Some Caveats on Profiling
暂无分享,去创建一个
[1] R. Ericson,et al. The New Politics of Surveillance and Visibility , 2006 .
[2] Roger Brownsword. Reinventing Data Protection , 2009 .
[3] Curtis E. A. Karnow. Liability for Distributed Artificial Intelligences , 1996 .
[4] Bibi van den Berg,et al. The Situated Self: Identity in a world of Ambient Intelligence , 2010 .
[5] Antoinette Rouvroy,et al. Privacy, Data Protection, and the Unprecedented Challenges of Ambient Intelligence , 2007 .
[6] Claudio U. Ciborra,et al. Digital Technologies and the Duality of Risk , 2004 .
[7] Serge Gutwirth,et al. Privacy and the Information Age , 2001 .
[8] G. Marx. Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.
[9] Yves Poullet,et al. Application of Convention 108 to the profiling mechanism: some ideas for the future work of the consultative committee (T-PD): final version , 2008 .
[10] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[11] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[12] Mireille Hildebrandt,et al. Ambient Intelligence, Criminal Liability and Democracy , 2008 .
[13] Tomas A. Lipinski,et al. The Digital Person: Technology and Privacy in the Information Age , 2008 .
[14] Jonathan L. Zittrain. Privacy 2.0 , 2008 .
[15] J.E.J. Prins,et al. When Personal Data, Behaviour and Virtual Identities Become a Commodity : Would a Property Rights Approach Matter? , 2006 .
[16] James A. Hendler,et al. Information accountability , 2008, CACM.
[17] Oscar Gandy. 15. Data Mining, Surveillance, and Discrimination in the Post-9/11 Environment , 2005 .
[18] Pm Schwartz,et al. Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy Control and Fair Information Practices , 2001 .
[19] Wim Schreurs,et al. Cogitas, Ergo Sum. The Role of Data Protection Law and Non-discrimination Law in Group Profiling in the Private Sector , 2008, Profiling the European Citizen.
[20] Jean-Marc Dinant,et al. Application of Convention 108 to the profiling mechanism Some ideas for the future work of the consultative committee ( TPD ) , 2008 .
[21] D. Citron. Technological Due Process , 2007 .
[22] Tal Z. Zarsky. "MINE YOUR OWN BUSINESS!": MAKING THE CASE FOR THE IMPLICATIONS OF THE DATA MINING OF PERSONAL INFORMATION IN THE FORUM OF PUBLIC OPINION , 2003 .
[23] D. Lyon. Surveillance as social sorting : privacy, risk, and digital discrimination , 2003 .
[24] B.H.M. Custers,et al. 'The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology , 2004 .
[25] Tal Zarsky. Desperately Seeking Solutions: Using Implementation-Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society , 2004 .
[26] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[27] Mireille Hildebrandt,et al. Who is Profiling Who? Invisible Visibility , 2009 .
[28] Serge Gutwirth,et al. Regulating Profiling in a Democratic Constitutional State , 2008, Profiling the European Citizen.
[29] Serge Gutwirth,et al. Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .
[30] Daniel J. Steinbock,et al. Data Matching, Data Mining, and Due Process , 2005 .
[31] Anton Vedder,et al. KDD: The challenge to individualism , 1999, Ethics and Information Technology.
[32] Elizabeth D. Mynatt,et al. Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .
[33] M. Hildebrandt,et al. A vision of ambient law , 2007 .
[34] Jenann Ismael,et al. The Situated Self , 2007 .