ORPP logo
Image from Google Jackets

Nothing to Hide : The False Tradeoff Between Privacy and Security.

By: Material type: TextTextPublisher: New Haven : Yale University Press, 2011Copyright date: ©2011Edition: 1st edDescription: 1 online resource (257 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780300177251
Subject(s): Genre/Form: Additional physical formats: Print version:: Nothing to HideDDC classification:
  • 342.7308/58
LOC classification:
  • KF1262 -- .S663 2011eb
Online resources:
Contents:
Cover -- Contents -- Preface -- 1 Introduction -- PART I: Values: How We Should Assess and Balance the Values of Privacy and Security -- 2 The Nothing-to-Hide Argument -- 3 The All-or-Nothing Fallacy -- 4 The Danger of Deference -- 5 Why Privacy Isn't Merely an Individual Right -- PART II: Times of Crisis: How the Law Should Address Matters of National Security -- 6 The Pendulum Argument -- 7 The National-Security Argument -- 8 The Problem with Dissolving the Crime-Espionage Distinction -- 9 The War-Powers Argument and the Rule of Law -- PART III: Constitutional Rights: How the Constitution Should Protect Privacy -- 10 The Fourth Amendment and the Secrecy Paradigm -- 11 The Third Party Doctrine and Digital Dossiers -- 12 The Failure of Looking for a Reasonable Expectation of Privacy -- 13 The Suspicionless-Searches Argument -- 14 Should We Keep the Exclusionary Rule? -- 15 The First Amendment as Criminal Procedure -- PART IV: New Technologies: How the Law Should Cope with Changing Technology -- 16 Will Repealing the Patriot Act Restore Our Privacy? -- 17 The Law-and-Technology Problem and the Leave-It-to-the-Legislature Argument -- 18 Video Surveillance and the No-Privacy-in-Public Argument -- 19 Should the Government Engage in Data Mining? -- 20 The Luddite Argument, the Titanic Phenomenon, and the Fix-a-Problem Strategy -- 21 Conclusion -- Notes -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- Y -- Z.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Contents -- Preface -- 1 Introduction -- PART I: Values: How We Should Assess and Balance the Values of Privacy and Security -- 2 The Nothing-to-Hide Argument -- 3 The All-or-Nothing Fallacy -- 4 The Danger of Deference -- 5 Why Privacy Isn't Merely an Individual Right -- PART II: Times of Crisis: How the Law Should Address Matters of National Security -- 6 The Pendulum Argument -- 7 The National-Security Argument -- 8 The Problem with Dissolving the Crime-Espionage Distinction -- 9 The War-Powers Argument and the Rule of Law -- PART III: Constitutional Rights: How the Constitution Should Protect Privacy -- 10 The Fourth Amendment and the Secrecy Paradigm -- 11 The Third Party Doctrine and Digital Dossiers -- 12 The Failure of Looking for a Reasonable Expectation of Privacy -- 13 The Suspicionless-Searches Argument -- 14 Should We Keep the Exclusionary Rule? -- 15 The First Amendment as Criminal Procedure -- PART IV: New Technologies: How the Law Should Cope with Changing Technology -- 16 Will Repealing the Patriot Act Restore Our Privacy? -- 17 The Law-and-Technology Problem and the Leave-It-to-the-Legislature Argument -- 18 Video Surveillance and the No-Privacy-in-Public Argument -- 19 Should the Government Engage in Data Mining? -- 20 The Luddite Argument, the Titanic Phenomenon, and the Fix-a-Problem Strategy -- 21 Conclusion -- Notes -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- Y -- Z.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.