Personalised political messaging undermines voter autonomy and the electoral process. Use of voter analytics for political communication must be regulated.
Filtered results
This paper examines three historical imaginaries associated with encryption, considering how they are intertwined in contemporary policy debates.
The importance of personal data for the digital economy accentuates a problematic information asymmetry between consumers and the data-driven market players. An increased consumer protection would have to deal with the lack of transparency of this black-box setup and a flawed use of consent as regulatory model. The consumer protection needs to be
The emergence of the Internet of Anonymous Things (AnIoT)
The rapid development of the Internet of Things - or IoT - affects the protection of privacy in profound ways. Eduardo Magrani argues in favour of a shift from privacy protection to the idea a “right to non-tracking”.
Notice and takedown under the GDPR: an operational overview
This is the third of a series of posts about the pending EU General Data Protection Regulation (GDPR), and its consequences for intermediaries and user speech online.
This article examines the stance of the European Union vis-à-vis internet services company Google in two controversial instances: the ‘right to be forgotten’ and the implementation of EU competition rules.
Currently dominant cloud services raise challenges in terms of security, privacy and user autonomy. Decentralisation, advocated by civil society, may overcome some of the drawbacks.
There are significant dangers in surveilling online communications unless the mechanisms and policies of surveillance are subject to strict and legally enforceable standards of transparency, oversight, and control.
With the growing tension between the cross-border internet and the patchwork of national jurisdictions, it becomes crucial to keep track of key global trends that drive the debate on appropriate frameworks. Based on the 2012 monitoring work of the Internet & Jurisdiction Project , twelve high-level patterns can be identified. Paul Fehlinger of