Skip to main content

Summary

Some of the most critical challenges for ‘the future of identity in the information society’ must be located in the domain of automated profiling practices. Profiling technologies enable the construction and application of group profiles used for targeted advertising, anti-money laundering, actuarial justice, etc. Profiling is also the conditio sine qua non for the realisation of the vision of Ambient Intelligence. Though automated profiling seems to provide the only viable answer for the increasing information overload and though it seems to be a promising tool for the selection of relevant and useful information, its invisible nature and pervasive character may affect core principles of democracy and the rule of law, especially privacy and non-discrimination. In response to these challenges we suggest novel types of protection next to the existing data protection regimes. Instead of focusing on the protection of personal data, these novel tools focus on the protection against invisible or unjustified profiling. Finally, we develop the idea of Ambient Law, advocating a framework of technologically embedded legal rules that guarantee a transparency of profiles that should allow European citizens to decide which of their data they want to hide, when and in which context.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Aarts, E. and Marzano, S. (2003), The New Everyday. Views on Ambient Intelligence. 010 Rotterdam, Rotterdam.

    Google Scholar 

  • Agre, P. E. and Rotenberg, M. (2001), Technology and Privacy: The New Landscape. MIT, Cambridge, Massachusetts.

    Google Scholar 

  • Altman, I. (1975), The Environment and Social Behavior. Privacy Personal Space Territory Crowding. Brooks/Cole, Montery.

    Google Scholar 

  • Anderson, C. (2008), ‘The End of Theory: The Data Deluge Makes the Scientific Method Obsolete’, Wired Magazine 16.07. Available at: http://www.wired.com/print/science/ discoveries/magazine/16-07/pb_theory.

  • Andronikou, V., Yannopoulos, A., Varvarigou, T. (2008), ‘Behavioural Biometric Profiling and Ambient Intelligence’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer, Dordrecht, pp. 89–103.

    Google Scholar 

  • Bateson, G. (1972), Steps to an Ecology of Mind. Ballantine, New York.

    Google Scholar 

  • Bellotti, V. and Sellen, A. (1993), ‘Design for Privacy in Ubiquitous Computing Environments’, Proc. of the European Conference on Computer-Supported Cooperative Work, pp. 77–92.

    Google Scholar 

  • Benoist, E. (2008), ‘Collecting Data for the Profiling of Web Users’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer, Dordrecht, pp. 169–174.

    Google Scholar 

  • Berlin, I. (1969), ‘Two concepts of liberty’, in: Berlin, I. (ed), Four essays on liberty. Oxford University Press, Oxford New York, pp. 118–173.

    Google Scholar 

  • Brownsword, R. (2005), ‘Code, control, and choice: why East is East and West is West’, Legal Studies 25:1, pp. 1–22.

    Article  Google Scholar 

  • Canhoto, A. (2008), ‘Reply: Profiles in Context: Analysis of the Development of a Customer Loyalty Programme and of a Risk Scoring Practice’, in: Hildebrandt, M. and Gut-wirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer, Dordrecht, pp. 211–216.

    Google Scholar 

  • Crossly, M., Kings, N. J., Scott, J. R. (2003), ‘Profiles — Analysis and Behaviour’, BT Technology Journal 21:1, pp. 56–66.

    Article  Google Scholar 

  • Custers, B. (2004), The Power of Knowledge. Ethical, Legal and Technological Aspects of Data Mining and Group Profiling in Epidemiology. Wolf Legal Publishers, Nijmwegen.

    Google Scholar 

  • De Hert, P. (2008), ‘The Use of Labour Law to Regulate Employer Profiling: Making Data Protection Relevant Again’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer, Dordrecht, pp. 226–237.

    Google Scholar 

  • Elmer, G. (2004), Profiling Machines: Mapping the Personal Information Economy. MIT Press, Cambridge, Massachusetts.

    Google Scholar 

  • Fayyad, U., Piatetsky-Shapiro, G., Smyth, P. (1996), ‘The KDD Process for Extracting Useful Knowledge from Volumes of Data’, Communications of the ACM 39:11, pp. 27–34.

    Article  Google Scholar 

  • Flanagan, M., Howe, D., Nissenbaum, H. (2007), ‘Emboying Values in Technology. Theory and Practice’, in: Van den Hoven, J. and Weckert, J. (eds.), Information Technology and Moral Philosophy. Cambridge University Press, Cambridge.

    Google Scholar 

  • Fritsch, L. (2008), ‘Profiling and Location-Based Services (LBS)’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer, Dordrecht, pp. 147–160.

    Google Scholar 

  • Gasson, M. and Browne, W. (2008), ‘Reply: Towards a Data Mining De Facto Standard’, in: Hildebrandt. M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer Publisher, Dordrecht, pp. 58–63.

    Google Scholar 

  • Geradts, Z. and Sommer, P. (eds.) (2008), FIDIS Deliverable D6.7: Forensic Profiling. Download: www.fidis.net.

  • Glenn, H. P. (2004), Legal Traditions of the World. Oxford, Oxford University Press, 2nd edition.

    Google Scholar 

  • Greenfield, A. (2006), Everyware: The Dawning Age of Ubiquitous Computing. New Riders Publishing, 1st edition.

    Google Scholar 

  • Halperin, R. (2008), ‘Reply: Profiling Individual and Group E-learning — Some critical Remarks’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer Publisher, Dordrecht, pp. 197–200.

    Google Scholar 

  • Hassin, R. R., Uleman, J. S., Bargh, J. A. (eds.) (2005), The new unconscious. Oxford University Press, New York.

    Google Scholar 

  • Hildebrandt, M. (2006), ‘Privacy and Identity’, in: Claes, E. et al. (eds.), Privacy and the Criminal Law. Intersentia, Antwerp- Oxford, pp. 43–58.

    Google Scholar 

  • Hildebrandt, M. (ed.) (2008), FIDIS Deliverable D7.12: Biometric Behavioural Profiling and Transparency Enhancing Tools, Download: www.fidis.net.

  • Hildebrandt, M. and Backhouse, J. (eds.) (2005), FIDIS Deliverable D7.2: Descriptive analysis and inventory of profiling practices, Download: www.fidis.net.

  • Hildebrandt, M. and Gutwirth, S. (eds.) (2005), FIDIS Deliverable D7.4: Implications of profiling practices on democracy and rule of law, Download: www.fidis.net.

  • Hildebrandt, M. and Gutwirth, S. (eds.) (2006), FIDIS Deliverable D7.5: Profiling the European Citizen. Cross-disciplinary perspectives, Download: www.fidis.net.

  • Hildebrandt, M. and Meints, M. (eds.) (2006), FIDIS Report D7.7: RFID, Profiling and AmI, Download: www.fidis.net.

  • Hildebrandt, M. and Koops, B. J. (eds.) (2007), FIDIS Report D7.9: A Vision of Ambient Law, Download: www.fidis.net.

  • Hildebrandt, M. and Gutwirth, S. (eds.) (2008), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer Publisher, Dordrecht.

    Google Scholar 

  • Hildebrandt, M., Koops, B. J., de Vries, K. (eds) (2008), FIDIS Report D7.14a: Where Idem-Identity meets Ipse-Identity. Conceptual Explorations, Download: www.fidis.net.

  • ITU (2005), The Internet of Things. Seventh Internet Report of the International Telecommunication Union.

    Google Scholar 

  • Informal High Level Advisory Group on the Future of European Home Affairs Policy (2008), Freedom, Security and Privacy — European Home Affairs in an open world (Report of the ‘The Future Group’).

    Google Scholar 

  • ISTAG (2001), Scenarios for Ambient Intelligence in 2010. Brussels. (Report of the Information Society Technology Advisory Group. Available at: http://www.cordis.lu/ist/ istagreports.htm).

  • Jaquet-Chiffelle. D. O. (2008), ‘Direct and Indirect Profiling in the Light of Virtual persons’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer, Dordrecht, pp. 34–45.

    Google Scholar 

  • Kamp, M., Körffer, B., Meints, M. (2008), ‘Profiling of Customers and Consumers — Customer Loyalty Programmes and Scoring Practices’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer, Dordrecht, pp. 201–211.

    Google Scholar 

  • Kephart, J. O. and Chess, D. M. (2003), ‘The Vision of Autonomic Computing’, IEEE Computer Society 36:1, pp. 41–50.

    Google Scholar 

  • Kindt, E. (2008), ‘Need for Legal Analysis of Biometric Profiling’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer, Dordrecht, pp. 139–145.

    Google Scholar 

  • Koops, B.J., de Vries, K. and Hildebrandt, M. (eds.) (2009), FIDIS Deliverable 7.14b: Idem-Identity and Ipse-Identity in Profiling Practices. Applying the Conceptual explorations of D7.14a, Download: www.fidis.net.

  • Kranzberg, M. (1986), ‘Technology and History: “Kranzberg’s Laws”’, Technology and Culture 27, pp. 544–560.

    Google Scholar 

  • Lasprogata, G., King, N. J., Pillay, S. (2004), Regulation of Electronic Employee Monitoring: Identifying Fundamental Principles of Employee Privacy through a Comparative Study of Data Privacy Legislation in the European Union, United States and Canada. Stan. Tech. L. Rev. 4. Available at: http://stlr.stanford.edu/STLR/Articles/04_STLR_4/idex.htm.

  • Leenes, R. E, (2008), ‘Reply: Mind My Step?’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer Publisher, Dordrecht, pp. 160–168.

    Google Scholar 

  • Leenes, R. E. and Koops, B. J. (2005), ‘“ Code” — Or How Technology is Slowly Eroding Privacy’, in: Dommering, E. and Asscher, L. (eds.), Coding Regulation. Essays on the normative role of information technology. T.M.C. Asser Press, The Hague. Available at SSRN: http://ssrn.com/abstract=661141.

    Google Scholar 

  • Lessig, L. (1999), Code and Other Laws of Cyberspace. Basic Books, New York.

    Google Scholar 

  • Lyon, D. (2003), Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. Routledge.

    Google Scholar 

  • Maturana, H. R. and Varela, F. J. (1978/1998 revised edn), The Tree of Knowledge. The Biological Roots of Human Understanding. Shambala, Boston and London.

    Google Scholar 

  • Maturana, H. R. and Varela, F. J. (1991), Autopoiesis and Cognition: The Realization of the Living. Reidel, Dordrecht.

    Google Scholar 

  • Nabeth, T. (2008), ‘User Profiling for Attention Support at School and Work’, in: Hilde-brandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer Dordrecht, pp. 185–197.

    Google Scholar 

  • Nissenbaum, H. (2004), ‘Privacy as Contextual Integrity’, Washington Law Review 79, pp. 101–139.

    Google Scholar 

  • Nguyen, D. H. and Mynatt, E. D. (2002), Privacy Mirrors: Understanding and Shaping Sociotechnical Ubiquitous Computing Systems (Georgia Institute of Technology Technical Report). Available at: www.erstwhile.org/writings/PrivacyMirrors.pdf.

    Google Scholar 

  • OECD Directorate for science, technology and industry (2007), At A crossroads. ‘Person-hood’ and Digital Identity in the Information Society. (STI Working Paper 2007/07. Available at: http://www.olis.oecd.org/olis/2007doc.nsf/ENGDATCORPLOOK/NT00005 D0E/$FILE/JT03241547.PDF).

  • Plessner, H. (1975), Die Stufen des Organischen und der Mensch. Einleitung in die philo-sophische Anthropologie. Suhrkamp, Frankfurt.

    Google Scholar 

  • Ricoeur, P. (1992), Oneself as Another. Translated by Blamey K. The University of Chicago Press, Chicago.

    Google Scholar 

  • Schreurs, W. Hildebrandt, M., Gasson, M., Warwick, K. (eds.) (2005), FIDIS Deliverable 7.3: The Report on actual and possible profiling technologies in the field of Ambient Intelligence, Download: www.fidis.net..

    Google Scholar 

  • Schreurs, W. et al (2008), ‘Cogitas, Ergo Sum. The Role of Data Protection Law and Non-Discrimination Law in Group Profiling in the Private Sector’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer, Dordrecht, pp. 241–264.

    Google Scholar 

  • Schweizer, A. (1999), Data Mining Data Warehousing — Datenschutzrechtliche Orientie-rungshilfe für Privatunternehmen. Orell Füssli Verlage, Zürich.

    Google Scholar 

  • Soenens, E. (2008), ‘Reply: Web Usage Mining for Web Personalisation in Customer Relation Management’, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen. Cross-Disciplinary Perspectives. Springer, Dordrecht, pp. 194–202.

    Google Scholar 

  • Solove, D. J. (2002), ‘Conceptualizing Privacy’, California Law Review 90:4, pp. 1087–1156.

    Article  Google Scholar 

  • Solove, D. J. (2004), The digital Person. Technology and Privacy in the Information Age. NYU Press New York.

    Google Scholar 

  • Sunstein, C. (2001), Republic.com. Princeton University Press, Princeton and Oxford.

    Google Scholar 

  • Treiblmaier, H. et al. (2004), ‘Evaluating Personalization and Customization from an Ethical point of View: an empirical study’, Proceedings of the 37th Hawaii International Conference on System Science. IEEE Computer Society, Big Island, HI, USA.

    Google Scholar 

  • Vedder, A. (1999), ‘KDD: The challenge to individualism’, Ethics and Information Technology 1:4, pp. 275–281.

    Article  Google Scholar 

  • Won, K. (2002), ‘Personalization: Definition, Status and challenges ahead’, Journal of Object Technology 1:1, pp. 29–40. Available at www.jot.fm/issues/issue_2002_05/column3.

    Google Scholar 

  • Zarsky, T. Z. (2002-2003), ‘“Mine Your Own Business”: Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion’, Yale Journal of Law and Technology 5.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Hildebrandt, M. (2009). Profiling and AmI. In: Rannenberg, K., Royer, D., Deuker, A. (eds) The Future of Identity in the Information Society. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01820-6_7

Download citation

Publish with us

Policies and ethics