Personal data for decisional purposes in the age of analytics: From an individual to a collective dimension of data protection
暂无分享,去创建一个
[1] Omer Tene Jules Polonetsky,et al. Privacy in the Age of Big Data: A Time for Big Decisions , 2012 .
[2] Wim Schreurs,et al. Cogitas, Ergo Sum. The Role of Data Protection Law and Non-discrimination Law in Group Profiling in the Private Sector , 2008, Profiling the European Citizen.
[3] John Dewby,et al. THE HISTORIC BACKGROUND OF CORPORATE LEGAL PERSONALITY , 1926 .
[4] Joseph A. Cannataci. Lex personalitatis & technology-driven law , 2008 .
[5] Adam Carlyle Breckenridge. The Right to Privacy , 1970 .
[6] Ryan Calo,et al. Consumer Subject Review Boards: A Thought Experiment , 2013 .
[7] K. Crawford. The Hidden Biases in Big Data , 2013 .
[8] Stig Strömholm. Right of privacy and rights of the personality : a comparative survey , 1967 .
[9] David Wright,et al. The state of the art in privacy impact assessment , 2012, Comput. Law Secur. Rev..
[10] Alfred Korzybski,et al. Science and sanity : an introduction to non-aristotelian systems and general semantics / Alfred Korzybski , 1942 .
[11] Martin Meints,et al. Profiling of Customers and Consumers - Customer Loyalty Programmes and Scoring Practices , 2008, Profiling the European Citizen.
[12] Mireille Hildebrandt. Profiling: From data to knowledge , 2006, Datenschutz und Datensicherheit - DuD.
[13] Yoram Dinstein,et al. The protection of minorities and human rights , 1992 .
[14] Ronald Beiner,et al. Canadian Political Philosophy: Contemporary Reflections , 2001 .
[15] L. Sweeney. Only You, Your Doctor, and Many Others May Know , 2015 .
[16] Katsuhito Iwai,et al. Persons, Things and Corporations: The Corporate Personality Controversy and Comparative Corporate Governance , 1997 .
[17] Pertti Ahonen,et al. Institutionalizing Big Data methods in social and political research , 2015, Big Data Soc..
[18] Kelly K. Koss. Leveraging Predictive Policing Algorithms to Restore Fourth Amendment Protections in High-Crime Areas in a Post-Wardlow World , 2015 .
[19] Kyle Kubler. The Black Box Society: the secret algorithms that control money and information , 2016 .
[20] Julie E. Cohen. Examined Lives: Informational Privacy and the Subject as Object , 2000 .
[21] Paul De Hert,et al. Policing, surveillance and law in a pre-crime society: Understanding the consequences of technology based strategies. , 2011 .
[22] Colin J. Bennett,et al. The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .
[23] N. Isaacs,et al. Fundamental Legal Conceptions as Applied in Judicial Reasoning: And Other Legal Essays , 2010 .
[24] Hans Kelsen,et al. Reine Rechtslehre : mit einem Anhang, Das Problem der Gerechtigkeit , 1962 .
[25] T. J. McIntyre. Reinventing data protection? , 2010, Comput. Law Secur. Rev..
[26] Ryan Calo. Digital Market Manipulation , 2013 .
[27] Deirdre K. Mulligan,et al. The Federal Trade Commission and Consumer Privacy in the Coming Decade , 2007 .
[28] James Q. Whitman. The Two Western Cultures of Privacy: Dignity versus Liberty , 2004 .
[29] Viktor Mayer-Schönberger,et al. Generational development of data protection in Europe , 1997 .
[30] Robert C. Post,et al. The Social Foundations of Privacy: Community and Self in the Common Law Tort , 1989 .
[31] Michael Friedewald,et al. Developing and testing a surveillance impact assessment methodology , 2015 .
[32] Barbara D. Underwood,et al. Law and the Crystal Ball: Predicting Behavior with Statistical Inference and Individualized Judgment , 1979 .
[33] Brent Windwick. Public Health Law: Power, Duty, Restraint by Lawrence O. Gostin (Berkeley: University of California Press, 2000) , 2003 .
[34] Paul M. Schwartz. Data Protection Law and the Ethical Use of Analytics, PRIVACY AND SECURITY LAW REPORT, 10 PVLR 70 , 2011 .
[35] David Wright,et al. A framework for the ethical impact assessment of information technology , 2011, Ethics and Information Technology.
[36] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[37] Daniel J. Solove,et al. Introduction: Privacy Self-Management and the Consent Dilemma , 2013 .
[38] Kendall Thomas,et al. Beyond the Privacy Principle , 1992 .
[39] H. L. A. Hart,et al. Definition and Theory in Jurisprudence , 1983 .
[40] D. Boyd,et al. CRITICAL QUESTIONS FOR BIG DATA , 2012 .
[41] B. van der Sloot. Do privacy and data protection rules apply to legal persons and should they? A proposal for a two-tiered system , 2015, Comput. Law Secur. Rev..
[42] Robert C. Post. Rereading Warren and Brandeis: Privacy, Property, and Appropriation , 1991 .
[43] Judith Rauhofer. Round and Round the Garden? Big Data, Small Government and the Balance of Power in the Information Age , 2014 .
[44] John Finnis,et al. The Authority Of Law In The Predicament Of Contemporary Social Theory , 2017 .
[45] Latanya Sweeney,et al. Discrimination in online ad delivery , 2013, CACM.
[46] Amy Luers,et al. Big Data , Communities and Ethical Resilience : A Framework for Action , 2013 .
[47] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[48] D. Newman,et al. Collective Interests and Collective Rights , 2004 .
[49] Frank A. Pasquale. The Black Box Society: The Secret Algorithms That Control Money and Information , 2015 .
[50] Gwendal Le Grand,et al. Prior Checking, a Forerunner to Privacy Impact Assessments , 2012 .
[51] L. Sweeney. Simple Demographics Often Identify People Uniquely , 2000 .
[52] Ira S. Rubinstein,et al. Big Data: The End of Privacy or a New Beginning? , 2013 .
[53] Latanya Sweeney. Foundations of Privacy Protection from a Computer Science Perspective , 2000 .
[54] Lee A. Bygrave,et al. Consent, Proportionality and Collective Power , 2009 .
[55] Will Kymlicka,et al. The New Debate Over Minority Rights , 2001 .
[56] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[57] Colin J. Bennett. Regulating privacy: data protection and public policy in europe and the u , 1992 .
[58] Edward J. Bloustein. Individual and Group Privacy , 2002 .
[59] Roger Clarke,et al. Privacy impact assessment: Its origins and development , 2009, Comput. Law Secur. Rev..
[60] M. Calo. Against Notice Skepticism In Privacy (And Elsewhere) , 2011 .
[61] A. Zwitter. Big Data ethics , 2014, Big Data Soc..
[62] Alessandro Mantelero. Data protection, e-ticketing, and intelligent systems for public transport , 2015 .
[63] Alessandro Acquisti,et al. Misplaced Confidences , 2013, WEIS.
[64] B. Fitzgerald. Civil Rights, Big Data, and Our Algorithmic Future , 2015 .
[65] Alessandro Mantelero. Social Control, Transparency, and Participation in the Big Data World , 2014 .
[66] Jonas Lerman,et al. Big Data and Its Exclusions , 2013 .
[67] Katharine Armstrong,et al. Big data: a revolution that will transform how we live, work, and think , 2014 .
[68] Edward W. Felten,et al. A Precautionary Approach to Big Data Privacy , 2016 .
[69] Carter C. Price,et al. Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations , 2013 .
[70] Giorgio Resta. Personnalité, Persönlichkeit, Personality: Comparative Perspectives on the Protection of Identity in Private Law , 2014 .
[71] Mireille Hildebrandt,et al. Defining Profiling: A New Type of Knowledge? , 2008, Profiling the European Citizen.
[72] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[73] Philippe Golle,et al. Revisiting the uniqueness of simple demographics in the US population , 2006, WPES '06.
[74] L. Bygrave. Data Protection Law, Approaching Its Rationale, Logic and Limits , 2002 .
[75] Antoinette Rouvroy. Des données sans personne: le fétichisme de la donnée à caractère personnel à l'épreuve de l'idéologie des Big Data , 2014 .
[76] Charles Fried. Philosophical Dimensions of Privacy: Privacy [a moral analysis] , 1984 .
[77] Bill Bowring,et al. Minority and Group Rights in the New Millennium , 1999 .
[78] Myron Brenton. The privacy invaders , 1964 .
[79] Satish Garla,et al. What Do Your Consumer Habits Say About Your Health ? Using Third-Party Data to Predict Individual Health Risk and Costs , 2013 .
[80] Giuseppe Vaciago,et al. Social Media and Big Data , 2014 .
[81] J. Rachels. Why privacy is important , 1985 .
[82] Serge Gutwirth,et al. Some Caveats on Profiling , 2010, Data Protection in a Profiled World.
[83] P. Agre,et al. Technology and privacy: The new landscape , 1998 .
[84] Roger Brownsword. Reinventing Data Protection , 2009 .
[85] Julia Stapleton. Group rights : perspectives since 1900 , 1995 .
[86] Julie E. Cohen,et al. What Privacy Is For , 2012 .
[87] M. Schudson. Discovering The News: A Social History Of American Newspapers , 1980 .
[88] Edward J. Bloustein,et al. Group Privacy: The Right To Huddle , 2018 .
[89] D. Boyd,et al. Six Provocations for Big Data , 2011 .
[90] A. H. Vedder. Privatization, Information Technology and Privacy : Reconsidering the Social Responsibilities of Private Organizations , 1997 .
[91] Gandy,et al. Exploring Identity and Identification in Cyberspace , 2014 .
[92] Frank A. Pasquale,et al. [89WashLRev0001] The Scored Society: Due Process for Automated Predictions , 2014 .
[93] Josef Kohler. Urheberrecht an schriftwerken und verlagsrecht , 1980 .
[94] Frederik Willlem Hondius. Emerging Data Protection in Europe , 1975 .
[95] L. Bygrave. Privacy Protection in a Global Context- A Comparative Overview. , 2004 .
[96] Deirdre K. Mulligan,et al. It's Not Privacy, and It's Not Fair , 2013 .
[97] Stefano Rodotà,et al. Data Protection as a Fundamental Right , 2009 .
[98] Amitai Etzioni,et al. The Limits Of Privacy , 1999 .
[99] Bert-Jaap Koops,et al. The trouble with European data protection law , 2014 .
[100] Mireille Hildebrandt. Profiling : From Data to Knowledge The challenges of a crucial technology , 2006 .
[101] Arvind Narayanan,et al. No silver bullet: De-identification still doesn't work , 2014 .
[102] Douwe Korff,et al. New Challenges to Data Protection Study - Working Paper No. 2: Data Protection Laws in the EU: The Difficulties in Meeting the Challenges Posed by Global Social and Technical Developments , 2010 .
[103] Lee A. Bygrave,et al. Automated Profiling: Minding the Machine: Article 15 of the EC Data Protection Directive and Automated Profiling , 2001, Comput. Law Secur. Rev..
[104] Alessandro Mantelero,et al. The future of consumer data protection in the E.U. Re-thinking the "notice and consent" paradigm in the new era of predictive analytics , 2014, Comput. Law Secur. Rev..
[105] Helen O'Nions. Minority Rights Protection in International Law: The Roma of Europe , 2007 .
[106] Luciano Floridi,et al. The Fourth Revolution: How the infosphere is reshaping human reality , 2014 .
[107] K. Toll. Privacy and Freedom. By Alan F. Westin. New York: Atheneum Press, 1967. $10.00 , 1968 .