Abstract
In recent years, various socio-political debates and scandals have raised old and new questions regarding data protection that, among other things, will also lead to new European legislation initiatives. However relevant each issue may be, there is far too little discussion in the public which potentials, be it positive or negative, exist with the possibility of combining data from different sources. In this article I want to give a non-exhaustive overview of the manner in which such information about everyone of us is collected today, before I discuss the social risks this may entail. I close the article with some theses outlining a path that helps to protect the rights of freedom of the citizens despite the extensive collection and analysis of data (My heartfelt thanks goes to Edward Sodmann for proofreading this text. He required tons of hours to generate something from my text, that can be understood at all.).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
BVerfGE 65, 1; Az. 1 BvR 209, 269, 362, 420, 440, 484/83 (1983)
Proposal for a regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (general data protection regulation) (2012). http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52012PC0011&from=EN
Alter, A.: Your E-Book is reading you. Wall Street J. (2012). http://www.wsj.com/articles/SB10001424052702304870304577490950051438304
Altman, I.: Privace: a conceptual analysis. Environ. Behav. 8(1), 7–29 (1976)
Anderson, C.: The end of theory: the data deluge makes the scientific method obsolete. Wired 16(7) (2008)
Anderson, N.: “Anonymized” data really isn’t - and here’s why not. Ars Technica (2009). http://arstechnica.com/tech-policy/2009/09/your-secrets-live-online-in-databases-of-ruin/
Bräuchle, T.: Die datenschutzrechtliche Einwilligung in Smart Metering Systemen - Kollisionslagen zwischen Datenschutz- und Energiewirtschaftsrecht. In: Pödereder, E., Grunske, L., Schneider, E., Ull, D. (eds.) INFORMATIK 2014: Big Data - Komplexität meistern, pp. 515–526. Lecture Notes in Informatics, Gesellschaft für Informatik (2014)
Dambeck, H.: Verschollene Mitschäler: Bärgel und Creditreform retten Klassentreffen. Spiegel online (2006). http://www.spiegel.de/netzwelt/web/verschollene-mitschueler-buergel-und-creditreform-retten-klassentreffen-a-452447.html
Eikenberg, R.: Spion im Wohnzimmer - Privacy und Sicherheit bei Internet-fähigen TVs. c’t (4) (2014)
Erickson, M.: Pre-crime detection system now being tested in the U.S. (2012). http://bigthink.com/think-tank/pre-crime-detection-system-now-being-tested-in-the-us
IBM: Memphis police department reduces crime rates with IBM predictive analytics software (2010). http://www-03.ibm.com/press/us/en/pressrelease/32169.wss
Narayanan, A., Shi, E., Rubinstein, B.I.P.: Link prediction by de-anonymization: How we won the kaggle social network challenge. CoRR abs/1102.4374 (2011). http://arxiv.org/abs/1102.4374
Narayanan, A., Shmatikov, V.: How to break anonymity of the netflix prize dataset. CoRR abs/cs/0610105 (2006). http://arxiv.org/abs/cs/0610105
Rössler, B.: Der Wert des Privaten. suhrkamp taschenbuch (2001)
Statista: Anzahl der Smartphone-Nutzer in Deutschland in den Jahren 2009 bis 2014. http://de.statista.com/statistik/daten/studie/198959/umfrage/anzahl-der-smartphonenutzer-in-deutschland-seit-2010
Statista: Prognose zum weltweiten Bestand an Smartphones von 2008 bis 2017. http://de.statista.com/statistik/daten/studie/312258/umfrage/weltweiter-bestand-an-smartphones/
Sweeney, L.: Simple demographics often identify people uniquely. In: Data privacy working paper. Carnegie Mellon University (2000)
Trepte, S.: Privatsphäre aus psychologischer Sicht. In: Schmidt, J.H., Weichert, T. (eds.) Datenschutz - Grundlagen, Entwicklungen und Kontroversen, pp. 59–66. Bundeszentrale für politische Bildung (2012)
Tufekci, Z.: Ein Datensatz mit X. The European (3) (2013). http://www.theeuropean.de/zeynep-tufekci/7065-gefahren-von-big-data
Wrobel, S.: Big Data Analytics - Vom Maschinellen Lernen zur Data Science. In: Plödereder, E., Grunske, L., Schneider, E., Ull, D. (eds.) INFORMATIK 2014: Big Data - Komplexität meistern, p. 53. Lecture Notes in Informatics, Gesellschaft für Informatik (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Klingspor, V. (2016). Why Do We Need Data Privacy?. In: Michaelis, S., Piatkowski, N., Stolpe, M. (eds) Solving Large Scale Learning Tasks. Challenges and Algorithms. Lecture Notes in Computer Science(), vol 9580. Springer, Cham. https://doi.org/10.1007/978-3-319-41706-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-41706-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41705-9
Online ISBN: 978-3-319-41706-6
eBook Packages: Computer ScienceComputer Science (R0)