Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-4hhp2 Total loading time: 0 Render date: 2024-05-01T13:18:47.076Z Has data issue: false hasContentIssue false

Part III - Issues in privacy regulation

Published online by Cambridge University Press:  05 July 2015

Beate Roessler
Affiliation:
Universiteit van Amsterdam
Dorota Mokrosinska
Affiliation:
Universiteit Leiden
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Social Dimensions of Privacy
Interdisciplinary Perspectives
, pp. 223 - 346
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

References

Altman, I. 1975. The Environment and Social Behaviour: Privacy, Personal Space, Territory and Crowding. Monterey: Brooks/Cole Publishing Company.Google Scholar
Cockfield, A. 2007. “Protecting the social value of privacy in the context of state investigations using new technologies,” University of British Colombia Law Review 40(1): 4168.Google Scholar
Feldman, D. 1997. “Privacy-related Rights: Their Social Value,” in Birks, P. (ed.) Privacy and Loyalty. Oxford University Press, pp. 1550.CrossRefGoogle Scholar
Gavison, R. 1980. “Privacy and the limits of the law,” Yale Law Journal 89: 421–71.CrossRefGoogle Scholar
Goold, B. 2009. “Surveillance and the political value of privacy,” Amsterdam Law Forum 1(4): 36.CrossRefGoogle Scholar
Goold, B. 2010. “How Much Surveillance Is Too Much? Some Thoughts on Surveillance, Democracy and the Political Value of Privacy,” in Schartum, D. W. (ed.) Overvåkning i en rettsstat. Bergen: Fagbokforlaget, pp. 3848.Google Scholar
Hughes, K. 2012. “A behavioural understanding of privacy and its implications for privacy law,” Modern Law Review 75(5): 806–36.CrossRefGoogle Scholar
Lever, A. 2012. On Privacy. London: Routledge.Google Scholar
Nehf, J. P. 2003. “Recognizing the societal value in information privacy,” Washington Law Review 78(1): 192.Google Scholar
Nissenbaum, H. 2010. Privacy in Context: Technology, Policy and the Integrity of Social Life. Stanford University Press.Google Scholar
Rachels, J. 1975. “Why privacy is important,” Philosophy & Public Affairs 4(4): 323–33.Google Scholar
Regan, P. 1995. Legislating Privacy. Chapel Hill: University of North Carolina Press.Google Scholar
Reiman, J. 1976. “Privacy, intimacy and personhood,” Philosophy & Public Affairs 6(1): 2644.Google Scholar
Richards, N. 2008. “Intellectual privacy,” Texas Law Review 87: 387445.Google Scholar
Goold, B. 2015. Intellectual Privacy. Oxford University Press.Google Scholar
Roessler, B. and Mokrosinska, D. 2013. “Privacy and social interaction,” Philosophy and Social Criticism 39: 771–91.CrossRefGoogle Scholar
Schoeman, F. 1992. Privacy and Social Freedom. Cambridge University Press.CrossRefGoogle Scholar
Simitis, S. 1987. “Reviewing privacy in an information society,” University of Pennsylvania Law Review 135: 707–46.CrossRefGoogle Scholar
Solove, D. J. 2008. Understanding Privacy. Cambridge, MA: Harvard University Press.Google Scholar
Steeves, V. 2009. “Reclaiming the Social Value of Privacy,” in Kerr, I. R., Steeves, V. and Lucock, C. (eds.) Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society. Oxford University Press, pp. 191208.Google Scholar
Woolf, Virginia 2002. A Room of One’s Own. London: Penguin Books.Google Scholar

References

Bailey, J. 2013. “Cogs in the Wheel of Economic Progress? Claims-Making About Girls and Technology in Canadian Policy Discourse.” Shirley E. Greenberg Chair for Women and the Legal Profession – Speaker Series. University of Ottawa.Google Scholar
Bailey, J. and Steeves, V. 2013. “Will the Real Digital Girl Please Stand Up? Examining the Gap Between Policy Dialogue and Girls’ Accounts of Their Digital Existence,” in Wise, J. M. and Hille, K. (eds.) New Visualities, New Technologies: The New Ecstasy of Communication. London: Ashgate, pp. 4166.Google Scholar
Bailey, J. and Steeves, V. (eds.) 2015 (forthcoming). eGirls, eCitizens: Putting Technology Theory and Policy Into Dialogue with Girls’ and Young Women’s Voices.University of Ottawa Press.CrossRefGoogle Scholar
Bennet, C. and Raab, C. 2002. The Governance of Privacy: Policy Instruments in Global Perspective. London: Barnes and Noble.Google Scholar
Burkell, J., Steeves, V. and Micheti, A. 2007. Broken Doors: Strategies for Drafting Privacy Policies Kids Can Understand. Ottawa: On the Identity Trail.Google Scholar
Contenta, S. 2014. “Dating website apologizes for using Rehtaeh Parsons’s picture,” Toronto Star, August 30.Google Scholar
Draper, N. 2012. “Is your teen at risk? Discourses of adolescent sexting in the United States,” Journal of Children and Media 6: 223.CrossRefGoogle Scholar
Goffman, E. 1959. The Presentation of Self in Everyday Life. New York: Anchor Books.Google Scholar
Hill, K. 2010. “Zuckerberg’s Right: Young People Don’t Care (As Much) About Privacy,” Forbes, January 10.Google Scholar
Industry Canada and Department of Justice. Task Force on Electronic Commerce. 1998. Building Canada’s Information Economy and Society: The Protection of Personal Information. Ottawa: Public Works and Government Services Canada.Google Scholar
Lawford, J. 2008. All in the Data Family: Children’s Privacy Online. Ottawa: Public Interest and Advocacy Centre.Google Scholar
Licoppe, C. 2004. “‘Connected presence’: the emergence of a new repertoire for managing social relationships in a changing communication technoscape,” Environment and Planning D: Society and Space 22: 135–56.CrossRefGoogle Scholar
Livingstone, S. 2009. Children and the Internet. Cambridge: Polity Press.Google Scholar
Mead, G. H. 1934. Mind, Self and Society. University of Chicago Press.Google Scholar
Media Awareness Network. 2001. Young Canadians in a Wired World: The Students’ View. Ottawa: Media Awareness Network.Google Scholar
Media Awareness Network. 2004. Young Canadians in a Wired World, Phase II: Focus GroupsOttawa: Media Awareness Network.Google Scholar
MediaSmarts. 2014. Youth and Digital Skills Symposium: Preparing Young Canadians to Make Social, Economic and Cultural Contributions. Ottawa: Information and Communications Technology Council.Google Scholar
Peter, J., Valkenburg, P. and Fluckiger, C. 2009. “Adolescents and Social Network Sites: Identity, Friendships and Privacy,” in Livingstone, S. and Haddon, L. (eds.) Kids Online: Opportunities and Risks for Children. Bristol: The Policy Press.Google Scholar
Phillips, D. 2009. “Ubiquitous Computing, Spatiality, and the Construction of Identity: Directions for Policy Response,” in Kerr, I., Lucock, C. and Steeves, V. (eds.) Lessons From the Identity Trail: Anonymity, Privacy and Identity in a Networked Society. New York: Oxford University Press, pp. 303–18.Google Scholar
Shade, L. R. 2011. “Surveilling the Girl via the Third and Networked Screen,” in Kearney, M. C. (ed.) Mediated Girlhoods: New Explorations of Girls’ Media Culture. New York: Peter Lang, pp. 261–76.Google Scholar
Standing Committee on Access to Information, Privacy and Ethics, House of Commons, Canada. 2014. Privacy and Social Media in the Age of Big Data, 1st sess., 41st Parliament.Google Scholar
Steeves, V. 2006. “It’s not child’s play: the online invasion of children’s privacy,” University of Ottawa Law and Technology Journal 3(1): 169–88.Google Scholar
Steeves, V. 2007. “The watched child: surveillance in three online playgrounds,” Proceedings of the International Conference on the Rights of the Child:119–40.Google Scholar
Steeves, V. 2009. “Reclaiming the Social Value of Privacy,” in Kerr, I., Lucock, C. and Steeves, V. (eds.) Lessons From the Identity Trail: Anonymity, Privacy and Identity in a Networked Society. New York: Oxford University Press, pp. 191208.Google Scholar
Steeves, V. 2012a. Young Canadians in a Wired World, Phase III: Talking to Youth and Parents About Life Online. Ottawa: MediaSmarts.Google Scholar
Steeves, V. 2012b. Young Canadians in a Wired World, Phase III: Teachers’ Perspectives. Ottawa: MediaSmarts.Google Scholar
Steeves, V. 2014a. Young Canadians in a Wired World, Phase III: Experts or Amateurs? Gauging Young Canadians’ Digital Literacy Skills. Ottawa: MediaSmarts.Google Scholar
Steeves, V. 2014b. Young Canadians in a Wired World, Phase III: Life Online. Ottawa: MediaSmarts.Google Scholar
Steeves, V. 2014c. Young Canadians in a Wired World, Phase III: Online Privacy, Online Publicity. Ottawa: MediaSmarts.Google Scholar
Steeves, V. 2015a (forthcoming). “Now You See Me: Privacy, Technology and Autonomy in the Digital Age,” in DiGiacomo, G. (ed.) Current Issues and Controversies in Human Rights. Toronto: Oxford University Press.Google Scholar
Steeves, V. 2015b (forthcoming). “Swimming in the Fishbowl: Young People, Identity and Surveillance in Networked Spaces,” in van der Ploeg, I. and Pridmore, J. (eds.) Digitizing Identities. London: Routledge.Google Scholar
Steeves, V. and Marx, G. 2014. “Safe School Initiatives and the Shifting Climate of Trust,” in Muschert, G., Henry, S., Bracy, , N. and Peguero, A. (eds.) Responding to School Violence: Confronting the Columbine Effect. Boulder: Lynne Rienner Publishers, pp. 7188.Google Scholar

References

Allen, A. L. 2011a. Privacy Law and Society. Minneapolis: West/Thomson Reuters.Google Scholar
Allen, A. L. 2011b. Unpopular Privacy: What Must We Hide. New York: Oxford University Press.CrossRefGoogle Scholar
Allen, A. L. 2015. “Privacy and Medicine,” in Zalta, E. N. (ed.) The Stanford Encyclopedia of Philosophy (Spring 2015 edition, http://plato.stanford.edu/entries/privacy-medicine/.Google Scholar
Allen, A. L. 2013. “Privacy law: positive theory and normative practice,” Harvard Law Review Forum 136: 241–25.Google Scholar
Archibald, D. J.et al. 2010. “Pitfalls of nonstandardized photography,” Facial Plastic Surgery Clinics of North America 18: 253–66.CrossRefGoogle ScholarPubMed
Baker, M. J.et al. 2014. “Navigating the Google blind spot: an emerging need for professional guidelines to address patient-targeted googling.” Journal of General Internal Medicine 29: 12.Google Scholar
Ben‐Yakov, M. and Snider, C. 2011. “How Facebook saved our day!Academic Emergency Medicine 18: 1217–19.CrossRefGoogle ScholarPubMed
Berle, I. 2008. “Clinical photography and patient rights: the need for orthopraxy,” Journal of Medical Ethics 34: 8992.CrossRefGoogle ScholarPubMed
Berman, L.et al. 2003. “Seeking help for sexual function complaints: what gynecologists need to know about the female patient’s experience,” Fertility and Sterility 79: 572–6.CrossRefGoogle ScholarPubMed
Bond, A. 2013. “Doctor jailed after taking intimate pictures of female patients with his mobile phone”, Mirror (UK), 19:43, 4 October 2013. Available at www.mirror.co.uk/news/uk-news/doctor-suhail-ahmed-jailed-after-2339680.Google Scholar
Brennan, P. A. W. 2006. “The medical and ethical aspects of photography in the sexual assault examination: why does it offend?,” Journal of Clinical Forensic Medicine 13: 194202.CrossRefGoogle ScholarPubMed
Butler, D. J. 2002. “Informed consent and patient videotaping,” Academic Medicine 77: 181–4.CrossRefGoogle ScholarPubMed
Dance, S.et al. 2013. “Accused Hopkins gynecologist suffocated himself with helium; Police seized multiple hard drives, servers from home of doctor said to have recorded patients; health regulators launch inquiry,” The Baltimore Sun, February 20, 2013.Google Scholar
DiSaia, J. P.et al. 1998. “Digital photography for the plastic surgeon,” Plastic and Reconstructive Surgery 102: 569–73.CrossRefGoogle ScholarPubMed
Ganguli, S.et al. 2006. “Part I: Preparing first-year radiology residents and assessing their readiness for on-call responsibilities,” Academic Radiology 13: 764–9.CrossRefGoogle ScholarPubMed
Hawke, C. 1998. “Nursing a fine line: patient privacy and sex discrimination: sensitive legal issues surround sex-based hiring and assignment for nurses,” Nursing Management 29: 5661.CrossRefGoogle Scholar
Hood, C. A.et al. 1998. “Videos, photographs, and patient consent,” British Medical Journal 316: 1009–11.CrossRefGoogle ScholarPubMed
Johns Hopkins University (2013) “Chronology of the Dr. Nikita Levy Case,” www.hopkinsmedicine.org/news/Nikita_Levy.html.Google Scholar
Katzan, I. L. and Rudick, R. A. 2012. “Time to Integrate Clinical and Research Informatics,” Science Translational Medicine 4: 162 [one page].CrossRefGoogle ScholarPubMed
Karasu, T. B. 2013. “The Ethics of Psychotherapy,” in Sisti, D. A.et al. (eds.) Applied Ethics in Mental Health Care: An Interdisciplinary Reader. Cambridge, MA: MIT Press, pp. 3558.CrossRefGoogle Scholar
Lau, C. K.et al. 2010. “Patients’ perception of medical photography,” Journal of Plastic, Reconstructive & Aesthetic Surgery 63: 507 [e-publication only].CrossRefGoogle ScholarPubMed
Makary, M. A. 2013. “The power of video recording,” Journal of the American Medical Association 309: 1591–92.Google ScholarPubMed
McLean, M., Al Ahbabi, S.et al. 2010. “Muslim women and medical students in the clinical encounter,” Medical Education 44: 306–15.CrossRefGoogle ScholarPubMed
Moore, I. N.et al. 2007. “Confidentiality and privacy in health care from the patients’ perspective: does HIPAA help?,” Health Matrix 17: 215–72.Google Scholar
Moskop, J. C.et al. 2005. “From Hippocrates to HIPAA: privacy and confidentiality in emergency medicine – Part II: Challenges in the emergency department,” Annals of Emergency Medicine 45: 60–7.Google Scholar
Papadaki, E. L. 2014. “Feminist Perspectives on Objectification,” in. Zalta, N. (ed.) The Stanford Encyclopedia of Philosophy (Summer 2014 Edition), http://plato.stanford.edu/archives/sum2014/entries/feminism-objectification.Google Scholar
Phillips, S. P. and Schneider, M. S. 1993. “Sexual harassment of female doctors by patients,” New England Journal of Medicine 329: 1936–9.CrossRefGoogle ScholarPubMed
Rakel, R. E. 2011. “Establishing Rapport,” in Rakel, R. E. and Rakel, D.P. (eds.) Textbook of Family Medicine, 8th edn. Philadelphia: Saunders, pp. 146–65.Google Scholar
Segal, J. and Sacopulos, M. J. 2010. “Photography consent and related legal issues,” Facial Plastic Surgery Clinics of North America 18: 237–44.CrossRefGoogle ScholarPubMed
Sinclair, R. 2012. “Skin checks,” Australian Family Physician 41: 464–9.Google ScholarPubMed
Soares, N. S. and Langkamp, D. L. 2012. “Telehealth in developmental-behavioral pediatrics,” Journal of Developmental & Behavioral Pediatrics 33: 656–65.CrossRefGoogle ScholarPubMed
Strahilevitz, L. 2013. “Toward a positive theory of privacy law,” Harvard Law Review 126: 2010–42.Google Scholar
Terushkin, V., Oliveira, S. A., Marghoob, A. A. and Halpern, A. C. 2010. “Use of and beliefs about total body photography and dermatoscopy among US dermatology training programs: an update,” Journal of the American Academy of Dermatology 62(5): 794803.CrossRefGoogle ScholarPubMed
Thomas, T. 1996. “Covert video surveillance – an assessment of the Staffordshire Protocol,” Journal of Medical Ethics 22: 349–50.Google ScholarPubMed
Walker, A. 2014. “Doctor Secretly Photographed Female Patients, Installed Covert Cameras in Toilet,” Breitbart, April 25, www.breitbart.com/.Google Scholar
Watson, J. J.et al. 2012Necessities in clinical photography,” Journal of Hand and Microsurgery 4: 30–1.Google ScholarPubMed
West, S. L.et al. 2009. “Reflections on the use of electronic health record data for clinical research,” Health Informatics Journal 15: 108–12.CrossRefGoogle ScholarPubMed
Witmer, W. K. and Lebovitz, P. J. 2012. “Clinical photography in the dermatology practice,” Seminars in Cutaneous Medicine and Surgery 31: 191–9.CrossRefGoogle ScholarPubMed

References

Angwin, J. and Valentino-Devries, J. 2012. “New tracking frontier: your license plates,” The Wall Street Journal, September 29. Accessed June 12, 2013 from http://on.wsj.com/1w2G8gB.Google Scholar
Cate, F. 2006. “The failure of Fair Information Practice Principles,” Consumer Protection in the Age of the Information Economy, July 8. Accessed July 1, 2013 from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972.Google Scholar
Chavez, P. L. 2011. Comments of Google Inc. to US Department of Commerce. Electronic filing, January 28. Accessed June 11, 2013 from www.ntia.doc.gov/files/ntia/comments/101214614-0614-01/attachments/FINALCommentsonDepartmentofCommercePrivacyGreenPaper%20%283%29.pdf.Google Scholar
Civil, C. 2012. “President Obama’s Privacy Bill of Rights: Encouraging a Collaborative Process for Digital Privacy Reform,” in Berkeley Technology Law Journal, March 12. Accessed June 11, 2013 from http://btlj.org/?p=1712.Google Scholar
Department of Homeland Security 2013. Website Privacy Policy. Accessed June 12, 2013 from www.dhs.gov/privacy-policy.Google Scholar
Dwork, C. and Mulligan, D. K. 2012. “Aligning Classification Systems with Social Values through Design,” The 5th Annual Privacy Law Scholars Conference. The George Washington University Law School, Washington DC. June 8.Google Scholar
EPIC.org 2012. “White House Sets Out Consumer Privacy Bill of Rights,” Electroning Privacy Information Center. 23 February. Accessed from https://epic.org/2012/02/white-house-sets-out-consumer-.html.Google Scholar
European Union 2013. Committee on Civil Liberties, Justice and Home Affairs. On the Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation). By Albrecht, J. P. Vol. (COM(2012)0011–C7-0025/2012–2012/0011(COD)). 22 November.Google Scholar
Federal Trade Commission 2012. Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers. FTC Report, March. Accessed June 11, 2013 from www.ftc.gov/os/2012/03/120326privacyreport.pdf.Google Scholar
Friedman, M. 1970. “The Social Responsibility of Business is to Increase its Profits,” TheNew York Times Magazine, September 13. Accessed June 11, 2013 from www.colorado.edu/studentgroups/libertarians/issues/friedman-soc-resp-business.html.Google Scholar
Hoffman, D. 2012. White House Releases Framework for Protecting Privacy in a Networked World. Post on Policy@Intel blog, February 23. Accessed June 12, 2013 from http://blogs.intel.com/policy/2012/02/23/white-house-privacy.Google Scholar
Hoffman, M. 2012. Obama Administration Unveils Promising Consumer Privacy Plan, But the Devil Will Be in the Details. Electronic Frontier Foundation, February 23. Accessed June, 12 2013 from www.eff.org/deeplinks/2012/02/obama-administration-unveils-promising-consumer-privacy-plan-devil-details.Google Scholar
Horan, P. 2011. Online Publishers Association Re: FTC Preliminary Staff Report on “Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers” – File No. P095416. Electronic filing, February 17. Accessed June 11, 2013 from www.ftc.gov/policy/public-comments/comment-00315-0.Google Scholar
Intel 2011. RE: FTC Staff Preliminary Report on Protecting Consumer Privacy. Intel Comments to FTC, January 26. Accessed June 11, 2013 from www.ftc.gov/os/comments/privacyreportframework/00246-57451.pdf.Google Scholar
Kiseleva, J., Thanh Lam, H. T., Pechenizkiy, M. and Calders, T. 2013a. “Discovering Temporal Hidden Contexts in Web Sessions for User Trail Prediction,” in Proceedings of the 22nd International Conference on World Wide Web Companion. Geneva: International World Wide Web Conferences Steering Committee, pp. 1067–74.Google Scholar
Kiseleva, J., Thanh Lam, H. T., Pechenizkiy, M., and Calders, T. 2013b. “Predicting Current User Intent with Contextual Markov Models,” in Data Mining Workshops (ICDMW), 2013 IEEE 13th International Conference. Los Alamitos: IEEE, pp. 3918.CrossRefGoogle Scholar
Lawler, B. 2011. Request for Comments: Information Privacy and Innovation in the Internet Economy. Intuit Comments before the Department of Commerce, Office of the Secretary National Telecommunications and Information Administration, January 28. Accessed June 11, 2013 from www.ntia.doc.gov/files/ntia/comments/101214614-0614-01/attachments/Intuit.pdf.Google Scholar
Maier, F. 2010. TRUSTe’s Comments in Response to the Department of Commerce’s Green Paper – Commercial Data Privacy & Innovation in the Internet Economy: A Dynamic Policy Framework. Electronic filing, January 28. Accessed June 11, 2013 from www.docstoc.com/docs/150372462/For-body-font-Preferably-Arial_-11-sized-font–which-is-what-most-of.Google Scholar
National Telecommunications and Information Administration 2012. Multistakeholder Process to Develop Consumer Data Privacy Code of Conduct Concerning Mobile Application Transparency. Notice of meeting published by Federal Register, June 28. Accessed June 11, 2013 from https://federalregister.gov/a/2012-15767.Google Scholar
Nissenbaum, H. 2010. Privacy in Context: Technology, Policy and the Integrity of Social Life. Stanford University Press.Google Scholar
Nissenbaum, H. 2011. “A Contextual Approach to Privacy Online,” Daedalus 140(4): 3248.CrossRefGoogle Scholar
OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. September 23, 1980. Accessed June 11, 2013 from www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm.Google Scholar
Rauhofer, J. 2013. “One step forward, two steps back: critical observations on the proposed reform of the EU Data Protection Framework,” Journal of Law and Economic Regulation 6(1): 5784.Google Scholar
Raul, A., McNicholas, E. R., Brown, C. T., Adams, J. P., Mancini, P. K., Krom, K. M. and Kingsley, T. R. 2011. Comments of AT&T Inc. before the Federal Trade Commission in the Matter of the Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers. Electronic filing, February 18. Accessed June 11, 2013 from www.ftc.gov/sites/default/files/documents/public_comments/preliminary-ftc-staff-report-protecting-consumer-privacy-era-rapid-change-proposed-framework/00420-58059.pdf.Google Scholar
Rubinstein, I. S. 2010. “Privacy and regulatory innovation: moving beyond voluntary codes,” I/S: a Journal of Law and Policy for the Information Society 6(3): 356423.Google Scholar
Selbst, A. D. 2013. “Contextual expectations of privacy,” Cardozo Law Review 35: 643897.Google Scholar
US National Telecommunications and Information Administration 2013a. Privacy Multistakeholder Process: Mobile Application Transparency – Background. Accessed from https://federalregister.gov/a/2013-19304.Google Scholar
US National Telecommunications and Information Administration 2013b. Short Form Notice Code of Conduct to Promote Transparency in Mobile App Practices. Washington DC. Accessed from www.ntia.doc.gov/files/ntia/publications/july_25_code_draft.pdf.Google Scholar
Valentino-Devries, J. and Singer-Vine, J. 2012. “They Know What You’re Shopping For,” The Wall Street Journal, December 7, 2012. Accessed from http://on.wsj.com/1w3xdLZ.Google Scholar
White House Privacy Report 2012. Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy. February 23. Accessed June 11, 2013 from www.whitehouse.gov/sites/default/files/privacy-final.pdf.Google Scholar
World Economic Forum 2012. Rethinking Personal Data: Strengthening Trust. Report, May. Accessed June 11, 2013 from www3.weforum.org/docs/WEF_IT_RethinkingPersonalData_Report_2012.pdf.Google Scholar

References

Acquisti, A. 2004. “Privacy in electronic commerce and the economics of immediate gratification,” in Breese, J., Feigenbaum, J. and Seltzer, M. (eds.), EC ’04, pp. 2129. doi: 10.1145/988772.988777.Google Scholar
Acquisti, A. and Varian, H. R. 2005. “Conditioning prices on purchase history,” Marketing Science 24(3): 367–81. doi: 10.1287/mksc.1040.0103.Google Scholar
Balzacq, T. (ed.) 2011. Securitization Theory: How Security Problems Emerge and Dissolve. London: Routledge.Google Scholar
Bennett, C. J. 1992. Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Ithaca: Cornell University Press.CrossRefGoogle Scholar
Bennett, C. J. 2008. The Privacy Advocates: Resisting the Spread of Surveillance. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Beresford, A. R., Kübler, D. and Preibusch, S. 2010. Unwillingness to Pay for Privacy: A Field Experiment. Bonn: Forschungsinstitut zur Zukunft der Arbeit.Google Scholar
Busch, A. 2010. “Politik, Prävention, Privatheit: Orwell und die britische Gegenwart,” in Seubert, S. and Niesen, P. (eds.), Die Grenzen des Privaten. Baden-Baden: Nomos, pp. 145–64.Google Scholar
Busch, A. 2011a. “Die Regulierung von Privatheit: Technische Innovation als Herausforderung von Datenschutzregimes,” dms – Der Moderne Staat – Zeitschrift für Public Policy, Recht und Management 4(2): 403–22.CrossRefGoogle Scholar
Busch, A. 2011b. “The Regulation of Privacy,” in Levi-Faur, D. (ed.), Handbook on the Politics of Regulation. Cheltenham and Northampton, MA: Edward Elgar, pp. 227–40.Google Scholar
Busch, A. 2012. “The regulation of transborder data traffic: disputes across the Atlantic,” Security and Human Rights 23(4): 313–30.Google Scholar
Busch, A. 2015. “The Changing Architecture of the National Security State,” in Leibfried, S., Huber, E., Nullmeier, F., Lange, M., Levy, J. and Stephens, J. (eds.), The Oxford Handbook of Transformations of the State. Oxford University Press, pp. 536–53.Google Scholar
Bygrave, L. A. 2008. “International Agreements to Protect Personal Data,” in Rule, J. B. and Greenleaf, G. (eds.), Global Privacy Protection. Northampton, MA: Edward Elgar, pp. 1549.Google Scholar
Crenshaw, M. (ed.) 2010. The Consequences of Counterterrorism. New York: Russell Sage Foundation.Google Scholar
Deutscher Bundestag 2013. Schlussbericht der Enquête-Kommission Internet und digitale Gesellschaft: Drucksache 17/12550, 5.4.2013. Berlin: Deutscher Bundestag.Google Scholar
Diffie, W. and Landau, S. E. 1998. Privacy on the Line: The Politics of Wiretapping and Encryption. Cambridge, MA and London: MIT Press.CrossRefGoogle Scholar
Gallup Europe and European Commission 2008. Data Protection in the European Union: Citizens’ Perceptions: Analytical Report. Brussels.Google Scholar
Garfinkel, S. 2000. Database Nation: The Death of Privacy in the 21st Century. Beijing and Cambridge: O’Reilly.Google Scholar
Gormley, K. 1992. “One hundred years of privacy,” Wisconsin Law Review 5, 1335–442.Google Scholar
Haubrich, D. 2003. “September 11, anti-terror laws and civil liberties: Britain, France and Germany compared,” Government & Opposition 38(1): 328.CrossRefGoogle Scholar
Heisenberg, D. 2005. Negotiating Privacy: The European Union, the United States, and Personal Data Protection. Boulder: Lynne Rienner Publishers.CrossRefGoogle Scholar
Home Office 2013. The National DNA Database Annual Report 2011–2012. London.Google Scholar
House of Lords. Select Committee on the Constitution (ed.). 2009. Surveillance: Citizens and the State: 2nd Report Of Session 2008–09. London: The Stationery Office.Google Scholar
International Telecommunication Union 2013. Measuring the Information Society: 2013. Geneva.Google Scholar
Kahn, A. E. 1966. “The tyranny of small decisions: market failures, imperfections, and the limits of economics,” Kyklos 19(1): 2347. doi: 10.1111/j.1467–6435.1966.tb02491.x.CrossRefGoogle Scholar
Katzenstein, P. J. 2003. “Same war – different views: Germany, Japan, and counterterrorism,” International Organization 57(4): 731–60.CrossRefGoogle Scholar
Lyon, D. 2001. Surveillance Society: Monitoring Everyday Life. Buckingham: Open University Press.Google Scholar
Moore, B. J. 1984. Privacy: Studies in Social and Cultural History. Armonk and London: M. E. Sharpe.Google Scholar
Murphy, R. S. 1996. “Property rights in personal information: an economic defence of privacy,” Georgetown Law Journal 84: 2381–417.Google Scholar
National Research Council (ed.) 2008. Protecting Individual Privacy in the Struggle against Terrorists: A Framework for Program Assessment. Washington DC: National Academies Press.Google Scholar
Nelson, L. 2004. “Privacy and technology: reconsidering a crucial public policy debate in the post-September 11 era,” Public Administration Review 64(3): 259–69.CrossRefGoogle Scholar
Newman, A. L. 2008. Protectors of Privacy: Regulating Personal Data in the Global Economy. Ithaca: Cornell University Press.CrossRefGoogle Scholar
Ni, A. Y. and Ho, A. T.-K. 2008. “A quiet revolution or a flashy blip? The real ID Act and U.S. national identification system reform,” Public Administration Review 68(5): 1063–78.CrossRefGoogle Scholar
Nissenbaum, H. 2004. “Privacy as contextual integrity,” Washington Law Review 79(1): 119–57.Google Scholar
Nissenbaum, H. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books.Google Scholar
Nuffield Council on Bioethics 2007. The Forensic Use of Bioinformation: Ethical Issues. London.Google Scholar
OECD 2013a. Exploring the economics of personal data: A survey of methodologies for measuring monetary value. Retrieved from: http://dx.doi.org/10.1787/5k486qtxldmq-en.CrossRefGoogle Scholar
OECD 2013b. “The app economy.” doi: 10.1787/5k3ttftlv95k-en.CrossRefGoogle Scholar
O’Harrow, R. 2006. No Place to Hide: Behind the Scenes of our Emerging Surveillance Society. New York: Free Press.Google Scholar
Packard, V. O. 1964. The Naked Society. London: Longmans.Google Scholar
Posner, R. A. 1981. “The economics of privacy,” The American Economic Review 71(2): 405–9.Google Scholar
Regan, P. M. 1995. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill and London: University of North Carolina Press.Google Scholar
Reidenberg, J. R. 2000. “Resolving conflicting international data privacy rules in cyberspace,” Stanford Law Review 52: 1315–71.CrossRefGoogle Scholar
Stigler, G. J. 1961. “The economics of information,” Journal of Political Economy 69(3): 213–25.CrossRefGoogle Scholar
Stigler, G. J. 1980. “An introduction to privacy in economics and politics,” Journal of Legal Studies 9(4): 623–44.Google Scholar
Sykes, C. J. 1999. The End of Privacy. New York: St. Martin’s Press.Google Scholar
Warren, S. D. and Brandeis, L. D. 1890. “The right to privacy,” Harvard Law Review, 4(5): 193220.CrossRefGoogle Scholar
Weiser, M. 1991. “The computer for the 21st century,” Scientific American 3: 94104.CrossRefGoogle Scholar
Westin, A. F. 1967. Privacy and Freedom. New York: Atheneum.Google Scholar
Westin, A. F. 2003. “Social and political dimensions of privacy,” Journal of Social Issues 59(2): 431–53.CrossRefGoogle Scholar
Wiegand, I. 2011. “Towards convergence? National counter-terrorism measures in Western Europe: A comparison of counter-terrorist legislation in France, Germany, Italy, the Netherlands, Spain, and the United Kingdom after 9/11,” unpublished Ph.D. thesis, Bremen International Graduate School of Social Sciences, Bremen.Google Scholar
World Economic Forum 2011 . Personal Data: The Emergence of a New Asset Class. Geneva. retrieved from: www3.weforum.org/docs/WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf.Google Scholar
Zureik, E., Harling Stalker, L. L., Smith, E., Lyon, D. and Chan, Y. E. (eds.) 2010. Surveillance, Privacy, and the Globalization of Personal Information: International Comparisons. Montreal and Quebec: McGill-Queen’s University Press.CrossRefGoogle Scholar
Zwick, D. and Dholakia, N. 2001. “Contrasting European and American approaches to privacy in electronic markets: property right versus civil right,” Electronic Markets 11(2): 116–20.Google Scholar

References

Bulman-Pozen, J. 2014. “From sovereignty and process to administration and politics,” Yale Law Journal 123: 1920–56.Google Scholar
Bundesrat Drucksachen [BR] 52/1/12 (Germany).Google Scholar
COM 2012. Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation), final, January 25, 2012.Google Scholar
CNIL (Commission Nationale de l’informatique et des Libertés) 2012. Projet de règlement européen: la défense de la vie privée s’éloigne du citoyen [Proposed European Regulation: Defense of Private Life Moves Away from Citizens], January 26, 2012.Google Scholar
Dix, A. 2012. “Datenschutzaufsicht im Bundesstaat – ein Vorbild für Europa,” [Data Protection Oversight in the Federal State – A Model for Europe] Datenschutz und Datensicherheit 36: 318–21.Google Scholar
Epstein, R. A. and Greve, M. S. 2007. “Introduction: Preemption in Context,” in Epstein, R. A. and Greve, M. S. (eds.) Federal Preemption: States’ Powers, National Interests. Washington DC: AEI Press, pp. 15.Google Scholar
European Commission 2012. Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation).Google Scholar
Executive Office of the President 2014. Big Data, Seizing Opportunities, Preserving Values. Washington DC.Google Scholar
Federal Trade Commission 2001. North Dakota Privacy Law is Not Preempted, 2001 WL 729771.Google Scholar
Feeley, M. M. and Rubin, E. 2008. Federalism: Political Identity and Tragic Compromise. University of Michigan Press.Google Scholar
Finch, K. 2013. “Straight From the Pacific Ocean: A Tidal Wave of California Privacy Laws,” The Privacy Advisor, November 6, 2013.Google Scholar
Härting, N. 2012. “Starke Behörden, schwaches Recht –der neue EU-Datenschutzentwurf,” [Strong Authorities, Weak Law – the new EU Data Protection Draft] Betriebs-Berater 8: 459–66.Google Scholar
Hills, R. M. Jr. 2007. “Against preemption,” New York University Law Review 82: 168.Google Scholar
Janger, E. J. and Schwartz, P. M. 2002. “The Gramm-Leach-Bliley Act, information privacy, and the limits of default rules,” Minnesota Law Review 86: 1219–61.Google Scholar
Kuner, C. 2012. “The European Commission’s Proposed Data Protection Regulation: a Copernican revolution in European data protection law,” Privacy & Security Law Report 11: 215–30.Google Scholar
Masing, J. 2011 “Ein Abschied von den Grundrechten,” [A Farewell to Fundamental Rights] Sueddeutsche Zeitung, January 9, p. 10.Google Scholar
Masing, J. 2012. “Herausforderungen des Datenschutzes,” [Challenges for Data Protection] Neue Juristische Wochenschrift: 2305–11.Google Scholar
National Conference of State Legislatures, n.d. State Security Breach Notification Laws.Google Scholar
Newman, A. L. 2008. Protectors of Privacy. Ithaca: Cornell University Press.Google Scholar
Note from Gen. Secretariat to Working Grp. on Info. Exch. & Data Prot. 2012. Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation) (July 18, 2012).Google Scholar
Piris, J.-C. 2010. The Lisbon Treaty: A Legal and Political Analysis. Cambridge University Press.CrossRefGoogle Scholar
Press Unit, European Court of Human Rights 2014. Factsheet: Data Protection (September 2014).Google Scholar
Privacy Protection Study Commission 1977. Personal Privacy in an Information Society. Washington DC.Google Scholar
Roßnagel, A. 2012. “Editorial: Datenschutzgesetzgebung: Monopol oder Vielfalt?,” [Data Protection Legislation: Monopoly or Diversity?] Datenschutz und Datensicherheit 36: 553–5.Google Scholar
Ronellenfitsch, M. 2012. “Fortentwicklung des Datenschutzes: Die Pläne der Europäischen Kommission,” [Further Development of Data Protection: The Plans of the European Commission] Datenschutz und Datensicherheit 36: 561–3.Google Scholar
Schild, H.-H. and Tinnefeld, M.-T. 2012. “Datenschutz in der Union – gelungene oder missglückte Gesetzentwürfe?” [Data Protection in the Union: Successful or Unsuccessful Bill?] Datenschutz und Datensicherheit 36: 312–17.Google Scholar
Schwartz, P. M. and Janger, E. J. 2007. “Notification of data security breaches,” Michigan Law Review 105: 913–84.Google Scholar
Sengupta, S. 2013. “No U.S. Action, So States Move on Privacy Law,” The New York Times, October 30.Google Scholar
Simitis, S. 1997. “Einleitung in die EG-Datenschutzrichtlinie” in Dammann, U. and Simitis, S. (eds.) EG Datenschutzrichtlinie – Kommentar. Baden-Baden: Nomos.Google Scholar
Slaughter, A.-M. 2004. A New World Order. Princeton University Press.Google Scholar
Solove, D. J. and Hartzog, W. 2014. “The FTC And The New Common Law Of Privacy,” Columbia Law Review 114: 583676.Google Scholar
Solove, D. J. and Schwartz, P. M. (eds.) 2009. Information Privacy Law, Third Edition. New York: Aspen Publishers.Google Scholar
State of California, Office of the Attorney General 2014. Privacy Legislation Pending in 2014.Google Scholar
von Lewinski, K. 2012. “Europäisierung des Datenschutzrechts, Umsetzungsspielraum des deutschen Gesetzgebers und Entscheidungskompetenz des BVerfG,” Datenschutz und Datensicherheit 8: 564–70.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×