Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • Comment
  • Published:

Consumer protection requires artificial intelligence

Technology companies have quickly become powerful with their access to large amounts of data and machine learning technologies, but consumers could be empowered too with automated tools to protect their rights.

This is a preview of subscription content, access via your institution

Relevant articles

Open Access articles citing this article.

Access options

Buy this article

Prices may be subject to local taxes which are calculated during checkout

References

  1. Zuboff, S. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (Profile Books, 2019).

  2. Hildebrandt, M. Geo. L. Tech. Rev. 2, 252–273 (2018).

    Google Scholar 

  3. Galbraith, J. K. The Anatomy of Power (Houghton-Mifflin, 1983).

  4. Hu, N., Koh, N. S. & Reddy, S. K. Decis. Support Syst. 57, 42–53 (2014).

    Article  Google Scholar 

  5. Ruggieri, S., Pedreschi, D. & Turini, F. ACM Trans. Knowl. Discov. D. 4, 9 (2010).

    Google Scholar 

  6. Wu, S.-H., Chou, M.-J., Tseng, C.-H., Lee, Y.-J. & Chen, K.-T. IEEE Syst. J. 11, 2432–2443 (2017).

    Article  Google Scholar 

  7. Obar, J. A. & Oeldorf-Hirsch, A. Inf. Commun. Soc. https://doi.org/10.1080/1369118X.2018.1486870 (2018).

  8. Lippi, M. et al. Artif. Intell. Law https://doi.org/10.1007/s10506-019-09243-2 (2019).

  9. Contissa, G. et al. CLAUDETTE Meets GDPR: Automating the Evaluation of Privacy Policies Using Artificial Intelligence (BEUC, 2018).

  10. Costante, E., Sun, Y., Petkovi´c, M. & den Hartog, J. in Proc. 2012 ACM Workshop on Privacy in the Electronic Society 91–96 (ACM, 2012).

  11. Tomuro, N., Lytinen, S. & Hornsburg, K. in Proc. Sixth ACM Conference on Data and Application Security and Privacy 133–135 (ACM, 2016).

  12. Zaeem, R. N., German, R. L. & Barber, S. K. ACM Trans. Internet Technol. 18, 53 (2018).

    Article  Google Scholar 

  13. Wilson, S. et al. ACM Trans. Web 13, 1 (2018).

    Article  Google Scholar 

  14. Solon, O. NBC News https://www.nbcnews.com/tech/internet/facial-recognition-s-dirty-little-secret-millions-online-photos-scraped-n981921 (12 March 2019).

  15. Rubin, J., Gordon, M. I., Nguyen, N. & Rinard, M. in 2015 30th IEEE/ACM International Conference on Automated Software Engineering 647–657 (IEEE, 2015).

  16. Gordon, M. I. et al. in 2015 Network and Distributed System Security Symposium 110 (NDSS, 2015).

  17. Joshi, K. P. et al. in AAAI Fall Symposium 149–152 (AAAI, 2016).

  18. Das, A., Degeling, M., Smullen, D. & Sadeh, N. M. IEEE Pervasive Comput. 17, 35–46 (2018).

    Article  Google Scholar 

Download references

Acknowledgements

This work was financially supported by the European University Institute project CLAUDETTE (http://claudette.eui.eu).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Lippi.

Ethics declarations

Competing interests

The authors declare no competing interests.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lippi, M., Contissa, G., Lagioia, F. et al. Consumer protection requires artificial intelligence. Nat Mach Intell 1, 168–169 (2019). https://doi.org/10.1038/s42256-019-0042-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1038/s42256-019-0042-3

This article is cited by

Search

Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing