Who owns the partnership between Pepsi and Lipton-Tee

Dark clouds over the digital world

Sustainable Risk Management pp 251-261 | Cite as

  • Daniela Korhammer
  • Konstantin Grambov
First Online:
Part of the Strategies for Sustainability book series (STSU)


The collection and analysis of vast amounts of data poses new risks that need to be evaluated following the principles of sustainable development.


Person-related Data Filter Bubble Large Cloud Service Providers Understanding Customer Behavior Device Cloud
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in to check access.


  1. Court of Justice of the European Union (2016). Judgment in joined cases C ‐ 203/15 and C ‐ 698/15 December 21 2016.Google Scholar
  2. Epstein, R., & Robertson, R. (2015). The search engine manipulation effect (SEME) and its possible impact on the outcomes of elections. In PNAS Proceedings of the National Academy of the United States of America11233E4512E4521Google Scholar
  3. Grassegger, H., & Krogerus, M. (2016). I was just showing that the bomb exists. In: Das Magazin, N ° 48, December 3, 2016. Retrieved January 14, 2017, from https://www.dasmagazin.ch/2016/12/03/ich-habe-nur-ge Brille-dass-es-die -bomb-gives /.
  4. Greenberg, A. (2015). Hackers remotely kill a jeep on the highway - with me in it. Retrieved January 14, 2017, from https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway.
  5. HP Security Research (2014). Internet of things research study. Retrieved January 14, 2017 from https://community.hpe.com/hpeb/attachments/hpeb/sws-22/1692/1/HP_IoT_Research_Study.pdf.
  6. Ji, Z., Lipton, Z. C., & Elkan C. (2014). Differential privacy and machine learning: A survey and review. arXiv: 1412.7584v1 [cs.LG].
  7. Lanier, J. (2014). Who does the future belong to? (3rd ed.). Hamburg: Hoffmann and Campe Verlag (Original title: Who owns the future? 2013. New York: Simon & Schuster). Google Scholar
  8. Pariser, E. (2012). Filter bubble. How we are incapacitated on the Internet. Munich: Carl Hanser Verlag (Original title: The filter bubble. What the internet is hiding from you (2011). New York: The Penguin Press). Google Scholar
  9. Roll, E. (2016). The lie — what does it mean for politics when facts no longer count? In: southgerman newspaper, No. 268, 49. Google Scholar
  10. Sadilek A., Kautz, H., & Bigham J. (2012) Finding your friends and following them to where you are. In Fifth ACM International Conference on Web Search and Data Mining (WSDM’12), February 8–12, 2012, Seattle, Washington, USA.Google Scholar
  11. Stahl, L., (2013). Critical security gap enables unauthorized access to the system controller of the Vaillant ecoPOWER 1.0. In: BHKW-Infothek. Retrieved January 14, 2017, from https://www.bhkw-infothek.de/nachrichten/18555/2013-04-15-kritische-sicherheitslucke-ermoglicht-fremdzugriff-auf-systemregel-des-vaillant-ecopower-1-0 .
  12. StatCounter GlobalStats (2017). Retrieved January 22, 2017, from http://gs.statcounter.com/#search_engine-DE-monthly-201512–201612
  13. Wondracek G., Holz T., Kirda E., & Kruegel C. (2010). A practical attack to de-anonymize social network users. In 2010 IEEE Symposium on Security and Privacy (pp. 223-238). Oakland, CA, USA.Google Scholar
  14. Youyou W., Kosinski, M., Stillwell, D. (2015). Computer-based personality judgments are more accurate than those made by humans. In PNAS Proceedings of the National Academy of the United States of America112410361040Google Scholar
  15. ZDNet.com (2013) Firm: Facebook’s shadow profiles are’frightening ’dossiers on everyone. Retrieved January 31, 2017, from http://www.zdnet.com/article/firm-facebooks-shadow-profiles-are-frightening-dossiers-on-everyone/

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Signon Deutschland GmbHBerlinGermany
  2. 2. Society for water treatment mbHIsmaningGermany