-
1
-
-
37249018138
-
Why youth & hearts social network sites: The role of networked publics in teenage social life
-
David Buckingham ed.
-
See, e.g., danah boyd, Why Youth & hearts Social Network Sites: The Role of Networked Publics in Teenage Social Life, in YOUTH, IDENTITY, AND DIGITAL MEDIA 119, 133 (David Buckingham ed., 2008), available at http://www.mitpressjournals.org/doi/pdf/10.1162/dmal.9780262524834.119 ("Most people believe that security through obscurity will serve as a functional barrier online. For the most part, this is a reasonable assumption.");
-
(2008)
Youth, Identity, and Digital Media
, vol.119
, pp. 133
-
-
-
2
-
-
77955341233
-
Fulfilling government 2.0's promise with robust privacy protections
-
835
-
Danielle Keats Citron, Fulfilling Government 2.0's Promise with Robust Privacy Protections, 78 GEO. WASH. L. REV. 822, 835 (2010) ("People also have a sense that their social-network information will be kept private because they feel anonymous amidst the millions of social-network users.");
-
(2010)
Geo. Wash. L. Rev.
, vol.78
, pp. 822
-
-
Citron, D.K.1
-
3
-
-
77953552698
-
Privacy, free speech, and "Blurry-edged" social networks
-
1317-18
-
Lauren Gelman, Privacy, Free Speech, and "Blurry-Edged" Social Networks, 50 B.C. L. REV. 1315, 1317-18 (2009);
-
(2009)
B.C. L. Rev.
, vol.50
, pp. 1315
-
-
Gelman, L.1
-
4
-
-
68949182898
-
Saving facebook
-
1160-63
-
James Grimmelmann, Saving Facebook, 94 IOWA L. REV. 1137, 1160-63 (2009). This assertion is addressed in greater detail in Part II.
-
(2009)
Iowa L. Rev.
, vol.94
, pp. 1137
-
-
Grimmelmann, J.1
-
5
-
-
84874868130
-
-
560 N.E.2d 900 III. App. Ct
-
See, e.g., Miller v. Motorola, Inc., 560 N.E.2d 900 (III. App. Ct 1990);
-
(1990)
Miller V. Motorola, Inc.
-
-
-
6
-
-
79953846914
-
-
257 N.W.2d 522 Mich.
-
Beaumont v. Brown, 257 N.W.2d 522 (Mich. 1977);
-
(1977)
Beaumont V. Brown
-
-
-
7
-
-
84874870918
-
-
112 N.W.2d 862 Iowa
-
Yoder v. Smith, 112 N.W.2d 862 (Iowa 1962);
-
(1962)
Yoder V. Smith
-
-
-
8
-
-
79953883814
-
-
299 S.W. 967 Ky.
-
Brents v. Morgan, 299 S.W. 967 (Ky. 1927).
-
(1927)
Brents V. Morgan
-
-
-
9
-
-
84874895677
-
-
527 F.2d 1122 9th Cir.
-
See, e.g., Virgil v. Time, Inc., 527 F.2d 1122 (9th Cir. 1975);
-
(1975)
Virgil V. Time, Inc.
-
-
-
10
-
-
84874875274
-
-
406 F. Supp. 858 W.D. Pa.
-
Neff v. Time, Inc., 406 F. Supp. 858 (W.D. Pa. 1976);
-
(1976)
Neff V. Time, Inc.
-
-
-
11
-
-
79953839608
-
-
201 Cal. Rptr. 665 Cal. Ct. App.
-
Sipple v. Chronicle Publ'g Co., 201 Cal. Rptr. 665 (Cal. Ct. App. 1984).
-
(1984)
Sipple V. Chronicle Publ'g Co.
-
-
-
12
-
-
72649089021
-
-
543 U.S. 405
-
See, e.g., Illinois v. Caballes, 543 U.S. 405 (2005);
-
(2005)
Illinois V. Caballes
-
-
-
13
-
-
72649092808
-
-
442 U.S. 735
-
Smith v. Maryland, 442 U.S. 735 (1979);
-
(1979)
Smith V. Maryland
-
-
-
16
-
-
84874919591
-
-
A URL, or Uniform Resource Locator, describes "syntax and semantics of formalized information for location and access of resources via the Internet" Id For example, the web address http://yahoo.com is a URL that resolves to the Yahoo website.
-
-
-
-
17
-
-
0003259187
-
The deep web: Surfacing hidden value
-
See, e.g., Michael K, Bergman, The Deep Web: Surfacing Hidden Value, 7 J. ELECTRIC PUBLISHING, htrp://quod.lib.umich.edu/cgi/t/text/text-id?c=jep;view= text;rgn=main;idno=3336451.0007.104 (2001) ("Since they are missing the deep Web when they use such search engines, Internet searchers are therefore searching only 0.03%-or one in 3,000-of the pages available to them today.");
-
(2001)
J. Electric Publishing
, vol.7
-
-
Michael, K.B.1
-
18
-
-
0012036450
-
Reap what you sow: Harvesting the deep web
-
Norm Medeiros, Reap What You Sow: Harvesting the Deep Web, 18 OCLC SYS. & SERVS. 18 (2002);
-
(2002)
Oclc Sys. & Servs.
, vol.18
, pp. 18
-
-
Medeiros, N.1
-
19
-
-
21344453736
-
Indexing the invisible web: A survey
-
Yanbo Ru & Ellis Horowitz, Indexing the Invisible Web: A Survey, 29 ONUNE INFO. REV. 249 (2005);
-
(2005)
Onune Info. Rev.
, vol.29
, pp. 249
-
-
Ru, Y.1
Horowitz, E.2
-
20
-
-
84874830943
-
Data is gold - 91,000 terabytes of uncharted web: Welcome to the DarkSide
-
Apr. 11
-
Danny Devriendt, Data Is Gold - 91,000 Terabytes of Uncharted Web: Welcome to the DarkSide, PORTER NOVELLI BLOG (Apr. 11, 2011), http://blog.portemovelli.com/2011/04/11/data-is-gold-%E2%80%93-91000-terabytes- of-uncharted-web-welcome-to-the-dark-side/ ("The dark Web, or hidden Web is approximately 550 times bigger than the Web you experience daily.");
-
(2011)
Porter Novelli Blog
-
-
Devriendt, D.1
-
21
-
-
84874827091
-
-
Dec. 19 12:00 PM
-
Russell Kay, Quickstudy: Deep Web, COMPUTERWORLD (Dec. 19, 2005, 12:00 PM), http://www.computerworld.com/s/article/107097/Deep-Web ("[M]ore than 500 times as much information as traditional search engines 'know about' is available in the deep Web.");
-
(2005)
Quickstudy: Deep Web
-
-
Kay, R.1
-
24
-
-
84858168372
-
-
See, e.g., boyd, supra note 1, at 133; Frederic Stutzman & Woodrow Hartzog, Boundary Regulation in Social Media, in PROCEEDINGS OF THE ACM 2012 CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK 769, 769-78 (2012), available at http://dl.acm.org/citation.cfm?id=2145320&bnc=1.
-
(2012)
Boundary Regulation in Social Media, in PROCEEDINGS of the ACM 2012 CONFERENCE on COMPUTER SUPPORTED COOPERATIVE WORK
, vol.769
, pp. 769-78
-
-
Stutzman, F.1
Hartzog, W.2
-
26
-
-
0001028618
-
Coevolution of neocortical size, group size and language in humans
-
See, e.g., R.I.M. Dunbar, Coevolution of Neocortical Size, Group Size and Language in Humans, 16 BEHAV. & BRAIN Sa. 681 (1993);
-
(1993)
BEHAV. & BRAIN Sa.
, vol.16
, pp. 681
-
-
Dunbar, R.I.M.1
-
27
-
-
34247790304
-
Social networks, support cliques, and kinship
-
R.I.M. Dunbar & M. Spoors, Social Networks, Support Cliques, and Kinship, 6 HUM. NATURE 273 (1995).
-
(1995)
Hum. Nature
, vol.6
, pp. 273
-
-
Dunbar, R.I.M.1
Spoors, M.2
-
28
-
-
0032221027
-
The social brain hypothesis
-
184
-
Robin I.M. Dunbar, The Social Brain Hypothesis, 6 EVOLUTIONARY ANTHROPOLOGY 178, 184(1998).
-
(1998)
Evolutionary Anthropology
, vol.6
, pp. 178
-
-
Dunbar, R.I.M.1
-
30
-
-
0036211735
-
Can you see the real me? Activation and expression of the "True self' on the internet
-
44-45
-
John A. Bargh et al., Can You See the Real Me? Activation and Expression of the "True Self' on the Internet, 58 J. SOC. ISSUES 33, 44-45 (2002).
-
(2002)
J. Soc. Issues
, vol.58
, pp. 33
-
-
Bargh, J.A.1
-
31
-
-
80052649771
-
-
There is some debate over measuring the size of human social groups, but even those debating measurement methodology agree that the average number of people to whom one is truly close-and nonobscure-to remains objectively small. See LEE RAINIE & BARRY WELLMAN, NETWORKED: THE NEW SOCIAL OPERATING SYSTEM 117-34 (2012) (discussing measurement of personal networks, effects of online interaction on personal networks);
-
(2012)
NETWORKED: The NEW SOCIAL OPERATING SYSTEM
, pp. 117-34
-
-
Lee, R.1
Wellman, B.2
-
32
-
-
33746507265
-
Social isolation in America: Changes in core discussion networks over two decades
-
360
-
Miller McPherson et al., Social Isolation in America: Changes in Core Discussion Networks over Two Decades, 71 AM. SOC. REV. 353, 360 (2006) (establishing and updating core discussion network size). Notable exceptions to this claim are celebrities or other highly identifiable individuals.
-
(2006)
Am. Soc. Rev.
, vol.71
, pp. 353
-
-
McPherson, M.1
-
35
-
-
0027345608
-
Social foundations of cognition
-
592
-
John M. Levine et al., Social Foundations of Cognition, 44 ANN. REV. PSYCHOL. 585, 592 (1993) (explaining how some observers expect certain individuals to behave a certain way based on the "social position" the observer perceives the individual to be in).
-
(1993)
Ann. Rev. Psychol.
, vol.44
, pp. 585
-
-
Levine, J.M.1
-
36
-
-
57849148623
-
Social identification and interpersonal communication in computer-mediated communication: What you do versus who you are in virtual groups
-
64-65
-
In off-line settings, individuals may seek personal information to explain observed deviant behavior, such as finding out the backstory for why an unidentified neighbor did something rude. In online settings, the role of deviant behavior has been shown to interact with group membership status. See Zuoming Wang et al., Social Identification and Interpersonal Communication in Computer-Mediated Communication: What You Do Versus Who You Are in Virtual Groups, 35 HUM. COMM. RES. 59, 64-65 (2009).
-
(2009)
Hum. Comm. Res.
, vol.35
, pp. 59
-
-
Wang, Z.1
-
38
-
-
84926273063
-
Felicity's condition
-
51
-
Of this particular challenge, Goffman writes, Whatever else, our activity must be addressed to the other's mind, that is, to the other's capacity to read our words and actions for evidence of our feelings, thoughts, and intent This confines what we say and do, but it also allows us to bring to bear all of the world to which the other can catch allusions. Erving Goffman, Felicity's Condition, 89 AM. J. SOC. 1, 51(1983).
-
(1983)
Am. J. Soc.
, vol.89
, pp. 1
-
-
Goffman, E.1
-
42
-
-
45649084983
-
Self-disclosure, privacy and the internet
-
Adam N. Joinson et al. eds.
-
See, e.g., Adam N. Joinson & Carina B. Paine, Self-Disclosure, Privacy and the Internet, in THE OXFORD HANDBOOK OF INTERNET PSYCHOLOGY 237, 237-38 (Adam N. Joinson et al. eds., 2007);
-
(2007)
The Oxford Handbook of Internet Psychology
, vol.237
, pp. 237-38
-
-
Joinson, A.N.1
Paine, C.B.2
-
43
-
-
0033244304
-
Assessing anonymous communication on the internet: Policy deliberations
-
82-84
-
Rob Kling et al., Assessing Anonymous Communication on the Internet: Policy Deliberations, 15 INFO. SOC'Y 79, 82-84 (1999);
-
(1999)
Info. Soc'Y
, vol.15
, pp. 79
-
-
Kling, R.1
-
44
-
-
70549095305
-
Sharing private information online: The mediator effect of social exchange
-
Su-Yu Zeng et al., Sharing Private Information Online: The Mediator Effect of Social Exchange, in PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE 231 (2009), available at http://dl.acm.org/ft-gateway. cfm?id=1593290&md=652035&dwn=1&CFID=194561741&CFTOKEN=39062883.
-
(2009)
PROCEEDINGS of the 11TH INTERNATIONAL CONFERENCE on ELECTRONIC COMMERCE
, vol.231
-
-
Zeng, S.-Y.1
-
46
-
-
33748935221
-
-
See, e.g., Susannah Fox, PEW INTERNET & AM. LIFE PROJECT, DIGITAL DIVISIONS: THERE ARE CLEAR DIFFERENCES AMONG THOSE WITH BROADBAND CONNECTIONS, DIAL-UP CONNECTIONS, AND NO CONNECTIONS AT ALL TO THE INTERNET (2005), available at http://www.pewintemet.org/PPF/r/165/report-display.asp;
-
(2005)
Pew Internet & Am. Life Project, Digital Divisions: There are Clear Differences Among those with Broadband Connections, Dial-Up Connections, and no Connections at all to the Internet
-
-
Fox, S.1
-
47
-
-
77954081235
-
-
JOHN HORRIGAN, PEW INTERNET & AM. LIFE PROJECT, HOME BROADBAND ADOPTION 2009 (2009), available at http://www.pewintemet.org/Reports/2009/10- Home-Broadband-Adoption-2009.aspx. As these reports clearly indicate, use and nonuse of Internet resources is largely a function of socioeconomic and geographic factors. While it is likely that a certain portion of the population opts out of the Internet for privacy-related reasons, the proportion of individuals for whom this applies is so small it does not appear on nationally representative studies.
-
(2009)
Pew Internet & AM. Life Project, Home Broadband Adoption 2009
-
-
Horrigan, J.1
-
48
-
-
84865809207
-
-
See, e.g., KATHRYN ZICKUHR & AARON SMITH, PEW INTERNET & AM. LIFE PROJECT, DIGITAL DIFFERENCES (2012), available at http://pewmternet.org/ Reports/2012/Digital-differences.aspx (noting that nonusers primary reasons involved lack of motivation, access to resources, or difficulty in use). We speculate that while use or nonuse of the Internet is poorly explained by privacy preferences, use and nonuse of certain applications may be better explained by privacy preference.
-
(2012)
Pew Internet & Am. Life Project, Digital Differences
-
-
Zickuhr, K.1
Smith, A.2
-
49
-
-
78650870765
-
Beyond and below racial homophily: Erg models of a friendship network documented on facebook
-
588-600
-
See RAINIE & WELLMAN, supra note 16, at 126-31; Andreas Wimmer & Kevin Lewis, Beyond and Below Racial Homophily: ERG Models of a Friendship Network Documented on Facebook, 116 AM. J. SOC, 583, 588-600 (explaining the theoretical bases for racial homogeneity in social networks).
-
Am. J. Soc
, vol.116
, pp. 583
-
-
Wimmer, A.1
Lewis, K.2
-
50
-
-
10444223569
-
-
1-15
-
The reinforcement of social structure can be broadly categorized into two frames. The first frame involves the replication of material and socioeconomic conditions and practices in online space, which is often conceived of as the digital divide. See, e.g., KAREN MOSSBERGER ET AL., VIRTUAL INEQUALITY: BEYOND THE DIGITAL DIVIDE, 1-15, 60-73 (2003);
-
(2003)
Virtual Inequality: Beyond the Digital Divide
, pp. 60-73
-
-
Mossberger, K.1
-
51
-
-
67649545122
-
Social interactions and the "Digital divide": Explaining variations in internet use
-
277-94
-
Ritu Agarwal et al., Social Interactions and the "Digital Divide": Explaining Variations in Internet Use, 20 INFO. SYS. RES. 277, 277-94 (connecting internet use with peer behavior and social influence);
-
Info. Sys. Res.
, vol.20
, pp. 277
-
-
Agarwal, R.1
-
52
-
-
76149139754
-
Digital na(t)ives? Variation in internet skills and uses among members of the "Net generation"
-
108
-
Eszter Hargittai, Digital Na(t)ives? Variation in Internet Skills and Uses Among Members of the "Net Generation", 80 SOC. INQUIRY 92, 108 (2010) (concluding that differences in web-use skills correlate with socioeconomic, racial, and gender differences). The second frame is the replication of off-line network structures online; that is, the degree to which online and off-line networks overlap, inherently forcing individuals to fall into off-line social roles. See, e.g., RAINIE & WELLMAN, supra note 16, at 126-30 (discussing the "diminishing" gap between physical space and cyberspace); Wimmer & Lewis, supra note 32, at 588-600 (discussing the important role off-line social structure exerts on online network formation).
-
(2010)
Soc. Inquiry
, vol.80
, pp. 92
-
-
Hargittai, E.1
-
53
-
-
0033721503
-
Graph structure in the web
-
See, e.g., Andrei Broder et al., Graph Structure in the Web, 33 COMPUTER NETWORKS 309 (2000);
-
(2000)
Computer Networks
, vol.33
, pp. 309
-
-
Broder, A.1
-
54
-
-
4243148480
-
Authoritative sources in a hyperlinked environment
-
Jon M. Kleinberg, Authoritative Sources in a Hyperlinked Environment, 46 J. ACM 604 (1999).
-
(1999)
J. ACM
, vol.46
, pp. 604
-
-
Kleinberg, J.M.1
-
55
-
-
84890768200
-
Measuring user influence in twitter: The million follower fallacy
-
For an applied discussion of attention networks in Twitter, see Meeyoung Cha et al., Measuring User Influence in Twitter: The Million Follower Fallacy, in PROCEEDINGS OF THE 4TH INTERNATIONAL AAAI CONFERENCE ON WEBLOGS AND SOCIAL MEDIA 10 (2010), available at http://www.aaai.org/ocs/index.php/ICWSM/ICWSM10/ paper/view/1538/1826.
-
(2010)
PROCEEDINGS of the 4TH INTERNATIONAL AAAI CONFERENCE on WEBLOGS and SOCIAL MEDIA
, pp. 10
-
-
Cha, M.1
-
56
-
-
84903015184
-
-
Id. at 126, 131-34. For example, consider the case of Aleksy Vayner, whose video resume "Impossible Is Nothing" became an Internet meme. See DANIL J. SOLOVE, THE FUTURE OF REPUTATION: GOSSIP, RUMOR, AND PRIVACY ON THE INTERNET 171-78 (2007).
-
(2007)
The Future of Reputation: Gossip, Rumor, and Privacy on the Internet
, pp. 171-78
-
-
Solove, D.J.1
-
57
-
-
84874819731
-
-
(last visited Nov. 10, 2012)
-
See, e.g., BLOGGER, http://www.blogger.com/ (last visited Nov. 10, 2012);
-
-
-
-
58
-
-
84874843259
-
-
(last visited Nov. 10, 2012)
-
FACEBOOK, https://www.facebook.com/ (last visited Nov. 10, 2012);
-
-
-
-
59
-
-
84874894559
-
-
(last visited Nov. 10, 2012)
-
FOURSQUARE, https://foursquare.com/ (last visited Nov. 10, 2012);
-
-
-
-
60
-
-
84874888156
-
-
(last visited Nov. 10, 2012)
-
TWITTER, https://twitter.com/ (last visited Nov. 10, 2012);
-
-
-
-
61
-
-
84874825383
-
-
(last visited Nov. 10, 2012)
-
WORDPRESS.COM, http://wordpress.com/ (last visited Nov. 10, 2012).
-
-
-
-
65
-
-
45649083153
-
Identity construction on facebook: Digital empowerment in anchored relationships
-
1818-19
-
Shanyang Zhao et al., Identity Construction on Facebook: Digital Empowerment in Anchored Relationships, 24 COMPUTERS HUM. BEHAV. 1816, 1818-19 (2008) (citations omitted).
-
(2008)
Computers Hum. Behav.
, vol.24
, pp. 1816
-
-
Zhao, S.1
-
67
-
-
34547160289
-
A facebook in the crowd: Social searching vs. Social browsing
-
Cliff Lampe et al., A Facebook in the Crowd: Social Searching vs. Social Browsing, in CSCW '06 PROCEEDINGS OF THE 2006 20TH ANNIVERSARY CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK 167 (2006), available at http://alacm.org/citation.cfm?id=1180901&bnc=1 (discussing the online network construction of college students). For a more general discussion of online-off-line overlaps, see, for example, RAINIE & WELLMAN, supra note 16, at 126-30.
-
(2006)
CSCW '06 PROCEEDINGS of the 2006 20TH ANNIVERSARY CONFERENCE on COMPUTER SUPPORTED COOPERATIVE WORK
, vol.167
-
-
Lampe, C.1
-
71
-
-
77950494574
-
All my people right here, right now: Management of group copresence on a social networking site
-
[hereinafter Lampinen et al., All My People]
-
Airi Lampinen et al., All My People Right Here, Right Now: Management of Group Copresence on a Social Networking Site, in GROUP '09: PROCEEDINGS OF THE ACM 2009 INTERNATIONAL CONFERENCE ON SUPPORTING GROUP WORK 281 (2009) [hereinafter Lampinen et al., All My People], available at http://dl.acm.org/ citation.cfm?id=1531717;
-
(2009)
GROUP '09: Proceedings of the ACM 2009 INTERNATIONAL CONFERENCE on SUPPORTING GROUP WORK
, pp. 281
-
-
Lampinen, A.1
-
73
-
-
46149119696
-
Online privacy control via anonymity and pseudonym: Cross-cultural implications
-
See, e.g., Houn-Gee Chen et al., Online Privacy Control Via Anonymity and Pseudonym: Cross-cultural Implications, 27 BEHAV. & INFO. TECH. 229 (2008).
-
(2008)
Behav. & Info. Tech.
, vol.27
, pp. 229
-
-
Chen, H.-G.1
-
74
-
-
4043132397
-
Protecting personal information online: A survey of user privacy concerns and control techniques
-
87-88
-
Kuanchin Chen & Alan I. Rea, Jr., Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques, 44 J. COMPUTER INFO. SYS. 85, 87-88 (2004).
-
(2004)
J. Computer Info. Sys.
, vol.44
, pp. 85
-
-
Chen, K.1
Rea Jr., A.I.2
-
77
-
-
84923802627
-
Strategies and struggles with privacy in an online social networking community
-
Katherine Strater & Heather Richter Lipford, Strategies and Struggles with Privacy in an Online Social Networking Community, in 1 BCS-HCI '08 PROCEEDINGS OF THE 22ND BRITISH HCI GROUP ANNUAL CONFERENCE ON PEOPLE AND COMPUTERS: CULTURE, CREATIVITY, INTERACTION 111 (2008), available at http://dl.acm.org/citation.cfm?id=1531530.
-
(2008)
1 BCS-HCI '08 PROCEEDINGS of the 22ND BRITISH HCI GROUP ANNUAL CONFERENCE on PEOPLE and COMPUTERS: Culture, CREATIVITY, INTERACTION
, pp. 111
-
-
Strater, K.1
Lipford, H.R.2
-
78
-
-
68949182788
-
-
Feb. 12 at 24-29, 102-03
-
See, e.g., Emily Nussbaum, Say Everything, N.Y. MAG., Feb. 12, 2007, at 24-29, 102-03, available at http://nymag.com/news/features/27341/.
-
(2007)
Say Everything
-
-
Nussbaum, E.1
-
79
-
-
78049439042
-
-
See, e.g., HELEN NISSENBAUM, PRIVACY IN CONTEXT: TECHNOLOGY, POLICY, AND THE INTEGRITY OF SOCIAL LIFE 104-26 (2010) [hereinafter NISSENBAUM, PRIVACY IN CONTEXT];
-
(2010)
PRIVACY in CONTEXT: Technology, POLICY, and the INTEGRITY of SOCIAL LIFE
, pp. 104-26
-
-
Nissenbaum, H.1
-
81
-
-
1842538795
-
Privacy as contextual integrity
-
Helen Nissenbaum, Privacy as Contextual Integrity, 79 WASH. L. REV. 119 (2004) [hereinafter Nissenbaum, Privacy as Contextual Integrity];
-
(2004)
Wash. L. Rev.
, vol.79
, pp. 119
-
-
Nissenbaum, H.1
-
82
-
-
0032282474
-
Protecting privacy in an information age: The problem of privacy in public
-
Helen Nissenbaum, Protecting Privacy in an Information Age: The Problem of Privacy in Public, 17 LAW & PHIL. 559 (1998) [hereinafter Nissenbaum, Protecting Privacy in an Information Age];
-
(1998)
Law & Phil.
, vol.17
, pp. 559
-
-
Nissenbaum, H.1
-
83
-
-
0036045758
-
Conceptualizing privacy
-
Daniel J. Solove, Conceptualizing Privacy, 90 CALIF. L. REV. 1087 (2002) [hereinafter Solove, Conceptualizing Privacy];
-
(2002)
Calif. L. Rev.
, vol.90
, pp. 1087
-
-
Solove, D.J.1
-
84
-
-
25144444373
-
A social networks theory of privacy
-
Lior Jacob Strahilevitz, A Social Networks Theory of Privacy, 72 U. CHI. L. REV. 919 (2005).
-
(2005)
U. Chi. L. Rev.
, vol.72
, pp. 919
-
-
Strahilevitz, L.J.1
-
85
-
-
84874827362
-
United states v. Gines-perez
-
225 D.P.R.
-
See, e.g., United States v. Gines-Perez, 214 F. Supp. 2d 205, 225 (D.P.R. 2002), rev'd on other grounds, 90 F. App'x 3 (1st Cir. 2004);
-
(2002)
F. Supp. 2d
, vol.214
, pp. 205
-
-
-
86
-
-
84874822242
-
-
767 N.W.2d 34, 44 Minn. Ct App.
-
Yath v. Fairview Clinics, N.P., 767 N.W.2d 34, 44 (Minn. Ct App. 2009).
-
(2009)
Yath V. Fairview Clinics, N.P.
-
-
-
87
-
-
34047274169
-
Access and aggregation: Public records, privacy, and the constitution
-
1177
-
Daniel J. Solove, Access and Aggregation: Public Records, Privacy, and the Constitution, 86 MINN. L. REV. 1137, 1177 (2002) (noting that when privacy is equated with secrecy, "[i]nformation is categorized as either public or private.... Understood this way, information has a particular status; it can either be in one domain or another. The law often treats information in this black-and-white manner; either it is wholly private or wholly public").
-
(2002)
Minn. L. Rev.
, vol.86
, pp. 1137
-
-
Solove, D.J.1
-
88
-
-
84861987728
-
Relative privacy: What privacy advocates can learn from trade secret law
-
694
-
Sharon K. Sandeen, Relative Privacy: What Privacy Advocates Can Learn from Trade Secret Law, 2006 MICH. ST. L. REV. 667, 694. Online obscurity has also appeared in the trade secret literature.
-
(2006)
Mich. St. L. Rev.
, pp. 667
-
-
Sandeen, S.K.1
-
89
-
-
84861968010
-
Saving trade secret disclosures on the internet through sequential preservation
-
17-19
-
See, e.g., Elizabeth A. Rowe, Saving Trade Secret Disclosures on the Internet Through Sequential Preservation, 42 WAKE FOREST L. REV. 1, 17-19 (2007). Rowe asked the question of trade secret doctrine: "Does public mean public accessibility or public publication? Does the obscurity of the Web site matter, or are all Internet postings equal?... The precise measure of obscurity or transience required to protect the trade secret, however, is unsettled." Id.
-
(2007)
Wake Forest L. Rev.
, vol.42
, pp. 1
-
-
Rowe, E.A.1
-
91
-
-
0003311737
-
Privacy versus the first amendment: A skeptical approach
-
See, e.g., Solveig Singleton, Privacy Versus the First Amendment: A Skeptical Approach, 11 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 97 (2000);
-
(2000)
Fordham Intell. Prop. Media & Ent. L.J.
, vol.11
, pp. 97
-
-
Singleton, S.1
-
92
-
-
0347315060
-
Freedom of speech and information privacy: The troubling implications of a right to stop people from speaking about you
-
Eugene Volokh, Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking About You, 52 STAn. L. REV. 1049 (2000);
-
(2000)
STAn. L. Rev.
, vol.52
, pp. 1049
-
-
Volokh, E.1
-
93
-
-
77952990411
-
Requiem for a heavyweight: A farewell to warren and brandeis's privacy tort
-
Diane L. Zimmerman, Requiem for a Heavyweight: A Farewell to Warren and Brandeis's Privacy Tort, 68 CORNELL L. REV. 291 (1983).
-
(1983)
Cornell L. Rev.
, vol.68
, pp. 291
-
-
Zimmerman, D.L.1
-
94
-
-
84872423773
-
The mythical right to obscurity: A pragmatic defense of no privacy in public
-
551
-
Heidi Reamer Anderson, The Mythical Right to Obscurity: A Pragmatic Defense of No Privacy in Public, 7I/S: J.L. & POL'Y FOR INFO. SOC'Y 543, 551 (2012).
-
(2012)
S: J.L. & POL'Y for INFO. SOC'Y
, vol.71
, pp. 543
-
-
Anderson, H.R.1
-
95
-
-
79955392932
-
Protecting privacy in the digital age
-
301
-
See, e.g., Will Thomas De Vries, Protecting Privacy in the Digital Age, 18 BERKELEY TECH. L.J. 283, 301 (2003) ("Digital technology is turning the asset of open government into a privacy nightmare. In the analog age, public records were all available, but languished in 'practical obscurity' in courthouse basements or isolated file cabinets.");
-
(2003)
Berkeley Tech. L.J.
, vol.18
, pp. 283
-
-
De Vries, W.T.1
-
96
-
-
84874838270
-
Litigation, privacy and the electronic age
-
¶ 6
-
Lewis A. Kaplan, Litigation, Privacy and the Electronic Age, 4 YALE SYMP. ON L. & TECH 1, ¶ 6 (2001) ("This practical obscurity of information generated in all but the most exceptional cases has been eroded by technological advances.");
-
(2001)
Yale Symp. on L. & Tech
, vol.4
, pp. 1
-
-
Kaplan, L.A.1
-
97
-
-
67651068264
-
Privacy, accountability, and the cooperating defendant: Towards a new role for internet access to court records
-
Caren Myers Morrison, Privacy, Accountability, and the Cooperating Defendant: Towards a New Role for Internet Access to Court Records, 62 VAND. L. REV. 921 (2009);
-
(2009)
Vand. L. Rev.
, vol.62
, pp. 921
-
-
Morrison, C.M.1
-
98
-
-
78649619118
-
Judicial information management in an electronic age: Old standards, new challenges
-
Peter A. Winn, Judicial Information Management in an Electronic Age: Old Standards, New Challenges, 3 FED. CTS. L. REV. 135 (2009);
-
(2009)
Fed. Cts. L. Rev.
, vol.3
, pp. 135
-
-
Winn, P.A.1
-
99
-
-
73249153322
-
Note, public availability or practical obscurity: The debate over public access to court records on the internet
-
Arminda Bradford Bepko, Note, Public Availability or Practical Obscurity: The Debate over Public Access to Court Records on the Internet, 49 n. Y.L. SCH. L. REV. 967 (2005);
-
(2005)
N. Y.L. Sch. L. Rev.
, vol.49
, pp. 967
-
-
Bepko, A.B.1
-
100
-
-
34047270800
-
Note, are public records too public? Why personally identifying information should be removed from both online and print versions of court documents
-
Kristen M. Blankley, Note, Are Public Records Too Public? Why Personally Identifying Information Should Be Removed from Both Online and Print Versions of Court Documents, 65 OHIO ST. L.J. 413 (2004).
-
(2004)
Ohio St. L.J.
, vol.65
, pp. 413
-
-
Blankley, K.M.1
-
101
-
-
77957594024
-
Broken promises of privacy: Responding to the surprising failure of anonymization
-
1724
-
Computer security through obscurity involves a slightly different set of concerns than user privacy. Obscurity is not favored as a computer security technique. See, e.g., Paul Ohm, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA. L. REV. 1701, 1724 (2010) ("Not only do reidentification scientists spurn security through obscurity, but they often assume that the adversary possesses the exact piece of data-if it exists-needed to unlock anonymized identities, in order to design responses that protect identity even in this worst case.");
-
(2010)
Ucla. L. Rev.
, vol.57
, pp. 1701
-
-
Ohm, P.1
-
102
-
-
77749333197
-
A theory of disclosure for security and competitive reasons: Open source, proprietary software, and government systems
-
1350-51
-
cf. Peter P. Swire, A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems, 42 HOUS. L. REV. 1333, 1350-51 (2006) ('"Obscurity is camouflage, security is armor.' Either can be useful, depending on the circumstances. They can also be useful when working together, much as tanks are often camouflaged").
-
(2006)
Hous. L. Rev.
, vol.42
, pp. 1333
-
-
Swire, P.P.1
-
103
-
-
67749135663
-
Note, defogging the cloud: Applying fourth amendment principles to evolving privacy expectations in cloud computing
-
A few have advocated online obscurity in the context of governmental searches. See, e.g., David A. Couillard, Note, Defogging the Cloud: Applying Fourth Amendment Principles to Evolving Privacy Expectations in Cloud Computing, 93 MINn. L. REV. 2205 (2009). Couillard also argued for a recognition of online obscurity, stating: Courts should... acknowledge the legitimacy of virtual concealment efforts-encryption, password protection, and the practical obscurity of unlisted links-as means of opacity in the cloud context Under this rule, courts would make a case-by-case determination as to whether a user's reliance upon a password, encryption, or obscurity was a reasonable effort to conceal in a given situation. It is not a burden for law enforcement to determine whether a password is necessary to access a website, at which point it would need a warrant prior to accessing the account Conversely, in the unlisted-link context, if an unlisted address appears on a public website as a hyperlink, law enforcement should be given discretion to treat such a virtual container as in plain view. Id. at 2236;
-
(2009)
MINn. L. Rev.
, vol.93
, pp. 2205
-
-
Couillard, D.A.1
-
104
-
-
79959627389
-
You better watch out, you better not frown, new video surveillance techniques are already in town (and other public spaces)
-
506
-
see also Carla Scherr, You Better Watch Out, You Better Not Frown, New Video Surveillance Techniques Are Already in Town (and Other Public Spaces), 3 I/S: J.L. & POL'Y FOR INFO. SOC'Y 499, 506 (2008) ("The concept of 'practical obscurity' applies to public information that is usually outside the public consciousness because it is contained in a large number of individual pieces that are practically impossible to accumulate and organize, or because it is impossible to find, for example a paper document stored in the dusty basement of the local courthouse or in an infinitely large government warehouse.");
-
(2008)
I/S: J.L. & POL'Y for INFO. SOC'Y
, vol.3
, pp. 499
-
-
Scherr, C.1
-
105
-
-
37249019175
-
Comment, the fourth amendment and privacy issues on the "New" internet: Facebook.com and MySpace.com
-
108
-
Matthew J. Hodge, Comment, The Fourth Amendment and Privacy Issues on the "New" Internet: Facebook.com and MySpace.com, 31 S. ILL. U. L.J. 95, 108 (2006) ("[A] user could only try to argue that a MySpace profile is not public knowledge, and that it is so obscure as to force the police to go searching for the profile. This obscurity... could be argued to deem some expectation of a private area.").
-
(2006)
S. Ill. U. L.J.
, vol.31
, pp. 95
-
-
Hodge, M.J.1
-
106
-
-
32844455310
-
Prioritizing privacy: A constitutional response to the internet
-
1100-01
-
A number of scholars have argued that the traditional notion of practical obscurity, which relied on off-line impediments to discovery, no longer exists in a digital world. See, e.g., Elbert Lin, Prioritizing Privacy: A Constitutional Response to the Internet, 17 BERKELEY TECH. L.J. 1085, 1100-01 (2002) ("[W]hile the scattering of information throughout numerous computer databases had preserved some practical obscurity, the Internet has all but eliminated those remnants of isolation. ");
-
(2002)
Berkeley Tech. L.J.
, vol.17
, pp. 1085
-
-
Lin, E.1
-
107
-
-
78751541477
-
Mapping online privacy
-
501
-
Jacqueline D. Lipton, Mapping Online Privacy, 104 Nw. U. L. REV. 477, 501 (2010) ("While before there was a fair amount of practical obscurity of information gathered in a public place, today the potential for immediate global dissemination of that information is unprecedented. Once information is available online, it is impossible to put the genie back in the bottle.");
-
(2010)
Nw. U. L. Rev.
, vol.104
, pp. 477
-
-
Lipton, J.D.1
-
108
-
-
77954713583
-
What google knows: Privacy and internet search engines
-
1440
-
Omar Tene, What Google Knows: Privacy and Internet Search Engines, 2008 UTAH L. REV. 1433, 1440 ("Before... search engines, we enjoyed a degree of 'practical obscurity'... (Information] was protected de facto from all but skilled investigators or highly motivated researchers, due to the practical difficulty and costs involved in uncovering and compiling the data. Today such information has become available instantly and free of charge through search engines...").
-
(2008)
Utah L. Rev.
, pp. 1433
-
-
Tene, O.1
-
109
-
-
84874907619
-
-
401 B.R. 295 Bankr. E.D. Tenn.
-
See, e.g., In re French v. Am. Gen. Fin. Servs., 401 B.R. 295 (Bankr. E.D. Tenn. 2009);
-
(2009)
French V. Am. Gen. Fin. Servs.
-
-
-
112
-
-
84874928386
-
-
898 n. E.2d 67 Ohio Ct. App.
-
Lambert v. Hartmann, 898 n. E.2d 67 (Ohio Ct. App. 2008).
-
(2008)
Lambert V. Hartmann
-
-
-
113
-
-
20444503560
-
U.S. Dep't of justice v. Reporters comm. for freedom of press
-
764
-
Id. (citing U.S. Dep't of Justice v. Reporters Comm. for Freedom of Press, 489 U.S. 749, 764(1989)).
-
(1989)
U.S.
, vol.489
, pp. 749
-
-
-
115
-
-
84874822778
-
-
767 n. W.2d 34, 44 Minn. Ct. App.
-
Yath v. Fairview Clinics, 767 n. W.2d 34, 44 (Minn. Ct. App. 2009).
-
(2009)
Yath V. Fairview Clinics
-
-
-
117
-
-
84856414178
-
-
U. CHI. LEGAL F. 65
-
See Jonathan Zittrain, Privacy 2.0, 2008 U. CHI. LEGAL F. 65.
-
(2008)
Privacy 2.0
-
-
Zittrain, J.1
-
118
-
-
84874874770
-
-
362 F. App'x 273 3d Cir.
-
See, e.g., Boring v. Google, Inc., 362 F. App'x 273 (3d Cir. 2010);
-
(2010)
Boring V. Google, Inc.
-
-
-
119
-
-
77951971529
-
-
255 F.3d 325, 333 6th Cir.
-
Guest v. Leis, 255 F.3d 325, 333 (6th Cir. 2001) ("Users would logically lack a legitimate expectation of privacy in the materials intended for publication or public posting.");
-
(2001)
Guest V. Leis
-
-
-
120
-
-
84874903483
-
-
565 F. Supp. 2d 184 D. Me.
-
Sandler v. Calcagni, 565 F. Supp. 2d 184 (D. Me. 2008);
-
(2008)
Sandler V. Calcagni
-
-
-
121
-
-
84874864924
-
-
497 F. Supp. 2d 117 D. Mass.
-
United States v. D'Andrea, 497 F. Supp. 2d 117 (D. Mass. 2007);
-
(2007)
United States V. D'Andrea
-
-
-
124
-
-
84867742889
-
-
91 Cal. Rptr. 3d 858, 862-63 Ct. App.
-
Moreno v. Hanford Sentinel, Inc., 91 Cal. Rptr. 3d 858, 862-63 (Ct. App. 2009);
-
(2009)
Moreno V. Hanford Sentinel, Inc.
-
-
-
125
-
-
84874822778
-
-
767 n. W.2d 34 Minn. Ct App.
-
Yath v. Fairview Clinics, 767 n. W.2d 34 (Minn. Ct App. 2009);
-
(2009)
Yath V. Fairview Clinics
-
-
-
126
-
-
77950509278
-
-
No. 04-08-00132, 2007 WL 1437235 n. J. Super. Ct App. Div. May 17
-
State v. Birchfield, No. 04-08-00132, 2007 WL 1437235 (n. J. Super. Ct App. Div. May 17, 2007).
-
(2007)
State V. Birchfield
-
-
-
127
-
-
84874924040
-
Stereotypification of the fourth amendment's public/private distinction: An opportunity for clarity
-
1196, 1206-11
-
Id. at 225. The "reasonable expectation of privacy" test is a complex and often maligned doctrine requiring analysis beyond the scope of this Article. It is sufficient for the purposes of this Article to acknowledge that courts generally hold that individuals do not have a reasonable expectation of privacy in "public" information for Fourth Amendment purposes. See Donald R.C. Pongrace, Stereotypification of the Fourth Amendment's Public/Private Distinction: An Opportunity for Clarity, 34 AM. U. L. REV. 1191, 1196, 1206-11 (1985).
-
(1985)
Am. U. L. Rev.
, vol.34
, pp. 1191
-
-
Pongrace, D.R.C.1
-
128
-
-
2242421636
-
The fourth amendment and the "Legitimate expectation of privacy"
-
For more information, see, for example, Gerald G. Ashdown, The Fourth Amendment and the "Legitimate Expectation of Privacy", 34 VAND. L. REV. 1289 (1981);
-
(1981)
Vand. L. Rev.
, vol.34
, pp. 1289
-
-
Ashdown, G.G.1
-
129
-
-
0036814641
-
What is a search? Two conceptual flaws in fourth amendment doctrine and some hints of a remedy
-
Sherry F. Colb, What Is a Search? Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy, 55 STAn. L. REV. 119 (2002);
-
(2002)
STAn. L. Rev.
, vol.55
, pp. 119
-
-
Colb, S.F.1
-
130
-
-
38849106262
-
Four models of fourth amendment protection
-
Orin S. Kerr, Four Models of Fourth Amendment Protection, 60 STAn. L. REV. 503 (2007);
-
(2007)
STAn. L. Rev.
, vol.60
, pp. 503
-
-
Kerr, O.S.1
-
131
-
-
80955134927
-
Fourth amendment pragmatism
-
Daniel J. Solove, Fourth Amendment Pragmatism, 51 B.C. L. REV. 1511 (2010);
-
(2010)
B.C. L. Rev.
, vol.51
, pp. 1511
-
-
Solove, D.J.1
-
132
-
-
75949125883
-
Defining the "reasonable expectation of privacy": An emerging tripartite analysis
-
Richard G. Wilkins, Defining the "Reasonable Expectation of Privacy": An Emerging Tripartite Analysis, 40 VAND. L. REV. 1077 (1987).
-
(1987)
Vand. L. Rev.
, vol.40
, pp. 1077
-
-
Wilkins, R.G.1
-
133
-
-
84874828491
-
-
413 F. Supp. 2d 1136, 1145 S.D. Cal.
-
However, a few courts have looked beyond passwords. See Four Navy Seals v. Associated Press, 413 F. Supp. 2d 1136, 1145 (S.D. Cal. 2005),
-
(2005)
Four Navy Seals V. Associated Press
-
-
-
134
-
-
79960519836
-
-
757 A.2d 412, 425 Pa. Commw. Ct
-
J.S. v. Bethlehem Area School District, 757 A.2d 412, 425 (Pa. Commw. Ct 2000), for a discussion on search visibility.
-
(2000)
J.S. V. Bethlehem Area School District
-
-
-
135
-
-
84866419355
-
-
214 F. Supp. 2d 205, 225 D.P.R.
-
United States v. Gines-Perez, 214 F. Supp. 2d 205, 225 (D.P.R. 2002) (emphasis in original).
-
(2002)
United States V. Gines-Perez
-
-
-
136
-
-
84455201030
-
-
*4-5 n. D. Fla. Mar. 11
-
*4-5 (n. D. Fla. Mar. 11, 2010) (citing United States v. King, 509 F.3d 1338 (11th Cir. 2007) (finding that the accidental sharing of files over a computer network and thumb drive left in a common use computer destroyed a reasonable expectation of privacy));
-
(2010)
United States V. Durdley
-
-
-
137
-
-
84859626217
-
-
*3 D. Ariz. Apr. 14
-
*3 (D. Ariz. Apr. 14, 2006) ("[I]t is undisputed that the share[d] file is publically available, therefore [the counterclaimant] cannot show that the Recording Companies intruded upon her private affairs [by accessing the file-sharing folder on her computer].").
-
(2006)
Interscope Records V. Duty
-
-
-
139
-
-
84874928411
-
-
Jan. 11 4:11 PM
-
18 U.S.C. § 2710 (2006). It should be noted that the Video Privacy Protection Act Amendments Act of 2012, Pub. L. No. 112-258, 126 Stat 2414 (2013), arguably weakened the statute's privacy protections by allowing video tape service providers to use advance consent obtained over the Internet to justify the disclosure of consumers' personally identifiable information. See, e.g., Chloe Albanesius, Obama Signs Bill That Lets You Share Netflix Activity on Facebook, PCMAG.COM (Jan. 11, 2013, 4:11 PM), http://www.pcmag.com/article2/0, 2817,2414206,00.asp;
-
(2013)
Obama Signs Bill that Lets You Share Netflix Activity on Facebook
-
-
Albanesius, C.1
-
144
-
-
84874916439
-
Pineda and the law of the jungle
-
Mar. 8
-
cf. Chris Hoofhagle, Pineda and the Law of the Jungle, TECHNOLOGY-ACADEMICS-POLICY (TAP) (Mar. 8, 2011), http://www.techpolicy.com/ PinedaLaw-of-Jungle-Hoofhagle.aspx (arguing that the Pineda decision restrains "commercial actors that have no respect whatsoever for consumer preferences" from collecting personal information).
-
(2011)
Technology-Academics-Policy (TAP)
-
-
Hoofhagle, C.1
-
145
-
-
0036622716
-
The public interest be damned: Lower court treatment of the reporters committee "central purpose" reformulation
-
1024
-
See, e.g., Martin E. Halstuk & Charles n. Davis, The Public Interest Be Damned: Lower Court Treatment of the Reporters Committee "Central Purpose" Reformulation, 54 ADMIn. L. REV. 983, 1024 (2002) ("[T]he Reporters Committee 'central purpose' definition and theory of 'practical obscurity' are judicial inventions aimed at ill-defined concerns...").
-
(2002)
ADMIn. L. Rev.
, vol.54
, pp. 983
-
-
Halstuk, M.E.1
Davis, C.N.2
-
146
-
-
84863553709
-
The Arkansas proposal on access to court records: Upgrading the common law with electronic freedom of information norms
-
636
-
See, e.g., Richard J. Peltz et al., The Arkansas Proposal on Access to Court Records: Upgrading the Common Law with Electronic Freedom of Information Norms, 59 ARK. L. REV. 555, 636 (2006) (stating that Reporters Committee for Freedom of the Press "condemned the theory of 'practical obscurity,' the notion that a limited privacy interest can be maintained in public information that is available only by sifting through files in a local courthouse and not available by more efficient and remote, electronic searches..."). Jane Kirtley has argued that in Reporters Committee: Justice Stevens's failure to distinguish the expectation of privacy from the expectation of nondiscovery reflects the growing tendency of courts and legislatures to regard the conversion of data from paper to electronic form as having some talismanic significance. Obviously, paper documents in a file drawer are physically distinct from entries in a computer database, and the time and effort required to retrieve them differ significantly as well. Merely translating data from one form to another, however, should not alter their inherently public nature.
-
(2006)
Ark. L. Rev.
, vol.59
, pp. 555
-
-
Peltz, R.J.1
-
147
-
-
84874870313
-
The EU data protection directive and the first amendment: Why a "Press exemption" won't work
-
642
-
Jane E. Kirtley, The EU Data Protection Directive and the First Amendment: Why a "Press Exemption" Won't Work, 80 IOWA L. REV. 639, 642 (1995); Bepko, supra note 113, at 984 ("But is a privacy right threatened when a compilation of otherwise hard to find information-what is now available in the courthouse-is disclosed on the Internet?... [I]t does not follow that access to information alone is necessarily harmful.").
-
(1995)
Iowa L. Rev.
, vol.80
, pp. 639
-
-
Kirtley, J.E.1
-
148
-
-
79958731816
-
-
May 2
-
Cf. Finn Brunton & Helen Nissenbaum, Vernacular Resistance to Data Collection and Analysis: A Political Theory of Obfuscation, 16 FIRST MONDAY (May 2, 2011), http://www.firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/ article/view/3493/2955 (developing a political philosophy of obfuscation where actors produce "misleading, false, or ambiguous data with the intention of confusing an adversary or simply adding to the time or cost of separating bad data from good."). We think the proper metaphor for online obscurity is the key and lock. The key and lock metaphor is well suited to online disputes given the judicial reliance on the digital version of the key: the password. In essence, we simply propose that there is more than one key that can lock information. Indeed, many kinds of keys and locks, each with varying strengths, exist Considered cumulatively, these metaphorical keys and locks fall along a spectrum that will allow courts to make a more nuanced analysis of online information based on a scale of obscurity.
-
(2011)
Vernacular Resistance to Data Collection and Analysis: A Political Theory of Obfuscation
, vol.16
-
-
Brunton, F.1
Nissenbaum, H.2
-
149
-
-
79953885112
-
Reunifying privacy law
-
2039
-
Lior Jacob Strahilevitz, Reunifying Privacy Law, 98 CALIF. L. REV. 2007, 2039 (2010) [hereinafter Strahilevitz, Reunifying Privacy Law] ("As I explained in A Social Networks Theory of Privacy, tort law typically analyzes expectations of privacy through a probabilistic lens."). Therefore, an individual who minimizes the likelihood that the public will discover her information generally enjoys a reasonable expectation of privacy.
-
(2010)
Calif. L. Rev.
, vol.98
, pp. 2007
-
-
Strahilevitz, L.J.1
-
150
-
-
78649943228
-
Pseudonymous litigation
-
1257-59
-
Cf. Lior Jacob Strahilevitz, Pseudonymous Litigation, 77 U. CHI. L. REV. 1239, 1257-59 (2010) [hereinafter Strahilevitz, Pseudonymous Litigation] (describing the importance of using pseudonyms for one or both parties in certain disputes).
-
(2010)
U. Chi. L. Rev.
, vol.77
, pp. 1239
-
-
Strahilevitz, L.J.1
-
151
-
-
84874895744
-
-
(last visited Nov. 10, 2012)
-
Discovery Definition, MACMILLAN DICTIONARY, http://www. macmillandictionary.com/dictionary/british/discovery (last visited Nov. 10, 2012).
-
Discovery Definition
-
-
-
152
-
-
84874818789
-
-
No. 06-5754, 2008 WL 6085437 D.n. J. July 25
-
Note that this is similar to the MySpace group formed in Pietrylo v. Hillstone, No. 06-5754, 2008 WL 6085437 (D.n. J. July 25, 2008). See supra note 147 and accompanying text
-
(2008)
Pietrylo V. Hillstone
-
-
-
156
-
-
33745184635
-
Exploratory search: From finding to understanding
-
Gary Marchionini, Exploratory Search: From Finding to Understanding, 49 COMM. ACM 41 (2006).
-
(2006)
Comm. ACM
, vol.49
, pp. 41
-
-
Marchionini, G.1
-
157
-
-
84874820380
-
-
(last visited Nov. 10, 2012)
-
For example, the popular blogging service Blogger allows users to make their blog invisible to Google. See "Listing" and "Let Search Engines Find Your Blog" Settings, GOOGLE BLOGGER, http://www.google.com/ support/blogger/bin/answer.py?hl=en&answer=41373 (last visited Nov. 10, 2012). Similarly, Facebook profiles that utilize privacy settings are also not found by search engines.
-
Listing" and "Let Search Engines Find Your Blog" Settings
-
-
-
159
-
-
84874855150
-
-
Jan. 29 7:55 AM
-
Restrictions to access are not limited to passwords and privacy settings. Technologies such as biometrics can also effectively restrict access to informatioa See, e.g., Mike Elgan, How Apple and Google Will Kill the Password, COMPUTERWORLD (Jan. 29, 2011, 7:55 AM), http://www.computerworld.com/s/articIe/ 9206998/How-Apple-and-Google-will-kill-the-password-?taxonomyId= 15&pageNumber=2.
-
(2011)
How Apple and Google Will Kill the Password
-
-
Elgan, M.1
-
160
-
-
84861977388
-
Website design as contract
-
1653
-
See, e.g., Woodrow Hartzog, Website Design as Contract, 60 AM. U. L. REV. 1635, 1653 (2011).
-
(2011)
Am. U. L. Rev.
, vol.60
, pp. 1635
-
-
Hartzog, W.1
-
161
-
-
84855656613
-
-
(Columbia Univ. Computer Science, unpublished Technical Report No. CUCS-010-11)
-
Michelle Madejski et al., The Failure of Online Social Network Privacy Settings (2011) (Columbia Univ. Computer Science, unpublished Technical Report No. CUCS-010-11), available at http://academiccommons.columbia.edu/catalog/ac: 135406.
-
(2011)
The Failure of Online Social Network Privacy Settings
-
-
Madejski, M.1
-
163
-
-
77950493360
-
-
June (unpublished Ph.D. dissertation, Lancaster University)
-
Maomao Wu, Adaptive Privacy Management for Distributed Applications (June 2007) (unpublished Ph.D. dissertation, Lancaster University), available at http://eprints.lancs.ac.uk/12984/1/PhdThesis-MaomaoWu.pdf.
-
(2007)
Adaptive Privacy Management for Distributed Applications
-
-
Wu, M.1
-
164
-
-
8644231057
-
Public displays of connection
-
d. boyd 73-77
-
J. Donath & d. boyd, Public Displays of Connection, 22 BT TECH. J. 71 (2004) 73-77;
-
(2004)
Bt Tech. J.
, vol.22
, pp. 71
-
-
Donath, J.1
-
165
-
-
37249053884
-
Social network sites: Definition, history, and scholarship
-
213
-
danah m. boyd & Nicole B. Ellison, Social Network Sites: Definition, History, and Scholarship, 13 J. COMPUTER-MEDIATED COMM. 210, 213 (2007), available at http://jcmc.indiana.edu/vol13/issuel/boyd.elhson.html ("The public display of connections is a crucial component of SNSs. The Friends list contains links to each Friend's profile, enabling viewers to traverse the network graph by clicking through the Friends lists.").
-
(2007)
J. Computer-Mediated Comm.
, vol.13
, pp. 210
-
-
Ellison, N.B.1
-
166
-
-
84874853453
-
-
danah boyd Aug. 23
-
danah boyd, Social Steganography: Learning to Hide in Plain Sight, ZEPHORIA (Aug. 23, 2010), http://www.zephoria.org/thoughts/archives/2010/08/23/ social-steganography-learning-to-hide-in-plain-sight.html.
-
(2010)
Social Steganography: Learning to Hide in Plain Sight
-
-
-
167
-
-
0347660650
-
Social cues and impression formation in CMC
-
See, e.g., Martin Tanis & Tom Postmes, Social Cues and Impression Formation in CMC, 53 J. COMM. 676 (2003);
-
(2003)
J. Comm.
, vol.53
, pp. 676
-
-
Tanis, M.1
Postmes, T.2
-
168
-
-
33947608968
-
Selective self-presentation in computer-mediated communication: Hyperpersonal dimensions of technology, language, and cognition
-
Joseph B. Walther, Selective Self-Presentation in Computer-Mediated Communication: Hyperpersonal Dimensions of Technology, Language, and Cognition, 23 COMPUTERS HUM. BEHAV. 2538(2007).
-
(2007)
Computers Hum. Behav.
, vol.23
, pp. 2538
-
-
Walther, J.B.1
-
169
-
-
84874844252
-
Chain-link confidentiality
-
675
-
In their most extreme forms, confidentiality demands a complete restriction on the dissemination of information and anonymity demands a complete inability to identify a target. See Woodrow Hartzog, Chain-Link Confidentiality, 46 GA. L. REV. 657, 675 (2012);
-
(2012)
Ga. L. Rev.
, vol.46
, pp. 657
-
-
Hartzog, W.1
-
170
-
-
0033244306
-
What's in a name? Some reflections on the sociology of anonymity
-
Gary T. Marx, What's in a Name? Some Reflections on the Sociology of Anonymity, 15 INFO. SOC'Y 99 (1999).
-
(1999)
Info. Soc'Y
, vol.15
, pp. 99
-
-
Marx, G.T.1
-
171
-
-
57349110717
-
"I've got nothing to hide" and other misunderstandings of privacy
-
See, e.g., Daniel J. Solove, "I've Got Nothing to Hide" and Other Misunderstandings of Privacy, 44 SAN DIEGO L. REV. 745 (2007).
-
(2007)
San Diego L. Rev.
, vol.44
, pp. 745
-
-
Solove, D.J.1
-
172
-
-
84874418595
-
-
907 n. Y.S.2d 650, 657 n. Y. Sup. Ct.
-
See, e.g., Romano v. Steelcase, Inc., 907 n. Y.S.2d 650, 657 (n. Y. Sup. Ct. 2010). The court found no reasonable expectation of privacy in social network sites, stating: Thus, when Plaintiff created her Facebook and My Space accounts, she consented to the fact that her personal information would be shared with others, notwithstanding her privacy settings. Indeed, that is the very nature and purpose of these social networking sites else they would cease to exist. Since Plaintiff knew that her information may become publicly available, she cannot now claim that she had a reasonable expectation of privacy. As recently set forth by commentators regarding privacy and social networking sites, given the millions of users, "[i]n this environment, privacy is no longer grounded in reasonable expectations, but rather in some theoretical protocol better known as wishful thinking." Id. (citing
-
(2010)
Romano V. Steelcase, Inc.
-
-
-
173
-
-
84874836471
-
What happens when the college rumor mill goes online? Privacy, defamation and online social networking sites
-
Dana L. Fleming & Joseph M. Herlihy, What Happens When the College Rumor Mill Goes Online? Privacy, Defamation and Online Social Networking Sites, 53 BOS. B.J. 16 (2009)).
-
(2009)
Bos. B.J.
, vol.53
, pp. 16
-
-
Fleming, D.L.1
Herlihy, J.M.2
-
174
-
-
84874880271
-
-
Apr. 17 1:46 PM
-
See, e.g., Adam Thierer, Erasing Our Past on the Internet, FORBES (Apr. 17, 2011, 1:46 PM), http://www.forbes.com/sites/adamthierer/2011/04/17/erasing- our-past-on-the-intemet/; MAYER-SCHÖNBERGER, supra note 13;
-
(2011)
Erasing our Past on the Internet
-
-
Thierer, A.1
-
176
-
-
84874844203
-
Online access to court records-from documents to data, particulars to patterns
-
868
-
The E-Government Act of 2002 instructed that personal identifiers, such as Social Security numbers and names of minor children, be redacted from federal court filings. Pub. L. No. 107-347, 116 Stat 2899 (2002). See also Peter W. Martin, Online Access to Court Records-From Documents to Data, Particulars to Patterns, 53 VILL. L. REV. 855, 868 (2008) ('The privacy concerns articulated in the E-Govemment Act led to a federal court policy and ultimately, effective December 1, 2007, new court rules directing attorneys to avoid the inclusion of certain personal identifying information (including full Social Security numbers) in case documents.").
-
(2008)
Vill. L. Rev.
, vol.53
, pp. 855
-
-
Martin, P.W.1
-
177
-
-
84874865517
-
A look at the commercial privacy bill of rights act of 2011
-
Apr. 20 9:03 AM
-
See, e.g., Venkat Balasubramani, A Look at the Commercial Privacy Bill of Rights Act of 2011, ERIC GOLDMAN: TECH. & MKTG. BLOG (Apr. 20, 2011, 9:03 AM), http:/blog.ericgoldman.org/archives/2011/04/a-look-at-the-c.htm.
-
(2011)
Eric Goldman: Tech. & MKTG. Blog
-
-
Balasubramani, V.1
-
178
-
-
84874822025
-
Breaking down the boucher bill
-
May 12
-
See also Tanya Forsheit, Breaking Down the Boucher Bill, INFORMATION LAW GROUP (May 12, 2010), http://www.infolawgroup.com/2010/05/articles/behavioral- advertising/breaking-down-the-boucher-bill/.
-
(2010)
Information Law Group
-
-
Forsheit, T.1
-
179
-
-
84874916674
-
-
(last visited Nov. 10, 2012)
-
What Does It Mean to File a Suit Pseudonymously?, WITHOUT MY CONSENT, http://www.withoutmyconsent.org/quick-link/what-does-it-mean-file-suit- pseudonymously (last visited Nov. 10, 2012). See Strahilevitz, Pseudonymous Litigation, supra note 188.
-
What Does It Mean to File a Suit Pseudonymously?
-
-
-
180
-
-
77955320294
-
Big brother's little helpers: How choicepoint and other commercial data brokers collect and package your data for law enforcement
-
Commercial data brokers also collect obscure but available information online and should be regulated under this approach. See, e.g., Chris Jay Hoofnagle, Big Brother's Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement, 29 n. C. J. INT'L L. & COM. REG. 595 (2004);
-
(2004)
C. J. Int'l L. & Com. Reg.
, vol.29
, pp. 595
-
-
Hoofnagle, C.J.1
-
183
-
-
0038405113
-
-
(last visited Nov. 10, 2012)
-
OECD Guidelines on the Protection of Privacy and the Transborder Flows of Personal Data, OECD, http://www.oecd.org/document/18/0,2340,en-2649-34255- 1815186-1-1-1-1,00.html (last visited Nov. 10, 2012) (setting forth data privacy guidelines for industry and governments that enable the transborder transfer of information).
-
OECD Guidelines on the Protection of Privacy and the Transborder Flows of Personal Data
-
-
-
184
-
-
84874840734
-
-
Oct. 11 4:52 PM
-
Plaintiffs in privacy disputes have an increasingly difficult time collecting monetary damages. See, e.g., Daniel J. Solove, The Slow Demise of Defamation and the Privacy Torts, HUFFINGTON POST (Oct. 11, 2010, 4:52 PM), http://www.huffingtonpost.com/daniel-j-solove/the-slow-dernise-of-defama-b- 758570.html.
-
(2010)
The Slow Demise of Defamation and the Privacy Torts
-
-
Solove, D.J.1
-
186
-
-
84874899971
-
-
(last visited Nov. 10, 2012)
-
See REPUTATION.COM, http://www.reputation.com/reputationdefender (last visited Nov. 10, 2012). One physician hired Online Reputation Manager, "a company that helps clients push down unfavorable content in search engine results. The effort has crowded out coverage of [a research] scandal and retraction notices on medical journals' websites."
-
-
-
-
188
-
-
77949749376
-
Rethinking spyware: Questioning the propriety of contractual consent to online surveillance
-
See, e.g., Wayne R. Barnes, Rethinking Spyware: Questioning the Propriety of Contractual Consent to Online Surveillance, 39 U.C. DAVIS L. REV. 1545 (2006);
-
(2006)
U.C. Davis L. Rev.
, vol.39
, pp. 1545
-
-
Barnes, W.R.1
-
189
-
-
50649122437
-
Online privacy policies: Contracting away control over personal information?
-
Allyson W. Haynes, Online Privacy Policies: Contracting Away Control over Personal Information?, 111 PENn. ST. L. REV. 587 (2007);
-
(2007)
Penn. St. L. Rev.
, vol.111
, pp. 587
-
-
Haynes, A.W.1
-
190
-
-
76049128005
-
Technoconsen(t)sus
-
Andrea M. Matwyshyn, Technoconsen(t)sus, 85 WASH. U. L. REV. 529 (2007).
-
(2007)
Wash. U. L. Rev.
, vol.85
, pp. 529
-
-
Matwyshyn, A.M.1
-
191
-
-
0141641037
-
Advantage ISP: Terms of service as media law
-
See, e.g., Sandra Braman & Stephanie Roberts, Advantage ISP: Terms of Service as Media Law, 5 NEW MEDIA & SOC'Y 422 (2003);
-
(2003)
New Media & Soc'Y
, vol.5
, pp. 422
-
-
Braman, S.1
Roberts, S.2
-
192
-
-
33846305796
-
Terms of use
-
460
-
Mark A. Lemley, Terms of Use, 91 MINn. L. REV. 459, 460 (2006);
-
(2006)
MINn. L. Rev.
, vol.91
, pp. 459
-
-
Lemley, M.A.1
-
193
-
-
33745657826
-
Kiss and tell: Protecting intimate relationship privacy through implied contracts of confidentiality
-
Andrew J. McClurg, Kiss and Tell: Protecting Intimate Relationship Privacy Through Implied Contracts of Confidentiality, 74 U. CIn. L. REV. 887 (2006);
-
(2006)
U. CIn. L. Rev.
, vol.74
, pp. 887
-
-
McClurg, A.J.1
-
194
-
-
84874867755
-
-
Mar. 29 (Ass'n for the Advancement of Artificial Intelligence Press, unpublished Technical Report No. SS-10-05)
-
Nancy S. Kim, 'Wrap Contracts and Privacy 1 (Mar. 29, 2010) (Ass'n for the Advancement of Artificial Intelligence Press, unpublished Technical Report No. SS-10-05), available at http://papers.ssm.com/so13/papers.cfm?abstract-id= 1580111.
-
(2010)
Wrap Contracts and Privacy
, vol.1
-
-
Kim, N.S.1
-
195
-
-
84872659143
-
-
(last visited Nov. 10, 2012)
-
About the Licenses, CREATIVE COMMONS, http://creativecommons.org/ licenses/ (last visited Nov. 10, 2012).
-
About the Licenses
-
-
-
196
-
-
84874850686
-
-
(last visited Nov. 10, 2012)
-
See, e.g., Posting, TUMBLR, http://www.tumblr.com/docs/en/posting (last visited Nov. 10, 2012);
-
Posting
-
-
-
197
-
-
84874857954
-
-
(last visited Nov. 10, 2012)
-
Tagging Photos, PICASA, http://support.google.com/picasa/answer/106209/? & (last visited Nov. 10, 2012);
-
Tagging Photos
-
-
-
198
-
-
84874869947
-
-
(last visited Nov. 10, 2012)
-
What Is Tagging and How Does It Work?, FACEBOOK, https://www.facebook. com/help/?feq=13407 (last visited Nov. 10, 2012) (discussing how to tag posts).
-
What is Tagging and How Does It Work?
-
-
|