메뉴 건너뛰기




Volumn 1, Issue , 2008, Pages 1-286

Safeguards in a World of Ambient Intelligence

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85098159678     PISSN: 18750044     EISSN: 18750036     Source Type: Book Series    
DOI: 10.1007/978-1-4020-6662-7_1     Document Type: Chapter
Times cited : (12)

References (271)
  • 3
    • 0742293904 scopus 로고    scopus 로고
    • Aarts, E., and S. Marzano (eds.), Uitgeverij 010 Publishers, Rotterdam
    • Aarts, E., and S. Marzano (eds.), The New Everyday: Views on Ambient Intelligence, Uitgeverij 010 Publishers, Rotterdam, 2003.
    • (2003) The New Everyday: Views on Ambient Intelligence
  • 4
    • 33745837482 scopus 로고    scopus 로고
    • Usage and Development Scenarios for the Tangible Toolbox
    • Swedish Institute of Computer Science, Kista
    • Åkesson, K.-P., J. Humble, A. Crabtree and A. Bullock, Usage and Development Scenarios for the Tangible Toolbox, ACCORD Deliverable D1.3, Swedish Institute of Computer Science, Kista, 2001.
    • (2001) ACCORD Deliverable D1 , vol.3
    • Åkesson, K.-P.1    Humble, J.2    Crabtree, A.3    Bullock, A.4
  • 6
    • 0038271926 scopus 로고    scopus 로고
    • Supermarket Cards: The Tip of the Retail Surveillance Iceberg
    • , No., pp
    • Albrecht, K., “Supermarket Cards: The Tip of the Retail Surveillance Iceberg”, Denver University Law Review, No. 79, 2002, pp. 534–539, 558–565.
    • (2002) Denver University Law Review , vol.534-539 , Issue.79 , pp. 558-565
    • Albrecht, K.1
  • 7
    • 85098145672 scopus 로고    scopus 로고
    • The applicability of the EU Product Liability Directive to Software”, The Comparative and International
    • , Vol., No
    • Alheit, K., “The applicability of the EU Product Liability Directive to Software”, The Comparative and International Law Journal of South Africa, Vol. 3, No. 2, 2001.
    • (2001) Law Journal of South Africa , vol.3 , Issue.2
    • Alheit, K.1
  • 8
    • 85098104946 scopus 로고    scopus 로고
    • Andrews, S., Privacy and Human Rights 2002, produced by the Electronic Privacy Information Center (EPIC), Washington, DC, and Privacy International, London, 2002. http://www. privacyinternational.org/survey/phr2002/
    • Andrews, S., Privacy and Human Rights 2002, produced by the Electronic Privacy Information Center (EPIC), Washington, DC, and Privacy International, London, 2002. http://www. privacyinternational.org/survey/phr2002/
  • 9
    • 85098144779 scopus 로고    scopus 로고
    • March
    • ARTEMIS Strategic Research Agenda, First Edition, March 2006. http://www.artemis-office.org/DotNetNuke/PressCorner/tabid/89/Default.aspx
    • (2006)
  • 10
    • 85098119881 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, Recommendation 3/97: anonymity on the Internet (WP 6), adopted on 3 December 1997, available through http://ec.europa.eu/justice:home/fsj/privacy/
    • Article 29 Data Protection Working Party, Recommendation 3/97: anonymity on the Internet (WP 6), adopted on 3 December 1997, available through http://ec.europa.eu/justice:home/fsj/privacy/
  • 11
    • 85098208365 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, Opinion on more harmonised information provisions (11987/04/EN – WP 100), adopted on 25 November 2004, available through http://ec.europa. eu/justice:home/fsj/privacy/
    • Article 29 Data Protection Working Party, Opinion on more harmonised information provisions (11987/04/EN – WP 100), adopted on 25 November 2004, available through http://ec.europa. eu/justice:home/fsj/privacy/
  • 12
    • 85098142067 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, Working document on the surveillance of electronic communications in the workplace (5401/01/EN/Final – WP 55), adopted 29 May 2002, available through http://ec.europa.eu/justice:home/fsj/privacy/
    • Article 29 Data Protection Working Party, Working document on the surveillance of electronic communications in the workplace (5401/01/EN/Final – WP 55), adopted 29 May 2002, available through http://ec.europa.eu/justice:home/fsj/privacy/
  • 13
    • 85098162510 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based web sites (5035/01/EN/Final WP 56), 30 May 2002. http://ec.europa.eu/justice: home/fsj/privacy/docs/wpdocs/2002/wp56_en.pdf
    • Article 29 Data Protection Working Party, Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based web sites (5035/01/EN/Final WP 56), 30 May 2002. http://ec.europa.eu/justice: home/fsj/privacy/docs/wpdocs/2002/wp56_en.pdf
  • 14
    • 85098150244 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party in Working document on the processing of personal data by means of video surveillance (11750/02/EN – WP 67), adopted 25 November 2002, available through http://ec.europa.eu/justice:home/fsj/privacy/
    • Article 29 Data Protection Working Party in Working document on the processing of personal data by means of video surveillance (11750/02/EN – WP 67), adopted 25 November 2002, available through http://ec.europa.eu/justice:home/fsj/privacy/
  • 15
    • 85098182784 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, Working document on biometrics (12168/02/EN – WP 80), adopted on 1 August 2003, available through http://ec.europa.eu/justice:home/fsj/privacy/
    • Article 29 Data Protection Working Party, Working document on biometrics (12168/02/EN – WP 80), adopted on 1 August 2003, available through http://ec.europa.eu/justice:home/fsj/privacy/
  • 16
    • 85098173100 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, Working document on data protection issues related to intellectual property rights (WP 104), adopted on 18 January 2005. http://ec.europa.eu/justice: home/fsj/privacy/
    • Article 29 Data Protection Working Party, Working document on data protection issues related to intellectual property rights (WP 104), adopted on 18 January 2005. http://ec.europa.eu/justice: home/fsj/privacy/
  • 17
    • 85098150801 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, Working document on data protection issues related to RFID technology (10107/05/EN – WP 105), 19 January 2005. http://ec.europa.eu/justice:home/fsj/privacy/
    • Article 29 Data Protection Working Party, Working document on data protection issues related to RFID technology (10107/05/EN – WP 105), 19 January 2005. http://ec.europa.eu/justice:home/fsj/privacy/
  • 18
    • 85098106321 scopus 로고    scopus 로고
    • Article 29 Working Party, Opinion 4/2005 on the Proposal for a Directive on the retention of Data processed in connection with the Provision of Public Electronic Communications Services and Amending Directive 2002/58/EC. http://ec.europa.eu/justice:home/fsj/privacy/workinggroup/index_en.htm
    • Article 29 Working Party, Opinion 4/2005 on the Proposal for a Directive on the retention of Data processed in connection with the Provision of Public Electronic Communications Services and Amending Directive 2002/58/EC. http://ec.europa.eu/justice:home/fsj/privacy/workinggroup/index_en.htm
  • 19
    • 85098208519 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, Opinion 5/2007 on the follow-up agreement between the European Union and the United States of America on the processing and transfer of passenger name record (PNR) data by air carriers to the United States Department of Homeland Security concluded in July 2007 (01646/07/EN-WP138). http://ec.europa.eu/justice:home/fsj/privacy/docs/wp138_en.pdf
    • Article 29 Data Protection Working Party, Opinion 5/2007 on the follow-up agreement between the European Union and the United States of America on the processing and transfer of passenger name record (PNR) data by air carriers to the United States Department of Homeland Security concluded in July 2007 (01646/07/EN-WP138). http://ec.europa.eu/justice:home/fsj/privacy/docs/wp138_en.pdf
  • 31
    • 33646907615 scopus 로고    scopus 로고
    • Freedom and privacy in Ambient Intelligence
    • , Vol., No
    • Brey, P., “Freedom and privacy in Ambient Intelligence”, Ethics and Information Technology, Vol. 7, No. 3, 2005.
    • (2005) Ethics and Information Technology , vol.7 , Issue.3
    • Brey, P.1
  • 32
    • 84929899694 scopus 로고    scopus 로고
    • Code, Control, and Choice: Why East is East and West is West
    • , Vol., No. , March, pp
    • Brownsword, R., “Code, Control, and Choice: Why East is East and West is West”, Legal Studies, Vol. 25, No. 1, March 2005, pp. 1–21.
    • (2005) Legal Studies , vol.25 , Issue.1 , pp. 1-21
    • Brownsword, R.1
  • 33
    • 85098164590 scopus 로고
    • Handbuch für die sichere Anwendung der Informationstechnik, Version 1.0
    • Bundesamt für Sicherheit in der Informationstechnik [Federal Office for Information Security], Bonn, März
    • BSI, IT-Sicherheitshandbuch: Handbuch für die sichere Anwendung der Informationstechnik, Version 1.0, BSI 7105, Bundesamt für Sicherheit in der Informationstechnik [Federal Office for Information Security], Bonn, März 1992.
    • (1992) BSI , vol.7105
  • 36
    • 85098140974 scopus 로고    scopus 로고
    • First Annual Research Report, PRIME Deliverable D16.1, 2005
    • Camenisch, J. (ed.), First Annual Research Report, PRIME Deliverable D16.1, 2005. http://www. prime-project.eu.org/public/prime_products/deliverables/rsch/pub_del_D16.1.a_ec_wp16.1_ V1_final.pdf
    • Camenisch, J.1
  • 37
    • 85098159203 scopus 로고    scopus 로고
    • Carr, S., “Wireless Tagging in Hospitals is ‘Inevitable’: Prepare to be chipped …”, silicon.com, 7 December 2004. http://hardware.silicon.com/storage/0,39024649,39126387,00.htm
    • Carr, S., “Wireless Tagging in Hospitals is ‘Inevitable’: Prepare to be chipped …”, silicon.com, 7 December 2004. http://hardware.silicon.com/storage/0,39024649,39126387,00.htm
  • 38
    • 17444413736 scopus 로고    scopus 로고
    • Privacy in Pervasive Computing Environments – A Contradiction in Terms?
    • , Vol., Issue , Spring, pp
    • Čas, J., “Privacy in Pervasive Computing Environments – A Contradiction in Terms?”, Technology and Society Magazine, IEEE, Vol. 24, Issue 1, Spring 2005, pp. 24–33.
    • (2005) Technology and Society Magazine, IEEE , vol.24 , Issue.1 , pp. 24-33
    • Čas, J.1
  • 39
    • 85098225271 scopus 로고    scopus 로고
    • Working Group on RFID: Privacy Best Practices for Deployment of RFID Technology, Interim Draft, 1 May 2006
    • CDT (Centre for democracy and technology) Working Group on RFID: Privacy Best Practices for Deployment of RFID Technology, Interim Draft, 1 May 2006, http://www.cdt.org/privacy/20060501rfid-best-practices.php
  • 41
    • 0024011426 scopus 로고
    • Information Technology and Dataveillance
    • , Vol., No. , May, pp
    • Clarke, R., “Information Technology and Dataveillance”, Communications of the ACM, Vol. 31, No. 5, May 1988, pp. 498–512.
    • (1988) Communications of the ACM , vol.31 , Issue.5 , pp. 498-512
    • Clarke, R.1
  • 44
    • 14044265519 scopus 로고    scopus 로고
    • Science and Technology Roadmapping from Industry to Public Policy
    • Da Costa, O., M. Boden, Y. Punie and M. Zappacosta, “Science and Technology Roadmapping from Industry to Public Policy”, in The IPTS Report, 73, 2003.
    • (2003) The IPTS Report , vol.73
    • da Costa, O.1    Boden, M.2    Punie, Y.3    Zappacosta, M.4
  • 46
    • 84892338843 scopus 로고    scopus 로고
    • European Data Protection and E-Commerce: Trust Enhancing?
    • in J.E.J. Prins, P. M.A. Ribbers, H.C.A. Van Tilborg, A.F.L. Veth and J.G.L. Van Der Wees (eds.), Kluwer Law International, The Hague, pp
    • De Hert, P., “European Data Protection and E-Commerce: Trust Enhancing?”, in J.E.J. Prins, P. M.A. Ribbers, H.C.A. Van Tilborg, A.F.L. Veth and J.G.L. Van Der Wees (eds.), Trust in Electronic Commerce, Kluwer Law International, The Hague, 2002, pp. 190–199.
    • (2002) Trust in Electronic Commerce , pp. 190-199
    • de Hert, P.1
  • 47
    • 85098212122 scopus 로고    scopus 로고
    • De soevereiniteit van de mensenrechten: Aantasting door de uitlevering en het bewijsrecht” [Sovereignty of human rights: Threats created by the law of extradition and by the law of evidence], Panopticon, Tijdschrift voor strafrecht
    • , Vol., No., pp
    • De Hert, P., “De soevereiniteit van de mensenrechten: aantasting door de uitlevering en het bewijsrecht” [Sovereignty of human rights: threats created by the law of extradition and by the law of evidence], Panopticon, Tijdschrift voor strafrecht, criminologie en forensisch welzijnswerk, Vol. 25, No. 3, 2004, pp. 229–238.
    • (2004) Criminologie En Forensisch Welzijnswerk , vol.25 , Issue.3 , pp. 229-238
    • de Hert, P.1
  • 49
    • 85098119709 scopus 로고    scopus 로고
    • What are the risks and what guarantees need to be put in place in a view of interoperability of the databases?”, Standard Briefing Note “JHA & Data Protection
    • January
    • De Hert, P., “What are the risks and what guarantees need to be put in place in a view of interoperability of the databases?”, Standard Briefing Note “JHA & Data Protection”, No. 1. January 2006, http://www.vub.ac.be/LSTS/pub/Dehert/006.pdf
    • (2006) No , pp. 1
    • de Hert, P.1
  • 51
    • 85098166789 scopus 로고    scopus 로고
    • “Interoperability of police databases: An accountable political choice”, International Review of Law Computers & Technology, Vol
    • , pp
    • De Hert, P., and S. Gutwirth, “Interoperability of police databases: an accountable political choice”, International Review of Law Computers & Technology, Vol. 20/no. 1–2, 2006, pp. 21–35.
    • (2006) 20/No. , vol.1-2 , pp. 21-35
    • de Hert, P.1    Gutwirth, S.2
  • 52
    • 34147170728 scopus 로고    scopus 로고
    • Privacy, data protection and law enforcement. Opacity of the individual and transparency of power
    • E. Claes, A. Duff and S. Gutwirth (eds.), pp
    • De Hert, P., and S. Gutwirth, “Privacy, data protection and law enforcement. Opacity of the individual and transparency of power” in E. Claes, A. Duff and S. Gutwirth (eds.), Privacy and the Criminal Law, Intersentia, Antwerp/Oxford, 2006, pp. 61–104.
    • (2006) Privacy and the Criminal Law, Intersentia, Antwerp/Oxford , pp. 61-104
    • de Hert, P.1    Gutwirth, S.2
  • 54
    • 85098205410 scopus 로고    scopus 로고
    • De Hert, P., and F.P. Ölcer, “Het onschadelijk gemaakte Europees privacybegrip. Implicaties voor de Nederlandse strafrechtspleging” [The notion of privacy made innocent. Implications for criminal procedure], Strafblad. Het nieuwe tijdschrift voor strafrecht, Vol. 2, No. 2, 2004, pp. 115–134
    • De Hert, P., and F.P. Ölcer, “Het onschadelijk gemaakte Europees privacybegrip. Implicaties voor de Nederlandse strafrechtspleging” [The notion of privacy made innocent. Implications for criminal procedure], Strafblad. Het nieuwe tijdschrift voor strafrecht, Vol. 2, No. 2, 2004, pp. 115–134.
  • 55
    • 79955931945 scopus 로고    scopus 로고
    • Information Technology Litigation and Software Failure
    • Law & Technology, Vol
    • Desai, M.S., J. Oghen and T.C. Richards, “Information Technology Litigation and Software Failure”, The Journal of Information, Law & Technology, Vol. 2, 2002. http://www2.warwick. ac.uk/fac/soc/law/elj/jilt/2002_2/desai/
    • (2002) The Journal of Information , vol.2
    • Desai, M.S.1    Oghen, J.2    Richards, T.C.3
  • 57
    • 85098181708 scopus 로고    scopus 로고
    • Civil liberties debate leaves much of America cold”, Reuters, published in
    • May 2006
    • Drees, C., “Civil liberties debate leaves much of America cold”, Reuters, published in The Washington Post, 18 May 2006.
    • The Washington Post
    • Drees, C.1
  • 58
    • 34548018515 scopus 로고
    • A Typology for Scenarios
    • , Vol. , February
    • Ducot, C., and G.J. Lubben, “A Typology for Scenarios”, Futures, Vol. 12, February 1980.
    • (1980) Futures , vol.12
    • Ducot, C.1    Lubben, G.J.2
  • 59
    • 85098117034 scopus 로고    scopus 로고
    • Politikbenchmarking Nachfrageorientierte Innovationspolitik
    • Edler, J. (ed.), Office for Technology Assessment at the German Parliament, Berlin
    • Edler, J. (ed.), “Politikbenchmarking Nachfrageorientierte Innovationspolitik”, Progress report No. 99, Office for Technology Assessment at the German Parliament, Berlin, 2006.
    • (2006) Progress Report , vol.99
  • 61
    • 23744439570 scopus 로고    scopus 로고
    • Universal access to ambient intelligence environments: Opportunities and challenges for people with disabilities
    • , Vol., No., pp
    • Emiliani, P.L., and C. Stephanidis, “Universal access to ambient intelligence environments: opportunities and challenges for people with disabilities”, IBM Systems Journal, Vol. 44, No. 3, 2005, pp. 605–619.
    • (2005) IBM Systems Journal , vol.44 , Issue.3 , pp. 605-619
    • Emiliani, P.L.1    Stephanidis, C.2
  • 62
    • 85098232691 scopus 로고    scopus 로고
    • Empowerment and Context Security as the route to Growth and Security”
    • Brussels, March
    • Engberg, S., “Empowerment and Context Security as the route to Growth and Security”, SWAMI Final Conference, Brussels, 21–22 March 2006.
    • (2006) SWAMI Final Conference , pp. 21-22
    • Engberg, S.1
  • 64
    • 85098179002 scopus 로고    scopus 로고
    • Philips unfurls prototype flexible display
    • Espiner, T., “Philips unfurls prototype flexible display”, ZDNet UK. http://news.zdnet.co.uk/hardware/emergingtech/0,39020357,39216111,00.htm
    • Zdnet UK
    • Espiner, T.1
  • 65
    • 85098211999 scopus 로고    scopus 로고
    • Viruses cause most security breaches
    • February 2006
    • Espiner, T., “Viruses cause most security breaches”, ZDNet UK, 28 February 2006. http://news. zdnet.co.uk/0,39020330,39254929,00.htm
    • Zdnet UK
    • Espiner, T.1
  • 70
    • 85098185253 scopus 로고    scopus 로고
    • European Commission, Science and Technology, the Key to Europe’s Future – Guidelines for Future European Union Policy to Support Research, COM(2004) 353 final, Brussels, 2004. ftp://ftp.cordis.lu/pub/era/docs/com2004_353_en.pdf
    • European Commission, Science and Technology, the Key to Europe’s Future – Guidelines for Future European Union Policy to Support Research, COM(2004) 353 final, Brussels, 2004. ftp://ftp.cordis.lu/pub/era/docs/com2004_353_en.pdf
  • 71
    • 85098110272 scopus 로고    scopus 로고
    • European Commission, Communication from the Commission to the Council and the European Parliament. The Hague Programme – Ten priorities for the next five years. The Partnership for European renewal in the field of Freedom, Security and Justice, COM(2005) 184 final
    • European Commission, Communication from the Commission to the Council and the European Parliament. The Hague Programme – Ten priorities for the next five years. The Partnership for European renewal in the field of Freedom, Security and Justice, COM(2005) 184 final.
  • 74
    • 85098226162 scopus 로고    scopus 로고
    • Communication to the Council and the European Parliament on improved effectiveness, enhanced interoperability and synergies among European databases in the area of Justice and Home Affairs, COM (2005) 597 final
    • November
    • European Commission, Communication to the Council and the European Parliament on improved effectiveness, enhanced interoperability and synergies among European databases in the area of Justice and Home Affairs, COM (2005) 597 final, Brussels, 24 November 2005.
    • (2005) Brussels , pp. 24
  • 76
    • 85098231095 scopus 로고    scopus 로고
    • Office for Official Publications of the European Communities, Luxembourg, May
    • European Commission, European Technology Platforms: Moving to Implementation, Second Status Report, Office for Official Publications of the European Communities, Luxembourg, May 2006. ftp://ftp.cordis.europa.eu/pub/technology-platforms/docs/ki7305429ecd.pdf
    • (2006) European Technology Platforms: Moving to Implementation, Second Status Report
  • 78
    • 85098151284 scopus 로고    scopus 로고
    • European Commission, Impact Assessment: Commission Staff Working Document, Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions on the Review of the EU Regulatory Framework for electronic communications networks and services, SEC(2006) 817, Brussels, 28 June 2006. http://ec.europa.eu/information_society/policy/ecomm/doc/info_centre/public_ consult/review/impactassessment_final.pdf
    • European Commission, Impact Assessment: Commission Staff Working Document, Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions on the Review of the EU Regulatory Framework for electronic communications networks and services, SEC(2006) 817, Brussels, 28 June 2006. http://ec.europa.eu/information_society/policy/ecomm/doc/info_centre/public_ consult/review/impactassessment_final.pdf
  • 79
    • 85098152908 scopus 로고    scopus 로고
    • European Commission, Communication from the Commission to the European Parliament and the Council on Promoting Data Protection by Privacy Enhancing Technologies (PETs), COM (2007) 228 final, Brussels, 2 May 2007
    • European Commission, Communication from the Commission to the European Parliament and the Council on Promoting Data Protection by Privacy Enhancing Technologies (PETs), COM (2007) 228 final, Brussels, 2 May 2007.
  • 80
    • 85098110153 scopus 로고    scopus 로고
    • European Data Protection Supervisor (EDPS), Opinion on the Proposal for a Regulation of the European Parliament and of the Council Concerning the Visa Information System (VIS) and the Exchange of Data between Member States on Short Stay-visas, COM (2004) 835 final, Official Journal C 181/27, 23 July 2005
    • European Data Protection Supervisor (EDPS), Opinion on the Proposal for a Regulation of the European Parliament and of the Council Concerning the Visa Information System (VIS) and the Exchange of Data between Member States on Short Stay-visas, COM (2004) 835 final, Official Journal C 181/27, 23 July 2005.
  • 81
    • 85098158900 scopus 로고    scopus 로고
    • European Data Protection Supervisor (EDPS), Annual Report 2005. http://www.edps.eu.int/publications/annual_report_en.htm
    • European Data Protection Supervisor (EDPS), Annual Report 2005. http://www.edps.eu.int/publications/annual_report_en.htm
  • 82
    • 85098165211 scopus 로고    scopus 로고
    • European Data Protection Supervisor (EDPS), Comments on the Communication of the Commission on Interoperability of European Databases, 10 March 2006. http://www.edps. eu.int/legislation/Comments/06-03-10_Comments_interoperability_EN.pdf
    • European Data Protection Supervisor (EDPS), Comments on the Communication of the Commission on Interoperability of European Databases, 10 March 2006. http://www.edps. eu.int/legislation/Comments/06-03-10_Comments_interoperability_EN.pdf
  • 87
    • 85098146592 scopus 로고    scopus 로고
    • Report on the Final Conference, Brussels, 21–22
    • March
    • Friedewald, M., and D. Wright (eds.), Report on the Final Conference, Brussels, 21–22 March 2006, SWAMI Deliverable D5, 2006.
    • (2006) SWAMI Deliverable D5 , pp. 2006
    • Friedewald, M.1    Wright, D.2
  • 90
    • 85098151059 scopus 로고    scopus 로고
    • Privacy Made Public: Will National Security Be the End of Individualism?
    • , Vol., No
    • Fujawa, J.M., “Privacy Made Public: Will National Security Be the End of Individualism?” Computers and Society, Vol. 35, No. 2, 2005.
    • (2005) Computers and Society , vol.35 , Issue.2
    • Fujawa, J.M.1
  • 93
    • 85098205242 scopus 로고    scopus 로고
    • García, R.A., “The General Provisions of the Charter of Fundamental Rights of the European Union”, Jean Monnet Working Paper 4/02. http://www.jeanmonnetprogram.org
    • García, R.A., “The General Provisions of the Charter of Fundamental Rights of the European Union”, Jean Monnet Working Paper 4/02. http://www.jeanmonnetprogram.org
  • 95
  • 97
    • 33751575545 scopus 로고    scopus 로고
    • Software Development, Intellectual Property, and IT Security
    • Gehring, R.A., “Software Development, Intellectual Property, and IT Security”, The Journal of Information, Law and Technology, 1/2003. http://elj.warwick.ac.uk/jilt/03-1/gehring.html
    • (2003) The Journal of Information, Law and Technology , vol.1
    • Gehring, R.A.1
  • 99
    • 84923472399 scopus 로고    scopus 로고
    • Liability for Defective Products and Services: The Netherlands”
    • , pp
    • Giensen, I., and M.B.M. Loos, “Liability for Defective Products and Services: The Netherlands”, Netherlands Comparative Law Association, 2002, pp. 75–79. http://www.ejcl.org/64/art64-6. html
    • (2002) Netherlands Comparative Law Association , pp. 75-79
    • Giensen, I.1    Loos, M.B.M.2
  • 100
    • 0009321155 scopus 로고    scopus 로고
    • The art of scenario and strategic planning: Tools and pitfalls
    • , Vol., pp
    • Godet, M., “The art of scenario and strategic planning: tools and pitfalls”, Technological Forecasting and Social Change, Vol. 65, 2000, pp. 3–22.
    • (2000) Technological Forecasting and Social Change , vol.65 , pp. 3-22
    • Godet, M.1
  • 101
    • 85098122352 scopus 로고    scopus 로고
    • Privacy and individual empowerment in the interactive age
    • in Y. Poullet, C. De Terwangne and P. Turner (eds.), Story-Scientia, Diegem
    • Goldman, J., “Privacy and individual empowerment in the interactive age” in Y. Poullet, C. De Terwangne and P. Turner (eds.), Privacy: New Risk and Opportunities, Story-Scientia, Diegem, 1997.
    • (1997) Privacy: New Risk and Opportunities
    • Goldman, J.1
  • 102
    • 0038615886 scopus 로고    scopus 로고
    • Empirical Research in on-Line Trust: A Review and Critical Assessment
    • , Vol., No., pp
    • Grabner-Kräuter, S., and E.A. Kaluscha, “Empirical Research in on-Line Trust: A Review and Critical Assessment”, International Journal of Human-Computer Studies, Vol. 58, No. 6, 2003, pp. 783–812.
    • (2003) International Journal of Human-Computer Studies , vol.58 , Issue.6 , pp. 783-812
    • Grabner-Kräuter, S.1    Kaluscha, E.A.2
  • 103
    • 25444432074 scopus 로고    scopus 로고
    • RFID and the Perception of Control: The Consumer’s View
    • , Vol., No
    • Günther, O., and S. Spiekermann, “RFID and the Perception of Control: The Consumer’s View”, Communications of the ACM, Vol. 48, No. 9, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.9
    • Günther, O.1    Spiekermann, S.2
  • 105
    • 0038086634 scopus 로고    scopus 로고
    • Rowman & Littlefield, Lanham/Boulder/ New York/Oxford, pp
    • Gutwirth, S., Privacy and the Information Age, Rowman & Littlefield, Lanham/Boulder/ New York/Oxford, 2002, pp. 5–20.
    • (2002) Privacy and the Information Age , pp. 5-20
    • Gutwirth, S.1
  • 107
    • 67650342504 scopus 로고    scopus 로고
    • Gutwirth, S., and P. De Hert, “Regulating profiling in a democratic constitutional state”, to be published in M. Hildebrandt and S. Gutwirth (eds.), Profiling the European Citizen, Springer, Dordrecht, 2008 (forthcoming)
    • Gutwirth, S., and P. De Hert, “Regulating profiling in a democratic constitutional state”, to be published in M. Hildebrandt and S. Gutwirth (eds.), Profiling the European Citizen, Springer, Dordrecht, 2008 (forthcoming).
  • 108
    • 33645657627 scopus 로고    scopus 로고
    • Increasingly, Internet’s Data Trail Leads to Court”
    • February 2006
    • Hansell, S., “Increasingly, Internet’s Data Trail Leads to Court”, The New York Times, 4 February 2006.
    • The New York Times
    • Hansell, S.1
  • 109
    • 85098217320 scopus 로고    scopus 로고
    • Hansen, M., and H. Krasemann (eds.), Deliverable D 15.1.d, July 2005
    • Hansen, M., and H. Krasemann (eds.), Privacy and Identity Management for Europe – PRIME White Paper, Deliverable D 15.1.d, 18 July 2005. http://www.prime-project.eu.org/public/prime_products/deliverables/
    • Privacy and Identity Management for Europe – PRIME White Paper
  • 111
    • 8544223437 scopus 로고    scopus 로고
    • The Distance Selling Directive: Points for Further Revision
    • , Vol., No., pp
    • Henderson, K., and A. Poulter, “The Distance Selling Directive: Points for Further Revision”, International Review for Law Computers & Technology, Vol. 16, No. 3, 2002, pp. 289–300.
    • (2002) International Review for Law Computers & Technology , vol.16 , Issue.3 , pp. 289-300
    • Henderson, K.1    Poulter, A.2
  • 116
    • 85098200937 scopus 로고    scopus 로고
    • The Precautionary Principle in the Information Society, Effects of Pervasive Computing on Health and Environment
    • February
    • Hilty, L., et al., The Precautionary Principle in the Information Society, Effects of Pervasive Computing on Health and Environment, Report of the Centre for Technology Assessment, February 2005.
    • (2005) Report of the Centre for Technology Assessment
    • Hilty, L.1
  • 117
    • 85098119615 scopus 로고    scopus 로고
    • Smart software linked to CCTV can spot dubious behaviour
    • July 2003
    • Hogan, J., “Smart software linked to CCTV can spot dubious behaviour”, New Scientist.com, 11 July 2003. http://www.newscientist.com/article.ns?id=dn3918
    • New Scientist.Com
    • Hogan, J.1
  • 118
    • 85098225699 scopus 로고    scopus 로고
    • Letter of the European Data Protection Supervisor (EDPS) to Dr W
    • June
    • Hustinx, P., Letter of the European Data Protection Supervisor (EDPS) to Dr W. Schauble, 27 June 2007. http://www.epic.org/privacy/pdf/hustinx-letter.pdf
    • (2007) Schauble , pp. 27
    • Hustinx, P.1
  • 119
    • 85098121581 scopus 로고    scopus 로고
    • Alternative Futures for the Islamic Ummah
    • undated
    • Inayatullah, S., “Alternative Futures for the Islamic Ummah”, Metafuture.org (undated). http://www.metafuture.org/Articles/AltFuturesUmmah.htm
    • Metafuture.Org
    • Inayatullah, S.1
  • 122
    • 84869135644 scopus 로고    scopus 로고
    • Information Technology – Security Techniques – Code of Practice for Information Security Management
    • International Organization for Standardization, Geneva
    • ISO/IEC 17799:2005(E), Information Technology – Security Techniques – Code of Practice for Information Security Management, International Organization for Standardization, Geneva, 2005.
    • (2005) ISO/IEC 17799:2005(E)
  • 124
    • 85098170254 scopus 로고    scopus 로고
    • Office for Official Publications of the European Communities, Luxembourg
    • IST Advisory Group, Trust, Dependability, Security and Privacy for IST in FP6, Office for Official Publications of the European Communities, Luxembourg, 2002. http://www.cordis.lu/ist/istag-reports.html
    • (2002) Security and Privacy for IST in FP6
  • 125
    • 85098121127 scopus 로고    scopus 로고
    • IST Advisory Group, K. Ducatel, M. Bogdanowicz et al., Scenarios for Ambient Intelligence in 2010, EUR 19763 EN, EC-JRC, Institute for Prospective Technological Studies (IPTS), Seville, 2001. http://www.cordis.lu/ist/istag-reports.html
    • IST Advisory Group, K. Ducatel, M. Bogdanowicz et al., Scenarios for Ambient Intelligence in 2010, EUR 19763 EN, EC-JRC, Institute for Prospective Technological Studies (IPTS), Seville, 2001. http://www.cordis.lu/ist/istag-reports.html
  • 126
    • 85098190744 scopus 로고    scopus 로고
    • Information Technology for European Advancement (ITEA) Office Association
    • 2nd edition, Eindhoven
    • ITEA Technology Roadmap for Software-Intensive Systems, 2nd edition, Information Technology for European Advancement (ITEA) Office Association, Eindhoven, 2004. www.itea-office.org
    • (2004) ITEA Technology Roadmap for Software-Intensive Systems
  • 129
    • 85098122940 scopus 로고    scopus 로고
    • Your Identity, Open to All
    • May 2005
    • Jardin, X., “Your Identity, Open to All”, Wired News, 6 May 2005. http://www.wired.com/news/privacy/0,1848,67407,00.html
    • Wired News
    • Jardin, X.1
  • 130
    • 85098187291 scopus 로고    scopus 로고
    • Electronic Eye Grows Wider in Britain
    • January 2006
    • Jordan, M., “Electronic Eye Grows Wider in Britain”, The Washington Post, 7 January 2006.
    • The Washington Post
    • Jordan, M.1
  • 131
    • 85098186952 scopus 로고    scopus 로고
    • Juels, A., D. Molnar and D. Wagner, “Security and Privacy Issues in E-passports”, ePrint Archive Cryptology Report 2005/095. http://eprint.iacr.org/
    • Juels, A., D. Molnar and D. Wagner, “Security and Privacy Issues in E-passports”, ePrint Archive Cryptology Report 2005/095. http://eprint.iacr.org/
  • 135
    • 85098223573 scopus 로고    scopus 로고
    • Kato, U., T. Hayashi, N. Umeda et al. (eds.), Flying Carpet: Towards the 4th Generation Mobile Communications Systems, Ver. 2.00, 4th Generation Mobile Communications Committee, 2004. http://www.mitf.org/public_e/archives/index.html
    • Kato, U., T. Hayashi, N. Umeda et al. (eds.), Flying Carpet: Towards the 4th Generation Mobile Communications Systems, Ver. 2.00, 4th Generation Mobile Communications Committee, 2004. http://www.mitf.org/public_e/archives/index.html
  • 136
    • 13244265620 scopus 로고    scopus 로고
    • Kawahara, Y., M. Minami, S. Saruwatari et al., “Challenges and Lessons Learned in Building a Practical Smart Space”, in The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, Boston, MA, 22–26 August 2004, pp. 213–222
    • Kawahara, Y., M. Minami, S. Saruwatari et al., “Challenges and Lessons Learned in Building a Practical Smart Space”, in The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, Boston, MA, 22–26 August 2004, pp. 213–222.
  • 137
    • 85098178939 scopus 로고    scopus 로고
    • Spyware attacks triple in 2005
    • June 2006
    • Kelly, L., “Spyware attacks triple in 2005”, Computing, 12 June 2006. http://www.vnunet.com/computing/news/2158112/spyware-attacks-triple-2005
    • Computing
    • Kelly, L.1
  • 138
    • 0345618751 scopus 로고    scopus 로고
    • Kent, S.T., and L.I. Millett (eds.), National Academies Press, Washington, DC
    • Kent, S.T., and L.I. Millett (eds.), Who Goes There? Authentication Through the Lens of Privacy. National Academies Press, Washington, DC, 2003.
    • (2003) Who Goes There? Authentication through the Lens of Privacy
  • 141
    • 85098181670 scopus 로고    scopus 로고
    • Koops, B.J., and M.M. Prinsen, “Glazen woning, transparant lichaam. Een toekomstblik op huisrecht en lichamelijke integriteit” [“Glass house, transparent body. A future view on home law and body integrity”], Nederland Juristenblad, 12 March 2005, pp. 624–630
    • Koops, B.J., and M.M. Prinsen, “Glazen woning, transparant lichaam. Een toekomstblik op huisrecht en lichamelijke integriteit” [“Glass house, transparent body. A future view on home law and body integrity”], Nederland Juristenblad, 12 March 2005, pp. 624–630.
  • 145
    • 79952059098 scopus 로고    scopus 로고
    • Hackers Break Into Computer-Security Firm’s Customer Database
    • December 2005
    • Krebs, B., “Hackers Break Into Computer-Security Firm’s Customer Database”, The Washington Post, 19 December 2005.
    • The Washington Post
    • Krebs, B.1
  • 146
    • 85098227987 scopus 로고    scopus 로고
    • Microsoft Releases Windows Malware Stats
    • June
    • Krebs, B., “Microsoft Releases Windows Malware Stats”, The Washington Post, 12 June 2006. http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
    • (2006) The Washington Post , vol.12
    • Krebs, B.1
  • 147
    • 85098120769 scopus 로고    scopus 로고
    • Invasion of the Computer Snatchers
    • February 2006
    • Krebs, B., “Invasion of the Computer Snatchers”, The Washington Post, 19 February 2006.
    • The Washington Post
    • Krebs, B.1
  • 148
    • 85098195044 scopus 로고    scopus 로고
    • Hacked Home PCs Fueling Rapid Growth in Online Fraud
    • September 2005
    • Krebs, B., “Hacked Home PCs Fueling Rapid Growth in Online Fraud”, The Washington Post, 19 September 2005. http://www.washingtonpost.com/wp-dyn/content/article/2005/09/19/AR2005091900026.html
    • The Washington Post
    • Krebs, B.1
  • 149
    • 34948830549 scopus 로고    scopus 로고
    • Consumers Not Told Of Security Breaches, Data Brokers Admit
    • April 2005
    • Krim, J., “Consumers Not Told Of Security Breaches, Data Brokers Admit”, The Washington Post, 14 April 2005.
    • The Washington Post
    • Krim, J.1
  • 150
    • 85098138244 scopus 로고    scopus 로고
    • Data on 3,000 Consumers Stolen With Computer
    • November 2005
    • Krim, J., “Data on 3,000 Consumers Stolen With Computer”, The Washington Post, 9 November 2005.
    • The Washington Post
    • Krim, J.1
  • 151
    • 85008049424 scopus 로고    scopus 로고
    • T-Engine: Japan’s Ubiquitous Computing Architecture Is Ready for Prime Time
    • , Vol., No., pp
    • Krikke, J., “T-Engine: Japan’s Ubiquitous Computing Architecture Is Ready for Prime Time”, in Pervasive Computing, Vol. 4, No. 2, 2005, pp. 4–9.
    • (2005) In Pervasive Computing , vol.4 , Issue.2 , pp. 4-9
    • Krikke, J.1
  • 152
    • 85098199743 scopus 로고    scopus 로고
    • Preventing Information Exclusion, Demos, London
    • Kruger, D., Access Denied? Preventing Information Exclusion, Demos, London, 1998.
    • (1998) Access Denied?
    • Kruger, D.1
  • 154
    • 14544292118 scopus 로고    scopus 로고
    • Privacy and Trust Issues with Invisible Computers
    • , Vol., No. , March
    • Lahlou, S., M. Langheinrich and C. Rocker, “Privacy and Trust Issues with Invisible Computers”, Communications of the ACM, Vol. 48, No. 3, March 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.3
    • Lahlou, S.1    Langheinrich, M.2    Rocker, C.3
  • 155
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems
    • in G.D. Abowd, B. Brumitt and S.A. Shafer (eds.), Springer, Berlin, pp
    • Langheinrich, M., “Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems”, in G.D. Abowd, B. Brumitt and S.A. Shafer (eds.), Proceedings of the Third International Conference on Ubiquitous Computing (Ubicomp 2001), Springer, Berlin, 2001, pp. 273–91.
    • (2001) Proceedings of the Third International Conference on Ubiquitous Computing (Ubicomp 2001) , pp. 273-291
    • Langheinrich, M.1
  • 156
    • 85098140193 scopus 로고    scopus 로고
    • The DC-Privacy Troubadour – Assessing Privacy Implications of DC-Projects”, Paper presented at the Designing for Privacy Workshop
    • Santorini, Greece
    • Langheinrich, M., “The DC-Privacy Troubadour – Assessing Privacy Implications of DC-Projects”, Paper presented at the Designing for Privacy Workshop, DC Tales Conference, Santorini, Greece, 2003.
    • (2003) DC Tales Conference
    • Langheinrich, M.1
  • 158
    • 85098193165 scopus 로고    scopus 로고
    • “Cybersecurity contests go national”, The Register, 5 June 2006. Http://www.theregister. co.uk/2006/06/05/security_contests/
    • Lemos, R., “Cybersecurity contests go national”, The Register, 5 June 2006. http://www.theregister. co.uk/2006/06/05/security_contests/. This article originally appeared at SecurityFocus. http://www.securityfocus.com/news/11394
    • This Article Originally Appeared at Securityfocus.
    • Lemos, R.1
  • 159
    • 77952992831 scopus 로고    scopus 로고
    • The Law of the Horse: What Cyberlaw Might Teach
    • , Vol., pp
    • Lessig, L., “The Law of the Horse: What Cyberlaw Might Teach”, Harvard Law Review, Vol. 133, 1999, pp. 501–546.
    • (1999) Harvard Law Review , vol.133 , pp. 501-546
    • Lessig, L.1
  • 161
    • 85098211234 scopus 로고    scopus 로고
    • Lewis, Paul, “Court victory hailed as spam stopper”, The Guardian, 28 December 2005. http://www.guardian.co.uk/uk_news/story/0,,1674316, 00.html
    • Lewis, Paul, “Court victory hailed as spam stopper”, The Guardian, 28 December 2005. http://www.guardian.co.uk/uk_news/story/0,,1674316, 00.html
  • 163
    • 85098228321 scopus 로고    scopus 로고
    • Report to the European Parliament Committee on Citizens’ Freedoms and Rights, Justice and Home Affairs (LIBE), IPTS Technical Report, Institute for Prospective Technological Studies
    • Seville
    • Maghiros, I. (ed.), Security and Privacy for the Citizen in the Post-September 11 Digital Age: A Prospective Overview, Report to the European Parliament Committee on Citizens’ Freedoms and Rights, Justice and Home Affairs (LIBE), IPTS Technical Report, Institute for Prospective Technological Studies, Seville, 2003. ftp://ftp.jrc.es/pub/EURdoc/eur20823en.pdf
    • (2003) Security and Privacy for the Citizen in the Post-September 11 Digital Age: A Prospective Overview
    • Maghiros, I.1
  • 165
    • 85098204407 scopus 로고    scopus 로고
    • Magnus, U., and H.W. Micklitz, Comparative Analysis of National Liability Systems for Remedying Damage Caused by Defective Consumer Services: A study commissioned by the European Commission, Final Report, April 2004. http://europa.eu.int/comm/consumers/cons_safe/serv_ safe/liability/reportabc_en.pdf; http://europa.eu.int/comm/consumers/cons_safe/serv_safe/liability/reportd_en.pdf
    • Magnus, U., and H.W. Micklitz, Comparative Analysis of National Liability Systems for Remedying Damage Caused by Defective Consumer Services: A study commissioned by the European Commission, Final Report, April 2004. http://europa.eu.int/comm/consumers/cons_safe/serv_ safe/liability/reportabc_en.pdf; http://europa.eu.int/comm/consumers/cons_safe/serv_safe/liability/reportd_en.pdf
  • 166
    • 85098159909 scopus 로고    scopus 로고
    • Markoff, J., “Attack of the Zombie Computers Is Growing Threat”, New York Times, 7 January 2007. http://www.nytimes.com/2007/01/07/technology/07net.html?hp&ex=1168232400 &en=60c6afb90ec2af68&ei=5094&partner=homepage
    • Markoff, J., “Attack of the Zombie Computers Is Growing Threat”, New York Times, 7 January 2007. http://www.nytimes.com/2007/01/07/technology/07net.html?hp&ex=1168232400 &en=60c6afb90ec2af68&ei=5094&partner=homepage
  • 167
    • 33745863921 scopus 로고    scopus 로고
    • A Dependability Roadmap for the Information Society in Europe
    • Masera, M., and R. Bloomfeld, A Dependability Roadmap for the Information Society in Europe, AMSD Delilverable D1.1, 2003. https://rami.jrc.it/roadmaps/amsd
    • (2003) AMSD Delilverable D1.1
    • Masera, M.1    Bloomfeld, R.2
  • 172
    • 85098172194 scopus 로고    scopus 로고
    • Foresight, Forecasting and Assessment Methods, 13–14
    • May
    • Foresight, Forecasting and Assessment Methods, 13–14 May 2004, European Commission DG JRC-IPTS, Seville, 2004. http://www.jrc.es/projects/fta/
    • (2004) European Commission DG JRC-IPTS, Seville , pp. 2004
  • 173
    • 85098217030 scopus 로고    scopus 로고
    • Handbook of Knowledge Society Foresight”, European Foundation for the Improvement of Living and Working Conditions
    • Dublin
    • Miles, I., M. Keenan and J. Kaivo-Oja, “Handbook of Knowledge Society Foresight”, European Foundation for the Improvement of Living and Working Conditions, Dublin, 2003. This handbook is available in electronic format only: http://www.eurofound.eu.int
    • (2003) This Handbook is Available in Electronic Format Only
    • Miles, I.1    Keenan, M.2    Kaivo-Oja, J.3
  • 174
    • 85098167971 scopus 로고    scopus 로고
    • Record Fine for Data Breach
    • January 2006
    • Mohammed, A., “Record Fine for Data Breach”, The Washington Post, 27 January 2006.
    • The Washington Post
    • Mohammed, A.1
  • 175
    • 34147117441 scopus 로고    scopus 로고
    • Government Increasingly Turning to Data Mining
    • June
    • Mohammed, A., and S. Kehaulani Goo, “Government Increasingly Turning to Data Mining”, The Washington Post, 15 June 2006. http://www.washingtonpost.com/wp-dyn/content/arti-cle/2006/06/14/AR2006061402063.html
    • (2006) The Washington Post , Issue.15
    • Mohammed, A.1    Kehaulani Goo, S.2
  • 176
    • 77952836196 scopus 로고    scopus 로고
    • Government Policies and Complex Product Systems: The Case of Defence Standards and Procurement
    • , Vol., No., pp
    • Molas-Gallart, J., “Government Policies and Complex Product Systems: The Case of Defence Standards and Procurement”, International Journal of Aerospace Management, Vol. 1, No. 3, 2001, pp. 268–280.
    • (2001) International Journal of Aerospace Management , vol.1 , Issue.3 , pp. 268-280
    • Molas-Gallart, J.1
  • 177
    • 14544301547 scopus 로고    scopus 로고
    • Do Consumers Understand the Role of Privacy Seals in E-Commerce?
    • , Vol., No., pp
    • Moores, T., “Do Consumers Understand the Role of Privacy Seals in E-Commerce?”, Communications of the ACM, Vol. 48, No. 3, 2005, pp. 86–91.
    • (2005) Communications of the ACM , vol.48 , Issue.3 , pp. 86-91
    • Moores, T.1
  • 178
    • 85098188804 scopus 로고    scopus 로고
    • MPHPT, Information and Communications in Japan: Building a Ubiquitous Network Society that Spreads Throughout the World, White Paper, Ministry of Public Management Home Affairs Posts and Telecommunications of Japan, Economic Research Office, General Policy Division, Tokyo, 2004. http://www.johotsusintokei.soumu.go.jp/whitepaper/eng/WP2004/2004-index. html
    • MPHPT, Information and Communications in Japan: Building a Ubiquitous Network Society that Spreads Throughout the World, White Paper, Ministry of Public Management Home Affairs Posts and Telecommunications of Japan, Economic Research Office, General Policy Division, Tokyo, 2004. http://www.johotsusintokei.soumu.go.jp/whitepaper/eng/WP2004/2004-index. html
  • 183
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as Contextual Integrity
    • , Vol., No., pp
    • Nissenbaum, H., “Privacy as Contextual Integrity”, in Washington Law Review, Vol. 79, No. 1, 2004, pp. 101–139.
    • (2004) Washington Law Review , vol.79 , Issue.1 , pp. 101-139
    • Nissenbaum, H.1
  • 185
    • 85098177226 scopus 로고    scopus 로고
    • Identity Theft Is Epidemic. Can It Be Stopped?
    • October 2004
    • O’Brien, T.L., “Identity Theft Is Epidemic. Can It Be Stopped?”, The New York Times, 24 October 2004.
    • The New York Times
    • O’Brien, T.L.1
  • 192
    • 85098190285 scopus 로고    scopus 로고
    • Online protection: A survey of consumer, industry and regulatory mechanisms and systems, 21 June 2006
    • Ofcom, Online protection: A survey of consumer, industry and regulatory mechanisms and systems, 21 June 2006. http://www.ofcom.org.uk/research/technology/onlineprotection/report.pdf
  • 194
    • 85098183866 scopus 로고    scopus 로고
    • Privacy – Identity Management, Data Protection Issues in Relation to Networked Organisations Utilizing Identity Management Systems
    • Olsen, T., T. Mahler et al., “Privacy – Identity Management, Data Protection Issues in Relation to Networked Organisations Utilizing Identity Management Systems”, LEGAL IST: Legal Issues for the Advancement of Information Society Technologies, Deliverable D11, 2005. http://193.72.209.176/default.asp?P=369&obj=P1076
    • (2005) LEGAL IST: Legal Issues for the Advancement of Information Society Technologies, Deliverable , pp. D11
    • Olsen, T.1    Mahler, T.2
  • 196
    • 33746673153 scopus 로고    scopus 로고
    • Herecast: An open infrastructure for location-based services using WiFi, Wireless and Mobile Computing, Networking and Communications
    • , pp
    • Paciga, M., and H. Lutfiyya, “Herecast: An open infrastructure for location-based services using WiFi, Wireless and Mobile Computing, Networking and Communications”, WiMob’2005, IEEE International Conference, 2005, pp. 21–28.
    • (2005) WiMob’2005, IEEE International Conference , pp. 21-28
    • Paciga, M.1    Lutfiyya, H.2
  • 197
    • 84880312225 scopus 로고    scopus 로고
    • Generic Artefacts Specification and Acceptance Criteria
    • STMicroelectronics s.r.l., Milan
    • Palmas, G., N. Tsapatsoulis, B. Apolloni et al., Generic Artefacts Specification and Acceptance Criteria, Oresteia Deliverable D01, STMicroelectronics s.r.l., Milan, 2001.
    • (2001) Oresteia Deliverable , vol.D01
    • Palmas, G.1    Tsapatsoulis, N.2    Apolloni, B.3
  • 199
    • 1242310117 scopus 로고    scopus 로고
    • The Role of System Trust in Business-to-Consumer Transactions
    • , Vol., No., pp
    • Pennington, R., H.D. Wilcox and V. Grover, “The Role of System Trust in Business-to-Consumer Transactions”, Journal of Management Information System, Vol. 20, No. 3, 2004, pp. 197–226.
    • (2004) Journal of Management Information System , vol.20 , Issue.3 , pp. 197-226
    • Pennington, R.1    Wilcox, H.D.2    Grover, V.3
  • 201
    • 85098136093 scopus 로고    scopus 로고
    • Anonymity, unobservability, pseudonymity and identity management requirements for an AmI world”
    • Brussels, March
    • Pfitzmann, A., “Anonymity, unobservability, pseudonymity and identity management requirements for an AmI world”, SWAMI Final Conference, Brussels, 21–22 March 2006.
    • (2006) SWAMI Final Conference , pp. 21-22
    • Pfitzmann, A.1
  • 202
    • 33745883087 scopus 로고    scopus 로고
    • Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology
    • February
    • Pfitzmann, A., and M. Hansen, Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology, Version v0.27, 20 February 2006. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
    • (2006) Version , vol.27 , Issue.20 , pp. v0
    • Pfitzmann, A.1    Hansen, M.2
  • 204
    • 85098149396 scopus 로고    scopus 로고
    • Traffic Hackers Hit Red Light
    • August
    • Poulsen, K., “Traffic Hackers Hit Red Light”, Wired News, 12 August 2005. http://www.wired. com/news/technology/0,1282,68507,00.html
    • (2005) Wired News , vol.12
    • Poulsen, K.1
  • 205
    • 33751023483 scopus 로고    scopus 로고
    • The Propertization of Personal Data and Identities
    • , Vol. , October
    • Prins, J.E.J., “The Propertization of Personal Data and Identities”, Electronic Journal of Comparative Law, Vol. 8.3, October 2004. http://www.ejcl.org
    • (2004) Electronic Journal of Comparative Law , vol.8 , Issue.3
    • Prins, J.E.J.1
  • 206
    • 84887364947 scopus 로고    scopus 로고
    • Fighting Untrustworthy Internet Content: In Search of Regulatory Scenarios
    • , Vol., pp
    • Prins, J.E.J., and M.H.M. Schellekens, “Fighting Untrustworthy Internet Content: In Search of Regulatory Scenarios”, Information Polity, Vol. 10, 2005, pp. 129–139.
    • (2005) Information Polity , vol.10 , pp. 129-139
    • Prins, J.E.J.1    Schellekens, M.H.M.2
  • 207
    • 33745812442 scopus 로고    scopus 로고
    • The future of Ambient Intelligence in Europe: The need for more Everyday Life
    • , Vol., pp
    • Punie, Y., “The future of Ambient Intelligence in Europe: The need for more Everyday Life”, Communications and Strategies, Vol. 57, 2005, pp. 141–165.
    • (2005) Communications and Strategies , vol.57 , pp. 141-165
    • Punie, Y.1
  • 209
    • 0034593280 scopus 로고    scopus 로고
    • Multilateral Security: A Concept and Examples for Balanced Security
    • , pp
    • Rannenberg, K., “Multilateral Security: A Concept and Examples for Balanced Security”, ACM New Security Paradigms Workshop, September 2000, pp. 151–162.
    • (2000) ACM New Security Paradigms Workshop, September , pp. 151-162
    • Rannenberg, K.1
  • 211
    • 34547637688 scopus 로고    scopus 로고
    • Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System
    • in Michael R. Baye (ed.), JAI Press, Amsterdam, pp
    • Resnick, P., and R. Zeckhauser, “Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System”, in Michael R. Baye (ed.), The Economics of the Internet and E-Commerce, Vol. 11 of Advances in Applied Microeconomics, JAI Press, Amsterdam, 2002, pp. 127–157.
    • (2002) The Economics of the Internet and E-Commerce, Vol. 11 of Advances in Applied Microeconomics , pp. 127-157
    • Resnick, P.1    Zeckhauser, R.2
  • 212
    • 0002101577 scopus 로고    scopus 로고
    • Reputation Systems: Facilitating Trust in Internet Interactions
    • , Vol., No., pp
    • Resnick, P., R. Zeckhauser, E. Friedman and K. Kuwabara, “Reputation Systems: Facilitating Trust in Internet Interactions”, Communications of the ACM, Vol. 43, No. 12, 2000, pp. 45–48. http://www.si.umich.edu/∼presnick/papers/cacm00/reputations.pdf
    • (2000) Communications of the ACM , vol.43 , Issue.12 , pp. 45-48
    • Resnick, P.1    Zeckhauser, R.2    Friedman, E.3    Kuwabara, K.4
  • 213
    • 85098179151 scopus 로고    scopus 로고
    • Suddenly, an Industry Is All Ears”
    • March 2006
    • Richtel, M., “Suddenly, an Industry Is All Ears”, The New York Times, 4 March 2006.
    • The New York Times
    • Richtel, M.1
  • 214
    • 19944389712 scopus 로고    scopus 로고
    • Consumer Perceptions of Privacy, Security and Trust in Ubiquitous Commerce
    • , Vol., No., pp
    • Roussos, G., and T. Moussouri, “Consumer Perceptions of Privacy, Security and Trust in Ubiquitous Commerce”, Personal and Ubiquitous Computing, Vol. 8, No. 6, 2004, pp. 416–429.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 416-429
    • Roussos, G.1    Moussouri, T.2
  • 216
    • 0345792391 scopus 로고    scopus 로고
    • Privacy As Intellectual Property?
    • , Vol
    • Samuelson, P., “Privacy As Intellectual Property?”, Stanford Law Review, Vol. 52, 2000.
    • (2000) Stanford Law Review , vol.52
    • Samuelson, P.1
  • 217
    • 33745811316 scopus 로고    scopus 로고
    • Report on Key Reference Scenarios
    • Foundation for Research and Technology Hellas, Institute of Computer Science, Heraklion
    • Savidis, A., S. Lalis, A. Karypidis et al., Report on Key Reference Scenarios, 2WEAR Deliverable D1, Foundation for Research and Technology Hellas, Institute of Computer Science, Heraklion, 2001.
    • (2001) 2WEAR Deliverable , vol.D1
    • Savidis, A.1    Lalis, S.2    Karypidis, A.3
  • 218
    • 0003714340 scopus 로고    scopus 로고
    • National Academy Press, Washington, DC
    • Schneider, F.B. (ed.), Trust in Cyberspace, National Academy Press, Washington, DC, 1999.
    • (1999) Trust in Cyberspace
    • Schneider, F.B.1
  • 219
    • 84889319684 scopus 로고    scopus 로고
    • Risks of Relying on Cryptography
    • , No
    • Schneier, B., “Risks of Relying on Cryptography”, Communications of the ACM 42, No. 10, 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.10
    • Schneier, B.1
  • 221
    • 70849109374 scopus 로고    scopus 로고
    • Information security: How liable should vendors be?
    • October 2004
    • Schneier, B., “Information security: How liable should vendors be?”, Computerworld, 28 October 2004. http://www.schneier.com/essay-073.html
    • Computerworld
    • Schneier, B.1
  • 222
    • 0003487308 scopus 로고    scopus 로고
    • Wiley Computer Publishing, New York
    • Schneier, B., Secrets & Lies, Wiley Computer Publishing, New York, 2000.
    • (2000) Secrets & Lies
    • Schneier, B.1
  • 223
    • 4344715558 scopus 로고    scopus 로고
    • Customers, Passwords, and Web Sites
    • , Vol., No
    • Schneier, B., “Customers, Passwords, and Web Sites”, in IEEE Security & Privacy Magazine, Vol. 2, No. 5, 2004.
    • (2004) IEEE Security & Privacy Magazine , vol.2 , Issue.5
    • Schneier, B.1
  • 228
    • 77955649104 scopus 로고    scopus 로고
    • Schreurs, W., M. Hildebrandt, E. Kindt and M. Vanfleteren, “Cogitas, ergo sum. The role of data protection law and non-discrimination law in group profiling in the private sector”, to be published in M. Hildebrandt and S. Gutwirth (eds.), Profiling the European Citizen, Springer, Dordrecht, 2008 (forthcoming)
    • Schreurs, W., M. Hildebrandt, E. Kindt and M. Vanfleteren, “Cogitas, ergo sum. The role of data protection law and non-discrimination law in group profiling in the private sector”, to be published in M. Hildebrandt and S. Gutwirth (eds.), Profiling the European Citizen, Springer, Dordrecht, 2008 (forthcoming).
  • 229
    • 85098111974 scopus 로고    scopus 로고
    • President, Symantec Corporation on Worms, Viruses and Securing Our Nation’s Computers, House Government Reform Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, Washington, DC
    • Schwarz, J., Statement of John Schwarz, President, Symantec Corporation on Worms, Viruses and Securing Our Nation’s Computers, House Government Reform Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, Washington, DC, 2003. http://reform.house.gov/UploadedFiles/Schwarz-v5.pdf
    • (2003) Statement of John Schwarz
    • Schwarz, J.1
  • 230
    • 85098145082 scopus 로고    scopus 로고
    • A Future More Nasty, Because It’s So Near”, Film review of “Code 46
    • August 2004
    • Scott, A.O., “A Future More Nasty, Because It’s So Near”, Film review of “Code 46”, The New York Times, 6 August 2004.
    • The New York Times
    • Scott, A.O.1
  • 233
    • 84900270514 scopus 로고    scopus 로고
    • New York University Press, New York
    • Solove, D.J., The Digital Person, New York University Press, New York, 2004.
    • (2004) The Digital Person
    • Solove, D.J.1
  • 236
    • 33644605740 scopus 로고    scopus 로고
    • Technology Paternalism – Wider Implications of Ubiquitous Computing
    • , Vol., No
    • Spiekermann, S., and F. Pallas, “Technology Paternalism – Wider Implications of Ubiquitous Computing”, Poiesis & Praxis, Vol. 4, No. 1, 2006.
    • (2006) Poiesis & Praxis , vol.4 , Issue.1
    • Spiekermann, S.1    Pallas, F.2
  • 238
    • 0036999904 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for Ubiquitous Computing”, first Security & Privacy Supplement to
    • April, pp
    • Stajano, F., and R. Anderson, “The Resurrecting Duckling: Security Issues for Ubiquitous Computing”, first Security & Privacy Supplement to IEEE Computer, April 2002, pp. 22–26.
    • (2002) IEEE Computer , pp. 22-26
    • Stajano, F.1    Anderson, R.2
  • 240
    • 85098172484 scopus 로고    scopus 로고
    • Data Theft at Nuclear Agency Went Unreported for 9 Months”
    • June 2006
    • Stout, D., “Data Theft at Nuclear Agency Went Unreported for 9 Months”, The New York Times, 10 June 2006.
    • The New York Times
    • Stout, D.1
  • 241
    • 14544284183 scopus 로고    scopus 로고
    • The Disappearing Computer
    • , Vol., No., pp
    • Streitz, N.A., and P. Nixon, “The Disappearing Computer”, Communications of the ACM, Vol. 48, No. 3, 2005, pp. 32–35.
    • (2005) Communications of the ACM , vol.48 , Issue.3 , pp. 32-35
    • Streitz, N.A.1    Nixon, P.2
  • 242
    • 85098204517 scopus 로고    scopus 로고
    • Sturcke, J., and agencies, “US access to flight data unlawful”, The Guardian, 30 May 2006
    • Sturcke, J., and agencies, “US access to flight data unlawful”, The Guardian, 30 May 2006.
  • 245
    • 55349137921 scopus 로고    scopus 로고
    • ‘Don’t Shoot the Messenger?’ The UK and Online Intermediary Liability
    • , Vol., No., pp
    • Sutter, G., “ ‘Don’t Shoot the Messenger?’ The UK and Online Intermediary Liability”, International Review of Law Computers & Technology, Vol. 17, No. 1, 2003, pp. 73–84.
    • (2003) International Review of Law Computers & Technology , vol.17 , Issue.1 , pp. 73-84
    • Sutter, G.1
  • 247
    • 85050497412 scopus 로고    scopus 로고
    • Government Uses Color Laser Printer Technology to Track Documents. Practice embeds hidden, traceable data in every page printed
    • November 2004
    • Tuohey, J., “Government Uses Color Laser Printer Technology to Track Documents. Practice embeds hidden, traceable data in every page printed”, PC World, 22 November 2004. http://www.pcworld.com/news/article/0,aid,118664,00.asp
    • PC World
    • Tuohey, J.1
  • 249
    • 85098220936 scopus 로고    scopus 로고
    • Trust in Cyberspace, National Research Council, National Academies Press, Washington, DC
    • [US] Committee on Information Systems Trustworthiness, Trust in Cyberspace, National Research Council, National Academies Press, Washington, DC, 1999.
    • (1999)
  • 250
    • 85098110942 scopus 로고    scopus 로고
    • [US] Committee on Radio Frequency Identification Technologies, Radio Frequency Identification Technologies: A Workshop Summary, Computer Science and Telecommunications Board, National Research Council, National Academies Press, Washington, DC, 2004. http://books. nap.edu/catalog/11189.html
    • [US] Committee on Radio Frequency Identification Technologies, Radio Frequency Identification Technologies: A Workshop Summary, Computer Science and Telecommunications Board, National Research Council, National Academies Press, Washington, DC, 2004. http://books. nap.edu/catalog/11189.html
  • 251
    • 85098160704 scopus 로고    scopus 로고
    • [US] National Telecommunications and Information Administration (NTIA), Falling through the Net: Towards Digital Inclusion. A Report on Americans’ Access to Technology Tools, US Department of Commerce, Economics and Statistics Administration, National Telecommunications and Information Administration, Washington, DC, 2000. http://search. ntia.doc.gov/pdf/fttn00.pdf
    • [US] National Telecommunications and Information Administration (NTIA), Falling through the Net: Towards Digital Inclusion. A Report on Americans’ Access to Technology Tools, US Department of Commerce, Economics and Statistics Administration, National Telecommunications and Information Administration, Washington, DC, 2000. http://search. ntia.doc.gov/pdf/fttn00.pdf
  • 252
    • 0034559541 scopus 로고    scopus 로고
    • Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model
    • , Vol., No., pp
    • Venkatesh, V., “Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model”, Information Systems Research, Vol. 11, No. 4, 2000, pp. 342–365.
    • (2000) Information Systems Research , vol.11 , Issue.4 , pp. 342-365
    • Venkatesh, V.1
  • 253
    • 85098156342 scopus 로고    scopus 로고
    • ID Theft Continues to Increase. More than 13 million Americans have been victimized, new study reveals
    • July 2003
    • Vijayan, J., “ID Theft Continues to Increase. More than 13 million Americans have been victimized, new study reveals”, Computerworld, 30 July 2003. http://www.pcworld.com/news/article/0,aid,111832,00.asp
    • Computerworld
    • Vijayan, J.1
  • 254
    • 1842487417 scopus 로고    scopus 로고
    • Vishwanath, A., “Manifestations of Interpersonal Trust in Online Interaction”, New Media and Society, Vol. 6, No. 2, 2004, pp. 224 f
    • Vishwanath, A., “Manifestations of Interpersonal Trust in Online Interaction”, New Media and Society, Vol. 6, No. 2, 2004, pp. 224 f.
  • 255
    • 85098155718 scopus 로고    scopus 로고
    • , D. Slater and G. Even-Shoshan G [Ashurst], Study on the Conditions of Claims for Damages in Case of Infringement of EC Competition Rules, commissioned by European Commission DG Competition
    • Waelbroeck, D., D. Slater and G. Even-Shoshan G [Ashurst], Study on the Conditions of Claims for Damages in Case of Infringement of EC Competition Rules, commissioned by European Commission DG Competition, 2004. http://ec.europa.eu/comm/competition/antitrust/others/actions_for_damages/study.html
    • (2004)
    • Waelbroeck, D.1
  • 258
    • 0001853125 scopus 로고
    • The Computer for the 21st Century
    • , Vol., No., pp
    • Weiser, M., “The Computer for the 21st Century”, Scientific American, Vol. 265, No. 3, 1991, pp. 94–104.
    • (1991) Scientific American , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 259
    • 84976653144 scopus 로고
    • Some Computer Science Issues in Ubiquitous Computing
    • , Vol., No., pp
    • Weiser, M., “Some Computer Science Issues in Ubiquitous Computing”, Communications of the ACM, Vol. 36, No. 7, 1993, pp. 75–85.
    • (1993) Communications of the ACM , vol.36 , Issue.7 , pp. 75-85
    • Weiser, M.1
  • 260
    • 0002054321 scopus 로고    scopus 로고
    • The Coming Age of Calm Technology”
    • in P.J. Denning and R.M. Metcalfe (eds.), Copernicus, New York
    • Weiser, M., and J.S. Brown, “The Coming Age of Calm Technology”, in P.J. Denning and R.M. Metcalfe (eds.), Beyond Calculation: The Next Fifty Years of Computing, Copernicus, New York, 1997.
    • (1997) Beyond Calculation: The Next Fifty Years of Computing
    • Weiser, M.1    Brown, J.S.2
  • 262
    • 85098179776 scopus 로고    scopus 로고
    • Whitehouse, O., GPRS Wireless Security: Not Ready for Prime Time, Research report, Stake, Boston, MA, 2002. http://www.atstake.com/research/reports/acrobat/atstake_gprs_security. pdf
    • Whitehouse, O., GPRS Wireless Security: Not Ready for Prime Time, Research report, Stake, Boston, MA, 2002. http://www.atstake.com/research/reports/acrobat/atstake_gprs_security. pdf
  • 263
    • 85098228906 scopus 로고    scopus 로고
    • Wilkinson, L., “How to Build Scenarios”, Wired 3, Special Issue. http://www.wired.com/wired/scenarios/build.html
    • Wilkinson, L., “How to Build Scenarios”, Wired 3, Special Issue. http://www.wired.com/wired/scenarios/build.html
  • 265
    • 27744516580 scopus 로고    scopus 로고
    • The dark side of ambient intelligence
    • , Vol., No. , October, pp
    • Wright, D., “The dark side of ambient intelligence”, Info, Vol. 7, No. 6, October 2005, pp. 33–51. http://www.emeraldinsight.com/info
    • (2005) Info , vol.7 , Issue.6 , pp. 33-51
    • Wright, D.1
  • 266
    • 40549122809 scopus 로고    scopus 로고
    • Alternative futures: Aml scenarios and Minority Report
    • , Vol. , June , forthcoming
    • Wright, David, “Alternative futures: Aml scenarios and Minority Report”, Futures, Vol. 40:5, June 2008 (forthcoming).
    • (2008) Futures , vol.40 , Issue.5
    • Wright, D.1
  • 267
    • 40549129976 scopus 로고    scopus 로고
    • The illusion of security
    • forthcoming
    • Wright, D., et al., “The illusion of security”, Communications of the ACM, 2008 (forthcoming).
    • (2008) Communications of the ACM
    • Wright, D.1
  • 268
    • 85098228644 scopus 로고    scopus 로고
    • WWRF, The Book of Visions 2001: Visions of the Wireless World, Version 1.0, Wireless World Research Forum, 2001. http://www.wireless-world-research.org/general_info/BoV2001-final. pdf
    • WWRF, The Book of Visions 2001: Visions of the Wireless World, Version 1.0, Wireless World Research Forum, 2001. http://www.wireless-world-research.org/general_info/BoV2001-final. pdf
  • 270
    • 85098216036 scopus 로고    scopus 로고
    • For Victims, Repairing ID Theft Can Be Grueling”, The
    • October 2005
    • Zeller, T. Jr., “For Victims, Repairing ID Theft Can Be Grueling”, The New York Times, 1 October 2005.
    • New York Times
    • Zeller, T.1
  • 271
    • 85098145777 scopus 로고    scopus 로고
    • TSA Data Dump Leads to Lawsuit
    • July 2005
    • Zetter, K., “TSA Data Dump Leads to Lawsuit”, Wired News, 14 July 2005. http://www.wired. com/news/privacy/0,1848,68560,00.html
    • Wired News
    • Zetter, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.