SlideShare a Scribd company logo
BYTE:
Addressing non-economical externalities
Hans Lammerant - VUB
Big data roadmap and cross-disciplinary community for
addressing societal externalities
@BYTE_EU www.byte-project.eu
Big data and externalities
Causal explanation?
How does big data affects interactions between actors?
Big Data
Interactions
between actors
Externalities
@BYTE_EU www.byte-project.eu
Categorisation of externalities
• Benefits: practices aiming at capturing and maximizing the benefits of big data
• Regulatory practices: practices aiming at maximizing an objective at a societal
level by balancing interests, but which are now negatively affected by big data.
They show up as negative externalities because their balancing of interests does
not deliver the same positive results any more.
• Protective practices: practices aimed at preserving other values or interests,
which now get negatively affected.
@BYTE_EU www.byte-project.eu
Categorisation of externalities
Benefits Negative effects on regulatory
practices
Negative effects on protective
practices
Improved efficiency and
innovation
IPR Equality
Improved awareness and
decision-making
Losing control to actors abroad Anti-discrimination
Participation Private vs. public and non-
profit sector
Privacy
Improved political decision-
making and participation
Trust (includes fear of capture
and competition issues)
Liability, accountability
Political abuse & surveillance
@BYTE_EU www.byte-project.eu
Effect of big data on interactions
• Larger amount of interactions between actors
• Higher visibility of actors
• Higher penetration of organisational boundaries → traditional gatekeeping gets
disrupted
• Data becomes network good → positive network effects
• Shift in transactions from exchange of goods to delivery of services → shift from
momentary transaction to regulating continuous data flows
• Changing role of internet: from market place where actors meet into digital
environment in which value creating production processes take place
@BYTE_EU www.byte-project.eu
Effect on regulatory and protective
practices
• Current regulatory and protective practices reflect old transaction model
→ high transaction costs → become disfunctional and result in negative
externalities (e.g. rights clearance in copyright, consent in data protection)
• Enlarged visibility and penetration of boundaries: privacy problems for
individuals and for organisations
• Positive network effects: anonymization becomes unreliable, propagation of
discriminatory effects
@BYTE_EU www.byte-project.eu
Benefits
Kitchin: additional characteristics of big data
• fine-grained in resolution and uniquely indexical in identification;
• relational in nature, containing common fields that enable the conjoining of different datasets;
• flexible, holding the traits of extensionality (can add new fields easily) and scalable (can expand
in size rapidly)
=> allows to deal with higher amount of interactions, such that transaction costs get lowered
while retaining necessary granularity for more individualised and targeted responses.
=> Results in:
• Improved awareness and decision-making
• Improved efficiency and innovation
• Participation
@BYTE_EU www.byte-project.eu
Capturing benefits
Main focus: interoperability
• European Interoperability Framework (EIF): legal, organisational, semantic and
technical interoperability
• Open data: 1) available with open licence, 2) as machine-readable structured
data, 3) in non-proprietary format, 4) using open standards, 5) linked to other's
data
• Design principles Industrie 4.0: Interoperability, Virtualization, Decentralization,
Real-Time Capability, Service Orientation, Modularity
@BYTE_EU www.byte-project.eu
Intellectual property rights, licensing and
contracts
• Regulatory mechanism: copyright, database protection
→ balances different economical objectives in order to get the best result on
the macro-level
• Protective mechanism: protection of trade secrets
→ 'privacy'-rights of companies
@BYTE_EU www.byte-project.eu
Copyright and database protection
• Same objectives but different balancing in EU and US
• Protection of investments by sui generis-right in EU, not in US
• Who did struck the balance right?
• Evaluation of database protection by Commission: no positive result
• Evaluation of Spanish Snippet law: negative result
→ conclusion: European legislator tends to be overprotective
@BYTE_EU www.byte-project.eu
Solutions
• legal change:
• drop sui generis-right on databases
• new exceptions for data and text mining in copyright
• solutions within existing legal framework: collective licensing
• lowers transaction costs but preserves remuneration
• shift transaction model to liability model
• extended collective licenses, compulsory licenses and levies
• open licences: patch, no solution
• Conclusion: limiting copyright preferable → market expansion due to network
effects
@BYTE_EU www.byte-project.eu
Protection of trade secrets
Also companies have their 'privacy' problems
→ results in reluctance to participate in data sharing in wide networks
→ only uptake of big data when it can be internalised
EU: draft directive for trade secrets protection
• No real IPR, but protection against dishonest practices
• Trade secret: not generally know or accessible information + adequate protection
• Unlawful: breach of confidentiality, …
• Lawful: reverse engineering, disclosure to reveal misconduct, …
@BYTE_EU www.byte-project.eu
Protection of trade secrets
• Necessary legal infrastructure supporting new contractual set-ups
• To be further developed in standard contractual arrangements
Best practice: Standardisation of Cloud Computing → includes work on SLA
@BYTE_EU www.byte-project.eu
Privacy and protection of personal data
• Higher visibility and penetration of boundaries result in privacy concerns
• Protective mechanisms: extensively developed in data protection law
• Problems:
→ conflict with purpose limitation and data minimisation principles
→ network effects make anonymisation techniques unreliable
→ mechanisms like consent and data subject rights reflect transaction model
• Does data protection still function with big data?
@BYTE_EU www.byte-project.eu
Privacy and protection of personal data
Critique on data protection principles: plea for risk-based approach
WP29: risk-based approach is possible within existing DP
→ modulate compliance obligations according to risk, not protection
Purpose limitation principle: further use: when not incompatible with original
purposes
@BYTE_EU www.byte-project.eu
Purpose limitation principle
Compatibility assessment:
• relation between original and new purposes
• context data collection and the reasonable expectations of the data subjects
• nature of data and the impact further processing
• safeguards applied by the controller
- additional technical and organisational safeguards
- goals data security (availability, integrity and confidentiality) + data protection
(transparency, isolation, intervenability)
@BYTE_EU www.byte-project.eu
Technical safeguards
Respondent privacy: statistical disclosure control
Anonymisation
• linked with applicability of data protection framework
• identifiability = singling out, linkability and inference
• reasonable effort-test
Randomisation and generalisation techniques
Re-identification research: all fail to guarantee anonymity
@BYTE_EU www.byte-project.eu
Anonymisation
How to deal with weaknesses anonymisation?
• anonymisation remains useful as safeguard
• less dissemination-based access and release-and-forget approach of datasets
with personal data
• query-based access and differential privacy
• access limited to specific users with data use agreement
→ assessing whole of technical and organisational safeguards
@BYTE_EU www.byte-project.eu
Technical safeguards
• Owner privacy: privacy-preserving data mining (PPDM)
• User privacy: private information retrieval (PIR)
• Privacy-preserving computations
• Technical measures for access control
@BYTE_EU www.byte-project.eu
Privacy by Design
• Mainstreaming privacy into design process
• Cavoukian: PbD principles
• goals data security (availability, integrity and confidentiality) + data protection
(transparency, isolation, intervenability)
• design patterns
@BYTE_EU www.byte-project.eu
Organisational safeguards
• functional separation → organisational limiting of access and data use
• limiting access with data use agreements
• privacy-by-design approach: risk assessment & privacy impact assessment
• risk assessment in general derived from IT security
• examples: CNIL, LINDDUN → threat modelling
• literature: PIA as a regular process involving stakeholders
@BYTE_EU www.byte-project.eu
Data protection principles and big data
Conclusions:
• existing data protection principles can be applied with big data
• mix of technical, organisational and legal means
• in full development:
→ specific attention for big data needed
→ mainstreaming through standardised approaches
@BYTE_EU www.byte-project.eu
Accountability and data subject rights
• Data protection are not only rules on use of information
• accountability framework
• informational control through data subject rights
→ necessary to establish trust
→ based in transaction-model: e.g. consent
• shift to liability-model through stronger role regulators
@BYTE_EU www.byte-project.eu
Transparency
• Obliged by data protection framework, but rarely implemented
• transparency of data used, of processing and of use results
• need for standardised auditing and evaluation tools: e.g. privacy seals
• technical tools for transparency: e.g. Google
• standards for transparency and data portability
→ avoid user lock-in
→ allows aggregated views on data use by data subjects
• traceability across several actors?
• Implementation of transparency and data access needs attention and further development
@BYTE_EU www.byte-project.eu
Equality and discrimination
Discrimination:
• prejudice
• rational discrimination
• unintended discrimination
Legal:
• principle of equality
• prohibition of discrimination → direct discrimination / indirect discrimination
@BYTE_EU www.byte-project.eu
Discrimination in data mining
sources of discrimination:
• definition of the objectives and problem → target variable and class labels
• training data → assumption: nothing changes
• under- or over-representation in sample
• choice of input variables
• attributes as proxy for discriminatory grounds
• historical discrimination reflected in labelling
• masking
@BYTE_EU www.byte-project.eu
Anti-discrimination & algorithms
Technical measures
• discrimination discovery
• discrimination prevention through discrimination-free classifiers
• conditional non-discrimination methods
Trade-off accuracy and anti-discrimination → effective methods exist
Recent area of research → in full development
@BYTE_EU www.byte-project.eu
Anti-discrimination framework
Legal framework:
• legal redress
• equality bodies: support legal redress + mainstreaming of policies
• Less developed as data protection framework → need for integration towards common
accountability framework
• Anti-discrimination by design → anti-discrimination objectives alongside data protection
objectives in safeguards, risk and impact assessment, auditing procedures, etc.
• Equality bodies have a task to address anti-discrimination in big data as part of their
mainstreaming efforts → coordination needed between DPAs and equality bodies
@BYTE_EU www.byte-project.eu
Political externalities: Relation private vs.
public and non-profit sector
- lock-in
→ standardisation
→ open source
→ data portability
- rent-seeking and need for public funding
→ Benkler: open source: commons model as result of positive network effects
→ is this also true for open data?
@BYTE_EU www.byte-project.eu
Political externalities: Relation private vs.
public and non-profit sector
Open data often concerns data from public sources, while users are private sector.
→ Costs and benefits fall with different actors.
Data revenue models: subsidized, licensing, subscription, advertising, commission, traffic,
branding
→ closed options like licensing or subscription can generate direct revenue, but limit users
→ subsidy is only open model available
Evaluation similar to IPR: what is macro-effect?
• when only a few users which make commercial applications → closed model
• lot of users: open model → indirect return
@BYTE_EU www.byte-project.eu
Political externalities: loss of control to
actors abroad
• economical concern: traditional tension between protectionism and open
market
• political concern: ability to regulate
→ Range of conflicts: extraterritorial application of law is an issue both in EU and
in US
Solution: International legal harmonisation
→ varies from mutual recognition mechanisms to fully developed legal
framework
@BYTE_EU www.byte-project.eu
Conclusions
Capturing positive benefits:
→ improving interoperability on several levels
→ restoring trust and legal certainty
Dealing with negative externalities
→ data = network good → refrain from overprotection as property
→ adapt legal frameworks from transaction model to liability model:
• collective solutions
• regulation of overall process and mainstreaming in design
• mix of technical, organisational and legal measures
@BYTE_EU www.byte-project.eu
QUESTIONS
Any questions?

More Related Content

What's hot

What's hot (20)

Katharina Götsch, Verena Grubmüller, Igor Pejic – The UniteEurope Project
Katharina Götsch, Verena Grubmüller, Igor Pejic – The UniteEurope ProjectKatharina Götsch, Verena Grubmüller, Igor Pejic – The UniteEurope Project
Katharina Götsch, Verena Grubmüller, Igor Pejic – The UniteEurope Project
 
EDF2014: Franck Cotton & Kamel Gadouche, France: TeraLab - A Secure Big Data...
EDF2014: Franck Cotton  & Kamel Gadouche, France: TeraLab - A Secure Big Data...EDF2014: Franck Cotton  & Kamel Gadouche, France: TeraLab - A Secure Big Data...
EDF2014: Franck Cotton & Kamel Gadouche, France: TeraLab - A Secure Big Data...
 
The EC strategy to enable data sharing spaces
The EC strategy to enable data sharing spacesThe EC strategy to enable data sharing spaces
The EC strategy to enable data sharing spaces
 
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
 
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
EDF2014: Marta Nagy-Rothengass, Head of Unit Data Value Chain, Directorate Ge...
 
Evolution of Data Spaces
Evolution of Data SpacesEvolution of Data Spaces
Evolution of Data Spaces
 
Esociety presentation krems cedem 2014
Esociety presentation krems cedem 2014Esociety presentation krems cedem 2014
Esociety presentation krems cedem 2014
 
Horizontal analysis of societal externalities
Horizontal analysis of societal externalitiesHorizontal analysis of societal externalities
Horizontal analysis of societal externalities
 
European Data Spaces
European Data SpacesEuropean Data Spaces
European Data Spaces
 
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
 
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
 
#opendata Back to the future
#opendata Back to the future#opendata Back to the future
#opendata Back to the future
 
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
 
Gaia-X for Finland – Hub launch 17 June 2021
Gaia-X for Finland – Hub launch 17 June 2021Gaia-X for Finland – Hub launch 17 June 2021
Gaia-X for Finland – Hub launch 17 June 2021
 
Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016Phaedra II Technology foresight, 17 Nov 2016
Phaedra II Technology foresight, 17 Nov 2016
 
EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...
EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...
EDF2014: Nicolas Lemcke Horst, Ambassador of the Danish Basic Data Programme,...
 
20140521 presentation ce de mv3
20140521 presentation ce de mv320140521 presentation ce de mv3
20140521 presentation ce de mv3
 
Many laws leos_v3
Many laws leos_v3Many laws leos_v3
Many laws leos_v3
 
How Big Data Ecosystems Work
How Big Data Ecosystems WorkHow Big Data Ecosystems Work
How Big Data Ecosystems Work
 
EDI project presentation at BDVA PPP 3rd Steering Committee Meeting
EDI project presentation at BDVA PPP 3rd Steering Committee MeetingEDI project presentation at BDVA PPP 3rd Steering Committee Meeting
EDI project presentation at BDVA PPP 3rd Steering Committee Meeting
 

Viewers also liked (6)

Economic Challenges of Big Data
Economic Challenges of Big DataEconomic Challenges of Big Data
Economic Challenges of Big Data
 
BYTE Big Data Community Workshop
BYTE Big Data Community WorkshopBYTE Big Data Community Workshop
BYTE Big Data Community Workshop
 
Addressing economic externalities
Addressing economic externalitiesAddressing economic externalities
Addressing economic externalities
 
Maximize the value of Earth Observation Data in a Big Data World
Maximize the value of Earth Observation Data in a Big Data WorldMaximize the value of Earth Observation Data in a Big Data World
Maximize the value of Earth Observation Data in a Big Data World
 
Big data in healthcare
Big data in healthcareBig data in healthcare
Big data in healthcare
 
Smart city València
Smart city ValènciaSmart city València
Smart city València
 

Similar to Addressing non economical externalities

Banji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSciBanji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSci
Banji Adenusi
 
19032013 Jacques Bus user controlled personal data management
19032013 Jacques Bus  user controlled personal data management 19032013 Jacques Bus  user controlled personal data management
19032013 Jacques Bus user controlled personal data management
Stichting ePortfolio Support
 

Similar to Addressing non economical externalities (20)

Legal Issues in Big Data
Legal Issues in Big DataLegal Issues in Big Data
Legal Issues in Big Data
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
 
BYTE Project Community Overview
BYTE Project Community OverviewBYTE Project Community Overview
BYTE Project Community Overview
 
The interface between data protection and ip law
The interface between data protection and ip lawThe interface between data protection and ip law
The interface between data protection and ip law
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
L'economia europea dei dati. Politiche europee e opportunità di finanziamento...
L'economia europea dei dati. Politiche europee e opportunità di finanziamento...L'economia europea dei dati. Politiche europee e opportunità di finanziamento...
L'economia europea dei dati. Politiche europee e opportunità di finanziamento...
 
Banji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSciBanji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSci
 
Big Data Expo 2015 - Data Science Innovation Privacy Considerations
Big Data Expo 2015 - Data Science Innovation Privacy ConsiderationsBig Data Expo 2015 - Data Science Innovation Privacy Considerations
Big Data Expo 2015 - Data Science Innovation Privacy Considerations
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
Privacy by Design
Privacy by DesignPrivacy by Design
Privacy by Design
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
19032013 Jacques Bus user controlled personal data management
19032013 Jacques Bus  user controlled personal data management 19032013 Jacques Bus  user controlled personal data management
19032013 Jacques Bus user controlled personal data management
 
BDE SC2 Workshop 3: Building a European Data Economy
BDE SC2 Workshop 3: Building a European Data EconomyBDE SC2 Workshop 3: Building a European Data Economy
BDE SC2 Workshop 3: Building a European Data Economy
 

More from BYTE Project

More from BYTE Project (10)

Big Data in a Digital City. Key Insights from the Smart City Case Study
Big Data in a Digital City. Key Insights from the Smart City Case StudyBig Data in a Digital City. Key Insights from the Smart City Case Study
Big Data in a Digital City. Key Insights from the Smart City Case Study
 
Big data societal externalitites. Results from the BYTE case studies
Big data societal externalitites. Results from the BYTE case studiesBig data societal externalitites. Results from the BYTE case studies
Big data societal externalitites. Results from the BYTE case studies
 
Big Data and Social Media Mining in Crisis and Emergency Management
Big Data and Social Media Mining in Crisis and Emergency ManagementBig Data and Social Media Mining in Crisis and Emergency Management
Big Data and Social Media Mining in Crisis and Emergency Management
 
From Big Data to Banality of Evil
From Big Data to Banality of EvilFrom Big Data to Banality of Evil
From Big Data to Banality of Evil
 
Big data Opportunities and Societal Concerns
Big data Opportunities and Societal ConcernsBig data Opportunities and Societal Concerns
Big data Opportunities and Societal Concerns
 
Setting the Scene for Big Data in Europe, Looking Ahead to the Case Studies
Setting the Scene for Big Data in Europe, Looking Ahead to the Case StudiesSetting the Scene for Big Data in Europe, Looking Ahead to the Case Studies
Setting the Scene for Big Data in Europe, Looking Ahead to the Case Studies
 
BYTE Project Overview
BYTE Project OverviewBYTE Project Overview
BYTE Project Overview
 
Big Data Technologies & Applications
Big Data Technologies & ApplicationsBig Data Technologies & Applications
Big Data Technologies & Applications
 
Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...
Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...
Methodologies for Addressing Risks and Opportunities Engendered by Big Data T...
 
BYTE: Big data roadmap and cross-disciplinary community for addressing societ...
BYTE: Big data roadmap and cross-disciplinary community for addressing societ...BYTE: Big data roadmap and cross-disciplinary community for addressing societ...
BYTE: Big data roadmap and cross-disciplinary community for addressing societ...
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Addressing non economical externalities

  • 1. BYTE: Addressing non-economical externalities Hans Lammerant - VUB Big data roadmap and cross-disciplinary community for addressing societal externalities
  • 2. @BYTE_EU www.byte-project.eu Big data and externalities Causal explanation? How does big data affects interactions between actors? Big Data Interactions between actors Externalities
  • 3. @BYTE_EU www.byte-project.eu Categorisation of externalities • Benefits: practices aiming at capturing and maximizing the benefits of big data • Regulatory practices: practices aiming at maximizing an objective at a societal level by balancing interests, but which are now negatively affected by big data. They show up as negative externalities because their balancing of interests does not deliver the same positive results any more. • Protective practices: practices aimed at preserving other values or interests, which now get negatively affected.
  • 4. @BYTE_EU www.byte-project.eu Categorisation of externalities Benefits Negative effects on regulatory practices Negative effects on protective practices Improved efficiency and innovation IPR Equality Improved awareness and decision-making Losing control to actors abroad Anti-discrimination Participation Private vs. public and non- profit sector Privacy Improved political decision- making and participation Trust (includes fear of capture and competition issues) Liability, accountability Political abuse & surveillance
  • 5. @BYTE_EU www.byte-project.eu Effect of big data on interactions • Larger amount of interactions between actors • Higher visibility of actors • Higher penetration of organisational boundaries → traditional gatekeeping gets disrupted • Data becomes network good → positive network effects • Shift in transactions from exchange of goods to delivery of services → shift from momentary transaction to regulating continuous data flows • Changing role of internet: from market place where actors meet into digital environment in which value creating production processes take place
  • 6. @BYTE_EU www.byte-project.eu Effect on regulatory and protective practices • Current regulatory and protective practices reflect old transaction model → high transaction costs → become disfunctional and result in negative externalities (e.g. rights clearance in copyright, consent in data protection) • Enlarged visibility and penetration of boundaries: privacy problems for individuals and for organisations • Positive network effects: anonymization becomes unreliable, propagation of discriminatory effects
  • 7. @BYTE_EU www.byte-project.eu Benefits Kitchin: additional characteristics of big data • fine-grained in resolution and uniquely indexical in identification; • relational in nature, containing common fields that enable the conjoining of different datasets; • flexible, holding the traits of extensionality (can add new fields easily) and scalable (can expand in size rapidly) => allows to deal with higher amount of interactions, such that transaction costs get lowered while retaining necessary granularity for more individualised and targeted responses. => Results in: • Improved awareness and decision-making • Improved efficiency and innovation • Participation
  • 8. @BYTE_EU www.byte-project.eu Capturing benefits Main focus: interoperability • European Interoperability Framework (EIF): legal, organisational, semantic and technical interoperability • Open data: 1) available with open licence, 2) as machine-readable structured data, 3) in non-proprietary format, 4) using open standards, 5) linked to other's data • Design principles Industrie 4.0: Interoperability, Virtualization, Decentralization, Real-Time Capability, Service Orientation, Modularity
  • 9. @BYTE_EU www.byte-project.eu Intellectual property rights, licensing and contracts • Regulatory mechanism: copyright, database protection → balances different economical objectives in order to get the best result on the macro-level • Protective mechanism: protection of trade secrets → 'privacy'-rights of companies
  • 10. @BYTE_EU www.byte-project.eu Copyright and database protection • Same objectives but different balancing in EU and US • Protection of investments by sui generis-right in EU, not in US • Who did struck the balance right? • Evaluation of database protection by Commission: no positive result • Evaluation of Spanish Snippet law: negative result → conclusion: European legislator tends to be overprotective
  • 11. @BYTE_EU www.byte-project.eu Solutions • legal change: • drop sui generis-right on databases • new exceptions for data and text mining in copyright • solutions within existing legal framework: collective licensing • lowers transaction costs but preserves remuneration • shift transaction model to liability model • extended collective licenses, compulsory licenses and levies • open licences: patch, no solution • Conclusion: limiting copyright preferable → market expansion due to network effects
  • 12. @BYTE_EU www.byte-project.eu Protection of trade secrets Also companies have their 'privacy' problems → results in reluctance to participate in data sharing in wide networks → only uptake of big data when it can be internalised EU: draft directive for trade secrets protection • No real IPR, but protection against dishonest practices • Trade secret: not generally know or accessible information + adequate protection • Unlawful: breach of confidentiality, … • Lawful: reverse engineering, disclosure to reveal misconduct, …
  • 13. @BYTE_EU www.byte-project.eu Protection of trade secrets • Necessary legal infrastructure supporting new contractual set-ups • To be further developed in standard contractual arrangements Best practice: Standardisation of Cloud Computing → includes work on SLA
  • 14. @BYTE_EU www.byte-project.eu Privacy and protection of personal data • Higher visibility and penetration of boundaries result in privacy concerns • Protective mechanisms: extensively developed in data protection law • Problems: → conflict with purpose limitation and data minimisation principles → network effects make anonymisation techniques unreliable → mechanisms like consent and data subject rights reflect transaction model • Does data protection still function with big data?
  • 15. @BYTE_EU www.byte-project.eu Privacy and protection of personal data Critique on data protection principles: plea for risk-based approach WP29: risk-based approach is possible within existing DP → modulate compliance obligations according to risk, not protection Purpose limitation principle: further use: when not incompatible with original purposes
  • 16. @BYTE_EU www.byte-project.eu Purpose limitation principle Compatibility assessment: • relation between original and new purposes • context data collection and the reasonable expectations of the data subjects • nature of data and the impact further processing • safeguards applied by the controller - additional technical and organisational safeguards - goals data security (availability, integrity and confidentiality) + data protection (transparency, isolation, intervenability)
  • 17. @BYTE_EU www.byte-project.eu Technical safeguards Respondent privacy: statistical disclosure control Anonymisation • linked with applicability of data protection framework • identifiability = singling out, linkability and inference • reasonable effort-test Randomisation and generalisation techniques Re-identification research: all fail to guarantee anonymity
  • 18. @BYTE_EU www.byte-project.eu Anonymisation How to deal with weaknesses anonymisation? • anonymisation remains useful as safeguard • less dissemination-based access and release-and-forget approach of datasets with personal data • query-based access and differential privacy • access limited to specific users with data use agreement → assessing whole of technical and organisational safeguards
  • 19. @BYTE_EU www.byte-project.eu Technical safeguards • Owner privacy: privacy-preserving data mining (PPDM) • User privacy: private information retrieval (PIR) • Privacy-preserving computations • Technical measures for access control
  • 20. @BYTE_EU www.byte-project.eu Privacy by Design • Mainstreaming privacy into design process • Cavoukian: PbD principles • goals data security (availability, integrity and confidentiality) + data protection (transparency, isolation, intervenability) • design patterns
  • 21. @BYTE_EU www.byte-project.eu Organisational safeguards • functional separation → organisational limiting of access and data use • limiting access with data use agreements • privacy-by-design approach: risk assessment & privacy impact assessment • risk assessment in general derived from IT security • examples: CNIL, LINDDUN → threat modelling • literature: PIA as a regular process involving stakeholders
  • 22. @BYTE_EU www.byte-project.eu Data protection principles and big data Conclusions: • existing data protection principles can be applied with big data • mix of technical, organisational and legal means • in full development: → specific attention for big data needed → mainstreaming through standardised approaches
  • 23. @BYTE_EU www.byte-project.eu Accountability and data subject rights • Data protection are not only rules on use of information • accountability framework • informational control through data subject rights → necessary to establish trust → based in transaction-model: e.g. consent • shift to liability-model through stronger role regulators
  • 24. @BYTE_EU www.byte-project.eu Transparency • Obliged by data protection framework, but rarely implemented • transparency of data used, of processing and of use results • need for standardised auditing and evaluation tools: e.g. privacy seals • technical tools for transparency: e.g. Google • standards for transparency and data portability → avoid user lock-in → allows aggregated views on data use by data subjects • traceability across several actors? • Implementation of transparency and data access needs attention and further development
  • 25. @BYTE_EU www.byte-project.eu Equality and discrimination Discrimination: • prejudice • rational discrimination • unintended discrimination Legal: • principle of equality • prohibition of discrimination → direct discrimination / indirect discrimination
  • 26. @BYTE_EU www.byte-project.eu Discrimination in data mining sources of discrimination: • definition of the objectives and problem → target variable and class labels • training data → assumption: nothing changes • under- or over-representation in sample • choice of input variables • attributes as proxy for discriminatory grounds • historical discrimination reflected in labelling • masking
  • 27. @BYTE_EU www.byte-project.eu Anti-discrimination & algorithms Technical measures • discrimination discovery • discrimination prevention through discrimination-free classifiers • conditional non-discrimination methods Trade-off accuracy and anti-discrimination → effective methods exist Recent area of research → in full development
  • 28. @BYTE_EU www.byte-project.eu Anti-discrimination framework Legal framework: • legal redress • equality bodies: support legal redress + mainstreaming of policies • Less developed as data protection framework → need for integration towards common accountability framework • Anti-discrimination by design → anti-discrimination objectives alongside data protection objectives in safeguards, risk and impact assessment, auditing procedures, etc. • Equality bodies have a task to address anti-discrimination in big data as part of their mainstreaming efforts → coordination needed between DPAs and equality bodies
  • 29. @BYTE_EU www.byte-project.eu Political externalities: Relation private vs. public and non-profit sector - lock-in → standardisation → open source → data portability - rent-seeking and need for public funding → Benkler: open source: commons model as result of positive network effects → is this also true for open data?
  • 30. @BYTE_EU www.byte-project.eu Political externalities: Relation private vs. public and non-profit sector Open data often concerns data from public sources, while users are private sector. → Costs and benefits fall with different actors. Data revenue models: subsidized, licensing, subscription, advertising, commission, traffic, branding → closed options like licensing or subscription can generate direct revenue, but limit users → subsidy is only open model available Evaluation similar to IPR: what is macro-effect? • when only a few users which make commercial applications → closed model • lot of users: open model → indirect return
  • 31. @BYTE_EU www.byte-project.eu Political externalities: loss of control to actors abroad • economical concern: traditional tension between protectionism and open market • political concern: ability to regulate → Range of conflicts: extraterritorial application of law is an issue both in EU and in US Solution: International legal harmonisation → varies from mutual recognition mechanisms to fully developed legal framework
  • 32. @BYTE_EU www.byte-project.eu Conclusions Capturing positive benefits: → improving interoperability on several levels → restoring trust and legal certainty Dealing with negative externalities → data = network good → refrain from overprotection as property → adapt legal frameworks from transaction model to liability model: • collective solutions • regulation of overall process and mainstreaming in design • mix of technical, organisational and legal measures