Showing 1 - 10 of 39
The essay is written in the form of a magazine article published in 2039 - eleven yearsafter the introduction of NeoTouch, a technology facilitating digital touch as human-to-humancommunication based on a brain-computer interface (BCI). The article follows Barbara, a youngwoman who recently had...
Persistent link: https://www.econbiz.de/10012206921
Society is becoming increasingly dependent on data-rich, "Big Tech" platforms and social networks, such as Facebook and Google. But what happens to our data when these companies close or fail? Despite the high stakes involved, this topic has received only limited attention to date. In this...
Persistent link: https://www.econbiz.de/10012292722
privacy and security. The present paper is one of the few empirical studies on CPs and is based on participant observation of …
Persistent link: https://www.econbiz.de/10012306906
How do we come to trust, use and govern virtual private networks (VPNs)? How do these objects of the internet tack back and forth between metaphor and technical processes as they garner usership and critique? This paper aims to answer these questions by considering VPNs as boundary objects. We...
Persistent link: https://www.econbiz.de/10012306908
"Feminist data protection" is not an established term or field of study: data protection discourse is dominated by doctrinal legal and economic positions, and feminist perspectives are few and far between. This editorial introduction summarises a number of recent interventions in the broader...
Persistent link: https://www.econbiz.de/10012876076
and a performative theory of privacy: as a resource, an objective discovery and an assumption. It also discusses …
Persistent link: https://www.econbiz.de/10012876078
privacy threat in mobile apps. The EU General Data Protection Regulation (GDPR) was introduced in 2018 to protect personal …
Persistent link: https://www.econbiz.de/10012876089
Cypherpunk refers to social movements, individuals, institutions, technologies, and political actions that, with a decentralised approach, defend, support, offer, code, or rely on strong encryption systems in order to re-shape social, political, or economic asymmetries. Based on a literature...
Persistent link: https://www.econbiz.de/10013194758
This article examines whether the territorial scope of the EU General Data Protection Regulation promotes European values. While the regulation received international attention, it remains questionable whether provisions with extraterritorial effect support a power-based approach or a...
Persistent link: https://www.econbiz.de/10012657631
Formal, government-driven technology standards developing organisations (SDOs) traditionally serve as platforms for compromise between existing national standards. In the past decade, the recognition of the driving role of SDOs in innovation has made them surface into the public debate. The...
Persistent link: https://www.econbiz.de/10012657635