Strengthening of EU regulatory intervention against data exploitations by online platforms with a zero-price business model

نویسندگان

چکیده

The article aims to analyse the relationship between data protection and online platforms’ zero-price business model. This model functions in a way that platforms provide their services “free of charge”, but exchange for personal data. may not only come with competition problems, also is detrimental principles, such as principle minimisation. Users are unaware value they provide, partly due false illusion service being free charge. market failure could be remedied by regulations would ensure users able use currently without providing

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a study on insurer solvency by panel data model: the case of iranian insurance market

the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.

Modeling Nonnegative Data with Clumping at Zero: A Survey

Applications in which data take nonnegative values but have a substantial proportion of values at zero occur in many disciplines. The modeling of such “clumped-at-zero” or “zero-inflated” data is challenging. We survey models that have been proposed. We consider cases in which the response for the non-zero observations is continuous and in which it is discrete. For the continuous and then the d...

متن کامل

Conceptualization of business excellence model with a grand theory approach

This study aims to conceptualize business excellence model and identify its variables and indicators. The philosophical foundations of the pragmatic, humanistic theory of symbolic interactionism has been, quietly and the strategy of grand theory deal with open, axial and selective coding; whose output is a new concept. Data collection is based on documentation studies on excellence models. The ...

متن کامل

Strengthening of Data Security against its Attack

This paper specifies cryptographic algorithm Hybridizing Traditional Technology (H.T.T) which may be used to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptograp...

متن کامل

Simple-Zero and Double-Zero Singularities of a Kaldor-Kalecki Model of Business Cycles with Delay

We study the Kaldor-Kalecki model of business cycles with delay in both the gross product and the capital stock. Simple-zero and double-zero singularities are investigated when bifurcation parameters change near certain critical values. By performing center manifold reduction, the normal forms on the center manifold are derived to obtain the bifurcation diagrams of the model such as Hopf, homoc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Masaryk University journal of law and technology

سال: 2023

ISSN: ['1802-5943', '1802-5951']

DOI: https://doi.org/10.5817/mujlt2023-1-4