233:
9175:
9099:
9011:
9001:
8924:
8838:
8816:
8730:
8674:
8551:
8477:
8372:
8233:
7034:
6968:
6903:
6874:
Krasnova, Hanna; Spiekermann, Sarah; Koroleva, Ksenia; Hildebrand, Thomas (June 2010).
6815:
6772:
6738:
6695:
6625:
6538:
6434:
6352:
6297:
5951:
5877:
5831:
5514:
5450:
5306:
4795:
4346:
4311:
4246:
3982:
3949:
3754:
3719:
3700:
3627:
3592:
3294:
2929:
2879:
2845:
2798:
2751:
2403:
2232:
1667:
942:
804:
798:
738:
518:
4312:"Private traits and attributes are predictable from digital records of human behavior"
3927:
3593:"Private traits and attributes are predictable from digital records of human behavior"
1992:
1445:
that implicitly grant a right to privacy against government intrusion, for example in
585:, who released multiple operations related to the mass surveillance operations of the
9213:
9031:
9006:
8919:
8826:
8806:
8770:
8750:
8735:
8581:
8541:
8494:
8442:
8367:
8203:
7986:
7606:
7598:
7588:
7507:
7479:
7475:
7415:
7038:
7026:
6895:
6875:
6856:
6807:
6742:
6728:
6685:
6629:
6617:
6579:
6500:
6390:
6344:
6336:
6108:
In 2017 9th International Conference on Cyber Conflict (CyCon), pp. 1–14. IEEE, 2017.
6041:
5929:
5884:
5787:
The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding
5662:
5592:
5533:
5518:
5510:
5442:
5397:
5377:
5369:
5332:
5268:
5248:
5150:
4799:
4407:
4351:
4191:
3987:
3759:
3741:
3704:
3692:
3632:
3470:
3416:
3347:
3320:
3246:
2921:
2869:
2837:
2790:
2743:
2655:
2591:
2549:
2411:
2115:
1747:
1548:
1476:
884:. This creates user privacy problems. A user's location and preferences constitute
866:
that "Has the effect of substantially disrupting the orderly operation of a school."
843:
784:
699:
612:
456:
6907:
6819:
6699:
6438:
6301:
6120:
Swartz, J., "'Opting In': A Privacy Paradox", The Washington Post, 03 Sep 2000, H.1.
5454:
3718:
Dhir, Amandeep; Torsheim, Torbjørn; Pallesen, Ståle; Andreassen, Cecilie S. (2017).
3211:
9300:
9259:
9228:
9181:
9124:
9089:
9061:
9036:
8980:
8914:
8760:
8745:
8571:
8487:
8452:
8251:
8117:
8076:
8014:
7966:
7723:
7676:
7632:
7580:
7442:
7407:
7065:
7016:
6960:
6887:
6846:
6799:
6768:
6720:
6677:
6609:
6569:
6530:
6490:
6426:
6356:
6328:
6289:
6258:
6227:
6214:
Nemec Zlatolas, Lili; Welzer, Tatjana; Heričko, Marjan; Hölbl, Marko (April 2015).
6194:
5584:
5506:
5434:
5298:
5260:
5228:
5009:
4887:
4785:
4341:
4331:
4017:"AccuWeather caught sending user location data – even when location sharing is off"
3977:
3969:
3749:
3731:
3684:
3622:
3612:
3387:
3238:
2913:
2829:
2782:
2735:
2647:
2521:
2486:
2353:
2224:
2137:
2119:
2108:
1904:
1895:
1527:
1424:
1204:
Approaches to privacy can, broadly, be divided into two categories: free market or
1168:
1106:
754:
646:
598:
492:
341:
155:
140:
112:
106:
71:
8874:
6757:"Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory"
6542:
5249:"Transparency of Intentions Decreases Privacy Concerns in Ubiquitous Surveillance"
4499:
4482:
Privacy policies as decision-making tools: an evaluation of online privacy notices
4450:
Data Protection Principles for the 21st Century. Revising the 1980 OECD Guidelines
3688:
380:
19:"Private information" redirects here. For personally identifying information, see
9269:
9134:
9104:
9056:
8833:
8649:
8601:
8561:
8462:
8412:
7981:
7971:
7572:
7566:
6681:
6462:
6040:(8th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall. pp. 428–442.
5849:
4979:
4517:
3867:
3579:
2481:
2332:
2157:
1775:
1771:
1724:
1636:
1589:
1468:
980:
604:
484:
435:
359:
219:
151:
65:
4537:
4375:. The official website of the Presidency of the Italian Republic. Archived from
1798:, or a corporation might attempt to protect valuable proprietary information as
1629:
described as “behaviors falling at specific locations on these two dimensions”.
1267:
Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015
1095:
Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015
9094:
9076:
9041:
8996:
8975:
8859:
8591:
8516:
8472:
8218:
8198:
8071:
7584:
7576:
7469:
6724:
6574:
6557:
6534:
6495:
6478:
6293:
5648:
5438:
5090:
3267:"The Little-Known Data Broker Industry Is Spending Big Bucks Lobbying Congress"
2516:
2471:
have been shown to cover their heads less as the density of visitors decreased.
2307:
1826:
1819:
1696:
1440:
1221:
984:
851:
582:
461:
409:
397:
334:
330:
294:
40:
7624:
7541:
6231:
3906:
3437:"Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business"
2802:
2770:
2286:
Individuals can encrypt e-mails via enabling either two encryption protocols,
9294:
9165:
9144:
8740:
8716:
8621:
8556:
8437:
8188:
8183:
8081:
8041:
8036:
7648:
7610:
7562:
7419:
7030:
7021:
7004:
6899:
6860:
6851:
6834:
6811:
6621:
6613:
6583:
6504:
6430:
6340:
6332:
5817:
5588:
5446:
4195:
4109:
4084:
3745:
3736:
3696:
3650:
3474:
3059:
3007:"As Orwell's 1984 Turns 70 It Predicted Much Of Today's Surveillance Society"
2925:
2841:
2794:
2747:
2659:
2541:
2426:
2340:
2259:
2152:
Count not him among your friends who will retail your privacies to the world.
2126:
2088:
1751:
1719:
1593:
1171:, Argentina's Law for the Protection of Personal Data of 2000, Canada's 2000
703:
451:
423:
7360:"David Attenborough: zoos should use peepholes to respect gorillas' privacy"
6129:
Bedrick, B., Lerner, B., Whitehead, B. "The privacy paradox: Introduction",
5767:
Asylums: Essays on the Social Situation of Mental Patients and Other Inmates
5264:
4956:
4376:
4336:
3617:
384:
Advertisement for dial telephone service available to delegates to the 1912
340:
Hegel’s notions were modified by prominent 19th century English philosopher
9274:
9264:
9046:
8955:
8945:
8811:
8785:
8531:
8526:
8417:
8294:
8262:
8228:
8009:
7433:
7364:
6348:
5286:
5272:
4355:
3991:
3763:
3636:
2430:
1839:
1799:
1625:
925:
808:
790:
662:
431:
325:
7069:
6803:
6719:, Digitale Gesellschaft, vol. 20, transcript Verlag, pp. 45–76,
6078:
4678:"Consolidated federal laws of Canada, THE CONSTITUTION ACTS, 1867 to 1982"
3242:
3114:
2883:
2863:
2639:
2611:
2065:
Intrusion into a person's private space, own affairs, or wish for solitude
1575:
approach similar to the one presented by Ruth Gavison Nine years earlier,
1040:, providing code snippets used by website owners to track their users via
9139:
8960:
8897:
8869:
8790:
8397:
8223:
7743:
5365:
5324:
3412:
3162:
3138:
2771:"Public, Private, and the Household in Early Seventeenth-Century England"
2651:
2581:
2577:
2506:
2291:
2130:
1576:
1453:
1112:
1041:
901:
881:
470:
190:
7005:"Contour-as-Face Framework: A Method to Preserve Privacy and Perception"
4875:
3231:
Industry Unbound: The Inside Story of Privacy, Data, and Corporate Power
2933:
2901:
2356:
will not share a user's history, clicks, and will obstruct ad blockers.
2111:, which is connecting many related but unconnected pieces of information
2012:
1838:
There have been attempts to establish privacy as one of the fundamental
1190:
is a privacy protection agreement for the members of that organization.
1044:. This tracking data is also sold to other third parties as part of the
9218:
9051:
8902:
8775:
8755:
8402:
8208:
7411:
7396:"Glass Panels and Peepholes: Nonhuman Animals and the Right to Privacy"
6972:
6891:
6262:
6199:
6182:
5835:
5147:
Privacy in Context Technology, Policy, and the Integrity of Social Life
5131:
4892:
4635:"Policy Proposals for PIPEDA Reform to Address Artificial Intelligence"
2849:
2817:
2755:
2723:
2447:
2419:
2271:
2220:
2173:
1288:
1287:
Canada is a federal state whose provinces and territories abide by the
1056:
913:
909:
816:
812:
488:
439:
355:
346:
301:
162:
6715:
Belliger, Andréa; Krieger, David J. (2018), "2. The Privacy Paradox",
5657:(5. print ed.). Cambridge, MA: Harvard University Press. p.
5310:
4998:(Spring 2015 ed.). Metaphysics Research Lab, Stanford University.
4766:"E-Commerce Consumer Privacy Protection Based on Differential Privacy"
3973:
3891:. Hawaii International Conference on System Sciences (45th ed.).
2418:"value their privacy" while discussing a brief escape by a gorilla in
9198:
8907:
8780:
8765:
8382:
8173:
6873:
6315:
Kaiser, Florian G.; Byrka, Katarzyna; Hartig, Terry (November 2010).
4880:
The Electronic Journal of Information Systems in Developing Countries
3367:
2917:
2681:(Spring 2015 ed.), Metaphysics Research Lab, Stanford University
2501:
2468:
2457:
2407:
2327:
1555:
745:
702:, instituting controls on corporations that handle communications or
666:
278:'s distinction between two spheres of life: the public sphere of the
275:
166:
6964:
6091:
Shade, L.R. (2008). "Reconsidering the right to privacy in Canada".
4485:
3779:"In wake of Amanda Todd suicide, MPs to debate anti-bullying motion"
2833:
2739:
9114:
8644:
8482:
7159:
6216:"Privacy antecedents for SNS self-disclosure: The case of Facebook"
5331:(Vintage Books ed.). New York: Vintage Books. pp. 10–11.
5302:
5246:
4960:
4126:
4124:
3828:
2982:"Nineteen Eighty-four | Summary, Characters, Analysis, & Facts"
2786:
2365:
1787:
1743:
1609:
1597:
1072:
1029:
836:
832:
725:
is significantly smaller with 316 million registered users, the US
694:
657:
to store and search through massive amounts of data as well as the
639:
528:
401:
319:
259:
178:
136:
7602:
6142:
J. Sweat "Privacy paradox: Customers want control – and coupons",
5538:
Man-environment Interactions: Evaluations and Applications: Part 2
5110:
Children's Online Privacy Protection Act, 15 U.S.C. § 6501 et seq.
4828:"French Official Campaigns to Make 'Right to be Forgotten' Global"
4701:
Penney, Steven; Rondinelli, Vincenzo; James, Stribopoulos (2013).
9129:
9084:
8392:
8377:
8362:
7638:
7628:
7135:"How to Encrypt Email (Gmail, Outlook, iOS, Yahoo, Android, AOL)"
6062:
Legislating privacy: Technology, social values, and public policy
5579:
Magnani, Lorenzo (2007). "4, "Knowledge as Duty: Cyberprivacy"".
2415:
1759:
1755:
1539:
1359:
917:
828:
794:
771:
750:
722:
389:
24:
8685:
7287:"7 Tips to Manage Your Identity and Protect Your Privacy Online"
6453:
Cyberpsychology: Journal of Psychosocial Research on Cyberspace,
6245:
Baruh, Lemi; Secinti, Ekin; Cemalcilar, Zeynep (February 2017).
6213:
4309:
4121:
3590:
284:, associated with political life, and the private sphere of the
3400:
2311:
2287:
2169:
1723:
the core of the concept of sexual privacy, which law professor
1033:
514:
44:
6386:
The Privacy Fallacy: Harm and Power in the Information Economy
5879:
Managing Privacy: Information Technology and Corporate America
3717:
3343:
The Privacy Fallacy: Harm and Power in the Information Economy
3316:
The Privacy Fallacy: Harm and Power in the Information Economy
3284:
3282:
3280:
3084:
3082:
3080:
895:
95:
8213:
7117:
7115:
7113:
7111:
7109:
7107:
7105:
7103:
7101:
7099:
6276:
Gerber, Nina; Gerber, Paul; Volkamer, Melanie (August 2018).
6133:, Washington, DC, Volume 22, Issue 2, Spring 1998, pp. P1–P3.
5750:
Kufer, Joseph (1987). "Privacy, Autonomy, and Self-Concept".
5702:
Reiman, Jeffrey (1976). "Privacy, Intimacy, and Personhood".
4066:"Government officials want answers to secret iPhone tracking"
3259:
2638:
Alibeigi, Ali; Munir, Abu Bakar; Karim, Md. Ershadul (2019).
2461:
2315:
1767:
921:
850:, or by enabling law enforcement to invade privacy without a
741:, such as samples of text, browsing logs, or Facebook Likes.
630:. Indeed, many entities such as corporations involved in the
286:
280:
210:
deal primarily with the United States and do not represent a
7097:
7095:
7093:
7091:
7089:
7087:
7085:
7083:
7081:
7079:
6832:
4816:
Proceedings of the 3rd int. conference on e-democracy, 2009.
4663:
3463:"How Europe's New Privacy Law Will Change the Web, and More"
1304:
Personal Information Protection and Electronic Documents Act
1173:
Personal Information Protection and Electronic Documents Act
8152:
5680:
5678:
5583:. Cambridge: Cambridge University Press. pp. 110–118.
5170:
5168:
5166:
4909:"Indian Supreme Court Declares Privacy A Fundamental Right"
4080:"Apple faces questions from Congress about iPhone tracking"
3950:"Unique in the Crowd: The privacy bounds of human mobility"
3651:"Self-portraits and social media: The rise of the 'selfie'"
3277:
3090:"Silicon Valley is Listening to Your Most Intimate Moments"
3077:
2371:
1980:
1763:
1378:
1213:
766:
124:
89:
52:
7668:
7235:"Coinbase considers adding five new coins to its platform"
6710:
6708:
5329:
Secrets : on the ethics of concealment and revelation
4814:
A Study on the Lack of Enforcement of Data Protection Acts
4538:
Privacy Amendment (Enhancing Privacy Protection) Bill 2012
4184:"The Battle for Digital Privacy Is Reshaping the Internet"
4105:"Apple denies tracking iPhone users, but promises changes"
4042:"McShame: McDonald's API Leaks Data for 2.2 Million Users"
3879:
1124:
831:, harassment may escalate to direct physical harm such as
7076:
6986:
6984:
6982:
6925:
6923:
6921:
6919:
6917:
5617:
5560:
4934:"India's top court upholds validity of biometric ID card"
4448:
Cate, Fred H.; Collen, Peter; Mayer-Schönberger, Viktor.
3409:
Internet for the People: The Fight for Our Digital Future
2336:
1911:
1866:
1291:
save the province of Quebec whose legal tradition is the
1153:
says "the privacy of no citizen shall be infringed." The
83:
6555:
5800:
5798:
5796:
5675:
5614:, p. 116, ch. 4, "Knowledge as Duty: Cyberprivacy".
5202:
5200:
5198:
5196:
5163:
3899:
3222:
3042:
3040:
3038:
3036:
3034:
3032:
3030:
3028:
3026:
1727:
argues should be protected as a unique form of privacy.
1431:
may be implicitly granted by the Constitution under the
1428:
1175:, and Japan's 2003 Personal Information Protection Law.
323:, which refers to an individual’s private judgment, and
6786:
Culnan, Mary J.; Armstrong, Pamela K. (February 1999).
6705:
4850:"What Happens When a Billion Identities Are Digitized?"
4447:
3855:
3584:
3380:
3204:
1833:
1354:
Aadhaar § Lack of legislation and privacy concerns
1344:
concept in support of its adoption by other countries.
6979:
6914:
6835:"A Cross-Cultural Perspective on the Privacy Calculus"
6244:
6075:"United Nations Universal Declaration of Human Rights"
6064:. Chapel Hill: The University of North Carolina Press.
5548:
3060:"Alan Westin is the father of modern data privacy law"
1399:
Privacy and Electronic Communications Regulations 2003
1184:
Organisation for Economic Co-operation and Development
869:
7185:"Edward Snowden Explains How To Reclaim Your Privacy"
6516:
6514:
5793:
5629:
5345:
5193:
4700:
4310:
Kosinski, Michal; Stillwell, D.; Graepel, T. (2013).
4242:"Google Facing Fresh E.U. Inquiry Over Ad Technology"
3920:
3591:
Kosinski, Michal; Stillwell, D.; Graepel, T. (2013).
3495:"Children's Online Privacy Protection Rule ("COPPA")"
3187:"17 disturbing things Snowden has taught us (so far)"
3023:
1193:
1149:
says that "everyone has a right to privacy"; and the
92:
6317:"Reviving Campbell's Paradigm for Attitude Research"
6275:
5581:
Morality in a Technological World: Knowledge as Duty
5089:. US Department of State. 2015-05-22. Archived from
4992:
DeCew, Judith (2015-01-01). Zalta, Edward N. (ed.).
1934:
1685:
1295:. Privacy in Canada was first addressed through the
991:, and by adding encyclopedic content written from a
892:
and the risks of breaching an individual's privacy.
121:
118:
86:
80:
77:
7259:"Anonymizers vs. VPNs: Everything You Need to Know"
7003:Zhou, Yinghui; Lu, Shasha; Ding, Min (2020-05-04).
6477:Barth, Susanne; de Jong, Menno D. T. (2017-11-01).
6472:
6470:
6116:
6114:
6014:
4383:
3212:"Privacy vs Security: A pointless false dichotomy?"
2865:
Central Works of Philosophy: The Nineteenth Century
2640:"Right to Privacy, A Complicated Concept to Review"
2209:
1497:
Health Insurance Portability and Accountability Act
1224:are above the reading level of the average person.
115:
74:
8655:Freedom from involuntary female genital mutilation
8148:International Association of Privacy Professionals
7389:
7387:
6511:
5990:Posner, R. A. (1981). "The economics of privacy".
5902:
5900:
5876:
5120:Fourth Amendment to the United States Constitution
4552:"Consolidated federal laws of Canada, Privacy Act"
3770:
3360:
2699:"oremus Bible Browser : Ecclesiasticus 29:21"
2637:
1921:
1511:
371:
6674:The Economics of Information Security and Privacy
6667:
6314:
5726:Philosophical Dimensions of Privacy: An Anthology
5364:
4401:
3229:Ari Ezra Waldman (2021). "One Book in One Page".
2251:
1590:consensually formed an interpersonal relationship
266:
177:The word privacy is derived from the Latin word "
9292:
8113:Computer Professionals for Social Responsibility
6676:, Springer Berlin Heidelberg, pp. 211–236,
6467:
6111:
5928:. Privacyrights. 11 January 2012. Archived from
5253:Cyberpsychology, Behavior, and Social Networking
4270:Information Trust Exchange Governing Association
3776:
3228:
2306:. Signal has received praise from whistleblower
2239:
2227:reported being forced to continue listening to "
1987:Privacy concerns with social networking services
716:Privacy concerns with social networking services
559:In 2014, the Supreme Court ruled unanimously in
499:moments and faithfully transcribe the contents.
7384:
6785:
6714:
5926:"Security Recommendations For Stalking Victims"
5897:
4662:Jones v. Tsige, 2012 ONCA 32 (CanLII), online:
4316:Proceedings of the National Academy of Sciences
3803:
3597:Proceedings of the National Academy of Sciences
3407:Ben Tarnoff (2022). "Preface: Among the Eels".
2398:
2048:
1805:
6755:Laufer, Robert S.; Wolfe, Maxine (July 1977).
6409:
5034:"DOBBS v. JACKSON WOMEN'S HEALTH ORGANIZATION"
3863:"Real-Name Online Registration to Be Scrapped"
3797:
2724:"Privacy and the Law: A Philosophical Prelude"
2290:, which is built into companies like Apple or
1620:
1600:, control over information is under pressure.
1271:controversy over its human rights implications
135:The domain of privacy partially overlaps with
8701:
8278:
7684:
6093:Bulletin of Science, Technology & Society
5874:
5240:
4812:Burghardt, Buchmann, Böhm, Kühling, Sivridis
2818:"Philosophical Views on the Value of Privacy"
2677:, in Zalta, Edward N.; Nodelman, Uri (eds.),
2590:(18th ed.). Cambridge University Press.
2372:§ Privacy paradox and economic valuation
846:, by removing the expectation of privacy via
767:§ Privacy paradox and economic valuation
208:The examples and perspective in this section
23:. For information transmitted privately, see
8292:
7468:Lessig, Lawrence (2006). "ELEVEN: Privacy".
7426:
6476:
6146:, Manhasset Iss, 781, April 10, 2000, p. 52.
5952:"FindLaw's Writ – Amar: Executive Privilege"
3837:"Carol Todd's Testimony regarding Bill C-13"
2146:
2114:identification, which can mean breaking the
1460:Dobbs v. Jackson Women's Health Organization
1125:§ Legal discussions of Internet privacy
690:to restrict corporate and government power.
426:, was published. A classic dystopian novel,
8323:Freedom from arbitrary arrest and detention
6754:
6599:
5820:(Summer 1975). "Why Privacy is Important".
5789:. Monterey: Brooks/Cole Publishing Company.
5149:. Stanford, CA: Stanford University Press.
4676:Branch, Legislative Services (2020-08-07).
4590:Branch, Legislative Services (2019-06-21).
4550:Branch, Legislative Services (2023-09-01).
4132:"Complaint for Injunctive and Other Relief"
3834:
3406:
2054:
1582:
1199:
896:Ethical controversies over location privacy
698:citizens' privacy is largely restricted to
642:to minimize those regulatory requirements.
508:
154:is considered an extension of the original
8708:
8694:
8285:
8271:
7691:
7677:
7002:
6645:"The privacy paradox is a privacy dilemma"
6187:Journal of Computer-Mediated Communication
5144:
4825:
2768:
2450:become more aggressive towards each other.
2380:
2098:
1857:United Nations Declaration of Human Rights
1660:
1395:Environmental Information Regulations 2004
1216:put into law later in the European Union.
317:(1770-1831) makes the distinction between
226:, or create a new section, as appropriate.
7556:
7020:
6876:"Online Social Networks: Why We Disclose"
6850:
6573:
6520:
6494:
6198:
6180:
6036:(2009). Beauchamp; Bowie; Arnold (eds.).
5572:
5420:
5289:(1980). "Privacy and the Limits of Law".
5180:
4891:
4789:
4705:. LexisNexis Canada Inc. pp. 143–77.
4622:. LexisNexis Canada Inc. pp. HAP-81.
4579:. LexisNexis Canada Inc. pp. HAP-51.
4345:
4335:
4014:
3981:
3928:"Florida Anti-Bullying Laws and Policies"
3753:
3735:
3626:
3616:
2868:. McGill-Queen's University Press. 2005.
2133:which harms the people whose data it held
2118:of items of data by putting it through a
2082:
2002:
1506:
1163:Human rights in Japan § Other issues
1100:
1053:Facebook–Cambridge Analytica data scandal
1011:Learn how and when to remove this message
483:(533 U.S. 27) determined that the use of
242:Learn how and when to remove this message
6595:
6593:
6389:. New York: Cambridge University Press.
6373:(pp. 36–58). Springer Berlin Heidelberg.
6321:Personality and Social Psychology Review
5954:. Writ.corporate.findlaw.com. 2004-04-16
5525:
5138:
4906:
4741:"- Charter of human rights and freedoms"
4214:
3346:. New York: Cambridge University Press.
3319:. New York: Cambridge University Press.
2587:Cambridge English Pronouncing Dictionary
1981:Inherent necessity for privacy violation
1961:
1879:Susan B. Barnes similarly used the term
1533:
1489:Children's Online Privacy Protection Act
1128:
1036:have instead encouraged the practice of
880:Increasingly, mobile devices facilitate
626:on the Internet is often conflated with
502:
379:
253:
39:
8537:Right to an adequate standard of living
7432:
6941:
6032:
5816:
5764:
5728:. New York: Cambridge University Press.
5623:
5611:
5578:
5566:
5554:
5531:
5285:
5132:"Visit to the United States of America"
4873:
3843:from the original on September 18, 2016
2721:
2679:The Stanford Encyclopedia of Philosophy
2604:
1310:Canadian Charter of Rights and Freedoms
258:Advertisement with a highlighted quote
9293:
8338:Cruel, inhuman, or degrading treatment
7643:The 2007 International Privacy Ranking
7499:
7467:
7393:
7309:
7281:
7279:
7121:
7051:
6990:
6929:
6382:
6020:
6008:
5989:
5848:
5804:
5784:
5780:
5778:
5776:
5745:
5743:
5741:
5739:
5737:
5735:
5719:
5717:
5715:
5713:
5701:
5697:
5695:
5693:
5684:
5647:
5635:
5496:
5492:
5490:
5488:
5486:
5474:
5470:
5468:
5466:
5464:
5351:
5218:
5206:
5174:
4675:
4647:
4632:
4613:
4611:
4589:
4549:
4479:
4473:
4389:
4102:
4077:
3674:
3339:
3312:
3046:
2899:
2895:
2893:
2815:
1917:
1912:Research on irrational decision making
1867:Privacy paradox and economic valuation
1814:
972:contains content that is written like
8689:
8266:
8128:Electronic Privacy Information Center
7672:
7639:International Privacy Index world map
7312:"How to Protect Your Digital Privacy"
7207:
6642:
6590:
5749:
4991:
4982:Information Commissioner's Office, UK
4770:Journal of Physics: Conference Series
4763:
4637:. Office of the Privacy Commissioner.
4617:
4574:
4395:
4177:
4175:
3816:from the original on October 28, 2016
3785:from the original on October 29, 2013
3777:CTVNews.ca Staff (October 14, 2012).
3290:"The Web Means the End of Forgetting"
2906:University of Pennsylvania Law Review
2672:
2568:
2540:
1974:
1967:
1794:or declare certain information to be
1439:has found that other guarantees have
1331:Information privacy law § Europe
1180:Universal Declaration of Human Rights
1151:Constitution of the Republic of Korea
7625:Glenn Greenwald: Why privacy matters
5421:Mantelero, Alessandro (2014-12-01).
4181:
4068:. MSNBC, "Technolog", April 21, 2011
4039:
3096:. Bloomberg Businessweek. 2019-12-11
2006:
1922:§ Advertising on Mobile Devices
1834:A collective value and a human right
1603:
1319:Charter of human rights and freedoms
956:
778:
709:
686:as well as societal efforts such as
442:. Parallels have been drawn between
372:§ Techniques to improve privacy
194:
8108:Center for Democracy and Technology
7654:Stanford Encyclopedia of Philosophy
7310:Gordon, Whitson (25 January 2019).
7303:
7276:
7232:
7182:
5773:
5732:
5710:
5690:
5483:
5461:
5323:
4957:Does Beckham judgment change rules?
4931:
4608:
3004:
2890:
2497:Identity theft in the United States
2359:
2255:
1730:
1712:with other humans. Because part of
930:Center for Democracy and Technology
870:Privacy and location-based services
307:Second Treatise of Civil Government
13:
7568:The Encyclopedia of Libertarianism
7521:
7438:"Animals Need Digital Privacy Too"
6773:10.1111/j.1540-4560.1977.tb01880.x
6181:Taddicken, Monika (January 2014).
5427:Computer Law & Security Review
5376:. London: Bodley Head. p. 7.
5363:The quotation is from Alan Westin.
4985:
4291:"Google's FLoC Is a Terrible Idea"
4172:
3804:Boutilier, Alex (April 13, 2014).
3545:"Facebook: active users worldwide"
2954:. Groups.csail.mit.edu. 1996-05-18
2079:space to get private information.
1437:Supreme Court of the United States
1194:Free market vs consumer protection
687:
14:
9337:
8715:
8458:Right to refuse medical treatment
7645:, Privacy International (London).
7618:
6880:Journal of Information Technology
5056:
5038:LII / Legal Information Institute
5014:LII / Legal Information Institute
4620:Access to Information and Privacy
4577:Access to Information and Privacy
4156:"Global Digital Ad Spending 2019"
2185:Invasion of privacy, a subset of
1935:The economic valuation of privacy
1884:
1781:
1686:Self-identity and personal growth
1562:
1411:Privacy laws of the United States
1383:Information Commissioner's Office
1366:
1324:
1188:Asia-Pacific Economic Cooperation
760:
613:Security § Computer security
16:Seclusion from unwanted attention
9204:Concentration of media ownership
8247:
8246:
7714:Right of access to personal data
7352:
7328:
7251:
7226:
7201:
7176:
7160:"Signal Messenger: Speak Freely"
7152:
7127:
7045:
6996:
6935:
6867:
6826:
6779:
6748:
6661:
6636:
6549:
6445:
6403:
6376:
6363:
6308:
6269:
6238:
6207:
6174:
6149:
6136:
6123:
6098:
6085:
6067:
6054:
6026:
5983:
5974:
5965:
5944:
5918:
5868:
5842:
5810:
5758:
5752:American Philosophical Quarterly
5723:
5641:
5511:10.1111/j.1468-2230.2012.00925.x
5414:
5390:
5357:
5317:
5279:
5212:
5124:
4254:from the original on 2023-04-15.
4117:from the original on 2023-03-29.
4092:from the original on 2019-07-20.
4015:Whittaker, Zack (Aug 22, 2017).
3875:from the original on 2023-04-23.
3460:
3302:from the original on 2019-03-10.
3273:from the original on 2023-04-22.
3218:from the original on 2023-01-31.
2546:Longman Pronunciation Dictionary
2389:
2210:Examples of invasions of privacy
2011:
1423:does not explicitly include the
1404:
961:
609:Computer network § Security
495:required employees to listen to
260:"my face got redder and redder!"
199:
111:
70:
51:graffiti, adjacent to an actual
7400:Pacific Philosophical Quarterly
7394:Pepper, Angie (December 2020).
7263:Privacy & VPN Blog – Orchid
5823:Philosophy & Public Affairs
5704:Philosophy & Public Affairs
5190:(1890) 4 Harvard Law Review 193
5113:
5104:
5075:
5050:
5026:
5002:
4966:
4950:
4925:
4900:
4867:
4842:
4819:
4806:
4791:10.1088/1742-6596/1168/3/032084
4757:
4733:
4709:
4694:
4669:
4656:
4641:
4626:
4583:
4568:
4543:
4531:
4510:
4492:
4441:
4420:
4362:
4303:
4283:
4258:
4234:
4208:
4148:
4096:
4071:
4058:
4040:Kirk, Jeremy (March 20, 2017).
4033:
4008:
3998:
3941:
3907:"Law, Policies and Regulations"
3711:
3668:
3643:
3561:
3537:
3512:
3487:
3454:
3429:
3333:
3306:
3179:
3155:
3131:
3107:
3052:
2998:
2974:
2965:
2940:
2856:
2104:privacy include the following:
1512:Privacy as contextual integrity
1391:Freedom of Information Act 2000
862:forced to use their real name.
859:Korea Communications Commission
679:
8670:Sexual and reproductive health
8567:Right to a healthy environment
8123:Electronic Frontier Foundation
8103:American Civil Liberties Union
8057:Privacy-enhancing technologies
7461:
7058:International Data Privacy Law
6371:Privacy enhancing technologies
4973:"Personal Information Toolkit"
4907:McCarthy, Julie (2017-08-24).
4874:Masiero, Silvia (2018-09-24).
4826:Mark Scott (3 December 2014).
4404:Ethics for the Information Age
4296:Electronic Frontier Foundation
3373:Electronic Frontier Foundation
2809:
2762:
2715:
2691:
2666:
2631:
2562:
2534:
2460:more in direct proportions to
2246:Privacy-enhancing technologies
1898:, attitudes and behaviors are
1358:Since the introduction of the
936:
847:
683:
676:Electronic Frontier Foundation
438:, particularly on privacy and
376:Privacy-enhancing technologies
267:Philosophical views on privacy
1:
8587:Right to public participation
7478: ed.). Lawrence Lessig.
7009:Journal of Marketing Research
6602:Journal of Consumer Marketing
5534:"Privacy as Personal Control"
4182:Chen, Brian X. (2021-09-16).
3689:10.1080/09528822.2015.1082339
3393:Cyber Civil Rights Initiative
2822:Law and Contemporary Problems
2728:Law and Contemporary Problems
2527:
2335:or anonymizing networks like
2265:
2258:, they may be referred to as
2240:Techniques to improve privacy
2228:
1855:privacy has precedent in the
1695:engage in self-discovery and
1467:, with Supreme Court Justice
1227:
1200:§ Conceptions of Privacy
1028:, digital ad brokers such as
928:, but Justin Brookman of the
672:Cyber Civil Rights Initiative
605:Internet § Social impact
509:§ Legal right to privacy
496:
365:
315:Georg Wilhelm Friedrich Hegel
8607:Right to science and culture
7635:. Published 10 October 2014.
7547:Resources in other libraries
7506:. Harvard University Press.
7208:Cheng, Evelyn (2017-08-29).
6682:10.1007/978-3-642-39498-0_10
5992:The American Economic Review
5224:"Libel and its Legal Remedy"
4703:Criminal Procedure in Canada
4650:Class Actions in Privacy Law
4103:Keizer, Gregg (2011-04-27).
4078:Keizer, Gregg (2011-04-21).
3835:Todd, Carol (May 14, 2014).
3163:"Carpenter v. United States"
2399:Privacy in non-human animals
2321:
2252:actions which reduce privacy
2192:
2125:insecurity, such as lack of
2049:Actions which reduce privacy
1806:Privacy self-synchronization
1232:
1147:Constitution of South Africa
523:PRISM (surveillance program)
172:
7:
8433:Right to keep and bear arms
8343:Freedom from discrimination
7848:Data protection authorities
7698:
7557:Singleton, Solveig (2008).
6220:Computers in Human Behavior
6038:Ethical theory and business
3520:"Fair Credit Reporting Act"
2722:Konvitz, Milton R. (1966).
2475:
2180:
1702:
1621:Privacy as personal control
1538:In 1890, the United States
1250:Telecommunications Act 1997
1066:
819:harassment, such as in the
592:
222:, discuss the issue on the
10:
9342:
9306:Civil rights and liberties
8052:Social networking services
7660:Knowledge's privacy policy
7585:10.4135/9781412965811.n242
7500:Solove, Daniel J. (2010).
7233:Ell, Kellie (2018-07-13).
7139:Panda Security Mediacenter
6725:10.14361/9783839442135-003
6717:Network Publicy Governance
6575:10.1016/j.tele.2019.03.003
6562:Telematics and Informatics
6535:10.1016/j.cose.2015.07.002
6496:10.1016/j.tele.2017.04.013
6483:Telematics and Informatics
6294:10.1016/j.cose.2018.04.002
5439:10.1016/j.clsr.2014.09.004
5145:Nissenbaum, Helen (2009).
5087:Freedom of Information Act
4963:(retrieved 27 April 2005).
4745:www.legisquebec.gouv.qc.ca
4721:www.legisquebec.gouv.qc.ca
4406:. Pearson Addison Wesley.
4402:Quinn, Michael J. (2009).
4370:"The Italian Constitution"
3235:Cambridge University Press
2900:Solove, Daniel J. (2006).
2775:Journal of British Studies
2769:Longfellow, Erica (2006).
2369:
2363:
2325:
2275:
2269:
2243:
1984:
1965:
1956:mass surveillance industry
1945:Mass surveillance industry
1938:
1915:
1647:
1515:
1408:
1370:
1351:
1328:
1317:as well as by s. 5 of the
1280:
1258:
1236:
1197:
1160:
1110:
1104:
1086:
1076:
1070:
1046:mass surveillance industry
953:Mass surveillance industry
946:
940:
873:
788:
782:
764:
713:
602:
596:
575:Carpenter v. United States
526:
512:
506:
369:
188:
184:
18:
9247:
9191:
9153:
9075:
9024:
8989:
8933:
8890:
8883:
8847:
8799:
8723:
8630:
8597:Right to rest and leisure
8503:
8308:
8301:
8242:
8166:
8143:Global Network Initiative
8095:
8087:Virtual assistant privacy
8067:Privacy-invasive software
7995:
7959:
7846:
7742:
7706:
7542:Resources in your library
7183:Lee, Micah (2015-11-12).
7052:Esteve, Asunción (2017).
6232:10.1016/j.chb.2014.12.012
5532:Johnson, Carl A. (1974).
4664:https://canlii.ca/t/fpnld
4520:. Alrc.gov.au. 2008-08-12
3839:. www.openparliament.ca.
2548:(3rd ed.). Longman.
2294:and thus most common, or
2147:Information dissemination
1276:
1239:Privacy in Australian law
933:their location settings.
825:suicide of Tyler Clementi
653:is motivated by both the
638:, while at the same time
27:. For the 1952 film, see
9280:Society of the Spectacle
8612:Right to social security
8577:Right to Internet access
8522:Equal pay for equal work
8408:Presumption of innocence
7022:10.1177/0022243720920256
6852:10.1177/2056305116688035
6761:Journal of Social Issues
6614:10.1108/JCM-06-2019-3286
6523:Computers & Security
6431:10.1177/1461444808089415
6383:Cofone, Ignacio (2023).
6333:10.1177/1088868310366452
6282:Computers & Security
6251:Journal of Communication
5765:Goffman, Erving (1968).
5654:The economics of justice
5589:10.1017/CBO9780511498657
5402:openaccess.leidenuniv.nl
4717:"- Civil Code of Québec"
4648:Cofone, Ignacio (2021).
4633:Cofone, Ignacio (2020).
4455:(Report). Archived from
3737:10.3389/fpsyg.2017.00815
3524:Federal Trade Commission
3499:Federal Trade Commission
3441:Federal Trade Commission
3340:Cofone, Ignacio (2023).
3313:Cofone, Ignacio (2023).
3115:"United States v. Jones"
2354:anonymous search engines
1918:§ Social networking
1583:Control over information
1427:, individual as well as
1387:Data Protection Act 1998
1347:
916:, noting the ability of
912:wrote an open letter to
587:National Security Agency
556:became a landmark case.
35:Privacy (disambiguation)
9161:Influence of mass media
8966:Narcotizing dysfunction
8488:right to be a candidate
8318:Equality before the law
8138:Future of Privacy Forum
8133:European Digital Rights
6419:New Media & Society
6410:S. Livingstone (2008).
5265:10.1089/cyber.2013.0585
4764:Zhong, Guorong (2019).
4682:laws-lois.justice.gc.ca
4618:Power, Michael (2020).
4596:laws-lois.justice.gc.ca
4575:Power, Michael (2020).
4556:laws-lois.justice.gc.ca
4480:Jensen, Carlos (2004).
4337:10.1073/pnas.1218772110
4215:Hausfeld (2024-05-16).
3724:Frontiers in Psychology
3618:10.1073/pnas.1218772110
2986:Encyclopedia Britannica
2902:"A Taxonomy of Privacy"
2644:SSRN Electronic Journal
2381:Other security measures
2346:Virtual Private Network
2304:perfect forward secrecy
2203:Decisional interference
2099:Aggregating information
1968:§ User empowerment
1952:surveillance capitalism
1941:Surveillance capitalism
1661:Personhood and autonomy
1448:Griswold v. Connecticut
1273:and the role of media.
1117:Information privacy law
949:Surveillance capitalism
550:Griswold v. Connecticut
8822:Freedom of information
8348:Freedom of information
8333:Freedom of association
8179:Cellphone surveillance
8096:Advocacy organizations
7719:Expectation of privacy
6845:(1): 205630511668803.
6839:Social Media + Society
6131:News Media and the Law
6077:. 1948. Archived from
5912:Georgetown Law Journal
5875:H. Jeff Smith (1994).
5785:Altman, Irwin (1975).
5769:. New York: Doubleday.
5188:"The Right To Privacy"
4518:"For Your Information"
2816:Negley, Glenn (1966).
2673:DeCew, Judith (2015),
2282:Signal (messaging app)
2187:expectation of privacy
2162:
2083:Collecting information
2055:conceptions of privacy
2003:Privacy calculus model
1710:intimate relationships
1507:Conceptions of privacy
1493:Gramm–Leach–Bliley Act
1417:privacy law in America
1373:Privacy in English law
1143:Constitution of Brazil
1138:
1101:Legal right to privacy
1079:Data re-identification
1038:behavioral advertising
1026:contextual advertising
876:Location-based service
821:suicide of Amanda Todd
659:subverted expectations
554:United States v. Jones
540:United States v. Jones
480:Kyllo v. United States
393:
263:
56:
33:. For other uses, see
9209:Exploitation of women
8660:Intersex human rights
8468:Right of self-defense
8423:Right to a fair trial
8158:Privacy International
7729:Right to be forgotten
7571:. Thousand Oaks, CA:
7503:Understanding Privacy
6952:California Law Review
6804:10.1287/orsc.10.1.104
6670:Felt, Adrienne Porter
6157:"Volume 11, Number 9"
6060:Regan, P. M. (1995).
5499:The Modern Law Review
5479:. New York: Atheneum.
5475:Westin, Alan (1967).
5186:Warren and Brandeis,
3893:IEEE Computer Society
3243:10.1017/9781108591386
3139:"Riley v. California"
2364:Further information:
2276:Further information:
2150:
1985:Further information:
1962:Information asymmetry
1916:Further information:
1896:attitude-behavior gap
1572:Edwin Lawrence Godkin
1534:Right to be let alone
1352:Further information:
1342:Right to be Forgotten
1329:Further information:
1161:Further information:
1134:Privacy International
1132:
1121:Right to be forgotten
1077:Further information:
993:neutral point of view
947:Further information:
789:Further information:
765:Further information:
655:computational ability
651:right to be forgotten
649:. In particular, the
636:regulatory compliance
537:ruled unanimously in
513:Further information:
503:Police and government
383:
370:Further information:
257:
189:Further information:
49:One Nation Under CCTV
43:
8547:Right to development
8428:Right to family life
8378:Freedom from torture
8363:Freedom from slavery
7664:Wikimedia Foundation
7579:. pp. 390–392.
7370:Agence France-Presse
6792:Organization Science
4428:"Privacy Guidelines"
4160:Insider Intelligence
4064:Popkin, Helen A.S.,
3388:"Legislative Reform"
2652:10.2139/ssrn.3537968
2617:Etymology Dictionary
2454:Lion-tailed macaques
2256:organizational level
1524:contextual integrity
1518:Contextual integrity
1315:Civil Code of Quebec
1283:Canadian privacy law
1269:was passed, to some
1155:Italian Constitution
886:personal information
632:surveillance economy
300:English philosopher
220:improve this section
21:Personal information
9321:Identity management
9255:Advanced capitalism
8941:Cult of personality
8855:Advanced capitalism
8358:Freedom of religion
8353:Freedom of movement
8328:Freedom of assembly
8310:Civil and political
8194:Global surveillance
8062:Privacy engineering
8047:Personal identifier
7997:Information privacy
7734:Post-mortem privacy
7436:(31 January 2020).
7070:10.1093/idpl/ipw026
5883:. UNC Press Books.
5477:Privacy and Freedom
5374:Privacy and freedom
4782:2019JPhCS1168c2084Z
4328:2013PNAS..110.5802K
3966:2013NatSR...3E1376D
3930:. 24 September 2019
3909:. 24 September 2019
3609:2013PNAS..110.5802K
3571:, 21(4), in press,
2620:, November 17, 2020
2492:Global surveillance
2442:Cotton-top tamarins
2431:high blood pressure
2333:Anonymizing proxies
2278:Pretty Good Privacy
1991:It is suggested by
1815:An individual right
1792:executive privilege
1770:, privacy screens,
1748:intimate behaviours
1714:human relationships
1485:Privacy Act of 1974
1206:consumer protection
985:promotional content
727:Library of Congress
617:Information privacy
567:Riley v. California
562:Riley v. California
466:Privacy and Freedom
30:Private Information
9176:Semiotic democracy
9100:Civil disobedience
9012:Media manipulation
9002:Crowd manipulation
8925:Tabloid journalism
8839:Media transparency
8817:Media independence
8731:24-hour news cycle
8675:Right to sexuality
8552:Right to education
8478:Security of person
8373:Freedom of thought
8234:Personality rights
7412:10.1111/papq.12329
7316:The New York Times
7124:, pp. 104–05.
6892:10.1057/jit.2010.6
6461:2016-04-13 at the
6263:10.1111/jcom.12276
6200:10.1111/jcc4.12052
6163:. 4 September 2006
5932:on 11 January 2012
5649:Posner, Richard A.
5370:Blom-Cooper, Louis
5010:"Fourth Amendment"
4978:2009-01-03 at the
4893:10.1002/isd2.12053
4247:The New York Times
4188:The New York Times
3954:Scientific Reports
3578:2014-03-28 at the
3295:The New York Times
3191:The World from PRX
2950:Harvard Law Review
2404:David Attenborough
2233:speech recognition
1668:self-determination
1429:locational privacy
1139:
1093:In Australia, the
987:and inappropriate
943:Online advertising
805:content moderation
799:Content moderation
739:digital footprints
519:Police body camera
394:
264:
57:
9288:
9287:
9214:Freedom of speech
9032:Theodor W. Adorno
9020:
9019:
9007:Managing the news
8827:Freedom of speech
8807:Media development
8771:News broadcasting
8751:Independent media
8736:Alternative media
8683:
8682:
8582:Right to property
8542:Right to clothing
8527:Fair remuneration
8495:Right to homeland
8443:Right to petition
8368:Freedom of speech
8260:
8259:
8204:Mass surveillance
7528:Library resources
7485:978-0-465-03914-2
7372:. 18 October 2016
6734:978-3-8394-4213-5
6691:978-3-642-39497-3
6047:978-0-13-612602-7
5687:, pp. 22–23.
5668:978-0-674-23526-7
5626:, pp. 90–92.
5569:, pp. 85–89.
5383:978-0-370-01325-1
5338:978-0-679-72473-5
5222:(December 1880).
5177:, pp. 15–17.
5083:"The Privacy Act"
4938:www.aljazeera.com
4932:Saberin, Zeenat.
4500:"The Privacy Act"
4413:978-0-321-53685-3
4322:(15): 5802–5805.
3974:10.1038/srep01376
3603:(15): 5802–5805.
3569:Internet Research
3422:978-1-83976-202-4
3252:978-1-108-49242-3
2875:978-0-7735-3052-2
2597:978-0-521-15255-6
2555:978-1-4058-8118-0
2412:natural historian
2116:de-identification
2042:
2041:
1604:States of privacy
1549:yellow journalism
1477:freedom of speech
1021:
1020:
1013:
882:location tracking
844:freedom of speech
785:Online harassment
779:Online harassment
710:Social networking
700:industrial policy
688:legal regulations
457:The Naked Society
292:deutero-canonical
252:
251:
244:
9333:
9260:Culture industry
9229:Social influence
9182:The Lonely Crowd
9125:Political satire
9090:Call-out culture
9067:Jacques Rancière
9062:Marshall McLuhan
9037:Jean Baudrillard
8981:Viral phenomenon
8915:Public relations
8888:
8887:
8761:Mainstream media
8746:Electronic media
8710:
8703:
8696:
8687:
8686:
8572:Right to housing
8506:Economic, social
8453:Right to protest
8448:Right to privacy
8287:
8280:
8273:
8264:
8263:
8250:
8249:
8118:Data Privacy Lab
8077:Privacy software
7724:Right to privacy
7693:
7686:
7679:
7670:
7669:
7614:
7517:
7496:
7494:
7492:
7455:
7454:
7452:
7450:
7430:
7424:
7423:
7391:
7382:
7381:
7379:
7377:
7356:
7350:
7349:
7347:
7346:
7332:
7326:
7325:
7323:
7322:
7307:
7301:
7300:
7298:
7297:
7291:Stay Safe Online
7283:
7274:
7273:
7271:
7270:
7255:
7249:
7248:
7246:
7245:
7230:
7224:
7223:
7221:
7220:
7205:
7199:
7198:
7196:
7195:
7180:
7174:
7173:
7171:
7170:
7164:Signal Messenger
7156:
7150:
7149:
7147:
7146:
7131:
7125:
7119:
7074:
7073:
7049:
7043:
7042:
7024:
7000:
6994:
6988:
6977:
6976:
6943:Prosser, William
6939:
6933:
6927:
6912:
6911:
6871:
6865:
6864:
6854:
6830:
6824:
6823:
6783:
6777:
6776:
6752:
6746:
6745:
6712:
6703:
6702:
6668:Egelman, Serge;
6665:
6659:
6658:
6656:
6655:
6649:Internet Citizen
6643:Burkhardt, Kai.
6640:
6634:
6633:
6597:
6588:
6587:
6577:
6553:
6547:
6546:
6518:
6509:
6508:
6498:
6489:(7): 1038–1058.
6474:
6465:
6449:
6443:
6442:
6416:
6407:
6401:
6400:
6380:
6374:
6367:
6361:
6360:
6312:
6306:
6305:
6273:
6267:
6266:
6242:
6236:
6235:
6211:
6205:
6204:
6202:
6178:
6172:
6171:
6169:
6168:
6153:
6147:
6144:Information Week
6140:
6134:
6127:
6121:
6118:
6109:
6102:
6096:
6089:
6083:
6082:
6071:
6065:
6058:
6052:
6051:
6034:Johnson, Deborah
6030:
6024:
6018:
6012:
6006:
6000:
5999:
5987:
5981:
5978:
5972:
5969:
5963:
5962:
5960:
5959:
5948:
5942:
5941:
5939:
5937:
5922:
5916:
5915:
5904:
5895:
5894:
5882:
5872:
5866:
5865:
5858:Yale Law Journal
5854:"Sexual Privacy"
5850:Citron, Danielle
5846:
5840:
5839:
5814:
5808:
5802:
5791:
5790:
5782:
5771:
5770:
5762:
5756:
5755:
5747:
5730:
5729:
5721:
5708:
5707:
5699:
5688:
5682:
5673:
5672:
5645:
5639:
5633:
5627:
5621:
5615:
5609:
5603:
5602:
5576:
5570:
5564:
5558:
5552:
5546:
5545:
5529:
5523:
5522:
5494:
5481:
5480:
5472:
5459:
5458:
5418:
5412:
5411:
5409:
5408:
5394:
5388:
5387:
5361:
5355:
5349:
5343:
5342:
5321:
5315:
5314:
5291:Yale Law Journal
5283:
5277:
5276:
5244:
5238:
5237:
5229:Atlantic Monthly
5216:
5210:
5204:
5191:
5184:
5178:
5172:
5161:
5160:
5142:
5136:
5135:
5128:
5122:
5117:
5111:
5108:
5102:
5101:
5099:
5098:
5079:
5073:
5072:
5070:
5069:
5063:Business Insider
5054:
5048:
5047:
5045:
5044:
5030:
5024:
5023:
5021:
5020:
5006:
5000:
4999:
4989:
4983:
4970:
4964:
4954:
4948:
4947:
4945:
4944:
4929:
4923:
4922:
4920:
4919:
4904:
4898:
4897:
4895:
4871:
4865:
4864:
4862:
4861:
4846:
4840:
4839:
4837:
4835:
4823:
4817:
4810:
4804:
4803:
4793:
4761:
4755:
4754:
4752:
4751:
4737:
4731:
4730:
4728:
4727:
4713:
4707:
4706:
4698:
4692:
4691:
4689:
4688:
4673:
4667:
4660:
4654:
4653:
4645:
4639:
4638:
4630:
4624:
4623:
4615:
4606:
4605:
4603:
4602:
4587:
4581:
4580:
4572:
4566:
4565:
4563:
4562:
4547:
4541:
4535:
4529:
4528:
4526:
4525:
4514:
4508:
4507:
4506:. 10 March 2023.
4496:
4490:
4489:
4477:
4471:
4470:
4468:
4467:
4461:
4454:
4445:
4439:
4438:
4436:
4435:
4424:
4418:
4417:
4399:
4393:
4387:
4381:
4380:
4374:
4366:
4360:
4359:
4349:
4339:
4307:
4301:
4300:
4287:
4281:
4280:
4278:
4276:
4262:
4256:
4255:
4238:
4232:
4231:
4229:
4228:
4212:
4206:
4205:
4203:
4202:
4179:
4170:
4169:
4167:
4166:
4152:
4146:
4145:
4143:
4142:
4136:
4128:
4119:
4118:
4100:
4094:
4093:
4075:
4069:
4062:
4056:
4055:
4053:
4052:
4046:BankInfoSecurity
4037:
4031:
4030:
4028:
4027:
4012:
4006:
4002:
3996:
3995:
3985:
3945:
3939:
3938:
3936:
3935:
3924:
3918:
3917:
3915:
3914:
3903:
3897:
3896:
3883:
3877:
3876:
3859:
3853:
3852:
3850:
3848:
3832:
3826:
3825:
3823:
3821:
3801:
3795:
3794:
3792:
3790:
3774:
3768:
3767:
3757:
3739:
3715:
3709:
3708:
3672:
3666:
3665:
3663:
3662:
3647:
3641:
3640:
3630:
3620:
3588:
3582:
3565:
3559:
3558:
3556:
3555:
3541:
3535:
3534:
3532:
3531:
3516:
3510:
3509:
3507:
3506:
3491:
3485:
3484:
3482:
3481:
3458:
3452:
3451:
3449:
3448:
3433:
3427:
3426:
3415:. pp. 8–9.
3404:
3398:
3397:
3384:
3378:
3377:
3364:
3358:
3357:
3337:
3331:
3330:
3310:
3304:
3303:
3286:
3275:
3274:
3263:
3257:
3256:
3226:
3220:
3219:
3208:
3202:
3201:
3199:
3198:
3183:
3177:
3176:
3174:
3173:
3159:
3153:
3152:
3150:
3149:
3135:
3129:
3128:
3126:
3125:
3111:
3105:
3104:
3102:
3101:
3086:
3075:
3074:
3072:
3071:
3056:
3050:
3044:
3021:
3020:
3018:
3017:
3005:Leetaru, Kalev.
3002:
2996:
2995:
2993:
2992:
2978:
2972:
2969:
2963:
2962:
2960:
2959:
2944:
2938:
2937:
2918:10.2307/40041279
2897:
2888:
2887:
2860:
2854:
2853:
2813:
2807:
2806:
2766:
2760:
2759:
2719:
2713:
2712:
2710:
2709:
2703:bible.oremus.org
2695:
2689:
2688:
2687:
2686:
2670:
2664:
2663:
2635:
2629:
2628:
2627:
2625:
2608:
2602:
2601:
2566:
2560:
2559:
2538:
2522:Privacy software
2487:Digital identity
2414:, affirmed that
2360:User empowerment
2217:contract workers
2160:
2138:informed consent
2120:de-anonymization
2109:data aggregation
2037:
2034:
2015:
2007:
1975:user empowerment
1905:default settings
1776:window coverings
1737:Fourth Amendment
1731:Physical privacy
1528:Helen Nissenbaum
1463:later overruled
1425:right to privacy
1245:Privacy Act 1988
1222:privacy policies
1212:concepts of the
1169:Privacy Act 1988
1107:Right to privacy
1016:
1009:
1005:
1002:
996:
974:an advertisement
965:
964:
957:
755:privacy settings
599:Internet privacy
342:John Stuart Mill
247:
240:
236:
233:
227:
203:
202:
195:
156:right to privacy
141:bodily integrity
131:
130:
127:
126:
123:
120:
117:
110:
102:
101:
98:
97:
94:
91:
88:
85:
82:
79:
76:
69:
9341:
9340:
9336:
9335:
9334:
9332:
9331:
9330:
9291:
9290:
9289:
9284:
9270:Media franchise
9243:
9187:
9149:
9105:Culture jamming
9071:
9057:Walter Lippmann
9016:
8985:
8929:
8879:
8843:
8834:Media pluralism
8795:
8719:
8714:
8684:
8679:
8650:Family planning
8635:
8626:
8602:Right of return
8562:Right to health
8510:
8507:
8499:
8463:Right to resist
8413:Right of asylum
8304:
8297:
8291:
8261:
8256:
8238:
8162:
8091:
7991:
7955:
7842:
7836:amended in 2020
7738:
7702:
7697:
7621:
7595:
7553:
7552:
7551:
7536:
7535:
7531:
7524:
7522:Further reading
7514:
7490:
7488:
7486:
7464:
7459:
7458:
7448:
7446:
7431:
7427:
7392:
7385:
7375:
7373:
7358:
7357:
7353:
7344:
7342:
7334:
7333:
7329:
7320:
7318:
7308:
7304:
7295:
7293:
7285:
7284:
7277:
7268:
7266:
7257:
7256:
7252:
7243:
7241:
7231:
7227:
7218:
7216:
7206:
7202:
7193:
7191:
7181:
7177:
7168:
7166:
7158:
7157:
7153:
7144:
7142:
7133:
7132:
7128:
7120:
7077:
7050:
7046:
7001:
6997:
6989:
6980:
6965:10.2307/3478805
6940:
6936:
6928:
6915:
6872:
6868:
6831:
6827:
6784:
6780:
6753:
6749:
6735:
6713:
6706:
6692:
6666:
6662:
6653:
6651:
6641:
6637:
6598:
6591:
6554:
6550:
6519:
6512:
6475:
6468:
6463:Wayback Machine
6450:
6446:
6414:
6408:
6404:
6397:
6381:
6377:
6368:
6364:
6313:
6309:
6274:
6270:
6243:
6239:
6212:
6208:
6179:
6175:
6166:
6164:
6161:firstmonday.org
6155:
6154:
6150:
6141:
6137:
6128:
6124:
6119:
6112:
6103:
6099:
6095:, 28(1), 80–91.
6090:
6086:
6073:
6072:
6068:
6059:
6055:
6048:
6031:
6027:
6019:
6015:
6007:
6003:
5988:
5984:
5979:
5975:
5970:
5966:
5957:
5955:
5950:
5949:
5945:
5935:
5933:
5924:
5923:
5919:
5906:
5905:
5898:
5891:
5873:
5869:
5847:
5843:
5815:
5811:
5803:
5794:
5783:
5774:
5763:
5759:
5748:
5733:
5722:
5711:
5700:
5691:
5683:
5676:
5669:
5646:
5642:
5634:
5630:
5622:
5618:
5610:
5606:
5599:
5577:
5573:
5565:
5561:
5553:
5549:
5530:
5526:
5495:
5484:
5473:
5462:
5419:
5415:
5406:
5404:
5396:
5395:
5391:
5384:
5366:Westin, Alan F.
5362:
5358:
5350:
5346:
5339:
5322:
5318:
5284:
5280:
5259:(10): 633–638.
5245:
5241:
5236:(278): 729–739.
5217:
5213:
5205:
5194:
5185:
5181:
5173:
5164:
5157:
5143:
5139:
5130:
5129:
5125:
5118:
5114:
5109:
5105:
5096:
5094:
5081:
5080:
5076:
5067:
5065:
5057:Frias, Lauren.
5055:
5051:
5042:
5040:
5032:
5031:
5027:
5018:
5016:
5008:
5007:
5003:
4990:
4986:
4980:Wayback Machine
4971:
4967:
4955:
4951:
4942:
4940:
4930:
4926:
4917:
4915:
4905:
4901:
4872:
4868:
4859:
4857:
4856:. 27 March 2020
4848:
4847:
4843:
4833:
4831:
4824:
4820:
4811:
4807:
4762:
4758:
4749:
4747:
4739:
4738:
4734:
4725:
4723:
4715:
4714:
4710:
4699:
4695:
4686:
4684:
4674:
4670:
4661:
4657:
4646:
4642:
4631:
4627:
4616:
4609:
4600:
4598:
4588:
4584:
4573:
4569:
4560:
4558:
4548:
4544:
4536:
4532:
4523:
4521:
4516:
4515:
4511:
4498:
4497:
4493:
4478:
4474:
4465:
4463:
4459:
4452:
4446:
4442:
4433:
4431:
4426:
4425:
4421:
4414:
4400:
4396:
4388:
4384:
4372:
4368:
4367:
4363:
4308:
4304:
4289:
4288:
4284:
4274:
4272:
4264:
4263:
4259:
4240:
4239:
4235:
4226:
4224:
4213:
4209:
4200:
4198:
4180:
4173:
4164:
4162:
4154:
4153:
4149:
4140:
4138:
4134:
4130:
4129:
4122:
4101:
4097:
4076:
4072:
4063:
4059:
4050:
4048:
4038:
4034:
4025:
4023:
4013:
4009:
4003:
3999:
3946:
3942:
3933:
3931:
3926:
3925:
3921:
3912:
3910:
3905:
3904:
3900:
3885:
3884:
3880:
3868:The Chosun Ilbo
3861:
3860:
3856:
3846:
3844:
3833:
3829:
3819:
3817:
3810:www.thestar.com
3802:
3798:
3788:
3786:
3775:
3771:
3716:
3712:
3673:
3669:
3660:
3658:
3649:
3648:
3644:
3589:
3585:
3580:Wayback Machine
3566:
3562:
3553:
3551:
3543:
3542:
3538:
3529:
3527:
3518:
3517:
3513:
3504:
3502:
3493:
3492:
3488:
3479:
3477:
3461:Tiku, Nitasha.
3459:
3455:
3446:
3444:
3435:
3434:
3430:
3423:
3405:
3401:
3386:
3385:
3381:
3366:
3365:
3361:
3354:
3338:
3334:
3327:
3311:
3307:
3288:
3287:
3278:
3265:
3264:
3260:
3253:
3227:
3223:
3210:
3209:
3205:
3196:
3194:
3185:
3184:
3180:
3171:
3169:
3161:
3160:
3156:
3147:
3145:
3137:
3136:
3132:
3123:
3121:
3113:
3112:
3108:
3099:
3097:
3088:
3087:
3078:
3069:
3067:
3058:
3057:
3053:
3049:, pp. 3–4.
3045:
3024:
3015:
3013:
3003:
2999:
2990:
2988:
2980:
2979:
2975:
2970:
2966:
2957:
2955:
2946:
2945:
2941:
2898:
2891:
2876:
2862:
2861:
2857:
2834:10.2307/1190674
2814:
2810:
2767:
2763:
2740:10.2307/1190671
2720:
2716:
2707:
2705:
2697:
2696:
2692:
2684:
2682:
2671:
2667:
2636:
2632:
2623:
2621:
2610:
2609:
2605:
2598:
2567:
2563:
2556:
2539:
2535:
2530:
2482:Civil liberties
2478:
2458:bite themselves
2401:
2392:
2383:
2374:
2368:
2362:
2330:
2324:
2284:
2274:
2268:
2248:
2242:
2212:
2195:
2183:
2161:
2158:Publilius Syrus
2156:
2149:
2101:
2085:
2059:William Prosser
2051:
2038:
2032:
2029:
2022:needs expansion
2016:
2005:
1997:privacy dilemma
1993:Andréa Belliger
1989:
1983:
1970:
1964:
1947:
1937:
1924:
1914:
1881:privacy paradox
1873:privacy paradox
1869:
1836:
1817:
1808:
1784:
1772:cathedral glass
1733:
1725:Danielle Citron
1705:
1688:
1663:
1650:
1637:Lorenzo Magnani
1623:
1606:
1585:
1565:
1536:
1526:, developed by
1520:
1514:
1509:
1495:(GLB), and the
1481:First Amendment
1479:granted in the
1471:characterizing
1469:Clarence Thomas
1421:US Constitution
1419:. Although the
1413:
1407:
1375:
1369:
1356:
1350:
1333:
1327:
1285:
1279:
1263:
1241:
1235:
1230:
1202:
1196:
1165:
1127:
1109:
1103:
1091:
1081:
1075:
1069:
1017:
1006:
1000:
997:
978:
966:
962:
955:
945:
939:
898:
878:
872:
801:
787:
781:
769:
763:
735:deanonymization
718:
712:
619:
601:
595:
531:
525:
511:
505:
485:thermal imaging
436:totalitarianism
378:
368:
360:Michel Foucault
344:. Mill’s essay
269:
248:
237:
231:
228:
217:
204:
200:
193:
187:
175:
152:digital privacy
114:
105:
104:
73:
64:
63:
38:
17:
12:
11:
5:
9339:
9329:
9328:
9323:
9318:
9313:
9311:Digital rights
9308:
9303:
9286:
9285:
9283:
9282:
9277:
9272:
9267:
9262:
9257:
9251:
9249:
9245:
9244:
9242:
9241:
9236:
9231:
9226:
9221:
9216:
9211:
9206:
9201:
9195:
9193:
9189:
9188:
9186:
9185:
9178:
9173:
9168:
9163:
9157:
9155:
9151:
9150:
9148:
9147:
9142:
9137:
9132:
9127:
9122:
9117:
9112:
9107:
9102:
9097:
9095:Cancel culture
9092:
9087:
9081:
9079:
9077:Counterculture
9073:
9072:
9070:
9069:
9064:
9059:
9054:
9049:
9044:
9042:Edward Bernays
9039:
9034:
9028:
9026:
9022:
9021:
9018:
9017:
9015:
9014:
9009:
9004:
8999:
8997:Catch and kill
8993:
8991:
8987:
8986:
8984:
8983:
8978:
8976:Sensationalism
8973:
8968:
8963:
8958:
8953:
8948:
8943:
8937:
8935:
8931:
8930:
8928:
8927:
8922:
8917:
8912:
8911:
8910:
8900:
8894:
8892:
8885:
8881:
8880:
8878:
8877:
8872:
8867:
8865:Bipartisanship
8862:
8860:American Dream
8857:
8851:
8849:
8845:
8844:
8842:
8841:
8836:
8831:
8830:
8829:
8824:
8814:
8809:
8803:
8801:
8797:
8796:
8794:
8793:
8788:
8783:
8778:
8773:
8768:
8763:
8758:
8753:
8748:
8743:
8738:
8733:
8727:
8725:
8721:
8720:
8713:
8712:
8705:
8698:
8690:
8681:
8680:
8678:
8677:
8672:
8667:
8662:
8657:
8652:
8647:
8641:
8639:
8628:
8627:
8625:
8624:
8619:
8617:Right to water
8614:
8609:
8604:
8599:
8594:
8592:Right of reply
8589:
8584:
8579:
8574:
8569:
8564:
8559:
8554:
8549:
8544:
8539:
8534:
8529:
8524:
8519:
8517:Digital rights
8513:
8511:
8504:
8501:
8500:
8498:
8497:
8492:
8491:
8490:
8480:
8475:
8473:Right to truth
8470:
8465:
8460:
8455:
8450:
8445:
8440:
8435:
8430:
8425:
8420:
8415:
8410:
8405:
8400:
8395:
8390:
8385:
8380:
8375:
8370:
8365:
8360:
8355:
8350:
8345:
8340:
8335:
8330:
8325:
8320:
8314:
8312:
8306:
8305:
8302:
8299:
8298:
8290:
8289:
8282:
8275:
8267:
8258:
8257:
8255:
8254:
8243:
8240:
8239:
8237:
8236:
8231:
8226:
8221:
8219:Search warrant
8216:
8211:
8206:
8201:
8199:Identity theft
8196:
8191:
8186:
8181:
8176:
8170:
8168:
8164:
8163:
8161:
8160:
8155:
8150:
8145:
8140:
8135:
8130:
8125:
8120:
8115:
8110:
8105:
8099:
8097:
8093:
8092:
8090:
8089:
8084:
8079:
8074:
8072:Privacy policy
8069:
8064:
8059:
8054:
8049:
8044:
8039:
8034:
8033:
8032:
8027:
8022:
8012:
8007:
8001:
7999:
7993:
7992:
7990:
7989:
7984:
7979:
7974:
7969:
7963:
7961:
7957:
7956:
7954:
7953:
7951:United Kingdom
7948:
7943:
7938:
7933:
7928:
7923:
7918:
7913:
7908:
7903:
7898:
7893:
7888:
7883:
7878:
7873:
7868:
7866:European Union
7863:
7858:
7852:
7850:
7844:
7843:
7841:
7840:
7839:
7838:
7824:
7822:United Kingdom
7819:
7814:
7809:
7804:
7799:
7794:
7789:
7784:
7782:European Union
7779:
7774:
7769:
7764:
7759:
7754:
7748:
7746:
7740:
7739:
7737:
7736:
7731:
7726:
7721:
7716:
7710:
7708:
7704:
7703:
7696:
7695:
7688:
7681:
7673:
7667:
7666:
7657:
7646:
7636:
7631:, provided by
7620:
7619:External links
7617:
7616:
7615:
7594:978-1412965804
7593:
7577:Cato Institute
7563:Hamowy, Ronald
7550:
7549:
7544:
7538:
7537:
7526:
7525:
7523:
7520:
7519:
7518:
7513:978-0674035072
7512:
7497:
7484:
7463:
7460:
7457:
7456:
7425:
7406:(4): 628–650.
7383:
7351:
7327:
7302:
7275:
7250:
7225:
7200:
7175:
7151:
7126:
7075:
7044:
7015:(4): 617–639.
6995:
6993:, p. 103.
6978:
6934:
6932:, p. 101.
6913:
6886:(2): 109–125.
6866:
6825:
6798:(1): 104–115.
6778:
6747:
6733:
6704:
6690:
6660:
6635:
6608:(4): 457–472.
6589:
6548:
6510:
6466:
6444:
6425:(3): 393–411.
6402:
6395:
6375:
6362:
6327:(4): 351–367.
6307:
6268:
6237:
6206:
6193:(2): 248–273.
6173:
6148:
6135:
6122:
6110:
6097:
6084:
6081:on 2014-12-08.
6066:
6053:
6046:
6025:
6013:
6001:
5982:
5973:
5964:
5943:
5917:
5896:
5890:978-0807821473
5889:
5867:
5841:
5830:(4): 323–333.
5818:Rachels, James
5809:
5792:
5772:
5757:
5731:
5709:
5689:
5674:
5667:
5640:
5628:
5616:
5612:Magnani (2007)
5604:
5597:
5571:
5559:
5547:
5524:
5505:(5): 806–836.
5482:
5460:
5433:(6): 643–660.
5413:
5389:
5382:
5356:
5344:
5337:
5316:
5303:10.2307/795891
5297:(3): 421–471.
5278:
5239:
5211:
5192:
5179:
5162:
5156:978-0804772891
5155:
5137:
5123:
5112:
5103:
5074:
5049:
5025:
5001:
4984:
4965:
4949:
4924:
4899:
4866:
4841:
4818:
4805:
4756:
4732:
4708:
4693:
4668:
4655:
4640:
4625:
4607:
4582:
4567:
4542:
4530:
4509:
4491:
4472:
4440:
4419:
4412:
4394:
4382:
4379:on 2016-11-27.
4361:
4302:
4282:
4257:
4250:. 2021-06-22.
4233:
4207:
4171:
4147:
4120:
4095:
4070:
4057:
4032:
4007:
3997:
3940:
3919:
3898:
3878:
3854:
3827:
3796:
3769:
3710:
3683:(3): 155–164.
3667:
3642:
3583:
3560:
3536:
3526:. 19 July 2013
3511:
3486:
3453:
3428:
3421:
3399:
3379:
3359:
3352:
3332:
3325:
3305:
3298:. 2010-07-25.
3276:
3269:. April 2021.
3258:
3251:
3221:
3203:
3193:. 30 July 2016
3178:
3154:
3130:
3106:
3076:
3051:
3022:
2997:
2973:
2964:
2939:
2912:(3): 477–564.
2889:
2874:
2855:
2828:(2): 319–325.
2808:
2803:10.1086/499790
2787:10.1086/499790
2781:(2): 313–334.
2761:
2734:(2): 272–280.
2714:
2690:
2665:
2630:
2612:"privacy (n.)"
2603:
2596:
2561:
2554:
2542:Wells, John C.
2532:
2531:
2529:
2526:
2525:
2524:
2519:
2517:Visual privacy
2514:
2509:
2504:
2499:
2494:
2489:
2484:
2477:
2474:
2473:
2472:
2465:
2451:
2445:
2400:
2397:
2391:
2388:
2382:
2379:
2361:
2358:
2326:Main article:
2323:
2320:
2308:Edward Snowden
2270:Main article:
2267:
2264:
2241:
2238:
2237:
2236:
2211:
2208:
2194:
2191:
2182:
2179:
2154:
2148:
2145:
2144:
2143:
2140:
2134:
2123:
2112:
2100:
2097:
2084:
2081:
2076:
2075:
2072:
2069:
2066:
2053:As with other
2050:
2047:
2040:
2039:
2019:
2017:
2010:
2004:
2001:
1982:
1979:
1963:
1960:
1936:
1933:
1913:
1910:
1868:
1865:
1835:
1832:
1827:Richard Posner
1820:David Flaherty
1816:
1813:
1807:
1804:
1783:
1782:Organizational
1780:
1752:intimate parts
1732:
1729:
1704:
1701:
1697:self-criticism
1687:
1684:
1662:
1659:
1649:
1646:
1622:
1619:
1605:
1602:
1584:
1581:
1564:
1563:Limited access
1561:
1545:natural rights
1535:
1532:
1522:The theory of
1516:Main article:
1513:
1510:
1508:
1505:
1409:Main article:
1406:
1403:
1371:Main article:
1368:
1367:United Kingdom
1365:
1349:
1346:
1326:
1325:European Union
1323:
1281:Main article:
1278:
1275:
1259:Main article:
1237:Main article:
1234:
1231:
1229:
1226:
1198:Main article:
1195:
1192:
1105:Main article:
1102:
1099:
1087:Main article:
1071:Main article:
1068:
1065:
1019:
1018:
989:external links
969:
967:
960:
941:Main article:
938:
935:
897:
894:
874:Main article:
871:
868:
852:search warrant
783:Main article:
780:
777:
762:
761:Selfie culture
759:
714:Main article:
711:
708:
597:Main article:
594:
591:
583:Edward Snowden
507:Main article:
504:
501:
410:Louis Brandeis
398:printing press
388:convention in
367:
364:
335:utilitarianism
331:Jeremy Bentham
295:Book of Sirach
268:
265:
250:
249:
214:of the subject
212:worldwide view
207:
205:
198:
186:
183:
174:
171:
15:
9:
6:
4:
3:
2:
9338:
9327:
9324:
9322:
9319:
9317:
9314:
9312:
9309:
9307:
9304:
9302:
9299:
9298:
9296:
9281:
9278:
9276:
9273:
9271:
9268:
9266:
9263:
9261:
9258:
9256:
9253:
9252:
9250:
9246:
9240:
9237:
9235:
9232:
9230:
9227:
9225:
9222:
9220:
9217:
9215:
9212:
9210:
9207:
9205:
9202:
9200:
9197:
9196:
9194:
9190:
9184:
9183:
9179:
9177:
9174:
9172:
9171:Mediatization
9169:
9167:
9166:Media studies
9164:
9162:
9159:
9158:
9156:
9152:
9146:
9145:Strike action
9143:
9141:
9138:
9136:
9133:
9131:
9128:
9126:
9123:
9121:
9118:
9116:
9113:
9111:
9110:Demonstration
9108:
9106:
9103:
9101:
9098:
9096:
9093:
9091:
9088:
9086:
9083:
9082:
9080:
9078:
9074:
9068:
9065:
9063:
9060:
9058:
9055:
9053:
9050:
9048:
9045:
9043:
9040:
9038:
9035:
9033:
9030:
9029:
9027:
9023:
9013:
9010:
9008:
9005:
9003:
9000:
8998:
8995:
8994:
8992:
8988:
8982:
8979:
8977:
8974:
8972:
8969:
8967:
8964:
8962:
8959:
8957:
8954:
8952:
8949:
8947:
8944:
8942:
8939:
8938:
8936:
8932:
8926:
8923:
8921:
8918:
8916:
8913:
8909:
8906:
8905:
8904:
8901:
8899:
8896:
8895:
8893:
8889:
8886:
8882:
8876:
8875:Pensée unique
8873:
8871:
8868:
8866:
8863:
8861:
8858:
8856:
8853:
8852:
8850:
8846:
8840:
8837:
8835:
8832:
8828:
8825:
8823:
8820:
8819:
8818:
8815:
8813:
8810:
8808:
8805:
8804:
8802:
8798:
8792:
8789:
8787:
8784:
8782:
8779:
8777:
8774:
8772:
8769:
8767:
8764:
8762:
8759:
8757:
8754:
8752:
8749:
8747:
8744:
8742:
8741:Digital media
8739:
8737:
8734:
8732:
8729:
8728:
8726:
8722:
8718:
8717:Media culture
8711:
8706:
8704:
8699:
8697:
8692:
8691:
8688:
8676:
8673:
8671:
8668:
8666:
8663:
8661:
8658:
8656:
8653:
8651:
8648:
8646:
8643:
8642:
8640:
8638:
8633:
8629:
8623:
8622:Right to work
8620:
8618:
8615:
8613:
8610:
8608:
8605:
8603:
8600:
8598:
8595:
8593:
8590:
8588:
8585:
8583:
8580:
8578:
8575:
8573:
8570:
8568:
8565:
8563:
8560:
8558:
8557:Right to food
8555:
8553:
8550:
8548:
8545:
8543:
8540:
8538:
8535:
8533:
8530:
8528:
8525:
8523:
8520:
8518:
8515:
8514:
8512:
8509:
8502:
8496:
8493:
8489:
8486:
8485:
8484:
8481:
8479:
8476:
8474:
8471:
8469:
8466:
8464:
8461:
8459:
8456:
8454:
8451:
8449:
8446:
8444:
8441:
8439:
8438:Right to life
8436:
8434:
8431:
8429:
8426:
8424:
8421:
8419:
8416:
8414:
8411:
8409:
8406:
8404:
8401:
8399:
8396:
8394:
8391:
8389:
8386:
8384:
8381:
8379:
8376:
8374:
8371:
8369:
8366:
8364:
8361:
8359:
8356:
8354:
8351:
8349:
8346:
8344:
8341:
8339:
8336:
8334:
8331:
8329:
8326:
8324:
8321:
8319:
8316:
8315:
8313:
8311:
8307:
8300:
8296:
8288:
8283:
8281:
8276:
8274:
8269:
8268:
8265:
8253:
8245:
8244:
8241:
8235:
8232:
8230:
8227:
8225:
8222:
8220:
8217:
8215:
8212:
8210:
8207:
8205:
8202:
8200:
8197:
8195:
8192:
8190:
8189:Eavesdropping
8187:
8185:
8184:Data security
8182:
8180:
8177:
8175:
8172:
8171:
8169:
8165:
8159:
8156:
8154:
8151:
8149:
8146:
8144:
8141:
8139:
8136:
8134:
8131:
8129:
8126:
8124:
8121:
8119:
8116:
8114:
8111:
8109:
8106:
8104:
8101:
8100:
8098:
8094:
8088:
8085:
8083:
8082:Secret ballot
8080:
8078:
8075:
8073:
8070:
8068:
8065:
8063:
8060:
8058:
8055:
8053:
8050:
8048:
8045:
8043:
8042:Personal data
8040:
8038:
8035:
8031:
8028:
8026:
8023:
8021:
8018:
8017:
8016:
8013:
8011:
8008:
8006:
8003:
8002:
8000:
7998:
7994:
7988:
7985:
7983:
7980:
7978:
7975:
7973:
7970:
7968:
7965:
7964:
7962:
7958:
7952:
7949:
7947:
7944:
7942:
7939:
7937:
7934:
7932:
7929:
7927:
7924:
7922:
7919:
7917:
7914:
7912:
7909:
7907:
7904:
7902:
7899:
7897:
7894:
7892:
7889:
7887:
7884:
7882:
7879:
7877:
7874:
7872:
7869:
7867:
7864:
7862:
7859:
7857:
7854:
7853:
7851:
7849:
7845:
7837:
7833:
7830:
7829:
7828:
7827:United States
7825:
7823:
7820:
7818:
7815:
7813:
7810:
7808:
7805:
7803:
7800:
7798:
7795:
7793:
7790:
7788:
7785:
7783:
7780:
7778:
7775:
7773:
7770:
7768:
7765:
7763:
7760:
7758:
7755:
7753:
7750:
7749:
7747:
7745:
7741:
7735:
7732:
7730:
7727:
7725:
7722:
7720:
7717:
7715:
7712:
7711:
7709:
7705:
7701:
7694:
7689:
7687:
7682:
7680:
7675:
7674:
7671:
7665:
7661:
7658:
7656:
7655:
7651:entry in the
7650:
7647:
7644:
7640:
7637:
7634:
7630:
7626:
7623:
7622:
7612:
7608:
7604:
7600:
7596:
7590:
7586:
7582:
7578:
7574:
7570:
7569:
7564:
7560:
7555:
7554:
7548:
7545:
7543:
7540:
7539:
7534:
7529:
7515:
7509:
7505:
7504:
7498:
7487:
7481:
7477:
7473:
7472:
7466:
7465:
7445:
7444:
7439:
7435:
7434:Eveleth, Rose
7429:
7421:
7417:
7413:
7409:
7405:
7401:
7397:
7390:
7388:
7371:
7367:
7366:
7361:
7355:
7341:
7337:
7331:
7317:
7313:
7306:
7292:
7288:
7282:
7280:
7264:
7260:
7254:
7240:
7236:
7229:
7215:
7211:
7204:
7190:
7189:The Intercept
7186:
7179:
7165:
7161:
7155:
7140:
7136:
7130:
7123:
7118:
7116:
7114:
7112:
7110:
7108:
7106:
7104:
7102:
7100:
7098:
7096:
7094:
7092:
7090:
7088:
7086:
7084:
7082:
7080:
7071:
7067:
7063:
7059:
7055:
7048:
7040:
7036:
7032:
7028:
7023:
7018:
7014:
7010:
7006:
6999:
6992:
6987:
6985:
6983:
6974:
6970:
6966:
6962:
6958:
6954:
6953:
6948:
6944:
6938:
6931:
6926:
6924:
6922:
6920:
6918:
6909:
6905:
6901:
6897:
6893:
6889:
6885:
6881:
6877:
6870:
6862:
6858:
6853:
6848:
6844:
6840:
6836:
6829:
6821:
6817:
6813:
6809:
6805:
6801:
6797:
6793:
6789:
6782:
6774:
6770:
6766:
6762:
6758:
6751:
6744:
6740:
6736:
6730:
6726:
6722:
6718:
6711:
6709:
6701:
6697:
6693:
6687:
6683:
6679:
6675:
6671:
6664:
6650:
6646:
6639:
6631:
6627:
6623:
6619:
6615:
6611:
6607:
6603:
6596:
6594:
6585:
6581:
6576:
6571:
6567:
6563:
6559:
6552:
6544:
6540:
6536:
6532:
6528:
6524:
6517:
6515:
6506:
6502:
6497:
6492:
6488:
6484:
6480:
6473:
6471:
6464:
6460:
6457:
6454:
6448:
6440:
6436:
6432:
6428:
6424:
6420:
6413:
6406:
6398:
6396:9781108995443
6392:
6388:
6387:
6379:
6372:
6366:
6358:
6354:
6350:
6346:
6342:
6338:
6334:
6330:
6326:
6322:
6318:
6311:
6303:
6299:
6295:
6291:
6287:
6283:
6279:
6272:
6264:
6260:
6256:
6252:
6248:
6241:
6233:
6229:
6225:
6221:
6217:
6210:
6201:
6196:
6192:
6188:
6184:
6177:
6162:
6158:
6152:
6145:
6139:
6132:
6126:
6117:
6115:
6107:
6104:Watt, Eliza.
6101:
6094:
6088:
6080:
6076:
6070:
6063:
6057:
6049:
6043:
6039:
6035:
6029:
6022:
6021:Lessig (2006)
6017:
6010:
6009:Lessig (2006)
6005:
5998:(2): 405–409.
5997:
5993:
5986:
5977:
5968:
5953:
5947:
5931:
5927:
5921:
5913:
5909:
5903:
5901:
5892:
5886:
5881:
5880:
5871:
5864:: 1877, 1880.
5863:
5859:
5855:
5851:
5845:
5837:
5833:
5829:
5825:
5824:
5819:
5813:
5807:, p. 35.
5806:
5801:
5799:
5797:
5788:
5781:
5779:
5777:
5768:
5761:
5753:
5746:
5744:
5742:
5740:
5738:
5736:
5727:
5720:
5718:
5716:
5714:
5705:
5698:
5696:
5694:
5686:
5681:
5679:
5670:
5664:
5660:
5656:
5655:
5650:
5644:
5638:, p. 21.
5637:
5632:
5625:
5620:
5613:
5608:
5600:
5598:9780511498657
5594:
5590:
5586:
5582:
5575:
5568:
5563:
5557:, p. 90.
5556:
5551:
5543:
5539:
5535:
5528:
5520:
5516:
5512:
5508:
5504:
5500:
5493:
5491:
5489:
5487:
5478:
5471:
5469:
5467:
5465:
5456:
5452:
5448:
5444:
5440:
5436:
5432:
5428:
5424:
5417:
5403:
5399:
5393:
5385:
5379:
5375:
5371:
5367:
5360:
5354:, p. 24.
5353:
5348:
5340:
5334:
5330:
5326:
5320:
5312:
5308:
5304:
5300:
5296:
5292:
5288:
5287:Gavison, Ruth
5282:
5274:
5270:
5266:
5262:
5258:
5254:
5250:
5243:
5235:
5231:
5230:
5225:
5221:
5215:
5209:, p. 19.
5208:
5203:
5201:
5199:
5197:
5189:
5183:
5176:
5171:
5169:
5167:
5158:
5152:
5148:
5141:
5133:
5127:
5121:
5116:
5107:
5093:on 2015-08-10
5092:
5088:
5084:
5078:
5064:
5060:
5053:
5039:
5035:
5029:
5015:
5011:
5005:
4997:
4996:
4988:
4981:
4977:
4974:
4969:
4962:
4958:
4953:
4939:
4935:
4928:
4914:
4910:
4903:
4894:
4889:
4886:(6): e12053.
4885:
4881:
4877:
4870:
4855:
4854:Yale Insights
4851:
4845:
4829:
4822:
4815:
4809:
4801:
4797:
4792:
4787:
4783:
4779:
4776:(3): 032084.
4775:
4771:
4767:
4760:
4746:
4742:
4736:
4722:
4718:
4712:
4704:
4697:
4683:
4679:
4672:
4665:
4659:
4651:
4644:
4636:
4629:
4621:
4614:
4612:
4597:
4593:
4586:
4578:
4571:
4557:
4553:
4546:
4539:
4534:
4519:
4513:
4505:
4501:
4495:
4487:
4483:
4476:
4462:on 2018-12-31
4458:
4451:
4444:
4429:
4423:
4415:
4409:
4405:
4398:
4391:
4386:
4378:
4371:
4365:
4357:
4353:
4348:
4343:
4338:
4333:
4329:
4325:
4321:
4317:
4313:
4306:
4299:. 2021-03-03.
4298:
4297:
4292:
4286:
4271:
4267:
4261:
4253:
4249:
4248:
4243:
4237:
4222:
4218:
4211:
4197:
4193:
4189:
4185:
4178:
4176:
4161:
4157:
4151:
4133:
4127:
4125:
4116:
4112:
4111:
4110:Computerworld
4106:
4099:
4091:
4087:
4086:
4085:Computerworld
4081:
4074:
4067:
4061:
4047:
4043:
4036:
4022:
4018:
4011:
4001:
3993:
3989:
3984:
3979:
3975:
3971:
3967:
3963:
3959:
3955:
3951:
3944:
3929:
3923:
3908:
3902:
3894:
3890:
3889:
3882:
3874:
3870:
3869:
3864:
3858:
3847:September 12,
3842:
3838:
3831:
3820:September 12,
3815:
3811:
3807:
3800:
3784:
3780:
3773:
3765:
3761:
3756:
3751:
3747:
3743:
3738:
3733:
3729:
3725:
3721:
3714:
3706:
3702:
3698:
3694:
3690:
3686:
3682:
3678:
3671:
3656:
3652:
3646:
3638:
3634:
3629:
3624:
3619:
3614:
3610:
3606:
3602:
3598:
3594:
3587:
3581:
3577:
3574:
3570:
3564:
3550:
3546:
3540:
3525:
3521:
3515:
3500:
3496:
3490:
3476:
3472:
3468:
3464:
3457:
3442:
3438:
3432:
3424:
3418:
3414:
3410:
3403:
3395:
3394:
3389:
3383:
3375:
3374:
3369:
3363:
3355:
3353:9781108995443
3349:
3345:
3344:
3336:
3328:
3326:9781108995443
3322:
3318:
3317:
3309:
3301:
3297:
3296:
3291:
3285:
3283:
3281:
3272:
3268:
3262:
3254:
3248:
3244:
3240:
3237:. p. x.
3236:
3232:
3225:
3217:
3213:
3207:
3192:
3188:
3182:
3168:
3164:
3158:
3144:
3140:
3134:
3120:
3116:
3110:
3095:
3094:Bloomberg.com
3091:
3085:
3083:
3081:
3065:
3061:
3055:
3048:
3043:
3041:
3039:
3037:
3035:
3033:
3031:
3029:
3027:
3012:
3008:
3001:
2987:
2983:
2977:
2968:
2953:
2951:
2943:
2935:
2931:
2927:
2923:
2919:
2915:
2911:
2907:
2903:
2896:
2894:
2885:
2881:
2877:
2871:
2867:
2866:
2859:
2851:
2847:
2843:
2839:
2835:
2831:
2827:
2823:
2819:
2812:
2804:
2800:
2796:
2792:
2788:
2784:
2780:
2776:
2772:
2765:
2757:
2753:
2749:
2745:
2741:
2737:
2733:
2729:
2725:
2718:
2704:
2700:
2694:
2680:
2676:
2669:
2661:
2657:
2653:
2649:
2645:
2641:
2634:
2619:
2618:
2613:
2607:
2599:
2593:
2589:
2588:
2583:
2579:
2575:
2571:
2570:Jones, Daniel
2565:
2557:
2551:
2547:
2543:
2537:
2533:
2523:
2520:
2518:
2515:
2513:
2510:
2508:
2505:
2503:
2500:
2498:
2495:
2493:
2490:
2488:
2485:
2483:
2480:
2479:
2470:
2466:
2463:
2459:
2455:
2452:
2449:
2446:
2443:
2440:
2439:
2438:
2434:
2432:
2428:
2427:heart disease
2423:
2421:
2417:
2413:
2409:
2405:
2396:
2390:Legal methods
2387:
2378:
2373:
2367:
2357:
2355:
2349:
2347:
2342:
2338:
2334:
2329:
2319:
2317:
2313:
2309:
2305:
2301:
2297:
2293:
2289:
2283:
2279:
2273:
2263:
2261:
2260:cybersecurity
2257:
2253:
2250:Similarly to
2247:
2234:
2230:
2226:
2222:
2218:
2214:
2213:
2207:
2204:
2200:
2190:
2188:
2178:
2175:
2171:
2165:
2159:
2153:
2141:
2139:
2135:
2132:
2128:
2127:data security
2124:
2121:
2117:
2113:
2110:
2107:
2106:
2105:
2096:
2092:
2090:
2089:interrogation
2080:
2073:
2070:
2067:
2064:
2063:
2062:
2060:
2056:
2046:
2036:
2027:
2023:
2020:This section
2018:
2014:
2009:
2008:
2000:
1998:
1994:
1988:
1978:
1976:
1969:
1959:
1957:
1953:
1946:
1942:
1932:
1928:
1923:
1919:
1909:
1906:
1901:
1897:
1892:
1888:
1886:
1882:
1877:
1874:
1864:
1860:
1858:
1852:
1849:
1843:
1841:
1831:
1828:
1824:
1821:
1812:
1803:
1801:
1800:trade secrets
1797:
1793:
1789:
1779:
1777:
1773:
1769:
1765:
1761:
1758:reasons, are
1757:
1753:
1749:
1745:
1740:
1738:
1728:
1726:
1721:
1720:James Rachels
1717:
1715:
1711:
1700:
1698:
1692:
1683:
1679:
1675:
1671:
1669:
1658:
1654:
1645:
1641:
1638:
1634:
1630:
1627:
1618:
1614:
1611:
1601:
1599:
1595:
1594:Charles Fried
1591:
1580:
1578:
1573:
1568:
1560:
1557:
1552:
1550:
1546:
1541:
1531:
1529:
1525:
1519:
1504:
1500:
1498:
1494:
1491:(COPPA), the
1490:
1486:
1482:
1478:
1474:
1470:
1466:
1462:
1461:
1457:
1455:
1450:
1449:
1444:
1443:
1438:
1434:
1433:4th Amendment
1430:
1426:
1422:
1418:
1412:
1405:United States
1402:
1400:
1396:
1392:
1388:
1384:
1380:
1374:
1364:
1361:
1355:
1345:
1343:
1337:
1332:
1322:
1320:
1316:
1312:
1311:
1306:
1305:
1300:
1299:
1294:
1290:
1284:
1274:
1272:
1268:
1265:In 2015, the
1262:
1257:
1253:
1251:
1246:
1240:
1225:
1223:
1217:
1215:
1209:
1207:
1201:
1191:
1189:
1185:
1181:
1176:
1174:
1170:
1164:
1159:
1156:
1152:
1148:
1144:
1135:
1131:
1126:
1122:
1118:
1114:
1108:
1098:
1096:
1090:
1085:
1080:
1074:
1064:
1062:
1058:
1054:
1049:
1047:
1043:
1039:
1035:
1031:
1027:
1015:
1012:
1004:
994:
990:
986:
982:
976:
975:
970:This section
968:
959:
958:
954:
950:
944:
934:
931:
927:
923:
919:
915:
911:
905:
903:
893:
889:
887:
883:
877:
867:
863:
860:
855:
853:
849:
845:
840:
838:
834:
830:
826:
822:
818:
814:
810:
806:
800:
796:
792:
786:
776:
773:
768:
758:
756:
752:
747:
742:
740:
736:
730:
728:
724:
717:
707:
705:
704:personal data
701:
696:
691:
689:
685:
681:
677:
673:
668:
664:
660:
656:
652:
648:
643:
641:
637:
633:
629:
625:
618:
614:
610:
606:
600:
590:
588:
584:
579:
577:
576:
570:
568:
564:
563:
557:
555:
551:
546:
542:
541:
536:
535:Supreme Court
530:
524:
520:
516:
510:
500:
498:
494:
490:
486:
482:
481:
475:
473:
472:
467:
463:
459:
458:
453:
452:Vance Packard
448:
445:
441:
437:
433:
429:
425:
424:George Orwell
421:
419:
413:
411:
407:
406:Samuel Warren
403:
399:
391:
387:
382:
377:
373:
363:
361:
357:
351:
349:
348:
343:
338:
336:
332:
328:
327:
322:
321:
316:
311:
309:
308:
303:
298:
296:
293:
289:
288:
283:
282:
277:
272:
261:
256:
246:
243:
235:
225:
221:
215:
213:
206:
197:
196:
192:
182:
180:
170:
168:
164:
159:
157:
153:
148:
144:
142:
138:
133:
129:
108:
100:
67:
61:
54:
50:
46:
42:
36:
32:
31:
26:
22:
9316:Human rights
9275:Post-Fordism
9265:Mass society
9234:Transparency
9223:
9180:
9047:Noam Chomsky
9025:Philosophers
8971:Recuperation
8956:Media circus
8946:Dumbing down
8812:Media policy
8786:Social media
8637:reproductive
8532:Labor rights
8508:and cultural
8447:
8418:Right to die
8295:human rights
8293:Substantive
8229:Human rights
7744:Privacy laws
7699:
7652:
7642:
7567:
7532:
7501:
7489:. Retrieved
7470:
7447:. Retrieved
7441:
7428:
7403:
7399:
7374:. Retrieved
7365:The Guardian
7363:
7354:
7343:. Retrieved
7339:
7330:
7319:. Retrieved
7315:
7305:
7294:. Retrieved
7290:
7267:. Retrieved
7265:. 2021-05-11
7262:
7253:
7242:. Retrieved
7238:
7228:
7217:. Retrieved
7213:
7203:
7192:. Retrieved
7188:
7178:
7167:. Retrieved
7163:
7154:
7143:. Retrieved
7141:. 2021-03-02
7138:
7129:
7064:(1): 36–47.
7061:
7057:
7047:
7012:
7008:
6998:
6959:(383): 389.
6956:
6950:
6937:
6883:
6879:
6869:
6842:
6838:
6828:
6795:
6791:
6781:
6767:(3): 22–42.
6764:
6760:
6750:
6716:
6673:
6663:
6652:. Retrieved
6648:
6638:
6605:
6601:
6565:
6561:
6551:
6526:
6522:
6486:
6482:
6452:
6447:
6422:
6418:
6405:
6385:
6378:
6370:
6365:
6324:
6320:
6310:
6285:
6281:
6271:
6257:(1): 26–53.
6254:
6250:
6240:
6223:
6219:
6209:
6190:
6186:
6176:
6165:. Retrieved
6160:
6151:
6143:
6138:
6130:
6125:
6100:
6092:
6087:
6079:the original
6069:
6061:
6056:
6037:
6033:
6028:
6016:
6004:
5995:
5991:
5985:
5976:
5967:
5956:. Retrieved
5946:
5934:. Retrieved
5930:the original
5920:
5911:
5878:
5870:
5861:
5857:
5844:
5827:
5821:
5812:
5786:
5766:
5760:
5751:
5725:
5703:
5653:
5643:
5631:
5624:Johnson 1974
5619:
5607:
5580:
5574:
5567:Johnson 1974
5562:
5555:Johnson 1974
5550:
5541:
5537:
5527:
5502:
5498:
5476:
5430:
5426:
5416:
5405:. Retrieved
5401:
5392:
5373:
5359:
5347:
5328:
5325:Bok, Sissela
5319:
5294:
5290:
5281:
5256:
5252:
5242:
5233:
5227:
5220:Godkin, E.L.
5214:
5182:
5146:
5140:
5126:
5115:
5106:
5095:. Retrieved
5091:the original
5086:
5077:
5066:. Retrieved
5062:
5052:
5041:. Retrieved
5037:
5028:
5017:. Retrieved
5013:
5004:
4994:
4987:
4968:
4952:
4941:. Retrieved
4937:
4927:
4916:. Retrieved
4912:
4902:
4883:
4879:
4869:
4858:. Retrieved
4853:
4844:
4832:. Retrieved
4821:
4813:
4808:
4773:
4769:
4759:
4748:. Retrieved
4744:
4735:
4724:. Retrieved
4720:
4711:
4702:
4696:
4685:. Retrieved
4681:
4671:
4658:
4652:. Routledge.
4649:
4643:
4628:
4619:
4599:. Retrieved
4595:
4585:
4576:
4570:
4559:. Retrieved
4555:
4545:
4533:
4522:. Retrieved
4512:
4503:
4494:
4481:
4475:
4464:. Retrieved
4457:the original
4443:
4432:. Retrieved
4422:
4403:
4397:
4392:, p. 3.
4385:
4377:the original
4364:
4319:
4315:
4305:
4294:
4285:
4273:. Retrieved
4269:
4260:
4245:
4236:
4225:. Retrieved
4220:
4210:
4199:. Retrieved
4187:
4163:. Retrieved
4159:
4150:
4139:. Retrieved
4108:
4098:
4083:
4073:
4060:
4049:. Retrieved
4045:
4035:
4024:. Retrieved
4020:
4010:
4000:
3957:
3953:
3943:
3932:. Retrieved
3922:
3911:. Retrieved
3901:
3887:
3881:
3866:
3857:
3845:. Retrieved
3830:
3818:. Retrieved
3809:
3799:
3787:. Retrieved
3781:. CTV News.
3772:
3727:
3723:
3713:
3680:
3676:
3670:
3659:. Retrieved
3657:. 2013-06-07
3654:
3645:
3600:
3596:
3586:
3568:
3563:
3552:. Retrieved
3548:
3539:
3528:. Retrieved
3523:
3514:
3503:. Retrieved
3501:. 2013-07-25
3498:
3489:
3478:. Retrieved
3466:
3456:
3445:. Retrieved
3443:. 2013-05-02
3440:
3431:
3408:
3402:
3391:
3382:
3371:
3362:
3342:
3335:
3315:
3308:
3293:
3261:
3230:
3224:
3206:
3195:. Retrieved
3190:
3181:
3170:. Retrieved
3166:
3157:
3146:. Retrieved
3142:
3133:
3122:. Retrieved
3118:
3109:
3098:. Retrieved
3093:
3068:. Retrieved
3066:. 2020-07-24
3063:
3054:
3014:. Retrieved
3010:
3000:
2989:. Retrieved
2985:
2976:
2967:
2956:. Retrieved
2949:
2942:
2909:
2905:
2864:
2858:
2825:
2821:
2811:
2778:
2774:
2764:
2731:
2727:
2717:
2706:. Retrieved
2702:
2693:
2683:, retrieved
2678:
2668:
2643:
2633:
2624:November 18,
2622:, retrieved
2615:
2606:
2585:
2582:Esling, John
2578:Setter, Jane
2574:Roach, Peter
2564:
2545:
2536:
2512:Transparency
2467:In one zoo,
2435:
2424:
2402:
2393:
2384:
2375:
2350:
2331:
2285:
2249:
2202:
2198:
2196:
2184:
2166:
2163:
2151:
2102:
2093:
2086:
2077:
2052:
2043:
2030:
2026:adding to it
2021:
1996:
1990:
1971:
1948:
1929:
1925:
1899:
1893:
1889:
1885:social media
1880:
1878:
1872:
1870:
1861:
1853:
1844:
1840:human rights
1837:
1825:
1818:
1809:
1785:
1741:
1734:
1718:
1706:
1693:
1689:
1680:
1676:
1672:
1664:
1655:
1651:
1642:
1635:
1631:
1626:Psychologist
1624:
1615:
1607:
1586:
1569:
1566:
1553:
1537:
1521:
1501:
1472:
1464:
1458:
1452:
1446:
1441:
1414:
1376:
1357:
1338:
1334:
1308:
1302:
1297:
1286:
1264:
1254:
1249:
1244:
1242:
1218:
1210:
1203:
1177:
1166:
1140:
1092:
1082:
1050:
1042:HTTP cookies
1022:
1007:
998:
983:by removing
979:Please help
971:
926:software bug
906:
899:
890:
879:
864:
856:
841:
811:may lead to
809:Revenge porn
802:
791:Revenge porn
770:
743:
731:
719:
692:
663:revenge porn
658:
654:
644:
627:
623:
620:
580:
573:
571:
566:
560:
558:
553:
549:
538:
532:
478:
476:
469:
465:
455:
449:
443:
432:surveillance
427:
416:
414:
395:
352:
345:
339:
326:sittlichkeit
324:
318:
312:
305:
299:
285:
279:
273:
270:
238:
229:
209:
176:
160:
149:
145:
134:
59:
58:
48:
29:
9326:Privacy law
9154:In academia
9140:Review bomb
8961:Media event
8898:Advertising
8870:Consumerism
8791:State media
8665:LGBT rights
8398:Nationality
8388:LGBT rights
8224:Wiretapping
7936:Switzerland
7921:South Korea
7911:Philippines
7901:Netherlands
7896:Isle of Man
7817:Switzerland
7797:New Zealand
7627:. Video on
7462:Works cited
7122:Solove 2010
6991:Solove 2010
6930:Solove 2010
6529:: 122–134.
6455:article 1.
6288:: 226–261.
6226:: 158–167.
5805:Solove 2010
5685:Solove 2010
5636:Solove 2010
5352:Solove 2010
5207:Solove 2010
5175:Solove 2010
4390:Solove 2010
4223:(in German)
3789:October 17,
3413:Verso Books
3047:Solove 2010
2952:193 (1890)"
2507:Open access
2448:Chimpanzees
2131:data breach
1577:Sissela Bok
1465:Roe v. Wade
1454:Roe v. Wade
1298:Privacy Act
1113:Privacy law
937:Advertising
902:AccuWeather
471:Roe v. Wade
462:Alan Westin
422:written by
191:Privacy law
9295:Categories
9219:Media bias
9120:Occupation
9052:Guy Debord
8934:Techniques
8903:Propaganda
8800:Principles
8776:News media
8756:Mass media
8403:Personhood
8209:Panopticon
7832:California
7707:Principles
7603:2008009151
7345:2021-11-22
7321:2021-11-22
7296:2021-11-22
7269:2022-01-22
7244:2024-01-29
7219:2024-01-29
7194:2024-01-29
7169:2021-11-22
7145:2021-11-22
6654:2020-01-10
6167:2019-11-25
5958:2012-01-01
5936:2 February
5407:2017-07-19
5097:2015-11-19
5068:2022-06-25
5043:2022-06-25
5019:2021-03-20
4943:2021-11-22
4918:2021-11-22
4860:2021-11-22
4750:2024-03-22
4726:2024-03-22
4687:2024-03-22
4601:2024-03-21
4561:2024-03-21
4524:2019-08-22
4466:2019-02-01
4434:2019-08-22
4227:2024-06-28
4201:2021-11-22
4165:2023-09-30
4141:2021-06-03
4051:2021-11-22
4026:2021-11-22
3934:2023-06-19
3913:2023-06-19
3677:Third Text
3661:2021-03-17
3554:2020-10-11
3530:2023-06-18
3505:2021-09-28
3480:2021-10-26
3447:2021-09-28
3197:2021-09-28
3172:2021-09-27
3148:2021-09-27
3124:2021-09-27
3100:2021-06-02
3070:2021-09-28
3016:2021-09-27
2991:2021-09-27
2958:2019-08-22
2884:j.cttq4963
2708:2024-03-21
2685:2024-03-21
2528:References
2469:orangutans
2420:London Zoo
2370:See also:
2272:Encryption
2266:Encryption
2244:See also:
2174:personhood
1966:See also:
1939:See also:
1900:in general
1848:collective
1796:classified
1289:common law
1228:By country
1111:See also:
981:improve it
914:Steve Jobs
910:Al Franken
817:homophobic
813:misogynist
693:While the
680:encryption
603:See also:
527:See also:
440:censorship
386:Republican
366:Technology
356:Panopticon
347:On Liberty
302:John Locke
169:measures.
163:encryption
9199:Anonymity
8908:Fake news
8884:Deception
8781:Old media
8766:New media
8383:Legal aid
8174:Anonymity
8010:Financial
7987:Workplace
7977:Education
7886:Indonesia
7856:Australia
7812:Sri Lanka
7807:Singapore
7752:Australia
7649:"Privacy"
7611:750831024
7559:"Privacy"
7449:10 August
7420:0279-0750
7376:10 August
7039:218917353
7031:0022-2437
6947:"Privacy"
6900:0268-3962
6861:2056-3051
6812:1047-7039
6743:239333913
6630:216265480
6622:0736-3761
6584:0736-5853
6568:: 55–69.
6505:0736-5853
6341:1088-8683
5544:: 83–100.
5519:142188960
5447:0267-3649
4830:. nytimes
4800:169731837
4275:April 16,
4196:0362-4331
3746:1664-1078
3705:146571563
3697:0952-8822
3475:1059-1028
3368:"Privacy"
2926:0041-9907
2842:0023-9186
2795:0021-9371
2748:0023-9186
2675:"Privacy"
2660:1556-5068
2502:Open data
2464:visitors.
2456:pace and
2408:biologist
2328:Anonymity
2322:Anonymity
2235:software.
2215:In 2019,
2199:intrusion
2193:Intrusion
2033:June 2023
1556:seclusion
1499:(HIPAA).
1442:penumbras
1293:civil law
1233:Australia
1001:June 2023
848:anonymity
746:Microsoft
684:anonymity
667:deepfakes
415:In 1948,
320:moralität
276:Aristotle
232:June 2023
224:talk page
173:Etymology
167:anonymity
9248:Synonyms
9239:Violence
9115:Graffiti
8848:Ideology
8645:Abortion
8483:Suffrage
8252:Category
8167:See also
8020:Facebook
8015:Internet
7967:Consumer
7941:Thailand
6945:(1960).
6908:33649999
6820:54041604
6700:11701552
6459:Archived
6439:31076785
6349:20435803
6302:52884338
5852:(2019).
5651:(1983).
5455:61135032
5372:(1970).
5327:(1989).
5273:25226054
4976:Archived
4961:BBC News
4834:14 April
4356:23479631
4252:Archived
4221:Hausfeld
4115:Archived
4090:Archived
3992:23524645
3960:: 1376.
3873:Archived
3841:Archived
3814:Archived
3783:Archived
3764:28588530
3655:BBC News
3637:23479631
3576:Archived
3549:Statista
3300:Archived
3271:Archived
3216:Archived
2934:40041279
2584:(eds.).
2572:(2011).
2544:(2008).
2476:See also
2416:gorillas
2366:End user
2229:intimate
2181:Invasion
2155:—
1954:and the
1788:security
1744:stalking
1703:Intimacy
1610:Solitude
1598:big data
1473:Griswold
1073:Metadata
1067:Metadata
1030:Facebook
837:swatting
833:stalking
823:and the
695:Internet
674:and the
640:lobbying
628:security
593:Internet
529:The Wire
497:intimate
402:Internet
218:You may
179:privatus
137:security
9301:Privacy
9224:Privacy
9130:Protest
9085:Boycott
8951:Framing
8393:Liberty
8030:Twitter
7982:Medical
7972:Digital
7891:Ireland
7876:Germany
7861:Denmark
7787:Germany
7777:England
7772:Denmark
7700:Privacy
7629:YouTube
7565:(ed.).
7533:Privacy
7491:30 June
7340:NPR.org
6973:3478805
6357:5394359
5914:. 2002.
5836:2265077
4995:Privacy
4959:, from
4778:Bibcode
4347:3625324
4324:Bibcode
3983:3607247
3962:Bibcode
3895:. 2012.
3755:5440591
3730:: 815.
3628:3625324
3605:Bibcode
2850:1190674
2756:1190671
2292:Outlook
1778:, etc.
1760:clothes
1756:modesty
1648:Secrecy
1540:jurists
1360:Aadhaar
918:iPhones
829:doxxing
795:Doxxing
772:Selfies
751:Twitter
723:Twitter
624:privacy
400:or the
390:Chicago
185:History
60:Privacy
25:Secrecy
9192:Issues
8990:Others
8632:Sexual
8025:Google
7946:Turkey
7931:Sweden
7916:Poland
7906:Norway
7871:France
7802:Russia
7762:Canada
7757:Brazil
7609:
7601:
7591:
7530:about
7510:
7482:
7418:
7037:
7029:
6971:
6906:
6898:
6859:
6818:
6810:
6741:
6731:
6698:
6688:
6628:
6620:
6582:
6543:422308
6541:
6503:
6437:
6393:
6355:
6347:
6339:
6300:
6044:
5887:
5834:
5665:
5595:
5517:
5453:
5445:
5380:
5335:
5311:795891
5309:
5271:
5153:
4798:
4430:. OECD
4410:
4354:
4344:
4194:
3990:
3980:
3762:
3752:
3744:
3703:
3695:
3635:
3625:
3473:
3419:
3350:
3323:
3249:
3011:Forbes
2932:
2924:
2882:
2872:
2848:
2840:
2801:
2793:
2754:
2746:
2658:
2594:
2552:
2312:Monero
2300:Signal
2298:. The
2288:S/MIME
2225:Amazon
2170:doxing
1920:, and
1768:fences
1435:. The
1277:Canada
1123:, and
1034:Google
797:, and
615:, and
521:, and
515:Police
493:Amazon
374:, and
55:camera
45:Banksy
8891:Forms
8724:Media
8214:PRISM
8037:Email
7960:Areas
7926:Spain
7881:India
7792:Ghana
7767:China
7561:. In
7443:Wired
7035:S2CID
6969:JSTOR
6904:S2CID
6816:S2CID
6739:S2CID
6696:S2CID
6626:S2CID
6539:S2CID
6435:S2CID
6415:(PDF)
6353:S2CID
6298:S2CID
5832:JSTOR
5515:S2CID
5451:S2CID
5307:JSTOR
4796:S2CID
4460:(PDF)
4453:(PDF)
4373:(PDF)
4135:(PDF)
4021:ZDNet
3701:S2CID
3467:Wired
3064:Osano
2930:JSTOR
2880:JSTOR
2846:JSTOR
2799:JSTOR
2752:JSTOR
2462:human
2316:ZCash
2221:Apple
1764:walls
1348:India
1057:Apple
922:iPads
647:users
489:Apple
287:oikos
281:polis
9135:Punk
8920:Spin
8153:NOYB
7607:OCLC
7599:LCCN
7589:ISBN
7573:Sage
7508:ISBN
7493:2022
7480:ISBN
7471:Code
7451:2022
7416:ISSN
7378:2022
7239:CNBC
7214:CNBC
7027:ISSN
6896:ISSN
6857:ISSN
6808:ISSN
6729:ISBN
6686:ISBN
6618:ISSN
6580:ISSN
6501:ISSN
6391:ISBN
6345:PMID
6337:ISSN
6042:ISBN
5938:2008
5885:ISBN
5663:ISBN
5593:ISBN
5443:ISSN
5378:ISBN
5333:ISBN
5269:PMID
5151:ISBN
4836:2018
4774:1168
4504:Home
4408:ISBN
4352:PMID
4277:2021
4192:ISSN
4005:2009
3988:PMID
3849:2016
3822:2016
3791:2012
3760:PMID
3742:ISSN
3693:ISSN
3633:PMID
3471:ISSN
3417:ISBN
3348:ISBN
3321:ISBN
3247:ISBN
3167:Oyez
3143:Oyez
3119:Oyez
2922:ISSN
2870:ISBN
2838:ISSN
2791:ISSN
2744:ISSN
2656:ISSN
2626:2020
2592:ISBN
2550:ISBN
2429:and
2410:and
2406:, a
2339:and
2314:and
2280:and
2223:and
2219:for
1943:and
1871:The
1451:and
1379:tort
1243:The
1214:GDPR
1061:FLoC
1032:and
951:and
920:and
682:and
665:and
491:and
444:1984
428:1984
418:1984
408:and
53:CCTV
8634:and
8005:Law
7633:TED
7581:doi
7476:2.0
7408:doi
7404:101
7066:doi
7017:doi
6961:doi
6888:doi
6847:doi
6800:doi
6769:doi
6721:doi
6678:doi
6610:doi
6570:doi
6531:doi
6491:doi
6427:doi
6329:doi
6290:doi
6259:doi
6228:doi
6195:doi
5862:128
5659:271
5585:doi
5507:doi
5435:doi
5299:doi
5261:doi
4913:NPR
4888:doi
4786:doi
4486:CHI
4342:PMC
4332:doi
4320:110
3978:PMC
3970:doi
3750:PMC
3732:doi
3685:doi
3623:PMC
3613:doi
3601:110
3239:doi
2948:"4
2914:doi
2910:154
2830:doi
2783:doi
2736:doi
2648:doi
2341:Tor
2337:I2P
2296:PGP
2197:An
2028:.
1750:or
835:or
815:or
545:GPS
464:'s
454:'s
165:or
47:'s
9297::
7834:,
7662:–
7641:,
7605:.
7597:.
7587:.
7575:;
7440:.
7414:.
7402:.
7398:.
7386:^
7368:.
7362:.
7338:.
7314:.
7289:.
7278:^
7261:.
7237:.
7212:.
7187:.
7162:.
7137:.
7078:^
7060:.
7056:.
7033:.
7025:.
7013:57
7011:.
7007:.
6981:^
6967:.
6957:48
6955:.
6949:.
6916:^
6902:.
6894:.
6884:25
6882:.
6878:.
6855:.
6841:.
6837:.
6814:.
6806:.
6796:10
6794:.
6790:.
6765:33
6763:.
6759:.
6737:,
6727:,
6707:^
6694:,
6684:,
6647:.
6624:.
6616:.
6606:37
6604:.
6592:^
6578:.
6566:41
6564:.
6560:.
6537:.
6527:64
6525:.
6513:^
6499:.
6487:34
6485:.
6481:.
6469:^
6433:.
6423:10
6421:.
6417:.
6351:.
6343:.
6335:.
6325:14
6323:.
6319:.
6296:.
6286:77
6284:.
6280:.
6255:67
6253:.
6249:.
6224:45
6222:.
6218:.
6191:19
6189:.
6185:.
6159:.
6113:^
5996:71
5994:.
5910:.
5899:^
5860:.
5856:.
5826:.
5795:^
5775:^
5734:^
5712:^
5692:^
5677:^
5661:.
5591:.
5540:.
5536:.
5513:.
5503:75
5501:.
5485:^
5463:^
5449:.
5441:.
5431:30
5429:.
5425:.
5400:.
5368:;
5305:.
5295:89
5293:.
5267:.
5257:17
5255:.
5251:.
5234:46
5232:.
5226:.
5195:^
5165:^
5085:.
5061:.
5036:.
5012:.
4936:.
4911:.
4884:84
4882:.
4878:.
4852:.
4794:.
4784:.
4772:.
4768:.
4743:.
4719:.
4680:.
4610:^
4594:.
4554:.
4502:.
4484:.
4350:.
4340:.
4330:.
4318:.
4314:.
4293:.
4268:.
4244:.
4219:.
4190:.
4186:.
4174:^
4158:.
4123:^
4113:.
4107:.
4088:.
4082:.
4044:.
4019:.
3986:.
3976:.
3968:.
3956:.
3952:.
3871:.
3865:.
3812:.
3808:.
3758:.
3748:.
3740:.
3726:.
3722:.
3699:.
3691:.
3681:29
3679:.
3653:.
3631:.
3621:.
3611:.
3599:.
3595:.
3547:.
3522:.
3497:.
3469:.
3465:.
3439:.
3411:.
3390:.
3370:.
3292:.
3279:^
3245:.
3233:.
3214:.
3189:.
3165:.
3141:.
3117:.
3092:.
3079:^
3062:.
3025:^
3009:.
2984:.
2928:.
2920:.
2908:.
2904:.
2892:^
2878:.
2844:.
2836:.
2826:31
2824:.
2820:.
2797:.
2789:.
2779:45
2777:.
2773:.
2750:.
2742:.
2732:31
2730:.
2726:.
2701:.
2654:.
2646:.
2642:.
2614:,
2580:;
2576:;
2422:.
2318:.
2262:.
1802:.
1774:,
1766:,
1762:,
1551:.
1397:;
1393:;
1389:;
1321:.
1208:.
1119:,
1115:,
1055:.
839:.
793:,
611:,
607:,
517:,
297:.
143:.
128:-/
125:aɪ
109::
107:US
103:,
96:iː
68::
66:UK
8709:e
8702:t
8695:v
8286:e
8279:t
8272:v
7692:e
7685:t
7678:v
7613:.
7583::
7516:.
7495:.
7474:(
7453:.
7422:.
7410::
7380:.
7348:.
7324:.
7299:.
7272:.
7247:.
7222:.
7197:.
7172:.
7148:.
7072:.
7068::
7062:7
7041:.
7019::
6975:.
6963::
6910:.
6890::
6863:.
6849::
6843:3
6822:.
6802::
6775:.
6771::
6723::
6680::
6657:.
6632:.
6612::
6586:.
6572::
6545:.
6533::
6507:.
6493::
6441:.
6429::
6399:.
6359:.
6331::
6304:.
6292::
6265:.
6261::
6234:.
6230::
6203:.
6197::
6170:.
6050:.
6023:.
5961:.
5940:.
5893:.
5838:.
5828:4
5754:.
5706:.
5671:.
5601:.
5587::
5542:6
5521:.
5509::
5457:.
5437::
5410:.
5386:.
5341:.
5313:.
5301::
5275:.
5263::
5159:.
5134:.
5100:.
5071:.
5046:.
5022:.
4946:.
4921:.
4896:.
4890::
4863:.
4838:.
4802:.
4788::
4780::
4753:.
4729:.
4690:.
4666:.
4604:.
4564:.
4540:.
4527:.
4488:.
4469:.
4437:.
4416:.
4358:.
4334::
4326::
4279:.
4230:.
4204:.
4168:.
4144:.
4054:.
4029:.
3994:.
3972::
3964::
3958:3
3937:.
3916:.
3851:.
3824:.
3793:.
3766:.
3734::
3728:8
3707:.
3687::
3664:.
3639:.
3615::
3607::
3557:.
3533:.
3508:.
3483:.
3450:.
3425:.
3396:.
3376:.
3356:.
3329:.
3255:.
3241::
3200:.
3175:.
3151:.
3127:.
3103:.
3073:.
3019:.
2994:.
2961:.
2936:.
2916::
2886:.
2852:.
2832::
2805:.
2785::
2758:.
2738::
2711:.
2662:.
2650::
2600:.
2558:.
2035:)
2031:(
1456:.
1014:)
1008:(
1003:)
999:(
995:.
977:.
420:,
245:)
239:(
234:)
230:(
216:.
122:r
119:p
116:ˈ
113:/
99:/
93:s
90:ə
87:v
84:ɪ
81:r
78:p
75:ˈ
72:/
62:(
37:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.