Skip to main content
Top
Published in: Health and Technology 4/2017

08-05-2017 | Original Paper

Regulation of Big Data: Perspectives on strategy, policy, law and privacy

Authors: Pompeu Casanovas, Louis De Koker, Danuta Mendelson, David Watts

Published in: Health and Technology | Issue 4/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This article encapsulates selected themes from the Australian Data to Decisions Cooperative Research Centre’s Law and Policy program. It is the result of a discussion on the regulation of Big Data, especially focusing on privacy and data protection strategies. It presents four complementary perspectives stemming from governance, law, ethics, and computer science. Big, Linked, and Open Data constitute complex phenomena whose economic and political dimensions require a plurality of instruments to enhance and protect citizens’ rights. Some conclusions are offered in the end to foster a more general discussion.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
1
The article reflects papers delivered at “Regulation of Big Data”, a panel discussion held at Deakin University, Australia, August 3rd 2016. While the support of the Data to Decisions Cooperative Research Centre is acknowledged, the views expressed in this article do not necessarily reflect the views of the Centre or of other members of the Law and Policy Program.
 
2
Douglas Laney is a VP and Distinguished Analyst with Gartner’s Chief Data Officer Research team.
 
3
[1]: “There are many definitions of “Big Data” which may differ depending on whether you are a computer scientist, a financial analyst, or an entrepreneur pitching an idea to a venture capitalist. Most definitions reflect the growing technological ability to capture, aggregate, and process an ever-greater volume, velocity, and variety of data.”
 
4
School of Business and Management, Lappeenranta University of Technology, Finland.
 
5
See for example [2]: “Big Data refers to both large volumes of data with high level of complexity and the analytical methods applied to them which require more advanced techniques and technologies in order to derive meaningful information and insights in real time”.
 
6
The Canadian component was led by Dr. Alana Maurushat of UNSW Law.
 
7
The division of participants among the three countries is as follows: 38 participants were from Australia (interviewed from 25 March 2015 to 13 November 2015), 14 were from the UK (interviewed from 24 February 2016 and 18 March 2016) and 11 were from Canada (interviewed from 15 October 2015 to 26 February 2016). For the methodology employed, see [13].
 
8
Discussions in sub-sections 1.3, 1.4 and 1.5 are largely based on [14].
 
9
See the discussion between J. Cannataci, C. Nyst, F. Patel and L. McGregor at Geneva Academy [17], and G. Greenleaf’s comments on the Report [18].
 
10
In 16 c. England, the visitations commenced in 1535, the inventory powers were granted by Parliament in 1536, and the process might have carried on for a few years. See for a cultural analysis of the ambivalent political roles that lists and cards can play, Werbin [65]. The author traces the history of Big Data “back to the earliest forms of punch cards, sorters and tabulators emerging in the late nineteenth century when these technologies of population control were first developed by Herman Hollerith (founder of IBM) while working at the US Census Bureau “.
 
11
Open Knowledge International is a global non-profit organisation “focused on realising open data’s value to society by helping civil society groups access and use data to take action on social problems”. Cf. https://​okfn.​org/​about/​
 
12
Former Information and Privacy Commissioner for the Canadian province of Ontario serving from 1997 to 2014. She is currently the Executive Director of the Privacy and Big Data Institute at Ryerson University.
 
13
Senior Analyst, Information Technology and Innovation Foundation.
 
14
See the seminal and influential white paper published in 2008 by the still unidentified author (or authors) under the pseudonym of ‘Satoshi Nakamoto‘ [25] .
 
15
Including Regulation of Investigatory Powers Act 2000 (UK), Police Act 1997 (UK), Justice and Security Act 2013 (UK), Counter-Terrorism and Security Act 2015 (UK), and Data Retention and Investigatory Powers Act 2014 (UK).
 
16
The United Kingdom, Australia, and Canada belong to the common law family of legal systems; are constitutional monarchies; they are bound by the multilateral United Kingdom – United States of America Agreement for cooperation in signals intelligence, known as Five Eyes.
 
17
Provisions of the Investigatory Powers Act include not only statutory controls on the issuance and approval of warrants, but also framework for oversight of the access to and gathering of communications and bulk sets of data, their use and management (distribution, retention and destruction).
 
18
Investigatory Powers Act 2016 (UK) s 2(1).
 
19
To access data from computers, smartphones etc. by the security and intelligence agencies, law enforcement and the armed forces.
 
20
The new Draft Code of Practice on Equipment Interference for the security and intelligence agencies identifies the following objectives:
“a) obtain information from the equipment in pursuit of intelligence requirements;
b) obtain information concerning the ownership, nature and use of the equipment with a view to meeting intelligence requirements;
c) locate and examine, remove, modify or substitute equipment hardware or software which is capable of yielding information of the type described in (a) and (b);
d) enable and facilitate surveillance activity by means of the equipment;
“Information” may include communications content, and communications data.”
 
21
Investigatory Powers Act 2016 (UK) s 141.
 
22
Investigatory Powers Act 2016 (UK) s160.
 
23
Investigatory Powers Act 2016 (UK) s182.
 
24
Investigatory Powers Act 2016 (UK) s 211.
 
25
Investigatory Powers Act 2016 (UK), s 18 and s 20.
 
26
Investigatory Powers Act 2016 (UK), s 19.
 
27
Investigatory Powers Act s 30 Renewal (s 33(9)(b)), notification and major modifications (s 37(3) and s 38) must be personally approved by the Secretary of State, or in the case of a warrant to be issued by the Scottish Ministers, a member of the Scottish Government. Decision to issue warrants to intelligence services are to be taken personally by the Secretary of State or, where relevant, by a member of the Scottish Government Ministers (105); as are decisions involving renewals of warrants (ss 117), major modifications (s 120, s 122).
 
28
Investigatory Powers Act 2016, s 18: “(1) Each of the following is an “intercepting authority” for the purposes of this Part—
(a) a person who is the head of an intelligence service; (b) the Director General of the National Crime Agency; (c) the Commissioner of Police of the Metropolis; (d) the Chief Constable of the Police Service of Northern Ireland; (e) the chief constable of the Police Service of Scotland [separate warrantry regime]; (f) the Commissioners for Her Majesty’s Revenue and Customs; (g) the Chief of Defence Intelligence;
(h) a person who is the competent authority of a country or territory outside the United Kingdom for the purposes of an EU mutual assistance instrument or an international mutual assistance agreement.”
 
29
Warrants made under the relevant mutual legal assistance treaty to which the United Kingdom is party for the purpose of gathering and exchanging information/data.
 
30
Investigatory Powers Act 2016 (UK) s 20(2)(c) provides that a “targeted interception warrant or targeted examination warrant is necessary “in the interests of the economic well-being of the United Kingdom so far as those interests are also relevant to the interests of national security”, but only “if the information which it is considered necessary to obtain is information relating to the acts or intentions of persons outside the British Islands” (s 20 (4).
 
31
Appointments of Judicial Commissioners will be made by the Prime Minister after consultation with the Lord Chief Justice of England and Wales, the Lord President of Scotland, the Lord Chief Justice of Northern Ireland, the Scottish Ministers, and the First Minister and deputy First Minister in Northern Ireland.
 
32
Judicial Commissioners have the power to approve both, warrants issued by the Secretary of State and those issued by Scottish Ministers under s 23 of the Investigatory Powers Act 2016. (1) In deciding whether to approve a person’s decision to issue a warrant under this Chapter, a Judicial Commissioner must review the person’s conclusions as to the following matters— (a) whether the warrant is necessary on relevant grounds (see subsection (3)), and (b) whether the conduct that would be authorised by the warrant is proportionate to what is sought to be achieved by that conduct. (2) In doing so, the Judicial Commissioner must— (a) apply the same principles as would be applied by a court on an application for judicial review, and (b) consider the matters referred to in subsection (1) with a sufficient degree of care as to ensure that the Judicial Commissioner complies with the duties imposed by section 2 (general duties in relation to privacy). (3) In subsection (1)(a) “relevant grounds” means— (a) in the case of a decision of the Secretary of State to issue a warrant, grounds falling within section 20; (b) in the case of a decision of the Scottish Ministers to issue a warrant, grounds falling within section 21(4).” The Advocate-General for Scotland (Lord Keen of Elie) [31].
 
33
There are two procedural control mechanisms: Section 23(4) of the Investigatory Powers Act 2016 requires the Judicial Commissioner who refuses to approve a person’s decision to issue a warrant to provide written reasons for the refusal; and s 23(5) provides that where “a Judicial Commissioner, other than the Investigatory Powers Commissioner, refuses to approve a person’s decision to issue a warrant …, the person may ask the Investigatory Powers Commissioner to decide whether to approve the decision to issue the warrant”.
 
34
The common law test of proportionality differs from the EU formulation of proportionality. Lumsdon & Ors, R v Legal Services Board [2015] UKSC 41; [2015] 3 WLR 121; Bank Mellat v HM Treasury (No 2) [2013] UKSC 39, [2013] 3 WLR 179.
 
35
Under s 227 of the Investigatory Powers Act 2016, the complex process of appointment is as follows: “Investigatory Powers Commissioner and other Judicial Commissioners (1) The Prime Minister must appoint— (a) the Investigatory Powers Commissioner, and (b) such number of other Judicial Commissioners as the Prime Minister considers necessary for the carrying out of the functions of the Judicial Commissioners. (2) A person is not to be appointed as the Investigatory Powers Commissioner or another Judicial Commissioner unless the person holds or has held a high judicial office (within the meaning of Part 3 of the Constitutional Reform Act 2005). (3) A person is not to be appointed as the Investigatory Powers Commissioner unless recommended jointly by— (a) the Lord Chancellor, (b) the Lord Chief Justice of England and Wales, (c) the Lord President of the Court of Session, and (d) the Lord Chief Justice of Northern Ireland. (4) A person is not to be appointed as a Judicial Commissioner under subsection (1)(b) unless recommended jointly by— (a) the Lord Chancellor, (b) the Lord Chief Justice of England and Wales, (c) the Lord President of the Court of Session, (d) the Lord Chief Justice of Northern Ireland, and (e) the Investigatory Powers Commissioner. (5) Before appointing any person under subsection (1), the Prime Minister must consult the Scottish Ministers. (6) The Prime Minister must have regard to a memorandum of understanding agreed between the Prime Minister and the Scottish Ministers when exercising functions under subsection (1) or (5). (7) The Investigatory Powers Commissioner is a Judicial Commissioner and the Investigatory Powers Commissioner and the other Judicial Commissioners are to be known, collectively, as the Judicial Commissioners”.
 
36
In the Investigatory Powers Act 2016 (UK), s 1, Parts 2 to 7 and Part 8; as well as by virtue of the Human Rights Act 1998 (UK); Data Protection Act 1998 (UK), s 55 (unlawful obtaining etc. of personal data); Wireless Telegraphy Act 2006 (UK), s 48 (offence of interception or disclosure of messages); Computer Misuse Act 1990 (UK), s 1 to 3A (computer misuse offences).
 
37
This discussion is based on Casanovas [32] and Casanovas et al. [33].
 
39
See GHENT 2015, ibid. “A data scientist can be defined as a person who creates or generates models that leverage predictive or prescriptive analytics but whose primary job function is outside of the field of statistics and analytics.”
 
41
Vice president at the Information Technology and Innovation Foundation (ITIF) and director of ITIF’s Center for Data Innovation.
 
42
Research analyst with The Information Technology and Innovation Foundation (ITIF).
 
43
This discussion is based on Casanovas et al. [33].
 
49
These semantic tools are constructed within a cooperative and collective work of knowledge engineering (with end-users’ cooperation). Semantics, constructing ontologies and ODP, means eliciting and sharing knowledge, making it explicit. See some examples [45] [46].
 
50
See the work by Renato Iannella et al. at https://​www.​w3.​org/​community/​odrl/​
 
51
Differential privacy aims to provide means to maximize the accuracy of queries from statistical databases while minimizing the chances of identifying its records.
 
52
See Dwork [47]: “Differential privacy is a strong privacy guarantee for an individual’s input to a (randomized) function or sequence of functions, which we call a privacy mechanism. Informally, the guarantee says that the behaviour of the mechanism is essentially unchanged independent of whether any individual opts into or opts out of the data set. Designed for statistical analysis, for example, of health or census data, the definition protects the privacy of individuals, and small groups of individuals, while permitting very different outcomes in the case of very different data sets”.
 
53
As stated by Dwork and Roth [49]: “Differential privacy describes a promise, made by a data holder, or curator, to a data subject: ‘You will not be affected, adversely or otherwise, by allowing your data to be used in any study or analysis, no matter what other studies, data sets, or information sources, are available.’ At their best, differentially private database mechanisms can make confidential data widely available for accurate data analysis, without resorting to data clean rooms, data usage agreements, data protection plans, or restricted views. Nonetheless, data utility will eventually be consumed: the Fundamental Law of Information Recovery states that overly accurate answers to too many questions will destroy privacy in a spectacular way. The goal of algorithmic research on differential privacy is to postpone this inevitability as long as possible.”
 
54
On 8 April 2016 the Council adopted the Regulation and the Directive. On 14 April so did the European Parliament. On 4 May, the official texts were published in the EU Official Journal (in all the official languages). The Regulation entered into force on 24 May, and it shall apply from 25 May 2018. The Directive, on 5 May 2016, and the EU states should transpose it into their national laws before 6 May 2018.
 
56
This American judicial tradition of property under some constraints to protect individual rights has been interpreted by Morton Horwitz [56] as a benefit for the economic development of entrepeneurs and companies, creating the legal conditions for 20 c. liberal capitalism.
 
57
Two different Western cultures: “On the one hand, a European interest in personal dignity, threatened primarily by the mass media; on the other hand, an American interest in liberty, threatened primarily by the government” [60].
 
Literature
5.
go back to reference Diebold FA. Personal Perspective on the Origin(s) and Development of 'Big Data': The Phenomenon, the Term, and the Discipline, PIER Working Paper No 13–003, 2nd Version. 2012. Available at: http://ssrn.com/abstract=2202843. Cited 5 October 2015. Diebold FA. Personal Perspective on the Origin(s) and Development of 'Big Data': The Phenomenon, the Term, and the Discipline, PIER Working Paper No 13–003, 2nd Version. 2012. Available at: http://​ssrn.​com/​abstract=​2202843. Cited 5 October 2015.
6.
go back to reference Cox M, Ellsworth D. Application-Controlled Demand Paging for Out-of-Core Visualization. Proceedings of the 8th Conference on Visualization, IEEE Computer Society Press; 1997. Cox M, Ellsworth D. Application-Controlled Demand Paging for Out-of-Core Visualization. Proceedings of the 8th Conference on Visualization, IEEE Computer Society Press; 1997.
7.
go back to reference Laney D. 3D data management: controlling data volume, velocity and variety. META Group Research Note No. 2001;6:2001. Laney D. 3D data management: controlling data volume, velocity and variety. META Group Research Note No. 2001;6:2001.
8.
go back to reference Ylijoki O, Porras J. Perspectives to definition of Big Data: A mapping study and discussion. Journal of Innovation Management. 2016;4(1):69–91. Ylijoki O, Porras J. Perspectives to definition of Big Data: A mapping study and discussion. Journal of Innovation Management. 2016;4(1):69–91.
9.
go back to reference Bennett Moses L. Bridging distances in approach: Sharing ideas about technology regulation. In R. Leenes, E. Kosta (editors) Bridging distances in technology and regulation, Oisterwijk: Wolf Legal Pub.; 2013. 37–51. Bennett Moses L. Bridging distances in approach: Sharing ideas about technology regulation. In R. Leenes, E. Kosta (editors) Bridging distances in technology and regulation, Oisterwijk: Wolf Legal Pub.; 2013. 37–51.
10.
go back to reference Bijker WE. Of Bicycles, Bakelites, and Bulbs: Towards a Theory of Sociotechnical Change, MIT Press; 1997. Bijker WE. Of Bicycles, Bakelites, and Bulbs: Towards a Theory of Sociotechnical Change, MIT Press; 1997.
11.
go back to reference Orlikowski WJ, Gash DC. Technological frames: Making sense of information technology in organisations. ACM Trans Inf Syst. 1994;12(2):174–207.CrossRef Orlikowski WJ, Gash DC. Technological frames: Making sense of information technology in organisations. ACM Trans Inf Syst. 1994;12(2):174–207.CrossRef
12.
go back to reference Chan J, et al. The technological game: How information technology is transforming police practice. Criminal Justice. 2001;1(2):139–59.CrossRef Chan J, et al. The technological game: How information technology is transforming police practice. Criminal Justice. 2001;1(2):139–59.CrossRef
13.
go back to reference Law and Policy Program, Data to Decisions CRC. Big Data Technology and National Security - Comparative International Perspectives on Strategy, Policy and Law: Methodology (Data to Decisions CRC). Adelaide. 2016. Law and Policy Program, Data to Decisions CRC. Big Data Technology and National Security - Comparative International Perspectives on Strategy, Policy and Law: Methodology (Data to Decisions CRC). Adelaide. 2016.
14.
go back to reference Law and Policy Program, Data to Decisions CRC. Big Data Technology and National Security- Comparative International Perspectives on Strategy, Policy and Law: Comparative Study (Data to Decisions CRC, 2016). Adelaide 2016. Law and Policy Program, Data to Decisions CRC. Big Data Technology and National Security- Comparative International Perspectives on Strategy, Policy and Law: Comparative Study (Data to Decisions CRC, 2016). Adelaide 2016.
15.
go back to reference Law and Policy Program, Data to Decisions CRC. Big Data Technology and National Security - Comparative International Perspectives on Strategy, Policy and Law: Australia (Data to Decisions CRC). Adelaide. 2016. Law and Policy Program, Data to Decisions CRC. Big Data Technology and National Security - Comparative International Perspectives on Strategy, Policy and Law: Australia (Data to Decisions CRC). Adelaide. 2016.
19.
go back to reference NIST Big Data Public Working Group Definitions and Taxonomies Subgroup. NIST Special Publication 1500–1, NIST Big Data Interoperability Framework: Volume 1, Definitions. Final Version 1. 2015. Available at: doi:10.6028/NIST.SP.1500-1. Cited 5 October 2016. NIST Big Data Public Working Group Definitions and Taxonomies Subgroup. NIST Special Publication 1500–1, NIST Big Data Interoperability Framework: Volume 1, Definitions. Final Version 1. 2015. Available at: doi:10.​6028/​NIST.​SP.​1500-1. Cited 5 October 2016.
35.
go back to reference Poblet M. (ed.). Mobile Technologies for Conflict Management. Online dispute resolution, governance, participation. LGTS n. 2, 2011, Dordrecht: Springer Verlag Poblet M. (ed.). Mobile Technologies for Conflict Management. Online dispute resolution, governance, participation. LGTS n. 2, 2011, Dordrecht: Springer Verlag
36.
go back to reference Corea, F. Big Data Analytics: A Management Perspective, Studies in Big Data 21, 2016, Switzerland, Springer Nature Corea, F. Big Data Analytics: A Management Perspective, Studies in Big Data 21, 2016, Switzerland, Springer Nature
37.
go back to reference Williams S. Business intelligence strategy and Big Data analytics: a general management perspective. Amsterdam: Morgan Kaufmann, Elsevier; 2016. Williams S. Business intelligence strategy and Big Data analytics: a general management perspective. Amsterdam: Morgan Kaufmann, Elsevier; 2016.
39.
go back to reference Casanovas P. The Future of Law: Relational Law and Next Generation of Web Services, in M. Fernández-Barrera, P. de Filippi et al. (Eds.) The Future of Law and Technology: Looking into the Future. Selected Essays. European Press Academic Publishing, Legal Information and Communication Technologies Series, vol. 7, Florence. 2010. pp. 137–156. Available at: http://www.ejls.eu/6/205UK.htm. Cited 5 October 2016. Casanovas P. The Future of Law: Relational Law and Next Generation of Web Services, in M. Fernández-Barrera, P. de Filippi et al. (Eds.) The Future of Law and Technology: Looking into the Future. Selected Essays. European Press Academic Publishing, Legal Information and Communication Technologies Series, vol. 7, Florence. 2010. pp. 137–156. Available at: http://​www.​ejls.​eu/​6/​205UK.​htm. Cited 5 October 2016.
42.
go back to reference Schmachtenberg M, Bizer C, Jentzsch A, Cyganiak R. The Linking Open Data Cloud Diagram. 2014. Available at: http://Lod-Cloud.Net. Cited: 5 October 2016. See as a published paper: Schmachtenberg, M. et al. Adoption of the Linked Data Best practices in different topical domains, 13th International Semantic Web Conference, LCNS 8796, pp. 245-260. Springer International Publishing. Schmachtenberg M, Bizer C, Jentzsch A, Cyganiak R. The Linking Open Data Cloud Diagram. 2014. Available at: http://​Lod-Cloud.​Net. Cited: 5 October 2016. See as a published paper: Schmachtenberg, M. et al. Adoption of the Linked Data Best practices in different topical domains, 13th International Semantic Web Conference, LCNS 8796, pp. 245-260. Springer International Publishing.
45.
go back to reference Casellas N, Blázquez M, Kiryakov A, Casanovas P, Poblet M, Benjamins VR. OPJK into PROTON: Legal domain ontology integration into an upper-level ontology. In OTM Confederated International Conferences, On the Move to Meaningful Internet Systems, Springer Berlin, Heidelberg. 2005, pp. 846–855. Casellas N, Blázquez M, Kiryakov A, Casanovas P, Poblet M, Benjamins VR. OPJK into PROTON: Legal domain ontology integration into an upper-level ontology. In OTM Confederated International Conferences, On the Move to Meaningful Internet Systems, Springer Berlin, Heidelberg. 2005, pp. 846–855.
46.
go back to reference Casanovas P, Casellas N, Tempich C., Vrandecic D., Benjamins VR. OPJK and DILIGENT: ontology modeling in a distributed environment. Artificial Intelligence and Law, 2007; 15 (2): 171–186. Casanovas P, Casellas N, Tempich C., Vrandecic D., Benjamins VR. OPJK and DILIGENT: ontology modeling in a distributed environment. Artificial Intelligence and Law, 2007; 15 (2): 171–186.
47.
go back to reference Dwork C. The differential privacy frontier. In: Theory of Cryptography Conference, Springer, LNCS 5444. Berlin: Springer; 2009. pp. 496–502. Dwork C. The differential privacy frontier. In: Theory of Cryptography Conference, Springer, LNCS 5444. Berlin: Springer; 2009. pp. 496–502.
48.
go back to reference Dwork C. Differential privacy: a survey of results. In: In international Conference on theory and applications of models of computation, LNCS, Springer, Berlin, 4978; 2008.,pp. 1–19. Dwork C. Differential privacy: a survey of results. In: In international Conference on theory and applications of models of computation, LNCS, Springer, Berlin, 4978; 2008.,pp. 1–19.
49.
go back to reference Dwork C, Roth A. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science. 2014;9(3–4):211–407.MathSciNetMATH Dwork C, Roth A. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science. 2014;9(3–4):211–407.MathSciNetMATH
52.
go back to reference Hijmans, H. 2016. The European Union as Guardian of internet privacy: the story of art 16 TFEU, LGTS vol. 31, Dordrecht: Springer. Hijmans, H. 2016. The European Union as Guardian of internet privacy: the story of art 16 TFEU, LGTS vol. 31, Dordrecht: Springer.
53.
go back to reference Gutwirth S, Leenes R, De Hert P (Eds.). Data Protection on the Move. Current Developments in ICT and Privacy/Data Protection, Springer Verlag, Dordrecht, 2016. Gutwirth S, Leenes R, De Hert P (Eds.). Data Protection on the Move. Current Developments in ICT and Privacy/Data Protection, Springer Verlag, Dordrecht, 2016.
54.
go back to reference González-Fuster G. The emergence of personal data protection as a fundamental right of the EU. Springer, Dordrecht, LGT. 16: 2014 González-Fuster G. The emergence of personal data protection as a fundamental right of the EU. Springer, Dordrecht, LGT. 16: 2014
55.
go back to reference De Hert P, Papakonstantinou V. The new General Data Protection Regulation: still a sound system for the protection of individuals? Computer Law & Security Review. 2016;32:179–94. De Hert P, Papakonstantinou V. The new General Data Protection Regulation: still a sound system for the protection of individuals? Computer Law & Security Review. 2016;32:179–94.
56.
go back to reference Horwitz MJ. The transformation of American law, 1870–1960: The crisis of legal orthodoxy. Oxford: Oxford University Press; 1992. Horwitz MJ. The transformation of American law, 1870–1960: The crisis of legal orthodoxy. Oxford: Oxford University Press; 1992.
57.
go back to reference Westin AF. Privacy and freedom. New York: Atheneum Books; 1963. Westin AF. Privacy and freedom. New York: Atheneum Books; 1963.
58.
go back to reference Westin AF. (dir.). Computers, personnel administration, and citizen rights. 1979. 500 (50), US Department of Commerce, National Bureau of Standards. Westin AF. (dir.). Computers, personnel administration, and citizen rights. 1979. 500 (50), US Department of Commerce, National Bureau of Standards.
59.
go back to reference Warren SD, Brandeis LD. The right to privacy. Harvard Law Review. 1890;4(5):193–220.CrossRef Warren SD, Brandeis LD. The right to privacy. Harvard Law Review. 1890;4(5):193–220.CrossRef
60.
go back to reference Whitman JQ. The two Western cultures of privacy: Dignity versus liberty. Yale Law Journal. 2004;113:1151–221.CrossRef Whitman JQ. The two Western cultures of privacy: Dignity versus liberty. Yale Law Journal. 2004;113:1151–221.CrossRef
61.
go back to reference Casanovas P, Palmirani M, Peroni S, van Engers T, Vitali, F. Special Issue on the Semantic Web for the Legal Domain, Guest Editors Editorial: The Next Step. Semantic Web Journal. 2016, 7 (2): 1–13. Available at: available at SSRN: http://ssrn.Com/abstract=2765912. Cited 5 October 2016. Casanovas P, Palmirani M, Peroni S, van Engers T, Vitali, F. Special Issue on the Semantic Web for the Legal Domain, Guest Editors Editorial: The Next Step. Semantic Web Journal. 2016, 7 (2): 1–13. Available at: available at SSRN: http://​ssrn.​Com/​abstract=​2765912. Cited 5 October 2016.
62.
go back to reference Rodríguez-Doncel V, Santos C, Casanovas P, Gómez-Pérez A. Legal aspects of linked data – The European framework, Computer Law & Security Review: The International Journal of Technology Law and Practice, 2016;32(6): 799–813, doi: 10.1016/j.clsr.2016.07.005. Rodríguez-Doncel V, Santos C, Casanovas P, Gómez-Pérez A. Legal aspects of linked data – The European framework, Computer Law & Security Review: The International Journal of Technology Law and Practice, 2016;32(6): 799–813, doi: 10.​1016/​j.​clsr.​2016.​07.​005.
63.
go back to reference Pagallo U. The Law of Robots. Crime, contracts, and torts. Dordrecht: Springer; 2013. Pagallo U. The Law of Robots. Crime, contracts, and torts. Dordrecht: Springer; 2013.
64.
go back to reference Mittelstadt BD, Floridi L, (ed.). The Ethics of Biomedical Big Data. Dordrecht: Springer; 2016. Mittelstadt BD, Floridi L, (ed.). The Ethics of Biomedical Big Data. Dordrecht: Springer; 2016.
65.
go back to reference Werbin KC. The List Serves: Population Control and Power. Amsterdam: Institute of Network Cultures; 2008. Werbin KC. The List Serves: Population Control and Power. Amsterdam: Institute of Network Cultures; 2008.
Metadata
Title
Regulation of Big Data: Perspectives on strategy, policy, law and privacy
Authors
Pompeu Casanovas
Louis De Koker
Danuta Mendelson
David Watts
Publication date
08-05-2017
Publisher
Springer Berlin Heidelberg
Published in
Health and Technology / Issue 4/2017
Print ISSN: 2190-7188
Electronic ISSN: 2190-7196
DOI
https://doi.org/10.1007/s12553-017-0190-6

Other articles of this Issue 4/2017

Health and Technology 4/2017 Go to the issue

Premium Partner