Advertisement

Protection of Privacy and Data Protection in Aviation Security

  • Olga Mironenko Enerstvedt
Chapter
  • 815 Downloads
Part of the Law, Governance and Technology Series book series (LGTS, volume 37)

Abstract

As discussed, the notions of privacy and data protection are central for this research. In order to analyse the impact of a particular aviation security measure on privacy and data protection and particular consequences in the Special Part, it should be explained how the terms “privacy” and “data protection” will be used in this research, how they are connected and how the interests that they denote are regulated.

Table of Legislation and Other Legal Texts

International

  1. OECD Recommendation Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, 11 July 2013 (OECD Privacy Framework 2013)Google Scholar

European Union

  1. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (DPD).Google Scholar

UK

  1. Data Protection Act 1998.Google Scholar

Reference Books and Articles

  1. Badii, Atta et al. “Visual context identification for privacy-respecting video analytics”. Multimedia Signal Processing (MMSP), 2012 IEEE 14th International Workshop on. IEEE, 2012.Google Scholar
  2. Bygrave, Lee A. “Data protection pursuant to the right to privacy in human rights treaties”. International Journal of Law and Information Technology 6 (1998): 247–84.CrossRefGoogle Scholar
  3. Bygrave, Lee A. “Privacy Protection in a Global Context – A Comparative Overview”. Scandinavian studies in law 47 (2004): 319–48.Google Scholar
  4. Bygrave, Lee A. “Privacy and Data Protection in an International Perspective”. Scandinavian Studies in Law, ISSN 0085-5944 (2010): 165–200.Google Scholar
  5. Bygrave, Lee A. Data privacy law: an international perspective. Oxford: Oxford University Press, 2014.CrossRefGoogle Scholar
  6. Carli, Vivien. Assessing CCTV as an Effective Safety and Mangement Tool for Crime-solving, Prevention and Reduction. International Centre for the Prevention of Crime, 2008.Google Scholar
  7. Clarke, Roger. “What’s Privacy?” Prepared for a Workshop at the Australian Law Reform Commission on 28 July 2006. Version of 7 August 2006. http://www.rogerclarke.com/DV/Privacy.html
  8. Cunningham, Brian. “Big Brother is watching EU: As the US moves towards privacy reform, Europe enacts sweeping new spying powers”. 20 May 2015. http://www.politico.eu/article/eu-privacy-surveillance-us-leads-act/
  9. Finn, Rachel et al.”Seven types of privacy”. In: European data protection: coming of age. Springer Netherlands, 2013: 3–32.Google Scholar
  10. Gavison, Ruth. “Privacy and the Limits of Law”. Yale LJ. 89 (1979): 421–471.CrossRefGoogle Scholar
  11. Gellert, Raphaël and Serge Gutwirth. “The legal construction of privacy and data protection”. Computer Law & Security Review 29 (2013): 522–30.CrossRefGoogle Scholar
  12. Grant, Hazel. “Data protection 1998–2008”. Computer Law & Security Review 25.1 (2009): 44–50.CrossRefGoogle Scholar
  13. Hijmans, Hielke and Alfonso Scirocco. “Shortcomings in EU data protection in the third and the second pillars. Can the Lisbon Treaty be expected to help”. Common Market Law Review 46.5 (2009): 1485–1525.Google Scholar
  14. Hijmans, Hielke. “Recent developments in data protection at European Union level”. ERA Forum. Vol. 11. No. 2. Springer-Verlag, 2010.Google Scholar
  15. Izmailova, N.S. Privacy in civil law: the law of the UK, the USA and Russia. Moscow, 2009.Google Scholar
  16. Joinson, Adam N. and Carina B. Paine. “Self-disclosure, privacy and the Internet”. The Oxford handbook of Internet psychology (2007): 237–252.Google Scholar
  17. Kilkelly, Ursula. “The right to respect for private and family life”. In: Human Rights Handbook, Council of Europe, 2001.Google Scholar
  18. Kovaleva, Natalia. Informational Law of Russia. Moscow: Dashkov and K., 2007.Google Scholar
  19. Leese, Matthias. “Blurring the dimensions of privacy? Law enforcement and trusted traveler programs”. Computer Law & Security Review 29 (2013): 480–90.CrossRefGoogle Scholar
  20. Nissenbaum, Helen. “Privacy as contextual integrity”. Wash. L. Rev 79 (2004): 119.Google Scholar
  21. Nissenbaum, Helen. Privacy in context. Stanford, Calif., 2010.Google Scholar
  22. Privacy International. European Privacy and Human Rights, 2011.Google Scholar
  23. Raab, Charles. “Effects of surveillance on privacy, autonomy and dignity”. Deliverable D1.1: Surveillance, fighting crime and violence. Increasing Resilience in Surveillance Societies (IRISS) (ed.), 2012a.Google Scholar
  24. Schneier, Bruce. Schneier on security. Indianapolis, Indiana, 2008.Google Scholar
  25. Solove, Daniel. Understanding privacy. Cambridge, 2008c.Google Scholar
  26. Tavani, Herman T. “Philosophical theories of privacy: Implications for an adequate online privacy policy”. Metaphilosophy 38 (2007): 1–22.CrossRefGoogle Scholar
  27. Tirosh, Yofi and Michael Birnhack. “Naked in Front of the Machine: Does Airport Scanning Violate Privacy?” Ohio State Law Journal 74 (2013): 6.Google Scholar
  28. Warren, Samuel and Louis Brandeis. “The Right to Privacy”. Harvard Law Review 4 (1890): 193–220.CrossRefGoogle Scholar
  29. Woodward, John D. Privacy vs. Security: Electronic Surveillance in the Nation’s Capital. Rand, 2002.Google Scholar
  30. Wright, David et al. “Questioning surveillance”. Computer Law & Security Review 31 (2015): 280–92.CrossRefGoogle Scholar
  31. Zoufal, Donald. “Someone to watch over me?” Privacy and governance strategies for CCTV and emerging surveillance technologies. Naval Postgraduate School, Monterey CA, 2008.Google Scholar

Reports and Other Resources

  1. Council of Europe (2010) Data Protection. Compilation of Council of Europe texts. Strasbourg, 2010.Google Scholar
  2. EPIC (2008) EPIC Framework for Protecting Privacy & Civil Liberties If CCTV Systems Are Contemplated, 2008.Google Scholar
  3. Increasing Resilience in Surveillance Societies (IRISS) (2013). Deliverable D2.3: The Legal Perspective, 2013.Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Olga Mironenko Enerstvedt
    • 1
  1. 1.Aviation and ICT Law ConsultingLanghusNorway

Personalised recommendations