Author of the publication

From Unsolicited Communications to Unsolicited Adjustments.

, , and . Data Protection in a Profiled World, Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The legal construction of privacy and data protection., and . Comput. Law Secur. Rev., 29 (5): 522-530 (2013)Privacy and the Information Age. Rowman & Littlefield Publishers, Inc., Lanham, (2002)Safeguards in a World of Ambient Intelligence (SWAMI), , , , , , , , , and 5 other author(s). (2006)Legal safeguards for privacy and data protection in ambient intelligence., , , , and . Pers. Ubiquitous Comput., 13 (6): 435-444 (2009)From Unsolicited Communications to Unsolicited Adjustments., , and . Data Protection in a Profiled World, Springer, (2010)Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power, and . Privacy and the Criminal Law, page 61--104. Antwerpen, Oxford, Intersentia, (2006)Reinventing Data Protection?, , , , and . (2009)Deliverable D1: Legal, social, economic and ethical conceptualisations of privacy and data protection, , , , , , , and . PRECIENT, (März 2011)Sorting out smart surveillance., , , , , , , , and . Comput. Law Secur. Rev., 26 (4): 343-354 (2010)Beyond Accountability, the Return to Privacy?, and . Managing Privacy through Accountability, Palgrave Macmillan, (2012)