{"title":"什么是搜查:第四修正案原则的两个概念缺陷和补救的一些暗示","authors":"S. F. Colb","doi":"10.2307/1229591","DOIUrl":null,"url":null,"abstract":"\"What Is A Search: Two Conceptual Flaws in Fourth Amendment Doctrine & Some Hints of a Remedy\" analyzes and critiques Fourth Amendment doctrine addressing the question of which government activities count as \"searches\" for Fourth Amendment purposes. The Article contends that the original articulation of the \"reasonable expectation of privacy\" standard in Katz v. United States made sense, but that the Court has, in subsequently applying and developing it, effectively robbed the doctrine of its protective power. It has done so through the use of two \"moves\" that are identified and developed in the Article: the equation of risk with invitation, and the equation of limited with absolute exposure. The Article demonstrates the pervasiveness of these moves as well as the perverse consequences of their application for the future of privacy.","PeriodicalId":51386,"journal":{"name":"Stanford Law Review","volume":"56 1","pages":"119-189"},"PeriodicalIF":4.9000,"publicationDate":"2002-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.2307/1229591","citationCount":"8","resultStr":"{\"title\":\"What is a Search: Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy\",\"authors\":\"S. F. Colb\",\"doi\":\"10.2307/1229591\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\\"What Is A Search: Two Conceptual Flaws in Fourth Amendment Doctrine & Some Hints of a Remedy\\\" analyzes and critiques Fourth Amendment doctrine addressing the question of which government activities count as \\\"searches\\\" for Fourth Amendment purposes. The Article contends that the original articulation of the \\\"reasonable expectation of privacy\\\" standard in Katz v. United States made sense, but that the Court has, in subsequently applying and developing it, effectively robbed the doctrine of its protective power. It has done so through the use of two \\\"moves\\\" that are identified and developed in the Article: the equation of risk with invitation, and the equation of limited with absolute exposure. The Article demonstrates the pervasiveness of these moves as well as the perverse consequences of their application for the future of privacy.\",\"PeriodicalId\":51386,\"journal\":{\"name\":\"Stanford Law Review\",\"volume\":\"56 1\",\"pages\":\"119-189\"},\"PeriodicalIF\":4.9000,\"publicationDate\":\"2002-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.2307/1229591\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Stanford Law Review\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.2307/1229591\",\"RegionNum\":1,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Stanford Law Review","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.2307/1229591","RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
What is a Search: Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy
"What Is A Search: Two Conceptual Flaws in Fourth Amendment Doctrine & Some Hints of a Remedy" analyzes and critiques Fourth Amendment doctrine addressing the question of which government activities count as "searches" for Fourth Amendment purposes. The Article contends that the original articulation of the "reasonable expectation of privacy" standard in Katz v. United States made sense, but that the Court has, in subsequently applying and developing it, effectively robbed the doctrine of its protective power. It has done so through the use of two "moves" that are identified and developed in the Article: the equation of risk with invitation, and the equation of limited with absolute exposure. The Article demonstrates the pervasiveness of these moves as well as the perverse consequences of their application for the future of privacy.