Strengthening of EU regulatory intervention against data exploitations by online platforms with a zero-price business model
نویسندگان
چکیده
The article aims to analyse the relationship between data protection and online platforms’ zero-price business model. This model functions in a way that platforms provide their services “free of charge”, but exchange for personal data. may not only come with competition problems, also is detrimental principles, such as principle minimisation. Users are unaware value they provide, partly due false illusion service being free charge. market failure could be remedied by regulations would ensure users able use currently without providing
منابع مشابه
a study on insurer solvency by panel data model: the case of iranian insurance market
the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.
Modeling Nonnegative Data with Clumping at Zero: A Survey
Applications in which data take nonnegative values but have a substantial proportion of values at zero occur in many disciplines. The modeling of such “clumped-at-zero” or “zero-inflated” data is challenging. We survey models that have been proposed. We consider cases in which the response for the non-zero observations is continuous and in which it is discrete. For the continuous and then the d...
متن کاملConceptualization of business excellence model with a grand theory approach
This study aims to conceptualize business excellence model and identify its variables and indicators. The philosophical foundations of the pragmatic, humanistic theory of symbolic interactionism has been, quietly and the strategy of grand theory deal with open, axial and selective coding; whose output is a new concept. Data collection is based on documentation studies on excellence models. The ...
متن کاملStrengthening of Data Security against its Attack
This paper specifies cryptographic algorithm Hybridizing Traditional Technology (H.T.T) which may be used to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptograp...
متن کاملSimple-Zero and Double-Zero Singularities of a Kaldor-Kalecki Model of Business Cycles with Delay
We study the Kaldor-Kalecki model of business cycles with delay in both the gross product and the capital stock. Simple-zero and double-zero singularities are investigated when bifurcation parameters change near certain critical values. By performing center manifold reduction, the normal forms on the center manifold are derived to obtain the bifurcation diagrams of the model such as Hopf, homoc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Masaryk University journal of law and technology
سال: 2023
ISSN: ['1802-5943', '1802-5951']
DOI: https://doi.org/10.5817/mujlt2023-1-4