Skip to main content
Erschienen in:
Buchtitelbild

2018 | OriginalPaper | Buchkapitel

1. Setting the Stage

verfasst von : Aurelia Tamò-Larrieux

Erschienen in: Designing for Privacy and its Legal Framework

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter addresses the current state of privacy in the digital age and how it came to be. The focus rests predominantly on technical and economic issues, as they greatly influence the discourse on the “digital privacy challenge.” [The term digital privacy challenge is framed by Gasser, Schweizerischer Juristentag 2015, ZSR Band 134 II, pp. 339 et seqq, 2015. Note that other forces at play, such as societal and legal aspects, exist and will be discussed in Chap. 3 in particular. Cf. for a complete analysis of technological, economic, behavioral, and legal forces Gasser, Schweizerischer Juristentag 2015, ZSR Band 134 II, pp. 355 et seqq., 2015.] First, we describe the technical revolution, specifically the shift from big mainframe computers towards ever-smaller data processing devices. Second, we discuss how economic developments led to the emergence of new business models which use data as their new raw material. Both developments feed into each other and compound the other’s effect on the erosion of privacy. We then examine how the movement towards a digital environment raises issues with respect to privacy protection. Finally, we explore the regulatory developments which are a result of concerns over the loss of privacy in a digital ecosystem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Cf. Catuogno/Turchi, p. 205; Federrath/Pfitzmann, pp. 857-858; Floridi, pp. 6-12; Langheinrich, pp. 1-5; Mayer-Schönberger, delete, pp. 62 et seqq.; Purtova, p. 19; Webster et al., pp. 90-97; approximately every 1.5-2 years the progress in microelectronic leads to duplication of the performance ability of processors—for a fixed price. This rule is known as “Moore’s Law”, cf. Moore, pp. 114 et seqq.; Mattern, p. 3.
 
2
Druey defines data as a sub-unit of information (p. 20). Information entails two characteristics: first an information process, a prerequisite for information to originate, and second, a meaning, which requires specification or has to be interpreted, cf. Specht, p. 23 with further references. Information is not an objective value, but its interpretation depends on the perception of the recipient, cf. Druey, p. 356. Information yields an added value compared to the raw data, cf. Linde, p. 6; Druey, pp. 5 et seqq., pp. 25 et seqq. This resulting knowledge in turn yields power, cf. Pasquale, p. 3.
 
3
Mattern, p. 4; cf. also Federrath/Pfitzmann, pp. 857-858; the increased transferability of data has triggered the growth of transborder data flows, cf. Kuner, pp. 1 et seqq.
 
4
Cf. Cohen, p. 107; Froomkin, pp. 1476 et seqq.; Gasser, pp. 357-358; Langheinrich, pp. 39-40.
 
5
Cf. i.a. Langheinrich, pp. 3 et seqq.; Mayer-Schönberger, delete, pp. 62 et seqq.
 
6
Wiegerling, pp. 19-21; cf. on robots, Lutz/Tamò, p. 27 with reference to Bekey, p. 18.
 
7
Cf. Catuogno/Turchi, p. 205; Mattern, p. 11; Purtova, pp. 38-39; Thierer, p. 1, 7; Wiegerling, pp. 19-25; cf. also Tene, pp. 5-6 elaborating on RFID, smart grids, and robotics.
 
8
The attributes efficiency, convenience, and security distinctively influence the likelihood of the social adaption of technological trends, such as ubiquitous computing, Internet of Things, or big data analysis, cf. Langheinrich, pp. 5-6.
 
9
Quercia et al., p. 971 et seqq.
 
10
So-called “high-resolution management,” cf. Subirana/Sarma/Fleisch, pp. 8 et seqq.
 
11
Cf. i.a. Calo, pp. 1007 et seqq.; Langheinrich, pp. 37-39; Mayer-Schönberger/Cukier, pp. 91 et seqq.
 
12
Calo, pp. 1007 et seqq.; Purtova, pp. 33-35; Solove, Metaphors, pp. 1404 et seqq.; cf. also Zuiderveen Borgesius, Singling out, pp. 261 et seqq.
 
13
Kobsa, p. 629; Zarsky, pp. 17-26; cf. also Brown, unpaginated; Hildebrandt, pp. 17-30.; Solove, Metaphors, pp. 1404 et seqq.; van der Hof/Prins, pp. 112-115.
 
14
Zuiderveen Borgesius, Singling out, pp.256 et seqq.; Purtova, pp. 23-24; cf. also Simitis, pp. 513-515; Tene, pp. 2-3. Behavioral profiling is the study of patterns of behavior. Here the focus rests on the analysis of typical behavior(s) of data subjects and deviations from it. Cf. on the process of behavioral profiling also Canhoto/Backhouse, pp. 47-58; Solove, Metaphors, pp. 1404 et seqq.
 
15
In the literature, these trends are defined as either Ubiquitous Computing, Ambient Intelligence (AmI), Pervasive Computing, Augmented Reality (AR), or “onlife” (a term proposed by Floridi, pp. 43 et seq.). Cf. Floridi, pp. 43 et seqq.; Hildebrandt, p. 23; Mattern, pp. 11 et seqq.; Purtova, pp. 38-39; Thierer, p. 61; Wiegerling, pp. 19-25; Weiser, pp. 94-104.
 
16
Weiser envisioned the evolution towards ubiquitous computing, cf. Weiser, pp. 94 et seqq.; cf. also Burkert, Privacy, pp. 63-64; Floridi, pp. 6-12; Froomkin, pp. 1476 et seqq.; Langheinrich, pp. 1-5; Purtova, p. 19; Uteck, pp. 85-91; Webster et al., pp. 28-33.
 
17
Spiekermann, p. 268.
 
18
Cf. i.a. Calo, pp. 1007 et seqq.; Langheinrich, pp. 37-39; Mayer-Schönberger/Cukier, pp. 91 et seqq.
 
19
Cf. for historical analysis of Big Data, Ambrose, pp. 25 et seqq.; cf. also Floridi, pp. 13-17; Rubinstein, pp. 3-4; Shaw, pp. 30 et seqq.; Thierer, pp. 1 et seqq.; cf. also Opinion EDPS, 2014; PCAST Report, 2014; OECD, Digital Outlook, 2015, p. 246.
 
20
So-called “Garterns 3-Vs” first proposed in 2001 (cf. META Group (now Gartner), 2001); cf. also MGI Report, 2011; OECD, Digital Outlook, 2015, p. 246; Floridi, pp. 13-17 arguing that “big data” is wrongly linked to the idea of “information overload.” He argues that the exponential growth of data (i.e., our entrance in the age of the zattabyte and a “data-richer” world), must be welcomed as the way forward.
 
21
Cf. Ambrose, pp. 25 et seqq.; boyd/Crawford, pp. 662 et seqq.; Mayer-Schönberger/Cukier, pp. 104-110; Floridi, pp. 22-24 on the value of connectivity of computers; cf. also Opinion EDPS, 2014.
 
22
Mayer-Schönberger/Cukier, p. 152. With aggregated data, reidentification of anonymized data is often possible, cf. Ohm, pp. 1716 et seqq.; cf. also Kosinski/Stillwell/Graepel, unpaginated; Montjoye et al., pp. 536-539; Sweeny/Abu/Winn, p. 1 et seqq.
 
23
Cf. Mayer-Schönberger/Cukier, pp. 17 et seqq.; Zarsky, pp. 26-30; Economist Prediction, 2016.
 
24
Mayer-Schönberger/Cukier, p. 17. Probably a more realistic scenario than getting arrested is a scenario where algorithms determine whether an arrested criminal can be released on bail. Cf. Joseph, Citylab, 2016.
 
25
Tene/Polonetsky, pp. 243-251; cf. also Brynjolfsson/Hitt/Kim, unpaginated; Bygrave, pp. 98-99; Tene, pp. 5-7; Thierer, pp. 6 et seqq.; MGI Report, 2011; cf. also Kuner, pp. 102-105 on the benefits and risks of transborder data flow in particular.
 
26
Cf. e.g., on downsides of predictions through algorithms and their build in biases: Economist, Prediction, 2016; Crawford, NYT, 2016; Joseph, Citylab, 2016; Leigh, Guardian, 2016.
 
27
Bekey, pp. 17 et seqq.; Lutz/Tamò, pp. 27-28.
 
28
Mindell, pp. 191 et seqq.
 
29
Cf. on the topic of accountability of algorithms, Kroll et al.
 
30
Mayer-Schönberger/Cukier, p. 17.
 
31
boyd/Crawford, pp. 662 et seqq.; Mayer-Schönberger/Cukier, pp. 17 et seqq.; Rubinstein, pp. 4-5.
 
32
Tavani, pp. 139-140; Floridi, Ontological interpretation, pp. 185 et seqq., introducing the 2P2Q hypothesis, which focuses on issues affecting “processing, pace, quantity, and quality.”
 
33
Own framework, inspired by Birnhack, p. 80; Floridi, pp. 5-6; Purtova, pp. 43-53; Zarsky, pp. 17-32.
 
34
Cf. Bygrave, Data Privacy, pp. 9-11; Langheinrich, Privatsphäre, pp. 233 et seqq.; Mattern/Langheinrich, pp. 55 et seqq.; Wiegerling, fn. 8.
 
35
The subsumption in this book follows approaches taken by e.g., Solove, p. 101-170; Tavani, pp. 139-140; Floridi, Ontological interpretation, pp. 185-200 and his 2P2Q examination scheme. Cf. also Chap. 3.
 
36
Cf. Purtova, pp. 45-51; cf. also Chap. 3. This demand for untraceability and regaining control over the information that data collectors collect has materialized in the development of privacy-enhancing technologies, see Chaps. 2 and 4.
 
37
Eurobarometer 431, 2015, p. 6 and Eurobarometer 359, 2011, p. 1. The willingness of an individual to disclose such personal information depends on the information type. Cf. also Kobsa, pp. 633-634; Phelps/Nowak/Ferrell, pp. 27 et seqq.; for attitudes of US-Americans cf. PEW Cybersecurity Report, 2015.
 
38
Cf. in particular Eurobarometer 431, 2015, p. 6 and Eurobarometer 359, 2011, p. 1. By “control capabilities,” the ability to “exert influence over those who are the subjects of surveillance” is meant, cf. Bygrave, p. 100 (citation). Cf. also Lessig, Code 2, pp. 223 et seqq.; Zuboff, pp. 75 et seqq., who coined the term “surveillance capitalism.”
 
39
Schneier, Blog on Security: Public/Private Surveillance Partnership, 2013; cf. also Christle/Spieckermann, pp. 9 et seqq.; Zuboff, pp. 75 et seqq.
 
40
Barocas/Nissenbaum, unpaginated; Brunton/Nissenbaum, unpaginated; Cohen, Privacy, pp. 1904 et seqq.; Tene/Polonetsky, OBA, pp. 288 et seqq; van der Hof/Prins, p. 119 et seqq.; Zarsky, pp. 17-26; cf. also EC, Impact Assessment, 2012, pp. 21 et seqq. with reference to the Eurobarometer 359, 2011.
 
41
Cf. e.g., study on how mobile apps share personal data by Zang et al., unpaginated; cf. also Christle/Spieckermann, pp. 9 et seqq.
 
42
Cf. i.a. Brunton/Nissenbaum, unpaginated; Calo, pp. 999 et seqq.; Christle/Spieckermann, pp. 123 et seqq.; Hartzog, Blueprint, pp. 153 et seqq.; Searls, pp. 61 et seqq.; cf. also ENISA Report, 2014, p. 1.
 
43
Searls, p. 55; An example of a controversial change was Google’s 2012 privacy policy update for which it was fined, cf. CNIL, Deliberation No. 2013-420; cf. Chap. 7.
 
44
Acquisti/Grossklags, p. 365; Hermstrüwer, pp. 17 et seqq.; Reidenberg et al., pp. 83 et seqq.; WP29, Opinion on IoT, 2014, pp. 6-7.
 
45
Mayer-Schönberger/Cukier, pp. 17 et seqq.; Zarsky, pp. 26-30.
 
46
A term connoted by Mayer-Schönberger/Cukier, p. 178 and Pasquale’s “Black Box Society” book; cf. also Watson, unpaginated; Executive Office Report, 2016.
 
47
Cf. Bygrave, pp. 105-106 stating that the realization that much data hold by organizations was deficient was a catalyst for the emergence of data protection laws (cf. Chap. 5); cf. also Executive Office Report, 2016.
 
48
Commonly referred to are scenarios resembling the movie “Minority Report,” where artificial intelligence is used to prevent crimes (i.e., predict violent crimes and enforcing the law before the crime happens; cf. e.g., Economist, Prediction, 2016).
 
49
Bygrave, p. 104; cf. also Bygrave, Data Privacy, pp. 10-11.
 
50
van der Hof/Prins, p. 117.
 
51
Hildebrandt, Profiling, p. 306.
 
52
Note that the fear over the increased automatization of decision-making is not new. Already in 1992 the EC discussed the diminishing influence of data subjects with increased automatization. Cf. Bygrave, p. 96 with reference to EC, Amended proposal, 1992.
 
53
Cf. i.a. Mayer-Schönberger/Cukier, pp. 150 et seqq.; Pasquale, pp. 59 et seqq.
 
54
Cf. on online price discrimination IViR research paper by Zuiderveen Borgesius, Price Discrimination, pp. 3 et seqq.
 
55
Zuiderveen Borgesius, Price Discrimination, pp. 5-9; Lessig, Code 1, pp. 155-156; Lessig, Code 2, pp. 220-222; Schneier, pp. 108-113; cf. also Executive Office Report, 2015 and Executive Office Report, 2016.
 
56
Citron/Pasquale, pp. 8 et seqq.; Crawford/Schultz, pp. 99 et seqq.; Gürses, p. 45; Schneier, pp. 108 et seqq.
 
57
Zarsky, pp. 51-52 on the manipulation of interests and choices; cf. also Bygrave, p. 107; Bygrave, Data Privacy, pp. 10-11.
 
58
Lessig, Code 1, p. 154; Lessig, Code 2, p. 220.
 
59
Sunstein has coined the term “echo chamber,” cf. Sunstein, Echo Chambers, pp. 1 et seqq.; cf. also Pariser, pp. 47 et seqq.; Shapiro, pp. 113 et seqq.; Sunstein, pp. 46 et seqq; Tene/Polonetsky, p. 252.
 
60
Sunstein, pp. 25 et seqq. Sunstein argues that citizens should have a range of shared experiences, as those common experiences are necessary for addressing social issues and understanding one another, cf. in particular pp. 99 et seqq.
 
61
Cf. Cuijpers/Purtova/Kosta, p. 555 on the right to be forgotten as the inverse to the notion of “total recall” enabled through the “ever growing data storage and retrieval capacity of modern IT.”
 
62
Mayer-Schönberger, delete, p. 7, pp. 62 et seqq and pp. 97 et seqq. Cf. also Brown, unpaginated.
 
63
As elaborated upon by Mayer-Schönberger in his book “delete”.
 
64
Brunton/Nissenbaum, unpaginated; Christle/Spieckermann, pp. 123 et seqq.; ENISA Report, 2014, p. 1.
 
65
Brown/Marsden, pp. 50-53.
 
66
Burkert, Privacy, pp. 63-64.
 
67
Burkert, Changing Patterns, pp. 2-4.
 
68
Burkert, Changing Patterns, pp. 2-4.
 
69
Burkert, Changing Patterns, pp. 2-4; cf. also Rossnagel/Pfitzmann/Garstka, p. 22 on the revision of the German data protection legislation.
 
70
Cf. Chap. 5, Sect. 5.​3; CJEU, C-131/12; Art. 17 GDPR.
 
71
Cf. Chap. 5, Sect. 5.​2. The attitude of policymakers towards the use of technical tools has changed over the past decades. They have gradually embraced the notion that technology is part of the solution. The importance of technology for data protection has also been discussed by Bennett/Raab, p. 179; Brown/Marsden, p. 57, pp. 66-68, pp. 200-203; Leenes/Koops, Code, pp. 195 et seqq.; Leenes/Koops, pp. 329 et seqq.; Lessig, Code 2; Lessig, Code 1.
 
72
Cf. i.a. Bellotti/Sellen, pp. 77 et seqq.; Langheinrich, pp. 18 et seqq.; cf. also Chap. 2 for further references.
 
Literatur
Zurück zum Zitat Acquisti, A. & Grossklags, J. (2008). What Can Behavioral Economics Tech Us about Privacy? In A. Acquisti, S. Gritzalis, C. Lambrinoudakis, S. di Vimercatiet (Eds.), Digital Privacy—Theory, Technologies, and Practices (pp. 363-377). New York: Auerbach Publications. Acquisti, A. & Grossklags, J. (2008). What Can Behavioral Economics Tech Us about Privacy? In A. Acquisti, S. Gritzalis, C. Lambrinoudakis, S. di Vimercatiet (Eds.), Digital Privacy—Theory, Technologies, and Practices (pp. 363-377). New York: Auerbach Publications.
Zurück zum Zitat Ambrose, M.L. (2014). From the Avalanche of Numbers to Big Data: A Comparative Historical Perspective on Data Protection in Transition. In K. O’Hara, C. Nguyen & P. Haynes (Eds.), Digital Enlightenment Foundation Yearbook on Social Networks and Social Machines, Surveillance and Empowerment (pp. 25-48), Amsterdam: IOS Press. Ambrose, M.L. (2014). From the Avalanche of Numbers to Big Data: A Comparative Historical Perspective on Data Protection in Transition. In K. O’Hara, C. Nguyen & P. Haynes (Eds.), Digital Enlightenment Foundation Yearbook on Social Networks and Social Machines, Surveillance and Empowerment (pp. 25-48), Amsterdam: IOS Press.
Zurück zum Zitat Bekey, G. (2012). Current Trends in Robotics: Technology and Ethics. In P. Lin, G. Bekey & K. Abney (Eds.), Robot Ethics—The Ethical and Social Implications of Robotics (pp. 17-34). Cambridge: MIT Press. Bekey, G. (2012). Current Trends in Robotics: Technology and Ethics. In P. Lin, G. Bekey & K. Abney (Eds.), Robot Ethics—The Ethical and Social Implications of Robotics (pp. 17-34). Cambridge: MIT Press.
Zurück zum Zitat Bellotti, V. & Sellen, A. (1993). Design for Privacy in Ubiquitous Computing Environments. Proceedings of the Third European Conference on Computer-Supported Cooperative Work, Milan, Italy, 77-92. Bellotti, V. & Sellen, A. (1993). Design for Privacy in Ubiquitous Computing Environments. Proceedings of the Third European Conference on Computer-Supported Cooperative Work, Milan, Italy, 77-92.
Zurück zum Zitat Bennett, C. & Raab, C. (2006). The Governance of Privacy—Policy Instruments in Global Perspective. Cambridge: MIT Press. Bennett, C. & Raab, C. (2006). The Governance of Privacy—Policy Instruments in Global Perspective. Cambridge: MIT Press.
Zurück zum Zitat Birnhack, M. (2013). Reverse Engineering Informational Privacy Law. Yale Journal of Law and Technology, 15(1), 24-91. Birnhack, M. (2013). Reverse Engineering Informational Privacy Law. Yale Journal of Law and Technology, 15(1), 24-91.
Zurück zum Zitat Boyd, D. & Crawford, K. (2012). Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5), 662-679.CrossRef Boyd, D. & Crawford, K. (2012). Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5), 662-679.CrossRef
Zurück zum Zitat Brown, I. & Marsden, C. (2013). Regulating Code—Good Governance and Better Regulation in the Information Age. Cambridge: MIT Press. Brown, I. & Marsden, C. (2013). Regulating Code—Good Governance and Better Regulation in the Information Age. Cambridge: MIT Press.
Zurück zum Zitat Burkert, H. (2005). Changing Patterns—Supplementary Approaches to Improving Data Protection a European Perspective. Presentation at CIAJ 2005 Annual Conference on Technology, Privacy and Justice, Toronto, Canada. (cited: Changing Patterns) Burkert, H. (2005). Changing Patterns—Supplementary Approaches to Improving Data Protection a European Perspective. Presentation at CIAJ 2005 Annual Conference on Technology, Privacy and Justice, Toronto, Canada. (cited: Changing Patterns)
Zurück zum Zitat ———— (2000). Privacy—Data Protection: A German/European Perspective. In C. Engel & K. Keller (Eds.), Governance of global networks in the light of differing local values (pp. 43-70). Baden-Baden: Nomos. (cited: Privacy) ———— (2000). Privacy—Data Protection: A German/European Perspective. In C. Engel & K. Keller (Eds.), Governance of global networks in the light of differing local values (pp. 43-70). Baden-Baden: Nomos. (cited: Privacy)
Zurück zum Zitat ———— (2014). Data Privacy Law—An International Perspective. Oxford: University Press. (cited: Data Privacy) ———— (2014). Data Privacy Law—An International Perspective. Oxford: University Press. (cited: Data Privacy)
Zurück zum Zitat ———— (2002). Data Protection Law—Approaching Its Rationale, Logic and Limits. The Hague: Kluwer Law International. ———— (2002). Data Protection Law—Approaching Its Rationale, Logic and Limits. The Hague: Kluwer Law International.
Zurück zum Zitat Calo, R. (2014). Digital Market Manipulation. George Washington Law Review, 82, 995-1051. Calo, R. (2014). Digital Market Manipulation. George Washington Law Review, 82, 995-1051.
Zurück zum Zitat Canhoto, A. & Backhouse, J. (2008). General Description of the Process of Behavioural Profiling. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European Citizen: Cross-Disciplinary Perspectives (pp. 47-58). Heidelberg: Springer.CrossRef Canhoto, A. & Backhouse, J. (2008). General Description of the Process of Behavioural Profiling. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European Citizen: Cross-Disciplinary Perspectives (pp. 47-58). Heidelberg: Springer.CrossRef
Zurück zum Zitat Christle, W. & Spiekermann, S. (2016). Networks of Control, A report on Corporate Surveillance, Digital Tracking, Big Data and Privacy. Vienna: Facultas. Christle, W. & Spiekermann, S. (2016). Networks of Control, A report on Corporate Surveillance, Digital Tracking, Big Data and Privacy. Vienna: Facultas.
Zurück zum Zitat Citron, D.K. & Pasquale, F. (2014). The Scored Society: Due Process for Automated Predictions. Washington Law Review, 89(1), 2-33. Citron, D.K. & Pasquale, F. (2014). The Scored Society: Due Process for Automated Predictions. Washington Law Review, 89(1), 2-33.
Zurück zum Zitat Cohen, J. (2013). What is Privacy For. Harvard Law Review, 126(7), 1904-1933. (cited: Privacy) Cohen, J. (2013). What is Privacy For. Harvard Law Review, 126(7), 1904-1933. (cited: Privacy)
Zurück zum Zitat ———— (2012). Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven: Yale University Press. ———— (2012). Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven: Yale University Press.
Zurück zum Zitat Crawford, K. & Schultz, J. (2014). Big Data and Due Process: Toward A Framework to Redress Predictive Privacy Harms, Boston Law Review, 55(1), 93-128. Crawford, K. & Schultz, J. (2014). Big Data and Due Process: Toward A Framework to Redress Predictive Privacy Harms, Boston Law Review, 55(1), 93-128.
Zurück zum Zitat Cuijpers, C., Purtova, N. & Kosta, E. (2014). Data protection reform and the Internet: the draft Data Protection Regulation. In A. Savin & J. Trzaskowski (Eds.), Research Handbook on EU Internet Law (pp. 543-568). Cheltenham: Edward Elgar. Cuijpers, C., Purtova, N. & Kosta, E. (2014). Data protection reform and the Internet: the draft Data Protection Regulation. In A. Savin & J. Trzaskowski (Eds.), Research Handbook on EU Internet Law (pp. 543-568). Cheltenham: Edward Elgar.
Zurück zum Zitat De Montjoye, Y.A., Radaelli, L., Singh, V. & Pentland, A. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), 536-539.CrossRef De Montjoye, Y.A., Radaelli, L., Singh, V. & Pentland, A. (2015). Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221), 536-539.CrossRef
Zurück zum Zitat Druey, J.N. (1995). Information als Gegenstand des Rechts. Zürich: Schulthess. Druey, J.N. (1995). Information als Gegenstand des Rechts. Zürich: Schulthess.
Zurück zum Zitat Federrath, H. & Pfitzmann, A. (2011). Datensicherheit. In M. Schulte & R. Schröder (Eds.), Handbuch des Technikrechts—Allgemeine Grundlagen (pp. 857-886). Heidelberg: Springer.CrossRef Federrath, H. & Pfitzmann, A. (2011). Datensicherheit. In M. Schulte & R. Schröder (Eds.), Handbuch des Technikrechts—Allgemeine Grundlagen (pp. 857-886). Heidelberg: Springer.CrossRef
Zurück zum Zitat Floridi, L. (2014). The 4th Revolution—How the Infosphere is Reshaping Human Reality Oxford: University Press. Floridi, L. (2014). The 4th Revolution—How the Infosphere is Reshaping Human Reality Oxford: University Press.
Zurück zum Zitat ———— (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 1(1), 185-200. (cited: Ontological interpretation) ———— (2005). The ontological interpretation of informational privacy. Ethics and Information Technology, 1(1), 185-200. (cited: Ontological interpretation)
Zurück zum Zitat Froomkin, M. (2000). The Death of Privacy? Standford Law Review, 52, 1461-1543.CrossRef Froomkin, M. (2000). The Death of Privacy? Standford Law Review, 52, 1461-1543.CrossRef
Zurück zum Zitat Carfinkel, S. (2000). Database Nation—The Death of Privacy in the 21st Century, Sebastopol: O’Reilly. Carfinkel, S. (2000). Database Nation—The Death of Privacy in the 21st Century, Sebastopol: O’Reilly.
Zurück zum Zitat Gasser, U. (2015). Perspectives on the Future of Digital Privacy. Rechtsfragen im digitalen Zeitalter. Schweizerischer Juristentag 2015, ZSR Band 134 II, 337-448. Gasser, U. (2015). Perspectives on the Future of Digital Privacy. Rechtsfragen im digitalen Zeitalter. Schweizerischer Juristentag 2015, ZSR Band 134 II, 337-448.
Zurück zum Zitat Hartzog, W. (2018). Privacy’s Blueprint—The Battle to Control the Design of New Technologies. Cambridge: Havard University Press (cited: Blueprint). Hartzog, W. (2018). Privacy’s Blueprint—The Battle to Control the Design of New Technologies. Cambridge: Havard University Press (cited: Blueprint).
Zurück zum Zitat Hermstrüwer, Y. (2017). Contracting Around Privacy: The (Behavioral) Law and Economics of Consent and Big Data. Journal of Intellectual Property, Information Technology and E-Commerce Law, 8(1), 9-26. Hermstrüwer, Y. (2017). Contracting Around Privacy: The (Behavioral) Law and Economics of Consent and Big Data. Journal of Intellectual Property, Information Technology and E-Commerce Law, 8(1), 9-26.
Zurück zum Zitat Hildebrandt, M. (2008). Defining Profiling: A New Type of Knowledge? In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European Citizen: Cross-Disciplinary Perspectives (pp. 17-30). Heidelberg: Springer.CrossRef Hildebrandt, M. (2008). Defining Profiling: A New Type of Knowledge? In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European Citizen: Cross-Disciplinary Perspectives (pp. 17-30). Heidelberg: Springer.CrossRef
Zurück zum Zitat ———— (2008). Profiling and the Identity of the European Citizen. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European Citizen: Cross-Disciplinary Perspectives (pp. 303-324). Heidelberg: Springer. (cited: Profiling) ———— (2008). Profiling and the Identity of the European Citizen. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European Citizen: Cross-Disciplinary Perspectives (pp. 303-324). Heidelberg: Springer. (cited: Profiling)
Zurück zum Zitat Kobsa, A. (2007). Privacy-Enhanced Web Personalization. In P. Brusilovski, A. Kobsa & W. Nejdl (Eds.), The Adaptive Web: Methods and Strategies of Web Personalization (pp. 628-670). Heidelberg: Springer.CrossRef Kobsa, A. (2007). Privacy-Enhanced Web Personalization. In P. Brusilovski, A. Kobsa & W. Nejdl (Eds.), The Adaptive Web: Methods and Strategies of Web Personalization (pp. 628-670). Heidelberg: Springer.CrossRef
Zurück zum Zitat Kroll, J., Huey, J., Barocas, S., Felten, E., Reidenberg, J., Robinson, D. & Yu, H. (2016). Accountable Algorithms [Electronic version]. University of Pennsylvania Law Review, 165(3), 633-705. Kroll, J., Huey, J., Barocas, S., Felten, E., Reidenberg, J., Robinson, D. & Yu, H. (2016). Accountable Algorithms [Electronic version]. University of Pennsylvania Law Review, 165(3), 633-705.
Zurück zum Zitat Kuner, C. (2013). Transborder Data Flows and Data Privacy Law. Oxford: University Press.CrossRef Kuner, C. (2013). Transborder Data Flows and Data Privacy Law. Oxford: University Press.CrossRef
Zurück zum Zitat Langheinrich, M. (2007). Gibt es in einer total informatisierten Welt noch eine Privatsphäre? In F. Mattern (Ed.), Die Informatisierung des Alltags—Leben in smarten Umgebungen (pp. 233-264). Heidelberg: Springer. (cited: Privatsphäre) Langheinrich, M. (2007). Gibt es in einer total informatisierten Welt noch eine Privatsphäre? In F. Mattern (Ed.), Die Informatisierung des Alltags—Leben in smarten Umgebungen (pp. 233-264). Heidelberg: Springer. (cited: Privatsphäre)
Zurück zum Zitat ———— (2005). Personal Privacy in Ubiquitous Computing—Tools and System Support. Dissertation, ETH Zurich, No. 16100. ———— (2005). Personal Privacy in Ubiquitous Computing—Tools and System Support. Dissertation, ETH Zurich, No. 16100.
Zurück zum Zitat Leenes, R. & Koops, B.J. (2006). Code and Privacy or How Technology is Slowly Eroding Privacy. In E. Dommering & L. Asscher (Eds.), Coding Regulation—Essays on the Normative Role of Information Technology (pp. 141-203). The Hague: T.M.C. Asser Press. (cited: Code) Leenes, R. & Koops, B.J. (2006). Code and Privacy or How Technology is Slowly Eroding Privacy. In E. Dommering & L. Asscher (Eds.), Coding Regulation—Essays on the Normative Role of Information Technology (pp. 141-203). The Hague: T.M.C. Asser Press. (cited: Code)
Zurück zum Zitat ———— (2005). Code: Privacy’s Death or Saviour? International Review of Law, Computers & Technology, 19(3), 329-340.CrossRef ———— (2005). Code: Privacy’s Death or Saviour? International Review of Law, Computers & Technology, 19(3), 329-340.CrossRef
Zurück zum Zitat Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books. (cited: Code 1) Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books. (cited: Code 1)
Zurück zum Zitat ———— (2006). Code version 2.0. New York: Basic Books. (cited: Code 2) ———— (2006). Code version 2.0. New York: Basic Books. (cited: Code 2)
Zurück zum Zitat Linde, F. (2005). Ökonomie der Information. Göttingen: Universitätsverlag. Linde, F. (2005). Ökonomie der Information. Göttingen: Universitätsverlag.
Zurück zum Zitat Mattern, F. (2005). Ubiquitous Computing: Eine Einführung mit Anmerkungen zu den sozialen und rechtlichen Folgen. In J. Taeger & A. Wiebe (Eds.), Mobilität, Telematik, Recht (pp. 1-29). Köln: Otto Schmidt Verlag. Mattern, F. (2005). Ubiquitous Computing: Eine Einführung mit Anmerkungen zu den sozialen und rechtlichen Folgen. In J. Taeger & A. Wiebe (Eds.), Mobilität, Telematik, Recht (pp. 1-29). Köln: Otto Schmidt Verlag.
Zurück zum Zitat Mayer-Schönberger, V. & Cukier, K. (2013). Big Data—A Revolution That Will Transform How We Live, Work, and Think. London: Eamon Dolan Book. Mayer-Schönberger, V. & Cukier, K. (2013). Big Data—A Revolution That Will Transform How We Live, Work, and Think. London: Eamon Dolan Book.
Zurück zum Zitat Mayer-Schönberger, V. (2009). delete—The Virtue of Forgetting in the Digital Age. Princeton: University Press. (cited: Delete) Mayer-Schönberger, V. (2009). delete—The Virtue of Forgetting in the Digital Age. Princeton: University Press. (cited: Delete)
Zurück zum Zitat Mindell, D. (2015). Our Robots, Ourselves. New York: Viking Penguin. Mindell, D. (2015). Our Robots, Ourselves. New York: Viking Penguin.
Zurück zum Zitat Moore, G. (1965). Cramming More Components onto Integrated Circuits. Electronics, 114-117. Moore, G. (1965). Cramming More Components onto Integrated Circuits. Electronics, 114-117.
Zurück zum Zitat Ohm, P. (2010). Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. University of California Los Angeles Law Review, 57, 1701-1777. Ohm, P. (2010). Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. University of California Los Angeles Law Review, 57, 1701-1777.
Zurück zum Zitat Pariser, E. (2011). The Filter Bubble: What the Internet is Hiding From You: New York: Penguin Press. Pariser, E. (2011). The Filter Bubble: What the Internet is Hiding From You: New York: Penguin Press.
Zurück zum Zitat Pasquale, F. (2015). The Black Box Society—The Secret Algorithms That Control Money and Information. Cambridge: Harvard University Press.CrossRef Pasquale, F. (2015). The Black Box Society—The Secret Algorithms That Control Money and Information. Cambridge: Harvard University Press.CrossRef
Zurück zum Zitat Pentland, A. (2014). Social Physics: How Good Ideas Spread—The Lessons from a New Science. New York: Penguin Press. Pentland, A. (2014). Social Physics: How Good Ideas Spread—The Lessons from a New Science. New York: Penguin Press.
Zurück zum Zitat Phelps, J., Nowak, G. & Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing, 19(1), 27-41.CrossRef Phelps, J., Nowak, G. & Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing, 19(1), 27-41.CrossRef
Zurück zum Zitat Purtova, N. (2012). Property Rights in Personal Data: A European Perspective. Information Law Series, 24. The Hague: Wolters Kluwer Law & Business. Purtova, N. (2012). Property Rights in Personal Data: A European Perspective. Information Law Series, 24. The Hague: Wolters Kluwer Law & Business.
Zurück zum Zitat Reidenberg, J. (1998). Lex Informatica: The Formulation of Information Policy Rules through Technology. Texas law Review, 76(3), 553-593. Reidenberg, J. (1998). Lex Informatica: The Formulation of Information Policy Rules through Technology. Texas law Review, 76(3), 553-593.
Zurück zum Zitat Rubinstein, I. (2013). Big Data: The End of Privacy or a New Beginning? International Data Privacy Law, 1-14. Rubinstein, I. (2013). Big Data: The End of Privacy or a New Beginning? International Data Privacy Law, 1-14.
Zurück zum Zitat Schneier, B. (2015). Data and Goliath—The Hidden Battles to Collect Your Data and Control Your World. New York: W.W. Norton & Company. Schneier, B. (2015). Data and Goliath—The Hidden Battles to Collect Your Data and Control Your World. New York: W.W. Norton & Company.
Zurück zum Zitat Searls, D. (2012). The Intention Economy—When Customers Take Charge. Cambridge: Harvard Business Review Press. Searls, D. (2012). The Intention Economy—When Customers Take Charge. Cambridge: Harvard Business Review Press.
Zurück zum Zitat Shapiro, A. (1999). The Control Revolution: How the Internet is Putting Individuals in Charge and Changing the World We Know. New York: Public Affairs. Shapiro, A. (1999). The Control Revolution: How the Internet is Putting Individuals in Charge and Changing the World We Know. New York: Public Affairs.
Zurück zum Zitat Shaw, J. (2014). Why “Big Data” is a Big Deal. Harvard Magazine, March/April, 30-75. Shaw, J. (2014). Why “Big Data” is a Big Deal. Harvard Magazine, March/April, 30-75.
Zurück zum Zitat Simitis, S. (2005). Datenschutz—eine notwendige Utopie. In R.M. Kiesow, R. Ogorek & S. Simitis, Summa Dieter Simon zum 70. Geburtstag, Studien zur europäischen Rechtsgeschichte (pp. 511-527). Frankfurt am Main: Max Planck Institut. Simitis, S. (2005). Datenschutz—eine notwendige Utopie. In R.M. Kiesow, R. Ogorek & S. Simitis, Summa Dieter Simon zum 70. Geburtstag, Studien zur europäischen Rechtsgeschichte (pp. 511-527). Frankfurt am Main: Max Planck Institut.
Zurück zum Zitat ———— (2001). Privacy and Power: Computer Databases and Metaphors for Information Privacy. Stanford Law Review, 53, 1393-1462. (cited: Metaphors)CrossRef ———— (2001). Privacy and Power: Computer Databases and Metaphors for Information Privacy. Stanford Law Review, 53, 1393-1462. (cited: Metaphors)CrossRef
Zurück zum Zitat Spiekermann, S. (2008). Perceived Control: Scales for Privacy in Ubiquitous Computing. In A. Acquisti, S. Gritzalis, C. Lambrinoudakis & S. di Vimercatiet (Eds.), Digital Privacy—Theory, Technologies, and Practices (pp. 267-281). New York: Auerbach Publications.CrossRef Spiekermann, S. (2008). Perceived Control: Scales for Privacy in Ubiquitous Computing. In A. Acquisti, S. Gritzalis, C. Lambrinoudakis & S. di Vimercatiet (Eds.), Digital Privacy—Theory, Technologies, and Practices (pp. 267-281). New York: Auerbach Publications.CrossRef
Zurück zum Zitat Subirana, B., Sarma, S. & Fleisch, E. (2006). High-Resolution Management. IESE Alumni Magazine, September Issue, 8-13. Subirana, B., Sarma, S. & Fleisch, E. (2006). High-Resolution Management. IESE Alumni Magazine, September Issue, 8-13.
Zurück zum Zitat Sunstein, C. (2007). Republic.com 2.0. Princeton: University Press. Sunstein, C. (2007). Republic.com 2.0. Princeton: University Press.
Zurück zum Zitat ———— (2001). Echo Chambers—Bush v. Gore, Impeachment, and Beyond. Princeton: University Press (cited: Echo Chambers) ———— (2001). Echo Chambers—Bush v. Gore, Impeachment, and Beyond. Princeton: University Press (cited: Echo Chambers)
Zurück zum Zitat Tavani, H. (2008). Informational Privacy: Concepts, Theories, and Controversies. In K. Himma & H. Tavani (Eds.), The Handbook of Information and Computer Ethics (pp. 131-164). Indianapolis: John Wiley & Sons.CrossRef Tavani, H. (2008). Informational Privacy: Concepts, Theories, and Controversies. In K. Himma & H. Tavani (Eds.), The Handbook of Information and Computer Ethics (pp. 131-164). Indianapolis: John Wiley & Sons.CrossRef
Zurück zum Zitat Tene, O. (2010). Privacy: The New Generations. International Data Privacy Law, 1-13. Tene, O. (2010). Privacy: The New Generations. International Data Privacy Law, 1-13.
Zurück zum Zitat Tene, O. & Polonetsky, J. (2012). To Track or ‘Do Not Track’: Advancing Transparency and Individual Control in Online Behavioral Advertising. Minnesota Journal of Law, Science & Technology, 13(1), 281-356. (cited: OBA) Tene, O. & Polonetsky, J. (2012). To Track or ‘Do Not Track’: Advancing Transparency and Individual Control in Online Behavioral Advertising. Minnesota Journal of Law, Science & Technology, 13(1), 281-356. (cited: OBA)
Zurück zum Zitat Tene, O. & Polonetsky, J. (2013). Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology and Intellectual Property, 11(5), 240-273. Tene, O. & Polonetsky, J. (2013). Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology and Intellectual Property, 11(5), 240-273.
Zurück zum Zitat Thierer, A. (2015). The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation. Richmond Journal of Law & Technology, 21(6), 1-118. Thierer, A. (2015). The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation. Richmond Journal of Law & Technology, 21(6), 1-118.
Zurück zum Zitat Uteck, A. (2009). Ubiquitous Computing and Spatial Privacy. In I. Kerr, C. Steeves & V. Lucock (Eds.), Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society (pp. 83-102). Oxford: University Press. Uteck, A. (2009). Ubiquitous Computing and Spatial Privacy. In I. Kerr, C. Steeves & V. Lucock (Eds.), Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society (pp. 83-102). Oxford: University Press.
Zurück zum Zitat van der Hof, S. & Prins, C. (2008). Personalisation and its Influence on Identities, Behavior and Social Values. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European Citizen: Cross-Disciplinary Perspectives (pp. 111-127). Heidelberg: Springer. van der Hof, S. & Prins, C. (2008). Personalisation and its Influence on Identities, Behavior and Social Values. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European Citizen: Cross-Disciplinary Perspectives (pp. 111-127). Heidelberg: Springer.
Zurück zum Zitat Watson, S. (2014). If Customers Knew How You Use Their Data, Would They Call It Creepy? Harvard Business Review, April, 2014. Watson, S. (2014). If Customers Knew How You Use Their Data, Would They Call It Creepy? Harvard Business Review, April, 2014.
Zurück zum Zitat Webster, W. et al. (2007). Engaging Privacy and Information Technology in a Digital Age. Washington: National Academies Press. Webster, W. et al. (2007). Engaging Privacy and Information Technology in a Digital Age. Washington: National Academies Press.
Zurück zum Zitat Weiser, M. (1991). The Computer for the 21st Century. Scientific American, 265(3), 94-104.CrossRef Weiser, M. (1991). The Computer for the 21st Century. Scientific American, 265(3), 94-104.CrossRef
Zurück zum Zitat Wiegerling, K. (2011). Philosophie Intelligenter Welten. Paderborn: Wilhelm Fink Verlag. Wiegerling, K. (2011). Philosophie Intelligenter Welten. Paderborn: Wilhelm Fink Verlag.
Zurück zum Zitat Zang, J., Dummit, K., Graves, J., Lisker, P. & Sweeney, L. (2015). Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps [Electronic version]. Technology Science, October, unpaginated. Retrieved from <http://techscience.org/a/2015103001/> Zang, J., Dummit, K., Graves, J., Lisker, P. & Sweeney, L. (2015). Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps [Electronic version]. Technology Science, October, unpaginated. Retrieved from <http://​techscience.​org/​a/​2015103001/​>
Zurück zum Zitat Zarsky, T. (2004). Desperately Seeking Solutions: Using Implementation-Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society. Maine Law Review, 56(1), 13-59. Zarsky, T. (2004). Desperately Seeking Solutions: Using Implementation-Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society. Maine Law Review, 56(1), 13-59.
Zurück zum Zitat Zuboff, S. (2015). Big Other: Surveillance Capitalism and the Prospects of Information Civilization. Journal of Information Technology, 30(1), 75-89.CrossRef Zuboff, S. (2015). Big Other: Surveillance Capitalism and the Prospects of Information Civilization. Journal of Information Technology, 30(1), 75-89.CrossRef
Zurück zum Zitat Zuiderveen Borgesius, F. (2016). Singling out people without knowing their names—Behavioural targeting, pseudonymous data, and the new Data Protection Regulation. Computer Law & Security Review, 32(2), 256–271. (cited: Singling out)CrossRef Zuiderveen Borgesius, F. (2016). Singling out people without knowing their names—Behavioural targeting, pseudonymous data, and the new Data Protection Regulation. Computer Law & Security Review, 32(2), 256–271. (cited: Singling out)CrossRef
Metadaten
Titel
Setting the Stage
verfasst von
Aurelia Tamò-Larrieux
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-98624-1_1

Premium Partner