Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9580))

Abstract

In recent years, various socio-political debates and scandals have raised old and new questions regarding data protection that, among other things, will also lead to new European legislation initiatives. However relevant each issue may be, there is far too little discussion in the public which potentials, be it positive or negative, exist with the possibility of combining data from different sources. In this article I want to give a non-exhaustive overview of the manner in which such information about everyone of us is collected today, before I discuss the social risks this may entail. I close the article with some theses outlining a path that helps to protect the rights of freedom of the citizens despite the extensive collection and analysis of data (My heartfelt thanks goes to Edward Sodmann for proofreading this text. He required tons of hours to generate something from my text, that can be understood at all.).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. BVerfGE 65, 1; Az. 1 BvR 209, 269, 362, 420, 440, 484/83 (1983)

    Google Scholar 

  2. Proposal for a regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (general data protection regulation) (2012). http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52012PC0011&from=EN

  3. Alter, A.: Your E-Book is reading you. Wall Street J. (2012). http://www.wsj.com/articles/SB10001424052702304870304577490950051438304

  4. Altman, I.: Privace: a conceptual analysis. Environ. Behav. 8(1), 7–29 (1976)

    Article  MathSciNet  Google Scholar 

  5. Anderson, C.: The end of theory: the data deluge makes the scientific method obsolete. Wired 16(7) (2008)

    Google Scholar 

  6. Anderson, N.: “Anonymized” data really isn’t - and here’s why not. Ars Technica (2009). http://arstechnica.com/tech-policy/2009/09/your-secrets-live-online-in-databases-of-ruin/

  7. Bräuchle, T.: Die datenschutzrechtliche Einwilligung in Smart Metering Systemen - Kollisionslagen zwischen Datenschutz- und Energiewirtschaftsrecht. In: Pödereder, E., Grunske, L., Schneider, E., Ull, D. (eds.) INFORMATIK 2014: Big Data - Komplexität meistern, pp. 515–526. Lecture Notes in Informatics, Gesellschaft für Informatik (2014)

    Google Scholar 

  8. Dambeck, H.: Verschollene Mitschäler: Bärgel und Creditreform retten Klassentreffen. Spiegel online (2006). http://www.spiegel.de/netzwelt/web/verschollene-mitschueler-buergel-und-creditreform-retten-klassentreffen-a-452447.html

  9. Eikenberg, R.: Spion im Wohnzimmer - Privacy und Sicherheit bei Internet-fähigen TVs. c’t (4) (2014)

    Google Scholar 

  10. Erickson, M.: Pre-crime detection system now being tested in the U.S. (2012). http://bigthink.com/think-tank/pre-crime-detection-system-now-being-tested-in-the-us

  11. IBM: Memphis police department reduces crime rates with IBM predictive analytics software (2010). http://www-03.ibm.com/press/us/en/pressrelease/32169.wss

  12. Narayanan, A., Shi, E., Rubinstein, B.I.P.: Link prediction by de-anonymization: How we won the kaggle social network challenge. CoRR abs/1102.4374 (2011). http://arxiv.org/abs/1102.4374

  13. Narayanan, A., Shmatikov, V.: How to break anonymity of the netflix prize dataset. CoRR abs/cs/0610105 (2006). http://arxiv.org/abs/cs/0610105

  14. Rössler, B.: Der Wert des Privaten. suhrkamp taschenbuch (2001)

    Google Scholar 

  15. Statista: Anzahl der Smartphone-Nutzer in Deutschland in den Jahren 2009 bis 2014. http://de.statista.com/statistik/daten/studie/198959/umfrage/anzahl-der-smartphonenutzer-in-deutschland-seit-2010

  16. Statista: Prognose zum weltweiten Bestand an Smartphones von 2008 bis 2017. http://de.statista.com/statistik/daten/studie/312258/umfrage/weltweiter-bestand-an-smartphones/

  17. Sweeney, L.: Simple demographics often identify people uniquely. In: Data privacy working paper. Carnegie Mellon University (2000)

    Google Scholar 

  18. Trepte, S.: Privatsphäre aus psychologischer Sicht. In: Schmidt, J.H., Weichert, T. (eds.) Datenschutz - Grundlagen, Entwicklungen und Kontroversen, pp. 59–66. Bundeszentrale für politische Bildung (2012)

    Google Scholar 

  19. Tufekci, Z.: Ein Datensatz mit X. The European (3) (2013). http://www.theeuropean.de/zeynep-tufekci/7065-gefahren-von-big-data

  20. Wrobel, S.: Big Data Analytics - Vom Maschinellen Lernen zur Data Science. In: Plödereder, E., Grunske, L., Schneider, E., Ull, D. (eds.) INFORMATIK 2014: Big Data - Komplexität meistern, p. 53. Lecture Notes in Informatics, Gesellschaft für Informatik (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Volker Klingspor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Klingspor, V. (2016). Why Do We Need Data Privacy?. In: Michaelis, S., Piatkowski, N., Stolpe, M. (eds) Solving Large Scale Learning Tasks. Challenges and Algorithms. Lecture Notes in Computer Science(), vol 9580. Springer, Cham. https://doi.org/10.1007/978-3-319-41706-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41706-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41705-9

  • Online ISBN: 978-3-319-41706-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics