Skip to main content

Privacy, technology, and social change

This is a preview of subscription content, access via your institution.

References

  • ACM (2003). “Letter to Senators John Warner and Carl Levin,” by U.S. Public Policy Committee of the Association for Computing Machinery, on ACM web site, 23 January at 〈http://www.acm.org/usacm/Letters/tia_final.html〉. (Accessed 7 February 2003.)

  • Agre, P. and Rotenberg, M. (eds.) (1997). Technology and Privacy: The New Landscape, Cambridge: MIT Press.

    Google Scholar 

  • Allen, A. (1988). Uneasy Access: Privacy for Women in a Free Society, Totowa, N.J.: Rowman and Littlefield.

    Google Scholar 

  • Ashcroft Announcement (2001). “Attorney General Ashcroft and Deputy Attorney General Thompson Announce Reorganization and Mobilization of the Nation’s Justice and Law Enforcement Resources,” on DOJ website, 8 November at 〈http://www.usdoj.gov/ag/speeches/2001/agcrisisremarks11_08.htm〉. (Accessed 31 December 2002.)

  • Ashcroft Testimony (2001). “DOJ Oversight: Preserving Our Freedoms While Defending Against Terrorism,” on DOJ website, 6 December at <http://judiciary.senate.gov/testimony.cfm?id=128&wit_id=85>. (Accessed 10 February 2003.)

  • Attorney General’s Remarks (2001). “Attorney General John Ashcroft Remarks Following his Tour of the Pentagon,” on DOJ web site, 09-19-01 at 〈http://www.usdoj.gov/ag/speeches/2001/0919remarkstourpentagon.htm〉. (Accessed 5 February 2003.)

  • Attorney General’s Remarks (2002). “Attorney General John Ashcroft Remarks to International Association of Chiefs of Police Conference,” on DOJ web site, 4 October at 〈http://www.usdoj.gov/ag/speeches/2002/100702chiefsofpolicemn1.htm〉. (Accessed 5 February 2003.)

  • Best, J. (1987). “Rhetoric in Claims-Making: Constructing the Missing Children Problem” in Social Problems 34: 101–121.

    Article  Google Scholar 

  • Best, J. (1990). Threatened Children: Rhetoric and Concern About Child-Victims, Chicago: University of Chicago Press.

    Google Scholar 

  • Bloustein, E. (1964). “Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser,” in New York University Law Review 39: 962–1007.

    Google Scholar 

  • Brin, D. (1998). The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom?, Reading, MA: Addison-Wesley.

    Google Scholar 

  • Chronicle (2003). “Editorial: Spying by Any Name,” in The San Francisco Chronicle, 26 May at 〈http://www.sfgate.com/cgi-bin/article.cgi?f=/chronicle/a/2003/05/26/ED272707.DTL〉, (Accessed 26 January 2004.)

  • Church Committee (1976). “Intelligence Activities and the Rights of Americans: Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities,” on cointelpro.org website, 26 April at 〈http://www.derechos.net/paulwolf/cointelpro/cointel.htm〉. (Accessed 18 November 2003.)

  • DeCew, J. (1997). In Pursuit of Privacy: Law, Ethics, and the Rise of Technology, Ithaca: Cornell University Press.

    Google Scholar 

  • DeCew, J. (2002). “Privacy,” Stanford Encyclopedia of Philosophy, at 〈http://plato.stanford.edu/entries/privacy/〉. (Accessed 14 January 2004.)

  • Etzioni, A. (2000). The Limits of Privacy, New York: Basic Books.

    Google Scholar 

  • Fried, C. (1970). An Anatomy of Values, Cambridge: Harvard University Press.

    Google Scholar 

  • Friedrich, C. (1971). “Security versus Privacy: The Democratic Dilemma,” in Pennock, J. and Chapman, J. (eds.) Privacy, Nomos Series 13, Yearbook of the American Society for Political and Legal Philosophy, New York: Atherton Press, 105–120.

    Google Scholar 

  • Gaboury, F. (2001). “ACLU and AFL-CIO Blast Ashcroft” in People’s Weekly World Newspaper Online, at 〈http://www.pww. org/article/view/323/1/30/〉. (Accessed 7 Feburary 2003.)

  • Gusfield, J. (1963). Symbolic Crusade: Status Politics and the American Temperance Movement, Urbana: University of Illinois Press.

    Google Scholar 

  • Gusfield, J. (1967). “Moral Passage: The Symbolic Process in Public Designations of Deviance,” in Social Problems 15: 175–188.

    Article  Google Scholar 

  • Gusfield, J. (1968). “On Legislating Morals: The Symbolic Process of Designating Deviance,” in California Law Review 58: 54–73.

    Article  Google Scholar 

  • Gusfield, J. (1981). The Culture of Public Problems: Drinking-Driving and the Symbolic Order, Chicago: University of Chicago Press.

    Google Scholar 

  • Gusfield, J. (1984). “On the Side: Practical Action and Social Constructivism in Social Problems Theory,” in Schneider, W. and Kitsuse, J. (eds.) Studies in the Sociology of Social Problems, Norwood, NJ: Ablex, 31–51.

    Google Scholar 

  • Hatch, O. (2001). “Statement,” DOJ Oversight: Preserving Our Freedoms While Defending Against Terrorism, 6 December at <http://www.senate.gov/~judiciary/print_member_statement.cfm?id=121&wit_id=51>. (Accessed 7 February 2003.)

  • Hudson, A. (2003). “Congress Kills Data-Mining Computer Program,” in The Washington Times, at 〈http://www.washingtontimes.com/national/20030925-115156-7992r.htm〉. (Accessed 21 January 2004.)

  • Inness, J. (1992). Privacy, Intimacy, and Isolation, Oxford: Oxford University Press.

    Google Scholar 

  • Kitsuse J. (1980). “Coming Out All Over: Deviance and the Politics of Social Problems” in Social Problems 28: 1–13.

    Article  Google Scholar 

  • Leahy, P. (2001). “Statement,” DOJ Oversight: Preserving Our Freedoms While Defending Against Terrorism, 6 December at <http://www.senate.gov/~judiciary/print_member_statement.clm?id=121&wit_id=50>. (Accessed 7 February 2003.)

  • Leahy, P. (2004). “Comments of Sen. Patrick Leahy on the TIA Data Mining Program Report to Congress” in IWS—The Information Warfare Site, at <http://www.iwar.org.uk/news-archive/tia/leahy.htm>. (Accessed 26 January 2004.)

  • Liptak, A. (2002). “The Nation: Citizen Watch; In the Name of Security, Privacy for Me, Not Thee,” in The New York Times, 24 November at <http://query.nytimes.com/search/restricted/article?res=F30A14F7385D0C778EDA80994DA404482>. (Accessed 26 January 2004.)

  • Lyon, D. (2003). Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, New York: Routledge.

    Google Scholar 

  • MacKinnon, C. (1989). Toward a Feminist Theory of the State, Cambridge: Harvard University Press.

    Google Scholar 

  • Mayle, A. and Knott, A. (2003). “Total Business Awareness: The Corporate Contracting behind John Poindexter’s Total Information Awareness Program,” in Multinational Monitor, Jan/Feb, Volume 24, Numbers 1 & 2. at <http://multinationalmonitor.org/mm2003/03jan-feb/janfeb03corp3.html>. (Accessed 1 February 2004.)

  • McCann, M. (1996). “Causal versus Constitutive Explanations (or, On the Difficulty of Being So Positive….),” in Law & Social Inquiry 21(2): 457–482.

    Google Scholar 

  • McCullagh, D. (2002). “Federal Database Spy Site Fading Away,” in News. Com, 20 December at <http://news.com.com/2102-1023_3-978598.html>. (Accessed on 1 February 2004.)

  • McCullagh, D. (2003). “Republican Senator Slams Database Plan,” 22 January at <http://news.com.com/2100-1023-981753.html>. (Accessed 1 February 2004.)

  • Merry S. (1995). “Resistance and the Cultural Power of Law” in Law & Society Review 29: 11–26.

    Article  Google Scholar 

  • Parent, W. (1983). “Privacy, Morality, and the Law,” in Philosophy and Public Affairs 12: 269–288.

    Google Scholar 

  • Phillips, D. and Curry, M. (2003). “Privacy and the phenetic urge: Geodemographics and the changing spatiality of local practice,” in Lyon, D. (ed.) Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, New York: Routledge, 137–152.

    Google Scholar 

  • Prosser, W. (1960). “Privacy,” in California Law Review 48: 383–423.

    Article  Google Scholar 

  • Rachels, J. (1975). “Why Privacy is Important,” in Philosophy and Public Affairs 4: 323–333.

    Google Scholar 

  • Regan, P. (1995). Legislating Privacy: Technology, Social Values, and Public Policy, Chapel Hill: The University of North Carolina Press.

    Google Scholar 

  • Rice Testimony (2004). “Testimony of Condoleezza Rice Before 9/11 Commission,” in The New York Times, 8 April at <http://www.nytimes.com/2004/04/08/politics/08RICE-TEXT.html>. (Accessed 10 April 2004.)

  • Rosen, J. (2004). “How to Protect America, and Your Rights,” in The New York Times, 6 February at <http://query.nytimes.com/gst/abstract.html?res=F60613FC3B5F0C758CDDAB0894DC404482>. (Accessed 26 February 2004.)

  • Rosenzweig, P. (2004). “Congress Should not Prematurely Short-Circuit the Total Information Awareness Program,” on Heritage Foundation web site at <http://www.heritage.org/Research/HomelandDefense/em853.cfm>. (Accessed 26 January 2004.)

  • Scanlon, T. (1975). “Thomson on Privacy,” in Philosophy and Public Affairs 4: 315–322.

    Google Scholar 

  • Schneider, J. (1978). “Deviant Drinking as Disease: Alcoholism as Social Accomplishment,” in Social Problems 25: 361–372.

    Article  Google Scholar 

  • Schneider, J. (1984). “Morality, Social Problems, and Everyday Life,” in Schneider, W. and Kitsuse, J. (eds.) Studies in the Sociology of Social Problems, Norwood, NJ: Ablex, 180–206.

    Google Scholar 

  • Schneider, J. (1985). “Social Problems Theory: The Constructionist View” in Annual View of Sociology 11: 209–229.

    Article  Google Scholar 

  • Schoeman, F. (1992). Privacy and Social Freedom, Cambridge: Cambridge University Press.

    Google Scholar 

  • Seper, J. (2003). “Grassley Airs Concerns over Tracking System,” in The Washington Times, 22 January at <http://nl.newsbank.com/nl-search/we/Archives?p_product=WT&p_theme=wt&p_action=search&p_maxdocs=200&p_text_search-0= grassley%20AND%20airs%20AND%20concerns&sdispstring=grassley%20airs%20concerns%20AND%20date(2003)&p_field_date0=YMD_date&p_params_date-0= date:B,E&p_text_date-0=2003&p_perpage=10&p_sort=YMD_date:D&xcal_useweights=no>. (Accessed 26 January 2004.)

  • Simmel, A. (1971). “Privacy Is not an Isolated Freedom,” in Pennock, J. and Chapman, J. (eds.) Privacy, Nomos Series 13, Yearbook of the American Society for Political and Legal Philosophy, New York: Atherton Press, 71–87.

    Google Scholar 

  • Singel, R. (2003). “Pentagon Defends Data Search Plan,” in Wired News, at 〈http://www.wired.com/news/privacy/0,1848,58936.html〉. (Accessed 26 January 2003.)

  • Spector, M. and Kitsuse, J. (1973). “Social Problems: A Reformulation,” in Social Problems 21: 145–190.

    Article  Google Scholar 

  • Spector, M. and Kitsuse, J. (1977). Constructing Social Problems, Menlo Park, CA: Cummings.

    Google Scholar 

  • Spector, M. and Kitsuse, J. (1997). “Social Problems: A Re-formulation,” in Social Problems 21: 145–159.

    Article  Google Scholar 

  • Spector, M. and Kitsuse, J. (2001). Constructing Social Problems, New Brunswick: Transaction Publishers.

    Google Scholar 

  • Thompson, D. (2002). “What Price Freedom: Developing the Capability to Build Dossiers on All Americans,” in Capital Hill Blue, 21 November at 〈http://www.capitolhillblue.com/artman/publish/article_1647.shtml〉. (Accessed 1 February 2004.)

  • Thomson, J. (1975). “The Right to Privacy,” in Philosophy and Public Affairs 4: 295–314.

    Google Scholar 

  • Toner, R. and Elder, J. (2004). “Poll Bolsters Bush on Terrorism but Finds Doubts on Economy,” in The New York Times, 18 January at 〈http://www.nytimes.com/2004/01/18/politics/campaigns/18POLL.html?ex=1389762000&en=6fa728883730bfc1&ei=5007& partner=USERLAND〉. (Accessed 18 January 2004.)

  • Warren, S. and Brandeis, L. (1890), “The Right to Privacy” in Harvard Law Review, 4: 193–220.

    Article  Google Scholar 

  • Westin, A. (1967), Privacy and Freedom, New York: Atheneum.

    Google Scholar 

  • Wyden, R. (2003), “Wyden Wins Fight to Curb Government Snooping: ‘Total Information Awareness’ Amendment Slated to Become Law,” on web site of Sen. Wyden, at 〈http://wyden.senate.gov/media/2003/02132003_tia.html〉. (Accessed 26 January 2004.)

Download references

Author information

Authors and Affiliations

Authors

Additional information

With John Dombrink, he is coauthor of the book Dying Right: The Death with Dignity Movement (2001), a study of physician assisted suicide in state and federal statehouses, courts, and legislatures. Building on his interests in agenda setting and policy innovation in local, state, and national politics, Daniel is researching and writing about privacy, technology, and law enforcement, as well as the ethical, legal, and social implications of human genome policy.

She won an Undergraduate Assistantship for the academic year 2003–2004, during which she co-authored this article, and assisted in editing this theme issue of KT&P. Sarah recently exhibited a poster on the topic of human genome policy at the SIUC Undergraduate Research Forum. She is also a winner of the Center’s 2004 Outstanding Senior Award.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Hillyard, D.P., Knight, S.M. Privacy, technology, and social change. Know Techn Pol 17, 81–101 (2004). https://doi.org/10.1007/BF02687078

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02687078

Keywords

  • Civil Liberty
  • Homeland Security
  • Attorney General
  • Defense Advance Research Project Agency
  • Defense Advance Research Project Agency