Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-m6dg7 Total loading time: 0 Render date: 2024-11-05T05:09:39.486Z Has data issue: false hasContentIssue false

16 - Privacy, technology, and regulation: why one size is unlikely to fit all

from Part III - Issues in privacy regulation

Published online by Cambridge University Press:  05 July 2015

Beate Roessler
Affiliation:
Universiteit van Amsterdam
Dorota Mokrosinska
Affiliation:
Universiteit Leiden
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Social Dimensions of Privacy
Interdisciplinary Perspectives
, pp. 303 - 323
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Acquisti, A. 2004. “Privacy in electronic commerce and the economics of immediate gratification,” in Breese, J., Feigenbaum, J. and Seltzer, M. (eds.), EC ’04, pp. 2129. doi: 10.1145/988772.988777.Google Scholar
Acquisti, A. and Varian, H. R. 2005. “Conditioning prices on purchase history,” Marketing Science 24(3): 367–81. doi: 10.1287/mksc.1040.0103.CrossRefGoogle Scholar
Balzacq, T. (ed.) 2011. Securitization Theory: How Security Problems Emerge and Dissolve. London: Routledge.Google Scholar
Bennett, C. J. 1992. Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Ithaca: Cornell University Press.CrossRefGoogle Scholar
Bennett, C. J. 2008. The Privacy Advocates: Resisting the Spread of Surveillance. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Beresford, A. R., Kübler, D. and Preibusch, S. 2010. Unwillingness to Pay for Privacy: A Field Experiment. Bonn: Forschungsinstitut zur Zukunft der Arbeit.Google Scholar
Busch, A. 2010. “Politik, Prävention, Privatheit: Orwell und die britische Gegenwart,” in Seubert, S. and Niesen, P. (eds.), Die Grenzen des Privaten. Baden-Baden: Nomos, pp. 145–64.Google Scholar
Busch, A. 2011a. “Die Regulierung von Privatheit: Technische Innovation als Herausforderung von Datenschutzregimes,” dms – Der Moderne Staat – Zeitschrift für Public Policy, Recht und Management 4(2): 403–22.Google Scholar
Busch, A. 2011b. “The Regulation of Privacy,” in Levi-Faur, D. (ed.), Handbook on the Politics of Regulation. Cheltenham and Northampton, MA: Edward Elgar, pp. 227–40.Google Scholar
Busch, A. 2012. “The regulation of transborder data traffic: disputes across the Atlantic,” Security and Human Rights 23(4): 313–30.Google Scholar
Busch, A. 2015. “The Changing Architecture of the National Security State,” in Leibfried, S., Huber, E., Nullmeier, F., Lange, M., Levy, J. and Stephens, J. (eds.), The Oxford Handbook of Transformations of the State. Oxford University Press, pp. 536–53.Google Scholar
Bygrave, L. A. 2008. “International Agreements to Protect Personal Data,” in Rule, J. B. and Greenleaf, G. (eds.), Global Privacy Protection. Northampton, MA: Edward Elgar, pp. 1549.Google Scholar
Crenshaw, M. (ed.) 2010. The Consequences of Counterterrorism. New York: Russell Sage Foundation.Google Scholar
Deutscher Bundestag 2013. Schlussbericht der Enquête-Kommission Internet und digitale Gesellschaft: Drucksache 17/12550, 5.4.2013. Berlin: Deutscher Bundestag.Google Scholar
Diffie, W. and Landau, S. E. 1998. Privacy on the Line: The Politics of Wiretapping and Encryption. Cambridge, MA and London: MIT Press.CrossRefGoogle Scholar
Gallup Europe and European Commission 2008. Data Protection in the European Union: Citizens’ Perceptions: Analytical Report. Brussels.Google Scholar
Garfinkel, S. 2000. Database Nation: The Death of Privacy in the 21st Century. Beijing and Cambridge: O’Reilly.Google Scholar
Gormley, K. 1992. “One hundred years of privacy,” Wisconsin Law Review 5, 1335–442.Google Scholar
Haubrich, D. 2003. “September 11, anti-terror laws and civil liberties: Britain, France and Germany compared,” Government & Opposition 38(1): 328.CrossRefGoogle Scholar
Heisenberg, D. 2005. Negotiating Privacy: The European Union, the United States, and Personal Data Protection. Boulder: Lynne Rienner Publishers.CrossRefGoogle Scholar
Home Office 2013. The National DNA Database Annual Report 2011–2012. London.Google Scholar
House of Lords. Select Committee on the Constitution (ed.). 2009. Surveillance: Citizens and the State: 2nd Report Of Session 2008–09. London: The Stationery Office.Google Scholar
International Telecommunication Union 2013. Measuring the Information Society: 2013. Geneva.Google Scholar
Kahn, A. E. 1966. “The tyranny of small decisions: market failures, imperfections, and the limits of economics,” Kyklos 19(1): 2347. doi: 10.1111/j.1467–6435.1966.tb02491.x.CrossRefGoogle Scholar
Katzenstein, P. J. 2003. “Same war – different views: Germany, Japan, and counterterrorism,” International Organization 57(4): 731–60.CrossRefGoogle Scholar
Lyon, D. 2001. Surveillance Society: Monitoring Everyday Life. Buckingham: Open University Press.Google Scholar
Moore, B. J. 1984. Privacy: Studies in Social and Cultural History. Armonk and London: M. E. Sharpe.Google Scholar
Murphy, R. S. 1996. “Property rights in personal information: an economic defence of privacy,” Georgetown Law Journal 84: 2381–417.Google Scholar
National Research Council (ed.) 2008. Protecting Individual Privacy in the Struggle against Terrorists: A Framework for Program Assessment. Washington DC: National Academies Press.Google Scholar
Nelson, L. 2004. “Privacy and technology: reconsidering a crucial public policy debate in the post-September 11 era,” Public Administration Review 64(3): 259–69.CrossRefGoogle Scholar
Newman, A. L. 2008. Protectors of Privacy: Regulating Personal Data in the Global Economy. Ithaca: Cornell University Press.CrossRefGoogle Scholar
Ni, A. Y. and Ho, A. T.-K. 2008. “A quiet revolution or a flashy blip? The real ID Act and U.S. national identification system reform,” Public Administration Review 68(5): 1063–78.CrossRefGoogle Scholar
Nissenbaum, H. 2004. “Privacy as contextual integrity,” Washington Law Review 79(1): 119–57.Google Scholar
Nissenbaum, H. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books.Google Scholar
Nuffield Council on Bioethics 2007. The Forensic Use of Bioinformation: Ethical Issues. London.Google Scholar
OECD 2013a. Exploring the economics of personal data: A survey of methodologies for measuring monetary value. Retrieved from: http://dx.doi.org/10.1787/5k486qtxldmq-en.CrossRefGoogle Scholar
OECD 2013b. “The app economy.” doi: 10.1787/5k3ttftlv95k-en.CrossRefGoogle Scholar
O’Harrow, R. 2006. No Place to Hide: Behind the Scenes of our Emerging Surveillance Society. New York: Free Press.Google Scholar
Packard, V. O. 1964. The Naked Society. London: Longmans.Google Scholar
Posner, R. A. 1981. “The economics of privacy,” The American Economic Review 71(2): 405–9.Google Scholar
Regan, P. M. 1995. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill and London: University of North Carolina Press.Google Scholar
Reidenberg, J. R. 2000. “Resolving conflicting international data privacy rules in cyberspace,” Stanford Law Review 52: 1315–71.CrossRefGoogle Scholar
Stigler, G. J. 1961. “The economics of information,” Journal of Political Economy 69(3): 213–25.CrossRefGoogle Scholar
Stigler, G. J. 1980. “An introduction to privacy in economics and politics,” Journal of Legal Studies 9(4): 623–44.Google Scholar
Sykes, C. J. 1999. The End of Privacy. New York: St. Martin’s Press.Google Scholar
Warren, S. D. and Brandeis, L. D. 1890. “The right to privacy,” Harvard Law Review, 4(5): 193220.CrossRefGoogle Scholar
Weiser, M. 1991. “The computer for the 21st century,” Scientific American 3: 94104.CrossRefGoogle Scholar
Westin, A. F. 1967. Privacy and Freedom. New York: Atheneum.Google Scholar
Westin, A. F. 2003. “Social and political dimensions of privacy,” Journal of Social Issues 59(2): 431–53.CrossRefGoogle Scholar
Wiegand, I. 2011. “Towards convergence? National counter-terrorism measures in Western Europe: A comparison of counter-terrorist legislation in France, Germany, Italy, the Netherlands, Spain, and the United Kingdom after 9/11,” unpublished Ph.D. thesis, Bremen International Graduate School of Social Sciences, Bremen.Google Scholar
World Economic Forum 2011 . Personal Data: The Emergence of a New Asset Class. Geneva. retrieved from: www3.weforum.org/docs/WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf.Google Scholar
Zureik, E., Harling Stalker, L. L., Smith, E., Lyon, D. and Chan, Y. E. (eds.) 2010. Surveillance, Privacy, and the Globalization of Personal Information: International Comparisons. Montreal and Quebec: McGill-Queen’s University Press.CrossRefGoogle Scholar
Zwick, D. and Dholakia, N. 2001. “Contrasting European and American approaches to privacy in electronic markets: property right versus civil right,” Electronic Markets 11(2): 116–20.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×