Data Protection in a Profiled World

I. Generic Issues.- 1. About the E-Privacy Directive: Towards a third generation of data protection legislation? Yves Poullet.- 2. Some Caveats on Profiling Serge Gutwirth and Mireille Hildebrandt- 3.Levelling up: Data privacy and the European Court of Human Rights Gordon Nardell. 4. Responding to the Inevitable Outcomes of Profiling - Recent Lessons from the Consumer Financial Markets, and Beyond Tal Z. Zarsky.- II. Specific Issues : Security Breaches, Unsolicited Adjustments, Facebook, Surveillance and Electronic Voting.-5. The Emerging European Union Security Breach Legal Framework - The 2002/58 ePrivacy Directive and Beyond Rosa Barcelo and Peter Traung.- 6. From Unsolicited Communications to Unsolicited Adjustments. Redefining a Key Mechanism for Privacy Protection Gloria Gonzalez Fuster, Serge Gutwirth and Paul de Hert.- 7. Facebook and Risks of 'De-Contextualization' of Information Franck Dumortier.- 8. Surveillance in Germany: Strategies and Counterstrategies Ralf Bendrath, Gerrit Hornung, Andreas Pfitzmann.- 9. Verifiability of Electronic Voting between Confidence and Trust Wolter Pieters.- 10. Electronic Voting in Germany Melanie Volkamer.- III. Third Pillar Issues.- 11.The new Council Decision strengthening the role of Eurojust: does it also strengthen data protection at Eurojust? Diana Alonso Blas.- 12. Tansatlantic Data Sharing as a Reconfiguration of Powers and Resistances: The 2008 German-US Agreement on Data Exchange Rocco Bellanova.- 13. NA Data Exchange: Germany flexed its Muscle Sylvia ierkegaard.- IV. Technology Assessment Views.- 14. Information Privacy in Europe from a TA perspective Walter Peissl.- 15. Privacy and Security - A Brief Synopsis of the Results of the European TA-Project PRISE Johann Cas.-V. Legal Practitioner's Views. 16. The Role of Private Lawyers in the Data Protection World Christopher Kuner.- 17. Transfer and monitoring: two key words in the current data protection private practice - a legalpractitioner's view Tanguy Van Overstraeten, Sylvie Rousseau and Guillaume Couneson.- VI. Technologist's views.-18. Architecture is Politics. Security and Privacy Issues in Transport and Beyond Bart Jacobs.- 19. PET's in the Surveillance Society. A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm Seda Gurses, Bettina Berendt.- 20. Privacy by design : a Matter of Choice Daniel Le Metayer

[1]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[2]  C. Mills,et al.  Power Elite , 1956, Encyclopedia of Social Network Analysis and Mining.

[3]  W. Brandt German foreign policy , 1969 .

[4]  Albert O. Hirschman,et al.  Exit, Voice, and Loyalty , 1970 .

[5]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[6]  Allison M. McCormack,et al.  Information Age , 1979 .

[7]  Neil C. Livingstone The war against terrorism , 1982 .

[8]  M. Foucault The Subject and Power , 1982, Critical Inquiry.

[9]  Mark S. Granovetter T H E S T R E N G T H O F WEAK TIES: A NETWORK THEORY REVISITED , 1983 .

[10]  F. Schoeman,et al.  Philosophical Dimensions of Privacy: Privacy and intimate information , 1984 .

[11]  F. Schoeman Philosophical Dimensions of Privacy: An Anthology , 1984 .

[12]  J. Rachels Why privacy is important , 1985 .

[13]  K. Laudon Dossier Society: Value Choices in the Design of National Information Systems , 1988 .

[14]  M. Foucault,et al.  Of Other Spaces , 1986 .

[15]  Edward B. Blanchard,et al.  If it ain't broke, don't fix it , 1987 .

[16]  J. Elster The Multiple Self , 1987 .

[17]  Elizabeth Phillips,et al.  The Site , 1988, Palestine Is Throwing a Party and the Whole World Is Invited.

[18]  R. Putnam Diplomacy and domestic politics: the logic of two-level games , 1988, International Organization.

[19]  K. Ewing The Illusion of Wholeness: Culture, Self and the Experience of Inconsistency , 1990 .

[20]  Don Ihde,et al.  Technology and the lifeworld , 1990 .

[21]  François Rigaux La protection de la vie privée et des autres biens de la personnalité , 1990 .

[22]  M. Poster The Mode of Information: Poststructuralism and Social Context , 1990 .

[23]  A. Giddens Modernity and Self-Identity: Self and Society in the Late Modern Age , 1992, The New Social Theory Reader.

[24]  David Chaum,et al.  Achieving Electronic Privacy , 1992 .

[25]  Josh Benaloh,et al.  Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.

[26]  P. McGregor,et al.  Mastering the Internet , 1996 .

[27]  Curtis E. A. Karnow Liability for Distributed Artificial Intelligences , 1996 .

[28]  John Maynard Smith,et al.  Too good to be true , 1999, Nature.

[29]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[30]  D. Bainbridge Data protection , 2000 .

[31]  Kazue Sako,et al.  Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.

[32]  N. Luhmann Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .

[33]  R. Federman,et al.  Take It or Leave It , 2000, Science.

[34]  Pekka Nikander,et al.  Users and Trust in Cyberspace (Transcript of Discussion) , 2000, Security Protocols Workshop.

[35]  F. Cunningham,et al.  Theories of Democracy: A Critical Introduction , 2001 .

[36]  G. Marx Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.

[37]  F. Cate Privacy in Perspective , 2001 .

[38]  Serge Gutwirth,et al.  Privacy and the Information Age , 2001 .

[39]  C. Andrew Neff,et al.  A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.

[40]  Patrick Jaillet,et al.  Online Searching , 2001, Oper. Res..

[41]  Pm Schwartz,et al.  Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy Control and Fair Information Practices , 2001 .

[42]  Dahlia Malkhi,et al.  E-Voting Without 'Cryptography' , 2002, Financial Cryptography.

[43]  L. Bygrave Data Protection Law, Approaching Its Rationale, Logic and Limits , 2002 .

[44]  Ulrich Beck,et al.  The Terrorist Threat , 2002 .

[45]  Elizabeth D. Mynatt,et al.  Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .

[46]  Fred H. Cate,et al.  The Impact of Opt-In Privacy Rules on Retail Credit Markets: A Case Study of Mbna , 2003 .

[47]  Fabio Martinelli,et al.  SEAS: A Secure E-Voting Applet System , 2003, ISSS.

[48]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[49]  Tal Z. Zarsky "MINE YOUR OWN BUSINESS!": MAKING THE CASE FOR THE IMPLICATIONS OF THE DATA MINING OF PERSONAL INFORMATION IN THE FORUM OF PUBLIC OPINION , 2003 .

[50]  André Zúquete,et al.  REVS – A ROBUST ELECTRONIC VOTING SYSTEM , 2003 .

[51]  Claudio U. Ciborra,et al.  Digital Technologies and the Duality of Risk , 2004 .

[52]  Tim Storer,et al.  Practical Remote Electronic Elections for the UK , 2004, PST.

[53]  Bart Jacobs,et al.  Counting Votes with Formal Methods , 2004, AMAST.

[54]  David A. Wagner,et al.  Analyzing internet voting security , 2004, CACM.

[55]  Sangjin Kim,et al.  A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels , 2004, AWCC.

[56]  Ted Selker,et al.  Security Vulnerabilities and Problems with VVPT , 2004 .

[57]  Lior Jacob Strahilevitz,et al.  A Social Networks Theory of Privacy , 2004 .

[58]  Anton Vedder,et al.  KDD: The challenge to individualism , 1999, Ethics and Information Technology.

[59]  Nathanael Paul,et al.  Election security: Perception and reality , 2004, IEEE Security & Privacy Magazine.

[60]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[61]  Tal Zarsky Desperately Seeking Solutions: Using Implementation-Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society , 2004 .

[62]  Valeria Brusco,et al.  Vote Buying in Argentina , 2004 .

[63]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[64]  David Chaum,et al.  Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.

[65]  Danah Boyd,et al.  Friendster and publicly articulated social networking , 2004, CHI EA '04.

[66]  Wolter Pieters,et al.  RIES - Internet Voting in Action , 2005, COMPSAC.

[67]  P. Verbeek What Things Do: Philosophical Reflections on Technology, Agency, and Design , 2005 .

[68]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[69]  F. Tödtling,et al.  One size fits all?: Towards a differentiated regional innovation policy approach , 2005 .

[70]  Oscar Gandy 15. Data Mining, Surveillance, and Discrimination in the Post-9/11 Environment , 2005 .

[71]  Daniel J. Steinbock,et al.  Data Matching, Data Mining, and Due Process , 2005 .

[72]  Wolter Pieters,et al.  Ethics of e-voting: an essay on requirements and values in Internet elections , 2005 .

[73]  Markus Jakobsson,et al.  Coercion-resistant electronic elections , 2005, WPES '05.

[74]  Marinella Petrocchi,et al.  SEAS, a secure e-voting protocol: Design and implementation , 2005, Comput. Secur..

[75]  Michael Friedewald,et al.  Safeguards in a world of ambient intelligence , 2008 .

[76]  Roy G. Saltman The history and politics of voting technology , 2006 .

[77]  F. Cate The Failure of Fair Information Practice Principles , 2006 .

[78]  Y. Benkler,et al.  The Wealth of Networks , 2008 .

[79]  Mark S. Strauss Behind closed doors , 2006 .

[80]  Melanie Volkamer,et al.  New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness , 2006 .

[81]  Wolter Pieters,et al.  What proof do we prefer? Variants of verifiability in voting , 2006 .

[82]  Peggy Valcke,et al.  Retaining the data retention directive , 2006, Comput. Law Secur. Rev..

[83]  Bert-Jaap Koops,et al.  Should ICT Regulation Be Technology-Neutral? , 2006 .

[84]  Sjo Anne Hoogcarspel,et al.  Regulating Spam: A European Perspective After the Adoption of the E-Privacy Directive , 2006 .

[85]  P. Schwartz,et al.  Notification of Data Security Breaches , 2006 .

[86]  Wolter Pieters,et al.  Acceptance of Voting Technology: Between Confidence and Trust , 2006, iTrust.

[87]  Y. Poullet Les aspects juridiques des systèmes d’information , 2006 .

[88]  Brian Randell,et al.  Voting Technologies and Trust , 2006, IEEE Security & Privacy.

[89]  Zeynep Erdeniz International Herald Tribune , 2007 .

[90]  M. Hildebrandt,et al.  A vision of ambient law , 2007 .

[91]  Walter Peissl ICT and Privacy in Europe , 2007 .

[92]  Tanya Sammut-Bonnici Consumer Confidence in the Digital Environment , 2007 .

[93]  F. Geyer,et al.  The Reform Treaty & Justice and Home Affairs - Implications for the Common Area of Freedom, Security and Justice , 2007 .

[94]  M.J.W. van Twist,et al.  Stemmachines: een verweesd dossier , 2007 .

[95]  Jörn Müller-Quade,et al.  Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator , 2007, VOTE-ID.

[96]  Wolfgang Jung,et al.  Compliance of POLYAS with the BSI Protection Profile - Basic Requirements for Remote Electronic Voting Systems , 2007, VOTE-ID.

[97]  Jenann Ismael,et al.  The Situated Self , 2007 .

[98]  D. Citron Technological Due Process , 2007 .

[99]  S. Curley,et al.  Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy? , 2008 .

[100]  Stephen Baker,et al.  The Numerati , 2008 .

[101]  Mireille Hildebrandt,et al.  Profiling and the Identity of the European Citizen , 2008, Profiling the European Citizen.

[102]  Serge Gutwirth,et al.  Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .

[103]  Mireille Hildebrandt,et al.  Ambient Intelligence, Criminal Liability and Democracy , 2008 .

[104]  James A. Hendler,et al.  Information accountability , 2008, CACM.

[105]  Wolter Pieters,et al.  La volonté machinale: understanding the electronic voting controversy , 2008 .

[106]  S. Múgica Dos derechos emergentes del consumidor: a no ser molestado y a una interacción informativa , 2008 .

[107]  Clay Shirky Here Comes Everybody: The Power of Organizing Without Organizations , 2008 .

[108]  Thomas Böckenförde,et al.  Auf dem Weg zur elektronischen Privatsphäre , 2008 .

[109]  Mireille Hildebrandt,et al.  Profiling and the rule of law , 2008 .

[110]  Colin J. Bennett The Privacy Advocates: Resisting the Spread of Surveillance , 2008 .

[111]  Jean Allain Article 13. (Entry into Force) , 2008 .

[112]  Gerrit Hornung Ein neues Grundrecht , 2008 .

[113]  Serge Gutwirth,et al.  Regulating Profiling in a Democratic Constitutional State , 2008, Profiling the European Citizen.

[114]  Prüm: A Model ‘Prêt-à-Exporter’? The 2008 German–US Agreement on Data Exchange. CEPS Challenge Paper No. 13, 12 March 2009 , 2009 .

[115]  Burkhard Schafer,et al.  The German Constitutional Court on the Right in Confidentiality and Integrity of Information Technology Systems , 2009 .

[116]  Y. Poullet,et al.  The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy , 2009 .

[117]  Mireille Hildebrandt,et al.  Who is Profiling Who? Invisible Visibility , 2009 .

[118]  Gerrit Hornung,et al.  Data protection in Germany II: Recent decisions on online-searching of computers, automatic number plate recognition and data retention , 2009, Comput. Law Secur. Rev..

[119]  Wiebke Abel Agents, Trojans and tags: The next generation of investigators , 2009 .

[120]  Navis Amalraj,et al.  Social Networking Site , 2010 .

[121]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[122]  L. vanSchalkwyk,et al.  Misuse and abuse - IV , 2010 .