SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
BYTE:
Addressing non-economical externalities
Hans Lammerant - VUB
Big data roadmap and cross-disciplinary community for
addressing societal externalities
@BYTE_EU www.byte-project.eu
Big data and externalities
Causal explanation?
How does big data affects interactions between actors?
Big Data
Interactions
between actors
Externalities
@BYTE_EU www.byte-project.eu
Categorisation of externalities
• Benefits: practices aiming at capturing and maximizing the benefits of big data
• Regulatory practices: practices aiming at maximizing an objective at a societal
level by balancing interests, but which are now negatively affected by big data.
They show up as negative externalities because their balancing of interests does
not deliver the same positive results any more.
• Protective practices: practices aimed at preserving other values or interests,
which now get negatively affected.
@BYTE_EU www.byte-project.eu
Categorisation of externalities
Benefits Negative effects on regulatory
practices
Negative effects on protective
practices
Improved efficiency and
innovation
IPR Equality
Improved awareness and
decision-making
Losing control to actors abroad Anti-discrimination
Participation Private vs. public and non-
profit sector
Privacy
Improved political decision-
making and participation
Trust (includes fear of capture
and competition issues)
Liability, accountability
Political abuse & surveillance
@BYTE_EU www.byte-project.eu
Effect of big data on interactions
• Larger amount of interactions between actors
• Higher visibility of actors
• Higher penetration of organisational boundaries → traditional gatekeeping gets
disrupted
• Data becomes network good → positive network effects
• Shift in transactions from exchange of goods to delivery of services → shift from
momentary transaction to regulating continuous data flows
• Changing role of internet: from market place where actors meet into digital
environment in which value creating production processes take place
@BYTE_EU www.byte-project.eu
Effect on regulatory and protective
practices
• Current regulatory and protective practices reflect old transaction model
→ high transaction costs → become disfunctional and result in negative
externalities (e.g. rights clearance in copyright, consent in data protection)
• Enlarged visibility and penetration of boundaries: privacy problems for
individuals and for organisations
• Positive network effects: anonymization becomes unreliable, propagation of
discriminatory effects
@BYTE_EU www.byte-project.eu
Benefits
Kitchin: additional characteristics of big data
• fine-grained in resolution and uniquely indexical in identification;
• relational in nature, containing common fields that enable the conjoining of different datasets;
• flexible, holding the traits of extensionality (can add new fields easily) and scalable (can expand
in size rapidly)
=> allows to deal with higher amount of interactions, such that transaction costs get lowered
while retaining necessary granularity for more individualised and targeted responses.
=> Results in:
• Improved awareness and decision-making
• Improved efficiency and innovation
• Participation
@BYTE_EU www.byte-project.eu
Capturing benefits
Main focus: interoperability
• European Interoperability Framework (EIF): legal, organisational, semantic and
technical interoperability
• Open data: 1) available with open licence, 2) as machine-readable structured
data, 3) in non-proprietary format, 4) using open standards, 5) linked to other's
data
• Design principles Industrie 4.0: Interoperability, Virtualization, Decentralization,
Real-Time Capability, Service Orientation, Modularity
@BYTE_EU www.byte-project.eu
Intellectual property rights, licensing and
contracts
• Regulatory mechanism: copyright, database protection
→ balances different economical objectives in order to get the best result on
the macro-level
• Protective mechanism: protection of trade secrets
→ 'privacy'-rights of companies
@BYTE_EU www.byte-project.eu
Copyright and database protection
• Same objectives but different balancing in EU and US
• Protection of investments by sui generis-right in EU, not in US
• Who did struck the balance right?
• Evaluation of database protection by Commission: no positive result
• Evaluation of Spanish Snippet law: negative result
→ conclusion: European legislator tends to be overprotective
@BYTE_EU www.byte-project.eu
Solutions
• legal change:
• drop sui generis-right on databases
• new exceptions for data and text mining in copyright
• solutions within existing legal framework: collective licensing
• lowers transaction costs but preserves remuneration
• shift transaction model to liability model
• extended collective licenses, compulsory licenses and levies
• open licences: patch, no solution
• Conclusion: limiting copyright preferable → market expansion due to network
effects
@BYTE_EU www.byte-project.eu
Protection of trade secrets
Also companies have their 'privacy' problems
→ results in reluctance to participate in data sharing in wide networks
→ only uptake of big data when it can be internalised
EU: draft directive for trade secrets protection
• No real IPR, but protection against dishonest practices
• Trade secret: not generally know or accessible information + adequate protection
• Unlawful: breach of confidentiality, …
• Lawful: reverse engineering, disclosure to reveal misconduct, …
@BYTE_EU www.byte-project.eu
Protection of trade secrets
• Necessary legal infrastructure supporting new contractual set-ups
• To be further developed in standard contractual arrangements
Best practice: Standardisation of Cloud Computing → includes work on SLA
@BYTE_EU www.byte-project.eu
Privacy and protection of personal data
• Higher visibility and penetration of boundaries result in privacy concerns
• Protective mechanisms: extensively developed in data protection law
• Problems:
→ conflict with purpose limitation and data minimisation principles
→ network effects make anonymisation techniques unreliable
→ mechanisms like consent and data subject rights reflect transaction model
• Does data protection still function with big data?
@BYTE_EU www.byte-project.eu
Privacy and protection of personal data
Critique on data protection principles: plea for risk-based approach
WP29: risk-based approach is possible within existing DP
→ modulate compliance obligations according to risk, not protection
Purpose limitation principle: further use: when not incompatible with original
purposes
@BYTE_EU www.byte-project.eu
Purpose limitation principle
Compatibility assessment:
• relation between original and new purposes
• context data collection and the reasonable expectations of the data subjects
• nature of data and the impact further processing
• safeguards applied by the controller
- additional technical and organisational safeguards
- goals data security (availability, integrity and confidentiality) + data protection
(transparency, isolation, intervenability)
@BYTE_EU www.byte-project.eu
Technical safeguards
Respondent privacy: statistical disclosure control
Anonymisation
• linked with applicability of data protection framework
• identifiability = singling out, linkability and inference
• reasonable effort-test
Randomisation and generalisation techniques
Re-identification research: all fail to guarantee anonymity
@BYTE_EU www.byte-project.eu
Anonymisation
How to deal with weaknesses anonymisation?
• anonymisation remains useful as safeguard
• less dissemination-based access and release-and-forget approach of datasets
with personal data
• query-based access and differential privacy
• access limited to specific users with data use agreement
→ assessing whole of technical and organisational safeguards
@BYTE_EU www.byte-project.eu
Technical safeguards
• Owner privacy: privacy-preserving data mining (PPDM)
• User privacy: private information retrieval (PIR)
• Privacy-preserving computations
• Technical measures for access control
@BYTE_EU www.byte-project.eu
Privacy by Design
• Mainstreaming privacy into design process
• Cavoukian: PbD principles
• goals data security (availability, integrity and confidentiality) + data protection
(transparency, isolation, intervenability)
• design patterns
@BYTE_EU www.byte-project.eu
Organisational safeguards
• functional separation → organisational limiting of access and data use
• limiting access with data use agreements
• privacy-by-design approach: risk assessment & privacy impact assessment
• risk assessment in general derived from IT security
• examples: CNIL, LINDDUN → threat modelling
• literature: PIA as a regular process involving stakeholders
@BYTE_EU www.byte-project.eu
Data protection principles and big data
Conclusions:
• existing data protection principles can be applied with big data
• mix of technical, organisational and legal means
• in full development:
→ specific attention for big data needed
→ mainstreaming through standardised approaches
@BYTE_EU www.byte-project.eu
Accountability and data subject rights
• Data protection are not only rules on use of information
• accountability framework
• informational control through data subject rights
→ necessary to establish trust
→ based in transaction-model: e.g. consent
• shift to liability-model through stronger role regulators
@BYTE_EU www.byte-project.eu
Transparency
• Obliged by data protection framework, but rarely implemented
• transparency of data used, of processing and of use results
• need for standardised auditing and evaluation tools: e.g. privacy seals
• technical tools for transparency: e.g. Google
• standards for transparency and data portability
→ avoid user lock-in
→ allows aggregated views on data use by data subjects
• traceability across several actors?
• Implementation of transparency and data access needs attention and further development
@BYTE_EU www.byte-project.eu
Equality and discrimination
Discrimination:
• prejudice
• rational discrimination
• unintended discrimination
Legal:
• principle of equality
• prohibition of discrimination → direct discrimination / indirect discrimination
@BYTE_EU www.byte-project.eu
Discrimination in data mining
sources of discrimination:
• definition of the objectives and problem → target variable and class labels
• training data → assumption: nothing changes
• under- or over-representation in sample
• choice of input variables
• attributes as proxy for discriminatory grounds
• historical discrimination reflected in labelling
• masking
@BYTE_EU www.byte-project.eu
Anti-discrimination & algorithms
Technical measures
• discrimination discovery
• discrimination prevention through discrimination-free classifiers
• conditional non-discrimination methods
Trade-off accuracy and anti-discrimination → effective methods exist
Recent area of research → in full development
@BYTE_EU www.byte-project.eu
Anti-discrimination framework
Legal framework:
• legal redress
• equality bodies: support legal redress + mainstreaming of policies
• Less developed as data protection framework → need for integration towards common
accountability framework
• Anti-discrimination by design → anti-discrimination objectives alongside data protection
objectives in safeguards, risk and impact assessment, auditing procedures, etc.
• Equality bodies have a task to address anti-discrimination in big data as part of their
mainstreaming efforts → coordination needed between DPAs and equality bodies
@BYTE_EU www.byte-project.eu
Political externalities: Relation private vs.
public and non-profit sector
- lock-in
→ standardisation
→ open source
→ data portability
- rent-seeking and need for public funding
→ Benkler: open source: commons model as result of positive network effects
→ is this also true for open data?
@BYTE_EU www.byte-project.eu
Political externalities: Relation private vs.
public and non-profit sector
Open data often concerns data from public sources, while users are private sector.
→ Costs and benefits fall with different actors.
Data revenue models: subsidized, licensing, subscription, advertising, commission, traffic,
branding
→ closed options like licensing or subscription can generate direct revenue, but limit users
→ subsidy is only open model available
Evaluation similar to IPR: what is macro-effect?
• when only a few users which make commercial applications → closed model
• lot of users: open model → indirect return
@BYTE_EU www.byte-project.eu
Political externalities: loss of control to
actors abroad
• economical concern: traditional tension between protectionism and open
market
• political concern: ability to regulate
→ Range of conflicts: extraterritorial application of law is an issue both in EU and
in US
Solution: International legal harmonisation
→ varies from mutual recognition mechanisms to fully developed legal
framework
@BYTE_EU www.byte-project.eu
Conclusions
Capturing positive benefits:
→ improving interoperability on several levels
→ restoring trust and legal certainty
Dealing with negative externalities
→ data = network good → refrain from overprotection as property
→ adapt legal frameworks from transaction model to liability model:
• collective solutions
• regulation of overall process and mainstreaming in design
• mix of technical, organisational and legal measures
@BYTE_EU www.byte-project.eu
QUESTIONS
Any questions?

Mais conteúdo relacionado

Mais procurados

EDF2014: Franck Cotton & Kamel Gadouche, France: TeraLab - A Secure Big Data...
EDF2014: Franck Cotton  & Kamel Gadouche, France: TeraLab - A Secure Big Data...EDF2014: Franck Cotton  & Kamel Gadouche, France: TeraLab - A Secure Big Data...
EDF2014: Franck Cotton & Kamel Gadouche, France: TeraLab - A Secure Big Data...European Data Forum
 
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...European Data Forum
 
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...European Data Forum
 
Evolution of Data Spaces
Evolution of Data SpacesEvolution of Data Spaces
Evolution of Data SpacesBoris Otto
 
Horizontal analysis of societal externalities
Horizontal analysis of societal externalitiesHorizontal analysis of societal externalities
Horizontal analysis of societal externalitiesBYTE Project
 
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...European Data Forum
 
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...European Data Forum
 
#opendata Back to the future
#opendata Back to the future#opendata Back to the future
#opendata Back to the futureSlim Turki, Dr.
 
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...European Data Forum
 
Gaia-X for Finland – Hub launch 17 June 2021
Gaia-X for Finland – Hub launch 17 June 2021Gaia-X for Finland – Hub launch 17 June 2021
Gaia-X for Finland – Hub launch 17 June 2021Sitra / Hyvinvointi
 
Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016Trilateral Research
 
EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...
EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...
EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...European Data Forum
 
How Big Data Ecosystems Work
How Big Data Ecosystems WorkHow Big Data Ecosystems Work
How Big Data Ecosystems Work Edward Curry
 

Mais procurados (20)

Katharina Götsch, Verena Grubmüller, Igor Pejic – The UniteEurope Project
Katharina Götsch, Verena Grubmüller, Igor Pejic – The UniteEurope ProjectKatharina Götsch, Verena Grubmüller, Igor Pejic – The UniteEurope Project
Katharina Götsch, Verena Grubmüller, Igor Pejic – The UniteEurope Project
 
EDF2014: Franck Cotton & Kamel Gadouche, France: TeraLab - A Secure Big Data...
EDF2014: Franck Cotton  & Kamel Gadouche, France: TeraLab - A Secure Big Data...EDF2014: Franck Cotton  & Kamel Gadouche, France: TeraLab - A Secure Big Data...
EDF2014: Franck Cotton & Kamel Gadouche, France: TeraLab - A Secure Big Data...
 
The EC strategy to enable data sharing spaces
The EC strategy to enable data sharing spacesThe EC strategy to enable data sharing spaces
The EC strategy to enable data sharing spaces
 
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
 
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
 
Evolution of Data Spaces
Evolution of Data SpacesEvolution of Data Spaces
Evolution of Data Spaces
 
Esociety presentation krems cedem 2014
Esociety presentation krems cedem 2014Esociety presentation krems cedem 2014
Esociety presentation krems cedem 2014
 
Horizontal analysis of societal externalities
Horizontal analysis of societal externalitiesHorizontal analysis of societal externalities
Horizontal analysis of societal externalities
 
European Data Spaces
European Data SpacesEuropean Data Spaces
European Data Spaces
 
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
 
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
 
#opendata Back to the future
#opendata Back to the future#opendata Back to the future
#opendata Back to the future
 
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
 
Gaia-X for Finland – Hub launch 17 June 2021
Gaia-X for Finland – Hub launch 17 June 2021Gaia-X for Finland – Hub launch 17 June 2021
Gaia-X for Finland – Hub launch 17 June 2021
 
Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016
 
EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...
EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...
EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...
 
20140521 presentation ce de mv3
20140521 presentation ce de mv320140521 presentation ce de mv3
20140521 presentation ce de mv3
 
Many laws leos_v3
Many laws leos_v3Many laws leos_v3
Many laws leos_v3
 
How Big Data Ecosystems Work
How Big Data Ecosystems WorkHow Big Data Ecosystems Work
How Big Data Ecosystems Work
 
EDI project presentation at BDVA PPP 3rd Steering Committee Meeting
EDI project presentation at BDVA PPP 3rd Steering Committee MeetingEDI project presentation at BDVA PPP 3rd Steering Committee Meeting
EDI project presentation at BDVA PPP 3rd Steering Committee Meeting
 

Destaque

Economic Challenges of Big Data
Economic Challenges of Big DataEconomic Challenges of Big Data
Economic Challenges of Big DataBYTE Project
 
BYTE Big Data Community Workshop
BYTE Big Data Community WorkshopBYTE Big Data Community Workshop
BYTE Big Data Community WorkshopBYTE Project
 
Addressing economic externalities
Addressing economic externalitiesAddressing economic externalities
Addressing economic externalitiesBYTE Project
 
Maximize the value of Earth Observation Data in a Big Data World
Maximize the value of Earth Observation Data in a Big Data WorldMaximize the value of Earth Observation Data in a Big Data World
Maximize the value of Earth Observation Data in a Big Data WorldBYTE Project
 
Big data in healthcare
Big data in healthcareBig data in healthcare
Big data in healthcareBYTE Project
 
Smart city València
Smart city ValènciaSmart city València
Smart city ValènciaBYTE Project
 

Destaque (6)

Economic Challenges of Big Data
Economic Challenges of Big DataEconomic Challenges of Big Data
Economic Challenges of Big Data
 
BYTE Big Data Community Workshop
BYTE Big Data Community WorkshopBYTE Big Data Community Workshop
BYTE Big Data Community Workshop
 
Addressing economic externalities
Addressing economic externalitiesAddressing economic externalities
Addressing economic externalities
 
Maximize the value of Earth Observation Data in a Big Data World
Maximize the value of Earth Observation Data in a Big Data WorldMaximize the value of Earth Observation Data in a Big Data World
Maximize the value of Earth Observation Data in a Big Data World
 
Big data in healthcare
Big data in healthcareBig data in healthcare
Big data in healthcare
 
Smart city València
Smart city ValènciaSmart city València
Smart city València
 

Semelhante a Addressing non economical externalities

Legal Issues in Big Data
Legal Issues in Big DataLegal Issues in Big Data
Legal Issues in Big DataBYTE Project
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...e-SIDES.eu
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...IDC4EU
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES.eu
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsLionel Briand
 
BYTE Project Community Overview
BYTE Project Community OverviewBYTE Project Community Overview
BYTE Project Community OverviewBIG Project
 
The interface between data protection and ip law
The interface between data protection and ip lawThe interface between data protection and ip law
The interface between data protection and ip lawFrancesco Banterle
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES.eu
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
L'economia europea dei dati. Politiche europee e opportunità di finanziamento...
L'economia europea dei dati. Politiche europee e opportunità di finanziamento...L'economia europea dei dati. Politiche europee e opportunità di finanziamento...
L'economia europea dei dati. Politiche europee e opportunità di finanziamento...Data Driven Innovation
 
Banji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSciBanji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSciBanji Adenusi
 
Big Data Expo 2015 - Data Science Innovation Privacy Considerations
Big Data Expo 2015 - Data Science Innovation Privacy ConsiderationsBig Data Expo 2015 - Data Science Innovation Privacy Considerations
Big Data Expo 2015 - Data Science Innovation Privacy ConsiderationsBigDataExpo
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016Elsa Prieto
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
19032013 Jacques Bus user controlled personal data management
19032013 Jacques Bus  user controlled personal data management 19032013 Jacques Bus  user controlled personal data management
19032013 Jacques Bus user controlled personal data management Stichting ePortfolio Support
 
BDE SC2 Workshop 3: Building a European Data Economy
BDE SC2 Workshop 3: Building a European Data EconomyBDE SC2 Workshop 3: Building a European Data Economy
BDE SC2 Workshop 3: Building a European Data EconomyBigData_Europe
 

Semelhante a Addressing non economical externalities (20)

Legal Issues in Big Data
Legal Issues in Big DataLegal Issues in Big Data
Legal Issues in Big Data
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
 
BYTE Project Community Overview
BYTE Project Community OverviewBYTE Project Community Overview
BYTE Project Community Overview
 
The interface between data protection and ip law
The interface between data protection and ip lawThe interface between data protection and ip law
The interface between data protection and ip law
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
L'economia europea dei dati. Politiche europee e opportunità di finanziamento...
L'economia europea dei dati. Politiche europee e opportunità di finanziamento...L'economia europea dei dati. Politiche europee e opportunità di finanziamento...
L'economia europea dei dati. Politiche europee e opportunità di finanziamento...
 
Banji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSciBanji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSci
 
Big Data Expo 2015 - Data Science Innovation Privacy Considerations
Big Data Expo 2015 - Data Science Innovation Privacy ConsiderationsBig Data Expo 2015 - Data Science Innovation Privacy Considerations
Big Data Expo 2015 - Data Science Innovation Privacy Considerations
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
19032013 Jacques Bus user controlled personal data management
19032013 Jacques Bus  user controlled personal data management 19032013 Jacques Bus  user controlled personal data management
19032013 Jacques Bus user controlled personal data management
 
BDE SC2 Workshop 3: Building a European Data Economy
BDE SC2 Workshop 3: Building a European Data EconomyBDE SC2 Workshop 3: Building a European Data Economy
BDE SC2 Workshop 3: Building a European Data Economy
 

Mais de BYTE Project

Big Data in a Digital City. Key Insights from the Smart City Case Study
Big Data in a Digital City. Key Insights from the Smart City Case StudyBig Data in a Digital City. Key Insights from the Smart City Case Study
Big Data in a Digital City. Key Insights from the Smart City Case StudyBYTE Project
 
Big data societal externalitites. Results from the BYTE case studies
Big data societal externalitites. Results from the BYTE case studiesBig data societal externalitites. Results from the BYTE case studies
Big data societal externalitites. Results from the BYTE case studiesBYTE Project
 
Big Data and Social Media Mining in Crisis and Emergency Management
Big Data and Social Media Mining in Crisis and Emergency ManagementBig Data and Social Media Mining in Crisis and Emergency Management
Big Data and Social Media Mining in Crisis and Emergency ManagementBYTE Project
 
From Big Data to Banality of Evil
From Big Data to Banality of EvilFrom Big Data to Banality of Evil
From Big Data to Banality of EvilBYTE Project
 
Big data Opportunities and Societal Concerns
Big data Opportunities and Societal ConcernsBig data Opportunities and Societal Concerns
Big data Opportunities and Societal ConcernsBYTE Project
 
Setting the Scene for Big Data in Europe, Looking Ahead to the Case Studies
Setting the Scene for Big Data in Europe, Looking Ahead to the Case StudiesSetting the Scene for Big Data in Europe, Looking Ahead to the Case Studies
Setting the Scene for Big Data in Europe, Looking Ahead to the Case StudiesBYTE Project
 
BYTE Project Overview
BYTE Project OverviewBYTE Project Overview
BYTE Project OverviewBYTE Project
 
Big Data Technologies & Applications
Big Data Technologies & ApplicationsBig Data Technologies & Applications
Big Data Technologies & ApplicationsBYTE Project
 
Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...
Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...
Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...BYTE Project
 
BYTE: Big data roadmap and cross-disciplinary community for addressing societ...
BYTE: Big data roadmap and cross-disciplinary community for addressing societ...BYTE: Big data roadmap and cross-disciplinary community for addressing societ...
BYTE: Big data roadmap and cross-disciplinary community for addressing societ...BYTE Project
 

Mais de BYTE Project (10)

Big Data in a Digital City. Key Insights from the Smart City Case Study
Big Data in a Digital City. Key Insights from the Smart City Case StudyBig Data in a Digital City. Key Insights from the Smart City Case Study
Big Data in a Digital City. Key Insights from the Smart City Case Study
 
Big data societal externalitites. Results from the BYTE case studies
Big data societal externalitites. Results from the BYTE case studiesBig data societal externalitites. Results from the BYTE case studies
Big data societal externalitites. Results from the BYTE case studies
 
Big Data and Social Media Mining in Crisis and Emergency Management
Big Data and Social Media Mining in Crisis and Emergency ManagementBig Data and Social Media Mining in Crisis and Emergency Management
Big Data and Social Media Mining in Crisis and Emergency Management
 
From Big Data to Banality of Evil
From Big Data to Banality of EvilFrom Big Data to Banality of Evil
From Big Data to Banality of Evil
 
Big data Opportunities and Societal Concerns
Big data Opportunities and Societal ConcernsBig data Opportunities and Societal Concerns
Big data Opportunities and Societal Concerns
 
Setting the Scene for Big Data in Europe, Looking Ahead to the Case Studies
Setting the Scene for Big Data in Europe, Looking Ahead to the Case StudiesSetting the Scene for Big Data in Europe, Looking Ahead to the Case Studies
Setting the Scene for Big Data in Europe, Looking Ahead to the Case Studies
 
BYTE Project Overview
BYTE Project OverviewBYTE Project Overview
BYTE Project Overview
 
Big Data Technologies & Applications
Big Data Technologies & ApplicationsBig Data Technologies & Applications
Big Data Technologies & Applications
 
Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...
Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...
Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...
 
BYTE: Big data roadmap and cross-disciplinary community for addressing societ...
BYTE: Big data roadmap and cross-disciplinary community for addressing societ...BYTE: Big data roadmap and cross-disciplinary community for addressing societ...
BYTE: Big data roadmap and cross-disciplinary community for addressing societ...
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Addressing non economical externalities

  • 1. BYTE: Addressing non-economical externalities Hans Lammerant - VUB Big data roadmap and cross-disciplinary community for addressing societal externalities
  • 2. @BYTE_EU www.byte-project.eu Big data and externalities Causal explanation? How does big data affects interactions between actors? Big Data Interactions between actors Externalities
  • 3. @BYTE_EU www.byte-project.eu Categorisation of externalities • Benefits: practices aiming at capturing and maximizing the benefits of big data • Regulatory practices: practices aiming at maximizing an objective at a societal level by balancing interests, but which are now negatively affected by big data. They show up as negative externalities because their balancing of interests does not deliver the same positive results any more. • Protective practices: practices aimed at preserving other values or interests, which now get negatively affected.
  • 4. @BYTE_EU www.byte-project.eu Categorisation of externalities Benefits Negative effects on regulatory practices Negative effects on protective practices Improved efficiency and innovation IPR Equality Improved awareness and decision-making Losing control to actors abroad Anti-discrimination Participation Private vs. public and non- profit sector Privacy Improved political decision- making and participation Trust (includes fear of capture and competition issues) Liability, accountability Political abuse & surveillance
  • 5. @BYTE_EU www.byte-project.eu Effect of big data on interactions • Larger amount of interactions between actors • Higher visibility of actors • Higher penetration of organisational boundaries → traditional gatekeeping gets disrupted • Data becomes network good → positive network effects • Shift in transactions from exchange of goods to delivery of services → shift from momentary transaction to regulating continuous data flows • Changing role of internet: from market place where actors meet into digital environment in which value creating production processes take place
  • 6. @BYTE_EU www.byte-project.eu Effect on regulatory and protective practices • Current regulatory and protective practices reflect old transaction model → high transaction costs → become disfunctional and result in negative externalities (e.g. rights clearance in copyright, consent in data protection) • Enlarged visibility and penetration of boundaries: privacy problems for individuals and for organisations • Positive network effects: anonymization becomes unreliable, propagation of discriminatory effects
  • 7. @BYTE_EU www.byte-project.eu Benefits Kitchin: additional characteristics of big data • fine-grained in resolution and uniquely indexical in identification; • relational in nature, containing common fields that enable the conjoining of different datasets; • flexible, holding the traits of extensionality (can add new fields easily) and scalable (can expand in size rapidly) => allows to deal with higher amount of interactions, such that transaction costs get lowered while retaining necessary granularity for more individualised and targeted responses. => Results in: • Improved awareness and decision-making • Improved efficiency and innovation • Participation
  • 8. @BYTE_EU www.byte-project.eu Capturing benefits Main focus: interoperability • European Interoperability Framework (EIF): legal, organisational, semantic and technical interoperability • Open data: 1) available with open licence, 2) as machine-readable structured data, 3) in non-proprietary format, 4) using open standards, 5) linked to other's data • Design principles Industrie 4.0: Interoperability, Virtualization, Decentralization, Real-Time Capability, Service Orientation, Modularity
  • 9. @BYTE_EU www.byte-project.eu Intellectual property rights, licensing and contracts • Regulatory mechanism: copyright, database protection → balances different economical objectives in order to get the best result on the macro-level • Protective mechanism: protection of trade secrets → 'privacy'-rights of companies
  • 10. @BYTE_EU www.byte-project.eu Copyright and database protection • Same objectives but different balancing in EU and US • Protection of investments by sui generis-right in EU, not in US • Who did struck the balance right? • Evaluation of database protection by Commission: no positive result • Evaluation of Spanish Snippet law: negative result → conclusion: European legislator tends to be overprotective
  • 11. @BYTE_EU www.byte-project.eu Solutions • legal change: • drop sui generis-right on databases • new exceptions for data and text mining in copyright • solutions within existing legal framework: collective licensing • lowers transaction costs but preserves remuneration • shift transaction model to liability model • extended collective licenses, compulsory licenses and levies • open licences: patch, no solution • Conclusion: limiting copyright preferable → market expansion due to network effects
  • 12. @BYTE_EU www.byte-project.eu Protection of trade secrets Also companies have their 'privacy' problems → results in reluctance to participate in data sharing in wide networks → only uptake of big data when it can be internalised EU: draft directive for trade secrets protection • No real IPR, but protection against dishonest practices • Trade secret: not generally know or accessible information + adequate protection • Unlawful: breach of confidentiality, … • Lawful: reverse engineering, disclosure to reveal misconduct, …
  • 13. @BYTE_EU www.byte-project.eu Protection of trade secrets • Necessary legal infrastructure supporting new contractual set-ups • To be further developed in standard contractual arrangements Best practice: Standardisation of Cloud Computing → includes work on SLA
  • 14. @BYTE_EU www.byte-project.eu Privacy and protection of personal data • Higher visibility and penetration of boundaries result in privacy concerns • Protective mechanisms: extensively developed in data protection law • Problems: → conflict with purpose limitation and data minimisation principles → network effects make anonymisation techniques unreliable → mechanisms like consent and data subject rights reflect transaction model • Does data protection still function with big data?
  • 15. @BYTE_EU www.byte-project.eu Privacy and protection of personal data Critique on data protection principles: plea for risk-based approach WP29: risk-based approach is possible within existing DP → modulate compliance obligations according to risk, not protection Purpose limitation principle: further use: when not incompatible with original purposes
  • 16. @BYTE_EU www.byte-project.eu Purpose limitation principle Compatibility assessment: • relation between original and new purposes • context data collection and the reasonable expectations of the data subjects • nature of data and the impact further processing • safeguards applied by the controller - additional technical and organisational safeguards - goals data security (availability, integrity and confidentiality) + data protection (transparency, isolation, intervenability)
  • 17. @BYTE_EU www.byte-project.eu Technical safeguards Respondent privacy: statistical disclosure control Anonymisation • linked with applicability of data protection framework • identifiability = singling out, linkability and inference • reasonable effort-test Randomisation and generalisation techniques Re-identification research: all fail to guarantee anonymity
  • 18. @BYTE_EU www.byte-project.eu Anonymisation How to deal with weaknesses anonymisation? • anonymisation remains useful as safeguard • less dissemination-based access and release-and-forget approach of datasets with personal data • query-based access and differential privacy • access limited to specific users with data use agreement → assessing whole of technical and organisational safeguards
  • 19. @BYTE_EU www.byte-project.eu Technical safeguards • Owner privacy: privacy-preserving data mining (PPDM) • User privacy: private information retrieval (PIR) • Privacy-preserving computations • Technical measures for access control
  • 20. @BYTE_EU www.byte-project.eu Privacy by Design • Mainstreaming privacy into design process • Cavoukian: PbD principles • goals data security (availability, integrity and confidentiality) + data protection (transparency, isolation, intervenability) • design patterns
  • 21. @BYTE_EU www.byte-project.eu Organisational safeguards • functional separation → organisational limiting of access and data use • limiting access with data use agreements • privacy-by-design approach: risk assessment & privacy impact assessment • risk assessment in general derived from IT security • examples: CNIL, LINDDUN → threat modelling • literature: PIA as a regular process involving stakeholders
  • 22. @BYTE_EU www.byte-project.eu Data protection principles and big data Conclusions: • existing data protection principles can be applied with big data • mix of technical, organisational and legal means • in full development: → specific attention for big data needed → mainstreaming through standardised approaches
  • 23. @BYTE_EU www.byte-project.eu Accountability and data subject rights • Data protection are not only rules on use of information • accountability framework • informational control through data subject rights → necessary to establish trust → based in transaction-model: e.g. consent • shift to liability-model through stronger role regulators
  • 24. @BYTE_EU www.byte-project.eu Transparency • Obliged by data protection framework, but rarely implemented • transparency of data used, of processing and of use results • need for standardised auditing and evaluation tools: e.g. privacy seals • technical tools for transparency: e.g. Google • standards for transparency and data portability → avoid user lock-in → allows aggregated views on data use by data subjects • traceability across several actors? • Implementation of transparency and data access needs attention and further development
  • 25. @BYTE_EU www.byte-project.eu Equality and discrimination Discrimination: • prejudice • rational discrimination • unintended discrimination Legal: • principle of equality • prohibition of discrimination → direct discrimination / indirect discrimination
  • 26. @BYTE_EU www.byte-project.eu Discrimination in data mining sources of discrimination: • definition of the objectives and problem → target variable and class labels • training data → assumption: nothing changes • under- or over-representation in sample • choice of input variables • attributes as proxy for discriminatory grounds • historical discrimination reflected in labelling • masking
  • 27. @BYTE_EU www.byte-project.eu Anti-discrimination & algorithms Technical measures • discrimination discovery • discrimination prevention through discrimination-free classifiers • conditional non-discrimination methods Trade-off accuracy and anti-discrimination → effective methods exist Recent area of research → in full development
  • 28. @BYTE_EU www.byte-project.eu Anti-discrimination framework Legal framework: • legal redress • equality bodies: support legal redress + mainstreaming of policies • Less developed as data protection framework → need for integration towards common accountability framework • Anti-discrimination by design → anti-discrimination objectives alongside data protection objectives in safeguards, risk and impact assessment, auditing procedures, etc. • Equality bodies have a task to address anti-discrimination in big data as part of their mainstreaming efforts → coordination needed between DPAs and equality bodies
  • 29. @BYTE_EU www.byte-project.eu Political externalities: Relation private vs. public and non-profit sector - lock-in → standardisation → open source → data portability - rent-seeking and need for public funding → Benkler: open source: commons model as result of positive network effects → is this also true for open data?
  • 30. @BYTE_EU www.byte-project.eu Political externalities: Relation private vs. public and non-profit sector Open data often concerns data from public sources, while users are private sector. → Costs and benefits fall with different actors. Data revenue models: subsidized, licensing, subscription, advertising, commission, traffic, branding → closed options like licensing or subscription can generate direct revenue, but limit users → subsidy is only open model available Evaluation similar to IPR: what is macro-effect? • when only a few users which make commercial applications → closed model • lot of users: open model → indirect return
  • 31. @BYTE_EU www.byte-project.eu Political externalities: loss of control to actors abroad • economical concern: traditional tension between protectionism and open market • political concern: ability to regulate → Range of conflicts: extraterritorial application of law is an issue both in EU and in US Solution: International legal harmonisation → varies from mutual recognition mechanisms to fully developed legal framework
  • 32. @BYTE_EU www.byte-project.eu Conclusions Capturing positive benefits: → improving interoperability on several levels → restoring trust and legal certainty Dealing with negative externalities → data = network good → refrain from overprotection as property → adapt legal frameworks from transaction model to liability model: • collective solutions • regulation of overall process and mainstreaming in design • mix of technical, organisational and legal measures