Showing 1 - 10 of 42
Liberal democracies are increasingly considering internet filtering as a means to assert state control over online information exchanges. A variety of filtering techniques have been implemented in Western states to prevent access to certain content deemed harmful. This development poses a series...
Persistent link: https://www.econbiz.de/10012164290
implementation of privacy principles does not necessarily translate into meaningful privacy safeguards for users in the face of … have discretionary power to set their policies and practices prioritising strategic interests over privacy commitments …. Discussions in this paper complement existing studies on the implementation of privacy principles stipulated in Fair Information …
Persistent link: https://www.econbiz.de/10012164360
This article puts forth the concept of protocol power as the disproportionate influence of dominant platform actors to shape and set industry-wide standards, and thus determine certain rules of inclusion at the technical, existential level of protocol. In this way, protocol power shapes and...
Persistent link: https://www.econbiz.de/10014634514
Personal Information Management Systems (PIMS) seek to empower users by equipping them with mechanisms for mediating, monitoring and controlling how their data is accessed, used, or shared.
Persistent link: https://www.econbiz.de/10013194755
The essay is written in the form of a magazine article published in 2039 - eleven yearsafter the introduction of NeoTouch, a technology facilitating digital touch as human-to-humancommunication based on a brain-computer interface (BCI). The article follows Barbara, a youngwoman who recently had...
Persistent link: https://www.econbiz.de/10012206921
Society is becoming increasingly dependent on data-rich, "Big Tech" platforms and social networks, such as Facebook and Google. But what happens to our data when these companies close or fail? Despite the high stakes involved, this topic has received only limited attention to date. In this...
Persistent link: https://www.econbiz.de/10012292722
privacy and security. The present paper is one of the few empirical studies on CPs and is based on participant observation of …
Persistent link: https://www.econbiz.de/10012306906
How do we come to trust, use and govern virtual private networks (VPNs)? How do these objects of the internet tack back and forth between metaphor and technical processes as they garner usership and critique? This paper aims to answer these questions by considering VPNs as boundary objects. We...
Persistent link: https://www.econbiz.de/10012306908
"Feminist data protection" is not an established term or field of study: data protection discourse is dominated by doctrinal legal and economic positions, and feminist perspectives are few and far between. This editorial introduction summarises a number of recent interventions in the broader...
Persistent link: https://www.econbiz.de/10012876076
and a performative theory of privacy: as a resource, an objective discovery and an assumption. It also discusses …
Persistent link: https://www.econbiz.de/10012876078