Reloading Data Protection

[1]  J. Vervaele Special procedural measures and respect of human rights : general report , 2009 .

[2]  Gary T. Marx,et al.  What's New About the "New Surveillance"? Classifying for Change and Continuity. , 2002 .

[3]  Charles Fried Philosophical Dimensions of Privacy: Privacy [a moral analysis] , 1984 .

[4]  Joshua Reeves If You See Something, Say Something: Lateral Surveillance and the Uses of Responsibility , 2012 .

[5]  Alisdair A. Gillespie Regulation of internet surveillance. , 2009 .

[6]  David Lyon,et al.  The Electronic Eye: The Rise of Surveillance Society , 1994 .

[7]  Daniel J. Solove,et al.  Privacy and Power: Computer Databases and Metaphors for Information Privacy , 2001 .

[8]  G. Armstrong,et al.  The Maximum Surveillance Society: The Rise of CCTV , 1999 .

[9]  Colin J. Bennett The governance of privacy , 2003 .

[10]  Paul Schwartz The Computer in German and American Constitutional Law: Towards an American Right of Informational Self-Determination , 1989 .

[11]  J. Beatson Human rights : judicial protection in the United Kingdom , 2008 .

[12]  M. Poster The Mode of Information: Poststructuralism and Social Context , 1990 .

[13]  M. Castells The rise of the network society , 1996 .

[14]  M. Mccahill The surveillance web : the rise of visual surveillance in an English city , 2002 .

[15]  M. Foucault,et al.  Surveiller et punir: Naissance de la prison , 1993 .

[16]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[17]  J. Naughton A Brief History of the Future: The Origins of the Internet , 1999 .

[18]  B. Simon The Return of Panopticism: Supervision, Subjection and the New Surveillance , 2002 .

[19]  Trevor Darrell,et al.  Privacy in Context , 2001, Hum. Comput. Interact..

[20]  Darren Cornwell Recon Scout XT , 2011 .

[21]  Jeffrey Rosen,et al.  The Right to Be Forgotten , 2012 .

[22]  H. Fenwick,et al.  Civil Liberties and Human Rights , 2002 .

[23]  James Michael Privacy and human rights : an international and comparative study, with special reference to developments in information technology , 1994 .

[24]  E. Böckenförde Grundrechtstheorie und Grundrechtsinterpretation , 1974 .

[25]  J. M. D. Meiklejohn,et al.  The Critique of Pure Reason , 2020, A Commentary on Kant’s Critique of Judgment.

[26]  S. Davies,et al.  Big brother : Britain's web of surveillance and the new technological order , 1996 .

[27]  J. Mcculloch,et al.  Pre-Crime and Counter-Terrorism Imagining Future Crime in the ‘War on Terror’ , 2009 .

[28]  Benjamin J. Goold,et al.  Surveillance and the Political Value of Privacy , 2009 .

[29]  James Bamford,et al.  The Shadow Factory , 2008 .

[30]  James B. Rule Privacy in peril , 2007 .

[31]  Simon N. L. Chalton,et al.  Data protection law , 1988 .

[32]  T. Murphy,et al.  Works in Progress: New Technologies and the European Court of Human Rights , 2010 .

[33]  Emmanuelle Rial-Sebbag,et al.  Legislation on direct-to-consumer genetic testing in seven European countries , 2012, European Journal of Human Genetics.

[34]  Gregory Piatetsky-Shapiro,et al.  Knowledge Discovery in Databases: An Overview , 1992, AI Mag..

[35]  A. Mcharg Reconciling Human Rights and the Public Interest: Conceptual Problems and Doctrinal Uncertainty in the Jurisprudence of the European Court of Human Rights , 1999 .

[36]  J W Gardner and P N Bartlett,et al.  Electronic Noses: Principles and Applications , 1999 .

[37]  Nora Ni Loideain Assessing the Evaluation of the EC Data Retention Directive , 2012 .

[38]  B. Roessler,et al.  Der Wert des Privaten , 2001 .

[39]  Lee A. Bygrave,et al.  Data protection pursuant to the right to privacy in human rights treaties , 1998, Int. J. Law Inf. Technol..

[40]  Omer Tene What Google Knows: Privacy and Internet Search Engines , 2007 .

[41]  Oliver Leistert Resistance against Cyber-Surveillance within Social Movements and how Surveillance Adapts , 2012 .

[42]  Colin J. Bennett Regulating privacy: data protection and public policy in europe and the u , 1992 .

[43]  D. Lyon Surveillance Studies: An Overview , 2007 .

[44]  Roy Want,et al.  An Introduction to Ubiquitous Computing , 2010, Ubicomp 2010.

[45]  Ada Pellegrini Grinover,et al.  Código brasileiro de defesa do consumidor comentado pelos autores do anteprojeto , 1991 .

[46]  S. Kraemer Steps to an Ecology of Mind: Gregory Bateson , 1993, British Journal of Psychiatry.

[47]  Robin C. A. White,et al.  European Convention on Human Rights , 1972, International and Comparative Law Quarterly.

[48]  Stanley H. Cohen,et al.  The punitive city: Notes on the dispersal of social control , 1979 .

[49]  Isaiah Berlin,et al.  Two Concepts of Liberty , 1958 .

[50]  Daniel J. Solove The Digital Person , 2022 .

[51]  B. Pieroth Grundrechte Staatsrecht II , 2006 .

[52]  S. Brown The criminology of hybrids , 2006 .

[53]  Manuel Castells,et al.  The Information Age: Economy, Society and Culture , 1999 .

[54]  D. Lyon Surveillance after September 11 , 2001 .

[55]  C. Raab,et al.  Protecting Information Privacy , 2011 .

[56]  Anthony Giddens Modernity and self-identity , 1991 .

[57]  Jef Ausloos,et al.  The Right to Be Forgotten Across the Pond , 2013, Journal of Information Policy.

[58]  G. Jakobs Burgerstrafrecht und Feindstrafrecht , 2004 .

[59]  Lauren D. Adkins,et al.  Biometrics: Weighing Convenience and National Security against Your Privacy , 2007 .

[60]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[61]  Julia Macke,et al.  European Union Agency for Fundamental Rights , 2006 .

[62]  Marta Kanashiro,et al.  Surveillance Cameras in Brazil: exclusion, mobility regulation, and the new meanings of security ∗ , 2002 .

[63]  J. Nicolas Secretary of state for the home department , 2010 .

[64]  M. Castells The Information Age: Economy, Society and Culture , 1999 .

[65]  Johannes Andenaes,et al.  General Preventive Effects of Punishment , 1966 .

[66]  David Aaron,et al.  A New Concept , 1974 .

[67]  Simone Frattasi,et al.  Mobile Positioning and Tracking: From Conventional to Cooperative Techniques , 2010 .

[68]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[69]  Ian Brown Communications Data Retention in an Evolving Internet , 2011, Int. J. Law Inf. Technol..

[70]  Michael O'Boyle,et al.  Law of the European Convention on Human Rights , 2014 .

[71]  Eoghan Casey,et al.  Digital Evidence and Computer Crime , 2000 .

[72]  Didier Bigo,et al.  Fighting cyber crime and protecting privacy in the cloud , 2012 .

[73]  Ronald Leenes,et al.  Constitutional Rights and New Technologies , 2008 .

[74]  K. Haggerty Tear down the walls: on demolishing the panopticon , 2006 .

[75]  Serge Gutwirth,et al.  Privacy and the Information Age , 2001 .

[76]  Ronald Leenes,et al.  Framing Techno-Regulation: An Exploration of State and Non-State Regulation by Technology , 2011 .

[77]  Spiros Simitis,et al.  Reviewing Privacy In an Information Society , 1987 .

[78]  P. Duyne The phantom and threat of organized crime , 1995 .

[79]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[80]  Bibi van den Berg,et al.  The Situated Self: Identity in a world of Ambient Intelligence , 2010 .

[81]  B. Hudson Justice in the risk society , 2003 .

[82]  G. Sewell,et al.  Coercion Versus Care: Using Irony to Make Sense of Organizational Surveillance , 2006 .

[83]  David Lyon,et al.  Liquid Surveillance: The Contribution of Zygmunt Bauman to Surveillance Studies , 2010 .

[84]  Sjaak Nouwt,et al.  Camera Surveillance and Privacy in the Netherlands , 2005 .

[86]  D. Bainbridge Data protection , 2000 .

[87]  Paul McBride Beyond Orwell : the application of unmanned aircraft systems in domestic surveillance operations , 2009 .

[88]  François Ost,et al.  De la pyramide au réseau ? Pour une théorie dialectique du droit , 2010 .

[89]  Brad Amorsino I have nothing to hide , 2013 .

[90]  Rachel Finn,et al.  Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications , 2012, Comput. Law Secur. Rev..

[91]  R. Ericson,et al.  Policing the Risk Society , 1997 .

[92]  Danilo Doneda Da Privacidade à Proteção de Dados Pessoais , 2006 .

[93]  Viktor Mayer-Schonberger,et al.  Beyond Privacy, beyond Rights - Toward a Systems Theory of Information Governance , 2010 .

[94]  Marc Langheinrich,et al.  Privacy in Ubiquitous Computing , 2014 .

[95]  Viktor Mayer-Schönberger,et al.  Generational development of data protection in Europe , 1997 .

[96]  K. Ball,et al.  Routledge Handbook of Surveillance Studies , 2014 .

[97]  R. Williamson A solution looking for a problem? , 2015, Anaesthesia.

[98]  C. Vega European Union Agency for Fundamental Rights (FRA) , 2013 .

[99]  Colin J. Bennett,et al.  The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .

[100]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[101]  M. Andrejevic The Work of Watching One Another: Lateral Surveillance, Risk, and Governance , 2002 .

[102]  Daniel Pipes The Real Problem , 1983 .

[103]  Andreas Gerstlauer,et al.  System Design , 2012 .

[104]  D. Bell The Coming of the Post-Industrial Society , 1973 .

[105]  Dear Mr Sotiropoulos ARTICLE 29 Data Protection Working Party , 2013 .

[106]  Viktor Mayer-Schönberger,et al.  Delete: The Virtue of Forgetting in the Digital Age , 2009 .

[107]  Christopher Soghoian The Law Enforcement Surveillance Reporting Gap , 2011 .

[108]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[109]  G. Elmer Panopticon—discipline—control , 2012 .

[110]  Fred F. Manget Intelligence and the Criminal Law System , 2006 .

[111]  Social Media Sites: New Fora for Criminal, Communication, and Investigation Opportunities , 2011 .

[112]  J. Crawford,et al.  The margin of appreciation doctrine and the principle of proportionality in the jurisprudence of the ECHR , 2002 .

[113]  Andrés Guadamuz González Habeas Data: The Latin-American response to Data Protection , 2000, Journal of Information, Law and Technology.

[114]  D. Brin The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? , 1998 .

[115]  Malcolm M Feeley Actuarial Justice: the Emerging New Criminal Law , 1994 .

[116]  Andrew Z. Drzemczewski European Human Rights Convention in Domestic Law: A Comparative Study , 1983 .

[117]  C. Gearty The European Court of Human Rights and the Protection of Civil Liberties: an Overview , 1993, The Cambridge Law Journal.

[118]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[119]  Gary T. Marx,et al.  Undercover: Police Surveillance in America , 1988 .

[120]  F. Schoeman,et al.  Privacy and Social Freedom , 1992 .

[121]  Paul De Hert,et al.  Policing, surveillance and law in a pre-crime society: Understanding the consequences of technology based strategies. , 2011 .

[122]  B. Turner European Union (EU) , 1999 .

[123]  Wolfgang Hoffmann-Riem,et al.  Das Grundrecht auf Schutz der Vertraulichkeit und Integrität eigengenutzter informationstechnischer Systeme , 2008 .

[124]  David Murakami Wood,et al.  Social Control after Foucault. , 2003 .

[125]  Gary T. Marx,et al.  Seeing Hazily (But Not Darkly) Through the Lens: Some Recent Empirical Studies of Surveillance Technologies , 2005, Law & Social Inquiry.

[126]  M. Goede,et al.  The Politics of Preemption and the War on Terror in Europe , 2008 .

[127]  W. Hoffmann-riem Grundrechts- und Funktionsschutz für elektronisch vernetzte Kommunikation , 2009 .

[128]  B. Emmerson Human Rights and Criminal Justice , 2001 .

[129]  Mohammad Ilyas,et al.  Smart Dust , 2006 .

[130]  L. Román The Institutional Environment , 1999 .

[131]  A. Ashworth Four Threats to the Presumption of Innocence , 2006 .

[132]  Michael Friedewald,et al.  Sorting out smart surveillance , 2010, Comput. Law Secur. Rev..

[133]  Ronald E. Leenes,et al.  Audience Segregation in Social Network Sites , 2010, 2010 IEEE Second International Conference on Social Computing.

[134]  L. Floridi The Ontological Interpretation of Informational Privacy , 2005, Ethics and Information Technology.

[135]  E. Goffman Stigma; Notes On The Management Of Spoiled Identity , 1964 .

[136]  T. Misa,et al.  Modernity and Technology , 2002 .

[137]  Diomidis Spinellis,et al.  The Athens Affair , 2007, IEEE Spectrum.

[138]  Gary T. Marx,et al.  A Tack in the Shoe: Neutralizing and Resisting the New Surveillance , 2003 .

[139]  C. Marsden Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in Cyberspace , 2011 .

[140]  I. Brown,et al.  Terrorism and the Proportionality of Internet Surveillance , 2009 .

[141]  R. Ericson,et al.  The New Politics of Surveillance and Visibility , 2006 .

[142]  Gang Wei,et al.  Biometrics: Applications, Challenges and the Future , 2006 .

[143]  Susan Landau,et al.  Communications surveillance , 2009, Commun. ACM.

[144]  Colin J. Bennett,et al.  The Adequacy of Privacy: the European Union Data Protection Directive and the North American Response , 1997, Inf. Soc..

[145]  Jim Gemmell,et al.  Total Recall: How the E-Memory Revolution Will Change , 2009 .