42 Hits in 7.8 sec

Dark and Bright Patterns in Cookie Consent Requests

Paul Graßl, Hanna Schraffenberger, Frederik Zuiderveen Borgesius, Moniek Buijzen
2021 Journal of Digital Social Research  
Overall, our findings suggest that many current implementations of cookie consent requests do not enable meaningful choices by internet users, and are thus not in line with the intention of the EU policymakers  ...  In two preregistered online experiments we investigated the effects of three common design nudges (default, aesthetic manipulation, obstruction) on users' consent decisions and their perception of control  ...  ACKNOWLEDGEMENTS We would like to thank the reviewers for their valuable comments to improve the manuscript.  ... 
doi:10.33621/jdsr.v3i1.54 fatcat:pvdxn3mxwnezjb5xq37hnxe6sy

The Law of Facebook: Borders, Regulation and Global Social Media

Veronica Shleina, Elaine Fahey, Kate Klonick, Natalia Menéndez, Andrew D. Murray, Maria Tzanou
2020 Social Science Research Network  
It is not prohibited under EU law but the placing of cookies and the processing of data both require a users' consent, covered possibly by the ePrivacy Directive (as to direct marketing) and the GDPR (  ...  The clients should also state expressly whether they permit or not to utilise this feature. Opting in takes one click, compared to opting out which is a three-step process.  ... 
doi:10.2139/ssrn.3683438 fatcat:q3lomsihbvgktiw2bynervbn24

Anonymity Versus Privacy in a Control Society

Rachel Melis
2019 Journal of Critical Library and Information Studies  
The main purpose of this article is conceptual. I consider what the practice of anonymity can offer that privacy does not.  ...  are co-opted by both the market and the state.  ...  In other contexts, such as service contracts, one's choice becomes a false choice; an "illusion of voluntariness." 74 Once a critical mass of participation is reached, there is no opting out of the system  ... 
doi:10.24242/jclis.v2i2.75 fatcat:ylb4fpwjubdwndp5sgcme3tkze

Slave to the Algorithm? Why a Right to Explanationn is Probably Not the Remedy You are Looking for

Lilian Edwards, Michael Veale
2017 Social Science Research Network  
We argue that other parts of the GDPR related (i) to the right to erasure ("right to be forgotten") and the right to data portability; and (ii) to privacy by design, Data Protection Impact Assessments  ...  and certification and privacy seals, may have the seeds we can use to make algorithms more responsible, explicable, and humancentered.  ...  Online, it is of limited protection, at best pushing controllers to more consumer-friendly consent collection such as opt-in rather than opt-out. 71 GDPR, art. 9(2)(a).  ... 
doi:10.2139/ssrn.2972855 fatcat:nqqo4xmminc4bkp76mwnrbhgeu

Complying with the GDPR when vulnerable people use smart devices

Stanislaw Piasecki, Jiahong Chen
2022 International Data Protecion Law  
through references made to the Information Commissioner's Office guidelines and reports. • Complying with the GDPR provisions related to the processing of vulnerable people's data would be beneficial  ...  focuses on children and inherently vulnerable adults, and analyses how to comply with the General Data Protection Regulation (GDPR) when the latter use smart products, with a particular focus on the UK  ...  A balancing exercise is often implicitly required by the GDPR to be carried out by controllers. 95 Fair balancing is to be defined and evaluated on a case-by-case basis.  ... 
doi:10.1093/idpl/ipac001 fatcat:bs52vlf3hrdstnpxrxxkshbeiu

Towards improving existing online social networks' privacy policies

Alexandra K. Michota, Sokratis K. Katsikas
2018 International Journal of Information Privacy Security and Integrity  
Further, as serious mismatches between these privacy policies and the adherence criteria set out in the ISO 29100:2011 standard were identified, a data lifecycle model is proposed as the basis for an improved  ...  standard, and to propose improvements based on the findings of the assessment.  ...  The 'how can I manage or delete information about me?'  ... 
doi:10.1504/ijipsi.2018.092062 fatcat:u24vlwe52zhotkqehja7eyc2em

Explanations of news personalisation across countries and media types

Mariella Bastian, Mykola Makhortykh, Jaron Harambam, Max van Drunen
2020 Internet Policy Review  
opting out of a specific form of personalisation because advertisement and news personalisation are not differentiated from each other).  ...  However, at that time, the GDPR had not yet been introduced, and its presence might have led to different results.  ... 
doi:10.14763/2020.4.1504 fatcat:6ngtqvi45zgubccrthqrh64y74

Conclusion: What Next for Privacy Seals? [chapter]

Rowena Rodrigues
2018 Privacy and Data Protection Seals  
It asks: Can subscribers opt out of direct marketing use of their directory data? If yes: Can they opt out free of charge? How is effect given to such a choice?)  ...  purposes, ISIS/TS recommends that the customer should be given the option to opt-in as opposed to the option to opt-out (although 'opt-out' may in certain circumstances be acceptable).  ...  allow only a limited number of opt outs before customer registration becomes mandatory. 51 Right to object free of charge to the processing of their personal data in cases of direct marketing (explicit  ... 
doi:10.1007/978-94-6265-228-6_9 fatcat:mpex6asr7bcwnmu7bazvkyblje

Net Neutrality matters: Privacy antibodies for information monopolies and mass profiling | Neutralidade da rede importa: anticorpos de privacidade para monopólios de informação e profiling em massa

Gianluigi M. Riva, Marguerite Barry
2019 Publicum  
The discussion addresses the monopolistic economic position of platforms, their connected revenue models and the power to control and influence information.  ...  The ability to deliver different search engine results, news feeds, discriminatory prices, and so forth, can be exploited to grant unequal access to different kinds of content.  ...  Acknowledgements This research was funded under the EU Horizon 2020 scheme of Marie Sklodowska-Curie Action grant agreement No. 722561.  ... 
doi:10.12957/publicum.2019.47199 fatcat:shy3sgzaq5fetg7qc6rl2e6jfi

The Selfless Exercise of Jurisdiction to Protect Human Rights and the Environment [chapter]

Cedric Ryngaert
2020 Selfless Intervention  
This chapter analyses how selfless jurisdictional intervention plays out in respect of two 'global values' or 'common interests' which occupy a central place in the contemporary global justice discourse  ...  the high seas; the imposition of trade measures in pursuit of global environmental objectives; the exercise of adjudicatory jurisdiction over corporate human rights abuses; and the territorial extension  ...  of the GDPR, over concerns that the use of tracker cookies would violate the GDPR.  ... 
doi:10.1093/oso/9780198851783.003.0005 fatcat:v4a2ilezpjd2xiaecx5x2qrw4i

Evaluating the Usability of Privacy Choice Mechanisms

Hana Habib
The design of consent and privacy choice interfaces can significantly affect consumer choices and their privacy outcomes.  ...  Notice and choice has dominated the discourse on consumer privacy protection and is the foundation of existing privacy regulation in the United States.  ...  They still have the information of billions of people. But I guess it gives me the illusion of having a little more privacy.”  ... 
doi:10.1184/r1/17105468 fatcat:z43kzfhpdnhylhkbl4fhfthe2m

Citizens Versus the Internet: Confronting Digital Challenges With Cognitive Tools

Anastasia Kozyreva, Stephan Lewandowsky, Ralph Hertwig
2020 Psychological Science in the Public Interest  
Next, we turn to how psychological science can inform interventions to counteract these challenges of the digital world.  ...  Benevolent choice architects working with regulators may curb the worst excesses of manipulative choice architectures, yet the strategic advantages, resources, and data remain with commercial players.  ...  We also thank Deb Ain and Rodney Atkins for editing the manuscript. Notes  ... 
doi:10.1177/1529100620946707 pmid:33325331 pmcid:PMC7745618 fatcat:ur4yjvucgvc7be2yy4h3idxusq

Evaluating And Addressing Positive And Negative Societal Externalities

Hans Lammerant, Paul De Hert, Guillermo Vega Gorgojo, Erik Stensrud
2015 Zenodo  
Evaluating and addressing positive and negative societal externalities. Deliverable D4.2 BYTE Project.  ...  control becomes an illusion because of the power imbalance.  ...  position of the data subject and the controller". 174 As pointed out by Mantelero, also the strong role for impact assessments in the draft GDPR represent this shift away from individual control.  ... 
doi:10.5281/zenodo.104962 fatcat:nbt36xssfrbghf33cfxsaumsse

Special Issue: Communicative Socialism/Digital Socialism, edited by Christian Fuchs (DOWNLOAD FULL ISSUE)

Christian Fuchs
2020 tripleC: Communication, Capitalism & Critique  
His research is conducted in the field of internet and politics, focusing on elections, party system, polarization, public opinion and social media.  ...  Marcelo Alves dos Santos Jr Marcelo Alves dos Santos Jr has a major degree in Journalism from the Federal University of São João del-Rei and is currently a PhD candidate at the Post-Graduate Program in  ...  GDPR attempts at building a defence against the aggressive pervasiveness of the digital social by giving individuals the (illusion of) control and ownership of their data, upon which they would enjoy the  ... 
doi:10.31269/triplec.v18i1.1149 fatcat:u4rcec2bizgmtpt6e2r4k4xhee

Secure and Dependable Multi-Cloud Network Virtualization

Max Alaluna, Eric Vial, Nuno Neves, Fernando M. V. Ramos
2017 Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures - XDOMO'17  
In particular, the acceptance ratios are less than 1% from the optimal, and the system can provision a 10 thousand container virtual network in approximately 2 minutes.  ...  This situation has started changing with Software-defined networking (SDN), a new paradigm that proposes the logical centralization of network control.  ...  The centralization of the control and the global visibility offered by SDN can be used to enforce the required properties for the virtual networks.Third, increasing the offer of virtual networks with security  ... 
doi:10.1145/3071064.3071066 fatcat:timnf66ocbafnb4f6xh5xlfofi
« Previous Showing results 1 — 15 out of 42 results