Abstract
As technologies to develop, conceptualisations of privacy have developed alongside them, from a “right to be let alone” to attempts to capture the complexity of privacy issues within frameworks that highlight the legal, social-psychological, economic or political concerns that technologies present. However, this reactive highlighting of concerns or intrusions does not provide an adequate framework though which to understand the ways in which privacy should be proactively protected. Rights to privacy, such as those enshrined in the European Charter of Fundamental Rights, require a forward-looking privacy framework that positively outlines the parameters of privacy in order to prevent intrusions, infringements and problems. This paper makes a contribution to a forward-looking privacy framework by examining the privacy impacts of six new and emerging technologies. It analyses the privacy issues that each of these technologies present and argues that there are seven different types of privacy. We also use this case study information to suggest that an imprecise conceptualisation of privacy may be necessary to maintain a fluidity that enables new dimensions of privacy to be identified, understood and addressed in order to effectively respond to rapid technological evolution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Samuel Warren and Louis D. Brandeis, “The Right to Privacy,” Harvard Law Review 4 (1890).
- 2.
Roger Clarke, “Introduction to Dataveillance and Information Privacy, and Definitions of Terms” (Xamax Consultancy, Aug 1997). http://www.rogerclarke.com/DV/Intro.html. Clarke identified these four categories even earlier, in his PhD Supplication in 1995. See http://www.rogerclarke.com/DV/PhD.html. He has variously referred to the four categories as categories, interests, dimensions, components and aspects. We use the term “types,” which Gary T. Marx also uses. See Gary T. Marx, “Privacy is not quite like the weather” in Privacy Impact Assessment, edited by David Wright and Paul De Hert (Dordrecht: Springer, 2012).
- 3.
Office of the Privacy Commissioner, Privacy Impact Assessment Guide, Sydney, NSW, August 2006, revised May 2010, p. iii. Information Commissioner’s Office (ICO), Privacy Impact Assessment Handbook, Wilmslow, Cheshire, UK, Version 2.0, June 2009, p. 14.
- 4.
See Daniel Solove, Understanding Privacy (Cambridge: Harvard University Press, 2008).
- 5.
David Lyon, Surveillance after September 11 (Cambridge: Polity Press, 2003).
- 6.
Serge Gutwirth, Privacy and the information age (Lanham, MD: Rowman & Littlefield, 2002), 30.
- 7.
Colin J. Bennett, Regulating Privacy: Data Protection and Public Policy in Europe and the United States (Ithaca NY: Cornell University Press, 1992).
- 8.
James Q. Whitman, “The Two Western Cultures of Privacy: Dignity Versus Liberty,” The Yale Law Journal 113 (2004): 1153–54.
- 9.
Solove, 12. Solove believes that privacy is not one thing, that there is no common dominator. We can agree with that – in so far as we have identified seven types of privacy. However, we believe that there is a common denominator and that common denominator is the ill-defined notion of privacy itself. While we agree with Gutwirth, Priscilla Regan and others who say that privacy has a social value, privacy at its core relates to the integrity and autonomy of the individual, so that when privacy is compromised – no matter what type of privacy – the individual is being harmed in some way.
- 10.
Debbie V. S. Kaspar, “The Evolution (or Devolution) of Privacy,” Sociological Forum 20 (2005): 72.
- 11.
Helen Nissenbaum, “Privacy as Contextual Integrity,” Washington Law Review 79:1 (2004), 101–139.
- 12.
Benjamin J. Goold, “Surveillance and the Political Value of Privacy,” Amsterdam Law Forum 1 (2009): 5.
- 13.
Christian Fuchs, “Towards an alternative concept of privacy,” Journal of Information, Communication and Ethics in Society 9 (2011): 232.
- 14.
Catharine A. MacKinnon, Feminism Unmodified: Discourses on Life and Law (Cambridge MA: Harvard University Press, 1987).
- 15.
The Supreme Court of Canada has stated that “society has come to realize that privacy is at the heart of liberty in a modern state.” R. v. Dyment (188), 55 D.L.R. (4th) 503 at 513 (S.C.C.). On the social value of privacy, see, for example, Priscilla M. Regan, Legislating Privacy: Technology, Social Values, and Public Policy, (Chapel Hill, University of North Carolina Press, 1995), 220–231; Alan Westin, “Social and Political Dimensions of Privacy,” Journal of Social Issues, 59: 2 (2003), 431–453; Valerie Steeves, “Reclaiming the social value of privacy,” in Ian Kerr, Valerie Steeves and Carole Lucock (eds.), Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society (Oxford University Press, 2009).
- 16.
Gutwirth, Privacy and the information age, 30.
- 17.
Solove, Understanding Privacy, 9.
- 18.
Daniel Solve, “‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy,” San Diego Law Review 44 (2007): 758.
- 19.
Kaspar, Evolution of Privacy, 76.
- 20.
Ibid.
- 21.
Roger Clarke, “Introduction to Dataveillance and Information Privacy, and Definitions of Terms,” Xamax Consultancy, Aug 1997. http://www.rogerclarke.com/DV/Intro.html.
- 22.
These seven types of privacy were first elaborated in an annex prepared for the PRESCIENT D1 report, available at http://www.prescient-project.eu/prescient/inhalte/download/PRESCIENT-D1---final.pdf.
- 23.
Emilio Mordini, “Whole Body Imaging at airport checkpoints: the ethical and political context,” in Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields, ed. René von Schomberg (Luxembourg: Publications Office of the European Union, 2011).
- 24.
Clarke, “Introduction to Dataveillance”.
- 25.
Helen Nissenbaum, Privacy in Context: Technology, Policy and the Integrity of Social Life (Stanford CA: Stanford University Press, 2010), 82.
- 26.
Clarke, “Introduction to Dataveillance”.
- 27.
Goold, “Surveillance and the Political Value of Privacy”.
- 28.
Dara Hallinan, Philip Schütz, and Michael Friedewald, “Neurodata-Based Devices and Data Protection” (paper presented at the 5th Bi-annual Surveillance and Society Conference, Sheffield, April 3–4, 2012).
- 29.
- 30.
- 31.
- 32.
Silvia Venier, “Global Mobility and Security,” Biometric Technology Today 5 (2009).
- 33.
European Commission, Consultation: The impact of the use of body scanners in the field of aviation security on human rights, privacy, personal dignity, health and data protection, Brussels, 19 February 2009.
- 34.
Demetrius Klitou, “Backscatter body scanners – A strip search by other means,” Computer Law & Security Report 24 (2008): 317.
- 35.
Electronic Privacy Information Center, “Transportation Agency’s Plan to X-Ray Travelers Should Be Stripped of Funding,” last modified June 2005, http://epic.org/privacy/surveillance/spotlight/0605/.
- 36.
American Civil Liberties Union, “The ACLU’s view on body scanners,” last modified 15 March 2002, http://www.aclu.org/technology-and-liberty/body-scanners.
- 37.
Department for Transport, Impact Assessment on the use of security scanners at UK airports, last modified 29 March 2001. http://webarchive.nationalarchives.gov.uk/+/http://www.dft.gov.uk/consultations/open/2010-23/.
- 38.
Ki Mae Heussner, “Air Security: Could Technology Have Stopped Christmas Attack?,” ABC News, 29 December 2009. http://abcnews.go.com/Technology/AheadoftheCurve/air%2Dsecurity%2Dtechnology%2Dstopped%2Dxmas%2Dattack/story%3Fid=9436877.
- 39.
Kim Zetter, “Airport Scanners Can Store, Transmit Images,” Wired News, 11 January 2010. http://www.wired.com/threatlevel/2010/01/airport-scanners/.
- 40.
Philip Rucker, “US airports say seeing is believing as passengers face body-scan drill,” Sydney Morning Herald 5 January 2010. http://www.smh.com.au/travel/travel-news/us-airports-say-seeing-is-believing-as-passengers-face-bodyscan-drill-20100104-lq6o.html.
- 41.
EPIC, “Transportation Agency’s Plan to X-Ray Travelers Should Be Stripped of Funding”.
- 42.
Privacy International, “PI statement on proposed deployments of body scanners in airports,” last modified 31 December 2009. https://www.privacyinternational.org/article/pi-statement-proposed-deployments-body-scanners-airports.
- 43.
European Economic and Social Committee, Opinion of the European Economic and Social Committee on the Communication from the Commission to the European Parliament and the Council on the Use of Security Scanners at EU airports, COM(2010) 311 final, Brussels, 16 February 2011, 4.
- 44.
Even if the images are anonymised, this would not legitimate the circulation of such images. Circulation of such images without the authorisation of the person whose image was captured would be either illegal or morally repugnant or both.
- 45.
The Guardian, “Oyster data use rises in crime clampdown,” 13 March 2006. http://www.guardian.co.uk/technology/2006/mar/13/news.freedomofinformation and Octopus Holdings Limited, “Customer Data Protection”.
- 46.
Marc Langheinrich, “A survey of RFID privacy approaches,” Personal and Ubiquitous Computing 13 (2009): 414.
- 47.
Faraday cages are a metallic shielding embedded in the passport cover and designed to protect it from electronic eavesdropping.
- 48.
Faraday cages do not prevent eavesdropping on legitimate conversations between readers and tags, and basic access codes could enable counterfeiting, since a forger could splice together a valid electronic signature with false identity information and biometric components.
- 49.
Raphael Gellert and Serge Gutwirth, “Privacy, data protection and policy issues in RFID enabled e-passports,” in Privacy, data protection and ethical issues in new and emerging technologies: Five case studies, eds. Rachel Finn and David Wright (PRESCIENT consortium, 25 November 2011).
- 50.
Marc van Lieshout, et al., RFID Technologies: Emerging Issues, Challenges and Policy Options, Office for Official Publications of the European Communities, Luxembourg, 2007, 197.
- 51.
Lara Srivastava, “Radio frequency identification: ubiquity for humanity,” info 9 (2007).
- 52.
Langheinrich, “RFID privacy approaches”.
- 53.
A. Juels, D. Molnar and D. Wagner, “Security and Privacy Issues in E-passports,” in Proceedings of IEEE/Create-net SecureComm 2005, (Los Angeles CA: IEEE Computer Society Press, 2005), 79.
- 54.
Organisation for Economic Co-operation and Development, “RFID Guidance and Reports,” OECD Digital Economy Papers 152 (Paris: OECD publishing, 2008), 42.
- 55.
Steve Bloomfield, “How an Oyster Card can Ruin your Marriage,” The Independent on Sunday, 19 February 2006. http://www.independent.co.uk/news/uk/home-news/how-an-oyster-card-could-ruin-your-marriage-467077.html.
- 56.
Octopus Holdings Limited, “Customer Data Protection,” 2009.
- 57.
Rachel L. Finn and David Wright, “Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications,” Computer Law & Security Review 28:2 (2012).
- 58.
Paul McBride, “Beyond Orwell: The Application of Unmanned Aircraft Systems in Domestic Surveillance Operations,” Journal of Air Law and Commerce 74 (2009): 659.
- 59.
European Commission, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), COM(2012) 11 final, Brussels, 25 January 2012.
- 60.
McBride, “Beyond Orwell,” 661.
- 61.
Nature Biotechnology, “DNA confidential,” Editorial, 27 (2009): 777.
- 62.
Piret Kukk, Bärbel Hüsing and Michael Friedewald, “Privacy, data protection and policy issues in next generation DNA sequencing technologies,” Privacy, data protection and ethical issues in new and emerging technologies: Five case studies, eds. Rachel Finn and David Wright (PRESCIENT consortium, 25 November 2011).
- 63.
Dorothy Nelkin and Lori Andrews, “DNA identification and surveillance creep,” Sociology of Health & Illness 21 (1999).
- 64.
Gary T. Marx, “Soft Surveillance: The Growth of Mandatory Volunteerism in Collecting Personal Information – ‘Hey Buddy Can You Spare a DNA?’,” in Surveillance and Security: Technological Politics and Power in Everyday Life, ed. T. Monahan (London: Routledge, 2006).
- 65.
Kukk et al., “Next-generation DNA sequencing”.
- 66.
L. Curren, et al., “Identifiability, genomics and UK data protection law,” European Journal of Health Law 17 (2010).
- 67.
J.E. Lunshof et al., “From genetic privacy to open consent,” Nature Reviews Genetics 9 (2008).
- 68.
Wikipedia defines Low Copy Number (LCN) as a DNA profiling technique developed by the Forensic Science Service (FSS) and in use in some countries since 1999.
- 69.
Rebecca Fowler, “Coded Revelations: DNA the second revolution,” The Observer, 27 April 2003.
- 70.
Alan Hall, “Woman serial killer was a just phantom, German police admit,” The Telegraph, 26 March 2009. http://www.telegraph.co.uk/news/worldnews/europe/germany/5056339/Woman-serial-killer-was-a-just-phantom-German-police-admit.html.
- 71.
Dustin Hays and DNA Policy Centre, “DNA, Forensics, and the Law,” last modified 2008.http://www.dnapolicy.org/policy.issue.php%3Faction=detail%26;issuebrief_id=42.
- 72.
Philip Schütz and Michael Friedewald, “Technologies for Human Enhancement and their impact on privacy,” in Privacy, data protection and ethical issues in new and emerging technologies: Five case studies, eds. Rachel Finn and David Wright (PRESCIENT consortium, 25 November 2011).
- 73.
Anton Nijholt, “BCI for Games: A ‘State of the Art’ Survey,” in Entertainment Computing – ICEC 2008, eds. Scott M. Stevens and Shirley J. Saldamarco (Berlin: Springer, 2009), 225.
- 74.
Schütz and Friedewald, “Technologies for Human Enhancement and their impact on privacy”.
- 75.
Dennis J. McFarland and Jonathan R. Wolpaw, “Brain-computer interfaces for communication and control,” Communications of the ACM 54 (2011): 63.
- 76.
Adam Kepecs, “Neuroscience: My brain made me do it,” Nature 473 (2011).
- 77.
Ira van Keulen and Mirjam Schuijff, “Engineering of The Brain: Neuromodulation and Regulation,” in Making Perfect Life: Bioengineering in the 21 st Century, eds. Rinie van Est and Dirk Stemerding (Brussels: European Technology Assessment Group, June 2011).
- 78.
Ian Sample, “Mind-reading program translates brain activity into words,” The Guardian, 31 January 2012. http://www.guardian.co.uk/science/2012/jan/31/mind-reading-program-brain-words.
- 79.
Medical Device Security Center, “Medical Device Security Center,” last modified 2011. http://secure-medicine.org/.
- 80.
Martha J. Farah, “Neuroethics: The practical and the philosophical,” Trends in Cognitive Sciences 9 (2005): 34.
- 81.
Silvia Venier and Emilio Mordini, “Second-generation biometrics,” in Privacy, data protection and ethical issues in new and emerging technologies: Five case studies, eds. Rachel Finn and David Wright (PRESCIENT consortium, 25 November 2011).
- 82.
Venier and Mordini, “Second-generation biometrics”.
- 83.
Ibid.
- 84.
Harvard Magazine, “Where Decisionmaking is Measured,” 12 December 2008. http://harvardmagazine.com/breaking-news/where-decisionmaking-is-measured.
- 85.
As mentioned early on in this article, Clarke labelled privacy of personal data and privacy of personal communications as “information privacy”.
- 86.
We do not mean to suggest that the newer the technology, the broader the risks to these different dimensions of privacy. Each new technology must be assessed to determine whether it has impacts on privacy and, if so, which types of privacy. It does not follow that new technologies necessarily pose greater risks to privacy than older technologies, but it is certainly true, as we have demonstrated, that some new technologies have exposed types of privacy not heretofore considered and that as technologies become more complex, the more likely it is that the risks will also be more complex.
- 87.
We draw support in this conclusion from Gutwirth, Privacy and the information age pp. 33–34, who discusses the undesirability of defining privacy from a legal perspective.
- 88.
Privacy should not be narrowly defined, nor should information privacy (of communication and personal data protection) be regarded as all there is to privacy. Clarke speaks of a “serious debasement of the term ‘privacy’ [which] has occurred in the case of U.S. and Australian statutes that have equated it with the highly restrictive idea of ‘data protection’. That notion derives from the ‘fair information practices’ movement that has been used by corporations and governments since the late 1960s to avoid meaningful regulation.” Roger Clarke, “What’s ‘privacy’?,” Xamax Consultancy, 2006. http://www.rogerclarke.com/DV/Privacy.html.
References
American Civil Liberties Union. The ACLU’s view on body scanners. http://www.aclu.org/technology%2Dand%2Dliberty/body%2Dscanners. Last modified 15 Mar 2002.
Bennett, Colin J. 1992. Regulating privacy: Data protection and public policy in Europe and the United States. Ithaca: Cornell University Press.
Bloomfield, Steve. 2006. How an oyster card can ruin your marriage. The Independent on Sunday, 19 Feb 2006. http://www.independent.co.uk/news/uk/home-news/how-an-oyster-card-could-ruin-your-marriage-467077.html.
Clarke, Roger. 2006. What’s ‘Privacy’?. Australian Law Reform Commission Workshop. http://www.rogerclarke.com/DV/Privacy.html. 28 July 2006.
Clarke, Roger. Aug 1997. Introduction to dataveillance and information privacy, and definitions of terms. Canberra: Xamax Consultancy. http://www.rogerclarke.com/DV/Intro.html.
Curren, L., P. Boddington, H. Gowans, N. Hawkins, N. Kanellopoulou, J. Kaye, and K. Melham. 2010. Identifiability, genomics and UK data protection law. European Journal of Health Law 17: 329–344.
Department for Transport. 2001. Impact assessment on the use of security scanners at UK airports. http://webarchive.nationalarchives.gov.uk/%2B%2F http://www.dft.gov.uk/consultations/open/2010%2D23%2F. 29 Mar 2001.
Electronic Privacy Information Center (EPIC). Transportation agency’s plan to X-ray travelers should be stripped of funding. Last modified June 2005. http://epic.org/privacy/surveillance/spotlight/0605.
European Commission. Consultation: The impact of the use of body scanners in the field of aviation security on human rights, privacy, personal dignity, health and data protection. Brussels, 19 Feb 2009. http://ec.europa.eu/transport/air/consultations/2009_02_19_body_scanners_en.htm.
European Commission, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), COM(2012) 11 final, Brussels, 25 January 2012.
European Economic and Social Committee. 2010. Opinion of the European Economic and Social Committee on the Communication from the Commission to the European Parliament and the Council on the Use of Security Scanners at EU airports. COM 311 final, Brussels, 16 Feb 2011.
Farah, Martha J. 2005. Neuroethics: The practical and the philosophical. Trends in Cognitive Sciences 9: 34–40.
Finn, Rachel L., and David Wright. 2012. Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications. Computer Law & Security Review 28(2): 184–194.
Fowler, Rebecca. 2003. Coded revelations: DNA the second revolution. The Observer, 27 Apr 2003.
Fuchs, Christian. 2011. Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society 9: 220–237.
Gellert Raphael, and Serge Gutwirth. 2011. Privacy, data protection and policy issues in RFID enabled e-passports. In Privacy, data protection and ethical issues in new and emerging technologies: Five case studies PRESCIENT Deliverable 2, ed. Rachel Finn and David Wright, 31–59. Report prepared by the PRESCIENT consortium for the European Commission’s Directorate-General Research, 25 Nov 2011.
Goold, Benjamin J. 2009. Surveillance and the political value of privacy. Amsterdam Law Forum 1: 3–6.
The Guardian, Oyster data use rises in crime clampdown. 13 Mar 2006. http://www.guardian.co.uk/technology/2006/mar/13/news.freedomofinformation.
Gutwirth, Serge. 2002. Privacy and the information age. Lanham: Rowman & Littlefield.
Hall, Alan. 2009. Woman serial killer was just a phantom: German police admit. The Telegraph, 26 Mar 2009. http://www.telegraph.co.uk/news/worldnews/europe/germany/5056339/Woman-serial-killer-was-a-just-phantom-German-police-admit.html.
Hallinan, Dara, Philip Schütz, and Michael Friedewald, “Neurodata-Based Devices and Data Protection”. Paper presented at the 5th Bi-annual Surveillance and Society Conference, Sheffield, 3–4 April 2012
Harvard Magazine, Where decisionmaking is measured. 12 Dec 2008. http://harvardmagazine.com/breaking-news/where-decisionmaking-is-measured.
Hays, Dustin, and DNA Policy Centre. 2007. DNA, Forensics, and the Law. Last modified 2008. http://www.dnapolicy.org/policy.issue.php%3Faction=detail%26;issuebrief_id=42.
Heussner, Ki Mae. 2009. Air security: Could technology have stopped Christmas attack? ABC News, 29 Dec 2009. http://abcnews.go.com/Technology/AheadoftheCurve/air-security-technology-stopped-xmas-attack/story?id=9436877.
Information Commissioner’s Office (ICO), Privacy Impact Assessment Handbook, Wilmslow, Cheshire, UK, Version 2.0, June 2009
Juels, A., D. Molnar, and D. Wagner. 2005. Security and privacy issues in E-passports. In Proceedings of IEEE/Create-net SecureComm 2005, 74–88. Los Angeles: IEEE Computer Society Press.
Kaspar, Debbie V.S. 2005. The evolution (or devolution) of privacy. Sociological Forum 20: 69–92.
Kepecs, Adam. 2011. Neuroscience: My brain made me do it. Nature 473: 280–281. Accessed 2 Mar 2012. http://www.nature.com/doifinder/10.1038/473280a.
Klitou, Demetrius. 2008. Backscatter body scanners – A strip search by other means. Computer Law & Security Report 24: 316–325.
Kukk, Piret, Bärbel Hüsing and Michael Friedewald. 2011. Privacy, data protection and policy issues in next generation DNA sequencing technologies. In Privacy, data protection and ethical issues in new and emerging technologies: Five case studies PRESCIENT Deliverable 2, ed. Rachel Finn and David Wright, 143–174. Report prepared by the PRESCIENT consortium for the European Commission’s Directorate-General Research, 25 Nov 2011.
Langheinrich, Marc. 2009. A survey of RFID privacy approaches. Personal and Ubiquitous Computing 13: 413–421.
Lunshof, J.E., R. Chadwick, D.B. Vorhaus, and G.M. Church. 2008. From genetic privacy to open consent. Nature Reviews Genetics 9: 406–411.
Lyon, David. 2003. Surveillance after September 11. Cambridge: Polity Press.
MacKinnon, Catharine A. 1987. Feminism unmodified: Discourses on life and law. Cambridge, MA: Harvard University Press.
Marx, Gary T. 2006. Soft surveillance: The growth of mandatory volunteerism in collecting personal information – ‘Hey buddy can you spare a DNA?’. In Surveillance and security: Technological politics and power in everyday life, ed. Torin Monahan, 37–56. London: Routledge.
Marx, Gary T. 2012. Privacy is not quite like the weather. In Privacy impact assessment, ed. David Wright and Paul De Hert. Dordrecht: Springer.
McBride, Paul. 2009. Beyond Orwell: The application of unmanned aircraft systems in domestic surveillance operations. Journal of Air Law and Commerce 74: 627–662.
McFarland, Dennis J., and Jonathan R. Wolpaw. 2011. Brain-computer interfaces for communication and control. Communications of the ACM 54: 60–66.
Medical Device Security Center. 2011. Medical Device Security Center. http://secure-medicine.org/.
Mordini, Emilio. 2011. Whole body imaging at airport checkpoints: The ethical and political context. In Towards responsible research and innovation in the information and communication technologies and security technologies fields, ed. René von Schomberg, 165–209. Luxembourg: Publications Office of the European Union.
Nature Biotechnology. 2009. DNA confidential. Editorial 27: 777.
Nelkin, Dorothy, and Lori Andrews. 1999. DNA identification and surveillance creep. Sociology of Health & Illness 21: 689–706.
Nijholt, Anton. 2009. BCI for games: A ‘State of the Art’ survey. In Entertainment computing – ICEC 2008, ed. Scott M. Stevens and Shirley J. Saldamarco, 225–228. Berlin: Springer.
Nissenbaum, Helen. 2004. Privacy as contextual integrity. Washington Law Review 79(1): 101–139.
Nissenbaum, Helen. 2010. Privacy in context: Technology, policy and the integrity of social life. Stanford: Stanford University Press.
Octopus Holdings Limited. Customer Data Protection. Last updated 2009.
Office of the Privacy Commissioner, Privacy Impact Assessment Guide, Sydney, NSW, August 2006, revised May 2010
Organisation for Economic Co-operation and Development. 2008. RFID guidance and reports. OECD Digital Economy Papers, 152. Paris: OECD Publishing.
Privacy International. 2009. PI statement on proposed deployments of body scanners in airports. Last updated 31 Dec 2009. https://www.privacyinternational.org/article/pi-statement-proposed-deployments-body-scanners-airports.
Regan, Priscilla M. 1995. Legislating privacy: Technology, social values, and public policy, Chapel Hill: University of North Carolina Press.
Rucker, Philip. 2010. US airports say seeing is believing as passengers face body-scan drill. Sydney Morning Herald, 5 Jan 2010. http://www.smh.com.au/travel/travel-news/us-airports-say-seeing-is-believing-as-passengers-face-bodyscan-drill-20100104-lq6o.html.
Sample, Ian. 2012. Mind-reading program translates brain activity into words. The Guardian, 31 Jan 2012. http://www.guardian.co.uk/science/2012/jan/31/mind-reading-program-brain-words.
Schütz, Philip, and Michael Friedewald. 2011. Technologies for human enhancement and their impact on privacy. In Privacy, data protection and ethical issues in new and emerging technologies: Five case studies PRESCIENT Deliverable 2, ed. Rachel Finn and David Wright, 175–198. Report prepared by the PRESCIENT consortium for the European Commission’s Directorate-General Research, 25 Nov 2011.
Solove, Daniel J. 2008. Understanding privacy. Cambridge, MA: Harvard University Press.
Solve, Daniel. 2007. ‘I’ve got nothing to hide’ and other misunderstandings of privacy. San Diego Law Review 44: 745–772.
Srivastava, Lara. 2007. Radio frequency identification: Ubiquity for humanity. Info 9: 4–14.
Steeves, Valerie. 2009. Reclaiming the social value of privacy. In Lessons from the identity trail: Anonymity, privacy and identity in a networked society, ed. Ian Kerr, Valerie Steeves, and Carole Lucock. Oxford: Oxford University Press.
Supreme Court of Canada, R. v. Dyment (188), 55 D.L.R. (4th) 503 at 513 (S.C.C.).
van Keulen, Ira, and Mirjam Schuijff. 2011. Engineering of the brain: Neuromodulation and regulation. In Making perfect life: Bioengineering in the 21st century, ed. Rinie van Est and Dirk Stemerding, 68–116. European Technology Assessment Group, June 2011.
van Lieshout, Marc, Luigi Grossi, Graziella Spinelli, Sandra Helmus, Linda Kool, Leo Pennings, Roel Stap, Thijs Veugen, Bram van der Waaij, and Claudio Borean. 2007. RFID technologies: Emerging issues, challenges and policy options. Luxembourg: Office for Official Publications of the European Communities.
Venier, Silvia. 2010. Global mobility and security. Biometric Technology Today 5: 7–10.
Venier, Silvia and Emilio Mordini. 2011. Second-generation biometrics. In Privacy, data protection and ethical issues in new and emerging technologies: Five case studies PRESCIENT Deliverable 2, ed. Rachel Finn and David Wright, 111–142. Report prepared by the PRESCIENT consortium for the European Commission’s Directorate-General Research, 25 Nov 2011.
Warren, Samuel, and Louis D. Brandeis. 1890. The right to privacy. Harvard Law Review 4: 193–220.
Westin, Alan. 2003. Social and political dimensions of privacy. Journal of Social Issues 59(2): 431–453.
Whitman, James Q. 2004. The two western cultures of privacy: Dignity versus liberty. The Yale Law Journal 113: 1151–1221.
Zetter, Kim. 2010. Airport scanners can store, transmit images. Wired News, 11 Jan 2010. http://www.wired.com/threatlevel/2010/01/airport-scanners/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Finn, R.L., Wright, D., Friedewald, M. (2013). Seven Types of Privacy. In: Gutwirth, S., Leenes, R., de Hert, P., Poullet, Y. (eds) European Data Protection: Coming of Age. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5170-5_1
Download citation
DOI: https://doi.org/10.1007/978-94-007-5170-5_1
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5184-2
Online ISBN: 978-94-007-5170-5
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)