{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:24:50Z","timestamp":1757543090243},"publisher-location":"Dordrecht","reference-count":20,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9781402069130"},{"type":"electronic","value":"9781402069147"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-1-4020-6914-7_13","type":"book-chapter","created":{"date-parts":[[2008,4,30]],"date-time":"2008-04-30T12:00:17Z","timestamp":1209556817000},"page":"241-270","source":"Crossref","is-referenced-by-count":25,"title":["Cogitas, Ergo Sum. The Role of Data Protection Law and Non-discrimination Law in Group Profiling in the Private Sector"],"prefix":"10.1007","author":[{"given":"Wim","family":"Schreurs","sequence":"first","affiliation":[]},{"given":"Mireille","family":"Hildebrandt","sequence":"additional","affiliation":[]},{"given":"Els","family":"Kindt","sequence":"additional","affiliation":[]},{"given":"Micha\u00ebl","family":"Vanfleteren","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Art.29 Data Protection Working Party, Opinion on the use of location data with a view to providing value-added services, 25 November 2005 (WP 115). Available at \n                  http:\/\/europa.eu.int\/comm\/justice_home\/fsj\/privacy\/workinggroup\/wpdocs\/2006_en.htm\n                  \n                ."},{"key":"13_CR2","unstructured":"Art.29 Data Protection Working Party, Opinion 5\/2004 on unsolicited communications for marketing purposes under Article 13 of Directive 2002\/58\/EC, 27 February 2004 (WP 90)."},{"key":"13_CR3","unstructured":"Borking, J., Artz, M., en Van Amelo, L., Gouden Bergen van gegevens. Over Datawarehousing, data mining en privacy, in Registratiekamer, Achtergrondstudies en Verkenningen 10, September 1998. Available at: \n                  http:\/\/www.cbpweb.nl\/documenten\/av_10_gouden_bergen_van_gegevens.stm?refer=true&theme=purple\n                  \n                ."},{"key":"13_CR4","first-page":"17","volume-title":"Computer Law & Security Report","author":"LA Bygrave","year":"2001","unstructured":"Bygrave, L. A., \u2018Minding the Machine: Article 15 of the EC Data Protection Directive and Automated Profiling\u2019, Computer Law & Security Report, Vol. 17, Elsevier, Neth., 2001, pp. 17\u201324."},{"key":"13_CR5","unstructured":"Bygrave, Lee A., Privacy Law & Policy Reporter, Vol. 7, HiTech Editing Pty Ltd., 2000, pp. 67\u201376."},{"key":"13_CR6","volume-title":"The Power of Knowledge","author":"B Custers","year":"2004","unstructured":"Custers B., The Power of Knowledge, Wolf Legal Publishers, Nijmegen, 2004."},{"key":"13_CR7","unstructured":"European Data Protection Supervisor (EDPS), \u2018Public access to documents and data protection\u2019, Background Paper Series July 2005 n\u00b01, Brussels, European Communities, 2005. Available at: \n                  www.edps.eu.int\/publications\/policy_papers\/Public_access_data_protection_EN.pdf\n                  \n                ."},{"key":"13_CR8","unstructured":"European Commission, First report on the implementation of the Data Protection Directive (95\/46\/EC), 15 May 2003, pp. 10\u201311. Available at: \n                  http:\/\/europa.eu.int\/comm\/justice_home\/fsj\/privacy\/lawreport\/index_en.htm\n                  \n                ."},{"key":"13_CR9","volume-title":"Discrimination Law","author":"S Fredman","year":"2002","unstructured":"Fredman, S., Discrimination Law, Oxford University Press, Oxford, 2002."},{"key":"13_CR10","unstructured":"Gutwirth, S., Privacy and the Information Age, Rowman & Littlefield Publishers Inc, 2002."},{"key":"13_CR11","unstructured":"Hildebrandt, M., Gutwirth, S., (Eds), Implications of profiling practices on democracy and rule of law, FIDIS Deliverable 7.4, European Union IST FIDIS Project, Brussels, 2005. Available at: \n                  www.fidis.net\n                  \n                ."},{"key":"13_CR12","unstructured":"Hildebrandt, M., Backhouse, J. (Eds), Descriptive analysis and inventory of profiling practices, FIDIS Deliverable 7.2, European Union IST FIDIS Project, Brussels, 2005. Available at: \n                  www.fidis.net\n                  \n                ."},{"key":"13_CR13","unstructured":"Hosein, I., \u2018Researching the Ethics of Knowledge Management: The Case of Data Mining\u2019, in Department of Information Systems. London School of Economics and Political Science, Working Paper Series 135, 5 October 2005. Available at: \n                  http:\/\/is2.lse.ac.uk\/wp\/pdf\/WP135.PDF\n                  \n                ."},{"key":"13_CR14","unstructured":"Koops, B.J., \u2018Reply\u2019 in Hildebrandt, M., Gutwirth, S., (Eds.), Implications of profiling practices on democracy and rule of law, FIDIS Deliverable 7.4, European Union IST FIDIS Project, Brussels 2005. Available at: \n                  http:\/\/www.fidis.net\n                  \n                \/."},{"key":"13_CR15","unstructured":"K\u00fcndig, A., Basis for IT Assessment. An overview of the underlying technologies, their applications and the implications for individuals, society and business, Swiss Centre for Technology Assessment, 2002. Available at: \n                  http:\/\/www.ta-swiss.ch\/www-remain\/reports_archive\/publications\/2002\/TA43_2002.pdf\n                  \n                ."},{"key":"13_CR16","unstructured":"Mallet-Poujol, N., \u2018Report: The place of the individual in a world of globalised information: rights and obligations\u2019 in European Conference on Data Protection on Council of Europe Convention 108 for the protection of individuals with regard to automatic processing of personal data: present and future (Proceedings), Warsaw, Council of Europe, 2001. Available at: \n                  http:\/\/www.coe.int\/t\/e\/legal_affairs\/legal_co-operation\/data_protection\/events\/conferences\/DP(2001)Proceedings_Warsaw_EN.pdf\n                  \n                ."},{"key":"13_CR17","unstructured":"Naylor, D., Ritter, C., \u2018B2C in Europe and Avoiding Contractual Liability: Why Businesses with European Operations Should Review their Customer Contracts Now\u2019, 15 September 2004. Available at: \n                  http:\/\/www.droit-technologie.org\/1_2.asp?actu_id=979&motcle=B2C&mode=motamot\n                  \n                ."},{"key":"13_CR18","volume-title":"Technopoly: The surrender of culture to technology","author":"N Postman","year":"1993","unstructured":"Postman, N., Technopoly: The surrender of culture to technology, Vintage Books, New York, 1993."},{"key":"13_CR19","unstructured":"T-zine (Tijdnet), \u2018No spam law cases in Belgium\u2019, 14 April 2006."},{"key":"13_CR20","unstructured":"Zwenne, G-J, Schermer, B., Privacy en andere juridische aspecten van RFID: unieke identificatie op afstand van producten en personen [Privacy and other legal aspects of RFID: unique identification from a distance of products and people], Elsevier Juridisch, \u2018s Gravenhage, 2005. Available at: \n                  http:\/\/www.nvvir.nl\/doc\/rfid-tekst.pdf\n                  \n                ."}],"container-title":["Profiling the European Citizen"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4020-6914-7_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:57:55Z","timestamp":1619672275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4020-6914-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9781402069130","9781402069147"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-1-4020-6914-7_13","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}