Consumer protection requires artificial intelligence

Technology companies have quickly become powerful with their access to large amounts of data and machine learning technologies, but consumers could be empowered too with automated tools to protect their rights.

Access options

Rent or Buy article

Get time limited or full article access on ReadCube.

from$8.99

All prices are NET prices.

References

  1. 1.

    Zuboff, S. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (Profile Books, 2019).

  2. 2.

    Hildebrandt, M. Geo. L. Tech. Rev. 2, 252–273 (2018).

    Google Scholar 

  3. 3.

    Galbraith, J. K. The Anatomy of Power (Houghton-Mifflin, 1983).

  4. 4.

    Hu, N., Koh, N. S. & Reddy, S. K. Decis. Support Syst. 57, 42–53 (2014).

    Article  Google Scholar 

  5. 5.

    Ruggieri, S., Pedreschi, D. & Turini, F. ACM Trans. Knowl. Discov. D. 4, 9 (2010).

    Google Scholar 

  6. 6.

    Wu, S.-H., Chou, M.-J., Tseng, C.-H., Lee, Y.-J. & Chen, K.-T. IEEE Syst. J. 11, 2432–2443 (2017).

    Article  Google Scholar 

  7. 7.

    Obar, J. A. & Oeldorf-Hirsch, A. Inf. Commun. Soc. https://doi.org/10.1080/1369118X.2018.1486870 (2018).

  8. 8.

    Lippi, M. et al. Artif. Intell. Law https://doi.org/10.1007/s10506-019-09243-2 (2019).

  9. 9.

    Contissa, G. et al. CLAUDETTE Meets GDPR: Automating the Evaluation of Privacy Policies Using Artificial Intelligence (BEUC, 2018).

  10. 10.

    Costante, E., Sun, Y., Petkovi´c, M. & den Hartog, J. in Proc. 2012 ACM Workshop on Privacy in the Electronic Society 91–96 (ACM, 2012).

  11. 11.

    Tomuro, N., Lytinen, S. & Hornsburg, K. in Proc. Sixth ACM Conference on Data and Application Security and Privacy 133–135 (ACM, 2016).

  12. 12.

    Zaeem, R. N., German, R. L. & Barber, S. K. ACM Trans. Internet Technol. 18, 53 (2018).

    Article  Google Scholar 

  13. 13.

    Wilson, S. et al. ACM Trans. Web 13, 1 (2018).

    Article  Google Scholar 

  14. 14.

    Solon, O. NBC News https://www.nbcnews.com/tech/internet/facial-recognition-s-dirty-little-secret-millions-online-photos-scraped-n981921 (12 March 2019).

  15. 15.

    Rubin, J., Gordon, M. I., Nguyen, N. & Rinard, M. in 2015 30th IEEE/ACM International Conference on Automated Software Engineering 647–657 (IEEE, 2015).

  16. 16.

    Gordon, M. I. et al. in 2015 Network and Distributed System Security Symposium 110 (NDSS, 2015).

  17. 17.

    Joshi, K. P. et al. in AAAI Fall Symposium 149–152 (AAAI, 2016).

  18. 18.

    Das, A., Degeling, M., Smullen, D. & Sadeh, N. M. IEEE Pervasive Comput. 17, 35–46 (2018).

    Article  Google Scholar 

Download references

Acknowledgements

This work was financially supported by the European University Institute project CLAUDETTE (http://claudette.eui.eu).

Author information

Affiliations

Authors

Corresponding author

Correspondence to Marco Lippi.

Ethics declarations

Competing interests

The authors declare no competing interests.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Lippi, M., Contissa, G., Lagioia, F. et al. Consumer protection requires artificial intelligence. Nat Mach Intell 1, 168–169 (2019). https://doi.org/10.1038/s42256-019-0042-3

Download citation

Further reading

Search

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing