You are here: Resources > FIDIS Deliverables > Profiling > D7.7: RFID, Profiling, and AmI > 

D7.7: RFID, Profiling, and AmI

Electronic Product Code (EPC)  Title:
 Abbreviations & Glossary




Legal texts 


Convention of the Council of Europe for the protection of individuals with regard to automatic processing of personal data, Council of Europe, European Treaty Series No. 108, Strasbourg, 28/01/1981.


Convention on Cybercrime, Budapest, 23.XI.2001. Available at


Convention of Rome on the Law applicable to contractual obligations opened for signature in Rome on 19 June 1980 (80/934/EEC), Official Journal L 266, 09/10/1980 p. 0001 - 0019


Council Directive 1999/34/EC of the European Parliament and of the Council of 10 May 1999, Official Journal L 141 , 04/06/1999, p. 0020 – 0021.


Council Framework Decision 2005/222/JHA of 24 February 2005 on attacks against information systems, Official Journal L69/67, 16.3.2005.


Council Regulation (EC) No 44/2001 of 22 December 2000 on jurisdiction and the recognition and enforcement of judgments in civil and commercial matters, Official Journal L 012 , 16/01/2001 p. 0001 – 0023.


Council Directive 85/374/EEC of 25 July 1985 on the approximation of the laws, regulations and administrative provisions of the Member States concerning liability for defective products, Official Journal L 210 , 07/08/1985 p. 0029 – 0033.


Council Directive 93/13/EEC of 5 April 1993 on unfair terms in consumer contracts. Official Journal L 095, 21/04/1993 P. 0029 – 0034.


Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (‘Directive on electronic commerce’) Official Journal L 178, 17/07/2000 P. 0001 – 0016.


Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. Official Journal L 13, 19/01/2000. P. 0012 -0020.


Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal, L 281/31 – L 281/39. 


Directive 2006/24/Ec of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC, Official Journal L105/54, 13.4.2006.




Bibliographical References 


ACM Newstrack, ‘Embedded Risks’, Communications of the ACM, Assn. For Computing Machinery, New York, 2006,


Alheit, K., ‘The applicability of the EU Product Liability Directive to Software’, The Comparative and International Law Journal of South Africa, Vol. 3, No. 2 , University of South Africa, Institute of Foreign and Comparative Law, Pretoria, 2001, pp. 188 - 209.


Art. 29 Data Protection Working Party, Working document on data protection issues related to RFID technology, WP105, 19 January 2005, Available at;


Art 29 Data Protection Working Party, Working document on the surveillance of electronic communications in the workplace, WP 55, 29 May 2002.


Art 29. Data Protection Working Party, Opinion 8/2001, WP 48, 13 September 2001.


Averill, J.R, ‘Personal control over aversive stimuli and its relationship to Stress’, Psychological Bulletin, Vol. 80, Apa Journals, Washington, 1973, pp. 286-303.


Audio-ID Center, ‘Technology Guide’, 2003, pp 24. Download via


Backhouse, J., (Ed.). ‘Structured Account of Approaches on Interoperability’, FIDIS Work package 4, Deliverable D4.2, 2005.


Bandura, A., ‘Human agency in social cognitive theory’, American Psychologist, Vol. 44, No. 9, Apa Journals, Washington, 1989, pp. 1175-1184.


Bijker, W.E, Hughes, T.P., Pinch, T. (Eds), The social construction of technological systems, New Directions in the Sociology and History of Technology, MA, MIT Press, Cambridge, 1987.


Bijker, W.E., ‘The Social Construction of Fluorescent Lighting, Or how an Artifact Was Invented in its Diffusion Stage’, in Bijker W.E. and Law J. (Eds.) Shaping Technology/building society. Studies in sociotechnical change, MIT Press, Cambridge, 1997, pp. 75 – 104.


Bimber, B., ‘Three Faces Of Technological Determinism’, in Smith, M. R,. , Marx, L., (Eds.), Does Technology Drive History? The Dilemma of Technological Determinism, MIT Press, Cambridge, 1994, pp. 79 – 100.


Bohn, L. et al., ‘Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing’, Institute for Pervasive Computing, ETH Zurich, Switzerland, 2004, p. 24. Available at:


Boone, T., ‘Can Bar Codes and RFID Co-Exist?’, Inbound Logistics, IT Matters, December 2005. Available at:


Borking, J., ‘Der Identity Protector’, Datenschutz und Datensicherheit, Vieweg Verlag, Wiesbaden, 11/1996, pp. 654-658.


Borking, J., Raab, C. D., ‘Laws, PETs and Other Technologies for Privacy Protection’, The Journal of Information, Law and Technology, Vol. 1, Universities of Warwick and Strathclyde, United Kingdom, , 2001. Available at:


Busch, D., ‘Indirect Representation and the Lando Principles. An Analysis of Some Problem Areas from the Perspective of English Law’, Electronic Journal of Comparative Law, Vol. 2, No. 3, December 1998.


Brutsaert, H., Sociologie., Derde Editie, Vakgroep Sociologie Universiteit Gent, 1995.


Callon, M., ‘Techno-economic network and irreversibility’, in Law J. (eds.), A sociology of monsters. Essays on power, technology and domination, Routledge, London, 1991, pp. 132-164.


Capgemini, ‘RFID and Consumers: What European Consumers Think About Radio Frequency Identification and the Implications for Business’, Report of Capgemini, 2005. Available at:


Davis, F. D., ‘Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology’, MIS Quarterly, Vol. 13, No. 3, Management Information Systems Research Center, Minnesota, 1989, pp. 319-340.


Delaney, H., Van de Zande, R., (eds.), A Guide to the EU Directive Concerning Liability for Defective Products (Product Liability Directive), 2001, pp 1. Available at:


Department of Commerce Washington D.C., ‘Radio Frequency Identification. Opportunities and challenges in Implementation’, Department of Commerce, Washington DC, April 2005.  


Desai, M.S., Oghen, J., Richards, T.C., ‘Information Technology Litigation and Software Failure’, The Journal of Information, Law & Technology, Vol. 2, Universities of Warwick and Strathclyde, United Kingdom, 2002. Available at:


Die Zeit, ‘Soll das Auto die Werkstatt alarmieren?’, Nr.45, ZEIT Online-GmbH (Die Zeit),Oxford, 03.11.2005. Available at: (accessed on 16th of May 2006).


Eckfeldt, B., ‘What Does RFID Do for the Consumer’, Communications of the ACM, Vol. 48, No. 9, Assn. For Computing Machinery, New York, 2005, pp. 77-79.


eGov monitor, ‘Q&A: Viviane Reding, EU Commissioner for Information Society and Media’, Published on 27 March 2006, Knowledge Asset Management Limited, London, 2006. Available at: (accessed on 3 April 2006).


European Data Protection Supervisor (EDPS), ‘Annual Report 2004’, available online at


European Data Protection Supervisor (EDPS), ‘Annual Report 2005’., Available at:


European Group on Ethics of Science and New Technologies, ‘Ethical aspects of the ICT implants in the human body’, Opinion, No. 20, March 2005. Available at:


European Group on Tort Law. ‘Principles of European Tort Law, Text and Commentary.’,SpringerWienNewYork, 2005. Available at:


Finke, T., Kelter, H., Abhörmöglichkeiten der Kommunikation zwischen Lesegerät und Transponder am Beispiel eines ISO14443-Systems, Bonn, 2004. Available at:


Finkenzeller, K., RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, Second Edition, Wiley & Sons, Australia, 2003.


Fishkin, K. P., Sumit, R., ‘Enhancing RFID Privacy via Antenna Energy Analysis’, MIT RFID Privacy Workshop, MIT Media Lab, Cambridge, November 2003. Also Intel Research Seattle Technical Memo IRS-TR-03-012, November 2003.


Fleck, M. et al., ‘From Informing to Remembering: Ubiquitous Systems in Interactive Museums’, IEEE Pervasive Computing, Vol.1, No. 2, IEEE Computer Society, April 2002, pp. 13-21.


Floerkemeier, C., Schneider, R., Langheinrich, M., ‘Scanning with a purpose – Supporting the Fair Information Principles in RFID-Protocols, Zurich, 2004. Available at:


Friedewal, M., Da Costa, O. (Eds.), ‘Science and Technology Roadmapping: Ambient Intelligence in Everyday Life (AmI@Life)’, final report of the JRC-IPTS/ESTO project “Ambient Intelligence in Everyday Life Roadmap,”, Seville, 2003. Available at:


Friedewald, M., Lindner, R., Wright D. (eds.), ‘Threats, Vulnerabilities and Safeguards in Ambient Intelligence’, SWAMI project Deliverable D3, 2006. Available at


Garfinkel, S.L., Juels, A., Pappu, R., ‘RFID privacy: an overview of problems and proposed solutions’, IEEE Security and Privacy, Vol. 3, No. 3, IEEE Computer Society Press, May-June 2005, pp. 34-43.


Garfinkel, S.L., Rosenberg B. (eds). RFID: Applications, Security, and Privacy, Addison-Wesley Professional, Boston, 2005.


Garreau, J., Radical Evolution. The Promise and Peril of Enhancing Our Minds, Our Bodies – and What It Means to Be Human, Double Day, New York 2005.


Gasson, M., Meints, M., Warwick, K. (eds.), FIDIS Deliverable D3.2 – A Study on PKI and Biometrics, 2005. Available at:


Greenfield, A., Everyware. The dawning age of ubiquitous computing, New Riders, Berkeley 2006.


Gossett, S., ‘Paying for Drinks with Wave of the Hand - Clubs Goers in Spain Get Implanted chips for ID Payment Purposes’, World Net Daily 2004. Available at: 


Gripenberg, P., ‘ICT and the shaping of Society. Exploring Human – ICT relationships in everyday life’, Publications of the Swedish School of Economics and Business Administration, nr. 143, 2005.


Günther, O., Spiekermann, S., ‘RFID and the perception of control: the consumer’s view’, Communications of the ACM, Vol. 48, No. 9, Assn. For Computing Machinery, New York, September 2005, pp. 73 - 76. Available at:


Hanseth, O., Monteiro, E., ‘Socio-technical webs and actor network theory, chapter 6 of Understanding Information Infrastructure, 1998. Available at: (accessed on


Hilty, L. et al., ‘The Precautionary Principle in the Information Society, Effects of Pervasive Computing on Health and Environment’, Report of the Centre for Technology Assessment, February 2005.


Howcroft, D., Mitev, N., Wilson, N., ‘What we may learn for the social shaping of technology approach’, in Mingers, J., Willcocks, L. (eds.) Social theory and philosophy for information systems; Wiley and Sons ltd., Australia, 2004, pp. 329 – 371.


Hsi, S., Fait, H., ‘RFID enhances visitors’ museum experience at the Exploratorium’, Communications of the ACM, Vol. 48, No. 9, Assn. For Computing Machinery, New York,


Ingdahl, W., ‘RFID in the euro notes?’, The Sprout, May 2004. Available at:

Integrated Silicon Design Pty Ltd., ‘Training Manual’, Adelaide, Australia, 1996.


Italian DPA (Garante per la protezione dei dati personali), ‘Loyalty cards and safeguards for the consumers: guidelines applying to loyalty programmes’, Web No. 1109624, dated 24 February 2005. Available at:


ITU, ‘The Internet of things’, ITU Internet Reports 2005, 7th edition. Available at :


Jay, R., Hamilton, A., Data Protection- law and Practice, Sweet & Maxwell, London, 2003, chapter 3 -39.


Juels, A. and Brainard, J.,‘Soft Blocking: Flexible Blocker Tags on the Cheap’, in De Capitani di Vimercati, S., Syverson P., (eds), Workshop on Privacy in the Electronic Society (WPES), 2004.


Juels, A., Rivest, R. L., Szydlo, M., ‘The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy’, 8th ACM Conference on Computer and Communications Security, ACM Press, Washington, 2003, pp 103- 111.


Knospe, H., Pohl, H., ‘RFID Security’, Information Security Technical Report, Vol. 9, No. 4, Elsevier Ltd., Oxford, 2004, p 30 – 41. Available at:


Kafka, F., The Trial, translation by Breon Mitchell, Schocken, New York, 1999


Latour, B., Reassembling the Social- An Introduction to Actor-Network-Theory, Clarendon Lectures in Management Studies, Oxford University Press, USA, 2005.


Law, J., Hassard, J., (Eds), Actor Network Theory and after, Blackwell Publishers/The Sociological Review, Oxford, UK, 1999.


Lee, H., et al., ‘Privacy threats and issues in mobile RFID’, ARES conference, Vienna, April 2006.


Legal IST, ‘Legal issues of RFID technology’, 2006, p 30. Available at: 


Liebenau, J. and Backhouse J., Understanding Information: An Introduction, Macmillan Press, Basingstoke and London, 1990.


Locquenghien von, K., ‘On the Potential Social Impact of RFID-Containing Every-day Objects’, Science, Technology and Innovation Studies, Vol.2, 57-78.


Lyon, D., ‘Identity Card: social sorting by database’, Internet Issue Brief No. 3, Oxford Internet Institute, November 2004.


MacKenzie, D., Wajcman, J., The social shaping of technology: how the refrigerator got its hum . Open University Press, Philadelphia, 1985.


Magnus, U., Micklitz, H.W., Institut Für Europaïsches Wirtschafts- Und Verbraucherrecht E.V. From Berlin (View), ‘Comparative Analysis of National Liability Systems for Remedying Damage Caused by Defective Consumer Services’, A study commissioned by the European Commission, Final Report, April 2004. Part A: General Part. Part B: Survey over the Contract and Tort Liability in the Reported Legal Systems. Part C: The Specific Part – Medical Services, Leisure, Tourism and Public Utilities. Part C is available at:


Meints, M., Hansen, M. (Eds.), ‘Study on ID Documents’, FIDIS Work package 3, Deliverable D3.6, Frankfurt a.M., 2006. Available at:


Meints, M., ‘Protokollierung bei Identitätsmanagementsystemen’, Datenschutz und Datensicherheit, Vieweg Verlag, Wiesbaden, 5/ 2006, pp. 304-307,.


Metro Group Future Store Initiative, ‘The Future begins now. Technologien’, January 17th 2006. Available at: 


Miedema, F., Post, B., Evaluatie pilot elektronische volgsystemen, IST, Nijmegen, January 2006.


Molnar D., Stapleton-Gray, R., Wagner, D., ‘Killing, Recoding and Beyond’, Chapter 23 of Garfinkel S., Rosenberg, B., RFID Applications, Security and Privacy, Addison Wesley Professional, Boston, 2005.


Molnar, D., Soppera, A., Wagner, D., ‘Privacy for RFID Through Trusted Computing’ Workshop on Privacy in the Electronic Society – WPES, Alexandria, Virginia, USA, ACM Press, November 2005.


Monteiro E. ‘Actor Network theory and information infrastructure’, in Ciborra, C.U., (Ed.), From Control to Drift, Oxford University Press, Oxford, 2000, pp. 71-86, Available at : (accessed on 10th of March 2006).


Mullen D., Moore, B., ‘Automatic Identification and Data Collection: What the future Holds’, Chapter 1 of Garfinkel, S., Rosenberg B., (Eds.), RFID Applications, Security and Privacy, Addison-Wesley Professional, Boston, 2005, pp. 608.


Natarajan V., Balasubramanian A., Mishra S., Sridhar R., ‘Security for Energy Constrained RFID System’, Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID’05), 2005.


National Academy of Engineering, ‘Technically speaking, What has been done? The international experience’, The National Academy of Sciences, USA, 2006. Available at:


Neumann, P.G., Weinstein, L., ‘Inside Risks: Risks of RFID’, Communications of the ACM, Vol. 49, No. 5, Assn. For Computing Machinery, New York, May 2006, pp. 136.


Pinch, T., Bijker, W.E.,‘The social construction of facts and artifacts: or how the sociology of science and technology might benefit each other’, in Bijker, W;E., Hughes, T.P., Pinch, T., (eds), The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology; MA MIT Press, Cambridge, 1987, pp. 399-441.


Punie Y., ‘A social and technological view of Ambient Intelligence in Everyday Life: What bends the trend?’ The European Media and Technology in Everyday Life Network, EMTEL2; Key Deliverable Work Package 2 September 2003EC DG JRC IPTS, Sevilla (EUR 20975), 2003.


Punie, Y., et al., ‘Dark scenarios on ambient intelligence – Highlighting risks and vulnerabilities’, SWAMI project, deliverable 2, January 2006.


Reed, Ch. and Welterveden A., ‘Liability’, in Reed, Ch., and Angel, J. (Eds.): Computer Law, Fourth Edition, Blackstone, London, 2000, pp. 101 - 130.


RFID Journal, ‘General RFID Information, FAQ Will RFID replace bar codes?Available at

RFID Journal, ‘RFID for Your Shopping Cart’, July 2003. Available at:

Rieback, M. R. Crispo, B., Tanenbaum, A. S., ‘RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management.’ Proc. 10th Australasian Conference on Information Security and Privacy. (ACISP 2005), Brisbane, Australia, July 2005. Available at


Rieback, M.R., et al., Is your Cat infected with a Computer Virus?’, Fourth Annual IEEE International Conference on Pervasive Computing and Communications, 2006. PerCom 2006, Los Alamitos, IEEE Computer Society, 2006. pp. 169-179. Available at:


Rieback, M.R, et al., ‘Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags’, Proceedings of SPW 2005, Cambridge, 2005. Available at:


Rip, A., ‘Science and Technology Studies and Constructive Technology Assessment’, EASST Review, European Association for the Study of Science and Technology, Surrey, September 1994. Available at: (accessed on 8th of June 2006) .


Robey, D., ‘The paradoxes of transformation’, in Sauer, C., Yetton, P.W. (eds.), Steps to the Future: Fresh thinking on the management of IT based organizational transformation, Jossey Bass Publications, San Fransisco, 1997, pp. 209-229.


Rötzer, F., ‘Der erste RFID-Virus wurde präsentiert’, Telepolis, March 15, 2006. Available at:


Royer, D. (ed.), Deliverable D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity, Work Package 11, 2006. Available at:


Schermer, B., ‘Criminaliteit en RFID’, in Zwenne, G.J., Schermer, B., (eds.), Privacy en andere juridische aspecten van RFID, Elsevier Juridisch, ‘s-Gravenhage, 2005, pp. 83-96.


Schreurs, W., Hildebrandt, M., Gasson, M., Warwick, K., ‘Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence’, FIDIS Work Package 7, Deliverable D7.3, 2005, p 68. Available at:


Singsangob, A., Computer Software and Information Licensing in Emerging Markets, The Need for Viable Legal Framework, Kluwer Law International, Alphen a/d rijn and London, 2003.


Smith, M. R., Marx, L., (Eds.), Does Technology Drive History? The Dilemma of Technological Determinism, MIT Press, Cambridge, 1994.


Solove, D., The Digital Person: Technology And Privacy In The Information Age, New York University Press, New York, 2004.


Spiekermann, S., ‘Perceived Control: Scales for Privacy in Ubiquitous Computing Environments’, 10th International Conference on User Modelling, Edinburgh, Scotland, July 2005. Available at:


Spiekermann, S., Rothensee, M., ‚‘Soziale und psychologische Bestimmungsfaktoren des Ubiquitous Computing’, Humboldt-Universität, Berlin, July 2005. Available at:

Spychips.Com, ‘Future Store Overview’, Background Metro “Future Store” Special Report. Available at:

Spychips.Com, ‘Scandal: The RFID Tag Hidden in METRO’s Loyalty Card’, The METRO "Future Store", Special Report. Available at:


Stamper, R., et al., ‘Understanding the roles of signs and norms in organizations-a semiotic approach to information systems design’, Behavior and Information Technology, Vol. 19, No. 1, Taylor and Francis, Abingdon, 2000, pp 15-28.


STREP, ‘NO-REST, Networked Organisations – Research into Standards and Standardisation’, IST, D07–Report on ‘The Dynamics of Standards I: Research Findings’, 2005.


Sunstein, C.,, Princeton University Press, Princeton and Oxford, 2001.


Sunstein, C., Laws of Fear: Beyond the Precautionary Principle, Cambridge University Press, Cambrigde, 2005.


Tien, L., ‘Doors, Envelopes, and Encryption: The Uncertain Role of Precautions in Fourth Amendment Law’, DePaul Law Review, Vol. 54, DePaul University College of Law, Chicago, 2005, pp. 873-908.


Van Eecke, P., Skouma, G., ‘RFID and Privacy: A difficult Marriage?’, in Paulus, S., Pohlmann, N., Reimer , H., (eds.), ISSE 2005 Securing Electronic Business Processes – Highlights of the Information Security Solutions Europe 2005 Conference, Vieweg ISSE, 2005, pp. 169-178.


Von Bar C., Lando, O., Swann, S., ‘Communication on European Contract Law: Joint Response of the Commission on European Contract Law and the Study Group on a European Civil Code’, European Review of Private Law, Vol. 10, No. 2, Wolters Kluwer, Alphen a/d rijn London, 2002, pp. 183 –248.


Verbeek, P-P., What Things do. Philosophical Reflections on Technology, Agency, and Design, The Pennsylvania State University Press, Pennsylvania, 2005



Verein zur Förderung des öffentlichen bewegten und unbewegten Datenverkehrs e.V, ‘Der Metro-Skandal’. Available at:


Weiser, M., ‘Some Computer Science Issues in Ubiquitous Computing’, CACM, Vol. 36, No. 7, Assn. For Computing Machinery, New York, July 1993, pp. 74- 84, available at:,


Williams, R., Edge, D., ’The social shaping of technology’, Research Policy, Vol. 25, No. 6, Elsevier, Amsterdam and London, 1996, pp. 856 – 899.




Electronic Product Code (EPC)  fidis-wp7-del7.7.RFID_Profiling_AMI_02.sxw  Abbreviations & Glossary
Denis Royer 42 / 43