{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T23:02:02Z","timestamp":1777158122459,"version":"3.51.4"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030396336","type":"print"},{"value":"9783030396343","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39634-3_5","type":"book-chapter","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T03:02:32Z","timestamp":1579662152000},"page":"47-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards a Right not to Be Deceived? An Interdisciplinary Analysis of Media Personalization in the Light of the GDPR"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5948-1476","authenticated-orcid":false,"given":"Urbano","family":"Reviglio","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,23]]},"reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1093\/idpl\/ipx005","volume":"7","author":"S Wachter","year":"2017","unstructured":"Wachter, S., Mittelstadt, B., Floridi, L.: Why a right to explanation of automated decision-making does not exist in the general data protection regulation. Int. Data Priv. Law 7(2), 76\u201399 (2017)","journal-title":"Int. Data Priv. Law"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Kaltheuner, F., Bietti, E.: Data is power: towards additional guidance on profiling and automated decision-making in the GDPR. J. Inf. Rights Policy Pract. 2(2) (2018)","DOI":"10.21039\/irpandp.v2i2.45"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1515\/til-2019-0004","volume":"19","author":"M Hildebrandt","year":"2019","unstructured":"Hildebrandt, M.: Privacy as protection of the incomputable self: from agnostic to agonistic machine learning. Theor. Inq. Law 19(1), 83\u2013121 (2019, forthcoming)","journal-title":"Theor. Inq. Law"},{"key":"5_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01820-6","volume-title":"The Future of Identity in the Information Society: Challenges and Opportunities","year":"2009","unstructured":"Rannenberg, K., Royer, D., Deuker, A. (eds.): The Future of Identity in the Information Society: Challenges and Opportunities. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01820-6"},{"key":"5_CR5","unstructured":"Kohl, U., Davey, J., Eisler, J.: Data-driven personalisation and the law-a primer: collective interests engaged by personalisation in markets, politics and law (2019)"},{"key":"5_CR6","first-page":"59","volume":"25","author":"MS Gal","year":"2017","unstructured":"Gal, M.S.: Algorithmic challenges to autonomous choice. Mich. Telecommun. Technol. Law Rev. 25, 59\u2013104 (2017)","journal-title":"Mich. Telecommun. Technol. Law Rev."},{"key":"5_CR7","first-page":"3","volume":"8","author":"K Yeung","year":"2018","unstructured":"Yeung, K.: Five fears about mass predictive personalisation in an age of surveillance capitalism. Int. Data Priv. Law 8, 3 (2018, forthcoming)","journal-title":"Int. Data Priv. Law"},{"key":"5_CR8","volume-title":"The Filter Bubble: How the New Personalized Web is Changing What We Read and How We Think","author":"E Pariser","year":"2011","unstructured":"Pariser, E.: The Filter Bubble: How the New Personalized Web is Changing What We Read and How We Think. Penguin, New York (2011)"},{"key":"5_CR9","doi-asserted-by":"publisher","DOI":"10.1515\/9781400884711","volume-title":"#Republic: Divided Democracy in the Age of Social Media","author":"CR Sunstein","year":"2017","unstructured":"Sunstein, C.R.: #Republic: Divided Democracy in the Age of Social Media. Princeton University Press, Princeton (2017)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Harambam, J., Helberger, N., van Hoboken, J.: Democratizing algorithmic news recommenders: how to materialize voice in a technologically saturated media ecosystem. Phil. Trans. R. Soc. A 376(2133) (2018)","DOI":"10.1098\/rsta.2018.0088"},{"issue":"1","key":"5_CR11","first-page":"1","volume":"5","author":"FJ Zuiderveen Borgesius","year":"2016","unstructured":"Zuiderveen Borgesius, F.J., Trilling, D., Moeller, J., Bod\u00f3, B., De Vreese, C.H., Helberger, N.: Should we worry about filter bubbles? Internet policy review. J. Internet Regul. 5(1), 1\u201316 (2016)","journal-title":"J. Internet Regul."},{"key":"5_CR12","first-page":"133","volume":"19","author":"B Bodo","year":"2017","unstructured":"Bodo, B., et al.: Tackling the algorithmic control crisis - the technical, legal, and ethical challenges of research into algorithmic agents. Yale JL Tech. 19, 133 (2017)","journal-title":"Yale JL Tech."},{"key":"5_CR13","unstructured":"Albanie, S., Shakespeare, H., Gunter, T.: Unknowable manipulators: social network curator algorithms. arXiv preprint arXiv:1701.04895 (2017)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Gillespie, T.: The relevance of algorithms. In: Media Technologies: Essays on Communication, Materiality, and Society, p. 167 (2014)","DOI":"10.7551\/mitpress\/9780262525374.003.0009"},{"issue":"1","key":"5_CR15","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1080\/1369118X.2016.1186713","volume":"20","author":"K Yeung","year":"2017","unstructured":"Yeung, K.: \u2018Hypernudge\u2019: big data as a mode of regulation by design. Inf. Commun. Soc. 20(1), 118\u2013136 (2017)","journal-title":"Inf. Commun. Soc."},{"issue":"2","key":"5_CR16","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.clsr.2018.12.004","volume":"35","author":"G Colangelo","year":"2019","unstructured":"Colangelo, G., Maggiolino, M.: From fragile to smart consumers: shifting paradigm for the digital era. Comput. Law Secur. Rev. 35(2), 173\u2013181 (2019)","journal-title":"Comput. Law Secur. Rev."},{"key":"5_CR17","first-page":"18","volume":"16","author":"L Edwards","year":"2017","unstructured":"Edwards, L., Veale, M.: Slave to the algorithm: why a right to an explanation is probably not the remedy you are looking for. Duke L. Tech. Rev. 16, 18 (2017)","journal-title":"Duke L. Tech. Rev."},{"issue":"2","key":"5_CR18","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10676-009-9187-9","volume":"11","author":"M Turilli","year":"2009","unstructured":"Turilli, M., Floridi, L.: The ethics of information transparency. Ethics Inf. Technol. 11(2), 105\u2013112 (2009)","journal-title":"Ethics Inf. Technol."},{"key":"5_CR19","first-page":"12","volume":"10","author":"B Mittelstadt","year":"2016","unstructured":"Mittelstadt, B.: Automation, algorithms, and politics| auditing for transparency in content personalization systems. Int. J. Commun. 10, 12 (2016)","journal-title":"Int. J. Commun."},{"issue":"1","key":"5_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2053951715622512","volume":"3","author":"J Burrell","year":"2016","unstructured":"Burrell, J.: How the machine \u2018thinks\u2019: understanding opacity in machine learning algorithms. Big Data Soc. 3(1), 1\u201312 (2016)","journal-title":"Big Data Soc."},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Tutt, A.: An FDA for algorithms. Social Science Research Network (2016)","DOI":"10.2139\/ssrn.2747994"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Goodman, B., Flaxman, S.: European union regulations on algorithmic decision-making and a \u201cright to explanation\u201d. arXiv preprint arXiv:1606.08813 (2016)","DOI":"10.1609\/aimag.v38i3.2741"},{"issue":"5","key":"5_CR23","first-page":"1427","volume":"54","author":"N Helberger","year":"2017","unstructured":"Helberger, N., Borgesius, F.Z., Reyna, A.: The perfect match? A closer look at the relationship between EU consumer law and data protection law. Common Market Law Rev. 54(5), 1427\u20131465 (2017)","journal-title":"Common Market Law Rev."},{"issue":"1","key":"5_CR24","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1515\/til-2019-0007","volume":"20","author":"O Lynskey","year":"2019","unstructured":"Lynskey, O.: Grappling with \u201cdata power\u201d: normative nudges from data protection and privacy. Theor. Inq. Law 20(1), 189\u2013220 (2019)","journal-title":"Theor. Inq. Law"},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s13347-018-0316-4","volume":"32","author":"M Lanzing","year":"2018","unstructured":"Lanzing, M.: \u201cStrongly recommended\u201d revisiting decisional privacy to judge hypernudging in self-tracking technologies. Philos. Technol. 32, 549\u2013568 (2018)","journal-title":"Philos. Technol."},{"issue":"2","key":"5_CR26","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1080\/17577632.2017.1387353","volume":"9","author":"S Eskens","year":"2017","unstructured":"Eskens, S., Helberger, N., Moeller, J.: Challenged by news personalisation: five perspectives on the right to receive information. J. Media Law 9(2), 259\u2013284 (2017)","journal-title":"J. Media Law"},{"key":"5_CR27","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s10676-018-9496-y","volume":"21","author":"U Reviglio","year":"2019","unstructured":"Reviglio, U.: Serendipity as an emerging design principle of the infosphere: challenges and opportunities. Ethics Inf. Technol. 21, 151\u2013166 (2019)","journal-title":"Ethics Inf. Technol."},{"issue":"1","key":"5_CR28","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1515\/til-2019-0006","volume":"20","author":"TZ Zarsky","year":"2019","unstructured":"Zarsky, T.Z.: Privacy and manipulation in the digital age. Theor. Inq. Law 20(1), 157\u2013188 (2019)","journal-title":"Theor. Inq. Law"},{"key":"5_CR29","unstructured":"Facebook Newsroom. https:\/\/newsroom.fb.com\/news\/2019\/03\/why-am-i-seeing-this\/. Accessed 07 June 2019"},{"issue":"1","key":"5_CR30","first-page":"1360","volume":"9","author":"CP Hoffmann","year":"2015","unstructured":"Hoffmann, C.P., Lutz, C., Meckel, M., Ranzini, G.: Diversity by choice: applying a social cognitive perspective to the role of public service media in the digital age. Int. J. Commun. 9(1), 1360\u20131381 (2015)","journal-title":"Int. J. Commun."},{"key":"5_CR31","unstructured":"Karppinen, K.: Media and the paradoxes of pluralism. In: The Media and Social Theory, pp. 27\u201342 (2008)"},{"issue":"2","key":"5_CR32","first-page":"197","volume":"21","author":"N Helberger","year":"2016","unstructured":"Helberger, N., Karppinen, K., D\u2019Acunto, L.: Exposure diversity as a design principle for recommender systems. Inf. Commun. Soc. 21(2), 191\u2013207 (2016)","journal-title":"Inf. Commun. Soc."},{"issue":"1","key":"5_CR33","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1353\/jod.2019.0002","volume":"30","author":"RJ Deibert","year":"2019","unstructured":"Deibert, R.J.: The road to digital unfreedom: three painful truths about social media. J. Democr. 30(1), 25\u201339 (2019)","journal-title":"J. Democr."},{"key":"5_CR34","first-page":"995","volume":"82","author":"R Calo","year":"2013","unstructured":"Calo, R.: Digital market manipulation. Geo. Wash. L. Rev. 82, 995 (2013)","journal-title":"Geo. Wash. L. Rev."},{"key":"5_CR35","unstructured":"Kidron, B., et al.: Disrupted Childhood: The Cost of Persuasive Design. 5rights, London (2018)"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Fogg, B.J., Lee, E., Marshall, J.: Interactive technology and persuasion. In: The Handbook of Persuasion: Theory and Practice. Sage, Thousand Oaks (2002)","DOI":"10.4135\/9781412976046.n34"},{"issue":"1","key":"5_CR37","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1057\/jit.2015.5","volume":"30","author":"S Zuboff","year":"2015","unstructured":"Zuboff, S.: Big other: surveillance capitalism and the prospects of an information civilization. J. Inf. Technol. 30(1), 75\u201389 (2015)","journal-title":"J. Inf. Technol."},{"issue":"6221","key":"5_CR38","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509\u2013514 (2015)","journal-title":"Science"}],"container-title":["IFIP Advances in Information and Communication Technology","Digital Transformation for a Sustainable Society in the 21st Century"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39634-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T01:11:08Z","timestamp":1705885868000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-39634-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030396336","9783030396343"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39634-3_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I3E","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on e-Business, e-Services and e-Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Trondheim","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i3e2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.i3e2019.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"138","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"I3E 2019 workshops (DTIS, TPSIE, 3(IT), and CROPS): 11 full papers and 4 short papers were carefully reviewed and selected from 33 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}