skip to main content
10.1145/3411763.3450369acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

The Computer for the 21st Century – Second Edition for Europe: Open-source Projects, Consumer Activism, and Collaboration Will Make Privacy the Central Pillar of Innovation and Cause a Technology Industry Where Creative Ideas From Small Market Players Can Flourish

Published:08 May 2021Publication History

ABSTRACT

The privacy of personal data is a human right that is systematically violated in the computing industry, according to human rights organisations. The vision that technology would help society progress through more computing and more accumulation of personal data is now 30 years old. With the knowledge of today, such a vision would be different. Instead of violating a human right, technologists could use data minimisation as a central pillar of innovation. A compelling amount of evidence shows that the majority of consumers does not feel comfortable with being tracked or profiled. This paper analyses how this vision may be realised through a variety of projects and case examples. The conclusion is that technology without tracking, personal data collection, or personal data analysis, may gradually emerge as the dominant mode of innovation and computing over the next 30 years.

References

  1. Norah Abokhodair and Sarah Vieweg. 2016. Privacy & Social Media in the Context of the Arab Gulf. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (DIS ’16), Association for Computing Machinery, New York, 672–683. https://doi.org/10.1145/2901790.2901873Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Syed Ishtiaque Ahmed, Md. Romael Haque, Jay Chen, and Nicola Dell. 2017. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. In Proceedings of the ACM on Human-Computer Interaction, Association for Computing Machinery, New York. https://doi.org/10.1145/3134652Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location Has Been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In CHI ’15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Association for Computing Machinery, New York, 787–796. https://doi.org/10.1145/2702123.2702210Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Patrick D. Anderson. 2020. Privacy for the weak, transparency for the powerful: the cypherpunk ethics of Julian Assange. Ethics and Information Technology (October 2020). https://doi.org/10.1007/s10676-020-09571-xGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  5. Anders S. G. Andrae and Tomas Edler. 2015. On Global Electricity Usage of Communication Technology: Trends to 2030. Challenges 6, 1 (April 2015), 117–157. https://doi.org/10.3390/challe6010117Google ScholarGoogle ScholarCross RefCross Ref
  6. Julia Angwin, Ariana Tobin, and Madeleine Varner. 2017. Facebook (Still) Letting Housing Advertisers Exclude Users by Race. ProPublica. Retrieved December 12, 2020 from https://www.propublica.org/article/facebook-advertising-discrimination-housing-race-sex-national-originGoogle ScholarGoogle Scholar
  7. Brooke Auxier, Lee Rainie, Monica Anderson, Andrew Perrin, Madhu Kumar, and Erica Turner. 2019. Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information. Pew Research Center. Retrieved February 6, 2021 from https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/Google ScholarGoogle Scholar
  8. Hanno Bakkeren. 2019. Datacenters verbruiken drie keer zoveel stroom als de NS. NRC. Retrieved December 12, 2020 from https://www.nrc.nl/nieuws/2019/05/14/datacenters-verbruiken-drie-keer-zoveel-stroom-als-de-ns-a3960091Google ScholarGoogle Scholar
  9. Yannis Bakos, Florencia Marotta-Wurgler, and David R. Trossen. 2014. Does anyone read the fine print? Consumer attention to standard-form contracts. Journal of Legal Studies 43, 1 (2014), 1–35. https://doi.org/10.1086/674424Google ScholarGoogle ScholarCross RefCross Ref
  10. Matt Blaze. 2013. Phew, NSA Is Just Collecting Metadata. (You Should Still Worry). WIRED. Retrieved December 8, 2020 from https://www.wired.com/2013/06/phew-it-was-just-metadata-not-think-again/Google ScholarGoogle Scholar
  11. Frederik Zuiderveen Borgesius, Sanne Kruikemeier, Sophie C Boerman, and Natali Helberger. 2017. Tracking Walls, Take-It-Or-Leave-It Choices, the GDPR, and the ePrivacy Regulation. European Data Protection Law Review 3, 3 (2017), 353–368.Google ScholarGoogle ScholarCross RefCross Ref
  12. Heiko Bugs, Antonio Fois, Christof Horn, Arjen Krom, Christian Leurs, Mirela Popescu, Alex Sixto, Samuel Tuati, Jan van Laer, and Grégoire Virat. 2017. Digital: Business Models in Danger? NextContinent. Retrieved December 8, 2020 from https://www.nextcontinent.net/wp-content/uploads/2019/02/Nextcontinent-Digital.Study_.pdfGoogle ScholarGoogle Scholar
  13. Danny van den Burg and Lisanne van Knippenberg. 2018. ShoppingTomorrow 2018: The future of retail according to consumers and experts. Shopping Tomorrow and GFK. Retrieved December 15, 2020 from https://www.shoppingtomorrow.nl/nl/consumentenonderzoekGoogle ScholarGoogle Scholar
  14. Danny van den Burg, Annemarie Perquin, and Alma Akkerman. 2019. ShoppingTomorrow 2019: The future of retail according to consumers. Shopping Tomorrow and GFK. Retrieved February 15, 2021 from https://www.shoppingtomorrow.nl/nl/consumentenonderzoekGoogle ScholarGoogle Scholar
  15. Sarah Childress. 2016. The Problem with “Broken Windows” Policing. Public Broadcasting Service (PBS). Retrieved February 10, 2021 from https://www.pbs.org/wgbh/frontline/article/the-problem-with-broken-windows-policing/Google ScholarGoogle Scholar
  16. Nicholas A. Christakis and James H. Fowler. 2009. Connected: The Surprising Power of Our Social Networks and How They Shape Our Lives. Little, Brown and Company, New York, Boston and London.Google ScholarGoogle Scholar
  17. J. Clement. 2020. Global annual net loss of Snap from 2015 to 2019. Statista. Retrieved December 11, 2020 from https://www.statista.com/statistics/668190/snapchat-annual-net-income-loss/Google ScholarGoogle Scholar
  18. Barb Darrow. 2016. Why did file sharing startup OwnCloud shut down? Fortune. Retrieved December 8, 2020 from https://fortune.com/2016/06/03/what-happened-to-owncloud/Google ScholarGoogle Scholar
  19. Pierre Debourdeau, Alain-Bernard Duvic, Cécile Gouesse, Axel Groothuis, Robert Maxim, Cécile Michel, and Alex Sixto. 2018. The Data Rush: European Survey on Data and Digitalization. NextContinent. Retrieved December 8, 2020 from https://www.nextcontinent.net/wp-content/uploads/2019/02/Data-Rush.pdfGoogle ScholarGoogle Scholar
  20. Inge Demoed, Mikkie Hogenboom, and Richard van Welie. 2020. The Future of the Journey: Wie wijst de weg? Shopping Tomorrow and Magnus.Google ScholarGoogle Scholar
  21. Cory Doctorow. 2021. How to Destroy Surveillance Capitalism. Stonesong Digital LLC, New York.Google ScholarGoogle Scholar
  22. Paul Dourish and Genevieve Bell. 2011. Divining a Digital Future: Mess and Mythology in Ubiquitous Computing. The MIT Press, Cambridge and London.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Baz Dreisinger. 2016. Norway Proves That Treating Prison Inmates As Human Beings Actually Works. Huffington Post. Retrieved February 10, 2021 from https://www.huffpost.com/entry/norway-prison_n_578418b6e4b0e05f05232cb7?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAAC1Q7SEMyBSPdpe98NEUDKqp9i6GNWOIJ8ZGv2cJos06ZPQ3NnTKR7Dm6Nz71IExPEVhqr9u7LOzoLIWP32eEGRvLNxNIHO6ns5WOcj1vzXMv2LK6q1nbwxL13LyQFlPXJ2Sl3aXI7MLTwRya92cVWn9aUmWDegWfpZM6u3w6ue9Google ScholarGoogle Scholar
  24. Gilad Edelman. 2020. Can Killing Cookies Save Journalism? WIRED. Retrieved December 12, 2020 from https://www.wired.com/story/can-killing-cookies-save-journalism/Google ScholarGoogle Scholar
  25. Heleen Ekker. 2020. Opening grootste windpark van Nederland; meeste stroom naar datacenter Microsoft. NOS. Retrieved December 12, 2020 from https://nos.nl/artikel/2350450-opening-grootste-windpark-van-nederland-meeste-stroom-naar-datacenter-microsoft.htmlGoogle ScholarGoogle Scholar
  26. Slava Gomzin. 2014. Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions. John Wiley & Sons, Indianapolis.Google ScholarGoogle Scholar
  27. Beatrice de Graaf. 2010. Theater van angst: De strijd tegen terrorisme in Nederland, Duitsland, Italië en Amerika. Amsterdam.Google ScholarGoogle Scholar
  28. Andy Greenberg. 2017. After 3 Years, Why Gmail's End-to-End Encryption Is Still Vapor. WIRED. Retrieved February 7, 2021 from https://www.wired.com/2017/02/3-years-gmails-end-end-encryption-still-vapor/Google ScholarGoogle Scholar
  29. Andy Greenberg. 2018. WhatsApp Co-Founder Brian Acton Injects $50 Million in Newly Formed Signal Foundation. WIRED. Retrieved December 8, 2020 from https://www.wired.com/story/signal-foundation-whatsapp-brian-acton/Google ScholarGoogle Scholar
  30. Andy Greenberg. 2020. Facebook Says Encrypting Messenger by Default Will Take Years. WIRED. Retrieved February 11, 2021 from https://www.wired.com/story/facebook-messenger-end-to-end-encryption-default/Google ScholarGoogle Scholar
  31. Maarten Hafkamp. 2020. Ster: 25 miljoen euro minder reclame-inkomsten in eerste halfjaar. Adformatie. Retrieved December 12, 2020 from https://www.adformatie.nl/media/ster-25-miljoen-euro-reclame-inkomsten-eerste-halfjaarGoogle ScholarGoogle Scholar
  32. Andrew Jay Hawkins. 2020. Uber lost $8.5 billion in 2019, but it thinks it can get profitable by the end of 2020. The Verge. Retrieved December 11, 2020 from https://www.theverge.com/2020/2/6/21126965/uber-q4-earnings-report-net-loss-revenue-profit-2019Google ScholarGoogle Scholar
  33. Jon Henley. 2014. How do you deradicalise returning Isis fighters? The Guardian. Retrieved February 10, 2021 from https://www.theguardian.com/world/2014/nov/12/deradicalise-isis-fighters-jihadists-denmark-syriaGoogle ScholarGoogle Scholar
  34. Matthew Hill. 2020. Amazon: What They Know About Us. BBC.Google ScholarGoogle Scholar
  35. Sean Hooley and Latanya Sweeney. 2013. Survey of Publicly Available State Health Databases. Cambridge and Massachusetts. Retrieved February 12, 2021 from https://thedatamap.org/1075-1.pdfGoogle ScholarGoogle ScholarCross RefCross Ref
  36. Hella Hueck and Jeroen Piersma. 2020. Adverteren zonder vervelende cookies blijkt minstens zo lucratief. Financieel Dagblad. Retrieved December 12, 2020 from https://fd.nl/achtergrond/1355271/adverteren-zonder-vervelende-cookies-blijkt-minstens-zo-lucratiefGoogle ScholarGoogle Scholar
  37. Erwin James. 2013. Bastoy: the Norwegian prison that works. The Guardian. Retrieved February 10, 2021 from https://www.theguardian.com/society/2013/sep/04/bastoy-norwegian-prison-worksGoogle ScholarGoogle Scholar
  38. Joseph Johnson. 2021. Advertising revenue of Google from 2001 to 2020. Statista. Retrieved February 14, 2021 from https://www.statista.com/statistics/266249/advertising-revenue-of-google/Google ScholarGoogle Scholar
  39. Joseph Johnson. 2021. Annual revenue of Google from 2002 to 2020. Statista. Retrieved February 13, 2021 from https://www.statista.com/statistics/266206/googles-annual-global-revenue/Google ScholarGoogle Scholar
  40. Naveena Karusala, Apoorva Bhalla, and Neha Kumar. 2019. Privacy, Patriarchy, and Participation on Social Media. In Proceedings of the 2019 on Designing Interactive Systems Conference (DIS ’19), Association for Computing Machinery, New York, 551–526. https://doi.org/10.1145/3322276.3322355Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Jacob Kastrenakes. 2018. Facebook spoke with hospitals about matching health data to anonymized profiles. The Verge. Retrieved December 8, 2020 from https://www.theverge.com/2018/4/5/17203262/facebook-medical-data-sharing-plan-healthcareGoogle ScholarGoogle Scholar
  42. Danielle Keats, Citron Frank Pasquale, Danielle Keats Citron, and Frank Pasquale. 2014. The Scored Society: Due Process for Automated Predictions. Washington Law Review 89, 8 (2014), 1–33.Google ScholarGoogle Scholar
  43. Nancy S. Kim. 2013. Wrap Contracts:  Foundations and Ramifications. Oxford University Press, New York. Retrieved February 7, 2021 from https://papers.ssrn.com/abstract=2322255Google ScholarGoogle Scholar
  44. Marshall Kirkpatrick. 2010. Facebook's Zuckerberg Says the Age of Privacy is Over. The New York Times. Retrieved February 6, 2021 from https://archive.nytimes.com/www.nytimes.com/external/readwriteweb/2010/01/10/10readwriteweb-facebooks-zuckerberg-says-the-age-of-privac-82963.htmlGoogle ScholarGoogle Scholar
  45. Nicole Kobie. 2016. Quantum computing and its threat on encryption and our data. WIRED. Retrieved February 7, 2021 from https://www.wired.co.uk/article/quantum-computers-quantum-security-encryptionGoogle ScholarGoogle Scholar
  46. Ava Kofman and Ariana Tobin. 2019. Facebook Ads Can Still Discriminate Against Women and Older Workers, Despite a Civil Rights Settlement. ProPublica. Retrieved December 12, 2020 from https://www.propublica.org/article/facebook-ads-can-still-discriminate-against-women-and-older-workers-despite-a-civil-rights-settlementGoogle ScholarGoogle Scholar
  47. Bart de Koning. 2015. Nieuws: de politie blijkt op grote schaal de wet te overtreden. De Correspondent. Retrieved December 10, 2020 from https://decorrespondent.nl/3734/nieuws-de-politie-blijkt-op-grote-schaal-de-wet-te-overtreden/510916939412-7be7c192Google ScholarGoogle Scholar
  48. Bert-Jaap Koops, Bryce Clayton Newell, Tjerk Timan, Ivan Škorvánek, Tomislavz Chokrevski, and Maša Galič. 2017. A Typology of Privacy. University of Pennsylvania Journal of International Law 38, 2 (2017), 483–575. Retrieved December 5, 2020 from https://ssrn.com/abstract=2754043Google ScholarGoogle Scholar
  49. Jeroen Kraaijenbrink. 2019. The Secret of Coolblue's Success? Their Tagline. Forbes. Retrieved December 11, 2020 from https://www.forbes.com/sites/jeroenkraaijenbrink/2019/05/21/the-secret-of-coolblues-success-their-tagline/?sh=6cf772e72cdaGoogle ScholarGoogle Scholar
  50. Jeroen Kraaijenbrink. 2019. How To Bring Sustainability To the Masses: Tony's Chocolonely's Impact Strategy. Forbes. Retrieved December 11, 2020 from https://www.forbes.com/sites/jeroenkraaijenbrink/2019/11/08/how-to-bring-sustainability-to-the-masses-tonys-chocolonely-impact-strategy/?sh=39e624ed712aGoogle ScholarGoogle Scholar
  51. Alexander Kunst. 2020. Messenger usage by brand in Germany 2020. Statista. Retrieved December 8, 2020 from https://www.statista.com/forecasts/998694/messenger-usage-by-brand-in-germanyGoogle ScholarGoogle Scholar
  52. Nicholas D Lane, Junyuan Xie, Thomas Moscibroda, and Feng Zhao. 2012. On the Feasibility of User De-Anonymization from Shared Mobile Sensor Data. In Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones (PhoneSense ’12), Association for Computing Machinery, New York, 1–5. https://doi.org/10.1145/2389148.2389151Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Marc Langheinrich. 2001. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In Proceedings of the 3rd International Conference on Ubiquitous Computing, Springer, 273–291. https://doi.org/10.5555/647987.741336Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Micah Lee. 2016. Battle of the Secure Messaging Apps: How Signal Beats WhatsApp. The Intercept. Retrieved December 8, 2020 from https://theintercept.com/2016/06/22/battle-of-the-secure-messaging-apps-how-signal-beats-whatsapp/Google ScholarGoogle Scholar
  55. Mark A. Lemley. 2006. Terms of Use. Minnesota Law Review 91, (2006), 459–483. Retrieved February 7, 2021 from https://papers.ssrn.com/abstract=917926Google ScholarGoogle Scholar
  56. Karlin Lillington. 2020. EU legislation is coming that could greatly improve the web. The Irish Times. Retrieved December 10, 2020 from https://www-irishtimes-com.cdn.ampproject.org/c/s/www.irishtimes.com/business/technology/eu-legislation-is-coming-that-could-greatly-improve-the-web-1.4432111?mode=ampGoogle ScholarGoogle Scholar
  57. Peter Linzer. 2015. Contract as Evil. Hastings Law Journal 66, (2015), 971–1010. Retrieved February 7, 2021 from https://hastingslawjournal.org/wp-content/uploads/Linzer-66.4.pdfGoogle ScholarGoogle Scholar
  58. Mary Madden and Lee Rainie. 2015. Americans’ Attitudes About Privacy, Security and Surveillance. Pew Research Center. Retrieved February 6, 2021 from https://www.pewresearch.org/internet/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/Google ScholarGoogle Scholar
  59. John Markoff. 2006. Taking Spying to Higher Level, Agencies Look for More Ways to Mine Data - The New York Times. The New York Times. Retrieved February 9, 2021 from https://www.nytimes.com/2006/02/25/technology/taking-spying-to-higher-level-agencies-look-for-more-ways-to.htmlGoogle ScholarGoogle Scholar
  60. Thomas J. Maronick. 2014. Do Consumers Read Terms of Service Agreements When Installing Software? - A Two-Study Empirical Analysis. International Journal of Business and Social Research 4, 6 (2014), 137–145. Retrieved February 7, 2021 from https://EconPapers.repec.org/RePEc:lrc:larijb:v:4:y:2014:i:6:p:137-145Google ScholarGoogle Scholar
  61. Maurits Martijn. 2015. Baas Belastingdienst over Big Data: ‘Mijn missie is gedragsverandering.’ De Correspondent. Retrieved December 10, 2020 from https://decorrespondent.nl/2720/baas-belastingdienst-over-big-data-mijn-missie-is-gedragsverandering/83656320-f6e78aafGoogle ScholarGoogle Scholar
  62. Maurits Martijn and Dimitri Tokmetzis. 2019. Je hebt wél iets te verbergen: over het levensbelang van privacy. De Correspondent.Google ScholarGoogle Scholar
  63. Maurits Martijn, Dimitri Tokmetzis, Riffy Bol, and Foeke Postma. 2018. This fitness app lets anyone find names and addresses for thousands of soldiers and secret agents. De Correspondent. Retrieved December 8, 2020 from https://decorrespondent.nl/8480/this-fitness-app-lets-anyone-find-names-and-addresses-for-thousands-of-soldiers-and-secret-agents/260810880-cc840165Google ScholarGoogle Scholar
  64. Chris Matyszczyk. 2015. The Internet will vanish, says Google's Eric Schmidt. CNET. Retrieved February 4, 2021 from https://www.cnet.com/news/the-internet-will-vanish-says-googles-schmidt/Google ScholarGoogle Scholar
  65. Aleecia M. McDonald and Lorrie Faith Cranor. 2008. The Cost of Reading Privacy Policies. A Journal of Law and Policy for the Information Society 4, 6 (2008), 543–568. Retrieved February 7, 2021 from https://kb.osu.edu/handle/1811/72839Google ScholarGoogle Scholar
  66. Daniel Mikkelsen, Henning Soller, and Malin Strandell-Jansson. 2019. What will Europe's e-privacy regulation mean for your business? McKinsey & Company. Retrieved December 12, 2020 from https://www.mckinsey.com/business-functions/risk/our-insights/what-will-europes-eprivacy-regulation-mean-for-your-businessGoogle ScholarGoogle Scholar
  67. Yves-Alexandre de Montjoye, Laura Radaelli, Vivek Kumar Singh, and Alex “Sandy” Pentland. 2015. Unique in the shopping mall: On the reidentifiability of credit card metadata. Science 347, 6221 (January 2015), 536–539. https://doi.org/10.1126/science.1256297Google ScholarGoogle ScholarCross RefCross Ref
  68. Daphne A. Muller and Pierre Lévy. 2019. A Design Approach Towards Affording the Trend of Privacy. In Proceedings of the 2019 on Designing Interactive Systems Conference (DIS ’19), Association for Computing Machinery, New York, 435–446. https://doi.org/10.1145/3322276.3322324Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Amelia Nierenberg. 2020. Signal Is the Messaging App of the Protests. The New York Times. Retrieved December 8, 2020 from https://www.nytimes.com/2020/06/11/style/signal-messaging-app-encryption-protests.htmlGoogle ScholarGoogle Scholar
  70. Kirill Nikitin, Ludovic Barman, Wouter Lueks, Matthew Underwood, Jean-Pierre Hubaux, and Bryan Ford. 2019. Reducing Metadata Leakage from Encrypted Files and Communication with PURBs. In Proceedings on Privacy Enhancing Technologies, Sciendo, 6–33. https://doi.org/10.2478/popets-2019-0056Google ScholarGoogle ScholarCross RefCross Ref
  71. Helen Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Helen Nissenbaum. 2011. A Contextual Approach to Privacy Online. Daedalus 140, 4 (September 2011), 32–48. https://doi.org/10.1162/DAED_a_00113Google ScholarGoogle ScholarCross RefCross Ref
  73. Parmy Olson. 2018. Exclusive: WhatsApp Cofounder Brian Acton Gives The Inside Story On #DeleteFacebook And Why He Left $850 Million Behind. Forbes. Retrieved December 12, 2020 from https://www.forbes.com/sites/parmyolson/2018/09/26/exclusive-whatsapp-cofounder-brian-acton-gives-the-inside-story-on-deletefacebook-and-why-he-left-850-million-behind/?sh=1a46d3173f20Google ScholarGoogle Scholar
  74. Leysia Palen and Paul Dourish. 2003. Unpacking “Privacy” for a Networked World. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Association for Computing Machinery, New York, 129–136. https://doi.org/10.1145/642611.642635Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Frank Pasquale. 2013. Privacy, Antitrust, and Power. George Mason Law Review 20, 4 (2013), 1024. Retrieved February 14, 2021 from https://digitalcommons.law.umaryland.edu/fac_pubs/1343/Google ScholarGoogle Scholar
  76. Frank Pasquale. 2015. The Black Box Society: The Secret Algorithms That Control Money and Information. Harvard University Press, London.Google ScholarGoogle Scholar
  77. Frank Pasquale and Danielle Citron. 2014. Promoting Innovation While Preventing Discrimination: Policy Goals for the Scored Society. Washington Law Review 89, (2014), 1413–1424.Google ScholarGoogle Scholar
  78. Jeffrey Paul. 2020. Your Computer Isn't Yours. Sneak.Berlin. Retrieved December 12, 2020 from https://sneak.berlin/20201112/your-computer-isnt-yours/#updatesGoogle ScholarGoogle Scholar
  79. Michael Pisa. 2019. Developing Countries Seek Greater Control as Tech Giants Woo the “Next Billion Users.” Center For Global Development. Retrieved February 7, 2021 from https://www.cgdev.org/blog/developing-countries-seek-greater-control-tech-giants-woo-next-billion-usersGoogle ScholarGoogle Scholar
  80. Victoria C. Plaut and Robert P. Bartlett. 2011. Blind consent? A social psychological investigation of non-readership of click-through agreements. Law and Human Behavior (June 2011), 1–23. https://doi.org/10.1007/s10979-011-9288-yGoogle ScholarGoogle ScholarCross RefCross Ref
  81. Jos Poortvliet. 2020. Nextcloud doubles order intake and customer base, remains profitable and independent. Nextcloud. Retrieved December 8, 2020 from https://nextcloud.com/blog/nextcloud-doubles-order-intake-and-customer-base-remains-profitable-and-independent/Google ScholarGoogle Scholar
  82. Espen Beer Prydz and Divyanshi Wadhwa. 2019. Classifying countries by income. The World Bank. Retrieved February 7, 2021 from https://datatopics.worldbank.org/world-development-indicators/stories/the-classification-of-countries-by-income.htmlGoogle ScholarGoogle Scholar
  83. Margaret Jane Radin. 2013. Boilerplate: The fine print, vanishing rights, and the rule of law. Princeton University Press, New Jersey and Oxfordshire.Google ScholarGoogle ScholarCross RefCross Ref
  84. Nathan Reiff. 2020. 5 Companies Owned by Facebook. Investopedia. Retrieved February 12, 2021 from https://www.investopedia.com/articles/personal-finance/051815/top-11-companies-owned-facebook.aspGoogle ScholarGoogle Scholar
  85. John Rose, Alexander Lawrence, and Elias Baltassis. 2018. Bridging the Trust Gap in Personal Data. The Boston Consulting Group. Retrieved February 14, 2021 from https://image-src.bcg.com/Images/BCG-Bridging-the-Trust-Gap-in-Personal-Data-Mar-2018_tcm9-186201.pdfGoogle ScholarGoogle Scholar
  86. Hanna Rosin. 2016. How A Danish Town Helped Young Muslims Turn Away From ISIS. NPR. Retrieved February 10, 2021 from https://www.npr.org/sections/health-shots/2016/07/15/485900076/how-a-danish-town-helped-young-muslims-turn-away-from-isis?t=1612957381308Google ScholarGoogle Scholar
  87. James B. Rule. 2015. Privacy: the longue durée. In Social Dimensions of Privacy, Beate Roessler and Dorota Mokrosinska (eds.). Cambridge University Press, Cambridge. https://doi.org/10.1017/CBO9781107280557.002Google ScholarGoogle ScholarCross RefCross Ref
  88. Tugba Sabanoglu. 2020. Annual operating income of Amazon from 2014 to 2019, by segment. Statista. Retrieved December 11, 2020 from https://www.statista.com/statistics/241835/amazon-operating-income-annual-by-segment/Google ScholarGoogle Scholar
  89. Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchil. 2018. “Privacy is Not for Me, It's for Those Rich Women”: Performative Privacy Practices on Mobile Phones by Women in South Asia. In Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security (SOUPS ’18), USENIX Association, 127–142.Google ScholarGoogle Scholar
  90. Jessica Schneider. 2017. DOJ demands Facebook info from “anti-administration activists.” CNN. Retrieved December 12, 2020 from https://edition.cnn.com/2017/09/28/politics/facebook-anti-administration-activists/index.htmlGoogle ScholarGoogle Scholar
  91. Bruce Schneier. 2015. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (1st ed.). W. W. Norton & Company, New York and London.Google ScholarGoogle Scholar
  92. Daniel Solove. 2001. Privacy and Power: Computer Databases and Metaphors for Information Privacy. Stanford Law Review 53, (July 2001), 1393–1462.Google ScholarGoogle ScholarCross RefCross Ref
  93. Daniel J. Solove. 2013. Introduction: Privacy self-management and the consent dilemma. Harvard Law Review 126, (2013), 1880–1903.Google ScholarGoogle ScholarCross RefCross Ref
  94. Jared Spataro. 2020. Power your digital transformation with insights from Microsoft Productivity Score. Microsoft. Retrieved December 12, 2020 from https://www.microsoft.com/en-us/microsoft-365/blog/2020/10/29/power-your-digital-transformation-with-insights-from-microsoft-productivity-score/Google ScholarGoogle Scholar
  95. Felix Stalder. 2002. Opinion. Privacy is not the antidote to surveillance. Surveillance and Society 1, 1 (2002), 120–124. https://doi.org/10.24908/ss.v1i1.3397Google ScholarGoogle ScholarCross RefCross Ref
  96. Nili Steinfeld. 2016. “I agree to the terms and conditions”: (How) do users read privacy policies online? An eye-tracking experiment. Computers in Human Behavior 55, (February 2016), 992–1000. https://doi.org/10.1016/j.chb.2015.09.038Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Jessica Su, Ansh Shukla, Sharad Goel, and Arvind Narayanan. 2017. De-Anonymizing Web Browsing Data with Social Networks. In Proceedings of the 26th International Conference on World Wide Web (WWW ’17), International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, 1261–1269. https://doi.org/10.1145/3038912.3052714Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Latanya Sweeney. 2015. Only You, Your Doctor, and Many Others May Know. Technology Science (2015). Retrieved February 7, 2021 from https://techscience.org/a/2015092903/Google ScholarGoogle Scholar
  99. H. Tankovska. 2021. Cumulative number of monthly Facebook product users as of 4th quarter 2020. Statista. Retrieved February 14, 2021 from https://www.statista.com/statistics/947869/facebook-product-mau/Google ScholarGoogle Scholar
  100. H. Tankovska. 2021. Facebook's annual revenue from 2009 to 2020. Statista. Retrieved February 14, 2021 from https://www.statista.com/statistics/268604/annual-revenue-of-facebook/Google ScholarGoogle Scholar
  101. Vlad Tarko. 2017. Elinor Ostrom: An Intellectual Biography. Rowman & Littlefield International Ltd, London.Google ScholarGoogle Scholar
  102. Taylor Tepper. 2020. Airbnb is Going Public. Here's What it Means for You. Forbes. Retrieved December 11, 2020 from https://www.forbes.com/advisor/investing/airbnb-ipo/Google ScholarGoogle Scholar
  103. Richard H. Thaler and Cass R. Sunstein. 2009. Nudge: Improving Decisions About Health, Wealth and Happiness. Penguin Putnam Inc, London.Google ScholarGoogle Scholar
  104. Alexis Trittipo, Kayvaun Rowshankish, and Simon London. 2018. Data privacy: What every manager needs to know. McKinsey & Company. Retrieved December 12, 2020 from https://www.mckinsey.com/business-functions/risk/our-insights/data-privacy-what-every-manager-needs-to-knowGoogle ScholarGoogle Scholar
  105. Joseph Turow, Michael Hennessy, and Nora A. Draper. 2015. The Tradeoff Fallacy - How Marketers Are Misrepresenting American Consumers and Opening Them up to Exploitation. Annenberg School for Communication.Google ScholarGoogle Scholar
  106. Joseph Turow, Jennifer King, Chris Jay Hoofnagle, Amy Bleakley, and Michael Hennessy. 2009. Contrary to What Marketers Say, Americans Reject Tailored Advertising and Three Activities That Enable It. SSRN (September 2009). https://doi.org/10.2139/ssrn.1478214Google ScholarGoogle ScholarCross RefCross Ref
  107. Aditya Vashistha, Richard Anderson, and Shrirang Mare. 2018. Examining Security and Privacy Research in Developing Regions. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS ’18), Association for Computing Machinery, New York, 1–14. https://doi.org/10.1145/3209811.3209818Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Kees Verhoeven. 2020. De Digitale D66 Agenda 2020-2030. D66. Retrieved December 10, 2020 from https://d66.nl/nieuws/digitale-dilemmas-verdienen-politieke-prioriteit/Google ScholarGoogle Scholar
  109. Amy Watson. 2020. Spotify revenue/net income from 2009 to 2019. Statista. Retrieved December 11, 2020 from https://www.statista.com/statistics/244990/spotifys-revenue-and-net-income/Google ScholarGoogle Scholar
  110. Mark Weiser. 1991. The Computer for the 21st Century. Scientific American 265, 3 (September 1991), 94–105.Google ScholarGoogle ScholarCross RefCross Ref
  111. Anna Wiener. 2020. Taking Back Our Privacy. The New Yorker. Retrieved February 12, 2021 from https://www.newyorker.com/magazine/2020/10/26/taking-back-our-privacyGoogle ScholarGoogle Scholar
  112. Tim Worstall. 2013. Why Email Can Never Be Truly Secure: It's the Metadata. Forbes. Retrieved December 8, 2020 from https://www.forbes.com/sites/timworstall/2013/08/18/why-email-can-never-be-truly-secure-its-the-metadata/#2f7eb4b04a5bGoogle ScholarGoogle Scholar
  113. Shoshana Zuboff. 2015. Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology 30, 1 (March 2015), 75–89. https://doi.org/10.1057/jit.2015.5Google ScholarGoogle ScholarCross RefCross Ref
  114. Shoshana Zuboff. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs, New York.Google ScholarGoogle Scholar
  115. 2011. Visie op Sensing binnen de Politie: Waarnemen in een genetwerkte maatschappij. Korps landelijke politiediensten (leaked by Freedominc). Retrieved February 9, 2021 from https://freedominc.nl/files/20110600-klpd-visie-op-sensing-binnen-de-politie_redacted.pdfGoogle ScholarGoogle Scholar
  116. 2015. Special Eurobarometer 431: Data Protection. European Commission. Retrieved December 8, 2020 from https://ec.europa.eu/commfrontoffice/publicopinion/archives/ebs/ebs_431_en.pdfGoogle ScholarGoogle Scholar
  117. 2018. The promotion, protection and enjoyment of human rights on the Internet: resolution / adopted by the Human Rights Council on 5 July 2018. UN. Human Rights Council, Geneva. Retrieved December 6, 2020 from https://digitallibrary.un.org/record/1639840Google ScholarGoogle Scholar
  118. 2019. Surveillance Giants: How the Business Model of Google and Facebook Threatens Human Rights. Amnesty International Ltd, London. Retrieved December 5, 2020 from https://www.amnesty.org/en/documents/pol30/1404/2019/en/Google ScholarGoogle Scholar
  119. 2019. Global Survey on Internet Security and Trust. Centre for International Governance Innovation. Retrieved February 6, 2021 from https://www.cigionline.org/internet-survey-2019Google ScholarGoogle Scholar
  120. 2019. Special Eurobarometer 487a: The General Data Protection Regulation. European Commission. https://doi.org/10.2838/43726Google ScholarGoogle ScholarCross RefCross Ref
  121. 2019. Bluepaper 2018-2019 - Innovation & Omnichannel E-fulfilment - EN. Shopping Tomorrow. Retrieved December 12, 2020 from https://www.shoppingtomorrow.nl/nl/zoekresultaten?query=innovationGoogle ScholarGoogle Scholar
  122. 2019. Amazon's Private Labels Are Causing Even More Retail Disruption. eMarketer Insider Intelligence. Retrieved February 12, 2021 from https://www.emarketer.com/content/amazon-s-private-labels-are-causing-even-more-retail-disruptionGoogle ScholarGoogle Scholar
  123. 2019. Innovative Retail Technology 2018-2019. Shopping Tomorrow. Retrieved December 12, 2020 from https://www.shoppingtomorrow.nl/nl/themas/city-store/store-innovationGoogle ScholarGoogle Scholar
  124. 2020. Signal. Signal. Retrieved December 8, 2020 from https://signal.org/Google ScholarGoogle Scholar
  125. 2020. Innovative Retail Technology 2019-2020. Shopping Tomorrow. Retrieved December 12, 2020 from https://www.shoppingtomorrow.nl/nl/themas/city-store/store-innovationGoogle ScholarGoogle Scholar
  126. 2020. Warden App management utility. Aurora OSS. Retrieved December 12, 2020 from https://auroraoss.com/app_info.php?app_id=3Google ScholarGoogle Scholar
  127. 2020. Digital privacy. European Commission. Retrieved December 12, 2020 from https://ec.europa.eu/digital-single-market/en/online-privacyGoogle ScholarGoogle Scholar
  128. 2020. Alphabet Market Cap. YCharts. Retrieved February 14, 2021 from https://ycharts.com/companies/GOOG/market_capGoogle ScholarGoogle Scholar
  129. 2020. Facebook Market Cap. YCharts. Retrieved February 14, 2021 from https://ycharts.com/companies/FB/market_capGoogle ScholarGoogle Scholar
  130. 2021. Alphabet Profit Margin 2006-2020 | GOOGL. MacroTrends. Retrieved February 12, 2021 from https://www.macrotrends.net/stocks/charts/GOOGL/alphabet/profit-marginsGoogle ScholarGoogle Scholar
  131. What is personal data? European Commission. Retrieved December 5, 2020 from https://ec.europa.eu/info/law/law-topic/data-protection/reform/what-personal-data_enGoogle ScholarGoogle Scholar
  132. GDPR Enforcement Tracker - list of GDPR fines. CMS Law. Retrieved December 8, 2020 from https://www.enforcementtracker.com/Google ScholarGoogle Scholar
  133. You should control your data. Nextcloud. Retrieved December 8, 2020 from https://nextcloud.com/about/Google ScholarGoogle Scholar
  134. Consultancy Fees & Rates. Consultancy.org. Retrieved February 12, 2021 from https://www.consultancy.org/consulting-industry/fees-ratesGoogle ScholarGoogle Scholar
  135. IT Consulting. Consultancy.org. Retrieved February 12, 2021 from https://www.consultancy.org/consulting-industry/it-consultingGoogle ScholarGoogle Scholar
  136. Pi-hole: Network-wide Ad Blocking. Pi-hole. Retrieved December 8, 2020 from https://pi-hole.net/Google ScholarGoogle Scholar
  137. The Digital Services Act package. European Commission. Retrieved December 10, 2020 from https://ec.europa.eu/digital-single-market/en/digital-services-act-packageGoogle ScholarGoogle Scholar
  138. Google Acquisitions. AcquiredBy. Retrieved February 12, 2021 from https://acquiredby.co/google-acquisitions/Google ScholarGoogle Scholar
  139. Onze producten. Google. Retrieved February 12, 2021 from https://about.google/products/Google ScholarGoogle Scholar
  140. Netherlands GNI Per Capita 1962-2021. MacroTrends. Retrieved February 7, 2021 from https://www.macrotrends.net/countries/NLD/netherlands/gni-per-capitaGoogle ScholarGoogle Scholar
  141. US Dollar (USD) to Euro (EUR) exchange rate history. ExchangeRates. Retrieved February 14, 2021 from https://www.exchangerates.org.uk/USD-EUR-exchange-rate-history.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. The Computer for the 21st Century – Second Edition for Europe: Open-source Projects, Consumer Activism, and Collaboration Will Make Privacy the Central Pillar of Innovation and Cause a Technology Industry Where Creative Ideas From Small Market Players Can Flourish
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Article Metrics

            • Downloads (Last 12 months)19
            • Downloads (Last 6 weeks)6

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format