Have a personal or library account? Click to login
Explaining the unexplainable: data sharing and privacy in Web 3.0 Cover

Explaining the unexplainable: data sharing and privacy in Web 3.0

By: Jieun Shim and  Jieun Kim  
Open Access
|Apr 2025

References

  1. Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L.F., Komanduri, S., Leon, P.G., Sadeh, N., Schaub, F., Sleeper, M., Wang, Y. and Wilson, S (2017) ‘Nudges for privacy and security: understanding and assisting users’ choices online’, ACM Computing Surveys, 50(3), article 44, pp. 1–41. Available at: https://doi.org/10.1145/3054926
  2. Arrieta, A.B., Díaz-Rodríguez, N., Del Ser, J., Bennetot, A., Tabik, S., Barbado, A., García, S., Gil-López, S., Molina, D., Benjamins, R., Chatila, R. and Herrera, F. (2020) ‘Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI’, Information Fusion, 58(1), pp. 82–115. Available at: https://doi.org/10.1016/j.inffus.2019.12.012
  3. Barth, S. and de Jong, M.D.T. (2017) ‘The privacy paradox—investigating discrepancies between expressed privacy concerns and actual online behavior—a systematic literature review’, Telematics and Informatics, 34(7), pp. 1038–1058. Available at: https://doi.org/10.1016/j.tele.2017.04.013
  4. Berger-Walliser, G. (2012) ‘The past and future of proactive law: an overview of the development of the proactive law movement. Proactive law in a business environment’, in Berger-Walliser, G. and Østergaard, K. (eds) Proactive law in a business environment. Copenhagen: DJØF Publishing, pp. 13–31. Available at: https://ssrn.com/abstract=2576761 (Accessed: 18 December 2024).
  5. Bhattacharya, A. (2022) Applied machine learning explainability techniques: make ML models explainable and trustworthy for practical applications using LIME, SHAP, and more. Birmingham: Packt Publishing Ltd.
  6. Bongard-Blanchy, K., Rossi, A., Rivas, S., Doublet, S., Koenig, V. and Lenzini, G. (2021) ‘“I am definitely manipulated, even when I am aware of it. It’s ridiculous!”—Dark patterns from the end-user perspective’, in Proceedings of the 2021 ACM Designing Interactive Systems Conference (DIS ‘21). New York: Association for Computing Machinery, pp. 763–776. Available at: https://doi.org/10.1145/3461778.3462086
  7. Bouchagiar, G. (2018) ‘Privacy and Web 3.0: implementing trust and learning from social networks’, Review of European Studies, 10(4), pp. 16–28. Available at: https://doi.org/10.5539/res.v10n4p16
  8. Bruwer, R.H.J. and Rudman, R. (2015) ‘Web 3.0: governance, risks and safeguards’, Journal of Applied Business Research, 31(3), pp. 1037–1056. Available at: https://doi.org/10.19030/jabr.v31i3.9241
  9. Chen, T. and Guestrin, C. (2016) ‘XGBoost: a scalable tree boosting system’, Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 22, pp. 785–794. Available at: https://doi.org/10.1145/2939672.2939785
  10. ‘Directive (EU) 2022/1925 of the European Parliament and of the Council of 14 September 2022 on contestable and fair markets in the digital sector’. Official Journal L 265, 14 September, pp. 1–66.
  11. Ghalebikesabi, S., Bagdasaryan, E., Yi, R., Yona, I., Shumailov, I., Pappu, A., Shi, C., Weidinger, L., Stanforth, R., Berrada, L., Kohli, P., Huang, P-S. and Balle, B. (2024) ‘Operationalizing contextual integrity in privacy-conscious assistants’, ArXiv, article 2408.02373. Available at: https://doi.org/10.48550/arXiv.2408.02373
  12. Hagan, M. (2020) ‘Legal design as a thing: a theory of change and a set of methods to craft a human-centered legal system’, Design Issues, 36(3), pp. 3–15. Available at: https://doi.org/10.1162/desi_a_00600
  13. Jackson, C.B. and Wang, Y. (2018) ‘Addressing the privacy paradox through personalized privacy notifications’, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(2), article 68, pp. 1–25. Available at: https://doi.org/10.1145/3214271
  14. Jones, M.L., Kaufman, E. and Edenberg, E. (2018) ‘AI and the ethics of automating consent’, IEEE Security & Privacy, 16(3), pp. 64–72. Available at: https://doi.org/10.1109/msp.2018.2701155
  15. Klitou, D. (2014) Privacy-invading technologies and privacy by design: safeguarding privacy, liberty and security in the 21st century. The Hague: T.M.C. Asser Press. Available at: https://doi.org/10.1007/978-94-6265-026-8
  16. Kokolakis, S. (2017) ‘Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon’, Computers & Security, 64(1), pp. 122–134. Available at: https://doi.org/10.1016/j.cose.2015.07.002
  17. Larsson, S. and Heintz, F. (2020) ‘Transparency in artificial intelligence’, Internet Policy Review, 9(2), pp. 1–16. Available at: https://doi.org/10.14763/2020.2.1469
  18. Lundberg, S.M. and Lee, S.-I. (2017) ‘A unified approach to interpreting model predictions’, Advances in Neural Information Processing Systems, 30, pp. 4765–4774. Available at: https://doi.org/10.48550/arXiv.1705.07874
  19. Mazur, J. (2019) ‘Automated decision-making and the precautionary principle in EU law’, TalTech Journal of European Studies, 9(4), pp. 3–18. Available at: https://doi.org/10.1515/bjes-2019-0035
  20. Kenny, E.M., Ford, C., Quinn, M. and Keane, M.T. (2020) ‘Explaining black-box classifiers using post-hoc explanations-by-example: the effect of explanations and error-rates in XAI user studies’, Artificial Intelligence, 294, article 103459. Available at: https://doi.org/10.1016/j.artint.2021.103459
  21. Oviedo, J., Rodriguez, M., Trenta, A., Cannas, D., Natale, D. and Piattini, M. (2024) ‘ISO/IEC quality standards for AI engineering’, Computer Science Review, 54, article 100681. Available at: https://doi.org/10.1016/j.cosrev.2024.100681
  22. Pavelek, O. and Zajíčková, D. (2021) ‘Personal data protection in the decision-making of the CJEU before and after the Lisbon Treaty’, TalTech Journal of European Studies, 11(2), pp. 167–188. Available at: https://doi.org/10.2478/bjes-2021-0020
  23. Pohjonen, S. (2006) ‘Proactive law in the field of law’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49. Stockholm: Stockholm Institute for Scandinavian Law, pp. 53–70. Available at: https://www.scandinavianlaw.se/pdf/49-4.pdf (Accessed: 12 September 2024).
  24. Razmetaeva, Y. (2020) ‘The right to be forgotten in the European perspective’, TalTech Journal of European Studies, 10(1), pp. 58–76. Available at: https://doi.org/10.1515/bjes-2020-0004
  25. Rossi, A., Ducato, R., Haapio, H. and Passera, S. (2019) ‘When design met law: design patterns for information transparency’, Droit de la consommation, 122–123(5), pp. 79–121.
  26. Rudman, R. and Bruwer, R. (2016) ‘Defining Web 3.0: opportunities and challenges’, The Electronic Library, 34(1), pp. 132–154. Available at: https://doi.org/10.1108/EL-08-2014-0140
  27. Schartum, D.W. (2006) ‘Introduction to a government-based perspective on proactive law: a proactive approach’, in P. Wahlgren (ed) A proactive approach. Scandinavian studies in law, 49, Stockholm: Stockholm Institute for Scandinavian Law, pp. 35–51. Available at: https://www.scandinavianlaw.se/pdf/49-3.pdf (Accessed: 12 September 2024).
  28. Schomakers, E.M., Lidynia, C. and Ziefle, M. (2019) ‘A typology of online privacy personalities: exploring and segmenting users’ diverse privacy attitudes and behaviors’, Journal of Grid Computing, 17(4), pp. 727–747. Available at: https://doi.org/10.1007/s10723-019-09500-3
  29. Solarte-Vásquez, M.C., Järv, N. and Nyman-Metcalf, K. (2016) ‘Usability factors in transactional design and smart contracting’, in T. Kerikmäe and A. Rull (eds) The future of law and eTechnologies, Cham: Springer, pp. 149–176. Available at: https://doi.org/10.1007/978-3-319-26896-5_8
  30. Solarte-Vásquez, M.C. and Nyman-Metcalf, K. (2017) ‘Smart contracting: a multidisciplinary and proactive approach for the EU digital single market’, Baltic Journal of European Studies, 7(2), pp. 208–246. Available at: https://doi.org/10.1515/bjes-2017-0017
  31. Taherisadr, M., Stavroulakis, S.A. and Elmalaki, S. (2023) ‘AdaPARL: adaptive privacy-aware reinforcement learning for sequential decision making human-in-the-loop systems’, in IoTDI ‘23: Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, pp. 262–274. Available at: https://doi.org/10.1145/3576842.3582325
  32. Wijesekera, P., Reardon, J., Reyes, I., Tsai, L., Chen, J., Good, N., Wagner, D., Beznosov, K. and Egelman, S. (2018) ‘Contextualizing privacy decisions for better prediction (and protection)’, in CHI ’18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Montreal QC: ACM, pp. 1–25. Available at: https://doi.org/10.1145/3173574.3173842
  33. Xi, R. (2024) ‘On emerging technologies: the old regime and the proactivity’, Cardozo International & Comparative Law Review, 8(1), pp. 3–57. Available at: https://doi.org/10.2139/ssrn.4952153
DOI: https://doi.org/10.2478/bjes-2025-0008 | Journal eISSN: 2674-4619 | Journal ISSN: 2674-4600
Language: English
Page range: 135 - 154
Published on: Apr 2, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2025 Jieun Shim, Jieun Kim, published by Tallinn University of Technology
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.