skip to main content
article

Enabling the new economic actor: data protection, the digital economy, and the Databox

Published: 01 November 2016 Publication History

Abstract

This paper offers a sociological perspective on data protection regulation and its relevance to design. From this perspective, proposed regulation in Europe and the USA seeks to create a new economic actor--the consumer as personal data trader--through new legal frameworks that shift the locus of agency and control in data processing towards the individual consumer or "data subject". The sociological perspective on proposed data regulation recognises the reflexive relationship between law and the social order, and the commensurate needs to balance the demand for compliance with the design of computational tools that enable this new economic actor. We present the Databox model as a means of providing data protection and allowing the individual to exploit personal data to become an active player in the emerging data economy.

References

[1]
Manyika J, Chui M, Groves P, Farrell D, van Kuiken S, Almasi Doshi E (2013) Open data: unlocking innovation and performance with liquid information. McKinsey and Company, New York
[2]
Middleton P, Kjeldsen P, Tully J (2013) Forecast: the internet of things worldwide. Gartner, Stamford
[3]
Gates C, Matthews P (2014) Data is the new currency. In: Proc. of new security paradigms workshop. ACM, Victoria, pp 105---116
[4]
World Economic Forum (2014) Rethinking personal data: a new lens for strengthening trust. http://www3.weforum.org/docs/WEF_RethinkingPersonalData_ANewLens_Report_2014.pdf. Accessed 12 Feb 2016
[5]
Gov.UK (2015) Data protection. http://www.gov.uk/data-protection/the-data-protection-act. Accessed 12 Feb 2016
[6]
Ferrari V (2007) Functions of law. In: Clark D (ed) Encyclopedia of law and society: American and global perspectives. Sage, New York, pp 611---617
[7]
van Rijmenam M (2015) From data ownership to data usage: how consumers will monetise their personal data. https://datafloq.com/read/data-ownership-data-usage-consumers-monetize-data/68. Accessed 12 Feb 16
[8]
BCG (2012) The value of our digital identity. Liberty global
[9]
EU (2012) General data protection regulation. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0011:FIN:en:PDF. Accessed 12 Feb 2016
[10]
US (2012) Consumer data privacy in a networked world. https://www.whitehouse.gov/sites/default/files/privacy-final.pdf. Accessed 12 Feb 2016
[11]
WP29 (2014) Opinion 8/2014 on recent developments on the internet of things. http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf. Accessed 12 Feb 2016
[12]
Durkheim E (1893) The division of labour in society. Presses Universitaires de France, Paris
[13]
Barnes JA (1966) Durkheim's division of labour in society. Man 1(2):158---175
[14]
Bittner E (1973) Objectivity and realism in sociology. In: Psathas G (ed) Phenomenological sociology. Wiley, Hoboken, pp 109---125
[15]
Marx K (1859) A contribution to the critique of political economy. Progress Publishers, Moscow
[16]
Bourdieu P (1987) The force of law: toward a sociology of the juridical field. Hastings Law J 38:814---843
[17]
Weber M (1905) The protestant ethic and the spirit of capitalism. Unwin Hyman, Crows Nest
[18]
Smith A (1776) An inquiry into the wealth of nations. Methuen & Co, London
[19]
Japan (2014) Policy outline of the institutional revision for utilization of personal data. http://japan.kantei.go.jp/policy/it/20140715_2.pdf. Accessed 12 Feb 2016
[20]
FTC (2013) Internet of things: privacy and security in a connected world. https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf. Accessed 12 Feb 2016
[21]
Winstein K (2015) Introducing the right to eavesdrop on your things. The agenda magazine, July edn. http://www.politico.com/agenda/story/2015/06/internet-of-things-privacy-concerns-000107. Accessed 12 Feb 2016
[22]
Lanier J (2013) Who owns the future?. Simon and Schuster, New York
[23]
Larsen R, Brochot G, Lewis D, Eisma F, Brunini J (2015) Personal data stores. https://ec.europa.eu/digital-agenda/en/news/study-personal-data-stores-conducted-cambridge-university-judge-business-school. Accessed 12 Feb 2016
[24]
Crabtree A, Mortier R (2015) Human data interaction: historical lessons from social studies and CSCW. In: Proc. of ECSCW. Springer, Oslo, pp 1---20
[25]
Chaudry A, Crowcroft J, Howard H, Madhavapeddy A, Mortier R, Haddadi H, McAuley D (2015) Personal data: thinking inside the box. In: Proc. of critical alternatives. ACM, Aarhus, pp 29---32
[26]
Pearson S, Casassa M (2011) Sticky policies: an approach for managing privacy across multiple parties. IEEE Comput 44(9):60---68
[27]
WP29 (2004) Opinion 10/2004 on more harmonised information provision. http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2004/wp100_en.pdf. Accessed 12 Feb 2016
[28]
Naughton J (2015) Fight back against internet giants' stranglehold on personal data starts here. The guardian, February 1, http://www.theguardian.com/technology/2015/feb/01/control-personal-data-databox-end-user-agreement. Accessed 12 Feb 2016

Cited By

View all
  • (2024)LOOM: a Privacy-Preserving Linguistic Observatory of Online MisinformationProceedings of the Second International Symposium on Trustworthy Autonomous Systems10.1145/3686038.3686062(1-9)Online publication date: 16-Sep-2024
  • (2023)The Use of Users’ Personal Data to Improve Online Retail Services: An Analysis from a Systematic Literature ReviewProceedings of the XIX Brazilian Symposium on Information Systems10.1145/3592813.3592940(78-85)Online publication date: 29-May-2023
  • (2022)Navigating Imaginaries of DNA-Based Digital Data StorageProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3501911(1-15)Online publication date: 29-Apr-2022
  • Show More Cited By
  1. Enabling the new economic actor: data protection, the digital economy, and the Databox

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Personal and Ubiquitous Computing
    Personal and Ubiquitous Computing  Volume 20, Issue 6
    November 2016
    194 pages

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 01 November 2016

    Author Tags

    1. Databox
    2. Digital economy
    3. Personal data regulation
    4. Privacy
    5. Sociology

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)LOOM: a Privacy-Preserving Linguistic Observatory of Online MisinformationProceedings of the Second International Symposium on Trustworthy Autonomous Systems10.1145/3686038.3686062(1-9)Online publication date: 16-Sep-2024
    • (2023)The Use of Users’ Personal Data to Improve Online Retail Services: An Analysis from a Systematic Literature ReviewProceedings of the XIX Brazilian Symposium on Information Systems10.1145/3592813.3592940(78-85)Online publication date: 29-May-2023
    • (2022)Navigating Imaginaries of DNA-Based Digital Data StorageProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3501911(1-15)Online publication date: 29-Apr-2022
    • (2022)Prediction model of the impact of innovation and entrepreneurship on China's digital economy based on neural network integration systemsNeural Computing and Applications10.1007/s00521-021-05899-734:4(2661-2675)Online publication date: 1-Feb-2022
    • (2021)Data Protection in AI ServicesACM Computing Surveys10.1145/344075454:2(1-38)Online publication date: 5-Mar-2021
    • (2020)Does Siri Have a Soul? Exploring Voice Assistants Through Shinto Design FictionsExtended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3334480.3381809(1-12)Online publication date: 25-Apr-2020
    • (2019)Beyond HCI and CSCW: Challenges and Useful Practices Towards a Human-Centred Vision of AI and IAProceedings of the Halfway to the Future Symposium 201910.1145/3363384.3363481(1-5)Online publication date: 19-Nov-2019
    • (2019)Security and Privacy Approaches in Mixed RealityACM Computing Surveys10.1145/335962652:6(1-37)Online publication date: 23-Oct-2019
    • (2019)Privacy Therapy with ArethaExtended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290607.3308449(1-6)Online publication date: 2-May-2019
    • (2019)Breaching the futurePersonal and Ubiquitous Computing10.1007/s00779-019-01210-723:2(287-307)Online publication date: 1-Apr-2019
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media