Discussion on privacy issues is as old as mankind. Starting with the protection of one’s body and home, it soon evolved in the direction of controlling one’s personal information. In 1891, the American lawyers Samuel Warren and Louis Brandeis described the right to privacy in a famous article: it is the right to be let alone. In 1967 a new milestone was reached with the publication of Alan Westin’s Privacy and Freedom when he defined privacy in terms of self determination: privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.

History of privacy makes clear that there is a strong relationship between privacy and the development of technology. The modern discussion started with the use of cameras and went on to include the development and use of computers in an information society in which personal data on every individual is collected and stored. Not only is it a great concern that privacy is eroding but also that we are entering a surveillance society. This loss of privacy seems to be even more the case since the protection of privacy is strongly dependant upon the political will to protect it. Since 9/11, however, this political will world-wide is oriented more toward the effective and efficient use of technology in the battle against criminality and terrorism than it is toward protecting privacy. Therefore it is time to re-evaluate the use of technology and the protection of privacy. It is not only privacy that is at stake but above all democracy.


Data protection information information technology information society privacy self regulation surveillance society vulnerability 


  1. 1.
    Branscomb, A.W.: Who Owns Information? From Privacy to Public Access. Basic Books, New York (1994)Google Scholar
  2. 2.
    Moore Jr., B.: Studies in Social and Cultural History. M.E. Sharpe, Inc., Armonk (1984)Google Scholar
  3. 3.
    Hixson, R.F.: Privacy in a Public Society. Human Rights in Conflict. Oxford University Press, Oxford (1987)Google Scholar
  4. 4.
    Flaherty, D.H.: Privacy in Colonial New England. University Press of Virginia, Charlottesville (1972)Google Scholar
  5. 5.
    Westin, A.F.: Science, Privacy and Freedom: Issues and Proposals for the 1970’s. Part I; The Current Impact of Surveillance on Privacy, Disclosure, and Surveillance. Columbia Law Review 66, 1003–1050 (1966)CrossRefGoogle Scholar
  6. 6.
    Westin, A.F.: Science, Privacy and Freedom: Issues and Proposals for the 1970’s. Part II, Balancing the Conflicting demands of Privacy, Disclosure, and Surveillance. Columbia Law Review 66, 1205–1253 (1966)CrossRefGoogle Scholar
  7. 7.
    Westin, A.F.: Privacy & Freedom. The Bodley Head, London (1967)Google Scholar
  8. 8.
    Bates, A.: Privacy – A Useful Concept? Social Forces 42, 429–435 (1964)CrossRefGoogle Scholar
  9. 9.
    Brenton, M.: The Privacy Invaders. Coward-McCann, Inc., New York (1964)Google Scholar
  10. 10.
    Harisson, A.: The Problem of Privacy in the Computer Age, an annotated bibliography. The Rand Corporation, Santa Monica (1967)Google Scholar
  11. 11.
    Jourard, S.M.: Some Psychological Aspects of privacy. Law and Contemporary Problems 31, 307–319 (1966)CrossRefGoogle Scholar
  12. 12.
    Kalven Jr., H.: The Problem of Privacy in the Year 2000. Daedalus 93, 876–882 (1967)Google Scholar
  13. 13.
    Konvitz, M.R.: Privacy and the Law: a Philosophical Prelude. Law and Contemporary Problems 31, 272–281 (1966)CrossRefGoogle Scholar
  14. 14.
    EPIC, Privacy & Human Rights, An international Survey of Privacy Laws and Developments. Electronic Privacy and Information Centre and Privacy International, Washington (2002)Google Scholar
  15. 15.
    The Economist, Move over, Big Brother, The Economist Technology Quarterly, 26 (December 2, 2004)Google Scholar
  16. 16.
    Garson, B.: The Electronic Sweatshop, How Computers Are Transforming the Office of the Future Into the Factory of the Past. Penguin Books, New York (1988)Google Scholar
  17. 17.
    Warren, S.D., Brandeis, L.D.: The Right to Privacy. In: Adam Carlyle Breckenridge, The Right to Privacy, pp. 133–153. University of Nebraska Press, Lincoln (1970)Google Scholar
  18. 18.
    Mayer, M.F.: Right of Privacy. Law Arts Publishers, Inc., New York (1972)Google Scholar
  19. 19.
    Zelermyer, W.: Invasion of Privacy. Syracuse University Press (1959)Google Scholar
  20. 20.
    Cate, F.H.: Privacy in the Information Age. Brooking Institution Press, Washington (1997)Google Scholar
  21. 21.
    Whyte, W.H.: The Organization Man. Penguin Books, Middlesex (1956)Google Scholar
  22. 22.
    Packard, V.: The Hidden Persuaders. Penguin Books, Midddlesex (1964)Google Scholar
  23. 23.
    Ruebhausen, O.M., Brim Jr., O.G.: Privacy and Behavioral Research. Columbia Law review 65, 1184–1211 (1965)CrossRefGoogle Scholar
  24. 24.
    Warner, M., Stone, M.: The Data Bank Society. Organizations, Computers and Social Freedom. George Allen and Unwin Ltd., London (1970)Google Scholar
  25. 25.
    Miller, A.: The Assault on Privacy: Computers, Dossiers and Data Banks. The University of Michigan Press, Ann Arbor (1971)Google Scholar
  26. 26.
    Stanley, J., Steinhardt, B., Monster, B., Chains, W.: The Growth of an American Surveillance Society. American Civil Liberties Union, New York (2003)Google Scholar
  27. 27.
    Davies, S.: Big Brother at the Box Office, Electronic Visual Surveillance and the Bog Screen. In: Proceedings of the 21th International Conference on Privacy and Personal Data Protection, Hong Kong, pp. 151–160 (1999)Google Scholar
  28. 28.
    Elbirt, A.J.: Who are You? How to Protect Against Identity Theft. IEEE Technology and Society Magazin, 5–8 (2005)Google Scholar
  29. 29.
    Cavoukian, A.: Identity Theft Revisited: Security is Not Enough. Information and Privacy Commissioner, Ontario (2005)Google Scholar
  30. 30.
    Erbschloe, M., Vacca, J.: Net Privacy, A Guide to developing and implementing an ironclad ebusiness plan. McGraw-Hill, New York (2001)Google Scholar
  31. 31.
    Duquenoy, P., Masurkar, V.: Surrounded by intelligence .... In: Duquennoy, P., Fisher-Hübner, S., Holvast, J., Zuccato, A. (eds.) Risks and Challenges of the Network Society, pp. 121–134. Karlstad University Studies, Karlstad (2004)Google Scholar
  32. 32.
    The Economist, The surveillance society, May 1 (1999)Google Scholar
  33. 33.
    Evans, M.: The data-informed marketing model and its social responsibility. In: Lace, S. (ed.) The Glass Consumer, Life in a surveillance society, pp. 99–132. National Consumer Council (2005)Google Scholar
  34. 34.
    Foroohar, R.: Life in the grid. In: Newsweek, pp. 64–67, September 16-23 (2002)Google Scholar
  35. 35.
    Council of Europe, Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data, European Treaty Series No. 108, Strasbourg (1982)Google Scholar
  36. 36.
    OECD, Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, Paris (1981)Google Scholar
  37. 37.
    Directive 95/46/EC of the European Parliament and the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and the free movement of such data, Official Journal of the European Communities, 281/31-50 (1995) Google Scholar
  38. 38.
    Directive 97/66/EC of the European Parliament and the Council of 15 December 1997 concerning the processing of personal data and the protection of privacy in the telecommunications sector, Official Journal of the European Communities, 24/1-8 (1998) Google Scholar
  39. 39.
    Directive 2002/58/EC of the European Parliament and the Council of 12 July 2002, concerning the processing of personal data and the protection of privacy in the electronic communication, Official Journal of the European Communities, 201/37-47 (2002) Google Scholar
  40. 40.
    Raab, C.: Regulatory provisions for privacy protection. In: Lace, S. (ed.) The Glass Consumer, Life in a surveillance society, pp. 45–67. National Consumer Council (2005)Google Scholar
  41. 41.
    Reidenberg, J.: Technologies for Privacy Protection. Paper presented at the 23rd Internation Conference of Data Protection Commissioners, Paris (2001)Google Scholar
  42. 42.
    Chaum, D.: Security without identification: Transaction Systems to make big brother obsolete. Communications of the ACM 28, 1020–1044 (1985)CrossRefGoogle Scholar
  43. 43.
    van Rossem, H., Gardeniers, H., Borking, J., Cavoukian, A., Brans, J., Muttupulle, N., Magistrale, N.: Privacy-enhancing Technologies, The path to anonymity, vol. I and II. Registratiekamer, The Netherlands & Information and Privacy Commissioner, Ontario, Canada (1995)Google Scholar
  44. 44.
    Grodzinsky, F.S., Tavani, H.T.: Verizon vs the RIAA: Implications for Privacy and Democracy. Paper presented at ISTAS 2004, International Symposium on Technology and Society, Globalizing Technological Education (2004)Google Scholar
  45. 45.
    Brantgärde, L.: Swedish trends in Data Protection and Data Access. In: de Guchteneire, P., Mochmann, E. (eds.) Data protection and data access, pp. 105–122. North-Holland, Amsterdam (1990)Google Scholar
  46. 46.
    Computer Business Review (June 2001)Google Scholar
  47. 47.
    Burnham, D.: The Rise of the Computer State. The threat to our Freedoms, our Ethics and our democratic Process. Random House, New York (1983)Google Scholar
  48. 48.
    Flaherty, D.: The Emergence of Surveillance Societies in the Western World: Toward the Year 2000. Government Information Quarterly 4, 377–387 (1988)CrossRefGoogle Scholar
  49. 49.
    Hall, H.: Data use in credit and insurance: controlling unfair outcomes. In: Lace, S. (ed.) The Glass Consumer, Life in a surveillance society, pp. 157–186. National Consumer Council (2005)Google Scholar
  50. 50.
    Lace, S. (ed.): The Glass Consumer, Life in a surveillance society. National Consumer Council (2005)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Jan Holvast
    • 1
  1. 1.Holvast & Partner, Privacy Consultants, NL - LandsmeerThe Netherlands

Personalised recommendations