Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-ndmmz Total loading time: 0 Render date: 2024-05-26T01:17:36.226Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  04 April 2020

Mark Burdon
Affiliation:
Queensland University of Technology
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aldrich, FK, ‘Smart Homes: Past and Present’ in Harper, R (ed), Inside the Smart Home (Springer 2003).Google Scholar
Allen, AL, ‘Coercing Privacy’ (1999) 40 William and Mary Law Review 723.Google Scholar
Allen, AL, ‘Privacy as Data Control: Conceptual, Practical and Moral Limits of the Paradigm’ (2000) 32 Connecticut Law Review 861.Google Scholar
Allen, AL, Unpopular Privacy: What Must We Hide? (Oxford University Press 2012).Google Scholar
Allen, AL, ‘Synthesis and Satisfaction: How Philosophy Scholarship Matters’ (2019) 20 Theoretical Inquiries in Law 343.CrossRefGoogle Scholar
Andrejevic, M, iSpy: Power and Surveillance in the Interactive Era (University of Kansas Press 2007).Google Scholar
Andrejevic, M and Burdon, M, ‘Defining the Sensor Society’ (2015) 16 Television & New Media 19.Google Scholar
Apthorpe, N and others, ‘Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic’ <https://arxiv.org/pdf/1708.05044.pdf> accessed 20 June 2019.+accessed+20+June+2019.>Google Scholar
Article 29 Data Protection Working Party, Opinion 4/2007 on the Concept of Personal Data (01248/07/EN WP 136, 2007).Google Scholar
Apthorpe, N and others, Opinion 13/2011 on Geolocation Services on Smart Mobile Devices (881/11/EN WP 185, 2011).Google Scholar
Apthorpe, N and others, Opinion 8/2014 on the Recent Developments on the Internet of Things (14/EN WP 223, 2014).Google Scholar
Austin, L, ‘Privacy and the Question of Technology’ (2003) 22 Law and Philosophy 119.Google Scholar
Austin, L, ‘Re-reading Westin’ (2019) 20 Theoretical Inquiries in Law 1.Google Scholar
Australian Law Reform Commission, For Your Information: Australian Privacy Law and Practice (Law Reform Commission 2008).Google Scholar
Baillie, L and Benyon, D, ‘Place and Technology in the Home’ (2008) 17 Computer Supported Cooperative Work 227.Google Scholar
Balta-Ozkan, N and others, ‘The Development of Smart Homes Market in the UK’ (2013) 60 Energy 361.Google Scholar
Balta-Ozkan, N and others, ‘Social Barriers to the Adoption of Smart Homes’ (2013) 63 Energy Policy 363.CrossRefGoogle Scholar
Bannerman, S, ‘Relational Privacy and the Networked Governance of the Self’ [2018] Information, Communication & Society 1.Google Scholar
Barlow, J and Venables, T, ‘Smart Home, Dumb Suppliers? The Future of Smart Homes Markets’ in Harper, R (ed), Inside the Smart Home (Springer 2003).Google Scholar
Barnard-Wills, D, Marinos, L and Portesi, S, Threat Landscape and Good Practice Guide for Smart Home and Converged Media (ENISA 2014).Google Scholar
Barocas, S and Selbst, A, ‘Big Data’s Disparate Impact’ (2016) 104 California Law Review 671.Google Scholar
Bellia, PL, ‘Federalization in Information Privacy Law’ (2009) 118 Yale Law Journal 868.Google Scholar
Benn, SI, A Theory of Freedom (Cambridge University Press 1988).Google Scholar
Bennett, CJ, Regulating Privacy: Data Protection and Public Policy in Europe and the United States (Cornell University Press 1992).Google Scholar
Bennett, CJ and Raab, CD, The Governance of Privacy: Policy Instruments in Global Perspective (MIT Press 2006).Google Scholar
Birchley, G and others, ‘Smart Homes, Private Homes? An Empirical Study of Technology Researchers’ Perceptions of Ethical Issues in Developing Smart-Home Health Technologies’ (2017) 18 BMC Medical Ethics 1.CrossRefGoogle ScholarPubMed
Birnhack, M, ‘A Process-Based Approach to Informational Privacy and the Case of Big Medical Data’ (2019) 20 Theoretical Inquiries in Law 257.CrossRefGoogle Scholar
Bloustein, EJ, ‘Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser’ (1964) 39 New York University Law Review 962.Google Scholar
Booth, S and others, What Are ‘Personal Data’? A Study Conducted for the UK Information Commissioner (Information Commissioner Office 2004).Google Scholar
Braun, A and Scheriber, F, The Current InsurTech Landscape: Business Models and Disruptive Potential (University of St. Gallen 2016).Google Scholar
Brich, J and others, ‘Exploring End User Programming Needs in Home Automation’ (2017) 24 ACM Transactions on Computer-Human Interaction 1.Google Scholar
Brynjolfsson, E and McAfee, A, The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies (W. W. Norton & Company 2014).Google Scholar
Bryson, S and others, ‘Visually Exploring Gigabyte Data Sets in Real Time’ (1999) 42 Communications of the ACM 82.CrossRefGoogle Scholar
Bugeja, J, Jacobsson, A and Davidsson, P, ‘On Privacy and Security Challenges in Smart Connected Homes’ (European Intelligence and Security Informatics Conference, Upsalla, Sweden, August 2016).Google Scholar
Burdon, M, ‘Contextualizing the Tensions and Weaknesses of Data Breach Notification and Information Privacy Law’ (2010) 27 Santa Clara Computer and High Technology Law Journal 63.Google Scholar
Burdon, M, ‘Privacy Invasive Geo-mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws’ [2010] University of Illinois Journal of Law, Technology and Policy 1.Google Scholar
Burdon, M and Andrejevic, M, ‘Big Data in the Sensor Society’ in Ekbia, H, Sugimoto, C and Mattiolli, M (eds), Big Data Is Not a Monolith (MIT Press 2016).Google Scholar
Burdon, M and Coles-Kemp, L, ‘The Significance of Securing as a Critical Component of Information Security: An Australian Narrative’ (2019) 87 Computers & Security 1.Google Scholar
Burdon, M and Harpur, P, ‘Re-conceptualising Privacy and Discrimination in an Age of Talent Analytics’ (2014) 37 University of New South Wales Law Journal 679.Google Scholar
Burdon, M and McKillop, A, ‘The Google Street View Wi-Fi Scandal and Its Repercussions for Privacy Regulation’ (2013) 39 Monash University Law Review 702.Google Scholar
Burdon, M, Siganto, J and Coles-Kemp, L, ‘The Regulatory Challenges of Australian Information Security Practice’ (2016) 32 Computer Law & Security Review 623.Google Scholar
Burdon, M and Telford, P, ‘The Conceptual Basis of Personal Information in Australian Privacy Law’ (2010) 17 Murdoch Elaw Journal 1.Google Scholar
Bygrave, LA, Data Protection Law: Approaching Its Rationale, Logic and Limits (Information Privacy, Kluwer Law International 2002).Google Scholar
Bygrave, LA, Data Privacy Law: An International Perspective (Oxford University Press 2014).Google Scholar
Canaan, M, Lucker, J and Spector, B, Opting In: Using IoT Connectivity to Drive Differentiation (Deloitte University Press 2016).Google Scholar
Cappiello, A, Technology and the Insurance Industry Re-configuring the Competitive Landscape (Springer International Publishing 2018).CrossRefGoogle Scholar
Cate, FH, ‘The EU Data Protection Directive, Information Privacy, and the Public Interest’ [1994] Iowa Law Review 431.Google Scholar
Cate, FH and Mayer-Schönberger, V, ‘Notice and Consent in a World of Big Data’ (2013) 3 International Data Privacy Law 67.Google Scholar
CB Insights, How Major Insurers Are Teaming Up with Internet of Things Companies in One Infographic (CB Insights 2015) <www.cbinsights.com/research/insurance-tech-iot-partnerships/>..>Google Scholar
Cebulsky, M and others, ‘The Digital Insurance: Facing Customer Expectation in a Rapidly Changing World’ in Linnhoff-Popien, C, Schneider, R and Zaddach, M (eds), Digital Marketplaces Unleashed (Springer 2017).Google Scholar
Chen, Z and others, ‘Unobtrusive Sleep Monitoring Using Smartphones’ (Proceedings of the 2013 7th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, PervasiveHealth, Venice, May 2013).Google Scholar
Choudhury, T and Pentland, S, ‘Sensing and Modeling Human Networks Using the Sociometer’ (Seventh IEEE International Symposium on Wearable Computers, ISWC 2003, October 2003, White Plains, New York).Google Scholar
Clarke, R and Greenleaf, G, ‘Dataveillance Regulation: A Research Framework’ (2017) 25 Journal of Law, Information and Science 104.Google Scholar
Cocchia, A, ‘Smart and Digital City: A Systematic Literature Review’ in Dameri, PR and Rosenthal-Sabroux, C (eds), Smart City: How to Create Public and Economic Value with High Technology in Urban Space (Springer International Publishing 2014).Google Scholar
Coffman, K and Odlyzko, A, ‘The Size and Growth of the Internet’ (1998) 3 First Monday.Google Scholar
Cognizant, Next-Generation Insurance: Tapping into the Intelligence of Smart Homes (2015) <www.cognizant.com/InsightsWhitepapers/next-generation-insurance-tapping-into-the-intelligence-of-smart-homes-codex1411.pdf>..>Google Scholar
Cohen, JE, ‘Examined Lives: Informational Privacy and the Subject as Object’ (2000) 52 Stanford Law Review 1373.Google Scholar
Cohen, JE, Configuring the Networked Self: Law, Code, and the Play of Everyday Practice (Yale University Press 2012).Google Scholar
Cohen, JE, ‘What Privacy Is For’ (2013) 126 Harvard Law Review 1904.Google Scholar
Cohen, JE, ‘Between Truth and Power’ in Hildebrandt, M and van den Berg, B (eds), Freedom and Property of Information: The Philosophy of Law Meets the Philosophy of Technology (Routledge 2014).Google Scholar
Cohen, JE, ‘The Networked Self in the Modulated Society’ in de Been, W, Arora, P and Hildebrandt, M (eds), Crossroads in New Media, Identity and Law: The Shape of Diversity to Come (Palgrave Macmillan UK 2015).Google Scholar
Cohen, JE, ‘Affording Fundamental Rights: A Provocation Inspired by Mireille Hildebrandt’ (2016) 4 Critical Analysis of Law 78.Google Scholar
Cohen, JE, ‘The Surveillance-Innovation Complex: The Irony of the Participatory Turn’ in Barney, D and others (eds), The Participatory Condition in the Digital Age (Minnesota University Press 2016).Google Scholar
Cohen, JE, ‘The Biopolitical Public Domain: The Legal Construction of the Surveillance Economy’ (2018) 31 Philosophy & Technology 213.Google Scholar
Cohen, JE, ‘Review of Zuboff, Shoshana. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power’ (2019) 17 Surveillance & Society 240.Google Scholar
Cohen, JE, ‘Turning Privacy Inside Out’ (2019) 20 Theoretical Inquiries in Law 1.Google Scholar
Cortis, D and others, ‘InsurTech’ in Lynn, T and others (eds), Disrupting Finance: FinTech and Strategy in the 21st Century (Springer International Publishing 2019).Google Scholar
Costa, L, Virtuality and Capabilities in a World of Ambient Intelligence: New Challenges to Privacy and Data Protection (Springer 2016).Google Scholar
Cox, E, Retail Analytics: The Secret Weapon (Wiley 2012).Google Scholar
Crawford, K and Schultz, J, ‘Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms’ (2014) 55 Boston College Law Review 93.Google Scholar
Davenport, N, ‘Smart Washers May Clean Your Clothes, but Hacks Can Clean Out Your Privacy, and Underdeveloped Regulations Could Leave You Hanging on a Line’ (2016) 32 The John Marshall Journal of Information Technology & Privacy Law.Google Scholar
Davenport, TH, The New World of Business Analytics (International Institute of Analytics 2010).Google Scholar
Davenport, TH, ‘Analytics 3.0’ (2013) 91 Harvard Business Review 64.Google Scholar
Davenport, TH, Barth, P and Bean, R, ‘How Big Data Is Different’ (2012) 54 MIT Sloan Management Review 43.Google Scholar
Davenport, TH and Dyche, J, Big Data in Big Companies (International Institute for Analytics 2013).Google Scholar
Davenport, TH, Harris, J and Morrison, R, Analytics at Work (Harvard Business Press 2010).Google Scholar
Davenport, TH, Harris, J and Shapiro, J, ‘Competing on Talent Analytics’ (2010) 88 Harvard Business Review 52.Google Scholar
Davenport, TH and Patil, DJ, ‘Data Scientist: The Sexiest Job of the 21st Century’ (2012) 90 Harvard Business Review 70.Google Scholar
Davidoff, S and others, ‘Principles of Smart Home Control’ in Dourish, P and Friday, A (eds), UbiComp 2006: Ubiquitous Computing (Springer Berlin Heidelberg 2006).Google Scholar
DeCew, JW, ‘The Conceptual Coherence of Privacy as Developed in Law’ in Cudd, AE and Navin, MC (eds), Core Concepts and Contemporary Issues in Privacy (Springer 2018).Google Scholar
Demiris, G and Hensel, B, ‘Technologies for an Aging Society: A Systematic Review of “Smart Home” Applications’ [2008] IMIA Yearbook of Medical Informatics 33.Google Scholar
Demiris, G and Hensel, B, ‘Smart Homes for Patients at the End of Life’ (2009) 23 Journal of Housing For the Elderly 106.Google Scholar
Denning, PJ, ‘Saving All the Bits’ (1990) 78 American Scientist 402.Google Scholar
Dickinson, P and others, ‘Indoor Positioning of Shoppers Using a Network of Bluetooth Low Energy Beacons’ (2016 International Conference on Indoor Positioning and Indoor Navigation (IPIN), October 2016, Alcalá de Henares, Spain).Google Scholar
Dinev, T and others, ‘Information Privacy and Correlates: An Empirical Attempt to Bridge and Distinguish Privacy-Related Concepts’ (2013) 22 European Journal of Information Systems 295.Google Scholar
Dirks, S and Keeling, M, A Vision of Smarter Cities: How Cities Can Lead the Way into a Prosperous and Sustainable Future (IBM Global Business Services 2009).Google Scholar
Dowding, K, ‘Three-Dimensional Power: A Discussion of Steven Lukes’ ‘Power: A Radical View’ (2006) 4 Political Studies Review 136.Google Scholar
Draper, NA and Turow, J, ‘The Corporate Cultivation of Digital Resignation’ [2019] New Media & Society.Google Scholar
Dyrberg, TB, The Circular Structure of Power: Politics, Identity, Community (Verso 1997).Google Scholar
Edwards, L, ‘Privacy, Security and Data Protection in Smart Cities: A Critical EU Law Perspective’ (2016) 2 European Data Protection Law Review 28.Google Scholar
Edwards, L and Veale, M, ‘Slave to the Algorithm? Why a ‘Right to Explanation’ Is Probably Not the Remedy You Are Looking For’ (2018) 16 Duke Law and Technology Review 18.Google Scholar
Ehrenreich, R, ‘Privacy and Power’ (2001) 89 Georgetown Law Journal 2047.Google Scholar
Eling, M and Lehmann, M, ‘The Impact of Digitalization on the Insurance Value Chain and the Insurability of Risks’ [2018] 43 The Geneva Papers on Risk and Insurance – Issues and Practice 359–396.Google Scholar
Eubanks, V, Digital Dead End: Fighting for Social Justice in the Information Age (MIT Press 2011).Google Scholar
Eubanks, V, Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor (1st edn, St. Martin’s Press 2018).Google Scholar
European Data Protection Supervisor, Privacy and Competitiveness in the Age of Big Data: The Interplay between Data Protection, Competition Law and Consumer Protection in the Digital Economy (European Data Protection Supervisor 2014).Google Scholar
Ferguson, AG, ‘The Internet of Things and the Fourth Amendment of Effects’ (2016) 104 California Law Review 805.Google Scholar
Forgó, N, Hänold, S and Schütze, B, ‘The Principle of Purpose Limitation and Big Data’ in Corrales, M, Fenwick, M and Forgó, N (eds), New Technology, Big Data and the Law (Springer 2017).Google Scholar
Fried, C, ‘Privacy’ (1968) 77 Yale Law Journal 475.Google Scholar
Gabrys, J, ‘Citizen Sensing, Air Pollution and Fracking: From “Caring About Your Air” to Speculative Practices of Evidencing Harm’ (2017) 65 The Sociological Review 172.Google Scholar
Gandy, OH and Nemorin, S, ‘Toward a Political Economy of Nudge: Smart City Variations’ [2018] Information, Communication & Society 1.Google Scholar
Gavison, R, ‘Privacy and the Limits of Law’ (1980) 89 Yale Law Journal 421.Google Scholar
Gellman, R, ‘Does Privacy Law Work?’ in Agre, P and Rotenberg, M (eds), Technology and Privacy: The New Landscape (Information Privacy, MIT Press 1997).Google Scholar
Geneiatakis, D and others, ‘Security and Privacy Issues for an IoT Based Smart Home’ (40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatijia, Croatia, May 2017).Google Scholar
Goldsmith, S and Crawford, S, The Responsive City (Jossey-Bass 2014).Google Scholar
Gonzâlez, Fuster G, The Emergence of Personal Data Protection as a Fundamental Right of the EU (Springer 2014).Google Scholar
Gormley, K, ‘One Hundred Years of Privacy’ [1992] Wisconsin Law Review 1335.Google Scholar
Graham-Rowe, D, ‘A Smart Phone That Knows You’re Angry’ MIT Technology Review <www.technologyreview.com/s/426560/a-smart-phone-that-knows-youre-angry/> accessed 2 May 2019.+accessed+2+May+2019.>Google Scholar
Greenleaf, G, Balancing Globalisation’s Benefits and Commitments: Accession to Data Protection Convention 108 by Countries Outside Europe (UNSW Law Research Paper No 16-52, 2016).Google Scholar
Greenleaf, GW, ‘Privacy in Australia’ in Greenleaf, GW and Rule, JB (eds), Global Privacy Protection: The First Generation (Edward Elgar Publishing Limited 2008).Google Scholar
Gross, H, ‘The Concept of Privacy’ (1967) 42 New York University Law Review 34.Google Scholar
Gurses, S and van Hoboken, J, ‘Privacy after the Agile Turn’ <https://osf.io/preprints/socarxiv/9gy73/> accessed 20 June 2019.+accessed+20+June+2019.>Google Scholar
Harper, R, Inside the Smart Home (Springer 2003).Google Scholar
Harper, R, ‘From Smart Home to Connected Home’ in Harper, R (ed), The Connected Home: The Future of Domestic Life (Springer 2011).CrossRefGoogle Scholar
Hartzog, W, ‘Opinions ∙ The Case against Idealising Control’ (2018) 4 European Data Protection Law Review 423.Google Scholar
Hartzog, W and Solove, DJ, ‘The Scope and Potential of FTC Data Protection’ (2015) 83 George Washington Law Review 2230.Google Scholar
Hildebrandt, M, ‘Law as Information in the Era of Data‐Driven Agency’ (2016) 79 The Modern Law Review 1.Google Scholar
Hiller, JS and Blanke, JM, ‘Smart Cities, Big Data, and the Resilience of Privacy’ (2017) 68 Hastings Law Journal 309.Google Scholar
Hollands, RG, ‘Critical Interventions into the Corporate Smart City’ (2015) 8 Cambridge Journal of Regions, Economy and Society 61.Google Scholar
Hoogendoorn, M and Funk, B, Machine Learning for the Quantified Self on the Art of Learning from Sensory Data (Springer 2018).Google Scholar
Huijsing, JH, ‘Smart Sensor Systems: Why? Where? How?’ in Meijer, G (ed), Smart Sensor Systems (John Wiley & Sons 2008).Google Scholar
Information Commissioner’s Office (UK), Guide to the General Data Protection Regulation (GDPR) (2018) <https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/>..>Google Scholar
Inness, JC, Privacy, Intimacy, and Isolation (Oxford University Press 1992).Google Scholar
Jacobsson, A, Boldt, M and Carlsson, B, ‘A Risk Analysis of a Smart Home Automation System’ (2016) 56 Future Generation Computer Systems 719.Google Scholar
Jacobsson, A and Davidsson, P, ‘Towards a Model of Privacy and Security for Smart Homes’ (IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, December 2015).Google Scholar
Jones, ML, ‘Privacy without Screens & the Internet of Other People’s Things’ (2015) 51 Idaho Law Review 639.Google Scholar
Kamiran, F and Calders, T, ‘Data Preprocessing Techniques for Classification without Discrimination’ (2012) 33 Knowledge and Information Systems 1.Google Scholar
Kang, J, ‘Information Privacy in Cyberspace Transactions’ (1998) 50 Stanford Law Review 1193.Google Scholar
Katyal, S, ‘Privacy vs. Piracy’ (2004) 7 Yale Journal of Law & Technology 222.Google Scholar
Keats Citron, D, ‘Technological Due Process’ (2007) 85 Washington University Law Review 1249.Google Scholar
Kellmereit, D and Obodovski, D, The Silent Intelligence: The Internet of Things (DND Ventures LLC 2013).Google Scholar
Kerr, I and Earle, J, ‘Prediction, Preemption, Presumption: How Big Data Threatens Big Picture Privacy’ 66 Stanford Law Review Online 65.Google Scholar
Kirby, M, ‘Twenty-five Years of Evolving Information Privacy Law: Where Have We Come From and Where Are We Going?’ (2003) 21 Prometheus 467.Google Scholar
Kitchin, R, ‘The Real-Time City? Big Data and Smart Urbanism’ (2014) 79 GeoJournal 1.Google Scholar
Knopf, GK and Bassi, AS, ‘Introduction to Biosensors and Bioelectronics’ in Knopf, GK and Bassi, AS (eds), Smart Biosensor Technology (2nd edn, CRC Press 2019).Google Scholar
Koops, B-J, ‘The Trouble with European Data Protection Law’ (2014) 4 International Data Privacy Law 250.Google Scholar
Koops, B-J and others, ‘A Typology of Privacy’ (2017) 38 University of Pennsylvania Journal of International Law 483.Google Scholar
Kranz, M, Building the Internet of Things: Implement New Business Models, Disrupt Competitors, and Transform Your Industry (Wiley 2017).Google Scholar
Lane, M, ‘Location-Based Analytics Yield Customer and Inventory Insights’ 4 Journal of Retail Analytics 21.Google Scholar
Lanzing, M, ‘The Transparent Self’ (2016) 18 Ethics and Information Technology 9.Google Scholar
Larsen, NM, Sigurdsson, V and Breivik, J, ‘The Use of Observational Technology to Study In-Store Behavior: Consumer Choice, Video Surveillance, and Retail Analytics’ (2017) 40 The Behavior Analyst 343.Google Scholar
Latif, MA and others, ‘User Privacy Framework for Web-of-Objects Based Smart Home Services’ (2015) 9 International Journal of Smart Home 61.Google Scholar
Lessig, L, ‘Privacy as Property’ (2002) 69 Social Research 247.Google Scholar
Lewis, S, ‘Insurtech: An Industry Ripe for Disruption’ (2017) 1 The Georgetown Law Technology Review 491.Google Scholar
Lewis, SCR, ‘Energy in the Smart Home’ in Harper, R (ed), The Connected Home: The Future of Domestic Life (Springer 2011).Google Scholar
Liddle, J and others, ‘Measuring the Lifespace of People with Parkinson’s Disease Using Smartphones: Proof of Principle’ (2014) 16 Journal of Medical Internet Research e13.Google Scholar
Likamwa, R and others, ‘MoodScope: Building a Mood Sensor from Smartphone Usage Patterns’ (Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys ‘13, Taipei, June 2013).Google Scholar
Lin, H and Bergmann, N, ‘IoT Privacy and Security Challenges for Smart Home Environments’ (2016) 7 Information 44.CrossRefGoogle Scholar
Lindsay, D, ‘An Exploration of the Conceptual Basis of Privacy and the Implications for the Future of Australian Privacy Law’ (2005) 29 Melbourne University Law Review 131.Google Scholar
Linnhoff-Popien, C, Schneider, R and Zaddach, M, Digital Marketplaces Unleashed (Springer 2017).Google Scholar
Litman, J, ‘Information Privacy/Information Property’ (2000) 52 Stanford Law Review 1283.Google Scholar
Löffler, M and others, Insurers Need to Plug into the Internet of Things: Or Risk Falling Behind (McKinsey & Company 2016).Google Scholar
Luhn, HP, ‘A Business Intelligence System’ (1958) 2 IBM Journal of Research and Development 314.Google Scholar
Lukes, S, Power: A Radical View (Palgrave Macmillan 1974).Google Scholar
Lukes, S, Power: A Radical View (2nd edn, Palgrave Macmillan 2005).Google Scholar
Lupton, D, ‘Feeling Your Data: Touch and Making Sense of Personal Digital Data’ (2017) 19 New Media & Society 1599.Google Scholar
Lyman, P and Varian, H, ‘How Much Information?’ (2000) 6 JEP: The Journal of Electronic Publishing.Google Scholar
Lynskey, O, ‘Aligning Data Protection Rights with Competition Law Remedies? The GDPR Right to Data Portability’ (2017) 42 European Law Review 793.Google Scholar
MacCarthy, M, ‘In Defense of Big Data Analytics’ in Selinger, E, Polonetsky, J and Tene, O (eds), The Cambridge Handbook of Consumer Privacy (Cambridge University Press 2018).Google Scholar
Mai, H, ‘Preface: Fin- & Insuretech’ in Linnhoff-Popien, C, Schneider, R and Zaddach, M (eds), Digital Marketplaces Unleashed (Springer 2017).Google Scholar
Maisel, L and Cokins, G, Predictive Business Analytics: Forward-Looking Capabilities to Improve Business Performance (John Wiley & Sons 2014).Google Scholar
Margulis, ST, ‘On the Status and Contribution of Westin’s and Altman’s Theories of Privacy’ (2003) 59 Journal of Social Issues 411.Google Scholar
McFall, L and Moor, L, ‘Who, or What, Is Insurtech Personalizing? Persons, Prices and the Historical Classifications of Risk’ (2018) 19 Distinktion: Journal of Social Theory 193.Google Scholar
Mendes, TDP and others, ‘Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources’ (2015) 8 Energies 7279.Google Scholar
Miller, AR, ‘Personal Privacy in the Computer Age: The Challenge of a New Technology in an Information-Oriented Society’ (1968) 67 Michigan Law Review 1091.Google Scholar
Mittelstadt, B, ‘Designing the Health-Related Internet of Things: Ethical Principles and Guidelines’ (2017) 8 Information 77.Google Scholar
Montgomery, AR, ‘Just What the Doctor Ordered: Protecting Privacy without Impeding Development of Digital Pills’ (2016) 19 Vanderbilt Journal of Entertainment and Technology Law 147.Google Scholar
Moor, JH, ‘Towards a Theory of Privacy in the Information Age’ (1997) 27 Computers and Society 27.Google Scholar
Moore, A, ‘Privacy, Speech and the Law’ (2013) 22 Journal of Information Ethics 21.CrossRefGoogle Scholar
Moore, AD, ‘Intangible Property: Privacy, Power and Control’ in Moore, AD (ed), Information Ethics: Privacy, Property, and Power (University of Washington Press 2005).Google Scholar
Mulligan, DK, Koopman, C and Doty, N, ‘Privacy Is an Essentially Contested Concept: A Multi-Dimensional Analytic for Mapping Privacy’ (2016) 374 Philosophical Transactions of the Royal Society A 1.Google Scholar
Mundie, C, ‘Privacy Pragmatism’ (2014) 93 Foreign Affairs 28.Google Scholar
Murakami Wood, D and Mackinnon, D, ‘Partial Platforms and Oligoptic Surveillance in the Smart City’ (2019) 17 Surveillance & Society 176.Google Scholar
Murphy, RS, ‘Property Rights in Personal Information: An Economic Defense of Privacy’ (1996) 84 Georgetown Law Journal 2381.Google Scholar
Naylor, M, Insurance Transformed (Springer 2017).Google Scholar
Neff, G and Nafus, D, Self-Tracking (The MIT Press 2016).Google Scholar
Newell, B, ‘Privacy and Surveillance in the Streets’ in Newell, BC, Timan, T and Koops, B-J (eds), Surveillance, Privacy and Public Space (Routledge 2019).Google Scholar
Nicoletti, B, The Future of Fintech: Integrating Finance and Technology in Financial Services (Palgrave Macmillan 2017).Google Scholar
Nissenbaum, H, ‘Protecting Privacy in an Information Age: The Problem of Privacy in Public’ (1998) 17 Law and Philosophy 559.Google Scholar
Nissenbaum, H, ‘Privacy as Contextual Integrity’ (2004) 79 Washington Law Review 119.Google Scholar
Nissenbaum, H, Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford Law Books 2010).Google Scholar
Nissenbaum, H, ‘Must Privacy Give Way to Use Regulation?’ 2015–16 Faculty Seminar: Democracy, Citizenship, and Constitutionalism <www.sas.upenn.edu/andrea-mitchell-center/sites/www.sas.upenn.edu.dcc/files/Nissenbaum-UPenn-Democracy.pdf> accessed 14 May 2019.+accessed+14+May+2019.>Google Scholar
Nyarku, M and others, ‘Mobile Phones as Monitors of Personal Exposure to Air Pollution: Is This the Future?’ (2018) 13 PLoS One e0193150.Google Scholar
OECD, Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (OECD 1980).Google Scholar
OECD, Smart Sensor Networks: Technologies and Applications for Green Growth (OECD Digital Economy Papers 2009).Google Scholar
OECD, Machine-to-Machine Communications: Connecting Billions of Devices (OECD Digital Economy Papers 2012).Google Scholar
OECD, The OECD Privacy Framework (OECD Publishing 2013).Google Scholar
OECD, Emerging Issues: The Internet of Things (Digital Economy Outlook 2015).Google Scholar
OECD, Technology and Innovation in the Insurance Sector (OECD 2017).Google Scholar
Office of the Australian Information Commissioner, Australian Privacy Principles Guidelines (OAIC 2014).Google Scholar
Office of the Australian Information Commissioner, What Is Personal Information? (OAIC 2017).Google Scholar
Ohm, P, ‘Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization’ 57 UCLA Law Review 1701.Google Scholar
Pasquale, F, ‘Restoring Transparency to Automated Authority’ (2011) 9 Journal on Telecommunications and High Technology Law 235.Google Scholar
Paterson, M and McDonagh, M, ‘Data Protection in an Era of Big Data: The Challenges Posed by Big Personal Data’ (2018) 44 Monash University Law Review 1.Google Scholar
Peek, ME, ‘Information Privacy and Corporate Power: Towards a Re-Imagination of Information Privacy Law’ (2006) 37 Seton Hall Law Review 127.Google Scholar
Peppet, SR, ‘Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent’ (2014) 93 Texas Law Review 85.Google Scholar
Perera, C and others, ‘Sensing as a Service Model for Smart Cities Supported by Internet of Things’ (2013) 25 Transactions on Emerging Telecommunications Technologies 81.Google Scholar
Plachkinova, M, Vo, A and Alluhaidan, A, ‘Emerging Trends in Smart Home Security, Privacy, and Digital Forensics’ AMCIS (2016) <https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1434&context=amcis2016>..>Google Scholar
Porter, M and Heppelmann, J, ‘Connected Products Are Transforming Competition’ (2014) Harvard Business Review 1.Google Scholar
Posner, RA, ‘The Right of Privacy’ (1978) 12 Georgia Law Review 393.Google Scholar
Post, RC, ‘Three Concepts of Privacy’ (2001) 89 Georgetown Law Journal 2087.Google Scholar
Poullet, Y, ‘Is the General Data Protection Regulation the Solution?’ (2018) 34 Computer Law & Security Review 773.Google Scholar
President’s Council of Advisors on Science and Technology, Big Data and Privacy: A Technological Perspective (White House Office of Science & Technology Policy 2014).Google Scholar
Price Waterhouse Coopers, Insurance’s New Normal: Driving Innovation with InsurTech (2016) <www.pwc.com/gx/en/industries/financial-services/fintech-survey/report/insurance.html>..>Google Scholar
Price Waterhouse Coopers, InsurTech: A Force for Good (2016) <www.pwc.co.uk/industries/financial-services/insurtech.html>..>Google Scholar
Price Waterhouse Coopers, Opportunities Await: How InsurTech Is Reshaping Insurance (Global FinTech Survey, June 2016).Google Scholar
Prins, C, ‘Property and Privacy: European Perspectives and the Commodification of Our Identity’ in Guibault, LMCR and Hugenholtz, PB (eds), The Future of the Public Domain (Information Privacy, Kluwer Law International 2006).Google Scholar
Purtova, N, ‘The Illusion of Personal Data as No One’s Property’ (2015) 7 Law, Innovation and Technology 83.Google Scholar
Purtova, N, ‘The Law of Everything: Broad Concept of Personal Data and Future of EU Data Protection Law’ (2018) 10 Law, Innovation and Technology 40.Google Scholar
Raul, AC, Privacy and the Digital State: Balancing Public Information and Personal Privacy (Kluwer 2002).Google Scholar
Regan, PM, Legislating Privacy: Technology, Social Values, and Public Policy (University of North Carolina Press 1995).Google Scholar
Regan, PM, ‘Privacy and the Common Good: Revisited’ in Roessler, B and Mokrosinska, D (eds), Social Dimensions of Privacy (Cambridge University Press 2015).Google Scholar
Reidenberg, J and others, ‘Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding’ (2015) 30 Berkeley Technology Law Journal 39.Google Scholar
Reidenberg, JR, ‘Privacy in the Information Economy: A Fortress or Frontier for Individual Rights?’ (1992) 44 Federal Communications Law Journal 195.Google Scholar
Report of the Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens (United States Government Printing Office 1973).Google Scholar
Riemer, K and others, The Fintech Advantage: Harnessing Digital Technology, Keeping the Customer in Focus (Capgemini & The University of Sydney Business School 2017).Google Scholar
Risteska Stojkoska, BL and Trivodaliev, KV, ‘A Review of Internet of Things for Smart Home: Challenges and Solutions’ (2016) 140 Journal of Cleaner Production 1454.Google Scholar
Roberts, A, ‘Why Privacy and Domination’ (2018) 4 European Data Protection Law Review 5.Google Scholar
Rosen, J, The Unwanted Gaze: The Destruction of Privacy in America (Random House 2000).Google Scholar
Rotenberg, M, ‘Fair Information Practices and the Architecture of Privacy’ Stanford Technology Law Review <http://stlr.stanford.edu/STLR/Articles/01_STLR_1> accessed 20 June 2019.+accessed+20+June+2019.>Google Scholar
Rubenfeld, J, ‘The Right of Privacy and the Right to Be Treated as an Object’ (2001) 89 Georgetown Law Journal 2099.Google Scholar
Rubinstein, I, ‘Privacy Localism’ (2018) 93 Washington Law Review 1961.Google Scholar
Rubinstein, IS, Lee, RD and Schwartz, PM, ‘Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches’ (2008) 75 The University of Chicago Law Review 261.Google Scholar
Rule, JB, Privacy in Peril (Oxford University Press 2007).Google Scholar
Saad Al-Sumaiti, A, Ahmed, MH and Salama, MMA, ‘Smart Home Activities: A Literature Review’ (2014) 42 Electric Power Components and Systems 294.Google Scholar
Saxena, RN and Srinivasan, A, Business Analytics: A Practitioner’s Guide (Springer 2013).CrossRefGoogle Scholar
Schauer, L, ‘Analyzing the Digital Society by Tracking Mobile Customer Devices’ in Linnhoff-Popien, C, Schneider, R and Zaddach, M (eds), Digital Marketplaces Unleashed (Springer 2017).Google Scholar
Schermer, B, ‘The Limits of Privacy in Automated Profiling and Data Mining’ (2011) 27 Computer Law & Security Review 45.Google Scholar
Schoeman, FD, Privacy and Social Freedom (Information Privacy, Cambridge University Press 1992).Google Scholar
Schwartz, PM, ‘Privacy and Democracy in Cyberspace’ (1999) 52 Vanderbilt Law Review 1609.Google Scholar
Schwartz, PM, ‘Internet Privacy and the State’ (2000) 32 Connecticut Law Review 815.Google Scholar
Schwartz, PM, ‘Preemption and Privacy’ (2009) 118 Yale Law Journal 902.Google Scholar
Schwartz, PM and Janger, EJ, ‘Notification of Data Security Breaches’ (2007) 105 Michigan Law Review 913.Google Scholar
Schwartz, PM and Peifer, K-N, ‘Transatlantic Data Privacy Law’ (2017) 106 Georgetown Law Journal 115.Google Scholar
Schwartz, PM and Solove, DJ, ‘Reconciling Personal Information in the United States and European Union’ (2014) 102 California Law Review 877.Google Scholar
Scoble, R and Israel, S, Age of Context: Mobile, Sensors, Data and the Future of Privacy (Patrick Brewster Press 2014).Google Scholar
Sedenberg, E, Wong, R and Chuang, J, ‘A Window into the Soul’ in Newell, BC, Timan, T and Koops, B-J (eds), Surveillance, Privacy and Public Space (Routledge 2019).Google Scholar
Shackelford, SJ and others, ‘When Toasters Attack: A Polycentric Approach to Enhancing the Security of Things’ (2017) 2017 University of Illinois Law Review 415.Google Scholar
Silk, M, ‘Beacons Are Not the New Black’ (2015) 4 Journal of Retail Analytics 6.Google Scholar
Simitis, S, ‘Reviewing Privacy in an Information Society’ (1987) 135 University of Pennsylvania Law Review 707.Google Scholar
Sinclair, B, IoT Inc: How Your Company Can Use the Internet of Things to Win in the Outcome Economy (McGraw-Hill Education 2017).Google Scholar
Sivaraman, V, Gharakheili, HH and Fernandes, C, Inside Job: Security and Privacy Threats for Smart-home IoT Devices (University of New South Wales and Australian Communications Consumer Action Network (ACCAN) 2017) <http://accan.org.au/files/Grants/UNSW-ACCAN_InsideJob_web.pdf>.Google Scholar
Smith, GJD, ‘Data Doxa: The Affective Consequences of Data Practices’ (2018) 5 Big Data & Society 1.Google Scholar
Solaimani, S, Keijzer-Broers, W and Bouwman, H, ‘What We Do – and Don’t – Know about the Smart Home: An Analysis of the Smart Home Literature’ (2015) 24 Indoor and Built Environment 370.Google Scholar
Solove, DJ, ‘Privacy and Power: Computer Databases and Metaphors for Information Privacy’ (2001) 53 Stanford Law Review 1393.Google Scholar
Solove, DJ, ‘Conceptualizing Privacy’ (2002) 90 California Law Review 1087.Google Scholar
Solove, DJ, ‘“I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy’ (2008) 44 San Diego Law Review 745.Google Scholar
Solove, DJ, Understanding Privacy (Harvard University Press 2008).Google Scholar
Solove, DJ, ‘Privacy Self-Management and the Consent Dilemma’ (2013) 126 Harvard Law Review 1880.Google Scholar
Solove, DJ and Hartzog, W, ‘The FTC and the New Common Law of Privacy’ (2014) 114 Columbia Law Review 583.Google Scholar
Solove, DJ and Schwartz, PM, ‘The PII Problem: Privacy and a New Concept of Personally Identifiable Information’ (2011) 86 New York University Law Review 1814.Google Scholar
Sprague, R, ‘Welcome to the Machine: Privacy and Workplace Implications of Predictive Analytics’ (2015) 21 Richmond Journal of Law & Technology 1.Google Scholar
Steeves, V, ‘Theorizing Privacy in a Liberal Democracy: Canadian Jurisprudence, Anti-Terrorism, and Social Memory after 9/11’ (2019) 20 Theoretical Inquiries in Law 323.Google Scholar
Strain, J, ‘Households as Morally Ordered Communities: Explorations in the Dynamics of Domestic Life’ in Harper, R (ed), Inside the Smart Home (Springer 2003).Google Scholar
Strandburg, KJ, ‘Monitoring, Datafication and Consent: Legal Approaches to Privacy in the Big Data Context’ in Lane, J and others (eds), Privacy, Big Data and the Public Good: Frameworks for Engagement (Cambridge University Press 2014).Google Scholar
Susser, D, ‘Notice after Notice-and-Consent: Why Privacy Disclosures Are Valuable Even If Consent Frameworks Aren’t’ [2019] 9 Journal of Information Policy 37.Google Scholar
Swanson, B and Gilder, G, Estimating the Exaflood: The Impact of Video and Rich Media on the Internet (Discovery Institute 2008).Google Scholar
Takayama, L and others, ‘Making Technology Homey: Finding Sources of Satisfaction and Meaning in Home Automation’ (UbiComp’12 – Proceedings of the 2012 ACM Conference on Ubiquitous Computing, Pittsburgh, September 2012).Google Scholar
Tavani, HT, ‘Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy’ (2007) 38 Metaphilosophy 1.Google Scholar
Tene, O and Polonetsky, J, ‘Big Data for All: Privacy and User Control in the Age of Analytics’ (2013) 11 Northwestern Journal of Technology and Intellectual Property 239.Google Scholar
Tene, O and Polonetsky, J, ‘Big Data for All: Privacy and User Control in the Age of Analytics’ (2013) 11 Northwestern Journal of Technology and Intellectual Property 240.Google Scholar
Theoharidou, M, Tsalis, N and Gritzalis, D, ‘Smart Home Solutions: Privacy Issues’ in van Hoof, J, Demiris, G and Wouters, EJM (eds), Handbook of Smart Homes, Health Care and Well-Being (Springer 2014).Google Scholar
Thierer, A, ‘The Pursuit of Privacy in a World Where Information Control Is Failing’ (2013) 36 Harvard Journal of Law & Public Policy 409.Google Scholar
Thorne, C and Griffiths, C, ‘Smart, Smarter, Smartest: Redefining Our Cities’ in Dameri, PR and Rosenthal-Sabroux, C (eds), Smart City: How to Create Public and Economic Value with High Technology in Urban Space (Springer International Publishing 2014).Google Scholar
Tolmie, P and Crabtree, A, ‘The Practical Politics of Sharing Personal Data’ (2018) 22 Personal and Ubiquitous Computing 293.Google Scholar
Tolmie, P and others, ‘Towards the Unremarkable Computer: Making Technology at Home in Domestic Routines’ in Harper, R (ed), Inside the Smart Home (Springer 2003).Google Scholar
Toschi, GM, Campos, LB and Cugnasca, CE, ‘Home Automation Networks: A Survey’ (2017) 50 Computer Standards & Interfaces 42.Google Scholar
Tovino, SA, ‘The HIPAA Privacy Rule and the EU GDPR: Illustrative Comparisons’ (2017) 47 Seton Hall Law Review 993.Google Scholar
Townsend, A and Arthur, J, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia (Audible Studios 2013).Google Scholar
Townsend, D, Knoefel, F and Goubran, R, ‘Privacy versus Autonomy: A Tradeoff Model for Smart Home Monitoring Technologies’ (Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Boston, Mass, USA, 30 August 2011).Google Scholar
Turow, J, The Aisles Have Eyes: How Retailers Track Your Shopping, Strip Your Privacy, and Define Your Power (Yale University Press 2017).Google Scholar
van der Sloot, B and Zuiderveen Borgesius, F, ‘The EU Data Protection Regulation: A New Global Standard for Information Privacy’ <https://bartvandersloot.com/onewebmedia/SSRN-id3162987.pdf>..>Google Scholar
van Dijck, J, ‘Datafication, Dataism and Dataveillance: Big Data between Scientific Paradigm and Ideology’ (2014) 12 Surveillance & Society 197.Google Scholar
van Hoboken, J, ‘From Collection to Use in Privacy Regulation? A Forward-Looking Comparison of European and US Frameworks for Personal Data Processing’ in van der Sloot, B, Broeders, D and Schrijvers, E (eds), Exploring the Boundaries of Big Data (Amsterdam University Press 2016).Google Scholar
Vaughn, A and others, ‘Activity Detection and Analysis Using Smartphone Sensors’ (2018 IEEE International Conference on Information Reuse and Integration (IRI), Salt Lake City, July 2018).Google Scholar
Volosovich, S, ‘Insurtech: Challenges and Development Perspectives’ (2016) 3 International Journal of Innovative Technologies in Economy 39.Google Scholar
Waber, B, People Analytics: How Social Sensing Technology Will Transform Business and What It Tells Us about the Future of Work (FT Press 2013).Google Scholar
Wachter, S, Mittelstadt, B and Floridi, L, ‘Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation’ (2017) 7 International Data Privacy Law 76.Google Scholar
Wacks, R, Personal Information: Privacy and the Law (Clarendon Press 1993).Google Scholar
Waldo, J, Lin, H and Millett, LI, Engaging Privacy and Information Technology in a Digital Age (Information Privacy, National Academies Press 2007).Google Scholar
Warren, SD and Brandeis, LD, ‘The Right to Privacy’ (1890) 4 Harvard Law Review 193.Google Scholar
Weber, S and Wong, RY, ‘The New World of Data: Four Provocations on The Internet of Things’ (2017) 22 First Monday 1.Google Scholar
Westin, AF, Privacy and Freedom (Atheneum 1967).Google Scholar
Whitson, JR, ‘Surveillance and Democracy in the Digital Enclosure’ in Haggerty, KD and Samatas, M (eds), Surveillance and Democracy (Routledge, Taylor & Francis Group 2010).Google Scholar
Wilson, C, Hargreaves, T and Hauxwell-Baldwin, R, ‘Smart Homes and Their Users: A Systematic Analysis and Key Challenges’ (2015) 19 Personal and Ubiquitous Computing 463.Google Scholar
Wilson, C, Hargreaves, T and Hauxwell-Baldwin, R, ‘Benefits and Risks of Smart Home Technologies’ (2017) 103 Energy Policy 72.Google Scholar
Wilson, JD, Creating Strategic Value Through Financial Technology (John Wiley & Sons 2017).Google Scholar
Witzleb, N and Wagner, J, ‘When Is Personal Data about or Relating to an Individual? A Comparison of Australian, Canadian, and EU Data Protection and Privacy Laws’ (2018) 4 Canadian Journal of Comparative and Contemporary Law 293.Google Scholar
World Economic Forum, Personal Data: The Emergence of a New Asset Class (World Economic Forum and Bain & Company 2011).Google Scholar
World Economic Forum, Big Data, Big Impact: New Possibilities for International Development (2012).Google Scholar
Wu, J and Coggeshall, S, Foundations of Predictive Analytics (CRC Press 2012).Google Scholar
Yan, TC, Schulte, P and Lee, DCK, ‘InsurTech and FinTech: Banking and Insurance Enablement’ in Lee, DCK and Deng, RH (eds), Handbook of Blockchain, Digital Finance, and Inclusion (Academic Press 2018), 249.Google Scholar
Yeung, K, ‘“Hypernudge”: Big Data as a Mode of Regulation by Design’ (2017) 20 Information, Communication & Society 118.Google Scholar
Yeung, K, ‘Algorithmic Regulation: A Critical Interrogation’ (2018) 12 Regulation & Governance 505.Google Scholar
Yeung, K, ‘Five Fears about Mass Predictive Personalization in an Age of Surveillance Capitalism’ (2018) 8 International Data Privacy Law 258.Google Scholar
Zarsky, TZ, ‘Transparent Predictions’ [2013] University of Illinois Law Review 1503.Google Scholar
Zarsky, TZ, ‘The Privacy-Innovation Conundrum’ (2015) 19 Lewis & Clark Law Review 168.Google Scholar
Zarsky, TZ, ‘Incompatible: The GDPR in the Age of Big Data’ (2017) 47 Seton Hall Law Review 1020.Google Scholar
Zarsky, TZ, ‘Privacy and Manipulation in the Digital Age’ (2019) 20 Theoretical Inquiries in Law 1.Google Scholar
Zeng, E, Mare, S and Roesner, F, ‘End User Security & Privacy Concerns with Smart Homes’ (Symposium on Usable and Scable Privacy (SOUPS), Santa Clara, California, 2017).Google Scholar
Zhang, J and others, ‘WiFi-ID: Human Identification Using WiFi Signal’ (2016 International Conference on Distributed Computing in Sensor Systems (DCOSS), 26–28 May 2016).Google Scholar
Zhang, X and others, ‘MoodExplorer: Towards Compound Emotion Detection via Smartphone Sensing’ (2018) [ACM] 1 Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1.Google Scholar
Zittrain, J, ‘Privacy 2.0’ [2008] The University of Chicago Legal Forum 65.Google Scholar
Zuboff, S, ‘Big Other: Surveillance Capitalism and the Prospects of an Information Civilization’ (2015) 30 Journal of Information Technology 75.Google Scholar
Zuboff, S, The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (1st edn, Public Affairs 2019).Google Scholar
Zuiderveen Borgesius, FJ, ‘Singling Out People without Knowing Their Names: Behavioural Targeting, Pseudonymous Data, and the New Data Protection Regulation’ (2016) 32 Computer Law & Security Review: The International Journal of Technology Law and Practice 256.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Mark Burdon, Queensland University of Technology
  • Book: Digital Data Collection and Information Privacy Law
  • Online publication: 04 April 2020
  • Chapter DOI: https://doi.org/10.1017/9781108283717.011
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Mark Burdon, Queensland University of Technology
  • Book: Digital Data Collection and Information Privacy Law
  • Online publication: 04 April 2020
  • Chapter DOI: https://doi.org/10.1017/9781108283717.011
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Mark Burdon, Queensland University of Technology
  • Book: Digital Data Collection and Information Privacy Law
  • Online publication: 04 April 2020
  • Chapter DOI: https://doi.org/10.1017/9781108283717.011
Available formats
×