Ronald Meijer et al.
Conradie, P. and Choenni, S.( 2012)“ Exploring Process Barriers to Release Public Sector Information in Local Government,” in 6th International Conference on Theory and Practice of Electronic Governance, Albany. NY. Albany, New York, pp. 5‐13. Denning, D. E. and Denning, P. J.( 1979) Data Security, ACM Computing Surveys, Vpl. II, No. 3. Elster, J.( 2000) Ulysses Unbound: Studies in Rationality, Precommitment, and Constraints. Cambridge University Press. Gambetta, D.( 2000).“ Can We Trust Trust?”, in Gambetta, Diego( ed.) Trust: Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, chapter 13, pp. 213‐237. Grimsley, M. and Meehan, A.( 2007) e‐Government systems: evaluation‐led design for public value and trust. European
Journal of Information Systems, Vol 16, pp. 134‐148.
Gutmann, M., Witkowski, K., Colyer, C., O’ Rourke, J. and McNally, J.( 2008) Providing Spatial Data for Secondary Analysis: Issues and Current Practices Relating to Confidentiality. Population Research and Policy Review, Vol 27, No. 6, pp. 639‐665. Heilbron, J.( 2005) Wetenschappelijk onderzoek: dilemma ' s en verleidingen, KNAW, Amsterdam. Itani, W., Kayssi, A. and Chehab, A.( 2009)“ Privacy as a Service: Privacy‐Aware Data Storage and Processing in Cloud Computing Architectures,” in Proc. 8th IEEE Int. Conf. on Dependable, Autonomic and Secure Comput., Chengdu, China, 2009, pp. 711‐716.
Kalidien, S., Choenni, S. and Meijer, R.( 2010) Crime Statistics On Line: Potentials and Challenges, in: Public Administration Online: Challenges and Opportunities, proceedings of the 11th Annual International Conference on Digital Government Research, DG. O 2010, Puebla, Mexico, May 17‐20, ed. by S. A. chun, R. Sandoval and A. Philpot ACM Press, Digital Government Research Center, 2010, pp. 131‐137.
Kamensky, J. M,( 2009)“ Making Sense from Information Overload Governments need to apply the science of analytics to the vast amount of data they collect”,( online), Governing. Management Insights. http:// www. governing. com / columns / mgmt‐insights / Making‐Sense‐from‐Information. html
Kulk, S. and van Loenen, B.( 2012) Brave New Open Data World?, International Journal of Spatial Data Infrastructures. Vol 7, pp. 196‐206.
Kurth‐Nelson, Z. and Redish, A.( 2012) Don’ t Let Me Do That! – Models of Precommitment. Front Neurosci. 2012; 6: 138. http:// www. ncbi. nlm. nih. gov / pmc / articles / PMC3465853 /
Langheinrich, M.( 2001)“ Privacy by Design ‐ Principles of Privacy‐Aware Ubiquitous Systems,” in Gregory D. Abowd, Barry Brumitt, Steven A. Shafer( Eds.): Proceedings of the Third International Conference on Ubiquitous Computing( UbiComp 2001). LNCS No. 2201, Springer‐Verlag, pp. 273‐291, Atlanta, USA, 2001.
Levelt, W. J. M.( 2012)“ Falende wetenschap: De frauduleuze onderzoekspraktijken van sociaal‐psycholoog Diederik Stapel”( online), Tilburg University, www. foliaweb. nl / wp‐content /.../ 2012 / 11 / Eindrapport‐definitief‐16nov. pdf LinkedGov.( 2011)“ What is Open Data?”,( online), Retrieved December 8, 2011, from http:// linkedgov. org / what‐isopendata / Moore, M.( 1995) Creating Public Value: Strategic Management in Government. Cambridge, Massachusetts: Harvard
University Press. O ' Flynn, J.( 2007) ' From New Public Management to Public Value: Paradigmatic Change and Managerial Implications ',
Australian Journal of Public Administration, Vol 66, No. 3, pp. 353‐366. O’ Flynn, J.( 2005) A Public Value Framework for Contractual Governance, PUBLIC, Issue 07, ESADE Institute of Public
Management, Barcelona, December( invited contribution). Ohm, P.( 2009) Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, Social Science Research
Network. Vol 57, No. 6, pp. 1‐64. Open _ Knowledge _ Foundation.( 2011). What is open? Retrieved December 8, 2011, from http:// opendatamanual. org / what‐is‐open‐data / what‐is‐open‐data. html Rajamäki, J., Tervahartiala, J., Tervola, S., Johansson, S., Ovaska, L. and Rathod, P.( 2012) How Transparency Improves the
Control of Law Enforcement Authorities ' Activities? EISIC, pp. 14‐21. IEEE Computer Society 2012. ROB, De Raad voor het openbaar bestuur( 2012)“ Gij zult openbaar maken: Naar een volwassen omgang met overheidsinformatie”( online), http:// www. rob‐rfv. nl / documenten / boekje _ advies _ openbaarheid. pdf Schuyt, C. J. M.( 2012) Zorgvuldig en integer omgaan met wetenschappelijke onderzoeksgegevens, Advies van de KNAWcommissie onderzoeksgegevens. Amsterdam, 2012. Stanberry, B.( 1998) The legal and ethical aspects of telemedicine. 2: Data protection, security and European law. J
Telemed Telecare. 1998. Vol 4, No. 1, pp. 18‐24. Sweeney, K.( 2009). Open Data: Meaning, context and implications. Talbot, C.( 2009) Public Value ‐ The Next“ Big Thing” in Public Management?, International Journal of Public,
Administration, Vol 32, No. 3‐4, pp. 167‐170. Versmissen, J. A. G.( 2001) Achtergrondstudies en Verkenningen. Sleutels van vertrouwen van vertrouwen TTP’ S digitale certificaten en privacy. Registratiekamer, Den Haag. Williams, I. and Shearer, H.( 2011) Appraising Public Value: past, present and futures. Public Administration, Vol 89, No. 4, pp. 1367‐1384.
Zuiderwijk, A., Janssen, M., Meijer, R., Choenni, S., Charalabidis, Y. and Jeffery, K.( 2012) Issues and Guiding Principles for Opening Governmental Judicial Research Data. Proc. EGOV 2012, 11 th European Conf. On Electronic Government, Kristiansand, Norway, September 3‐6, LNCS, Springer verlag, Germany, pp. 90‐102.
336