메뉴 건너뛰기




Volumn 101, Issue 1, 2013, Pages 1-50

The case for online obscurity

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84874925899     PISSN: 00081221     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (63)

References (199)
  • 1
    • 37249018138 scopus 로고    scopus 로고
    • Why youth & hearts social network sites: The role of networked publics in teenage social life
    • David Buckingham ed.
    • See, e.g., danah boyd, Why Youth & hearts Social Network Sites: The Role of Networked Publics in Teenage Social Life, in YOUTH, IDENTITY, AND DIGITAL MEDIA 119, 133 (David Buckingham ed., 2008), available at http://www.mitpressjournals.org/doi/pdf/10.1162/dmal.9780262524834.119 ("Most people believe that security through obscurity will serve as a functional barrier online. For the most part, this is a reasonable assumption.");
    • (2008) Youth, Identity, and Digital Media , vol.119 , pp. 133
  • 2
    • 77955341233 scopus 로고    scopus 로고
    • Fulfilling government 2.0's promise with robust privacy protections
    • 835
    • Danielle Keats Citron, Fulfilling Government 2.0's Promise with Robust Privacy Protections, 78 GEO. WASH. L. REV. 822, 835 (2010) ("People also have a sense that their social-network information will be kept private because they feel anonymous amidst the millions of social-network users.");
    • (2010) Geo. Wash. L. Rev. , vol.78 , pp. 822
    • Citron, D.K.1
  • 3
    • 77953552698 scopus 로고    scopus 로고
    • Privacy, free speech, and "Blurry-edged" social networks
    • 1317-18
    • Lauren Gelman, Privacy, Free Speech, and "Blurry-Edged" Social Networks, 50 B.C. L. REV. 1315, 1317-18 (2009);
    • (2009) B.C. L. Rev. , vol.50 , pp. 1315
    • Gelman, L.1
  • 4
    • 68949182898 scopus 로고    scopus 로고
    • Saving facebook
    • 1160-63
    • James Grimmelmann, Saving Facebook, 94 IOWA L. REV. 1137, 1160-63 (2009). This assertion is addressed in greater detail in Part II.
    • (2009) Iowa L. Rev. , vol.94 , pp. 1137
    • Grimmelmann, J.1
  • 5
    • 84874868130 scopus 로고
    • 560 N.E.2d 900 III. App. Ct
    • See, e.g., Miller v. Motorola, Inc., 560 N.E.2d 900 (III. App. Ct 1990);
    • (1990) Miller V. Motorola, Inc.
  • 6
    • 79953846914 scopus 로고
    • 257 N.W.2d 522 Mich.
    • Beaumont v. Brown, 257 N.W.2d 522 (Mich. 1977);
    • (1977) Beaumont V. Brown
  • 7
    • 84874870918 scopus 로고
    • 112 N.W.2d 862 Iowa
    • Yoder v. Smith, 112 N.W.2d 862 (Iowa 1962);
    • (1962) Yoder V. Smith
  • 8
    • 79953883814 scopus 로고
    • 299 S.W. 967 Ky.
    • Brents v. Morgan, 299 S.W. 967 (Ky. 1927).
    • (1927) Brents V. Morgan
  • 9
    • 84874895677 scopus 로고
    • 527 F.2d 1122 9th Cir.
    • See, e.g., Virgil v. Time, Inc., 527 F.2d 1122 (9th Cir. 1975);
    • (1975) Virgil V. Time, Inc.
  • 10
    • 84874875274 scopus 로고
    • 406 F. Supp. 858 W.D. Pa.
    • Neff v. Time, Inc., 406 F. Supp. 858 (W.D. Pa. 1976);
    • (1976) Neff V. Time, Inc.
  • 11
    • 79953839608 scopus 로고
    • 201 Cal. Rptr. 665 Cal. Ct. App.
    • Sipple v. Chronicle Publ'g Co., 201 Cal. Rptr. 665 (Cal. Ct. App. 1984).
    • (1984) Sipple V. Chronicle Publ'g Co.
  • 12
    • 72649089021 scopus 로고    scopus 로고
    • 543 U.S. 405
    • See, e.g., Illinois v. Caballes, 543 U.S. 405 (2005);
    • (2005) Illinois V. Caballes
  • 13
    • 72649092808 scopus 로고
    • 442 U.S. 735
    • Smith v. Maryland, 442 U.S. 735 (1979);
    • (1979) Smith V. Maryland
  • 16
    • 84874919591 scopus 로고    scopus 로고
    • A URL, or Uniform Resource Locator, describes "syntax and semantics of formalized information for location and access of resources via the Internet" Id For example, the web address http://yahoo.com is a URL that resolves to the Yahoo website.
  • 17
    • 0003259187 scopus 로고    scopus 로고
    • The deep web: Surfacing hidden value
    • See, e.g., Michael K, Bergman, The Deep Web: Surfacing Hidden Value, 7 J. ELECTRIC PUBLISHING, htrp://quod.lib.umich.edu/cgi/t/text/text-id?c=jep;view= text;rgn=main;idno=3336451.0007.104 (2001) ("Since they are missing the deep Web when they use such search engines, Internet searchers are therefore searching only 0.03%-or one in 3,000-of the pages available to them today.");
    • (2001) J. Electric Publishing , vol.7
    • Michael, K.B.1
  • 18
    • 0012036450 scopus 로고    scopus 로고
    • Reap what you sow: Harvesting the deep web
    • Norm Medeiros, Reap What You Sow: Harvesting the Deep Web, 18 OCLC SYS. & SERVS. 18 (2002);
    • (2002) Oclc Sys. & Servs. , vol.18 , pp. 18
    • Medeiros, N.1
  • 19
    • 21344453736 scopus 로고    scopus 로고
    • Indexing the invisible web: A survey
    • Yanbo Ru & Ellis Horowitz, Indexing the Invisible Web: A Survey, 29 ONUNE INFO. REV. 249 (2005);
    • (2005) Onune Info. Rev. , vol.29 , pp. 249
    • Ru, Y.1    Horowitz, E.2
  • 20
    • 84874830943 scopus 로고    scopus 로고
    • Data is gold - 91,000 terabytes of uncharted web: Welcome to the DarkSide
    • Apr. 11
    • Danny Devriendt, Data Is Gold - 91,000 Terabytes of Uncharted Web: Welcome to the DarkSide, PORTER NOVELLI BLOG (Apr. 11, 2011), http://blog.portemovelli.com/2011/04/11/data-is-gold-%E2%80%93-91000-terabytes- of-uncharted-web-welcome-to-the-dark-side/ ("The dark Web, or hidden Web is approximately 550 times bigger than the Web you experience daily.");
    • (2011) Porter Novelli Blog
    • Devriendt, D.1
  • 21
    • 84874827091 scopus 로고    scopus 로고
    • Dec. 19 12:00 PM
    • Russell Kay, Quickstudy: Deep Web, COMPUTERWORLD (Dec. 19, 2005, 12:00 PM), http://www.computerworld.com/s/article/107097/Deep-Web ("[M]ore than 500 times as much information as traditional search engines 'know about' is available in the deep Web.");
    • (2005) Quickstudy: Deep Web
    • Kay, R.1
  • 26
    • 0001028618 scopus 로고
    • Coevolution of neocortical size, group size and language in humans
    • See, e.g., R.I.M. Dunbar, Coevolution of Neocortical Size, Group Size and Language in Humans, 16 BEHAV. & BRAIN Sa. 681 (1993);
    • (1993) BEHAV. & BRAIN Sa. , vol.16 , pp. 681
    • Dunbar, R.I.M.1
  • 27
    • 34247790304 scopus 로고
    • Social networks, support cliques, and kinship
    • R.I.M. Dunbar & M. Spoors, Social Networks, Support Cliques, and Kinship, 6 HUM. NATURE 273 (1995).
    • (1995) Hum. Nature , vol.6 , pp. 273
    • Dunbar, R.I.M.1    Spoors, M.2
  • 28
  • 30
    • 0036211735 scopus 로고    scopus 로고
    • Can you see the real me? Activation and expression of the "True self' on the internet
    • 44-45
    • John A. Bargh et al., Can You See the Real Me? Activation and Expression of the "True Self' on the Internet, 58 J. SOC. ISSUES 33, 44-45 (2002).
    • (2002) J. Soc. Issues , vol.58 , pp. 33
    • Bargh, J.A.1
  • 31
    • 80052649771 scopus 로고    scopus 로고
    • There is some debate over measuring the size of human social groups, but even those debating measurement methodology agree that the average number of people to whom one is truly close-and nonobscure-to remains objectively small. See LEE RAINIE & BARRY WELLMAN, NETWORKED: THE NEW SOCIAL OPERATING SYSTEM 117-34 (2012) (discussing measurement of personal networks, effects of online interaction on personal networks);
    • (2012) NETWORKED: The NEW SOCIAL OPERATING SYSTEM , pp. 117-34
    • Lee, R.1    Wellman, B.2
  • 32
    • 33746507265 scopus 로고    scopus 로고
    • Social isolation in America: Changes in core discussion networks over two decades
    • 360
    • Miller McPherson et al., Social Isolation in America: Changes in Core Discussion Networks over Two Decades, 71 AM. SOC. REV. 353, 360 (2006) (establishing and updating core discussion network size). Notable exceptions to this claim are celebrities or other highly identifiable individuals.
    • (2006) Am. Soc. Rev. , vol.71 , pp. 353
    • McPherson, M.1
  • 35
    • 0027345608 scopus 로고
    • Social foundations of cognition
    • 592
    • John M. Levine et al., Social Foundations of Cognition, 44 ANN. REV. PSYCHOL. 585, 592 (1993) (explaining how some observers expect certain individuals to behave a certain way based on the "social position" the observer perceives the individual to be in).
    • (1993) Ann. Rev. Psychol. , vol.44 , pp. 585
    • Levine, J.M.1
  • 36
    • 57849148623 scopus 로고    scopus 로고
    • Social identification and interpersonal communication in computer-mediated communication: What you do versus who you are in virtual groups
    • 64-65
    • In off-line settings, individuals may seek personal information to explain observed deviant behavior, such as finding out the backstory for why an unidentified neighbor did something rude. In online settings, the role of deviant behavior has been shown to interact with group membership status. See Zuoming Wang et al., Social Identification and Interpersonal Communication in Computer-Mediated Communication: What You Do Versus Who You Are in Virtual Groups, 35 HUM. COMM. RES. 59, 64-65 (2009).
    • (2009) Hum. Comm. Res. , vol.35 , pp. 59
    • Wang, Z.1
  • 38
    • 84926273063 scopus 로고
    • Felicity's condition
    • 51
    • Of this particular challenge, Goffman writes, Whatever else, our activity must be addressed to the other's mind, that is, to the other's capacity to read our words and actions for evidence of our feelings, thoughts, and intent This confines what we say and do, but it also allows us to bring to bear all of the world to which the other can catch allusions. Erving Goffman, Felicity's Condition, 89 AM. J. SOC. 1, 51(1983).
    • (1983) Am. J. Soc. , vol.89 , pp. 1
    • Goffman, E.1
  • 42
    • 45649084983 scopus 로고    scopus 로고
    • Self-disclosure, privacy and the internet
    • Adam N. Joinson et al. eds.
    • See, e.g., Adam N. Joinson & Carina B. Paine, Self-Disclosure, Privacy and the Internet, in THE OXFORD HANDBOOK OF INTERNET PSYCHOLOGY 237, 237-38 (Adam N. Joinson et al. eds., 2007);
    • (2007) The Oxford Handbook of Internet Psychology , vol.237 , pp. 237-38
    • Joinson, A.N.1    Paine, C.B.2
  • 43
    • 0033244304 scopus 로고    scopus 로고
    • Assessing anonymous communication on the internet: Policy deliberations
    • 82-84
    • Rob Kling et al., Assessing Anonymous Communication on the Internet: Policy Deliberations, 15 INFO. SOC'Y 79, 82-84 (1999);
    • (1999) Info. Soc'Y , vol.15 , pp. 79
    • Kling, R.1
  • 44
    • 70549095305 scopus 로고    scopus 로고
    • Sharing private information online: The mediator effect of social exchange
    • Su-Yu Zeng et al., Sharing Private Information Online: The Mediator Effect of Social Exchange, in PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE 231 (2009), available at http://dl.acm.org/ft-gateway. cfm?id=1593290&md=652035&dwn=1&CFID=194561741&CFTOKEN=39062883.
    • (2009) PROCEEDINGS of the 11TH INTERNATIONAL CONFERENCE on ELECTRONIC COMMERCE , vol.231
    • Zeng, S.-Y.1
  • 47
    • 77954081235 scopus 로고    scopus 로고
    • JOHN HORRIGAN, PEW INTERNET & AM. LIFE PROJECT, HOME BROADBAND ADOPTION 2009 (2009), available at http://www.pewintemet.org/Reports/2009/10- Home-Broadband-Adoption-2009.aspx. As these reports clearly indicate, use and nonuse of Internet resources is largely a function of socioeconomic and geographic factors. While it is likely that a certain portion of the population opts out of the Internet for privacy-related reasons, the proportion of individuals for whom this applies is so small it does not appear on nationally representative studies.
    • (2009) Pew Internet & AM. Life Project, Home Broadband Adoption 2009
    • Horrigan, J.1
  • 48
    • 84865809207 scopus 로고    scopus 로고
    • See, e.g., KATHRYN ZICKUHR & AARON SMITH, PEW INTERNET & AM. LIFE PROJECT, DIGITAL DIFFERENCES (2012), available at http://pewmternet.org/ Reports/2012/Digital-differences.aspx (noting that nonusers primary reasons involved lack of motivation, access to resources, or difficulty in use). We speculate that while use or nonuse of the Internet is poorly explained by privacy preferences, use and nonuse of certain applications may be better explained by privacy preference.
    • (2012) Pew Internet & Am. Life Project, Digital Differences
    • Zickuhr, K.1    Smith, A.2
  • 49
    • 78650870765 scopus 로고    scopus 로고
    • Beyond and below racial homophily: Erg models of a friendship network documented on facebook
    • 588-600
    • See RAINIE & WELLMAN, supra note 16, at 126-31; Andreas Wimmer & Kevin Lewis, Beyond and Below Racial Homophily: ERG Models of a Friendship Network Documented on Facebook, 116 AM. J. SOC, 583, 588-600 (explaining the theoretical bases for racial homogeneity in social networks).
    • Am. J. Soc , vol.116 , pp. 583
    • Wimmer, A.1    Lewis, K.2
  • 50
    • 10444223569 scopus 로고    scopus 로고
    • 1-15
    • The reinforcement of social structure can be broadly categorized into two frames. The first frame involves the replication of material and socioeconomic conditions and practices in online space, which is often conceived of as the digital divide. See, e.g., KAREN MOSSBERGER ET AL., VIRTUAL INEQUALITY: BEYOND THE DIGITAL DIVIDE, 1-15, 60-73 (2003);
    • (2003) Virtual Inequality: Beyond the Digital Divide , pp. 60-73
    • Mossberger, K.1
  • 51
    • 67649545122 scopus 로고    scopus 로고
    • Social interactions and the "Digital divide": Explaining variations in internet use
    • 277-94
    • Ritu Agarwal et al., Social Interactions and the "Digital Divide": Explaining Variations in Internet Use, 20 INFO. SYS. RES. 277, 277-94 (connecting internet use with peer behavior and social influence);
    • Info. Sys. Res. , vol.20 , pp. 277
    • Agarwal, R.1
  • 52
    • 76149139754 scopus 로고    scopus 로고
    • Digital na(t)ives? Variation in internet skills and uses among members of the "Net generation"
    • 108
    • Eszter Hargittai, Digital Na(t)ives? Variation in Internet Skills and Uses Among Members of the "Net Generation", 80 SOC. INQUIRY 92, 108 (2010) (concluding that differences in web-use skills correlate with socioeconomic, racial, and gender differences). The second frame is the replication of off-line network structures online; that is, the degree to which online and off-line networks overlap, inherently forcing individuals to fall into off-line social roles. See, e.g., RAINIE & WELLMAN, supra note 16, at 126-30 (discussing the "diminishing" gap between physical space and cyberspace); Wimmer & Lewis, supra note 32, at 588-600 (discussing the important role off-line social structure exerts on online network formation).
    • (2010) Soc. Inquiry , vol.80 , pp. 92
    • Hargittai, E.1
  • 53
    • 0033721503 scopus 로고    scopus 로고
    • Graph structure in the web
    • See, e.g., Andrei Broder et al., Graph Structure in the Web, 33 COMPUTER NETWORKS 309 (2000);
    • (2000) Computer Networks , vol.33 , pp. 309
    • Broder, A.1
  • 54
    • 4243148480 scopus 로고    scopus 로고
    • Authoritative sources in a hyperlinked environment
    • Jon M. Kleinberg, Authoritative Sources in a Hyperlinked Environment, 46 J. ACM 604 (1999).
    • (1999) J. ACM , vol.46 , pp. 604
    • Kleinberg, J.M.1
  • 55
    • 84890768200 scopus 로고    scopus 로고
    • Measuring user influence in twitter: The million follower fallacy
    • For an applied discussion of attention networks in Twitter, see Meeyoung Cha et al., Measuring User Influence in Twitter: The Million Follower Fallacy, in PROCEEDINGS OF THE 4TH INTERNATIONAL AAAI CONFERENCE ON WEBLOGS AND SOCIAL MEDIA 10 (2010), available at http://www.aaai.org/ocs/index.php/ICWSM/ICWSM10/ paper/view/1538/1826.
    • (2010) PROCEEDINGS of the 4TH INTERNATIONAL AAAI CONFERENCE on WEBLOGS and SOCIAL MEDIA , pp. 10
    • Cha, M.1
  • 57
    • 84874819731 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • See, e.g., BLOGGER, http://www.blogger.com/ (last visited Nov. 10, 2012);
  • 58
    • 84874843259 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • FACEBOOK, https://www.facebook.com/ (last visited Nov. 10, 2012);
  • 59
    • 84874894559 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • FOURSQUARE, https://foursquare.com/ (last visited Nov. 10, 2012);
  • 60
    • 84874888156 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • TWITTER, https://twitter.com/ (last visited Nov. 10, 2012);
  • 61
    • 84874825383 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • WORDPRESS.COM, http://wordpress.com/ (last visited Nov. 10, 2012).
  • 65
    • 45649083153 scopus 로고    scopus 로고
    • Identity construction on facebook: Digital empowerment in anchored relationships
    • 1818-19
    • Shanyang Zhao et al., Identity Construction on Facebook: Digital Empowerment in Anchored Relationships, 24 COMPUTERS HUM. BEHAV. 1816, 1818-19 (2008) (citations omitted).
    • (2008) Computers Hum. Behav. , vol.24 , pp. 1816
    • Zhao, S.1
  • 67
    • 34547160289 scopus 로고    scopus 로고
    • A facebook in the crowd: Social searching vs. Social browsing
    • Cliff Lampe et al., A Facebook in the Crowd: Social Searching vs. Social Browsing, in CSCW '06 PROCEEDINGS OF THE 2006 20TH ANNIVERSARY CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK 167 (2006), available at http://alacm.org/citation.cfm?id=1180901&bnc=1 (discussing the online network construction of college students). For a more general discussion of online-off-line overlaps, see, for example, RAINIE & WELLMAN, supra note 16, at 126-30.
    • (2006) CSCW '06 PROCEEDINGS of the 2006 20TH ANNIVERSARY CONFERENCE on COMPUTER SUPPORTED COOPERATIVE WORK , vol.167
    • Lampe, C.1
  • 71
    • 77950494574 scopus 로고    scopus 로고
    • All my people right here, right now: Management of group copresence on a social networking site
    • [hereinafter Lampinen et al., All My People]
    • Airi Lampinen et al., All My People Right Here, Right Now: Management of Group Copresence on a Social Networking Site, in GROUP '09: PROCEEDINGS OF THE ACM 2009 INTERNATIONAL CONFERENCE ON SUPPORTING GROUP WORK 281 (2009) [hereinafter Lampinen et al., All My People], available at http://dl.acm.org/ citation.cfm?id=1531717;
    • (2009) GROUP '09: Proceedings of the ACM 2009 INTERNATIONAL CONFERENCE on SUPPORTING GROUP WORK , pp. 281
    • Lampinen, A.1
  • 73
    • 46149119696 scopus 로고    scopus 로고
    • Online privacy control via anonymity and pseudonym: Cross-cultural implications
    • See, e.g., Houn-Gee Chen et al., Online Privacy Control Via Anonymity and Pseudonym: Cross-cultural Implications, 27 BEHAV. & INFO. TECH. 229 (2008).
    • (2008) Behav. & Info. Tech. , vol.27 , pp. 229
    • Chen, H.-G.1
  • 74
    • 4043132397 scopus 로고    scopus 로고
    • Protecting personal information online: A survey of user privacy concerns and control techniques
    • 87-88
    • Kuanchin Chen & Alan I. Rea, Jr., Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques, 44 J. COMPUTER INFO. SYS. 85, 87-88 (2004).
    • (2004) J. Computer Info. Sys. , vol.44 , pp. 85
    • Chen, K.1    Rea Jr., A.I.2
  • 78
    • 68949182788 scopus 로고    scopus 로고
    • Feb. 12 at 24-29, 102-03
    • See, e.g., Emily Nussbaum, Say Everything, N.Y. MAG., Feb. 12, 2007, at 24-29, 102-03, available at http://nymag.com/news/features/27341/.
    • (2007) Say Everything
    • Nussbaum, E.1
  • 81
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • Helen Nissenbaum, Privacy as Contextual Integrity, 79 WASH. L. REV. 119 (2004) [hereinafter Nissenbaum, Privacy as Contextual Integrity];
    • (2004) Wash. L. Rev. , vol.79 , pp. 119
    • Nissenbaum, H.1
  • 82
    • 0032282474 scopus 로고    scopus 로고
    • Protecting privacy in an information age: The problem of privacy in public
    • Helen Nissenbaum, Protecting Privacy in an Information Age: The Problem of Privacy in Public, 17 LAW & PHIL. 559 (1998) [hereinafter Nissenbaum, Protecting Privacy in an Information Age];
    • (1998) Law & Phil. , vol.17 , pp. 559
    • Nissenbaum, H.1
  • 83
    • 0036045758 scopus 로고    scopus 로고
    • Conceptualizing privacy
    • Daniel J. Solove, Conceptualizing Privacy, 90 CALIF. L. REV. 1087 (2002) [hereinafter Solove, Conceptualizing Privacy];
    • (2002) Calif. L. Rev. , vol.90 , pp. 1087
    • Solove, D.J.1
  • 84
    • 25144444373 scopus 로고    scopus 로고
    • A social networks theory of privacy
    • Lior Jacob Strahilevitz, A Social Networks Theory of Privacy, 72 U. CHI. L. REV. 919 (2005).
    • (2005) U. Chi. L. Rev. , vol.72 , pp. 919
    • Strahilevitz, L.J.1
  • 85
    • 84874827362 scopus 로고    scopus 로고
    • United states v. Gines-perez
    • 225 D.P.R.
    • See, e.g., United States v. Gines-Perez, 214 F. Supp. 2d 205, 225 (D.P.R. 2002), rev'd on other grounds, 90 F. App'x 3 (1st Cir. 2004);
    • (2002) F. Supp. 2d , vol.214 , pp. 205
  • 86
    • 84874822242 scopus 로고    scopus 로고
    • 767 N.W.2d 34, 44 Minn. Ct App.
    • Yath v. Fairview Clinics, N.P., 767 N.W.2d 34, 44 (Minn. Ct App. 2009).
    • (2009) Yath V. Fairview Clinics, N.P.
  • 87
    • 34047274169 scopus 로고    scopus 로고
    • Access and aggregation: Public records, privacy, and the constitution
    • 1177
    • Daniel J. Solove, Access and Aggregation: Public Records, Privacy, and the Constitution, 86 MINN. L. REV. 1137, 1177 (2002) (noting that when privacy is equated with secrecy, "[i]nformation is categorized as either public or private.... Understood this way, information has a particular status; it can either be in one domain or another. The law often treats information in this black-and-white manner; either it is wholly private or wholly public").
    • (2002) Minn. L. Rev. , vol.86 , pp. 1137
    • Solove, D.J.1
  • 88
    • 84861987728 scopus 로고    scopus 로고
    • Relative privacy: What privacy advocates can learn from trade secret law
    • 694
    • Sharon K. Sandeen, Relative Privacy: What Privacy Advocates Can Learn from Trade Secret Law, 2006 MICH. ST. L. REV. 667, 694. Online obscurity has also appeared in the trade secret literature.
    • (2006) Mich. St. L. Rev. , pp. 667
    • Sandeen, S.K.1
  • 89
    • 84861968010 scopus 로고    scopus 로고
    • Saving trade secret disclosures on the internet through sequential preservation
    • 17-19
    • See, e.g., Elizabeth A. Rowe, Saving Trade Secret Disclosures on the Internet Through Sequential Preservation, 42 WAKE FOREST L. REV. 1, 17-19 (2007). Rowe asked the question of trade secret doctrine: "Does public mean public accessibility or public publication? Does the obscurity of the Web site matter, or are all Internet postings equal?... The precise measure of obscurity or transience required to protect the trade secret, however, is unsettled." Id.
    • (2007) Wake Forest L. Rev. , vol.42 , pp. 1
    • Rowe, E.A.1
  • 91
    • 0003311737 scopus 로고    scopus 로고
    • Privacy versus the first amendment: A skeptical approach
    • See, e.g., Solveig Singleton, Privacy Versus the First Amendment: A Skeptical Approach, 11 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 97 (2000);
    • (2000) Fordham Intell. Prop. Media & Ent. L.J. , vol.11 , pp. 97
    • Singleton, S.1
  • 92
    • 0347315060 scopus 로고    scopus 로고
    • Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you
    • Eugene Volokh, Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About You, 52 STAn. L. REV. 1049 (2000);
    • (2000) STAn. L. Rev. , vol.52 , pp. 1049
    • Volokh, E.1
  • 93
    • 77952990411 scopus 로고
    • Requiem for a heavyweight: A farewell to warren and brandeis's privacy tort
    • Diane L. Zimmerman, Requiem for a Heavyweight: A Farewell to Warren and Brandeis's Privacy Tort, 68 CORNELL L. REV. 291 (1983).
    • (1983) Cornell L. Rev. , vol.68 , pp. 291
    • Zimmerman, D.L.1
  • 94
    • 84872423773 scopus 로고    scopus 로고
    • The mythical right to obscurity: A pragmatic defense of no privacy in public
    • 551
    • Heidi Reamer Anderson, The Mythical Right to Obscurity: A Pragmatic Defense of No Privacy in Public, 7I/S: J.L. & POL'Y FOR INFO. SOC'Y 543, 551 (2012).
    • (2012) S: J.L. & POL'Y for INFO. SOC'Y , vol.71 , pp. 543
    • Anderson, H.R.1
  • 95
    • 79955392932 scopus 로고    scopus 로고
    • Protecting privacy in the digital age
    • 301
    • See, e.g., Will Thomas De Vries, Protecting Privacy in the Digital Age, 18 BERKELEY TECH. L.J. 283, 301 (2003) ("Digital technology is turning the asset of open government into a privacy nightmare. In the analog age, public records were all available, but languished in 'practical obscurity' in courthouse basements or isolated file cabinets.");
    • (2003) Berkeley Tech. L.J. , vol.18 , pp. 283
    • De Vries, W.T.1
  • 96
    • 84874838270 scopus 로고    scopus 로고
    • Litigation, privacy and the electronic age
    • ¶ 6
    • Lewis A. Kaplan, Litigation, Privacy and the Electronic Age, 4 YALE SYMP. ON L. & TECH 1, ¶ 6 (2001) ("This practical obscurity of information generated in all but the most exceptional cases has been eroded by technological advances.");
    • (2001) Yale Symp. on L. & Tech , vol.4 , pp. 1
    • Kaplan, L.A.1
  • 97
    • 67651068264 scopus 로고    scopus 로고
    • Privacy, accountability, and the cooperating defendant: Towards a new role for internet access to court records
    • Caren Myers Morrison, Privacy, Accountability, and the Cooperating Defendant: Towards a New Role for Internet Access to Court Records, 62 VAND. L. REV. 921 (2009);
    • (2009) Vand. L. Rev. , vol.62 , pp. 921
    • Morrison, C.M.1
  • 98
    • 78649619118 scopus 로고    scopus 로고
    • Judicial information management in an electronic age: Old standards, new challenges
    • Peter A. Winn, Judicial Information Management in an Electronic Age: Old Standards, New Challenges, 3 FED. CTS. L. REV. 135 (2009);
    • (2009) Fed. Cts. L. Rev. , vol.3 , pp. 135
    • Winn, P.A.1
  • 99
    • 73249153322 scopus 로고    scopus 로고
    • Note, public availability or practical obscurity: The debate over public access to court records on the internet
    • Arminda Bradford Bepko, Note, Public Availability or Practical Obscurity: The Debate over Public Access to Court Records on the Internet, 49 n. Y.L. SCH. L. REV. 967 (2005);
    • (2005) N. Y.L. Sch. L. Rev. , vol.49 , pp. 967
    • Bepko, A.B.1
  • 100
    • 34047270800 scopus 로고    scopus 로고
    • Note, are public records too public? Why personally identifying information should be removed from both online and print versions of court documents
    • Kristen M. Blankley, Note, Are Public Records Too Public? Why Personally Identifying Information Should Be Removed from Both Online and Print Versions of Court Documents, 65 OHIO ST. L.J. 413 (2004).
    • (2004) Ohio St. L.J. , vol.65 , pp. 413
    • Blankley, K.M.1
  • 101
    • 77957594024 scopus 로고    scopus 로고
    • Broken promises of privacy: Responding to the surprising failure of anonymization
    • 1724
    • Computer security through obscurity involves a slightly different set of concerns than user privacy. Obscurity is not favored as a computer security technique. See, e.g., Paul Ohm, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA. L. REV. 1701, 1724 (2010) ("Not only do reidentification scientists spurn security through obscurity, but they often assume that the adversary possesses the exact piece of data-if it exists-needed to unlock anonymized identities, in order to design responses that protect identity even in this worst case.");
    • (2010) Ucla. L. Rev. , vol.57 , pp. 1701
    • Ohm, P.1
  • 102
    • 77749333197 scopus 로고    scopus 로고
    • A theory of disclosure for security and competitive reasons: Open source, proprietary software, and government systems
    • 1350-51
    • cf. Peter P. Swire, A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems, 42 HOUS. L. REV. 1333, 1350-51 (2006) ('"Obscurity is camouflage, security is armor.' Either can be useful, depending on the circumstances. They can also be useful when working together, much as tanks are often camouflaged").
    • (2006) Hous. L. Rev. , vol.42 , pp. 1333
    • Swire, P.P.1
  • 103
    • 67749135663 scopus 로고    scopus 로고
    • Note, defogging the cloud: Applying fourth amendment principles to evolving privacy expectations in cloud computing
    • A few have advocated online obscurity in the context of governmental searches. See, e.g., David A. Couillard, Note, Defogging the Cloud: Applying Fourth Amendment Principles to Evolving Privacy Expectations in Cloud Computing, 93 MINn. L. REV. 2205 (2009). Couillard also argued for a recognition of online obscurity, stating: Courts should... acknowledge the legitimacy of virtual concealment efforts-encryption, password protection, and the practical obscurity of unlisted links-as means of opacity in the cloud context Under this rule, courts would make a case-by-case determination as to whether a user's reliance upon a password, encryption, or obscurity was a reasonable effort to conceal in a given situation. It is not a burden for law enforcement to determine whether a password is necessary to access a website, at which point it would need a warrant prior to accessing the account Conversely, in the unlisted-link context, if an unlisted address appears on a public website as a hyperlink, law enforcement should be given discretion to treat such a virtual container as in plain view. Id. at 2236;
    • (2009) MINn. L. Rev. , vol.93 , pp. 2205
    • Couillard, D.A.1
  • 104
    • 79959627389 scopus 로고    scopus 로고
    • You better watch out, you better not frown, new video surveillance techniques are already in town (and other public spaces)
    • 506
    • see also Carla Scherr, You Better Watch Out, You Better Not Frown, New Video Surveillance Techniques Are Already in Town (and Other Public Spaces), 3 I/S: J.L. & POL'Y FOR INFO. SOC'Y 499, 506 (2008) ("The concept of 'practical obscurity' applies to public information that is usually outside the public consciousness because it is contained in a large number of individual pieces that are practically impossible to accumulate and organize, or because it is impossible to find, for example a paper document stored in the dusty basement of the local courthouse or in an infinitely large government warehouse.");
    • (2008) I/S: J.L. & POL'Y for INFO. SOC'Y , vol.3 , pp. 499
    • Scherr, C.1
  • 105
    • 37249019175 scopus 로고    scopus 로고
    • Comment, the fourth amendment and privacy issues on the "New" internet: Facebook.com and MySpace.com
    • 108
    • Matthew J. Hodge, Comment, The Fourth Amendment and Privacy Issues on the "New" Internet: Facebook.com and MySpace.com, 31 S. ILL. U. L.J. 95, 108 (2006) ("[A] user could only try to argue that a MySpace profile is not public knowledge, and that it is so obscure as to force the police to go searching for the profile. This obscurity... could be argued to deem some expectation of a private area.").
    • (2006) S. Ill. U. L.J. , vol.31 , pp. 95
    • Hodge, M.J.1
  • 106
    • 32844455310 scopus 로고    scopus 로고
    • Prioritizing privacy: A constitutional response to the internet
    • 1100-01
    • A number of scholars have argued that the traditional notion of practical obscurity, which relied on off-line impediments to discovery, no longer exists in a digital world. See, e.g., Elbert Lin, Prioritizing Privacy: A Constitutional Response to the Internet, 17 BERKELEY TECH. L.J. 1085, 1100-01 (2002) ("[W]hile the scattering of information throughout numerous computer databases had preserved some practical obscurity, the Internet has all but eliminated those remnants of isolation. ");
    • (2002) Berkeley Tech. L.J. , vol.17 , pp. 1085
    • Lin, E.1
  • 107
    • 78751541477 scopus 로고    scopus 로고
    • Mapping online privacy
    • 501
    • Jacqueline D. Lipton, Mapping Online Privacy, 104 Nw. U. L. REV. 477, 501 (2010) ("While before there was a fair amount of practical obscurity of information gathered in a public place, today the potential for immediate global dissemination of that information is unprecedented. Once information is available online, it is impossible to put the genie back in the bottle.");
    • (2010) Nw. U. L. Rev. , vol.104 , pp. 477
    • Lipton, J.D.1
  • 108
    • 77954713583 scopus 로고    scopus 로고
    • What google knows: Privacy and internet search engines
    • 1440
    • Omar Tene, What Google Knows: Privacy and Internet Search Engines, 2008 UTAH L. REV. 1433, 1440 ("Before... search engines, we enjoyed a degree of 'practical obscurity'... (Information] was protected de facto from all but skilled investigators or highly motivated researchers, due to the practical difficulty and costs involved in uncovering and compiling the data. Today such information has become available instantly and free of charge through search engines...").
    • (2008) Utah L. Rev. , pp. 1433
    • Tene, O.1
  • 109
    • 84874907619 scopus 로고    scopus 로고
    • 401 B.R. 295 Bankr. E.D. Tenn.
    • See, e.g., In re French v. Am. Gen. Fin. Servs., 401 B.R. 295 (Bankr. E.D. Tenn. 2009);
    • (2009) French V. Am. Gen. Fin. Servs.
  • 112
    • 84874928386 scopus 로고    scopus 로고
    • 898 n. E.2d 67 Ohio Ct. App.
    • Lambert v. Hartmann, 898 n. E.2d 67 (Ohio Ct. App. 2008).
    • (2008) Lambert V. Hartmann
  • 113
    • 20444503560 scopus 로고
    • U.S. Dep't of justice v. Reporters comm. for freedom of press
    • 764
    • Id. (citing U.S. Dep't of Justice v. Reporters Comm. for Freedom of Press, 489 U.S. 749, 764(1989)).
    • (1989) U.S. , vol.489 , pp. 749
  • 115
    • 84874822778 scopus 로고    scopus 로고
    • 767 n. W.2d 34, 44 Minn. Ct. App.
    • Yath v. Fairview Clinics, 767 n. W.2d 34, 44 (Minn. Ct. App. 2009).
    • (2009) Yath V. Fairview Clinics
  • 117
    • 84856414178 scopus 로고    scopus 로고
    • U. CHI. LEGAL F. 65
    • See Jonathan Zittrain, Privacy 2.0, 2008 U. CHI. LEGAL F. 65.
    • (2008) Privacy 2.0
    • Zittrain, J.1
  • 118
    • 84874874770 scopus 로고    scopus 로고
    • 362 F. App'x 273 3d Cir.
    • See, e.g., Boring v. Google, Inc., 362 F. App'x 273 (3d Cir. 2010);
    • (2010) Boring V. Google, Inc.
  • 119
    • 77951971529 scopus 로고    scopus 로고
    • 255 F.3d 325, 333 6th Cir.
    • Guest v. Leis, 255 F.3d 325, 333 (6th Cir. 2001) ("Users would logically lack a legitimate expectation of privacy in the materials intended for publication or public posting.");
    • (2001) Guest V. Leis
  • 120
    • 84874903483 scopus 로고    scopus 로고
    • 565 F. Supp. 2d 184 D. Me.
    • Sandler v. Calcagni, 565 F. Supp. 2d 184 (D. Me. 2008);
    • (2008) Sandler V. Calcagni
  • 121
    • 84874864924 scopus 로고    scopus 로고
    • 497 F. Supp. 2d 117 D. Mass.
    • United States v. D'Andrea, 497 F. Supp. 2d 117 (D. Mass. 2007);
    • (2007) United States V. D'Andrea
  • 123
  • 124
    • 84867742889 scopus 로고    scopus 로고
    • 91 Cal. Rptr. 3d 858, 862-63 Ct. App.
    • Moreno v. Hanford Sentinel, Inc., 91 Cal. Rptr. 3d 858, 862-63 (Ct. App. 2009);
    • (2009) Moreno V. Hanford Sentinel, Inc.
  • 125
    • 84874822778 scopus 로고    scopus 로고
    • 767 n. W.2d 34 Minn. Ct App.
    • Yath v. Fairview Clinics, 767 n. W.2d 34 (Minn. Ct App. 2009);
    • (2009) Yath V. Fairview Clinics
  • 126
    • 77950509278 scopus 로고    scopus 로고
    • No. 04-08-00132, 2007 WL 1437235 n. J. Super. Ct App. Div. May 17
    • State v. Birchfield, No. 04-08-00132, 2007 WL 1437235 (n. J. Super. Ct App. Div. May 17, 2007).
    • (2007) State V. Birchfield
  • 127
    • 84874924040 scopus 로고
    • Stereotypification of the fourth amendment's public/private distinction: An opportunity for clarity
    • 1196, 1206-11
    • Id. at 225. The "reasonable expectation of privacy" test is a complex and often maligned doctrine requiring analysis beyond the scope of this Article. It is sufficient for the purposes of this Article to acknowledge that courts generally hold that individuals do not have a reasonable expectation of privacy in "public" information for Fourth Amendment purposes. See Donald R.C. Pongrace, Stereotypification of the Fourth Amendment's Public/Private Distinction: An Opportunity for Clarity, 34 AM. U. L. REV. 1191, 1196, 1206-11 (1985).
    • (1985) Am. U. L. Rev. , vol.34 , pp. 1191
    • Pongrace, D.R.C.1
  • 128
    • 2242421636 scopus 로고
    • The fourth amendment and the "Legitimate expectation of privacy"
    • For more information, see, for example, Gerald G. Ashdown, The Fourth Amendment and the "Legitimate Expectation of Privacy", 34 VAND. L. REV. 1289 (1981);
    • (1981) Vand. L. Rev. , vol.34 , pp. 1289
    • Ashdown, G.G.1
  • 129
    • 0036814641 scopus 로고    scopus 로고
    • What is a search? Two conceptual flaws in fourth amendment doctrine and some hints of a remedy
    • Sherry F. Colb, What Is a Search? Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy, 55 STAn. L. REV. 119 (2002);
    • (2002) STAn. L. Rev. , vol.55 , pp. 119
    • Colb, S.F.1
  • 130
    • 38849106262 scopus 로고    scopus 로고
    • Four models of fourth amendment protection
    • Orin S. Kerr, Four Models of Fourth Amendment Protection, 60 STAn. L. REV. 503 (2007);
    • (2007) STAn. L. Rev. , vol.60 , pp. 503
    • Kerr, O.S.1
  • 131
    • 80955134927 scopus 로고    scopus 로고
    • Fourth amendment pragmatism
    • Daniel J. Solove, Fourth Amendment Pragmatism, 51 B.C. L. REV. 1511 (2010);
    • (2010) B.C. L. Rev. , vol.51 , pp. 1511
    • Solove, D.J.1
  • 132
    • 75949125883 scopus 로고
    • Defining the "reasonable expectation of privacy": An emerging tripartite analysis
    • Richard G. Wilkins, Defining the "Reasonable Expectation of Privacy": An Emerging Tripartite Analysis, 40 VAND. L. REV. 1077 (1987).
    • (1987) Vand. L. Rev. , vol.40 , pp. 1077
    • Wilkins, R.G.1
  • 133
    • 84874828491 scopus 로고    scopus 로고
    • 413 F. Supp. 2d 1136, 1145 S.D. Cal.
    • However, a few courts have looked beyond passwords. See Four Navy Seals v. Associated Press, 413 F. Supp. 2d 1136, 1145 (S.D. Cal. 2005),
    • (2005) Four Navy Seals V. Associated Press
  • 134
    • 79960519836 scopus 로고    scopus 로고
    • 757 A.2d 412, 425 Pa. Commw. Ct
    • J.S. v. Bethlehem Area School District, 757 A.2d 412, 425 (Pa. Commw. Ct 2000), for a discussion on search visibility.
    • (2000) J.S. V. Bethlehem Area School District
  • 135
    • 84866419355 scopus 로고    scopus 로고
    • 214 F. Supp. 2d 205, 225 D.P.R.
    • United States v. Gines-Perez, 214 F. Supp. 2d 205, 225 (D.P.R. 2002) (emphasis in original).
    • (2002) United States V. Gines-Perez
  • 136
    • 84455201030 scopus 로고    scopus 로고
    • *4-5 n. D. Fla. Mar. 11
    • *4-5 (n. D. Fla. Mar. 11, 2010) (citing United States v. King, 509 F.3d 1338 (11th Cir. 2007) (finding that the accidental sharing of files over a computer network and thumb drive left in a common use computer destroyed a reasonable expectation of privacy));
    • (2010) United States V. Durdley
  • 137
    • 84859626217 scopus 로고    scopus 로고
    • *3 D. Ariz. Apr. 14
    • *3 (D. Ariz. Apr. 14, 2006) ("[I]t is undisputed that the share[d] file is publically available, therefore [the counterclaimant] cannot show that the Recording Companies intruded upon her private affairs [by accessing the file-sharing folder on her computer].").
    • (2006) Interscope Records V. Duty
  • 138
  • 139
    • 84874928411 scopus 로고    scopus 로고
    • Jan. 11 4:11 PM
    • 18 U.S.C. § 2710 (2006). It should be noted that the Video Privacy Protection Act Amendments Act of 2012, Pub. L. No. 112-258, 126 Stat 2414 (2013), arguably weakened the statute's privacy protections by allowing video tape service providers to use advance consent obtained over the Internet to justify the disclosure of consumers' personally identifiable information. See, e.g., Chloe Albanesius, Obama Signs Bill That Lets You Share Netflix Activity on Facebook, PCMAG.COM (Jan. 11, 2013, 4:11 PM), http://www.pcmag.com/article2/0, 2817,2414206,00.asp;
    • (2013) Obama Signs Bill that Lets You Share Netflix Activity on Facebook
    • Albanesius, C.1
  • 144
    • 84874916439 scopus 로고    scopus 로고
    • Pineda and the law of the jungle
    • Mar. 8
    • cf. Chris Hoofhagle, Pineda and the Law of the Jungle, TECHNOLOGY-ACADEMICS-POLICY (TAP) (Mar. 8, 2011), http://www.techpolicy.com/ PinedaLaw-of-Jungle-Hoofhagle.aspx (arguing that the Pineda decision restrains "commercial actors that have no respect whatsoever for consumer preferences" from collecting personal information).
    • (2011) Technology-Academics-Policy (TAP)
    • Hoofhagle, C.1
  • 145
    • 0036622716 scopus 로고    scopus 로고
    • The public interest be damned: Lower court treatment of the reporters committee "central purpose" reformulation
    • 1024
    • See, e.g., Martin E. Halstuk & Charles n. Davis, The Public Interest Be Damned: Lower Court Treatment of the Reporters Committee "Central Purpose" Reformulation, 54 ADMIn. L. REV. 983, 1024 (2002) ("[T]he Reporters Committee 'central purpose' definition and theory of 'practical obscurity' are judicial inventions aimed at ill-defined concerns...").
    • (2002) ADMIn. L. Rev. , vol.54 , pp. 983
    • Halstuk, M.E.1    Davis, C.N.2
  • 146
    • 84863553709 scopus 로고    scopus 로고
    • The Arkansas proposal on access to court records: Upgrading the common law with electronic freedom of information norms
    • 636
    • See, e.g., Richard J. Peltz et al., The Arkansas Proposal on Access to Court Records: Upgrading the Common Law with Electronic Freedom of Information Norms, 59 ARK. L. REV. 555, 636 (2006) (stating that Reporters Committee for Freedom of the Press "condemned the theory of 'practical obscurity,' the notion that a limited privacy interest can be maintained in public information that is available only by sifting through files in a local courthouse and not available by more efficient and remote, electronic searches..."). Jane Kirtley has argued that in Reporters Committee: Justice Stevens's failure to distinguish the expectation of privacy from the expectation of nondiscovery reflects the growing tendency of courts and legislatures to regard the conversion of data from paper to electronic form as having some talismanic significance. Obviously, paper documents in a file drawer are physically distinct from entries in a computer database, and the time and effort required to retrieve them differ significantly as well. Merely translating data from one form to another, however, should not alter their inherently public nature.
    • (2006) Ark. L. Rev. , vol.59 , pp. 555
    • Peltz, R.J.1
  • 147
    • 84874870313 scopus 로고
    • The EU data protection directive and the first amendment: Why a "Press exemption" won't work
    • 642
    • Jane E. Kirtley, The EU Data Protection Directive and the First Amendment: Why a "Press Exemption" Won't Work, 80 IOWA L. REV. 639, 642 (1995); Bepko, supra note 113, at 984 ("But is a privacy right threatened when a compilation of otherwise hard to find information-what is now available in the courthouse-is disclosed on the Internet?... [I]t does not follow that access to information alone is necessarily harmful.").
    • (1995) Iowa L. Rev. , vol.80 , pp. 639
    • Kirtley, J.E.1
  • 148
    • 79958731816 scopus 로고    scopus 로고
    • May 2
    • Cf. Finn Brunton & Helen Nissenbaum, Vernacular Resistance to Data Collection and Analysis: A Political Theory of Obfuscation, 16 FIRST MONDAY (May 2, 2011), http://www.firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/ article/view/3493/2955 (developing a political philosophy of obfuscation where actors produce "misleading, false, or ambiguous data with the intention of confusing an adversary or simply adding to the time or cost of separating bad data from good."). We think the proper metaphor for online obscurity is the key and lock. The key and lock metaphor is well suited to online disputes given the judicial reliance on the digital version of the key: the password. In essence, we simply propose that there is more than one key that can lock information. Indeed, many kinds of keys and locks, each with varying strengths, exist Considered cumulatively, these metaphorical keys and locks fall along a spectrum that will allow courts to make a more nuanced analysis of online information based on a scale of obscurity.
    • (2011) Vernacular Resistance to Data Collection and Analysis: A Political Theory of Obfuscation , vol.16
    • Brunton, F.1    Nissenbaum, H.2
  • 149
    • 79953885112 scopus 로고    scopus 로고
    • Reunifying privacy law
    • 2039
    • Lior Jacob Strahilevitz, Reunifying Privacy Law, 98 CALIF. L. REV. 2007, 2039 (2010) [hereinafter Strahilevitz, Reunifying Privacy Law] ("As I explained in A Social Networks Theory of Privacy, tort law typically analyzes expectations of privacy through a probabilistic lens."). Therefore, an individual who minimizes the likelihood that the public will discover her information generally enjoys a reasonable expectation of privacy.
    • (2010) Calif. L. Rev. , vol.98 , pp. 2007
    • Strahilevitz, L.J.1
  • 150
    • 78649943228 scopus 로고    scopus 로고
    • Pseudonymous litigation
    • 1257-59
    • Cf. Lior Jacob Strahilevitz, Pseudonymous Litigation, 77 U. CHI. L. REV. 1239, 1257-59 (2010) [hereinafter Strahilevitz, Pseudonymous Litigation] (describing the importance of using pseudonyms for one or both parties in certain disputes).
    • (2010) U. Chi. L. Rev. , vol.77 , pp. 1239
    • Strahilevitz, L.J.1
  • 151
    • 84874895744 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • Discovery Definition, MACMILLAN DICTIONARY, http://www. macmillandictionary.com/dictionary/british/discovery (last visited Nov. 10, 2012).
    • Discovery Definition
  • 152
    • 84874818789 scopus 로고    scopus 로고
    • No. 06-5754, 2008 WL 6085437 D.n. J. July 25
    • Note that this is similar to the MySpace group formed in Pietrylo v. Hillstone, No. 06-5754, 2008 WL 6085437 (D.n. J. July 25, 2008). See supra note 147 and accompanying text
    • (2008) Pietrylo V. Hillstone
  • 156
    • 33745184635 scopus 로고    scopus 로고
    • Exploratory search: From finding to understanding
    • Gary Marchionini, Exploratory Search: From Finding to Understanding, 49 COMM. ACM 41 (2006).
    • (2006) Comm. ACM , vol.49 , pp. 41
    • Marchionini, G.1
  • 157
    • 84874820380 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • For example, the popular blogging service Blogger allows users to make their blog invisible to Google. See "Listing" and "Let Search Engines Find Your Blog" Settings, GOOGLE BLOGGER, http://www.google.com/ support/blogger/bin/answer.py?hl=en&answer=41373 (last visited Nov. 10, 2012). Similarly, Facebook profiles that utilize privacy settings are also not found by search engines.
    • Listing" and "Let Search Engines Find Your Blog" Settings
  • 159
    • 84874855150 scopus 로고    scopus 로고
    • Jan. 29 7:55 AM
    • Restrictions to access are not limited to passwords and privacy settings. Technologies such as biometrics can also effectively restrict access to informatioa See, e.g., Mike Elgan, How Apple and Google Will Kill the Password, COMPUTERWORLD (Jan. 29, 2011, 7:55 AM), http://www.computerworld.com/s/articIe/ 9206998/How-Apple-and-Google-will-kill-the-password-?taxonomyId= 15&pageNumber=2.
    • (2011) How Apple and Google Will Kill the Password
    • Elgan, M.1
  • 160
    • 84861977388 scopus 로고    scopus 로고
    • Website design as contract
    • 1653
    • See, e.g., Woodrow Hartzog, Website Design as Contract, 60 AM. U. L. REV. 1635, 1653 (2011).
    • (2011) Am. U. L. Rev. , vol.60 , pp. 1635
    • Hartzog, W.1
  • 161
    • 84855656613 scopus 로고    scopus 로고
    • (Columbia Univ. Computer Science, unpublished Technical Report No. CUCS-010-11)
    • Michelle Madejski et al., The Failure of Online Social Network Privacy Settings (2011) (Columbia Univ. Computer Science, unpublished Technical Report No. CUCS-010-11), available at http://academiccommons.columbia.edu/catalog/ac: 135406.
    • (2011) The Failure of Online Social Network Privacy Settings
    • Madejski, M.1
  • 163
    • 77950493360 scopus 로고    scopus 로고
    • June (unpublished Ph.D. dissertation, Lancaster University)
    • Maomao Wu, Adaptive Privacy Management for Distributed Applications (June 2007) (unpublished Ph.D. dissertation, Lancaster University), available at http://eprints.lancs.ac.uk/12984/1/PhdThesis-MaomaoWu.pdf.
    • (2007) Adaptive Privacy Management for Distributed Applications
    • Wu, M.1
  • 164
    • 8644231057 scopus 로고    scopus 로고
    • Public displays of connection
    • d. boyd 73-77
    • J. Donath & d. boyd, Public Displays of Connection, 22 BT TECH. J. 71 (2004) 73-77;
    • (2004) Bt Tech. J. , vol.22 , pp. 71
    • Donath, J.1
  • 165
    • 37249053884 scopus 로고    scopus 로고
    • Social network sites: Definition, history, and scholarship
    • 213
    • danah m. boyd & Nicole B. Ellison, Social Network Sites: Definition, History, and Scholarship, 13 J. COMPUTER-MEDIATED COMM. 210, 213 (2007), available at http://jcmc.indiana.edu/vol13/issuel/boyd.elhson.html ("The public display of connections is a crucial component of SNSs. The Friends list contains links to each Friend's profile, enabling viewers to traverse the network graph by clicking through the Friends lists.").
    • (2007) J. Computer-Mediated Comm. , vol.13 , pp. 210
    • Ellison, N.B.1
  • 166
    • 84874853453 scopus 로고    scopus 로고
    • danah boyd Aug. 23
    • danah boyd, Social Steganography: Learning to Hide in Plain Sight, ZEPHORIA (Aug. 23, 2010), http://www.zephoria.org/thoughts/archives/2010/08/23/ social-steganography-learning-to-hide-in-plain-sight.html.
    • (2010) Social Steganography: Learning to Hide in Plain Sight
  • 167
    • 0347660650 scopus 로고    scopus 로고
    • Social cues and impression formation in CMC
    • See, e.g., Martin Tanis & Tom Postmes, Social Cues and Impression Formation in CMC, 53 J. COMM. 676 (2003);
    • (2003) J. Comm. , vol.53 , pp. 676
    • Tanis, M.1    Postmes, T.2
  • 168
    • 33947608968 scopus 로고    scopus 로고
    • Selective self-presentation in computer-mediated communication: Hyperpersonal dimensions of technology, language, and cognition
    • Joseph B. Walther, Selective Self-Presentation in Computer-Mediated Communication: Hyperpersonal Dimensions of Technology, Language, and Cognition, 23 COMPUTERS HUM. BEHAV. 2538(2007).
    • (2007) Computers Hum. Behav. , vol.23 , pp. 2538
    • Walther, J.B.1
  • 169
    • 84874844252 scopus 로고    scopus 로고
    • Chain-link confidentiality
    • 675
    • In their most extreme forms, confidentiality demands a complete restriction on the dissemination of information and anonymity demands a complete inability to identify a target. See Woodrow Hartzog, Chain-Link Confidentiality, 46 GA. L. REV. 657, 675 (2012);
    • (2012) Ga. L. Rev. , vol.46 , pp. 657
    • Hartzog, W.1
  • 170
    • 0033244306 scopus 로고    scopus 로고
    • What's in a name? Some reflections on the sociology of anonymity
    • Gary T. Marx, What's in a Name? Some Reflections on the Sociology of Anonymity, 15 INFO. SOC'Y 99 (1999).
    • (1999) Info. Soc'Y , vol.15 , pp. 99
    • Marx, G.T.1
  • 171
    • 57349110717 scopus 로고    scopus 로고
    • "I've got nothing to hide" and other misunderstandings of privacy
    • See, e.g., Daniel J. Solove, "I've Got Nothing to Hide" and Other Misunderstandings of Privacy, 44 SAN DIEGO L. REV. 745 (2007).
    • (2007) San Diego L. Rev. , vol.44 , pp. 745
    • Solove, D.J.1
  • 172
    • 84874418595 scopus 로고    scopus 로고
    • 907 n. Y.S.2d 650, 657 n. Y. Sup. Ct.
    • See, e.g., Romano v. Steelcase, Inc., 907 n. Y.S.2d 650, 657 (n. Y. Sup. Ct. 2010). The court found no reasonable expectation of privacy in social network sites, stating: Thus, when Plaintiff created her Facebook and My Space accounts, she consented to the fact that her personal information would be shared with others, notwithstanding her privacy settings. Indeed, that is the very nature and purpose of these social networking sites else they would cease to exist. Since Plaintiff knew that her information may become publicly available, she cannot now claim that she had a reasonable expectation of privacy. As recently set forth by commentators regarding privacy and social networking sites, given the millions of users, "[i]n this environment, privacy is no longer grounded in reasonable expectations, but rather in some theoretical protocol better known as wishful thinking." Id. (citing
    • (2010) Romano V. Steelcase, Inc.
  • 173
    • 84874836471 scopus 로고    scopus 로고
    • What happens when the college rumor mill goes online? Privacy, defamation and online social networking sites
    • Dana L. Fleming & Joseph M. Herlihy, What Happens When the College Rumor Mill Goes Online? Privacy, Defamation and Online Social Networking Sites, 53 BOS. B.J. 16 (2009)).
    • (2009) Bos. B.J. , vol.53 , pp. 16
    • Fleming, D.L.1    Herlihy, J.M.2
  • 174
    • 84874880271 scopus 로고    scopus 로고
    • Apr. 17 1:46 PM
    • See, e.g., Adam Thierer, Erasing Our Past on the Internet, FORBES (Apr. 17, 2011, 1:46 PM), http://www.forbes.com/sites/adamthierer/2011/04/17/erasing- our-past-on-the-intemet/; MAYER-SCHÖNBERGER, supra note 13;
    • (2011) Erasing our Past on the Internet
    • Thierer, A.1
  • 176
    • 84874844203 scopus 로고    scopus 로고
    • Online access to court records-from documents to data, particulars to patterns
    • 868
    • The E-Government Act of 2002 instructed that personal identifiers, such as Social Security numbers and names of minor children, be redacted from federal court filings. Pub. L. No. 107-347, 116 Stat 2899 (2002). See also Peter W. Martin, Online Access to Court Records-From Documents to Data, Particulars to Patterns, 53 VILL. L. REV. 855, 868 (2008) ('The privacy concerns articulated in the E-Govemment Act led to a federal court policy and ultimately, effective December 1, 2007, new court rules directing attorneys to avoid the inclusion of certain personal identifying information (including full Social Security numbers) in case documents.").
    • (2008) Vill. L. Rev. , vol.53 , pp. 855
    • Martin, P.W.1
  • 177
    • 84874865517 scopus 로고    scopus 로고
    • A look at the commercial privacy bill of rights act of 2011
    • Apr. 20 9:03 AM
    • See, e.g., Venkat Balasubramani, A Look at the Commercial Privacy Bill of Rights Act of 2011, ERIC GOLDMAN: TECH. & MKTG. BLOG (Apr. 20, 2011, 9:03 AM), http:/blog.ericgoldman.org/archives/2011/04/a-look-at-the-c.htm.
    • (2011) Eric Goldman: Tech. & MKTG. Blog
    • Balasubramani, V.1
  • 178
    • 84874822025 scopus 로고    scopus 로고
    • Breaking down the boucher bill
    • May 12
    • See also Tanya Forsheit, Breaking Down the Boucher Bill, INFORMATION LAW GROUP (May 12, 2010), http://www.infolawgroup.com/2010/05/articles/behavioral- advertising/breaking-down-the-boucher-bill/.
    • (2010) Information Law Group
    • Forsheit, T.1
  • 179
    • 84874916674 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • What Does It Mean to File a Suit Pseudonymously?, WITHOUT MY CONSENT, http://www.withoutmyconsent.org/quick-link/what-does-it-mean-file-suit- pseudonymously (last visited Nov. 10, 2012). See Strahilevitz, Pseudonymous Litigation, supra note 188.
    • What Does It Mean to File a Suit Pseudonymously?
  • 180
    • 77955320294 scopus 로고    scopus 로고
    • Big brother's little helpers: How choicepoint and other commercial data brokers collect and package your data for law enforcement
    • Commercial data brokers also collect obscure but available information online and should be regulated under this approach. See, e.g., Chris Jay Hoofnagle, Big Brother's Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement, 29 n. C. J. INT'L L. & COM. REG. 595 (2004);
    • (2004) C. J. Int'l L. & Com. Reg. , vol.29 , pp. 595
    • Hoofnagle, C.J.1
  • 181
  • 183
    • 0038405113 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • OECD Guidelines on the Protection of Privacy and the Transborder Flows of Personal Data, OECD, http://www.oecd.org/document/18/0,2340,en-2649-34255- 1815186-1-1-1-1,00.html (last visited Nov. 10, 2012) (setting forth data privacy guidelines for industry and governments that enable the transborder transfer of information).
    • OECD Guidelines on the Protection of Privacy and the Transborder Flows of Personal Data
  • 184
    • 84874840734 scopus 로고    scopus 로고
    • Oct. 11 4:52 PM
    • Plaintiffs in privacy disputes have an increasingly difficult time collecting monetary damages. See, e.g., Daniel J. Solove, The Slow Demise of Defamation and the Privacy Torts, HUFFINGTON POST (Oct. 11, 2010, 4:52 PM), http://www.huffingtonpost.com/daniel-j-solove/the-slow-dernise-of-defama-b- 758570.html.
    • (2010) The Slow Demise of Defamation and the Privacy Torts
    • Solove, D.J.1
  • 186
    • 84874899971 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • See REPUTATION.COM, http://www.reputation.com/reputationdefender (last visited Nov. 10, 2012). One physician hired Online Reputation Manager, "a company that helps clients push down unfavorable content in search engine results. The effort has crowded out coverage of [a research] scandal and retraction notices on medical journals' websites."
  • 188
    • 77949749376 scopus 로고    scopus 로고
    • Rethinking spyware: Questioning the propriety of contractual consent to online surveillance
    • See, e.g., Wayne R. Barnes, Rethinking Spyware: Questioning the Propriety of Contractual Consent to Online Surveillance, 39 U.C. DAVIS L. REV. 1545 (2006);
    • (2006) U.C. Davis L. Rev. , vol.39 , pp. 1545
    • Barnes, W.R.1
  • 189
    • 50649122437 scopus 로고    scopus 로고
    • Online privacy policies: Contracting away control over personal information?
    • Allyson W. Haynes, Online Privacy Policies: Contracting Away Control over Personal Information?, 111 PENn. ST. L. REV. 587 (2007);
    • (2007) Penn. St. L. Rev. , vol.111 , pp. 587
    • Haynes, A.W.1
  • 190
    • 76049128005 scopus 로고    scopus 로고
    • Technoconsen(t)sus
    • Andrea M. Matwyshyn, Technoconsen(t)sus, 85 WASH. U. L. REV. 529 (2007).
    • (2007) Wash. U. L. Rev. , vol.85 , pp. 529
    • Matwyshyn, A.M.1
  • 191
    • 0141641037 scopus 로고    scopus 로고
    • Advantage ISP: Terms of service as media law
    • See, e.g., Sandra Braman & Stephanie Roberts, Advantage ISP: Terms of Service as Media Law, 5 NEW MEDIA & SOC'Y 422 (2003);
    • (2003) New Media & Soc'Y , vol.5 , pp. 422
    • Braman, S.1    Roberts, S.2
  • 192
    • 33846305796 scopus 로고    scopus 로고
    • Terms of use
    • 460
    • Mark A. Lemley, Terms of Use, 91 MINn. L. REV. 459, 460 (2006);
    • (2006) MINn. L. Rev. , vol.91 , pp. 459
    • Lemley, M.A.1
  • 193
    • 33745657826 scopus 로고    scopus 로고
    • Kiss and tell: Protecting intimate relationship privacy through implied contracts of confidentiality
    • Andrew J. McClurg, Kiss and Tell: Protecting Intimate Relationship Privacy Through Implied Contracts of Confidentiality, 74 U. CIn. L. REV. 887 (2006);
    • (2006) U. CIn. L. Rev. , vol.74 , pp. 887
    • McClurg, A.J.1
  • 194
    • 84874867755 scopus 로고    scopus 로고
    • Mar. 29 (Ass'n for the Advancement of Artificial Intelligence Press, unpublished Technical Report No. SS-10-05)
    • Nancy S. Kim, 'Wrap Contracts and Privacy 1 (Mar. 29, 2010) (Ass'n for the Advancement of Artificial Intelligence Press, unpublished Technical Report No. SS-10-05), available at http://papers.ssm.com/so13/papers.cfm?abstract-id= 1580111.
    • (2010) Wrap Contracts and Privacy , vol.1
    • Kim, N.S.1
  • 195
    • 84872659143 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • About the Licenses, CREATIVE COMMONS, http://creativecommons.org/ licenses/ (last visited Nov. 10, 2012).
    • About the Licenses
  • 196
    • 84874850686 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • See, e.g., Posting, TUMBLR, http://www.tumblr.com/docs/en/posting (last visited Nov. 10, 2012);
    • Posting
  • 197
    • 84874857954 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • Tagging Photos, PICASA, http://support.google.com/picasa/answer/106209/? & (last visited Nov. 10, 2012);
    • Tagging Photos
  • 198
    • 84874869947 scopus 로고    scopus 로고
    • (last visited Nov. 10, 2012)
    • What Is Tagging and How Does It Work?, FACEBOOK, https://www.facebook. com/help/?feq=13407 (last visited Nov. 10, 2012) (discussing how to tag posts).
    • What is Tagging and How Does It Work?


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.