ABSTRACT
The privacy of personal data is a human right that is systematically violated in the computing industry, according to human rights organisations. The vision that technology would help society progress through more computing and more accumulation of personal data is now 30 years old. With the knowledge of today, such a vision would be different. Instead of violating a human right, technologists could use data minimisation as a central pillar of innovation. A compelling amount of evidence shows that the majority of consumers does not feel comfortable with being tracked or profiled. This paper analyses how this vision may be realised through a variety of projects and case examples. The conclusion is that technology without tracking, personal data collection, or personal data analysis, may gradually emerge as the dominant mode of innovation and computing over the next 30 years.
- Norah Abokhodair and Sarah Vieweg. 2016. Privacy & Social Media in the Context of the Arab Gulf. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (DIS ’16), Association for Computing Machinery, New York, 672–683. https://doi.org/10.1145/2901790.2901873Google ScholarDigital Library
- Syed Ishtiaque Ahmed, Md. Romael Haque, Jay Chen, and Nicola Dell. 2017. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. In Proceedings of the ACM on Human-Computer Interaction, Association for Computing Machinery, New York. https://doi.org/10.1145/3134652Google ScholarDigital Library
- Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location Has Been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In CHI ’15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Association for Computing Machinery, New York, 787–796. https://doi.org/10.1145/2702123.2702210Google ScholarDigital Library
- Patrick D. Anderson. 2020. Privacy for the weak, transparency for the powerful: the cypherpunk ethics of Julian Assange. Ethics and Information Technology (October 2020). https://doi.org/10.1007/s10676-020-09571-xGoogle ScholarDigital Library
- Anders S. G. Andrae and Tomas Edler. 2015. On Global Electricity Usage of Communication Technology: Trends to 2030. Challenges 6, 1 (April 2015), 117–157. https://doi.org/10.3390/challe6010117Google ScholarCross Ref
- Julia Angwin, Ariana Tobin, and Madeleine Varner. 2017. Facebook (Still) Letting Housing Advertisers Exclude Users by Race. ProPublica. Retrieved December 12, 2020 from https://www.propublica.org/article/facebook-advertising-discrimination-housing-race-sex-national-originGoogle Scholar
- Brooke Auxier, Lee Rainie, Monica Anderson, Andrew Perrin, Madhu Kumar, and Erica Turner. 2019. Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information. Pew Research Center. Retrieved February 6, 2021 from https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/Google Scholar
- Hanno Bakkeren. 2019. Datacenters verbruiken drie keer zoveel stroom als de NS. NRC. Retrieved December 12, 2020 from https://www.nrc.nl/nieuws/2019/05/14/datacenters-verbruiken-drie-keer-zoveel-stroom-als-de-ns-a3960091Google Scholar
- Yannis Bakos, Florencia Marotta-Wurgler, and David R. Trossen. 2014. Does anyone read the fine print? Consumer attention to standard-form contracts. Journal of Legal Studies 43, 1 (2014), 1–35. https://doi.org/10.1086/674424Google ScholarCross Ref
- Matt Blaze. 2013. Phew, NSA Is Just Collecting Metadata. (You Should Still Worry). WIRED. Retrieved December 8, 2020 from https://www.wired.com/2013/06/phew-it-was-just-metadata-not-think-again/Google Scholar
- Frederik Zuiderveen Borgesius, Sanne Kruikemeier, Sophie C Boerman, and Natali Helberger. 2017. Tracking Walls, Take-It-Or-Leave-It Choices, the GDPR, and the ePrivacy Regulation. European Data Protection Law Review 3, 3 (2017), 353–368.Google ScholarCross Ref
- Heiko Bugs, Antonio Fois, Christof Horn, Arjen Krom, Christian Leurs, Mirela Popescu, Alex Sixto, Samuel Tuati, Jan van Laer, and Grégoire Virat. 2017. Digital: Business Models in Danger? NextContinent. Retrieved December 8, 2020 from https://www.nextcontinent.net/wp-content/uploads/2019/02/Nextcontinent-Digital.Study_.pdfGoogle Scholar
- Danny van den Burg and Lisanne van Knippenberg. 2018. ShoppingTomorrow 2018: The future of retail according to consumers and experts. Shopping Tomorrow and GFK. Retrieved December 15, 2020 from https://www.shoppingtomorrow.nl/nl/consumentenonderzoekGoogle Scholar
- Danny van den Burg, Annemarie Perquin, and Alma Akkerman. 2019. ShoppingTomorrow 2019: The future of retail according to consumers. Shopping Tomorrow and GFK. Retrieved February 15, 2021 from https://www.shoppingtomorrow.nl/nl/consumentenonderzoekGoogle Scholar
- Sarah Childress. 2016. The Problem with “Broken Windows” Policing. Public Broadcasting Service (PBS). Retrieved February 10, 2021 from https://www.pbs.org/wgbh/frontline/article/the-problem-with-broken-windows-policing/Google Scholar
- Nicholas A. Christakis and James H. Fowler. 2009. Connected: The Surprising Power of Our Social Networks and How They Shape Our Lives. Little, Brown and Company, New York, Boston and London.Google Scholar
- J. Clement. 2020. Global annual net loss of Snap from 2015 to 2019. Statista. Retrieved December 11, 2020 from https://www.statista.com/statistics/668190/snapchat-annual-net-income-loss/Google Scholar
- Barb Darrow. 2016. Why did file sharing startup OwnCloud shut down? Fortune. Retrieved December 8, 2020 from https://fortune.com/2016/06/03/what-happened-to-owncloud/Google Scholar
- Pierre Debourdeau, Alain-Bernard Duvic, Cécile Gouesse, Axel Groothuis, Robert Maxim, Cécile Michel, and Alex Sixto. 2018. The Data Rush: European Survey on Data and Digitalization. NextContinent. Retrieved December 8, 2020 from https://www.nextcontinent.net/wp-content/uploads/2019/02/Data-Rush.pdfGoogle Scholar
- Inge Demoed, Mikkie Hogenboom, and Richard van Welie. 2020. The Future of the Journey: Wie wijst de weg? Shopping Tomorrow and Magnus.Google Scholar
- Cory Doctorow. 2021. How to Destroy Surveillance Capitalism. Stonesong Digital LLC, New York.Google Scholar
- Paul Dourish and Genevieve Bell. 2011. Divining a Digital Future: Mess and Mythology in Ubiquitous Computing. The MIT Press, Cambridge and London.Google ScholarDigital Library
- Baz Dreisinger. 2016. Norway Proves That Treating Prison Inmates As Human Beings Actually Works. Huffington Post. Retrieved February 10, 2021 from https://www.huffpost.com/entry/norway-prison_n_578418b6e4b0e05f05232cb7?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAAC1Q7SEMyBSPdpe98NEUDKqp9i6GNWOIJ8ZGv2cJos06ZPQ3NnTKR7Dm6Nz71IExPEVhqr9u7LOzoLIWP32eEGRvLNxNIHO6ns5WOcj1vzXMv2LK6q1nbwxL13LyQFlPXJ2Sl3aXI7MLTwRya92cVWn9aUmWDegWfpZM6u3w6ue9Google Scholar
- Gilad Edelman. 2020. Can Killing Cookies Save Journalism? WIRED. Retrieved December 12, 2020 from https://www.wired.com/story/can-killing-cookies-save-journalism/Google Scholar
- Heleen Ekker. 2020. Opening grootste windpark van Nederland; meeste stroom naar datacenter Microsoft. NOS. Retrieved December 12, 2020 from https://nos.nl/artikel/2350450-opening-grootste-windpark-van-nederland-meeste-stroom-naar-datacenter-microsoft.htmlGoogle Scholar
- Slava Gomzin. 2014. Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions. John Wiley & Sons, Indianapolis.Google Scholar
- Beatrice de Graaf. 2010. Theater van angst: De strijd tegen terrorisme in Nederland, Duitsland, Italië en Amerika. Amsterdam.Google Scholar
- Andy Greenberg. 2017. After 3 Years, Why Gmail's End-to-End Encryption Is Still Vapor. WIRED. Retrieved February 7, 2021 from https://www.wired.com/2017/02/3-years-gmails-end-end-encryption-still-vapor/Google Scholar
- Andy Greenberg. 2018. WhatsApp Co-Founder Brian Acton Injects $50 Million in Newly Formed Signal Foundation. WIRED. Retrieved December 8, 2020 from https://www.wired.com/story/signal-foundation-whatsapp-brian-acton/Google Scholar
- Andy Greenberg. 2020. Facebook Says Encrypting Messenger by Default Will Take Years. WIRED. Retrieved February 11, 2021 from https://www.wired.com/story/facebook-messenger-end-to-end-encryption-default/Google Scholar
- Maarten Hafkamp. 2020. Ster: 25 miljoen euro minder reclame-inkomsten in eerste halfjaar. Adformatie. Retrieved December 12, 2020 from https://www.adformatie.nl/media/ster-25-miljoen-euro-reclame-inkomsten-eerste-halfjaarGoogle Scholar
- Andrew Jay Hawkins. 2020. Uber lost $8.5 billion in 2019, but it thinks it can get profitable by the end of 2020. The Verge. Retrieved December 11, 2020 from https://www.theverge.com/2020/2/6/21126965/uber-q4-earnings-report-net-loss-revenue-profit-2019Google Scholar
- Jon Henley. 2014. How do you deradicalise returning Isis fighters? The Guardian. Retrieved February 10, 2021 from https://www.theguardian.com/world/2014/nov/12/deradicalise-isis-fighters-jihadists-denmark-syriaGoogle Scholar
- Matthew Hill. 2020. Amazon: What They Know About Us. BBC.Google Scholar
- Sean Hooley and Latanya Sweeney. 2013. Survey of Publicly Available State Health Databases. Cambridge and Massachusetts. Retrieved February 12, 2021 from https://thedatamap.org/1075-1.pdfGoogle ScholarCross Ref
- Hella Hueck and Jeroen Piersma. 2020. Adverteren zonder vervelende cookies blijkt minstens zo lucratief. Financieel Dagblad. Retrieved December 12, 2020 from https://fd.nl/achtergrond/1355271/adverteren-zonder-vervelende-cookies-blijkt-minstens-zo-lucratiefGoogle Scholar
- Erwin James. 2013. Bastoy: the Norwegian prison that works. The Guardian. Retrieved February 10, 2021 from https://www.theguardian.com/society/2013/sep/04/bastoy-norwegian-prison-worksGoogle Scholar
- Joseph Johnson. 2021. Advertising revenue of Google from 2001 to 2020. Statista. Retrieved February 14, 2021 from https://www.statista.com/statistics/266249/advertising-revenue-of-google/Google Scholar
- Joseph Johnson. 2021. Annual revenue of Google from 2002 to 2020. Statista. Retrieved February 13, 2021 from https://www.statista.com/statistics/266206/googles-annual-global-revenue/Google Scholar
- Naveena Karusala, Apoorva Bhalla, and Neha Kumar. 2019. Privacy, Patriarchy, and Participation on Social Media. In Proceedings of the 2019 on Designing Interactive Systems Conference (DIS ’19), Association for Computing Machinery, New York, 551–526. https://doi.org/10.1145/3322276.3322355Google ScholarDigital Library
- Jacob Kastrenakes. 2018. Facebook spoke with hospitals about matching health data to anonymized profiles. The Verge. Retrieved December 8, 2020 from https://www.theverge.com/2018/4/5/17203262/facebook-medical-data-sharing-plan-healthcareGoogle Scholar
- Danielle Keats, Citron Frank Pasquale, Danielle Keats Citron, and Frank Pasquale. 2014. The Scored Society: Due Process for Automated Predictions. Washington Law Review 89, 8 (2014), 1–33.Google Scholar
- Nancy S. Kim. 2013. Wrap Contracts: Foundations and Ramifications. Oxford University Press, New York. Retrieved February 7, 2021 from https://papers.ssrn.com/abstract=2322255Google Scholar
- Marshall Kirkpatrick. 2010. Facebook's Zuckerberg Says the Age of Privacy is Over. The New York Times. Retrieved February 6, 2021 from https://archive.nytimes.com/www.nytimes.com/external/readwriteweb/2010/01/10/10readwriteweb-facebooks-zuckerberg-says-the-age-of-privac-82963.htmlGoogle Scholar
- Nicole Kobie. 2016. Quantum computing and its threat on encryption and our data. WIRED. Retrieved February 7, 2021 from https://www.wired.co.uk/article/quantum-computers-quantum-security-encryptionGoogle Scholar
- Ava Kofman and Ariana Tobin. 2019. Facebook Ads Can Still Discriminate Against Women and Older Workers, Despite a Civil Rights Settlement. ProPublica. Retrieved December 12, 2020 from https://www.propublica.org/article/facebook-ads-can-still-discriminate-against-women-and-older-workers-despite-a-civil-rights-settlementGoogle Scholar
- Bart de Koning. 2015. Nieuws: de politie blijkt op grote schaal de wet te overtreden. De Correspondent. Retrieved December 10, 2020 from https://decorrespondent.nl/3734/nieuws-de-politie-blijkt-op-grote-schaal-de-wet-te-overtreden/510916939412-7be7c192Google Scholar
- Bert-Jaap Koops, Bryce Clayton Newell, Tjerk Timan, Ivan Škorvánek, Tomislavz Chokrevski, and Maša Galič. 2017. A Typology of Privacy. University of Pennsylvania Journal of International Law 38, 2 (2017), 483–575. Retrieved December 5, 2020 from https://ssrn.com/abstract=2754043Google Scholar
- Jeroen Kraaijenbrink. 2019. The Secret of Coolblue's Success? Their Tagline. Forbes. Retrieved December 11, 2020 from https://www.forbes.com/sites/jeroenkraaijenbrink/2019/05/21/the-secret-of-coolblues-success-their-tagline/?sh=6cf772e72cdaGoogle Scholar
- Jeroen Kraaijenbrink. 2019. How To Bring Sustainability To the Masses: Tony's Chocolonely's Impact Strategy. Forbes. Retrieved December 11, 2020 from https://www.forbes.com/sites/jeroenkraaijenbrink/2019/11/08/how-to-bring-sustainability-to-the-masses-tonys-chocolonely-impact-strategy/?sh=39e624ed712aGoogle Scholar
- Alexander Kunst. 2020. Messenger usage by brand in Germany 2020. Statista. Retrieved December 8, 2020 from https://www.statista.com/forecasts/998694/messenger-usage-by-brand-in-germanyGoogle Scholar
- Nicholas D Lane, Junyuan Xie, Thomas Moscibroda, and Feng Zhao. 2012. On the Feasibility of User De-Anonymization from Shared Mobile Sensor Data. In Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones (PhoneSense ’12), Association for Computing Machinery, New York, 1–5. https://doi.org/10.1145/2389148.2389151Google ScholarDigital Library
- Marc Langheinrich. 2001. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In Proceedings of the 3rd International Conference on Ubiquitous Computing, Springer, 273–291. https://doi.org/10.5555/647987.741336Google ScholarDigital Library
- Micah Lee. 2016. Battle of the Secure Messaging Apps: How Signal Beats WhatsApp. The Intercept. Retrieved December 8, 2020 from https://theintercept.com/2016/06/22/battle-of-the-secure-messaging-apps-how-signal-beats-whatsapp/Google Scholar
- Mark A. Lemley. 2006. Terms of Use. Minnesota Law Review 91, (2006), 459–483. Retrieved February 7, 2021 from https://papers.ssrn.com/abstract=917926Google Scholar
- Karlin Lillington. 2020. EU legislation is coming that could greatly improve the web. The Irish Times. Retrieved December 10, 2020 from https://www-irishtimes-com.cdn.ampproject.org/c/s/www.irishtimes.com/business/technology/eu-legislation-is-coming-that-could-greatly-improve-the-web-1.4432111?mode=ampGoogle Scholar
- Peter Linzer. 2015. Contract as Evil. Hastings Law Journal 66, (2015), 971–1010. Retrieved February 7, 2021 from https://hastingslawjournal.org/wp-content/uploads/Linzer-66.4.pdfGoogle Scholar
- Mary Madden and Lee Rainie. 2015. Americans’ Attitudes About Privacy, Security and Surveillance. Pew Research Center. Retrieved February 6, 2021 from https://www.pewresearch.org/internet/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/Google Scholar
- John Markoff. 2006. Taking Spying to Higher Level, Agencies Look for More Ways to Mine Data - The New York Times. The New York Times. Retrieved February 9, 2021 from https://www.nytimes.com/2006/02/25/technology/taking-spying-to-higher-level-agencies-look-for-more-ways-to.htmlGoogle Scholar
- Thomas J. Maronick. 2014. Do Consumers Read Terms of Service Agreements When Installing Software? - A Two-Study Empirical Analysis. International Journal of Business and Social Research 4, 6 (2014), 137–145. Retrieved February 7, 2021 from https://EconPapers.repec.org/RePEc:lrc:larijb:v:4:y:2014:i:6:p:137-145Google Scholar
- Maurits Martijn. 2015. Baas Belastingdienst over Big Data: ‘Mijn missie is gedragsverandering.’ De Correspondent. Retrieved December 10, 2020 from https://decorrespondent.nl/2720/baas-belastingdienst-over-big-data-mijn-missie-is-gedragsverandering/83656320-f6e78aafGoogle Scholar
- Maurits Martijn and Dimitri Tokmetzis. 2019. Je hebt wél iets te verbergen: over het levensbelang van privacy. De Correspondent.Google Scholar
- Maurits Martijn, Dimitri Tokmetzis, Riffy Bol, and Foeke Postma. 2018. This fitness app lets anyone find names and addresses for thousands of soldiers and secret agents. De Correspondent. Retrieved December 8, 2020 from https://decorrespondent.nl/8480/this-fitness-app-lets-anyone-find-names-and-addresses-for-thousands-of-soldiers-and-secret-agents/260810880-cc840165Google Scholar
- Chris Matyszczyk. 2015. The Internet will vanish, says Google's Eric Schmidt. CNET. Retrieved February 4, 2021 from https://www.cnet.com/news/the-internet-will-vanish-says-googles-schmidt/Google Scholar
- Aleecia M. McDonald and Lorrie Faith Cranor. 2008. The Cost of Reading Privacy Policies. A Journal of Law and Policy for the Information Society 4, 6 (2008), 543–568. Retrieved February 7, 2021 from https://kb.osu.edu/handle/1811/72839Google Scholar
- Daniel Mikkelsen, Henning Soller, and Malin Strandell-Jansson. 2019. What will Europe's e-privacy regulation mean for your business? McKinsey & Company. Retrieved December 12, 2020 from https://www.mckinsey.com/business-functions/risk/our-insights/what-will-europes-eprivacy-regulation-mean-for-your-businessGoogle Scholar
- Yves-Alexandre de Montjoye, Laura Radaelli, Vivek Kumar Singh, and Alex “Sandy” Pentland. 2015. Unique in the shopping mall: On the reidentifiability of credit card metadata. Science 347, 6221 (January 2015), 536–539. https://doi.org/10.1126/science.1256297Google ScholarCross Ref
- Daphne A. Muller and Pierre Lévy. 2019. A Design Approach Towards Affording the Trend of Privacy. In Proceedings of the 2019 on Designing Interactive Systems Conference (DIS ’19), Association for Computing Machinery, New York, 435–446. https://doi.org/10.1145/3322276.3322324Google ScholarDigital Library
- Amelia Nierenberg. 2020. Signal Is the Messaging App of the Protests. The New York Times. Retrieved December 8, 2020 from https://www.nytimes.com/2020/06/11/style/signal-messaging-app-encryption-protests.htmlGoogle Scholar
- Kirill Nikitin, Ludovic Barman, Wouter Lueks, Matthew Underwood, Jean-Pierre Hubaux, and Bryan Ford. 2019. Reducing Metadata Leakage from Encrypted Files and Communication with PURBs. In Proceedings on Privacy Enhancing Technologies, Sciendo, 6–33. https://doi.org/10.2478/popets-2019-0056Google ScholarCross Ref
- Helen Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford.Google ScholarDigital Library
- Helen Nissenbaum. 2011. A Contextual Approach to Privacy Online. Daedalus 140, 4 (September 2011), 32–48. https://doi.org/10.1162/DAED_a_00113Google ScholarCross Ref
- Parmy Olson. 2018. Exclusive: WhatsApp Cofounder Brian Acton Gives The Inside Story On #DeleteFacebook And Why He Left $850 Million Behind. Forbes. Retrieved December 12, 2020 from https://www.forbes.com/sites/parmyolson/2018/09/26/exclusive-whatsapp-cofounder-brian-acton-gives-the-inside-story-on-deletefacebook-and-why-he-left-850-million-behind/?sh=1a46d3173f20Google Scholar
- Leysia Palen and Paul Dourish. 2003. Unpacking “Privacy” for a Networked World. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Association for Computing Machinery, New York, 129–136. https://doi.org/10.1145/642611.642635Google ScholarDigital Library
- Frank Pasquale. 2013. Privacy, Antitrust, and Power. George Mason Law Review 20, 4 (2013), 1024. Retrieved February 14, 2021 from https://digitalcommons.law.umaryland.edu/fac_pubs/1343/Google Scholar
- Frank Pasquale. 2015. The Black Box Society: The Secret Algorithms That Control Money and Information. Harvard University Press, London.Google Scholar
- Frank Pasquale and Danielle Citron. 2014. Promoting Innovation While Preventing Discrimination: Policy Goals for the Scored Society. Washington Law Review 89, (2014), 1413–1424.Google Scholar
- Jeffrey Paul. 2020. Your Computer Isn't Yours. Sneak.Berlin. Retrieved December 12, 2020 from https://sneak.berlin/20201112/your-computer-isnt-yours/#updatesGoogle Scholar
- Michael Pisa. 2019. Developing Countries Seek Greater Control as Tech Giants Woo the “Next Billion Users.” Center For Global Development. Retrieved February 7, 2021 from https://www.cgdev.org/blog/developing-countries-seek-greater-control-tech-giants-woo-next-billion-usersGoogle Scholar
- Victoria C. Plaut and Robert P. Bartlett. 2011. Blind consent? A social psychological investigation of non-readership of click-through agreements. Law and Human Behavior (June 2011), 1–23. https://doi.org/10.1007/s10979-011-9288-yGoogle ScholarCross Ref
- Jos Poortvliet. 2020. Nextcloud doubles order intake and customer base, remains profitable and independent. Nextcloud. Retrieved December 8, 2020 from https://nextcloud.com/blog/nextcloud-doubles-order-intake-and-customer-base-remains-profitable-and-independent/Google Scholar
- Espen Beer Prydz and Divyanshi Wadhwa. 2019. Classifying countries by income. The World Bank. Retrieved February 7, 2021 from https://datatopics.worldbank.org/world-development-indicators/stories/the-classification-of-countries-by-income.htmlGoogle Scholar
- Margaret Jane Radin. 2013. Boilerplate: The fine print, vanishing rights, and the rule of law. Princeton University Press, New Jersey and Oxfordshire.Google ScholarCross Ref
- Nathan Reiff. 2020. 5 Companies Owned by Facebook. Investopedia. Retrieved February 12, 2021 from https://www.investopedia.com/articles/personal-finance/051815/top-11-companies-owned-facebook.aspGoogle Scholar
- John Rose, Alexander Lawrence, and Elias Baltassis. 2018. Bridging the Trust Gap in Personal Data. The Boston Consulting Group. Retrieved February 14, 2021 from https://image-src.bcg.com/Images/BCG-Bridging-the-Trust-Gap-in-Personal-Data-Mar-2018_tcm9-186201.pdfGoogle Scholar
- Hanna Rosin. 2016. How A Danish Town Helped Young Muslims Turn Away From ISIS. NPR. Retrieved February 10, 2021 from https://www.npr.org/sections/health-shots/2016/07/15/485900076/how-a-danish-town-helped-young-muslims-turn-away-from-isis?t=1612957381308Google Scholar
- James B. Rule. 2015. Privacy: the longue durée. In Social Dimensions of Privacy, Beate Roessler and Dorota Mokrosinska (eds.). Cambridge University Press, Cambridge. https://doi.org/10.1017/CBO9781107280557.002Google ScholarCross Ref
- Tugba Sabanoglu. 2020. Annual operating income of Amazon from 2014 to 2019, by segment. Statista. Retrieved December 11, 2020 from https://www.statista.com/statistics/241835/amazon-operating-income-annual-by-segment/Google Scholar
- Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchil. 2018. “Privacy is Not for Me, It's for Those Rich Women”: Performative Privacy Practices on Mobile Phones by Women in South Asia. In Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security (SOUPS ’18), USENIX Association, 127–142.Google Scholar
- Jessica Schneider. 2017. DOJ demands Facebook info from “anti-administration activists.” CNN. Retrieved December 12, 2020 from https://edition.cnn.com/2017/09/28/politics/facebook-anti-administration-activists/index.htmlGoogle Scholar
- Bruce Schneier. 2015. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (1st ed.). W. W. Norton & Company, New York and London.Google Scholar
- Daniel Solove. 2001. Privacy and Power: Computer Databases and Metaphors for Information Privacy. Stanford Law Review 53, (July 2001), 1393–1462.Google ScholarCross Ref
- Daniel J. Solove. 2013. Introduction: Privacy self-management and the consent dilemma. Harvard Law Review 126, (2013), 1880–1903.Google ScholarCross Ref
- Jared Spataro. 2020. Power your digital transformation with insights from Microsoft Productivity Score. Microsoft. Retrieved December 12, 2020 from https://www.microsoft.com/en-us/microsoft-365/blog/2020/10/29/power-your-digital-transformation-with-insights-from-microsoft-productivity-score/Google Scholar
- Felix Stalder. 2002. Opinion. Privacy is not the antidote to surveillance. Surveillance and Society 1, 1 (2002), 120–124. https://doi.org/10.24908/ss.v1i1.3397Google ScholarCross Ref
- Nili Steinfeld. 2016. “I agree to the terms and conditions”: (How) do users read privacy policies online? An eye-tracking experiment. Computers in Human Behavior 55, (February 2016), 992–1000. https://doi.org/10.1016/j.chb.2015.09.038Google ScholarDigital Library
- Jessica Su, Ansh Shukla, Sharad Goel, and Arvind Narayanan. 2017. De-Anonymizing Web Browsing Data with Social Networks. In Proceedings of the 26th International Conference on World Wide Web (WWW ’17), International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, 1261–1269. https://doi.org/10.1145/3038912.3052714Google ScholarDigital Library
- Latanya Sweeney. 2015. Only You, Your Doctor, and Many Others May Know. Technology Science (2015). Retrieved February 7, 2021 from https://techscience.org/a/2015092903/Google Scholar
- H. Tankovska. 2021. Cumulative number of monthly Facebook product users as of 4th quarter 2020. Statista. Retrieved February 14, 2021 from https://www.statista.com/statistics/947869/facebook-product-mau/Google Scholar
- H. Tankovska. 2021. Facebook's annual revenue from 2009 to 2020. Statista. Retrieved February 14, 2021 from https://www.statista.com/statistics/268604/annual-revenue-of-facebook/Google Scholar
- Vlad Tarko. 2017. Elinor Ostrom: An Intellectual Biography. Rowman & Littlefield International Ltd, London.Google Scholar
- Taylor Tepper. 2020. Airbnb is Going Public. Here's What it Means for You. Forbes. Retrieved December 11, 2020 from https://www.forbes.com/advisor/investing/airbnb-ipo/Google Scholar
- Richard H. Thaler and Cass R. Sunstein. 2009. Nudge: Improving Decisions About Health, Wealth and Happiness. Penguin Putnam Inc, London.Google Scholar
- Alexis Trittipo, Kayvaun Rowshankish, and Simon London. 2018. Data privacy: What every manager needs to know. McKinsey & Company. Retrieved December 12, 2020 from https://www.mckinsey.com/business-functions/risk/our-insights/data-privacy-what-every-manager-needs-to-knowGoogle Scholar
- Joseph Turow, Michael Hennessy, and Nora A. Draper. 2015. The Tradeoff Fallacy - How Marketers Are Misrepresenting American Consumers and Opening Them up to Exploitation. Annenberg School for Communication.Google Scholar
- Joseph Turow, Jennifer King, Chris Jay Hoofnagle, Amy Bleakley, and Michael Hennessy. 2009. Contrary to What Marketers Say, Americans Reject Tailored Advertising and Three Activities That Enable It. SSRN (September 2009). https://doi.org/10.2139/ssrn.1478214Google ScholarCross Ref
- Aditya Vashistha, Richard Anderson, and Shrirang Mare. 2018. Examining Security and Privacy Research in Developing Regions. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS ’18), Association for Computing Machinery, New York, 1–14. https://doi.org/10.1145/3209811.3209818Google ScholarDigital Library
- Kees Verhoeven. 2020. De Digitale D66 Agenda 2020-2030. D66. Retrieved December 10, 2020 from https://d66.nl/nieuws/digitale-dilemmas-verdienen-politieke-prioriteit/Google Scholar
- Amy Watson. 2020. Spotify revenue/net income from 2009 to 2019. Statista. Retrieved December 11, 2020 from https://www.statista.com/statistics/244990/spotifys-revenue-and-net-income/Google Scholar
- Mark Weiser. 1991. The Computer for the 21st Century. Scientific American 265, 3 (September 1991), 94–105.Google ScholarCross Ref
- Anna Wiener. 2020. Taking Back Our Privacy. The New Yorker. Retrieved February 12, 2021 from https://www.newyorker.com/magazine/2020/10/26/taking-back-our-privacyGoogle Scholar
- Tim Worstall. 2013. Why Email Can Never Be Truly Secure: It's the Metadata. Forbes. Retrieved December 8, 2020 from https://www.forbes.com/sites/timworstall/2013/08/18/why-email-can-never-be-truly-secure-its-the-metadata/#2f7eb4b04a5bGoogle Scholar
- Shoshana Zuboff. 2015. Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology 30, 1 (March 2015), 75–89. https://doi.org/10.1057/jit.2015.5Google ScholarCross Ref
- Shoshana Zuboff. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs, New York.Google Scholar
- 2011. Visie op Sensing binnen de Politie: Waarnemen in een genetwerkte maatschappij. Korps landelijke politiediensten (leaked by Freedominc). Retrieved February 9, 2021 from https://freedominc.nl/files/20110600-klpd-visie-op-sensing-binnen-de-politie_redacted.pdfGoogle Scholar
- 2015. Special Eurobarometer 431: Data Protection. European Commission. Retrieved December 8, 2020 from https://ec.europa.eu/commfrontoffice/publicopinion/archives/ebs/ebs_431_en.pdfGoogle Scholar
- 2018. The promotion, protection and enjoyment of human rights on the Internet: resolution / adopted by the Human Rights Council on 5 July 2018. UN. Human Rights Council, Geneva. Retrieved December 6, 2020 from https://digitallibrary.un.org/record/1639840Google Scholar
- 2019. Surveillance Giants: How the Business Model of Google and Facebook Threatens Human Rights. Amnesty International Ltd, London. Retrieved December 5, 2020 from https://www.amnesty.org/en/documents/pol30/1404/2019/en/Google Scholar
- 2019. Global Survey on Internet Security and Trust. Centre for International Governance Innovation. Retrieved February 6, 2021 from https://www.cigionline.org/internet-survey-2019Google Scholar
- 2019. Special Eurobarometer 487a: The General Data Protection Regulation. European Commission. https://doi.org/10.2838/43726Google ScholarCross Ref
- 2019. Bluepaper 2018-2019 - Innovation & Omnichannel E-fulfilment - EN. Shopping Tomorrow. Retrieved December 12, 2020 from https://www.shoppingtomorrow.nl/nl/zoekresultaten?query=innovationGoogle Scholar
- 2019. Amazon's Private Labels Are Causing Even More Retail Disruption. eMarketer Insider Intelligence. Retrieved February 12, 2021 from https://www.emarketer.com/content/amazon-s-private-labels-are-causing-even-more-retail-disruptionGoogle Scholar
- 2019. Innovative Retail Technology 2018-2019. Shopping Tomorrow. Retrieved December 12, 2020 from https://www.shoppingtomorrow.nl/nl/themas/city-store/store-innovationGoogle Scholar
- 2020. Signal. Signal. Retrieved December 8, 2020 from https://signal.org/Google Scholar
- 2020. Innovative Retail Technology 2019-2020. Shopping Tomorrow. Retrieved December 12, 2020 from https://www.shoppingtomorrow.nl/nl/themas/city-store/store-innovationGoogle Scholar
- 2020. Warden App management utility. Aurora OSS. Retrieved December 12, 2020 from https://auroraoss.com/app_info.php?app_id=3Google Scholar
- 2020. Digital privacy. European Commission. Retrieved December 12, 2020 from https://ec.europa.eu/digital-single-market/en/online-privacyGoogle Scholar
- 2020. Alphabet Market Cap. YCharts. Retrieved February 14, 2021 from https://ycharts.com/companies/GOOG/market_capGoogle Scholar
- 2020. Facebook Market Cap. YCharts. Retrieved February 14, 2021 from https://ycharts.com/companies/FB/market_capGoogle Scholar
- 2021. Alphabet Profit Margin 2006-2020 | GOOGL. MacroTrends. Retrieved February 12, 2021 from https://www.macrotrends.net/stocks/charts/GOOGL/alphabet/profit-marginsGoogle Scholar
- What is personal data? European Commission. Retrieved December 5, 2020 from https://ec.europa.eu/info/law/law-topic/data-protection/reform/what-personal-data_enGoogle Scholar
- GDPR Enforcement Tracker - list of GDPR fines. CMS Law. Retrieved December 8, 2020 from https://www.enforcementtracker.com/Google Scholar
- You should control your data. Nextcloud. Retrieved December 8, 2020 from https://nextcloud.com/about/Google Scholar
- Consultancy Fees & Rates. Consultancy.org. Retrieved February 12, 2021 from https://www.consultancy.org/consulting-industry/fees-ratesGoogle Scholar
- IT Consulting. Consultancy.org. Retrieved February 12, 2021 from https://www.consultancy.org/consulting-industry/it-consultingGoogle Scholar
- Pi-hole: Network-wide Ad Blocking. Pi-hole. Retrieved December 8, 2020 from https://pi-hole.net/Google Scholar
- The Digital Services Act package. European Commission. Retrieved December 10, 2020 from https://ec.europa.eu/digital-single-market/en/digital-services-act-packageGoogle Scholar
- Google Acquisitions. AcquiredBy. Retrieved February 12, 2021 from https://acquiredby.co/google-acquisitions/Google Scholar
- Onze producten. Google. Retrieved February 12, 2021 from https://about.google/products/Google Scholar
- Netherlands GNI Per Capita 1962-2021. MacroTrends. Retrieved February 7, 2021 from https://www.macrotrends.net/countries/NLD/netherlands/gni-per-capitaGoogle Scholar
- US Dollar (USD) to Euro (EUR) exchange rate history. ExchangeRates. Retrieved February 14, 2021 from https://www.exchangerates.org.uk/USD-EUR-exchange-rate-history.htmlGoogle Scholar
Index Terms
- The Computer for the 21st Century – Second Edition for Europe: Open-source Projects, Consumer Activism, and Collaboration Will Make Privacy the Central Pillar of Innovation and Cause a Technology Industry Where Creative Ideas From Small Market Players Can Flourish
Recommendations
Personal Data Sharing and Legal Issues of Human Rights in the Era of Artificial Intelligence: Moderating Effect of Government Regulation
Personal data sharing has become an important issue in public and private sectors of our society. However, data subjects are perceived to be always unwilling to share their data on security and privacy reasons. They apprehend that those data will be ...
Detection and surveillance technologies: privacy-related requirements and protection schemes
Detection, identification, authentication and surveillance technologies are increasingly deployed and at the same time further researched, aiming at countering terrorism and crime, protecting people and goods, and managing working procedures and ...
The Potential of Emerging Technology for Social Change
SIGMIS-CPR '16: Proceedings of the 2016 ACM SIGMIS Conference on Computers and People ResearchThe purpose of this panel is to explore the potential for emerging technology to engender social change. Technology is transformative, and has already seen innovative application in business and industry, and of course in relation to society and social ...
Comments