{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:47:25Z","timestamp":1759092445649},"reference-count":83,"publisher":"Walter de Gruyter GmbH","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,28]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The GDPR regulates at present the handling with personal data fundamentally new and thereby opens new leeway. At the same time, it creates great uncertainty among those affected. One example of this is web tracking: It helps designers to improve the utility and usability of their websites based on, in part, extensive (personal) data collection, or enable operators to finance them. Against this background, in this article we first show the practical relevance of web tracking by collecting the web trackers of the 100 most popular pages of each of the 28 EU member states. Building on this, we show which data these trackers collect and analyze their legal bases. Finally, we discuss possible consequences in design and architecture for fulfilling the legally outlined requirements, taking into account a user\u2019s perspective.<\/jats:p>","DOI":"10.1515\/icom-2020-0004","type":"journal-article","created":{"date-parts":[[2020,4,7]],"date-time":"2020-04-07T21:44:25Z","timestamp":1586295865000},"page":"31-45","source":"Crossref","is-referenced-by-count":3,"title":["Web Tracking Under the New Data Protection Law: Design Potentials at the Intersection of Jurisprudence and HCI"],"prefix":"10.1515","volume":"19","author":[{"given":"Timo","family":"Jakobi","sequence":"first","affiliation":[{"name":"122276 University of Siegen , Siegen , Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gunnar","family":"Stevens","sequence":"additional","affiliation":[{"name":"122276 University of Siegen , Siegen , Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anna-Magdalena","family":"Seufert","sequence":"additional","affiliation":[{"name":"122276 University of Siegen , Siegen , Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Max","family":"Becker","sequence":"additional","affiliation":[{"name":"122276 University of Siegen , Siegen , Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Max","family":"von Grafenstein","sequence":"additional","affiliation":[{"name":"Einstein Center Digital Future , Berlin , Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"374","published-online":{"date-parts":[[2020,4,7]]},"reference":[{"key":"2023033114325865488_j_icom-2020-0004_ref_001","unstructured":"Achara, J. P. et al. 2016. Mytrackingchoices: Pacifyig the ad-block war by enforcing user privacy preferences. arXiv:1604.04495."},{"key":"2023033114325865488_j_icom-2020-0004_ref_002","doi-asserted-by":"crossref","unstructured":"Ajzen, I. and Fishbein, M. 1977. Attitude-behavior relations: A theoretical analysis and review of empirical research. Psychological Bulletin. 84(5), 888\u2013918. DOI:10.1037\/0033-2909.84.5.888.","DOI":"10.1037\/0033-2909.84.5.888"},{"key":"2023033114325865488_j_icom-2020-0004_ref_003","doi-asserted-by":"crossref","unstructured":"Akkus, I. E. et al. 2012. Non-tracking web analytics. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, 687\u2013698.","DOI":"10.1145\/2382196.2382268"},{"key":"2023033114325865488_j_icom-2020-0004_ref_004","doi-asserted-by":"crossref","unstructured":"Angulo, J. et al. 2012. Towards usable privacy policy display and management. Information Management & Computer Security 20(1), 4\u201317.","DOI":"10.1108\/09685221211219155"},{"key":"2023033114325865488_j_icom-2020-0004_ref_005","doi-asserted-by":"crossref","unstructured":"Balebako, R. et al. 2015. The Impact of Timing on the Salience of Smartphone App Privacy Notices, 63\u201374.","DOI":"10.1145\/2808117.2808119"},{"key":"2023033114325865488_j_icom-2020-0004_ref_006","unstructured":"Beales, H. 2010. The value of behavioral targeting. Network Advertising Initiative 1."},{"key":"2023033114325865488_j_icom-2020-0004_ref_007","doi-asserted-by":"crossref","unstructured":"Becker, M. 2017. Ein Recht auf datenerhebungsfreie Produkte. JuristenZeitung 72(4), 170\u2013181.","DOI":"10.1628\/002268817X14845656323252"},{"key":"2023033114325865488_j_icom-2020-0004_ref_008","unstructured":"Bitkom e. V. 2018. Stellungnahme. Zur Positionsbestimmungder Datenschutzkonferenz vom 26. April 2018 zur Anwendbarkeit des TMG f\u00fcr nicht-\u00f6ffentliche Stellen ab dem 25. Mai 2018."},{"key":"2023033114325865488_j_icom-2020-0004_ref_009","unstructured":"Brecht, F. et al. 2012. Communication anonymizers: personality, internet privacy literacy and their influence on technology acceptance. In: ECIS, 214."},{"key":"2023033114325865488_j_icom-2020-0004_ref_010","doi-asserted-by":"crossref","unstructured":"Bujlow, T. et al. 2017. A survey on web tracking: Mechanisms, implications, and defenses. Proceedings of the IEEE 105(8), 1476\u20131510.","DOI":"10.1109\/JPROC.2016.2637878"},{"key":"2023033114325865488_j_icom-2020-0004_ref_011","unstructured":"Bundesregierung mit Schreiben des Bundesministeriums f\u00fcr Wirtschaft und Energie 2018. Antwort der Bundesregierung auf die Kleine Anfrage der Abgeordneten Jan Korte, Ulla Jelpke, Dr. Alexander S. Neu, weiterer Abgeordneter und der Fraktion DIE LINKE. \u2013 Drucksache 19\/5699 \u2013 Verhandlungen \u00fcber den Datenschutz in der elektronischen Kommunikation (ePrivacy-Reform). Bundesanzeiger Verlag GmbH."},{"key":"2023033114325865488_j_icom-2020-0004_ref_012","unstructured":"Burgess, M. 2018. The tyranny of GDPR popups and the websites failing to adapt. wired.co.uk."},{"key":"2023033114325865488_j_icom-2020-0004_ref_013","doi-asserted-by":"crossref","unstructured":"Calo, R. 2013. Digital Market Manipulation. George Washington Law Review, forthcoming.","DOI":"10.2139\/ssrn.2309703"},{"key":"2023033114325865488_j_icom-2020-0004_ref_014","doi-asserted-by":"crossref","unstructured":"Clarke, N. et al. 2012. Towards usable privacy policy display and management. Information Management & Computer Security. 20(1), 4\u201317.","DOI":"10.1108\/09685221211219155"},{"key":"2023033114325865488_j_icom-2020-0004_ref_015","unstructured":"Clifton, B. 2012. Advanced web metrics with Google Analytics. John Wiley & Sons."},{"key":"2023033114325865488_j_icom-2020-0004_ref_016","unstructured":"Cookie Hinweis: Ben\u00f6tigt jede Webseite einen Cookie Hinweis? https:\/\/www.e-recht24.de\/artikel\/datenschutz\/8451-hinweispflicht-fuer-cookies.html. Accessed: 2019-04-05."},{"key":"2023033114325865488_j_icom-2020-0004_ref_017","unstructured":"Cranor, L. F. 2002. Web privacy with P3P. O\u2019Reilly Media, Inc."},{"key":"2023033114325865488_j_icom-2020-0004_ref_018","doi-asserted-by":"crossref","unstructured":"Datta, A. et al. 2015. Automated experiments on ad privacy settings. Proceedings on Privacy Enhancing Technologies 2015(1), 92\u2013112.","DOI":"10.1515\/popets-2015-0007"},{"key":"2023033114325865488_j_icom-2020-0004_ref_019","doi-asserted-by":"crossref","unstructured":"Degeling, M. et al. 2018. We Value Your Privacy... Now Take Some Cookies: Measuring the GDPR\u2019s Impact on Web Privacy. arXiv:1808.05096.","DOI":"10.14722\/ndss.2019.23378"},{"key":"2023033114325865488_j_icom-2020-0004_ref_020","doi-asserted-by":"crossref","unstructured":"Dienlin, T. and Trepte, S. 2014. Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology.","DOI":"10.1002\/ejsp.2049"},{"key":"2023033114325865488_j_icom-2020-0004_ref_021","doi-asserted-by":"crossref","unstructured":"Englehardt, S. and Narayanan, A. 2016. Online tracking: A 1-million-site measurement and analysis. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 1388\u20131401.","DOI":"10.1145\/2976749.2978313"},{"key":"2023033114325865488_j_icom-2020-0004_ref_022","unstructured":"ePrivacy-Verordnung: https:\/\/cms.law\/de\/deu\/insight\/e-privacy. Accessed: 2020-01-15."},{"key":"2023033114325865488_j_icom-2020-0004_ref_023","doi-asserted-by":"crossref","unstructured":"Ermakova, T. et al. 2018. Web Tracking \u2013 A Literature Review on the State of Research.","DOI":"10.24251\/HICSS.2018.596"},{"key":"2023033114325865488_j_icom-2020-0004_ref_024","unstructured":"Europ\u00e4ische Kommission 2017. Vorschlag f\u00fcr eine VERORDNUNG DES EUROP\u00c4ISCHEN PARLAMENTS UND DES RATES \u00fcber die Achtung des Privatlebens und den Schutz personenbezogener Daten in der elektronischen Kommunikation und zur Aufhebung der Richtlinie 2002\/58\/EG (Verordnung \u00fcber Privatsph\u00e4re und elektronische Kommunikation)."},{"key":"2023033114325865488_j_icom-2020-0004_ref_025","unstructured":"European Parliament and the Council 2016. REGULATION (EU) 2016\/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)."},{"key":"2023033114325865488_j_icom-2020-0004_ref_026","doi-asserted-by":"crossref","unstructured":"Felt, A. P. et al. 2012. Android permissions: User attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, 3.","DOI":"10.1145\/2335356.2335360"},{"key":"2023033114325865488_j_icom-2020-0004_ref_027","doi-asserted-by":"crossref","unstructured":"Gigerenzer, G. and Goldstein, D. G. 1996. Reasoning the fast and frugal way: models of bounded rationality. Psychological Review 103(4), 650.","DOI":"10.1037\/0033-295X.103.4.650"},{"key":"2023033114325865488_j_icom-2020-0004_ref_028","doi-asserted-by":"crossref","unstructured":"Greengard, S. 2012. Advertising gets personal. Commun. ACM 55(8), 18\u201320.","DOI":"10.1145\/2240236.2240243"},{"key":"2023033114325865488_j_icom-2020-0004_ref_029","doi-asserted-by":"crossref","unstructured":"Gummer, E. and Mandinach, E. 2015. Building a conceptual framework for data literacy. Teachers College Record 117(4), n4.","DOI":"10.1177\/016146811511700401"},{"key":"2023033114325865488_j_icom-2020-0004_ref_030","doi-asserted-by":"crossref","unstructured":"Hiremath, P. N. et al. 2019. MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web. In: International Conference on Future Data and Security Engineering, 506\u2013525.","DOI":"10.1007\/978-3-030-35653-8_33"},{"key":"2023033114325865488_j_icom-2020-0004_ref_031","unstructured":"Internetpenetrationsrate weltweit 2021 | Prognose: https:\/\/de.statista.com\/statistik\/daten\/studie\/369362\/umfrage\/prognose-der-internetpenetrationsrate-weltweit\/. Accessed: 2019-04-05."},{"key":"2023033114325865488_j_icom-2020-0004_ref_032","doi-asserted-by":"crossref","unstructured":"Jakobi, T. et al. 2018. Evolving Needs in IoT Control and Accountability: A Longitudinal Study on Smart Home Intelligibility. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2(4), 171. DOI:10.1145\/3287049.","DOI":"10.1145\/3287049"},{"key":"2023033114325865488_j_icom-2020-0004_ref_033","doi-asserted-by":"crossref","unstructured":"Jakobi, T. et al. 2019. It\u2019s About What They Could Do with the Data: A User Perspective on Privacy in Smart Metering. ACM Trans. Comput.-Hum. Interact 26(1), 2. DOI:10.1145\/3281444.","DOI":"10.1145\/3281444"},{"key":"2023033114325865488_j_icom-2020-0004_ref_034","doi-asserted-by":"crossref","unstructured":"Jakobi, T. et al. 2018. Privacy-By-Design f\u00fcr das Connected Car: Architekturen aus Verbrauchersicht. Datenschutz und Datensicherheit - DuD 42(11), 704\u2013707.","DOI":"10.1007\/s11623-018-1029-7"},{"key":"2023033114325865488_j_icom-2020-0004_ref_035","unstructured":"Jakobi, T. et al. 2017. Providing smartphone data visualizations to support Privacy Literacy (Paris, 2007)."},{"key":"2023033114325865488_j_icom-2020-0004_ref_036","doi-asserted-by":"crossref","unstructured":"Joinson, A. N. et al. 2010. Privacy, trust, and self-disclosure online. Human\u2013Computer Interaction 25(1), 1\u201324.","DOI":"10.1080\/07370020903586662"},{"key":"2023033114325865488_j_icom-2020-0004_ref_037","unstructured":"Kang, R. et al. 2015. \u201cMy Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security. In: Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 39\u201352."},{"key":"2023033114325865488_j_icom-2020-0004_ref_038","unstructured":"Klug, C. and Golar, P. 2018. Die Entwicklung des Datenschutzrechts im ersten Halbjahr 2018. NJW 36, 2608\u20132611."},{"key":"2023033114325865488_j_icom-2020-0004_ref_039","doi-asserted-by":"crossref","unstructured":"Koltay, T. 2017. Data literacy for researchers and data librarians. Journal of Librarianship and Information Science 49(1), 3\u201314.","DOI":"10.1177\/0961000615616450"},{"key":"2023033114325865488_j_icom-2020-0004_ref_040","unstructured":"Konferenz der unabh\u00e4ngigen Datenschutzaufsichtsbeh\u00f6rden des Bundes und der L\u00e4nder 2018. Zur Anwendbarkeit des TMG f\u00fcr nicht-\u00f6ffentliche Stellen ab dem 25. Mai 2018. Datenschutzkonferenz."},{"key":"2023033114325865488_j_icom-2020-0004_ref_041","unstructured":"Kontaxis, G. and Chew, M. 2015. Tracking protection in Firefox for privacy and performance. arXiv:1506.04104."},{"key":"2023033114325865488_j_icom-2020-0004_ref_042","unstructured":"Kranig, T. 2019. Digitale Dienste im Datenschutzcheck. Bayerisches Landesamt f\u00fcr Datenschutzaufsicht."},{"key":"2023033114325865488_j_icom-2020-0004_ref_043","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B. and Wills, C. E. 2006. Generating a privacy footprint on the internet. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 65\u201370.","DOI":"10.1145\/1177080.1177088"},{"key":"2023033114325865488_j_icom-2020-0004_ref_044","doi-asserted-by":"crossref","unstructured":"Leenes, R. and Kosta, E. 2015. Taming the cookie monster with Dutch law \u2013 a tale of regulatory failure. Computer Law & Security Review 31(3), 317\u2013335.","DOI":"10.1016\/j.clsr.2015.01.004"},{"key":"2023033114325865488_j_icom-2020-0004_ref_045","doi-asserted-by":"crossref","unstructured":"Leon, P. et al. 2012. Why Johnny can\u2019t opt out: a usability evaluation of tools to limit online behavioral advertising. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 589\u2013598.","DOI":"10.1145\/2207676.2207759"},{"key":"2023033114325865488_j_icom-2020-0004_ref_046","doi-asserted-by":"crossref","unstructured":"Leon, P. G. et al. 2013. What matters to users?: Factors that affect users\u2019 willingness to share information with online advertisers. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, 7.","DOI":"10.1145\/2501604.2501611"},{"key":"2023033114325865488_j_icom-2020-0004_ref_047","doi-asserted-by":"crossref","unstructured":"Lim, B. Y. et al. 2009. Why and why not explanations improve the intelligibility of context-aware intelligent systems. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2119\u20132128.","DOI":"10.1145\/1518701.1519023"},{"key":"2023033114325865488_j_icom-2020-0004_ref_048","doi-asserted-by":"crossref","unstructured":"Markham, A. 2018. Critical pedagogy as a response to datafication: Research methods as data literacy tools. Qualitative Inquiry, 25(8), 754\u2013760.","DOI":"10.1177\/1077800418809470"},{"key":"2023033114325865488_j_icom-2020-0004_ref_049","unstructured":"Markham, A. 2019. Taking the methods classroom to the street: Reflexive qualitative methods to find better prompts for data literacy. Qualitative Inquiry, 1\u201317."},{"key":"2023033114325865488_j_icom-2020-0004_ref_050","doi-asserted-by":"crossref","unstructured":"Mayer, J. R. and Mitchell, J. C. 2012. Third-party web tracking: Policy and technology. In: 2012 IEEE Symposium on Security and Privacy, 413\u2013427.","DOI":"10.1109\/SP.2012.47"},{"key":"2023033114325865488_j_icom-2020-0004_ref_051","doi-asserted-by":"crossref","unstructured":"McDonald, A. M. and Cranor, L. F. 2010. Americans\u2019 attitudes about internet behavioral advertising practices. In: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, 63\u201372.","DOI":"10.1145\/1866919.1866929"},{"key":"2023033114325865488_j_icom-2020-0004_ref_052","doi-asserted-by":"crossref","unstructured":"Melicher, W. et al. 2016. (Do Not) Track me sometimes: users\u2019 contextual preferences for web tracking. Proceedings on Privacy Enhancing Technologies 2016(2), 135\u2013154.","DOI":"10.1515\/popets-2016-0009"},{"key":"2023033114325865488_j_icom-2020-0004_ref_053","doi-asserted-by":"crossref","unstructured":"Merzdovnik, G. et al. 2017. Block me if you can: A large-scale study of tracker-blocking tools. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 319\u2013333.","DOI":"10.1109\/EuroSP.2017.26"},{"key":"2023033114325865488_j_icom-2020-0004_ref_054","unstructured":"Nithyanand, R. et al. 2016. Adblocking and counter blocking: A slice of the arms race. In: 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI \u201916)."},{"key":"2023033114325865488_j_icom-2020-0004_ref_055","unstructured":"Priebe, A. 2018. Was nach der DSGVO-Panik bleibt: Kreative Strategien zur Einholung des Consents. OnlineMarketing.de."},{"key":"2023033114325865488_j_icom-2020-0004_ref_056","doi-asserted-by":"crossref","unstructured":"Pugliese, G. 2015. Web Tracking: Overview and applicability in digital investigations. it - Information Technology 57(6), 366\u2013375.","DOI":"10.1515\/itit-2015-0015"},{"key":"2023033114325865488_j_icom-2020-0004_ref_057","doi-asserted-by":"crossref","unstructured":"Pujol, E. et al. 2015. Annoyed users: Ads and ad-block usage in the wild. In: Proceedings of the 2015 Internet Measurement Conference, 93\u2013106.","DOI":"10.1145\/2815675.2815705"},{"key":"2023033114325865488_j_icom-2020-0004_ref_058","unstructured":"Purcell, K. et al. 2012. Search engine use 2012."},{"key":"2023033114325865488_j_icom-2020-0004_ref_059","doi-asserted-by":"crossref","unstructured":"Raschke, P. et al. 2017. Designing a GDPR-Compliant and Usable Privacy Dashboard. In: IFIP International Summer School on Privacy and Identity Management, 221\u2013236.","DOI":"10.1007\/978-3-319-92925-5_14"},{"key":"2023033114325865488_j_icom-2020-0004_ref_060","unstructured":"Roesner, F. et al. 2012. Detecting and defending against third-party tracking on the web. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, 12."},{"key":"2023033114325865488_j_icom-2020-0004_ref_061","doi-asserted-by":"crossref","unstructured":"Sakamoto, T. and Matsunaga, M. 2019. After GDPR, Still Tracking or Not? Understanding Opt-Out States for Online Behavioral Advertising. In: 2019 IEEE Security and Privacy Workshops (SPW), 92\u201399.","DOI":"10.1109\/SPW.2019.00027"},{"key":"2023033114325865488_j_icom-2020-0004_ref_062","doi-asserted-by":"crossref","unstructured":"Sanchez-Rola, I. et al. 2019. Can I opt out yet?: GDPR and the global illusion of cookie control. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 340\u2013351.","DOI":"10.1145\/3321705.3329806"},{"key":"2023033114325865488_j_icom-2020-0004_ref_063","doi-asserted-by":"crossref","unstructured":"Sanchez-Rola, I. et al. 2017. The web is watching you: A comprehensive review of web-tracking techniques and countermeasures. Logic Journal of the IGPL 25(1), 18\u201329.","DOI":"10.1093\/jigpal\/jzw041"},{"key":"2023033114325865488_j_icom-2020-0004_ref_064","unstructured":"Schaub, F. et al. 2015. A design space for effective privacy notices. In: Eleventh Symposium on Usable Privacy and Security (SOUPS 2015), 1\u201317."},{"key":"2023033114325865488_j_icom-2020-0004_ref_065","doi-asserted-by":"crossref","unstructured":"Schaub, F. et al. 2016. Watching them watching me: Browser extensions impact on user privacy awareness and concern. In: NDSS Workshop on Usable Security.","DOI":"10.14722\/usec.2016.23017"},{"key":"2023033114325865488_j_icom-2020-0004_ref_066","doi-asserted-by":"crossref","unstructured":"Schelter, S. and Kunegis, J. 2018. On the ubiquity of web tracking: Insights from a billion-page web crawl. The Journal of Web Science 4(4), 53\u201366.","DOI":"10.1561\/106.00000014"},{"key":"2023033114325865488_j_icom-2020-0004_ref_067","unstructured":"Schleipfer, S. 2017. Datenschutzkonformes Webtracking nach Wegfall des TMG. Was bringen die DS-GVO und die ePrivacy-Verordnung? 10\/2017, 460\u2013466."},{"key":"2023033114325865488_j_icom-2020-0004_ref_068","unstructured":"Schwartz, A. 2009. Looking back at P3P: lessons for the future. Center for Democracy & Technology, https:\/\/www.cdt.org\/files\/pdfs\/P3P_Retro_Final_0.pdf."},{"key":"2023033114325865488_j_icom-2020-0004_ref_069","doi-asserted-by":"crossref","unstructured":"Seufert, A.-M. and Vitt, N. 2019. Medien zur DSGVO: Die Berichterstattung vor und seit dem Stichtag im Vergleich. Wirtschaftsinformatik & Management, 1\u20139.","DOI":"10.1365\/s35764-019-0158-6"},{"key":"2023033114325865488_j_icom-2020-0004_ref_070","doi-asserted-by":"crossref","unstructured":"S\u00f8rensen, J. and Kosta, S. 2019. Before and After GDPR: The Changes in Third Party Presence at Public and Private European Websites. In: The World Wide Web Conference, 1590\u20131600.","DOI":"10.1145\/3308558.3313524"},{"key":"2023033114325865488_j_icom-2020-0004_ref_071","unstructured":"Spindler, G. and Schmitz, P. 2018. Telemediengesetz: TMG mit Netzwerkdurchsetzungsgesetz (NetzDG). C. H. Beck."},{"key":"2023033114325865488_j_icom-2020-0004_ref_072","doi-asserted-by":"crossref","unstructured":"Stevens, G. et al. 2014. Mehrseitige, barrierefreie Sicherheit intelligenter Messsysteme. Datenschutz und Datensicherheit 38, 536\u2013544.","DOI":"10.1007\/s11623-014-0180-z"},{"key":"2023033114325865488_j_icom-2020-0004_ref_073","doi-asserted-by":"crossref","unstructured":"Trudeau, S. et al. 2009. The effects of introspection on creating privacy policy. In: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, 1\u201310.","DOI":"10.1145\/1655188.1655190"},{"key":"2023033114325865488_j_icom-2020-0004_ref_074","doi-asserted-by":"crossref","unstructured":"Turow, J. et al. 2009. Americans reject tailored advertising and three activities that enable it. SSRN. DOI:10.2139\/ssrn.1478214.","DOI":"10.2139\/ssrn.1478214"},{"key":"2023033114325865488_j_icom-2020-0004_ref_075","doi-asserted-by":"crossref","unstructured":"Ur, B. et al. 2012. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, 4.","DOI":"10.1145\/2335356.2335362"},{"key":"2023033114325865488_j_icom-2020-0004_ref_076","doi-asserted-by":"crossref","unstructured":"Utz, C. et al. 2019. (Un)Informed Consent: Studying GDPR Consent Notices in the Field. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2019), 973\u2013990.","DOI":"10.1145\/3319535.3354212"},{"key":"2023033114325865488_j_icom-2020-0004_ref_077","unstructured":"Wittig, P. 2000. Die datenschutzrechtliche Problematik der Anfertigung von Pers\u00f6nlichkeitsprofilen zu Marketingzwecken. Recht der Datenverarbeitung 2, 59\u201362."},{"key":"2023033114325865488_j_icom-2020-0004_ref_078","doi-asserted-by":"crossref","unstructured":"Yu, Z. et al. 2016. Tracking the trackers. In: Proceedings of the 25th International Conference on World Wide Web, 121\u2013132.","DOI":"10.1145\/2872427.2883028"},{"key":"2023033114325865488_j_icom-2020-0004_ref_079","unstructured":"Zuboff, S. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs."},{"key":"2023033114325865488_j_icom-2020-0004_ref_080","unstructured":"European Court of Justice. 2019. Judgment of the Court (Grand Chamber) of 1 October 2019 (request for a preliminary ruling from the Bundesgerichtshof \u2014 Germany) \u2014 Bundesverband der Verbraucherzentralen und Verbraucherverb\u00e4nde \u2014 Verbraucherzentrale Bundesverband eV v Planet49 GmbH. Technical Report #C-673\/17 ECLI:EU:C:2019:80, Rdnr. 13."},{"key":"2023033114325865488_j_icom-2020-0004_ref_081","unstructured":"European Court of Justice. 2019. Judgment of the Court of Justice in Case C-40\/17 Fashion ID. Technical Report #No 99\/2019."},{"key":"2023033114325865488_j_icom-2020-0004_ref_082","unstructured":"European Court of Justice. 2019. Judgment of the Court of Justice in Case C-673\/17 Planet49. Technical Report #No 125\/2019."},{"key":"2023033114325865488_j_icom-2020-0004_ref_083","unstructured":"2019. Transport, Telecommunications and Energy Council (Telecommunications) - December 2019, Press conference \u2013 Part 4 (Q&A)."}],"container-title":["i-com"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/icom\/19\/1\/article-p31.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/icom-2020-0004\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/icom-2020-0004\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T21:03:00Z","timestamp":1680296580000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/icom-2020-0004\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":83,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,4,7]]},"published-print":{"date-parts":[[2020,4,28]]}},"alternative-id":["10.1515\/icom-2020-0004"],"URL":"https:\/\/doi.org\/10.1515\/icom-2020-0004","relation":{},"ISSN":["2196-6826","1618-162X"],"issn-type":[{"value":"2196-6826","type":"electronic"},{"value":"1618-162X","type":"print"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}