Privacy, Due Process and the Computational Turn : The Philosophy of Law Meets the Philosophy of Technology

Acknowledgments On the contributors Preface 0. 'Privacy, Due Process and the Computational Turn' at a glance. Pointers for the hurried reader, Katja de Vries en Mireille Hildebrandt Chapter 1: Privacy, Due Process and the Computational Turn A parable and a first analysis, Katja de Vries Part 1 Data Science Chapter 2: A Machine Learning View on Profiling Martijn van Otterlo Part 2 Anticipating Machines Chapter 3: Abducing Personal Data, Destroying Privacy. Diagnosing Profiles through Artifactual Mediators, Lorenzo Magnani Chapter 4: Prediction, Preemption, Presumption: The Path of Law After the Computational Turn, Ian Kerr Chapter 5: Digital prophecies and web intelligence, Elena Esposito Chapter 6: The end(s) of critique : data-behaviourism vs. due-process, Antoinette Rouvroy Part 3 Resistance & Solutions Chapter 7: Political and Ethical Perspectives on Data Obfuscation, Finn Brunton and Helen Nissenbaum Chapter 8: On decision transparency, Bert-Jaap Koops Chapter 9: Profile transparency by design? Re-enabling double contingency, Mireille Hildebrandt Index

[1]  Helen Nissenbaum,et al.  Trackmenot: Resisting Surveillance in Web Search , 2015 .

[2]  J. Reiman Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future , 1995 .

[3]  Helen Nissenbaum,et al.  On Notice: The Trouble with Notice and Consent , 2009 .

[4]  Helen Nissenbaum,et al.  The Meaning of Anonymity in an Information Age , 1999, Inf. Soc..

[5]  Jonathan M. Smith,et al.  Disinformation: A Taxonomy , 2011, IEEE Security & Privacy.

[6]  James C. Scott,et al.  Weapons of the Weak: Everyday Forms of Peasant Resistance. , 1985, The Journal of Asian Studies.

[7]  J. Waldron,et al.  Security and Liberty: The Image of Balance* , 2003 .

[8]  Francisco Goldman,et al.  The Art of Political Murder: Who Killed the Bishop? , 2007 .

[9]  Chris Jay Hoofnagle,et al.  Model Regime of Privacy Protection, A , 2006 .

[10]  William W. Stead,et al.  Computational Technology for Effective Health Care , 2009 .

[11]  Daniel J. Solove,et al.  Data Mining and the Security-Liberty Debate , 2007 .

[12]  Tal Zarsky Online Privacy, Tailoring, and Persuasion , 2006 .

[13]  Christopher Soghoian Manipulation and Abuse of the Consumer Credit Reporting Agencies , 2009, First Monday.

[14]  Gloria González Fuster,et al.  Inaccuracy as a privacy-enhancing tool , 2010, Ethics and Information Technology.

[15]  Qi Xie,et al.  FaceCloak: An Architecture for User Privacy on Social Networking Sites , 2009, 2009 International Conference on Computational Science and Engineering.