Previous Next

Security and Privacy: Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States


The initial impetus for this study was a US National Science Foundation grant (#0619226) awarded in 2006 to several researchers at John Jay College of Criminal Justice, some of whom were also associated with the Centre for Applied Philosophy and Public Ethics, Charles Sturt University, Canberra. We are particularly appreciative of the support of John Jay College and CAPPE, and for the assistance at different stages of this project of Nick Evans, Jamie Levy, Richard Lovely, Richard Lucas, Vincent Maldonado and Vincenzo Sainato. Richard Lucas was particularly helpful in reviewing and updating the technical data. Until his untimely death, one of our original grant members, Brian O’Connell, from Central Connecticut State University, brought to the early stages of this project not only his enthusiasm but also his combined expertise in philosophy, law, and computing. Our loss, along with that of others, was great.

In preparing this material for publication, we are grateful for the extensive comments of two reviewers, including Leslie Francis of the University of Utah. James Spence provided valuable editorial assistance.

During the course of this study, several items have been prepared for other venues, including: John Kleinig “Humiliation, Degradation, and Moral Capacity: A Response to Hörnle and Kremnitzer”, Israel Law Review 44; and John Kleinig, “Liberty and Security in an Era of Terrorism”, in Criminologists on Terrorism and Homeland Security, ed. Brian Forst, Jack Greene & James Lynch (NY: Cambridge University Press, 2011), ch. 15.

Acknowledgment is also made of permission to use material first published in Peter Mameli, “Tracking the Beast: Techno-Ethics Boards and Government Surveillance Programs”, Critical Issues in Justice and Politics, 1, no. 1 (2008): 31–56, available at: Professor Mameli's research benefitted from time spent as a visiting scholar at the National Policing Improvement Agency, Bramshill, in the United Kingdom during 2006. In addition, elements of his work were originally presented at the 2006 “Soft Law, Soft Regulation?” conference of Anglia Ruskin University.

We also acknowledge permission to publish in Chapter VII (pages 131–51) material from Douglas Salane, “Are Large Scale Data Breaches Inevitable?”, Cyber Infrastructure Protection, ed. Tarek N. Saadawi and Col. Louis H. Jordan, Jr. (Carlisle, PA: Strategic Studies Institute, United States Army War College, forthcoming), ch. 4.

Previous Next