Who owns the partnership between Pepsi and Lipton-Tee
Dark clouds over the digital world
Sustainable Risk Management pp 251-261 | Cite as
- Daniela Korhammer
- Konstantin Grambov
ChapterPart of the Strategies for Sustainability book series (STSU)
The collection and analysis of vast amounts of data poses new risks that need to be evaluated following the principles of sustainable development.
KeywordsPerson-related Data Filter Bubble Large Cloud Service Providers Understanding Customer Behavior Device Cloud
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in to check access.
- Court of Justice of the European Union (2016). Judgment in joined cases C ‐ 203/15 and C ‐ 698/15 December 21 2016.Google Scholar
- Epstein, R., & Robertson, R. (2015). The search engine manipulation effect (SEME) and its possible impact on the outcomes of elections. In PNAS Proceedings of the National Academy of the United States of America11233E4512E4521Google Scholar
- Grassegger, H., & Krogerus, M. (2016). I was just showing that the bomb exists. In: Das Magazin, N ° 48, December 3, 2016. Retrieved January 14, 2017, from https://www.dasmagazin.ch/2016/12/03/ich-habe-nur-ge Brille-dass-es-die -bomb-gives /.
- Greenberg, A. (2015). Hackers remotely kill a jeep on the highway - with me in it. Retrieved January 14, 2017, from https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway.
- HP Security Research (2014). Internet of things research study. Retrieved January 14, 2017 from https://community.hpe.com/hpeb/attachments/hpeb/sws-22/1692/1/HP_IoT_Research_Study.pdf.
- Ji, Z., Lipton, Z. C., & Elkan C. (2014). Differential privacy and machine learning: A survey and review. arXiv: 1412.7584v1 [cs.LG].
- Lanier, J. (2014). Who does the future belong to? (3rd ed.). Hamburg: Hoffmann and Campe Verlag (Original title: Who owns the future? 2013. New York: Simon & Schuster). Google Scholar
- Pariser, E. (2012). Filter bubble. How we are incapacitated on the Internet. Munich: Carl Hanser Verlag (Original title: The filter bubble. What the internet is hiding from you (2011). New York: The Penguin Press). Google Scholar
- Roll, E. (2016). The lie — what does it mean for politics when facts no longer count? In: southgerman newspaper, No. 268, 49. Google Scholar
- Sadilek A., Kautz, H., & Bigham J. (2012) Finding your friends and following them to where you are. In Fifth ACM International Conference on Web Search and Data Mining (WSDM’12), February 8–12, 2012, Seattle, Washington, USA.Google Scholar
- Stahl, L., (2013). Critical security gap enables unauthorized access to the system controller of the Vaillant ecoPOWER 1.0. In: BHKW-Infothek. Retrieved January 14, 2017, from https://www.bhkw-infothek.de/nachrichten/18555/2013-04-15-kritische-sicherheitslucke-ermoglicht-fremdzugriff-auf-systemregel-des-vaillant-ecopower-1-0 .
- StatCounter GlobalStats (2017). Retrieved January 22, 2017, from http://gs.statcounter.com/#search_engine-DE-monthly-201512–201612
- Wondracek G., Holz T., Kirda E., & Kruegel C. (2010). A practical attack to de-anonymize social network users. In 2010 IEEE Symposium on Security and Privacy (pp. 223-238). Oakland, CA, USA.Google Scholar
- Youyou W., Kosinski, M., Stillwell, D. (2015). Computer-based personality judgments are more accurate than those made by humans. In PNAS Proceedings of the National Academy of the United States of America112410361040Google Scholar
- ZDNet.com (2013) Firm: Facebook’s shadow profiles are’frightening ’dossiers on everyone. Retrieved January 31, 2017, from http://www.zdnet.com/article/firm-facebooks-shadow-profiles-are-frightening-dossiers-on-everyone/
© Springer International Publishing AG 2018
Authors and Affiliations
- 1.Signon Deutschland GmbHBerlinGermany
- 2. Society for water treatment mbHIsmaningGermany
- What is my original sound mantra
- How to get Philhealth ID in Cebu
- Prueba evalue 3 descargar whatsapp
- Ioio library basic4android how to scroll
- Gandhi Sas Whois Godaddy
- How to heat stuffed artichokes in the oven
- What is spice extract 160c
- Rahoul chowdry pricewaterhousecoopers new york
- Who killed Mike Beck rapper
- Italian man who went to Malta Subtitle
- When to use yourself or yourself
- Angela Nina Torres Whole Foods Market
- What is Porosus crocodile skin
- Howling bells hearts us release date
- Movable atlas of how infected texts were repo
- Nimmagadda Prema Chowdary Veerender
- Modified who partograph ppt presentation
- Asansol red light court everywhere
- How to make tomato chutney for pongal
- Who makes Kenco Feeders now
- Tsai Mong Hsia dress up who
- Grado Sonata Cartridge, how to connect
- How to use a benteng 3296
- How to Watch DVD Movies on Netflix
- Programming the boost controller msd 7562
- What is solid pressure
- How to know my janmanamam
- How to use titanite shards of dark souls
- Codename cure how to play with friends
- How many units make a megawatt
- Nh welfare fraud first offense - what happens
- Who said tout comprendre cest tout pardonner
- How to draw a population pyramid in spss
- Minecraft How To Use Command Combiner