The assumption of the conference on ‘Reinventing Data Protection?’ was that data protection and privacy are not the same thing, though they may overlap. One of the questions raised by advanced data processing techniques like data mining and profiling is whether the assumption that it is data that need to be protected still holds.1 The data protection directive of 1995 builds on the concept of personal data, defined as data that relate to an identified or identifiable natural person.2
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bateson, G. (1972). Steps to an Ecology of Mind. New York, Ballantine
Bonner, W. and M. Chiasson (2005). “If fair information principles are the answer, what was the question? An actor-network theory investigation of the modern constitution of privacy.” Information and Organization 15: 267–293
Bourcier, D. (2001). “De l’intelligence artificielle à la personne virtuelle: émergence d’une entité juridique?” Droit et Société 49: 847–871
Bygrave, L. (2001). Minding the Machine. Article 15 and the EC Data Protection Directive and automated profiling. Computer Law & Security Report. 17: 17–24
Custers, B. (2004). The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology. Nijmegen, Wolf Legal Publishers
De Hert, P. and S. Gutwirth (2006). Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power. Privacy and the Criminal Law. E. Claes, A. Duff and S. Gutwirth. Antwerpen Oxford, Intersentia
Dewey, J. (1927). The Public & Its Problems. Chicago, The Swallow Press
Dötzer, F. (2005). Privacy Issues in Vehicular Ad Hoc Networks. Workshop on Privacy Enhancing Technologies. Dubrovnik, available at: http://www13.informatik.tu-muenchen.de/personen/doetzer/publications/Doetzer-05-PrivacyIssuesVANETs.pdf.
Fayyad, U. M., G. Piatetsky-Shapiro, et al., Eds. (1996). Advances in Knowledge Discovery and Data Mining. Meno Park, California, Cambridge, Mass., London England, AAAI Press / MIT Press
Hildebrandt, M. (2006a). “From Data to Knowledge: The challenges of a crucial technology.” DuD – Datenschutz und Datensicherheit 30: 548–552
Hildebrandt, M. (2006b). Privacy and Identity. Privacy and the Criminal Law. E. Claes, A. Duff and S. Gutwirth. Antwerpen – Oxford, Intersentia: 43–58
Hildebrandt, M. (2008a). Defining Profiling: A New Type of Knowledge. Profiling the European Citizen. A Cross-disciplinary Perspective. M. Hildebrandt and S. Gutwirth, Springer: 17–30
Hildebrandt, M. (2008b). A Vision of Ambient Law. Regulating Technologies. R. Brownsword and K. Yeung. Oxford, Hart: 175–191
Hildebrandt, M. and S. Gutwirth (2007). “(Re)presentation, pTA citizens’ juries and the jury trial.” Utrecht Law Review 3 (1): http://www.utrechtlawreview.org/
Hildebrandt, M. and B.-J. Koops (2007). A Vision of Ambient Law. Brussels, FIDIS
Hudson, B. (2005). Secrets of Self: Punishment and the Right to Privacy. Privacy and the Criminal Law. E. Claes and A. Duff. Antwerp Oxford, Intersentia
Kallinikos, J. (2006). The Consequences of Information. Institutional Implications of Technological Change. Cheltenham, UK Northampton, MA, USA, Edward Elgar
Keymolen, E. (2006). Onzichtbare Zichtbaarheid. Helmuth Plessner ontmoet profiling. Bachelor Thesis Faculty of Philosophy. Rotterdam, not published
Lessig, L. (1999). Code and Other Laws of Cyberspace. New York, Basic Books
Lessig, L. (2006). Code Version 2.0. New York, Basic Books
Lévy, P. (1990). Les technologies de l’intelligence. L’avenir à l’ère informatique. Paris, La Découverte
Mead, G. H. (1959/1934). Mind, Self & Society. From the Standpoint of a Social Behaviorist. Chicago – Illinois, The University of Chicago Press
Peirce, C. S. (1997). Pragmatism as a Principle and Method of Right Thinking. The 1903 Harvard Lectures on Pragmatism. Albany, State University of New York Press
Prins, J. E. J. (2004). “The Propertization of Personal Data and Identities.” Electronic Journal of Comparative Law, available at http://www.ejcl.org/ 8(3)
Ricoeur, P. (1992). Oneself as Another. Chicago, The University of Chicago Press
Rouvroy, A. (2008). “Privacy, data protection and the unprecedented challenges of Ambient Intelligence.” (2) Studies in Ethics, Law and Technology, Issue 1, available at SSRN: http://ssrn.com/abstract=1013984
Schwartz, P. M. (2000). “Beyond Lessig’s Code for Internet Privacy: Cyberspace Filters, Privacy-Control and Fair Information Practices.” Wisconsin Law Review 4: 743–788
Vedder, A. (1999). “KDD: The challenge to individualism.” Ethics and Information Technology 1: 275–281
Zarsky, T. Z. (2002–2003). “‘Mine Your Own Business!’: Making the Case for the Implications of the Data Mining or Personal Information in the Forum of Public Opinion.” Yale Journal of Law & Technology 5 (4): 17–47
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media B.V.
About this paper
Cite this paper
Hildebrandt, M. (2009). Who is Profiling Who? Invisible Visibility. In: Gutwirth, S., Poullet, Y., De Hert, P., de Terwangne, C., Nouwt, S. (eds) Reinventing Data Protection?. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-9498-9_14
Download citation
DOI: https://doi.org/10.1007/978-1-4020-9498-9_14
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-9497-2
Online ISBN: 978-1-4020-9498-9
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)