scholarly journals Market Definition and Free Online Services: The Prospect of Personal Data as Price

2017 ◽  
Author(s):  
Magali Eben
2021 ◽  
Vol 49 (1) ◽  
pp. 138-164
Author(s):  
D.E. Konoplev ◽  

The article discusses the problem of digital poverty, arising when communication through digital platforms reduces the cost of the process of obtaining and exchanging information and replaces traditional economic processes. Using the example of the consumption of digital and online services, the author shows how digital communications can act as a marker for differentiating the behavior of the poor and the rich. Using cluster analysis and assessment of multicollinearity, the author interprets the data of a sociological study of five groups of respondents, indicating the factors of manifestation of digital poverty in the behavior of economic agents. The problem of the digital trace formed as a result of the automated data collection from users of online services is also considered. The author notes that consumers of digital services, in exchange for discounts, transfer their personal data to digital platforms that use the information received to stimulate further online consumption through new discounts and loyalty programs, which has a negative impact on offline consumption. The study also raises the issue of the accompanying digital poverty of economic externalities, identifies markers of property inequality in the digital economy, possible options for the development of the online economy against the background of the classical communication and social relations become luxurious. It also indicates the main scenarios for leveling the effects of digital poverty.


Author(s):  
Shivam Pandey ◽  
Tewodros Taffese ◽  
Michelle Huang ◽  
Michael D. Byrne

Due to the proliferation of online services such as social networking, online banking, and cloud computing, more personal data are potentially exposed than ever before. Efforts such as two factor authentication (2FA) aim to make these services more secure; however, existing research efforts suggest this may come at the expense of usability. We conducted a usability evaluation of Google's 2FA setup process that confirms this concern, and extends previous efforts by identifying several problem areas and specific usability issues that affect human performance in 2FA setup processes. Future research should include more diverse populations but also continue efforts in improving the usability of 2FA setup processes. This will hopefully lead to increased adoption of 2FA systems.


Author(s):  
Vilas Baburao Khedekar ◽  
Shruti Sangmesh Hiremath ◽  
Prashant Madhav Sonawane ◽  
Dharmendra Singh Rajput

In today's world, we deal with various online services, where each person deals with various technologies. These technologies are made for people to make our access to the new world easily. There is a tremendous use of online applications, websites which require large storage. Large data is handled by the online systems. The collection of data in the whole world is about 20% in the last few years. The data is captured from the user, controlled by the systems, and operations are performed on data. It requires more system accuracy and protection to personal data. But the person does not know about the data, where and how it is used where it is stored or whether the data is handled by some organisations for their own use or data is been hacked by another person. This chapter explores protection of data using the decentralized privacy of blockchain.


Author(s):  
Antonia Russo ◽  
Gianluca Lax ◽  
Baptiste Dromard ◽  
Menad Mezred

AbstractThe General Data Protection Regulation highlights the principle of data minimization, which means that only data required to successfully accomplish a given task should be processed. In this paper, we propose a Blockchain-based scheme that allows users to have control over the personal data revealed when accessing a service. The proposed solution does not rely on sophisticated cryptographic primitives, provides mechanisms for revoking the authorization to access a service and for guessing the identity of a user only in cases of need, and is compliant with the recent eIDAS Regulation. We prove that the proposed scheme is secure and reaches the expected goal, and we present an Ethereum-based implementation to show the effectiveness of the proposed solution.


2021 ◽  
Vol 2021 (3) ◽  
pp. 351-372
Author(s):  
Emmanuel Syrmoudis ◽  
Stefan Mager ◽  
Sophie Kuebler-Wachendorff ◽  
Paul Pizzinini ◽  
Jens Grossklags ◽  
...  

Abstract Data portability regulation has promised that individuals will be easily able to transfer their personal data between online service providers. Yet, after more than two years of an active privacy regulation regime in the European Union, this promise is far from being fulfilled. Given the lack of a functioning infrastructure for direct data portability between multiple providers, we investigate in our study how easily an individual could currently make use of an indirect data transfer between providers. We define such porting as a two-step transfer: firstly, requesting a data export from one provider, followed secondly by the import of the obtained data to another provider. To answer this question, we examine the data export practices of 182 online services, including the top one hundred visited websites in Germany according to the Alexa ranking, as well as their data import capabilities. Our main results show that high-ranking services, which primarily represent incumbents of key online markets, provide significantly larger data export scope and increased import possibilities than their lower-ranking competitors. Moreover, they establish more thorough authentication of individuals before export. These first empirical results challenge the theoretical literature on data portability, according to which, it would be expected that incumbents only complied with the minimal possible export scope in order to not lose exclusive consumer data to market competitors free-of-charge. We attribute the practices of incumbents observed in our study to the absence of an infrastructure realizing direct data portability.


Author(s):  
Ionela-Mariana VLAD

Nowadays, social networks are some of the fastest growing online services. Take for instance the case of Facebook which is considered to be the second most visited site on the Internet and reports growth rates of 3% per week. Social engineering attacks target human weaknesses instead of the technical vulnerabilities of the system. Usually, the attackers are attracted by the large amount of personal data published on the user’s profile. In social networks, the next attacks are specific to reverse social engineering: recommendation-based, visitor tracking-based and demographics-based attacks. In this paper, I will study the risks of using Facebook, the implication of Reverse Social Engineering in social networks and methods of securing a Facebook account.


2021 ◽  
Vol 15 (4) ◽  
pp. 1-42
Author(s):  
Michael Kretschmer ◽  
Jan Pennekamp ◽  
Klaus Wehrle

The General Data Protection Regulation (GDPR) is in effect since May of 2018. As one of the most comprehensive pieces of legislation concerning privacy, it sparked a lot of discussion on the effect it would have on users and providers of online services in particular, due to the large amount of personal data processed in this context. Almost three years later, we are interested in revisiting this question to summarize the impact this new regulation has had on actors in the World Wide Web. Using Scopus, we obtain a vast corpus of academic work to survey studies related to changes on websites since and around the time the GDPR went into force. Our findings show that the emphasis on privacy increased w.r.t. online services, but plenty potential for improvements remains. Although online services are on average more transparent regarding data processing practices in their public data policies, a majority of these policies still either lack information required by the GDPR (e.g., contact information for users to file privacy inquiries) or do not provide this information in a user-friendly form. Additionally, we summarize that online services more often provide means for their users to opt out of data processing, but regularly obstruct convenient access to such means through unnecessarily complex and sometimes illegitimate interface design. Our survey further details that this situation contradicts the preferences expressed by users both verbally and through their actions, and researchers have proposed multiple approaches to facilitate GDPR-conform data processing without negatively impacting the user experience. Thus, we compiled reoccurring points of criticism by privacy researchers and data protection authorities into a list of four guidelines for service providers to consider.


1976 ◽  
Vol 15 (02) ◽  
pp. 69-74
Author(s):  
M. Goldberg ◽  
B. Doyon

This paper describes a general data base management package, devoted to medical applications. SARI is a user-oriented system, able to take into account applications very different by their nature, structure, size, operating procedures and general objectives, without any specific programming. It can be used in conversational mode by users with no previous knowledge of computers, such as physicians or medical clerks.As medical data are often personal data, the privacy problem is emphasized and a satisfactory solution implemented in SARI.The basic principles of the data base and program organization are described ; specific efforts have been made in order to increase compactness and to make maintenance easy.Several medical applications are now operational with SARI. The next steps will mainly consist in the implementation of highly sophisticated functions.


Sign in / Sign up

Export Citation Format

Share Document