[1]
|
A. Cavoukian, S. Taylor and M. E. Abrams, “Privacy by Design: Essential for Organizational Accountability and Strong Business Practices,” Identity in the Information Society, Vol. 3, No. 2, 2010, pp. 405-413.
doi:10.1007/s12394-010-0053-z
|
[2]
|
C. Bennett, “International Privacy Standards: Can Accountability Be Adequate?” Privacy Laws and Business International, Vol. 106, 2010, pp. 21-23.
|
[3]
|
D. Guagnin, L. Hempel and C. Ilten, “Privacy Practices and the Claim for Accountability,” In: R. Von Schomberg, Ed., Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields, Publication Office of the European Union, Luxembourg, 2011, pp. 99-110.
|
[4]
|
C. Ilten, D. Guagnin and L. Hempel, “How Can Privacy Accountability Become Part of Business Process?” Privacy Laws and Business International, No. 112, 2011, pp. 28-30.
|
[5]
|
Y. Fan, “Ethical Branding and Corporate Reputation,” Corporate Communications: An International Journal, Vol. 10, No. 4, 2005, pp. 341-350.
doi:10.1108/13563280510630133
|
[6]
|
A. Crane, “Unpacking the Ethical Product,” Journal of Business Ethics, Vol. 30, No. 4, 2001, pp. 361-373.
doi:10.1023/A:1010793013027
|
[7]
|
D. Tancock, S. Pearson and A. Charlesworth, “The Emergence of Privacy Impact Assessments,” HPL-2010-63, Technical Reports, Hewlett-Packard Laboratories, 2010.
|
[8]
|
D. Wright, “Should Privacy Impact Assessment Be Mandatory,” Communication of the ACM, Vol. 54, No. 8, 2011. pp. 121-131. doi:10.1145/1978542.1978568
|
[9]
|
I. Rubinstein, “Regulating Privacy by Design,” Berkeley Technology Law Journal, Vol. 26, 2012, pp. 1409.
|
[10]
|
A. Peters, “Soft Law as a New Mode of Governance,” In: U. Diedrichs. W. Reiners and W. Wessels, Eds., The Dynamics of Change in EU Governance, Edward Elgar Publishing, Cheltenham, 2011, pp. 21-51.
|
[11]
|
K. Martin and K. N. Plataniotis, “Privacy Protected Surveillance Using Secure Visual Object Coding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 18, No. 8, 2008, pp. 1152-1162.
|
[12]
|
A. Cavoukian, M Chibba and A. Stoianov, “Advances in Biometric Encryption: Taking Privacy by Design from Academic Research to Deployment,” Review of Policy Research, Vol. 29, No. 1, 2012, pp. 37-61.
doi:10.1111/j.1541-1338.2011.00537.x
|