The death of privacy policies: How app stores shape GDPR compliance of apps

Julia Krämer, Erasmus University Rotterdam
PUBLISHED ON: 02 Apr 2024 DOI: 10.14763/2024.2.1757

This paper delivers a legal analysis that explores whether the privacy labels of the Apple App Store and Google Play Store meet the requirements of the General Data Protection Regulation (GDPR), along with insights into the adoption of app developers to map the extent of the problem.

Regulating high-reach AI: On transparency directions in the Digital Services Act

Kasia Söderlund, Lund University
Emma Engström, Institute for Futures Studies
Kashyap Haresamudram, Lund University
Stefan Larsson, Lund University
Pontus Strimling, Institute for Futures Studies
PUBLISHED ON: 26 Mar 2024 DOI: 10.14763/2024.1.1746

Focusing on recommender systems used by dominant social media platforms as an example of high-reach AI, this study explores the directionality of transparency provisions introduced by the Digital Services Act and highlights the pivotal role of oversight authorities in addressing risks posed by high-reach AI technologies.

Governing Chinese technologies: TikTok, foreign interference, and technological sovereignty

Ausma Bernot, Griffith University
Diarmuid Cooney-O'Donoghue, University of Warwick
Monique Mann, Victoria University of Wellington
PUBLISHED ON: 27 Feb 2024 DOI: 10.14763/2024.1.1741

In this article, we analyse attempts to regulate and control TikTok through the lens of foreign interference and technological sovereignty in Australia, the United Kingdom, the United States, and the European Union.

Navigating vulnerability markets and bug bounty programs: A public policy perspective

Aviram Zrahia, Tel Aviv University
PUBLISHED ON: 15 Feb 2024 DOI: 10.14763/2024.1.1740

This paper explores the economics of software vulnerabilities, evaluates three policy alternatives for vulnerability discovery and disclosure and argues that bug bounty programs, which leverage two-sided digital market platforms to connect organisations and ethical hackers, yield the highest effectiveness, legality and trustworthiness impacts.

Pages