{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T22:13:03Z","timestamp":1777327983546,"version":"3.51.4"},"reference-count":112,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.011.212."],"award-info":[{"award-number":["628.011.212."]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.011.212."],"award-info":[{"award-number":["628.011.212."]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.011.212."],"award-info":[{"award-number":["628.011.212."]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.011.212."],"award-info":[{"award-number":["628.011.212."]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.011.212."],"award-info":[{"award-number":["628.011.212."]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.011.212."],"award-info":[{"award-number":["628.011.212."]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.011.212."],"award-info":[{"award-number":["628.011.212."]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2025,9]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Access to large datasets, the rise of the Internet of Things (IoT) and the ease of collecting personal data, have led to significant breakthroughs in machine learning. However, they have also raised new concerns about privacy data protection. Controversies like the Facebook-Cambridge Analytica scandal highlight unethical practices in today\u2019s digital landscape. Historical privacy incidents have led to the development of technical and legal solutions to protect data subjects\u2019 right to privacy. However, within machine learning, these problems have largely been approached from a mathematical point of view, ignoring the larger context in which privacy is relevant. This technical approach has benefited data-controllers and failed to protect individuals adequately. Moreover, it has aligned with Big Tech organizations\u2019 interests and allowed them to further push the discussion in a direction that is favorable to their interests. This paper reflects on current privacy approaches in machine learning and explores how various big organizations guide the public discourse, and how this harms data subjects. It also critiques the current data protection regulations, as they allow superficial compliance without addressing deeper ethical issues. Finally, it argues that redefining privacy to focus on harm to data subjects rather than on data breaches would benefit data subjects as well as society at large.<\/jats:p>","DOI":"10.1007\/s10676-025-09843-4","type":"journal-article","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T02:08:15Z","timestamp":1750385295000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A critique of current approaches to privacy in machine learning"],"prefix":"10.1007","volume":"27","author":[{"given":"Florian","family":"van Daalen","sequence":"first","affiliation":[]},{"given":"Marine","family":"Jacquemin","sequence":"additional","affiliation":[]},{"given":"Johan","family":"van Soest","sequence":"additional","affiliation":[]},{"given":"Nina","family":"Stahl","sequence":"additional","affiliation":[]},{"given":"David","family":"Townend","sequence":"additional","affiliation":[]},{"given":"Andre","family":"Dekker","sequence":"additional","affiliation":[]},{"given":"Inigo","family":"Bermejo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"issue":"6","key":"9843_CR1","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1093\/jeclap\/lpab025","volume":"12","author":"P Affeldt","year":"2021","unstructured":"Affeldt, P., & Kesler, R. (2021). Big tech acquisitions\u2013Towards empirical evidence $$\\dagger$$. Journal of European Competition Law and Practice, 12(6), 471\u2013478. https:\/\/doi.org\/10.1093\/jeclap\/lpab025. Accessed 2024-08-16.","journal-title":"Journal of European Competition Law and Practice"},{"issue":"4","key":"9843_CR2","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1038\/s42256-024-00813-x","volume":"6","author":"M Bak","year":"2024","unstructured":"Bak, M., Madai, V. I., Celi, L. A., Kaissis, G. A., Cornet, R., Maris, M., Rueckert, D., Buyx, A., & McLennan, S. (2024). Federated learning is not a cure-all for data ethics. Nature Machine Intelligence, 6(4), 370\u2013372. https:\/\/doi.org\/10.1038\/s42256-024-00813-x. Publisher: Nature Publishing Group. Accessed 2024-07-09.","journal-title":"Nature Machine Intelligence"},{"issue":"1","key":"9843_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1186\/s41073-016-0024-5","volume":"1","author":"LM Bouter","year":"2016","unstructured":"Bouter, L. M., Tijdink, J., Axelsen, N., Martinson, B. C., & Ter Riet, G. (2016). Ranking major and minor research misbehaviors: Results from a survey among participants of four World Conferences on Research Integrity. Research Integrity and Peer Review, 1(1), 17. https:\/\/doi.org\/10.1186\/s41073-016-0024-5. Accessed 2024-07-08.","journal-title":"Research Integrity and Peer Review"},{"key":"9843_CR4","first-page":"1904","volume":"126","author":"JE Cohen","year":"2012","unstructured":"Cohen, J. E. (2012). What privacy is for. Harvard Law Review, 126, 1904.","journal-title":"Harvard Law Review"},{"key":"9843_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-024-01424-0","author":"F Daalen","year":"2024","unstructured":"Daalen, F., Ippel, L., Dekker, A., & Bermejo, I. (2024). VertiBayes: Learning Bayesian network parameters from vertically partitioned data with missing values. Complex and Intelligent Systems. https:\/\/doi.org\/10.1007\/s40747-024-01424-0. Accessed 2024-05-21.","journal-title":"Complex and Intelligent Systems"},{"issue":"4","key":"9843_CR6","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/s00146-020-00981-5","volume":"35","author":"SJ De","year":"2020","unstructured":"De, S. J., & Imine, A. (2020). Consent for targeted advertising: The case of Facebook. AI & SOCIETY, 35(4), 1055\u20131064. https:\/\/doi.org\/10.1007\/s00146-020-00981-5. Accessed 2024-07-09.","journal-title":"AI & SOCIETY"},{"key":"9843_CR7","doi-asserted-by":"publisher","first-page":"47304","DOI":"10.1109\/ACCESS.2023.3275134","volume":"11","author":"P Eigenschink","year":"2023","unstructured":"Eigenschink, P., Reutterer, T., Vamosi, S., Vamosi, R., Sun, C., & Kalcher, K. (2023). Deep generative models for synthetic data: A survey. IEEE Access, 11, 47304\u201347320. https:\/\/doi.org\/10.1109\/ACCESS.2023.3275134. Conference Name: IEEE Access. Accessed 2024-07-08.","journal-title":"IEEE Access"},{"issue":"4","key":"9843_CR8","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s12599-020-00650-3","volume":"62","author":"S Feuerriegel","year":"2020","unstructured":"Feuerriegel, S., Dolata, M., & Schwabe, G. (2020). Fair AI. Business and Information Systems Engineering, 62(4), 379\u2013384. https:\/\/doi.org\/10.1007\/s12599-020-00650-3. Accessed 2024-07-09.","journal-title":"Business and Information Systems Engineering"},{"key":"9843_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05023-2","volume-title":"The emergence of personal data protection as a fundamental right of the EU","author":"GG Fuster","year":"2014","unstructured":"Fuster, G. G. (2014). The emergence of personal data protection as a fundamental right of the EU (Vol. 16). Springer."},{"issue":"1","key":"9843_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1080\/13600869.2012.646798","volume":"26","author":"GG Fuster","year":"2012","unstructured":"Fuster, G. G., & Gellert, R. (2012). The fundamental right of data protection in the european union: In search of an uncharted right. International Review of Law, Computers and Technology, 26(1), 73\u201382.","journal-title":"International Review of Law, Computers and Technology"},{"issue":"3","key":"9843_CR11","doi-asserted-by":"publisher","first-page":"1002106","DOI":"10.1371\/journal.pbio.1002106","volume":"13","author":"ML Head","year":"2015","unstructured":"Head, M. L., Holman, L., Lanfear, R., Kahn, A. T., & Jennions, M. D. (2015). The extent and consequences of P-hacking in science. PLOS Biology, 13(3), 1002106. https:\/\/doi.org\/10.1371\/journal.pbio.1002106. Publisher: Public Library of Science. Accessed 2023-08-01.","journal-title":"PLOS Biology"},{"issue":"4","key":"9843_CR12","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1080\/09589236.2020.1845628","volume":"30","author":"RL Healy","year":"2021","unstructured":"Healy, R. L. (2021). Zuckerberg, get out of my uterus! An examination of fertility apps, data-sharing and remaking the female body as a digitalized reproductive subject. Journal of Gender Studies, 30(4), 406\u2013416. https:\/\/doi.org\/10.1080\/09589236.2020.1845628. Accessed 2023-09-12.","journal-title":"Journal of Gender Studies"},{"issue":"5","key":"9843_CR13","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1177\/0956797611430953","volume":"23","author":"LK John","year":"2012","unstructured":"John, L. K., Loewenstein, G., & Prelec, D. (2012). Measuring the prevalence of questionable research practices with incentives for truth telling. Psychological Science, 23(5), 524\u2013532. https:\/\/doi.org\/10.1177\/0956797611430953. Publisher: SAGE Publications Inc., Accessed 2024-08-14.","journal-title":"Psychological Science"},{"key":"9843_CR14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511495342","volume-title":"Genetic privacy: A challenge to medico-legal norms","author":"G Laurie","year":"2002","unstructured":"Laurie, G. (2002). Genetic privacy: A challenge to medico-legal norms. Cambridge University Press."},{"issue":"2","key":"9843_CR15","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1111\/japp.12219","volume":"35","author":"K Macnish","year":"2018","unstructured":"Macnish, K. (2018). Government surveillance and why defining privacy matters in a post-snowden world. Journal of Applied Philosophy, 35(2), 417\u2013432.","journal-title":"Journal of Applied Philosophy"},{"issue":"8","key":"9843_CR16","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1007\/s00262-010-0859-4","volume":"59","author":"MS Mitchell","year":"2010","unstructured":"Mitchell, M. S., Yu, M. C., & Whiteside, T. L. (2010). The tyranny of statistics in medicine: A critique of unthinking adherence to an arbitrary p value. Cancer Immunology, Immunotherapy, 59(8), 1137\u20131140. https:\/\/doi.org\/10.1007\/s00262-010-0859-4. Accessed 2023-07-13.","journal-title":"Cancer Immunology, Immunotherapy"},{"issue":"3","key":"9843_CR17","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1111\/j.1467-9833.2008.00433.x","volume":"39","author":"AD Moore","year":"2008","unstructured":"Moore, A. D. (2008). Defining privacy. Journal of Social Philosophy, 39(3), 411\u2013428.","journal-title":"Journal of Social Philosophy"},{"issue":"1","key":"9843_CR18","first-page":"1","volume":"16","author":"MM Nair","year":"2021","unstructured":"Nair, M. M., & Tyagi, A. K. (2021). Privacy: History, statistics, policy, laws, preservation and threat analysis. Journal of Information Assurance & Security, 16(1), 1.","journal-title":"Journal of Information Assurance & Security"},{"key":"9843_CR19","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891","author":"H Nissenbaum","year":"2009","unstructured":"Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press. https:\/\/doi.org\/10.1515\/9780804772891. Accessed 2024-07-08.","journal-title":"Stanford University Press"},{"issue":"8","key":"9843_CR20","doi-asserted-by":"publisher","first-page":"26","DOI":"10.5120\/15902-5081","volume":"91","author":"PV Parmar","year":"2014","unstructured":"Parmar, P. V., Padhar, S. B., Patel, S. N., Bhatt, N. I., & Jhaveri, R. H. (2014). Survey of various homomorphic encryption algorithms and schemes. International Journal of Computer Applications, 91(8), 26\u201332. https:\/\/doi.org\/10.5120\/15902-5081","journal-title":"International Journal of Computer Applications"},{"issue":"6","key":"9843_CR21","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1038\/s41431-020-0596-x","volume":"28","author":"D Peloquin","year":"2020","unstructured":"Peloquin, D., DiMaio, M., Bierer, B., & Barnes, M. (2020). Disruptive and avoidable: GDPR challenges to secondary research uses of data. European Journal of Human Genetics, 28(6), 697\u2013705. https:\/\/doi.org\/10.1038\/s41431-020-0596-x. Publisher: Nature Publishing Group. Accessed 2024-07-08.","journal-title":"European Journal of Human Genetics"},{"issue":"1","key":"9843_CR22","doi-asserted-by":"publisher","first-page":"20201681","DOI":"10.1542\/peds.2020-1681","volume":"146","author":"J Radesky","year":"2020","unstructured":"Radesky, J., Chassiakos, Y. L. R., Ameenuddin, N., & Navsaria, D. (2020). Council on communication and media: Digital advertising to children. Pediatrics, 146(1), 20201681. https:\/\/doi.org\/10.1542\/peds.2020-1681. Accessed 2024-07-09.","journal-title":"Pediatrics"},{"key":"9843_CR23","volume-title":"Genetic secrets: Protecting privacy and confidentiality in the genetic era","author":"MA Rothstein","year":"1997","unstructured":"Rothstein, M. A. (1997). Genetic secrets: Protecting privacy and confidentiality in the genetic era. Yale University Press."},{"issue":"4","key":"9843_CR24","doi-asserted-by":"publisher","first-page":"491","DOI":"10.2478\/popets-2020-0083","volume":"2020","author":"L Shipp","year":"2020","unstructured":"Shipp, L., & Blasco, J. (2020). How private is your period?: A systematic analysis of menstrual app privacy policies. Proceedings on Privacy Enhancing Technologies, 2020(4), 491\u2013510. https:\/\/doi.org\/10.2478\/popets-2020-0083. Accessed 2023-09-13.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"4","key":"9843_CR25","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.2307\/3481326","volume":"90","author":"DJ Solove","year":"2002","unstructured":"Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90(4), 1087\u20131155. https:\/\/doi.org\/10.2307\/3481326. Publisher: California Law Review Inc, Accessed 2024-07-17.","journal-title":"California Law Review"},{"issue":"05","key":"9843_CR26","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L. (2002). k-Anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557\u2013570. https:\/\/doi.org\/10.1142\/S0218488502001648. Publisher: World Scientific Publishing Co., Accessed 2022-08-22.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"2","key":"9843_CR27","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/s00146-022-01437-8","volume":"39","author":"P Verdegem","year":"2024","unstructured":"Verdegem, P. (2024). Dismantling ai capitalism: The commons as an alternative to the power concentration of big tech. AI & society, 39(2), 727\u2013737.","journal-title":"AI & society"},{"issue":"5","key":"9843_CR28","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S Warren","year":"1890","unstructured":"Warren, S., & Brandeis, L. (1890). The right to privacy. Harvard Law Review, 4(5), 193\u2013220.","journal-title":"Harvard Law Review"},{"issue":"1","key":"9843_CR29","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1177\/0007650317718185","volume":"58","author":"SM West","year":"2019","unstructured":"West, S. M. (2019). Data capitalism: Redefining the logics of surveillance and privacy. Business and Society, 58(1), 20\u201341. https:\/\/doi.org\/10.1177\/0007650317718185. Publisher: SAGE Publications Inc., Accessed 2024-07-08.","journal-title":"Business and Society"},{"issue":"1","key":"9843_CR30","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s11192-019-03182-0","volume":"121","author":"R Zhao","year":"2019","unstructured":"Zhao, R., Li, X., Liang, Z., & Li, D. (2019). Development strategy and collaboration preference in S &T of enterprises based on funded papers: A case study of Google. Scientometrics, 121(1), 323\u2013347. https:\/\/doi.org\/10.1007\/s11192-019-03182-0. Accessed 2024-07-08.","journal-title":"Scientometrics"},{"key":"9843_CR31","doi-asserted-by":"publisher","unstructured":"Abdalla, M., & Abdalla, M. (2021) The grey hoodie project: Big Tobacco, Big Tech, and the Threat on Academic Integrity. In Proceedings of the 2021 AAAI\/ACM conference on AI, ethics, and society. AIES\u201921 (pp. 287\u2013297). Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3461702.3462563. Accessed 2024-07-09.","DOI":"10.1145\/3461702.3462563"},{"key":"9843_CR32","unstructured":"Ahmed, I (2023). Aclu V. Clearview AI, Inc. DePaul Journal of Art, Technology & Intellectual Property Law, 33(1), 4"},{"key":"9843_CR33","unstructured":"Albright, J. (2016). How Trump\u2019s campaign used the new data-industrial complex to win the election. https:\/\/blogs.lse.ac.uk\/usappblog\/2016\/11\/26\/how-trumps-campaign-used-the-new-data-industrial-complex-to-win-the-election\/. Accessed 2024-07-17."},{"key":"9843_CR34","doi-asserted-by":"publisher","unstructured":"Amrhein, V., Greenland, S., & McShane, B. (2019). Scientists rise up against statistical significance. Nature,567(7748), 305\u2013307. https:\/\/doi.org\/10.1038\/d41586-019-00857-9. Bandiera_abtest: a Cg_type: Comment Publisher: Nature Publishing Group Subject_term: Research data, Research management. Accessed 2024-07-08","DOI":"10.1038\/d41586-019-00857-9"},{"key":"9843_CR35","doi-asserted-by":"publisher","unstructured":"Antonio, B. A., Cruz, K. L. D., Jimenez, A. I., & Pantoja, E. (2022). Invasion or personalization: An overview on user attitudes towards the privacy issues in targeted advertising in NCR and its effect in consumer purchase behavior. Journal of Business and Management Studies, 4(2), 38\u201347 https:\/\/doi.org\/10.32996\/jbms.2022.4.2.4. Number: 2. Accessed 2024-07-09.","DOI":"10.32996\/jbms.2022.4.2.4"},{"key":"9843_CR36","doi-asserted-by":"publisher","unstructured":"Arora, A., Barrett, M., Lee, E., Oborn, E., & Prince, K. (2023). Risk and the future of AI: Algorithmic bias, data colonialism, and marginalization. Information and Organization,33(3), Article 100478. https:\/\/doi.org\/10.1016\/j.infoandorg.2023.100478. Accessed 2024-07-09.","DOI":"10.1016\/j.infoandorg.2023.100478"},{"key":"9843_CR37","doi-asserted-by":"publisher","unstructured":"Banabilah, S., Aloqaily, M., Alsayed, E., Malik, N., & Jararweh, Y. (2022). Federated learning review: Fundamentals, enabling technologies, and future applications. Information Processing and Management,59(6), Article 103061. https:\/\/doi.org\/10.1016\/j.ipm.2022.103061. Accessed 2023-07-31.","DOI":"10.1016\/j.ipm.2022.103061"},{"key":"9843_CR38","doi-asserted-by":"crossref","unstructured":"Beyleveld, D., Townend, D., Rouill\u00e9-Mirza, S., & Wright, J (2004) The data protection directive and medical research across Europe.","DOI":"10.1201\/9780203720349.ch15"},{"key":"9843_CR39","unstructured":"Brockell, G. (2018). Perspective | Dear tech companies, I don\u2019t want to see pregnancy ads after my child was stillborn. Washington Post. Accessed 2023-08-01."},{"key":"9843_CR40","unstructured":"Bundesverfassungsgericht, S. (1983) Bundesverfassungsgericht-Decisions\u2013Decision on the constitutionality of the 1983 Census Act. Archive Location: de Publisher: Bundesverfassungsgericht. https:\/\/www.bundesverfassungsgericht.de\/SharedDocs\/Entscheidungen\/EN\/1983\/12\/rs19831215_1bvr020983en.html. Accessed 2024-07-17."},{"key":"9843_CR41","unstructured":"California Code Civil Code-CIV DIVISION 3-OBLIGATIONS PART 4-Obligations arising from particular transactions title 1.81.5-California Consumer Privacy Act of 2018 Section 1798.192. Universal Citation: CA Civ Code \u00a71798.192 (2023)."},{"key":"9843_CR42","unstructured":"Cromack, J (2021) Why Amazon\u2019s GDPR fine really matters: Consent in marketing. https:\/\/www.dataguard.co.uk\/blog\/why-amazons-gdpr-fine-really-matters-its-time-to-be-open-with-consent-for-marketing. Accessed 2024-08-14."},{"key":"9843_CR43","unstructured":"Data Protection Working Party: Article 29: Opinion 06\/2014 on the notion of legitimate interests of the data controller under Article 7 of Directive 95\/46\/EC (2014). https:\/\/ec.europa.eu\/justice\/article-29\/press-material\/public-consultation\/notion-legitimate-interests\/files\/20141126_overview_relating_to_consultation_on_opinion_legitimate_interest_.pdf"},{"key":"9843_CR44","unstructured":"De&nbsp;Hert, P., & Gutwirth, S. (2006). Privacy, data protection and law enforcement. Opacity of the individual and transparency of power. Privacy and the criminal law 61\u2013104"},{"key":"9843_CR45","unstructured":"Dean, J. (2003). Review of regulating intimacy: A new legal paradigm. Journal of Law and Society,30(3), 453\u2013458. Publisher: [Cardiff University, Wiley]. Accessed 2024-07-17."},{"key":"9843_CR46","unstructured":"Denton, E. L., Chintala, S., Szlam, A., & Fergus, R. (2015). Deep generative image models using a laplacian pyramid of adversarial networks. In Advances in neural information processing systems (Vol. 28). Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper\/2015\/hash\/aa169b49b583a2b5af89203c2b78c67c-Abstract.html. Accessed 2024-07-08."},{"key":"9843_CR47","doi-asserted-by":"publisher","unstructured":"Dogruel, L. (2019). Too much information!? Examining the impact of different levels of transparency on consumers\u2019 evaluations of targeted advertising. Communication Research Reports,36(5), 383\u2013392. https:\/\/doi.org\/10.1080\/08824096.2019.1684253. Publisher: Routledge_eprint: Accessed 2024-07-09.","DOI":"10.1080\/08824096.2019.1684253"},{"key":"9843_CR48","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J (2007) A three-dimensional conceptual framework for database privacy. In Secure data management: 4th VLDB workshop, SDM 2007, Vienna, Austria, September 23\u201324, 2007. Proceedings 4 (pp. 193\u2013202). Springer.","DOI":"10.1007\/978-3-540-75248-6_14"},{"key":"9843_CR49","unstructured":"Dutch Childcare Benefit Scandal an Urgent Wake-Up Call to Ban Racist Algorithms. (2021). https:\/\/www.amnesty.org\/en\/latest\/news\/2021\/10\/xenophobic-machines-dutch-child-benefit-scandal\/. Accessed 2024-07-08."},{"key":"9843_CR50","doi-asserted-by":"publisher","unstructured":"Dwork, C., McSherry, F., Nissim, K., spsampsps Smith, A (2006) Calibrating noise to sensitivity in private data analysis. In S. Halevi, T. Rabin (Eds.) Theory of cryptography. Lecture notes in computer science (pp. 265\u2013284). Springer. https:\/\/doi.org\/10.1007\/11681878_14.","DOI":"10.1007\/11681878_14"},{"key":"9843_CR51","doi-asserted-by":"publisher","unstructured":"Dwork, C., & Naor, M. (2010). On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. Journal of Privacy and Confidentiality.https:\/\/doi.org\/10.29012\/jpc.v2i1.585. Number: 1. Accessed 2024-07-09.","DOI":"10.29012\/jpc.v2i1.585"},{"key":"9843_CR52","doi-asserted-by":"publisher","unstructured":"Dwork, C., & Roth, A. (2015). The algorithmic foundations of differential privacy. Foundations and Trends\u00aein Theoretical Computer Science, 9(3\u20134), 211\u2013407 https:\/\/doi.org\/10.1561\/0400000042. Accessed 2021-06-15.","DOI":"10.1561\/0400000042"},{"key":"9843_CR53","unstructured":"EDPB: 1.2 billion euro fine for Facebook as a result of EDPB binding decision | European Data Protection Board (2023). https:\/\/www.edpb.europa.eu\/news\/news\/2023\/12-billion-euro-fine-facebook-result-edpb-binding-decision_en. Accessed 2024-07-17."},{"key":"9843_CR54","unstructured":"EU General Data Protection Regulation (GDPR): Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation), OJ 2016 L 119\/1. (2016). https:\/\/gdpr-info.eu\/"},{"key":"9843_CR55","unstructured":"Euronews: Meta hit with \u20ac265 million fine by Irish regulators for breaking Europe\u2019s data protection law | Euronews (2022). https:\/\/www.euronews.com\/next\/2022\/11\/28\/meta-hit-with-265-million-fine-by-irish-regulators-for-breaking-europes-data-protection-la. Accessed 2024-08-14."},{"key":"9843_CR56","unstructured":"European Court of Human Rights: Guide on Article 8 of the European Convention on Human Rights Council of Europe (2022). https:\/\/ks.echr.coe.int\/documents\/d\/echr-ks\/guide_art_8_eng"},{"key":"9843_CR57","unstructured":"European Data Protection Board: Opinion 08\/2024 on Valid Consent in the Context of Consent or Pay Models Implemented by Large Online Platforms. (2024). https:\/\/www.edpb.europa.eu\/system\/files\/2024-04\/edpb_opinion_202408_consentorpay_en.pdf"},{"key":"9843_CR58","unstructured":"European Union: Charter of Fundamental Rights. (2007). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=OJ:C:2007:303:FULL."},{"key":"9843_CR59","unstructured":"Facebook and Instagram to Offer Subscription for No Ads in Europe. (2023). https:\/\/about.fb.com\/news\/2023\/10\/facebook-and-instagram-to-offer-subscription-for-no-ads-in-europe\/. Accessed 2024-07-09."},{"key":"9843_CR60","unstructured":"Fitzgerald, C. (2024). Facebook will soon use your photos, posts and other info to train its AI. You can opt out (but it\u2019s complicated). https:\/\/www.thejournal.ie\/facebook-data-ai-6391876-May2024\/. Accessed 2024-07-09."},{"key":"9843_CR61","unstructured":"Foundation, M. (2023). \u2018Privacy nightmare on wheels\u2019: Every car brand reviewed by Mozilla\u2014Including Ford, Volkswagen and Toyota\u2014Flunks Privacy Test. https:\/\/foundation.mozilla.org\/en\/blog\/privacy-nightmare-on-wheels-every-car-brand-reviewed-by-mozilla-including-ford-volkswagen-and-toyota-flunks-privacy-test\/. Accessed 2024-07-08."},{"key":"9843_CR62","unstructured":"GDPR Enforcement Tracker-List of GDPR fines. https:\/\/www.enforcementtracker.com. Accessed 2024-07-17."},{"key":"9843_CR63","unstructured":"Goldman, S. (2024). The \u2018Meta AI mafia\u2019 brain drain continues with 3 more major departures. https:\/\/fortune.com\/2024\/04\/02\/mark-zuckerberg-ai-jobs-meta-brain-drain-erik-meijer\/. Accessed 2024-07-09."},{"key":"9843_CR64","unstructured":"Gregor, K., Danihelka, I., Graves, A., Rezende, D., & Wierstra, D (2015) DRAW: A recurrent neural network for image generation. In Proceedings of the 32nd international conference on machine learning (pp. 1462\u20131471). PMLR. ISSN: 1938-7228. https:\/\/proceedings.mlr.press\/v37\/gregor15.html. Accessed 2024-07-08."},{"key":"9843_CR65","unstructured":"Grinkevi\u010dius, P. (2024). Meta uses your data to train AI, and it doesn\u2019t want you to opt out. https:\/\/cybernews.com\/tech\/meta-trains-ai-on-your-data\/. Accessed 2024-07-09."},{"key":"9843_CR66","unstructured":"Hagen, L. (2021). Privacy preserving machine learning: Maintaining confidentiality and preserving trust. https:\/\/www.microsoft.com\/en-us\/research\/blog\/privacy-preserving-machine-learning-maintaining-confidentiality-and-preserving-trust\/. Accessed 2023-07-25."},{"key":"9843_CR67","doi-asserted-by":"publisher","unstructured":"Hinds, J., Williams, E. J., & Joinson, A. N. (2020). \u201cIt wouldn\u2019t happen to me\u201d: Privacy concerns and perspectives following the Cambridge Analytica scandal. International Journal of Human-Computer Studies,143, Article 102498. https:\/\/doi.org\/10.1016\/j.ijhcs.2020.102498. Accessed 2024-07-08.","DOI":"10.1016\/j.ijhcs.2020.102498"},{"key":"9843_CR68","unstructured":"Hoe Meta Gegevens Gebruikt voor generatieve AI-modellen (2024). https:\/\/www.facebook.com\/privacy\/genai\/. Accessed 2024-07-09."},{"key":"9843_CR69","doi-asserted-by":"crossref","unstructured":"Jablonowska, A., & Michatowicz, A. (2020). Planet49: Pre-ticked checkboxes are not sufficient to convey user\u2019s consent to the storage of cookies case notes. European Data Protection Law Review (EDPL), 6(1), 137\u2013142. Accessed 2024-07-09.","DOI":"10.21552\/edpl\/2020\/1\/19"},{"key":"9843_CR70","doi-asserted-by":"publisher","unstructured":"Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A. N., Bonawitz, K., Charles, Z., Cormode, G., Cummings, R., D\u2019Oliveira, R. G. L., Eichner, H., Rouayheb, S. E., Evans, D., Gardner, J., Garrett, Z., Gasc\u00f3n, A., Ghazi, B., Gibbons, P. B., Gruteser, M., Harchaoui, Z., He, C., He, L., Huo, Z., Hutchinson, B., Hsu, J., Jaggi, M., Javidi, T., Joshi, G., Khodak, M., Konecn\u00fd, J., Korolova, A., Koushanfar, F., Koyejo, S., Lepoint, T., Liu, Y., Mittal, P., Mohri, M., Nock, R., \u00d6zg\u00fcr, A., Pagh, R., Qi, H., Ramage, D., Raskar, R., Raykova, M., Song, D., Song, W., Stich, S. U., Sun, Z., Suresh, A. T., Tram\u00e8r, F., Vepakomma, P., Wang, J., Xiong, L., Xu, Z., Yang, Q., Yu, F. X., Yu, H., & Zhao, S. (2021). Advances and open problems in federated learning. Foundations and Trends\u00ae in Machine Learning, 14(1\u20132), 1\u2013210 https:\/\/doi.org\/10.1561\/2200000083. Publisher: Now Publishers, Inc. Accessed 2023-01-20.","DOI":"10.1561\/2200000083"},{"key":"9843_CR71","doi-asserted-by":"publisher","unstructured":"Kelly, B. G., & Habib, M. (2023). Missed period? The significance of period-tracking applications in a post-Roe America. Sexual and Reproductive Health Matters,31(4), 2238940. https:\/\/doi.org\/10.1080\/26410397.2023.2238940. Publisher: Taylor Francis_eprint: Accessed 2024-07-09.","DOI":"10.1080\/26410397.2023.2238940"},{"key":"9843_CR72","doi-asserted-by":"publisher","unstructured":"Kusche, I. (2024). Possible harms of artificial intelligence and the EU AI act: Fundamental rights and risk. Journal of Risk Research,1\u201314,. https:\/\/doi.org\/10.1080\/13669877.2024.2350720. Publisher: Routledge_eprint: Accessed 2024-07-09","DOI":"10.1080\/13669877.2024.2350720"},{"key":"9843_CR73","doi-asserted-by":"publisher","unstructured":"Li, L., Fan, Y., Tse, M., & Lin, K.-Y. (2020). A review of applications in federated learning. Computers and Industrial Engineering,149, Article 106854. https:\/\/doi.org\/10.1016\/j.cie.2020.106854. Accessed 2021-03-03.","DOI":"10.1016\/j.cie.2020.106854"},{"key":"9843_CR74","doi-asserted-by":"publisher","unstructured":"Liu, B., Ding, M., Shaham, S., Rahayu, W., Farokhi, F., & Lin, Z (2020) When machine learning meets privacy: A survey and outlook. arXiv:2011.11819 [chttps:\/\/doi.org\/10.48550\/arXiv.2011.11819. Accessed 2023-07-25.","DOI":"10.48550\/arXiv.2011.11819"},{"key":"9843_CR75","unstructured":"Lorenz, T., & Harwell, D. (2022). Facebook paid GOP firm to malign TikTok. Washington Post. Accessed 2024-07-17."},{"key":"9843_CR76","doi-asserted-by":"publisher","unstructured":"Lyu, L., Yu, J., Nandakumar, K., Li, Y., Ma, X., Jin, J., Yu, H., & Ng, K. S. (2020). towards fair and privacy-preserving federated deep models. IEEE Transactions on Parallel and Distributed Systems, 31(11), 2524\u20132541 https:\/\/doi.org\/10.1109\/TPDS.2020.2996273. Conference Name: IEEE Transactions on Parallel and Distributed Systems. Accessed 2024-07-09.","DOI":"10.1109\/TPDS.2020.2996273"},{"key":"9843_CR77","unstructured":"Maheshwari, S., & Holpuch, A. (2024). Why the U.S. is forcing TikTok to be sold or banned. https:\/\/www.nytimes.com\/article\/tiktok-ban.html. Accessed 2024-07-09."},{"key":"9843_CR78","unstructured":"Mauran, C. (2024). Meta is using your posts to train AI. It\u2019s not easy to opt out. Section: Tech. https:\/\/mashable.com\/article\/meta-using-posts-train-ai-opt-out. Accessed 2024-07-09."},{"key":"9843_CR79","doi-asserted-by":"publisher","unstructured":"Mehrnezhad, M., & Almeida, T. (2023). My sex-related data is more sensitive than my financial data and I want the same level of security and privacy: User risk perceptions and protective actions in female-oriented technologies. In Proceedings of the 2023 European symposium on usable security. EuroUSEC\u201923 (pp. 1\u201314). Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3617072.3617100. Accessed 2024-07-09.","DOI":"10.1145\/3617072.3617100"},{"key":"9843_CR80","doi-asserted-by":"publisher","unstructured":"Mehrnezhad, M., Shipp, L., Almeida, T., & Toreini, E. (2022). Vision: Too little too late? Do the risks of femtech already outweigh the benefits? In Proceedings of the 2022 European Symposium on Usable Security. EuroUSEC \u201922, pp. 145\u2013150. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3549015.3554204. Accessed 2024-07-09.","DOI":"10.1145\/3549015.3554204"},{"key":"9843_CR81","unstructured":"Menn, J., & Nix, N. (2023). Big tech funds the very people who are supposed to hold it accountable. Washington Post. Accessed 2024-07-09."},{"key":"9843_CR82","unstructured":"Moor, J. H. (2006). Using genetic information while protecting the privacy of the soul. Ethics, Computing, and Genomics, Jones and Bartlett, Sudbury, MA (pp. 109\u2013119)."},{"key":"9843_CR83","doi-asserted-by":"publisher","unstructured":"Narayanan, A., & Shmatikov, V. (2007) How to break anonymity of the netflix prize dataset. arXiv:cs\/0610105. https:\/\/doi.org\/10.48550\/arXiv.cs\/0610105. Accessed 2024-07-08.","DOI":"10.48550\/arXiv.cs\/0610105"},{"key":"9843_CR84","unstructured":"Ochigame, R. (2019). How big tech manipulates academia to avoid regulation. https:\/\/theintercept.com\/2019\/12\/20\/mit-ethical-ai-artificial-intelligence\/. Accessed 2024-07-09."},{"key":"9843_CR85","unstructured":"Palmer, M. (2005). Data is the new oil. https:\/\/ana.blogs.com\/maestros\/2006\/11\/data_is_the_new.html. Accessed 2024-07-17."},{"key":"9843_CR86","doi-asserted-by":"publisher","unstructured":"Papaevangelou, C. (2024). Funding intermediaries: Google and Facebook\u2019s strategy to capture journalism. Digital Journalism,12(2), 234\u2013255. https:\/\/doi.org\/10.1080\/21670811.2022.2155206. Publisher: Routledge_eprint: Accessed 2024-07-08.","DOI":"10.1080\/21670811.2022.2155206"},{"key":"9843_CR87","unstructured":"Parsons, K. (2020). Why taking Facebook quizzes is a really bad idea | CBC news. https:\/\/www.cbc.ca\/news\/canada\/nova-scotia\/tech-columnist-warns-against-taking-social-media-quizzes-for-fun-1.5442282. Accessed 2023-07-31."},{"key":"9843_CR88","unstructured":"Project, T. T. (2023). Zuckerberg and meta reach deep into academia. https:\/\/www.techtransparencyproject.org\/articles\/zuckerberg-and-meta-reach-deep-into-academia. Accessed 2024-07-09."},{"key":"9843_CR89","unstructured":"Proposal for a Regulation of the European Parliament and of the Council laying down harmonised rules on Artificial Intelligence (Artificial Intelligence Act) and amending certain Union legislative Acts. COM\/2021\/206 final (2021). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/ALL\/?uri=CELEX:52021PC0206"},{"key":"9843_CR90","unstructured":"Register Berispingen | Autoriteit Persoonsgegevens. https:\/\/www.autoriteitpersoonsgegevens.nl\/over-de-autoriteit-persoonsgegevens\/register-berispingen. Accessed 2024-07-17."},{"key":"9843_CR91","unstructured":"Rehman, I. (2019). Facebook-cambridge analytica data harvesting: What you need to know. Library Philosophy and Practice, 1\u201311."},{"key":"9843_CR92","doi-asserted-by":"publisher","unstructured":"Reznichenko, A., & Francis, P. (2014) Private-by-design advertising meets the real world. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. CCS \u201914 (pp. 116\u2013128). Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/2660267.2660305. Accessed 2024-07-09.","DOI":"10.1145\/2660267.2660305"},{"key":"9843_CR93","unstructured":"Roessler, B., DeCew, J (2023) Privacy. In E. N. Zalta, U. Nodelman (Eds.), The Stanford Encyclopedia of Philosophy, Winter 2023 edn. Metaphysics Research Lab, Stanford University. Accessed 2024-07-17."},{"key":"9843_CR94","unstructured":"Roush, T. (2023). Meta launching paid subscriptions to use facebook and instagram ad-free in Europe. Section: Business. https:\/\/www.forbes.com\/sites\/tylerroush\/2023\/10\/30\/meta-launching-paid-subscriptions-to-use-facebook-and-instagram-ad-free-in-europe\/. Accessed 2024-07-09."},{"key":"9843_CR95","doi-asserted-by":"publisher","unstructured":"Scheenstra, B., Bruninx, A., Van Daalen, F., Stahl, N., Latuapon, E., Imkamp, M., Ippel, L., Duijsings-Mahangi, S., Smits, D., Townend, D., Bermejo, I., Dekker, A., Hochstenbach, L., Spreeuwenberg, M., Maessen, J., & Van \u2019T Hof, A., & Kietselaer, B,. (2022). Digital health solutions to reduce the burden of atherosclerotic cardiovascular disease proposed by the CARRIER consortium. JMIR Cardio,6(2), 37437. https:\/\/doi.org\/10.2196\/37437. Accessed 2024-07-08.","DOI":"10.2196\/37437"},{"key":"9843_CR96","unstructured":"Shah, S. (2024). How to opt out of Instagram and Facebook training AI on your photos. Section: News. https:\/\/www.standard.co.uk\/news\/tech\/instagram-facebook-train-ai-photos-posts-how-opt-out-b1162065.html. Accessed 2024-07-09."},{"key":"9843_CR97","unstructured":"Shaw, D. (2024). Meta shatters lobbying record as house passes TikTok Ban. https:\/\/readsludge.com\/2024\/04\/23\/meta-shatters-lobbying-record-as-house-passes-tiktok-ban\/. Accessed 2024-07-09."},{"key":"9843_CR98","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C., & Shmatikov, V. (2017). Membership inference attacks against machine learning models. In 2017 IEEE symposium on security and privacy (SP) (pp. 3\u201318). https:\/\/doi.org\/10.1109\/SP.2017.41. ISSN: 2375-1207. https:\/\/ieeexplore.ieee.org\/abstract\/document\/7958568. Accessed 2024-07-09.","DOI":"10.1109\/SP.2017.41"},{"key":"9843_CR99","doi-asserted-by":"crossref","unstructured":"Siu, L., & Chun, C. (2020). Yellow peril and techno-orientalism in the time of Covid-19: Racialized contagion, scientific espionage, and techno-economic warfare. Journal of Asian American Studies, 23(3), 421\u2013440. Publisher: Johns Hopkins University Press. Accessed 2024-07-09.","DOI":"10.1353\/jaas.2020.0033"},{"key":"9843_CR100","doi-asserted-by":"publisher","unstructured":"Slokom, M., Wolf, P.-P., spsampsps Larson, M. (2022). When machine learning models leak: An exploration of synthetic training data. In J. Domingo-Ferrer, M. Laurent (Eds.), Privacy in statistical databases, pp. 283\u2013296. Springer. https:\/\/doi.org\/10.1007\/978-3-031-13945-1_20.","DOI":"10.1007\/978-3-031-13945-1_20"},{"key":"9843_CR101","doi-asserted-by":"publisher","unstructured":"Srivastava, S., Wilska, T.-A., & Nyrhinen, J. (2023). Awareness of digital commercial profiling among adolescents in Finland and their perspectives on online targeted advertisements. Journal of Children and Media,17(4), 559\u2013578. https:\/\/doi.org\/10.1080\/17482798.2023.2257813. Publisher: Routledge_eprint: Accessed 2024-07-09.","DOI":"10.1080\/17482798.2023.2257813"},{"key":"9843_CR102","doi-asserted-by":"crossref","unstructured":"Tavani, H. T. (2008). Informational privacy: Concepts, theories, and controversies. The handbook of information and computer ethics, 131\u2013164","DOI":"10.1002\/9780470281819.ch6"},{"key":"9843_CR103","doi-asserted-by":"crossref","unstructured":"Townend, D. (2025). Big data research: Can confidentiality and fiduciary duties fill in the gaps in privacy and data protection? In Confidentiality, privacy, and data protection in biomedicine (pp. 81\u2013101). Routledge.","DOI":"10.4324\/9781003394518-5"},{"key":"9843_CR104","doi-asserted-by":"publisher","unstructured":"Truong, N., Sun, K., Wang, S., Guitton, F., & Guo, Y. (2021). Privacy preservation in federated learning: An insightful survey from the GDPR perspective. Computers and Security,110, Article 102402. https:\/\/doi.org\/10.1016\/j.cose.2021.102402. Accessed 2022-11-07.","DOI":"10.1016\/j.cose.2021.102402"},{"key":"9843_CR105","doi-asserted-by":"publisher","unstructured":"Vatsalan, D., Sehili, Z., Christen, P., spsampsps Rahm, E. (2017). Privacy-preserving record linkage for big data: Current approaches and research challenges. In A.Y. Zomaya, S. Sakr (Eds.) Handbook of Big Data Technologies (pp. 851\u2013895). Springer.https:\/\/doi.org\/10.1007\/978-3-319-49340-4_25. Accessed 2021-07-07.","DOI":"10.1007\/978-3-319-49340-4_25"},{"key":"9843_CR106","doi-asserted-by":"publisher","unstructured":"Verma, S. (2019). Weapons of math destruction: How big data increases inequality and threatens democracy. Vikalpa: The Journal for Decision Makers, 44(2), 97\u201398 https:\/\/doi.org\/10.1177\/0256090919853933. Accessed 2024-07-08.","DOI":"10.1177\/0256090919853933"},{"key":"9843_CR107","unstructured":"Xenophobic Machines. (2021). Discrimination through unregulated use of algorithms in the Dutch childcare benefits scandal. https:\/\/www.amnesty.org\/en\/documents\/eur35\/4686\/2021\/en\/. Accessed 2024-07-17."},{"key":"9843_CR108","doi-asserted-by":"publisher","unstructured":"Xu, R., Baracaldo, N., & Joshi, J. (2021) Privacy-preserving machine learning: Methods, challenges and directions. arXiv:2108.04417 [cs]. https:\/\/doi.org\/10.48550\/arXiv.2108.04417. Accessed 2023-07-25.","DOI":"10.48550\/arXiv.2108.04417"},{"key":"9843_CR109","doi-asserted-by":"publisher","unstructured":"Yang, L., Tan, B., Zheng, V.W., Chen, K., spsampsps Yang, Q. (2020). Federated recommendation systems. In Q. Yang, L. Fan, H. Yu (Eds.) Federated learning: privacy and incentive. Lecture notes in computer science (pp. 225\u2013239). Springer. https:\/\/doi.org\/10.1007\/978-3-030-63076-8_16. Accessed 2023-09-14.","DOI":"10.1007\/978-3-030-63076-8_16"},{"key":"9843_CR110","unstructured":"Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2019). Federated machine learning: Concept and applications. arXiv:1902.04885. Accessed 2021-05-18."},{"key":"9843_CR111","doi-asserted-by":"publisher","unstructured":"Yao, A. C. (1982). Protocols for secure computations. In 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982) (pp. 160\u2013164). https:\/\/doi.org\/10.1109\/SFCS.1982.38. ISSN: 0272-5428.","DOI":"10.1109\/SFCS.1982.38"},{"key":"9843_CR112","doi-asserted-by":"crossref","unstructured":"Zuboff, S (2023) The age of surveillance capitalism. In Social theory re-wired (pp. 203\u2013213). Routledge.","DOI":"10.4324\/9781003320609-27"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-025-09843-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-025-09843-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-025-09843-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T05:46:14Z","timestamp":1758260774000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-025-09843-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":112,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["9843"],"URL":"https:\/\/doi.org\/10.1007\/s10676-025-09843-4","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"20 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"32"}}