Personal Data Protection and Its Reflexes on the Data Broker Industry

  • Guilherme BirckanEmail author
  • Moisés Lima Dutra
  • Douglas D. J. de Macedo
  • Angel Freddy Godoy Viera
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 319)


Demonstrates the relationship between government and private interests in identifying people’s profiles on the Internet. Describes the establishment and development of information aggregators and merchants, the data brokers. Discusses the boundaries of personal data commoditization, which in consequence wears away privacy and anonymity. Associates the inception of laws that mandate publicity to data breaches events, exposing the model, and ensuing debates on the need for further regulation. Presents the innovative generation of legislation created to govern a business that up until then operated free from public scrutiny. Introduces ideas to prevent the extinction of such a business model upon the shift to privacy and data protection.


Digital identity Internet privacy Personal data Data brokers 


  1. Castells, M.: The Power of Identity, vol. 14. Wiley, New York (2011)Google Scholar
  2. Prins, C.: Property and privacy: European perspectives and the commodification of our identity. Inf. Law Ser. 16, 223–257 (2006)Google Scholar
  3. Federal Trade Commission: Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers. Federal Trade Commission, Washington, DC (2012)Google Scholar
  4. Horvitz, E., Mulligan, D.: Data, privacy, and the greater good. Science 349(6245), 253–255 (2015)MathSciNetCrossRefGoogle Scholar
  5. De Mauro, A., Greco, M., Grimaldi, M.: A formal definition of Big Data based on its essential features. Libr. Rev. 65(3), 122–135 (2016)CrossRefGoogle Scholar
  6. Ward, J.S., Barker, A.: Undefined by data: a survey of big data definitions (2013). arXiv preprint arXiv:1309.5821
  7. Sevignani, S.: The commodification of privacy on the Internet. Sci. Public Policy 40(6), 733–739 (2013)CrossRefGoogle Scholar
  8. Roderick, L.: Discipline and power in the digital age: the case of the US consumer data broker industry. Crit. Sociol. 40(5), 729–746 (2014)CrossRefGoogle Scholar
  9. Mosco, V., Wasko, J. (eds.): The Political Economy of Information. University of Wisconsin Press, Madison (1988)Google Scholar
  10. Stevens, G.M.: Data brokers: background and industry overview. Wall Street J. 6(5), 552a (2001)Google Scholar
  11. Otto, P.N., Antón, A.I., Baumer, D.L.: The ChoicePoint dilemma: how data brokers should handle the privacy of personal information. IEEE Secur. Priv. 5(5), 15–23 (2007)CrossRefGoogle Scholar
  12. Ostrowski, D.A.: Identification of trends in consumer behavior through social media. In: 17th World Multi-conference on Systemics, Cybernetics and Informatics, WMSCI 2013, Orlando, Florida, pp. 9–12, July 2013Google Scholar
  13. Ngai, E.W., Xiu, L., Chau, D.C.: Application of data mining techniques in customer relationship management: a literature review and classification. Expert Syst. Appl. 36(2), 2592–2602 (2009)CrossRefGoogle Scholar
  14. Gordon, G.R., Rebovich, D.D.J., Choo, K.S.: Identity fraud trends and patterns. Center for Identity Management and Information Protection, Utica College (2007)Google Scholar
  15. Reyman, J.: User data on the social web: authorship, agency, and appropriation. Coll. Engl. 75(5), 513–533 (2013)Google Scholar
  16. Gangadharan, S.P.: The downside of digital inclusion: expectations and experiences of privacy and surveillance among marginal Internet users. New Media Soc. 19(4), 597–615 (2017)CrossRefGoogle Scholar
  17. Rachels, J.: Why privacy is important. In: Ethical Issues in the Use of Computers, pp. 194–200 (1985)Google Scholar
  18. Roessler, B., Mokrosinska, D.: Privacy and social interaction. Philos. Soc. Crit. 39(8), 771–791 (2013)CrossRefGoogle Scholar
  19. Malgieri, G., Custers, B.: Pricing privacy – the right to know the value of your personal data. Comput. Law Secur. Rev. 34(2), 289–303 (2018)CrossRefGoogle Scholar
  20. Crain, M.: The limits of transparency: data brokers and commodification. New Media Soc. 20(1), 88–104 (2018)CrossRefGoogle Scholar
  21. Stevens, G.: Data Security Breach Notification Laws. Congressional Research Service (2012)Google Scholar
  22. Pires, A.P., Cauchie, J.F.: Um caso de inovação “acidental” em matéria de penas: a lei brasileira de drogas. Revista Direito GV 7(1), 299–329 (2011)CrossRefGoogle Scholar
  23. Iyilade, J., Vassileva, J.: A framework for privacy-aware user data trading. In: Carberry, S., Weibelzahl, S., Micarelli, A., Semeraro, G. (eds.) UMAP 2013. LNCS, vol. 7899, pp. 310–317. Springer, Heidelberg (2013). Scholar
  24. Tona, O., et al.: Towards ethical big data artifacts: a conceptual design. In: Proceedings of the 51st Hawaii International Conference on System Sciences, January 2018Google Scholar
  25. Mun, M., et al.: Personal data vaults: a locus of control for personal data streams. In: Proceedings of the 6th International Conference, p. 17. ACM, November 2010Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020

Authors and Affiliations

  • Guilherme Birckan
    • 1
    Email author
  • Moisés Lima Dutra
    • 1
  • Douglas D. J. de Macedo
    • 1
  • Angel Freddy Godoy Viera
    • 1
  1. 1.Universidade Federal de Santa CatarinaFlorianópolisBrazil

Personalised recommendations