Skip to main content
Log in

Consumer protection requires artificial intelligence

  • Comment
  • Published:

From Nature Machine Intelligence

View current issue Submit your manuscript

Technology companies have quickly become powerful with their access to large amounts of data and machine learning technologies, but consumers could be empowered too with automated tools to protect their rights.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Zuboff, S. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (Profile Books, 2019).

  2. Hildebrandt, M. Geo. L. Tech. Rev. 2, 252–273 (2018).

    Google Scholar 

  3. Galbraith, J. K. The Anatomy of Power (Houghton-Mifflin, 1983).

  4. Hu, N., Koh, N. S. & Reddy, S. K. Decis. Support Syst. 57, 42–53 (2014).

    Article  Google Scholar 

  5. Ruggieri, S., Pedreschi, D. & Turini, F. ACM Trans. Knowl. Discov. D. 4, 9 (2010).

    Google Scholar 

  6. Wu, S.-H., Chou, M.-J., Tseng, C.-H., Lee, Y.-J. & Chen, K.-T. IEEE Syst. J. 11, 2432–2443 (2017).

    Article  Google Scholar 

  7. Obar, J. A. & Oeldorf-Hirsch, A. Inf. Commun. Soc. https://doi.org/10.1080/1369118X.2018.1486870 (2018).

  8. Lippi, M. et al. Artif. Intell. Law https://doi.org/10.1007/s10506-019-09243-2 (2019).

  9. Contissa, G. et al. CLAUDETTE Meets GDPR: Automating the Evaluation of Privacy Policies Using Artificial Intelligence (BEUC, 2018).

  10. Costante, E., Sun, Y., Petkovi´c, M. & den Hartog, J. in Proc. 2012 ACM Workshop on Privacy in the Electronic Society 91–96 (ACM, 2012).

  11. Tomuro, N., Lytinen, S. & Hornsburg, K. in Proc. Sixth ACM Conference on Data and Application Security and Privacy 133–135 (ACM, 2016).

  12. Zaeem, R. N., German, R. L. & Barber, S. K. ACM Trans. Internet Technol. 18, 53 (2018).

    Article  Google Scholar 

  13. Wilson, S. et al. ACM Trans. Web 13, 1 (2018).

    Article  Google Scholar 

  14. Solon, O. NBC News https://www.nbcnews.com/tech/internet/facial-recognition-s-dirty-little-secret-millions-online-photos-scraped-n981921 (12 March 2019).

  15. Rubin, J., Gordon, M. I., Nguyen, N. & Rinard, M. in 2015 30th IEEE/ACM International Conference on Automated Software Engineering 647–657 (IEEE, 2015).

  16. Gordon, M. I. et al. in 2015 Network and Distributed System Security Symposium 110 (NDSS, 2015).

  17. Joshi, K. P. et al. in AAAI Fall Symposium 149–152 (AAAI, 2016).

  18. Das, A., Degeling, M., Smullen, D. & Sadeh, N. M. IEEE Pervasive Comput. 17, 35–46 (2018).

    Article  Google Scholar 

Download references

Acknowledgements

This work was financially supported by the European University Institute project CLAUDETTE (http://claudette.eui.eu).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Lippi.

Ethics declarations

Competing interests

The authors declare no competing interests.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lippi, M., Contissa, G., Lagioia, F. et al. Consumer protection requires artificial intelligence. Nat Mach Intell 1, 168–169 (2019). https://doi.org/10.1038/s42256-019-0042-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1038/s42256-019-0042-3

  • Springer Nature Limited

This article is cited by

Navigation