References
- Adler, B. (2014). The key difference between mobile and web analytics metrics. Retrieved February 10, 2020, from http://info.localytics.com/blog/the-key-differences-between-mobile-and-web-analytics-metrics
- Alepis, E., & Patsakis, C. (2017). Hey doc, is this normal?: Exploring Android permissions in the post marshmallow era. In Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics) (Vol. 10662 LNCS, pp. 53–73). Springer Verlag. https://doi.org/10.1007/978-3-319-71501-8_4
- Alepis, E., & Patsakis, C. (2019). Unravelling security issues of runtime permissions in Android. Journal of Hardware and Systems Security, 3(1), 45–63. https://doi.org/10.1007/s41635-018-0053-2
- Baker, J. (2020). Adapting to ‘the new normal’ using AI-powered personalisation. The Drum. https://www.thedrum.com/news/2020/08/03/adapting-the-new-normal-using-ai-powered-personalisation-changing-context
- Bennett, J. (2010). Vibrant matter: A political ecology of things. Duke University Press.
- Binns, R., Zhao, J., Van Kleek, M., & Shadbolt, N. (2018). Measuring third-party tracker power across web and mobile. ACM Transactions on Internet Technology, 18(4), 1–22. https://doi.org/10.1145/3176246
- Blanke, T., & Pybus, J. (2020). The material conditions of platforms – monopolisation through decentralisation. Social Media + Society, https://doi.org/10.1177/2056305120971632
- Book, T., Pridgen, A., & Wallach, D. S. (2013). Longitudinal analysis of Android ad library permissions. Cryptography and Security. http://arxiv.org/abs/1303.0857
- Brandtzaeg, P. B., Pultier, A., & Moen, G. M. (2019). Losing control to data-hungry apps: A mixed-methods approach to mobile app privacy. Social Science Computer Review, 37(4), 466–488. https://doi.org/10.1177/0894439318777706
- Cardon, D., Cointet, J.-P., & Mazieres, A. (2018). Neurons spike back: The invention of inductive machines and the artificial intelligence controversy. Réseaux, 211(5), 173. https://doi.org/10.3917/res.211.0173ï
- Cavoukian, A. (2009). Privacy by design – the 7 foundational principles – implementation and mapping of fair information practices. Information and Privacy Commissioner of Ontario, Canada, 5. https://www.iab.org/wp-content/IAB-uploads/2011/03/fred_carter.pdf%5Cnwww.privacybydesign.ca
- Coeckelbergh, M. (2020). AI ethics. MIT Press Essential Knowledge series.
- Coté, M., & Pybus, J. (2016). Simondon on datafication. A techno-cultural method. Digital Culture & Society, 2(2), https://doi.org/10.14361/dcs-2016-0206
- Coté, M., & Pybus, J. (2007). Learning to immaterial labour 2.0: MySpace and social networks. Ephemera, 7(2005), 88–106. http://ephemeraweb.org/journal/7-1/7-1cote-pybus.pdf
- Couldry, N., & Mejias, U. A. (2019). Data colonialism: Rethinking big data’s relation to the contemporary subject. Television & New Media, 20(4), 336–349. https://doi.org/10.1177/1527476418796632
- Dieter, M., Gerlitz, C., Helmond, A., Tkacz, N., van der Vlist, F. N., & Weltevrede, E. (2019). Multi-situated app studies: Methods and propositions. Social Media + Society, 5(2), 205630511984648. https://doi.org/10.1177/2056305119846486
- European Union Agency for Network and Information Security, E. (2017). Privacy and data protection in mobile applications: A study on the app development ecosystem and the technical implemantion of GDPR.
- Gao, X., Liu, D., Wang, H., & Sun, K. (2016). Pmdroid: Permission supervision for Android advertising. In Proceedings of the IEEE Symposium on Reliable Distributed Systems (Vol. 2016-January, pp. 120–129). IEEE Computer Society. https://doi.org/10.1109/SRDS.2015.41
- Gerlitz, C. (2016). What counts? Reflections on the Multivalence of social media data. Digital Culture & Society, 2(2), 19–38. https://doi.org/10.14361/dcs-2016-0203
- Han, S., Jung, J., & Wetherall, D. (2012). A study of third-party tracking by mobile apps in the wild. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.225.2284&rep=rep1&type=pdf
- Hargittai, E., & Marwick, A. (2016). “What can i really do?” Explaining the privacy paradox with online apathy. International Journal of Communication, 10, 3737–3757. https://ijoc.org/index.php/ijoc/article/view/4655
- Helmond, A., Nieborg, D. B., & van der Vlist, F. N. (2019). Facebook’s evolution: Development of a platform-as-infrastructure. Internet Histories, 3(2), 123–146. https://doi.org/10.1080/24701475.2019.1593667
- Lin, J., Amini, S., Hong, J. I., Sadeh, N., Lindqvist, J., & Zhang, J. (2012). Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. In UbiComp’12 – Proceedings of the 2012 ACM Conference on Ubiquitous Computing (pp. 501–510). ACM Press. https://doi.org/10.1145/2370216.2370290
- Liu, X., Liu, J., Zhu, S., Wang, W., & Zhang, X. (2019). Privacy risk analysis and mitigation of analytics libraries in the Android ecosystem. IEEE Transactions on Mobile Computing, 1–1. https://doi.org/10.1109/tmc.2019.2903186
- Moallem, A. (2018). Do you really trust “privacy policy” or “terms of use” agreements without reading them? In Advances in intelligent systems and computing (Vol. 593, pp. 290–295). Springer Verlag. https://doi.org/10.1007/978-3-319-60585-2_27
- O’Reilly, L. (2020). Google plans to kill off third-party cookies in Chrome “within 2 years”. Retrieved October 20, 2020, from https://digiday.com/media/google-plans-kill-off-third-party-cookies-chrome-within-2-years/
- Plantin, J.-C., Lagoze, C., Edwards, P. N., & Sandvig, C. (2018). Infrastructure studies meet platform studies in the age of Google and Facebook. New Media & Society, 20(1), 293–310. https://doi.org/10.1177/1461444816661553
- Protalinski, E. (2018). Over 90% of Facebook’s advertising revenue now comes from mobile. VentureBeat. Retrieved February 10, 2020, from https://venturebeat.com/2018/04/25/over-90-of-facebooks-advertising-revenue-now-comes-from-mobile/
- Pybus, J. (2019). Trump, the first Facebook President: Why politicians need our data too. In Trump’s media war (pp. 227–240). Springer International Publishing. https://doi.org/10.1007/978-3-319-94069-4_14
- Pybus, J., Coté, M., & Blanke, T. (2015). Hacking the social life of big data. Big Data & Society, 2(2), 205395171561664. https://doi.org/10.1177/2053951715616649
- Reardon, J., Feal, Á, Wijesekera, P., On, A. E. B., Vallina-Rodriguez, N., & Egelman, S. (2019). 50 ways to leak your data: An exploration of apps’ circumvention of the Android permissions system. In 28th USENIX security symposium (USENIX security 19) (pp. 603–620). https://www.usenix.org/conference/usenixsecurity19/presentation/reardon
- Reyes, I., Wiesekera, P., Razaghpanah, A., Reardon, J., Vallina-Rodriguez, N., Egelman, S., & Kreibich, C. (2017). “Is our children’s apps learning?” Automatically detecting COPPA violations.
- Richter, F. (2019). GAFAM market cap jumps $2.7 trillion over past five years. Retrieved February 10, 2020, from https://www.statista.com/chart/17875/market-capitalization-of-selected-tech-companies/
- Schoeman, W., & Moore, R. (2019). Are you ready for what’s next? The post-digital era is upon us. Retrieved February 10, 2020, from https://www.accenture.com/_acnmedia/pdf-97/accenture-technology-vision-2019-executive-final-brochure.pdf
- Sterling, G. (2019, May 16). The mobile, desktop split may have stabilized at roughly 60%–40%. Search Engine Land. https://searchengineland.com/mobile-desktop-search-traffic-split-may-have-stabilized-at-roughly-60-40-317091
- Turow, J. (2011). The daily you :How the new advertising industry is defining your identity and your worth. Yale University Press.
- Warzel, C. (2019). The loophole that turns your apps into spies. Retrieved February 10, 2020, from https://www.nytimes.com/2019/09/24/opinion/facebook-google-apps-data.html
- Wei, X., Gomez, L., Neamtiu, I., & Faloutsos, M. (2012). Permission evolution in the Android ecosystem. In ACM International Conference Proceeding Series (pp. 31–40). ACM Press. https://doi.org/10.1145/2420950.2420956
- World Economic Forum. (2014). Rethinking personal data : A new lens for strengthening trust. http://www3.weforum.org/docs/WEF_RethinkingPersonalData_ANewLens_Report_2014.pdf
- Zhauniarovich, Y., & Gadyatskaya, O. (2016). Small changes, big changes: An updated view on the Android permission system. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) (Vol. 9854 LNCS, pp. 346–367). Springer Verlag. https://doi.org/10.1007/978-3-319-45719-2_16
- Zuboff, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power. Profile Books Ltd.