Op deze pagina vind je de referenties van hoofdstuk 5 van het boek ICT & Recht, van auteur Arnoud Engelfriet.
1. S.D. Warren & L.D. Brandeis, ‘The Right to Privacy’, Harvard Law Review 4(5), 1890.
2. R.E. Mensel, ‘Kodakers Lying in Wait: Amateur Photography and the Right of Privacy in New York, 1885-1915’, American Quarterly 1991, afl. 43.1, p. 24-45.
3. P.J.C. Olsthoorn, Baas over eigen data Zelfbeschikking in bescherming van persoonsgegevens (diss. Amsterdam VU), Den Haag: Boom juridisch 2021.
4. D.K. Mulligan & C. Koopman & N. Doty. ‘Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy’, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 2016.
5. A.F. Westin, ‘Social and Political Dimensions of Privacy’, Journal of Social Issues 2003, afl. 59, p. 431-453.
6. B. Bratman, ‘Brandeis and Warren's The Right to Privacy and the Birth of the Right to Privacy’, Tennessee Law Review 2001, afl.69, p. 623.
7. M. Berger, ‘Surrender of Privacy,’ Scribner’s Magazine 1939, afl. 4.
8. S. Barbas, ‘Saving privacy from history’ DePaul Law Review 2011, afl.61, p. 973.
9. A.F. Westin, Privacy and freedom. New York: Atheneum 1967.
10. P.J.C. Olsthoorn, Baas over eigen data Zelfbeschikking in bescherming van persoonsgegevens (dissertatie Amsterdam VU), Den Haag: Boom juridisch 2021.
11. P.M. Schwartz & D.J. Solove, ‚The PII problem: Privacy and a new concept of personally identifiable information’, NYU Law Review 2011, afl. 86, p. 1814.
12. J.A. Tomain, ‘Online Privacy & the First Amendment: An Opt-In Approach to Data Processing’, University of Cincinnati Law Review 2014, afl.83, iss. 1.
13. L. Frohman, ‘Datenschutz, the Defense of Law, and the Debate over Precautionary Surveillance: The Reform of Police Law and the Changing Parameters of State Action in West Germany’, German Studies Review 2015, vol. 38, no. 2, p. 307-327.
14. J.L. Riccardi, "The german federal data protection act of 1977: Protecting the right to privacy’, Boston College International and Comparative Law Review 1983, afl. 6, p. 243.
15. J. van Maarseveen, ‘Volkstellingen. De betekenis voor historisch sociaal-wetenschappelijk onderzoek’, in: E.S. Nordholt, "De ‘virtuele volkstelling’ 2001," SOCIAAL STATISTISCH BESTAND: 33.
16. C.J. Bennett, ‘The European General Data Protection Regulation: An instrument for the globalization of privacy standards?’, Information Polity 2018, afl. 23.2, p. 239-246.
17. EHRM 25 februari 1997 nr. 22009/93, ECLI: XX:1997:AD448, NJ 1999/515, m.nt. Knigge, (Z./Finland).
18. G. Hornung & C. Schnabel, ‘Data protection in Germany I: The population census decision and the right to informational self-determination’, Computer Law & Security Review 2009, afl. 25.1, p. 84-88.
19. E. Schwartz, Netactivism: how citizens use the Internet. Sepastopol, California: Songline Studios Inc. 2015.
20. J. Assange & J, Appelbaum & A Muller & M.J. Zimmerman, Cypherpunks: Freedom and the Future of the Internet. New York: OR books 2012.
21. C. Jarvis, Crypto Wars: The Fight for Privacy in the Digital Age: a Political History of Digital Encryption, CRC Press 2020.
22. H. Abelson & R. Anderson & S. M. Bellovin & J. Benaloh & M. Blaze & W. Diffie & J. Gilmore & M. Green & S. Landau & P. G. Neumann and others, ‘Keys under doormats: mandating insecurity by requiring government access to all data and communications’, Journal of Cybersecurity 2015, vol. 1, no. 1, p. 69-79.
23. D. Charjan & P. Bochare & Y. Bhuyar. "An Overview of Secure Sockets Layer." International Journal of Computer Science Application 2013, afl. 6.2, p. 388-393.
24. Y. Poullet, ‘EU data protection policy. The Directive 95/46/EC: Ten years after’, Computer Law & Security Review 2006, afl. 22.3, p. 206-217.
25. HvJ EU 6 november 2003, C-101/01, ECLI:EU:C:2003:596, Jur 2003, m.nt. Zwenne (Bodil Lindqvist).
26. A.H.Mhaidli, & Y. Zou & F. Schaub. "We Can't Live Without {Them!}" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks." Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 2019.
27. H. Choi & J. Park, & Y. Jung, ‘The role of privacy fatigue in online privacy behavior’, Computers in Human Behavior 2018, afl. 81, p. 42–51.
28. J. Verble, ‘The NSA and Edward Snowden: surveillance in the 21st century’, ACM Sigcas Computers and Society 2014, afl. 44.3, p. 14-20.
29. R. Deibert, ‘The geopolitics of cyberspace after Snowden’, Current History 2015, 114.768: 9.
30. HvJ EU 6 oktober 2015, C-362/14, ECLI:EU:C:2015:650 (Maximillian Schrems tegen Data Protection Commissioner).
31. HvJ EU 17 juli 2020, C-311/18, ECLI:EU:C:2020:559 (Schrems II).
32. Questions & Answers: EU-U.S. Data Privacy Framework, ec.europa.eu
33. S. T. McAbee & R.S. Landis & M.I. Burke, ‘Inductive reasoning: The promise of big data’, Human resource Management review 2017, afl. 27.2, p. 277-290.
34. S. Zuboff, The age of surveillance capitalism: The fight for a human future at the new frontier of power , Londen: Profile books 2019.
35. I.N. Eezende, ‘Facial recognition in police hands: Assessing the ‘Clearview case’from a European perspective’, New Journal of European Criminal Law 2020, afl. 11.3, p. 375-389.
36. EHRM 26 maart 1985, ECLI:NL:XX:1985:AC8813, NJ 1985/525, m.nt. EAA (X en Y). EHRM 9 december 1994, ECLI:NL:XX:1994:AH6193, NJ 1996/506, m.nt. EJD, m.nt. I.C. van der Vlies (López Ostra).
37. HR 9 januari 1987, ECLI:NL:PHR:1987:AG55000, NJ 1987/928, m.nt. E.A. van der Alkema (Bespiede bijstandsmoeder).
38. P. Palka, ‘Data Management Law for the 2020s: The Lost Origins and the New Needs’, Buffalo Law Review 2020, afl. 68, p. 559.
39. EHRM 10 november 2015, ECLI: https://hudoc.echr.coe.int/eng#{%22itemid%22:[%22001-158861%22]} zaaknr 40454/07) HvJ EU 6 november 2003, C-101/01, ECLI:EU:C:2003:596, Jur 2003, m.nt. Zwenne (Bodil Lindqvist). ECR I-12971, para. 86 and Case C-73/07 Satakunnan Markkinapörssi and Satamedia [2008] ECR I-9831, paras 53-56.
40. D.J. Solove, Understanding privacy. Cambridge, MA: Harvard University Press 2008.
41. R.L. Finn, D. Wright, M. Friedewald, ‘Seven types of privacy’, in: S. Gutwirth, R. Leenes, P. de Hert, Y. Poullet, eds., European Data Protection: Coming of age, Dordrecht: Springer 2013, p. 3-32.
42. P.L. Lau, ‘An Ecosystem of Interconnectedness: Prioritising Key Legal Concerns in the Metaverse’, The World Financial Review 2022
43. D. Solove, Understanding Privacy, Cambridge: Harvard University Press, 2008.
44. B. Koops, B. Clayton Newell, T. Timan, I. Škorvánek, T. Chokrevski, M. Galič, A Typology of Privacy, 38 U. Pa. J. Int’l L. 2017, p. 483.
45. E. Dommering, Informatierecht: Fundamentele rechten voor de informatiesamenleving, Amsterdam: Otto Cramwinckel 2000.
46. L.A. Bygrave, Data Protection Law: Approaching Its Rationale, Logic and Limits, The Hague / London / New York: Kluwer Law International: 2002. Chapter 7
47. G.G. Fuster, The emergence of personal data protection as a fundamental right of the EU, [Plaatsnaam]: Springer Science & Business 2014.
48. J.R. Beniger, The Control Revolution, Cambridge: Harvard University Press 1986.
49. I. Hacking, ‘How should we do the history of statistics?’, in: G. Burchell, C. Gordon, P. Miller, eds., The Foucault Effect. Studies in Governmentality, Chicago: The University of Chicago Press 1991, p. 181-195.
50. J. van Maarseveen, ‘Volkstellingen. De betekenis voor historisch sociaal-wetenschappelijk onderzoek’, in: Nordholt, E. Schulte. "De ‘virtuele volkstelling’ 2001." SOCIAAL STATISTISCH BESTAND: 33.
51. K. Driscoll, ‘From Punched Cards to “Big Data”: A Social History of Database Populism’, Communication +1 2012/1.1, p. 1-33.
52. E. Black, IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation, Washington DC: Dialog Press 2001.
53. P. Beynon-Davies, Information Systems: An introduction to informatics in organisations, Basingstoke: Palgrave Macmillan 2002.
54. J.H. Leavitt, T.L. Whisler, ‘Management in the 1980s’, HBR 1958, p. 41.
55. E.F. Codd, ‘A Relational Model of Data for Large Shared Data Banks’, Communications of the ACM 1970, p. 377-387.
56. K.L. Berg, T. Seymour, R. Goel, ‘History of databases’, IJMIS 2013/17.1, p. 29-36.
57. K.L. Berg, T. Seymour, R. Goel, ‘History of databases’, IJMIS 2013/17.1, p. 29-36.
58. H. G. Wells, World Brain: The Idea of a Permanent World Encyclopaedia, Garden City, NY: Doubleday, Doran & Co. 1938.
59. V. Bush, ‘As we may think’, The Atlantic monthly 1945/176.1, p. 101-108.
60. M.L. Neufeld, M. Cornog, ‘Database history: From dinosaurs to compact discs’, Journal of the American society for information science 1986/37.4, p. 183-190.
61. K.L. Berg, T. Seymour, R. Goel, ‘History of databases’, IJMIS 2013/17.1, p. 29-36.
62. M.R. Zynda, ‘The first killer app: A history of spreadsheets’, ACM: Interactions 2013/20.5, p. 68-72.
63. T.A. Grossman, V. Mehrotra, Ö. Özlük, ‘Lessons from mission-critical spreadsheets’, Communications of the Association for Information Systems 2007/20.1, p. 60.
64. L. Welling, L. Thomson, PHP and MySQL Web development, Carmel: Sams Publishing 2003.
65. S. Madden, ‘From databases to big data’, IEEE Internet Computing 2012/16.3, p. 4-6.
66. M.L. Jones, ‘Cookies: a legacy of controversy’, Internet Histories 2020/4.1, p. 87-104.
67. S. Whittle, M. Foster, ‘Customer profiling: getting into your customer’s shoes’, Management Decision 1989, p. 27-30.
68. D.E. Schultz, ‘Integrated Marketing Communications’, Journal of Promotion Management 1992/1:1, p. 99-104.
69. P.M. Regan, ‘Privacy legislation in the United States: a debate about ideas and interests’, International Review of Administrative Sciences 1996/62(4), p. 465-477.
70. E.P. Kelly, G.S. Erickson, ‘RFID tags: commercial applications v. privacy rights’, Industrial Management & Data Systems 2005.
71. F-L. Wong & F. Stajano. "Location privacy in Bluetooth." European Workshop on Security in Ad-hoc and Sensor Networks. Springer, Berlin, Heidelberg, 2005.
72. K. Wiedmann, H. Buxel, G. Walsh, ‘Customer profiling in e-commerce: Methodological aspects and challenges’, Journal of Database Marketing & Customer Strategy Management 2002/9.2. p. 170-184.
73. A. Lerner, ‘Internet Jones and the Raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016’, Symposium verslag: USENIX security 16 2016.
74. A.M. Hisham, ‘The effectiveness of advertising personalization’, Journal of Design Sciences and Applied Arts 2021/2.1, p.114-121.
75. M. Malheiros, et al. "Too close for comfort: A study of the effectiveness and acceptability of rich-media personalized advertising." Proceedings of the SIGCHI conference on human factors in computing systems. 2012.
76. K. van Es, ‘Netflix & Big Data: The Strategic Ambivalence of an Entertainment Company’, Television & New Media 2022, p. 1-17.
77. R. Chan, ‘The Cambridge Analytica whistleblower explains how the firm used Facebook data to sway elections’, businessinsider.nl, 5 oktober 2019. Zie ook Chan, Rosalie. "The Cambridge Analytica whistleblower explains how the firm used Facebook data to sway elections". Business Insider 29 januari 2021.
78. F. Cappa, R. Oriani, E. Peruffo, I. McCarthy, ‘Big Data for Creating and Capturing Value in the Digitalized Environment: Unpacking the Effects of Volume, Variety, and Veracity on Firm Performance’, Journal of Product Innovation Management 2021/38(1), p. 49-67.
79. M. Hilbert, P. López, ‘The world’s technological capacity to store, communicate, and compute information’, Science 2011/332(6025), p. 60-5.
80. A.L. Fradkov, ‘Early history of machine learning’, IFAC-PapersOnLine 2020/53.2, p. 1385-1390.
81. V. Mayer-Schönberger, K. Cukier, Big data: A revolution that will transform how we live, work and think, Boston: Houghton Mifflin Harcourt 2013.
82. Ntoutsi, Eirini, et al. "Bias in data‐driven artificial intelligence systems—An introductory survey." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 10.3 (2020): e1356.
83. M. Veale, F. Zuiderveen Borgesius, ‘Demystifying the Draft EU Artificial Intelligence Act – Analysing the good, the bad, and the unclear elements of the proposed approach’ Computer Law Review International 2021/22.4, p. 97-112.
84. N. Kshetri, ‘China’s Social Credit System: Data, Algorithms and Implications’, IT Professional 2020/22.2, p. 14-18.
85. L. Edwards, M. Veale, ‘Enslaving the algorithm: From a “right to an explanation” to a “right to better decisions”?, IEEE Security & Privacy 2018/16(3), p. 46-54.
Meld je nu aan voor één van de nieuwsbrieven van ICTRecht en blijf op de hoogte van onderwerpen zoals contracteren, informatiebeveiliging, innovatie, marketing, cloud, e-commerce, privacy en overheid.