Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wim Schreurs is active.

Publication


Featured researches published by Wim Schreurs.


Profiling the European Citizen | 2008

Cogitas, Ergo Sum. The Role of Data Protection Law and Non-discrimination Law in Group Profiling in the Private Sector

Wim Schreurs; Mireille Hildebrandt; Els Kindt; Michaël Vanfleteren

This chapter focuses on the legal uncertainty regarding the applicability of data protection law in the case of profiling. This legal uncertainty stems amongst others from the definitions of personal data, data processing and data controller in EU regulations as well as from the possible exclusion of anonymous data from the applicability of data protection law. We will show that it is perfectly possible to construct and apply profiles without identifying the person concerned in the sense of data protection law. We will build our legal analysis gradually upon the three different steps that exist in the construction and application of profiles: the collection of personal data and other information to construct the profile; the construction of the profile upon personal and anonymous data and the application of a group profile to a group or an individual. For each level, we will analyse whether and how data protection law applies. We will use case law and legal doctrine in our analysis. As a result of the legal uncertainty that we find in data protection law, we will then try to find answers in privacy and anti-discrimination law, with a special focus on legislation and jurisprudence in the case of racial and ethnic profiling.


Communications of The ACM | 2008

The illusion of security

David Wright; Michael Friedewald; Wim Schreurs; Michiel Verlinden; Serge Gutwirth; Yves Punie; Ioannis Maghiros; Elena Vildjiounaite; Petteri Alahuhta

A fictional scenario of daily life in a world networked with ambient intelligence illustrates the dark side of the technology and the need for appropriate safeguards.


Archive | 2008

Threats and vulnerabilities

Pasi Ahonen; Petteri Alahuhta; Barbara Daskala; Sabine Delaitre; Paul De Hert; Ralf Lindner; Ioannis Maghiros; Anna Moscibroda; Wim Schreurs; Michiel Verlinden

In this chapter, we present a review of threats and vulnerabilities that could afflict society and individuals in the AmI world in the context of the key policy issues of privacy, identity, trust, security and digital divide. We define a threat as the potential for one or more unwanted consequences caused by a circumstance, capability, action or event that could be harmful to a system or person. Threats can be caused naturally, accidentally or intentionally. In essence, a threat is a ubiquitous phenomenon. A vulnerability is a flaw or weakness in a system’s design, its implementation, operation or management that could be exploited to violate the system and, consequently, cause a threat. Vulnerabilities may have different dimensions: technical, functional or behavioural.1


Archive | 2008

The brave new world of ambient intelligence

Pasi Ahonen; Petteri Alahuhta; Barbara Daskala; Sabine Delaitre; Paul De Hert; Ralf Lindner; Ioannis Maghiros; Anna Moscibroda; Wim Schreurs; Michiel Verlinden

This chapter provides an overview of ambient intelligence in order to set the stage for the subsequent identification and discussion of threats, vulnerabilities and safeguards In this chapter, we provide a somewhat high-level description of the key technologies that are crucial to the development and deployment of ambient intelligence. The development and deployment of AmI are being propelled by certain visions of the future, which we reference in this chapter. For the most part, the development and deployment are taking place in a rather structured context composed of visions, scenarios, roadmaps, strategic research agendas, platforms and projects. We highlight the most important of these.


Archive | 2008

Recommendations for stakeholders

Pasi Ahonen; Petteri Alahuhta; Barbara Daskala; Sabine Delaitre; Paul De Hert; Ralf Lindner; Ioannis Maghiros; Anna Moscibroda; Wim Schreurs; Michiel Verlinden

Chapter 5 identified safeguards against the threats and vulnerabilities affecting privacy, identity, trust, security and the digital divide in an AmI world. In this chapter, we offer to particular stakeholders several specific recommendations some of which flow from the safeguards identified above.


Intelligent Environments, 2006. IE 06. 2nd IET International Conference on | 2006

Safeguards in a world of ambient intelligence

loannis Maghiros; Yves Punie; Sabine Delaitre; Paul De Hert; Serge Gutwirth; Wim Schreurs; Anna Moscibroda; Michael Friedewald; Ralf Linden; David Wright; Elena Vildjiounaite; Petteri Alahuhta


Proceedings of the 11th Nordic Workshop on Secure IT-systems (NordSec 2006), Linköping, Sweden | 2006

Trusted Server Model for Privacy-Enhanced Location Based Services

Leonardo A. Martucci; Christer Andersson; Wim Schreurs; Simone Fischer-Hübner


2nd IET international conference on intelligent environments | 2006

Safeguards in a world of ambient intelligence (SWAMI)

P.J.A. de Hert; Pasi Ahonen; Petteri Alahuhta; Barbara Daskala; Sabine Delaitre; Michael Friedewald; Serge Gutwirth; Ralf Lindner; Ioannis Maghiros; Anna Moscibroda; Yves Punie; Michiel Verlinden; Wim Schreurs; Elena Vildjiounaite; David Wright


Communications of The ACM | 2008

The Illusion of Security: A fiction scenario of daily life

David Wright; Michael Friedewald; Wim Schreurs; Michiel Verlinden; Serge Gutwirth; Yves Punie; Ioannis Maghiros; Elena Vildjiounaite; Petteri Alahuhta


Keesing Journal of Documents & Identity | 2007

Machine-readable identity documents with biometric data in the EU. Overview of the legal framework.

P.J.A. de Hert; Wim Schreurs; E.R. Brouwer

Collaboration


Dive into the Wim Schreurs's collaboration.

Top Co-Authors

Avatar

Michiel Verlinden

VTT Technical Research Centre of Finland

View shared research outputs
Top Co-Authors

Avatar

Serge Gutwirth

Vrije Universiteit Brussel

View shared research outputs
Top Co-Authors

Avatar

Petteri Alahuhta

VTT Technical Research Centre of Finland

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

P.J.A. de Hert

Vrije Universiteit Brussel

View shared research outputs
Top Co-Authors

Avatar

Pasi Ahonen

VTT Technical Research Centre of Finland

View shared research outputs
Top Co-Authors

Avatar

Elena Vildjiounaite

VTT Technical Research Centre of Finland

View shared research outputs
Top Co-Authors

Avatar

Paul De Hert

Vrije Universiteit Brussel

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Els Kindt

Katholieke Universiteit Leuven

View shared research outputs
Researchain Logo
Decentralizing Knowledge