489
Views
1
CrossRef citations to date
0
Altmetric
Articles

Do algorithms dream of ‘data’ without bodies?

Bibliography

  • Ackerman, B. 1980. Social Justice in the Liberal State. Yale: Yale University Press.
  • Acquisti, A. 2009. “Nudging Privacy: The Behavioral Economics of Personal Information.” IEEE Security and Privacy 7 (6): 82–85. doi: 10.1109/MSP.2009.163
  • Agre, P. 1994. “Surveillance and Capture: Two Models of Privacy.” The Information Society 10 (2): 101–127. doi: 10.1080/01972243.1994.9960162
  • Albrecht, J. P. 2016. “Regaining Control and Sovereignty in the Digital Age.” In Enforcing Privacy: Regulatory, Legal and Technological Approaches, edited by D. Wright and P. De Hert, 473–488. Dordrecht: Springer.
  • Article 29 Working Party. Opinion 4/2007 Opinion 4/2007 on the Concept of Personal Data.
  • Article 29 Working Party. Opinion 02/2013 on Apps on Smart Devices.
  • Article 29 Working Party. Opinion 03/2013 on Purpose Limitation.
  • Article 29 Working Party. Advice Paper on Essential Elements of a Definition and a Provision on Profiling within the EU General Data Protection Regulation.
  • Article 29 Working Party. Joint Statement of the European Data Protection Authorities Assembled in the Article 29 Working Party, WP227 2014.
  • Article 29 Working Party. Opinion 06/2014 on the Notion of Legitimate Interests of the Data Controller under Article 7 of Directive 95/46/EC.
  • Article 29 Working Party. Opinion 8/2014 on the Recent Developments on the Internet of Things.
  • Article 29 Working Party. Opinion 03/2016 on the Evaluation and Review of the e-Privacy Directive (2002/58/EC).
  • Balkin, J. 2012. “Room for Maneuver: Julie Cohen’s Theory of Freedom in the Information State.” Jerusalem Review of Legal Studies 6: 84–85. doi: 10.1093/jrls/jls010
  • Barocas, S., and A. Selbst. 2016. “Big Data’s Disparate Impact.” California Law Review 104 (3): 671–732.
  • Berry, D. 2011. “The Computational Turn: Thinking About the Digital Humanities.” Culture Machine 12: 1–22.
  • Borgesius, F. 2016. “Singling Out People Without Knowing their Names-behavioural Targeting, Pseudonymous Data, and the New Data Protection Regulation.” Computer Law & Security Review 32 (2): 256–271. doi: 10.1016/j.clsr.2015.12.013
  • Bowers, J., and Rodden, T. 1993. Exploding the Interface: Experiences of a CSCW Network. In Proceedings of the INTERACT ’93 and CHI ’93 Conference on Human Factors in Computing Systems (CHI ’93). ACM, New York, NY, USA, 255–262.
  • Boyd, D., and K. Crawford. 2012. “Critical Questions for Big Data.” Information, Communication & Society 15 (5): 662–679. doi: 10.1080/1369118X.2012.678878
  • Burrell, J. 2016. “How the Machine “Thinks”: Understanding Opacity in Machine Learning Algorithms.” Big Data & Society January–June 2016: 1–12.
  • Bygrave, L. 2002. Data Protection Law: Approaching its Rationale, Logic and Limits. Hague: Kluwer.
  • Bygrave, L. 2010. “The Body as Data? Biobank Regulation via the ‘Back Door’ of Data Protection Law.” Law, Innovation and Technology 2 (1): 1–25. doi: 10.5235/175799610791935443
  • Casper, S. 2013. “New-technology Clusters and Public Policy: Three Perspectives.” Social Science Information 52 (4): 628–652. doi: 10.1177/0539018413501236
  • Cohen, J. 2012. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven, CT: YUP.
  • Cohen, J. 2016. “Between Truth and Power.” In Freedom and Property of Information: The Philosophy of Law Meets the Philosophy of Technology, edited by M. Hildebrandt and B. van den Berg. Abingdon: Routledge.
  • Cohen, J. 2017. “Affording Fundamental Rights: A Provocation Inspired by Mireille Hildebrandt.” Critical Analysis of Law 4 (1): 1–22.
  • Commission. 2003. Report from the Commission – First Report on the Implementation of the Data Protection Directive (95/46/EC) COM (2003) 265 final.
  • Commission. 2015. A Digital Single Market Strategy for Europe. COM (2015) 0192 final.
  • Commission. 2016. Digitising European Industry: Reaping the full benefits of a Digital Single Market. COM (2016) 180 final.
  • Commission. 2017. Building A European Data Economy. COM (2017).
  • Copenhagen Economics. 2013. The Impact of Online Intermediaries on the EU Economy. Copenhagen.
  • Couldry, N., and A. Hepp. 2016. The Mediated Construction of Reality. Cambridge: Polity.
  • Elmer, G. 2004. Profiling Machines: Mapping the Personal Information Economy. Cambridge, MA: MIT.
  • EDPS. 2015. Opinion 4/2015 Towards a New Digital Ethics: Data, Dignity and Technology.
  • EDPS. 2016. Opinion 8/2016 EDPS Opinion on Coherent Enforcement of Fundamental Rights in the Age of Big Data.
  • Esposti, S. 2014. “When Big Data Meets Dataveillance: The Hidden Side of Analytics.” Surveillance & Society 12 (2): 209–225.
  • Evans, P., and A. Gawer. 2016. The Rise of the Platform Enterprise: A Global Survey. New York: Center for Global Enterprise. January.
  • Fourcade, M., and K. Healy. 2016. “Seeing Like a Market.” Socio-Economic Review 1–21.
  • Frawley, W., G. Piatetsky-Shapiro, and C. Matheus. 1992. “Knowledge Discovery in Databases: An Overview.” AI Magazine 13 (2): 57–70.
  • FTC Staff Report. 2015. Internet of Things: Privacy & Security in a Connected World. Washington: FTC.
  • Fuster, G. 2014. The Emergence of Personal Data Protection as a Fundamental Right of the EU. Berlin: Springer.
  • Gilmore, J. 2015. “Everywear: The Quantified Self and Wearable Fitness Technologies.” New Media & Society 18 (11): 2524–2539.
  • Hacking, I. 1986. “Making Up People.” In Reconstructing Individualism: Autonomy, Individuality, and the Self in Western Thought, edited by T. C. Heller, M. Sosna, and D. E. Wellbery. Redwood City, CA: Stanford UP.
  • Helmond, A. 2015. “The Platformization of the Web: Making Web Data Platform Ready.” Social Media+ Society 1 (2): 1–11.
  • Hildebrandt, M. 2008. “Profiling and the Rule of Law.” Identity in the Information Society 1 (1): 55–70. doi: 10.1007/s12394-008-0003-1
  • Hildebrandt, M. 2015. Smart Technologies and the End of Law: Novel Entanglements of Law and Technology. Cheltenham: Edward Elgar.
  • Hilts, A., C. Parsons, and J. Knockel. 2016. Every Step You Fake: A Comparative Analysis of Fitness Tracker Privacy and Security. https://openeffect.ca/reports/Every_Step_You_Fake.pdf.
  • Hustinx, P. 2014. EU Data Protection Law: The Review of Directive 95/46/EC and the Proposed General Data Protection Regulation. https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/Publications/Speeches/2014/14-09-15_Article_EUI_EN.pdf.
  • Katz, J. 2003. “Bodies, Machines and Communication Contexts: What is to Become of Us?” In Machines that Become Us: The Social Context of Personal Communication Technology, edited by J. Katz, 311–319. New Brunswick, NJ: Transaction.
  • Kotthoff, L. 2014. “Algorithm Selection for Combinatorial Search Problems: A Survey.” AI Magazine 35 (3): 48–60.
  • Kramer, A., J. Guillory, and J. Hancock. 2014. “Experimental Evidence of Massive Scale Emotional Contagion Through Social Networks.” Proceedings of the National Academy of Sciences 111 (24): 8788–8790. doi: 10.1073/pnas.1320040111
  • Langlois, G., and G. Elmer. 2013. “The Research Politics of Social Media Platforms.” Culture Machine 14: 1–17.
  • LIBE. 2015. Big Data and Smart Devices and their Impact on Privacy. Brussels: European Union. http://www.europarl.europa.eu/studies.
  • Lynskey, O. 2016. The Foundations of EU Data Protection Law. Oxford: OUP.
  • Mittelstadt, B. 2016. “Auditing for Transparency in Content Personalization Systems.” International Journal of Communication 10: 4991–5002.
  • Nagel, S., V. Hrincu, and P. Reiner. 2016. “Algorithm Anxiety – Do Decision-making Algorithms Pose a Threat to Autonomy?” In 2016 IEEE international symposium on ethics in engineering, science and technology. IEEE Ethics 1-7.
  • NDG (National Data Guardian). 2016. “Review of Data Security, Consent and Opt-Outs.” https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/535024/data-security-review.PDF.
  • Nissenbaum, H. 1999. “The Meaning of Anonymity in an Information Age.” The Information Society 15 (2): 141–144. doi: 10.1080/019722499128592
  • Nissenbaum, H. 2015. “‘Respect for Context’: Fulfilling the Promise of the White House Report.” In Privacy in the Modern Age: The Search for Solutions, edited by M. Rotenberg, J. Scott, J, and J. Horwitz, 152–164. New York: The New Press.
  • OECD. 1980. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. France: Paris.
  • O’Neill, C. 2016. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. New York: Crown Pub.
  • Papacharissi, Z. 2015. Affective Publics: Sentiment, Technology, and Politics. Oxford: Oxford UP.
  • Parisi, L. 2009. “Symbiotic Architecture: Prehending Digitality.” Theory, Culture and Society 26 (2–3): 346–374. doi: 10.1177/0263276409103121
  • Parisi, L. 2013. Contagious Architecture: Computation, Aesthetics, and Space. Cambridge, MA: MIT.
  • Raab, C. 1999. “From Balancing to Steering: New Directions for Data Protection.” In Visions of Privacy: Policy Choices for the Digital Age, edited by C. J. Bennett and R. Grant, 68–96. Toronto: University of Toronto Press.
  • Rouvroy, A. 2012. “The End(s) of Critique: Data-behaviourism vs. Due-process.” In Privacy, Due Process and the Computational Turn. Philosophers of Law Meet Philosophers of Technology, edited by M. Hildebrandt and E. De Vries, 143–168. Abingdon: Routledge.
  • Savirimuthu, J. 2016. “Networked Children, Commercial Profiling and The EU Data Protection Reform Agenda: In the Child’s Best Interests?” In The EU as a Children’s Rights Actor: Law, Policy and Structural Dimensions, edited by Iusmen and H. Stalford, 221–257. Opladen: Barbara Budrich.
  • Schermer, B. W., B. H. M. Custers, S. Van Der Hof. 2014. “The Crisis of Consent: How Stronger Legal Protection May Lead to Weaker Consent in Data Protection.” Ethics and Information Technology 16 (2): 171–182.
  • Solove, D. 2013. “Privacy Self-Management and the Consent Dilemma.” Harvard Law Review 126 (7): 1880–1903.
  • Sweeney, L. 2013. “Discrimination in Online Ad Delivery.” Communications of the ACM 56 (5): 44–54. doi: 10.1145/2447976.2447990
  • Tempini, N. 2015. “Governing Patientslikeme: Information Production and Research Through an Open, Distributed, and Data-based Social Media Network.” The Information Society 31 (2): 193–211. doi: 10.1080/01972243.2015.998108
  • Tufecki, Z. 2015. “Algorithmic Harms Beyond Facebook and Google: Emergent Challenges of Computational Agency.” Journal on Telecommunicaions and High Technology Law 13: 203–218.
  • Turow, J., L. McGuigan, and E. Maris. 2015. “Making Data Mining a Natural Part of Life: Physical Retailing, Customer Surveillance and the 21st Century Social Imaginary.” European Journal of Cultural Studies 18 (4–5): 464–478. doi: 10.1177/1367549415577390
  • Van Dijk, J. 2013. Culture of Connectivity: A Critical History of Social Media. Oxford: Oxford University Press.
  • Weiser, M. 1991. “The Computer of the 21st Century.” Scientific American 265: 94–104. doi: 10.1038/scientificamerican0991-94
  • Zins, C. 2007. “Conceptual Approaches for Defining Data, Information and Knowledge.” Journal of the American Society for Information Science and Technology 58 (4): 479–493. doi: 10.1002/asi.20508

Cases

  • Bodil Lindqvist C-101/01
  • Digital Rights Ireland Ltd v Minister for Communications, Marine and Natural Resources C-293/12
  • Google v Vidal-Hall [2015] 3 WLR 409
  • Google Spain SL and Google Inc. v Agencia Española de Protección de Datos (AEPD) and Mario Costeja González C-131/12
  • Maximillian Schrems v Data Protection Commissioner C-362/14
  • Promusicae C-275/06
  • Regina v. Chief Constable of South Yorkshire Police (Respondent) ex parte Marper (FC)(Appellant) Consolidated Appeals [2004] UKHL 39
  • S and Marper v UK [2008] ECHR 1581
  • Volker und Markus Schecke and Eifert C-92/09

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.