{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T22:51:20Z","timestamp":1756075880022},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2006,9,1]],"date-time":"2006-09-01T00:00:00Z","timestamp":1157068800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,9]]},"DOI":"10.1007\/s11623-006-0140-3","type":"journal-article","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T04:08:30Z","timestamp":1158552510000},"page":"548-552","source":"Crossref","is-referenced-by-count":45,"title":["Profiling: From data to knowledge"],"prefix":"10.1007","volume":"30","author":[{"given":"Mireille","family":"Hildebrandt","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"140_CR1","volume-title":"Technology and Privacy: The New Landscape","author":"P. E. Agre","year":"2001","unstructured":"Agre, P. E. \u2019Introduction\u2019, Technology and Privacy: The New Landscape. P. E. Agre and M. Rotenberg. Cambridge, Massachusetts, MIT, 2001"},{"key":"140_CR2","unstructured":"Bauer, M., Meints, M., Hansen, M. (Hrsg.), FIDIS Deliverable D3.1 \u2014 Structured Overview on Prototypes and Concepts of Identity Management Systems, Frankfurt a.M. 2005. Download: http:\/\/www.fidis.net\/486.0.html ."},{"key":"140_CR3","volume-title":"Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing","author":"J. Bohn","year":"2004","unstructured":"Bohn, J., V. Coroama, et al. Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing, Institute for Pervasive Computing, ETH Zurich, Zurich, 2004. Download: www.vs.inf.ethz.ch\/publ\/papers\/socialambient.pdf."},{"key":"140_CR4","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/S0267-3649(01)00104-2","volume":"17","author":"L. Bygrave","year":"2001","unstructured":"Bygrave, L. \u2019Minding the Machine. Art.15 and the EC Data Protection Directive and automated profiling.\u2019 Computer Law & Security Report, 17: pp. 17\u201324, 2001","journal-title":"Computer Law & Security Report"},{"key":"140_CR5","volume-title":"The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology","author":"B. Custers","year":"2004","unstructured":"Custers, B. The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology., Wolf Legal Publishers, Nijmegen 2004."},{"key":"140_CR6","unstructured":"Hansen, M., Meints, M., \u2018Digitale Identit\u00e4ten \u2014 \u00dcberblick und aktuelle Trends\u2019, in this issue."},{"key":"140_CR7","doi-asserted-by":"crossref","unstructured":"Hildebrandt, M. \u2018Defining Profiling: A New Type of Knowledge\u2019, in Profiling the European Citizen. A Cross-disciplinary Perspective. M. Hildebrandt and S. Gutwirth (Eds.), Springer 2007.","DOI":"10.1007\/978-1-4020-6914-7_2"},{"key":"140_CR8","unstructured":"Hildebrandt, M., Backhouse, J. FIDIS Deliverable D7.2 \u2014 Descripitve analysis and inventory of profiling practices. Brussels 2005. Download via: www.fidis.net"},{"key":"140_CR9","unstructured":"Hildebrandt, M. and S. Gutwirth, (Eds.) FIDIS Deliverable D7.4 \u2014 Implications of profiling practices on democracy and rule of law. Brussels 2005. Dowload via http:\/\/www.fidis.net"},{"key":"140_CR10","unstructured":"ISTAG., Scenarios for Ambient Intelligence in 2010, Information Society Technology Advisory Group 2001. Dowload: http:\/\/www.cordis.lu\/ist\/istag-reports.htm"},{"key":"140_CR11","unstructured":"International Telecommunications Union (ITU), The Internet of Things. Geneva 2005."},{"key":"140_CR12","unstructured":"Jiang, X. Safeguard Privacy in Ubiquitous Computing with Decentralized Information Spaces: Bridging the Technical and the Social. Privacy Workshop September 29, 2002, University of California, Berkeley. Berkeley 2002. Download: http:\/\/guir.berkeley.edu\/pubs\/ubicomp2002\/privacyworkshop\/papers\/jiang-privacyworkshop.pdf"},{"key":"140_CR13","doi-asserted-by":"crossref","unstructured":"Kephart, J. O. and D. M. Chess \u2018The Vision of Autonomic Computing.\u2019 Computer January 2003.","DOI":"10.1109\/MC.2003.1160055"},{"key":"140_CR14","doi-asserted-by":"crossref","first-page":"544","DOI":"10.2307\/3105385","volume":"27","author":"M. Kranzberg","year":"1986","unstructured":"Kranzberg, M., \u2019Technology and History: \u2018Kranzberg\u2019s Laws\u2019.\u2019 Technology and Culture 27: pp. 544\u2013560, 1986","journal-title":"Technology and Culture"},{"key":"140_CR15","volume-title":"Profiles Probabilities and Stereotypes","author":"F. Schauer","year":"2003","unstructured":"Schauer, F. Profiles Probabilities and Stereotypes. Cambridge, Massachusetts, London, England, Belknap Press of Harvard University Press 2003."},{"key":"140_CR16","unstructured":"Schreurs, W., M. Hildebrandt, et al. (Eds.), FIDIS Deliverable D7.3 \u2014 Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence, p. 68, Brussels 2005."},{"key":"140_CR17","doi-asserted-by":"crossref","unstructured":"Schreurs, W., M. Hildebrandt, et al. \u2018Cogitas ergo sum. The role of data protection law and non discrimination law in group profiling in the private sector, in: Profiling the European Citizen. A Cross-disciplinary Perspective, M. Hildebrandt and S. Gutwirth (Eds.), Springer 2007","DOI":"10.1007\/978-1-4020-6914-7_13"},{"key":"140_CR18","volume-title":"The Digital Person. Technology and Privacy in the Information Age","author":"D. J. Solove","year":"2004","unstructured":"Solove, D. J., The Digital Person. Technology and Privacy in the Information Age. New York, New York University Press 2004."},{"key":"140_CR19","volume-title":"Republic.com","author":"C. Sunstein","year":"2001","unstructured":"Sunstein, C., Republic.com. Princeton and Oxford, Princeton University Press 2001."},{"key":"140_CR20","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1023\/A:1010016102284","volume":"1","author":"A. Vedder","year":"1999","unstructured":"Vedder, A. \u201eKDD: The challenge to individualism.\u201c Ethics and Information Technology 1, pp. 275\u2013281, 1999.","journal-title":"Ethics and Information Technology"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0140-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0140-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0140-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:08:18Z","timestamp":1559398098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0140-3"}},"subtitle":["The challenges of a crucial technology"],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":20,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["140"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0140-3","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,9]]}}}