Skip to main content

Begrenzung der Informationsmacht

  • Chapter
  • First Online:
Protektion 4.0: Das Digitalisierungsdilemma

Part of the book series: Die blaue Stunde der Informatik ((DBSI))

  • 3579 Accesses

Zusammenfassung

Die Informationsmacht wird durch die Innovationen und die Daten erzeugt und könnte durch die Interoperationen und die Protektion, z. B. die DSGVO, begrenzt werden. Waren es in der industriellen Zeit vor allem inkrementelle Verbesserungen von Produkten, so streben digitale Innovationen nach einer maximalen Erweiterung ihres Netzwerkes durch das informationelle Eindringen in einen Markt, die Informatisierung der Prozesse und die nachfolgende Reorganisation der betroffenen Unternehmen. Fallstudien zu NEST, Motorola und General Electric sowie Android-Auto zeigen die Stufen der Informatisierung, der Vernetzung, das Überschreiten von Branchengrenzen und damit den Zwang zur Entwicklung übergeordneter Geschäftsmodelle am Beispiel von vier Branchen – u. a. der Automobilindustrie – als Folge von informationeller Überlegenheit der Netzwerktore. Eine der schärfsten Waffen zur Begrenzung von Marktmacht ist das Kartell- oder Wettbewerbsrecht. Die insgesamt beschränkten Ergebnisse der Klagen der EU gegen Google und Facebook zeigen, dass das Kartellrecht neue Instrumente zur Kontrolle der Informationsmacht braucht, gewissermaßen als digitales Pendant einer wettbewerbsschädlichen industriellen Marktmacht. Trotz hoher Strafen für sogenannte „Wenn-dann-Geschäfte“ ist die Informationsmacht und Wettbewerbsfähigkeit von Google und Facebook durch die EU nicht geschwächt worden. Die DSGVO ist eine sich selbst beschränkende weithin passive Regulierung. Sie konzentriert sich auf die Datenpreisgabe mit nachfolgender Geheimhaltung und vorausgehender informierter Zustimmung, lässt den Datenempfang aber außer Acht. Damit verstärkt sie das Digitalisierungsdilemma und schützt weder Daten noch Menschen in wirksamem Umfang. Ein Paradigmenwechsel des Datenschutzes wäre die Normierung einer Rechtfertigungspflicht verbunden mit der Transparenz der Daten als Regeldienst für die Netzwerktore und zur Stärkung der Datensubjekte damit Daten z. B. „geteilt“ genutzt werden können ohne sie „aufzuteilen“.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Literatur

  • Accorsi R (2012) A secure log architecture to support remote auditing. Math Comput Model 57(7–8):1578–1591

    Article  Google Scholar 

  • Accorsi R, Müller G (2013) Preventive inference control in data centric business. 2nd IEEE security and privacy. San Francisco, S 28–33

    Google Scholar 

  • Accorsi R, Zimmermann C, Müller G (2012) On taming the inference threat in social networks. In: Privacy and data protection technology (PDPT). Amsterdam. https://staff.fnwi.uva.nl/g.j.vantnoordende/pdpt/2012/accorsi.pdf. S 1–5 Zugegriffen: 15. Mai 2016

  • Acquisti A (2009) Nudging privacy: the behavioral economics of personal information. IEEE Security & Priv 7(6):72–75

    Article  Google Scholar 

  • Acquisti A (2017) The economics of personal data and the economics of privacy. Carnegie Mellon University. http://repository.cmu.edu/heinzworks/332/. Zugegriffen: 10. Mai 2016

  • Acquisti A, Grossklags J (2003) Losses, gains and hyperbolic discounting: an experimental approach to information security attitudes and behaviour. 2nd annual workshop on economics and information security. http://www.infosecon.net/workshop/downloads/2003/pdf/Final_session6_acquisti.pdf. S 1–34 Zugegriffen: 27. Juli 2019

  • Acquisti A, Grossklags J (2007) When 25 cent is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. Proceedings on the 6th Workshop on the Economics of Information Security (WEIS) https://www.econinfosec.org/archive/weis2007/papers/66.pdf. Zugegriffen: 27. Juli 2019

  • Acquisti A, John LK, Loewenstein G (2013) What is privacy worth? J Leg Stud 42(2):249–274

    Article  Google Scholar 

  • Adomavicius G (2008) Making sense of technology trends in the information technology landscape. MIS Q 32(4):779–809

    Article  Google Scholar 

  • Anonymizer Proxy Server (2008). http://www.anonymizer.com/Anonymizer. Zugegriffen: 15. Nov. 2018

  • Arrington M (2008) OpenID Welcomes Microsoft, Google, Verisign and IBM. https://goo.gl/eRHe1Z. Zugegriffen: 18. Nov. 2018

  • Arthur D. Little (2011) Study future of advertising. denkwerk Medien. NRW. September 2011. S 21

    Google Scholar 

  • Axon L (2017) Privacy-awareness in blockchain-based PKI. https://ora.ox.ac.uk/objects/uuid:8bd33c4f-5614-400e-b958-48e53fe1b342/download_file?safe_filename = SECRYPT_2017.pdf. Zugegriffen: 15. Nov. 2018

  • Baek YM (2014) Solving the privacy paradox: a counter-argument experimental approach. Computers Hum Behav 38:33–42

    Article  Google Scholar 

  • Bapna R, Jank W, Shmueli G (2008) Consumer surplus in online auctions. Inf Syst Res 19(4). http://papers.ssrn.com/sol3/papers.cfm?abstract_id = 840264. Zugegriffen: 15. Nov. 2018

  • Barnes S (2006) A privacy paradox: social networking in the united states. First Monday. 11(9):139

    Article  Google Scholar 

  • Beliger A, Krieger D (2018) You have zero privacy anyway – get over it. Inform Spektrum 41(5):328–348

    Article  Google Scholar 

  • Berendt B, Günther O, Spiekermann S (2005) Privacy in E-Commerce: stated preferences vs. actual behaviour. Communications of the ACM 48(4):101–106

    Article  Google Scholar 

  • Beresford A, Kübler D, Preibusch S (2010) Unwillingness to pay for privacy: a field experiment. IZA Discussion Paper No. 5017

    Google Scholar 

  • Bergelson V (2003) It’s personal but is it mine? Toward property rights in personal information. U.C. Davis Law Rev 37:379–452

    Google Scholar 

  • Berners-Lee T (2010) Long live the web. Sci Am 303(6):80–85

    Article  Google Scholar 

  • Berners-Lee T (2018) One small Step for the Web. https://medium.com/@timberners_lee/one-small-step-for-the-web-87f92217d085. Zugegriffen: 7. Apr. 2019

  • Blarkom G, Borking J, Olk J (2003) Handbook of privacy and privacy-enhancing technologies. Pisa Consortium. The Hague, Netherlands

    Google Scholar 

  • Boyd D, Crawford K (2012) Critical questions for big data. Inf, Commun Soc 15(5):662–679

    Article  Google Scholar 

  • Brauer M (2018) Das Darknet – Schutzraum für politisch Verfolgte oder Tummelplatz für Kriminelle? Uni Greifswald. https://www.darknet-anwalt.de/wp-content/uploads/2018/Das_Darknet.pdf. Zugegriffen: 15. Juni 2019

  • Brynjolfsson E (2003) Consumer surplus in the digital economy: estimating the value of increased product variety at online booksellers. Manage sci 49(11):1580–1596

    Article  Google Scholar 

  • Bundesamt für Sicherheit in der Informationstechnik (2018) eIDAS. https://www.bsi.bund.de/DE/Themen/DigitaleGesellschaft/eIDAS/eIDAS. Zugegriffen: 18. Mai 2019

  • Bundeskartellamt (2016) Think tank internet. Arbeitspapier – Marktmacht von Plattformen und Netzwerken. Az. B6-113/15. Bonn

    Google Scholar 

  • Camenisch J, Herreweghen EV (2002) Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM conference on Computer and Communications Security. S 21–30

    Google Scholar 

  • Castells M (2017) Der Aufstieg der Netzwerkgesellschaft. Das Informationszeitalter, 2. Aufl. Springer, Wiesbaden

    Book  Google Scholar 

  • CCIB (2006) Common criteria for information technology security evaluation. Part 1: Introduction and general model. September 2006

    Google Scholar 

  • Ceri S, Dolog P, Matera M, Nejdl W (2004) Model-driven design of web applications with client-side adaptation. In: ICWE 2004. LNCS. Bd 3140. S 201–214

    Google Scholar 

  • Chance C (2017) Smart contracts. www.cliffordchance.com/briefings/2017/06/smart_contracts. Zugegriffen: 15. Nov. 2018

  • Chapin A, Greenstadt R, Santell J (2017) How privacy flaws affect consumer perception. Unpublished manuscript

    Google Scholar 

  • Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM. S 84–90

    Google Scholar 

  • Christensen CM, Raynor M, Mc Donald R (2015) What is disruptive innovation? https://hbr.org/2015/12/What-is-disruptive-innovation. Zugegriffen: 15. Nov. 2018

  • Clarke R (2014) Persona missing, feared drowned. The digital persona concept, two decades later. Inf Technol People 27(2):182–207

    Article  MathSciNet  Google Scholar 

  • Couldry N (2019) Datenkolonialismus. https://www.hiig.de/events/nick-couldry-datenkolonialismus-digitale-gesellschaft/. Zugegriffen: 30. Apr. 2019

  • Dhar V (2013) Data science and prediction. Communications of the ACM 56(12):64–78

    Article  Google Scholar 

  • Dingledine R, Mathewson N, Syverson, P (2004) Tor: The second-generation onion router. Naval Research Lab Washington DC. Tech. Rep.

    Google Scholar 

  • EC (2017) European committee for interoperable systems: interoperability & intraoperability. https://goo.gl/Wr5vGJ. Zugegriffen: 15. Nov. 2018

  • Eckert C (2018) IT-Sicherheit, Konzepte – Verfahren – Protokolle. De Gruyter, Berlin

    Book  Google Scholar 

  • Economist (2018a) Intelligent economies: AI’s transformation of industries and society, intelligent economies: AI’s transformation of Industries and Society. https://eiuperspectives.economist.com/sites/default/files/EIU_Microsoft-20–Intelligent-Economies_AI’s-transformation-of-industries-and-society.pdf. Zugegriffen: 15. Nov. 2018

  • Economist (2018b) Technology firms are both the friend and the foe of competition. In: Economist Special Report: The Tech Antitrust Paradox https://www.economist.com/special-report/2018/11/15/technology-firms-are-both-the-friend-and-the-foe-of-competition. Zugegriffen: 27. Juli 2019

  • Economist (2019a) The European Union struggles to extract more from tech firms, Dezember 2018 https://www.economist.com/business/2018/12/08/the-european-union-struggles-to-extract-more-from-tech-firms. Zugegriffen: 27. Juli 2019

  • European Commission (2012) Proposal for a regulation of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). Procedure 2012/0010/COD

    Google Scholar 

  • Fichman RG, Santos BL, Zheng ZE (2014) Digital innovation. MIS Q 38(2):329–343

    Article  Google Scholar 

  • Fischer-Hübner S, Hedbom H, Wästlund E (2011) Trust and assurance HCI. In: Camenisch J, Fischer-Hübner S, Rannenberg K (Hrsg) Privacy and identity management for life. Springer, Berlin, S 245–260

    Chapter  Google Scholar 

  • Fischer-Hübner S, Angulo J, Karegar F, Pulls T (2016) Transparency, privacy and trust – technology for tracking and controlling my data disclosures: does this work? IFIPTM 2016. S 3–14

    Google Scholar 

  • Flament P C A (2016) Blockchain technology: a general purpose technology for the decentralization of governance. Universite Libre de Bruxelles. Masterthesis. Ing. Solvay Brussels School

    Google Scholar 

  • Gillespie T (2018) Custodians of the Internet Platforms, Content Moderation and the hidden Decisions that shape Social Media. Yale University Press, New Haven

    Google Scholar 

  • Google (2015) My account. https://myaccount.google.com. Zugegriffen: 15. Juni 2019

  • Grafenstein M (2018) The principle of purpose limitation. In: Data Protection Laws. Nomos. https://www.hiig.de/publication/the-principle-of-purpose-limitation-in-data-protection-laws-the-risk-based-approach-principles-and-private-standards-as-elements-for-regulating-innovation/. Zugegriffen: 15. Nov. 2018

  • Grasser U (2015) Interoperability in digital ecosystems. Berkman Klein Center for Internet and Society. Publication No. 2015–13. http://nrs.harvard.edu/urn-3:HUL.InstRepos:28552584 Cambridge. Zugegriffen: 15. Nov. 2018

  • Haas S, Wohlgemuth S, Echizen I, Sonehara N, Müller G (2011) Aspects of privacy for electronic health records. Int J Med Inform 80(2):26–31 (Special Issue: Security in Health Information Systems)

    Article  Google Scholar 

  • Hansen M (2008) Marrying transparency tools with user-controlled identity management. In: The Future of Identity in the Information Society. IFIP, Bd 262. Springer, Boston, S 199–220

    Chapter  Google Scholar 

  • Heiden I, Wersig M (2018) Preisdifferenzierung nach Geschlecht in Deutschland. Nomos, Baden-Baden

    Google Scholar 

  • Heurix JP, Zimmermann T, Neubauer S, Fenz S (2015) A taxonomy for privacy enhancing technologies. Computers & Security 53:1–17

    Article  Google Scholar 

  • Hinz O, Eckert J (2010) Der Einfluss von Such- und Empfehlungssystemen auf den Absatz im Electronic Commerce. Wirtschaftsinformatik 52(2):65–77

    Article  Google Scholar 

  • Hoffmann-Riem W, Fritzsche S (2009) Innovationsverantwortung. In: Eifert M, Hoffmann-Riem W (Hrsg) Innovation und Recht. Duncker & Humblot, Berlin, S 11–41

    Google Scholar 

  • Iansiti M, Lakhani R (2014) Digital ubiquity: how connections, sensors, and data are revolutionizing business. https://hbr.org/2014/11/digital-ubiquity-how-connections-sensors-and-data-are-revolutionizing-business. Zugegriffen: 15. Nov. 2018

  • Iansiti M, Lakhani K (2018) Die neuen Monopole. Harvard Business Manager. Edition 3. S 24–31

    Google Scholar 

  • Jacobs I (2014) Open social foundation moves standards work to W3C social web activity. https://goo.gl/2GTUCa. Zugegriffen: 15. Nov. 2018

  • Kaiser J (2003) Besteht eine Beziehung zwischen Nutzbarkeit und Sicherheit? Praxis der Informationsverarbeitung und Kommunikation 26(1):48–51

    Article  Google Scholar 

  • Kaiser J, Reichenbach M (2002) Evaluating security tools towards usable security. Proceedings of the IFIP 17th world computer congress – TC13 stream on usability: gaining a competitive edge. S 125–131

    Google Scholar 

  • Kamann H-G (2016) Kartellrecht und Datenschutzrecht. Verhältnis einer „Hass-Liebe “? In: Immenga U, Körber T (Hrsg) Daten und Wettbewerb in der digitalen Ökonomie. Nomos, S 59–80

    Google Scholar 

  • Karjoth G, Schunter M, Waidner M (2003) Plattform for enterprise privacy practices: privacy-enabled management of customer data. 2nd workshop on privacy enhancing technologies. LNCS 2482. S 69–84

    Google Scholar 

  • Knieps G (2015) Network economics: principles – strategies – competition policy. Springer Texts in Business and Economics. Springer

    Google Scholar 

  • Kobsa A (2007) The adaptive web. In: Privacy-Enhanced Web Personalization. Springer, S 628–670

    Google Scholar 

  • Kosinski M, Stilwell D, Graepel T (2013) Private traits and attributes are predictable from digital records and human behaviour. PNAS 4:5802–5805

    Article  Google Scholar 

  • Kurz C (2016) Kriecht aus dem fiesen Darknet das Unheil der Welt? https://netzpolitik.org/2016/kommentar-kriecht-aus-dem-fiesen-darknet-das-unheil-der-welt. Zugegriffen: 15. Nov. 2018

  • Lanier J (2014) Who owns the future? Simon & Schuster, New York

    Google Scholar 

  • Lanier J (2018) Zehn Gründe, warum Du Deine Social Media Accounts sofort löschen musst. Hoffmann und Campe, Hamburg

    Google Scholar 

  • Lobe A (2017) Gebt die Algorithmen frei! Strategien der Digitalkonzerne. http://www.faz.net/-gqz-8z26h. Zugegriffen: 15. Nov. 2018

  • Mantelero A (2013) The EU proposal for a general data protection regulation and the roots of the ‚Right to be Forgotten‘. Computer Law & Security Rev 29(3):229–235

    Article  Google Scholar 

  • Mayer-Schönberger V, Cukier K (2012) Big data: a revolution that transforms how we work, live, and think. Houghton Mifflin Harcourt

    Google Scholar 

  • McKinsey (2018) Blockchain beyond the hype: what is the strategic business value? https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/blockchain-beyond-the-hype-what-is-the-strategic-business-value. Zugegriffen: 15. Nov. 2018

  • Metz R (2018) Raus aus der Echokammer. In Technology Review. https://www.heise.de/tr/artikel/Raus-aus-der-Echokammer-3965673.html. Zugegriffen: 15. Nov. 2018

  • Müller G (2003) Telematik und Kommunikationssysteme in der vernetzten Wirtschaft. Oldenbourg, München

    Book  Google Scholar 

  • Müller G (2008) Information security: 50 years behind, 50 years beyond. Wirtschaftsinformatik 50(4):322–323

    Article  Google Scholar 

  • Müller G, Rannenberg K (1999b) Multilateral security. In: Müller G, Rannenberg K (Hrsg) Multilateral security in communications technology, empowering users, enabling applications. Addison-Wesley, Bonn S 562–570

    Google Scholar 

  • Müller G, Wahlster W (2013) Placing humans in the feedback loop of social infrastructures. Inform Spektrum. 36(6):520–529

    Article  Google Scholar 

  • Müller G, Sackmann S, Prokein O (2008) IT security: new requirements, regulations and approaches. In: Schlottmann F (Hrsg) Handbook on information technology in finance. Springer, Berlin, S 711–730

    Google Scholar 

  • Nambisan S (2018) Architecture vs. ecosystems perspective: reflections on digital innovation management. Inf Organ 28(2):104–106

    Article  Google Scholar 

  • Negroponte J, Palmisano S (2017) Defending an open, global, secure, and resilient internet. In: Council on foreign relations. Independent task force MIT Report No. 70. Cambridge, USA

    Google Scholar 

  • Nguyen HH, Tieu T, Nguyen-Son HQ, Nozick V, Yamagishi J, Echizen I (2018) Modular convolutional neural network for discriminating between computer-generated images and photographic images. In: Proceedings of the 13th international conference on availability, reliability and security. S 1–21

    Google Scholar 

  • Nilakanta S, Scheibe K (2005) The digital persona and trust bank. A privacy management framework. J Inf Priv Secur 1(4):3–21

    Google Scholar 

  • Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford

    Google Scholar 

  • Nolte C-G (2018) Privacy in social networks. Dissertation Freiburg

    Google Scholar 

  • Ogane T, Echizen I (2018) Biometric jammer: use of pseudo fingerprint to prevent fingerprint extraction from camera images without inconveniencing users, IEEE international conference on Systems, Man, and Cybernetics (SMC2018). S 253–260

    Google Scholar 

  • Open Pretty Good Privacy (2018) https://lists.gnupg.org/pipermail/gnupg-devel/2014-January/028141. Zugegriffen: 15. Nov. 2018

  • Owen G (2014) Tor: hidden services and deanonymisation. https://media.ccc.de/v/31c3 – 6112. Zugegriffen: 15. Nov. 2018

  • Pang B, Lee L (2008) Opinion mining and sentiment. Found Trends Inf Retrieval 2(1–2):1–135

    Article  Google Scholar 

  • Park J, Sandhu R (2004) The UCONABC usage control model. ACM Trans Inform Syst Secur (TISSEC). 7(1):128–174

    Article  Google Scholar 

  • Pohle J (2016) Datenschutz und Technikgestaltung Geschichte und Theorie des Datenschutzes aus informatischer Sicht und Folgerungen für die Technikgestaltung. Dissertation TU Berlin

    Google Scholar 

  • Porter ME, Heppelmann JE (2018) Wie smarte Produkte Unternehmen verändern? In: Harvard Business Manager. Edition 3. S 5–23

    Google Scholar 

  • Posner RA (1981) The economics of privacy. Am Econ Rev 71(2):405–409

    Google Scholar 

  • Posner RA (2008) Privacy, surveillance and law. Univ Chicago Law Rev 75(1):245–260

    Google Scholar 

  • Pretschner A, Hilty M, Basin D (2006) Distributed usage control. CACM 49(9):39–44

    Article  Google Scholar 

  • Pretschner A, Hilty M, Schaefer C (2008) Usage control enforcement: present and future. IEEE Secur Priv 6(4):44–53

    Article  Google Scholar 

  • Purtova N (2010) Private law solutions in European data protection: relationship to privacy, and waiver of data protection rights. Neth Q Hum Rights 28:179–198

    Article  Google Scholar 

  • Raskin A (2015) Mozilla privacy icons. https://wiki.mozilla.org. Zugegriffen: 15. Nov. 2018

  • Reichl H, Roßnagel A, Müller G (2005) Digitaler Personalausweis. DuV, Wiesbaden

    Book  Google Scholar 

  • Reiter MK, Rubin AD (1998) Crowds: anonymity for web transactions. ACM Trans Inf Syst Secur 1(1):66–92

    Article  Google Scholar 

  • Sackmann S, Kähmer M (2006) ExPDT: a policy-based approach for automating compliance. Wirtschaftsinformatik 50(5):366–374

    Article  Google Scholar 

  • Schermer BW (2011) The limits of privacy in automated profiling and data mining. Computer Law Secur Rev 27(1):45–52

    Article  Google Scholar 

  • Schmalensee R (1989) Inter-industry studies of structure and performance. In: Schmalensee R, Willig R (Hrsg) Handbook of industrial organization. North-Holland, Amsterdam, S 951–1009

    Google Scholar 

  • Schmitt C (1950) Der Nomos der Erde im Völkerrecht des Jus Publicum Europaeum. Duncker & Humblot, Berlin

    Google Scholar 

  • Schwartz PM (2004) Property, privacy, and personal. Data. Harv Law Rev 117(7):2056–2128

    Article  Google Scholar 

  • Skog AD, Wimelius H, Sandbeg J (2018) Digital disruption. BISE 60(5):431–437

    Google Scholar 

  • Softonic (2013) Anonym-surfen-tor-jondo-vpn-und-web-proxies-im-vergleich. https://de.softonic.com/artikel/anonym-surfen-tor-jondo-vpn-und-web-proxies-im-vergleich. Zugegriffen: 26. Apr. 2016

  • Spiekermann S, Novotny A (2015) A vision for global privacy bridges. Technical and legal measures for international data markets. Computer Law & Secur Rev 31(2):181–200

    Article  Google Scholar 

  • Szabo N (2006) Smart contracts. http://www.fon.hum.uva.nl/szabo.best.vwh.net/smart.contracts.html. Zugegriffen: 3. Apr. 2016

  • Thaler R (2015) The power of nudges, for good and bad. In: The New York Times. 31. Oktober 2015. S 46

    Google Scholar 

  • Thomson L (2017) Dark web doesn’t exist, says Tor’s dingledine and folks use network for privacy, not crime the register. https://www.theregister.co.uk/2017/07/29/tordarkweb/. Zugegriffen: 15. Nov. 2018

  • Tor Project Inc (2014) Tor: sponsors. https://www.torproject.org/about/sponsors. Zugegriffen: 5. Apr. 2019

  • Tsai J, Egelman S, Cranor L, Acquisti SA (2011) The effect of online privacy information on purchasing behavior: an experimental study. Information Systems Research Vol 22. No. https://www.econinfosec.org/archive/weis2007/papers/57.pdf. Zugegriffen: 27. Juli 2019

  • Varian HR (2009) Economic aspects of personal privacy. In: Internet policy and economics. Springer, Berlin S 101–109

    Chapter  Google Scholar 

  • Warren SD, Brandeis LD (1990) The right to privacy. Harv Law Rev 4(5):193–220

    Article  Google Scholar 

  • Weitzner DJ (2007) Google, profiling, and privacy. IEEE Internet Computing 11(6):95

    Article  Google Scholar 

  • Wenning R, Schunter M (2006) The platform for privacy preferences 1.1 (S 3S. 1.1) Specification. W3C Note 13. http://www.w3.org/TR/P3S. 11. Zugegriffen: 24. September 2015

  • Wessel M (2016) How big data is changing disruptive innovation. https://hbr.org/2016/01/how-big-data-is-changing-disruptive-innovation? Zugegriffen: 15. Nov. 2018

  • Wessel M (2017) Why preventing disruption in 2017 is harder than it was when christensen coined the term. https://hbr.org/2017/09/why-preventing-disruption-in-2017-is-harder-than-it-was-when-christensen-coined-the-term? Zugegriffen: 15. Juni 2019

  • Westin AF (1968) Privacy and freedom. Wash Law Rev 25(1):166–170

    Google Scholar 

  • Whitten A, Tygar J (1999) Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. Proceedings of the 8th USENIX security symposium, S 169–184

    Google Scholar 

  • Wired (1999) You have zero privacy. https://www.wired.com/1999/01/sun-on-privacy-get-over-it/. Zugegriffen: 15. Juli 2017

  • Wohlgemuth S, Müller G (2006) Privacy with delegation of rights by identity management. In: Müller G (Hrsg) Emerging Trends in Information and Communication Security. ETRICS 2006, Bd. 3995. Lecture Notes in Computer Science, Berlin, S 175–190

    Google Scholar 

  • Yamada T, Gohshi S, Echizen I (2013) Privacy visor: method based on light absorbing and reflecting properties for preventing face image detection. Proc. of the 2013. IEEE international conference on Systems, Man, and Cybernetics. S 152–161

    Google Scholar 

  • Young AL, Quan-Haase A (2013) Privacy protection strategies on facebook: the internet privacy paradox revisited. Inf Commun Soc 16(4):479–500

    Article  Google Scholar 

  • Zimmermann C, Accorsi R, Müller G (2014) Privacy dashboards. Reconciling data-driven business models and privacy. In: 9th international conference on availability, reliability and security. IEEE, S 152–157

    Google Scholar 

  • Zuboff S (2014) Lasst euch nicht enteignen! Unsere Zukunft mit “Big Data”. http://www.faz.net/-gsf-7twrt. Zugegriffen: 15. Nov. 2018

  • Zuboff S (2019) The age of surveillance Capitalism: the fight for a human future at the new frontier of power. Public Affairs, New York

    Google Scholar 

Weiterführende Literatur

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer-Verlag GmbH Deutschland, ein Teil von Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Müller, G. (2020). Begrenzung der Informationsmacht . In: Protektion 4.0: Das Digitalisierungsdilemma. Die blaue Stunde der Informatik. Springer Vieweg, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-56262-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-56262-8_2

  • Published:

  • Publisher Name: Springer Vieweg, Berlin, Heidelberg

  • Print ISBN: 978-3-662-56261-1

  • Online ISBN: 978-3-662-56262-8

  • eBook Packages: Computer Science and Engineering (German Language)

Publish with us

Policies and ethics