Cover des Buchs: The New Shapes of Digital Vulnerability in European Private Law
Sammelband Open Access Vollzugriff

The New Shapes of Digital Vulnerability in European Private Law

Prefaces by Frank Pasquale and Oreste Pollicino
Herausgeber:innen:
Verlag:
 2024

Zusammenfassung

Der Band analysiert, ob und wie der aktuelle Rechtsrahmen den persönlichen Bedingungen, unter denen sich digitale Technologien als besonders störend erweisen könnten, angemessen gerecht wird. Darüber hinaus wird untersucht, wie die bestehenden Policies und Regeln neu interpretiert, neu konzipiert und umgestaltet werden könnten. Dabei bietet es eine bemerkenswerte Symbiose zwischen politikorientierter rechtswissenschaftlicher Arbeit und eher theoretischer und philosophischer Forschung. Insbesondere verleiht dieses Buch dem fließenden Konzept der digitalen Vulnerabilität eine konkretere Bedeutung; es identifiziert persönliche und situationsbezogene Faktoren; es identifiziert wirksame Maßnahmen/Abhilfemaßnahmen, um den größtmöglichen Schutz derjenigen zu gewährleisten, die digital verwundbar sein könnten, vor neu auftretenden technologischen Bedrohungen; es hilft, traditionelle privatrechtliche Mikro- und Makrokategorien, die sich um den Begriff der digitalen Vulnerabilität drehen, zu überdenken und stellt traditionelle rechtliche Taxonomien in Frage. Mit Beiträgen vonCamilla Crea | Alberto De Franceschi | Frank Pasquale | Oreste Pollicino | Catalina Goanta | Giovanni De Gregorio | Gerasimos Spanakis | Fabrizio Esposito | Emilia Mišćenić | Mateja Durovic | Eleni Kaprou | Niti Chatterjee | Gianclaudio Malgieri | Shabahang Arian | Mateusz Grochowski | Irina Domurath | Teresa Rodríguez de las Heras Ballell | Jura Golub | Gérardine Goh Escolar 吴美姗 | Federica Casarosa | Hans-W. Micklitz | Piotr Tereszkiewicz | Katarzyna Południak-Gierz | Patryk Walczak | Alessandra Pera | Sara Rigazio | Denise Amram | Isabelle Wildhaber | Isabel Laura Ebert | Léa Stiefel | Alain Sandoz | Reiner Schulze

Schlagworte


Publikation durchsuchen


Bibliographische Angaben

Copyrightjahr
2024
ISBN-Print
978-3-7560-1632-7
ISBN-Online
978-3-7489-4091-3
Verlag
Nomos, Baden-Baden
Sprache
Englisch
Seiten
536
Produkttyp
Sammelband

Inhaltsverzeichnis

KapitelSeiten
  1. Titelei/InhaltsverzeichnisSeiten 1 - 8 Download Kapitel (PDF)
  2. Authors’ profilesSeiten 9 - 16 Download Kapitel (PDF)
  3. ‘Digital Vulnerability in European Private Law’ – Towards Digital Fairness Seiten 17 - 18 Camilla Crea, Alberto De Franceschi Download Kapitel (PDF)
    1. Enforcing and Expanding Legal Protections for Vulnerable SubjectsSeiten 21 - 24 Frank Pasquale Download Kapitel (PDF)
    2. Vulnerability in the Digital Age Seiten 25 - 28 Oreste Pollicino Download Kapitel (PDF)
    1. Catalina Goanta, Giovanni de Gregorio, Jerry Spanakis Download Kapitel (PDF)
      1. A. Introduction
      2. B. Digital vulnerability and structural asymmetry affecting European consumers
          1. 1. A brief introduction to monetisation
          2. 2. Monetising conspiracy channels
          3. 3. Relevance for the digital vulnerability debate
          4. 4. Contextual vulnerability: technical solutions for complex social media consumer harms?
        1. II. Revisiting the harmonisation debate through judicial interpretations of European consumer protection
      3. D. Synthesis and conclusion: digital vulnerability and the need for systems-thinking
    2. Fabrizio Esposito Download Kapitel (PDF)
      1. A. Overview
          1. 1. What is harm?
          2. 2. What causes harm?
          3. 3. Scenarios of harm
          1. 1. Reverse-engineering and coherence
          2. 2. Interpretation, integration and policy proposals
        1. I. A first approximation
          1. 1. The benchmark
          2. 2. The lemon
          3. 3. Divide et impera
          4. 4. The bottom
          5. 5. On the relationship between the scenarios
        1. I. Shopping between hidden traps and hidden gems as the new normal?
        2. II. The naïve consumers’ right to transparent contract terms
        1. I. Hyper-engaging practices: capturing and retaining user attention
        2. II. Hyper-engaging practices plausibly violate the Unfair Commercial Practices Directive
        1. I. The economic preconditions of exploitative price personalization
        2. II. An information duty that would work?
      2. G. Conclusions
    3. Emilia Mišćenić Download Kapitel (PDF)
      1. A. Introduction: consumer legislation in the digital age – fit for purpose?
      2. B. What is going on in the EU legislative arena?
      3. C. From an average to a vulnerable consumer in the digital environment
        1. I. Information duties
        2. II. CJEU case law
      4. E. The relation between information and transparency in the digital environment
      5. F. The relation between transparency and fairness in the digital environment
      6. G. Closing remarks and proposals
    4. Mateja Durovic, Eleni Kaprou Download Kapitel (PDF)
      1. A. Introduction
      2. B. Consumers and the digital age
      3. C. EU digital environment
      4. D. Digital and consumer vulnerability
      5. E. Related terms
      6. F. The common elements of consumer vulnerability and digital divide
      7. G. Conceptualising digital vulnerability
      8. H. Categories of vulnerable consumers
      9. I. The façade of the average consumer
      10. L. An appeal to recognise the vulnerability of consumers
      11. M. Conclusive remarks
    5. Niti Chatterjee, Gianclaudio Malgieri Download Kapitel (PDF)
      1. A. Introduction
          1. a) AR Technology
          2. b) VR Technology
        1. 2. Sensors in AR/VR Technology
        2. 3. Emotion Recognition in AR/VR Devices
        1. 1. Conceptualizing Vulnerability
        2. 2. Vulnerability vis-à-vis Digital Consumption
          1. a) Amplification of Existing Vulnerabilities
          2. b) Inducement of New Vulnerabilities
        3. 4. Broader impact on end-users
      2. III. Conclusion and input for policy remarks
    6. Shabahang Arian Download Kapitel (PDF)
      1. A. Metaverse: new frontier of digital life
        1. I. Virtual product placement (VPPs)
        2. II. Virtual spokes people (VSPs)
      2. C. Persuasion vs manipulation in the metaverse
      3. D. Layers of vulnerability in the metaverse
        1. I. EU Data Protection Law and profiling
        2. II. Manipulative business practice in the metaverse
        3. III. Children as vulnerable users in the metaverse
      4. F. Conclusions
    1. Mateusz Grochowski Download Kapitel (PDF)
      1. A. Why digital vulnerability?
      2. B. Open-edged economic imaginary
        1. I. Digital post-consumption and consumer harm
        2. II. Deficits of the legal framework
        1. I. Digital vulnerability: the overall origins
        2. II. The architecture of post-consumer vulnerability
        3. III. Digital vulnerability: towards a comprehensive concept
      3. E. The way ahead: bridging consumer law and platform regulation
    2. Irina Domurath Download Kapitel (PDF)
      1. A. Introduction
        1. I. Static, personal, exceptional
          1. 1. Influence of intersectionality: vulnerability as relational
          2. 2. Two definitions
            1. a) Autonomy
            2. b) Hypo-autonomy: lack of power of consumers
            3. c) Hyper-autonomy: structural power of companies
        2. III. Interim conclusion 1
        1. I. The value of privacy
        2. II. Thin privacy in EU Law: control rights
        3. III. Thick privacy: substantive dimensions
        4. IV. Privacy and autonomy
        5. V. Interim conclusion 2
      2. D. Conclusion: digital vulnerability and thick privacy
    3. Teresa Rodríguez de las Heras Ballell Download Kapitel (PDF)
        1. I. Defining algorithmic contracts
        2. II. Mapping algorithmic contracting scenarios
        1. I. A rule of legal recognition
        2. II. Attribution rules
      1. C. Decoding digital vulnerability in algorithmic contracting: a two-sided interplay
      2. D. Rethinking paradigms to address digital vulnerability: towards a notion of algorithmic or ADM-related vulnerability
    4. Jura Golub Download Kapitel (PDF)
      1. A. Introduction
      2. B. Setting the scene of smart contracts
      3. C. Do smart consumer contracts fall within the framework of EU PIL?
      4. D. International jurisdiction for disputes related to smart consumer contracts
        1. I. Choice of law (lex autonomiae)
        2. II. The consumer's habitual residence (lex residentiae habitualis)
        3. III. Consent and material validity of smart consumer contracts
        4. IV. Formal validity of smart consumer contracts
        5. V. (In)capacity of the consumer
      5. F. Concluding remarks
    5. Gérardine Goh Escolar Download Kapitel (PDF)
      1. A. Introduction
      2. B. Digital vulnerability in the context of private international law
        1. I. Distributed storage mechanisms
        2. II. Digital currencies and cross-border payments
        3. III. The tokenised economy
        4. IV. Digital platforms
        5. V. Artificial intelligence and automated contracting
        6. VI. Immersive technologies and the cloud economy
        7. VII. Decentralised governance structures
      3. D. Conclusion
    6. Federica Casarosa, Hans-W. Micklitz Download Kapitel (PDF)
      1. A. Introduction
        1. I. Access to justice
        2. II. ADR in the European legal framework
        3. III. The notion of ODR in the European legal framework
        1. I. Vulnerabilities in universal service obligations
        2. II. Vulnerabilities in the UCPD
        3. III. Vulnerabilities in ADR and ODR
        1. I. Vulnerabilities in the AIA, the DSA and the Data Act
        2. II. Dispute resolution in the AIA, the DSA and the Data Act
        3. III. The EC digital fairness initiative
      2. E. Challenges for further research
    1. Piotr Tereszkiewicz, Katarzyna Południak-Gierz, Patryk Walczak Download Kapitel (PDF)
      1. A. Introduction
      2. B. Digital distribution of insurance and personalisation of insurance contracts
        1. I. Lawfulness of data processing under GDPR
        2. II. GDPR and automated individual decision-making
        3. III. Information duties on data processing under GDPR
      3. D. Personalised pricing of insurance products under Unfair Commercial Practices Directive
      4. E. Infringement of GDPR as an unfair commercial practice?
      5. F. Conclusions
    2. Alessandra Pera, Sara Rigazio Download Kapitel (PDF)
      1. A. Introduction
      2. B. Vulnerability as a multidimensional concept
        1. I. The case studies
      3. D. Case subsumption and use of taxonomies
      4. E. Institutional policies and responses
      5. F. Ways forward and conclusions
    3. Denise Amram Download Kapitel (PDF)
      1. A. Introduction: digital vulnerabilities and the digitization of vulnerabilities
        1. I. Harms in the digital environment
        2. II. Policies, guidelines, and standards
        1. I. Vulnerabilities in digitalised emergency, outpatient, and surgical services
      2. D. The interplay of technical and organisational standards to protect users
    4. Isabelle Wildhaber, Isabel Laura Ebert Download Kapitel (PDF)
      1. A. Introduction
        1. I. Results from a quantitative survey in Swiss companies
          1. 1. Information
          2. 2. Consultation
          3. 3. Data protection law as a buffer against the inappropriate use of ADM systems
          4. 4. Attribution of responsibility and exercise of power
          5. 5. Communication as a means to engage employees
          6. 6. Learning culture vs. sanctioning culture
          7. 7. Acceptance of ADM systems
        1. I. National legal foundations
        2. II. International legal foundations
        1. I. Strengthening collective participation
        2. II. Continuously enabling employee objections
        3. III. Structures for oversight and control/enforcement
        4. IV. Solutions empowering social partnerships
          1. 1. Deep Insights into privacy and possible monitoring of employee activities
          2. 2. Timing of information and consultation
          3. 3. Data competence / data literacy
          4. 4. Data transparency
          5. 5. Clarification about the scope of application of the ADM systems
          6. 6. Avoiding «black box systems»
          1. 1. Identify and assess impacts to assess the nature and extent of human rights
          2. 2. Act to prevent and reduce human rights risks, also through integration into internal functions and processes
          3. 3. Track the effectiveness of risk reduction measures over time
          4. 4. Appropriate communication of the measures with a view to dealing with human rights impacts
      2. F. Conclusions
    5. Léa Stiefel, Alain Sandoz Download Kapitel (PDF)
      1. A. Introduction
      2. B. Context
      3. C. Definitions and conceptual framework
      4. D. Methods and materials
        1. I. Barto: a service platform on top of a centralized database
        2. II. ADA: a peer-to-peer platform for authorized data transmission
      5. F. Discussion
      6. G. Conclusions
    1. Reiner Schulze Download Kapitel (PDF)
      1. A. Introduction
      2. B. A new challenge for European Private Law
      3. C. Concept and cross-cutting nature of digital vulnerability
        1. I. The multilevel dimension
        2. II. Interaction with public law
        3. III. Consumer protection and protection of Internet users
      4. E. Further tasks for legislation and research

Ähnliche Veröffentlichungen

aus dem Schwerpunkt "Europarecht & Internationales Recht & Rechtsvergleichung"
Cover des Buchs: Der Volkseinwand
Monographie Kein Zugriff
Florian Feigl
Der Volkseinwand
Cover des Buchs: Wie fördert die EU Menschenrechte in Drittstaaten?
Monographie Kein Zugriff
Dennis Traudt
Wie fördert die EU Menschenrechte in Drittstaaten?
Cover des Buchs: Future-Proofing in Public Law
Sammelband Kein Zugriff
Nicole Koblenz LL.M., Nicholas Otto, Gernot Sydow
Future-Proofing in Public Law