{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:30:16Z","timestamp":1743114616937,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":32,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048188642"},{"type":"electronic","value":"9789048188659"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-8865-9_14","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:12:18Z","timestamp":1280754738000},"page":"247-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Privacy in Europe from a TA Perspective"],"prefix":"10.1007","author":[{"given":"Walter","family":"Peissl","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,3]]},"reference":[{"key":"14_CR1","first-page":"61","volume-title":"Privacy: Ein Grundrecht mit Ablaufdatum? Interdisziplin\u00e4re Beitr\u00e4ge zur Grundrechtsdebatte","author":"C.J. Bennett","year":"2003","unstructured":"Bennett, C.J. 2003. Information privacy and \u201cDatenschutz\u201d: Global assumptions and international governance. In Privacy: Ein Grundrecht mit Ablaufdatum? Interdisziplin\u00e4re Beitr\u00e4ge zur Grundrechtsdebatte, ed. W. Peissl, 61\u201381. Wien: Verlag der \u00d6sterreichische Akademie der Wissenschaften."},{"key":"14_CR2","volume-title":"The governance of privacy","author":"C.J. Bennett","year":"2003","unstructured":"Bennett, C.J., and C.D. Raab. 2003. The governance of privacy. Aldershot: Ashgate."},{"key":"14_CR3","unstructured":"von Bredow, W. 2005. The Barcelona report on a Human Security Doctrine for Europe, overview and some critical remarks. Berlin Symposium on Human Security and EU-Canada Relations Canadian Universities\u2019 Centre Berlin. March 3, Berlin."},{"key":"14_CR4","unstructured":"Cas, J. 2006. Technologies that affect privacy. In ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, eds. L. Kl\u00fcver, W. Peissl, T. Tenn\u00f8e, D. B\u00fctschi, J. Cas, R. Deboelpaep, C. Hafskjold et al. 19\u201324. EPTA. Copenhagen\/Oslo\/Vienna. http:\/\/epub.oeaw.ac.at\/ita\/ita-projektberichte\/e2-2a44.pdf."},{"key":"14_CR5","unstructured":"Cavoukian, A. 2009. Privacy by design \u2026 take the challenge. Toronto: Information and Privacy Commisioner of Ontario, Canada. http:\/\/www.privacybydesign.ca\/pbdbook\/PrivacybyDesignBook.pdf."},{"key":"14_CR6","unstructured":"Commission of the European Communities. 2007. COM(2007) 87 final. Communication from the Commission to the European Parliament and the Council on the follow-up of the Work Programme for better implementation of the Data Protection Directive. http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/docs\/lawreport\/com_2007_87_f_en.pdf. Accessed 7 September 2009."},{"key":"14_CR7","unstructured":"Commission of the European Communities. 2009. COM(2009) 278 final. Communication from the Commission to the European Parliament and the Council, the European Economic and Social Committee and the Committee of the Regions: Internet of Things: \u2014An action plan for Europe; Last update: Brussels, 18.6.2009. http:\/\/ec.europa.eu\/information_society\/policy\/rfid\/documents\/commiot2009.pdf. Accessed 7 September 2009."},{"key":"14_CR8","unstructured":"Council of Europe (CoE). 1981. Convention for the protection of individuals with regard to automatic processing of personal data (Convention 108), Strasbourg, 28.I.1981. http:\/\/conventions.coe.int\/Treaty\/EN\/Treaties\/Html\/108.htm."},{"key":"14_CR9","unstructured":"Council of Europe (CoE). 2003. Convention for the protection of human rights and fundamental freedoms as amended by Protocol No. 11 with Protocol Nos. 1, 4, 6, 7, 12  and 13. http:\/\/www.echr.coe.int\/ECHR\/EN\/Header\/Basic\u00b1Texts\/Basic\u00b1Texts\/The\u00b1European\u00b1Convention\u00b1on\u00b1Human\u00b1Rights\u00b1and\u00b1its\u00b1Protocols\/."},{"key":"14_CR10","volume-title":"Internationale Risikopolitik: Der Umgang mit neuen Gefahren in den internationalen Beziehungen","author":"C. Daase","year":"2002","unstructured":"Daase, C., S. Feske, and I. Peters, eds. 2002. Internationale Risikopolitik: Der Umgang mit neuen Gefahren in den internationalen Beziehungen. Baden-Baden: Nomos Verlag."},{"key":"14_CR11","unstructured":"David, Murakami Wood, ed. 2006. A Report on the surveillance society, by Ball, K., D. Lyon, C. Norris, and C. Raab, commissioned by: Information Commissioner. September 2006, London. www.ico.gov.uk\/\u2026\/surveillance_society_full_report_2006.pdf."},{"key":"14_CR12","unstructured":"EPTA (European Parliamenty Technology Assessment). 2008. About EPTA. http:\/\/www.eptanetwork.org\/EPTA\/about.php. Accessed 19 May 2009."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Eriksson, J., and G. Giacomello, eds. 2007. International relations and security in the digital age. Routlegde Advances in International Relations and Global Politics. Oxford: Routledge.","DOI":"10.4324\/9780203964736"},{"key":"14_CR14","unstructured":"European Parliament and Council. 1995. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http:\/\/europa.eu.int\/smartapi\/cgi\/sga_doc?smartapi!celexapi!prod!CELEXnumdoc&lg=EN&numdoc=31995L0046&model=guichett."},{"key":"14_CR15","volume-title":"Arming big brother: The EU\u2019s security research programme","author":"B. Hayes","year":"2006","unstructured":"Hayes, B. 2006. Arming big brother: The EU\u2019s security research programme. No. TNI Briefing series 2006\/1. Amsterdam: Transnational Institute."},{"key":"14_CR16","unstructured":"ITU. 2005. IITU internet reports 2005: The internet of things: Executive summary. www.itu.int\/dms_pub\/itu-s\/opb\/pol\/S-POL-IR.IT-2005-SUM-PDF-E.pdf. Accessed 07 September 2009."},{"key":"14_CR17","unstructured":"Joss, S., and S. Bellucci, eds. 2002. Participatory technology assessment. European perspectives, edited by CSD. London: Centre for the Study of Democracy (Centre for the Study of Democracy and Swiss Centre for Technology Assessment)."},{"key":"14_CR18","unstructured":"Kl\u00fcver, L., W. Peissl, T. Tenn\u00f8e, D. B\u00fctschi, J. Cas, R. Deboelpaep, C. Hafskjold, et al. 2006. ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, 16 October 2006. EPTA. Copenhagen\/Oslo\/Vienna. http:\/\/epub.oeaw.ac.at\/ita\/ita-projektberichte\/e2-2a44.pdf."},{"key":"14_CR19","volume-title":"Surveillance as social sorting. Privacy, risk and digital discrimination","author":"D. Lyon","year":"2003","unstructured":"Lyon, D., ed. 2003. Surveillance as social sorting. Privacy, risk and digital discrimination. London: Routledge."},{"key":"14_CR20","unstructured":"\u00d6AW. 2005. Sicherheitsforschung, Begriffsfassung und Vorgangsweise f\u00fcr \u00d6sterreich. Vienna: \u00d6AW."},{"key":"14_CR21","unstructured":"OECD. 1980. Guidelines on the protection of privacy and transborder flows of personal data. OECD, 23 September 1980. http:\/\/www.oecd.org\/document\/20\u2009\/\u20090,2340,en_2649_33703_15589524_1_1_1_37409,00.html."},{"key":"14_CR22","first-page":"9","volume-title":"Privacy: ein Grundrecht mit Ablaufdatum? Interdisziplin\u00e4re Beitr\u00e4ge zur Grundrechtsdebatte","author":"H. Pauer-Studer","year":"2003","unstructured":"Pauer-Studer, H. 2003. Privatheit: ein ambivalenter aber unverzichtbarer Wert. In Privacy: ein Grundrecht mit Ablaufdatum? Interdisziplin\u00e4re Beitr\u00e4ge zur Grundrechtsdebatte, ed. W. Peissl, 9\u201322. Wien: Verlag der \u00d6sterreichische Akademie der Wissenschaften."},{"key":"14_CR23","unstructured":"Peissl, W. 1999. Parlamentarische Technikfolgen-Absch\u00e4tzung in Europa. In Handbuch der Technikfolgen-Absch\u00e4tzung, eds. S. Br\u00f6chler et al., 469\u2013478, 2nd ed. Berlin: Edition Sigma."},{"key":"14_CR24","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1111\/1468-5973.1101004","volume":"11","author":"W. Peissl","year":"2003","unstructured":"Peissl, W. 2003. Surveillance and security: A dodgy relationship. Journal of Contingencies and Crisis Management 11 (1 March 2003): 19\u201324.","journal-title":"Journal of Contingencies and Crisis Management"},{"issue":"2","key":"14_CR25","first-page":"88","volume":"14","author":"W. Peissl","year":"2005","unstructured":"Peissl, W. 2005. ICT and privacy: Das erste gemeinsame EPTA-Projekt, Technikfolgen-Absch\u00e4tzung: Theorie und Praxis 14 (2): 88\u201391.","journal-title":"Technikfolgen-Absch\u00e4tzung: Theorie und Praxis"},{"key":"14_CR26","unstructured":"Peissl, W. 2006. Legislation: Current situation and recent developments. In ICT and privacy in Europe: A report on different aspects of privacy based on studies made by EPTA members in 7 European countries, eds. L. Kl\u00fcver, W. Peissl, T. Tenn\u00f8e, D. B\u00fctschi, J. Cas, R. Deboelpaep, C. Hafskjold et al., 26\u201331. EPTA. Copenhagen\/Oslo\/Vienna. http:\/\/epub.oeaw.ac.at\/ita\/ita-projektberichte\/e2-2a44.pdf."},{"key":"14_CR27","unstructured":"Raguse, M., M. Meints, O. Langfeldt, and P. Walter. 2008. PRISE D6.2: Criteria for privacy enhancing security technologies. Commissioned by: European Commission PASR. Vienna: Institute of Technology Assessment Austrian Academy of Sciences. http:\/\/prise.oeaw.ac.at\/docs\/PRISE_D_6.2_Criteria_for_privacy_enhancing_security_technologies.pdf."},{"key":"14_CR28","unstructured":"R\u00f6ssler, B. 2001. Der Wert des Privaten. Frankfurt am Main: Suhrkamp (Philosophie an der Universit\u00e4t von Amsterdam)."},{"key":"14_CR29","unstructured":"Stef, Steyaert, and Herv\u00e9, Lisoir, eds. 2005. Participatory Methods Toolkit: A practitioner\u2019s manual. Brussels: King Baudouin Foundation and the Flemish Institute for Science and Technology Assessment (viWTA). http:\/\/www.viwta.be\/files\/30890_ToolkitENGdef.pdf."},{"key":"14_CR30","unstructured":"Study Group on Europe\u2019s Security Capabilities. 2004. A human security doctrine for Europe the barcelona report of the study group on Europe\u2019s security capabilities presented to EU High representative for common foreign and security policy Javier Solana, 15 September 2004. Barcelona: Study group on Europe\u2019s security capabilities. http:\/\/www.lse.ac.uk\/Depts\/global\/Publications\/HumanSecurityDoctrine.pdf."},{"key":"14_CR31","unstructured":"ULD. 2006. Systemdatenschutz. ULD.https:\/\/www.datenschutzzentrum.de\/systemdatenschutz\/index.htm. Accessed 7 September 2009."},{"key":"14_CR32","volume-title":"Parliaments and technology. Albany, USA","author":"N.J. Vig","year":"2000","unstructured":"Vig, N.J., and H. Paschen, eds. 2000. Parliaments and technology. Albany, USA: State Univ. New York Press."}],"container-title":["Data Protection in a Profiled World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-8865-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T10:48:44Z","timestamp":1720694924000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-8865-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9789048188642","9789048188659"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-8865-9_14","relation":{},"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"3 August 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}