File #2695: "2019_Book_RegulatingNewTechnologiesInUnc.pdf"
Text
1|Series Information|6
2|Editorial Office|6
1|Contents|7
1|Editor and Contributors|9
1|Introduction|11
1|1 Regulating New Technologies in Times of Change|12
2|Abstract|12
2|1.1 Introduction|12
2|1.2 Back to the Future|14
2|1.3 Regulating Technology|16
2|1.4 Connecting the Dots|20
2|1.5 Solutions|22
2|1.6 Conclusion|24
2|References|25
1|2 Regulating New Technologies in Uncertain Times—Challenges and Opportunities|27
2|Abstract|27
2|2.1 Introduction|28
2|2.2 The Scope: Democratic Governance, Market Regulation, and Data|29
2|2.3 The Contributions|30
3|2.3.1 Part I: New Technologies and Impacts on Democratic Governance|30
3|2.3.2 Part II: The Economic Perspective—Market Regulation of New Technologies|33
3|2.3.3 Part III: The Data in New Technologies|34
2|2.4 The Way Forward|36
2|References|36
1|New Technologies and Impacts on Democratic Governance|37
1|3 Between Freedom and Regulation: Investigating Community Standards for Enhancing Scientific Robustness of Citizen Science|38
2|Abstract|38
2|3.1 Introduction: Citizen Science at the Intersection Between Freedom and Regulation|39
2|3.2 Defining Citizen Science and Community Standards|40
2|3.3 Theoretical Justification of Citizen Science as a Legitimate Method and Practice|44
2|3.4 Tensions Between Expert Science and Citizen Science|45
3|3.4.1 Insights from the Literature|45
3|3.4.2 Empirical Insights|48
2|3.5 A Critical Analysis of Community Standards|50
2|3.6 Conclusion|51
2|Acknowledgements|52
2|References|52
1|4 Human Rights in the Smart City: Regulating Emerging Technologies in City Places|54
2|Abstract|54
2|4.1 Introduction|55
2|4.2 Visions of the Smart City|57
2|4.3 Human Rights in the Smart City|58
3|4.3.1 Human Rights Cities|59
3|4.3.2 Human Rights as the Foundation of the Smart City|61
2|4.4 The Smart City Competition|62
3|4.4.1 Smart City Strategies in Canadian Cities|63
3|4.4.2 Law and Policy in Smart City Proposals|65
2|4.5 Implementing Rights in the Smart City|66
3|4.5.1 Strategies|66
2|4.6 Conclusion|69
2|References|70
1|5 Automated Driving and the Future of Traffic Law|73
2|Abstract|73
2|5.1 Introduction|74
2|5.2 Current Developments|75
2|5.3 Technical Regulations|76
2|5.4 Civil Liability|77
2|5.5 Traffic Laws|79
3|5.5.1 Rules of the Road|80
3|5.5.2 The Notion of ‘Driver’|80
3|5.5.3 The Driver of an Automated Vehicle|82
3|5.5.4 Automation and Traffic Laws|83
3|5.5.5 Adopting a New Approach|84
2|5.6 Final Remarks|86
2|References|86
2|Case Law|88
1|6 Coercive Neuroimaging Technologies in Criminal Law in Europe|89
2|Abstract|89
2|6.1 Introduction|90
2|6.2 Coercive Forensic Neuroimaging|92
3|6.2.1 Introduction|92
3|6.2.2 Forensic Neuroimaging|92
3|6.2.3 Two Types of Coercion|95
3|6.2.4 Conclusion|97
2|6.3 Article 3 ECHR and Coercive Neuroimaging|98
2|6.4 Analogy and Deduction|100
3|6.4.1 Introduction|100
3|6.4.2 Analogy|101
3|6.4.3 Conclusion: From Analogy to Deduction|103
2|6.5 Synthesis: Exploring Legal Implications of Coercive Neuroimaging in Light of Article 3 ECHR|103
2|6.6 Conclusion|105
2|References|106
1|New Technologies and Market Regulation|109
1|7 Planting the Seeds of Market Power: Digital Agriculture, Farmers’ Autonomy, and the Role of Competition Policy|110
2|Abstract|110
2|7.1 Introduction|111
2|7.2 Digital Agriculture in the European Union and Its Benefits|113
3|7.2.1 Technological Background: What is Digital Agriculture?|113
3|7.2.2 The Benefits of Digital Agriculture|114
2|7.3 Adverse Effects on Competition and Farmers’ Autonomy|117
3|7.3.1 Competitive Analysis|119
3|7.3.2 Superior Bargaining Position Facilitates Exclusionary and Exploitative Conduct|125
2|7.4 Regulatory Responses: EU Competition Law Fit-for-Purpose?|126
3|7.4.1 Assessment Under EU Competition Law|127
3|7.4.2 Beyond Traditional Competition Law: Other Rules to the Rescue?|129
2|7.5 How to Proceed: Policy Recommendations|134
2|References|135
1|8 Sharing Data and Privacy in the Platform Economy: The Right to Data Portability and “Porting Rights”|138
2|Abstract|138
2|8.1 Introduction to the “Platform Economy”: Network Effects and Switching Cost|139
2|8.2 The Right to Data Portability as a Milestone for Competition Law, User’s Protection and Privacy: An Introduction|142
2|8.3 The Right to Data Portability in the General Data Protection Regulation and in the Guidelines of the Article 29 Working Group: The Privacy Concern|145
2|8.4 Non-personal Data and Professional Users: The Proposals of the EU Commission|150
2|8.5 Provided, Observed and Inferred Data: Regulating New Technology in Uncertain Times|153
2|References|156
1|9 Regulating Smart Distributed Generation Electricity Systems in the European Union|158
2|Abstract|158
2|9.1 Introduction|159
2|9.2 The Disruptive Nature of Distributed Generation|160
2|9.3 Promoting Distributed Generation in the EU: Merits and Risks|162
2|9.4 The EU Legal Order: Law in Force and the Proposal for a Directive on the Internal Electricity Market|164
2|9.5 The Special Issue of Net Metering|169
2|9.6 Conclusion|172
2|References|173
1|The Data in New Technologies—The Utilization of Data and the Protection of Personal Data|177
1|10 A Public Database as a Way Towards More Effective Algorithm Regulation and Transparency?|178
2|Abstract|178
2|10.1 Introduction|179
2|10.2 Transparency in the GDPR|180
3|10.2.1 Fundamental Importance and Elements|180
3|10.2.2 Algorithmic Transparency|181
4|10.2.2.1 Towards Data Subjects|182
4|10.2.2.2 Towards DPAs|183
4|10.2.2.3 Towards the Public|184
2|10.3 The Need for Public Transparency|184
3|10.3.1 For Data Protection in General|184
3|10.3.2 For Algorithms in Particular|185
2|10.4 A Public Database of Algorithms|186
3|10.4.1 Role Models|187
4|10.4.1.1 Environmental Law|187
4|10.4.1.2 OpenSchufa|188
4|10.4.1.3 Lebensmittelklarheit.de|189
3|10.4.2 Details|190
4|10.4.2.1 Responsible Body|190
4|10.4.2.2 Content|191
5|Data Protection Impact Assessment Results|191
5|Existing User Data|191
5|Discussion Platform|192
4|10.4.2.3 Access|193
2|10.5 Conclusion|193
2|References|194
1|11 Access to and Re-use of Government Data and the Use of Big Data in Healthcare|196
2|Abstract|196
2|11.1 Setting the Scene|197
3|11.1.1 Data Availability as a Challenge for Big Data in Healthcare|197
3|11.1.2 The Use of Government Data by Private Healthcare Actors|198
3|11.1.3 Government Data Access and Re-use Legislation: Necessary and Proportionate?|199
2|11.2 Access to Government Data|201
3|11.2.1 An International and Constitutional Right|201
3|11.2.2 A “Governmental” Obligation to Allow Access|203
3|11.2.3 Access upon Request versus Proactive Publication|205
3|11.2.4 Access Limitations|206
4|11.2.4.1 Which Information Can Be Accessed?|206
4|11.2.4.2 Which Persons Can (Request) Access (to) Government Data?|208
4|11.2.4.3 Formalities and Processing of the Access Request|209
4|11.2.4.4 Access Forms|211
4|11.2.4.5 Access Charges|212
4|11.2.4.6 Copyright Protection|212
4|11.2.4.7 Access Refusal Grounds|213
2|11.3 Re-use of Public Sector Information|216
3|11.3.1 The PSI Directive|216
3|11.3.2 Link with Access to Government Information?|217
3|11.3.3 A “Governmental” Obligation to Allow Re-use|218
3|11.3.4 Re-use Limitations|219
4|11.3.4.1 What Kind of Information Can Be Re-used?|219
4|11.3.4.2 Who Can Re-use and for What Purpose?|220
4|11.3.4.3 Re-use Request Formalities and Processing|220
4|11.3.4.4 Re-use Conditions|221
4|11.3.4.5 Information Delivery Modalities|223
4|11.3.4.6 Re-use Refusal Grounds|224
2|11.4 Lessons for the Legislator?|226
2|References|226
1|12 The Challenges of Risk Profiling Used by Law Enforcement: Examining the Cases of COMPAS and SyRI|228
2|Abstract|228
2|12.1 Introduction|229
2|12.2 Risk Profiling|230
2|12.3 Mapping Practice|232
3|12.3.1 Risk Profiling in General Policing|232
3|12.3.2 Risk Profiling in an Individual Case|234
2|12.4 Challenges of Risk Profiling by Law Enforcement|236
3|12.4.1 Challenges of Transparency|236
3|12.4.2 Challenging Procedural Safeguards|237
3|12.4.3 Challenges Pertaining to Discrimination|239
2|12.5 Conclusion|240
2|References|241
1|13 Regulating Data Re-use for Research: The Challenges of Innovation and Incipient Social Norms|244
2|Abstract|244
2|13.1 The Rise of Big Data Analytics in Research Utilising Administrative Data|245
2|13.2 The Study|247
3|13.2.1 Methods|247
3|13.2.2 Data Analysis|248
2|13.3 The Findings|250
3|13.3.1 Divergent Approaches to the Construction of the Right to Privacy|250
3|13.3.2 An Account of the EU Directive’s Notion of ‘Privacy’|253
3|13.3.3 Divergent Approaches to the Value of Research as an Activity in the Public Interest|254
2|13.4 The Potential Drivers of These Divergences|256
3|13.4.1 Innovations and Uncertainty|256
3|13.4.2 The Role of Data Processing Actors|258
2|13.5 What Does This Mean for the Law?|259
2|References|261
1|14 European Cloud Service Data Protection Certification|264
2|Abstract|264
2|14.1 Introduction|265
2|14.2 The Risks and Uncertainties of Cloud Services|266
2|14.3 Certification Mechanisms|267
2|14.4 Certification Mechanisms According to GDPR|269
3|14.4.1 The Legislative Framework of Articles 42 and 43 GDPR|269
3|14.4.2 AUDITOR—Interdisciplinary Research Project from Germany|270
3|14.4.3 Certification Object: Operating Processes|271
4|14.4.3.1 Derivation from the Legal Provisions of the GDPR|271
4|14.4.3.2 Cloud-Specific Certification Object|273
3|14.4.4 Certification Criteria—The Necessity of Specification|276
3|14.4.5 Certification Procedure and Accreditation of Certification Bodies|277
3|14.4.6 Conclusion|279
2|References|280
1|15 Data Privacy Laws Response to Ransomware Attacks: A Multi-Jurisdictional Analysis|284
2|Abstract|284
2|15.1 Introduction|285
2|15.2 What is Ransomware?|286
2|15.3 Ransomware Targeting Personal Data|288
2|15.4 Ransomware as Information Security Failure|289
2|15.5 Ransomware in the Light of Legal Obligations to Secure Personal Data|291
3|15.5.1 InfoSec and Security of Personal Data|291
3|15.5.2 “Security Safeguards Principle” in the OECD Guidelines|291
3|15.5.3 European Union|292
3|15.5.4 Canada|294
3|15.5.5 Israel|296
3|15.5.6 Analysis|298
2|15.6 Data Breach Notification Obligations|301
3|15.6.1 Rationale|301
3|15.6.2 European Union|302
3|15.6.3 Canada|302
3|15.6.4 Israel|303
2|15.7 Conclusion|304
2|Acknowledgements|305
2|References|305
1|Conclusion|309
1|16 Concluding Observations: The Regulation of Technology—What Lies Ahead—And Where Do We Want to End Up?|310
2|Abstract|310
2|16.1 Introduction|311
2|16.2 The Human Aspect and Technology|311
2|16.3 Competitive Technology and Technology in Competition|312
2|16.4 Technology, Data and the Role of the Individual|312
2|16.5 Conclusion|314
2|Editorial Office|6
1|Contents|7
1|Editor and Contributors|9
1|Introduction|11
1|1 Regulating New Technologies in Times of Change|12
2|Abstract|12
2|1.1 Introduction|12
2|1.2 Back to the Future|14
2|1.3 Regulating Technology|16
2|1.4 Connecting the Dots|20
2|1.5 Solutions|22
2|1.6 Conclusion|24
2|References|25
1|2 Regulating New Technologies in Uncertain Times—Challenges and Opportunities|27
2|Abstract|27
2|2.1 Introduction|28
2|2.2 The Scope: Democratic Governance, Market Regulation, and Data|29
2|2.3 The Contributions|30
3|2.3.1 Part I: New Technologies and Impacts on Democratic Governance|30
3|2.3.2 Part II: The Economic Perspective—Market Regulation of New Technologies|33
3|2.3.3 Part III: The Data in New Technologies|34
2|2.4 The Way Forward|36
2|References|36
1|New Technologies and Impacts on Democratic Governance|37
1|3 Between Freedom and Regulation: Investigating Community Standards for Enhancing Scientific Robustness of Citizen Science|38
2|Abstract|38
2|3.1 Introduction: Citizen Science at the Intersection Between Freedom and Regulation|39
2|3.2 Defining Citizen Science and Community Standards|40
2|3.3 Theoretical Justification of Citizen Science as a Legitimate Method and Practice|44
2|3.4 Tensions Between Expert Science and Citizen Science|45
3|3.4.1 Insights from the Literature|45
3|3.4.2 Empirical Insights|48
2|3.5 A Critical Analysis of Community Standards|50
2|3.6 Conclusion|51
2|Acknowledgements|52
2|References|52
1|4 Human Rights in the Smart City: Regulating Emerging Technologies in City Places|54
2|Abstract|54
2|4.1 Introduction|55
2|4.2 Visions of the Smart City|57
2|4.3 Human Rights in the Smart City|58
3|4.3.1 Human Rights Cities|59
3|4.3.2 Human Rights as the Foundation of the Smart City|61
2|4.4 The Smart City Competition|62
3|4.4.1 Smart City Strategies in Canadian Cities|63
3|4.4.2 Law and Policy in Smart City Proposals|65
2|4.5 Implementing Rights in the Smart City|66
3|4.5.1 Strategies|66
2|4.6 Conclusion|69
2|References|70
1|5 Automated Driving and the Future of Traffic Law|73
2|Abstract|73
2|5.1 Introduction|74
2|5.2 Current Developments|75
2|5.3 Technical Regulations|76
2|5.4 Civil Liability|77
2|5.5 Traffic Laws|79
3|5.5.1 Rules of the Road|80
3|5.5.2 The Notion of ‘Driver’|80
3|5.5.3 The Driver of an Automated Vehicle|82
3|5.5.4 Automation and Traffic Laws|83
3|5.5.5 Adopting a New Approach|84
2|5.6 Final Remarks|86
2|References|86
2|Case Law|88
1|6 Coercive Neuroimaging Technologies in Criminal Law in Europe|89
2|Abstract|89
2|6.1 Introduction|90
2|6.2 Coercive Forensic Neuroimaging|92
3|6.2.1 Introduction|92
3|6.2.2 Forensic Neuroimaging|92
3|6.2.3 Two Types of Coercion|95
3|6.2.4 Conclusion|97
2|6.3 Article 3 ECHR and Coercive Neuroimaging|98
2|6.4 Analogy and Deduction|100
3|6.4.1 Introduction|100
3|6.4.2 Analogy|101
3|6.4.3 Conclusion: From Analogy to Deduction|103
2|6.5 Synthesis: Exploring Legal Implications of Coercive Neuroimaging in Light of Article 3 ECHR|103
2|6.6 Conclusion|105
2|References|106
1|New Technologies and Market Regulation|109
1|7 Planting the Seeds of Market Power: Digital Agriculture, Farmers’ Autonomy, and the Role of Competition Policy|110
2|Abstract|110
2|7.1 Introduction|111
2|7.2 Digital Agriculture in the European Union and Its Benefits|113
3|7.2.1 Technological Background: What is Digital Agriculture?|113
3|7.2.2 The Benefits of Digital Agriculture|114
2|7.3 Adverse Effects on Competition and Farmers’ Autonomy|117
3|7.3.1 Competitive Analysis|119
3|7.3.2 Superior Bargaining Position Facilitates Exclusionary and Exploitative Conduct|125
2|7.4 Regulatory Responses: EU Competition Law Fit-for-Purpose?|126
3|7.4.1 Assessment Under EU Competition Law|127
3|7.4.2 Beyond Traditional Competition Law: Other Rules to the Rescue?|129
2|7.5 How to Proceed: Policy Recommendations|134
2|References|135
1|8 Sharing Data and Privacy in the Platform Economy: The Right to Data Portability and “Porting Rights”|138
2|Abstract|138
2|8.1 Introduction to the “Platform Economy”: Network Effects and Switching Cost|139
2|8.2 The Right to Data Portability as a Milestone for Competition Law, User’s Protection and Privacy: An Introduction|142
2|8.3 The Right to Data Portability in the General Data Protection Regulation and in the Guidelines of the Article 29 Working Group: The Privacy Concern|145
2|8.4 Non-personal Data and Professional Users: The Proposals of the EU Commission|150
2|8.5 Provided, Observed and Inferred Data: Regulating New Technology in Uncertain Times|153
2|References|156
1|9 Regulating Smart Distributed Generation Electricity Systems in the European Union|158
2|Abstract|158
2|9.1 Introduction|159
2|9.2 The Disruptive Nature of Distributed Generation|160
2|9.3 Promoting Distributed Generation in the EU: Merits and Risks|162
2|9.4 The EU Legal Order: Law in Force and the Proposal for a Directive on the Internal Electricity Market|164
2|9.5 The Special Issue of Net Metering|169
2|9.6 Conclusion|172
2|References|173
1|The Data in New Technologies—The Utilization of Data and the Protection of Personal Data|177
1|10 A Public Database as a Way Towards More Effective Algorithm Regulation and Transparency?|178
2|Abstract|178
2|10.1 Introduction|179
2|10.2 Transparency in the GDPR|180
3|10.2.1 Fundamental Importance and Elements|180
3|10.2.2 Algorithmic Transparency|181
4|10.2.2.1 Towards Data Subjects|182
4|10.2.2.2 Towards DPAs|183
4|10.2.2.3 Towards the Public|184
2|10.3 The Need for Public Transparency|184
3|10.3.1 For Data Protection in General|184
3|10.3.2 For Algorithms in Particular|185
2|10.4 A Public Database of Algorithms|186
3|10.4.1 Role Models|187
4|10.4.1.1 Environmental Law|187
4|10.4.1.2 OpenSchufa|188
4|10.4.1.3 Lebensmittelklarheit.de|189
3|10.4.2 Details|190
4|10.4.2.1 Responsible Body|190
4|10.4.2.2 Content|191
5|Data Protection Impact Assessment Results|191
5|Existing User Data|191
5|Discussion Platform|192
4|10.4.2.3 Access|193
2|10.5 Conclusion|193
2|References|194
1|11 Access to and Re-use of Government Data and the Use of Big Data in Healthcare|196
2|Abstract|196
2|11.1 Setting the Scene|197
3|11.1.1 Data Availability as a Challenge for Big Data in Healthcare|197
3|11.1.2 The Use of Government Data by Private Healthcare Actors|198
3|11.1.3 Government Data Access and Re-use Legislation: Necessary and Proportionate?|199
2|11.2 Access to Government Data|201
3|11.2.1 An International and Constitutional Right|201
3|11.2.2 A “Governmental” Obligation to Allow Access|203
3|11.2.3 Access upon Request versus Proactive Publication|205
3|11.2.4 Access Limitations|206
4|11.2.4.1 Which Information Can Be Accessed?|206
4|11.2.4.2 Which Persons Can (Request) Access (to) Government Data?|208
4|11.2.4.3 Formalities and Processing of the Access Request|209
4|11.2.4.4 Access Forms|211
4|11.2.4.5 Access Charges|212
4|11.2.4.6 Copyright Protection|212
4|11.2.4.7 Access Refusal Grounds|213
2|11.3 Re-use of Public Sector Information|216
3|11.3.1 The PSI Directive|216
3|11.3.2 Link with Access to Government Information?|217
3|11.3.3 A “Governmental” Obligation to Allow Re-use|218
3|11.3.4 Re-use Limitations|219
4|11.3.4.1 What Kind of Information Can Be Re-used?|219
4|11.3.4.2 Who Can Re-use and for What Purpose?|220
4|11.3.4.3 Re-use Request Formalities and Processing|220
4|11.3.4.4 Re-use Conditions|221
4|11.3.4.5 Information Delivery Modalities|223
4|11.3.4.6 Re-use Refusal Grounds|224
2|11.4 Lessons for the Legislator?|226
2|References|226
1|12 The Challenges of Risk Profiling Used by Law Enforcement: Examining the Cases of COMPAS and SyRI|228
2|Abstract|228
2|12.1 Introduction|229
2|12.2 Risk Profiling|230
2|12.3 Mapping Practice|232
3|12.3.1 Risk Profiling in General Policing|232
3|12.3.2 Risk Profiling in an Individual Case|234
2|12.4 Challenges of Risk Profiling by Law Enforcement|236
3|12.4.1 Challenges of Transparency|236
3|12.4.2 Challenging Procedural Safeguards|237
3|12.4.3 Challenges Pertaining to Discrimination|239
2|12.5 Conclusion|240
2|References|241
1|13 Regulating Data Re-use for Research: The Challenges of Innovation and Incipient Social Norms|244
2|Abstract|244
2|13.1 The Rise of Big Data Analytics in Research Utilising Administrative Data|245
2|13.2 The Study|247
3|13.2.1 Methods|247
3|13.2.2 Data Analysis|248
2|13.3 The Findings|250
3|13.3.1 Divergent Approaches to the Construction of the Right to Privacy|250
3|13.3.2 An Account of the EU Directive’s Notion of ‘Privacy’|253
3|13.3.3 Divergent Approaches to the Value of Research as an Activity in the Public Interest|254
2|13.4 The Potential Drivers of These Divergences|256
3|13.4.1 Innovations and Uncertainty|256
3|13.4.2 The Role of Data Processing Actors|258
2|13.5 What Does This Mean for the Law?|259
2|References|261
1|14 European Cloud Service Data Protection Certification|264
2|Abstract|264
2|14.1 Introduction|265
2|14.2 The Risks and Uncertainties of Cloud Services|266
2|14.3 Certification Mechanisms|267
2|14.4 Certification Mechanisms According to GDPR|269
3|14.4.1 The Legislative Framework of Articles 42 and 43 GDPR|269
3|14.4.2 AUDITOR—Interdisciplinary Research Project from Germany|270
3|14.4.3 Certification Object: Operating Processes|271
4|14.4.3.1 Derivation from the Legal Provisions of the GDPR|271
4|14.4.3.2 Cloud-Specific Certification Object|273
3|14.4.4 Certification Criteria—The Necessity of Specification|276
3|14.4.5 Certification Procedure and Accreditation of Certification Bodies|277
3|14.4.6 Conclusion|279
2|References|280
1|15 Data Privacy Laws Response to Ransomware Attacks: A Multi-Jurisdictional Analysis|284
2|Abstract|284
2|15.1 Introduction|285
2|15.2 What is Ransomware?|286
2|15.3 Ransomware Targeting Personal Data|288
2|15.4 Ransomware as Information Security Failure|289
2|15.5 Ransomware in the Light of Legal Obligations to Secure Personal Data|291
3|15.5.1 InfoSec and Security of Personal Data|291
3|15.5.2 “Security Safeguards Principle” in the OECD Guidelines|291
3|15.5.3 European Union|292
3|15.5.4 Canada|294
3|15.5.5 Israel|296
3|15.5.6 Analysis|298
2|15.6 Data Breach Notification Obligations|301
3|15.6.1 Rationale|301
3|15.6.2 European Union|302
3|15.6.3 Canada|302
3|15.6.4 Israel|303
2|15.7 Conclusion|304
2|Acknowledgements|305
2|References|305
1|Conclusion|309
1|16 Concluding Observations: The Regulation of Technology—What Lies Ahead—And Where Do We Want to End Up?|310
2|Abstract|310
2|16.1 Introduction|311
2|16.2 The Human Aspect and Technology|311
2|16.3 Competitive Technology and Technology in Competition|312
2|16.4 Technology, Data and the Role of the Individual|312
2|16.5 Conclusion|314