[
Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L.F., Komanduri, S., Leon, P.G., Sadeh, N., Schaub, F., Sleeper, M., Wang, Y. and Wilson, S (2017) ‘Nudges for privacy and security: understanding and assisting users’ choices online’, ACM Computing Surveys, 50(3), article 44, pp. 1–41. Available at: https://doi.org/10.1145/3054926
]Search in Google Scholar
[
Arrieta, A.B., Díaz-Rodríguez, N., Del Ser, J., Bennetot, A., Tabik, S., Barbado, A., García, S., Gil-López, S., Molina, D., Benjamins, R., Chatila, R. and Herrera, F. (2020) ‘Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI’, Information Fusion, 58(1), pp. 82–115. Available at: https://doi.org/10.1016/j.inffus.2019.12.012
]Search in Google Scholar
[
Barth, S. and de Jong, M.D.T. (2017) ‘The privacy paradox—investigating discrepancies between expressed privacy concerns and actual online behavior—a systematic literature review’, Telematics and Informatics, 34(7), pp. 1038–1058. Available at: https://doi.org/10.1016/j.tele.2017.04.013
]Search in Google Scholar
[
Berger-Walliser, G. (2012) ‘The past and future of proactive law: an overview of the development of the proactive law movement. Proactive law in a business environment’, in Berger-Walliser, G. and Østergaard, K. (eds) Proactive law in a business environment. Copenhagen: DJØF Publishing, pp. 13–31. Available at: https://ssrn.com/abstract=2576761 (Accessed: 18 December 2024).
]Search in Google Scholar
[
Bhattacharya, A. (2022) Applied machine learning explainability techniques: make ML models explainable and trustworthy for practical applications using LIME, SHAP, and more. Birmingham: Packt Publishing Ltd.
]Search in Google Scholar
[
Bongard-Blanchy, K., Rossi, A., Rivas, S., Doublet, S., Koenig, V. and Lenzini, G. (2021) ‘“I am definitely manipulated, even when I am aware of it. It’s ridiculous!”—Dark patterns from the end-user perspective’, in Proceedings of the 2021 ACM Designing Interactive Systems Conference (DIS ‘21). New York: Association for Computing Machinery, pp. 763–776. Available at: https://doi.org/10.1145/3461778.3462086
]Search in Google Scholar
[
Bouchagiar, G. (2018) ‘Privacy and Web 3.0: implementing trust and learning from social networks’, Review of European Studies, 10(4), pp. 16–28. Available at: https://doi.org/10.5539/res.v10n4p16
]Search in Google Scholar
[
Bruwer, R.H.J. and Rudman, R. (2015) ‘Web 3.0: governance, risks and safeguards’, Journal of Applied Business Research, 31(3), pp. 1037–1056. Available at: https://doi.org/10.19030/jabr.v31i3.9241
]Search in Google Scholar
[
Chen, T. and Guestrin, C. (2016) ‘XGBoost: a scalable tree boosting system’, Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 22, pp. 785–794. Available at: https://doi.org/10.1145/2939672.2939785
]Search in Google Scholar
[
‘Directive (EU) 2022/1925 of the European Parliament and of the Council of 14 September 2022 on contestable and fair markets in the digital sector’. Official Journal L 265, 14 September, pp. 1–66.
]Search in Google Scholar
[
Ghalebikesabi, S., Bagdasaryan, E., Yi, R., Yona, I., Shumailov, I., Pappu, A., Shi, C., Weidinger, L., Stanforth, R., Berrada, L., Kohli, P., Huang, P-S. and Balle, B. (2024) ‘Operationalizing contextual integrity in privacy-conscious assistants’, ArXiv, article 2408.02373. Available at: https://doi.org/10.48550/arXiv.2408.02373
]Search in Google Scholar
[
Hagan, M. (2020) ‘Legal design as a thing: a theory of change and a set of methods to craft a human-centered legal system’, Design Issues, 36(3), pp. 3–15. Available at: https://doi.org/10.1162/desi_a_00600
]Search in Google Scholar
[
Jackson, C.B. and Wang, Y. (2018) ‘Addressing the privacy paradox through personalized privacy notifications’, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(2), article 68, pp. 1–25. Available at: https://doi.org/10.1145/3214271
]Search in Google Scholar
[
Jones, M.L., Kaufman, E. and Edenberg, E. (2018) ‘AI and the ethics of automating consent’, IEEE Security & Privacy, 16(3), pp. 64–72. Available at: https://doi.org/10.1109/msp.2018.2701155
]Search in Google Scholar
[
Klitou, D. (2014) Privacy-invading technologies and privacy by design: safeguarding privacy, liberty and security in the 21st century. The Hague: T.M.C. Asser Press. Available at: https://doi.org/10.1007/978-94-6265-026-8
]Search in Google Scholar
[
Kokolakis, S. (2017) ‘Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon’, Computers & Security, 64(1), pp. 122–134. Available at: https://doi.org/10.1016/j.cose.2015.07.002
]Search in Google Scholar
[
Larsson, S. and Heintz, F. (2020) ‘Transparency in artificial intelligence’, Internet Policy Review, 9(2), pp. 1–16. Available at: https://doi.org/10.14763/2020.2.1469
]Search in Google Scholar
[
Lundberg, S.M. and Lee, S.-I. (2017) ‘A unified approach to interpreting model predictions’, Advances in Neural Information Processing Systems, 30, pp. 4765–4774. Available at: https://doi.org/10.48550/arXiv.1705.07874
]Search in Google Scholar
[
Mazur, J. (2019) ‘Automated decision-making and the precautionary principle in EU law’, TalTech Journal of European Studies, 9(4), pp. 3–18. Available at: https://doi.org/10.1515/bjes-2019-0035
]Search in Google Scholar
[
Kenny, E.M., Ford, C., Quinn, M. and Keane, M.T. (2020) ‘Explaining black-box classifiers using post-hoc explanations-by-example: the effect of explanations and error-rates in XAI user studies’, Artificial Intelligence, 294, article 103459. Available at: https://doi.org/10.1016/j.artint.2021.103459
]Search in Google Scholar
[
Oviedo, J., Rodriguez, M., Trenta, A., Cannas, D., Natale, D. and Piattini, M. (2024) ‘ISO/IEC quality standards for AI engineering’, Computer Science Review, 54, article 100681. Available at: https://doi.org/10.1016/j.cosrev.2024.100681
]Search in Google Scholar
[
Pavelek, O. and Zajíčková, D. (2021) ‘Personal data protection in the decision-making of the CJEU before and after the Lisbon Treaty’, TalTech Journal of European Studies, 11(2), pp. 167–188. Available at: https://doi.org/10.2478/bjes-2021-0020
]Search in Google Scholar
[
Pohjonen, S. (2006) ‘Proactive law in the field of law’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 53–70. Available at: https://www.scandinavianlaw.se/pdf/49-4.pdf (Accessed: 12 September 2024).
]Search in Google Scholar
[
Razmetaeva, Y. (2020) ‘The right to be forgotten in the European perspective’, TalTech Journal of European Studies, 10(1), pp. 58–76. Available at: https://doi.org/10.1515/bjes-2020-0004
]Search in Google Scholar
[
Rossi, A., Ducato, R., Haapio, H. and Passera, S. (2019) ‘When design met law: design patterns for information transparency’, Droit de la consommation, 122–123(5), pp. 79–121.
]Search in Google Scholar
[
Rudman, R. and Bruwer, R. (2016) ‘Defining Web 3.0: opportunities and challenges’, The Electronic Library, 34(1), pp. 132–154. Available at: https://doi.org/10.1108/EL-08-2014-0140
]Search in Google Scholar
[
Schartum, D.W. (2006) ‘Introduction to a government-based perspective on proactive law: a proactive approach’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49, Stockholm: Stockholm Institute for Scandinavian Law, pp. 35–51. Available at: https://www.scandinavianlaw.se/pdf/49-3.pdf (Accessed: 12 September 2024).
]Search in Google Scholar
[
Schomakers, E.M., Lidynia, C. and Ziefle, M. (2019) ‘A typology of online privacy personalities: exploring and segmenting users’ diverse privacy attitudes and behaviors’, Journal of Grid Computing, 17(4), pp. 727–747. Available at: https://doi.org/10.1007/s10723-019-09500-3
]Search in Google Scholar
[
Solarte-Vásquez, M.C., Järv, N. and Nyman-Metcalf, K. (2016) ‘Usability factors in transactional design and smart contracting’, in T. Kerikmäe and A. Rull (eds) The future of law and eTechnologies, Cham: Springer, pp. 149–176. Available at: https://doi.org/10.1007/978-3-319-26896-5_8
]Search in Google Scholar
[
Solarte-Vásquez, M.C. and Nyman-Metcalf, K. (2017) ‘Smart contracting: a multidisciplinary and proactive approach for the EU digital single market’, Baltic Journal of European Studies, 7(2), pp. 208–246. Available at: https://doi.org/10.1515/bjes-2017-0017
]Search in Google Scholar
[
Taherisadr, M., Stavroulakis, S.A. and Elmalaki, S. (2023) ‘AdaPARL: adaptive privacy-aware reinforcement learning for sequential decision making human-in-the-loop systems’, in IoTDI ‘23: Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, pp. 262–274. Available at: https://doi.org/10.1145/3576842.3582325
]Search in Google Scholar
[
Wijesekera, P., Reardon, J., Reyes, I., Tsai, L., Chen, J., Good, N., Wagner, D., Beznosov, K. and Egelman, S. (2018) ‘Contextualizing privacy decisions for better prediction (and protection)’, in CHI ’18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Montreal QC: ACM, pp. 1–25. Available at: https://doi.org/10.1145/3173574.3173842
]Search in Google Scholar
[
Xi, R. (2024) ‘On emerging technologies: the old regime and the proactivity’, Cardozo International & Comparative Law Review, 8(1), pp. 3–57. Available at: https://doi.org/10.2139/ssrn.4952153
]Search in Google Scholar