Skip to main content

Who is Profiling Who? Invisible Visibility

  • Conference paper
Reinventing Data Protection?

The assumption of the conference on ‘Reinventing Data Protection?’ was that data protection and privacy are not the same thing, though they may overlap. One of the questions raised by advanced data processing techniques like data mining and profiling is whether the assumption that it is data that need to be protected still holds.1 The data protection directive of 1995 builds on the concept of personal data, defined as data that relate to an identified or identifiable natural person.2

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Bateson, G. (1972). Steps to an Ecology of Mind. New York, Ballantine

    Google Scholar 

  • Bonner, W. and M. Chiasson (2005). “If fair information principles are the answer, what was the question? An actor-network theory investigation of the modern constitution of privacy.” Information and Organization 15: 267–293

    Article  Google Scholar 

  • Bourcier, D. (2001). “De l’intelligence artificielle à la personne virtuelle: émergence d’une entité juridique?” Droit et Société 49: 847–871

    Google Scholar 

  • Bygrave, L. (2001). Minding the Machine. Article 15 and the EC Data Protection Directive and automated profiling. Computer Law & Security Report. 17: 17–24

    Article  Google Scholar 

  • Custers, B. (2004). The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology. Nijmegen, Wolf Legal Publishers

    Google Scholar 

  • De Hert, P. and S. Gutwirth (2006). Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power. Privacy and the Criminal Law. E. Claes, A. Duff and S. Gutwirth. Antwerpen Oxford, Intersentia

    Google Scholar 

  • Dewey, J. (1927). The Public & Its Problems. Chicago, The Swallow Press

    Google Scholar 

  • Dötzer, F. (2005). Privacy Issues in Vehicular Ad Hoc Networks. Workshop on Privacy Enhancing Technologies. Dubrovnik, available at: http://www13.informatik.tu-muenchen.de/personen/doetzer/publications/Doetzer-05-PrivacyIssuesVANETs.pdf.

  • Fayyad, U. M., G. Piatetsky-Shapiro, et al., Eds. (1996). Advances in Knowledge Discovery and Data Mining. Meno Park, California, Cambridge, Mass., London England, AAAI Press / MIT Press

    Google Scholar 

  • Hildebrandt, M. (2006a). “From Data to Knowledge: The challenges of a crucial technology.” DuD – Datenschutz und Datensicherheit 30: 548–552

    Google Scholar 

  • Hildebrandt, M. (2006b). Privacy and Identity. Privacy and the Criminal Law. E. Claes, A. Duff and S. Gutwirth. Antwerpen – Oxford, Intersentia: 43–58

    Google Scholar 

  • Hildebrandt, M. (2008a). Defining Profiling: A New Type of Knowledge. Profiling the European Citizen. A Cross-disciplinary Perspective. M. Hildebrandt and S. Gutwirth, Springer: 17–30

    Google Scholar 

  • Hildebrandt, M. (2008b). A Vision of Ambient Law. Regulating Technologies. R. Brownsword and K. Yeung. Oxford, Hart: 175–191

    Google Scholar 

  • Hildebrandt, M. and S. Gutwirth (2007). “(Re)presentation, pTA citizens’ juries and the jury trial.” Utrecht Law Review 3 (1): http://www.utrechtlawreview.org/

  • Hildebrandt, M. and B.-J. Koops (2007). A Vision of Ambient Law. Brussels, FIDIS

    Google Scholar 

  • Hudson, B. (2005). Secrets of Self: Punishment and the Right to Privacy. Privacy and the Criminal Law. E. Claes and A. Duff. Antwerp Oxford, Intersentia

    Google Scholar 

  • Kallinikos, J. (2006). The Consequences of Information. Institutional Implications of Technological Change. Cheltenham, UK Northampton, MA, USA, Edward Elgar

    Google Scholar 

  • Keymolen, E. (2006). Onzichtbare Zichtbaarheid. Helmuth Plessner ontmoet profiling. Bachelor Thesis Faculty of Philosophy. Rotterdam, not published

    Google Scholar 

  • Lessig, L. (1999). Code and Other Laws of Cyberspace. New York, Basic Books

    Google Scholar 

  • Lessig, L. (2006). Code Version 2.0. New York, Basic Books

    Google Scholar 

  • Lévy, P. (1990). Les technologies de l’intelligence. L’avenir à l’ère informatique. Paris, La Découverte

    Google Scholar 

  • Mead, G. H. (1959/1934). Mind, Self & Society. From the Standpoint of a Social Behaviorist. Chicago – Illinois, The University of Chicago Press

    Google Scholar 

  • Peirce, C. S. (1997). Pragmatism as a Principle and Method of Right Thinking. The 1903 Harvard Lectures on Pragmatism. Albany, State University of New York Press

    Google Scholar 

  • Prins, J. E. J. (2004). “The Propertization of Personal Data and Identities.” Electronic Journal of Comparative Law, available at http://www.ejcl.org/ 8(3)

  • Ricoeur, P. (1992). Oneself as Another. Chicago, The University of Chicago Press

    Google Scholar 

  • Rouvroy, A. (2008). “Privacy, data protection and the unprecedented challenges of Ambient Intelligence.” (2) Studies in Ethics, Law and Technology, Issue 1, available at SSRN: http://ssrn.com/abstract=1013984

  • Schwartz, P. M. (2000). “Beyond Lessig’s Code for Internet Privacy: Cyberspace Filters, Privacy-Control and Fair Information Practices.” Wisconsin Law Review 4: 743–788

    Google Scholar 

  • Vedder, A. (1999). “KDD: The challenge to individualism.” Ethics and Information Technology 1: 275–281

    Article  Google Scholar 

  • Zarsky, T. Z. (2002–2003). “‘Mine Your Own Business!’: Making the Case for the Implications of the Data Mining or Personal Information in the Forum of Public Opinion.” Yale Journal of Law & Technology 5 (4): 17–47

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mireille Hildebrandt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media B.V.

About this paper

Cite this paper

Hildebrandt, M. (2009). Who is Profiling Who? Invisible Visibility. In: Gutwirth, S., Poullet, Y., De Hert, P., de Terwangne, C., Nouwt, S. (eds) Reinventing Data Protection?. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-9498-9_14

Download citation

Publish with us

Policies and ethics