{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:55:23Z","timestamp":1771458923875,"version":"3.50.1"},"publisher-location":"Dordrecht","reference-count":34,"publisher":"Springer Netherlands","isbn-type":[{"value":"9789048188642","type":"print"},{"value":"9789048188659","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-8865-9_2","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:12:18Z","timestamp":1280754738000},"page":"31-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Some Caveats on Profiling"],"prefix":"10.1007","author":[{"given":"Serge","family":"Gutwirth","sequence":"first","affiliation":[]},{"given":"Mireille","family":"Hildebrandt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,3]]},"reference":[{"key":"2_CR1","unstructured":"Ciborra, C. 2004. Digital technologies and the duality of risk. Paper 21, ESRC Centre of Analysis of Risk and Regulation. London School of Economics."},{"key":"2_CR2","unstructured":"Citron, D.K. 2007. Technological due process. Washington University Law Review 85: 1249\u20131313. Also available online at http:\/\/papers.ssrn.com\/sol3\/Papers.cfm?abstract_id=1012360."},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.2307\/1228974","volume":"44","author":"R.K.L. Collins","year":"1992","unstructured":"Collins, R.K.L., and D.M. Skover 1992. Paratexts. Stanford Law Review 44 (1): 509\u201352.","journal-title":"Stanford Law Review"},{"key":"2_CR4","volume-title":"The power of knowledge. Ethical, legal, and technological aspects of data mining and group profiling in epidemiology.","author":"B. Custers","year":"2004","unstructured":"Custers, B. 2004. The power of knowledge. Ethical, legal, and technological aspects of data mining and group profiling in epidemiology. Nijmegen: Wolf Legal Publ."},{"key":"2_CR5","unstructured":"Dinant, J.-M., C. Lazaro, Y. Poullet, N. Lefever, and A. Rouvroy. 2008. Application of convention 108 to the profiling mechanism. Council of Europe\/Crid. (11 January 2008), 35."},{"key":"2_CR6","first-page":"373","volume-title":"The new politics of surveillance and visibility,","author":"O. Gandy","year":"2006","unstructured":"Gandy, O. Jr. 2006. Data mining, surveillance and discrimination in the post-9\/11 environment. In The new politics of surveillance and visibility, eds. K.D. Haggerty and R.V. Ericson, 373\u201384. Toronto: Univ. Toronto Press."},{"key":"2_CR7","first-page":"349","volume":"32","author":"G. Gonzalez Fuster","year":"2008","unstructured":"Gonzalez Fuster G., and S. Gutwirth 2008. Privacy 2.0? Revue du droit des Technologies de l\u2019Information, Doctrine 32: 349\u201359.","journal-title":"Doctrine"},{"key":"2_CR8","volume-title":"Privacy and the information age.","author":"S. Gutwirth","year":"2002","unstructured":"Gutwirth, S. 2002. Privacy and the information age. Lanham: Rowman & Littlefield Publ."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Gutwirth, S. 2009. Beyond identity? Identity in the information society, 1: 122\u2013133.","DOI":"10.1007\/s12394-009-0009-3"},{"key":"2_CR10","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/978-1-4020-6914-7_14","volume-title":"Profiling the european citizen. Cross-disciplinary perspectives","author":"S Gutwirth","year":"2008","unstructured":"Gutwirth, S, and P. De Hert 2008. Regulating profiling in a democratic constitutional state. In Profiling the european citizen. Cross-disciplinary perspectives, eds. M. Hildebrandt and S. Gutwirth, 271\u2013302. Dordrecht: Springer."},{"key":"2_CR11","first-page":"175","volume-title":"Regulating technologies","author":"M. Hildebrandt","year":"2008a","unstructured":"Hildebrandt, M. 2008a. A vision of ambient law. In Regulating technologies, eds. R. Brownsword and K. Yeung, 175\u201391. Oxford: Hart."},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s11572-007-9042-1","volume":"2","author":"M Hildebrandt","year":"2008b","unstructured":"Hildebrandt, M. 2008b. Ambient intelligence, criminal liability and democracy. Criminal Law and Philosophy 2: 163\u201380.","journal-title":"Criminal Law and Philosophy"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-1-4020-9498-9_14","volume-title":"Reinventing data protection?","author":"M Hildebrandt","year":"2009","unstructured":"Hildebrandt, M 2009. Who is profiling who? Invisible visibility. In Reinventing data protection?, eds. S. Gutwirth, Y. Poullet, P. De Hert, C. de Terwangne, and S. Nouwt, 239\u201352. Dordrecht: Springer."},{"key":"2_CR14","volume-title":"A vision of ambient law.","author":"M. Hildebrandt","year":"2007","unstructured":"Hildebrandt, M., and B.-J. Koops 2007. A vision of ambient law. Brussels: FIDIS."},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Hildebrandt, M. and S. Gutwirth (eds) 2008. Profiling the European citizen. Cross-disciplinary perspectives. Dordrecht: Springer Science. p.","DOI":"10.1007\/978-1-4020-6914-7"},{"key":"2_CR15","unstructured":"Jiang, X. 2002. Safeguard privacy in ubiquitous computing with decentralized information spaces: Bridging the technical and the social. Privacy workshop September 29, 2002. University of California, Berkeley, Berkeley. Also available online at http:\/\/guir.berkeley.edu\/pubs\/ubicomp2002\/privacyworkshop\/papers\/jiang-privacyworkshop.pdf."},{"key":"2_CR16","first-page":"148","volume":"11","author":"C.E.A. Karnow","year":"1996","unstructured":"Karnow, C.E.A. 1996. Liability for distributed artificial intelligences. Berkely Technology Law Journal 11: 148\u2013204.","journal-title":"Berkely Technology Law Journal"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"J.O. Kephart","year":"2003","unstructured":"Kephart, J.O., and D.M. Chess 2003. The vision of autonomic computing. Computer 36: 41\u201350.","journal-title":"Computer"},{"key":"2_CR18","volume-title":"Code and other laws of cyberspace","author":"L. Lessig","year":"1999","unstructured":"Lessig, L. 1999. Code and other laws of cyberspace. New York: Basic Books."},{"key":"2_CR19","volume-title":"Surveillance as social sorting. Privacy, risk and digital discrimination.","author":"D. Lyon","year":"2002","unstructured":"Lyon, D., ed. 2002. Surveillance as social sorting. Privacy, risk and digital discrimination. New York: Routledge."},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1023\/A:1012456832336","volume":"3","author":"G.T. Marx","year":"2001","unstructured":"Marx, G.T. 2001. Murky conceptual waters: The public and the private. Ethics and Information Technology 3: 157\u201369.","journal-title":"Ethics and Information Technology"},{"key":"2_CR21","volume-title":"Privacy mirrors: Understanding and shaping socio-technical ubiquitous computing systems","author":"D.H. Nguyen","year":"2002","unstructured":"Nguyen, D.H., and E.D. Mynatt 2002. Privacy mirrors: Understanding and shaping socio-technical ubiquitous computing systems. Atlanta: Georgia Institute of Technology."},{"key":"2_CR22","first-page":"101","volume":"79","author":"H. Nissenbaum","year":"2004","unstructured":"Nissenbaum, H. 2004. Privacy as contextual integrity. Washington Law Review 79: 101\u201340.","journal-title":"Washington Law Review"},{"issue":"4","key":"2_CR23","doi-asserted-by":"publisher","first-page":"270","DOI":"10.2966\/scrip.030406.270","volume":"3","author":"C. Prins","year":"2006","unstructured":"Prins, C. 2006. When personal data, behavior and virtual identities become a commodity: Would a property rights approach matter? SCRIPTSed 3 (4): 270\u2013303.","journal-title":"SCRIPTSed"},{"issue":"1","key":"2_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2202\/1941-6008.1001","volume":"2","author":"A. Rouvroy","year":"2008","unstructured":"Rouvroy, A. 2008. Privacy, data protection, and the unprecedented challenges of ambient intelligence. Studies in Law, Ethics and Technology 2 (1): 1\u201351.","journal-title":"Studies in Law, Ethics and Technology"},{"key":"2_CR25","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-1-4020-6914-7_13","volume-title":"Profiling the european citizen. Cross-disciplinary perspectives","author":"W. Schreurs","year":"2008","unstructured":"Schreurs, W., M. Hildebrandt, E. Kindt, and M. Vanfleteren. 2008. Cogitas, ergo sum. The role of data protection law and non-discrimination law in group profiling in the private sector. In Profiling the european citizen. Cross-disciplinary perspectives, eds. M. Hildebrandt and S. Gutwirth. 241\u201370. Dordrecht: Springer."},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Schwartz, P.M. 2000. Beyond lessig\u2019s code for internet privacy: Cyberspace filters, privacy-control and fair information practices. Wisconsin Law Review. 2000: 743\u201388.","DOI":"10.2139\/ssrn.254849"},{"key":"2_CR27","volume-title":"The digital person. Technology and privacy in the information age.","author":"D.J. Solove","year":"2004","unstructured":"Solove, D.J. 2004. The digital person. Technology and privacy in the information age. New York: New York Univ. Press."},{"issue":"1","key":"2_CR28","first-page":"1","volume":"40","author":"D.J. Steinbock","year":"2005","unstructured":"Steinbock, D.J. 2005. Data matching, data mining and due process. Georgia Law Review 40 (1): 1\u201384.","journal-title":"Georgia Law Review"},{"key":"2_CR29","volume-title":"The situated self. Identity in a world of ambient intelligence.","author":"B Van Den Berg","year":"2009","unstructured":"Van Den Berg, B. 2009. The situated self. Identity in a world of ambient intelligence. Rotterdam: Erasmus Univ. Rotterdam."},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1023\/A:1010016102284","volume":"1","author":"A. Vedder","year":"1999","unstructured":"Vedder, A. 1999. KDD: The challenge to individualism. Ethics and Information Technology 1: 275\u201381.","journal-title":"Ethics and Information Technology"},{"key":"2_CR31","volume-title":"Information accountability. Computer Science and Artificial Intelligence Laboratory Technical Report","author":"D.J. Weitzner","year":"2007","unstructured":"Weitzner, D.J., H. Abelson et al. 2007. Information accountability. Computer Science and Artificial Intelligence Laboratory Technical Report. Cambridge, MIT."},{"issue":"4","key":"2_CR32","first-page":"17","volume":"5","author":"T.Z. Zarsky","year":"2002\u20132003","unstructured":"Zarsky, T.Z. 2002\u20132003. Mine your own business!: Making the case for the implications of the data mining or personal information in the Forum of Public Opinion. Yale Journal of Law & Technology 5 (4): 17\u201347.","journal-title":"Yale Journal of Law & Technology"},{"issue":"1","key":"2_CR33","first-page":"14","volume":"56","author":"T.Z. Zarsky","year":"2004","unstructured":"Zarsky, T.Z. 2004. Desperately seeking solutions: Using implementation-based solutions for the troubles of information privacy in the Age of data mining and the internet society. Maine Law Review 56 (1): 14\u201359.","journal-title":"Maine Law Review"}],"container-title":["Data Protection in a Profiled World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-8865-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T10:46:34Z","timestamp":1720694794000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-8865-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9789048188642","9789048188659"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-8865-9_2","relation":{},"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"3 August 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}