Advertisement

Privacy 3.0

  • Anton VedderEmail author
Chapter
Part of the Information Technology and Law Series book series (ITLS, volume 20)

Abstract

Dead or as good as dead.’ Not so long ago articles and essays on privacy often started with a statement like this one. Unfortunately, those announcing the end of privacy often did not indicate what exactly was going on. Is our privacy indeed coming to an end? Can we no longer hide things from the eyes of our all-seeing neighbors, companies, and public bodies? Or perhaps nobody, including pro-privacy advocates, is really convinced of the value of privacy? As far as the recognition of the importance of privacy is concerned, there seems to be no justification for pessimism. In spite of the prognosed lack of vitality, privacy presently leads a remarkably lively existence in newspaper opinion columns and in public debate.

Keywords

Personal Data Public Debate Normative Impact Technical Device Ambient Intelligence 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Albrecht HJ, Dorsch C, Krüpe C (2003) Rechtswirklichkeit und Effizienz der Überwachung der Telekommunikation. Freiburg, Max-Planck-Institut. http://www.iuscrim.mpg.de/verlag/online/Band_115.pdf
  2. Allen AL (1988) Uneasy access: privacy for women in a free society. Rowan & Littlefield, TotowaGoogle Scholar
  3. Aubel CP (1968) Persoon en Pers (diss. Nijmegen KUN). Deventer, KluwerGoogle Scholar
  4. Barth A et al (2006) Privacy and contextual integrity: framework and applications. Proceedings of the IEEE symposium on security and privacy, May 2006 (Showcased in ‘The Logic of Privacy’ The Economist, 4 January 2007)Google Scholar
  5. Benn SI (1988) A theory of freedom. Cambridge University Press, CambridgeCrossRefGoogle Scholar
  6. Blok PH (2002) Het recht op privacy. De betekenis van het begrip ‘privacy’ in het Nederlandse en Amerikaanse recht (diss. Tilburg). Boom Juridische Uitgevers, Den HaagGoogle Scholar
  7. Bloustein EJ (1964) Privacy as an aspect of human dignity. An answer to dean Prosser. New York University Law Review, pp 962–1007. Also in: Schoeman FD (ed) (1984) Philosophical dimensions of privacy: an anthology. Cambridge, Cambridge University Press, pp 156–202Google Scholar
  8. Brouwer A de et al (2009) Gewoon Doen, beschermen van veiligheid en persoonlijke levenssfeer. Ministry of Interior Affairs, The HagueGoogle Scholar
  9. Devlin P (1965) The Enforcement of Morals (1st edn. 1959). Oxford University Press, OxfordGoogle Scholar
  10. Etzioni A (1999) The limits of privacy. Basic Books, New YorkGoogle Scholar
  11. Foucault M (1975) Surveiller et punir, naissance de la prison. Gallimard, ParisGoogle Scholar
  12. Fried C (1968) Privacy. Yale Law J 77:475–493Google Scholar
  13. Gallie WB (1955–1956) Essentially contested concepts. Proceedings of the Aristotelian society, pp 167–198Google Scholar
  14. Gerstein RS (1978) Intimacy and privacy. Ethics, pp 76–81Google Scholar
  15. Gutwirth S (1998) Privacyvrijheid! De vrijheid om zichzelf te zijn. Rathenau Instituut, Den HaagGoogle Scholar
  16. Hart HLA (1963) Law, liberty and morality. Oxford University Press, LondonGoogle Scholar
  17. Henkin L (1974) Privacy and autonomy. Columbia Law Rev 74:1410–1433Google Scholar
  18. Holmes R (1995) Privacy: philosophical foundations and moral dilemma’s. In: Ippel P (ed) Privacy disputed. SDU Uitgeverij, Den Haag, pp 15–27Google Scholar
  19. Inness J (1992) Privacy, intimacy and isolation. Oxford University Press, OxfordGoogle Scholar
  20. Johnson JL (1989a) Privacy and the judgements of others. J Value Inq 23:157–168Google Scholar
  21. Johnson JL (1989b) Privacy, liberty and integrity. Public Aff Q 3:15–34Google Scholar
  22. Johnson D (1994) Computers and privacy. Prentice Hall, Upper Saddle RiverGoogle Scholar
  23. Johnson JL (2001) Immunity from the illegitimate focused attention of others: an explanation of our thinking and talking about privacy. In: Vedder A (ed) Ethics and the internet. Antwerpen, IntersentiaGoogle Scholar
  24. Koffijberg J et al (2009) Niets te verbergen en toch bang. Nederlandse burgers over het gebruik van hun gegevens in de glazen samenleving. Den Haag/Amsterdam, College Bescherming Persoonsgegevens/RegioplanGoogle Scholar
  25. Koops BJ, Vedder A (2001) Opsporing versus privacy: de beleving van burgers. SDU Uitgeverij, Den HaagGoogle Scholar
  26. Lyon D (1994) The electronic eye, the rise of the surveillance society. Polity Press, CambridgeGoogle Scholar
  27. Mill JS (1974) On liberty (1st edn. 1859). Pelican Books, London Google Scholar
  28. Moore B (1984) Privacy: studies in social and cultural history. M.E. Sharpe Inc. New YorkGoogle Scholar
  29. Muller ER, Kummeling HRBM, Bron RP (2007) Veiligheid en privacy, Een zoektocht naar een nieuwe balans. Boom Juridische Uitgevers, Den HaagGoogle Scholar
  30. Nissenbaum H (1998) Protecting privacy in an information age: the problem of privacy in public. Law Contemp Probl 17:559–596Google Scholar
  31. Parent WA (1983) Recent work on the concept of privacy. Am Philos Q 20(4):341–355Google Scholar
  32. Perri 6 (1998) The future of privacy. Demos, LondonGoogle Scholar
  33. Powers M (1996) A cognitive access definition of privacy. Law Philos 15:369–386Google Scholar
  34. Projectgroep Forensische Opsporing Raad van Hoofdcommissarissen (2004) Spelverdeler in de opsporing. Een visie op forensische opsporin (z.p.). http://www.politie.nl/Overige/Images/33_144778.pdf
  35. Prosser WL (1960) Privacy. Calif Law Rev 48:338–423CrossRefGoogle Scholar
  36. Rachels J (1975) Why privacy is important. Philosophy and public affairs, pp 323–333Google Scholar
  37. Rachels J (1975) Why privacy is important. In: Schoeman FD (ed) (1984) Philosophical dimensions of privacy: an anthology. Cambridge University Press, Cambridge, pp 290–299Google Scholar
  38. Rössler B (2001) Der wert des privaten. Frankfurt am Main, SuhrkampGoogle Scholar
  39. Rule J (1980) The politics of privacy: planning for personal data systems as powerful technologies. Elsevier, New YorkGoogle Scholar
  40. Schildmeijer R, Samson C, Koot H (2005) Burgers en hun privacy, Opinie onder burgers. Amsterdam, TNS/NIPOGoogle Scholar
  41. Schoeman FD (1984) Philosophical dimensions of the literature. In: Schoeman FD (ed) Philosophical dimensions of privacy: an anthology. Cambridge University Press, Cambridge, pp 1–33CrossRefGoogle Scholar
  42. Schoeman FD (1992) Privacy and social freedom. Cambridge University Press, CambridgeCrossRefGoogle Scholar
  43. Stein P, Shand J (1974) Legal values in western society. Edinburgh University Press, EdinburghGoogle Scholar
  44. Teeuw WB, Vedder AH (eds) (2008) Security applications for converging technologies, Impact on the constitutional state and the legal order. Boom Juridische Uitgevers, Den HaagGoogle Scholar
  45. Thomson JJ (1975a) The right to privacy. philosophy and public affairs, pp 295–315Google Scholar
  46. Thomson JJ (1975b) The right to privacy. In: Schoeman FD (ed) (1984) Philosophical dimensions of privacy: an anthology. Cambridge University Press, Cambridge, pp 272–289Google Scholar
  47. Vedder A (1996) Privacy en woorden die tekort schieten. In: Nouwt J, Voermans W (eds) Privacy in het informatietijdperk. SDU Uitgeverij, Den Haag, pp 17–30Google Scholar
  48. Vedder A (1997) Privatization, information technology and privacy: reconsidering the social responsibilities of private organizations. In: Moore G (ed) Business ethics: principles and practice. Business Education Publishers Ltd, Sunderland, pp 215–226Google Scholar
  49. Vedder A (1998) Het einde van de individualiteit? Groepsprofilering, datamining en de vermeerdering van brute pech en dom geluk. Privacy en Informatie 1(3):115–120Google Scholar
  50. Vedder A (2000) Medical data, new information technologies and the need for normative principles other than privacy rules. In: Freeman and Lewis (ed) Law and medicine (Series Current Legal Issues) Oxford University Press, Oxford, pp 441–459Google Scholar
  51. Vedder A (2006) Niets meer te verbergen en toch nog bang. Filosofie en Praktijk 27(5):47–61Google Scholar
  52. Vedder A (2008a) Convergerende technologieën, verschuivende verantwoordelijkheden. Justitiële Verkenningen 34(1):54–66Google Scholar
  53. Vedder A (2008b) De oudere en de paradoxale gevolgen van nieuwe technologieën. In: Berg M Van den, Prins JEJ and Ham M (ed) In de greep van de technologie—Nieuwe toepassingen en het gedrag van de burger. Van Gennep, Amsterdam, pp 135–150Google Scholar
  54. Verhue D (2007) Nationaal Vrijheidsonderzoek—opiniedeel. Meting 2007. Amsterdam, Veldkamp/Comité 4 and 5 May 2007. http://www.4en5mei.nl/mmbase/attachments/110429/2007.04.284_Veldkamp_Marktonderzoek_BV_Nationaal_Vrijheidsonderzoek_2007_opinie
  55. Warren SD, Brandeis LD (1890) The right to privacy. The implicit made explicit. Harv Law Rev, pp 193–220. Also in: Schoeman FD (ed) (1984) Philosophical dimensions of privacy: an anthology. Cambridge University Press, Cambridge, pp 75–103Google Scholar
  56. Weinstein WL (1971) The private and the free: a conceptual inquiry. In: Pennock JR, Chapman JW (eds) Nomos XIII: privacy. Atherton Press, New York, pp 88–104Google Scholar
  57. Westin A (1967) Privacy and freedom. The Bodley Head, New YorkGoogle Scholar
  58. Winter HB et al (2008) Wat niet weet, wat niet deert. Een evaluatieonderzoek naar de werking van de wet bescherming persoonsgegevens in de praktijk. WODC/Ministerie van Justitie, Den HaagGoogle Scholar

Copyright information

© T.M.C. ASSER PRESS, The Hague, The Netherlands, and the authors 2011 2011

Authors and Affiliations

  1. 1.TILT – Tilburg Institute for Law, Technology and Society, Tilburg UniversityTilburgThe Netherlands

Personalised recommendations