The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom?
Page 52
costs and benefits of
dangers of
defined
gender-based attitudes toward
history of
vs. pseudonymity
remailers and
AOL, databases of
Applied Cryptography
Arnett, Nick
ARPANET
Arquilla, John
Artificial nose
ASCAP
At Large
Audio surveillance
Australia, privacy protections in
Authority
accountability and
suspicion of
Back doors
Bacon, Francis
Banks, Iain M.
Baran, Paul
Barlow, John Perry
Barram, David
Baruch, Bernard
BBC World Service
Bernal, J. D.
Berra, Yogi
Bill of Rights
Biology, future of
Biometric identification
Bit taxes
Blackmail, fighting
Blaze, Matthew
Bly, Nelly
Body odor parsing
Bohr, Niels
Bork, Robert H.
Brain, evolution of
Branch Davidians
Brand, Stewart
Brandeis, Louis D.
Branscomb, Anne Wells
Brin, David
Brin, David (another)
Bronowski, Jacob
Brunner, John
Burke, James
Burns, Ken
Bush, Vannevar
Business
accountability of
relation to open society
threat to privacy by
Cable television, encryption in
Caller ID,
Cameras, miniature
Cameron, James
Campbell, John W.
Campbell, Joseph
Canada, privacy protections in
Capitalism, characteristics of
Carroll, Lewis
Cash flow, electronic tracking of
Cassini mission, NASA
Caste rule, danger of
Cato Institute
Census, privacy issues in
Center for Democracy and Technology
CERT (Computer Emergency Response Team)
Certification authorities
Chaum, David
Chemical companies, accountability of
Chicago police, privacy violations of
Children, video surveillance of
China, imperial
meritocracy of
Ciphers. See also Encryption
Citizen truth squads
Civilizing Cyberspace
Clarke, Roger
Clipper chip
government backing of
media scuttling of
procedural issues regarding
reasoning behind
Clipper II,
Cold War
Commerce, digitally based
Common carriers, vs. publishers
Commons, metaphor of
Communications Decency Act
unconstitutionality of
Computers, Freedom, and Privacy (CFP)
Concealed-weapons detectors
Concealment, value of
Conformity, spurs to
Constitution
original goals of
privacy issues in
Consumer Credit Database
Consumer groups
Consumer Reports
Control, perceptions of
Cooper, Jeff
Copyright
future of
history of
suggestions to implement
suggestions to replace
Crackers
Creative Incentive Coalition (CIC)
Creativity, future of
Credibility ratings
Credit ratings
Crime
attitudes toward
penalties for
statistics on
Criticism
difficulties surrounding
importance of
Cryptography. See also Encryption
basics of
future of
Currency, electronic
Cyberaristocracy
Cyberjocks
Cybermarketplace
Cyberpunks
Cyberwar
Cypherpunk Manifesto
Cypherpunks
DARPA (U.S. Defense Advanced Research Projects Agency)
Data impresarios
Data smog
on Internet
Databases
lack of public access to
proliferation of
Dawkins, Richard
Declaration of Independence, original goals of
Declaration of Independence for Cyberspace
Declassification of documents
Defense Department, hacker attacks on
Delphi polling
Demarchy
Democracy
ancient
evolution of
hardiness of
warand
Democracy against Itself
Denning, Dorothy
DES (data encryption standard), cracking of
Descartes, René
Detectives, abuse by
Deterrence, against crime
Devil’s dichotomies
Dialogues
Dickens, Charles
Diffie, Whitfield
Digital Future Coalition (DFC)
Digital signatures
Dilbert Future, The
Dirty Harry
Disclosure of private facts, as tort
Disputations
modern
DNA, ownership issues regarding
Dossier society, possibilities for
Doyle, Michael W.
Drug testing, workplace
Du Pont, Pierre
“Dudgeon addiction,”
drawbacks of
Dyson, Esther
Dyson, Freeman
e-mail. See Internet
e-mail stalking
Earth
ecash
disadvantages of
open transactions and
Eco, Umberto
Economic Espionage Act
Eisenhower, Dwight D.
Electronic Frontier Foundation (EFF)
Electronic Privacy Information Center (EPIC)
reading list of
Electronic tagging
Encryption
back doors and
Clipper chip and
government attitudes toward
history of
insecurity of
as protection against tyranny
public-key
regulation of
taxation of
trusted third party
Engineered society, possibilities for
Enigma encryption
Equifax Corp.
EU, privacy guidelines of
European model of data protection
Exhortation, ineffectiveness of
Experian
Extortion
Face recognition systems
Fair Credit Reporting Act
Fair use, doctrine of
False light, as tort
Falsification
FBI, privacy violations of
Federalist Papers
Fingerprinting systems
Finney, Hal
Firewalls
Flames, defined
Florence, medieval
Forecasting, assessing
Forest Journey
Foster, Vincent
Frailty thesis
Frankenstein syndrome
Franklin, Benjamin
Freedman, David
Freedom
history of
relation to privacy
Freedom of Information Act (FOIA)
Freedom of speech,
reasons for
Freeh, Louis
Gabriel, Peter
Galileo
Game theory
Garfinkel, Simson
Gates, Bill
GATT (General Agreement on Tariffs and Trade)
Gedankenexperimenten
Gibson, William
Gilmore, John
Gingrich, Newt
Givens, Beth
Global Information Infrastructure (GII)
Global Positioning Systems (GPS)
Godwin, Michael
Golding, William
Gore, Al
on cryptography
Government
attitudes toward encryption
future of
monopolies of
open society’s effect on
relation to open society
Great Game of Business: Unlocking the Power and Profitability of Open-Book Management
Gulliver’s Travels
Gutenberg, Johannes
Hacker Crackdown
Hackers
Hamilton, Alexander
Hand geometry
Hanson, Robin
Harbs, Christine
Hardin, Garrett
Heaven’s Gate
Hegel, G. W. F.
Heinlein, Robert
Heisenberg uncertainty principle
Helsingius, Johan
Helsinki incident
Henry, Buck
Hitler, Adolf
HIV, as privacy issue
Hoover, J. Edgar
Hughes, Eric
Human Genome Project
Human nature
aspects of
in opposition to open society
Human rights, self-interest and
Hussein, Saddam
“I See You,”
Ideas
criticism as essential to
enlightened ideas about
fostering rebellion
good or evil as inherent in
perceived toxicity of
Identity
fraud regarding
theftof
Ideologs, birth of
Individualism
Internet and
Information
asymmetric flow of
commercial traffic in
as commodity
as “currency,”
financial value of
and freedom
importance of free flow of
increasing flow of
municipal supply of
obstruction of flow of
ownership of
persistence of
World Wide Web
Information Age
Information systems, vulnerability of
Informers
Innovation, changing attitudes toward
Intellectual property
history of
future of
Intellectual property law
Internal Revenue Service, abuses by
Internet
addresses of
and aficionados
“anarchy” of
anonymity on
chaos and redundancy in
creativity on
data smog on
debate on
dirty tricks on
dystopic visions of
growing pains of
history of
idealistic visions of
individuality and
integrative capabilities of
international aspect of
lying on
netiquette on
obstruction of data flow on
personal information collection on
as populist tool
proposals to tax
risksinvolved in
security breaches in
Intimacy, defined
Intrusion, as tort
Inventions, encouragement of
Jackson, Steve
James, William
Japan
privacy protections in
video surveillance in
Jefferson, Thomas
Jones, Stefan
Jonestown
Juror anonymity
Juvenal
Kantrowitz, Arthur
Kaplan, Robert D.
Katz, Jon
Keillor, Garrison
Kelly, Kevin
Kennedy, Caroline
Kennedy, John F.
Kevs
escrow holding of
length of
Keystroke dynamics
Kidnapping, fighting
Kindercam
King, Martin Luther
King, Rodney
King’s Lynn, video surveillance in
Kissinger, Henry
Knight, Damon
Knowledge. See Information
!Kung people
Lanier, Jaron
Lawyers
Learning, theory of
Lending institutions, accountability of
Leopold, King of Belgium
Levy, Steven
Lexis-Nexis Corp.
Liberal education
Libertarian Party
Liberty, and privacy
Liddy, G. Gordon
Lie detectors
gender-based attitudes toward
Limbaugh, Rush
Lord of the Flies
Love, American Style