File #2872: "2020_Book_BigDataDatabasesAndOwnershipRi.pdf"

2020_Book_BigDataDatabasesAndOwnershipRi.pdf

Testo

1|Preface|6
1|Table of Cases|9
1|Contents|11
1|About the Author|16
1|Acronyms|17
1|List of Figures|21
1|List of Tables|22
1|1 Introduction|23
2|1.1 Problem Statement|28
2|1.2 Summary of the Key Points Analyzed|30
2|1.3 The Structure of This Book|31
2|1.4 Methodology|34
2|References|36
1|Fundamental Legal, Theoretical and Technical Issues|39
1|2 Database Rights in Big Data and the Cloud—Main Legal Considerations|40
2|2.1 Introduction|40
2|2.2 On the Legal Issues of Databases|41
3|2.2.1 International Legal Framework|41
3|2.2.2 Database Protection in the European Legal Framework: Justification for the Double Scheme of Protection|43
3|2.2.3 The Necessity for the Legal Protection of Databases in the Cloud|46
3|2.2.4 Motivations for Introducing the Database Right in the EU|47
2|2.3 Database Rights: Legal Concepts and Main European Court Decisions|49
3|2.3.1 “Obtaining” and “Creating” Data and the “Spin-Off Doctrine” in the Eyes of the CJEU|54
3|2.3.2 Right to Access Information and “Sole Source” Databases|57
3|2.3.3 Sui Generis Right Term of Protection|59
2|2.4 Big Data and the Sui Generis Right Dilemma|59
2|2.5 Database Right and Contract Law|63
2|2.6 Summary and Interim Remarks|67
2|References|67
1|3 Brokers, Clouds and Databases—The Good, the Bad and the Ugly|71
2|3.1 Introduction|71
2|3.2 Databases: Background and Technical Definition|72
3|3.2.1 A Few Examples of Databases in the Cloud|74
2|3.3 Cloud Computing and Brokerage Scenarios|75
3|3.3.1 Literature Review and Background Considerations|75
3|3.3.2 The Cloud Metaphor|77
3|3.3.3 Advantages of Cloud Computing: Main Capabilities|79
3|3.3.4 Disadvantages of Cloud Computing: Some Related Technical and Legal Issues|83
2|3.4 Cloud Deployment Models|84
3|3.4.1 Public Cloud|85
3|3.4.2 Private Cloud|86
3|3.4.3 Community Cloud|86
3|3.4.4 Hybrid Cloud|87
2|3.5 Cloud Service Models|88
3|3.5.1 Software as a Service (SaaS)|88
3|3.5.2 Platform as a Service (PaaS)|89
3|3.5.3 Infrastructure as a Service (IaaS)|89
3|3.5.4 Software Infrastructure as a Service (SIaaS)|90
2|3.6 Cloud Service Brokerage|90
2|3.7 Summary and Interim Remarks|92
2|References|93
1|4 Law and Economics—Five Core Principles in the Cloud|98
2|4.1 Introduction|98
2|4.2 Literature Review and Background Considerations: The Three Schools of Thought|99
3|4.2.1 Positive Law and Economics (Chicago-Style)|100
3|4.2.2 Normative Law and Economics (Yale-Style)|102
3|4.2.3 Functional School of Law and Economics (Virginia-Style)|103
2|4.3 Combining the Three Schools of Thought: Five Core Principles|103
3|4.3.1 Reducing Transaction Costs in the Cloud: “Filling the Gaps” in SLAs|104
3|4.3.2 Turning Technological Negative Externalities into External Benefits: The “Bee Metaphor”|107
3|4.3.3 “Ownership” Rights of Data as a Commons: Transforming “Tragedy” into “Comedy”|110
3|4.3.4 Institutional Alternatives: The Foucault Pendulum of “Imperfect Choices in the Cloud”|114
3|4.3.5 Social Network Analysis (SNA): Cloud Brokers as a Hub|116
2|4.4 Summary and Interim Remarks|118
2|References|119
1|A New Theoretical Framework|126
1|5 Plan-Like Architectures|127
2|5.1 Introduction|127
2|5.2 Plan Theory: We Are All Planning Agents|128
3|5.2.1 Shared Agency Theory: From Individual Plans to Joint Plans|130
3|5.2.2 Laws Are Plans|134
3|5.2.3 Simple Logic of Planning|135
3|5.2.4 Exclusionary Reasons|138
2|5.3 Plan Theory in the Cloud: Plan-Like Architectures|139
3|5.3.1 Brokers as Main Planners|139
3|5.3.2 Code and Architecture Design|142
3|5.3.3 SLAs as Plans|145
2|5.4 Summary and Interim Remarks|146
2|References|147
1|6 Plans, Brokers and Trust|151
2|6.1 Introduction|151
2|6.2 Literature Review and Background Considerations|153
3|6.2.1 Attitudes of Trust (and Distrust) Within Plan Theory|156
3|6.2.2 Different Notions of Trust: A Kaleidoscopic and Critical View|159
3|6.2.3 Delimiting the Concept of Trust|171
2|6.3 The Role of Cloud Brokers for Strengthening Mutual Trust|173
3|6.3.1 The Double Nature of Trust|176
3|6.3.2 Deferring Accountability to Cloud Brokers|178
3|6.3.3 Risk, Vulnerability and Threat|179
3|6.3.4 Trust and Reputation: Beyond Track Records|181
3|6.3.5 Gaining User’s Trust Through Websites and Social Networks|184
3|6.3.6 Blockchain 2.0: The “Trust Machine”|186
2|6.4 Trust and Plan-Like Architectures: How It All Fits Together|188
2|6.5 Summary and Interim Remarks|189
2|References|190
1|7 Framing Choice Architectures|201
2|7.1 Introduction|201
2|7.2 Literature Review and Background Considerations|203
3|7.2.1 Two Ways of Thinking: “Fast” and “Slow”|206
3|7.2.2 Nudge Theory and Cloud Brokerage Architectures|207
3|7.2.3 Behavioral Market Failures, Different Types of Nudges and Soft Paternalism|212
2|7.3 Turning Nudges into Simpler and More Effective SLAs|214
3|7.3.1 Warning Signs for Risk Management in Cloud Brokerage|216
3|7.3.2 Default Rules and Information Disclosure as Prime Nudges|218
2|7.4 The Relation Between Plans, Nudges and Choice Architectures|220
2|7.5 Summary and Interim Remarks|221
2|References|221
1|A New Contractual Model|226
1|8 New Template for SLAs|227
2|8.1 Introduction|227
2|8.2 Background Considerations: SLAs and XML|229
2|8.3 Empirical Study and Optimized Solutions|231
3|8.3.1 Database Rights and the “Legal Glocalization” Conundrum|233
3|8.3.2 Click-Through or Negotiated Terms? A Blended Approach|234
3|8.3.3 “Ownership” Rights in Consumer Data|237
3|8.3.4 “Ownership” Rights in Biological Data|241
2|8.4 A Sui Generis Contractual Framework|248
3|8.4.1 Automated Framework: The “Dead Man’s Switch”|250
3|8.4.2 XML-Based Description Schema|251
3|8.4.3 Brokerage Workflow Process|253
3|8.4.4 Unified Modeling Language and Pseudo-code|256
3|8.4.5 Legal Questions for the Extraction of the Pseudo-code|258
2|8.5 Summary and Interim Remarks|270
2|References|270
1|9 Towards a Legal Risk Assessment|277
2|9.1 Introduction|277
2|9.2 Risk Assessment: Literature Review, Motivation and Justification|279
2|9.3 Risk Assessment Methodology|283
3|9.3.1 High Level Analysis of the System|284
3|9.3.2 Identifying the Assets Involved|284
3|9.3.3 Identifying the Threats in Each Cloud Deployment Scenario|284
2|9.4 Embracing Legal Risks and Enhancing Legal Interoperability|285
2|9.5 Conventional Databases Versus Big Data: Striking the Right Balance|288
3|9.5.1 Territorial Scope of Protection|289
3|9.5.2 “Ownership” Rights of New Data Generated by Big Data|290
3|9.5.3 Lack of International Legal and Contractual Standards|291
2|9.6 Risk Assessment Techniques and Typical Actors Involved in Brokering WS-Agreements|292
3|9.6.1 Typical Actors Involved|292
3|9.6.2 Risk Assessment Techniques|293
2|9.7 Risk Inventory Design for the Identification of Legal Risks|294
2|9.8 Different Stages of Risk Assessment in Cloud Brokerage Scenarios (CBS)|296
2|9.9 Use Case Scenarios: Examples|299
3|9.9.1 Use Case 1: Cloud Services in Business Transactions|301
3|9.9.2 Use Case 2: Genetic Research Projects Within Clinical Trials Scenarios|305
2|9.10 Summary and Interim Remarks|308
2|References|308
1|10 Conclusion—Main Findings and Contributions to the Current Knowledge|313
2|10.1 Theoretical Contribution|313
2|10.2 Scientific Contribution|314
2|References|317
1|Index|319