A Taxonomy of Privacy: Repose, Sanctuary, and Intimate Decision

@article{Bostwick1976ATO,
  title={A Taxonomy of Privacy: Repose, Sanctuary, and Intimate Decision},
  author={Gary L. Bostwick},
  journal={California Law Review},
  year={1976},
  volume={64},
  pages={1447}
}
In this Comment the author suggests that the right of privacy in fact encompasses three separate and distinct rights. Unless the three interests are viewed discretely and analyzed within the appropriate framework, privacy becomes a catchall phrase, protecting too little because it protests too much. The Comment subdivides privacy into its three components-repose, sanctuary, and intimate decisionand provides a guide to aid in proper classification and analysis of privacy claims. 
Privacy as a Human Right: A Sociological Theory
Drawing on Durkheim, Simmel, and Luhmann, this article grounds the polysemic character of privacy and its contingent legal determination in the functional differentiation of social communicationExpand
A typology of privacy
Despite the difficulty of capturing the nature and boundaries of privacy, it is important to conceptualize it. Some scholars develop unitary theories of privacy in the form of a unified conceptualExpand
Implications of the Constitutional Right of Privacy for the Control of Drugs
Probably no Constitutional issue has created as much interest in academic circles over the past several years as has the development of the Constitutional right of privacy and, with the exception ofExpand
Privacy, Democracy and the Politics of Disease Surveillance
Surveillance is a cornerstone of public health. It permits us to recognize disease outbreaks, to track the incidence and prevalence of threats to public health, and to monitor the effectiveness ofExpand
Bargaining for your privacy in the information age: Systematic factors undermining the equity of user-company online information transactions
  • Peter Glazer, Jonathan Straus
  • Economics
  • Proceedings of PICMET '14 Conference: Portland International Center for Management of Engineering and Technology; Infrastructure and Service Integration
  • 2014
Consumer privacy and protection of personal information are among the forefront of emerging complex social issues in the internet age. This growing threat to consumers' safety and security is framedExpand
Legal Framework for Data Mining and Privacy
This chapter explores the foundations of the legal right to privacy in the United States, juxtaposed against the accumulation and mining of data in today’s society. Businesses and government agenciesExpand
Of Minds and Bodies and the Legal-Spatial Constitution of Sanctuary
Examination of the notion of sanctuary, whether invoked in reference to persecution, refugees, and asylum or as encountered in less extraordinary contexts as a function or fruit of privacy, offersExpand
Information Privacy in Two Dimensions - Towards a Classification Scheme for Information Privacy Research
  • K. Reddy, H. Venter
  • Computer Science
  • 2010 IEEE Second International Conference on Social Computing
  • 2010
TLDR
The classification scheme presented consists of two broad dimensions that are designed to classify information research from various academic disciplines and is presented by presenting, discussing and demonstrating such a classification scheme. Expand
Information Control
In America today there are government or corporation officials who .have eavesdropped on telephone calls (Wise, 1976; &dquo;AT & T monitored millions of calls,&dquo; 1975; Shapley, 1977), keptExpand
Patients’ perceptions of privacy and their outcomes in healthcare
The purpose of this study is two-fold: 1) to develop a measurement instrument of patient perceptions of privacy in the healthcare sector; 2) to empirically investigate the outcomes of privacy.Expand
...
1
2
3
...