1,352
Views
11
CrossRef citations to date
0
Altmetric
Original Articles

Privacy notices versus informational self-determination: Minding the gap

, &

References

  • Adjerid, I., A. Acquisti, L. Brandimarte, and G. Loewenstein. 2012. “Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency.” Paper presented at the Conference on Web Privacy Measurement, 2012, preliminary draft available at http://www.heinz.cmu.edu/~acquisti/papers/acquisti-sleights-privacy.pdf.
  • Albers, M. (2005). Informationelle Selbstbestimmung. Baden-Baden: Nomos-Verlag.
  • Alhadeff, J., B. Van Alsenoy, and J. Dumortier. (2012). “The accountability Principle in Data Protection Regulation: Origin, Development and Future Directions.” In Managing Privacy Through Accountability, edited by D. Guagnin, L. Hempel, C. Ilten, I. Kroener, D. Neyland and H. Postigo, 49–82. Basingstoke, UK: Palgrave Macmillan.
  • Baumer, D. L., J. B. Earp, and J. C. Poindexter. (2004). “Internet Privacy Law: A Comparison Between the United States and the European Union.” Computers & Security 23: 402. doi: 10.1016/j.cose.2003.11.001
  • Beales, J. H., and T. J. Muris. (2008). “Choice or consequences: protecting privacy in commercial information.” The University of Chicago Law Review 75 (1): 114–115.
  • Ben-Shahar, O., and C. E. Schneider. (2010). “The failure of mandated disclosure. University of Michigan Law School, Program in Law and Economics, 2010. Paper 9, 30 (‘When a [disclosure] mandate is stated broadly, disclosers might think that duty requires – or prudence demands – disclosing everything’.).
  • Bosker, B. (2012). “Google privacy policies get major revamp.” Huffington Post, 24 January 2012, available at http://www.huffingtonpost.com/2012/01/24/google-privacy-policies_n_1229470.html (last accessed 21 April 2013).
  • Boulanger, M.-H., C. De Terwangne, Th. Léonard, S. Louveaux, D. Moreau, and Y. Poullet. (1997). “La protection des données à caractère personnel en droit communautaire.” Journal des Tribunaux 127.
  • Brandeis, L. (1913). “What publicity can do.” Harper's Weekly, Dec. 20; reprinted in L.D. Brandeis. 1932. Other people's money and how the bankers use it, 92 (of which the full text is available at http://www.law.louisville.edu/library/collections/brandeis/node/191; last accessed 21 April 2013).
  • Brandimarte, L., A. Acquisti, and G. Loewenstein. (2010). “Misplaced confidences: Privacy and the control paradox. Ninth Annual Workshop on the Economics of Information Security (WEIS), June 7–8 2010.” Cambridge, MA: Harvard University Press. Available at http://www.futureofprivacy.org/wp-content/uploads/2010/07/Misplaced-Confidences-acquisti-FPF.pdf.
  • Brownsword, R. (2004). “The cult of consent: fixation and fallacy.” King's Law Journal 15: 223–251.
  • Brownsword, R. (2009). “Consent in data protection law: Privacy, fair processing and confidentiality.” In Reinventing data protection, edited by S. Gutwirth, Y. Poullet, P. De Hert, C. de Terwangne and S. Nouwt. Vol. 90. Dordrecht: Springer.
  • Bygrave, L. A. (2002). Data protection law. Approaching its rationale, logic and limits. Vol. 59. Den Haag: Kluwer International.
  • Bygrave, L. A., and D. W. Schartum. (2009). “Consent, proportionality and collective power.” In Reinventing data protection, edited by S. Gutwirth, Y. Poullet, P. De Hert, C. de Terwangne and S. Nouwt. Vol. 165. Dordrecht: Springer.
  • Calo, R. (2012). “Against notice skepticism in privacy (and elsewhere).” Notre Dame Law Review 87, 1051–1052.
  • Cate, F. H., and Mayer-Schönberger V. (2012). “Notice and consent in a world of big data. Microsoft global privacy summit summary report and outcomes.” 2, available at http://www.microsoft.com/en-us/download/details.aspx?id=35596 (last accessed 21 April 2013).
  • Dawes, S. (2010). “Stewardship and usefulness: Policy principles for information-based transparency.” Government Information Quarterly 27: 377–378. doi: 10.1016/j.giq.2010.07.001
  • De Bot, D. (2001). Verwerking van Persoonsgegevens. Vol. 115. Antwerpen: Kluwer.
  • Dumortier, J. 2011. Online privacy: reflections on the regulatory aspects. In Online privacy: Towards informational self-determination on the internet, eds. S. Fischer-Hübner, C. Hoofnagle, K. Rannenberg, M. Waidner, I. Krontiris and M. Marhöfer. Dagstuhl Reports, 2011. Vol. 1, Issue 2, 8, available at http://drops.dagstuhl.de/opus/volltexte/2011/3151/pdf/dagrep_v001_i002_p001_s11061.pdf (last accessed 21 April 2013).
  • Edwards, L., and I. Brown. (2009). “Data control and social networking: Irreconcilable ideas?.” In Harboring data, edited by A. Matwyshyn, 202–227. Stanford, CA: Stanford University Press. (Author's version available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1148732, last accessed on 21 April 2013).
  • Flaherty, D. H. (1989). Protecting privacy in surveillance societies – The Federal Republic of Germany, Sweden, France, Canada and the United States. part 1: The Federal Republic of Germany, esp. 77–83. Chapel Hill and London: The University of North Carolina Press.
  • Federal Trade Commission (FTC). 2012. “Protecting consumer privacy in an era of rapid change – Recommendations for businesses and policymakers.” FTC Report, March 2012. Available at http://www.ftc.gov/opa/2012/03/privacyframework.shtm (last accessed 30 June 2012).
  • Grimmelmann, J. (2009). “Saving Facebook.” Iowa Law Review 94: 1182.
  • Gutwirth, S., and P. De Hert. (2008). “Regulating profiling in a democratic constitutional state.” In Profiling the European citizen – cross-disciplinary perspectives, edited by M. Hildebrandt, and S. Gutwirth. Vol. 448. Dordrecht: Springer.
  • Hildebrandt, M. (2009). “Who is profiling who? Invisible visibility.” In Reinventing data protection, edited by S. Gutwirth, Y. Poullet, P. De Hert, C. de Terwangne and S. Nouwt. Vol. 242. Dordrecht: Springer.
  • Hildebrandt, M., and B.-J. Koops. (2010). “The challenges of ambient law and legal protection in the profiling era.” The Modern Law Review 439.
  • Hill, K. (2012). “Facebook privacy policy change paves way for off-Facebook advertising.” Forbes, 11 May 2012, available at http://www.forbes.com/sites/kashmirhill/2012/05/11/facebook-privacy-policy-change-paves-way-for-off-facebook-advertising (last accessed 21 April 2013).
  • Hood, C. (2007). “What happens transparency meets blame-avoidance.” Public Management Review 9 no. 2: 194 et seq. doi: 10.1080/14719030701340275
  • Jensen, C., C. Potts, and C. Jensen. (2005). “Privacy practices of Internet users: Self-reports versus observed behavior.” International Journal of Human-Computer Studies 63: 215. doi: 10.1016/j.ijhcs.2005.04.019
  • Korff, D. (2010). “Comparative study on different approaches to new privacy challenges, in particular in the light of technological developments: Country Study A.4 – Germany. 33, available online at http://ec.europa.eu/justice/policies/privacy/docs/studies/new_privacy_challenges/final_report_country_report_A4_germany.pdf (last accessed on 23 March 2011).
  • Kosta, E. (2013). Consent in European data protection law. Martinus Nijhoff.
  • Korff, D. (2010). “Comparative study on different approaches to new privacy challenges, in particular in the light of technological developments: Working Paper No.2: Data protection laws in the EU. The difficulties in meeting challenges posed by global social and technical developments. 69. Available online at http://ec.europa.eu/justice/policies/privacy/docs/studies/new_privacy_challenges/final_report_working_paper_2_en.pdf (last accessed on 21 April 2013).
  • Kuczerawy, A., and F. Coudert. (2011). “Privacy settings in social networking sites: Is it fair?.” In Privacy and identity management for life, edited by S. Fischer-Hübner et al., 6th IFIP AICT 352, 5.
  • Léonard, T., and Y. Poullet. (1999). “La protection des données à caractère personnel en pleine (r)évolution - La loi du 11 décembre 1998 transposant la directive 95/46/C.E. du 24 octobre 1995.” Journal des Tribunaux 385.
  • McDonald, A., and L. F. Cranor. (2008). “The cost of reading privacy policies.” I/S: A Journal of Law and Policy for the Information Society. 4 (Privacy Year in Review issue) available online at http://www.aleecia.com/authors-drafts/readingPolicyCost-AV.pdf (last accessed on 21 April 2013).
  • Mayer-Schönberger, V. (1997). “Generational development of data protection in Europe.” In Technology and privacy: The new landscape, edited by P. Agre and M. Rotenberg, 219 et seq. Cambridge, MA: The MIT Press.
  • Meijer, A. (2009). “Understanding modern transparency.” International Review of Administrative Sciences 75 (2): 262. doi: 10.1177/0020852309104175
  • Rauhofer, J. (2008). “Privacy is dead, get over it! Information privacy and the dream of risk-free society.” Information & Communications Technology Law 17: 187. doi: 10.1080/13600830802472990
  • Riedel, E. (1984). “New bearings in German data protection – Census Act 1983 partially unconstitutional.” Human Rights Law Journal 27.
  • Robinson, N., H. Graux, M. Botterman, and L. Valeri. (2009). “Review of the European Data Protection Directive (RAND - Technical Report), prepared for the UK Information Commissioner's Office. 28, available online at http://www.ico.gov.uk/upload/documents/library/data_protection/detailed_specialist_guides/review_of_eu_dp_directive.pdf (last accessed on 21 April 2013).
  • Rouvroy, A., and Y. Poullet. (2009). “The right to informational self-determination and the value of self-development: reassessing the importance of privacy for democracy.” In Reinventing data protection, edited by S. Gutwirth, Y. Poullet, P. De Hert, C. de Terwangne and S. Nouwt, Dordrecht: Springer (‘Data protection regimes were thus designed […] in order to better balance “informational power”’).
  • Schwartz, P. M. (2000). “Internet privacy and the state.” Connecticut Law Review 821.
  • Simitis, S. (1984). “Die informationelle Selbstbestimmung, Grundbedingung einer verfassungskonformen Informationsordnung.” Neue Juristische Wochenschrift 398–405.
  • Simitis, S. (1987). “Reviewing privacy in an information society.” University of Pennsylvania Law Review 135. doi: 10.2307/3312079
  • Simitis, S., ed. (2003). Kommentar zum Bundesdatenschutzgesetz, 5th ed, Section 4, para. 2. Baden-Baden: Nomos Verlagsgesellschaft.
  • Simon, H. A. (1982). Models of bounded rationality. Cambridge: MIT Press.
  • Stutzman, F., and A. Acquisti. (2011). “Behavioural aspects.” In Deliverable 2.1 state of the art. Security and privacy in online social networks(‘SPION’), ed. S. Gürses, 28. IWT funded Belgian project. 30 September 2011.
  • Tene, O., and J. Polonetsky. (2012). “To track or ‘do not track’: Advancing transparency and individual control in online behavioral advertising.” Minnesota Journal of Law, Science & Technology 13 (1): 335–338.
  • Van Alsenoy, B. (2012). “Allocating responsibility among controllers, processors, and ‘everything in between’: The definition of actors and roles in Directive 95/46/EC.” Computer, Law & Security Review 28: 25–43. doi: 10.1016/j.clsr.2011.11.006
  • Van Alsenoy, B., E. Kindt, and J. Dumortier. (2011). “Privacy and data protection aspects of e-government identity management.” In Innovating government. Normative, policy and technological dimensions of modern government, edited by S. Van der Hof and M.M. Groothuis. Information Technology and Law Series, Volume 20, 261. The Hague, the Netherlands: T. M. C. Asser Press.
  • Van den Berg, B., and S. van der Hof. (2012). “What happens to my data? A novel approach to informing users of data processing practices.” First Monday 17 (7) July 2012, available online at http://journals.uic.edu/ojs/index.php/fm/article/view/4010/3274 doi: 10.5210/fm.v17i7.4010
  • van der Hof, S., and B. van den Berg. 2011. Deliverable 2.2: ‘Social requirements and implications’. EU FP7 ENDORSE project (Legal Technical Framework for Privacy Preserving Data Management).
  • Van Eecke, P., and M. Truyens, eds. (2009). “The future of online privacy and data protection.” In EU study on the legal analysis of a single market for the information society – New rules for a new age?, edited by P. Van Eecke and M. Truyens. DLA Piper. November 2009, 42 available at http://ec.europa.eu/information_society/newsroom/cf/itemlongdetail.cfm?item_id=7022 (last accessed on 2013).
  • Vogelsang, K. (1987). Grundrecht auf informationelle Selbstbestimmung?. Baden-Baden: Nomos Verlagsgesellschaft.
  • Zarsky, T.Z. 2004. Thinking outside the box: considering transparency, anonymity and pseudonymity as overall solutions to the problems of information privacy in the internet society. University of Miami Law Review 58: 998.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.