Weitere Artikel dieser Ausgabe durch Wischen aufrufen
This article is part of the Topical collection on Privacy and Security of Medical Information
In the era of information, administration of personal data protection mingles with expectations of access to information as well as the overall sense of cyber (in)security. A failure to appropriately consider the system of data processing relationships easily reduces personal data protection to assurances in letter. The complexity of contemporary data transactions demands a systemic and structured normative approach to personal data protection. Any evaluation of relevant norms should not be isolated from factors that determine or condition their implementation. As privacy is an intrinsically subjective claim, enforcing data privacy is premised on data subject’s personal participation in the protection of her data.
Martha F. Cultivating international cyber norms, America’s cyber future: security and prosperity in the information age. 2011, available at http://citizenlab.org/cybernorms2011/cultivating.pdf.
The Economist 06.05.2017, The world’s most valuable resource is no longer oil, but data http://www.economist.com/news/leaders/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource.
Eneken T, Agnes Z (eds). “Privacy, freedom of information and national security”, paper for the global Conference of cyberspace. 2015, available at https://www.gccs2015.com.
Michael K. Informationsrecht. Beck, München: C. H; 2002.
Cooley TM. The general principles of constitutional law in the United States of America. Boston: Little Brown; 1880.
Warren, SD, Brandeis, LD. The right to privacy. Harv Law Rev. 1890; vol. 4.
Solove DJ, Marc R, Schwartz PM. Privacy, information, and technology. 2nd ed. New York: Aspen Publishers Online; 2006.
Branscomb AW. Who owns information? From privacy to public access. New York: BasicBooks; 1994.
Hunton & Williams, Jay RP (ed.). “Data protection & privacy In 31 jurisdictions worldwide”. 2012, available at https://www.huntonprivacyblog.com/wp-content/uploads/sites/18/2011/04/DDP2015_United_States.pdf.
Tikk E et al; Considerations for regulatory and policy approaches to cloud computing in the GCC, IISS White Paper. 2013, available at www.iiss.org.
Freedom of the Net 2015. Report, freedom house, available at https://freedomhouse.org/report/freedom-net/freedom-net-2015.
Connecting_Africa: An Assessment of Progress Towards the Connect Africa Summit Goals”, African Development Bank Group, 2013, available at http://www.afdb.org/fileadmin/uploads/afdb/Documents/Project-and-Operations/Connecting_Africa_-_An_Assessment_of_Progress_Towards_the_Connect_Africa_Summit_Goals_-_Main_Report.pdf.
Rodrigues RJ, Wilson P, Schanz SJ, Essential drugs and technology program, division of health systems and services development; “the regulation of privacy and data protection in the use of electronic health information: an international perspective and reference source on regulatory and legal issues related to person-identifiable health databases, Washington, DC, Pan American Health Organization/World Health Organization 2001.
Weaver C. Hypocrisy trap: The World Bank and the poverty of reform. Princeton: Princeton University Press; 2008. CrossRef
Brunsson N. The Organization of Hypocrisy: talk, decisions, and action in organizations. New York: Wiley; 1989.
ITU; International Telecommunication Convention, 1959, Annex, para 308, available at http://www.itu.int/dms_pub/itu-s/oth/02/09/S02090000085201PDFE.PDF.
Weiss MA, Archick K.“US-EU data privacy: from safe harbor to privacy shield”, congressional research service, 19 May 2016, available at https://www.fas.org/sgp/crs/misc/R44257.pdf.
Arjun K. “Apple vs FBI: all you need to know”, CNBC, 29 March 2016, available at http://www.cnbc.com/2016/03/29/apple-vs-fbi-all-you-need-to-know.html.
Paul S. “Google’s grand plan to target the ‘next billion’ internet users”, Venturebeat, 27 September 2016, available at http://venturebeat.com/2016/09/27/google-india-all-in/.
Rusli EM. “Five apps bringing the next billion people online”, The Wall Street Journal, 21 April 2015, available at http://blogs.wsj.com/digits/2015/04/21/five-apps-bringing-the-next-billion-people-online/.
White House. International strategy for cyberspace, prosperity, security, and openness in a networked world, May 2011, available at https://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.
Prosser, WL.; “Privacy”. Calif Law Rev. 1960; Vol. 48.
Viktor M-S. Generational development of data protection in Europe. In: Agre PE, Rotenberg M, editors. Technology and privacy: the new landscape. Cambridge: The MIT Press; 1997. p. 219–42.
Laraine L. Summaries of EU court decisions relating to data protection 2000–2015., 28 January 2016, availablet at https://ec.europa.eu/anti-fraud/sites/antifraud/files/caselaw_2001_2015_en.pdf.
Allen & Overy. The EU general data protection regulation. 2016, available at http://www.allenovery.com/SiteCollectionDocuments/Radical%20changes%20to%20European%20data%20protection%20legislation.pdf.
Louis B. Dissenting opinion in Olmstead v. United States 277 U.S. 438, 1928.
Centre for Internet Safety, “Privacy and the Internet, Australian Attitudes Towards Privacy in the Online Environment”, April 2012, available at http://www.canberra.edu.au/cis/storage/Australian%20Attitutdes%20Towards%20Privacy%20Online.pdf.
European Commission. Operational human rights guidance for EU external cooperation actions addressing terrorism, organised crime and cybersecurity, 2015. Available at http://ec.europa.eu/europeaid/sites/devco/files/manual-hr-guidance-ct-oc-cyber-20151105_en.pdf.
Anne-Marie S. A new world order. Princeton: Princeton University Press; 2004.
Hedley B. The anarchical society: a study of order in world politics. London: Macmillan; 1977.
Christine R. Virtual friendship and the new narcissism, the New Atlantis, No. 17, Summer 2007, pp. 15–31.
Douglas H. Branding in the age of social media. Harv Bus Rev, March 2016.
Agamben G. Homo Sacer. Sovereign power and bare life. Stanford: Stanford University Press; 1998.
- Privacy online: up, close and personal
- Springer Berlin Heidelberg
Neuer Inhalt/© ITandMEDIA, Erfolgsfaktoren sensitiver Robotertechnologien/© Composer | Fotolia