{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:06:20Z","timestamp":1759961180518,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":24,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048188642"},{"type":"electronic","value":"9789048188659"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-8865-9_6","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:12:18Z","timestamp":1280754738000},"page":"105-117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["From Unsolicited Communications to Unsolicited Adjustments"],"prefix":"10.1007","author":[{"given":"Gloria","family":"Gonz\u00e1lez Fuster","sequence":"first","affiliation":[]},{"given":"Serge","family":"Gutwirth","sequence":"additional","affiliation":[]},{"given":"Paul de","family":"Hert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,3]]},"reference":[{"key":"6_CR1","unstructured":"Alleweldt, F., F. Anna, and A. Merle. 2007. Consumer confidence in the digital environment. Briefing note, European Parliament, PE382.173."},{"key":"6_CR2","unstructured":"Article 29 Data Protection Working Party. 2004. Opinion 5\/2004 on unsolicited communications for marketing purposes under Article 13 of Directive 2002\/58\/EC. WP 90. Brussels, 27 February."},{"key":"6_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-90-6704-711-1","volume-title":"Regulating spam: A European perspective after the adoption of the E-Privacy directive.","author":"L.F. Asscher","year":"2006","unstructured":"Asscher, L.F., and S.A. Hoogcarspel. 2006. Regulating spam: A European perspective after the adoption of the E-Privacy directive. The Hague: T.M.C. Asser Press."},{"key":"6_CR4","unstructured":"Bygrave, L.A. 2002. Data protection law: Approaching its rationale, logic and limits. The Hague: Kluwer Law International."},{"key":"6_CR5","first-page":"175","volume":"2","author":"M\u00fagica, S. Cavanillas","year":"2008","unstructured":"Cavanillas M\u00fagica, S. 2008. Dos derechos emergentes del consumidor: A no ser molestado y a una interacci\u00f3n informativa. Revista general de legislaci\u00f3n y jurisprudencia 2: 175\u201393.","journal-title":"Revista general de legislaci\u00f3n y jurisprudencia"},{"key":"6_CR6","first-page":"60","volume-title":"In Privacy and the criminal law","author":"P. De Hert","year":"2006","unstructured":"De Hert, P., and S. Gutwirth. 2006. Privacy, data protection and law enforcement. Opacity of the individual and transparency of powe. In Privacy and the criminal law, eds. E. Claes, A. Duff, and S. Gutwirth, 60\u2013104. Oxford: Intersentia."},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-1-4020-9498-9_1","volume-title":"Reinventing data protection?","author":"P. De Hert","year":"2009","unstructured":"De Hert, P., and S. Gutwirth. 2009. European data protection\u2019s constitutional project. Its problematic recognition in Strasbourg and Luxembourg. In Reinventing data protection? eds. S. Gutwirth, Y. Poullet, P. De Hert, and C. de Terwangne, 3\u201344. Dordrecht: Springer."},{"key":"6_CR8","unstructured":"Federal Trade Commission. 2009. FTC report: Self-regulatory principles for online behavioral advertising. FTC, February."},{"key":"6_CR9","first-page":"349","volume":"32","author":"G. Gonz\u00e1lez Fuster","year":"2008","unstructured":"Gonz\u00e1lez Fuster, G., and S. Gutwirth. 2008. Privacy 2.0? Revue du droit des Technologies de l\u2019Information,\n                Doctrine, 32: 349\u201359.","journal-title":"Doctrine"},{"key":"6_CR10","unstructured":"Gutwirth, Serge. 2002. Privacy and the information age. Lanham: Rowman & Littlefield Publ."},{"issue":"1","key":"6_CR11","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s12394-008-0003-1","volume":"1","author":"M. Hildebrandt","year":"2008a","unstructured":"Hildebrandt, M. 2008a. Profiling and the rule of law. Identity in Information Society (IDIS) 1 (1): 55\u201370.","journal-title":"Identity in Information Society (IDIS)"},{"key":"6_CR12","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/978-1-4020-6914-7_15","volume-title":"Profiling the European citizen: Cross-disciplinary perspectives","author":"M. Hildebrandt","year":"2008b","unstructured":"Hildebrandt, M. 2008b. Profiling and the identity of the European citizen. In Profiling the European citizen: Cross-disciplinary perspectives, eds. M. Hildebrandt and S. Gutwirth, 303\u201343. Profiling the European Citizen: Cross-Disciplinary Perspectives New York: Springer."},{"key":"6_CR13","unstructured":"International Advertising Bureau (IAB). 2009. Good practice principles online behavioural advertising."},{"key":"6_CR14","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-90-6704-665-7_4","volume-title":"Starting points for ICT regulation. Deconstructing prevalent policy one-liners","author":"B.J. Koops","year":"2006","unstructured":"Koops, B.J. 2006. Should ICT regulation be technology-neutral? In Starting points for ICT regulation. Deconstructing prevalent policy one-liners, eds. B.J. Koops, M. Lips, C. Prins, and M. Schellekens, 77\u2013108. The Hague: T.M.C. Asser Press."},{"key":"6_CR15","unstructured":"Korff, D. 2004. The legal framework: an analysis of the \u201cconstitutional\u201d European approach to issues of data protection and law enforcement. UK Information Commissioner Study Project: Privacy & Law Enforcement, Foundation for Information Policy Research (FIPR)."},{"key":"6_CR16","unstructured":"Organisation for Economic Co-operation and Development (OECD). 2008. RFID radio frequency identification: OECD policy guidance: A focus on information security and privacy applications, impacts and country initiatives. Paper presented at the meeting of the OECD Ministeriel, Seoul (OECD Digital Economy Papers, No. 150)."},{"issue":"3","key":"6_CR17","first-page":"10","volume":"10","author":"Y. Poullet","year":"2006","unstructured":"Poullet, Y. 2006. Les aspects juridiques des syst\u00e8mes d\u2019information. Lex Electronica 10 (3). Also available online at http:\/\/www.lex-electronica.org\/articles\/v10-3\/poullet.htm.","journal-title":"Lex Electronica"},{"key":"6_CR18","volume-title":"La protection de la vie priv\u00e9e et des autres biens de la personnalit\u00e9","author":"F. Rigaux","year":"1990","unstructured":"Rigaux, F. 1990. La protection de la vie priv\u00e9e et des autres biens de la personnalit\u00e9. Brussels: Bruylant."},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-1-4020-9498-9_2","volume-title":"Reinventing data protection","author":"A. Rouvroy","year":"2009","unstructured":"Rouvroy, A., and Poullet, Y. 2009. The right to informational self-determination and the value of self-development: Reassessing the importance of privacy for democracy. In Reinventing data protection? eds. S. Gutwirth, Y. Poullet, P. De Hert, and C. de Terwangne, 45\u201376. Dordrecht: Springer."},{"key":"6_CR20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511625138","volume-title":"Philosophical dimensions of privacy: An anthology.","author":"F.D. Schoeman","year":"1984","unstructured":"Schoeman, F.D. ed. 1984. Philosophical dimensions of privacy: An anthology. Cambridge: Cambridge Univ. Press."},{"key":"6_CR21","volume-title":"Republic.com 2.0.","author":"Cass R. Sunstein","year":"2007","unstructured":"Sunstein, Cass R. 2007. Republic.com 2.0. Princeton, PA: Princeton Univ. Press."},{"key":"6_CR22","unstructured":"The Public Voice. 2008. Civil society background Paper: Fuelling creativity, ensuring consumer and privacy protection, building confidence and benefiting from convergence. Paper presented at the meeting of the OECD Ministeriel, Seoul."},{"key":"6_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6662-7","volume-title":"Safeguards in a world of ambient intelligence.","author":"D. Wright","year":"2008","unstructured":"Wright, D., S. Gutwirth, M. Friedewald, Y. Punie, and E. Vildjiounaite, eds. 2008. Safeguards in a world of ambient intelligence. Dordrecht: Springer Science."},{"key":"6_CR24","volume-title":"The power elite","author":"C. Wright Mills","year":"1956","unstructured":"Wright Mills, C. 1956, 2000. The power elite. New York: Oxford Univ. Press."}],"container-title":["Data Protection in a Profiled World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-8865-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T10:46:59Z","timestamp":1720694819000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-8865-9_6"}},"subtitle":["Redefining a Key Mechanism for Privacy Protection"],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9789048188642","9789048188659"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-8865-9_6","relation":{},"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"3 August 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}