Profiling Practices - References

References

  • Anderson, Chris (2008). "The End of Theory: The Data Deluge Makes the Scientific Method Obsolete". Wired Magazine 16 (7).
  • Custers, B.H.M. (2004). The Power of Knowledge. Tilburg:Wolf Legal Publishers
  • Elmer, G. (2004). Profiling Machines. Mapping the Personal Information Economy. MIT Press
  • Fayyad, U.M.; Piatetsky-Shapiro, G.; Smyth, P. (1996). "From Data Mining to Knowledge Discovery in Databases". AI Magazine 17 (3): 37–54.
  • Geradts, Zeno; Sommer, Peter (2008). "D6.7c: Forensic Profiling". FIDIS Deliverables 6 (7c).
  • Harcourt, B. E. (2006). Against Prediction. Profiling, Policing, and Punishing in an Actuarial Age. The University of Chicago Press, Chicago and London
  • Hildebrandt, Mireille; Gutwirth, Serge (2008). Profiling the European Citizen. Cross Disciplinary Perspectives. Springer, Dordrecht. doi:10.1007/978-1-4020-6914-7. ISBN 978-1-4020-6913-0
  • Jaquet-Chiffelle, David-Olivier (2008). "Reply: Direct and Indirect Profiling in the Light of Virtual Persons. To: Defining Profiling: A New Type of Knowledge?". In Hildebrandt, Mireille; Gutwirth, Serge. Profiling the European Citizen. Springer Netherlands. pp. 17–45. doi:10.1007/978-1-4020-6914-7_2.
  • Kephart, J. O.; Chess, D. M. (2003). "The Vision of Autonomic Computing". Computer 36 (1 January): 96–104. doi:10.1109/MC.2003.1160055.
  • Leopold, N.; Meints, M. (2008). "Profiling in Employment Situations (Fraud)". In Hildebrandt, Mireille; Gutwirth, Serge. Profiling the European Citizen. Springer Netherlands. pp. 217–237. doi:10.1007/978-1-4020-6914-7_12.
  • Lessig, L. (2006). Code 2.0. Basic Books, New York
  • Lyon, D. (2003). Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. Routledge
  • Nabeth, Thierry (2008). "User Profiling for Attention Support for School and Work". In Hildebrandt, Mireille; Gutwirth, Serge. Profiling the European Citizen. Springer Netherlands. pp. 185–200. doi:10.1007/978-1-4020-6914-7_10.
  • Schwartz, P. (2000). "Beyond Lessig's Code for the Internet Privacy: Cyberspace Filters, Privacy-Control and Fair Information Practices". Wis. Law Review 743: 743–788.
  • Solove, D.J. (2004). The Digital Person. Technology and Privacy in the Information Age. New York, New York University Press.
  • Steinbock, D. (2005). "Data Matching, Data Mining, and Due Process". Georgia Law Review 40 (1): 1–84.
  • Vedder, A. (1999). "KDD: The Challenge to Individualism". Ethics and Information Technology 1 (4): 275–281. doi:10.1023/A:1010016102284.
  • Weiser, M. (1991). "The Computer for the Twenty-First Century". Scientific American 265 (3): 94–104.
  • Zarsky, T. (2002-3). ""Mine Your Own Business!": Making the Case for the Implications of the Data Mining or Personal Information in the Forum of Public Opinion". Yale Journal of Law and Technology 5 (4): 17–47.

Read more about this topic:  Profiling Practices