Accès libre

Explaining the unexplainable: data sharing and privacy in Web 3.0

 et   
02 avr. 2025
À propos de cet article

Citez
Télécharger la couverture

Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L.F., Komanduri, S., Leon, P.G., Sadeh, N., Schaub, F., Sleeper, M., Wang, Y. and Wilson, S (2017) ‘Nudges for privacy and security: understanding and assisting users’ choices online’, ACM Computing Surveys, 50(3), article 44, pp. 1–41. Available at: https://doi.org/10.1145/3054926 Search in Google Scholar

Arrieta, A.B., Díaz-Rodríguez, N., Del Ser, J., Bennetot, A., Tabik, S., Barbado, A., García, S., Gil-López, S., Molina, D., Benjamins, R., Chatila, R. and Herrera, F. (2020) ‘Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI’, Information Fusion, 58(1), pp. 82–115. Available at: https://doi.org/10.1016/j.inffus.2019.12.012 Search in Google Scholar

Barth, S. and de Jong, M.D.T. (2017) ‘The privacy paradox—investigating discrepancies between expressed privacy concerns and actual online behavior—a systematic literature review’, Telematics and Informatics, 34(7), pp. 1038–1058. Available at: https://doi.org/10.1016/j.tele.2017.04.013 Search in Google Scholar

Berger-Walliser, G. (2012) ‘The past and future of proactive law: an overview of the development of the proactive law movement. Proactive law in a business environment’, in Berger-Walliser, G. and Østergaard, K. (eds) Proactive law in a business environment. Copenhagen: DJØF Publishing, pp. 13–31. Available at: https://ssrn.com/abstract=2576761 (Accessed: 18 December 2024). Search in Google Scholar

Bhattacharya, A. (2022) Applied machine learning explainability techniques: make ML models explainable and trustworthy for practical applications using LIME, SHAP, and more. Birmingham: Packt Publishing Ltd. Search in Google Scholar

Bongard-Blanchy, K., Rossi, A., Rivas, S., Doublet, S., Koenig, V. and Lenzini, G. (2021) ‘“I am definitely manipulated, even when I am aware of it. It’s ridiculous!”—Dark patterns from the end-user perspective’, in Proceedings of the 2021 ACM Designing Interactive Systems Conference (DIS ‘21). New York: Association for Computing Machinery, pp. 763–776. Available at: https://doi.org/10.1145/3461778.3462086 Search in Google Scholar

Bouchagiar, G. (2018) ‘Privacy and Web 3.0: implementing trust and learning from social networks’, Review of European Studies, 10(4), pp. 16–28. Available at: https://doi.org/10.5539/res.v10n4p16 Search in Google Scholar

Bruwer, R.H.J. and Rudman, R. (2015) ‘Web 3.0: governance, risks and safeguards’, Journal of Applied Business Research, 31(3), pp. 1037–1056. Available at: https://doi.org/10.19030/jabr.v31i3.9241 Search in Google Scholar

Chen, T. and Guestrin, C. (2016) ‘XGBoost: a scalable tree boosting system’, Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 22, pp. 785–794. Available at: https://doi.org/10.1145/2939672.2939785 Search in Google Scholar

‘Directive (EU) 2022/1925 of the European Parliament and of the Council of 14 September 2022 on contestable and fair markets in the digital sector’. Official Journal L 265, 14 September, pp. 1–66. Search in Google Scholar

Ghalebikesabi, S., Bagdasaryan, E., Yi, R., Yona, I., Shumailov, I., Pappu, A., Shi, C., Weidinger, L., Stanforth, R., Berrada, L., Kohli, P., Huang, P-S. and Balle, B. (2024) ‘Operationalizing contextual integrity in privacy-conscious assistants’, ArXiv, article 2408.02373. Available at: https://doi.org/10.48550/arXiv.2408.02373 Search in Google Scholar

Hagan, M. (2020) ‘Legal design as a thing: a theory of change and a set of methods to craft a human-centered legal system’, Design Issues, 36(3), pp. 3–15. Available at: https://doi.org/10.1162/desi_a_00600 Search in Google Scholar

Jackson, C.B. and Wang, Y. (2018) ‘Addressing the privacy paradox through personalized privacy notifications’, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(2), article 68, pp. 1–25. Available at: https://doi.org/10.1145/3214271 Search in Google Scholar

Jones, M.L., Kaufman, E. and Edenberg, E. (2018) ‘AI and the ethics of automating consent’, IEEE Security & Privacy, 16(3), pp. 64–72. Available at: https://doi.org/10.1109/msp.2018.2701155 Search in Google Scholar

Klitou, D. (2014) Privacy-invading technologies and privacy by design: safeguarding privacy, liberty and security in the 21st century. The Hague: T.M.C. Asser Press. Available at: https://doi.org/10.1007/978-94-6265-026-8 Search in Google Scholar

Kokolakis, S. (2017) ‘Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon’, Computers & Security, 64(1), pp. 122–134. Available at: https://doi.org/10.1016/j.cose.2015.07.002 Search in Google Scholar

Larsson, S. and Heintz, F. (2020) ‘Transparency in artificial intelligence’, Internet Policy Review, 9(2), pp. 1–16. Available at: https://doi.org/10.14763/2020.2.1469 Search in Google Scholar

Lundberg, S.M. and Lee, S.-I. (2017) ‘A unified approach to interpreting model predictions’, Advances in Neural Information Processing Systems, 30, pp. 4765–4774. Available at: https://doi.org/10.48550/arXiv.1705.07874 Search in Google Scholar

Mazur, J. (2019) ‘Automated decision-making and the precautionary principle in EU law’, TalTech Journal of European Studies, 9(4), pp. 3–18. Available at: https://doi.org/10.1515/bjes-2019-0035 Search in Google Scholar

Kenny, E.M., Ford, C., Quinn, M. and Keane, M.T. (2020) ‘Explaining black-box classifiers using post-hoc explanations-by-example: the effect of explanations and error-rates in XAI user studies’, Artificial Intelligence, 294, article 103459. Available at: https://doi.org/10.1016/j.artint.2021.103459 Search in Google Scholar

Oviedo, J., Rodriguez, M., Trenta, A., Cannas, D., Natale, D. and Piattini, M. (2024) ‘ISO/IEC quality standards for AI engineering’, Computer Science Review, 54, article 100681. Available at: https://doi.org/10.1016/j.cosrev.2024.100681 Search in Google Scholar

Pavelek, O. and Zajíčková, D. (2021) ‘Personal data protection in the decision-making of the CJEU before and after the Lisbon Treaty’, TalTech Journal of European Studies, 11(2), pp. 167–188. Available at: https://doi.org/10.2478/bjes-2021-0020 Search in Google Scholar

Pohjonen, S. (2006) ‘Proactive law in the field of law’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 53–70. Available at: https://www.scandinavianlaw.se/pdf/49-4.pdf (Accessed: 12 September 2024). Search in Google Scholar

Razmetaeva, Y. (2020) ‘The right to be forgotten in the European perspective’, TalTech Journal of European Studies, 10(1), pp. 58–76. Available at: https://doi.org/10.1515/bjes-2020-0004 Search in Google Scholar

Rossi, A., Ducato, R., Haapio, H. and Passera, S. (2019) ‘When design met law: design patterns for information transparency’, Droit de la consommation, 122–123(5), pp. 79–121. Search in Google Scholar

Rudman, R. and Bruwer, R. (2016) ‘Defining Web 3.0: opportunities and challenges’, The Electronic Library, 34(1), pp. 132–154. Available at: https://doi.org/10.1108/EL-08-2014-0140 Search in Google Scholar

Schartum, D.W. (2006) ‘Introduction to a government-based perspective on proactive law: a proactive approach’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49, Stockholm: Stockholm Institute for Scandinavian Law, pp. 35–51. Available at: https://www.scandinavianlaw.se/pdf/49-3.pdf (Accessed: 12 September 2024). Search in Google Scholar

Schomakers, E.M., Lidynia, C. and Ziefle, M. (2019) ‘A typology of online privacy personalities: exploring and segmenting users’ diverse privacy attitudes and behaviors’, Journal of Grid Computing, 17(4), pp. 727–747. Available at: https://doi.org/10.1007/s10723-019-09500-3 Search in Google Scholar

Solarte-Vásquez, M.C., Järv, N. and Nyman-Metcalf, K. (2016) ‘Usability factors in transactional design and smart contracting’, in T. Kerikmäe and A. Rull (eds) The future of law and eTechnologies, Cham: Springer, pp. 149–176. Available at: https://doi.org/10.1007/978-3-319-26896-5_8 Search in Google Scholar

Solarte-Vásquez, M.C. and Nyman-Metcalf, K. (2017) ‘Smart contracting: a multidisciplinary and proactive approach for the EU digital single market’, Baltic Journal of European Studies, 7(2), pp. 208–246. Available at: https://doi.org/10.1515/bjes-2017-0017 Search in Google Scholar

Taherisadr, M., Stavroulakis, S.A. and Elmalaki, S. (2023) ‘AdaPARL: adaptive privacy-aware reinforcement learning for sequential decision making human-in-the-loop systems’, in IoTDI ‘23: Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, pp. 262–274. Available at: https://doi.org/10.1145/3576842.3582325 Search in Google Scholar

Wijesekera, P., Reardon, J., Reyes, I., Tsai, L., Chen, J., Good, N., Wagner, D., Beznosov, K. and Egelman, S. (2018) ‘Contextualizing privacy decisions for better prediction (and protection)’, in CHI ’18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Montreal QC: ACM, pp. 1–25. Available at: https://doi.org/10.1145/3173574.3173842 Search in Google Scholar

Xi, R. (2024) ‘On emerging technologies: the old regime and the proactivity’, Cardozo International & Comparative Law Review, 8(1), pp. 3–57. Available at: https://doi.org/10.2139/ssrn.4952153 Search in Google Scholar