Handbook on European Data Protection Law

[1]  Alessandro Acquisti,et al.  Predicting Social Security numbers from public data , 2009, Proceedings of the National Academy of Sciences.

[2]  Fred H. Cate,et al.  Notice and consent in a world of Big Data , 2013 .

[3]  Gloria Gonzlez Fuster The Emergence of Personal Data Protection as a Fundamental Right of the EU , 2014 .

[4]  Khaled El Emam,et al.  A critical appraisal of the Article 29 Working Party Opinion 05/2014 on data anonymization techniques , 2015 .

[5]  Amy Wales Major legal ruling on a company’s data protection obligations outside the country where it is headquartered: Weltimmo s.r.o. v. Nemzeti Adatvédelmi és Információszabadság Hatóság , 2018 .

[6]  J. Rubenfeld The Right of Privacy , 1989 .

[7]  O. Lynskey DECONSTRUCTING DATA PROTECTION: THE ‘ADDED-VALUE’ OF A RIGHT TO DATA PROTECTION IN THE EU LEGAL ORDER , 2014, International and Comparative Law Quarterly.

[8]  Jane Kaye,et al.  Revoking consent: A 'blind spot' in data protection law? , 2010, Comput. Law Secur. Rev..

[9]  H. Hijmans The European Union as Guardian of Internet Privacy , 2016 .

[10]  Jana Reinhard,et al.  Computers, Privacy and Data Protection: an Element of Choice , 2011, Computers, Privacy and Data Protection.

[11]  Serge Gutwirth,et al.  European Data Protection: In Good Health? , 2012, European Data Protection.

[12]  Franziska Boehm,et al.  Information Sharing and Data Protection in the Area of Freedom, Security and Justice: Towards Harmonised Data Protection Principles for Information Exchange at EU-level , 2011 .

[13]  Btihaj Ajana Reinventing data protection? , 2009 .

[14]  Paul De Hert,et al.  The proposed data protection Regulation replacing Directive 95/46/EC: A sound system for the protection of individuals , 2012, Comput. Law Secur. Rev..

[15]  O. Lynskey The Foundations of EU Data Protection Law , 2016 .

[16]  Angus Hamilton,et al.  Data protection: Law and practice , 1999 .

[17]  César A. Hidalgo,et al.  Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.

[18]  Peter Carey,et al.  Data Protection: A Practical Guide to UK and EU Law , 2004 .

[19]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[20]  Jürgen Meyer,et al.  Charta der Grundrechte der Europäischen Union , 2006 .

[21]  Agustí Verde Parera,et al.  General data protection regulation , 2018 .

[22]  L. Macía,et al.  A Charter of Fundamental Rights for the European Union , 2000 .

[23]  Richard Morgan,et al.  Data Protection Strategy : Implementing Data Protection Compliance , 2003 .

[24]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[25]  Nicolás Tilli La protection des données à caractère personnel , 2013 .

[26]  C. Smee,et al.  United Kingdom , 2000, International Journal of Pharmaceutical Medicine.

[27]  Herke Kranenborg Google and the Right to Be Forgotten (Case C-131/12, Google Spain) , 2015 .

[28]  A. C. Evans European data protection law , 1981 .

[29]  D. Drewer,et al.  Europol’s data protection framework as an asset in the fight against cybercrime , 2012 .

[30]  Serge Gutwirth,et al.  Data Protection in a Profiled World , 2010, Data Protection in a Profiled World.

[31]  C. Docksey Four fundamental rights: finding the balance , 2016 .

[32]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[33]  Stephen Saxby,et al.  30 years on - The review of the Council of Europe Data Protection Convention 108 , 2011, Comput. Law Secur. Rev..

[34]  Ira S. Rubinstein,et al.  Big Data: The End of Privacy or a New Beginning? , 2013 .