表中的内容
Chapter 1: Introduction (written by the editors).- Part I: Setting the stage .- Chapter 2: Different notions of surveillance in healthcare;Samantha Adams.- Chapter 3: The European legal framework for personal data in health; Nadezhda Purtova.- Part II: Personal health, privacy and autonomy: an uneasy relationship.- Chapter 4: Unravelling Unobtrusiveness in m Health Design and Use and implications for user’s autonomy; Maartje Niezen.- Chapter 5: e Health and Privacy in U.S. Employer Wellness Programs; Anna Slomovic.- Chapter 6: Sleeping information: describing circuits of knowledge in apps for self-management of sleep disorders;Federica Lucivero, Maartje Niezen and Samantha Adams.- Part III: Surveillance practices for risk management .- Chapter 7: Profiling anomalies, anomalies of profiling: At the crossroads of risk assessments on Dutch youth and the European da Chapter 1: Introduction (written by the editors).- Part I: Setting the stage .- Chapter 2: Different notions of surveillance in healthcare;Samantha Adams.- Chapter 3: The European legal framework for personal data in health; Nadezhda Purtova.- Part II: Personal health, privacy and autonomy: an uneasy relationship.- Chapter 4: Unravelling Unobtrusiveness in m Health Design and Use and implications for user’s autonomy; Maartje Niezen.- Chapter 5: e Health and Privacy in U.S. Employer Wellness Programs; Anna Slomovic.- Chapter 6: Sleeping information: describing circuits of knowledge in apps for self-management of sleep disorders;Federica Lucivero, Maartje Niezen and Samantha Adams.- Part III: Surveillance practices for risk management .- Chapter 7: Profiling anomalies, anomalies of profiling: At the crossroads of risk assessments on Dutch youth and the European data protection regime; Karolina La Fors-Owcinik.- Chapter 8: Selling passive monitoring to manage risk in independent living: Frontline workers in a bind ; Clara Berridge.- Chapter 9: Setting the Context: Use of CCTV inside Mental Health Wards in England; Suki Desai and Majid Yar.- Chapter 10: Veillance and electronic medical records in disease management programs in the Netherlands; Bethany Hipple Walters.- Part IV: (Health) Data for public good .- Chapter 11: Entitled to Privacy: economic perspective on use of health data; Ignacio Cofone.- Chapter 12: Big Data, the e-health bubble and its fix ;Winfried Tilanus.- Chapter 13: Conclusions and reflections (written by editors).ta protection regime; Karolina La Fors-Owcinik.- Chapter 8: Selling passive monitoring to manage risk in independent living: Frontline workers in a bind ; Clara Berridge.- Chapter 9: Setting the Context: Use of CCTV inside Mental Health Wards in England; Suki Desai and Majid Yar.- Chapter 10: Veillance and electronic medical records in disease management programs in the Netherlands; Bethany Hipple Walters.- Part IV: (Health) Data for public good .- Chapter 11: Entitled to Privacy: economic perspective on use of health data; Ignacio Cofone.- Chapter 12: Big Data, the e-health bubble and its fix ;Winfried Tilanus.- Chapter 13: Conclusions and reflections (written by editors).