Cover des Buchs: Digital Decade
Sammelband Open Access Vollzugriff

Digital Decade

How the EU Shapes Digitalisation Research
Herausgeber:innen:
Verlag:
 2025

Zusammenfassung

In den vergangenen zehn Jahren wurden zahlreiche EU-Rechtsakte im Bereich des Digitalrechts verabschiedet, darunter der AI Act, der Digital Services Act und der Digital Markets Act. Die komplexen, aber zum Teil schwer verständlichen Rechtsakte spielen in Forschung und Alltag eine große Rolle. Im vorliegenden Band stellen Rechtswissenschaftler:innen und Expert:innen die entscheidenden EU-Regulierungsakte vor, die für Sozialwissenschaftler:innen, Studierende und die breitere Öffentlichkeit von Bedeutung sind. Der Band soll zudem einen intensiveren Austausch zwischen den Disziplinen der Sozialwissenschaften und der Rechtswissenschaft anregen, von dem beide Fachbereiche profitieren können. Mit Beiträgen vonDr. Adelaida Afilipoaie | Valerie Albus | Dr. Lucie Antoine | Lena Auler | Dr. Jascha Bareis, M.A. | Prof. Dr. Catrien Bijleveld, LL.M. | Jorge Constantinos | Dr. Max van Drunen, M.Z. | Rita Gsenger, M.A., M.Sc.| Prisca von Hagen | Liza Herrmann | Julia Krämer | Eyup Kun | Dr. Lucas Lasota | Lisa Markschies | Prof. Dr. Heritiana Ranaivoson | Nik Roeingh | Prof. Dr. Hannah Ruschemeier | Dr. Pascal Schneiders | Marie-Therese Sekwenz | Lisa Völzmann | David Wagner

Schlagworte


Publikation durchsuchen


Bibliographische Angaben

Copyrightjahr
2025
ISBN-Print
978-3-7560-1741-6
ISBN-Online
978-3-7489-4399-0
Verlag
Nomos, Baden-Baden
Reihe
Normsetzung und Entscheidungsverfahren – Schriftenreihe des Weizenbaum-Instituts für normative Wissenschaften
Band
3
Sprache
Englisch
Seiten
524
Produkttyp
Sammelband

Inhaltsverzeichnis

KapitelSeiten
  1. Titelei/InhaltsverzeichnisSeiten 1 - 8 Download Kapitel (PDF)
  2. Rita Gsenger, Marie-Therese Sekwenz Download Kapitel (PDF)
    1. The principles of the Digital Decade
    2. Structural aspects of European Regulations and Acts
    3. The structure of this book
  3. Catrien Bijleveld Download Kapitel (PDF)
    1. 1. What are empirical legal studies
    2. 2. Doing empirical legal research
    3. 3. Empirical legal research: qualitative and quantitative methods
      1. 4.1 Sample representativeness
      2. 4.2 Sample nonresponse
      3. 4.3 Testing
    4. 5. Causality
    5. 6. Special topic: Systematic case law analysis
    6. 7. Conclusion
  4. Hannah Ruschemeier, Jascha Bareis Download Kapitel (PDF)
    1. 1. Regulating AI: an introduction
      1. 2.1 Regulating AI is regulating power
      2. 2.2 EU taking a stance in the geopolitical AI arena
      3. 2.3 Coming into being: from ethical guidelines to legal regulation
      1. 3.1 Regulatory structure
        1. 3.2.1 Material scope of application
        2. 3.2.2 High-risk classification as the relevant regulatory definition
        3. 3.2.3 Exceptions in the material scope
      2. 3.3 Personal scope of application
      3. 3.4 Territorial scope of application
      1. 4.1 Prohibited AI practices
      2. 4.2 High-risk systems
      3. 4.3 Systemic risks for general-purpose AI
    2. 5. Oversight and governance
        1. 6.1.1 Towards the final AI definition
        2. 6.1.2 Beyond technical AI: understanding AI as a socio-technical phenomenon
        1. 6.2.1 Physicality and actors: AI systems are no fixed products
      1. 6.3 Different understanding of risks and harms depict paradigms that are not compatible
      2. 6.4 Watered down Fundamental Rights Impact Assessment
      1. 7.1 Democratically unsupervised private standardisation procedures
      2. 7.2 Missing participation of affected subjects
      3. 7.3 The problem of algorithmic discrimination escaping the categories of anti-discrimination
      4. 7.4 The loophole of addressing recommendation systems on platforms as high-risk systems
      5. 7.5 Lobbying and the risk of tech-solutionism
    3. 8. Conclusion and outlook
  5. Jorge Constantino Download Kapitel (PDF)
    1. 1. An introduction to AI systems
    2. 2. AI systems in our societies: good and bad AI?
    3. 3. The approach of the EU AI Act to accountable AI
    4. 4. Conclusion
  6. Marie-Therese Sekwenz, Rita Gsenger Download Kapitel (PDF)
    1. 1. Introducing the DSA: Context and scope
      1. 2.1 A harmonised form of reporting through DSA transparency reports?
      2. 2.2 A place for all platform contracts – The terms and conditions database
      3. 2.3 Quick insights in content moderation decisions through the statement of reason database
      4. 2.4 Ad library
      5. 2.5 Data access for researchers
      1. 3.1 Drop-down of user empowerment? Notice and action mechanisms
      2. 3.2 Trust me, I am a trusted flagger
      3. 3.3 The wronged user? Internal complaint-handling systems in the DSA
      4. 3.4 The right of a judge or the DSA’s answer to it: Out-of-court dispute settlements
    2. 4. In crisis – Please follow the Commission
      1. 5.1 That seems pretty risky: Risk assessment under the DSA
      2. 5.2 Better to avoid it – Risk mitigation under the DSA
      3. 5.3 Audits
      4. 5.4 The deluge of delegated regulations
    3. 6. Conclusion
  7. Pascal Schneiders, Lena Auler Download Kapitel (PDF)
    1. 1. Introduction
      1. 2.1 Regulatory approach of the DSA for content moderation
      2. 2.2 Illegal content and hate speech
        1. 2.3.1 Notice and action procedure
        2. 2.3.2 Complaint and redress mechanisms
        3. 2.3.3 Cooperation with authorities
        1. 2.4.1 Risk assessment and mitigation
        2. 2.4.2 Data access
      3. 2.5 Transparency obligations
      1. 3.1 Legitimacy and accuracy of content moderation
      2. 3.2 Involvement of state authorities
      3. 3.3 Effectiveness of content moderation
      4. 3.4 Data access
      1. 4.1 Starting point and the DSA’s approach
      2. 4.2 Risks and opportunities in relation to the DSA
      3. 4.3 Implications
  8. Liza Herrmann Download Kapitel (PDF)
    1. 1. A fairy-tale introduction
      1. 2.1 The (complicated) relationship between law and social science: a practical approach
      2. 2.2 What constitutes the social character of law?
      1. 3.1 Background considerations on the development of the Regulation
      2. 3.2 The dual objectives of the DMA
      3. 3.3 The material and geographical scope
      4. 3.4 The gatekeeper’s obligations and prohibitions
      5. 3.5 Enforcement and penalties for non-compliance
      1. 4.1 Explicit references to the principle of proportionality in the DMA
      2. 4.2 The recitals
      3. 4.3 The beneficiaries
      4. 4.4 The regulatory objectives
      5. 4.5 The ex ante control approach
      6. 4.6 Core platform services
    2. 5. Conclusion & considerations for further (interdisciplinary) research
  9. Valerie Albus Download Kapitel (PDF)
    1. 1. Introduction
      1. 2.1 Legislative history
      2. 2.2 Legal basis
      3. 2.3 Scope of application
      4. 2.4 Definition of terrorist content
      1. 3.1 Removal orders
      2. 3.2 Cross-border removal orders
      3. 3.3 Specific measures to address the dissemination of terrorist content
      4. 3.4 Transparency obligations
    2. 4. Conclusion
  10. Max van Drunen Download Kapitel (PDF)
    1. 1. Introduction
      1. 2.1 What is political advertising?
      2. 2.2 Why does the Political Advertising Regulation empower researchers?
      1. 3.1 Ad libraries
        1. 3.2.1 From whom can data be requested?
        2. 3.2.2 Who can request data?
      1. 4.1 Defining political ads
      2. 4.2 When should political advertising be prohibited?
      3. 4.3 Effective labels for political advertisements
    2. 5. Conclusion
  11. Lisa Völzmann Download Kapitel (PDF)
      1. 1.1 Objective
      2. 1.2 Legal Nature
      1. 2.1 Scope
        1. 2.2.1 Research Organisations, Cultural Heritage Institutions, and Other Users
        2. 2.2.2 Rightholders
        1. 2.3.1 Creating Legal Certainty
        2. 2.3.2 Enhancing Innovation
      1. 3.1 Scope
        1. 3.2.1 Press Publishers
        2. 3.2.2 Information Society Service Providers
        3. 3.2.3 Authors and Other Rightholders
        4. 3.3 Objectives and Perspectives
      2. 3.3.1 Protecting a Free and Pluralist Press
      3. 3.3.2 Shifting Power Dynamics
      1. 4.1 Scope
        1. 4.2.1 Users
        2. 4.2.2 Rightholders
        3. 4.2.3 Online Content-Sharing Service Providers
        1. 4.3.1 Risking Overblocking
        2. 4.3.2 Strengthening Copyright Protection
    1. 5. Conclusion
  12. Adelaida Afilipoaie, Heritiana Ranaivoson Download Kapitel (PDF)
    1. 1. Introduction
    2. 2. Safeguarding media pluralism at the EU level
      1. 3.1 Explaining Section 5 of the EMFA
      2. 3.2 The EMFA’s approach to media pluralism and the link with the Media Plurality Monitor
      3. 3.3 Delving into Art. 22 of the EMFA: assessment of media market concentrations
        1. 4.1.1 Ownership and beyond
        2. 4.1.2 Diversity and opinion-formation power
        1. 4.2.1 Editorial independence
        2. 4.2.2 Editorial independence in practice
        1. 4.3.1 Economic sustainability
        2. 4.3.2 Assessment of economic sustainability
      1. 4.4 Art. 22(2)(d)
      2. 4.5 Art. 22(2)(e)
    3. 5. Conclusion
  13. Lucie Antoine Download Kapitel (PDF)
    1. 1. The role of trust for data sharing
    2. 2. Law and trust
      1. 3.1 The DGA: background, legal nature, and overview
        1. 3.2.1 Scope and covered data categories
        2. 3.2.2 General conditions for re-use
        3. 3.2.3 Additional safeguards
        4. 3.2.4 Safeguards for the transfer of non-personal data to third countries
        5. 3.2.5 Transparent and effective framework for re-use requests
        6. 3.2.6 Summary, guiding principles and perspective
          1. 3.3.2 Definition of data intermediation service
          2. 3.3.3 Notification process and public register
          3. 3.3.4 Conditions for providing data intermediation services
          4. 3.3.5 Summary, guiding principles, and perspective
          1. 3.3.7 Definition of data altruism
          2. 3.3.8 Registration process and public register
          3. 3.3.9 Further obligations for recognised data altruism organisations
          4. 3.3.10 Consent and permission
          5. 3.3.11 Summary, guiding principles, and perspective
    3. 4. The role of trust in business and consumer decisions?
    4. 5. Concluding remarks
  14. Nik Roeingh, David Wagner Download Kapitel (PDF)
    1. 1. Introduction
      1. 2.1 Understanding open government data through its rationale
      2. 2.2 Understanding open government data as a data state
        1. 2.3.1 Openness
        2. 2.3.2 Data
        3. 2.3.3 Government
      1. 3.1 A brief history of internal market regulation for open public sector data
        1. 3.2.1 Standard licences (Art. 8 ODD)
        2. 3.2.2 Available formats (Art. 5 ODD)
        3. 3.2.3 Charging (Art. 6 ODD)
        4. 3.2.4 Non-discrimination (Art. 11 ODD)
        5. 3.2.5 Exclusivity arrangements (Art. 12 ODD)
        1. 4.1.1 High value datasets
        2. 4.1.2 Public sector bodies’ data
        3. 4.1.3 Public undertakings’ data
        1. 4.2.1 Dividing lines within Art. 10 ODD
        2. 4.2.2 Research data
        3. 4.2.3 Covered data
        4. 4.2.4 Exclusion: scientific publications
    2. 5. Overall assessment of the Open Data Directive
  15. Prisca von Hagen Download Kapitel (PDF)
    1. 1. Introduction
      1. 2.1 Reasons for the lack of data sharing
      2. 2.2 Effects of the lack of data sharing
        1. 2.3.1 The European Data Strategy
        2. 2.3.2 Basic idea of the DA with regard to IoT data
      1. 3.1 Scope of application: what data are covered?
      2. 3.2 Relevant actors
        1. 3.3.1 Data access of the user
        2. 3.3.2 Data access for data recipients
        3. 3.3.3 Restrictions for the use by the data holder
          1. Legal Basis for Data Processing
          2. Relationship between the right to data portability and Article 4 (1) and Article 5 (1) DA
          3. Criticism of the creation of user accounts
          1. Data as trade secret
          2. Approaches of the DA with regard to trade secrets
        1. 4.1.3 Relationship to database protection
        2. 4.1.4 Relationship to other existing legal instruments
      1. 4.2 Independent decision by the user?
        1. 4.3.1 “Ownership-like” position of the user?
        2. 4.3.2 (Exclusive) de facto position of the data holder?
    2. 5. Conclusion
  16. Julia Krämer Download Kapitel (PDF)
    1. 1. Introduction
        1. 2.1.1 Processing
        2. 2.1.2 Personal data
        3. 2.1.3 Controllership
      1. 2.2 Principles of data processing
      1. 3.1 Art 6 GDPR – lawful grounds for processing
      2. 3.2 Art. 7 GDPR – conditions for valid consent
      3. 3.3 Art. 9 GDPR – Data revealing special categories of personal data
        1. 3.4.1 Privacy policies (Arts. 12, 13, 14 GDPR)
        2. 3.4.2 Privacy labels and standardised icons (Art. 12(7) GDPR)
      4. 3.5 Measuring data flows and tracking – transparency and data minimisation
      5. 3.6 Art. 15 GDPR – right of access
      6. 3.7 Art. 17 GDPR – right to be forgotten
      1. 4.1 Challenges for empirical (legal) studies in the context of the GDPR
    2. 5. Conclusion
  17. Lisa Markschies Download Kapitel (PDF)
    1. 1. Introduction
    2. 2. Legislative history
      1. 3.1 More control over the individual’s electronic health data
      2. 3.2 Better treatment through better data
      3. 3.3 Data access made easy?
      1. 4.1 Application process
      2. 4.2 Purposes
        1. 4.3.1 Categories
        2. 4.3.2 Patient protection through anonymisation and pseudonymisation
      3. 4.4 Prohibited secondary uses
    3. 5. To consent or not to consent
      1. 6.1 Relation to the GDPR
      2. 6.2 Differences between the Member States
      3. 6.3 Garbage in/garbage out?
    4. 7. Outlook
  18. Lucas Lasota Download Kapitel (PDF)
    1. 1. Introduction – making cybersecurity a priority for digital markets
    2. 2. Cybersecurity is broader than computer security
    3. 3. Vulnerabilities are inescapable in the digital world
    4. 4. From safety to security – understanding the EU’s cybersecurity regulatory path
    5. 5. CRA: setting far-reaching cybersecurity rules for digital products
    6. 6. The challenge of regulating FOSS cybersecurity
    7. 7. Conclusion and future research
  19. Eyup Kun Download Kapitel (PDF)
    1. 1. Introduction: evolution from the NIS Directive to NIS 2 Directive
        1. 2.1.1 Bifurcation of entities under the NIS 2 Directive: Essential and important entities
        2. 2.1.2 The different supervision and enforcement regime for essential and important entities
      1. 2.2 Jurisdictional scope of Member States under the NIS 2 Directive
      2. 2.3 Material scope of the NIS 2 Directive: data and availability of services as proxies to protect individuals and society
      3. 2.4 Objective of the NIS 2 Directive: solving underinvestment problem in cybersecurity
        1. 3.1.1 Cybersecurity strategies
        2. 3.1.2 National cyber crisis management frameworks
        3. 3.1.3 Establishment of competent authorities and single points of contact for cybersecurity
        4. 3.1.4 Computer Security Incident Response Teams (CSIRTS)
        5. 3.1.5 Cooperation at the national level
        1. 3.2.1 European vulnerability database
        2. 3.2.2 EU-level cooperation
      1. 4.1 Responsibilities of managerial boards
      2. 4.2 Risk management responsibility
        1. 4.3.1 Notification to CSIRT or competent authorities
          1. 4.3.3 Notification of the incident to the recipients of services
          2. 4.3.4 The communication of significant cyber threats to the recipients of services
          1. 4.3.6 Information sharing on voluntary basis
    2. 5. Conclusion
  20. Author BiographiesSeiten 513 - 520 Download Kapitel (PDF)
  21. Abbreviations and AcronymsSeiten 521 - 524 Download Kapitel (PDF)

Ähnliche Veröffentlichungen

aus dem Schwerpunkt "Handelsrecht & Wirtschaftsrecht & Gesellschaftsrecht"
Cover des Buchs: Maximal Extractable Value
Monographie Kein Zugriff
Paul Leipertz
Maximal Extractable Value
Cover des Buchs: Der forderungslose Anfechtungsgegner
Monographie Kein Zugriff
Paul Goes
Der forderungslose Anfechtungsgegner
Cover des Buchs: Geschäftsleiter versus Gesellschafter unter dem StaRUG
Monographie Kein Zugriff
Maximilian Kaul
Geschäftsleiter versus Gesellschafter unter dem StaRUG
Cover des Buchs: Mehrfachbeteiligungen an Personengesellschaften
Monographie Kein Zugriff
Hannah Stieghorst-Roggermaier
Mehrfachbeteiligungen an Personengesellschaften