Further Reading: What Is Privacy? Definitions and Debates
The sources below provide deeper engagement with the themes introduced in Chapter 7. They are organized by topic and include a mix of foundational texts, empirical research, legal analyses, and accessible works of public scholarship. Annotations describe what each source covers and why it is relevant to the chapter's core questions.
Foundational Privacy Theories
Warren, Samuel D., and Louis D. Brandeis. "The Right to Privacy." Harvard Law Review 4, no. 5 (1890): 193-220. The article that launched the modern legal concept of privacy. Warren and Brandeis argued for a tort remedy to protect "the right to be let alone" against intrusions enabled by new technologies (portable cameras and mass-circulation newspapers). The piece is historically indispensable and surprisingly readable for a 19th-century law review article. Reading it alongside the chapter's discussion of its limitations (Section 7.1.2) reveals how much the concept of privacy has evolved — and how much the underlying concern about technology outpacing law has not.
Westin, Alan F. Privacy and Freedom. New York: Atheneum, 1967. The foundational text for the "privacy as control" framework examined in Section 7.2. Westin redefines privacy as the right to determine when, how, and to what extent personal information is communicated, and identifies four states of privacy: solitude, intimacy, anonymity, and reserve. Written during the Cold War amid concerns about government surveillance and the emerging computer database, the book is remarkably prescient. Its discussion of anonymity and reserve anticipates the digital-age threats that would not materialize for decades.
Nissenbaum, Helen. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford: Stanford University Press, 2010. The most influential reconceptualization of privacy in the digital age. Nissenbaum argues that privacy is not about secrecy or control but about appropriate information flow within social contexts, governed by established informational norms. The book provides the theoretical framework applied throughout Chapter 7 (Sections 7.3.1-7.3.3) and offers detailed case analyses demonstrating how contextual integrity can evaluate data practices that other frameworks miss. Essential reading for anyone serious about privacy theory.
Solove, Daniel J. Understanding Privacy. Cambridge, MA: Harvard University Press, 2008. Solove argues that privacy is not a single concept but a cluster of related problems — information collection, processing, dissemination, and invasion — each requiring different analytical and legal tools. His taxonomy provides the intellectual scaffolding for the chapter's argument that multiple privacy theories are needed, not just one. The book is rigorous but accessible, and its engagement with the "nothing to hide" argument anticipates the fuller treatment in Solove's later work (see below).
The "Nothing to Hide" Debate
Solove, Daniel J. Nothing to Hide: The False Tradeoff Between Privacy and Security. New Haven: Yale University Press, 2011. The definitive scholarly response to the "nothing to hide" argument, and the primary source for the seven responses in Section 7.4.2. Solove demonstrates that the argument rests on a narrow, reductive conception of privacy as secrecy and systematically dismantles it from multiple angles — philosophical, legal, and practical. Written for an educated general audience, the book is an ideal starting point for students who found the seven responses compelling and want to see them developed in full.
Schneier, Bruce. "The Eternal Value of Privacy." Wired, May 18, 2006. A concise, widely cited essay by one of the world's leading security experts. Schneier argues that privacy is essential for democracy, intellectual freedom, and human dignity — a compressed version of the arguments developed across Sections 7.4 and 7.6. At fewer than 1,500 words, it is the single best short reading for students who want a quick, persuasive response to the "nothing to hide" argument.
Privacy, Law, and the Digital Age
Carpenter v. United States, 585 U.S. ___, 138 S. Ct. 2206 (2018). The Supreme Court decision examined in Case Study 1. Chief Justice Roberts's majority opinion — that the government needs a warrant to access historical cell site location information — engages directly with the third-party doctrine's limitations in the digital age. Reading the opinion alongside the dissents reveals the deep disagreement on the Court about how the Fourth Amendment should adapt to digital technology. Available freely online through the Supreme Court's website or legal databases.
Ohm, Paul. "Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization." UCLA Law Review 57 (2010): 1701-1777. Although focused on anonymization, this article illuminates a key theme of the chapter: the gap between what people expect privacy protections to accomplish and what they actually deliver. Ohm demonstrates that anonymization techniques consistently fail to prevent re-identification, undermining the legal and regulatory frameworks built on the assumption that anonymized data is safe. Relevant to the aggregation argument (Response 4) and to the broader question of whether privacy can be protected through technical means alone.
Richards, Neil M. "The Dangers of Surveillance." Harvard Law Review 126 (2013): 1934-1965. Richards argues that surveillance poses three distinct harms: it chills the exercise of civil liberties, it creates power imbalances between watchers and watched, and it can be used for social control. This article develops the democracy and power-dynamics arguments from Section 7.6 in a legal context and bridges the gap between Chapter 7 (privacy theory) and Chapter 8 (surveillance). A useful companion for students interested in why privacy matters at the structural, not just individual, level.
Privacy Across Cultures
Greenleaf, Graham. Asian Data Privacy Laws: Trade and Human Rights Perspectives. Oxford: Oxford University Press, 2014. The most comprehensive treatment of data privacy law across Asian jurisdictions. Greenleaf covers Japan, South Korea, China, India, and Southeast Asian nations, documenting how cultural values, colonial legacies, and economic interests shape privacy governance. Directly relevant to the cross-cultural analysis in Section 7.5.1 and essential for students who want to move beyond the European-American axis that dominates most privacy scholarship.
Bygrave, Lee A. Data Privacy Law: An International Perspective. Oxford: Oxford University Press, 2014. A comparative analysis of data privacy law across dozens of jurisdictions. Bygrave identifies common principles (purpose limitation, proportionality, data minimization) and examines how they are implemented differently across legal cultures. An excellent reference for the cross-cultural governance tensions described in Section 7.5.2 and for students researching specific countries' privacy frameworks.
Carrol, Stephanie Russo, et al. "The CARE Principles for Indigenous Data Governance." Data Science Journal 19, no. 1 (2020): 43. The foundational paper for the Indigenous data governance framework referenced in Section 7.5.1. The CARE Principles (Collective Benefit, Authority to Control, Responsibility, Ethics) assert that indigenous peoples have collective rights to govern data about their communities. This paper challenges the individualistic assumptions of Western privacy theory and expands the chapter's cross-cultural analysis by centering a tradition that treats data as relational and communal.
Privacy and Public Health: The Contact Tracing Debate
Kahn, Jeffrey P., and the Johns Hopkins Project on Ethics and Governance of Digital Contact Tracing. Digital Contact Tracing for Pandemic Response: Ethics and Governance Guidance. Baltimore: Johns Hopkins University Press, 2020. A comprehensive ethical and governance analysis of digital contact tracing, written in real time during the pandemic by a team of public health ethicists, technologists, and legal scholars. The report addresses the centralized vs. decentralized debate, consent, equity, sunset provisions, and the tension between privacy and public health effectiveness. Directly relevant to Case Study 2 and the broader question of how privacy norms are negotiated under crisis conditions.
Sharon, Tamar. "Blind-Sided by Privacy? Digital Contact Tracing, the Apple/Google API and Big Tech's Newfound Role as Global Health Policy Makers." Ethics and Information Technology 23, Supplement 1 (2021): 45-57. A provocative analysis of how Apple and Google's decision to support only decentralized contact tracing effectively determined global public health policy — raising questions about the power of technology companies to set privacy standards. Sharon argues that the privacy-preserving design of the Exposure Notification framework, while commendable, also served Big Tech's interests in positioning themselves as privacy champions. An important counterpoint to straightforward narratives about the contact tracing debate.
Privacy and Power
Veliz, Carissa. Privacy Is Power: Why and How You Should Take Back Control of Your Data. London: Bantam Press, 2020. A philosopher's argument that privacy is not a personal preference but a form of political power — and that its erosion undermines democracy, equality, and autonomy. Veliz writes with urgency and clarity, connecting the theoretical arguments of Section 7.6 to concrete recommendations for individuals and policymakers. Particularly strong on the equity dimension: how privacy violations disproportionately harm those with the least power to protect themselves.
Zuboff, Shoshana. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York: PublicAffairs, 2019. Zuboff's influential work argues that major technology companies have created a new economic logic that claims human experience as raw material for commercial extraction. While the book's scope extends well beyond Chapter 7, its analysis of how data collection undermines autonomy and democratic self-governance provides the economic context for the privacy concerns this chapter raises. Read Part I for the most direct connection to the chapter's themes.
These readings are starting points for deeper inquiry. As subsequent chapters examine surveillance (Chapter 8), consent (Chapter 9), and data protection law (Chapter 10), they will build on and extend the theoretical foundations laid here. Students interested in legal analysis should prioritize the Carpenter decision and Richards. Those drawn to cross-cultural comparison should begin with Greenleaf or Bygrave. Those most engaged by the philosophical dimensions should start with Nissenbaum and Veliz.