Comment | Published:

Consumer protection requires artificial intelligence

Nature Machine Intelligencevolume 1pages168169 (2019) | Download Citation

Technology companies have quickly become powerful with their access to large amounts of data and machine learning technologies, but consumers could be empowered too with automated tools to protect their rights.

Access optionsAccess options

Rent or Buy article

Get time limited or full article access on ReadCube.

from$8.99

All prices are NET prices.

References

  1. 1.

    Zuboff, S. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (Profile Books, 2019).

  2. 2.

    Hildebrandt, M. Geo. L. Tech. Rev. 2, 252–273 (2018).

  3. 3.

    Galbraith, J. K. The Anatomy of Power (Houghton-Mifflin, 1983).

  4. 4.

    Hu, N., Koh, N. S. & Reddy, S. K. Decis. Support Syst. 57, 42–53 (2014).

  5. 5.

    Ruggieri, S., Pedreschi, D. & Turini, F. ACM Trans. Knowl. Discov. D. 4, 9 (2010).

  6. 6.

    Wu, S.-H., Chou, M.-J., Tseng, C.-H., Lee, Y.-J. & Chen, K.-T. IEEE Syst. J. 11, 2432–2443 (2017).

  7. 7.

    Obar, J. A. & Oeldorf-Hirsch, A. Inf. Commun. Soc. https://doi.org/10.1080/1369118X.2018.1486870 (2018).

  8. 8.

    Lippi, M. et al. Artif. Intell. Law https://doi.org/10.1007/s10506-019-09243-2 (2019).

  9. 9.

    Contissa, G. et al. CLAUDETTE Meets GDPR: Automating the Evaluation of Privacy Policies Using Artificial Intelligence (BEUC, 2018).

  10. 10.

    Costante, E., Sun, Y., Petkovi´c, M. & den Hartog, J. in Proc. 2012 ACM Workshop on Privacy in the Electronic Society 91–96 (ACM, 2012).

  11. 11.

    Tomuro, N., Lytinen, S. & Hornsburg, K. in Proc. Sixth ACM Conference on Data and Application Security and Privacy 133–135 (ACM, 2016).

  12. 12.

    Zaeem, R. N., German, R. L. & Barber, S. K. ACM Trans. Internet Technol. 18, 53 (2018).

  13. 13.

    Wilson, S. et al. ACM Trans. Web 13, 1 (2018).

  14. 14.

    Solon, O. NBC News https://www.nbcnews.com/tech/internet/facial-recognition-s-dirty-little-secret-millions-online-photos-scraped-n981921 (12 March 2019).

  15. 15.

    Rubin, J., Gordon, M. I., Nguyen, N. & Rinard, M. in 2015 30th IEEE/ACM International Conference on Automated Software Engineering 647–657 (IEEE, 2015).

  16. 16.

    Gordon, M. I. et al. in 2015 Network and Distributed System Security Symposium 110 (NDSS, 2015).

  17. 17.

    Joshi, K. P. et al. in AAAI Fall Symposium 149–152 (AAAI, 2016).

  18. 18.

    Das, A., Degeling, M., Smullen, D. & Sadeh, N. M. IEEE Pervasive Comput. 17, 35–46 (2018).

Download references

Acknowledgements

This work was financially supported by the European University Institute project CLAUDETTE (http://claudette.eui.eu).

Author information

Affiliations

  1. DISMI, University of Modena and Reggio Emilia, Reggio Emilia, Italy

    • Marco Lippi
  2. CIRSFID, University of Bologna, Bologna, Italy

    • Giuseppe Contissa
    • , Francesca Lagioia
    •  & Giovanni Sartor
  3. Law Department, European University Institute, Florence, Italy

    • Francesca Lagioia
    • , Hans-Wolfgang Micklitz
    •  & Giovanni Sartor
  4. Center for Private Law, Information Society Project, Yale Law School, New Haven, CT, USA

    • Przemysław Pałka
  5. DISI, University of Bologna, Bologna, Italy

    • Paolo Torroni

Authors

  1. Search for Marco Lippi in:

  2. Search for Giuseppe Contissa in:

  3. Search for Francesca Lagioia in:

  4. Search for Hans-Wolfgang Micklitz in:

  5. Search for Przemysław Pałka in:

  6. Search for Giovanni Sartor in:

  7. Search for Paolo Torroni in:

Competing interests

The authors declare no competing interests.

Corresponding author

Correspondence to Marco Lippi.

About this article

Publication history

Published

Issue Date

DOI

https://doi.org/10.1038/s42256-019-0042-3

Newsletter Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing